@spidy092/auth-client 2.1.8 → 3.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.js ADDED
@@ -0,0 +1,1008 @@
1
+ // config.js
2
+ var config = {
3
+ clientKey: null,
4
+ authBaseUrl: null,
5
+ redirectUri: null,
6
+ accountUiUrl: null,
7
+ isRouter: false,
8
+ // ✅ Add router flag
9
+ // ========== SESSION SECURITY SETTINGS ==========
10
+ // Buffer time (in seconds) before token expiry to trigger proactive refresh
11
+ // With 5-minute access tokens, refreshing 60s before expiry ensures seamless UX
12
+ tokenRefreshBuffer: 60,
13
+ // Interval (in milliseconds) for periodic session validation
14
+ // Validates that the session still exists in Keycloak (not deleted by admin)
15
+ // Default: 2 minutes (120000ms) - balances responsiveness vs server load
16
+ sessionValidationInterval: 2 * 60 * 1e3,
17
+ // Enable/disable periodic session validation
18
+ // When enabled, the client will ping the server to verify session is still active
19
+ enableSessionValidation: true,
20
+ // Enable/disable proactive token refresh
21
+ // When enabled, tokens are refreshed before they expire (using tokenRefreshBuffer)
22
+ enableProactiveRefresh: true,
23
+ // Validate session when browser tab becomes visible again
24
+ // Catches session deletions that happened while the tab was inactive
25
+ validateOnVisibility: true
26
+ };
27
+ function setConfig(customConfig = {}) {
28
+ if (!customConfig.clientKey || !customConfig.authBaseUrl) {
29
+ throw new Error("Missing required config: clientKey and authBaseUrl are required");
30
+ }
31
+ config = {
32
+ ...config,
33
+ ...customConfig,
34
+ redirectUri: customConfig.redirectUri || window.location.origin + "/callback",
35
+ // ✅ Auto-detect router mode
36
+ isRouter: customConfig.isRouter || customConfig.clientKey === "account-ui"
37
+ };
38
+ console.log(`\u{1F527} Auth Client Mode: ${config.isRouter ? "ROUTER" : "CLIENT"}`, {
39
+ clientKey: config.clientKey,
40
+ isRouter: config.isRouter
41
+ });
42
+ }
43
+ function getConfig() {
44
+ return { ...config };
45
+ }
46
+ function isRouterMode() {
47
+ return config.isRouter;
48
+ }
49
+
50
+ // token.js
51
+ import { jwtDecode } from "jwt-decode";
52
+ var accessToken = null;
53
+ var listeners = /* @__PURE__ */ new Set();
54
+ var REFRESH_COOKIE = "account_refresh_token";
55
+ var COOKIE_MAX_AGE = 7 * 24 * 60 * 60;
56
+ function secureAttribute() {
57
+ var _a;
58
+ try {
59
+ return typeof window !== "undefined" && ((_a = window.location) == null ? void 0 : _a.protocol) === "https:" ? "; Secure" : "";
60
+ } catch (err) {
61
+ return "";
62
+ }
63
+ }
64
+ function writeAccessToken(token) {
65
+ if (!token) {
66
+ try {
67
+ localStorage.removeItem("authToken");
68
+ } catch (err) {
69
+ console.warn("Could not clear token from localStorage:", err);
70
+ }
71
+ return;
72
+ }
73
+ try {
74
+ localStorage.setItem("authToken", token);
75
+ } catch (err) {
76
+ console.warn("Could not persist token to localStorage:", err);
77
+ }
78
+ }
79
+ function readAccessToken() {
80
+ try {
81
+ return localStorage.getItem("authToken");
82
+ } catch (err) {
83
+ console.warn("Could not read token from localStorage:", err);
84
+ return null;
85
+ }
86
+ }
87
+ function decode(token) {
88
+ try {
89
+ return jwtDecode(token);
90
+ } catch (err) {
91
+ return null;
92
+ }
93
+ }
94
+ function getTokenExpiryTime(token) {
95
+ if (!token) return null;
96
+ const decoded = decode(token);
97
+ if (!(decoded == null ? void 0 : decoded.exp)) return null;
98
+ return new Date(decoded.exp * 1e3);
99
+ }
100
+ function getTimeUntilExpiry(token) {
101
+ if (!token) return -1;
102
+ const decoded = decode(token);
103
+ if (!(decoded == null ? void 0 : decoded.exp)) return -1;
104
+ const now = Date.now() / 1e3;
105
+ return Math.floor(decoded.exp - now);
106
+ }
107
+ function willExpireSoon(token, withinSeconds = 60) {
108
+ const timeLeft = getTimeUntilExpiry(token);
109
+ return timeLeft >= 0 && timeLeft <= withinSeconds;
110
+ }
111
+ function setToken(token) {
112
+ const previousToken = accessToken;
113
+ accessToken = token || null;
114
+ writeAccessToken(accessToken);
115
+ if (previousToken !== accessToken) {
116
+ listeners.forEach((listener) => {
117
+ try {
118
+ listener(accessToken, previousToken);
119
+ } catch (err) {
120
+ console.warn("Token listener error:", err);
121
+ }
122
+ });
123
+ }
124
+ }
125
+ function getToken() {
126
+ if (accessToken) return accessToken;
127
+ accessToken = readAccessToken();
128
+ return accessToken;
129
+ }
130
