@privy-io/node 0.1.0-alpha.3 → 0.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +20 -0
- package/client.d.mts +1 -1
- package/client.d.ts +1 -1
- package/client.js +1 -1
- package/client.js.map +1 -1
- package/client.mjs +1 -1
- package/client.mjs.map +1 -1
- package/index.d.mts +6 -1
- package/index.d.mts.map +1 -1
- package/index.d.ts +6 -1
- package/index.d.ts.map +1 -1
- package/index.js +6 -2
- package/index.js.map +1 -1
- package/index.mjs +2 -1
- package/index.mjs.map +1 -1
- package/lib/auth.d.mts +68 -0
- package/lib/auth.d.mts.map +1 -0
- package/lib/auth.d.ts +68 -0
- package/lib/auth.d.ts.map +1 -0
- package/lib/auth.js +130 -0
- package/lib/auth.js.map +1 -0
- package/lib/auth.mjs +123 -0
- package/lib/auth.mjs.map +1 -0
- package/lib/identity-token.d.mts +15 -0
- package/lib/identity-token.d.mts.map +1 -0
- package/lib/identity-token.d.ts +15 -0
- package/lib/identity-token.d.ts.map +1 -0
- package/lib/identity-token.js +273 -0
- package/lib/identity-token.js.map +1 -0
- package/lib/identity-token.mjs +268 -0
- package/lib/identity-token.mjs.map +1 -0
- package/lib/user-utils.d.mts +22 -0
- package/lib/user-utils.d.mts.map +1 -0
- package/lib/user-utils.d.ts +22 -0
- package/lib/user-utils.d.ts.map +1 -0
- package/lib/user-utils.js +15 -0
- package/lib/user-utils.js.map +1 -0
- package/lib/user-utils.mjs +11 -0
- package/lib/user-utils.mjs.map +1 -0
- package/package.json +1 -1
- package/public-api/PrivyClient.d.mts +2 -1
- package/public-api/PrivyClient.d.mts.map +1 -1
- package/public-api/PrivyClient.d.ts +2 -1
- package/public-api/PrivyClient.d.ts.map +1 -1
- package/public-api/PrivyClient.js +10 -3
- package/public-api/PrivyClient.js.map +1 -1
- package/public-api/PrivyClient.mjs +10 -3
- package/public-api/PrivyClient.mjs.map +1 -1
- package/public-api/services/ethereum.d.mts.map +1 -1
- package/public-api/services/ethereum.d.ts.map +1 -1
- package/public-api/services/ethereum.js +0 -6
- package/public-api/services/ethereum.js.map +1 -1
- package/public-api/services/ethereum.mjs +0 -6
- package/public-api/services/ethereum.mjs.map +1 -1
- package/public-api/services/solana.d.mts.map +1 -1
- package/public-api/services/solana.d.ts.map +1 -1
- package/public-api/services/solana.js +0 -3
- package/public-api/services/solana.js.map +1 -1
- package/public-api/services/solana.mjs +0 -3
- package/public-api/services/solana.mjs.map +1 -1
- package/public-api/services/users.d.mts +23 -1
- package/public-api/services/users.d.mts.map +1 -1
- package/public-api/services/users.d.ts +23 -1
- package/public-api/services/users.d.ts.map +1 -1
- package/public-api/services/users.js +24 -0
- package/public-api/services/users.js.map +1 -1
- package/public-api/services/users.mjs +24 -0
- package/public-api/services/users.mjs.map +1 -1
- package/public-api/services/utils/auth.d.mts +6 -17
- package/public-api/services/utils/auth.d.mts.map +1 -1
- package/public-api/services/utils/auth.d.ts +6 -17
- package/public-api/services/utils/auth.d.ts.map +1 -1
- package/public-api/services/utils/auth.js +17 -69
- package/public-api/services/utils/auth.js.map +1 -1
- package/public-api/services/utils/auth.mjs +15 -66
- package/public-api/services/utils/auth.mjs.map +1 -1
- package/public-api/services/utils.d.mts +2 -1
- package/public-api/services/utils.d.mts.map +1 -1
- package/public-api/services/utils.d.ts +2 -1
- package/public-api/services/utils.d.ts.map +1 -1
- package/public-api/services/utils.js +2 -2
- package/public-api/services/utils.js.map +1 -1
- package/public-api/services/utils.mjs +2 -2
- package/public-api/services/utils.mjs.map +1 -1
- package/resources/policies.d.mts +2 -1
- package/resources/policies.d.mts.map +1 -1
- package/resources/policies.d.ts +2 -1
- package/resources/policies.d.ts.map +1 -1
- package/resources/users.d.mts +14 -3
- package/resources/users.d.mts.map +1 -1
- package/resources/users.d.ts +14 -3
- package/resources/users.d.ts.map +1 -1
- package/resources/users.js +2 -2
- package/resources/users.js.map +1 -1
- package/resources/users.mjs +2 -2
- package/resources/users.mjs.map +1 -1
- package/resources/wallets/wallets.d.mts +3 -18
- package/resources/wallets/wallets.d.mts.map +1 -1
- package/resources/wallets/wallets.d.ts +3 -18
- package/resources/wallets/wallets.d.ts.map +1 -1
- package/resources/wallets/wallets.js.map +1 -1
- package/resources/wallets/wallets.mjs.map +1 -1
- package/src/client.ts +2 -2
- package/src/index.ts +15 -1
- package/src/lib/auth.ts +210 -0
- package/src/lib/identity-token.ts +280 -0
- package/src/lib/user-utils.ts +31 -0
- package/src/public-api/PrivyClient.ts +12 -2
- package/src/public-api/services/ethereum.ts +0 -8
- package/src/public-api/services/solana.ts +0 -4
- package/src/public-api/services/users.ts +36 -2
- package/src/public-api/services/utils/auth.ts +22 -86
- package/src/public-api/services/utils.ts +3 -2
- package/src/resources/policies.ts +2 -1
- package/src/resources/users.ts +23 -2
- package/src/resources/wallets/wallets.ts +6 -30
- package/src/version.ts +1 -1
- package/version.d.mts +1 -1
