@strands.gg/accui 1.4.0 → 1.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (68) hide show
  1. package/dist/accui.css +544 -14
  2. package/dist/nuxt/runtime/composables/useStrandsAuth.cjs.js +1 -1
  3. package/dist/nuxt/runtime/composables/useStrandsAuth.d.ts +32 -1
  4. package/dist/nuxt/runtime/composables/useStrandsAuth.d.ts.map +1 -1
  5. package/dist/nuxt/runtime/composables/useStrandsAuth.es.js +1 -1
  6. package/dist/nuxt/runtime/plugin.client.cjs.js +1 -1
  7. package/dist/nuxt/runtime/plugin.client.es.js +1 -1
  8. package/dist/nuxt/runtime/plugin.server.cjs.js +1 -1
  9. package/dist/nuxt/runtime/plugin.server.es.js +1 -1
  10. package/dist/nuxt-v4/runtime/composables/useStrandsAuth.cjs.js +1 -1
  11. package/dist/nuxt-v4/runtime/composables/useStrandsAuth.es.js +1 -1
  12. package/dist/nuxt-v4/runtime/plugin.client.cjs.js +1 -1
  13. package/dist/nuxt-v4/runtime/plugin.client.es.js +1 -1
  14. package/dist/nuxt-v4/runtime/plugin.server.cjs.js +1 -1
  15. package/dist/nuxt-v4/runtime/plugin.server.es.js +1 -1
  16. package/dist/strands-auth-ui.cjs.js +3990 -625
  17. package/dist/strands-auth-ui.cjs.js.map +1 -1
  18. package/dist/strands-auth-ui.es.js +4000 -635
  19. package/dist/strands-auth-ui.es.js.map +1 -1
  20. package/dist/types/index.d.ts +8 -0
  21. package/dist/types/index.d.ts.map +1 -1
  22. package/dist/{useStrandsAuth-Bw5wrBA2.cjs → useStrandsAuth-CVR23cd8.cjs} +142 -7
  23. package/dist/useStrandsAuth-CVR23cd8.cjs.map +1 -0
  24. package/dist/{useStrandsAuth-DQbwHB-6.js → useStrandsAuth-if4J5WT8.js} +142 -7
  25. package/dist/useStrandsAuth-if4J5WT8.js.map +1 -0
  26. package/dist/{useStrandsConfig-V7XSMyQ5.js → useStrandsConfig-Bdk-g0jS.js} +11 -1
  27. package/dist/useStrandsConfig-Bdk-g0jS.js.map +1 -0
  28. package/dist/{useStrandsConfig-B9UkrP-c.cjs → useStrandsConfig-CtmQtE7Y.cjs} +11 -1
  29. package/dist/useStrandsConfig-CtmQtE7Y.cjs.map +1 -0
  30. package/dist/vue/components/SignedIn.vue.d.ts +4 -0
  31. package/dist/vue/components/SignedIn.vue.d.ts.map +1 -1
  32. package/dist/vue/components/SignedOut.vue.d.ts +4 -0
  33. package/dist/vue/components/SignedOut.vue.d.ts.map +1 -1
  34. package/dist/vue/components/StrandsCompleteSignUp.vue.d.ts.map +1 -1
  35. package/dist/vue/components/StrandsConfirmModal.vue.d.ts +2 -2
  36. package/dist/vue/components/StrandsHardwareKeySetupModal.vue.d.ts +4 -1
  37. package/dist/vue/components/StrandsHardwareKeySetupModal.vue.d.ts.map +1 -1
  38. package/dist/vue/components/StrandsMfaVerification.vue.d.ts.map +1 -1
  39. package/dist/vue/components/StrandsSettingsModal.vue.d.ts +18 -0
  40. package/dist/vue/components/StrandsSettingsModal.vue.d.ts.map +1 -0
  41. package/dist/vue/components/StrandsUserProfile.vue.d.ts +1 -1
  42. package/dist/vue/components/StrandsUserProfile.vue.d.ts.map +1 -1
  43. package/dist/vue/components/index.d.ts +1 -0
  44. package/dist/vue/components/index.d.ts.map +1 -1
  45. package/dist/vue/composables/useStrandsAuth.d.ts +32 -1
  46. package/dist/vue/composables/useStrandsAuth.d.ts.map +1 -1
  47. package/dist/vue/composables/useStrandsConfig.d.ts.map +1 -1
  48. package/dist/vue/ui/UiAvatarEditor.vue.d.ts +24 -0
  49. package/dist/vue/ui/UiAvatarEditor.vue.d.ts.map +1 -0
  50. package/dist/vue/ui/UiAvatarEditorSimple.vue.d.ts +25 -0
  51. package/dist/vue/ui/UiAvatarEditorSimple.vue.d.ts.map +1 -0
  52. package/dist/vue/ui/UiButton.vue.d.ts +1 -0
  53. package/dist/vue/ui/UiButton.vue.d.ts.map +1 -1
  54. package/dist/vue/ui/UiInput.vue.d.ts +6 -1
  55. package/dist/vue/ui/UiInput.vue.d.ts.map +1 -1
  56. package/dist/vue/ui/UiLevelProgress.vue.d.ts +19 -0
  57. package/dist/vue/ui/UiLevelProgress.vue.d.ts.map +1 -0
  58. package/dist/vue/ui/UiToggle.vue.d.ts +15 -0
  59. package/dist/vue/ui/UiToggle.vue.d.ts.map +1 -0
  60. package/dist/vue/ui/index.d.ts +4 -0
  61. package/dist/vue/ui/index.d.ts.map +1 -1
  62. package/dist/vue/utils/sounds.d.ts +57 -0
  63. package/dist/vue/utils/sounds.d.ts.map +1 -0
  64. package/package.json +3 -1
  65. package/dist/useStrandsAuth-Bw5wrBA2.cjs.map +0 -1
  66. package/dist/useStrandsAuth-DQbwHB-6.js.map +0 -1
  67. package/dist/useStrandsConfig-B9UkrP-c.cjs.map +0 -1
  68. package/dist/useStrandsConfig-V7XSMyQ5.js.map +0 -1
@@ -7,6 +7,10 @@ export interface User {
7
7
  mfaEnabled: boolean;
8
8
  emailVerified: boolean;
9
9
  passwordUpdatedAt?: string | Date;
10
+ settings?: any;
11
+ xp: number;
12
+ username?: string;
13
+ usernameLastChangedAt?: string | Date;
10
14
  createdAt: string | Date;
11
15
  updatedAt: string | Date;
12
16
  }
@@ -133,6 +137,10 @@ export interface StrandsAuthEndpoints {
133
137
  oauthProvider: string;
134
138
  changeEmail: string;
135
139
  avatar: string;
140
+ settings: string;
141
+ changeUsername: string;
142
+ usernameCooldown: string;
143
+ checkUsernameAvailability: string;
136
144
  mfaDevices: string;
137
145
  mfaTotpSetup: string;
138
146
  mfaTotpVerify: string;
@@ -1 +1 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../apps/accounts-ui/src/types/index.ts"],"names":[],"mappings":"AAIA,MAAM,WAAW,IAAI;IACnB,EAAE,EAAE,MAAM,CAAA;IACV,KAAK,EAAE,MAAM,CAAA;IACb,SAAS,EAAE,MAAM,CAAA;IACjB,QAAQ,EAAE,MAAM,CAAA;IAChB,MAAM,CAAC,EAAE,MAAM,CAAA;IACf,UAAU,EAAE,OAAO,CAAA;IACnB,aAAa,EAAE,OAAO,CAAA;IACtB,iBAAiB,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA;IACjC,SAAS,EAAE,MAAM,GAAG,IAAI,CAAA;IACxB,SAAS,EAAE,MAAM,GAAG,IAAI,CAAA;CACzB;AAED,MAAM,WAAW,OAAO;IACtB,EAAE,CAAC,EAAE,MAAM,CAAA;IACX,MAAM,CAAC,EAAE,MAAM,CAAA;IACf,WAAW,EAAE,MAAM,CAAA;IACnB,YAAY,EAAE,MAAM,CAAA;IACpB,SAAS,EAAE,IAAI,CAAA;IACf,SAAS,CAAC,EAAE,IAAI,CAAA;CACjB;AAED,MAAM,WAAW,UAAU;IACzB,MAAM,EAAE,MAAM,CAAA;IACd,aAAa,EAAE,MAAM,CAAA;IACrB,SAAS,EAAE,MAAM,CAAA;IACjB,WAAW,CAAC,EAAE,OAAO,CAAA;IACrB,WAAW,CAAC,EAAE,MAAM,CAAA;CACrB;AAGD,MAAM,WAAW,iBAAiB;IAChC,KAAK,EAAE,MAAM,CAAA;IACb,QAAQ,EAAE,MAAM,CAAA;CACjB;AAED,MAAM,WAAW,UAAU;IACzB,KAAK,EAAE,MAAM,CAAA;IACb,QAAQ,EAAE,MAAM,CAAA;IAChB,SAAS,EAAE,MAAM,CAAA;IACjB,QAAQ,EAAE,MAAM,CAAA;CACjB;AAGD,MAAM,WAAW,aAAa;IAC5B,EAAE,EAAE,MAAM,CAAA;IACV,IAAI,EAAE,MAAM,CAAA;IACZ,OAAO,EAAE,OAAO,CAAA;IAChB,QAAQ,CAAC,EAAE,MAAM,CAAA;IACjB,MAAM,CAAC,EAAE,MAAM,EAAE,CAAA;CAClB;AAGD,MAAM,WAAW,iBAAiB;IAChC;;;OAGG;IACH,OAAO,CAAC,EAAE,MAAM,CAAA;IAEhB;;OAEG;IACH,QAAQ,CAAC,EAAE,MAAM,CAAA;IAEjB;;;OAGG;IACH,WAAW,CAAC,EAAE,MAAM,CAAA;IAEpB;;;OAGG;IACH,WAAW,CAAC,EAAE,MAAM,CAAA;IAEpB;;;OAGG;IACH,WAAW,CAAC,EAAE,MAAM,CAAA;IAEpB;;;OAGG;IACH,YAAY,CAAC,EAAE,MAAM,CAAA;IAErB;;;OAGG;IACH,WAAW,CAAC,EAAE,OAAO,CAAA;IAErB;;;OAGG;IACH,eAAe,CAAC,EAAE,MAAM,CAAA;IAExB;;;OAGG;IACH,eAAe,CAAC,EAAE,MAAM,EAAE,CAAA;IAE1B;;;OAGG;IACH,eAAe,CAAC,EAAE,MAAM,EAAE,CAAA;IAE1B;;;OAGG;IACH,OAAO,CAAC,EAAE,OAAO,CAAA;IAEjB;;;OAGG;IACH,YAAY,CAAC,EAAE,MAAM,CAAA;IAErB;;;;OAIG;IACH,iBAAiB,CAAC,EAAE,MAAM,CAAA;IAE1B;;;;OAIG;IACH,MAAM,CAAC,EAAE,OAAO,CAAA;IAEhB;;OAEG;IACH,SAAS,CAAC,EAAE,OAAO,CAAC,oBAAoB,CAAC,CAAA;CAC1C;AAED,MAAM,WAAW,oBAAoB;IACnC,MAAM,EAAE,MAAM,CAAA;IACd,MAAM,EAAE,MAAM,CAAA;IACd,OAAO,EAAE,MAAM,CAAA;IACf,OAAO,EAAE,MAAM,CAAA;IACf,aAAa,EAAE,MAAM,CAAA;IACrB,oBAAoB,EAAE,MAAM,CAAA;IAC5B,oBAAoB,EAAE,MAAM,CAAA;IAC5B,OAAO,EAAE,MAAM,CAAA;IACf,WAAW,EAAE,MAAM,CAAA;IACnB,cAAc,EAAE,MAAM,CAAA;IACtB,aAAa,EAAE,MAAM,CAAA;IACrB,WAAW,EAAE,MAAM,CAAA;IACnB,MAAM,EAAE,MAAM,CAAA;IAEd,UAAU,EAAE,MAAM,CAAA;IAClB,YAAY,EAAE,MAAM,CAAA;IACpB,aAAa,EAAE,MAAM,CAAA;IACrB,aAAa,EAAE,MAAM,CAAA;IACrB,YAAY,EAAE,MAAM,CAAA;IACpB,cAAc,EAAE,MAAM,CAAA;IACtB,gBAAgB,EAAE,MAAM,CAAA;IACxB,cAAc,EAAE,MAAM,CAAA;IAEtB,4BAA4B,EAAE,MAAM,CAAA;IACpC,+BAA+B,EAAE,MAAM,CAAA;IAEvC,kBAAkB,EAAE,MAAM,CAAA;IAC1B,eAAe,EAAE,MAAM,CAAA;IACvB,mBAAmB,EAAE,MAAM,CAAA;IAC3B,oBAAoB,EAAE,MAAM,CAAA;CAC7B;AAGD,MAAM,WAAW,YAAY;IAC3B,YAAY,EAAE,MAAM,CAAA;IACpB,aAAa,EAAE,MAAM,CAAA;IACrB,IAAI,EAAE,IAAI,CAAA;IACV,YAAY,CAAC,EAAE,OAAO,CAAA;IACtB,cAAc,CAAC,EAAE,MAAM,CAAA;IACvB,qBAAqB,CAAC,EAAE,SAAS,EAAE,CAAA;CACpC;AAGD,MAAM,MAAM,aAAa,GAAG,MAAM,GAAG,OAAO,GAAG,UAAU,GAAG,SAAS,CAAA;AAErE,MAAM,WAAW,SAAS;IACxB,EAAE,EAAE,MAAM,CAAA;IACV,WAAW,EAAE,aAAa,CAAA;IAC1B,WAAW,EAAE,MAAM,CAAA;IACnB,SAAS,EAAE,OAAO,CAAA;IAClB,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA;IAC5B,UAAU,EAAE,MAAM,GAAG,IAAI,CAAA;CAC1B;AAED,MAAM,WAAW,kBAAkB;IACjC,OAAO,EAAE,SAAS,EAAE,CAAA;IACpB,WAAW,EAAE,OAAO,CAAA;CACrB;AAED,MAAM,WAAW,iBAAiB;IAChC,SAAS,EAAE,MAAM,CAAA;IACjB,MAAM,EAAE,MAAM,CAAA;IACd,WAAW,EAAE,MAAM,CAAA;IACnB,YAAY,EAAE,MAAM,EAAE,CAAA;CACvB;AAED,MAAM,WAAW,mBAAmB;IAClC,YAAY,EAAE,MAAM,EAAE,CAAA;CACvB;AAGD,MAAM,WAAW,gBAAgB;IAC/B,IAAI,EAAE,MAAM,CAAA;IACZ,OAAO,EAAE,MAAM,CAAA;IACf,cAAc,CAAC,EAAE,MAAM,CAAA;IACvB,iBAAiB,CAAC,EAAE,MAAM,EAAE,CAAA;CAC7B"}
