@tenxyte/core 0.1.5 → 0.9.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +444 -0
- package/dist/index.cjs +1881 -496
- package/dist/index.cjs.map +1 -1
- package/dist/index.d.cts +2767 -1265
- package/dist/index.d.ts +2767 -1265
- package/dist/index.js +1830 -464
- package/dist/index.js.map +1 -1
- package/package.json +83 -67
- package/patched-schema.json +0 -11388
- package/src/client.ts +0 -21
- package/src/config.ts +0 -0
- package/src/http/client.ts +0 -162
- package/src/http/index.ts +0 -1
- package/src/http/interceptors.ts +0 -117
- package/src/index.ts +0 -7
- package/src/modules/ai.ts +0 -0
- package/src/modules/auth.ts +0 -95
- package/src/modules/b2b.ts +0 -0
- package/src/modules/rbac.ts +0 -160
- package/src/modules/security.ts +0 -122
- package/src/modules/user.ts +0 -80
- package/src/storage/cookie.ts +0 -39
- package/src/storage/index.ts +0 -29
- package/src/storage/localStorage.ts +0 -75
- package/src/storage/memory.ts +0 -30
- package/src/types/api-schema.d.ts +0 -6590
- package/src/types/index.ts +0 -150
- package/src/utils/device_info.ts +0 -94
- package/src/utils/events.ts +0 -71
- package/src/utils/jwt.ts +0 -51
- package/tests/http.test.ts +0 -144
- package/tests/modules/auth.test.ts +0 -93
- package/tests/modules/rbac.test.ts +0 -95
- package/tests/modules/security.test.ts +0 -75
- package/tests/modules/user.test.ts +0 -76
- package/tests/storage.test.ts +0 -96
- package/tests/utils.test.ts +0 -71
- package/tsconfig.json +0 -26
- package/tsup.config.ts +0 -10
- package/vitest.config.ts +0 -7
package/README.md
ADDED
|
@@ -0,0 +1,444 @@
|
|
|
1
|
+
# @tenxyte/core
|
|
2
|
+
|
|
3
|
+
The official core JavaScript/TypeScript SDK for the **Tenxyte** API — a unified platform for authentication, multi-tenant organizations, RBAC, GDPR compliance, and AI agent security.
|
|
4
|
+
|
|
5
|
+
## Features
|
|
6
|
+
|
|
7
|
+
- **Authentication** — Email/password, phone, magic link, social OAuth2, registration
|
|
8
|
+
- **Security** — 2FA/TOTP, OTP verification, WebAuthn/Passkeys (FIDO2), password management
|
|
9
|
+
- **RBAC** — Role & permission management, synchronous JWT checks, user role assignment
|
|
10
|
+
- **User Management** — Profile CRUD, avatar upload, admin user operations
|
|
11
|
+
- **B2B Multi-Tenancy** — Organization CRUD, member management, invitations, context switching
|
|
12
|
+
- **AI Agent Security (AIRS)** — Agent tokens, circuit breakers, Human-in-the-Loop, usage reporting
|
|
13
|
+
- **Applications** — API client management, credential regeneration
|
|
14
|
+
- **Admin** — Audit logs, login attempts, blacklisted/refresh token management
|
|
15
|
+
- **GDPR** — Account deletion flows, data export, admin deletion request processing
|
|
16
|
+
- **Dashboard** — Global, auth, security, GDPR, and per-org statistics
|
|
17
|
+
|
|
18
|
+
## Installation
|
|
19
|
+
|
|
20
|
+
```bash
|
|
21
|
+
npm install @tenxyte/core
|
|
22
|
+
# or
|
|
23
|
+
yarn add @tenxyte/core
|
|
24
|
+
# or
|
|
25
|
+
pnpm add @tenxyte/core
|
|
26
|
+
```
|
|
27
|
+
|
|
28
|
+
## Quick Start
|
|
29
|
+
|
|
30
|
+
```typescript
|
|
31
|
+
import { TenxyteClient } from '@tenxyte/core';
|
|
32
|
+
|
|
33
|
+
const tx = new TenxyteClient({
|
|
34
|
+
baseUrl: 'https://api.my-backend.com',
|
|
35
|
+
headers: { 'X-Access-Key': 'your-public-app-key' },
|
|
36
|
+
});
|
|
37
|
+
|
|
38
|
+
// Login
|
|
39
|
+
const tokens = await tx.auth.loginWithEmail({
|
|
40
|
+
email: 'user@example.com',
|
|
41
|
+
password: 'secure_password!',
|
|
42
|
+
device_info: '',
|
|
43
|
+
});
|
|
44
|
+
|
|
45
|
+
// Check authentication state
|
|
46
|
+
const isLoggedIn = await tx.isAuthenticated();
|
|
47
|
+
const user = await tx.getCurrentUser();
|
|
48
|
+
```
|
|
49
|
+
|
|
50
|
+
> **Important**: Never expose `X-Access-Secret` in frontend bundles. Use it exclusively server-side.
|
|
51
|
+
|
|
52
|
+
---
|
|
53
|
+
|
|
54
|
+
## Configuration
|
|
55
|
+
|
|
56
|
+
The `TenxyteClient` accepts a single configuration object. Only `baseUrl` is required.
