@phila/sso-react 0.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/LICENSE ADDED
@@ -0,0 +1,21 @@
1
+ MIT License
2
+
3
+ Copyright (c) 2026 City of Philadelphia
4
+
5
+ Permission is hereby granted, free of charge, to any person obtaining a copy
6
+ of this software and associated documentation files (the "Software"), to deal
7
+ in the Software without restriction, including without limitation the rights
8
+ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9
+ copies of the Software, and to permit persons to whom the Software is
10
+ furnished to do so, subject to the following conditions:
11
+
12
+ The above copyright notice and this permission notice shall be included in all
13
+ copies or substantial portions of the Software.
14
+
15
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16
+ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17
+ FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18
+ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19
+ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20
+ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21
+ SOFTWARE.
@@ -0,0 +1,67 @@
1
+ import { AccountInfo } from '@azure/msal-browser';
2
+ import { Context } from 'react';
3
+ import { JSX } from 'react/jsx-runtime';
4
+ import { ReactNode } from 'react';
5
+ import { SignInOptions } from '@phila/sso-core';
6
+ import { SignOutOptions } from '@phila/sso-core';
7
+ import { SSOClient } from '@phila/sso-core';
8
+ import { SSOClientConfig } from '@phila/sso-core';
9
+ import { SSOClientState } from '@phila/sso-core';
10
+ import { TokenOptions } from '@phila/sso-core';
11
+
12
+ /**
13
+ * Drop-in provider for Azure AD B2C authentication.
14
+ * Reads connection details from VITE_SSO_* environment variables:
15
+ * VITE_SSO_CLIENT_ID, VITE_SSO_TENANT, VITE_SSO_AUTHORITY_DOMAIN, VITE_SSO_REDIRECT_URI
16
+ */
17
+ export declare function B2CSSOProvider({ children, signInPolicy, resetPasswordPolicy, debug, }: B2CSSOProviderProps): JSX.Element;
18
+
19
+ export declare interface B2CSSOProviderProps {
20
+ children: ReactNode;
21
+ signInPolicy?: string;
22
+ resetPasswordPolicy?: string;
23
+ debug?: boolean;
24
+ }
25
+
26
+ export declare const SSOContext: Context<SSOContextValue | null>;
27
+
28
+ export declare interface SSOContextValue {
29
+ client: SSOClient;
30
+ state: SSOClientState;
31
+ }
32
+
33
+ export declare function SSOProvider({ config, children }: SSOProviderProps): JSX.Element;
34
+
35
+ export declare interface SSOProviderProps {
36
+ config: SSOClientConfig;
37
+ children: ReactNode;
38
+ }
39
+
40
+ /**
41
+ * Primary hook for SSO authentication in React apps.
42
+ * Same API shape as the Vue composable for consistency.
43
+ */
44
+ export declare function useAuth(): {
45
+ isAuthenticated: boolean;
46
+ isLoading: boolean;
47
+ user: AccountInfo | null;
48
+ token: string | null;
49
+ error: Error | null;
50
+ activePolicy: string | null;
51
+ authReady: boolean;
52
+ userName: string | null;
53
+ signIn: (options?: SignInOptions) => Promise<void>;
54
+ signInCityEmployee: (options?: SignInOptions) => Promise<void>;
55
+ signOut: (options?: SignOutOptions) => Promise<void>;
56
+ forgotPassword: () => Promise<void>;
57
+ acquireToken: (options?: TokenOptions) => Promise<string | null>;
58
+ hasRole: (role: string) => boolean;
59
+ };
60
+
61
+ /**
62
+ * Access the raw SSOClient instance.
63
+ * Must be called within an SSOProvider.