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../apps/accounts-ui/src/types/index.ts"],"names":[],"mappings":"AAIA,MAAM,WAAW,IAAI;IACnB,EAAE,EAAE,MAAM,CAAA;IACV,KAAK,EAAE,MAAM,CAAA;IACb,SAAS,EAAE,MAAM,CAAA;IACjB,QAAQ,EAAE,MAAM,CAAA;IAChB,MAAM,CAAC,EAAE,MAAM,CAAA;IACf,UAAU,EAAE,OAAO,CAAA;IACnB,aAAa,EAAE,OAAO,CAAA;IACtB,iBAAiB,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA;IACjC,QAAQ,CAAC,EAAE,GAAG,CAAA;IACd,EAAE,EAAE,MAAM,CAAA;IACV,QAAQ,CAAC,EAAE,MAAM,CAAA;IACjB,qBAAqB,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA;IACrC,SAAS,EAAE,MAAM,GAAG,IAAI,CAAA;IACxB,SAAS,EAAE,MAAM,GAAG,IAAI,CAAA;CACzB;AAED,MAAM,WAAW,OAAO;IACtB,EAAE,CAAC,EAAE,MAAM,CAAA;IACX,MAAM,CAAC,EAAE,MAAM,CAAA;IACf,WAAW,EAAE,MAAM,CAAA;IACnB,YAAY,EAAE,MAAM,CAAA;IACpB,SAAS,EAAE,IAAI,CAAA;IACf,SAAS,CAAC,EAAE,IAAI,CAAA;CACjB;AAED,MAAM,WAAW,UAAU;IACzB,MAAM,EAAE,MAAM,CAAA;IACd,aAAa,EAAE,MAAM,CAAA;IACrB,SAAS,EAAE,MAAM,CAAA;IACjB,WAAW,CAAC,EAAE,OAAO,CAAA;IACrB,WAAW,CAAC,EAAE,MAAM,CAAA;CACrB;AAGD,MAAM,WAAW,iBAAiB;IAChC,KAAK,EAAE,MAAM,CAAA;IACb,QAAQ,EAAE,MAAM,CAAA;CACjB;AAED,MAAM,WAAW,UAAU;IACzB,KAAK,EAAE,MAAM,CAAA;IACb,QAAQ,EAAE,MAAM,CAAA;IAChB,SAAS,EAAE,MAAM,CAAA;IACjB,QAAQ,EAAE,MAAM,CAAA;CACjB;AAGD,MAAM,WAAW,aAAa;IAC5B,EAAE,EAAE,MAAM,CAAA;IACV,IAAI,EAAE,MAAM,CAAA;IACZ,OAAO,EAAE,OAAO,CAAA;IAChB,QAAQ,CAAC,EAAE,MAAM,CAAA;IACjB,MAAM,CAAC,EAAE,MAAM,EAAE,CAAA;CAClB;AAGD,MAAM,WAAW,iBAAiB;IAChC;;;OAGG;IACH,OAAO,CAAC,EAAE,MAAM,CAAA;IAEhB;;OAEG;IACH,QAAQ,CAAC,EAAE,MAAM,CAAA;IAEjB;;;OAGG;IACH,WAAW,CAAC,EAAE,MAAM,CAAA;IAEpB;;;OAGG;IACH,WAAW,CAAC,EAAE,MAAM,CAAA;IAEpB;;;OAGG;IACH,WAAW,CAAC,EAAE,MAAM,CAAA;IAEpB;;;OAGG;IACH,YAAY,CAAC,EAAE,MAAM,CAAA;IAErB;;;OAGG;IACH,WAAW,CAAC,EAAE,OAAO,CAAA;IAErB;;;OAGG;IACH,eAAe,CAAC,EAAE,MAAM,CAAA;IAExB;;;OAGG;IACH,eAAe,CAAC,EAAE,MAAM,EAAE,CAAA;IAE1B;;;OAGG;IACH,eAAe,CAAC,EAAE,MAAM,EAAE,CAAA;IAE1B;;;OAGG;IACH,OAAO,CAAC,EAAE,OAAO,CAAA;IAEjB;;;OAGG;IACH,YAAY,CAAC,EAAE,MAAM,CAAA;IAErB;;;;OAIG;IACH,iBAAiB,CAAC,EAAE,MAAM,CAAA;IAE1B;;;;OAIG;IACH,MAAM,CAAC,EAAE,OAAO,CAAA;IAEhB;;OAEG;IACH,SAAS,CAAC,EAAE,OAAO,CAAC,oBAAoB,CAAC,CAAA;CAC1C;AAED,MAAM,WAAW,oBAAoB;IACnC,MAAM,EAAE,MAAM,CAAA;IACd,MAAM,EAAE,MAAM,CAAA;IACd,OAAO,EAAE,MAAM,CAAA;IACf,OAAO,EAAE,MAAM,CAAA;IACf,aAAa,EAAE,MAAM,CAAA;IACrB,oBAAoB,EAAE,MAAM,CAAA;IAC5B,oBAAoB,EAAE,MAAM,CAAA;IAC5B,OAAO,EAAE,MAAM,CAAA;IACf,WAAW,EAAE,MAAM,CAAA;IACnB,cAAc,EAAE,MAAM,CAAA;IACtB,aAAa,EAAE,MAAM,CAAA;IACrB,WAAW,EAAE,MAAM,CAAA;IACnB,MAAM,EAAE,MAAM,CAAA;IACd,QAAQ,EAAE,MAAM,CAAA;IAEhB,cAAc,EAAE,MAAM,CAAA;IACtB,gBAAgB,EAAE,MAAM,CAAA;IACxB,yBAAyB,EAAE,MAAM,CAAA;IAEjC,UAAU,EAAE,MAAM,CAAA;IAClB,YAAY,EAAE,MAAM,CAAA;IACpB,aAAa,EAAE,MAAM,CAAA;IACrB,aAAa,EAAE,MAAM,CAAA;IACrB,YAAY,EAAE,MAAM,CAAA;IACpB,cAAc,EAAE,MAAM,CAAA;IACtB,gBAAgB,EAAE,MAAM,CAAA;IACxB,cAAc,EAAE,MAAM,CAAA;IAEtB,4BAA4B,EAAE,MAAM,CAAA;IACpC,+BAA+B,EAAE,MAAM,CAAA;IAEvC,kBAAkB,EAAE,MAAM,CAAA;IAC1B,eAAe,EAAE,MAAM,CAAA;IACvB,mBAAmB,EAAE,MAAM,CAAA;IAC3B,oBAAoB,EAAE,MAAM,CAAA;CAC7B;AAGD,MAAM,WAAW,YAAY;IAC3B,YAAY,EAAE,MAAM,CAAA;IACpB,aAAa,EAAE,MAAM,CAAA;IACrB,IAAI,EAAE,IAAI,CAAA;IACV,YAAY,CAAC,EAAE,OAAO,CAAA;IACtB,cAAc,CAAC,EAAE,MAAM,CAAA;IACvB,qBAAqB,CAAC,EAAE,SAAS,EAAE,CAAA;CACpC;AAGD,MAAM,MAAM,aAAa,GAAG,MAAM,GAAG,OAAO,GAAG,UAAU,GAAG,SAAS,CAAA;AAErE,MAAM,WAAW,SAAS;IACxB,EAAE,EAAE,MAAM,CAAA;IACV,WAAW,EAAE,aAAa,CAAA;IAC1B,WAAW,EAAE,MAAM,CAAA;IACnB,SAAS,EAAE,OAAO,CAAA;IAClB,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA;IAC5B,UAAU,EAAE,MAAM,GAAG,IAAI,CAAA;CAC1B;AAED,MAAM,WAAW,kBAAkB;IACjC,OAAO,EAAE,SAAS,EAAE,CAAA;IACpB,WAAW,EAAE,OAAO,CAAA;CACrB;AAED,MAAM,WAAW,iBAAiB;IAChC,SAAS,EAAE,MAAM,CAAA;IACjB,MAAM,EAAE,MAAM,CAAA;IACd,WAAW,EAAE,MAAM,CAAA;IACnB,YAAY,EAAE,MAAM,EAAE,CAAA;CACvB;AAED,MAAM,WAAW,mBAAmB;IAClC,YAAY,EAAE,MAAM,EAAE,CAAA;CACvB;AAGD,MAAM,WAAW,gBAAgB;IAC/B,IAAI,EAAE,MAAM,CAAA;IACZ,OAAO,EAAE,MAAM,CAAA;IACf,cAAc,CAAC,EAAE,MAAM,CAAA;IACvB,iBAAiB,CAAC,EAAE,MAAM,EAAE,CAAA;CAC7B"}
@@ -1,6 +1,6 @@
1
1
  "use strict";
2
2
  const vue = require("vue");
3
- const useStrandsConfig = require("./useStrandsConfig-B9UkrP-c.cjs");
3
+ const useStrandsConfig = require("./useStrandsConfig-CtmQtE7Y.cjs");
4
4
  const { getUrl } = useStrandsConfig.useStrandsConfig();
5
5
  const currentUser = vue.ref(null);
6
6
  const currentSession = vue.ref(null);
@@ -194,7 +194,7 @@ function useStrandsAuth() {
194
194
  throw new Error(`Token refresh failed: ${response.status} ${response.statusText}`);
195
195
  }
196
196
  const authData = await response.json();
197
- setAuthData(authData);
197
+ setAuthData(authData, true);
198
198
  return true;
199
199
  } catch (error) {
200
200
  await signOut();
@@ -231,6 +231,10 @@ function useStrandsAuth() {
231
231
  mfaEnabled: userData.mfaEnabled || false,
232
232
  emailVerified: userData.email_verified,
233
233
  passwordUpdatedAt: userData.password_updated_at,
234
+ settings: userData.settings || {},
235
+ xp: userData.xp || 0,
236
+ username: userData.username,
237
+ usernameLastChangedAt: userData.username_last_changed_at,
234
238
  createdAt: userData.created_at,
235
239
  updatedAt: userData.updated_at || (/* @__PURE__ */ new Date()).toISOString()
236
240
  };
@@ -291,6 +295,45 @@ function useStrandsAuth() {
291
295
  isLoadingProfile.value = false;
292
296
  }
293
297
  };
298
+ const updateUserSettings = async (settings) => {
299
+ if (!currentSession.value?.accessToken) {
300
+ throw new Error("No access token available");
301
+ }
302
+ isLoadingProfile.value = true;
303
+ try {
304
+ const response = await fetch(getUrl("settings"), {
305
+ method: "POST",
306
+ headers: {
307
+ "Content-Type": "application/json",
308
+ "Authorization": `Bearer ${currentSession.value.accessToken}`
309
+ },
310
+ body: JSON.stringify({
311
+ settings
312
+ })
313
+ });
314
+ if (!response.ok) {
315
+ if (response.status === 401) {
316
+ throw new Error("Authentication expired. Please sign in again.");
317
+ } else {
318
+ throw new Error(`Settings update failed: ${response.status} ${response.statusText}`);
319
+ }
320
+ }
321
+ const updatedUserData = await response.json();
322
+ if (currentUser.value) {
323
+ currentUser.value = {
324
+ ...currentUser.value,
325
+ settings: updatedUserData.settings,
326
+ updatedAt: updatedUserData.updated_at || (/* @__PURE__ */ new Date()).toISOString()
327
+ };
328
+ if (typeof window !== "undefined") {
329
+ localStorage.setItem("strands_auth_user", JSON.stringify(currentUser.value));
330
+ }
331
+ }
332
+ return currentUser.value;
333
+ } finally {
334
+ isLoadingProfile.value = false;
335
+ }
336
+ };
294
337
  const changeEmail = async (newEmail, password) => {
295
338
  if (!currentSession.value?.accessToken) {
296
339
  throw new Error("No access token available");
@@ -424,23 +467,41 @@ function useStrandsAuth() {
424
467
  }
425
468
  return response.json();
426
469
  };
427
- const setAuthData = (authResponse) => {
470
+ const setAuthData = (authResponse, isTokenRefresh = false) => {
428
471
  try {
429
- currentUser.value = authResponse.user;
472
+ if (authResponse.user) {
473
+ if (isTokenRefresh && currentUser.value) {
474
+ currentUser.value = {
475
+ ...currentUser.value,
476
+ ...authResponse.user,
477
+ // Preserve certain fields that might be missing in refresh response
478
+ avatar: authResponse.user.avatar || currentUser.value.avatar,
479
+ firstName: authResponse.user.firstName || currentUser.value.firstName,
480
+ lastName: authResponse.user.lastName || currentUser.value.lastName
481
+ };
482
+ } else {
483
+ currentUser.value = authResponse.user;
484
+ }
485
+ } else if (!isTokenRefresh) {
486
+ currentUser.value = null;
487
+ }
430
488
  const session = {
431
489
  accessToken: authResponse.access_token,
432
490
  refreshToken: authResponse.refresh_token,
433
491
  expiresAt: new Date(Date.now() + 5 * 60 * 1e3),
434
492
  // 5 minutes from now (matching API token expiry)
435
- userId: authResponse.user.id
493
+ userId: currentUser.value?.id || authResponse.user?.id
436
494
  };
437
495
  currentSession.value = session;
438
496
  if (typeof window !== "undefined") {
439
497
  localStorage.setItem("strands_auth_session", JSON.stringify(session));
440
- localStorage.setItem("strands_auth_user", JSON.stringify(authResponse.user));
498
+ if (currentUser.value) {
499
+ localStorage.setItem("strands_auth_user", JSON.stringify(currentUser.value));
500
+ }
441
501
  }
442
502
  startTokenRefreshTimer();
443
503
  } catch (error) {
504
+ console.error("Error setting auth data:", error);
