@spidy092/auth-client 2.1.8 โ†’ 3.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.cjs ADDED
@@ -0,0 +1,1065 @@
1
+ var __create = Object.create;
2
+ var __defProp = Object.defineProperty;
3
+ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
4
+ var __getOwnPropNames = Object.getOwnPropertyNames;
5
+ var __getProtoOf = Object.getPrototypeOf;
6
+ var __hasOwnProp = Object.prototype.hasOwnProperty;
7
+ var __export = (target, all) => {
8
+ for (var name in all)
9
+ __defProp(target, name, { get: all[name], enumerable: true });
10
+ };
11
+ var __copyProps = (to, from, except, desc) => {
12
+ if (from && typeof from === "object" || typeof from === "function") {
13
+ for (let key of __getOwnPropNames(from))
14
+ if (!__hasOwnProp.call(to, key) && key !== except)
15
+ __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
16
+ }
17
+ return to;
18
+ };
19
+ var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
20
+ // If the importer is in node compatibility mode or this is not an ESM
21
+ // file that has been converted to a CommonJS file using a Babel-
22
+ // compatible transform (i.e. "__esModule" has not been set), then set
23
+ // "default" to the CommonJS "module.exports" for node compatibility.
24
+ isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
25
+ mod
26
+ ));
27
+ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
28
+
29
+ // index.js
30
+ var index_exports = {};
31
+ __export(index_exports, {
32
+ AuthProvider: () => AuthProvider,
33
+ auth: () => auth,
34
+ useAuth: () => useAuth,
35
+ useSessionMonitor: () => useSessionMonitor
36
+ });
37
+ module.exports = __toCommonJS(index_exports);
38
+
39
+ // token.js
40
+ var import_jwt_decode = require("jwt-decode");
41
+ var accessToken = null;
42
+ var listeners = /* @__PURE__ */ new Set();
43
+ var REFRESH_COOKIE = "account_refresh_token";
44
+ var COOKIE_MAX_AGE = 7 * 24 * 60 * 60;
45
+ function secureAttribute() {
46
+ var _a;
47
+ try {
48
+ return typeof window !== "undefined" && ((_a = window.location) == null ? void 0 : _a.protocol) === "https:" ? "; Secure" : "";
49
+ } catch (err) {
50
+ return "";
51
+ }
52
+ }
53
+ function writeAccessToken(token) {
54
+ if (!token) {
55
+ try {
56
+ localStorage.removeItem("authToken");
57
+ } catch (err) {
58
+ console.warn("Could not clear token from localStorage:", err);
59
+ }
60
+ return;
61
+ }
62
+ try {
63
+ localStorage.setItem("authToken", token);
64
+ } catch (err) {
65
+ console.warn("Could not persist token to localStorage:", err);
66
+ }
67
+ }
68
+ function readAccessToken() {
69
+ try {
70
+ return localStorage.getItem("authToken");
71
+ } catch (err) {
72
+ console.warn("Could not read token from localStorage:", err);
73
+ return null;
74
+ }
75
+ }
76
+ function decode(token) {
77
+ try {
78
+ return (0, import_jwt_decode.jwtDecode)(token);
79
+ } catch (err) {
80
+ return null;
81
+ }
82
+ }
83
+ function getTokenExpiryTime(token) {
84
+ if (!token) return null;
85
+ const decoded = decode(token);
86
+ if (!(decoded == null ? void 0 : decoded.exp)) return null;
87
+ return new Date(decoded.exp * 1e3);
88
+ }
89
+ function getTimeUntilExpiry(token) {
90
+ if (!token) return -1;
91
+ const decoded = decode(token);
92
+ if (!(decoded == null ? void 0 : decoded.exp)) return -1;
93
+ const now = Date.now() / 1e3;
94
+ return Math.floor(decoded.exp - now);
95
+ }
96
+ function willExpireSoon(token, withinSeconds = 60) {
97
+ const timeLeft = getTimeUntilExpiry(token);
98
+ return timeLeft >= 0 && timeLeft <= withinSeconds;
99
+ }
100
+ function setToken(token) {
101
+ const previousToken = accessToken;
102
+ accessToken = token || null;
103
+ writeAccessToken(accessToken);
104
+ if (previousToken !== accessToken) {
105
+ listeners.forEach((listener) => {
106
+ try {
107
+ listener(accessToken, previousToken);
108
+ } catch (err) {
109
+ console.warn("Token listener error:", err);
110
+ }
111
+ });
112
+ }
113
+ }
114
+ function getToken() {
115
+ if (accessToken) return accessToken;
116
+ accessToken = readAccessToken();
117
+ return accessToken;
118
+ }
119
+ function clearToken() {
120
+ if (!accessToken) {
121
+ writeAccessToken(null);
122
+ clearRefreshToken();
123
+ return;
124
+ }
125
+ const previousToken = accessToken;
126
+ accessToken = null;
127
+ writeAccessToken(null);
128
+ clearRefreshToken();
129
+ listeners.forEach((listener) => {
130
+ try {
131
+ listener(null, previousToken);
132
+ } catch (err) {
133
+ console.warn("Token listener error:", err);
134
+ }
135
+ });
136
+ }
137
+ var REFRESH_TOKEN_KEY = "auth_refresh_token";
138
+ var _persistRefreshToken = false;
139
+ function enableRefreshTokenPersistence(enabled) {
140
+ _persistRefreshToken = !!enabled;