64
+ */
65
+ export declare function useSSOClient(): SSOClient;
66
+
67
+ export { }
package/dist/index.js ADDED
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const f=require("react/jsx-runtime"),r=require("react"),C=require("@phila/sso-core"),y={isAuthenticated:!1,isLoading:!0,user:null,token:null,error:null,activePolicy:null,authReady:!1},l=r.createContext(null);function m({config:s,children:n}){const e=r.useRef(null),[c,i]=r.useState(y);e.current||(e.current=new C.SSOClient(s));const o=e.current;return r.useEffect(()=>{const d=o.events.on("auth:stateChanged",S=>{i(S)});return o.initialize(),()=>{d(),o.destroy()}},[o]),f.jsx(l.Provider,{value:{client:o,state:c},children:n})}function O(){const s=r.useContext(l);if(!s)throw new Error("useAuth must be used within an SSOProvider");const{client:n,state:e}=s,c=r.useCallback(t=>n.signIn(t),[n]),i=r.useCallback(t=>n.signInCityEmployee(t),[n]),o=r.useCallback(t=>n.signOut(t),[n]),d=r.useCallback(()=>n.forgotPassword(),[n]),S=r.useCallback(t=>n.acquireToken(t),[n]),g=r.useCallback(t=>{const u=e.user?.idTokenClaims;if(!u)return!1;const a=u.roles??u.extension_Roles??[];return Array.isArray(a)&&a.includes(t)},[e.user]),v=r.useMemo(()=>{const t=e.user?.idTokenClaims;if(!t)return null;const u=t.given_name??t.name??"",a=t.family_name??"";return a?`${u} ${a}`.trim():u},[e.user]);return{isAuthenticated:e.isAuthenticated,isLoading:e.isLoading,user:e.user,token:e.token,error:e.error,activePolicy:e.activePolicy,authReady:e.authReady,userName:v,signIn:c,signInCityEmployee:i,signOut:o,forgotPassword:d,acquireToken:S,hasRole:g}}function h(){const s=r.useContext(l);if(!s)throw new Error("useSSOClient must be used within an SSOProvider");return s.client}function P({children:s,signInPolicy:n="B2C_1A_AD_SIGNIN_ONLY",resetPasswordPolicy:e="B2C_1A_PASSWORDRESET",debug:c=!1}){const i=r.useRef(null);return i.current||(i.current=new C.B2CProvider({clientId:void 0,b2cEnvironment:void 0,authorityDomain:void 0,redirectUri:void 0,policies:{signUpSignIn:n,signInOnly:n,resetPassword:e}})),f.jsx(m,{config:{provider:i.current,debug:c},children:s})}exports.B2CSSOProvider=P;exports.SSOContext=l;exports.SSOProvider=m;exports.useAuth=O;exports.useSSOClient=h;
2
+ //# sourceMappingURL=index.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.js","sources":["../src/context.tsx","../src/hooks/useAuth.ts","../src/hooks/useSSOClient.ts","../src/B2CSSOProvider.tsx"],"sourcesContent":["import { createContext, useRef, useState, useEffect } from \"react\";\nimport { SSOClient } from \"@phila/sso-core\";\nimport type { SSOClientConfig, SSOClientState } from \"@phila/sso-core\";\nimport type { ReactNode } from \"react\";\n\nconst INITIAL_STATE: SSOClientState = {\n isAuthenticated: false,\n isLoading: true,\n user: null,\n token: null,\n error: null,\n activePolicy: null,\n authReady: false,\n};\n\nexport interface SSOContextValue {\n client: SSOClient;\n state: SSOClientState;\n}\n\nexport const SSOContext = createContext<SSOContextValue | null>(null);\n\nexport interface SSOProviderProps {\n config: SSOClientConfig;\n children: ReactNode;\n}\n\nexport function SSOProvider({ config, children }: SSOProviderProps) {\n const clientRef = useRef<SSOClient | null>(null);\n const [state, setState] = useState<SSOClientState>(INITIAL_STATE);\n\n // Create client once (stable across renders)\n if (!clientRef.current) {\n