@spidy092/auth-client 2.1.8 → 3.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,692 @@
1
+ var __create = Object.create;
2
+ var __defProp = Object.defineProperty;
3
+ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
4
+ var __getOwnPropNames = Object.getOwnPropertyNames;
5
+ var __getProtoOf = Object.getPrototypeOf;
6
+ var __hasOwnProp = Object.prototype.hasOwnProperty;
7
+ var __export = (target, all) => {
8
+ for (var name in all)
9
+ __defProp(target, name, { get: all[name], enumerable: true });
10
+ };
11
+ var __copyProps = (to, from, except, desc) => {
12
+ if (from && typeof from === "object" || typeof from === "function") {
13
+ for (let key of __getOwnPropNames(from))
14
+ if (!__hasOwnProp.call(to, key) && key !== except)
15
+ __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
16
+ }
17
+ return to;
18
+ };
19
+ var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
20
+ // If the importer is in node compatibility mode or this is not an ESM
21
+ // file that has been converted to a CommonJS file using a Babel-
22
+ // compatible transform (i.e. "__esModule" has not been set), then set
23
+ // "default" to the CommonJS "module.exports" for node compatibility.
24
+ isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
25
+ mod
26
+ ));
27
+ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
28
+
29
+ // react/AuthProvider.jsx
30
+ var AuthProvider_exports = {};
31
+ __export(AuthProvider_exports, {
32
+ AuthContext: () => AuthContext,
33
+ AuthProvider: () => AuthProvider
34
+ });
35
+ module.exports = __toCommonJS(AuthProvider_exports);
36
+ var import_react = __toESM(require("react"), 1);
37
+
38
+ // token.js
39
+ var import_jwt_decode = require("jwt-decode");
40
+ var accessToken = null;
41
+ var listeners = /* @__PURE__ */ new Set();
42
+ var REFRESH_COOKIE = "account_refresh_token";
43
+ var COOKIE_MAX_AGE = 7 * 24 * 60 * 60;
44
+ function secureAttribute() {
45
+ var _a;
46
+ try {
47
+ return typeof window !== "undefined" && ((_a = window.location) == null ? void 0 : _a.protocol) === "https:" ? "; Secure" : "";
48
+ } catch (err) {
49
+ return "";
50
+ }
51
+ }
52
+ function writeAccessToken(token) {
53
+ if (!token) {
54
+ try {
55
+ localStorage.removeItem("authToken");
56
+ } catch (err) {
57
+ console.warn("Could not clear token from localStorage:", err);
58
+ }
59
+ return;
60
+ }
61
+ try {
62
+ localStorage.setItem("authToken", token);
63
+ } catch (err) {
64
+ console.warn("Could not persist token to localStorage:", err);
65
+ }
66
+ }
67
+ function readAccessToken() {
68
+ try {
69
+ return localStorage.getItem("authToken");
70
+ } catch (err) {
71
+ console.warn("Could not read token from localStorage:", err);
72
+ return null;
73
+ }
74
+ }
75
+ function decode(token) {
76
+ try {
77
+ return (0, import_jwt_decode.jwtDecode)(token);
78
+ } catch (err) {
79
+ return null;
80
+ }
81
+ }
82
+ function getTimeUntilExpiry(token) {
83
+ if (!token) return -1;
84
+ const decoded = decode(token);
85
+ if (!(decoded == null ? void 0 : decoded.exp)) return -1;
86
+ const now = Date.now() / 1e3;
87
+ return Math.floor(decoded.exp - now);
88
+ }
89
+ function setToken(token) {
90
+ const previousToken = accessToken;
91
+ accessToken = token || null;
92
+ writeAccessToken(accessToken);
93
+ if (previousToken !== accessToken) {
94
+ listeners.forEach((listener) => {
95
+ try {
96
+ listener(accessToken, previousToken);
97
+ } catch (err) {
98
+ console.warn("Token listener error:", err);