- package/version.d.mts.map +1 -1
- package/version.d.ts +1 -1
- package/version.d.ts.map +1 -1
- package/version.js +1 -1
- package/version.js.map +1 -1
- package/version.mjs +1 -1
- package/version.mjs.map +1 -1
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"solana.d.ts","sourceRoot":"","sources":["../../src/public-api/services/solana.ts"],"names":[],"mappings":"OAAO,EAAE,eAAe,EAAE,iBAAiB,EAAE;OACtC,EAAE,mBAAmB,EAAE,aAAa,EAAE;OACtC,EAAE,oBAAoB,EAAE;AAE/B,qBAAa,kBAAkB;IAC7B,OAAO,CAAC,mBAAmB,CAAsB;gBAErC,mBAAmB,EAAE,mBAAmB;IAIvC,WAAW,CACtB,QAAQ,EAAE,MAAM,EAChB,EAAE,OAAO,EAAE,GAAG,KAAK,EAAE,EAAE,kBAAkB,CAAC,gBAAgB,GACzD,OAAO,CAAC,iBAAiB,CAAC,4BAA4B,CAAC,IAAI,CAAC;IAoBlD,eAAe,CAC1B,QAAQ,EAAE,MAAM,EAChB,EAAE,WAAW,EAAE,GAAG,KAAK,EAAE,EAAE,kBAAkB,CAAC,oBAAoB,GACjE,OAAO,CAAC,iBAAiB,CAAC,gCAAgC,CAAC,IAAI,CAAC;IAoBtD,sBAAsB,CACjC,QAAQ,EAAE,MAAM,EAChB,EAAE,WAAW,EAAE,GAAG,KAAK,EAAE,EAAE,kBAAkB,CAAC,2BAA2B,GACxE,OAAO,CAAC,iBAAiB,CAAC,uCAAuC,CAAC,IAAI,CAAC;
|
|
1
|
+
{"version":3,"file":"solana.d.ts","sourceRoot":"","sources":["../../src/public-api/services/solana.ts"],"names":[],"mappings":"OAAO,EAAE,eAAe,EAAE,iBAAiB,EAAE;OACtC,EAAE,mBAAmB,EAAE,aAAa,EAAE;OACtC,EAAE,oBAAoB,EAAE;AAE/B,qBAAa,kBAAkB;IAC7B,OAAO,CAAC,mBAAmB,CAAsB;gBAErC,mBAAmB,EAAE,mBAAmB;IAIvC,WAAW,CACtB,QAAQ,EAAE,MAAM,EAChB,EAAE,OAAO,EAAE,GAAG,KAAK,EAAE,EAAE,kBAAkB,CAAC,gBAAgB,GACzD,OAAO,CAAC,iBAAiB,CAAC,4BAA4B,CAAC,IAAI,CAAC;IAoBlD,eAAe,CAC1B,QAAQ,EAAE,MAAM,EAChB,EAAE,WAAW,EAAE,GAAG,KAAK,EAAE,EAAE,kBAAkB,CAAC,oBAAoB,GACjE,OAAO,CAAC,iBAAiB,CAAC,gCAAgC,CAAC,IAAI,CAAC;IAoBtD,sBAAsB,CACjC,QAAQ,EAAE,MAAM,EAChB,EAAE,WAAW,EAAE,GAAG,KAAK,EAAE,EAAE,kBAAkB,CAAC,2BAA2B,GACxE,OAAO,CAAC,iBAAiB,CAAC,uCAAuC,CAAC,IAAI,CAAC;CAmB3E;AAGD;;;;GAIG;AACH,yBAAiB,kBAAkB,CAAC;IAClC;;;;OAIG;IACH,KAAY,gBAAgB,GAAG,aAAa,CAAC,oBAAoB,CAAC,eAAe,CAAC,yBAAyB,CAAC,EAAE;QAAC,OAAO,EAAE,MAAM,GAAG,UAAU,CAAA;KAAC,CAAC,CAAC;IAC9I;;;;OAIG;IACH,KAAY,oBAAoB,GAAG,aAAa,CAAC,oBAAoB,CAAC,eAAe,CAAC,6BAA6B,CAAC,EAAE;QAAC,WAAW,EAAE,MAAM,GAAG,UAAU,CAAA;KAAC,CAAC,CAAC;IAC1J;;;;OAIG;IACH,KAAY,2BAA2B,GAAG,aAAa,CAAC,oBAAoB,CAAC,eAAe,CAAC,oCAAoC,CAAC,EAAE;QAAC,WAAW,EAAE,MAAM,GAAG,UAAU,CAAA;KAAC,CAAC,CAAC;CACzK"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"solana.js","sourceRoot":"","sources":["../../src/public-api/services/solana.ts"],"names":[],"mappings":";;;AAIA,MAAa,kBAAkB;IAG7B,YAAY,mBAAwC;QAClD,IAAI,CAAC,mBAAmB,GAAG,mBAAmB,CAAC;IACjD,CAAC;IAEM,KAAK,CAAC,WAAW,CACtB,QAAgB,EAChB,EAAE,OAAO,EAAE,GAAG,KAAK,EAAuC;QAE1D,IAAI,MAAwD,CAAC;QAC7D,IAAI,OAAO,YAAY,UAAU,EAAE,CAAC;YAClC,mFAAmF;YACnF,MAAM,GAAG,EAAE,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QACpF,CAAC;aAAM,CAAC;YACN,2CAA2C;YAC3C,MAAM,GAAG,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QAC3C,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,QAAQ,EAAE;YAC5D,GAAG,KAAK;YACR,MAAM,EAAE,aAAa;YACrB,UAAU,EAAE,QAAQ;YACpB,MAAM;SACP,CAAC,CAAC;QAEH,OAAO,QAAQ,CAAC,IAAI,CAAC;IACvB,CAAC;IAEM,KAAK,CAAC,eAAe,CAC1B,QAAgB,EAChB,EAAE,WAAW,EAAE,GAAG,KAAK,EAA2C;QAElE,IAAI,MAA4D,CAAC;QACjE,IAAI,WAAW,YAAY,UAAU,EAAE,CAAC;YACtC,mFAAmF;YACnF,MAAM,GAAG,EAAE,WAAW,EAAE,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QAC5F,CAAC;aAAM,CAAC;YACN,2CAA2C;YAC3C,MAAM,GAAG,EAAE,WAAW,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QAC/C,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,QAAQ,EAAE;YAC5D,GAAG,KAAK;YACR,MAAM,EAAE,iBAAiB;YACzB,UAAU,EAAE,QAAQ;YACpB,MAAM;SACP,CAAC,CAAC;QAEH,OAAO,QAAQ,CAAC,IAAI,CAAC;IACvB,CAAC;IAEM,KAAK,CAAC,sBAAsB,CACjC,QAAgB,EAChB,EAAE,WAAW,EAAE,GAAG,KAAK,EAAkD;QAEzE,IAAI,MAAmE,CAAC;QACxE,IAAI,WAAW,YAAY,UAAU,EAAE,CAAC;YACtC,mFAAmF;YACnF,MAAM,GAAG,EAAE,WAAW,EAAE,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QAC5F,CAAC;aAAM,CAAC;YACN,2CAA2C;YAC3C,MAAM,GAAG,EAAE,WAAW,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QAC/C,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,QAAQ,EAAE;YAC5D,GAAG,KAAK;YACR,MAAM,EAAE,wBAAwB;YAChC,UAAU,EAAE,QAAQ;YACpB,MAAM;SACP,CAAC,CAAC;QAEH,
|
|
1
|
+
{"version":3,"file":"solana.js","sourceRoot":"","sources":["../../src/public-api/services/solana.ts"],"names":[],"mappings":";;;AAIA,MAAa,kBAAkB;IAG7B,YAAY,mBAAwC;QAClD,IAAI,CAAC,mBAAmB,GAAG,mBAAmB,CAAC;IACjD,CAAC;IAEM,KAAK,CAAC,WAAW,CACtB,QAAgB,EAChB,EAAE,OAAO,EAAE,GAAG,KAAK,EAAuC;QAE1D,IAAI,MAAwD,CAAC;QAC7D,IAAI,OAAO,YAAY,UAAU,EAAE,CAAC;YAClC,mFAAmF;YACnF,MAAM,GAAG,EAAE,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QACpF,CAAC;aAAM,CAAC;YACN,2CAA2C;YAC3C,MAAM,GAAG,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QAC3C,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,QAAQ,EAAE;YAC5D,GAAG,KAAK;YACR,MAAM,EAAE,aAAa;YACrB,UAAU,EAAE,QAAQ;YACpB,MAAM;SACP,CAAC,CAAC;QAEH,OAAO,QAAQ,CAAC,IAAI,CAAC;IACvB,CAAC;IAEM,KAAK,CAAC,eAAe,CAC1B,QAAgB,EAChB,EAAE,WAAW,EAAE,GAAG,KAAK,EAA2C;QAElE,IAAI,MAA4D,CAAC;QACjE,IAAI,WAAW,YAAY,UAAU,EAAE,CAAC;YACtC,mFAAmF;YACnF,MAAM,GAAG,EAAE,WAAW,EAAE,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QAC5F,CAAC;aAAM,CAAC;YACN,2CAA2C;YAC3C,MAAM,GAAG,EAAE,WAAW,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QAC/C,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,QAAQ,EAAE;YAC5D,GAAG,KAAK;YACR,MAAM,EAAE,iBAAiB;YACzB,UAAU,EAAE,QAAQ;YACpB,MAAM;SACP,CAAC,CAAC;QAEH,OAAO,QAAQ,CAAC,IAAI,CAAC;IACvB,CAAC;IAEM,KAAK,CAAC,sBAAsB,CACjC,QAAgB,EAChB,EAAE,WAAW,EAAE,GAAG,KAAK,EAAkD;QAEzE,IAAI,MAAmE,CAAC;QACxE,IAAI,WAAW,YAAY,UAAU,EAAE,CAAC;YACtC,mFAAmF;YACnF,MAAM,GAAG,EAAE,WAAW,EAAE,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QAC5F,CAAC;aAAM,CAAC;YACN,2CAA2C;YAC3C,MAAM,GAAG,EAAE,WAAW,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QAC/C,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,QAAQ,EAAE;YAC5D,GAAG,KAAK;YACR,MAAM,EAAE,wBAAwB;YAChC,UAAU,EAAE,QAAQ;YACpB,MAAM;SACP,CAAC,CAAC;QAEH,OAAO,QAAQ,CAAC,IAAI,CAAC;IACvB,CAAC;CACF;AA3ED,gDA2EC"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"solana.mjs","sourceRoot":"","sources":["../../src/public-api/services/solana.ts"],"names":[],"mappings":"AAIA,MAAM,OAAO,kBAAkB;IAG7B,YAAY,mBAAwC;QAClD,IAAI,CAAC,mBAAmB,GAAG,mBAAmB,CAAC;IACjD,CAAC;IAEM,KAAK,CAAC,WAAW,CACtB,QAAgB,EAChB,EAAE,OAAO,EAAE,GAAG,KAAK,EAAuC;QAE1D,IAAI,MAAwD,CAAC;QAC7D,IAAI,OAAO,YAAY,UAAU,EAAE,CAAC;YAClC,mFAAmF;YACnF,MAAM,GAAG,EAAE,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QACpF,CAAC;aAAM,CAAC;YACN,2CAA2C;YAC3C,MAAM,GAAG,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QAC3C,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,QAAQ,EAAE;YAC5D,GAAG,KAAK;YACR,MAAM,EAAE,aAAa;YACrB,UAAU,EAAE,QAAQ;YACpB,MAAM;SACP,CAAC,CAAC;QAEH,OAAO,QAAQ,CAAC,IAAI,CAAC;IACvB,CAAC;IAEM,KAAK,CAAC,eAAe,CAC1B,QAAgB,EAChB,EAAE,WAAW,EAAE,GAAG,KAAK,EAA2C;QAElE,IAAI,MAA4D,CAAC;QACjE,IAAI,WAAW,YAAY,UAAU,EAAE,CAAC;YACtC,mFAAmF;YACnF,MAAM,GAAG,EAAE,WAAW,EAAE,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QAC5F,CAAC;aAAM,CAAC;YACN,2CAA2C;YAC3C,MAAM,GAAG,EAAE,WAAW,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QAC/C,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,QAAQ,EAAE;YAC5D,GAAG,KAAK;YACR,MAAM,EAAE,iBAAiB;YACzB,UAAU,EAAE,QAAQ;YACpB,MAAM;SACP,CAAC,CAAC;QAEH,OAAO,QAAQ,CAAC,IAAI,CAAC;IACvB,CAAC;IAEM,KAAK,CAAC,sBAAsB,CACjC,QAAgB,EAChB,EAAE,WAAW,EAAE,GAAG,KAAK,EAAkD;QAEzE,IAAI,MAAmE,CAAC;QACxE,IAAI,WAAW,YAAY,UAAU,EAAE,CAAC;YACtC,mFAAmF;YACnF,MAAM,GAAG,EAAE,WAAW,EAAE,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QAC5F,CAAC;aAAM,CAAC;YACN,2CAA2C;YAC3C,MAAM,GAAG,EAAE,WAAW,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QAC/C,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,QAAQ,EAAE;YAC5D,GAAG,KAAK;YACR,MAAM,EAAE,wBAAwB;YAChC,UAAU,EAAE,QAAQ;YACpB,MAAM;SACP,CAAC,CAAC;QAEH,
|
|
1
|
+
{"version":3,"file":"solana.mjs","sourceRoot":"","sources":["../../src/public-api/services/solana.ts"],"names":[],"mappings":"AAIA,MAAM,OAAO,kBAAkB;IAG7B,YAAY,mBAAwC;QAClD,IAAI,CAAC,mBAAmB,GAAG,mBAAmB,CAAC;IACjD,CAAC;IAEM,KAAK,CAAC,WAAW,CACtB,QAAgB,EAChB,EAAE,OAAO,EAAE,GAAG,KAAK,EAAuC;QAE1D,IAAI,MAAwD,CAAC;QAC7D,IAAI,OAAO,YAAY,UAAU,EAAE,CAAC;YAClC,mFAAmF;YACnF,MAAM,GAAG,EAAE,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QACpF,CAAC;aAAM,CAAC;YACN,2CAA2C;YAC3C,MAAM,GAAG,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QAC3C,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,QAAQ,EAAE;YAC5D,GAAG,KAAK;YACR,MAAM,EAAE,aAAa;YACrB,UAAU,EAAE,QAAQ;YACpB,MAAM;SACP,CAAC,CAAC;QAEH,OAAO,QAAQ,CAAC,IAAI,CAAC;IACvB,CAAC;IAEM,KAAK,CAAC,eAAe,CAC1B,QAAgB,EAChB,EAAE,WAAW,EAAE,GAAG,KAAK,EAA2C;QAElE,IAAI,MAA4D,CAAC;QACjE,IAAI,WAAW,YAAY,UAAU,EAAE,CAAC;YACtC,mFAAmF;YACnF,MAAM,GAAG,EAAE,WAAW,EAAE,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QAC5F,CAAC;aAAM,CAAC;YACN,2CAA2C;YAC3C,MAAM,GAAG,EAAE,WAAW,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QAC/C,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,QAAQ,EAAE;YAC5D,GAAG,KAAK;YACR,MAAM,EAAE,iBAAiB;YACzB,UAAU,EAAE,QAAQ;YACpB,MAAM;SACP,CAAC,CAAC;QAEH,OAAO,QAAQ,CAAC,IAAI,CAAC;IACvB,CAAC;IAEM,KAAK,CAAC,sBAAsB,CACjC,QAAgB,EAChB,EAAE,WAAW,EAAE,GAAG,KAAK,EAAkD;QAEzE,IAAI,MAAmE,CAAC;QACxE,IAAI,WAAW,YAAY,UAAU,EAAE,CAAC;YACtC,mFAAmF;YACnF,MAAM,GAAG,EAAE,WAAW,EAAE,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QAC5F,CAAC;aAAM,CAAC;YACN,2CAA2C;YAC3C,MAAM,GAAG,EAAE,WAAW,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC;QAC/C,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,QAAQ,EAAE;YAC5D,GAAG,KAAK;YACR,MAAM,EAAE,wBAAwB;YAChC,UAAU,EAAE,QAAQ;YACpB,MAAM;SACP,CAAC,CAAC;QAEH,OAAO,QAAQ,CAAC,IAAI,CAAC;IACvB,CAAC;CACF"}
|
|
@@ -1,4 +1,26 @@
|
|
|
1
|
-
import {
|
|
1
|
+
import { PrivyAPI } from "../../client.mjs";
|
|
2
|
+
import { PrivyAppJWKS } from "../../lib/auth.mjs";
|
|
3
|
+
import { User, Users } from "../../resources.mjs";
|
|
2
4
|
export declare class PrivyUsersService extends Users {
|
|
5
|
+
private appJwks;
|
|
6
|
+
constructor(privyApiClient: PrivyAPI, appJwks: PrivyAppJWKS);
|
|
7
|
+
/**
|
|
8
|
+
* Gets a user object from the identity token.
|
|
9
|
+
* This verifies the token and parses the payload into a `User` object.
|
|
10
|
+
* Note the user object may be incomplete due to the size constraints of the identity token.
|
|
11
|
+
*
|
|
12
|
+
* @param input.id_token the identity token to parse.
|
|
13
|
+
* @returns the user object parsed from the identity token.