clientRef.current = new SSOClient(config);\n }\n\n const client = clientRef.current;\n\n useEffect(() => {\n // Subscribe to state changes\n const unsubscribe = client.events.on(\"auth:stateChanged\", (newState: SSOClientState) => {\n setState(newState);\n });\n\n // Initialize\n client.initialize();\n\n return () => {\n unsubscribe();\n client.destroy();\n };\n }, [client]);\n\n return <SSOContext.Provider value={{ client, state }}>{children}</SSOContext.Provider>;\n}\n","import { useContext, useCallback, useMemo } from \"react\";\nimport { SSOContext } from \"../context\";\nimport type { SignInOptions, SignOutOptions, TokenOptions } from \"@phila/sso-core\";\n\n/**\n * Primary hook for SSO authentication in React apps.\n * Same API shape as the Vue composable for consistency.\n */\nexport function useAuth() {\n const context = useContext(SSOContext);\n if (!context) {\n throw new Error(\"useAuth must be used within an SSOProvider\");\n }\n\n const { client, state } = context;\n\n // Stable action references\n const signIn = useCallback((options?: SignInOptions) => client.signIn(options), [client]);\n\n const signInCityEmployee = useCallback((options?: SignInOptions) => client.signInCityEmployee(options), [client]);\n\n const signOut = useCallback((options?: SignOutOptions) => client.signOut(options), [client]);\n\n const forgotPassword = useCallback(() => client.forgotPassword(), [client]);\n\n const acquireToken = useCallback((options?: TokenOptions) => client.acquireToken(options), [client]);\n\n const hasRole = useCallback(\n (role: string): boolean => {\n const claims = state.user?.idTokenClaims as Record<string, unknown> | undefined;\n if (!claims) return false;\n const roles = (claims.roles ?? claims.extension_Roles ?? []) as string[];\n return Array.isArray(roles) && roles.includes(role);\n },\n [state.user],\n );\n\n const userName = useMemo(() => {\n const claims = state.user?.idTokenClaims as Record<string, unknown> | undefined;\n if (!claims) return null;\n const given = (claims.given_name ?? claims.name ?? \"\") as string;\n const family = (claims.family_name ?? \"\") as string;\n return family ? `${given} ${family}`.trim() : given;\n }, [state.user]);\n\n return {\n // State\n isAuthenticated: state.isAuthenticated,\n isLoading: state.isLoading,\n user: state.user,\n token: state.token,\n error: state.error,\n activePolicy: state.activePolicy,\n authReady: state.authReady,\n userName,\n\n // Actions\n signIn,\n signInCityEmployee,\n signOut,\n forgotPassword,\n acquireToken,\n\n // Utilities\n hasRole,\n };\n}\n","import { useContext } from \"react\";\nimport { SSOContext } from \"../context\";\nimport type { SSOClient } from \"@phila/sso-core\";\n\n/**\n * Access the raw SSOClient instance.\n * Must be called within an SSOProvider.\n */\nexport function useSSOClient(): SSOClient {\n const context = useContext(SSOContext);\n if (!context) {\n throw new Error(\"useSSOClient must be used within an SSOProvider\");\n }\n return context.client;\n}\n","// ABOUTME: Convenience provider component for React/Vite apps using Azure AD B2C\n// ABOUTME: Reads VITE_SSO_* env vars by convention so apps need zero B2CProvider boilerplate\nimport { useRef } from \"react\";\nimport { B2CProvider } from \"@phila/sso-core\";\nimport { SSOProvider } from \"./context\";\nimport type { ReactNode } from \"react\";\n\nexport interface B2CSSOProviderProps {\n children: ReactNode;\n signInPolicy?: string;\n resetPasswordPolicy?: string;\n debug?: boolean;\n}\n\n/**\n * Drop-in provider for Azure AD B2C authentication.