99
+ }
100
+ });
101
+ }
102
+ }
103
+ function getToken() {
104
+ if (accessToken) return accessToken;
105
+ accessToken = readAccessToken();
106
+ return accessToken;
107
+ }
108
+ function clearToken() {
109
+ if (!accessToken) {
110
+ writeAccessToken(null);
111
+ clearRefreshToken();
112
+ return;
113
+ }
114
+ const previousToken = accessToken;
115
+ accessToken = null;
116
+ writeAccessToken(null);
117
+ clearRefreshToken();
118
+ listeners.forEach((listener) => {
119
+ try {
120
+ listener(null, previousToken);
121
+ } catch (err) {
122
+ console.warn("Token listener error:", err);
123
+ }
124
+ });
125
+ }
126
+ var REFRESH_TOKEN_KEY = "auth_refresh_token";
127
+ function isHttpDevelopment() {
128
+ var _a;
129
+ try {
130
+ return typeof window !== "undefined" && ((_a = window.location) == null ? void 0 : _a.protocol) === "http:";
131
+ } catch (err) {
132
+ return false;
133
+ }
134
+ }
135
+ function setRefreshToken(token) {
136
+ if (!token) {
137
+ clearRefreshToken();
138
+ return;
139
+ }
140
+ if (isHttpDevelopment()) {
141
+ try {
142
+ localStorage.setItem(REFRESH_TOKEN_KEY, token);
143
+ console.log("\u{1F4E6} Refresh token stored in localStorage (HTTP dev mode)");
144
+ } catch (err) {
145
+ console.warn("Could not store refresh token:", err);
146
+ }
147
+ } else {
148
+ console.log("\u{1F512} Refresh token managed by server httpOnly cookie (production mode)");
149
+ }
150
+ }
151
+ function getRefreshToken() {
152
+ if (isHttpDevelopment()) {
153
+ try {
154
+ const token = localStorage.getItem(REFRESH_TOKEN_KEY);
155
+ return token;
156
+ } catch (err) {
157
+ console.warn("Could not read refresh token:", err);
158
+ return null;
159
+ }
160
+ }
161
+ return null;
162
+ }
163
+ function clearRefreshToken() {
164
+ try {
165
+ localStorage.removeItem(REFRESH_TOKEN_KEY);
166
+ } catch (err) {
167
+ }
168
+ try {
169
+ document.cookie = `${REFRESH_COOKIE}=; Path=/; SameSite=Strict${secureAttribute()}; Expires=Thu, 01 Jan 1970 00:00:00 GMT`;
170
+ } catch (err) {
171
+ console.warn("Could not clear refresh token cookie:", err);
172
+ }
173
+ try {
174
+ sessionStorage.removeItem(REFRESH_COOKIE);
175
+ } catch (err) {
176
+ }
177
+ }
178
+
179
+ // config.js
180
+ var config = {
181
+ clientKey: null,
182
+ authBaseUrl: null,
183
+ redirectUri: null,
184
+ accountUiUrl: null,
185
+ isRouter: false,
186
+ // ✅ Add router flag
187
+ // ========== SESSION SECURITY SETTINGS ==========
188
+ // Buffer time (in seconds) before token expiry to trigger proactive refresh
189
+ // With 5-minute access tokens, refreshing 60s before expiry ensures seamless UX
190
+ tokenRefreshBuffer: 60,
191
+ // Interval (in milliseconds) for periodic session validation
192
+ // Validates that the session still exists in Keycloak (not deleted by admin)
193
+ // Default: 2 minutes (120000ms) - balances responsiveness vs server load
194
+ sessionValidationInterval: 2 * 60 * 1e3,
195
+ // Enable/disable periodic session validation
196
+ // When enabled, the client will ping the server to verify session is still active
197
+ enableSessionValidation: true,
198
+ // Enable/disable proactive token refresh
199
+ // When enabled, tokens are refreshed before they expire (using tokenRefreshBuffer)
200
+ enableProactiveRefresh: true,
201
+ // Validate session when browser tab becomes visible again
202
+ // Catches session deletions that happened while the tab was inactive
203
+ validateOnVisibility: true
204
+ };
205