|
|
14
|
+
*
|
|
15
|
+
* @example
|
|
16
|
+
* const idToken = req.cookies.get('privy-id-token'); // or however your framework surfaces cookies
|
|
17
|
+
* const user = await client.users().get({idToken});
|
|
18
|
+
*/
|
|
19
|
+
get({ id_token }: PrivyUsersService.GetInput): Promise<User>;
|
|
20
|
+
}
|
|
21
|
+
export declare namespace PrivyUsersService {
|
|
22
|
+
type GetInput = {
|
|
23
|
+
id_token: string;
|
|
24
|
+
};
|
|
3
25
|
}
|
|
4
26
|
//# sourceMappingURL=users.d.mts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"users.d.mts","sourceRoot":"","sources":["../../src/public-api/services/users.ts"],"names":[],"mappings":"OAAO,EAAE,KAAK,EAAE;
|
|
1
|
+
{"version":3,"file":"users.d.mts","sourceRoot":"","sources":["../../src/public-api/services/users.ts"],"names":[],"mappings":"OAAO,EAAE,QAAQ,EAAE;OACZ,EAAE,YAAY,EAAuB;OACrC,EAAE,IAAI,EAAE,KAAK,EAAE;AAEtB,qBAAa,iBAAkB,SAAQ,KAAK;IAC1C,OAAO,CAAC,OAAO,CAAe;gBAClB,cAAc,EAAE,QAAQ,EAAE,OAAO,EAAE,YAAY;IAK3D;;;;;;;;;;;OAWG;IACU,GAAG,CAAC,EAAE,QAAQ,EAAE,EAAE,iBAAiB,CAAC,QAAQ,GAAG,OAAO,CAAC,IAAI,CAAC;CAO1E;AAED,yBAAiB,iBAAiB,CAAC;IACjC,KAAY,QAAQ,GAAG;QACrB,QAAQ,EAAE,MAAM,CAAC;KAClB,CAAC;CACH"}
|
|
@@ -1,4 +1,26 @@
|
|
|
1
|
-
import {
|
|
1
|
+
import { PrivyAPI } from "../../client.js";
|
|
2
|
+
import { PrivyAppJWKS } from "../../lib/auth.js";
|
|
3
|
+
import { User, Users } from "../../resources.js";
|
|
2
4
|
export declare class PrivyUsersService extends Users {
|
|
5
|
+
private appJwks;
|
|
6
|
+
constructor(privyApiClient: PrivyAPI, appJwks: PrivyAppJWKS);
|
|
7
|
+
/**
|
|
8
|
+
* Gets a user object from the identity token.
|
|
9
|
+
* This verifies the token and parses the payload into a `User` object.
|
|
10
|
+
* Note the user object may be incomplete due to the size constraints of the identity token.
|
|
11
|
+
*
|
|
12
|
+
* @param input.id_token the identity token to parse.
|
|
13
|
+
* @returns the user object parsed from the identity token.
|
|
14
|
+
*
|
|
15
|
+
* @example
|
|
16
|
+
* const idToken = req.cookies.get('privy-id-token'); // or however your framework surfaces cookies
|
|
17
|
+
* const user = await client.users().get({idToken});
|
|
18
|
+
*/
|
|
19
|
+
get({ id_token }: PrivyUsersService.GetInput): Promise<User>;
|
|
20
|
+
}
|
|
21
|
+
export declare namespace PrivyUsersService {
|
|
22
|
+
type GetInput = {
|
|
23
|
+
id_token: string;
|
|
24
|
+
};
|
|
3
25
|
}
|
|
4
26
|
//# sourceMappingURL=users.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"users.d.ts","sourceRoot":"","sources":["../../src/public-api/services/users.ts"],"names":[],"mappings":"OAAO,EAAE,KAAK,EAAE;
|
|
1
|
+
{"version":3,"file":"users.d.ts","sourceRoot":"","sources":["../../src/public-api/services/users.ts"],"names":[],"mappings":"OAAO,EAAE,QAAQ,EAAE;OACZ,EAAE,YAAY,EAAuB;OACrC,EAAE,IAAI,EAAE,KAAK,EAAE;AAEtB,qBAAa,iBAAkB,SAAQ,KAAK;IAC1C,OAAO,CAAC,OAAO,CAAe;gBAClB,cAAc,EAAE,QAAQ,EAAE,OAAO,EAAE,YAAY;IAK3D;;;;;;;;;;;OAWG;IACU,GAAG,CAAC,EAAE,QAAQ,EAAE,EAAE,iBAAiB,CAAC,QAAQ,GAAG,OAAO,CAAC,IAAI,CAAC;CAO1E;AAED,yBAAiB,iBAAiB,CAAC;IACjC,KAAY,QAAQ,GAAG;QACrB,QAAQ,EAAE,MAAM,CAAC;KAClB,CAAC;CACH"}
|
|
@@ -1,8 +1,32 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
exports.PrivyUsersService = void 0;
|
|
4
|
+
const auth_1 = require("../../lib/auth.js");
|
|
4
5
|
const resources_1 = require("../../resources.js");
|
|
5
6
|
class PrivyUsersService extends resources_1.Users {
|
|
7
|
+
constructor(privyApiClient, appJwks) {
|
|
8
|
+
super(privyApiClient);
|
|
9
|
+
this.appJwks = appJwks;
|
|
10
|
+
}
|
|
11
|
+
/**
|
|
12
|
+
* Gets a user object from the identity token.
|
|
13
|
+
* This verifies the token and parses the payload into a `User` object.
|
|
14
|
+
* Note the user object may be incomplete due to the size constraints of the identity token.
|
|
15
|
+
*
|
|
16
|
+
* @param input.id_token the identity token to parse.
|
|
17
|
+
* @returns the user object parsed from the identity token.
|
|
18
|
+
*
|
|
19
|
+
* @example
|
|
20
|
+
* const idToken = req.cookies.get('privy-id-token'); // or however your framework surfaces cookies
|
|
21
|
+
* const user = await client.users().get({idToken});
|
|
22
|
+
*/
|
|
23
|
+
async get({ id_token }) {
|
|
24
|
+
return (0, auth_1.verifyIdentityToken)({
|
|
25
|
+
identity_token: id_token,
|
|
26
|
+
app_id: this._client.appID,
|
|
27
|
+
verification_key: this.appJwks,
|
|
28
|
+
});
|
|
29
|
+
}
|
|
6
30
|
}
|
|
7
31
|
exports.PrivyUsersService = PrivyUsersService;
|
|
8
32
|
//# sourceMappingURL=users.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"users.js","sourceRoot":"","sources":["../../src/public-api/services/users.ts"],"names":[],"mappings":";;;
|
|
1
|
+
{"version":3,"file":"users.js","sourceRoot":"","sources":["../../src/public-api/services/users.ts"],"names":[],"mappings":";;;AACA,4CAAmE;AACnE,kDAA8C;AAE9C,MAAa,iBAAkB,SAAQ,iBAAK;IAE1C,YAAY,cAAwB,EAAE,OAAqB;QACzD,KAAK,CAAC,cAAc,CAAC,CAAC;QACtB,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;IACzB,CAAC;IAED;;;;;;;;;;;OAWG;IACI,KAAK,CAAC,GAAG,CAAC,EAAE,QAAQ,EAA8B;QACvD,OAAO,IAAA,0BAAmB,EAAC;YACzB,cAAc,EAAE,QAAQ;YACxB,MAAM,EAAE,IAAI,CAAC,OAAO,CAAC,KAAK;YAC1B,gBAAgB,EAAE,IAAI,CAAC,OAAO;SAC/B,CAAC,CAAC;IACL,CAAC;CACF;AA1BD,8CA0BC"}
|
|
@@ -1,4 +1,28 @@
|
|
|
1
|
+
import { verifyIdentityToken } from "../../lib/auth.mjs";
|
|
1
2
|
import { Users } from "../../resources.mjs";
|
|
2
3
|
export class PrivyUsersService extends Users {
|
|
4
|
+
constructor(privyApiClient, appJwks) {
|
|
5
|
+
super(privyApiClient);
|
|
6
|
+
this.appJwks = appJwks;
|
|
7
|
+
}
|
|
8
|
+
/**
|
|
9
|
+
* Gets a user object from the identity token.
|
|
10
|
+
* This verifies the token and parses the payload into a `User` object.
|
|
11
|
+
* Note the user object may be incomplete due to the size constraints of the identity token.
|
|
12
|
+
*
|
|
13
|
+
* @param input.id_token the identity token to parse.
|
|
14
|
+
* @returns the user object parsed from the identity token.