\n * Reads connection details from VITE_SSO_* environment variables:\n * VITE_SSO_CLIENT_ID, VITE_SSO_TENANT, VITE_SSO_AUTHORITY_DOMAIN, VITE_SSO_REDIRECT_URI\n */\nexport function B2CSSOProvider({\n children,\n signInPolicy = \"B2C_1A_AD_SIGNIN_ONLY\",\n resetPasswordPolicy = \"B2C_1A_PASSWORDRESET\",\n debug = import.meta.env.DEV,\n}: B2CSSOProviderProps) {\n const providerRef = useRef<B2CProvider | null>(null);\n\n // Create once — props that affect provider construction are treated as initializers\n if (!providerRef.current) {\n providerRef.current = new B2CProvider({\n clientId: import.meta.env.VITE_SSO_CLIENT_ID,\n b2cEnvironment: import.meta.env.VITE_SSO_TENANT,\n authorityDomain: import.meta.env.VITE_SSO_AUTHORITY_DOMAIN,\n redirectUri: import.meta.env.VITE_SSO_REDIRECT_URI,\n policies: {\n signUpSignIn: signInPolicy,\n signInOnly: signInPolicy,\n resetPassword: resetPasswordPolicy,\n },\n });\n }\n\n return <SSOProvider config={{ provider: providerRef.current, debug }}>{children}</SSOProvider>;\n}\n"],"names":["INITIAL_STATE","SSOContext","createContext","SSOProvider","config","children","clientRef","useRef","state","setState","useState","SSOClient","client","useEffect","unsubscribe","newState","jsx","useAuth","context","useContext","signIn","useCallback","options","signInCityEmployee","signOut","forgotPassword","acquireToken","hasRole","role","claims","roles","userName","useMemo","given","family","useSSOClient","B2CSSOProvider","signInPolicy","resetPasswordPolicy","debug","providerRef","B2CProvider"],"mappings":"qKAKMA,EAAgC,CACpC,gBAAiB,GACjB,UAAW,GACX,KAAM,KACN,MAAO,KACP,MAAO,KACP,aAAc,KACd,UAAW,EACb,EAOaC,EAAaC,EAAAA,cAAsC,IAAI,EAO7D,SAASC,EAAY,CAAE,OAAAC,EAAQ,SAAAC,GAA8B,CAClE,MAAMC,EAAYC,EAAAA,OAAyB,IAAI,EACzC,CAACC,EAAOC,CAAQ,EAAIC,EAAAA,SAAyBV,CAAa,EAG3DM,EAAU,UACbA,EAAU,QAAU,IAAIK,EAAAA,UAAUP,CAAM,GAG1C,MAAMQ,EAASN,EAAU,QAEzBO,OAAAA,EAAAA,UAAU,IAAM,CAEd,MAAMC,EAAcF,EAAO,OAAO,GAAG,oBAAsBG,GAA6B,CACtFN,EAASM,CAAQ,CACnB,CAAC,EAGD,OAAAH,EAAO,WAAA,EAEA,IAAM,CACXE,EAAA,EACAF,EAAO,QAAA,CACT,CACF,EAAG,CAACA,CAAM,CAAC,EAEJI,EAAAA,IAACf,EAAW,SAAX,CAAoB,MAAO,CAAE,OAAAW,EAAQ,MAAAJ,GAAU,SAAAH,EAAS,CAClE,CC9CO,SAASY,GAAU,CACxB,MAAMC,EAAUC,EAAAA,WAAWlB,CAAU,EACrC,GAAI,CAACiB,EACH,MAAM,IAAI,MAAM,4CAA4C,EAG9D,KAAM,CAAE,OAAAN,EAAQ,MAAAJ,CAAA,EAAUU,EAGpBE,EAASC,cAAaC,GAA4BV,EAAO,OAAOU,CAAO,EAAG,CAACV,CAAM,CAAC,EAElFW,EAAqBF,cAAaC,GAA4BV,EAAO,mBAAmBU,CAAO,EAAG,CAACV,CAAM,CAAC,EAE1GY,EAAUH,cAAaC,GAA6BV,EAAO,QAAQU,CAAO,EAAG,CAACV,CAAM,CAAC,EAErFa,EAAiBJ,EAAAA,YAAY,IAAMT,EAAO,iBAAkB,CAACA,CAAM,CAAC,EAEpEc,EAAeL,cAAaC,GAA2BV,EAAO,aAAaU,CAAO,EAAG,CAACV,CAAM,CAAC,EAE7Fe,EAAUN,EAAAA,YACbO,GAA0B,CACzB,MAAMC,EAASrB,EAAM,MAAM,cAC3B,GAAI,CAACqB,EAAQ,MAAO,GACpB,MAAMC,EAASD,EAAO,OAASA,EAAO,iBAAmB,CAAA,EACzD,OAAO,MAAM,QAAQC,CAAK,GAAKA,EAAM,SAASF,CAAI,CACpD,EACA,CAACpB,EAAM,IAAI,CAAA,EAGPuB,EAAWC,EAAAA,QAAQ,IAAM,CAC7B,MAAMH,EAASrB,EAAM,MAAM,cAC3B,GAAI,CAACqB,EAAQ,OAAO,KACpB,MAAMI,EAASJ,EAAO,YAAcA,EAAO,MAAQ,GAC7CK,EAAUL,EAAO,aAAe,GACtC,OAAOK,EAAS,GAAGD,CAAK,IAAIC,CAAM,GAAG,OAASD,CAChD,EAAG,CAACzB,EAAM,IAAI,CAAC,EAEf,MAAO,CAEL,gBAAiBA,EAAM,gBACvB,UAAWA,EAAM,UACjB,KAAMA,EAAM,KACZ,MAAOA,EAAM,MACb,MAAOA,EAAM,MACb,aAAcA,EAAM,aACpB,UAAWA,EAAM,UACjB,SAAAuB,EAGA,OAAAX,EACA,mBAAAG,EACA,QAAAC,EACA,eAAAC,EACA,aAAAC,EAGA,QAAAC,CAAA,CAEJ,CC1DO,SAASQ,GAA0B,CACxC,MAAMjB,EAAUC,EAAAA,WAAWlB,CAAU,EACrC,GAAI,CAACiB,EACH,MAAM,IAAI,MAAM,iDAAiD,EAEnE,OAAOA,EAAQ,MACjB,CCKO,SAASkB,EAAe,CAC7B,SAAA/B,EACA,aAAAgC,EAAe,wBACf,oBAAAC,EAAsB,uBACtB,MAAAC,EAAQ,EACV,EAAwB,CACtB,MAAMC,EAAcjC,EAAAA,OAA2B,IAAI,EAGnD,OAAKiC,EAAY,UACfA,EAAY,QAAU,IAAIC,cAAY,CACpC,SAAU,OACV,eAAgB,OAChB,gBAAiB,OACjB,YAAa,OACb,SAAU,CACR,aAAcJ,EACd,WAAYA,EACZ,cAAeC,CAAA,CACjB,CACD,GAGItB,MAACb,GAAY,OAAQ,CAAE,SAAUqC,EAAY,QAAS,MAAAD,GAAU,SAAAlC,EAAS,CAClF"}
package/dist/index.mjs ADDED
@@ -0,0 +1,96 @@
1
+ import { jsx as m } from "react/jsx-runtime";
2
+ import { createContext as y, useRef as S, useState as C, useEffect as A, useContext as g, useCallback as u, useMemo as O } from "react";
3
+ import { SSOClient as P, B2CProvider as w } from "@phila/sso-core";
4
+ const I = {
5
+ isAuthenticated: !1,
6
+ isLoading: !0,
7
+ user: null,
8
+ token: null,
9
+ error: null,
10
+ activePolicy: null,
11
+ authReady: !1
12
+ }, f = y(null);
13
+ function p({ config: r, children: n }) {
14
+ const e = S(null), [c, i] = C(I);
15
+ e.current || (e.current = new P(r));
16
+ const s = e.current;
17
+ return A(() => {
18
+ const l = s.events.on("auth:stateChanged", (d) => {
19
+ i(d);
20
+ });
21
+ return s.initialize(), () => {
22
+ l(), s.destroy();
23
+ };
24
+ }, [s]), /* @__PURE__ */ m(f.Provider, { value: { client: s, state: c }, children: n });
25
+ }
26
+ function k() {
27
+ const r = g(f);
28
+ if (!r)
29
+ throw new Error("useAuth must be used within an SSOProvider");
30
+ const { client: n, state: e } = r, c = u((t) => n.signIn(t), [n]), i = u((t) => n.signInCityEmployee(t), [n]), s = u((t) => n.signOut(t), [n]), l = u(() => n.forgotPassword(), [n]), d = u((t) => n.acquireToken(t), [n]), h = u(
31
+ (t) => {
32
+ const o = e.user?.idTokenClaims;
33
+ if (!o) return !1;
34
+ const a = o.roles ?? o.extension_Roles ?? [];
35
+ return Array.isArray(a) && a.includes(t);
36
+ },
37
+ [e.user]
38
+ ), v = O(() => {
39
+ const t = e.user?.idTokenClaims;
40
+ if (!t) return null;
41
+ const o = t.given_name ?? t.name ?? "", a = t.family_name ?? "";
42
+ return a ? `${o} ${a}`.trim() : o;
43
+ }, [e.user]);
44
+ return {
45
+ // State
46
+ isAuthenticated: e.isAuthenticated,
47
+ isLoading: e.isLoading,
48
+ user: e.user,
49
+ token: e.token,
50
+ error: e.error,
51
+ activePolicy: e.activePolicy,
52
+ authReady: e.authReady,
53
+ userName: v,
54
+ // Actions
55
+ signIn: c,
56
+ signInCityEmployee: i,
57
+ signOut: s,
58
+ forgotPassword: l,
59
+ acquireToken: d,
60
+ // Utilities
61
+ hasRole: h
62
+ };
63
+ }
64
+ function x() {
65
+ const r = g(f);
66
+ if (!r)
67
+ throw new Error("useSSOClient must be used within an SSOProvider");
68
+ return r.client;
69
+ }
70
+ function T({
71
+ children: r,
72
+ signInPolicy: n = "B2C_1A_AD_SIGNIN_ONLY",
73
+ resetPasswordPolicy: e = "B2C_1A_PASSWORDRESET",
74
+ debug: c = !1
75
+ }) {
76
+ const i = S(null);
77
+ return i.current || (i.current = new w({
78
+ clientId: void 0,
79
+ b2cEnvironment: void 0,
80
+ authorityDomain: void 0,
81
+ redirectUri: void 0,
82
+ policies: {
83
+ signUpSignIn: n,
84
+ signInOnly: n,
85
+ resetPassword: e
86
+ }
87
+ })), /* @__PURE__ */ m(p, { config: { provider: i.current, debug: c }, children: r });
88
+ }
89
+ export {
90
+ T as B2CSSOProvider,
91
+ f as SSOContext,
92
+ p as SSOProvider,