+ function getConfig() {
206
+ return { ...config };
207
+ }
208
+ function isRouterMode() {
209
+ return config.isRouter;
210
+ }
211
+
212
+ // core.js
213
+ var callbackProcessed = false;
214
+ function login(clientKeyArg, redirectUriArg) {
215
+ resetCallbackState();
216
+ const {
217
+ clientKey: defaultClientKey,
218
+ authBaseUrl,
219
+ redirectUri: defaultRedirectUri,
220
+ accountUiUrl
221
+ } = getConfig();
222
+ const clientKey = clientKeyArg || defaultClientKey;
223
+ const redirectUri = redirectUriArg || defaultRedirectUri;
224
+ console.log("\u{1F504} Smart Login initiated:", {
225
+ mode: isRouterMode() ? "ROUTER" : "CLIENT",
226
+ clientKey,
227
+ redirectUri
228
+ });
229
+ if (!clientKey || !redirectUri) {
230
+ throw new Error("Missing clientKey or redirectUri");
231
+ }
232
+ sessionStorage.setItem("originalApp", clientKey);
233
+ sessionStorage.setItem("returnUrl", redirectUri);
234
+ if (isRouterMode()) {
235
+ return routerLogin(clientKey, redirectUri);
236
+ } else {
237
+ return clientLogin(clientKey, redirectUri);
238
+ }
239
+ }
240
+ function routerLogin(clientKey, redirectUri) {
241
+ const { authBaseUrl } = getConfig();
242
+ const params = new URLSearchParams();
243
+ if (redirectUri) {
244
+ params.append("redirect_uri", redirectUri);
245
+ }
246
+ const query = params.toString();
247
+ const backendLoginUrl = `${authBaseUrl}/login/${clientKey}${query ? `?${query}` : ""}`;
248
+ console.log("\u{1F3ED} Router Login: Direct backend authentication", {
249
+ clientKey,
250
+ redirectUri,
251
+ backendUrl: backendLoginUrl
252
+ });
253
+ window.location.href = backendLoginUrl;
254
+ }
255
+ function clientLogin(clientKey, redirectUri) {
256
+ const { accountUiUrl } = getConfig();
257
+ const params = new URLSearchParams({
258
+ client: clientKey
259
+ });
260
+ if (redirectUri) {
261
+ params.append("redirect_uri", redirectUri);
262
+ }
263
+ const centralizedLoginUrl = `${accountUiUrl}/login?${params.toString()}`;
264
+ console.log("\u{1F504} Client Login: Redirecting to centralized login", {
265
+ clientKey,
266
+ redirectUri,
267
+ centralizedUrl: centralizedLoginUrl
268
+ });
269
+ window.location.href = centralizedLoginUrl;
270
+ }
271
+ function logout() {
272
+ resetCallbackState();
273
+ const { clientKey, authBaseUrl, accountUiUrl } = getConfig();
274
+ const token = getToken();
275
+ console.log("\u{1F6AA} Smart Logout initiated");
276
+ clearToken();
277
+ clearRefreshToken();
278
+ sessionStorage.removeItem("originalApp");
279
+ sessionStorage.removeItem("returnUrl");
280
+ if (isRouterMode()) {
281
+ return routerLogout(clientKey, authBaseUrl, accountUiUrl, token);
282
+ } else {
283
+ return clientLogout(clientKey, accountUiUrl);
284
+ }
285
+ }
286
+ async function routerLogout(clientKey, authBaseUrl, accountUiUrl, token) {
287
+ console.log("\u{1F3ED} Router Logout");
288
+ const refreshToken2 = getRefreshToken();
289
+ try {
290
+ const response = await fetch(`${authBaseUrl}/logout/${clientKey}`, {
291
+ method: "POST",
292
+ credentials: "include",
293
+ headers: {
294
+ "Authorization": token ? `Bearer ${token}` : "",
295
+ "Content-Type": "application/json"
296
+ },
297
+ body: JSON.stringify({
298
+ refreshToken: refreshToken2
299
+ })
300
+ });
301
+ const data = await response.json();
302
+ console.log("\u2705 Logout response:", data);
303
+ clearRefreshToken();
304
+ clearToken();
305
+ console.log("\u{1F504} Redirecting to login (skipping Keycloak confirmation)");
306