+ function clearToken() {
131
+ if (!accessToken) {
132
+ writeAccessToken(null);
133
+ clearRefreshToken();
134
+ return;
135
+ }
136
+ const previousToken = accessToken;
137
+ accessToken = null;
138
+ writeAccessToken(null);
139
+ clearRefreshToken();
140
+ listeners.forEach((listener) => {
141
+ try {
142
+ listener(null, previousToken);
143
+ } catch (err) {
144
+ console.warn("Token listener error:", err);
145
+ }
146
+ });
147
+ }
148
+ var REFRESH_TOKEN_KEY = "auth_refresh_token";
149
+ function isHttpDevelopment() {
150
+ var _a;
151
+ try {
152
+ return typeof window !== "undefined" && ((_a = window.location) == null ? void 0 : _a.protocol) === "http:";
153
+ } catch (err) {
154
+ return false;
155
+ }
156
+ }
157
+ function setRefreshToken(token) {
158
+ if (!token) {
159
+ clearRefreshToken();
160
+ return;
161
+ }
162
+ if (isHttpDevelopment()) {
163
+ try {
164
+ localStorage.setItem(REFRESH_TOKEN_KEY, token);
165
+ console.log("\u{1F4E6} Refresh token stored in localStorage (HTTP dev mode)");
166
+ } catch (err) {
167
+ console.warn("Could not store refresh token:", err);
168
+ }
169
+ } else {
170
+ console.log("\u{1F512} Refresh token managed by server httpOnly cookie (production mode)");
171
+ }
172
+ }
173
+ function getRefreshToken() {
174
+ if (isHttpDevelopment()) {
175
+ try {
176
+ const token = localStorage.getItem(REFRESH_TOKEN_KEY);
177
+ return token;
178
+ } catch (err) {
179
+ console.warn("Could not read refresh token:", err);
180
+ return null;
181
+ }
182
+ }
183
+ return null;
184
+ }
185
+ function clearRefreshToken() {
186
+ try {
187
+ localStorage.removeItem(REFRESH_TOKEN_KEY);
188
+ } catch (err) {
189
+ }
190
+ try {
191
+ document.cookie = `${REFRESH_COOKIE}=; Path=/; SameSite=Strict${secureAttribute()}; Expires=Thu, 01 Jan 1970 00:00:00 GMT`;
192
+ } catch (err) {
193
+ console.warn("Could not clear refresh token cookie:", err);
194
+ }
195
+ try {
196
+ sessionStorage.removeItem(REFRESH_COOKIE);
197
+ } catch (err) {
198
+ }
199
+ }
200
+ function addTokenListener(listener) {
201
+ if (typeof listener !== "function") {
202
+ throw new Error("Token listener must be a function");
203
+ }
204
+ listeners.add(listener);
205
+ return () => {
206
+ listeners.delete(listener);
207
+ };
208
+ }
209
+ function removeTokenListener(listener) {
210
+ listeners.delete(listener);
211
+ }
212
+ function getListenerCount() {
213
+ return listeners.size;
214
+ }
215
+
216
+ // core.js
217
+ var callbackProcessed = false;
218
+ function login(clientKeyArg, redirectUriArg) {
219
+ resetCallbackState();
220
+ const {
221
+ clientKey: defaultClientKey,
222
+ authBaseUrl,
223
+ redirectUri: defaultRedirectUri,
224
+ accountUiUrl
225
+ } = getConfig();
226
+ const clientKey = clientKeyArg || defaultClientKey;
227
+ const redirectUri = redirectUriArg || defaultRedirectUri;
228
+ console.log("\u{1F504} Smart Login initiated:", {
229
+ mode: isRouterMode() ? "ROUTER" : "CLIENT",
230
+ clientKey,
231
+ redirectUri
232
+ });
233
+ if (!clientKey || !redirectUri) {
234
+ throw new Error("Missing clientKey or redirectUri");
235
+ }
236
+ sessionStorage.setItem("originalApp", clientKey);
237
+ sessionStorage.setItem("returnUrl", redirectUri);
238
+ if (isRouterMode()) {
239
+ return routerLogin(clientKey, redirectUri);
240
+ } else {
241
+ return clientLogin(clientKey, redirectUri);
242
+ }
243
+ }
244
+ function routerLogin(clientKey, redirectUri) {
245
+ const { authBaseUrl } = getConfig();
246
+ const params = new URLSearchParams();
247
+ if (redirectUri) {
248
+ params.append("redirect_uri", redirectUri);
249
+ }
250
+ const query = params.toString();
251
+ const backendLoginUrl = `${authBaseUrl}/login/${clientKey}${query ? `?${query}` : ""}`;
252
+ console.log("\u{1F3ED} Router Login: Direct backend authentication", {
253
+ clientKey,
254
+ redirectUri,
255
+ backendUrl: backendLoginUrl
256
+ });
257
+ window.location.href = backendLoginUrl;
258
+ }
259
+ function clientLogin(clientKey, redirectUri) {
260
+ const { accountUiUrl } = getConfig();
261
+ const params = new URLSearchParams({
262
+ client: clientKey
263
+ });
264
+ if (redirectUri) {
265
+ params.append("redirect_uri", redirectUri);
266
+ }
267
+ const centralizedLoginUrl = `${accountUiUrl}/login?${params.toString()}`;
268
+ console.log("\u{1F504} Client Login: Redirecting to centralized login", {
269
+ clientKey,
270
+ redirectUri,
271
+ centralizedUrl: centralizedLoginUrl
272
+ });
273
+ window.location.href = centralizedLoginUrl;
274
+ }
275