141
+ console.log(`\u{1F527} Refresh token persistence: ${_persistRefreshToken ? "ENABLED" : "DISABLED"}`);
142
+ }
143
+ function shouldUseLocalStorage() {
144
+ var _a;
145
+ if (_persistRefreshToken) return true;
146
+ try {
147
+ return typeof window !== "undefined" && ((_a = window.location) == null ? void 0 : _a.protocol) === "http:";
148
+ } catch (err) {
149
+ return false;
150
+ }
151
+ }
152
+ function setRefreshToken(token) {
153
+ if (!token) {
154
+ clearRefreshToken();
155
+ return;
156
+ }
157
+ if (shouldUseLocalStorage()) {
158
+ try {
159
+ localStorage.setItem(REFRESH_TOKEN_KEY, token);
160
+ console.log(`\u{1F4E6} Refresh token stored in localStorage (${_persistRefreshToken ? "persistence enabled" : "HTTP dev mode"})`);
161
+ } catch (err) {
162
+ console.warn("Could not store refresh token:", err);
163
+ }
164
+ } else {
165
+ console.log("\u{1F512} Refresh token managed by server httpOnly cookie (production mode)");
166
+ }
167
+ }
168
+ function getRefreshToken() {
169
+ if (shouldUseLocalStorage()) {
170
+ try {
171
+ const token = localStorage.getItem(REFRESH_TOKEN_KEY);
172
+ return token;
173
+ } catch (err) {
174
+ console.warn("Could not read refresh token:", err);
175
+ return null;
176
+ }
177
+ }
178
+ return null;
179
+ }
180
+ function clearRefreshToken() {
181
+ try {
182
+ localStorage.removeItem(REFRESH_TOKEN_KEY);
183
+ } catch (err) {
184
+ }
185
+ try {
186
+ document.cookie = `${REFRESH_COOKIE}=; Path=/; SameSite=Strict${secureAttribute()}; Expires=Thu, 01 Jan 1970 00:00:00 GMT`;
187
+ } catch (err) {
188
+ console.warn("Could not clear refresh token cookie:", err);
189
+ }
190
+ try {
191
+ sessionStorage.removeItem(REFRESH_COOKIE);
192
+ } catch (err) {
193
+ }
194
+ }
195
+ function addTokenListener(listener) {
196
+ if (typeof listener !== "function") {
197
+ throw new Error("Token listener must be a function");
198
+ }
199
+ listeners.add(listener);
200
+ return () => {
201
+ listeners.delete(listener);
202
+ };
203
+ }
204
+ function removeTokenListener(listener) {
205
+ listeners.delete(listener);
206
+ }
207
+ function getListenerCount() {
208
+ return listeners.size;
209
+ }
210
+
211
+ // config.js
212
+ var config = {
213
+ clientKey: null,
214
+ authBaseUrl: null,
215
+ redirectUri: null,
216
+ accountUiUrl: null,
217
+ isRouter: false,
218
+ // โœ… Add router flag
219
+ // ========== SESSION SECURITY SETTINGS ==========
220
+ // Buffer time (in seconds) before token expiry to trigger proactive refresh
221
+ // With 5-minute access tokens, refreshing 60s before expiry ensures seamless UX
222
+ tokenRefreshBuffer: 60,
223
+ // Interval (in milliseconds) for periodic session validation
224
+ // Validates that the session still exists in Keycloak (not deleted by admin)
225
+ // Default: 15 minutes (900000ms) - Increased from 2m to avoid frequent checks
226
+ sessionValidationInterval: 15 * 60 * 1e3,
227
+ // Enable/disable periodic session validation
228
+ // When enabled, the client will ping the server to verify session is still active
229
+ enableSessionValidation: true,
230
+ // Enable/disable proactive token refresh
231
+ // When enabled, tokens are refreshed before they expire (using tokenRefreshBuffer)
232
+ enableProactiveRefresh: true,
233
+ // Validate session when browser tab becomes visible again
234
+ // Catches session deletions that happened while the tab was inactive
235
+ validateOnVisibility: true,
236
+ // ========== REFRESH TOKEN PERSISTENCE ==========
237
+ // When true, stores refresh token in localStorage even on HTTPS
238
+ // Required for local dev with mkcert/self-signed certs where httpOnly cookies
239
+ // may not work reliably across origins
240
+ // โš ๏ธ In true production, set to false and rely on httpOnly cookies
241
+ persistRefreshToken: false
242
+ };
243
+ function setConfig(customConfig = {}) {
244
+ if (!customConfig.clientKey || !customConfig.authBaseUrl) {
245
+ throw new Error("Missing required config: clientKey and authBaseUrl are required");
246
+ }
247
+ config = {
248
+ ...config,
249
+ ...customConfig,
250
+ redirectUri: customConfig.redirectUri || window.location.origin + "/callback",
251
+ // โœ… Auto-detect router mode
252
+ isRouter: customConfig.isRouter || customConfig.clientKey === "account-ui"
253
+ };
254
+ if (config.persistRefreshToken) {
255
+ enableRefreshTokenPersistence(true);
256
+ console.log("\u{1F4E6} Refresh token persistence ENABLED (localStorage on HTTPS)");
257
+ }
258
+ console.log(`\u{1F527} Auth Client Mode: ${config.isRouter ? "ROUTER" : "CLIENT"}`, {
259
+ clientKey: config.clientKey,
260
+ isRouter: config.isRouter,
261
+ persistRefreshToken: config.persistRefreshToken
262
+ });
