@payez/next-mvp 4.0.1 → 4.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/api/auth-handler.d.ts +66 -0
- package/dist/api/auth-handler.js +397 -0
- package/dist/api/index.d.ts +10 -0
- package/dist/api/index.js +19 -0
- package/dist/api-handlers/account/change-password.d.ts +9 -0
- package/dist/api-handlers/account/change-password.js +110 -0
- package/dist/api-handlers/account/masked-info.d.ts +2 -0
- package/dist/api-handlers/account/masked-info.js +41 -0
- package/dist/api-handlers/account/profile.d.ts +3 -0
- package/dist/api-handlers/account/profile.js +63 -0
- package/dist/api-handlers/account/recovery/initiate.d.ts +2 -0
- package/dist/api-handlers/account/recovery/initiate.js +26 -0
- package/dist/api-handlers/account/recovery/send-code.d.ts +2 -0
- package/dist/api-handlers/account/recovery/send-code.js +28 -0
- package/dist/api-handlers/account/recovery/verify-code.d.ts +2 -0
- package/dist/api-handlers/account/recovery/verify-code.js +28 -0
- package/dist/api-handlers/account/reset-password.d.ts +2 -0
- package/dist/api-handlers/account/reset-password.js +26 -0
- package/dist/api-handlers/account/send-code.d.ts +24 -0
- package/dist/api-handlers/account/send-code.js +60 -0
- package/dist/api-handlers/account/update-phone.d.ts +27 -0
- package/dist/api-handlers/account/update-phone.js +64 -0
- package/dist/api-handlers/account/validate-password.d.ts +17 -0
- package/dist/api-handlers/account/validate-password.js +81 -0
- package/dist/api-handlers/account/verify-email.d.ts +26 -0
- package/dist/api-handlers/account/verify-email.js +106 -0
- package/dist/api-handlers/account/verify-sms.d.ts +26 -0
- package/dist/api-handlers/account/verify-sms.js +106 -0
- package/dist/api-handlers/admin/analytics.d.ts +19 -0
- package/dist/api-handlers/admin/analytics.js +378 -0
- package/dist/api-handlers/admin/audit.d.ts +19 -0
- package/dist/api-handlers/admin/audit.js +213 -0
- package/dist/api-handlers/admin/index.d.ts +21 -0
- package/dist/api-handlers/admin/index.js +42 -0
- package/dist/api-handlers/admin/redis-sessions.d.ts +35 -0
- package/dist/api-handlers/admin/redis-sessions.js +203 -0
- package/dist/api-handlers/admin/sessions.d.ts +20 -0
- package/dist/api-handlers/admin/sessions.js +283 -0
- package/dist/api-handlers/admin/site-logs.d.ts +45 -0
- package/dist/api-handlers/admin/site-logs.js +317 -0
- package/dist/api-handlers/admin/stats.d.ts +20 -0
- package/dist/api-handlers/admin/stats.js +239 -0
- package/dist/api-handlers/admin/users.d.ts +19 -0
- package/dist/api-handlers/admin/users.js +221 -0
- package/dist/api-handlers/admin/vibe-data.d.ts +79 -0
- package/dist/api-handlers/admin/vibe-data.js +267 -0
- package/dist/api-handlers/anon/preferences.d.ts +37 -0
- package/dist/api-handlers/anon/preferences.js +96 -0
- package/dist/api-handlers/auth/jwks.d.ts +2 -0
- package/dist/api-handlers/auth/jwks.js +24 -0
- package/dist/api-handlers/auth/login.d.ts +42 -0
- package/dist/api-handlers/auth/login.js +178 -0
- package/dist/api-handlers/auth/refresh.d.ts +74 -0
- package/dist/api-handlers/auth/refresh.js +633 -0
- package/dist/api-handlers/auth/signout.d.ts +37 -0
- package/dist/api-handlers/auth/signout.js +186 -0
- package/dist/api-handlers/auth/status.d.ts +8 -0
- package/dist/api-handlers/auth/status.js +23 -0
- package/dist/api-handlers/auth/update-session.d.ts +37 -0
- package/dist/api-handlers/auth/update-session.js +93 -0
- package/dist/api-handlers/auth/validate.d.ts +6 -0
- package/dist/api-handlers/auth/validate.js +43 -0
- package/dist/api-handlers/auth/verify-code.d.ts +43 -0
- package/dist/api-handlers/auth/verify-code.js +90 -0
- package/dist/api-handlers/session/refresh-viability.d.ts +14 -0
- package/dist/api-handlers/session/refresh-viability.js +39 -0
- package/dist/api-handlers/session/viability.d.ts +13 -0
- package/dist/api-handlers/session/viability.js +114 -0
- package/dist/api-handlers/test/force-expire.d.ts +23 -0
- package/dist/api-handlers/test/force-expire.js +59 -0
- package/dist/auth/auth-decision.d.ts +39 -0
- package/dist/auth/auth-decision.js +182 -0
- package/dist/auth/better-auth.d.ts +79 -0
- package/dist/auth/better-auth.js +119 -0
- package/dist/auth/route-config.d.ts +66 -0
- package/dist/auth/route-config.js +190 -0
- package/dist/auth/types/auth-types.d.ts +417 -0
- package/dist/auth/types/auth-types.js +53 -0
- package/dist/auth/types/index.d.ts +6 -0
- package/dist/auth/types/index.js +22 -0
- package/dist/auth/unauthenticated-routes.d.ts +1 -0
- package/dist/auth/unauthenticated-routes.js +19 -0
- package/dist/auth/utils/idp-client.d.ts +94 -0
- package/dist/auth/utils/idp-client.js +384 -0
- package/dist/auth/utils/index.d.ts +5 -0
- package/dist/auth/utils/index.js +21 -0
- package/dist/auth/utils/token-utils.d.ts +83 -0
- package/dist/auth/utils/token-utils.js +218 -0
- package/dist/client/AuthContext.d.ts +19 -0
- package/dist/client/AuthContext.js +115 -0
- package/dist/client/better-auth-client.d.ts +1020 -0
- package/dist/client/better-auth-client.js +68 -0
- package/dist/client/fetch-with-auth.d.ts +11 -0
- package/dist/client/fetch-with-auth.js +44 -0
- package/dist/client/fetchWithSession.d.ts +3 -0
- package/dist/client/fetchWithSession.js +24 -0
- package/dist/client/index.d.ts +9 -0
- package/dist/client/index.js +20 -0
- package/dist/client/useAnonSession.d.ts +36 -0
- package/dist/client/useAnonSession.js +99 -0
- package/dist/components/SessionSync.d.ts +13 -0
- package/dist/components/SessionSync.js +121 -0
- package/dist/components/SignalRHealthCheck.d.ts +10 -0
- package/dist/components/SignalRHealthCheck.js +97 -0
- package/dist/components/account/MobileNavDrawer.d.ts +32 -0
- package/dist/components/account/MobileNavDrawer.js +81 -0
- package/dist/components/account/UserAvatarMenu.d.ts +20 -0
- package/dist/components/account/UserAvatarMenu.js +91 -0
- package/dist/components/account/index.d.ts +9 -0
- package/dist/components/account/index.js +13 -0
- package/dist/components/admin/AlertSettingsTab.d.ts +48 -0
- package/dist/components/admin/AlertSettingsTab.js +351 -0
- package/dist/components/admin/AnalyticsTab.d.ts +22 -0
- package/dist/components/admin/AnalyticsTab.js +167 -0
- package/dist/components/admin/DataBrowserTab.d.ts +19 -0
- package/dist/components/admin/DataBrowserTab.js +252 -0
- package/dist/components/admin/LoggingSettingsTab.d.ts +73 -0
- package/dist/components/admin/LoggingSettingsTab.js +339 -0
- package/dist/components/admin/SessionsTab.d.ts +37 -0