93
+ k as useAuth,
94
+ x as useSSOClient
95
+ };
96
+ //# sourceMappingURL=index.mjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.mjs","sources":["../src/context.tsx","../src/hooks/useAuth.ts","../src/hooks/useSSOClient.ts","../src/B2CSSOProvider.tsx"],"sourcesContent":["import { createContext, useRef, useState, useEffect } from \"react\";\nimport { SSOClient } from \"@phila/sso-core\";\nimport type { SSOClientConfig, SSOClientState } from \"@phila/sso-core\";\nimport type { ReactNode } from \"react\";\n\nconst INITIAL_STATE: SSOClientState = {\n isAuthenticated: false,\n isLoading: true,\n user: null,\n token: null,\n error: null,\n activePolicy: null,\n authReady: false,\n};\n\nexport interface SSOContextValue {\n client: SSOClient;\n state: SSOClientState;\n}\n\nexport const SSOContext = createContext<SSOContextValue | null>(null);\n\nexport interface SSOProviderProps {\n config: SSOClientConfig;\n children: ReactNode;\n}\n\nexport function SSOProvider({ config, children }: SSOProviderProps) {\n const clientRef = useRef<SSOClient | null>(null);\n const [state, setState] = useState<SSOClientState>(INITIAL_STATE);\n\n // Create client once (stable across renders)\n if (!clientRef.current) {\n clientRef.current = new SSOClient(config);\n }\n\n const client = clientRef.current;\n\n useEffect(() => {\n // Subscribe to state changes\n const unsubscribe = client.events.on(\"auth:stateChanged\", (newState: SSOClientState) => {\n setState(newState);\n });\n\n // Initialize\n client.initialize();\n\n return () => {\n unsubscribe();\n client.destroy();\n };\n }, [client]);\n\n return <SSOContext.Provider value={{ client, state }}>{children}</SSOContext.Provider>;\n}\n","import { useContext, useCallback, useMemo } from \"react\";\nimport { SSOContext } from \"../context\";\nimport type { SignInOptions, SignOutOptions, TokenOptions } from \"@phila/sso-core\";\n\n/**\n * Primary hook for SSO authentication in React apps.\n * Same API shape as the Vue composable for consistency.\n */\nexport function useAuth() {\n const context = useContext(SSOContext);\n if (!context) {\n throw new Error(\"useAuth must be used within an SSOProvider\");\n }\n\n const { client, state } = context;\n\n // Stable action references\n const signIn = useCallback((options?: SignInOptions) => client.signIn(options), [client]);\n\n const signInCityEmployee = useCallback((options?: SignInOptions) => client.signInCityEmployee(options), [client]);\n\n const signOut = useCallback((options?: SignOutOptions) => client.signOut(options), [client]);\n\n const forgotPassword = useCallback(() => client.forgotPassword(), [client]);\n\n const acquireToken = useCallback((options?: TokenOptions) => client.acquireToken(options), [client]);\n\n const hasRole = useCallback(\n (role: string): boolean => {\n const claims = state.user?.idTokenClaims as Record<string, unknown> | undefined;\n if (!claims) return false;\n const roles = (claims.roles ?? claims.extension_Roles ?? []) as string[];\n return Array.isArray(roles) && roles.includes(role);\n },\n [state.user],\n );\n\n const userName = useMemo(() => {\n const claims = state.user?.idTokenClaims as Record<string, unknown> | undefined;\n if (!claims) return null;\n const given = (claims.given_name ?? claims.name ?? \"\") as string;\n const family = (claims.family_name ?? \"\") as string;\n return family ? `${given} ${family}`.trim() : given;\n }, [state.user]);\n\n return {\n // State\n isAuthenticated: state.isAuthenticated,\n isLoading: state.isLoading,\n user: state.user,\n token: state.token,\n error: state.error,\n activePolicy: state.activePolicy,\n authReady: state.authReady,\n userName,\n\n // Actions\n signIn,\n signInCityEmployee,\n signOut,\n forgotPassword,\n acquireToken,\n\n // Utilities\n hasRole,\n };\n}\n","import { useContext } from \"react\";\nimport { SSOContext } from \"../context\";\nimport type { SSOClient } from \"@phila/sso-core\";\n\n/**\n * Access the raw SSOClient instance.\n * Must be called within an SSOProvider.\n */\nexport function useSSOClient(): SSOClient {\n const context = useContext(SSOContext);\n if (!context) {\n throw new Error(\"useSSOClient must be used within an SSOProvider\");\n }\n return context.client;\n}\n","// ABOUTME: Convenience provider component for React/Vite apps using Azure AD B2C\n// ABOUTME: Reads VITE_SSO_* env vars by convention so apps need zero B2CProvider boilerplate\nimport { useRef } from \"react\";\nimport { B2CProvider } from \"@phila/sso-core\";\nimport { SSOProvider } from \"./context\";\nimport type { ReactNode } from \"react\";\n\nexport interface B2CSSOProviderProps {\n children: ReactNode;\n signInPolicy?: string;\n resetPasswordPolicy?: string;\n debug?: boolean;\n}\n\n/**\n * Drop-in provider for Azure AD B2C authentication.\n * Reads connection details from VITE_SSO_* environment variables:\n * VITE_SSO_CLIENT_ID, VITE_SSO_TENANT, VITE_SSO_AUTHORITY_DOMAIN, VITE_SSO_REDIRECT_URI\n */\nexport function B2CSSOProvider({\n children,\n signInPolicy = \"B2C_1A_AD_SIGNIN_ONLY\",\n resetPasswordPolicy = \"B2C_1A_PASSWORDRESET\",\n debug = import.meta.env.DEV,\n}: B2CSSOProviderProps) {\n const providerRef = useRef<B2CProvider | null>(null);\n\n // Create once — props that affect provider construction are treated as initializers\n if (!providerRef.current) {\n providerRef.current = new B2CProvider({\n clientId: import.meta.env.VITE_SSO_CLIENT_ID,\n b2cEnvironment: import.meta.env.VITE_SSO_TENANT,\n authorityDomain: import.meta.env.VITE_SSO_AUTHORITY_DOMAIN,\n redirectUri: import.meta.env.VITE_SSO_REDIRECT_URI,\n policies: {\n signUpSignIn: signInPolicy,\n signInOnly: signInPolicy,\n resetPassword: resetPasswordPolicy,\n },\n });\n }\n\n return <SSOProvider config={{ provider: providerRef.current, debug }}>{children}</SSOProvider>;\n}\n"],"names":["INITIAL_STATE","SSOContext","createContext","SSOProvider","config","children","clientRef","useRef","state","setState","useState","SSOClient","client","useEffect","unsubscribe","newState","jsx","useAuth","context","useContext","signIn","useCallback","options","signInCityEmployee","signOut","forgotPassword","acquireToken","hasRole","role","claims","roles","userName","useMemo","given","family","useSSOClient","B2CSSOProvider","signInPolicy","resetPasswordPolicy","debug","providerRef","B2CProvider"],"mappings":";;;AAKA,MAAMA,IAAgC;AAAA,EACpC,iBAAiB;AAAA,EACjB,WAAW;AAAA,EACX,MAAM;AAAA,EACN,OAAO;AAAA,EACP,OAAO;AAAA,EACP,cAAc;AAAA,EACd,WAAW;AACb,GAOaC,IAAaC,EAAsC,IAAI;AAO7D,SAASC,EAAY,EAAE,QAAAC,GAAQ,UAAAC,KAA8B;AAClE,QAAMC,IAAYC,EAAyB,IAAI,GACzC,CAACC,GAAOC,CAAQ,IAAIC,EAAyBV,CAAa;AAGhE,EAAKM,EAAU,YACbA,EAAU,UAAU,IAAIK,EAAUP,CAAM;AAG1C,QAAMQ,IAASN,EAAU;AAEzB,SAAAO,EAAU,MAAM;AAEd,UAAMC,IAAcF,EAAO,OAAO,GAAG,qBAAqB,CAACG,MAA6B;AACtF,