@spidy092/auth-client 2.1.8 โ†’ 3.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,910 @@
1
+ // react/useSessionMonitor.js
2
+ import { useQuery, useQueryClient } from "@tanstack/react-query";
3
+ import { useEffect as useEffect2, useCallback } from "react";
4
+
5
+ // token.js
6
+ import { jwtDecode } from "jwt-decode";
7
+ var accessToken = null;
8
+ var listeners = /* @__PURE__ */ new Set();
9
+ var REFRESH_COOKIE = "account_refresh_token";
10
+ var COOKIE_MAX_AGE = 7 * 24 * 60 * 60;
11
+ function secureAttribute() {
12
+ var _a;
13
+ try {
14
+ return typeof window !== "undefined" && ((_a = window.location) == null ? void 0 : _a.protocol) === "https:" ? "; Secure" : "";
15
+ } catch (err) {
16
+ return "";
17
+ }
18
+ }
19
+ function writeAccessToken(token) {
20
+ if (!token) {
21
+ try {
22
+ localStorage.removeItem("authToken");
23
+ } catch (err) {
24
+ console.warn("Could not clear token from localStorage:", err);
25
+ }
26
+ return;
27
+ }
28
+ try {
29
+ localStorage.setItem("authToken", token);
30
+ } catch (err) {
31
+ console.warn("Could not persist token to localStorage:", err);
32
+ }
33
+ }
34
+ function readAccessToken() {
35
+ try {
36
+ return localStorage.getItem("authToken");
37
+ } catch (err) {
38
+ console.warn("Could not read token from localStorage:", err);
39
+ return null;
40
+ }
41
+ }
42
+ function decode(token) {
43
+ try {
44
+ return jwtDecode(token);
45
+ } catch (err) {
46
+ return null;
47
+ }
48
+ }
49
+ function getTokenExpiryTime(token) {
50
+ if (!token) return null;
51
+ const decoded = decode(token);
52
+ if (!(decoded == null ? void 0 : decoded.exp)) return null;
53
+ return new Date(decoded.exp * 1e3);
54
+ }
55
+ function getTimeUntilExpiry(token) {
56
+ if (!token) return -1;
57
+ const decoded = decode(token);
58
+ if (!(decoded == null ? void 0 : decoded.exp)) return -1;
59
+ const now = Date.now() / 1e3;
60
+ return Math.floor(decoded.exp - now);
61
+ }
62
+ function willExpireSoon(token, withinSeconds = 60) {
63
+ const timeLeft = getTimeUntilExpiry(token);
64
+ return timeLeft >= 0 && timeLeft <= withinSeconds;
65
+ }
66
+ function setToken(token) {
67
+ const previousToken = accessToken;
68
+ accessToken = token || null;
69
+ writeAccessToken(accessToken);
70
+ if (previousToken !== accessToken) {
71
+ listeners.forEach((listener) => {
72
+ try {
73
+ listener(accessToken, previousToken);
74
+ } catch (err) {
75
+ console.warn("Token listener error:", err);
76
+ }
77
+ });
78
+ }
79
+ }
80
+ function getToken() {
81
+ if (accessToken) return accessToken;
82
+ accessToken = readAccessToken();
83
+ return accessToken;
84
+ }
85
+ function clearToken() {
86
+ if (!accessToken) {
87
+ writeAccessToken(null);
88
+ clearRefreshToken();
89
+ return;
90
+ }
91
+ const previousToken = accessToken;
92
+ accessToken = null;
93
+ writeAccessToken(null);
94
+ clearRefreshToken();
95
+ listeners.forEach((listener) => {
96
+ try {
97
+ listener(null, previousToken);
98
+ } catch (err) {
99
+ console.warn("Token listener error:", err);
100
+ }
101
+ });
102
+ }
103
+ var REFRESH_TOKEN_KEY = "auth_refresh_token";
104
+ var _persistRefreshToken = false;
105
+ function enableRefreshTokenPersistence(enabled) {
106
+ _persistRefreshToken = !!enabled;
107
+ console.log(`\u{1F527} Refresh token persistence: ${_persistRefreshToken ? "ENABLED" : "DISABLED"}`);
108
+ }
109
+ function shouldUseLocalStorage() {
110
+ var _a;
111
+ if (_persistRefreshToken) return true;
112
+ try {
113
+ return typeof window !== "undefined" && ((_a = window.location) == null ? void 0 : _a.protocol) === "http:";
114
+ } catch (err) {
115
+ return false;
116
+ }
117
+ }
118
+ function setRefreshToken(token) {
119
+ if (!token) {
120
+ clearRefreshToken();
121
+ return;
122
+ }
123
+ if (shouldUseLocalStorage()) {
124
+ try {
125
+ localStorage.setItem(REFRESH_TOKEN_KEY, token);
126
+ console.log(`\u{1F4E6} Refresh token stored in localStorage (${_persistRefreshToken ? "persistence enabled" : "HTTP dev mode"})`);