- package/dist/components/admin/SessionsTab.js +165 -0
- package/dist/components/admin/StatsTab.d.ts +53 -0
- package/dist/components/admin/StatsTab.js +161 -0
- package/dist/components/admin/VibeAdminContext.d.ts +32 -0
- package/dist/components/admin/VibeAdminContext.js +38 -0
- package/dist/components/admin/VibeAdminLayout.d.ts +11 -0
- package/dist/components/admin/VibeAdminLayout.js +71 -0
- package/dist/components/admin/index.d.ts +29 -0
- package/dist/components/admin/index.js +44 -0
- package/dist/components/auth/FederatedAuthSection.d.ts +8 -0
- package/dist/components/auth/FederatedAuthSection.js +45 -0
- package/dist/components/auth/ModeAwareLoginPage.d.ts +10 -0
- package/dist/components/auth/ModeAwareLoginPage.js +42 -0
- package/dist/components/auth/ModeAwareSignupPage.d.ts +9 -0
- package/dist/components/auth/ModeAwareSignupPage.js +78 -0
- package/dist/components/auth/TraditionalAuthSection.d.ts +14 -0
- package/dist/components/auth/TraditionalAuthSection.js +20 -0
- package/dist/components/recovery/CompleteStep.d.ts +5 -0
- package/dist/components/recovery/CompleteStep.js +8 -0
- package/dist/components/recovery/InitiateRecoveryStep.d.ts +8 -0
- package/dist/components/recovery/InitiateRecoveryStep.js +20 -0
- package/dist/components/recovery/SelectMethodStep.d.ts +8 -0
- package/dist/components/recovery/SelectMethodStep.js +8 -0
- package/dist/components/recovery/SetPasswordStep.d.ts +6 -0
- package/dist/components/recovery/SetPasswordStep.js +20 -0
- package/dist/components/recovery/VerifyCodeStep.d.ts +10 -0
- package/dist/components/recovery/VerifyCodeStep.js +24 -0
- package/dist/components/reserved/ReservedRecoveryWarning.d.ts +38 -0
- package/dist/components/reserved/ReservedRecoveryWarning.js +92 -0
- package/dist/components/reserved/ReservedStatusBox.d.ts +30 -0
- package/dist/components/reserved/ReservedStatusBox.js +71 -0
- package/dist/components/ui/BetaBadge.d.ts +29 -0
- package/dist/components/ui/BetaBadge.js +38 -0
- package/dist/components/ui/Footer.d.ts +37 -0
- package/dist/components/ui/Footer.js +41 -0
- package/dist/config/env.d.ts +66 -0
- package/dist/config/env.js +57 -0
- package/dist/config/logger.d.ts +57 -0
- package/dist/config/logger.js +73 -0
- package/dist/config/logging-config.d.ts +30 -0
- package/dist/config/logging-config.js +122 -0
- package/dist/config/unauthenticated-routes.d.ts +17 -0
- package/dist/config/unauthenticated-routes.js +24 -0
- package/dist/config/vibe-log-transport.d.ts +81 -0
- package/dist/config/vibe-log-transport.js +212 -0
- package/dist/edge/internal-api-url.d.ts +53 -0
- package/dist/edge/internal-api-url.js +63 -0
- package/dist/edge/middleware.d.ts +14 -0
- package/dist/edge/middleware.js +32 -0
- package/dist/hooks/useAuth.d.ts +23 -0
- package/dist/hooks/useAuth.js +83 -0
- package/dist/hooks/useAuthSettings.d.ts +59 -0
- package/dist/hooks/useAuthSettings.js +93 -0
- package/dist/hooks/useAvailableProviders.d.ts +43 -0
- package/dist/hooks/useAvailableProviders.js +112 -0
- package/dist/hooks/usePasswordValidation.d.ts +27 -0
- package/dist/hooks/usePasswordValidation.js +102 -0
- package/dist/hooks/useProfile.d.ts +15 -0
- package/dist/hooks/useProfile.js +59 -0
- package/dist/hooks/usePublicAuthSettings.d.ts +56 -0
- package/dist/hooks/usePublicAuthSettings.js +131 -0
- package/dist/hooks/useSessionExpiration.d.ts +56 -0
- package/dist/hooks/useSessionExpiration.js +72 -0
- package/dist/hooks/useViabilitySession.d.ts +75 -0
- package/dist/hooks/useViabilitySession.js +269 -0
- package/dist/index.d.ts +12 -0
- package/dist/index.js +53 -0
- package/dist/lib/anon-session.d.ts +74 -0
- package/dist/lib/anon-session.js +169 -0
- package/dist/lib/api-handler.d.ts +123 -0
- package/dist/lib/api-handler.js +478 -0
- package/dist/lib/app-slug.d.ts +95 -0
- package/dist/lib/app-slug.js +172 -0
- package/dist/lib/demo-mode.d.ts +6 -0
- package/dist/lib/demo-mode.js +16 -0
- package/dist/lib/geolocation.d.ts +64 -0
- package/dist/lib/geolocation.js +235 -0
- package/dist/lib/idp-client-config.d.ts +75 -0
- package/dist/lib/idp-client-config.js +425 -0
- package/dist/lib/idp-fetch.d.ts +14 -0
- package/dist/lib/idp-fetch.js +91 -0
- package/dist/lib/internal-api.d.ts +87 -0
- package/dist/lib/internal-api.js +122 -0
- package/dist/lib/jwt-decode-client.d.ts +10 -0
- package/dist/lib/jwt-decode-client.js +46 -0
- package/dist/lib/jwt-decode.d.ts +48 -0
- package/dist/lib/jwt-decode.js +57 -0
- package/dist/lib/rate-limit-service.d.ts +23 -0
- package/dist/lib/rate-limit-service.js +6 -0
- package/dist/lib/redis.d.ts +5 -0
- package/dist/lib/redis.js +28 -0
- package/dist/lib/refresh-token-validator.d.ts +13 -0
- package/dist/lib/refresh-token-validator.js +117 -0
- package/dist/lib/roles.d.ts +145 -0
- package/dist/lib/roles.js +168 -0
- package/dist/lib/secret-validation.d.ts +4 -0
- package/dist/lib/secret-validation.js +14 -0
- package/dist/lib/session-store.d.ts +170 -0
- package/dist/lib/session-store.js +545 -0
- package/dist/lib/session.d.ts +21 -0
- package/dist/lib/session.js +26 -0
- package/dist/lib/site-logger.d.ts +214 -0
- package/dist/lib/site-logger.js +210 -0
- package/dist/lib/standardized-client-api.d.ts +161 -0
- package/dist/lib/standardized-client-api.js +791 -0
- package/dist/lib/startup-init.d.ts +40 -0
- package/dist/lib/startup-init.js +257 -0
- package/dist/lib/test-aware-get-token.d.ts +2 -0
- package/dist/lib/test-aware-get-token.js +86 -0
- package/dist/lib/token-expiry.d.ts +14 -0
- package/dist/lib/token-expiry.js +39 -0
- package/dist/lib/token-lifecycle.d.ts +78 -0
- package/dist/lib/token-lifecycle.js +360 -0
- package/dist/lib/types/api-responses.d.ts +128 -0
- package/dist/lib/types/api-responses.js +171 -0
- package/dist/lib/user-agent-parser.d.ts +50 -0
- package/dist/lib/user-agent-parser.js +220 -0
- package/dist/logging/api/admin-analytics.d.ts +3 -0
- package/dist/logging/api/admin-analytics.js +45 -0
- package/dist/logging/api/audit-log.d.ts +3 -0
- package/dist/logging/api/audit-log.js +52 -0
- package/dist/logging/components/AdminAnalyticsLayout.d.ts +10 -0
- package/dist/logging/components/AdminAnalyticsLayout.js +11 -0
- package/dist/logging/components/AuditLogViewer.d.ts +7 -0
- package/dist/logging/components/AuditLogViewer.js +51 -0
- package/dist/logging/components/ErrorMetricsCard.d.ts +7 -0
- package/dist/logging/components/ErrorMetricsCard.js +16 -0
- package/dist/logging/components/HealthMetricsCard.d.ts +7 -0
- package/dist/logging/components/HealthMetricsCard.js +19 -0