263
+ }
264
+ function getConfig() {
265
+ return { ...config };
266
+ }
267
+ function isRouterMode() {
268
+ return config.isRouter;
269
+ }
270
+
271
+ // core.js
272
+ var callbackProcessed = false;
273
+ function login(clientKeyArg, redirectUriArg) {
274
+ resetCallbackState();
275
+ const {
276
+ clientKey: defaultClientKey,
277
+ authBaseUrl,
278
+ redirectUri: defaultRedirectUri,
279
+ accountUiUrl
280
+ } = getConfig();
281
+ const clientKey = clientKeyArg || defaultClientKey;
282
+ const redirectUri = redirectUriArg || defaultRedirectUri;
283
+ console.log("\u{1F504} Smart Login initiated:", {
284
+ mode: isRouterMode() ? "ROUTER" : "CLIENT",
285
+ clientKey,
286
+ redirectUri
287
+ });
288
+ if (!clientKey || !redirectUri) {
289
+ throw new Error("Missing clientKey or redirectUri");
290
+ }
291
+ sessionStorage.setItem("originalApp", clientKey);
292
+ sessionStorage.setItem("returnUrl", redirectUri);
293
+ if (isRouterMode()) {
294
+ return routerLogin(clientKey, redirectUri);
295
+ } else {
296
+ return clientLogin(clientKey, redirectUri);
297
+ }
298
+ }
299
+ function routerLogin(clientKey, redirectUri) {
300
+ const { authBaseUrl } = getConfig();
301
+ const params = new URLSearchParams();
302
+ if (redirectUri) {
303
+ params.append("redirect_uri", redirectUri);
304
+ }
305
+ const query = params.toString();
306
+ const backendLoginUrl = `${authBaseUrl}/login/${clientKey}${query ? `?${query}` : ""}`;
307
+ console.log("\u{1F3ED} Router Login: Direct backend authentication", {
308
+ clientKey,
309
+ redirectUri,
310
+ backendUrl: backendLoginUrl
311
+ });
312
+ window.location.href = backendLoginUrl;
313
+ }
314
+ function clientLogin(clientKey, redirectUri) {
315
+ const { accountUiUrl } = getConfig();
316
+ const params = new URLSearchParams({
317
+ client: clientKey
318
+ });
319
+ if (redirectUri) {
320
+ params.append("redirect_uri", redirectUri);
321
+ }
322
+ const centralizedLoginUrl = `${accountUiUrl}/login?${params.toString()}`;
323
+ console.log("\u{1F504} Client Login: Redirecting to centralized login", {
324
+ clientKey,
325
+ redirectUri,
326
+ centralizedUrl: centralizedLoginUrl
327
+ });
328
+ window.location.href = centralizedLoginUrl;
329
+ }
330
+ function logout() {
331
+ resetCallbackState();
332
+ const { clientKey, authBaseUrl, accountUiUrl } = getConfig();
333
+ const token = getToken();
334
+ console.log("\u{1F6AA} Smart Logout initiated");
335
+ clearToken();
336
+ clearRefreshToken();
337
+ sessionStorage.removeItem("originalApp");
338
+ sessionStorage.removeItem("returnUrl");
339
+ if (isRouterMode()) {
340
+ return routerLogout(clientKey, authBaseUrl, accountUiUrl, token);
341
+ } else {
342
+ return clientLogout(clientKey, accountUiUrl);
343
+ }
344
+ }
345
+ async function routerLogout(clientKey, authBaseUrl, accountUiUrl, token) {
346
+ console.log("\u{1F3ED} Router Logout");
347
+ const refreshToken2 = getRefreshToken();
348
+ try {
349
+ const response = await fetch(`${authBaseUrl}/logout/${clientKey}`, {
350
+ method: "POST",
351
+ credentials: "include",
352
+ headers: {
353
+ "Authorization": token ? `Bearer ${token}` : "",
354
+ "Content-Type": "application/json"
355
+ },
356
+ body: JSON.stringify({
357
+ refreshToken: refreshToken2
358
+ })
359
+ });
360
+ const data = await response.json();
361
+ console.log("\u2705 Logout response:", data);
362
+ clearRefreshToken();
363
+ clearToken();
364
+ console.log("\u{1F504} Redirecting to login (skipping Keycloak confirmation)");
365
+ window.location.href = "/login";
366
+ } catch (error) {
367
+ console.warn("\u26A0\uFE0F Logout failed:", error);
368
+ clearRefreshToken();
369
+ clearToken();
370
+ window.location.href = "/login";
371
+ }
372
+ }
373
+ function clientLogout(clientKey, accountUiUrl) {
374
+ console.log("\u{1F504} Client Logout");
375
+ const logoutUrl = `${accountUiUrl}/login?client=${clientKey}&logout=true`;
376
+ window.location.href = logoutUrl;
377
+ }
378
+ function handleCallback() {
379
+ var _a;
380
+ const params = new URLSearchParams(window.location.search);
381
+ const accessToken2 = params.get("access_token");
382
+ const error = params.get("error");
383
+ console.log("\u{1F504} Callback handling:", {
384
+ hasAccessToken: !!accessToken2,
385
+ error
386
+ });
387
+ if (callbackProcessed) {
388
+ const existingToken = getToken();
389
+ if (existingToken) {
390
+ console.log("\u2705 Callback already processed, returning existing token");
391
+ return existingToken;
392
+ }
393
+ callbackProcessed = false;
394
+ }
395
+ callbackProcessed = true;
396
+ sessionStorage.removeItem("originalApp");
397
+ sessionStorage.removeItem("returnUrl");
398
+ if (error) {
399