127
+ } catch (err) {
128
+ console.warn("Could not store refresh token:", err);
129
+ }
130
+ } else {
131
+ console.log("\u{1F512} Refresh token managed by server httpOnly cookie (production mode)");
132
+ }
133
+ }
134
+ function getRefreshToken() {
135
+ if (shouldUseLocalStorage()) {
136
+ try {
137
+ const token = localStorage.getItem(REFRESH_TOKEN_KEY);
138
+ return token;
139
+ } catch (err) {
140
+ console.warn("Could not read refresh token:", err);
141
+ return null;
142
+ }
143
+ }
144
+ return null;
145
+ }
146
+ function clearRefreshToken() {
147
+ try {
148
+ localStorage.removeItem(REFRESH_TOKEN_KEY);
149
+ } catch (err) {
150
+ }
151
+ try {
152
+ document.cookie = `${REFRESH_COOKIE}=; Path=/; SameSite=Strict${secureAttribute()}; Expires=Thu, 01 Jan 1970 00:00:00 GMT`;
153
+ } catch (err) {
154
+ console.warn("Could not clear refresh token cookie:", err);
155
+ }
156
+ try {
157
+ sessionStorage.removeItem(REFRESH_COOKIE);
158
+ } catch (err) {
159
+ }
160
+ }
161
+ function addTokenListener(listener) {
162
+ if (typeof listener !== "function") {
163
+ throw new Error("Token listener must be a function");
164
+ }
165
+ listeners.add(listener);
166
+ return () => {
167
+ listeners.delete(listener);
168
+ };
169
+ }
170
+ function removeTokenListener(listener) {
171
+ listeners.delete(listener);
172
+ }
173
+ function getListenerCount() {
174
+ return listeners.size;
175
+ }
176
+
177
+ // config.js
178
+ var config = {
179
+ clientKey: null,
180
+ authBaseUrl: null,
181
+ redirectUri: null,
182
+ accountUiUrl: null,
183
+ isRouter: false,
184
+ // โœ… Add router flag
185
+ // ========== SESSION SECURITY SETTINGS ==========
186
+ // Buffer time (in seconds) before token expiry to trigger proactive refresh
187
+ // With 5-minute access tokens, refreshing 60s before expiry ensures seamless UX
188
+ tokenRefreshBuffer: 60,
189
+ // Interval (in milliseconds) for periodic session validation
190
+ // Validates that the session still exists in Keycloak (not deleted by admin)
191
+ // Default: 15 minutes (900000ms) - Increased from 2m to avoid frequent checks
192
+ sessionValidationInterval: 15 * 60 * 1e3,
193
+ // Enable/disable periodic session validation
194
+ // When enabled, the client will ping the server to verify session is still active
195
+ enableSessionValidation: true,
196
+ // Enable/disable proactive token refresh
197
+ // When enabled, tokens are refreshed before they expire (using tokenRefreshBuffer)
198
+ enableProactiveRefresh: true,
199
+ // Validate session when browser tab becomes visible again
200
+ // Catches session deletions that happened while the tab was inactive
201
+ validateOnVisibility: true,
202
+ // ========== REFRESH TOKEN PERSISTENCE ==========
203
+ // When true, stores refresh token in localStorage even on HTTPS
204
+ // Required for local dev with mkcert/self-signed certs where httpOnly cookies
205
+ // may not work reliably across origins
206
+ // โš ๏ธ In true production, set to false and rely on httpOnly cookies
207
+ persistRefreshToken: false
208
+ };
209
+ function setConfig(customConfig = {}) {
210
+ if (!customConfig.clientKey || !customConfig.authBaseUrl) {
211
+ throw new Error("Missing required config: clientKey and authBaseUrl are required");
212
+ }
213
+ config = {
214
+ ...config,
215
+ ...customConfig,
216
+ redirectUri: customConfig.redirectUri || window.location.origin + "/callback",
217
+ // โœ… Auto-detect router mode
218
+ isRouter: customConfig.isRouter || customConfig.clientKey === "account-ui"
219
+ };
220
+ if (config.persistRefreshToken) {
221
+ enableRefreshTokenPersistence(true);
222
+ console.log("\u{1F4E6} Refresh token persistence ENABLED (localStorage on HTTPS)");
223
+ }
224
+ console.log(`\u{1F527} Auth Client Mode: ${config.isRouter ? "ROUTER" : "CLIENT"}`, {
225
+ clientKey: config.clientKey,
226
+ isRouter: config.isRouter,
227
+ persistRefreshToken: config.persistRefreshToken