- package/dist/logging/hooks/useAdminAnalytics.d.ts +24 -0
- package/dist/logging/hooks/useAdminAnalytics.js +22 -0
- package/dist/logging/hooks/useAuditLog.d.ts +6 -0
- package/dist/logging/hooks/useAuditLog.js +25 -0
- package/dist/logging/hooks/useErrorMetrics.d.ts +6 -0
- package/dist/logging/hooks/useErrorMetrics.js +38 -0
- package/dist/logging/hooks/useHealthMetrics.d.ts +6 -0
- package/dist/logging/hooks/useHealthMetrics.js +41 -0
- package/dist/logging/index.d.ts +11 -0
- package/dist/logging/index.js +40 -0
- package/dist/logging/types/analytics.d.ts +68 -0
- package/dist/logging/types/analytics.js +3 -0
- package/dist/logging/types/audit.d.ts +29 -0
- package/dist/logging/types/audit.js +2 -0
- package/dist/logging/types/index.d.ts +2 -0
- package/dist/logging/types/index.js +19 -0
- package/dist/middleware/auth-decision.d.ts +33 -0
- package/dist/middleware/auth-decision.js +65 -0
- package/dist/middleware/create-middleware.d.ts +102 -0
- package/dist/middleware/create-middleware.js +469 -0
- package/dist/middleware/rbac-check.d.ts +51 -0
- package/dist/middleware/rbac-check.js +219 -0
- package/dist/middleware/twofa-presets.d.ts +134 -0
- package/dist/middleware/twofa-presets.js +175 -0
- package/dist/models/DecodedAccessToken.d.ts +17 -0
- package/dist/models/DecodedAccessToken.js +2 -0
- package/dist/models/SessionModel.d.ts +122 -0
- package/dist/models/SessionModel.js +136 -0
- package/dist/pages/admin-login/page.d.ts +31 -0
- package/dist/pages/admin-login/page.js +73 -0
- package/dist/pages/admin-page-permissions/PagePermissionsAdminPage.d.ts +18 -0
- package/dist/pages/admin-page-permissions/PagePermissionsAdminPage.js +276 -0
- package/dist/pages/admin-page-permissions/index.d.ts +6 -0
- package/dist/pages/admin-page-permissions/index.js +13 -0
- package/dist/pages/admin-roles/RolesAdminPage.d.ts +16 -0
- package/dist/pages/admin-roles/RolesAdminPage.js +261 -0
- package/dist/pages/admin-roles/index.d.ts +8 -0
- package/dist/pages/admin-roles/index.js +15 -0
- package/dist/pages/admin-roles/modals.d.ts +72 -0
- package/dist/pages/admin-roles/modals.js +154 -0
- package/dist/pages/client-admin/ClientSiteAdminPage.d.ts +79 -0
- package/dist/pages/client-admin/ClientSiteAdminPage.js +179 -0
- package/dist/pages/client-admin/index.d.ts +32 -0
- package/dist/pages/client-admin/index.js +37 -0
- package/dist/pages/coming-soon/page.d.ts +8 -0
- package/dist/pages/coming-soon/page.js +28 -0
- package/dist/pages/login/page.d.ts +22 -0
- package/dist/pages/login/page.js +230 -0
- package/dist/pages/profile/EnhancedProfilePage.d.ts +13 -0
- package/dist/pages/profile/EnhancedProfilePage.js +150 -0
- package/dist/pages/profile/index.d.ts +8 -0
- package/dist/pages/profile/index.js +16 -0
- package/dist/pages/profile/page.d.ts +19 -0
- package/dist/pages/profile/page.js +47 -0
- package/dist/pages/recovery/page.d.ts +1 -0
- package/dist/pages/recovery/page.js +142 -0
- package/dist/pages/roles/MyRolesPage.d.ts +24 -0
- package/dist/pages/roles/MyRolesPage.js +71 -0
- package/dist/pages/roles/components.d.ts +63 -0
- package/dist/pages/roles/components.js +108 -0
- package/dist/pages/roles/index.d.ts +8 -0
- package/dist/pages/roles/index.js +19 -0
- package/dist/pages/security/EnhancedSecurityPage.d.ts +14 -0
- package/dist/pages/security/EnhancedSecurityPage.js +248 -0
- package/dist/pages/security/index.d.ts +8 -0
- package/dist/pages/security/index.js +16 -0
- package/dist/pages/security/page.d.ts +21 -0
- package/dist/pages/security/page.js +212 -0
- package/dist/pages/settings/EnhancedSettingsPage.d.ts +46 -0
- package/dist/pages/settings/EnhancedSettingsPage.js +231 -0
- package/dist/pages/settings/index.d.ts +8 -0
- package/dist/pages/settings/index.js +16 -0
- package/dist/pages/settings/page.d.ts +7 -0
- package/dist/pages/settings/page.js +26 -0
- package/dist/pages/showcase/ShowcasePage.d.ts +13 -0
- package/dist/pages/showcase/ShowcasePage.js +142 -0
- package/dist/pages/showcase/index.d.ts +12 -0
- package/dist/pages/showcase/index.js +17 -0
- package/dist/pages/test-env/EmergencyLogoutPage.d.ts +14 -0
- package/dist/pages/test-env/EmergencyLogoutPage.js +99 -0
- package/dist/pages/test-env/JwtInspectPage.d.ts +14 -0
- package/dist/pages/test-env/JwtInspectPage.js +116 -0
- package/dist/pages/test-env/RefreshTokenPage.d.ts +15 -0
- package/dist/pages/test-env/RefreshTokenPage.js +93 -0
- package/dist/pages/test-env/TestEnvPage.d.ts +13 -0
- package/dist/pages/test-env/TestEnvPage.js +51 -0
- package/dist/pages/test-env/index.d.ts +24 -0
- package/dist/pages/test-env/index.js +32 -0
- package/dist/pages/verify-code/page.d.ts +30 -0
- package/dist/pages/verify-code/page.js +412 -0
- package/dist/routes/account/index.d.ts +28 -0
- package/dist/routes/account/index.js +71 -0
- package/dist/routes/account/masked-info.d.ts +33 -0
- package/dist/routes/account/masked-info.js +39 -0
- package/dist/routes/account/send-code.d.ts +37 -0
- package/dist/routes/account/send-code.js +42 -0
- package/dist/routes/account/update-phone.d.ts +13 -0
- package/dist/routes/account/update-phone.js +17 -0
- package/dist/routes/account/verify-email.d.ts +38 -0
- package/dist/routes/account/verify-email.js +43 -0
- package/dist/routes/account/verify-sms.d.ts +38 -0
- package/dist/routes/account/verify-sms.js +43 -0
- package/dist/routes/auth/index.d.ts +19 -0
- package/dist/routes/auth/index.js +64 -0
- package/dist/routes/auth/logout.d.ts +31 -0
- package/dist/routes/auth/logout.js +98 -0
- package/dist/routes/auth/nextauth.d.ts +22 -0
- package/dist/routes/auth/nextauth.js +40 -0
- package/dist/routes/auth/refresh.d.ts +30 -0
- package/dist/routes/auth/refresh.js +51 -0
- package/dist/routes/auth/session.d.ts +43 -0
- package/dist/routes/auth/session.js +157 -0
- package/dist/routes/auth/settings.d.ts +25 -0
- package/dist/routes/auth/settings.js +55 -0
- package/dist/routes/auth/viability.d.ts +52 -0
- package/dist/routes/auth/viability.js +190 -0
- package/dist/routes/index.d.ts +12 -0
- package/dist/routes/index.js +54 -0
- package/dist/routes/session/index.d.ts +6 -0
- package/dist/routes/session/index.js +10 -0
- package/dist/routes/session/refresh-viability.d.ts +16 -0
- package/dist/routes/session/refresh-viability.js +20 -0
- package/dist/server/auth-guard.d.ts +46 -0
- package/dist/server/auth-guard.js +128 -0
- package/dist/server/auth.d.ts +50 -0
- package/dist/server/auth.js +62 -0
- package/dist/server/decode-session.d.ts +30 -0