+ const errorDescription = params.get("error_description") || error;
400
+ throw new Error(`Authentication failed: ${errorDescription}`);
401
+ }
402
+ if (accessToken2) {
403
+ setToken(accessToken2);
404
+ const refreshTokenInUrl = params.get("refresh_token");
405
+ if (refreshTokenInUrl) {
406
+ const { persistRefreshToken } = getConfig();
407
+ const isHttpDev = typeof window !== "undefined" && ((_a = window.location) == null ? void 0 : _a.protocol) === "http:";
408
+ if (persistRefreshToken || isHttpDev) {
409
+ console.log(`\u{1F4E6} Storing refresh token from callback URL (${persistRefreshToken ? "persistence enabled" : "HTTP dev mode"})`);
410
+ setRefreshToken(refreshTokenInUrl);
411
+ } else {
412
+ console.log("\u{1F512} HTTPS mode: Refresh token is in httpOnly cookie (ignoring URL param)");
413
+ }
414
+ }
415
+ const url = new URL(window.location);
416
+ url.searchParams.delete("access_token");
417
+ url.searchParams.delete("refresh_token");
418
+ url.searchParams.delete("state");
419
+ url.searchParams.delete("error");
420
+ url.searchParams.delete("error_description");
421
+ window.history.replaceState({}, "", url);
422
+ console.log("\u2705 Callback processed successfully, token stored");
423
+ return accessToken2;
424
+ }
425
+ throw new Error("No access token found in callback URL");
426
+ }
427
+ function resetCallbackState() {
428
+ callbackProcessed = false;
429
+ }
430
+ var refreshInProgress = false;
431
+ var refreshPromise = null;
432
+ async function refreshToken() {
433
+ const { clientKey, authBaseUrl } = getConfig();
434
+ if (refreshInProgress && refreshPromise) {
435
+ console.log("\u{1F504} Token refresh already in progress, waiting...");
436
+ return refreshPromise;
437
+ }
438
+ refreshInProgress = true;
439
+ refreshPromise = (async () => {
440
+ try {
441
+ const storedRefreshToken = getRefreshToken();
442
+ console.log("\u{1F504} Refreshing token:", {
443
+ clientKey,
444
+ mode: isRouterMode() ? "ROUTER" : "CLIENT",
445
+ hasStoredRefreshToken: !!storedRefreshToken
446
+ });
447
+ const requestOptions = {
448
+ method: "POST",
449
+ credentials: "include",
450
+ // โœ… Include httpOnly cookies (for HTTPS)
451
+ headers: {
452
+ "Content-Type": "application/json"
453
+ }
454
+ };
455
+ if (storedRefreshToken) {
456
+ requestOptions.headers["X-Refresh-Token"] = storedRefreshToken;
457
+ requestOptions.body = JSON.stringify({ refreshToken: storedRefreshToken });
458
+ }
459
+ const response = await fetch(`${authBaseUrl}/refresh/${clientKey}`, requestOptions);
460
+ if (!response.ok) {
461
+ const errorText = await response.text();
462
+ console.error("\u274C Token refresh failed:", response.status, errorText);
463
+ throw new Error(`Refresh failed: ${response.status}`);
464
+ }
465
+ const data = await response.json();
466
+ const { access_token, refresh_token: new_refresh_token } = data;
467
+ if (!access_token) {
468
+ throw new Error("No access token in refresh response");
469
+ }
470
+ setToken(access_token);
471
+ if (new_refresh_token) {
472
+ setRefreshToken(new_refresh_token);
473
+ console.log("\u{1F504} New refresh token stored from rotation");
474
+ }
475
+ console.log("\u2705 Token refresh successful, listeners notified");
476
+ return access_token;
477
+ } catch (err) {
478
+ console.error("\u274C Token refresh error:", err);
479
+ clearToken();
480
+ clearRefreshToken();
481
+ throw err;
482
+ } finally {
483
+ refreshInProgress = false;
484
+ refreshPromise = null;
485
+ }
486
+ })();
487
+ return refreshPromise;
488
+ }
489
+ async function validateCurrentSession() {
490
+ try {
491
+ const { authBaseUrl } = getConfig();
492
+ const token = getToken();
493
+ if (!token || !authBaseUrl) {
494
+ return false;
495
+ }
496
+ const response = await fetch(`${authBaseUrl}/account/validate-session`, {
497
+ method: "GET",
498
+ headers: {
499
+ "Authorization": `Bearer ${token}`,
500
+ "Content-Type": "application/json"
501
+ },
502
+ credentials: "include"
503
+ });
504
+ if (!response.ok) {
505
+ if (response.status === 401) {
506
+ return false;
507
+ }
508
+ throw new Error(`HTTP ${response.status}: ${response.statusText}`);
509
+ }
510
+ const data = await response.json();
511
+ return data.valid === true;
512
+ } catch (error) {
513
+ console.warn("Session validation failed:", error.message);
514
+ if (error.message.includes("401")) {
515
+ return false;
516
+ }
517
+ throw error;
518
+ }
519
+ }
520
+ var proactiveRefreshTimer = null;
521
+ var sessionValidationTimer = null;
522
+ var visibilityHandler = null;
523
+ var sessionInvalidCallbacks = /* @__PURE__ */ new Set();
524
+ function onSessionInvalid(callback) {
525
+ if (typeof callback === "function") {
526