228
+ });
229
+ }
230
+ function getConfig() {
231
+ return { ...config };
232
+ }
233
+ function isRouterMode() {
234
+ return config.isRouter;
235
+ }
236
+
237
+ // core.js
238
+ var callbackProcessed = false;
239
+ function login(clientKeyArg, redirectUriArg) {
240
+ resetCallbackState();
241
+ const {
242
+ clientKey: defaultClientKey,
243
+ authBaseUrl,
244
+ redirectUri: defaultRedirectUri,
245
+ accountUiUrl
246
+ } = getConfig();
247
+ const clientKey = clientKeyArg || defaultClientKey;
248
+ const redirectUri = redirectUriArg || defaultRedirectUri;
249
+ console.log("\u{1F504} Smart Login initiated:", {
250
+ mode: isRouterMode() ? "ROUTER" : "CLIENT",
251
+ clientKey,
252
+ redirectUri
253
+ });
254
+ if (!clientKey || !redirectUri) {
255
+ throw new Error("Missing clientKey or redirectUri");
256
+ }
257
+ sessionStorage.setItem("originalApp", clientKey);
258
+ sessionStorage.setItem("returnUrl", redirectUri);
259
+ if (isRouterMode()) {
260
+ return routerLogin(clientKey, redirectUri);
261
+ } else {
262
+ return clientLogin(clientKey, redirectUri);
263
+ }
264
+ }
265
+ function routerLogin(clientKey, redirectUri) {
266
+ const { authBaseUrl } = getConfig();
267
+ const params = new URLSearchParams();
268
+ if (redirectUri) {
269
+ params.append("redirect_uri", redirectUri);
270
+ }
271
+ const query = params.toString();
272
+ const backendLoginUrl = `${authBaseUrl}/login/${clientKey}${query ? `?${query}` : ""}`;
273
+ console.log("\u{1F3ED} Router Login: Direct backend authentication", {
274
+ clientKey,
275
+ redirectUri,
276
+ backendUrl: backendLoginUrl
277
+ });
278
+ window.location.href = backendLoginUrl;
279
+ }
280
+ function clientLogin(clientKey, redirectUri) {
281
+ const { accountUiUrl } = getConfig();
282
+ const params = new URLSearchParams({
283
+ client: clientKey
284
+ });
285
+ if (redirectUri) {
286
+ params.append("redirect_uri", redirectUri);
287
+ }
288
+ const centralizedLoginUrl = `${accountUiUrl}/login?${params.toString()}`;
289
+ console.log("\u{1F504} Client Login: Redirecting to centralized login", {
290
+ clientKey,
291
+ redirectUri,
292
+ centralizedUrl: centralizedLoginUrl
293
+ });
294
+ window.location.href = centralizedLoginUrl;
295
+ }
296
+ function logout() {
297
+ resetCallbackState();
298
+ const { clientKey, authBaseUrl, accountUiUrl } = getConfig();
299
+ const token = getToken();
300
+ console.log("\u{1F6AA} Smart Logout initiated");
301
+ clearToken();
302
+ clearRefreshToken();
303
+ sessionStorage.removeItem("originalApp");
304
+ sessionStorage.removeItem("returnUrl");
305
+ if (isRouterMode()) {
306
+ return routerLogout(clientKey, authBaseUrl, accountUiUrl, token);
307
+ } else {
308
+ return clientLogout(clientKey, accountUiUrl);
309
+ }
310
+ }
311
+ async function routerLogout(clientKey, authBaseUrl, accountUiUrl, token) {
312
+ console.log("\u{1F3ED} Router Logout");
313
+ const refreshToken2 = getRefreshToken();
314
+ try {
315
+ const response = await fetch(`${authBaseUrl}/logout/${clientKey}`, {
316
+ method: "POST",
317
+ credentials: "include",
318
+ headers: {
319
+ "Authorization": token ? `Bearer ${token}` : "",
320
+ "Content-Type": "application/json"
321
+ },
322
+ body: JSON.stringify({
323
+ refreshToken: refreshToken2
324
+ })
325
+ });
326
+ const data = await response.json();
327
+ console.log("\u2705 Logout response:", data);
328
+ clearRefreshToken();
329
+ clearToken();
330
+ console.log("\u{1F504} Redirecting to login (skipping Keycloak confirmation)");
331
+ window.location.href = "/login";
332
+ } catch (error) {
333
+ console.warn("\u26A0\uFE0F Logout failed:", error);
334
+ clearRefreshToken();
335
+ clearToken();
336
+ window.location.href = "/login";
337
+ }
338
+ }
339
+ function clientLogout(clientKey, accountUiUrl) {
340
+ console.log("\u{1F504} Client Logout");
341
+ const logoutUrl = `${accountUiUrl}/login?client=${clientKey}&logout=true`;
342
+ window.location.href = logoutUrl;
343
+ }
344