+ window.location.href = "/login";
307
+ } catch (error) {
308
+ console.warn("\u26A0\uFE0F Logout failed:", error);
309
+ clearRefreshToken();
310
+ clearToken();
311
+ window.location.href = "/login";
312
+ }
313
+ }
314
+ function clientLogout(clientKey, accountUiUrl) {
315
+ console.log("\u{1F504} Client Logout");
316
+ const logoutUrl = `${accountUiUrl}/login?client=${clientKey}&logout=true`;
317
+ window.location.href = logoutUrl;
318
+ }
319
+ function resetCallbackState() {
320
+ callbackProcessed = false;
321
+ }
322
+ var refreshInProgress = false;
323
+ var refreshPromise = null;
324
+ async function refreshToken() {
325
+ const { clientKey, authBaseUrl } = getConfig();
326
+ if (refreshInProgress && refreshPromise) {
327
+ console.log("\u{1F504} Token refresh already in progress, waiting...");
328
+ return refreshPromise;
329
+ }
330
+ refreshInProgress = true;
331
+ refreshPromise = (async () => {
332
+ try {
333
+ const storedRefreshToken = getRefreshToken();
334
+ console.log("\u{1F504} Refreshing token:", {
335
+ clientKey,
336
+ mode: isRouterMode() ? "ROUTER" : "CLIENT",
337
+ hasStoredRefreshToken: !!storedRefreshToken
338
+ });
339
+ const requestOptions = {
340
+ method: "POST",
341
+ credentials: "include",
342
+ // ✅ Include httpOnly cookies (for HTTPS)
343
+ headers: {
344
+ "Content-Type": "application/json"
345
+ }
346
+ };
347
+ if (storedRefreshToken) {
348
+ requestOptions.headers["X-Refresh-Token"] = storedRefreshToken;
349
+ requestOptions.body = JSON.stringify({ refreshToken: storedRefreshToken });
350
+ }
351
+ const response = await fetch(`${authBaseUrl}/refresh/${clientKey}`, requestOptions);
352
+ if (!response.ok) {
353
+ const errorText = await response.text();
354
+ console.error("\u274C Token refresh failed:", response.status, errorText);
355
+ throw new Error(`Refresh failed: ${response.status}`);
356
+ }
357
+ const data = await response.json();
358
+ const { access_token, refresh_token: new_refresh_token } = data;
359
+ if (!access_token) {
360
+ throw new Error("No access token in refresh response");
361
+ }
362
+ setToken(access_token);
363
+ if (new_refresh_token) {
364
+ setRefreshToken(new_refresh_token);
365
+ console.log("\u{1F504} New refresh token stored from rotation");
366
+ }
367
+ console.log("\u2705 Token refresh successful, listeners notified");
368
+ return access_token;
369
+ } catch (err) {
370
+ console.error("\u274C Token refresh error:", err);
371
+ clearToken();
372
+ clearRefreshToken();
373
+ throw err;
374
+ } finally {
375
+ refreshInProgress = false;
376
+ refreshPromise = null;
377
+ }
378
+ })();
379
+ return refreshPromise;
380
+ }
381
+ async function validateCurrentSession() {
382
+ try {
383
+ const { authBaseUrl } = getConfig();
384
+ const token = getToken();
385
+ if (!token || !authBaseUrl) {
386
+ return false;
387
+ }
388
+ const response = await fetch(`${authBaseUrl}/account/validate-session`, {
389
+ method: "GET",
390
+ headers: {
391
+ "Authorization": `Bearer ${token}`,
392
+ "Content-Type": "application/json"
393
+ },
394
+ credentials: "include"
395
+ });
396
+ if (!response.ok) {
397
+ if (response.status === 401) {
398
+ return false;
399
+ }
400
+ throw new Error(`HTTP ${response.status}: ${response.statusText}`);
401
+ }
402
+ const data = await response.json();
403
+ return data.valid === true;
404
+ } catch (error) {
405
+ console.warn("Session validation failed:", error.message);
406
+ if (error.message.includes("401")) {
407