|
|
15
|
+
*
|
|
16
|
+
* @example
|
|
17
|
+
* const idToken = req.cookies.get('privy-id-token'); // or however your framework surfaces cookies
|
|
18
|
+
* const user = await client.users().get({idToken});
|
|
19
|
+
*/
|
|
20
|
+
async get({ id_token }) {
|
|
21
|
+
return verifyIdentityToken({
|
|
22
|
+
identity_token: id_token,
|
|
23
|
+
app_id: this._client.appID,
|
|
24
|
+
verification_key: this.appJwks,
|
|
25
|
+
});
|
|
26
|
+
}
|
|
3
27
|
}
|
|
4
28
|
//# sourceMappingURL=users.mjs.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"users.mjs","sourceRoot":"","sources":["../../src/public-api/services/users.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"users.mjs","sourceRoot":"","sources":["../../src/public-api/services/users.ts"],"names":[],"mappings":"OACO,EAAgB,mBAAmB,EAAE;OACrC,EAAQ,KAAK,EAAE;AAEtB,MAAM,OAAO,iBAAkB,SAAQ,KAAK;IAE1C,YAAY,cAAwB,EAAE,OAAqB;QACzD,KAAK,CAAC,cAAc,CAAC,CAAC;QACtB,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;IACzB,CAAC;IAED;;;;;;;;;;;OAWG;IACI,KAAK,CAAC,GAAG,CAAC,EAAE,QAAQ,EAA8B;QACvD,OAAO,mBAAmB,CAAC;YACzB,cAAc,EAAE,QAAQ;YACxB,MAAM,EAAE,IAAI,CAAC,OAAO,CAAC,KAAK;YAC1B,gBAAgB,EAAE,IAAI,CAAC,OAAO;SAC/B,CAAC,CAAC;IACL,CAAC;CACF"}
|
|
@@ -1,29 +1,18 @@
|
|
|
1
1
|
import { PrivyAPI } from "../../../client.mjs";
|
|
2
|
-
import {
|
|
2
|
+
import { PrivyAppJWKS, VerifyAuthTokenResponse } from "../../../lib/auth.mjs";
|
|
3
|
+
import { User } from "../../../resources.mjs";
|
|
3
4
|
export declare class PrivyAuthUtils {
|
|
4
|
-
private
|
|
5
|
+
private appJwks;
|
|
5
6
|
private privyAppID;
|
|
6
|
-
constructor(privyApiClient: PrivyAPI);
|
|
7
|
+
constructor(privyApiClient: PrivyAPI, appJwks: PrivyAppJWKS);
|
|
7
8
|
/**
|
|
8
9
|
* Verifies the authentication token, and returns the payload if it is valid.
|
|
9
10
|
*
|
|
10
11
|
* @param authToken - The authentication token to verify.
|
|
11
|
-
* @param verificationKeyOverride - The verification key to use instead of calling the JWKS endpoint.
|
|
12
12
|
* @returns The payload of the token if it is valid.
|
|
13
13
|
* @throws If the token is invalid.
|
|
14
14
|
*/
|
|
15
|
-
verifyAuthToken(authToken: string
|
|
16
|
-
|
|
17
|
-
export declare namespace PrivyUsersService {
|
|
18
|
-
type VerifyAuthTokenResponse = {
|
|
19
|
-
appId: string;
|
|
20
|
-
issuer: string;
|
|
21
|
-
issuedAt: number;
|
|
22
|
-
expiration: number;
|
|
23
|
-
sessionId: string;
|
|
24
|
-
userId: string;
|
|
25
|
-
};
|
|
26
|
-
}
|
|
27
|
-
export declare class InvalidAuthTokenError extends PrivyAPIError {
|
|
15
|
+
verifyAuthToken(authToken: string): Promise<VerifyAuthTokenResponse>;
|
|
16
|
+
verifyIdentityToken(identityToken: string): Promise<User>;
|
|
28
17
|
}
|
|
29
18
|
//# sourceMappingURL=auth.d.mts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"auth.d.mts","sourceRoot":"","sources":["../../../src/public-api/services/utils/auth.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"auth.d.mts","sourceRoot":"","sources":["../../../src/public-api/services/utils/auth.ts"],"names":[],"mappings":"OAAO,EAAE,QAAQ,EAAE;OACZ,EACL,YAAY,EAEZ,uBAAuB,EAExB;OACM,EAAE,IAAI,EAAE;AAEf,qBAAa,cAAc;IACzB,OAAO,CAAC,OAAO,CAAe;IAC9B,OAAO,CAAC,UAAU,CAAS;gBAEf,cAAc,EAAE,QAAQ,EAAE,OAAO,EAAE,YAAY;IAK3D;;;;;;OAMG;IACU,eAAe,CAAC,SAAS,EAAE,MAAM,GAAG,OAAO,CAAC,uBAAuB,CAAC;IAQpE,mBAAmB,CAAC,aAAa,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;CAOvE"}
|
|
@@ -1,29 +1,18 @@
|
|
|
1
1
|
import { PrivyAPI } from "../../../client.js";
|
|
2
|
-
import {
|
|
2
|
+
import { PrivyAppJWKS, VerifyAuthTokenResponse } from "../../../lib/auth.js";
|
|
3
|
+
import { User } from "../../../resources.js";
|
|
3
4
|
export declare class PrivyAuthUtils {
|
|
4
|
-
private
|
|
5
|
+
private appJwks;
|
|
5
6
|
private privyAppID;
|
|
6
|
-
constructor(privyApiClient: PrivyAPI);
|
|
7
|
+
constructor(privyApiClient: PrivyAPI, appJwks: PrivyAppJWKS);
|
|
7
8
|
/**
|
|
8
9
|
* Verifies the authentication token, and returns the payload if it is valid.
|
|
9
10
|
*
|
|
10
11
|
* @param authToken - The authentication token to verify.
|
|
11
|
-
* @param verificationKeyOverride - The verification key to use instead of calling the JWKS endpoint.
|
|
12
12
|
* @returns The payload of the token if it is valid.
|
|
13
13
|
* @throws If the token is invalid.
|
|
14
14
|
*/
|
|
15
|
-
verifyAuthToken(authToken: string
|
|
16
|
-
|
|
17
|
-
export declare namespace PrivyUsersService {
|
|
18
|
-
type VerifyAuthTokenResponse = {
|
|
19
|
-
appId: string;
|
|
20
|
-
issuer: string;
|
|
21
|
-
issuedAt: number;
|
|
22
|
-
expiration: number;
|
|
23
|
-
sessionId: string;
|
|
24
|
-
userId: string;
|
|
25
|
-
};
|
|
26
|
-
}
|
|
27
|
-
export declare class InvalidAuthTokenError extends PrivyAPIError {
|
|
15
|
+
verifyAuthToken(authToken: string): Promise<VerifyAuthTokenResponse>;
|
|
16
|
+
verifyIdentityToken(identityToken: string): Promise<User>;
|
|
28
17
|
}
|
|
29
18
|
//# sourceMappingURL=auth.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"auth.d.ts","sourceRoot":"","sources":["../../../src/public-api/services/utils/auth.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"auth.d.ts","sourceRoot":"","sources":["../../../src/public-api/services/utils/auth.ts"],"names":[],"mappings":"OAAO,EAAE,QAAQ,EAAE;OACZ,EACL,YAAY,EAEZ,uBAAuB,EAExB;OACM,EAAE,IAAI,EAAE;AAEf,qBAAa,cAAc;IACzB,OAAO,CAAC,OAAO,CAAe;IAC9B,OAAO,CAAC,UAAU,CAAS;gBAEf,cAAc,EAAE,QAAQ,EAAE,OAAO,EAAE,YAAY;IAK3D;;;;;;OAMG;IACU,eAAe,CAAC,SAAS,EAAE,MAAM,GAAG,OAAO,CAAC,uBAAuB,CAAC;IAQpE,mBAAmB,CAAC,aAAa,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;CAOvE"}
|
|
@@ -1,85 +1,33 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.