+ function handleCallback() {
345
+ var _a;
346
+ const params = new URLSearchParams(window.location.search);
347
+ const accessToken2 = params.get("access_token");
348
+ const error = params.get("error");
349
+ console.log("\u{1F504} Callback handling:", {
350
+ hasAccessToken: !!accessToken2,
351
+ error
352
+ });
353
+ if (callbackProcessed) {
354
+ const existingToken = getToken();
355
+ if (existingToken) {
356
+ console.log("\u2705 Callback already processed, returning existing token");
357
+ return existingToken;
358
+ }
359
+ callbackProcessed = false;
360
+ }
361
+ callbackProcessed = true;
362
+ sessionStorage.removeItem("originalApp");
363
+ sessionStorage.removeItem("returnUrl");
364
+ if (error) {
365
+ const errorDescription = params.get("error_description") || error;
366
+ throw new Error(`Authentication failed: ${errorDescription}`);
367
+ }
368
+ if (accessToken2) {
369
+ setToken(accessToken2);
370
+ const refreshTokenInUrl = params.get("refresh_token");
371
+ if (refreshTokenInUrl) {
372
+ const { persistRefreshToken } = getConfig();
373
+ const isHttpDev = typeof window !== "undefined" && ((_a = window.location) == null ? void 0 : _a.protocol) === "http:";
374
+ if (persistRefreshToken || isHttpDev) {
375
+ console.log(`\u{1F4E6} Storing refresh token from callback URL (${persistRefreshToken ? "persistence enabled" : "HTTP dev mode"})`);
376
+ setRefreshToken(refreshTokenInUrl);
377
+ } else {
378
+ console.log("\u{1F512} HTTPS mode: Refresh token is in httpOnly cookie (ignoring URL param)");
379
+ }
380
+ }
381
+ const url = new URL(window.location);
382
+ url.searchParams.delete("access_token");
383
+ url.searchParams.delete("refresh_token");
384
+ url.searchParams.delete("state");
385
+ url.searchParams.delete("error");
386
+ url.searchParams.delete("error_description");
387
+ window.history.replaceState({}, "", url);
388
+ console.log("\u2705 Callback processed successfully, token stored");
389
+ return accessToken2;
390
+ }
391
+ throw new Error("No access token found in callback URL");
392
+ }
393
+ function resetCallbackState() {
394
+ callbackProcessed = false;
395
+ }
396
+ var refreshInProgress = false;
397
+ var refreshPromise = null;
398
+ async function refreshToken() {
399
+ const { clientKey, authBaseUrl } = getConfig();
400
+ if (refreshInProgress && refreshPromise) {
401
+ console.log("\u{1F504} Token refresh already in progress, waiting...");
402
+ return refreshPromise;
403
+ }
404
+ refreshInProgress = true;
405
+ refreshPromise = (async () => {
406
+ try {
407
+ const storedRefreshToken = getRefreshToken();
408
+ console.log("\u{1F504} Refreshing token:", {
409
+ clientKey,
410
+ mode: isRouterMode() ? "ROUTER" : "CLIENT",
411
+ hasStoredRefreshToken: !!storedRefreshToken
412
+ });
413
+ const requestOptions = {
414
+ method: "POST",
415
+ credentials: "include",
416
+ // โœ… Include httpOnly cookies (for HTTPS)
417
+ headers: {
418
+ "Content-Type": "application/json"
419
+ }
420
+ };
421
+ if (storedRefreshToken) {
422
+ requestOptions.headers["X-Refresh-Token"] = storedRefreshToken;
423
+ requestOptions.body = JSON.stringify({ refreshToken: storedRefreshToken });
424
+ }
425
+ const response = await fetch(`${authBaseUrl}/refresh/${clientKey}`, requestOptions);
426
+ if (!response.ok) {
427
+ const errorText = await response.text();
428
+ console.error("\u274C Token refresh failed:", response.status, errorText);
429
+ throw new Error(`Refresh failed: ${response.status}`);
430
+ }
431
+ const data = await response.json();
432
+ const { access_token, refresh_token: new_refresh_token } = data;
433
+ if (!access_token) {
434
+ throw new Error("No access token in refresh response");
435
+ }
436
+ setToken(access_token);
437
+ if (new_refresh_token) {
438
+ setRefreshToken(new_refresh_token);
439
+ console.log("\u{1F504} New refresh token stored from rotation");
440
+ }
441
+ console.log("\u2705 Token refresh successful, listeners notified");
442
+ return access_token;