- package/dist/server/decode-session.js +78 -0
- package/dist/server/slim-middleware.d.ts +23 -0
- package/dist/server/slim-middleware.js +89 -0
- package/dist/server/with-auth.d.ts +33 -0
- package/dist/server/with-auth.js +59 -0
- package/dist/services/signalrActivityService.d.ts +44 -0
- package/dist/services/signalrActivityService.js +257 -0
- package/dist/stores/authStore.d.ts +154 -0
- package/dist/stores/authStore.js +1527 -0
- package/dist/theme/ThemeProvider.d.ts +14 -0
- package/dist/theme/ThemeProvider.js +28 -0
- package/dist/theme/default.d.ts +8 -0
- package/dist/theme/default.js +33 -0
- package/dist/theme/index.d.ts +15 -0
- package/dist/theme/index.js +25 -0
- package/dist/theme/types.d.ts +56 -0
- package/dist/theme/types.js +8 -0
- package/dist/theme/useTheme.d.ts +60 -0
- package/dist/theme/useTheme.js +63 -0
- package/dist/theme/utils.d.ts +13 -0
- package/dist/theme/utils.js +39 -0
- package/dist/types/api.d.ts +134 -0
- package/dist/types/api.js +44 -0
- package/dist/types/auth.d.ts +19 -0
- package/dist/types/auth.js +2 -0
- package/dist/types/logging.d.ts +42 -0
- package/dist/types/logging.js +2 -0
- package/dist/types/recovery.d.ts +48 -0
- package/dist/types/recovery.js +2 -0
- package/dist/types/security.d.ts +1 -0
- package/dist/types/security.js +2 -0
- package/dist/utils/api.d.ts +85 -0
- package/dist/utils/api.js +287 -0
- package/dist/utils/circuitBreaker.d.ts +43 -0
- package/dist/utils/circuitBreaker.js +91 -0
- package/dist/utils/error-message.d.ts +1 -0
- package/dist/utils/error-message.js +103 -0
- package/dist/utils/layout/reservedSpace.d.ts +59 -0
- package/dist/utils/layout/reservedSpace.js +102 -0
- package/dist/utils/logout.d.ts +14 -0
- package/dist/utils/logout.js +32 -0
- package/dist/vibe/client.d.ts +261 -0
- package/dist/vibe/client.js +445 -0
- package/dist/vibe/enterprise-auth.d.ts +106 -0
- package/dist/vibe/enterprise-auth.js +173 -0
- package/dist/vibe/errors.d.ts +83 -0
- package/dist/vibe/errors.js +146 -0
- package/dist/vibe/generic.d.ts +234 -0
- package/dist/vibe/generic.js +369 -0
- package/dist/vibe/hooks/index.d.ts +169 -0
- package/dist/vibe/hooks/index.js +252 -0
- package/dist/vibe/index.d.ts +25 -0
- package/dist/vibe/index.js +72 -0
- package/dist/vibe/sessions.d.ts +161 -0
- package/dist/vibe/sessions.js +391 -0
- package/dist/vibe/types.d.ts +353 -0
- package/dist/vibe/types.js +315 -0
- package/package.json +1 -1
|
@@ -0,0 +1,66 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Advanced Route Configuration for `@payez/next-mvp`
|
|
3
|
+
*
|
|
4
|
+
* This module provides a robust, pattern-based mechanism for defining
|
|
5
|
+
* unauthenticated (public) routes, including wildcard support.
|
|
6
|
+
* It is designed to be easily configurable by host applications.
|
|
7
|
+
*/
|
|
8
|
+
import { TwoFactorRequirements } from '../middleware/twofa-presets';
|
|
9
|
+
export interface UnauthenticatedRouteConfig {
|
|
10
|
+
/** The route pattern (supports wildcards with *) */
|
|
11
|
+
pattern: string;
|
|
12
|
+
/** Description of what this route is for */
|
|
13
|
+
description: string;
|
|
14
|
+
/** Whether this route should be accessible during circuit breaker open state */
|
|
15
|
+
allowDuringCircuitBreakerOpen?: boolean;
|
|
16
|
+
/** Whether this route requires rate limiting even when unauthenticated */
|
|
17
|
+
requiresRateLimit?: boolean;
|
|
18
|
+
}
|
|
19
|
+
/**
|
|
20
|
+
* Protected route configuration with 2FA requirements
|
|
21
|
+
*/
|
|
22
|
+
export interface ProtectedRouteConfig {
|
|
23
|
+
/** The route pattern (supports wildcards with *) */
|
|
24
|
+
pattern: string;
|
|
25
|
+
/** Description of what this route is for */
|
|
26
|
+
description?: string;
|
|
27
|
+
/** 2FA requirements for this route (default: requires 2FA if site requires it) */
|
|
28
|
+
twoFactorRequirements: TwoFactorRequirements;
|
|
29
|
+
}
|
|
30
|
+
/**
|
|
31
|
+
* Configures additional public routes for the application.
|
|
32
|
+
* This function should be called once during application initialization.
|
|
33
|
+
* @param appRoutes An array of route patterns or UnauthenticatedRouteConfig objects.
|
|
34
|
+
*/
|
|
35
|
+
export declare function configurePublicRoutes(appRoutes?: (string | UnauthenticatedRouteConfig)[]): void;
|
|
36
|
+
/**
|
|
37
|
+
* Configures routes that require authentication but bypass 2FA requirements.
|
|
38
|
+
* Essential for 2FA onboarding flows where user is authenticated but hasn't completed 2FA yet.
|
|
39
|
+
* @param routes An array of route patterns or ProtectedRouteConfig objects.
|
|
40
|
+
*/
|
|
41
|
+
export declare function configure2FABypassRoutes(routes?: (string | ProtectedRouteConfig)[]): void;
|
|
42
|
+
/**
|
|
43
|
+
* Checks if a route should bypass 2FA requirements (but still requires auth).
|
|
44
|
+
* @param pathname The URL pathname to check.
|
|
45
|
+
* @returns The ProtectedRouteConfig if found, otherwise undefined.
|
|
46
|
+
*/
|
|
47
|
+
export declare function get2FABypassConfig(pathname: string): ProtectedRouteConfig | undefined;
|
|
48
|
+
/**
|
|
49
|
+
* Checks if a route should bypass 2FA requirements.
|
|
50
|
+
* @param pathname The URL pathname to check.
|
|
51
|
+
* @returns true if 2FA should be bypassed for this route.
|
|
52
|
+
*/
|
|
53
|
+
export declare function should2FABypass(pathname: string): boolean;
|
|
54
|
+
/**
|
|
55
|
+
* Checks if a given pathname matches any of the configured unauthenticated routes.
|
|
56
|
+
* Supports wildcard matching (e.g., '/api/*').
|
|
57
|
+
* @param pathname The URL pathname to check.
|
|
58
|
+
* @returns `true` if the route is unauthenticated, `false` otherwise.
|
|
59
|
+
*/
|
|
60
|
+
export declare function isUnauthenticatedRoute(pathname: string): boolean;
|
|
61
|
+
/**
|
|
62
|
+
* Retrieves the configuration for a specific route.
|
|
63
|
+
* @param pathname The URL pathname to get the configuration for.
|
|
64
|
+
* @returns The `UnauthenticatedRouteConfig` object if found, otherwise `undefined`.
|
|
65
|
+
*/
|
|
66
|
+
export declare function getRouteConfig(pathname: string): UnauthenticatedRouteConfig | undefined;
|
|
@@ -0,0 +1,190 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/**
|
|
3
|
+
* Advanced Route Configuration for `@payez/next-mvp`
|
|
4
|
+
*
|
|
5
|
+
* This module provides a robust, pattern-based mechanism for defining
|
|
6
|
+
* unauthenticated (public) routes, including wildcard support.
|
|
7
|
+
* It is designed to be easily configurable by host applications.