+ sessionInvalidCallbacks.add(callback);
527
+ }
528
+ return () => sessionInvalidCallbacks.delete(callback);
529
+ }
530
+ function notifySessionInvalid(reason = "session_deleted") {
531
+ console.log("\u{1F6A8} Session invalidated:", reason);
532
+ sessionInvalidCallbacks.forEach((callback) => {
533
+ try {
534
+ callback(reason);
535
+ } catch (err) {
536
+ console.error("Session invalid callback error:", err);
537
+ }
538
+ });
539
+ }
540
+ function startProactiveRefresh() {
541
+ const { enableProactiveRefresh, tokenRefreshBuffer } = getConfig();
542
+ if (!enableProactiveRefresh) {
543
+ console.log("\u23F8\uFE0F Proactive refresh disabled by config");
544
+ return null;
545
+ }
546
+ stopProactiveRefresh();
547
+ const token = getToken();
548
+ if (!token) {
549
+ console.log("\u23F8\uFE0F No token, skipping proactive refresh setup");
550
+ return null;
551
+ }
552
+ const timeUntilExpiry = getTimeUntilExpiry(token);
553
+ if (timeUntilExpiry <= 0) {
554
+ console.log("\u26A0\uFE0F Token already expired, attempting immediate refresh");
555
+ refreshToken().catch((err) => {
556
+ console.error("\u274C Immediate refresh failed:", err);
557
+ notifySessionInvalid("token_expired");
558
+ });
559
+ return null;
560
+ }
561
+ const refreshIn = Math.max(0, timeUntilExpiry - tokenRefreshBuffer) * 1e3;
562
+ console.log(`\u{1F504} Scheduling proactive refresh in ${Math.round(refreshIn / 1e3)}s (token expires in ${timeUntilExpiry}s)`);
563
+ proactiveRefreshTimer = setTimeout(async () => {
564
+ var _a;
565
+ try {
566
+ console.log("\u{1F504} Proactive token refresh triggered");
567
+ await refreshToken();
568
+ console.log("\u2705 Proactive refresh successful, scheduling next refresh");
569
+ startProactiveRefresh();
570
+ } catch (err) {
571
+ console.error("\u274C Proactive refresh failed:", err);
572
+ const errorMessage = ((_a = err.message) == null ? void 0 : _a.toLowerCase()) || "";
573
+ const isPermanentFailure = errorMessage.includes("401") || errorMessage.includes("revoked") || errorMessage.includes("invalid") || errorMessage.includes("expired") || errorMessage.includes("unauthorized");
574
+ if (isPermanentFailure) {
575
+ console.log("\u{1F6A8} Token permanently invalid, triggering session expiry");
576
+ notifySessionInvalid("refresh_token_revoked");
577
+ } else {
578
+ proactiveRefreshTimer = setTimeout(() => startProactiveRefresh(), 3e4);
579
+ }
580
+ }
581
+ }, refreshIn);
582
+ return proactiveRefreshTimer;
583
+ }
584
+ function stopProactiveRefresh() {
585
+ if (proactiveRefreshTimer) {
586
+ clearTimeout(proactiveRefreshTimer);
587
+ proactiveRefreshTimer = null;
588
+ console.log("\u23F9\uFE0F Proactive refresh stopped");
589
+ }
590
+ }
591
+ function startSessionMonitor(onInvalid) {
592
+ const { enableSessionValidation, sessionValidationInterval, validateOnVisibility } = getConfig();
593
+ if (!enableSessionValidation) {
594
+ console.log("\u23F8\uFE0F Session validation disabled by config");
595
+ return null;
596
+ }
597
+ if (onInvalid && typeof onInvalid === "function") {
598
+ sessionInvalidCallbacks.add(onInvalid);
599
+ }
600
+ stopSessionMonitor();
601
+ const token = getToken();
602
+ if (!token) {
603
+ console.log("\u23F8\uFE0F No token, skipping session monitor setup");
604
+ return null;
605
+ }
606
+ console.log(`\u{1F441}\uFE0F Starting session monitor (interval: ${sessionValidationInterval / 1e3}s)`);
607
+ sessionValidationTimer = setInterval(async () => {
608
+ try {
609
+ const currentToken = getToken();
610
+ if (!currentToken) {
611
+ console.log("\u23F8\uFE0F No token, stopping session validation");
612
+ stopSessionMonitor();
613
+ return;
614
+ }
615
+ console.log("\u{1F50D} Validating session...");
616
+ const isValid = await validateCurrentSession();
617
+ if (!isValid) {
618
+ console.log("\u274C Session no longer valid on server");
619
+ stopSessionMonitor();
620
+ stopProactiveRefresh();
621
+ clearToken();
622
+ clearRefreshToken();
623
+ notifySessionInvalid("session_deleted");
624
+ } else {
625
+ console.log("\u2705 Session still valid");
626
+ }
627
+ } catch (error) {
628
+ console.warn("\u26A0\uFE0F Session validation check failed:", error.message);
629
+ }
630
+ }, sessionValidationInterval);
631
+ if (validateOnVisibility && typeof document !== "undefined") {
632
+ visibilityHandler = async () => {
633
+ if (document.visibilityState === "visible") {
634
+ const currentToken = getToken();
635
+ if (!currentToken) return;
636
+ console.log("\u{1F441}\uFE0F Tab visible - validating session");
637
+ try {
638
+ const isValid = await validateCurrentSession();
639
+ if (!isValid) {
640
+ console.log("\u274C Session expired while tab was hidden");
641
+ stopSessionMonitor();