443
+ } catch (err) {
444
+ console.error("\u274C Token refresh error:", err);
445
+ clearToken();
446
+ clearRefreshToken();
447
+ throw err;
448
+ } finally {
449
+ refreshInProgress = false;
450
+ refreshPromise = null;
451
+ }
452
+ })();
453
+ return refreshPromise;
454
+ }
455
+ async function validateCurrentSession() {
456
+ try {
457
+ const { authBaseUrl } = getConfig();
458
+ const token = getToken();
459
+ if (!token || !authBaseUrl) {
460
+ return false;
461
+ }
462
+ const response = await fetch(`${authBaseUrl}/account/validate-session`, {
463
+ method: "GET",
464
+ headers: {
465
+ "Authorization": `Bearer ${token}`,
466
+ "Content-Type": "application/json"
467
+ },
468
+ credentials: "include"
469
+ });
470
+ if (!response.ok) {
471
+ if (response.status === 401) {
472
+ return false;
473
+ }
474
+ throw new Error(`HTTP ${response.status}: ${response.statusText}`);
475
+ }
476
+ const data = await response.json();
477
+ return data.valid === true;
478
+ } catch (error) {
479
+ console.warn("Session validation failed:", error.message);
480
+ if (error.message.includes("401")) {
481
+ return false;
482
+ }
483
+ throw error;
484
+ }
485
+ }
486
+ var proactiveRefreshTimer = null;
487
+ var sessionValidationTimer = null;
488
+ var visibilityHandler = null;
489
+ var sessionInvalidCallbacks = /* @__PURE__ */ new Set();
490
+ function onSessionInvalid(callback) {
491
+ if (typeof callback === "function") {
492
+ sessionInvalidCallbacks.add(callback);
493
+ }
494
+ return () => sessionInvalidCallbacks.delete(callback);
495
+ }
496
+ function notifySessionInvalid(reason = "session_deleted") {
497
+ console.log("\u{1F6A8} Session invalidated:", reason);
498
+ sessionInvalidCallbacks.forEach((callback) => {
499
+ try {
500
+ callback(reason);
501
+ } catch (err) {
502
+ console.error("Session invalid callback error:", err);
503
+ }
504
+ });
505
+ }
506
+ function startProactiveRefresh() {
507
+ const { enableProactiveRefresh, tokenRefreshBuffer } = getConfig();
508
+ if (!enableProactiveRefresh) {
509
+ console.log("\u23F8\uFE0F Proactive refresh disabled by config");
510
+ return null;
511
+ }
512
+ stopProactiveRefresh();
513
+ const token = getToken();
514
+ if (!token) {
515
+ console.log("\u23F8\uFE0F No token, skipping proactive refresh setup");
516
+ return null;
517
+ }
518
+ const timeUntilExpiry = getTimeUntilExpiry(token);
519
+ if (timeUntilExpiry <= 0) {
520
+ console.log("\u26A0\uFE0F Token already expired, attempting immediate refresh");
521
+ refreshToken().catch((err) => {
522
+ console.error("\u274C Immediate refresh failed:", err);
523
+ notifySessionInvalid("token_expired");
524
+ });
525
+ return null;
526
+ }
527
+ const refreshIn = Math.max(0, timeUntilExpiry - tokenRefreshBuffer) * 1e3;
528
+ console.log(`\u{1F504} Scheduling proactive refresh in ${Math.round(refreshIn / 1e3)}s (token expires in ${timeUntilExpiry}s)`);
529
+ proactiveRefreshTimer = setTimeout(async () => {
530
+ var _a;
531
+ try {
532
+ console.log("\u{1F504} Proactive token refresh triggered");
533
+ await refreshToken();
534
+ console.log("\u2705 Proactive refresh successful, scheduling next refresh");
535
+ startProactiveRefresh();
536
+ } catch (err) {
537
+ console.error("\u274C Proactive refresh failed:", err);
538
+ const errorMessage = ((_a = err.message) == null ? void 0 : _a.toLowerCase()) || "";
539
+ const isPermanentFailure = errorMessage.includes("401") || errorMessage.includes("revoked") || errorMessage.includes("invalid") || errorMessage.includes("expired") || errorMessage.includes("unauthorized");
540
+ if (isPermanentFailure) {
541
+ console.log("\u{1F6A8} Token permanently invalid, triggering session expiry");
542
+ notifySessionInvalid("refresh_token_revoked");
543
+ } else {
544
+ proactiveRefreshTimer = setTimeout(() => startProactiveRefresh(), 3e4);
545
+ }
546
+ }
547
+ }, refreshIn);
548
+ return proactiveRefreshTimer;
549
+ }
550
+ function stopProactiveRefresh() {