|
|
8
|
+
*/
|
|
9
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
10
|
+
exports.configurePublicRoutes = configurePublicRoutes;
|
|
11
|
+
exports.configure2FABypassRoutes = configure2FABypassRoutes;
|
|
12
|
+
exports.get2FABypassConfig = get2FABypassConfig;
|
|
13
|
+
exports.should2FABypass = should2FABypass;
|
|
14
|
+
exports.isUnauthenticatedRoute = isUnauthenticatedRoute;
|
|
15
|
+
exports.getRouteConfig = getRouteConfig;
|
|
16
|
+
const twofa_presets_1 = require("../middleware/twofa-presets");
|
|
17
|
+
// Default public routes provided by the MVP package
|
|
18
|
+
const defaultUnauthenticatedRoutes = [
|
|
19
|
+
{
|
|
20
|
+
pattern: '/',
|
|
21
|
+
description: 'Homepage',
|
|
22
|
+
allowDuringCircuitBreakerOpen: true,
|
|
23
|
+
requiresRateLimit: false
|
|
24
|
+
},
|
|
25
|
+
{
|
|
26
|
+
pattern: '/login',
|
|
27
|
+
description: 'Login page',
|
|
28
|
+
allowDuringCircuitBreakerOpen: true,
|
|
29
|
+
requiresRateLimit: false
|
|
30
|
+
},
|
|
31
|
+
{
|
|
32
|
+
pattern: '/register',
|
|
33
|
+
description: 'Registration page',
|
|
34
|
+
allowDuringCircuitBreakerOpen: true,
|
|
35
|
+
requiresRateLimit: false
|
|
36
|
+
},
|
|
37
|
+
{
|
|
38
|
+
pattern: '/forgot-password',
|
|
39
|
+
description: 'Forgot password page',
|
|
40
|
+
allowDuringCircuitBreakerOpen: true,
|
|
41
|
+
requiresRateLimit: false
|
|
42
|
+
},
|
|
43
|
+
{
|
|
44
|
+
pattern: '/account-auth/*',
|
|
45
|
+
description: 'All authentication pages (login, register, forgot password, etc.)',
|
|
46
|
+
allowDuringCircuitBreakerOpen: true,
|
|
47
|
+
requiresRateLimit: false
|
|
48
|
+
},
|
|
49
|
+
{
|
|
50
|
+
pattern: '/api/auth/*',
|
|
51
|
+
description: 'Authentication API endpoints',
|
|
52
|
+
allowDuringCircuitBreakerOpen: true,
|
|
53
|
+
requiresRateLimit: true
|
|
54
|
+
},
|
|
55
|
+
{
|
|
56
|
+
pattern: '/api/session/viability',
|
|
57
|
+
description: 'Session viability check endpoint',
|
|
58
|
+
allowDuringCircuitBreakerOpen: true,
|
|
59
|
+
requiresRateLimit: false
|
|
60
|
+
},
|
|
61
|
+
{
|
|
62
|
+
pattern: '/api/health/*',
|
|
63
|
+
description: 'Health check endpoints',
|
|
64
|
+
allowDuringCircuitBreakerOpen: true,
|
|
65
|
+
requiresRateLimit: true
|
|
66
|
+
},
|
|
67
|
+
{
|
|
68
|
+
pattern: '/service-unavailable',
|
|
69
|
+
description: 'Service unavailable error page',
|
|
70
|
+
allowDuringCircuitBreakerOpen: true,
|
|
71
|
+
requiresRateLimit: false
|
|
72
|
+
},
|
|
73
|
+
{
|
|
74
|
+
pattern: '/_next/*',
|
|
75
|
+
description: 'Next.js static assets',
|
|
76
|
+
allowDuringCircuitBreakerOpen: true,
|
|
77
|
+
requiresRateLimit: false
|
|
78
|
+
},
|
|
79
|
+
{
|
|
80
|
+
pattern: '/favicon.ico',
|
|
81
|
+
description: 'Favicon',
|
|
82
|
+
allowDuringCircuitBreakerOpen: true,
|
|
83
|
+
requiresRateLimit: false
|
|
84
|
+
},
|
|
85
|
+
];
|
|
86
|
+
let configuredRoutes = [...defaultUnauthenticatedRoutes];
|
|
87
|
+
// Default routes that require auth but NOT 2FA (for 2FA onboarding flow)
|
|
88
|
+
// NOTE: Only the bare minimum routes needed for 2FA completion - no welcome screens
|
|
89
|
+
const default2FABypassRoutes = [
|
|
90
|
+
{
|
|
91
|
+
pattern: '/api/auth/*',
|
|
92
|
+
description: 'Auth API routes - must be accessible during 2FA flow for session management',
|
|
93
|
+
twoFactorRequirements: twofa_presets_1.TwoFactorPresets.NONE
|
|
94
|
+
},
|
|
95
|
+
{
|
|
96
|
+
pattern: '/api/account/*',
|
|
97
|
+
description: '2FA verification APIs (send-code, verify-email, verify-sms, update-phone, masked-info)',
|
|
98
|
+
twoFactorRequirements: twofa_presets_1.TwoFactorPresets.NONE
|
|
99
|
+
},
|
|
100
|
+
{
|
|
101
|
+
pattern: '/api/session/*',
|
|
102
|
+
description: 'Session management APIs (viability, refresh-viability)',
|
|
103
|
+
twoFactorRequirements: twofa_presets_1.TwoFactorPresets.NONE
|
|
104
|
+
},
|
|
105
|
+
{
|
|
106
|
+
pattern: '/account-auth/verify-code',
|
|
107
|
+
description: '2FA verification page',
|
|
108
|
+
twoFactorRequirements: twofa_presets_1.TwoFactorPresets.NONE
|
|
109
|
+
},
|
|
110
|
+
{
|
|
111
|
+
pattern: '/test-env/*',
|
|
112
|
+
description: 'Test/debug pages (emergency-logout, jwt-inspect, refresh-token) - must bypass 2FA',
|
|
113
|
+
twoFactorRequirements: twofa_presets_1.TwoFactorPresets.NONE
|
|
114
|
+
},
|
|
115
|
+
// NOTE: /onboarding/two-factor intentionally NOT included - go straight to 2FA, no welcome page
|
|
116
|
+
];
|
|
117
|
+
let configured2FABypassRoutes = [...default2FABypassRoutes];
|
|
118
|
+
/**
|
|
119
|
+
* Configures additional public routes for the application.
|
|
120
|
+
* This function should be called once during application initialization.
|
|
121
|
+
* @param appRoutes An array of route patterns or UnauthenticatedRouteConfig objects.
|
|
122
|
+
*/
|
|
123
|
+
function configurePublicRoutes(appRoutes = []) {
|
|
124
|
+
const newRoutes = appRoutes.map(route => typeof route === 'string'
|
|
125
|
+
? { pattern: route, description: `Application-defined public route: ${route}` }
|
|
126
|
+
: route);
|
|
127
|
+
configuredRoutes = [...defaultUnauthenticatedRoutes, ...newRoutes];
|
|
128
|
+
}
|
|
129
|
+
/**
|
|
130
|
+
* Configures routes that require authentication but bypass 2FA requirements.
|
|
131
|
+
* Essential for 2FA onboarding flows where user is authenticated but hasn't completed 2FA yet.
|
|
132
|
+
* @param routes An array of route patterns or ProtectedRouteConfig objects.
|
|
133
|
+
*/
|
|
134
|
+
function configure2FABypassRoutes(routes = []) {
|
|
135
|
+
const newRoutes = routes.map(route => typeof route === 'string'
|
|
136
|
+
? { pattern: route, description: `2FA bypass route: ${route}`, twoFactorRequirements: twofa_presets_1.TwoFactorPresets.NONE }
|
|
137
|
+
: route);
|
|
138
|
+
configured2FABypassRoutes = [...default2FABypassRoutes, ...newRoutes];
|
|
139
|
+
}
|
|
140
|
+
/**
|
|
141
|
+
* Checks if a route should bypass 2FA requirements (but still requires auth).
|
|
142
|
+
* @param pathname The URL pathname to check.
|
|
143
|
+
* @returns The ProtectedRouteConfig if found, otherwise undefined.
|
|
144
|
+
*/
|
|
145
|
+
function get2FABypassConfig(pathname) {
|
|
146
|
+
return configured2FABypassRoutes.find(route => {
|
|
147
|
+
if (route.pattern.endsWith('*')) {
|
|
148
|
+
const basePattern = route.pattern.slice(0, -1);
|
|
149
|
+
return pathname.startsWith(basePattern);
|
|
150
|
+
}
|
|
151
|
+
return pathname === route.pattern;
|
|
152
|
+
});
|
|
153
|
+
}
|
|
154
|
+
/**
|
|
155
|
+
* Checks if a route should bypass 2FA requirements.
|
|
156
|
+
* @param pathname The URL pathname to check.
|
|
157
|
+
* @returns true if 2FA should be bypassed for this route.