642
+ stopProactiveRefresh();
643
+ clearToken();
644
+ clearRefreshToken();
645
+ notifySessionInvalid("session_deleted_while_hidden");
646
+ }
647
+ } catch (error) {
648
+ console.warn("\u26A0\uFE0F Visibility check failed:", error.message);
649
+ }
650
+ }
651
+ };
652
+ document.addEventListener("visibilitychange", visibilityHandler);
653
+ }
654
+ return sessionValidationTimer;
655
+ }
656
+ function stopSessionMonitor() {
657
+ if (sessionValidationTimer) {
658
+ clearInterval(sessionValidationTimer);
659
+ sessionValidationTimer = null;
660
+ console.log("\u23F9\uFE0F Session monitor stopped");
661
+ }
662
+ if (visibilityHandler && typeof document !== "undefined") {
663
+ document.removeEventListener("visibilitychange", visibilityHandler);
664
+ visibilityHandler = null;
665
+ }
666
+ }
667
+ function startSessionSecurity(onSessionInvalidCallback) {
668
+ console.log("\u{1F510} Starting session security (proactive refresh + session monitoring)");
669
+ startProactiveRefresh();
670
+ startSessionMonitor(onSessionInvalidCallback);
671
+ return {
672
+ stopAll: () => {
673
+ stopProactiveRefresh();
674
+ stopSessionMonitor();
675
+ }
676
+ };
677
+ }
678
+ function stopSessionSecurity() {
679
+ stopProactiveRefresh();
680
+ stopSessionMonitor();
681
+ sessionInvalidCallbacks.clear();
682
+ console.log("\u{1F510} Session security stopped");
683
+ }
684
+
685
+ // api.js
686
+ var import_axios = __toESM(require("axios"), 1);
687
+ var api = import_axios.default.create({
688
+ withCredentials: true
689
+ });
690
+ api.interceptors.request.use((config2) => {
691
+ const runtimeConfig = getConfig();
692
+ if (!config2.baseURL) {
693
+ config2.baseURL = (runtimeConfig == null ? void 0 : runtimeConfig.authBaseUrl) || "http://auth.local.test:4000/auth";
694
+ }
695
+ if (!config2.headers) {
696
+ config2.headers = {};
697
+ }
698
+ if ((runtimeConfig == null ? void 0 : runtimeConfig.clientKey) && !config2.headers["X-Client-Key"]) {
699
+ config2.headers["X-Client-Key"] = runtimeConfig.clientKey;
700
+ }
701
+ const token = getToken();
702
+ if (token) {
703
+ config2.headers.Authorization = `Bearer ${token}`;
704
+ }
705
+ return config2;
706
+ });
707
+ var refreshPromise2 = null;
708
+ api.interceptors.response.use(
709
+ (response) => response,
710
+ async (error) => {
711
+ const { response, config: config2 } = error || {};
712
+ if (!response || !config2) {
713
+ return Promise.reject(error);
714
+ }
715
+ if (response.status !== 401 || config2._retry) {
716
+ return Promise.reject(error);
717
+ }
718
+ config2._retry = true;
719
+ if (!refreshPromise2) {
720
+ refreshPromise2 = refreshToken().then((newToken) => {
721
+ refreshPromise2 = null;
722
+ if (newToken) {
723
+ setToken(newToken);
724
+ }
725
+ return newToken;
726
+ }).catch((refreshError) => {
727
+ refreshPromise2 = null;
728
+ clearToken();
729
+ throw refreshError;
730
+ });
731
+ }
732
+ try {
733
+ const refreshedToken = await refreshPromise2;
734
+ if (refreshedToken) {
735
+ config2.headers.Authorization = `Bearer ${refreshedToken}`;
736
+ return api(config2);
737
+ }
738
+ } catch (refreshErr) {
739
+ return Promise.reject(refreshErr);
740
+ }
741
+ return Promise.reject(error);
742
+ }
743
+ );
744
+ api.validateSession = async () => {
745
+ var _a;
746
+ try {
747
+ const response = await api.get("/account/validate-session");
748
+ return response.data.valid;
749
+ } catch (err) {
750
+ if (((_a = err.response) == null ? void 0 : _a.status) === 401) {
751
+ return false;
752
+ }
753
+ throw err;
754
+ }
755
+ };
756
+ var api_default = api;
757
+
758
+ // utils/jwt.js
759
+ var import_jwt_decode2 = require("jwt-decode");
760
+ function decodeToken(token) {
761
+ try {
762
+ return (0, import_jwt_decode2.jwtDecode)(token);
763
+ } catch (err) {
764
+ console.warn("Failed to decode JWT:", err);
765
+ return null;
766
+ }
767
+ }
768
+ function isTokenExpired(token, bufferSeconds = 60) {
769
+ const decoded = decodeToken(token);
770
+ if (!decoded || !decoded.exp) return true;
771
+ const currentTime = Date.now() / 1e3;
772
+ return decoded.exp < currentTime + bufferSeconds;
773
+ }
774
+ function isAuthenticated() {
775
+ const token = getToken();
776
+ return !!token && !isTokenExpired(token);
777
+ }
778
+
779
+ // react/AuthProvider.jsx
780
+ var import_react = __toESM(require("react"), 1);
781
+ var AuthContext = (0, import_react.createContext)();
782
+ function AuthProvider({ children, onSessionExpired }) {
783
+ const [token, setTokenState] = (0, import_react.useState)(getToken());
784
+ const [user, setUser] = (0, import_react.useState)(null);
785
+ const [loading, setLoading] = (0, import_react.useState)(!!token);
786