551
+ if (proactiveRefreshTimer) {
552
+ clearTimeout(proactiveRefreshTimer);
553
+ proactiveRefreshTimer = null;
554
+ console.log("\u23F9\uFE0F Proactive refresh stopped");
555
+ }
556
+ }
557
+ function startSessionMonitor(onInvalid) {
558
+ const { enableSessionValidation, sessionValidationInterval, validateOnVisibility } = getConfig();
559
+ if (!enableSessionValidation) {
560
+ console.log("\u23F8\uFE0F Session validation disabled by config");
561
+ return null;
562
+ }
563
+ if (onInvalid && typeof onInvalid === "function") {
564
+ sessionInvalidCallbacks.add(onInvalid);
565
+ }
566
+ stopSessionMonitor();
567
+ const token = getToken();
568
+ if (!token) {
569
+ console.log("\u23F8\uFE0F No token, skipping session monitor setup");
570
+ return null;
571
+ }
572
+ console.log(`\u{1F441}\uFE0F Starting session monitor (interval: ${sessionValidationInterval / 1e3}s)`);
573
+ sessionValidationTimer = setInterval(async () => {
574
+ try {
575
+ const currentToken = getToken();
576
+ if (!currentToken) {
577
+ console.log("\u23F8\uFE0F No token, stopping session validation");
578
+ stopSessionMonitor();
579
+ return;
580
+ }
581
+ console.log("\u{1F50D} Validating session...");
582
+ const isValid = await validateCurrentSession();
583
+ if (!isValid) {
584
+ console.log("\u274C Session no longer valid on server");
585
+ stopSessionMonitor();
586
+ stopProactiveRefresh();
587
+ clearToken();
588
+ clearRefreshToken();
589
+ notifySessionInvalid("session_deleted");
590
+ } else {
591
+ console.log("\u2705 Session still valid");
592
+ }
593
+ } catch (error) {
594
+ console.warn("\u26A0\uFE0F Session validation check failed:", error.message);
595
+ }
596
+ }, sessionValidationInterval);
597
+ if (validateOnVisibility && typeof document !== "undefined") {
598
+ visibilityHandler = async () => {
599
+ if (document.visibilityState === "visible") {
600
+ const currentToken = getToken();
601
+ if (!currentToken) return;
602
+ console.log("\u{1F441}\uFE0F Tab visible - validating session");
603
+ try {
604
+ const isValid = await validateCurrentSession();
605
+ if (!isValid) {
606
+ console.log("\u274C Session expired while tab was hidden");
607
+ stopSessionMonitor();
608
+ stopProactiveRefresh();
609
+ clearToken();
610
+ clearRefreshToken();
611
+ notifySessionInvalid("session_deleted_while_hidden");
612
+ }
613
+ } catch (error) {
614
+ console.warn("\u26A0\uFE0F Visibility check failed:", error.message);
615
+ }
616
+ }
617
+ };
618
+ document.addEventListener("visibilitychange", visibilityHandler);
619
+ }
620
+ return sessionValidationTimer;
621
+ }
622
+ function stopSessionMonitor() {
623
+ if (sessionValidationTimer) {
624
+ clearInterval(sessionValidationTimer);
625
+ sessionValidationTimer = null;
626
+ console.log("\u23F9\uFE0F Session monitor stopped");
627
+ }
628
+ if (visibilityHandler && typeof document !== "undefined") {
629
+ document.removeEventListener("visibilitychange", visibilityHandler);
630
+ visibilityHandler = null;
631
+ }
632
+ }
633
+ function startSessionSecurity(onSessionInvalidCallback) {
634
+ console.log("\u{1F510} Starting session security (proactive refresh + session monitoring)");
635
+ startProactiveRefresh();
636
+ startSessionMonitor(onSessionInvalidCallback);
637
+ return {
638
+ stopAll: () => {
639
+ stopProactiveRefresh();
640
+ stopSessionMonitor();
641
+ }
642
+ };
643
+ }
644
+ function stopSessionSecurity() {
645
+ stopProactiveRefresh();
646
+ stopSessionMonitor();
647
+ sessionInvalidCallbacks.clear();
648
+ console.log("\u{1F510} Session security stopped");
649
+ }
650
+
651
+ // api.js
652
+ import axios from "axios";
653
+ var api = axios.create({
654
+ withCredentials: true
655
+ });
656
+ api.interceptors.request.use((config2) => {
657
+ const runtimeConfig = getConfig();
658
+ if (!config2.baseURL) {
659
+ config2.baseURL = (runtimeConfig == null ? void 0 : runtimeConfig.authBaseUrl) || "http://auth.local.test:4000/auth";
660
+ }
661