+ return false;
408
+ }
409
+ throw error;
410
+ }
411
+ }
412
+ var proactiveRefreshTimer = null;
413
+ var sessionValidationTimer = null;
414
+ var visibilityHandler = null;
415
+ var sessionInvalidCallbacks = /* @__PURE__ */ new Set();
416
+ function onSessionInvalid(callback) {
417
+ if (typeof callback === "function") {
418
+ sessionInvalidCallbacks.add(callback);
419
+ }
420
+ return () => sessionInvalidCallbacks.delete(callback);
421
+ }
422
+ function notifySessionInvalid(reason = "session_deleted") {
423
+ console.log("\u{1F6A8} Session invalidated:", reason);
424
+ sessionInvalidCallbacks.forEach((callback) => {
425
+ try {
426
+ callback(reason);
427
+ } catch (err) {
428
+ console.error("Session invalid callback error:", err);
429
+ }
430
+ });
431
+ }
432
+ function startProactiveRefresh() {
433
+ const { enableProactiveRefresh, tokenRefreshBuffer } = getConfig();
434
+ if (!enableProactiveRefresh) {
435
+ console.log("\u23F8\uFE0F Proactive refresh disabled by config");
436
+ return null;
437
+ }
438
+ stopProactiveRefresh();
439
+ const token = getToken();
440
+ if (!token) {
441
+ console.log("\u23F8\uFE0F No token, skipping proactive refresh setup");
442
+ return null;
443
+ }
444
+ const timeUntilExpiry = getTimeUntilExpiry(token);
445
+ if (timeUntilExpiry <= 0) {
446
+ console.log("\u26A0\uFE0F Token already expired, attempting immediate refresh");
447
+ refreshToken().catch((err) => {
448
+ console.error("\u274C Immediate refresh failed:", err);
449
+ notifySessionInvalid("token_expired");
450
+ });
451
+ return null;
452
+ }
453
+ const refreshIn = Math.max(0, timeUntilExpiry - tokenRefreshBuffer) * 1e3;
454
+ console.log(`\u{1F504} Scheduling proactive refresh in ${Math.round(refreshIn / 1e3)}s (token expires in ${timeUntilExpiry}s)`);
455
+ proactiveRefreshTimer = setTimeout(async () => {
456
+ var _a;
457
+ try {
458
+ console.log("\u{1F504} Proactive token refresh triggered");
459
+ await refreshToken();
460
+ console.log("\u2705 Proactive refresh successful, scheduling next refresh");
461
+ startProactiveRefresh();
462
+ } catch (err) {
463
+ console.error("\u274C Proactive refresh failed:", err);
464
+ const errorMessage = ((_a = err.message) == null ? void 0 : _a.toLowerCase()) || "";
465
+ const isPermanentFailure = errorMessage.includes("401") || errorMessage.includes("revoked") || errorMessage.includes("invalid") || errorMessage.includes("expired") || errorMessage.includes("unauthorized");
466
+ if (isPermanentFailure) {
467
+ console.log("\u{1F6A8} Token permanently invalid, triggering session expiry");
468
+ notifySessionInvalid("refresh_token_revoked");
469
+ } else {
470
+ proactiveRefreshTimer = setTimeout(() => startProactiveRefresh(), 3e4);
471
+ }
472
+ }
473
+ }, refreshIn);
474
+ return proactiveRefreshTimer;
475
+ }
476
+ function stopProactiveRefresh() {
477
+ if (proactiveRefreshTimer) {
478
+ clearTimeout(proactiveRefreshTimer);
479
+ proactiveRefreshTimer = null;
480
+ console.log("\u23F9\uFE0F Proactive refresh stopped");
481
+ }
482
+ }
483
+ function startSessionMonitor(onInvalid) {
484
+ const { enableSessionValidation, sessionValidationInterval, validateOnVisibility } = getConfig();
485
+ if (!enableSessionValidation) {
486
+ console.log("\u23F8\uFE0F Session validation disabled by config");
487
+ return null;
488
+ }
489
+ if (onInvalid && typeof onInvalid === "function") {
490
+ sessionInvalidCallbacks.add(onInvalid);
491
+ }
492
+ stopSessionMonitor();
493