+ function logout() {
276
+ resetCallbackState();
277
+ const { clientKey, authBaseUrl, accountUiUrl } = getConfig();
278
+ const token = getToken();
279
+ console.log("\u{1F6AA} Smart Logout initiated");
280
+ clearToken();
281
+ clearRefreshToken();
282
+ sessionStorage.removeItem("originalApp");
283
+ sessionStorage.removeItem("returnUrl");
284
+ if (isRouterMode()) {
285
+ return routerLogout(clientKey, authBaseUrl, accountUiUrl, token);
286
+ } else {
287
+ return clientLogout(clientKey, accountUiUrl);
288
+ }
289
+ }
290
+ async function routerLogout(clientKey, authBaseUrl, accountUiUrl, token) {
291
+ console.log("\u{1F3ED} Router Logout");
292
+ const refreshToken2 = getRefreshToken();
293
+ try {
294
+ const response = await fetch(`${authBaseUrl}/logout/${clientKey}`, {
295
+ method: "POST",
296
+ credentials: "include",
297
+ headers: {
298
+ "Authorization": token ? `Bearer ${token}` : "",
299
+ "Content-Type": "application/json"
300
+ },
301
+ body: JSON.stringify({
302
+ refreshToken: refreshToken2
303
+ })
304
+ });
305
+ const data = await response.json();
306
+ console.log("\u2705 Logout response:", data);
307
+ clearRefreshToken();
308
+ clearToken();
309
+ console.log("\u{1F504} Redirecting to login (skipping Keycloak confirmation)");
310
+ window.location.href = "/login";
311
+ } catch (error) {
312
+ console.warn("\u26A0\uFE0F Logout failed:", error);
313
+ clearRefreshToken();
314
+ clearToken();
315
+ window.location.href = "/login";
316
+ }
317
+ }
318
+ function clientLogout(clientKey, accountUiUrl) {
319
+ console.log("\u{1F504} Client Logout");
320
+ const logoutUrl = `${accountUiUrl}/login?client=${clientKey}&logout=true`;
321
+ window.location.href = logoutUrl;
322
+ }
323
+ function handleCallback() {
324
+ var _a;
325
+ const params = new URLSearchParams(window.location.search);
326
+ const accessToken2 = params.get("access_token");
327
+ const error = params.get("error");
328
+ console.log("\u{1F504} Callback handling:", {
329
+ hasAccessToken: !!accessToken2,
330
+ error
331
+ });
332
+ if (callbackProcessed) {
333
+ const existingToken = getToken();
334
+ if (existingToken) {
335
+ console.log("\u2705 Callback already processed, returning existing token");
336
+ return existingToken;
337
+ }
338
+ callbackProcessed = false;
339
+ }
340
+ callbackProcessed = true;
341
+ sessionStorage.removeItem("originalApp");
342
+ sessionStorage.removeItem("returnUrl");
343
+ if (error) {
344
+ const errorDescription = params.get("error_description") || error;
345
+ throw new Error(`Authentication failed: ${errorDescription}`);
346
+ }
347
+ if (accessToken2) {
348
+ setToken(accessToken2);
349
+ const refreshTokenInUrl = params.get("refresh_token");
350
+ if (refreshTokenInUrl) {
351
+ const isHttpDev = typeof window !== "undefined" && ((_a = window.location) == null ? void 0 : _a.protocol) === "http:";
352
+ if (isHttpDev) {
353
+ console.log("\u{1F4E6} HTTP dev mode: Storing refresh token from callback URL");
354
+ setRefreshToken(refreshTokenInUrl);
355
+ } else {
356
+ console.log("\u{1F512} HTTPS mode: Refresh token is in httpOnly cookie (ignoring URL param)");
357
+ }
358
+ }
359
+ const url = new URL(window.location);
360
+ url.searchParams.delete("access_token");
361
+ url.searchParams.delete("refresh_token");
362
+ url.searchParams.delete("state");
363
+ url.searchParams.delete("error");
364
+ url.searchParams.delete("error_description");
365
+ window.history.replaceState({}, "", url);
366
+ console.log("\u2705 Callback processed successfully, token stored");
367
+ return accessToken2;
368
+ }
369
+ throw new Error("No access token found in callback URL");
370
+ }
371
+ function resetCallbackState() {
372
+ callbackProcessed = false;
373
+ }
374
+ var refreshInProgress = false;
375
+ var refreshPromise = null;
376
+ async function refreshToken() {
377
+ const { clientKey, authBaseUrl } = getConfig();
378
+ if (refreshInProgress && refreshPromise) {
379
+ console.log("\u{1F504} Token refresh already in progress, waiting...");
380
+ return refreshPromise;
381
+ }
382
+ refreshInProgress = true;
383
+ refreshPromise = (async () => {
384
+ try {
385
+ const storedRefreshToken = getRefreshToken();
386
+ console.log("\u{1F504} Refreshing token:", {
387
+ clientKey,
388
+ mode: isRouterMode() ? "ROUTER" : "CLIENT",
389
+ hasStoredRefreshToken: !!storedRefreshToken
390
+ });
391
+ const requestOptions = {
392
+ method: "POST",
393
+ credentials: "include",
394
+ // ✅ Include httpOnly cookies (for HTTPS)
395
+ headers: {