444
505
  }
445
506
  };
446
507
  const startTokenRefreshTimer = () => {
@@ -501,6 +562,76 @@ function useStrandsAuth() {
501
562
  isInitializing.value = false;
502
563
  }
503
564
  };
565
+ const changeUsername = async (newUsername) => {
566
+ if (!currentSession.value?.accessToken) {
567
+ throw new Error("No access token available");
568
+ }
569
+ isLoadingProfile.value = true;
570
+ try {
571
+ const response = await fetch(getUrl("changeUsername"), {
572
+ method: "POST",
573
+ headers: {
574
+ "Content-Type": "application/json",
575
+ "Authorization": `Bearer ${currentSession.value.accessToken}`
576
+ },
577
+ body: JSON.stringify({
578
+ username: newUsername
579
+ })
580
+ });
581
+ if (!response.ok) {
582
+ const errorData = await response.json().catch(() => ({}));
583
+ if (response.status === 409) {
584
+ throw new Error("Username is already taken");
585
+ } else if (errorData.cooldown_end) {
586
+ throw new Error(`You can only change your username once every 30 days. You can change it again on ${new Date(errorData.cooldown_end).toLocaleDateString()}`);
587
+ }
588
+ throw new Error(errorData.message || `Username change failed: ${response.status} ${response.statusText}`);
589
+ }
590
+ const result = await response.json();
591
+ if (currentUser.value) {
592
+ currentUser.value = {
593
+ ...currentUser.value,
594
+ username: newUsername,
595
+ usernameLastChangedAt: (/* @__PURE__ */ new Date()).toISOString(),
596
+ updatedAt: (/* @__PURE__ */ new Date()).toISOString()
597
+ };
598
+ if (typeof window !== "undefined") {
599
+ localStorage.setItem("strands_auth_user", JSON.stringify(currentUser.value));
600
+ }
601
+ }
602
+ return result;
603
+ } finally {
604
+ isLoadingProfile.value = false;
605
+ }
606
+ };
607
+ const getUsernameCooldown = async () => {
608
+ if (!currentSession.value?.accessToken) {
609
+ throw new Error("No access token available");
610
+ }
611
+ const response = await fetch(getUrl("usernameCooldown"), {
612
+ method: "GET",
613
+ headers: {
614
+ "Authorization": `Bearer ${currentSession.value.accessToken}`
615
+ }
616
+ });
617
+ if (!response.ok) {
618
+ throw new Error(`Failed to get username cooldown: ${response.status} ${response.statusText}`);
619
+ }
620
+ return response.json();
621
+ };
622
+ const checkUsernameAvailability = async (username) => {
623
+ const url = getUrl("checkUsernameAvailability").replace("{username}", encodeURIComponent(username));
624
+ const response = await fetch(url, {
625
+ method: "GET",
626
+ headers: {
627
+ "Content-Type": "application/json"
628
+ }
629
+ });
630
+ if (!response.ok) {
631
+ throw new Error(`Failed to check username availability: ${response.status} ${response.statusText}`);
632
+ }
633
+ return response.json();
634
+ };
504
635
  if (!isInitialized.value) {
505
636
  initialize();
506
637
  }
@@ -532,7 +663,11 @@ function useStrandsAuth() {
532
663
  refreshToken,
533
664
  fetchProfile,
534
665
  updateProfile,
666
+ updateUserSettings,
535
667
  changeEmail,
668
+ changeUsername,
669
+ getUsernameCooldown,
670
+ checkUsernameAvailability,
536
671
  initialize,
537
672
  setAuthData,
538
673
  verifyMfa,
@@ -552,4 +687,4 @@ function useStrandsAuth() {
552
687
  };
553
688
  }
554
689
  exports.useStrandsAuth = useStrandsAuth;
555
- //# sourceMappingURL=useStrandsAuth-Bw5wrBA2.cjs.map
690
+ //# sourceMappingURL=useStrandsAuth-CVR23cd8.cjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"useStrandsAuth-CVR23cd8.cjs","sources":["../../../apps/accounts-ui/src/vue/composables/useStrandsAuth.ts"],"sourcesContent":["import { ref, computed } from 'vue'\nimport type { User, Session, SignInCredentials, SignUpData, AuthResponse, MfaDevice, MfaErrorResponse } from '../../types'\nimport { useStrandsConfig } from './useStrandsConfig'\n\nconst { getUrl } = useStrandsConfig()\n\nconst currentUser = ref<User | null>(null)\nconst currentSession = ref<Session | null>(null)\n\n// Specific loading states\nconst isInitializing = ref(true)\nconst isSigningIn = ref(false)\nconst isSigningUp = ref(false)\nconst isSigningOut = ref(false)\nconst isRefreshingToken = ref(false)\nconst isSendingMfaEmail = ref(false)\nconst isVerifyingMfa = ref(false)\nconst isLoadingProfile = ref(false)\n\n// Legacy loading states for backward compatibility\nconst loading = computed(() => isSigningIn.value || isSigningUp.value || isSigningOut.value || isRefreshingToken.value || isSendingMfaEmail.value || isVerifyingMfa.value || isLoadingProfile.value)\nconst isLoading = computed(() => isInitializing.value || loading.value)\n\n// Loading messages for better UX\nconst loadingMessage = computed(() => {\n if (isInitializing.value) return 'Checking authentication...'\n if (isSigningIn.value) return 'Signing you in...'\n if (isSigningUp.value) return 'Creating your account...'\n if (isSigningOut.value) return 'Signing you out...'\n if (isRefreshingToken.value) return 'Refreshing session...'\n if (isSendingMfaEmail.value) return 'Sending verification code...'\n if (isVerifyingMfa.value) return 'Verifying code...'\n return 'Loading...' // Fallback\n})\n\nconst isInitialized = ref(false)\n\n// MFA state\nconst mfaRequired = ref(false)\nconst mfaSessionId = ref<string | null>(null)\nconst availableMfaMethods = ref<MfaDevice[]>([])\n\n// Token refresh timer\nlet refreshTimer: NodeJS.Timeout | null = null\n\nexport function useStrandsAuth() {\n /**\n * Complete hardware key (WebAuthn) registration for MFA\n * Returns result with backup codes on success\n */\n const completeHardwareKeyRegistration = async (deviceId: string, credential: any, accessToken: string) => {\n if (!currentSession.value?.accessToken) {\n throw new Error('No access token available')\n }\n\n const response = await fetch(getUrl('mfaHardwareCompleteRegistration'), {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/json',\n 'Authorization': `Bearer ${currentSession.value.accessToken}`\n },\n body: JSON.stringify({\n device_id: deviceId,\n credential: credential\n })\n })\n if (!response.ok) {\n const errorText = await response.text()\n let errorMessage = 'Failed to complete hardware key registration'\n \n try {\n const errorData = JSON.parse(errorText)\n errorMessage = errorData.message || errorData.error || errorText\n } catch {\n errorMessage = errorText || 'Failed to complete hardware key registration'\n }\n \n throw new Error(errorMessage)\n }\n return response.json()\n }\n /**\n * Register a hardware key (WebAuthn) for MFA\n * Returns { device_id, challenge } on success\n */\n const registerHardwareKey = async (deviceName: string, accessToken: string, deviceType: 'hardware' | 'passkey' = 'hardware') => {\n if (!currentSession.value?.accessToken) {\n throw new Error('No access token available')\n }\n \n const response = await fetch(getUrl('mfaHardwareStartRegistration'), {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/json',\n 'Authorization': `Bearer ${currentSession.value.accessToken}`,\n },\n body: JSON.stringify({ \n device_name: deviceName,\n device_type: deviceType \n })\n })\n if (!response.ok) {\n const errorText = await response.text()\n let errorMessage = 'Failed to start hardware key registration'\n \n try {\n const errorData = JSON.parse(errorText)\n errorMessage = errorData.message || errorData.error || errorText\n } catch {\n errorMessage = errorText || 'Failed to start hardware key registration'\n }\n \n throw new Error(errorMessage)\n }\n return response.json()\n }\n\n const isAuthenticated = computed(() => currentUser.value !== null)\n\n const signIn = async (credentials: SignInCredentials) => {\n isSigningIn.value = true\n try {\n // Reset MFA state at start of new sign-in attempt\n mfaRequired.value = false\n mfaSessionId.value = null\n availableMfaMethods.value = []\n \n // Make API call to sign-in endpoint\n const response = await fetch(getUrl('signIn'), {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/json',\n },\n body: JSON.stringify(credentials),\n })\n\n if (!response.ok) {\n if (response.status === 401) {\n throw new Error('Invalid email or password')\n } else if (response.status === 403) {\n throw new Error('Please verify your email address before signing in')\n } else {\n throw new Error(`Sign in failed: ${response.status} ${response.statusText}`)\n }\n }\n\n const authData: AuthResponse = await response.json()\n \n // Check if MFA is required\n if (authData.mfa_required) {\n mfaRequired.value = true\n mfaSessionId.value = authData.mfa_session_id || null\n \n // Convert API MFA methods to the expected format\n const methods = (authData.available_mfa_methods || []).map((method: any) => {\n // Create better fallback names for different device types\n let fallbackName = `${method.device_type.charAt(0).toUpperCase() + method.device_type.slice(1)} Authentication`\n \n if (method.device_type === 'hardware') {\n // Better names for hardware keys\n fallbackName = method.device_name || 'Security Key' // Could be YubiKey, FIDO2 Key, etc.