|
|
158
|
+
*/
|
|
159
|
+
function should2FABypass(pathname) {
|
|
160
|
+
return get2FABypassConfig(pathname) !== undefined;
|
|
161
|
+
}
|
|
162
|
+
/**
|
|
163
|
+
* Checks if a given pathname matches any of the configured unauthenticated routes.
|
|
164
|
+
* Supports wildcard matching (e.g., '/api/*').
|
|
165
|
+
* @param pathname The URL pathname to check.
|
|
166
|
+
* @returns `true` if the route is unauthenticated, `false` otherwise.
|
|
167
|
+
*/
|
|
168
|
+
function isUnauthenticatedRoute(pathname) {
|
|
169
|
+
return configuredRoutes.some(route => {
|
|
170
|
+
if (route.pattern.endsWith('*')) {
|
|
171
|
+
const basePattern = route.pattern.slice(0, -1);
|
|
172
|
+
return pathname.startsWith(basePattern);
|
|
173
|
+
}
|
|
174
|
+
return pathname === route.pattern;
|
|
175
|
+
});
|
|
176
|
+
}
|
|
177
|
+
/**
|
|
178
|
+
* Retrieves the configuration for a specific route.
|
|
179
|
+
* @param pathname The URL pathname to get the configuration for.
|
|
180
|
+
* @returns The `UnauthenticatedRouteConfig` object if found, otherwise `undefined`.
|
|
181
|
+
*/
|
|
182
|
+
function getRouteConfig(pathname) {
|
|
183
|
+
return configuredRoutes.find(route => {
|
|
184
|
+
if (route.pattern.endsWith('*')) {
|
|
185
|
+
const basePattern = route.pattern.slice(0, -1);
|
|
186
|
+
return pathname.startsWith(basePattern);
|
|
187
|
+
}
|
|
188
|
+
return pathname === route.pattern;
|
|
189
|
+
});
|
|
190
|
+
}
|
|
@@ -0,0 +1,417 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* ============================================================================
|
|
3
|
+
* AUTH TYPES - Single Source of Truth
|
|
4
|
+
* ============================================================================
|
|
5
|
+
*
|
|
6
|
+
* This file defines ALL authentication-related types for the PayEz Next MVP.
|
|
7
|
+
* Every type has ONE name and ONE meaning. No aliases. No confusion.
|
|
8
|
+
*
|
|
9
|
+
* GLOSSARY:
|
|
10
|
+
* ---------
|
|
11
|
+
* RedisSessionId - UUID stored in browser cookie, keys into Redis session
|
|
12
|
+
* IdpAccessToken - JWT from PayEz IDP, used for backend API calls
|
|
13
|
+
* IdpRefreshToken - JWT from PayEz IDP, used to get new access tokens
|
|
14
|
+
* OAuthProviderToken - Token from Google/Microsoft/etc (NOT for our APIs)
|
|
15
|
+
*
|
|
16
|
+
* DATA FLOW:
|
|
17
|
+
* ----------
|
|
18
|
+
* 1. User logs in (credentials or OAuth)
|
|
19
|
+
* 2. IDP returns IdpAccessToken + IdpRefreshToken
|
|
20
|
+
* 3. We create RedisSessionData in Redis, get back RedisSessionId
|
|
21
|
+
* 4. RedisSessionId goes in NextAuth JWT cookie (browser)
|
|
22
|
+
* 5. On each request: cookie -> RedisSessionId -> Redis -> tokens
|
|
23
|
+
*
|
|
24
|
+
* SECURITY NOTES:
|
|
25
|
+
* ---------------
|
|
26
|
+
* - Tokens NEVER stored in NextAuth JWT (only RedisSessionId)
|
|
27
|
+
* - Tokens ONLY stored in Redis (server-side)
|
|
28
|
+
* - Browser only sees RedisSessionId (opaque UUID)
|
|
29
|
+
*
|
|
30
|
+
* @version 1.0.0
|
|
31
|
+
* @since auth-refactor-2026-01
|
|
32
|
+
*/
|
|
33
|
+
/**
|
|
34
|
+
* UUID key for Redis session storage.
|
|
35
|
+
*
|
|
36
|
+
* This is what gets stored in the browser's NextAuth cookie.
|
|
37
|
+
* It's an opaque identifier - the browser cannot decode it to get tokens.
|
|
38
|
+
*
|
|
39
|
+
* Format: UUID v4 (e.g., "550e8400-e29b-41d4-a716-446655440000")
|
|
40
|
+
*
|
|
41
|
+
* OLD NAMES (do not use):
|
|
42
|
+
* - sessionToken
|
|
43
|
+
* - token.redisSessionId
|
|
44
|
+
*/
|
|
45
|
+
export type RedisSessionId = string & {
|
|
46
|
+
readonly __brand: 'RedisSessionId';
|
|
47
|
+
};
|
|
48
|
+
/**
|
|
49
|
+
* JWT issued by PayEz IDP for calling backend APIs.
|
|
50
|
+
*
|
|
51
|
+
* This token:
|
|
52
|
+
* - Is signed by the IDP's private key
|
|
53
|
+
* - Contains user claims (sub, email, roles, client_id, etc.)
|
|
54
|
+
* - Has short expiry (typically 1 hour)
|
|
55
|
+
* - Goes in Authorization header for API calls
|
|
56
|
+
*
|
|
57
|
+
* OLD NAMES (do not use):
|
|
58
|
+
* - accessToken
|
|
59
|
+
* - idpAccessToken
|
|
60
|
+
* - token.accessToken
|
|
61
|
+
* - responseData.result.access_token
|
|
62
|
+
*/
|
|
63
|
+
export type IdpAccessToken = string & {
|
|
64
|
+
readonly __brand: 'IdpAccessToken';
|
|
65
|
+
};
|
|
66
|
+
/**
|
|
67
|
+
* JWT issued by PayEz IDP for refreshing the access token.
|
|
68
|
+
*
|
|
69
|
+
* This token:
|
|
70
|
+
* - Is signed by the IDP's private key
|
|
71
|
+
* - Has longer expiry (typically 30 days)
|
|
72
|
+
* - Is single-use (rotated on each refresh)
|
|
73
|
+
* - NEVER sent to frontend, ONLY stored in Redis
|
|
74
|
+
*
|
|
75
|
+
* OLD NAMES (do not use):
|
|
76
|
+
* - refreshToken
|
|
77
|
+
* - idpRefreshToken
|
|
78
|
+
* - token.refreshToken
|
|
79
|
+
*/
|
|
80
|
+
export type IdpRefreshToken = string & {
|
|
81
|
+
readonly __brand: 'IdpRefreshToken';
|
|
82
|
+
};
|
|
83
|
+
/**
|
|
84
|
+
* Access token from OAuth provider (Google, Microsoft, etc.)
|
|
85
|
+
*
|
|
86
|
+
* This is NOT used for our APIs. It's the token from the OAuth provider
|
|
87
|
+
* that we received during OAuth flow. We store it in case the app needs
|
|
88
|
+
* to call the provider's APIs (e.g., Google Calendar).
|
|
89
|
+
*
|
|
90
|
+
* OLD NAMES (do not use):
|
|
91
|
+
* - account.access_token
|
|
92
|
+
* - oauthAccessToken
|
|
93
|
+
*/
|
|
94
|
+
export type OAuthProviderToken = string & {
|
|
95
|
+
readonly __brand: 'OAuthProviderToken';
|
|
96
|
+
};
|
|
97
|
+
export declare function toRedisSessionId(value: string): RedisSessionId;
|
|
98
|
+
export declare function toIdpAccessToken(value: string): IdpAccessToken;
|
|
99
|
+
export declare function toIdpRefreshToken(value: string): IdpRefreshToken;
|
|
100
|
+
export declare function toOAuthProviderToken(value: string): OAuthProviderToken;
|
|
101
|
+
/**
|
|
102
|
+
* What we store in the NextAuth JWT cookie.
|
|
103
|
+
*
|
|
104
|
+
* MINIMAL by design. The JWT cookie is sent with every request, so we
|
|
105
|
+
* keep it small. All the real data lives in Redis.