+ const token = getToken();
494
+ if (!token) {
495
+ console.log("\u23F8\uFE0F No token, skipping session monitor setup");
496
+ return null;
497
+ }
498
+ console.log(`\u{1F441}\uFE0F Starting session monitor (interval: ${sessionValidationInterval / 1e3}s)`);
499
+ sessionValidationTimer = setInterval(async () => {
500
+ try {
501
+ const currentToken = getToken();
502
+ if (!currentToken) {
503
+ console.log("\u23F8\uFE0F No token, stopping session validation");
504
+ stopSessionMonitor();
505
+ return;
506
+ }
507
+ console.log("\u{1F50D} Validating session...");
508
+ const isValid = await validateCurrentSession();
509
+ if (!isValid) {
510
+ console.log("\u274C Session no longer valid on server");
511
+ stopSessionMonitor();
512
+ stopProactiveRefresh();
513
+ clearToken();
514
+ clearRefreshToken();
515
+ notifySessionInvalid("session_deleted");
516
+ } else {
517
+ console.log("\u2705 Session still valid");
518
+ }
519
+ } catch (error) {
520
+ console.warn("\u26A0\uFE0F Session validation check failed:", error.message);
521
+ }
522
+ }, sessionValidationInterval);
523
+ if (validateOnVisibility && typeof document !== "undefined") {
524
+ visibilityHandler = async () => {
525
+ if (document.visibilityState === "visible") {
526
+ const currentToken = getToken();
527
+ if (!currentToken) return;
528
+ console.log("\u{1F441}\uFE0F Tab visible - validating session");
529
+ try {
530
+ const isValid = await validateCurrentSession();
531
+ if (!isValid) {
532
+ console.log("\u274C Session expired while tab was hidden");
533
+ stopSessionMonitor();
534
+ stopProactiveRefresh();
535
+ clearToken();
536
+ clearRefreshToken();
537
+ notifySessionInvalid("session_deleted_while_hidden");
538
+ }
539
+ } catch (error) {
540
+ console.warn("\u26A0\uFE0F Visibility check failed:", error.message);
541
+ }
542
+ }
543
+ };
544
+ document.addEventListener("visibilitychange", visibilityHandler);
545
+ }
546
+ return sessionValidationTimer;
547
+ }
548
+ function stopSessionMonitor() {
549
+ if (sessionValidationTimer) {
550
+ clearInterval(sessionValidationTimer);
551
+ sessionValidationTimer = null;
552
+ console.log("\u23F9\uFE0F Session monitor stopped");
553
+ }
554
+ if (visibilityHandler && typeof document !== "undefined") {
555
+ document.removeEventListener("visibilitychange", visibilityHandler);
556
+ visibilityHandler = null;
557
+ }
558
+ }
559
+ function startSessionSecurity(onSessionInvalidCallback) {
560
+ console.log("\u{1F510} Starting session security (proactive refresh + session monitoring)");
561
+ startProactiveRefresh();
562
+ startSessionMonitor(onSessionInvalidCallback);
563
+ return {
564
+ stopAll: () => {
565
+ stopProactiveRefresh();
566
+ stopSessionMonitor();
567
+ }
568
+ };
569
+ }
570
+ function stopSessionSecurity() {
571
+ stopProactiveRefresh();
572
+ stopSessionMonitor();
573
+ sessionInvalidCallbacks.clear();
574
+ console.log("\u{1F510} Session security stopped");
575
+ }
576
+
577
+ // react/AuthProvider.jsx
578
+ var AuthContext = (0, import_react.createContext)();
579
+ function AuthProvider({ children, onSessionExpired }) {
580
+ const [token, setTokenState] = (0, import_react.useState)(getToken());
581
+ const [user, setUser] = (0, import_react.useState)(null);
582
+ const [loading, setLoading] = (0, import_react.useState)(!!token);
583
+ const [sessionValid, setSessionValid] = (0, import_react.useState)(true);
584
+ const sessionSecurityRef = (0, import_react.useRef)(null);
585