\n } else if (method.device_type === 'totp') {\n fallbackName = method.device_name || 'Authenticator App'\n } else if (method.device_type === 'email') {\n fallbackName = method.device_name || 'Email Verification'\n }\n \n return {\n id: method.device_id,\n device_type: method.device_type,\n device_name: method.device_name || fallbackName,\n is_active: true,\n created_at: new Date().toISOString(),\n last_used_at: method.last_used_at,\n // Pass through additional metadata if available\n credential_id: method.credential_id,\n device_info: method.device_info\n }\n })\n availableMfaMethods.value = methods\n \n // Set signIn loading to false immediately so MFA modal can show\n isSigningIn.value = false\n \n return authData // Return without storing full auth data\n }\n \n // Store the authentication data if MFA not required\n setAuthData(authData)\n \n return authData\n } catch (error) {\n throw error\n } finally {\n isSigningIn.value = false\n }\n }\n\n const signUp = async (userData: SignUpData) => {\n isSigningUp.value = true\n try {\n // Integration point: Replace with actual auth SDK call\n // Example: const result = await authSDK.signUp(userData)\n \n throw new Error('Sign up not implemented - please integrate with auth SDK')\n } finally {\n isSigningUp.value = false\n }\n }\n\n const signOut = async () => {\n isSigningOut.value = true\n try {\n // Stop token refresh timer\n stopTokenRefreshTimer()\n \n // Clear user and session state\n currentUser.value = null\n currentSession.value = null\n \n // Clear MFA state\n mfaRequired.value = false\n mfaSessionId.value = null\n availableMfaMethods.value = []\n \n // Clear stored tokens\n if (typeof window !== 'undefined') {\n localStorage.removeItem('strands_auth_session')\n localStorage.removeItem('strands_auth_user')\n }\n } finally {\n isSigningOut.value = false\n }\n }\n\n const refreshToken = async () => {\n if (!currentSession.value?.refreshToken) {\n return false\n }\n \n \n isRefreshingToken.value = true\n try {\n const response = await fetch(getUrl('refresh'), {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/json',\n },\n body: JSON.stringify({\n refresh_token: currentSession.value.refreshToken,\n }),\n })\n\n if (!response.ok) { \n if (response.status === 401) {\n // Refresh token is invalid/expired, sign out user\n await signOut()\n return false\n }\n throw new Error(`Token refresh failed: ${response.status} ${response.statusText}`)\n }\n\n const authData: AuthResponse = await response.json()\n \n // Update auth data with new tokens, preserving existing user data if needed\n setAuthData(authData, true)\n \n return true\n } catch (error) {\n // On refresh failure, sign out the user\n await signOut()\n return false\n }\n }\n\n const fetchProfile = async (): Promise<User | null> => {\n if (!currentSession.value?.accessToken) {\n throw new Error('No access token available')\n }\n \n isLoadingProfile.value = true\n try {\n const response = await fetch(getUrl('profile'), {\n method: 'GET',\n headers: {\n 'Content-Type': 'application/json',\n 'Authorization': `Bearer ${currentSession.value.accessToken}`,\n },\n })\n\n if (!response.ok) {\n if (response.status === 401) {\n throw new Error('Authentication expired. Please sign in again.')\n } else {\n throw new Error(`Failed to fetch profile: ${response.status} ${response.statusText}`)\n }\n }\n\n const userData = await response.json()\n \n // Update the current user state\n currentUser.value = {\n id: userData.id,\n email: userData.email,\n firstName: userData.first_name,\n lastName: userData.last_name,\n avatar: userData.avatar_url,\n mfaEnabled: userData.mfaEnabled || false,\n emailVerified: userData.email_verified,\n passwordUpdatedAt: userData.password_updated_at,\n settings: userData.settings || {},\n xp: userData.xp || 0,\n username: userData.username,\n usernameLastChangedAt: userData.username_last_changed_at,\n createdAt: userData.created_at,\n updatedAt: userData.updated_at || new Date().toISOString(),\n }\n \n // Update localStorage\n if (typeof window !== 'undefined') {\n localStorage.setItem('strands_auth_user', JSON.stringify(currentUser.value))\n }\n \n return currentUser.value\n } finally {\n isLoadingProfile.value = false\n }\n }\n\n const updateProfile = async (profileData: Partial<User>) => {\n if (!currentSession.value?.accessToken) {\n throw new Error('No access token available')\n }\n \n isLoadingProfile.value = true\n try {\n const response = await fetch(getUrl('profile'), {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/json',\n 'Authorization': `Bearer ${currentSession.value.accessToken}`,\n },\n body: JSON.stringify({\n first_name: profileData.firstName,\n last_name: profileData.lastName,\n }),\n })\n\n if (!response.ok) {\n if (response.status === 401) {\n throw new Error('Authentication expired. Please sign in again.')\n } else {\n throw new Error(`Profile update failed: ${response.status} ${response.statusText}`)\n }\n }\n\n const updatedUserData = await response.json()\n \n // Update the current user state\n if (currentUser.value) {\n currentUser.value = {\n ...currentUser.value,\n id: updatedUserData.id,\n firstName: updatedUserData.first_name,\n lastName: updatedUserData.last_name,\n // Keep existing properties not returned by API\n avatar: updatedUserData.avatar_url || currentUser.value.avatar,\n mfaEnabled: currentUser.value.mfaEnabled,\n email: currentUser.value.email, // Keep existing email since we don't update it here\n emailVerified: currentUser.value.emailVerified,\n createdAt: updatedUserData.created_at || currentUser.value.createdAt,\n updatedAt: updatedUserData.updated_at || new Date().toISOString(),\n }\n \n // Update localStorage\n if (typeof window !== 'undefined') {\n localStorage.setItem('strands_auth_user', JSON.stringify(currentUser.value))\n }\n }\n \n return currentUser.value\n } finally {\n isLoadingProfile.value = false\n }\n }\n\n const updateUserSettings = async (settings: any) => {\n if (!currentSession.value?.accessToken) {\n throw new Error('No access token available')\n }\n \n isLoadingProfile.value = true\n try {\n const response = await fetch(getUrl('settings'), {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/json',\n 'Authorization': `Bearer ${currentSession.value.accessToken}`,\n },\n body: JSON.stringify({\n settings: settings,\n }),\n })\n\n if (!response.ok) {\n if (response.status === 401) {\n throw new Error('Authentication expired. Please sign in again.')\n } else {\n throw new Error(`Settings update failed: ${response.status} ${response.statusText}`)\n }\n }\n\n const updatedUserData = await response.json()\n \n // Update the current user state\n if (currentUser.value) {\n currentUser.value = {\n ...currentUser.value,\n settings: updatedUserData.settings,\n updatedAt: updatedUserData.updated_at || new Date().toISOString(),\n }\n \n // Update localStorage\n if (typeof window !== 'undefined') {\n localStorage.setItem('strands_auth_user', JSON.stringify(currentUser.value))\n }\n }\n \n return currentUser.value\n } finally {\n isLoadingProfile.value = false\n }\n }\n\n const changeEmail = async (newEmail: string, password: string) => {\n if (!currentSession.value?.accessToken) {\n throw new Error('No access token available')\n }\n \n isLoadingProfile.value = true\n try {\n const response = await fetch(getUrl('changeEmail'), {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/json',\n 'Authorization': `Bearer ${currentSession.value.accessToken}`,\n },\n body: JSON.stringify({\n new_email: newEmail,\n password: password,\n }),\n })\n\n if (!response.ok) {\n if (response.status === 401) {\n throw new Error('Authentication expired. Please sign in again.')