+ if (!config2.headers) {
662
+ config2.headers = {};
663
+ }
664
+ if ((runtimeConfig == null ? void 0 : runtimeConfig.clientKey) && !config2.headers["X-Client-Key"]) {
665
+ config2.headers["X-Client-Key"] = runtimeConfig.clientKey;
666
+ }
667
+ const token = getToken();
668
+ if (token) {
669
+ config2.headers.Authorization = `Bearer ${token}`;
670
+ }
671
+ return config2;
672
+ });
673
+ var refreshPromise2 = null;
674
+ api.interceptors.response.use(
675
+ (response) => response,
676
+ async (error) => {
677
+ const { response, config: config2 } = error || {};
678
+ if (!response || !config2) {
679
+ return Promise.reject(error);
680
+ }
681
+ if (response.status !== 401 || config2._retry) {
682
+ return Promise.reject(error);
683
+ }
684
+ config2._retry = true;
685
+ if (!refreshPromise2) {
686
+ refreshPromise2 = refreshToken().then((newToken) => {
687
+ refreshPromise2 = null;
688
+ if (newToken) {
689
+ setToken(newToken);
690
+ }
691
+ return newToken;
692
+ }).catch((refreshError) => {
693
+ refreshPromise2 = null;
694
+ clearToken();
695
+ throw refreshError;
696
+ });
697
+ }
698
+ try {
699
+ const refreshedToken = await refreshPromise2;
700
+ if (refreshedToken) {
701
+ config2.headers.Authorization = `Bearer ${refreshedToken}`;
702
+ return api(config2);
703
+ }
704
+ } catch (refreshErr) {
705
+ return Promise.reject(refreshErr);
706
+ }
707
+ return Promise.reject(error);
708
+ }
709
+ );
710
+ api.validateSession = async () => {
711
+ var _a;
712
+ try {
713
+ const response = await api.get("/account/validate-session");
714
+ return response.data.valid;
715
+ } catch (err) {
716
+ if (((_a = err.response) == null ? void 0 : _a.status) === 401) {
717
+ return false;
718
+ }
719
+ throw err;
720
+ }
721
+ };
722
+ var api_default = api;
723
+
724
+ // utils/jwt.js
725
+ import { jwtDecode as jwtDecode2 } from "jwt-decode";
726
+ function decodeToken(token) {
727
+ try {
728
+ return jwtDecode2(token);
729
+ } catch (err) {
730
+ console.warn("Failed to decode JWT:", err);
731
+ return null;
732
+ }
733
+ }
734
+ function isTokenExpired(token, bufferSeconds = 60) {
735
+ const decoded = decodeToken(token);
736
+ if (!decoded || !decoded.exp) return true;
737
+ const currentTime = Date.now() / 1e3;
738
+ return decoded.exp < currentTime + bufferSeconds;
739
+ }
740
+ function isAuthenticated() {
741
+ const token = getToken();
742
+ return !!token && !isTokenExpired(token);
743
+ }
744
+
745
+ // react/AuthProvider.jsx
746
+ import React, { createContext, useState, useEffect, useRef } from "react";
747
+ var AuthContext = createContext();
748
+
749
+ // react/useAuth.js
750
+ import { useContext } from "react";
751
+
752
+ // index.js
753
+ var auth = {
754
+ // ๐Ÿ”ง Config
755
+ setConfig,
756
+ getConfig,
757
+ isRouterMode,
758
+ // ๐Ÿ” Core flows
759
+ login,
760
+ logout,
761
+ handleCallback,
762
+ refreshToken,
763
+ resetCallbackState,
764
+ validateCurrentSession,
765
+ // ๐Ÿ”‘ Token management
766
+ getToken,
767
+ setToken,
768
+ clearToken,
769
+ setRefreshToken,
770
+ // โœ… Refresh token for HTTP dev
771
+ getRefreshToken,
772
+ clearRefreshToken,
773
+ addTokenListener,
774
+ // โœ… Export new functions
775
+ removeTokenListener,
776
+ getListenerCount,
777
+ // โœ… Debug function
778
+ // ๐ŸŒ Authenticated API client
779
+ api: api_default,
780
+ // ๐Ÿงช Utilities
781
+ decodeToken,
782
+ isTokenExpired,
783
+ isAuthenticated,
784
+ // โฑ๏ธ Token Expiry Utilities (NEW)
785
+ getTokenExpiryTime,
786
+ // Get token expiry as Date object
787
+ getTimeUntilExpiry,
788
+ // Get seconds until token expires
789
+ willExpireSoon,
790
+ // Check if token expires within N seconds
791
+ // ๐Ÿ” Session Security (NEW - Short-lived tokens + Periodic validation)
792
+ startProactiveRefresh,
793
+ // Start proactive token refresh before expiry
794
+ stopProactiveRefresh,
795
+ // Stop proactive refresh
796
+ startSessionMonitor,
797
+ // Start periodic session validation