396
+ "Content-Type": "application/json"
397
+ }
398
+ };
399
+ if (storedRefreshToken) {
400
+ requestOptions.headers["X-Refresh-Token"] = storedRefreshToken;
401
+ requestOptions.body = JSON.stringify({ refreshToken: storedRefreshToken });
402
+ }
403
+ const response = await fetch(`${authBaseUrl}/refresh/${clientKey}`, requestOptions);
404
+ if (!response.ok) {
405
+ const errorText = await response.text();
406
+ console.error("\u274C Token refresh failed:", response.status, errorText);
407
+ throw new Error(`Refresh failed: ${response.status}`);
408
+ }
409
+ const data = await response.json();
410
+ const { access_token, refresh_token: new_refresh_token } = data;
411
+ if (!access_token) {
412
+ throw new Error("No access token in refresh response");
413
+ }
414
+ setToken(access_token);
415
+ if (new_refresh_token) {
416
+ setRefreshToken(new_refresh_token);
417
+ console.log("\u{1F504} New refresh token stored from rotation");
418
+ }
419
+ console.log("\u2705 Token refresh successful, listeners notified");
420
+ return access_token;
421
+ } catch (err) {
422
+ console.error("\u274C Token refresh error:", err);
423
+ clearToken();
424
+ clearRefreshToken();
425
+ throw err;
426
+ } finally {
427
+ refreshInProgress = false;
428
+ refreshPromise = null;
429
+ }
430
+ })();
431
+ return refreshPromise;
432
+ }
433
+ async function validateCurrentSession() {
434
+ try {
435
+ const { authBaseUrl } = getConfig();
436
+ const token = getToken();
437
+ if (!token || !authBaseUrl) {
438
+ return false;
439
+ }
440
+ const response = await fetch(`${authBaseUrl}/account/validate-session`, {
441
+ method: "GET",
442
+ headers: {
443
+ "Authorization": `Bearer ${token}`,
444
+ "Content-Type": "application/json"
445
+ },
446
+ credentials: "include"
447
+ });
448
+ if (!response.ok) {
449
+ if (response.status === 401) {
450
+ return false;
451
+ }
452
+ throw new Error(`HTTP ${response.status}: ${response.statusText}`);
453
+ }
454
+ const data = await response.json();
455
+ return data.valid === true;
456
+ } catch (error) {
457
+ console.warn("Session validation failed:", error.message);
458
+ if (error.message.includes("401")) {
459
+ return false;
460
+ }
461
+ throw error;
462
+ }
463
+ }
464
+ var proactiveRefreshTimer = null;
465
+ var sessionValidationTimer = null;
466
+ var visibilityHandler = null;
467
+ var sessionInvalidCallbacks = /* @__PURE__ */ new Set();
468
+ function onSessionInvalid(callback) {
469
+ if (typeof callback === "function") {
470
+ sessionInvalidCallbacks.add(callback);
471
+ }
472
+ return () => sessionInvalidCallbacks.delete(callback);
473
+ }
474
+ function notifySessionInvalid(reason = "session_deleted") {
475
+ console.log("\u{1F6A8} Session invalidated:", reason);
476
+ sessionInvalidCallbacks.forEach((callback) => {
477
+ try {
478
+ callback(reason);
479
+ } catch (err) {
480
+ console.error("Session invalid callback error:", err);
481
+ }
482
+ });
483
+ }
484
+ function startProactiveRefresh() {
485
+ const { enableProactiveRefresh, tokenRefreshBuffer } = getConfig();
486
+ if (!enableProactiveRefresh) {
487
+ console.log("\u23F8\uFE0F Proactive refresh disabled by config");
488
+ return null;
489
+ }
490
+ stopProactiveRefresh();
491
+ const token = getToken();
492
+ if (!token) {
493
+ console.log("\u23F8\uFE0F No token, skipping proactive refresh setup");
494
+ return null;
495
+ }
496
+ const timeUntilExpiry = getTimeUntilExpiry(token);
497
+ if (timeUntilExpiry <= 0) {
498
+ console.log("\u26A0\uFE0F Token already expired, attempting immediate refresh");
499
+ refreshToken().catch((err) => {
500
+ console.error("\u274C Immediate refresh failed:", err);
501
+ notifySessionInvalid("token_expired");
502
+ });
503
+ return null;
504
+ }
505
+ const refreshIn = Math.max(0, timeUntilExpiry - tokenRefreshBuffer) * 1e3;
506
+ console.log(`\u{1F504} Scheduling proactive refresh in ${Math.round(refreshIn / 1e3)}s (token expires in ${timeUntilExpiry}s)`);
507
+ proactiveRefreshTimer = setTimeout(async () => {
508
+ var _a;
509
+ try {
510
+ console.log("\u{1F504} Proactive token refresh triggered");
511
+ await refreshToken();
512
+ console.log("\u2705 Proactive refresh successful, scheduling next refresh");
513
+ startProactiveRefresh();
514
+ } catch (err) {
515
+ console.error("\u274C Proactive refresh failed:", err);
516
+ const errorMessage = ((_a = err.message) == null ? void 0 : _a.toLowerCase()) || "";
517