\n } else {\n const errorData = await response.json().catch(() => ({}))\n throw new Error(errorData.message || `Email change failed: ${response.status} ${response.statusText}`)\n }\n }\n\n const result = await response.json()\n \n // Update the current user state with new email\n if (currentUser.value) {\n currentUser.value = {\n ...currentUser.value,\n email: newEmail,\n emailVerified: false, // Email needs to be verified again\n updatedAt: new Date().toISOString(),\n }\n \n // Update localStorage\n if (typeof window !== 'undefined') {\n localStorage.setItem('strands_auth_user', JSON.stringify(currentUser.value))\n }\n }\n \n return result\n } finally {\n isLoadingProfile.value = false\n }\n }\n\n const verifyMfa = async (deviceId: string, code: string, isBackupCode = false) => {\n if (!mfaSessionId.value) {\n throw new Error('No MFA session available')\n }\n\n isVerifyingMfa.value = true\n try {\n const endpoint = isBackupCode ? getUrl('mfaBackupCodeVerify') : getUrl('mfaSigninVerify')\n const body = isBackupCode \n ? { mfa_session_id: mfaSessionId.value, backup_code: code }\n : { mfa_session_id: mfaSessionId.value, device_id: deviceId, code }\n\n const response = await fetch(endpoint, {\n method: 'POST',\n headers: { 'Content-Type': 'application/json' },\n body: JSON.stringify(body),\n })\n\n if (!response.ok) {\n const errorText = await response.text()\n let errorMessage = 'MFA verification failed'\n \n try {\n const errorData = JSON.parse(errorText)\n errorMessage = errorData.message || errorData.error || errorText\n } catch {\n // If parsing fails, use the raw text but clean it up\n errorMessage = errorText || 'MFA verification failed'\n }\n \n throw new Error(errorMessage)\n }\n\n const authData: AuthResponse = await response.json()\n \n // Clear MFA state\n mfaRequired.value = false\n mfaSessionId.value = null\n availableMfaMethods.value = []\n \n // Store the authentication data\n setAuthData(authData)\n \n return authData\n } finally {\n isVerifyingMfa.value = false\n }\n }\n\n const sendMfaEmailCode = async (deviceId: string) => {\n if (!mfaSessionId.value) {\n throw new Error('No MFA session available')\n }\n\n isSendingMfaEmail.value = true\n try {\n const response = await fetch(getUrl('mfaSigninSendEmail'), {\n method: 'POST',\n headers: { 'Content-Type': 'application/json' },\n body: JSON.stringify({\n mfa_session_id: mfaSessionId.value,\n device_id: deviceId,\n }),\n })\n\n if (!response.ok) {\n const errorText = await response.text()\n let errorMessage = 'Failed to send MFA email code'\n \n try {\n const errorData = JSON.parse(errorText)\n errorMessage = errorData.message || errorData.error || errorText\n } catch {\n // If parsing fails, use the raw text but clean it up\n errorMessage = errorText || 'Failed to send MFA email code'\n }\n \n throw new Error(errorMessage)\n }\n\n const result = await response.json()\n return result\n } finally {\n isSendingMfaEmail.value = false\n }\n }\n\n const getMfaWebAuthnChallenge = async (deviceId: string) => {\n if (!mfaSessionId.value) {\n throw new Error('No MFA session available')\n }\n \n const response = await fetch(getUrl('mfaWebAuthnChallenge'), {\n method: 'POST',\n headers: { 'Content-Type': 'application/json' },\n body: JSON.stringify({\n mfa_session_id: mfaSessionId.value,\n device_id: deviceId\n }),\n })\n\n if (!response.ok) {\n const errorText = await response.text()\n let errorMessage = 'Failed to get WebAuthn challenge'\n \n try {\n const errorData = JSON.parse(errorText)\n errorMessage = errorData.message || errorData.error || errorText\n } catch {\n errorMessage = errorText || errorMessage\n }\n \n throw new Error(errorMessage)\n }\n\n return response.json()\n }\n\n const setAuthData = (authResponse: AuthResponse, isTokenRefresh = false) => {\n try {\n // Handle user data\n if (authResponse.user) {\n // During token refresh, merge with existing user data to preserve fields that might not be returned\n if (isTokenRefresh && currentUser.value) {\n currentUser.value = {\n ...currentUser.value,\n ...authResponse.user,\n // Preserve certain fields that might be missing in refresh response\n avatar: authResponse.user.avatar || currentUser.value.avatar,\n firstName: authResponse.user.firstName || currentUser.value.firstName,\n lastName: authResponse.user.lastName || currentUser.value.lastName,\n }\n } else {\n currentUser.value = authResponse.user\n }\n } else if (!isTokenRefresh) {\n // Only clear user if it's not a token refresh and no user data provided\n currentUser.value = null\n }\n // If it's a token refresh and no user data, keep existing user data\n \n // Create session object\n const session: Session = {\n accessToken: authResponse.access_token,\n refreshToken: authResponse.refresh_token,\n expiresAt: new Date(Date.now() + 5 * 60 * 1000), // 5 minutes from now (matching API token expiry)\n userId: currentUser.value?.id || authResponse.user?.id,\n }\n \n currentSession.value = session\n \n // Store in localStorage for persistence\n if (typeof window !== 'undefined') {\n localStorage.setItem('strands_auth_session', JSON.stringify(session))\n if (currentUser.value) {\n localStorage.setItem('strands_auth_user', JSON.stringify(currentUser.value))\n }\n }\n \n // Start automatic token refresh\n startTokenRefreshTimer()\n } catch (error) {\n console.error('Error setting auth data:', error)\n // Silently handle auth data storage errors\n }\n }\n\n // Token refresh timer management\n const startTokenRefreshTimer = () => {\n // Clear existing timer\n if (refreshTimer) {\n clearTimeout(refreshTimer)\n }\n \n if (!currentSession.value) return\n \n // Calculate time until token expires (refresh 1 minute before expiry)\n const now = new Date()\n const expiresAt = currentSession.value.expiresAt\n const timeUntilRefresh = expiresAt.getTime() - now.getTime() - (1 * 60 * 1000) // 1 minute before expiry\n \n // If token is already expired or expires very soon, refresh immediately\n if (timeUntilRefresh <= 0) {\n refreshToken()\n return\n }\n \n // Set timer to refresh token\n refreshTimer = setTimeout(async () => {\n const success = await refreshToken()\n \n if (success) {\n // Schedule next refresh\n startTokenRefreshTimer()\n }\n }, timeUntilRefresh)\n }\n\n const stopTokenRefreshTimer = () => {\n if (refreshTimer) {\n clearTimeout(refreshTimer)\n refreshTimer = null\n }\n }\n\n const initialize = async () => {\n if (isInitialized.value) return\n \n isInitializing.value = true\n try {\n // Check for existing session/token in localStorage\n if (typeof window !== 'undefined') {\n const storedSession = localStorage.getItem('strands_auth_session')\n const storedUser = localStorage.getItem('strands_auth_user')\n \n if (storedSession && storedUser) {\n try {\n const session = JSON.parse(storedSession) as Session\n const user = JSON.parse(storedUser) as User\n \n // Convert expiresAt back to Date object\n session.expiresAt = new Date(session.expiresAt)\n \n // Check if session is still valid\n if (session.expiresAt > new Date()) {\n currentSession.value = session\n currentUser.value = user\n \n // Start token refresh timer for restored session\n startTokenRefreshTimer()\n } else {\n // Session expired, clear storage\n localStorage.removeItem('strands_auth_session')\n localStorage.removeItem('strands_auth_user')\n }\n } catch (error) {\n // Clear corrupted data\n localStorage.removeItem('strands_auth_session')\n localStorage.removeItem('strands_auth_user')\n }\n }\n }\n \n isInitialized.value = true\n \n // Add a small delay to ensure state is fully settled before hiding loading\n await new Promise(resolve => setTimeout(resolve, 50))\n } catch (error) {\n // Silently handle initialization errors\n } finally {\n isInitializing.value = false\n }\n }\n\n const changeUsername = async (newUsername: string) => {\n if (!currentSession.value?.accessToken) {\n throw new Error('No access token available')\n }\n \n isLoadingProfile.value = true\n try {\n const response = await fetch(getUrl('changeUsername'), {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/json',\n 'Authorization': `Bearer ${currentSession.value.accessToken}`,\n },\n body: JSON.stringify({\n username: newUsername,\n }),\n })\n\n if (!response.ok) {\n const errorData = await response.json().catch(() => ({}))\n if (response.status === 409) {\n throw new Error('Username is already taken')\n } else if (errorData.cooldown_end) {\n throw new Error(`You can only change your username once every 30 days. You can change it again on ${new Date(errorData.cooldown_end).toLocaleDateString()}`)\n }\n throw new Error(errorData.message || `Username change failed: ${response.status} ${response.statusText}`)\n }\n\n const result = await response.json()\n \n // Update the current user state with new username\n if (currentUser.value) {\n currentUser.value = {\n ...currentUser.value,\n username: newUsername,\n usernameLastChangedAt: new Date().toISOString(),\n updatedAt: new Date().toISOString(),\n }\n \n // Update localStorage\n if (typeof window !