+ const [sessionValid, setSessionValid] = (0, import_react.useState)(true);
787
+ const sessionSecurityRef = (0, import_react.useRef)(null);
788
+ const handleSessionInvalid = (reason) => {
789
+ console.log("\u{1F6A8} AuthProvider: Session invalidated -", reason);
790
+ setSessionValid(false);
791
+ setUser(null);
792
+ setTokenState(null);
793
+ if (onSessionExpired && typeof onSessionExpired === "function") {
794
+ onSessionExpired(reason);
795
+ }
796
+ };
797
+ (0, import_react.useEffect)(() => {
798
+ if (token && !sessionSecurityRef.current) {
799
+ console.log("\u{1F510} AuthProvider: Starting session security");
800
+ const unsubscribe = onSessionInvalid(handleSessionInvalid);
801
+ sessionSecurityRef.current = startSessionSecurity(handleSessionInvalid);
802
+ return () => {
803
+ unsubscribe();
804
+ if (sessionSecurityRef.current) {
805
+ sessionSecurityRef.current.stopAll();
806
+ sessionSecurityRef.current = null;
807
+ }
808
+ };
809
+ }
810
+ if (!token && sessionSecurityRef.current) {
811
+ sessionSecurityRef.current.stopAll();
812
+ sessionSecurityRef.current = null;
813
+ }
814
+ }, [token]);
815
+ (0, import_react.useEffect)(() => {
816
+ console.log("\u{1F50D} AuthProvider useEffect triggered:", {
817
+ hasToken: !!token,
818
+ tokenLength: token == null ? void 0 : token.length
819
+ });
820
+ if (!token) {
821
+ console.log("\u26A0\uFE0F AuthProvider: No token, setting loading=false");
822
+ setLoading(false);
823
+ return;
824
+ }
825
+ const { authBaseUrl } = getConfig();
826
+ if (!authBaseUrl) {
827
+ console.warn("AuthProvider: No authBaseUrl configured");
828
+ setLoading(false);
829
+ return;
830
+ }
831
+ console.log("\u{1F310} AuthProvider: Fetching profile with token...", {
832
+ authBaseUrl,
833
+ tokenPreview: token.slice(0, 50) + "..."
834
+ });
835
+ fetch(`${authBaseUrl}/account/profile`, {
836
+ headers: { Authorization: `Bearer ${token}` },
837
+ credentials: "include"
838
+ }).then((res) => {
839
+ console.log("\u{1F4E5} Profile response status:", res.status);
840
+ if (!res.ok) throw new Error("Failed to fetch user");
841
+ return res.json();
842
+ }).then((userData) => {
843
+ console.log("\u2705 Profile fetched successfully:", userData.email);
844
+ setUser(userData);
845
+ setSessionValid(true);
846
+ setLoading(false);
847
+ }).catch((err) => {
848
+ console.error("\u274C Fetch user error:", err);
849
+ clearToken();
850
+ setTokenState(null);
851
+ setUser(null);
852
+ setLoading(false);
853
+ });
854
+ }, [token]);
855
+ const login2 = (clientKey, redirectUri, state) => {
856
+ login(clientKey, redirectUri, state);
857
+ };
858
+ const logout2 = () => {
859
+ stopSessionSecurity();
860
+ sessionSecurityRef.current = null;
861
+ logout();
862
+ setUser(null);
863
+ setTokenState(null);
864
+ setSessionValid(true);
865
+ };
866
+ const value = {
867
+ token,
868
+ user,
869
+ loading,
870
+ login: login2,
871
+ logout: logout2,
872
+ isAuthenticated: !!token && !!user && sessionValid,
873
+ sessionValid,
874
+ setUser,
875
+ setToken: (newToken) => {
876
+ setToken(newToken);
877
+ setTokenState(newToken);
878
+ setSessionValid(true);
879
+ },
880
+ clearToken: () => {
881
+ stopSessionSecurity();
882
+ sessionSecurityRef.current = null;
883
+ clearToken();
884
+ setTokenState(null);
885
+ setUser(null);
886
+ }
887
+ };
888
+ return /* @__PURE__ */ import_react.default.createElement(AuthContext.Provider, { value }, children);
889
+ }
890
+
891
+ // react/useAuth.js
892
+ var import_react2 = require("react");
893
+ function useAuth() {
894
+ const context = (0, import_react2.useContext)(AuthContext);
895
+ if (!context) {
896
+ throw new Error("useAuth must be used within an AuthProvider");
897
+ }
898
+ return context;
899
+ }
900
+
901
+ // react/useSessionMonitor.js
902
+ var import_react_query = require("@tanstack/react-query");
903
+ var import_react3 = require("react");
904
+ var useSessionMonitor = (options = {}) => {
905
+ var _a, _b;
906
+ const queryClient = (0, import_react_query.useQueryClient)();
907
+ const {
908
+ enabled = true,
909
+ refetchInterval = 2 * 60 * 1e3,
910
+ // 2 minutes (matching config default)
911
+ onSessionInvalid: onSessionInvalid2,
912
+ onError,
913
+ autoLogout = true,
914
+ validateOnMount = true
915
+ } = options;
916
+ const handleInvalid = (0, import_react3.useCallback)(() => {
917
+ console.log("\u{1F6A8} useSessionMonitor: Session invalid detected");
918
+ queryClient.clear();
919
+ if (autoLogout) {
920
+ auth.clearToken();
921
+ auth.clearRefreshToken();
922
+ }
923
+ if (onSessionInvalid2) {
924
+ onSessionInvalid2();
925
+ }
926
+ }, [queryClient, autoLogout, onSessionInvalid2]);
927
+ const query = (0, import_react_query.useQuery)({