|
|
4
|
-
const
|
|
5
|
-
const error_1 = require("../../../core/error.js");
|
|
6
|
-
const DEFAULT_JWKS_CACHE_MAX_AGE = 10 * 60 * 1000; // 10 minutes
|
|
7
|
-
const JWT_ALGORITHM = 'ES256';
|
|
8
|
-
const JWT_ISSUER = 'privy.io';
|
|
3
|
+
exports.PrivyAuthUtils = void 0;
|
|
4
|
+
const auth_1 = require("../../../lib/auth.js");
|
|
9
5
|
class PrivyAuthUtils {
|
|
10
|
-
constructor(privyApiClient) {
|
|
11
|
-
this.
|
|
6
|
+
constructor(privyApiClient, appJwks) {
|
|
7
|
+
this.appJwks = appJwks;
|
|
12
8
|
this.privyAppID = privyApiClient.appID;
|
|
13
9
|
}
|
|
14
10
|
/**
|
|
15
11
|
* Verifies the authentication token, and returns the payload if it is valid.
|
|
16
12
|
*
|
|
17
13
|
* @param authToken - The authentication token to verify.
|
|
18
|
-
* @param verificationKeyOverride - The verification key to use instead of calling the JWKS endpoint.
|
|
19
14
|
* @returns The payload of the token if it is valid.
|
|
20
15
|
* @throws If the token is invalid.
|
|
21
16
|
*/
|
|
22
|
-
async verifyAuthToken(authToken
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
typ: 'JWT',
|
|
29
|
-
algorithms: [JWT_ALGORITHM],
|
|
30
|
-
issuer: JWT_ISSUER,
|
|
31
|
-
audience: this.privyAppID,
|
|
32
|
-
}).catch(mapAndThrowJoseErrors);
|
|
33
|
-
}
|
|
34
|
-
else {
|
|
35
|
-
verifiedToken = await (0, jose_1.jwtVerify)(authToken, this.remoteJwks, {
|
|
36
|
-
typ: 'JWT',
|
|
37
|
-
algorithms: [JWT_ALGORITHM],
|
|
38
|
-
issuer: JWT_ISSUER,
|
|
39
|
-
audience: this.privyAppID,
|
|
40
|
-
}).catch(mapAndThrowJoseErrors);
|
|
41
|
-
}
|
|
42
|
-
return {
|
|
43
|
-
appId: throwIfNotString(verifiedToken.payload.aud),
|
|
44
|
-
issuer: throwIfNotString(verifiedToken.payload.iss),
|
|
45
|
-
issuedAt: throwIfNotNumber(verifiedToken.payload.iat),
|
|
46
|
-
expiration: throwIfNotNumber(verifiedToken.payload.exp),
|
|
47
|
-
sessionId: throwIfNotString(verifiedToken.payload['sid']),
|
|
48
|
-
userId: throwIfNotString(verifiedToken.payload.sub),
|
|
49
|
-
};
|
|
17
|
+
async verifyAuthToken(authToken) {
|
|
18
|
+
return (0, auth_1.verifyAuthToken)({
|
|
19
|
+
auth_token: authToken,
|
|
20
|
+
app_id: this.privyAppID,
|
|
21
|
+
verification_key: this.appJwks,
|
|
22
|
+
});
|
|
50
23
|
}
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
|
|
55
|
-
|
|
56
|
-
|
|
57
|
-
function throwIfNotString(value) {
|
|
58
|
-
if (!value || typeof value !== 'string') {
|
|
59
|
-
throw new InvalidAuthTokenError("Token's payload is invalid");
|
|
60
|
-
}
|
|
61
|
-
return value;
|
|
62
|
-
}
|
|
63
|
-
/** Used for asserting the values in the token payload are numbers. */
|
|
64
|
-
function throwIfNotNumber(value) {
|
|
65
|
-
if (!value || typeof value !== 'number') {
|
|
66
|
-
throw new InvalidAuthTokenError("Token's payload is invalid");
|
|
67
|
-
}
|
|
68
|
-
return value;
|
|
69
|
-
}
|
|
70
|
-
/**
|
|
71
|
-
* Used to catch errors thrown by async `jose` functions and map to our own error types.
|
|
72
|
-
* This method will **always** throw an error, so it's return type is `never`.
|
|
73
|
-
*/
|
|
74
|
-
function mapAndThrowJoseErrors(error) {
|
|
75
|
-
if (error instanceof jose_1.errors.JWTExpired) {
|
|
76
|
-
throw new InvalidAuthTokenError('Authentication token expired');
|
|
77
|
-
}
|
|
78
|
-
else if (error instanceof jose_1.errors.JWTClaimValidationFailed || error instanceof jose_1.errors.JWTInvalid) {
|
|
79
|
-
throw new InvalidAuthTokenError('Authentication token is invalid');
|
|
80
|
-
}
|
|
81
|
-
else {
|
|
82
|
-
throw new InvalidAuthTokenError('Failed to verify authentication token');
|
|
24
|
+
async verifyIdentityToken(identityToken) {
|
|
25
|
+
return (0, auth_1.verifyIdentityToken)({
|
|
26
|
+
identity_token: identityToken,
|
|
27
|
+
app_id: this.privyAppID,
|
|
28
|
+
verification_key: this.appJwks,
|
|
29
|
+
});
|
|
83
30
|
}
|
|
84
31
|
}
|
|
32
|
+
exports.PrivyAuthUtils = PrivyAuthUtils;
|
|
85
33
|
//# sourceMappingURL=auth.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"auth.js","sourceRoot":"","sources":["../../../src/public-api/services/utils/auth.ts"],"names":[],"mappings":";;;
|
|
1
|
+
{"version":3,"file":"auth.js","sourceRoot":"","sources":["../../../src/public-api/services/utils/auth.ts"],"names":[],"mappings":";;;AACA,+CAK2B;AAG3B,MAAa,cAAc;IAIzB,YAAY,cAAwB,EAAE,OAAqB;QACzD,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;QACvB,IAAI,CAAC,UAAU,GAAG,cAAc,CAAC,KAAK,CAAC;IACzC,CAAC;IAED;;;;;;OAMG;IACI,KAAK,CAAC,eAAe,CAAC,SAAiB;QAC5C,OAAO,IAAA,sBAAe,EAAC;YACrB,UAAU,EAAE,SAAS;YACrB,MAAM,EAAE,IAAI,CAAC,UAAU;YACvB,gBAAgB,EAAE,IAAI,CAAC,OAAO;SAC/B,CAAC,CAAC;IACL,CAAC;IAEM,KAAK,CAAC,mBAAmB,CAAC,aAAqB;QACpD,OAAO,IAAA,0BAAmB,EAAC;YACzB,cAAc,EAAE,aAAa;YAC7B,MAAM,EAAE,IAAI,CAAC,UAAU;YACvB,gBAAgB,EAAE,IAAI,CAAC,OAAO;SAC/B,CAAC,CAAC;IACL,CAAC;CACF;AA/BD,wCA+BC"}
|
|
@@ -1,80 +1,29 @@
|
|
|
1
|
-
import {
|
|
2
|
-
import { PrivyAPIError } from "../../../core/error.mjs";
|
|
3
|
-
const DEFAULT_JWKS_CACHE_MAX_AGE = 10 * 60 * 1000; // 10 minutes
|
|
4
|
-
const JWT_ALGORITHM = 'ES256';
|
|
5
|
-
const JWT_ISSUER = 'privy.io';
|
|
1
|
+
import { verifyAuthToken, verifyIdentityToken, } from "../../../lib/auth.mjs";
|
|
6
2
|
export class PrivyAuthUtils {
|
|
7
|
-
constructor(privyApiClient) {
|
|
8
|
-
this.
|
|
3
|
+
constructor(privyApiClient, appJwks) {
|
|
4
|
+
this.appJwks = appJwks;
|
|
9
5
|
this.privyAppID = privyApiClient.appID;
|
|
10
6
|
}
|
|
11
7
|
/**
|
|
12
8
|
* Verifies the authentication token, and returns the payload if it is valid.
|
|
13
9
|
*
|
|
14
10
|
* @param authToken - The authentication token to verify.
|
|
15
|
-
* @param verificationKeyOverride - The verification key to use instead of calling the JWKS endpoint.
|
|
16
11
|
* @returns The payload of the token if it is valid.
|
|
17
12
|
* @throws If the token is invalid.