== 'undefined') {\n localStorage.setItem('strands_auth_user', JSON.stringify(currentUser.value))\n }\n }\n \n return result\n } finally {\n isLoadingProfile.value = false\n }\n }\n\n const getUsernameCooldown = async () => {\n if (!currentSession.value?.accessToken) {\n throw new Error('No access token available')\n }\n \n const response = await fetch(getUrl('usernameCooldown'), {\n method: 'GET',\n headers: {\n 'Authorization': `Bearer ${currentSession.value.accessToken}`,\n },\n })\n\n if (!response.ok) {\n throw new Error(`Failed to get username cooldown: ${response.status} ${response.statusText}`)\n }\n\n return response.json()\n }\n\n const checkUsernameAvailability = async (username: string) => {\n // Replace {username} in the URL\n const url = getUrl('checkUsernameAvailability').replace('{username}', encodeURIComponent(username))\n \n const response = await fetch(url, {\n method: 'GET',\n headers: {\n 'Content-Type': 'application/json',\n },\n })\n\n if (!response.ok) {\n throw new Error(`Failed to check username availability: ${response.status} ${response.statusText}`)\n }\n\n return response.json()\n }\n\n // Auto-initialize on first use\n if (!isInitialized.value) {\n initialize()\n }\n\n return {\n // State\n user: computed(() => currentUser.value),\n currentUser: computed(() => currentUser.value),\n currentSession: computed(() => currentSession.value),\n isAuthenticated,\n isLoading: computed(() => isLoading.value || !isInitialized.value),\n loading: computed(() => loading.value),\n loadingMessage,\n \n // Specific loading states\n isInitializing,\n isSigningIn,\n isSigningUp,\n isSigningOut,\n isRefreshingToken,\n isSendingMfaEmail,\n isVerifyingMfa,\n \n // MFA State\n mfaRequired: computed(() => mfaRequired.value),\n mfaSessionId: computed(() => mfaSessionId.value),\n availableMfaMethods: computed(() => availableMfaMethods.value),\n\n // Methods\n signIn,\n signUp,\n signOut,\n refreshToken,\n fetchProfile,\n updateProfile,\n updateUserSettings,\n changeEmail,\n changeUsername,\n getUsernameCooldown,\n checkUsernameAvailability,\n initialize,\n setAuthData,\n verifyMfa,\n sendMfaEmailCode,\n getMfaWebAuthnChallenge,\n registerHardwareKey,\n completeHardwareKeyRegistration,\n \n // Token management\n startTokenRefreshTimer,\n stopTokenRefreshTimer,\n \n // Force re-initialization (useful for testing or navigation)\n forceReInit: () => {\n isInitialized.value = false\n isInitializing.value = true\n initialize()\n },\n }\n}"],"names":["useStrandsConfig","ref","computed"],"mappings":";;;AAIA,MAAM,EAAE,OAAA,IAAWA,kCAAA;AAEnB,MAAM,cAAcC,IAAAA,IAAiB,IAAI;AACzC,MAAM,iBAAiBA,IAAAA,IAAoB,IAAI;AAG/C,MAAM,iBAAiBA,IAAAA,IAAI,IAAI;AAC/B,MAAM,cAAcA,IAAAA,IAAI,KAAK;AAC7B,MAAM,cAAcA,IAAAA,IAAI,KAAK;AAC7B,MAAM,eAAeA,IAAAA,IAAI,KAAK;AAC9B,MAAM,oBAAoBA,IAAAA,IAAI,KAAK;AACnC,MAAM,oBAAoBA,IAAAA,IAAI,KAAK;AACnC,MAAM,iBAAiBA,IAAAA,IAAI,KAAK;AAChC,MAAM,mBAAmBA,IAAAA,IAAI,KAAK;AAGlC,MAAM,UAAUC,IAAAA,SAAS,MAAM,YAAY,SAAS,YAAY,SAAS,aAAa,SAAS,kBAAkB,SAAS,kBAAkB,SAAS,eAAe,SAAS,iBAAiB,KAAK;AACnM,MAAM,YAAYA,IAAAA,SAAS,MAAM,eAAe,SAAS,QAAQ,KAAK;AAGtE,MAAM,iBAAiBA,IAAAA,SAAS,MAAM;AACpC,MAAI,eAAe,MAAO,QAAO;AACjC,MAAI,YAAY,MAAO,QAAO;AAC9B,MAAI,YAAY,MAAO,QAAO;AAC9B,MAAI,aAAa,MAAO,QAAO;AAC/B,MAAI,kBAAkB,MAAO,QAAO;AACpC,MAAI,kBAAkB,MAAO,QAAO;AACpC,MAAI,eAAe,MAAO,QAAO;AACjC,SAAO;AACT,CAAC;AAED,MAAM,gBAAgBD,IAAAA,IAAI,KAAK;AAG/B,MAAM,cAAcA,IAAAA,IAAI,KAAK;AAC7B,MAAM,eAAeA,IAAAA,IAAmB,IAAI;AAC5C,MAAM,sBAAsBA,IAAAA,IAAiB,EAAE;AAG/C,IAAI,eAAsC;AAEnC,SAAS,iBAAiB;AAK/B,QAAM,kCAAkC,OAAO,UAAkB,YAAiB,gBAAwB;AACxG,QAAI,CAAC,eAAe,OAAO,aAAa;AACtC,YAAM,IAAI,MAAM,2BAA2B;AAAA,IAC7C;AAEA,UAAM,WAAW,MAAM,MAAM,OAAO,iCAAiC,GAAG;AAAA,MACtE,QAAQ;AAAA,MACR,SAAS;AAAA,QACP,gBAAgB;AAAA,QAChB,iBAAiB,UAAU,eAAe,MAAM,WAAW;AAAA,MAAA;AAAA,MAE7D,MAAM,KAAK,UAAU;AAAA,QACnB,WAAW;AAAA,QACX;AAAA,MAAA,CACD;AAAA,IAAA,CACF;AACD,QAAI,CAAC,SAAS,IAAI;AAChB,YAAM,YAAY,MAAM,SAAS,KAAA;AACjC,UAAI,eAAe;AAEnB,UAAI;AACF,cAAM,YAAY,KAAK,MAAM,SAAS;AACtC,uBAAe,UAAU,WAAW,UAAU,SAAS;AAAA,MACzD,QAAQ;AACN,uBAAe,aAAa;AAAA,MAC9B;AAEA,YAAM,IAAI,MAAM,YAAY;AAAA,IAC9B;AACA,WAAO,SAAS,KAAA;AAAA,EAClB;AAKA,QAAM,sBAAsB,OAAO,YAAoB,aAAqB,aAAqC,eAAe;AAC9H,QAAI,CAAC,eAAe,OAAO,aAAa;AACtC,YAAM,IAAI,MAAM,2BAA2B;AAAA,IAC7C;AAEA,UAAM,WAAW,MAAM,MAAM,OAAO,8BAA8B,GAAG;AAAA,MACnE,QAAQ;AAAA,MACR,SAAS;AAAA,QACP,gBAAgB;AAAA,QAChB,iBAAiB,UAAU,eAAe,MAAM,WAAW;AAAA,MAAA;AAAA,MAE7D,MAAM,KAAK,UAAU;AAAA,QACnB,aAAa;AAAA,QACb,aAAa;AAAA,MAAA,CACd;AAAA,IAAA,CACF;AACD,QAAI,CAAC,SAAS,IAAI;AAChB,YAAM,YAAY,MAAM,SAAS,KAAA;AACjC,UAAI,eAAe;AAEnB,UAAI;AACF,cAAM,YAAY,KAAK,MAAM,SAAS;AACtC,uBAAe,UAAU,WAAW,UAAU,SAAS;AAAA,MACzD,QAAQ;AACN,uBAAe,aAAa;AAAA,MAC9B;AAEA,YAAM,IAAI,MAAM,YAAY;AAAA,IAC9B;AACA,WAAO,SAAS,KAAA;AAAA,EAClB;AAEA,QAAM,kBAAkBC,IAAAA,SAAS,MAAM,YAAY,UAAU,IAAI;AAE/D,QAAM,SAAS,OAAO,gBAAmC;AACzD,gBAAY,QAAQ;AACpB,QAAI;AAEF,kBAAY,QAAQ;AACpB,mBAAa,QAAQ;AACrB,0BAAoB,QAAQ,CAAA;AAG5B,YAAM,WAAW,MAAM,MAAM,OAAO,QAAQ,GAAG;AAAA,QAC7C,QAAQ;AAAA,QACR,SAAS;AAAA,UACP,gBAAgB;AAAA,QAAA;AAAA,QAElB,MAAM,KAAK,UAAU,WAAW;AAAA,MAAA,CACjC;AAED,UAAI,CAAC,SAAS,IAAI;AAChB,YAAI,SAAS,WAAW,KAAK;AAC3B,gBAAM,IAAI,MAAM,2BAA2B;AAAA,QAC7C,WAAW,SAAS,WAAW,KAAK;AAClC,gBAAM,IAAI,MAAM,oDAAoD;AAAA,QACtE,OAAO;AACL,gBAAM,IAAI,MAAM,mBAAmB,SAAS,MAAM,IAAI,SAAS,UAAU,EAAE;AAAA,QAC7E;AAAA,MACF;AAEA,YAAM,WAAyB,MAAM,SAAS,KAAA;AAG9C,UAAI,SAAS,cAAc;AACzB,oBAAY,QAAQ;AACpB,qBAAa,QAAQ,SAAS,kBAAkB;AAGhD,cAAM,WAAW,SAAS,yBAAyB,CAAA,GAAI,IAAI,CAAC,WAAgB;AAE1E,cAAI,eAAe,GAAG,OAAO,YAAY,OAAO,CAAC,EAAE,YAAA,IAAgB,OAAO,YAAY,MAAM,CAAC,CAAC;AAE9F,cAAI,OAAO,gBAAgB,YAAY;AAErC,2BAAe,OAAO,eAAe;AAAA,UACvC,WAAW,OAAO,gBAAgB,QAAQ;AACxC,2BAAe,OAAO,eAAe;AAAA,UACvC,WAAW,OAAO,gBAAgB,SAAS;AACzC,2BAAe,OAAO,eAAe;AAAA,UACvC;AAEA,iBAAO;AAAA,YACL,IAAI,OAAO;AAAA,YACX,aAAa,OAAO;AAAA,YACpB,aAAa,OAAO,eAAe;AAAA,YACnC,WAAW;AAAA,YACX,aAAY,oBAAI,KAAA,GAAO,YAAA;AAAA,YACvB,cAAc,OAAO;AAAA;AAAA,YAErB,eAAe,OAAO;AAAA,YACtB,aAAa,OAAO;AAAA,UAAA;AAAA,QAExB,CAAC;AACD,4BAAoB,QAAQ;AAG5B,oBAAY,QAAQ;AAEpB,eAAO;AAAA,MACT;AAGA,kBAAY,QAAQ;AAEpB,aAAO;AAAA,IACT,SAAS,OAAO;AACd,YAAM;AAAA,IACR,UAAA;AACE,kBAAY,QAAQ;AAAA,IACtB;AAAA,EACF;AAEA,QAAM,SAAS,OAAO,aAAyB;AAC7C,gBAAY,QAAQ;AACpB,QAAI;AAIF,YAAM,IAAI,MAAM,0DAA0D;AAAA,IAC5E,UAAA;AACE,kBAAY,QAAQ;AAAA,IACtB;AAAA,EACF;AAEA,QAAM,UAAU,YAAY;AAC1B,iBAAa,QAAQ;AACrB,QAAI;AAEF,4BAAA;AAGA,kBAAY,QAAQ;AACpB,qBAAe,QAAQ;AAGvB,kBAAY,QAAQ;AACpB,mBAAa,QAAQ;AACrB,0BAAoB,QAAQ,CAAA;AAG5B,UAAI,OAAO,WAAW,aAAa;AACjC,qBAAa,WAAW,sBAAsB;AAC9C,qBAAa,WAAW,mBAAmB;AAAA,MAC7C;AAAA,IACF,UAAA;AACE,mBAAa,QAAQ;AAAA,IACvB;AAAA,EACF;AAEA,QAAM,eAAe,YAAY;AAC/B,QAAI,CAAC,eAAe,OAAO,cAAc;AACvC,aAAO;AAAA,IACT;AAGA,sBAAkB,QAAQ;AAC1B,QAAI;AACF,YAAM,WAAW,MAAM,MAAM,OAAO,SAAS,GAAG;AAAA,QAC9C,QAAQ;AAAA,QACR,SAAS;AAAA,UACP,gBAAgB;AAAA,QAAA;AAAA,QAElB,MAAM,KAAK,UAAU;AAAA,UACnB,eAAe,eAAe,MAAM;AAAA,QAAA,CACrC;AAAA,MAAA,CACF;AAED,UAAI,CAAC,SAAS,IAAI;AAChB,YAAI,SAAS,WAAW,KAAK;AAE3B,gBAAM,QAAA;AACN,iBAAO;AAAA,QACT;AACA,cAAM,IAAI,MAAM,yBAAyB,SAAS,MAAM,IAAI,SAAS,UAAU,EAAE;AAAA,MACnF;AAEA,YAAM,WAAyB,MAAM,SAAS,KAAA;AAG9C,kBAAY,UAAU,IAAI;AAE1B,aAAO;AAAA,IACT,SAAS,OAAO;AAEd,YAAM,QAAA;AACN,aAAO;AAAA,IACT;AAAA,EACF;AAEA,QAAM,eAAe,YAAkC;AACrD,QAAI,CAAC,eAAe,OAAO,aAAa;AACtC,YAAM,IAAI,MAAM,2BAA2B;AAAA,IAC7C;AAEA,qBAAiB,QAAQ;AACzB,QAAI;AACF,YAAM,WAAW,MAAM,MAAM,OAAO,SAAS,GAAG;AAAA,QAC9C,QAAQ;AAAA,QACR,SAAS;AAAA,UACP,gBAAgB;AAAA,UAChB,iBAAiB,UAAU,eAAe,MAAM,WAAW;AAAA,QAAA;AAAA,MAC7D,CACD;AAED,UAAI,CAAC,SAAS,IAAI;AAChB,YAAI,SAAS,WAAW,KAAK;AAC3B,gBAAM,IAAI,MAAM,+CAA+C;AAAA,QACjE,OAAO;AACL,gBAAM,IAAI,MAAM,4BAA4B,SAAS,MAAM,IAAI,SAAS,UAAU,EAAE;AAAA,QACtF;AAAA,MACF;AAEA,YAAM,WAAW,MAAM,SAAS,KAAA;AAGhC,kBAAY,QAAQ;AAAA,QAClB,IAAI,SAAS;AAAA,QACb,OAAO,SAAS;AAAA,QAChB,WAAW,SAAS;AAAA,QACpB,UAAU,SAAS;AAAA,QACnB,QAAQ,SAAS;AAAA,QACjB,YAAY,SAAS,cAAc;AAAA,QACnC,eAAe,SAAS;AAAA,QACxB,mBAAmB,SAAS;AAAA,QAC5B,UAAU,SAAS,YAAY,CAAA;AAAA,QAC/B,IAAI,SAAS,MAAM;AAAA,QACnB,UAAU,SAAS;AAAA,QACnB,uBAAuB,SAAS;AAAA,QAChC,WAAW,SAAS;AAAA,QACpB,WAAW,SAAS,eAAc,oBAAI,KAAA,GAAO,YAAA;AAAA,MAAY;AAI3D,UAAI,OAAO,WAAW,aAAa;AACjC,qBAAa,QAAQ,qBAAqB,KAAK,UAAU,YAAY,KAAK,CAAC;AAAA,MAC7E;AAEA,aAAO,YAAY;AAAA,IACrB,UAAA;AACE,uBAAiB,QAAQ;AAAA,IAC3B;AAAA,EACF;AAEA,QAAM,gBAAgB,OAAO,gBAA+B;AAC1D,QAAI,CAAC,eAAe,OAAO,aAAa;AACtC,YAAM,IAAI,MAAM,2BAA2B;AAAA,IAC7C;AAEA,qBAAiB,QAAQ;AACzB,QAAI;AACF,YAAM,WAAW,MAAM,MAAM,OAAO,SAAS,GAAG;AAAA,QAC9C,QAAQ;AAAA,QACR,SAAS;AAAA,UACP,gBAAgB;AAAA,UAChB,iBAAiB,UAAU,eAAe,MAAM,WAAW;AAAA,QAAA;AAAA,QAE7D,MAAM,KAAK,UAAU;AAAA,UACnB,YAAY,YAAY;AAAA,UACxB,WAAW,YAAY;AAAA,QAAA,CACxB;AAAA,MAAA,CACF;AAED,UAAI,CAAC,SAAS,IAAI;AAChB,YAAI,SAAS,WAAW,KAAK;AAC3B,gBAAM,IAAI,MAAM,+CAA+C;AAAA,QACjE,OAAO;AACL,gBAAM,IAAI,MAAM,0BAA0B,SAAS,MAAM,IAAI,SAAS,UAAU,EAAE;AAAA,QACpF;AAAA,MACF;AAEA,YAAM,kBAAkB,MAAM,SAAS,KAAA;AAGvC,UAAI,YAAY,OAAO;AACrB,oBAAY,QAAQ;AAAA,UAClB,GAAG,YAAY;AAAA,UACf,IAAI,gBAAgB;AAAA,UACpB,WAAW,gBAAgB;AAAA,UAC3B,UAAU,gBAAgB;AAAA;AAAA,UAE1B,QAAQ,gBAAgB,cAAc,YAAY,MAAM;AAAA,UACxD,YAAY,YAAY,MAAM;AAAA,UAC9B,OAAO,YAAY,MAAM;AAAA;AAAA,UACzB,eAAe,YAAY,MAAM;AAAA,UACjC,WAAW,gBAAgB,cAAc,YAAY,MAAM;AAAA,UAC3D,WAAW,gBAAgB,eAAc,oBAAI,KAAA,GAAO,YAAA;AAAA,QAAY;AAIlE,YAAI,OAAO,WAAW,aAAa;AACjC,uBAAa,QAAQ,qBAAqB,KAAK,UAAU,YAAY,KAAK,CAAC;AAAA,QAC7E;AAAA,MACF;AAEA,aAAO,YAAY;AAAA,IACrB,UAAA;AACE,uBAAiB,QAAQ;AAAA,IAC3B;AAAA,EACF;AAEA,QAAM,qBAAqB,OAAO,aAAkB;AAClD,QAAI,CAAC,eAAe,OAAO,aAAa;AACtC,YAAM,IAAI,MAAM,2BAA2B;AAAA,IAC7C;AAEA,qBAAiB,QAAQ;AACzB,QAAI;AACF,YAAM,WAAW,MAAM,MAAM,OAAO,UAAU,GAAG;AAAA,QAC/C,QAAQ;AAAA,QACR,SAAS;AAAA,UACP,gBAAgB;AAAA,UAChB,iBAAiB,UAAU,eAAe,MAAM,WAAW;AAAA,QAAA;AAAA,QAE7D,MAAM,KAAK,UAAU;AAAA,UACnB;AAAA,QAAA,CACD;AAAA,MAAA,CACF;AAED,UAAI,CAAC,SAAS,IAAI;AAChB,YAAI,SAAS,WAAW,KAAK;AAC3B,gBAAM,IAAI,MAAM,+CAA+C;AAAA,QACjE,OAAO;AACL,gBAAM,IAAI,MAAM,2BAA2B,SAAS,MAAM,IAAI,SAAS,UAAU,EAAE;AAAA,QACrF;AAAA,MACF;AAEA,YAAM,kBAAkB,MAAM,SAAS,KAAA;AAGvC,UAAI,YAAY,OAAO;AACrB,oBAAY,QAAQ;AAAA,UAClB,GAAG,YAAY;AAAA,UACf,UAAU,gBAAgB;AAAA,UAC1B,WAAW,gBAAgB,eAAc,oBAAI,KAAA,GAAO,YAAA;AAAA,QAAY;AAIlE,YAAI,OAAO,WAAW,aAAa;AACjC,uBAAa,QAAQ,qBAAqB,KAAK,UAAU,YAAY,KAAK,CAAC;AAAA,QAC7E;AAAA,MACF;AAEA,aAAO,YAAY;AAAA,IACrB,UAAA;AACE,uBAAiB,QAAQ;AAAA,IAC3B;AAAA,EACF;AAEA,QAAM,cAAc,OAAO,UAAkB,aAAqB;AAChE,QAAI,CAAC,eAAe,OAAO,aAAa;AACtC,YAAM,IAAI,MAAM,2BAA2B;AAAA,IAC7C;AAEA,qBAAiB,QAAQ;AACzB,QAAI;AACF,YAAM,WAAW,MAAM,MAAM,OAAO,aAAa,GAAG;AAAA,QAClD,QAAQ;AAAA,QACR,SAAS;AAAA,UACP,gBAAgB;AAAA,UAChB,iBAAiB,UAAU,eAAe,MAAM,WAAW;AAAA,QAAA;AAAA,QAE7D,MAAM,KAAK,UAAU;AAAA,UACnB,WAAW;AAAA,UACX;AAAA,QAAA,CACD;AAAA,MAAA,CACF;AAED,UAAI,CAAC,SAAS,IAAI;AAChB,YAAI,SAAS,WAAW,KAAK;AAC3B,gBAAM,IAAI,MAAM,+CAA+C;AAAA,QACjE,OAAO;AACL,gBAAM,YAAY,MAAM,SAAS,KAAA,EAAO,MAAM,OAAO,CAAA,EAAG;AACxD,gBAAM,IAAI,MAAM,UAAU,WAAW,wBAAwB,SAAS,MAAM,IAAI,SAAS,UAAU,EAAE;AAAA,QACvG;AAAA,MACF;AAEA,YAAM,SAAS,MAAM,SAAS,KAAA;AAG9B,UAAI,YAAY,OAAO;AACrB,oBAAY,QAAQ;AAAA,UAClB,GAAG,YAAY;AAAA,UACf,OAAO;AAAA,UACP,eAAe;AAAA;AAAA,UACf,YAAW,oBAAI,KAAA,GAAO,YAAA;AAAA,QAAY;AAIpC,YAAI,OAAO,WAAW,aAAa;AACjC,uBAAa,QAAQ,qBAAqB,KAAK,UAAU,YAAY,KAAK,CAAC;AAAA,QAC7E;AAAA,MACF;AAEA,aAAO;AAAA,IACT,UAAA;AACE,uBAAiB,QAAQ;AAAA,IAC3B;AAAA,EACF;AAEA,QAAM,YAAY,OAAO,UAAkB,MAAc,eAAe,UAAU;AAChF,QAAI,CAAC,aAAa,OAAO;AACvB,YAAM,IAAI,MAAM,0BAA0B;AAAA,IAC5C;AAEA,mBAAe,QAAQ;AACvB,QAAI;AACF,YAAM,WAAW,eAAe,OAAO,qBAAqB,IAAI,OAAO,iBAAiB;AACxF,YAAM,OAAO,eACT,EAAE,gBAAgB,aAAa,OAAO,aAAa,KAAA,IACnD,EAAE,gBAAgB,aAAa,OAAO,WAAW,UAAU,KAAA;AAE/D,YAAM,WAAW,MAAM,MAAM,UAAU;AAAA,QACrC,QAAQ;AAAA,QACR,SAAS,EAAE,gBAAgB,mBAAA;AAAA,QAC3B,MAAM,KAAK,UAAU,IAAI;AAAA,MAAA,CAC1B;AAED,UAAI,CAAC,SAAS,IAAI;AAChB,cAAM,YAAY,MAAM,SAAS,KAAA;AACjC,YAAI,eAAe;AAEnB,YAAI;AACF,gBAAM,YAAY,KAAK,MAAM,SAAS;AACtC,yBAAe,UAAU,WAAW,UAAU,SAAS;AAAA,QACzD,QAAQ;AAEN,yBAAe,aAAa;AAAA,QAC9B;AAEA,cAAM,IAAI,MAAM,YAAY;AAAA,MAC9B;AAEA,YAAM,WAAyB,MAAM,SAAS,KAAA;AAG9C,kBAAY,QAAQ;AACpB,mBAAa,QAAQ;AACrB,0BAAoB,QAAQ,CAAA;AAG5B,kBAAY,QAAQ;AAEpB,aAAO;AAAA,IACT,UAAA;AACE,qBAAe,QAAQ;AAAA,IACzB;AAAA,EACF;AAEA,QAAM,mBAAmB,OAAO,aAAqB;AACnD,QAAI,CAAC,aAAa,OAAO;AACvB,YAAM,IAAI,MAAM,0BAA0B;AAAA,IAC5C;AAEA,sBAAkB,QAAQ;AAC1B,QAAI;AACF,YAAM,WAAW,MAAM,MAAM,OAAO,oBAAoB,GAAG;AAAA,QACzD,QAAQ;AAAA,QACR,SAAS,EAAE,gBAAgB,mBAAA;AAAA,QAC3B,MAAM,KAAK,UAAU;AAAA,UACnB,gBAAgB,aAAa;AAAA,UAC7B,WAAW;AAAA,QAAA,CACZ;AAAA,MAAA,CACF;AAED,UAAI,CAAC,SAAS,IAAI;AAChB,cAAM,YAAY,MAAM,SAAS,KAAA;AACjC,YAAI,eAAe;AAEnB,YAAI;AACF,gBAAM,YAAY,KAAK,MAAM,SAAS;AACtC,yBAAe,UAAU,WAAW,UAAU,SAAS;AAAA,QACzD,QAAQ;AAEN,yBAAe,aAAa;AAAA,QAC9B;AAEA,cAAM,IAAI,MAAM,YAAY;AAAA,MAC9B;AAEA,YAAM,SAAS,MAAM,SAAS,KAAA;AAC9B,aAAO;AAAA,IACT,UAAA;AACE,wBAAkB,QAAQ;AAAA,IAC5B;AAAA,EACF;AAEA,QAAM,0BAA0B,OAAO,aAAqB;AAC1D,QAAI,CAAC,aAAa,OAAO;AACvB,YAAM,IAAI,MAAM,0BAA0B;AAAA,IAC5C;AAEA,UAAM,WAAW,MAAM,MAAM,OAAO,sBAAsB,GAAG;AAAA,MAC3D,QAAQ;AAAA,MACR,SAAS,EAAE,gBAAgB,mBAAA;AAAA,MAC3B,MAAM,KAAK,UAAU;AAAA,QACnB,gBAAgB,aAAa;AAAA,QAC7B,WAAW;AAAA,MAAA,CACZ;AAAA,IAAA,CACF;AAED,QAAI,CAAC,SAAS,IAAI;AAChB,YAAM,YAAY,MAAM,SAAS,KAAA;AACjC,UAAI,eAAe;AAEnB,UAAI;AACF,cAAM,YAAY,KAAK,MAAM,SAAS;AACtC,uBAAe,UAAU,WAAW,UAAU,SAAS;AAAA,MACzD,QAAQ;AACN,uBAAe,aAAa;AAAA,MAC9B;AAEA,YAAM,IAAI,MAAM,YAAY;AAAA,IAC9B;AAEA,WAAO,SAAS,KAAA;AAAA,EAClB;AAEA,QAAM,cAAc,CAAC,cAA4B,iBAAiB,UAAU;AAC1E,QAAI;AAEF,UAAI,aAAa,MAAM;AAErB,YAAI,kBAAkB,YAAY,OAAO;AACvC,sBAAY,QAAQ;AAAA,YAClB,GAAG,YAAY;AAAA,YACf,GAAG,aAAa;AAAA;AAAA,YAEhB,QAAQ,aAAa,KAAK,UAAU,YAAY,MAAM;AAAA,YACtD,WAAW,aAAa,KAAK,aAAa,YAAY,MAAM;AAAA,YAC5D,UAAU,aAAa,KAAK,YAAY,YAAY,MAAM;AAAA,UAAA;AAAA,QAE9D,OAAO;AACL,sBAAY,QAAQ,aAAa;AAAA,QACnC;AAAA,MACF,WAAW,CAAC,gBAAgB;AAE1B,oBAAY,QAAQ;AAAA,MACtB;AAIA,YAAM,UAAmB;AAAA,QACvB,aAAa,aAAa;AAAA,QAC1B,cAAc,aAAa;AAAA,QAC3B,WAAW,IAAI,KAAK,KAAK,QAAQ,IAAI,KAAK,GAAI;AAAA;AAAA,QAC9C,QAAQ,YAAY,OAAO,MAAM,aAAa,MAAM;AAAA,MAAA;AAGtD,qBAAe,QAAQ;AAGvB,UAAI,OAAO,WAAW,aAAa;AACjC,qBAAa,QAAQ,wBAAwB,KAAK,UAAU,OAAO,CAAC;AACpE,YAAI,YAAY,OAAO;AACrB,uBAAa,QAAQ,qBAAqB,KAAK,UAAU,YAAY,KAAK,CAAC;AAAA,QAC7E;AAAA,MACF;AAGA,6BAAA;AAAA,IACF,SAAS,OAAO;AACd,cAAQ,MAAM,4BAA4B,KAAK;AAAA,IAEjD;AAAA,EACF;AAGA,QAAM,yBAAyB,MAAM;AAEnC,QAAI,cAAc;AAChB,mBAAa,YAAY;AAAA,IAC3B;AAEA,QAAI,CAAC,eAAe,MAAO;AAG3B,UAAM,0BAAU,KAAA;AAChB,UAAM,YAAY,eAAe,MAAM;AACvC,UAAM,mBAAmB,UAAU,QAAA,IAAY,IAAI,QAAA,IAAa,IAAI,KAAK;AAGzE,QAAI,oBAAoB,GAAG;AACzB,mBAAA;AACA;AAAA,IACF;AAGA,mBAAe,WAAW,YAAY;AACpC,YAAM,UAAU,MAAM,aAAA;AAEtB,UAAI,SAAS;AAEX,+BAAA;AAAA,MACF;AAAA,IACF,GAAG,gBAAgB;AAAA,EACrB;AAEA,QAAM,wBAAwB,MAAM;AAClC,QAAI,cAAc;AAChB,mBAAa,YAAY;AACzB,qBAAe;AAAA,IACjB;AAAA,EACF;AAEA,QAAM,aAAa,YAAY;AAC7B,QAAI,cAAc,MAAO;AAEzB,mBAAe,QAAQ;AACvB,QAAI;AAEF,UAAI,OAAO,WAAW,aAAa;AACjC,cAAM,gBAAgB,aAAa,QAAQ,sBAAsB;AACjE,cAAM,aAAa,aAAa,QAAQ,mBAAmB;AAE3D,YAAI,iBAAiB,YAAY;AAC/B,cAAI;AACF,kBAAM,UAAU,KAAK,MAAM,aAAa;AACxC,kBAAM,OAAO,KAAK,MAAM,UAAU;AAGlC,oBAAQ,YAAY,IAAI,KAAK,QAAQ,SAAS;AAG9C,gBAAI,QAAQ,YAAY,oBAAI,QAAQ;AAClC,6BAAe,QAAQ;AACvB,0BAAY,QAAQ;AAGpB,qCAAA;AAAA,YACF,OAAO;AAEL,2BAAa,WAAW,sBAAsB;AAC9C,2BAAa,WAAW,mBAAmB;AAAA,YAC7C;AAAA,UACF,SAAS,OAAO;AAEd,yBAAa,WAAW,sBAAsB;AAC9C,yBAAa,WAAW,mBAAmB;AAAA,UAC7C;AAAA,QACF;AAAA,MACF;AAEA,oBAAc,QAAQ;AAGtB,YAAM,IAAI,QAAQ,CAAA,YAAW,WAAW,SAAS,EAAE,CAAC;AAAA,IACtD,SAAS,OAAO;AAAA,IAEhB,UAAA;AACE,qBAAe,QAAQ;AAAA,IACzB;AAAA,EACF;AAEA,QAAM,iBAAiB,OAAO,gBAAwB;AACpD,QAAI,CAAC,eAAe,OAAO,aAAa;AACtC,YAAM,IAAI,MAAM,2BAA2B;AAAA,IAC7C;AAEA,qBAAiB,QAAQ;AACzB,QAAI;AACF,YAAM,WAAW,MAAM,MAAM,OAAO,gBAAgB,GAAG;AAAA,QACrD,QAAQ;AAAA,QACR,SAAS;AAAA,UACP,gBAAgB;AAAA,UAChB,iBAAiB,UAAU,eAAe,MAAM,WAAW;AAAA,QAAA;AAAA,QAE7D,MAAM,KAAK,UAAU;AAAA,UACnB,UAAU;AAAA,QAAA,CACX;AAAA,MAAA,CACF;AAED,UAAI,CAAC,SAAS,IAAI;AAChB,cAAM,YAAY,MAAM,SAAS,KAAA,EAAO,MAAM,OAAO,CAAA,EAAG;AACxD,YAAI,SAAS,WAAW,KAAK;AAC3B,gBAAM,IAAI,MAAM,2BAA2B;AAAA,QAC7C,WAAW,UAAU,cAAc;AACjC,gBAAM,IAAI,MAAM,oFAAoF,IAAI,KAAK,UAAU,YAAY,EAAE,mBAAA,CAAoB,EAAE;AAAA,QAC7J;AACA,cAAM,IAAI,MAAM,UAAU,WAAW,2BAA2B,SAAS,MAAM,IAAI,SAAS,UAAU,EAAE;AAAA,MAC1G;AAEA,YAAM,SAAS,MAAM,SAAS,KAAA;AAG9B,UAAI,YAAY,OAAO;AACrB,oBAAY,QAAQ;AAAA,UAClB,GAAG,YAAY;AAAA,UACf,UAAU;AAAA,UACV,wBAAuB,oBAAI,KAAA,GAAO,YAAA;AAAA,UAClC,YAAW,oBAAI,KAAA,GAAO,YAAA;AAAA,QAAY;AAIpC,YAAI,OAAO,WAAW,aAAa;AACjC,uBAAa,QAAQ,qBAAqB,KAAK,UAAU,YAAY,KAAK,CAAC;AAAA,QAC7E;AAAA,MACF;AAEA,aAAO;AAAA,IACT,UAAA;AACE,uBAAiB,QAAQ;AAAA,IAC3B;AAAA,EACF;AAEA,QAAM,sBAAsB,YAAY;AACtC,QAAI,CAAC,eAAe,OAAO,aAAa;AACtC,YAAM,IAAI,MAAM,2BAA2B;AAAA,IAC7C;AAEA,UAAM,WAAW,MAAM,MAAM,OAAO,kBAAkB,GAAG;AAAA,MACvD,QAAQ;AAAA,MACR,SAAS;AAAA,QACP,iBAAiB,UAAU,eAAe,MAAM,WAAW;AAAA,MAAA;AAAA,IAC7D,CACD;AAED,QAAI,CAAC,SAAS,IAAI;AAChB,YAAM,IAAI,MAAM,oCAAoC,SAAS,MAAM,IAAI,SAAS,UAAU,EAAE;AAAA,IAC9F;AAEA,WAAO,SAAS,KAAA;AAAA,EAClB;AAEA,QAAM,4BAA4B,OAAO,aAAqB;AAE5D,UAAM,MAAM,OAAO,2BAA2B,EAAE,QAAQ,cAAc,mBAAmB,QAAQ,CAAC;AAElG,UAAM,WAAW,MAAM,MAAM,KAAK;AAAA,MAChC,QAAQ;AAAA,MACR,SAAS;AAAA,QACP,gBAAgB;AAAA,MAAA;AAAA,IAClB,CACD;AAED,QAAI,CAAC,SAAS,IAAI;AAChB,YAAM,IAAI,MAAM,0CAA0C,SAAS,MAAM,IAAI,SAAS,UAAU,EAAE;AAAA,IACpG;AAEA,WAAO,SAAS,KAAA;AAAA,EAClB;AAGA,MAAI,CAAC,cAAc,OAAO;AACxB,eAAA;AAAA,EACF;AAEA,SAAO;AAAA;AAAA,IAEL,MAAMA,IAAAA,SAAS,MAAM,YAAY,KAAK;AAAA,IACtC,aAAaA,IAAAA,SAAS,MAAM,YAAY,KAAK;AAAA,IAC7C,gBAAgBA,IAAAA,SAAS,MAAM,eAAe,KAAK;AAAA,IACnD;AAAA,IACA,WAAWA,IAAAA,SAAS,MAAM,UAAU,SAAS,CAAC,cAAc,KAAK;AAAA,IACjE,SAASA,IAAAA,SAAS,MAAM,QAAQ,KAAK;AAAA,IACrC;AAAA;AAAA,IAGA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA;AAAA,IAGA,aAAaA,IAAAA,SAAS,MAAM,YAAY,KAAK;AAAA,IAC7C,cAAcA,IAAAA,SAAS,MAAM,aAAa,KAAK;AAAA,IAC/C,qBAAqBA,IAAAA,SAAS,MAAM,oBAAoB,KAAK;AAAA;AAAA,IAG/D;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA;AAAA,IAGE;AAAA,IACA;AAAA;AAAA,IAGA,aAAa,MAAM;AACjB,oBAAc,QAAQ;AACtB,qBAAe,QAAQ;AACvB,iBAAA;AAAA,IACF;AAAA,EAAA;AAEJ;;"}