+ const isPermanentFailure = errorMessage.includes("401") || errorMessage.includes("revoked") || errorMessage.includes("invalid") || errorMessage.includes("expired") || errorMessage.includes("unauthorized");
518
+ if (isPermanentFailure) {
519
+ console.log("\u{1F6A8} Token permanently invalid, triggering session expiry");
520
+ notifySessionInvalid("refresh_token_revoked");
521
+ } else {
522
+ proactiveRefreshTimer = setTimeout(() => startProactiveRefresh(), 3e4);
523
+ }
524
+ }
525
+ }, refreshIn);
526
+ return proactiveRefreshTimer;
527
+ }
528
+ function stopProactiveRefresh() {
529
+ if (proactiveRefreshTimer) {
530
+ clearTimeout(proactiveRefreshTimer);
531
+ proactiveRefreshTimer = null;
532
+ console.log("\u23F9\uFE0F Proactive refresh stopped");
533
+ }
534
+ }
535
+ function startSessionMonitor(onInvalid) {
536
+ const { enableSessionValidation, sessionValidationInterval, validateOnVisibility } = getConfig();
537
+ if (!enableSessionValidation) {
538
+ console.log("\u23F8\uFE0F Session validation disabled by config");
539
+ return null;
540
+ }
541
+ if (onInvalid && typeof onInvalid === "function") {
542
+ sessionInvalidCallbacks.add(onInvalid);
543
+ }
544
+ stopSessionMonitor();
545
+ const token = getToken();
546
+ if (!token) {
547
+ console.log("\u23F8\uFE0F No token, skipping session monitor setup");
548
+ return null;
549
+ }
550
+ console.log(`\u{1F441}\uFE0F Starting session monitor (interval: ${sessionValidationInterval / 1e3}s)`);
551
+ sessionValidationTimer = setInterval(async () => {
552
+ try {
553
+ const currentToken = getToken();
554
+ if (!currentToken) {
555
+ console.log("\u23F8\uFE0F No token, stopping session validation");
556
+ stopSessionMonitor();
557
+ return;
558
+ }
559
+ console.log("\u{1F50D} Validating session...");
560
+ const isValid = await validateCurrentSession();
561
+ if (!isValid) {
562
+ console.log("\u274C Session no longer valid on server");
563
+ stopSessionMonitor();
564
+ stopProactiveRefresh();
565
+ clearToken();
566
+ clearRefreshToken();
567
+ notifySessionInvalid("session_deleted");
568
+ } else {
569
+ console.log("\u2705 Session still valid");
570
+ }
571
+ } catch (error) {
572
+ console.warn("\u26A0\uFE0F Session validation check failed:", error.message);
573
+ }
574
+ }, sessionValidationInterval);
575
+ if (validateOnVisibility && typeof document !== "undefined") {
576
+ visibilityHandler = async () => {
577
+ if (document.visibilityState === "visible") {
578
+ const currentToken = getToken();
579
+ if (!currentToken) return;
580
+ console.log("\u{1F441}\uFE0F Tab visible - validating session");
581
+ try {
582
+ const isValid = await validateCurrentSession();
583
+ if (!isValid) {
584
+ console.log("\u274C Session expired while tab was hidden");
585
+ stopSessionMonitor();
586
+ stopProactiveRefresh();
587
+ clearToken();
588
+ clearRefreshToken();
589
+ notifySessionInvalid("session_deleted_while_hidden");
590
+ }
591
+ } catch (error) {
592
+ console.warn("\u26A0\uFE0F Visibility check failed:", error.message);
593
+ }
594
+ }
595
+ };
596
+ document.addEventListener("visibilitychange", visibilityHandler);
597
+ }
598
+ return sessionValidationTimer;
599
+ }
600
+ function stopSessionMonitor() {
601
+ if (sessionValidationTimer) {
602
+ clearInterval(sessionValidationTimer);
603
+ sessionValidationTimer = null;
604
+ console.log("\u23F9\uFE0F Session monitor stopped");
605
+ }
606
+ if (visibilityHandler && typeof document !== "undefined") {
607
+ document.removeEventListener("visibilitychange", visibilityHandler);
608
+ visibilityHandler = null;
609
+ }
610
+ }
611
+ function startSessionSecurity(onSessionInvalidCallback) {
612
+ console.log("\u{1F510} Starting session security (proactive refresh + session monitoring)");
613
+ startProactiveRefresh();
614
+ startSessionMonitor(onSessionInvalidCallback);
615
+ return {
616
+ stopAll: () => {
617
+ stopProactiveRefresh();
618
+ stopSessionMonitor();
619
+ }
620
+ };
621
+ }
622
+ function stopSessionSecurity() {
623
+ stopProactiveRefresh();
624
+ stopSessionMonitor();
625
+ sessionInvalidCallbacks.clear();
626
+ console.log("\u{1F510} Session security stopped");
627
+ }
628
+
629
+ // api.js
630
+ import axios from "axios";
631
+ var api = axios.create({
632
+ withCredentials: true
633
+ });
634
+ api.interceptors.request.use((config2) => {
635
+ const runtimeConfig = getConfig();
636
+ if (!config2.baseURL) {
637
+ config2.baseURL = (runtimeConfig == null ? void 0 : runtimeConfig.authBaseUrl) || "http://auth.local.test:4000/auth";
638
+ }
639
+ if (!config2.headers) {
640
+ config2.headers = {};