|
|
106
|
+
*
|
|
107
|
+
* WHAT'S IN THE COOKIE:
|
|
108
|
+
* - redisSessionId: Key to look up session in Redis
|
|
109
|
+
* - sub: User ID (for quick access without Redis round-trip)
|
|
110
|
+
* - iss: Issuer URL (for SSO token validation)
|
|
111
|
+
*
|
|
112
|
+
* WHAT'S NOT IN THE COOKIE:
|
|
113
|
+
* - Access tokens (security risk if cookie stolen)
|
|
114
|
+
* - Refresh tokens (security risk if cookie stolen)
|
|
115
|
+
* - User details (wastes bandwidth)
|
|
116
|
+
*/
|
|
117
|
+
export interface NextAuthJwtPayload {
|
|
118
|
+
/** Redis session key - the ONLY way to get tokens */
|
|
119
|
+
redisSessionId: RedisSessionId;
|
|
120
|
+
/** User ID from IDP (sub claim) */
|
|
121
|
+
sub: string;
|
|
122
|
+
/** JWT issuer - AUTH_ISSUER_URL for SSO validation */
|
|
123
|
+
iss: string;
|
|
124
|
+
/** JWT issued at timestamp */
|
|
125
|
+
iat?: number;
|
|
126
|
+
/** JWT expiry timestamp */
|
|
127
|
+
exp?: number;
|
|
128
|
+
}
|
|
129
|
+
/**
|
|
130
|
+
* The complete session data stored in Redis.
|
|
131
|
+
*
|
|
132
|
+
* This is the single source of truth for a user's session state.
|
|
133
|
+
* Everything about the session lives here - tokens, MFA status, user info.
|
|
134
|
+
*
|
|
135
|
+
* REDIS KEY FORMAT: "session:{redisSessionId}"
|
|
136
|
+
* TTL: Matches refresh token expiry (typically 30 days)
|
|
137
|
+
*/
|
|
138
|
+
export interface RedisSessionData {
|
|
139
|
+
/** User ID from IDP (matches JWT sub claim) */
|
|
140
|
+
userId: string;
|
|
141
|
+
/** User's email address */
|
|
142
|
+
email: string;
|
|
143
|
+
/** Display name (from OAuth profile or IDP) */
|
|
144
|
+
name?: string;
|
|
145
|
+
/** User's roles from IDP (e.g., ['user', 'admin']) */
|
|
146
|
+
roles: string[];
|
|
147
|
+
/** JWT for backend API calls */
|
|
148
|
+
idpAccessToken: IdpAccessToken;
|
|
149
|
+
/** JWT for refreshing access token */
|
|
150
|
+
idpRefreshToken: IdpRefreshToken;
|
|
151
|
+
/** When idpAccessToken expires (Unix ms) */
|
|
152
|
+
idpAccessTokenExpires: number;
|
|
153
|
+
/** When idpRefreshToken expires (Unix ms) - session dies when this expires */
|
|
154
|
+
idpRefreshTokenExpires?: number;
|
|
155
|
+
/**
|
|
156
|
+
* Decoded access token claims (cached to avoid repeated JWT parsing)
|
|
157
|
+
* Contains: sub, email, roles, client_id, merchant_id, amr, acr, etc.
|
|
158
|
+
*/
|
|
159
|
+
decodedAccessToken?: DecodedIdpAccessToken;
|
|
160
|
+
/**
|
|
161
|
+
* Bearer Key ID (kid from JWT header).
|
|
162
|
+
*
|
|
163
|
+
* This is the key ID used to sign the IDP access token.
|
|
164
|
+
* CRITICAL: This is from the JWT HEADER, not the payload.
|
|
165
|
+
* Do NOT confuse with client_id (which is in the payload).
|
|
166
|
+
*
|
|
167
|
+
* Used for:
|
|
168
|
+
* - Key governance verification
|
|
169
|
+
* - Identifying which IDP signing key was used
|
|
170
|
+
* - Token validation on the backend
|
|
171
|
+
*
|
|
172
|
+
* May be undefined for sessions created before this field was added.
|
|
173
|
+
*/
|
|
174
|
+
bearerKeyId?: string;
|
|
175
|
+
/**
|
|
176
|
+
* Has the user completed MFA for this session?
|
|
177
|
+
*
|
|
178
|
+
* TRUE means: User has verified their identity with a second factor
|
|
179
|
+
* FALSE means: User is in "provisional" state, limited access
|
|
180
|
+
*
|
|
181
|
+
* OLD NAMES (do not use):
|
|
182
|
+
* - twoFactorComplete
|
|
183
|
+
* - twoFactorSessionVerified
|
|
184
|
+
* - requiresTwoFactor (this was the INVERSE, very confusing)
|
|
185
|
+
*/
|
|
186
|
+
mfaVerified: boolean;
|
|
187
|
+
/** How the user completed MFA */
|
|
188
|
+
mfaMethod?: 'email' | 'sms' | 'totp' | 'authenticator';
|
|
189
|
+
/** When MFA was completed (Unix ms) */
|
|
190
|
+
mfaCompletedAt?: number;
|
|
191
|
+
/** When MFA verification expires, requiring re-verification (Unix ms) */
|
|
192
|
+
mfaExpiresAt?: number;
|
|
193
|
+
/** How long MFA is valid (hours) - from client config */
|
|
194
|
+
mfaValidityHours?: number;
|
|
195
|
+
/**
|
|
196
|
+
* Authentication methods used (AMR claim from token)
|
|
197
|
+
* e.g., ['pwd', 'mfa', 'otp']
|
|
198
|
+
*/
|
|
199
|
+
authenticationMethods?: string[];
|
|
200
|
+
/**
|
|
201
|
+
* Authentication context class (ACR claim from token)
|
|
202
|
+
* '1' = single factor, '2' = multi-factor
|
|
203
|
+
*/
|
|
204
|
+
authenticationLevel?: string;
|
|
205
|
+
/** Which OAuth provider was used (e.g., 'google', 'microsoft') */
|
|
206
|
+
oauthProvider?: string;
|
|
207
|
+
/** Token from the OAuth provider (for calling provider APIs) */
|
|
208
|
+
oauthProviderToken?: OAuthProviderToken;
|
|
209
|
+
/** Refresh token from OAuth provider */
|
|
210
|
+
oauthProviderRefreshToken?: string;
|
|
211
|
+
/** IDP client ID this session belongs to */
|
|
212
|
+
idpClientId?: string;
|
|
213
|
+
/** Merchant ID for payment processing */
|
|
214
|
+
merchantId?: string;
|
|
215
|
+
}
|
|
216
|
+
/**
|
|
217
|
+
* Claims extracted from the IdpAccessToken JWT.
|
|
218
|
+
*
|
|
219
|
+
* We cache this in Redis to avoid parsing the JWT on every request.
|
|
220
|
+
* These are the claims that the IDP puts in the access token.
|
|
221
|
+
*/
|
|
222
|
+
export interface DecodedIdpAccessToken {
|
|
223
|
+
/** Subject - User ID */
|
|
224
|
+
sub: string;
|
|
225
|
+
/** Issuer - IDP URL */
|
|
226
|
+
iss: string;
|
|
227
|
+
/** Audience - who this token is for */
|
|
228
|
+
aud?: string | string[];
|
|
229
|
+
/** Expiration time (Unix seconds) */
|
|
230
|
+
exp: number;
|
|
231
|
+
/** Issued at time (Unix seconds) */
|
|
232
|
+
iat: number;
|
|
233
|
+
/** Not before time (Unix seconds) */
|
|
234
|
+
nbf?: number;
|
|
235
|
+
/** JWT ID - unique identifier for this token */
|
|
236
|
+
jti?: string;
|
|
237
|
+
/** User's email (may be in different claim names) */
|
|
238
|
+
email?: string;
|
|
239
|
+
'http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name'?: string;
|
|
240
|
+
/** User's roles */
|
|
241
|
+
role?: string | string[];
|
|
242
|
+
roles?: string | string[];
|
|
243
|
+
/** Client ID this token was issued for */
|
|
244
|
+
client_id?: string;
|
|
245
|
+
/** Client slug (human-readable identifier) */
|
|
246
|
+
client_slug?: string;
|
|
247
|
+
/** Merchant ID for payment processing */
|
|
248
|
+
merchant_id?: string;
|
|
249
|
+
/** Authentication methods used */
|
|
250
|
+
amr?: string | string[];
|
|
251
|
+
/** Authentication context class */
|
|
252
|
+
acr?: string;
|
|
253
|
+
/** MFA completion time (Unix seconds) */
|
|
254
|
+
mfa_time?: number;
|
|
255
|
+
/** MFA expiry time (Unix seconds) */
|
|
256
|
+
mfa_expires?: number;
|
|
257
|
+
/** MFA validity period (hours) */
|
|
258
|
+
mfa_validity_hours?: number;
|
|
259
|
+
}
|
|
260
|
+
/**
|
|
261
|
+
* The session object returned by NextAuth's useSession() hook.