+ const handleSessionInvalid = (reason) => {
586
+ console.log("\u{1F6A8} AuthProvider: Session invalidated -", reason);
587
+ setSessionValid(false);
588
+ setUser(null);
589
+ setTokenState(null);
590
+ if (onSessionExpired && typeof onSessionExpired === "function") {
591
+ onSessionExpired(reason);
592
+ }
593
+ };
594
+ (0, import_react.useEffect)(() => {
595
+ if (token && !sessionSecurityRef.current) {
596
+ console.log("\u{1F510} AuthProvider: Starting session security");
597
+ const unsubscribe = onSessionInvalid(handleSessionInvalid);
598
+ sessionSecurityRef.current = startSessionSecurity(handleSessionInvalid);
599
+ return () => {
600
+ unsubscribe();
601
+ if (sessionSecurityRef.current) {
602
+ sessionSecurityRef.current.stopAll();
603
+ sessionSecurityRef.current = null;
604
+ }
605
+ };
606
+ }
607
+ if (!token && sessionSecurityRef.current) {
608
+ sessionSecurityRef.current.stopAll();
609
+ sessionSecurityRef.current = null;
610
+ }
611
+ }, [token]);
612
+ (0, import_react.useEffect)(() => {
613
+ console.log("\u{1F50D} AuthProvider useEffect triggered:", {
614
+ hasToken: !!token,
615
+ tokenLength: token == null ? void 0 : token.length
616
+ });
617
+ if (!token) {
618
+ console.log("\u26A0\uFE0F AuthProvider: No token, setting loading=false");
619
+ setLoading(false);
620
+ return;
621
+ }
622
+ const { authBaseUrl } = getConfig();
623
+ if (!authBaseUrl) {
624
+ console.warn("AuthProvider: No authBaseUrl configured");
625
+ setLoading(false);
626
+ return;
627
+ }
628
+ console.log("\u{1F310} AuthProvider: Fetching profile with token...", {
629
+ authBaseUrl,
630
+ tokenPreview: token.slice(0, 50) + "..."
631
+ });
632
+ fetch(`${authBaseUrl}/account/profile`, {
633
+ headers: { Authorization: `Bearer ${token}` },
634
+ credentials: "include"
635
+ }).then((res) => {
636
+ console.log("\u{1F4E5} Profile response status:", res.status);
637
+ if (!res.ok) throw new Error("Failed to fetch user");
638
+ return res.json();
639
+ }).then((userData) => {
640
+ console.log("\u2705 Profile fetched successfully:", userData.email);
641
+ setUser(userData);
642
+ setSessionValid(true);
643
+ setLoading(false);
644
+ }).catch((err) => {
645
+ console.error("\u274C Fetch user error:", err);
646
+ clearToken();
647
+ setTokenState(null);
648
+ setUser(null);
649
+ setLoading(false);
650
+ });
651
+ }, [token]);
652
+ const login2 = (clientKey, redirectUri, state) => {
653
+ login(clientKey, redirectUri, state);
654
+ };
655
+ const logout2 = () => {
656
+ stopSessionSecurity();
657
+ sessionSecurityRef.current = null;
658
+ logout();
659
+ setUser(null);
660
+ setTokenState(null);
661
+ setSessionValid(true);
662
+ };
663
+ const value = {
664
+ token,
665
+ user,
666
+ loading,
667
+ login: login2,
668
+ logout: logout2,
669
+ isAuthenticated: !!token && !!user && sessionValid,
670
+ sessionValid,
671
+ setUser,
672
+ setToken: (newToken) => {
673
+ setToken(newToken);
674
+ setTokenState(newToken);
675
+ setSessionValid(true);
676
+ },
677
+ clearToken: () => {
678
+ stopSessionSecurity();
679
+ sessionSecurityRef.current = null;
680
+ clearToken();
681
+ setTokenState(null);
682
+ setUser(null);
683
+ }
684
+ };
685
+ return /* @__PURE__ */ import_react.default.createElement(AuthContext.Provider, { value }, children);
686
+ }
687
+ // Annotate the CommonJS export names for ESM import in node:
688
+ 0 && (module.exports = {
689
+ AuthContext,
690
+ AuthProvider
691
+ });
692
+ //# sourceMappingURL=AuthProvider.cjs.map