641
+ }
642
+ if ((runtimeConfig == null ? void 0 : runtimeConfig.clientKey) && !config2.headers["X-Client-Key"]) {
643
+ config2.headers["X-Client-Key"] = runtimeConfig.clientKey;
644
+ }
645
+ const token = getToken();
646
+ if (token) {
647
+ config2.headers.Authorization = `Bearer ${token}`;
648
+ }
649
+ return config2;
650
+ });
651
+ var refreshPromise2 = null;
652
+ api.interceptors.response.use(
653
+ (response) => response,
654
+ async (error) => {
655
+ const { response, config: config2 } = error || {};
656
+ if (!response || !config2) {
657
+ return Promise.reject(error);
658
+ }
659
+ if (response.status !== 401 || config2._retry) {
660
+ return Promise.reject(error);
661
+ }
662
+ config2._retry = true;
663
+ if (!refreshPromise2) {
664
+ refreshPromise2 = refreshToken().then((newToken) => {
665
+ refreshPromise2 = null;
666
+ if (newToken) {
667
+ setToken(newToken);
668
+ }
669
+ return newToken;
670
+ }).catch((refreshError) => {
671
+ refreshPromise2 = null;
672
+ clearToken();
673
+ throw refreshError;
674
+ });
675
+ }
676
+ try {
677
+ const refreshedToken = await refreshPromise2;
678
+ if (refreshedToken) {
679
+ config2.headers.Authorization = `Bearer ${refreshedToken}`;
680
+ return api(config2);
681
+ }
682
+ } catch (refreshErr) {
683
+ return Promise.reject(refreshErr);
684
+ }
685
+ return Promise.reject(error);
686
+ }
687
+ );
688
+ api.validateSession = async () => {
689
+ var _a;
690
+ try {
691
+ const response = await api.get("/account/validate-session");
692
+ return response.data.valid;
693
+ } catch (err) {
694
+ if (((_a = err.response) == null ? void 0 : _a.status) === 401) {
695
+ return false;
696
+ }
697
+ throw err;
698
+ }
699
+ };
700
+ var api_default = api;
701
+
702
+ // utils/jwt.js
703
+ import { jwtDecode as jwtDecode2 } from "jwt-decode";
704
+ function decodeToken(token) {
705
+ try {
706
+ return jwtDecode2(token);
707
+ } catch (err) {
708
+ console.warn("Failed to decode JWT:", err);
709
+ return null;
710
+ }
711
+ }
712
+ function isTokenExpired(token, bufferSeconds = 60) {
713
+ const decoded = decodeToken(token);
714
+ if (!decoded || !decoded.exp) return true;
715
+ const currentTime = Date.now() / 1e3;
716
+ return decoded.exp < currentTime + bufferSeconds;
717
+ }
718
+ function isAuthenticated() {
719
+ const token = getToken();
720
+ return !!token && !isTokenExpired(token);
721
+ }
722
+
723
+ // react/AuthProvider.jsx
724
+ import React, { createContext, useState, useEffect, useRef } from "react";
725
+ var AuthContext = createContext();
726
+ function AuthProvider({ children, onSessionExpired }) {
727
+ const [token, setTokenState] = useState(getToken());
728
+ const [user, setUser] = useState(null);
729
+ const [loading, setLoading] = useState(!!token);
730
+ const [sessionValid, setSessionValid] = useState(true);
731
+ const sessionSecurityRef = useRef(null);
732
+ const handleSessionInvalid = (reason) => {
733
+ console.log("\u{1F6A8} AuthProvider: Session invalidated -", reason);
734
+ setSessionValid(false);
735
+ setUser(null);
736
+ setTokenState(null);
737
+ if (onSessionExpired && typeof onSessionExpired === "function") {
738
+ onSessionExpired(reason);
739
+ }
740
+ };
741
+ useEffect(() => {
742
+ if (token && !sessionSecurityRef.current) {
743
+ console.log("\u{1F510} AuthProvider: Starting session security");
744
+ const unsubscribe = onSessionInvalid(handleSessionInvalid);
745
+ sessionSecurityRef.current = startSessionSecurity(handleSessionInvalid);
746
+ return () => {
747
+ unsubscribe();
748
+ if (sessionSecurityRef.current) {
749
+ sessionSecurityRef.current.stopAll();
750
+ sessionSecurityRef.current = null;
751
+ }
752
+ };
753
+ }
754
+ if (!token && sessionSecurityRef.current) {
755
+ sessionSecurityRef.current.stopAll();
756
+ sessionSecurityRef.current = null;
757
+ }
758
+ }, [token]);
759
+ useEffect(() => {
760
+ console.log("\u{1F50D} AuthProvider useEffect triggered:", {
761
+ hasToken: !!token,
762
+ tokenLength: token == null ? void 0 : token.length
763
+ });
764
+ if (!token) {
765
+ console.log("\u26A0\uFE0F AuthProvider: No token, setting loading=false");
766
+ setLoading(false);
767
+ return;
768
+ }
769
+ const { authBaseUrl } = getConfig();
770
+ if (!authBaseUrl) {
771
+ console.warn("AuthProvider: No authBaseUrl configured");
772
+ setLoading(false);
773
+ return;
774
+ }
775
+ console.log("\u{1F310} AuthProvider: Fetching profile with token...", {
776
+ authBaseUrl,
777
+ tokenPreview: token.slice(0, 50) + "..."