|
|
262
|
+
*
|
|
263
|
+
* This is what React components receive. It contains user info and
|
|
264
|
+
* session metadata, but NOT raw tokens (those stay server-side).
|
|
265
|
+
*
|
|
266
|
+
* To make API calls, use the API routes which have access to Redis.
|
|
267
|
+
*/
|
|
268
|
+
export interface AppSession {
|
|
269
|
+
user: {
|
|
270
|
+
/** User ID from IDP */
|
|
271
|
+
id: string;
|
|
272
|
+
/** User's email */
|
|
273
|
+
email: string;
|
|
274
|
+
/** Display name */
|
|
275
|
+
name?: string;
|
|
276
|
+
/** User's roles */
|
|
277
|
+
roles: string[];
|
|
278
|
+
/** Has user completed MFA? */
|
|
279
|
+
mfaVerified: boolean;
|
|
280
|
+
/** OAuth provider if applicable */
|
|
281
|
+
oauthProvider?: string;
|
|
282
|
+
};
|
|
283
|
+
/** Redis session key (for API routes that need it) */
|
|
284
|
+
redisSessionId: RedisSessionId;
|
|
285
|
+
/** Session expiry info */
|
|
286
|
+
expires: string;
|
|
287
|
+
/** Error state if something went wrong */
|
|
288
|
+
error?: 'SessionNotFound' | 'RefreshFailed' | 'MfaExpired' | 'TokenExpired';
|
|
289
|
+
}
|
|
290
|
+
/**
|
|
291
|
+
* Response from IDP login endpoint (/api/ExternalAuth/login)
|
|
292
|
+
*
|
|
293
|
+
* Note: IDP returns snake_case. We normalize to camelCase at the boundary.
|
|
294
|
+
*/
|
|
295
|
+
export interface IdpLoginResponse {
|
|
296
|
+
success: boolean;
|
|
297
|
+
result?: {
|
|
298
|
+
access_token: string;
|
|
299
|
+
refresh_token: string;
|
|
300
|
+
expires_in: number;
|
|
301
|
+
token_type: 'Bearer';
|
|
302
|
+
user?: {
|
|
303
|
+
userId: number;
|
|
304
|
+
email: string;
|
|
305
|
+
fullName?: string;
|
|
306
|
+
isEmailConfirmed?: boolean;
|
|
307
|
+
isSmsConfirmed?: boolean;
|
|
308
|
+
roles?: string[];
|
|
309
|
+
};
|
|
310
|
+
};
|
|
311
|
+
error?: {
|
|
312
|
+
code: string;
|
|
313
|
+
message: string;
|
|
314
|
+
details?: {
|
|
315
|
+
errors?: Array<{
|
|
316
|
+
code: string;
|
|
317
|
+
message: string;
|
|
318
|
+
}>;
|
|
319
|
+
attempts_remaining?: number;
|
|
320
|
+
};
|
|
321
|
+
};
|
|
322
|
+
}
|
|
323
|
+
/**
|
|
324
|
+
* Response from IDP OAuth callback (/api/ExternalAuth/oauth-callback)
|
|
325
|
+
*/
|
|
326
|
+
export interface IdpOAuthCallbackResponse {
|
|
327
|
+
success: boolean;
|
|
328
|
+
data?: {
|
|
329
|
+
accessToken: string;
|
|
330
|
+
refreshToken: string;
|
|
331
|
+
isNewUser: boolean;
|
|
332
|
+
user?: {
|
|
333
|
+
userId: number;
|
|
334
|
+
email: string;
|
|
335
|
+
fullName?: string;
|
|
336
|
+
roles?: string[];
|
|
337
|
+
};
|
|
338
|
+
};
|
|
339
|
+
error?: {
|
|
340
|
+
code: string;
|
|
341
|
+
message: string;
|
|
342
|
+
};
|
|
343
|
+
}
|
|
344
|
+
/**
|
|
345
|
+
* Response from IDP token refresh (/api/ExternalAuth/refresh)
|
|
346
|
+
*/
|
|
347
|
+
export interface IdpRefreshResponse {
|
|
348
|
+
success: boolean;
|
|
349
|
+
data?: {
|
|
350
|
+
access_token: string;
|
|
351
|
+
refresh_token?: string;
|
|
352
|
+
expires_in: number;
|
|
353
|
+
};
|
|
354
|
+
error?: {
|
|
355
|
+
code: string;
|
|
356
|
+
message: string;
|
|
357
|
+
};
|
|
358
|
+
}
|
|
359
|
+
/**
|
|
360
|
+
* Result of the ensureFreshToken() utility
|
|
361
|
+
*/
|
|
362
|
+
export type EnsureFreshTokenResult = {
|
|
363
|
+
success: true;
|
|
364
|
+
idpAccessToken: IdpAccessToken;
|
|
365
|
+
sessionData: RedisSessionData;
|
|
366
|
+
} | {
|
|
367
|
+
success: false;
|
|
368
|
+
error: AuthError;
|
|
369
|
+
message: string;
|
|
370
|
+
};
|
|
371
|
+
/**
|
|
372
|
+
* Possible auth errors
|
|
373
|
+
*/
|
|
374
|
+
export type AuthError = 'NO_SESSION' | 'NO_TOKEN' | 'TOKEN_EXPIRED' | 'REFRESH_FAILED' | 'MFA_REQUIRED' | 'MFA_EXPIRED' | 'SESSION_INVALID' | 'CLIENT_MISMATCH';
|
|
375
|
+
/**
|
|
376
|
+
* Credentials submitted via the login form
|
|
377
|
+
*/
|
|
378
|
+
export interface LoginCredentials {
|
|
379
|
+
email: string;
|
|
380
|
+
password: string;
|
|
381
|
+
}
|
|
382
|
+
/**
|
|
383
|
+
* What the CredentialsProvider.authorize() function returns
|
|
384
|
+
*/
|
|
385
|
+
export interface AuthorizeResult {
|
|
386
|
+
/** User ID from IDP */
|
|
387
|
+
id: string;
|
|
388
|
+
/** User's email */
|
|
389
|
+
email: string;
|
|
390
|
+
/** User's roles */
|
|
391
|
+
roles: string[];
|
|
392
|
+
/** Redis session ID (created during authorize) */
|
|
393
|
+
redisSessionId: RedisSessionId;
|
|
394
|
+
/** Whether user needs to complete MFA */
|
|
395
|
+
mfaRequired: boolean;
|
|
396
|
+
/** Available MFA methods */
|
|
397
|
+
mfaMethod?: 'email' | 'sms' | 'totp';
|
|
398
|
+
}
|
|
399
|
+
/**
|
|
400
|
+
* OAuth account info from NextAuth
|
|
401
|
+
*/
|
|
402
|
+
export interface OAuthAccountInfo {
|
|
403
|
+
provider: string;
|
|
404
|
+
providerAccountId: string;
|
|
405
|
+
access_token?: string;
|
|
406
|
+
refresh_token?: string;
|
|
407
|
+
expires_at?: number;
|
|
408
|
+
}
|
|
409
|
+
/**
|
|
410
|
+
* OAuth user info from provider
|
|
411
|
+
*/
|
|
412
|
+
export interface OAuthUserInfo {
|
|
413
|
+
id?: string;
|
|
414
|
+
email?: string;
|
|
415
|
+
name?: string;
|
|
416
|
+
image?: string;
|
|
417
|
+
}
|