@@ -1,5 +1,5 @@
1
1
  import { ref, computed } from "vue";
2
- import { u as useStrandsConfig } from "./useStrandsConfig-V7XSMyQ5.js";
2
+ import { u as useStrandsConfig } from "./useStrandsConfig-Bdk-g0jS.js";
3
3
  const { getUrl } = useStrandsConfig();
4
4
  const currentUser = ref(null);
5
5
  const currentSession = ref(null);
@@ -193,7 +193,7 @@ function useStrandsAuth() {
193
193
  throw new Error(`Token refresh failed: ${response.status} ${response.statusText}`);
194
194
  }
195
195
  const authData = await response.json();
196
- setAuthData(authData);
196
+ setAuthData(authData, true);
197
197
  return true;
198
198
  } catch (error) {
199
199
  await signOut();
@@ -230,6 +230,10 @@ function useStrandsAuth() {
230
230
  mfaEnabled: userData.mfaEnabled || false,
231
231
  emailVerified: userData.email_verified,
232
232
  passwordUpdatedAt: userData.password_updated_at,
233
+ settings: userData.settings || {},
234
+ xp: userData.xp || 0,
235
+ username: userData.username,
236
+ usernameLastChangedAt: userData.username_last_changed_at,
233
237
  createdAt: userData.created_at,
234
238
  updatedAt: userData.updated_at || (/* @__PURE__ */ new Date()).toISOString()
235
239
  };
@@ -290,6 +294,45 @@ function useStrandsAuth() {
290
294
  isLoadingProfile.value = false;
291
295
  }
292
296
  };
297
+ const updateUserSettings = async (settings) => {
298
+ if (!currentSession.value?.accessToken) {
299
+ throw new Error("No access token available");
300
+ }
301
+ isLoadingProfile.value = true;
302
+ try {
303
+ const response = await fetch(getUrl("settings"), {
304
+ method: "POST",
305
+ headers: {
306
+ "Content-Type": "application/json",
307
+ "Authorization": `Bearer ${currentSession.value.accessToken}`
308
+ },
309
+ body: JSON.stringify({
310
+ settings
311
+ })
312
+ });
313
+ if (!response.ok) {
314
+ if (response.status === 401) {
315
+ throw new Error("Authentication expired. Please sign in again.");
316
+ } else {
317
+ throw new Error(`Settings update failed: ${response.status} ${response.statusText}`);
318
+ }
319
+ }
320
+ const updatedUserData = await response.json();
321
+ if (currentUser.value) {
322
+ currentUser.value = {
323
+ ...currentUser.value,
324
+ settings: updatedUserData.settings,
325
+ updatedAt: updatedUserData.updated_at || (/* @__PURE__ */ new Date()).toISOString()
326
+ };
327
+ if (typeof window !== "undefined") {
328
+ localStorage.setItem("strands_auth_user", JSON.stringify(currentUser.value));
329
+ }
330
+ }
331
+ return currentUser.value;
332
+ } finally {
333
+ isLoadingProfile.value = false;
334
+ }
335
+ };
293
336
  const changeEmail = async (newEmail, password) => {
294
337
  if (!currentSession.value?.accessToken) {
295
338
  throw new Error("No access token available");
@@ -423,23 +466,41 @@ function useStrandsAuth() {
423
466
  }
424
467
  return response.json();
425
468
  };
426
- const setAuthData = (authResponse) => {
469
+ const setAuthData = (authResponse, isTokenRefresh = false) => {
427
470
  try {
428
- currentUser.value = authResponse.user;
471
+ if (authResponse.user) {
472
+ if (isTokenRefresh && currentUser.value) {
473
+ currentUser.value = {
474
+ ...currentUser.value,
475
+ ...authResponse.user,
476
+ // Preserve certain fields that might be missing in refresh response
477
+ avatar: authResponse.user.avatar || currentUser.value.avatar,
478
+ firstName: authResponse.user.firstName || currentUser.value.firstName,
479
+ lastName: authResponse.user.lastName || currentUser.value.lastName
480
+ };
481
+ } else {
482
+ currentUser.value = authResponse.user;
483
+ }
484
+ } else if (!isTokenRefresh) {
485
+ currentUser.value = null;
486
+ }
429
487
  const session = {
430
488
  accessToken: authResponse.access_token,
431
489
  refreshToken: authResponse.refresh_token,
432
490
  expiresAt: new Date(Date.now() + 5 * 60 * 1e3),
433
491
  // 5 minutes from now (matching API token expiry)
434
- userId: authResponse.user.id
492
+ userId: currentUser.value?.id || authResponse.user?.id
435
493
  };
436
494
  currentSession.value = session;
437
495
  if (typeof window !== "undefined") {
438
496
  localStorage.setItem("strands_auth_session", JSON.stringify(session));
439
- localStorage.setItem("strands_auth_user", JSON.stringify(authResponse.user));
497
+ if (currentUser.value) {
498
+ localStorage.setItem("strands_auth_user", JSON.stringify(currentUser.value));
499
+ }
440
500
  }
441
501
  startTokenRefreshTimer();
442
502
  } catch (error) {
503
+ console.error("Error setting auth data:", error);
443
504
  }
444
505
  };
445
506
  const startTokenRefreshTimer = () => {
@@ -500,6 +561,76 @@ function useStrandsAuth() {
500
561
  isInitializing.value = false;
501
562
  }
502
563
  };
564
+ const changeUsername = async (newUsername) => {
565
+ if (!currentSession.value?.accessToken) {
566
+ throw new Error("No access token available");
567
+ }
568
+ isLoadingProfile.value = true;
569
+ try {
570
+ const response = await fetch(getUrl("changeUsername"), {
571
+ method: "POST",
572
+ headers: {
573
+ "Content-Type": "application/json",
574
+ "Authorization": `Bearer ${currentSession.value.accessToken}`
575
+ },
576
+ body: JSON.stringify({
577
+ username: newUsername
578
+ })
579
+ });
580
+ if (!response.ok) {
581
+ const errorData = await response.json().catch(() => ({}));
582
+ if (response.status === 409) {
583
+ throw new Error("Username is already taken");
584
+ } else if (errorData.cooldown_end) {
585
+ throw new Error(`You can only change your username once every 30 days. You can change it again on ${new Date(errorData.cooldown_end).toLocaleDateString()}`);
586
+ }
587
+ throw new Error(errorData.message || `Username change failed: ${response.status} ${response.statusText}`);
588
+ }
589
+ const result = await response.json();
590
+ if (currentUser.value) {
591
+ currentUser.value = {
592
+ ...currentUser.value,
593
+ username: newUsername,
594
+ usernameLastChangedAt: (/* @__PURE__ */ new Date()).toISOString(),
595
+ updatedAt: (/* @__PURE__ */ new Date()).toISOString()
596
+ };
597
+ if (typeof window !== "undefined") {
598
+ localStorage.setItem("strands_auth_user", JSON.stringify(currentUser.value));
599
+ }
600
+ }
601
+ return result;
602
+ } finally {
603
+ isLoadingProfile.value = false;
604
+ }
605
+ };
606
+ const getUsernameCooldown = async () => {
607
+ if (!currentSession.value?.accessToken) {
608
+ throw new Error("No access token available");
609
+ }
610
+ const response = await fetch(getUrl("usernameCooldown"), {
611
+ method: "GET",
612
+ headers: {
613
+ "Authorization": `Bearer ${currentSession.value.accessToken}`
614
+ }
615
+ });
616
+ if (!response.ok) {
617
+ throw new Error(`Failed to get username cooldown: ${response.status} ${response.statusText}`);
618
+ }
619
+ return response.json();
620
+ };
621
+ const checkUsernameAvailability = async (username) => {
622
+ const url = getUrl("checkUsernameAvailability").replace("{username}", encodeURIComponent(username));
623
+ const response = await fetch(url, {
624
+ method: "GET",
625
+ headers: {
626
+ "Content-Type": "application/json"
627
+ }
628
+ });
629
+ if (!response.ok) {
630
+ throw new Error(`Failed to check username availability: ${response.status} ${response.statusText}`);
631
+ }
632
+ return response.json();
633
+ };
503
634
  if (!isInitialized.value) {
504
635
  initialize();
505
636
  }
@@ -531,7 +662,11 @@ function useStrandsAuth() {
531
662
  refreshToken,
532
663
  fetchProfile,
533
664
  updateProfile,
665
+ updateUserSettings,
534
666
  changeEmail,
667
+ changeUsername,
668
+ getUsernameCooldown,
669
+ checkUsernameAvailability,
535
670
  initialize,
536
671
  setAuthData,
537
672
  verifyMfa,
@@ -553,4 +688,4 @@ function useStrandsAuth() {
553
688
  export {
554
689
  useStrandsAuth as u
555
690
  };
556
- //# sourceMappingURL=useStrandsAuth-DQbwHB-6.js.map
691
+ //# sourceMappingURL=useStrandsAuth-if4J5WT8.js.map