778
+ });
779
+ fetch(`${authBaseUrl}/account/profile`, {
780
+ headers: { Authorization: `Bearer ${token}` },
781
+ credentials: "include"
782
+ }).then((res) => {
783
+ console.log("\u{1F4E5} Profile response status:", res.status);
784
+ if (!res.ok) throw new Error("Failed to fetch user");
785
+ return res.json();
786
+ }).then((userData) => {
787
+ console.log("\u2705 Profile fetched successfully:", userData.email);
788
+ setUser(userData);
789
+ setSessionValid(true);
790
+ setLoading(false);
791
+ }).catch((err) => {
792
+ console.error("\u274C Fetch user error:", err);
793
+ clearToken();
794
+ setTokenState(null);
795
+ setUser(null);
796
+ setLoading(false);
797
+ });
798
+ }, [token]);
799
+ const login2 = (clientKey, redirectUri, state) => {
800
+ login(clientKey, redirectUri, state);
801
+ };
802
+ const logout2 = () => {
803
+ stopSessionSecurity();
804
+ sessionSecurityRef.current = null;
805
+ logout();
806
+ setUser(null);
807
+ setTokenState(null);
808
+ setSessionValid(true);
809
+ };
810
+ const value = {
811
+ token,
812
+ user,
813
+ loading,
814
+ login: login2,
815
+ logout: logout2,
816
+ isAuthenticated: !!token && !!user && sessionValid,
817
+ sessionValid,
818
+ setUser,
819
+ setToken: (newToken) => {
820
+ setToken(newToken);
821
+ setTokenState(newToken);
822
+ setSessionValid(true);
823
+ },
824
+ clearToken: () => {
825
+ stopSessionSecurity();
826
+ sessionSecurityRef.current = null;
827
+ clearToken();
828
+ setTokenState(null);
829
+ setUser(null);
830
+ }
831
+ };
832
+ return /* @__PURE__ */ React.createElement(AuthContext.Provider, { value }, children);
833
+ }
834
+
835
+ // react/useAuth.js
836
+ import { useContext } from "react";
837
+ function useAuth() {
838
+ const context = useContext(AuthContext);
839
+ if (!context) {
840
+ throw new Error("useAuth must be used within an AuthProvider");
841
+ }
842
+ return context;
843
+ }
844
+
845
+ // react/useSessionMonitor.js
846
+ import { useQuery, useQueryClient } from "@tanstack/react-query";
847
+ import { useEffect as useEffect2, useCallback } from "react";
848
+ var useSessionMonitor = (options = {}) => {
849
+ var _a, _b;
850
+ const queryClient = useQueryClient();
851
+ const {
852
+ enabled = true,
853
+ refetchInterval = 2 * 60 * 1e3,
854
+ // 2 minutes (matching config default)
855
+ onSessionInvalid: onSessionInvalid2,
856
+ onError,
857
+ autoLogout = true,
858
+ validateOnMount = true
859
+ } = options;
860
+ const handleInvalid = useCallback(() => {
861
+ console.log("\u{1F6A8} useSessionMonitor: Session invalid detected");
862
+ queryClient.clear();
863
+ if (autoLogout) {
864
+ auth.clearToken();
865
+ auth.clearRefreshToken();
866
+ }
867
+ if (onSessionInvalid2) {
868
+ onSessionInvalid2();
869
+ }
870
+ }, [queryClient, autoLogout, onSessionInvalid2]);
871
+ const query = useQuery({
872
+ queryKey: ["session-validation"],
873
+ queryFn: async () => {
874
+ try {
875
+ const token = auth.getToken();
876
+ if (!token) {
877
+ return { valid: false, reason: "no_token" };
878
+ }
879
+ console.log("\u{1F50D} useSessionMonitor: Validating session...");
880
+ const isValid = await auth.validateCurrentSession();
881
+ if (!isValid) {
882
+ console.log("\u274C useSessionMonitor: Session no longer valid");
883
+ handleInvalid();
884
+ return { valid: false, reason: "session_deleted" };
885
+ }
886
+ console.log("\u2705 useSessionMonitor: Session still valid");
887
+ return { valid: true };
888
+ } catch (error) {
889
+ console.error("\u26A0\uFE0F useSessionMonitor: Validation error:", error);
890
+ if (onError) {
891
+ onError(error);
892
+ }
893
+ throw error;
894
+ }
895
+ },
896