|
|
18
13
|
*/
|
|
19
|
-
async verifyAuthToken(authToken
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
typ: 'JWT',
|
|
26
|
-
algorithms: [JWT_ALGORITHM],
|
|
27
|
-
issuer: JWT_ISSUER,
|
|
28
|
-
audience: this.privyAppID,
|
|
29
|
-
}).catch(mapAndThrowJoseErrors);
|
|
30
|
-
}
|
|
31
|
-
else {
|
|
32
|
-
verifiedToken = await jwtVerify(authToken, this.remoteJwks, {
|
|
33
|
-
typ: 'JWT',
|
|
34
|
-
algorithms: [JWT_ALGORITHM],
|
|
35
|
-
issuer: JWT_ISSUER,
|
|
36
|
-
audience: this.privyAppID,
|
|
37
|
-
}).catch(mapAndThrowJoseErrors);
|
|
38
|
-
}
|
|
39
|
-
return {
|
|
40
|
-
appId: throwIfNotString(verifiedToken.payload.aud),
|
|
41
|
-
issuer: throwIfNotString(verifiedToken.payload.iss),
|
|
42
|
-
issuedAt: throwIfNotNumber(verifiedToken.payload.iat),
|
|
43
|
-
expiration: throwIfNotNumber(verifiedToken.payload.exp),
|
|
44
|
-
sessionId: throwIfNotString(verifiedToken.payload['sid']),
|
|
45
|
-
userId: throwIfNotString(verifiedToken.payload.sub),
|
|
46
|
-
};
|
|
14
|
+
async verifyAuthToken(authToken) {
|
|
15
|
+
return verifyAuthToken({
|
|
16
|
+
auth_token: authToken,
|
|
17
|
+
app_id: this.privyAppID,
|
|
18
|
+
verification_key: this.appJwks,
|
|
19
|
+
});
|
|
47
20
|
}
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
throw new InvalidAuthTokenError("Token's payload is invalid");
|
|
55
|
-
}
|
|
56
|
-
return value;
|
|
57
|
-
}
|
|
58
|
-
/** Used for asserting the values in the token payload are numbers. */
|
|
59
|
-
function throwIfNotNumber(value) {
|
|
60
|
-
if (!value || typeof value !== 'number') {
|
|
61
|
-
throw new InvalidAuthTokenError("Token's payload is invalid");
|
|
62
|
-
}
|
|
63
|
-
return value;
|
|
64
|
-
}
|
|
65
|
-
/**
|
|
66
|
-
* Used to catch errors thrown by async `jose` functions and map to our own error types.
|
|
67
|
-
* This method will **always** throw an error, so it's return type is `never`.
|
|
68
|
-
*/
|
|
69
|
-
function mapAndThrowJoseErrors(error) {
|
|
70
|
-
if (error instanceof joseErrors.JWTExpired) {
|
|
71
|
-
throw new InvalidAuthTokenError('Authentication token expired');
|
|
72
|
-
}
|
|
73
|
-
else if (error instanceof joseErrors.JWTClaimValidationFailed || error instanceof joseErrors.JWTInvalid) {
|
|
74
|
-
throw new InvalidAuthTokenError('Authentication token is invalid');
|
|
75
|
-
}
|
|
76
|
-
else {
|
|
77
|
-
throw new InvalidAuthTokenError('Failed to verify authentication token');
|
|
21
|
+
async verifyIdentityToken(identityToken) {
|
|
22
|
+
return verifyIdentityToken({
|
|
23
|
+
identity_token: identityToken,
|
|
24
|
+
app_id: this.privyAppID,
|
|
25
|
+
verification_key: this.appJwks,
|
|
26
|
+
});
|
|
78
27
|
}
|
|
79
28
|
}
|
|
80
29
|
//# sourceMappingURL=auth.mjs.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"auth.mjs","sourceRoot":"","sources":["../../../src/public-api/services/utils/auth.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"auth.mjs","sourceRoot":"","sources":["../../../src/public-api/services/utils/auth.ts"],"names":[],"mappings":"OACO,EAEL,eAAe,EAEf,mBAAmB,GACpB;AAGD,MAAM,OAAO,cAAc;IAIzB,YAAY,cAAwB,EAAE,OAAqB;QACzD,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;QACvB,IAAI,CAAC,UAAU,GAAG,cAAc,CAAC,KAAK,CAAC;IACzC,CAAC;IAED;;;;;;OAMG;IACI,KAAK,CAAC,eAAe,CAAC,SAAiB;QAC5C,OAAO,eAAe,CAAC;YACrB,UAAU,EAAE,SAAS;YACrB,MAAM,EAAE,IAAI,CAAC,UAAU;YACvB,gBAAgB,EAAE,IAAI,CAAC,OAAO;SAC/B,CAAC,CAAC;IACL,CAAC;IAEM,KAAK,CAAC,mBAAmB,CAAC,aAAqB;QACpD,OAAO,mBAAmB,CAAC;YACzB,cAAc,EAAE,aAAa;YAC7B,MAAM,EAAE,IAAI,CAAC,UAAU;YACvB,gBAAgB,EAAE,IAAI,CAAC,OAAO;SAC/B,CAAC,CAAC;IACL,CAAC;CACF"}
|
|
@@ -1,3 +1,4 @@
|
|
|
1
|
+
import { PrivyAppJWKS } from "../../lib/auth.mjs";
|
|
1
2
|
import { PrivyAPI } from "../../client.mjs";
|
|
2
3
|
import { PrivyClient } from "../PrivyClient.mjs";
|
|
3
4
|
import { PrivyAuthUtils } from "./utils/auth.mjs";
|
|
@@ -7,7 +8,7 @@ export declare class PrivyUtils {
|
|
|
7
8
|
private _requestSigner;
|
|
8
9
|
private _requestFormatter;
|
|
9
10
|
private _auth;
|
|
10
|
-
constructor(privyApiClient: PrivyAPI, privyClient: PrivyClient);
|
|
11
|
+
constructor(privyApiClient: PrivyAPI, privyClient: PrivyClient, appJwks: PrivyAppJWKS);
|
|
11
12
|
requestSigner(): PrivyRequestSigner;
|
|
12
13
|
requestFormatter(): PrivyRequestFormatter;
|
|
13
14
|
auth(): PrivyAuthUtils;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"utils.d.mts","sourceRoot":"","sources":["../../src/public-api/services/utils.ts"],"names":[],"mappings":"OAAO,EAAE,QAAQ,EAAE;OACZ,EAAE,WAAW,EAAE;OACf,EAAE,cAAc,EAAE;OAClB,EAAE,qBAAqB,EAAE;OACzB,EAAE,kBAAkB,EAAE;AAE7B,qBAAa,UAAU;IACrB,OAAO,CAAC,cAAc,CAAqB;IAC3C,OAAO,CAAC,iBAAiB,CAAwB;IACjD,OAAO,CAAC,KAAK,CAAiB;gBAElB,cAAc,EAAE,QAAQ,EAAE,WAAW,EAAE,WAAW;
|
|
1
|
+
{"version":3,"file":"utils.d.mts","sourceRoot":"","sources":["../../src/public-api/services/utils.ts"],"names":[],"mappings":"OAAO,EAAE,YAAY,EAAE;OAChB,EAAE,QAAQ,EAAE;OACZ,EAAE,WAAW,EAAE;OACf,EAAE,cAAc,EAAE;OAClB,EAAE,qBAAqB,EAAE;OACzB,EAAE,kBAAkB,EAAE;AAE7B,qBAAa,UAAU;IACrB,OAAO,CAAC,cAAc,CAAqB;IAC3C,OAAO,CAAC,iBAAiB,CAAwB;IACjD,OAAO,CAAC,KAAK,CAAiB;gBAElB,cAAc,EAAE,QAAQ,EAAE,WAAW,EAAE,WAAW,EAAE,OAAO,EAAE,YAAY;IAM9E,aAAa,IAAI,kBAAkB;IAInC,gBAAgB,IAAI,qBAAqB;IAIzC,IAAI,IAAI,cAAc;CAG9B"}