798
+ stopSessionMonitor,
799
+ // Stop session validation
800
+ startSessionSecurity,
801
+ // Start both proactive refresh AND session monitoring
802
+ stopSessionSecurity,
803
+ // Stop all session security
804
+ onSessionInvalid,
805
+ // Register callback for session invalidation
806
+ // ๐Ÿ”„ Legacy auto-refresh (DEPRECATED - use startSessionSecurity instead)
807
+ startTokenRefresh: () => {
808
+ console.warn("\u26A0\uFE0F startTokenRefresh is deprecated. Use startSessionSecurity() instead for better session management.");
809
+ const interval = setInterval(async () => {
810
+ const token = getToken();
811
+ if (token && isTokenExpired(token, 300)) {
812
+ try {
813
+ await refreshToken();
814
+ console.log("\u{1F504} Auto-refresh successful");
815
+ } catch (err) {
816
+ console.error("Auto-refresh failed:", err);
817
+ clearInterval(interval);
818
+ }
819
+ }
820
+ }, 6e4);
821
+ return interval;
822
+ }
823
+ };
824
+
825
+ // react/useSessionMonitor.js
826
+ var useSessionMonitor = (options = {}) => {
827
+ var _a, _b;
828
+ const queryClient = useQueryClient();
829
+ const {
830
+ enabled = true,
831
+ refetchInterval = 2 * 60 * 1e3,
832
+ // 2 minutes (matching config default)
833
+ onSessionInvalid: onSessionInvalid2,
834
+ onError,
835
+ autoLogout = true,
836
+ validateOnMount = true
837
+ } = options;
838
+ const handleInvalid = useCallback(() => {
839
+ console.log("\u{1F6A8} useSessionMonitor: Session invalid detected");
840
+ queryClient.clear();
841
+ if (autoLogout) {
842
+ auth.clearToken();
843
+ auth.clearRefreshToken();
844
+ }
845
+ if (onSessionInvalid2) {
846
+ onSessionInvalid2();
847
+ }
848
+ }, [queryClient, autoLogout, onSessionInvalid2]);
849
+ const query = useQuery({
850
+ queryKey: ["session-validation"],
851
+ queryFn: async () => {
852
+ try {
853
+ const token = auth.getToken();
854
+ if (!token) {
855
+ return { valid: false, reason: "no_token" };
856
+ }
857
+ console.log("\u{1F50D} useSessionMonitor: Validating session...");
858
+ const isValid = await auth.validateCurrentSession();
859
+ if (!isValid) {
860
+ console.log("\u274C useSessionMonitor: Session no longer valid");
861
+ handleInvalid();
862
+ return { valid: false, reason: "session_deleted" };
863
+ }
864
+ console.log("\u2705 useSessionMonitor: Session still valid");
865
+ return { valid: true };
866
+ } catch (error) {
867
+ console.error("\u26A0\uFE0F useSessionMonitor: Validation error:", error);
868
+ if (onError) {
869
+ onError(error);
870
+ }
871
+ throw error;
872
+ }
873
+ },
874
+ enabled: enabled && !!auth.getToken(),
875
+ refetchInterval,
876
+ refetchIntervalInBackground: true,
877
+ retry: 2,
878
+ retryDelay: 5e3,
879
+ staleTime: refetchInterval / 2
880
+ // Consider stale at half the interval
881
+ });
882
+ useEffect2(() => {
883
+ if (!enabled) return;
884
+ const handleVisibilityChange = () => {
885
+ if (document.visibilityState === "visible" && auth.getToken()) {
886
+ console.log("\u{1F441}\uFE0F useSessionMonitor: Tab visible - triggering validation");
887
+ queryClient.invalidateQueries({ queryKey: ["session-validation"] });
888
+ }
889
+ };
890
+ document.addEventListener("visibilitychange", handleVisibilityChange);
891
+ return () => {
892
+ document.removeEventListener("visibilitychange", handleVisibilityChange);
893
+ };
894
+ }, [enabled, queryClient]);
895
+ useEffect2(() => {
896
+ if (validateOnMount && enabled && auth.getToken()) {
897
+ queryClient.invalidateQueries({ queryKey: ["session-validation"] });
898
+ }
899
+ }, [validateOnMount, enabled, queryClient]);
900
+ return {
901
+ ...query,
902
+ isSessionValid: ((_a = query.data) == null ? void 0 : _a.valid) ?? true,
903
+ invalidationReason: (_b = query.data) == null ? void 0 : _b.reason,
904
+ manualValidate: () => queryClient.invalidateQueries({ queryKey: ["session-validation"] })
905
+ };
906
+ };
907
+ export {
908
+ useSessionMonitor
909
+ };
910
+ //# sourceMappingURL=useSessionMonitor.js.map