+ enabled: enabled && !!auth.getToken(),
897
+ refetchInterval,
898
+ refetchIntervalInBackground: true,
899
+ retry: 2,
900
+ retryDelay: 5e3,
901
+ staleTime: refetchInterval / 2
902
+ // Consider stale at half the interval
903
+ });
904
+ useEffect2(() => {
905
+ if (!enabled) return;
906
+ const handleVisibilityChange = () => {
907
+ if (document.visibilityState === "visible" && auth.getToken()) {
908
+ console.log("\u{1F441}\uFE0F useSessionMonitor: Tab visible - triggering validation");
909
+ queryClient.invalidateQueries({ queryKey: ["session-validation"] });
910
+ }
911
+ };
912
+ document.addEventListener("visibilitychange", handleVisibilityChange);
913
+ return () => {
914
+ document.removeEventListener("visibilitychange", handleVisibilityChange);
915
+ };
916
+ }, [enabled, queryClient]);
917
+ useEffect2(() => {
918
+ if (validateOnMount && enabled && auth.getToken()) {
919
+ queryClient.invalidateQueries({ queryKey: ["session-validation"] });
920
+ }
921
+ }, [validateOnMount, enabled, queryClient]);
922
+ return {
923
+ ...query,
924
+ isSessionValid: ((_a = query.data) == null ? void 0 : _a.valid) ?? true,
925
+ invalidationReason: (_b = query.data) == null ? void 0 : _b.reason,
926
+ manualValidate: () => queryClient.invalidateQueries({ queryKey: ["session-validation"] })
927
+ };
928
+ };
929
+
930
+ // index.js
931
+ var auth = {
932
+ // 🔧 Config
933
+ setConfig,
934
+ getConfig,
935
+ isRouterMode,
936
+ // 🔐 Core flows
937
+ login,
938
+ logout,
939
+ handleCallback,
940
+ refreshToken,
941
+ resetCallbackState,
942
+ validateCurrentSession,
943
+ // 🔑 Token management
944
+ getToken,
945
+ setToken,
946
+ clearToken,
947
+ setRefreshToken,
948
+ // ✅ Refresh token for HTTP dev
949
+ getRefreshToken,
950
+ clearRefreshToken,
951
+ addTokenListener,
952
+ // ✅ Export new functions
953
+ removeTokenListener,
954
+ getListenerCount,
955
+ // ✅ Debug function
956
+ // 🌐 Authenticated API client
957
+ api: api_default,
958
+ // 🧪 Utilities
959
+ decodeToken,
960
+ isTokenExpired,
961
+ isAuthenticated,
962
+ // ⏱️ Token Expiry Utilities (NEW)
963
+ getTokenExpiryTime,
964
+ // Get token expiry as Date object
965
+ getTimeUntilExpiry,
966
+ // Get seconds until token expires
967
+ willExpireSoon,
968
+ // Check if token expires within N seconds
969
+ // 🔐 Session Security (NEW - Short-lived tokens + Periodic validation)
970
+ startProactiveRefresh,
971
+ // Start proactive token refresh before expiry
972
+ stopProactiveRefresh,
973
+ // Stop proactive refresh
974
+ startSessionMonitor,
975
+ // Start periodic session validation
976
+ stopSessionMonitor,
977
+ // Stop session validation
978
+ startSessionSecurity,
979
+ // Start both proactive refresh AND session monitoring
980
+ stopSessionSecurity,
981
+ // Stop all session security
982
+ onSessionInvalid,
983
+ // Register callback for session invalidation
984
+ // 🔄 Legacy auto-refresh (DEPRECATED - use startSessionSecurity instead)
985
+ startTokenRefresh: () => {
986
+ console.warn("\u26A0\uFE0F startTokenRefresh is deprecated. Use startSessionSecurity() instead for better session management.");
987
+ const interval = setInterval(async () => {
988
+ const token = getToken();
989
+ if (token && isTokenExpired(token, 300)) {
990
+ try {
991
+ await refreshToken();
992
+ console.log("\u{1F504} Auto-refresh successful");
993
+ } catch (err) {
994
+ console.error("Auto-refresh failed:", err);
995
+ clearInterval(interval);
996
+ }
997
+ }
998
+ }, 6e4);
999
+ return interval;
1000
+ }
1001
+ };
1002
+ export {
1003
+ AuthProvider,
1004
+ auth,
1005
+ useAuth,
1006
+ useSessionMonitor
1007
+ };
1008
+ //# sourceMappingURL=index.js.map