|
|
@@ -1,3 +1,4 @@
|
|
|
1
|
+
import { PrivyAppJWKS } from "../../lib/auth.js";
|
|
1
2
|
import { PrivyAPI } from "../../client.js";
|
|
2
3
|
import { PrivyClient } from "../PrivyClient.js";
|
|
3
4
|
import { PrivyAuthUtils } from "./utils/auth.js";
|
|
@@ -7,7 +8,7 @@ export declare class PrivyUtils {
|
|
|
7
8
|
private _requestSigner;
|
|
8
9
|
private _requestFormatter;
|
|
9
10
|
private _auth;
|
|
10
|
-
constructor(privyApiClient: PrivyAPI, privyClient: PrivyClient);
|
|
11
|
+
constructor(privyApiClient: PrivyAPI, privyClient: PrivyClient, appJwks: PrivyAppJWKS);
|
|
11
12
|
requestSigner(): PrivyRequestSigner;
|
|
12
13
|
requestFormatter(): PrivyRequestFormatter;
|
|
13
14
|
auth(): PrivyAuthUtils;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"utils.d.ts","sourceRoot":"","sources":["../../src/public-api/services/utils.ts"],"names":[],"mappings":"OAAO,EAAE,QAAQ,EAAE;OACZ,EAAE,WAAW,EAAE;OACf,EAAE,cAAc,EAAE;OAClB,EAAE,qBAAqB,EAAE;OACzB,EAAE,kBAAkB,EAAE;AAE7B,qBAAa,UAAU;IACrB,OAAO,CAAC,cAAc,CAAqB;IAC3C,OAAO,CAAC,iBAAiB,CAAwB;IACjD,OAAO,CAAC,KAAK,CAAiB;gBAElB,cAAc,EAAE,QAAQ,EAAE,WAAW,EAAE,WAAW;
|
|
1
|
+
{"version":3,"file":"utils.d.ts","sourceRoot":"","sources":["../../src/public-api/services/utils.ts"],"names":[],"mappings":"OAAO,EAAE,YAAY,EAAE;OAChB,EAAE,QAAQ,EAAE;OACZ,EAAE,WAAW,EAAE;OACf,EAAE,cAAc,EAAE;OAClB,EAAE,qBAAqB,EAAE;OACzB,EAAE,kBAAkB,EAAE;AAE7B,qBAAa,UAAU;IACrB,OAAO,CAAC,cAAc,CAAqB;IAC3C,OAAO,CAAC,iBAAiB,CAAwB;IACjD,OAAO,CAAC,KAAK,CAAiB;gBAElB,cAAc,EAAE,QAAQ,EAAE,WAAW,EAAE,WAAW,EAAE,OAAO,EAAE,YAAY;IAM9E,aAAa,IAAI,kBAAkB;IAInC,gBAAgB,IAAI,qBAAqB;IAIzC,IAAI,IAAI,cAAc;CAG9B"}
|
|
@@ -5,10 +5,10 @@ const auth_1 = require("./utils/auth.js");
|
|
|
5
5
|
const request_formatter_1 = require("./utils/request-formatter.js");
|
|
6
6
|
const request_signer_1 = require("./utils/request-signer.js");
|
|
7
7
|
class PrivyUtils {
|
|
8
|
-
constructor(privyApiClient, privyClient) {
|
|
8
|
+
constructor(privyApiClient, privyClient, appJwks) {
|
|
9
9
|
this._requestSigner = new request_signer_1.PrivyRequestSigner(privyClient);
|
|
10
10
|
this._requestFormatter = new request_formatter_1.PrivyRequestFormatter();
|
|
11
|
-
this._auth = new auth_1.PrivyAuthUtils(privyApiClient);
|
|
11
|
+
this._auth = new auth_1.PrivyAuthUtils(privyApiClient, appJwks);
|
|
12
12
|
}
|
|
13
13
|
requestSigner() {
|
|
14
14
|
return this._requestSigner;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"utils.js","sourceRoot":"","sources":["../../src/public-api/services/utils.ts"],"names":[],"mappings":";;;
|
|
1
|
+
{"version":3,"file":"utils.js","sourceRoot":"","sources":["../../src/public-api/services/utils.ts"],"names":[],"mappings":";;;AAGA,0CAA8C;AAC9C,oEAAkE;AAClE,8DAA4D;AAE5D,MAAa,UAAU;IAKrB,YAAY,cAAwB,EAAE,WAAwB,EAAE,OAAqB;QACnF,IAAI,CAAC,cAAc,GAAG,IAAI,mCAAkB,CAAC,WAAW,CAAC,CAAC;QAC1D,IAAI,CAAC,iBAAiB,GAAG,IAAI,yCAAqB,EAAE,CAAC;QACrD,IAAI,CAAC,KAAK,GAAG,IAAI,qBAAc,CAAC,cAAc,EAAE,OAAO,CAAC,CAAC;IAC3D,CAAC;IAEM,aAAa;QAClB,OAAO,IAAI,CAAC,cAAc,CAAC;IAC7B,CAAC;IAEM,gBAAgB;QACrB,OAAO,IAAI,CAAC,iBAAiB,CAAC;IAChC,CAAC;IAEM,IAAI;QACT,OAAO,IAAI,CAAC,KAAK,CAAC;IACpB,CAAC;CACF;AAtBD,gCAsBC"}
|
|
@@ -2,10 +2,10 @@ import { PrivyAuthUtils } from "./utils/auth.mjs";
|
|
|
2
2
|
import { PrivyRequestFormatter } from "./utils/request-formatter.mjs";
|
|
3
3
|
import { PrivyRequestSigner } from "./utils/request-signer.mjs";
|
|
4
4
|
export class PrivyUtils {
|
|
5
|
-
constructor(privyApiClient, privyClient) {
|
|
5
|
+
constructor(privyApiClient, privyClient, appJwks) {
|
|
6
6
|
this._requestSigner = new PrivyRequestSigner(privyClient);
|
|
7
7
|
this._requestFormatter = new PrivyRequestFormatter();
|
|
8
|
-
this._auth = new PrivyAuthUtils(privyApiClient);
|
|
8
|
+
this._auth = new PrivyAuthUtils(privyApiClient, appJwks);
|
|
9
9
|
}
|
|
10
10
|
requestSigner() {
|
|
11
11
|
return this._requestSigner;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"utils.mjs","sourceRoot":"","sources":["../../src/public-api/services/utils.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"utils.mjs","sourceRoot":"","sources":["../../src/public-api/services/utils.ts"],"names":[],"mappings":"OAGO,EAAE,cAAc,EAAE;OAClB,EAAE,qBAAqB,EAAE;OACzB,EAAE,kBAAkB,EAAE;AAE7B,MAAM,OAAO,UAAU;IAKrB,YAAY,cAAwB,EAAE,WAAwB,EAAE,OAAqB;QACnF,IAAI,CAAC,cAAc,GAAG,IAAI,kBAAkB,CAAC,WAAW,CAAC,CAAC;QAC1D,IAAI,CAAC,iBAAiB,GAAG,IAAI,qBAAqB,EAAE,CAAC;QACrD,IAAI,CAAC,KAAK,GAAG,IAAI,cAAc,CAAC,cAAc,EAAE,OAAO,CAAC,CAAC;IAC3D,CAAC;IAEM,aAAa;QAClB,OAAO,IAAI,CAAC,cAAc,CAAC;IAC7B,CAAC;IAEM,gBAAgB;QACrB,OAAO,IAAI,CAAC,iBAAiB,CAAC;IAChC,CAAC;IAEM,IAAI;QACT,OAAO,IAAI,CAAC,KAAK,CAAC;IACpB,CAAC;CACF"}
|
package/resources/policies.d.mts
CHANGED
|
@@ -167,7 +167,8 @@ export interface Policy {
|
|
|
167
167
|
}
|
|
168
168
|
export declare namespace Policy {
|
|
169
169
|
/**
|
|
170
|
-
*
|
|
170
|
+
* A rule that defines the conditions and action to take if the conditions are
|
|
171
|
+
* true.
|
|
171
172
|
*/
|
|
172
173
|
interface Rule {
|
|
173
174
|
id: string;
|