MAAAN,EAASM,CAAQ;AAAA,IACnB,CAAC;AAGD,WAAAH,EAAO,WAAA,GAEA,MAAM;AACX,MAAAE,EAAA,GACAF,EAAO,QAAA;AAAA,IACT;AAAA,EACF,GAAG,CAACA,CAAM,CAAC,GAEJ,gBAAAI,EAACf,EAAW,UAAX,EAAoB,OAAO,EAAE,QAAAW,GAAQ,OAAAJ,KAAU,UAAAH,GAAS;AAClE;AC9CO,SAASY,IAAU;AACxB,QAAMC,IAAUC,EAAWlB,CAAU;AACrC,MAAI,CAACiB;AACH,UAAM,IAAI,MAAM,4CAA4C;AAG9D,QAAM,EAAE,QAAAN,GAAQ,OAAAJ,EAAA,IAAUU,GAGpBE,IAASC,EAAY,CAACC,MAA4BV,EAAO,OAAOU,CAAO,GAAG,CAACV,CAAM,CAAC,GAElFW,IAAqBF,EAAY,CAACC,MAA4BV,EAAO,mBAAmBU,CAAO,GAAG,CAACV,CAAM,CAAC,GAE1GY,IAAUH,EAAY,CAACC,MAA6BV,EAAO,QAAQU,CAAO,GAAG,CAACV,CAAM,CAAC,GAErFa,IAAiBJ,EAAY,MAAMT,EAAO,kBAAkB,CAACA,CAAM,CAAC,GAEpEc,IAAeL,EAAY,CAACC,MAA2BV,EAAO,aAAaU,CAAO,GAAG,CAACV,CAAM,CAAC,GAE7Fe,IAAUN;AAAA,IACd,CAACO,MAA0B;AACzB,YAAMC,IAASrB,EAAM,MAAM;AAC3B,UAAI,CAACqB,EAAQ,QAAO;AACpB,YAAMC,IAASD,EAAO,SAASA,EAAO,mBAAmB,CAAA;AACzD,aAAO,MAAM,QAAQC,CAAK,KAAKA,EAAM,SAASF,CAAI;AAAA,IACpD;AAAA,IACA,CAACpB,EAAM,IAAI;AAAA,EAAA,GAGPuB,IAAWC,EAAQ,MAAM;AAC7B,UAAMH,IAASrB,EAAM,MAAM;AAC3B,QAAI,CAACqB,EAAQ,QAAO;AACpB,UAAMI,IAASJ,EAAO,cAAcA,EAAO,QAAQ,IAC7CK,IAAUL,EAAO,eAAe;AACtC,WAAOK,IAAS,GAAGD,CAAK,IAAIC,CAAM,GAAG,SAASD;AAAA,EAChD,GAAG,CAACzB,EAAM,IAAI,CAAC;AAEf,SAAO;AAAA;AAAA,IAEL,iBAAiBA,EAAM;AAAA,IACvB,WAAWA,EAAM;AAAA,IACjB,MAAMA,EAAM;AAAA,IACZ,OAAOA,EAAM;AAAA,IACb,OAAOA,EAAM;AAAA,IACb,cAAcA,EAAM;AAAA,IACpB,WAAWA,EAAM;AAAA,IACjB,UAAAuB;AAAA;AAAA,IAGA,QAAAX;AAAA,IACA,oBAAAG;AAAA,IACA,SAAAC;AAAA,IACA,gBAAAC;AAAA,IACA,cAAAC;AAAA;AAAA,IAGA,SAAAC;AAAA,EAAA;AAEJ;AC1DO,SAASQ,IAA0B;AACxC,QAAMjB,IAAUC,EAAWlB,CAAU;AACrC,MAAI,CAACiB;AACH,UAAM,IAAI,MAAM,iDAAiD;AAEnE,SAAOA,EAAQ;AACjB;ACKO,SAASkB,EAAe;AAAA,EAC7B,UAAA/B;AAAA,EACA,cAAAgC,IAAe;AAAA,EACf,qBAAAC,IAAsB;AAAA,EACtB,OAAAC,IAAQ;AACV,GAAwB;AACtB,QAAMC,IAAcjC,EAA2B,IAAI;AAGnD,SAAKiC,EAAY,YACfA,EAAY,UAAU,IAAIC,EAAY;AAAA,IACpC,UAAU;AAAA,IACV,gBAAgB;AAAA,IAChB,iBAAiB;AAAA,IACjB,aAAa;AAAA,IACb,UAAU;AAAA,MACR,cAAcJ;AAAA,MACd,YAAYA;AAAA,MACZ,eAAeC;AAAA,IAAA;AAAA,EACjB,CACD,IAGI,gBAAAtB,EAACb,KAAY,QAAQ,EAAE,UAAUqC,EAAY,SAAS,OAAAD,KAAU,UAAAlC,GAAS;AAClF;"}
package/package.json ADDED
@@ -0,0 +1,54 @@
1
+ {
2
+ "name": "@phila/sso-react",
3
+ "version": "0.0.1",
4
+ "type": "module",
5
+ "description": "React adapter for @phila/sso-core",
6
+ "main": "./dist/index.js",
7
+ "module": "./dist/index.mjs",
8
+ "types": "./dist/index.d.ts",
9
+ "exports": {
10
+ ".": {
11
+ "types": "./dist/index.d.ts",
12
+ "import": "./dist/index.mjs",
13
+ "require": "./dist/index.js"
14
+ }
15
+ },
16
+ "files": [
17
+ "dist"
18
+ ],
19
+ "keywords": [
20
+ "sso",
21
+ "react",
22
+ "authentication",
23
+ "hooks"
24
+ ],
25
+ "author": "City of Philadelphia",
26
+ "license": "MIT",
27
+ "dependencies": {
28
+ "@phila/sso-core": "0.0.1"
29
+ },
30
+ "peerDependencies": {
31
+ "react": "^18.0.0 || ^19.0.0"
32
+ },
33
+ "devDependencies": {
34
+ "@types/node": "^24.0.0",
35
+ "@types/react": "^19.2.7",
36
+ "eslint": "^9.0.0",
37
+ "react": "^19.1.0",
38
+ "typescript": "^5.9.3",
39
+ "vite": "^7.0.6",
40
+ "vite-plugin-dts": "^3.9.1"
41
+ },
42
+ "scripts": {
43
+ "build": "vite build",
44
+ "dev": "vite build --watch",
45
+ "lint": "eslint src/**/*.{ts,tsx}",
46
+ "lint:fix": "eslint src/**/*.{ts,tsx} --fix",
47
+ "type-check": "tsc --noEmit",
48
+ "clean": "rm -rf dist",
49
+ "test": "vitest run --passWithNoTests",
50
+ "test:watch": "vitest",
51
+ "format": "prettier --write .",
52
+ "format:check": "prettier --check ."
53
+ }
54
+ }