928
+ queryKey: ["session-validation"],
929
+ queryFn: async () => {
930
+ try {
931
+ const token = auth.getToken();
932
+ if (!token) {
933
+ return { valid: false, reason: "no_token" };
934
+ }
935
+ console.log("\u{1F50D} useSessionMonitor: Validating session...");
936
+ const isValid = await auth.validateCurrentSession();
937
+ if (!isValid) {
938
+ console.log("\u274C useSessionMonitor: Session no longer valid");
939
+ handleInvalid();
940
+ return { valid: false, reason: "session_deleted" };
941
+ }
942
+ console.log("\u2705 useSessionMonitor: Session still valid");
943
+ return { valid: true };
944
+ } catch (error) {
945
+ console.error("\u26A0\uFE0F useSessionMonitor: Validation error:", error);
946
+ if (onError) {
947
+ onError(error);
948
+ }
949
+ throw error;
950
+ }
951
+ },
952
+ enabled: enabled && !!auth.getToken(),
953
+ refetchInterval,
954
+ refetchIntervalInBackground: true,
955
+ retry: 2,
956
+ retryDelay: 5e3,
957
+ staleTime: refetchInterval / 2
958
+ // Consider stale at half the interval
959
+ });
960
+ (0, import_react3.useEffect)(() => {
961
+ if (!enabled) return;
962
+ const handleVisibilityChange = () => {
963
+ if (document.visibilityState === "visible" && auth.getToken()) {
964
+ console.log("\u{1F441}\uFE0F useSessionMonitor: Tab visible - triggering validation");
965
+ queryClient.invalidateQueries({ queryKey: ["session-validation"] });
966
+ }
967
+ };
968
+ document.addEventListener("visibilitychange", handleVisibilityChange);
969
+ return () => {
970
+ document.removeEventListener("visibilitychange", handleVisibilityChange);
971
+ };
972
+ }, [enabled, queryClient]);
973
+ (0, import_react3.useEffect)(() => {
974
+ if (validateOnMount && enabled && auth.getToken()) {
975
+ queryClient.invalidateQueries({ queryKey: ["session-validation"] });
976
+ }
977
+ }, [validateOnMount, enabled, queryClient]);
978
+ return {
979
+ ...query,
980
+ isSessionValid: ((_a = query.data) == null ? void 0 : _a.valid) ?? true,
981
+ invalidationReason: (_b = query.data) == null ? void 0 : _b.reason,
982
+ manualValidate: () => queryClient.invalidateQueries({ queryKey: ["session-validation"] })
983
+ };
984
+ };
985
+
986
+ // index.js
987
+ var auth = {
988
+ // ๐Ÿ”ง Config
989
+ setConfig,
990
+ getConfig,
991
+ isRouterMode,
992
+ // ๐Ÿ” Core flows
993
+ login,
994
+ logout,
995
+ handleCallback,
996
+ refreshToken,
997
+ resetCallbackState,
998
+ validateCurrentSession,
999
+ // ๐Ÿ”‘ Token management
1000
+ getToken,
1001
+ setToken,
1002
+ clearToken,
1003
+ setRefreshToken,
1004
+ // โœ… Refresh token for HTTP dev
1005
+ getRefreshToken,
1006
+ clearRefreshToken,
1007
+ addTokenListener,
1008
+ // โœ… Export new functions
1009
+ removeTokenListener,
1010
+ getListenerCount,
1011
+ // โœ… Debug function
1012
+ // ๐ŸŒ Authenticated API client
1013
+ api: api_default,
1014
+ // ๐Ÿงช Utilities
1015
+ decodeToken,
1016
+ isTokenExpired,
1017
+ isAuthenticated,
1018
+ // โฑ๏ธ Token Expiry Utilities (NEW)
1019
+ getTokenExpiryTime,
1020
+ // Get token expiry as Date object
1021
+ getTimeUntilExpiry,
1022
+ // Get seconds until token expires
1023
+ willExpireSoon,
1024
+ // Check if token expires within N seconds
1025
+ // ๐Ÿ” Session Security (NEW - Short-lived tokens + Periodic validation)
1026
+ startProactiveRefresh,
1027
+ // Start proactive token refresh before expiry
1028
+ stopProactiveRefresh,
1029
+ // Stop proactive refresh
1030
+ startSessionMonitor,
1031
+ // Start periodic session validation
1032
+ stopSessionMonitor,
1033
+ // Stop session validation
1034
+ startSessionSecurity,
1035
+ // Start both proactive refresh AND session monitoring
1036
+ stopSessionSecurity,
1037
+ // Stop all session security
1038
+ onSessionInvalid,
1039
+ // Register callback for session invalidation
1040
+ // ๐Ÿ”„ Legacy auto-refresh (DEPRECATED - use startSessionSecurity instead)
1041
+ startTokenRefresh: () => {
1042
+ console.warn("\u26A0\uFE0F startTokenRefresh is deprecated. Use startSessionSecurity() instead for better session management.");
1043
+ const interval = setInterval(async () => {
1044
+ const token = getToken();
1045
+ if (token && isTokenExpired(token, 300)) {
1046
+ try {
1047
+ await refreshToken();
1048
+ console.log("\u{1F504} Auto-refresh successful");
1049
+ } catch (err) {
1050
+ console.error("Auto-refresh failed:", err);
1051
+ clearInterval(interval);
1052
+ }
1053
+ }
1054
+ }, 6e4);
1055
+ return interval;
1056
+ }
1057
+ };
1058
+ // Annotate the CommonJS export names for ESM import in node:
1059
+ 0 && (module.exports = {
1060
+ AuthProvider,
1061
+ auth,
1062
+ useAuth,
1063
+ useSessionMonitor
1064
+ });
1065
+ //# sourceMappingURL=index.cjs.map