|
|
57
|
+
|
|
58
|
+
```typescript
|
|
59
|
+
const tx = new TenxyteClient({
|
|
60
|
+
// Required
|
|
61
|
+
baseUrl: 'https://api.my-service.com',
|
|
62
|
+
|
|
63
|
+
// Optional — extra headers for every request
|
|
64
|
+
headers: { 'X-Access-Key': 'pkg_abc123' },
|
|
65
|
+
|
|
66
|
+
// Optional — token storage backend (default: MemoryStorage)
|
|
67
|
+
// Use LocalStorageAdapter for browser persistence
|
|
68
|
+
storage: new LocalStorageAdapter(),
|
|
69
|
+
|
|
70
|
+
// Optional — auto-refresh 401s silently (default: true)
|
|
71
|
+
autoRefresh: true,
|
|
72
|
+
|
|
73
|
+
// Optional — auto-inject device fingerprint into auth requests (default: true)
|
|
74
|
+
autoDeviceInfo: true,
|
|
75
|
+
|
|
76
|
+
// Optional — global request timeout in ms (default: undefined)
|
|
77
|
+
timeoutMs: 10_000,
|
|
78
|
+
|
|
79
|
+
// Optional — retry config for 429/5xx with exponential backoff
|
|
80
|
+
retryConfig: { maxRetries: 3, baseDelayMs: 500 },
|
|
81
|
+
|
|
82
|
+
// Optional — callback when session cannot be recovered
|
|
83
|
+
onSessionExpired: () => router.push('/login'),
|
|
84
|
+
|
|
85
|
+
// Optional — pluggable logger (default: silent no-op)
|
|
86
|
+
logger: console,
|
|
87
|
+
logLevel: 'debug', // 'silent' | 'error' | 'warn' | 'debug'
|
|
88
|
+
|
|
89
|
+
// Optional — override auto-detected device info
|
|
90
|
+
deviceInfoOverride: { app_name: 'MyApp', app_version: '2.0.0' },
|
|
91
|
+
});
|
|
92
|
+
```
|
|
93
|
+
|
|
94
|
+
---
|
|
95
|
+
|
|
96
|
+
## Modules
|
|
97
|
+
|
|
98
|
+
### Authentication (`tx.auth`)
|
|
99
|
+
|
|
100
|
+
```typescript
|
|
101
|
+
// Email/password login
|
|
102
|
+
const tokens = await tx.auth.loginWithEmail({
|
|
103
|
+
email: 'user@example.com',
|
|
104
|
+
password: 'password123',
|
|
105
|
+
device_info: '',
|
|
106
|
+
totp_code: '123456', // optional, for 2FA
|
|
107
|
+
});
|
|
108
|
+
|
|
109
|
+
// Phone login
|
|
110
|
+
const tokens = await tx.auth.loginWithPhone({
|
|
111
|
+
phone_country_code: '+1',
|
|
112
|
+
phone_number: '5551234567',
|
|
113
|
+
password: 'password123',
|
|
114
|
+
device_info: '',
|
|
115
|
+
});
|
|
116
|
+
|
|
117
|
+
// Registration
|
|
118
|
+
const result = await tx.auth.register({
|
|
119
|
+
email: 'new@example.com',
|
|
120
|
+
password: 'StrongP@ss1',
|
|
121
|
+
first_name: 'Jane',
|
|
122
|
+
last_name: 'Doe',
|
|
123
|
+
});
|
|
124
|
+
|
|
125
|
+
// Magic Link (passwordless)
|
|
126
|
+
await tx.auth.requestMagicLink({ email: 'user@example.com', validation_url: 'https://myapp.com/verify' });
|
|
127
|
+
const tokens = await tx.auth.verifyMagicLink(urlToken);
|
|
128
|
+
|
|
129
|
+
// Social OAuth2
|
|
130
|
+
const tokens = await tx.auth.loginWithSocial('google', { id_token: 'jwt...' });
|
|
131
|
+
const tokens = await tx.auth.handleSocialCallback('github', 'auth_code', 'https://myapp.com/cb');
|
|
132
|
+
|
|
133
|
+
// Session management
|
|
134
|
+
await tx.auth.logout('refresh_token_value');
|
|
135
|
+
await tx.auth.logoutAll();
|
|
136
|
+
await tx.auth.refreshToken('refresh_token_value');
|
|
137
|
+
```
|
|
138
|
+
|
|
139
|
+
### Security (`tx.security`)
|
|
140
|
+
|
|
141
|
+
```typescript
|
|
142
|
+
// 2FA (TOTP)
|
|
143
|
+
const status = await tx.security.get2FAStatus();
|
|
144
|
+
const { secret, qr_code_url, backup_codes } = await tx.security.setup2FA();
|
|
145
|
+
await tx.security.confirm2FA('123456');
|
|
146
|
+
await tx.security.disable2FA('123456');
|
|
147
|
+
|
|
148
|
+
// OTP
|
|
149
|
+
await tx.security.requestOtp({ delivery_method: 'email', purpose: 'login' });
|
|
150
|
+
const result = await tx.security.verifyOtp({ otp: '123456', purpose: 'login' });
|
|
151
|
+
|
|
152
|
+
// Password management
|
|
153
|
+
await tx.security.resetPasswordRequest({ email: 'user@example.com' });
|
|
154
|
+
await tx.security.resetPasswordConfirm({ token: '...', new_password: 'NewP@ss1' });
|
|
155
|
+
await tx.security.changePassword({ old_password: 'old', new_password: 'new' });
|
|
156
|
+
|
|
157
|
+
// WebAuthn / Passkeys
|
|
158
|
+
await tx.security.registerWebAuthn('My Laptop');
|
|
159
|
+
const session = await tx.security.authenticateWebAuthn('user@example.com');
|
|
160
|
+
const creds = await tx.security.listWebAuthnCredentials();
|
|
161
|
+
await tx.security.deleteWebAuthnCredential(credentialId);
|
|
162
|
+
```
|
|
163
|
+
|
|
164
|
+
### RBAC (`tx.rbac`)
|
|
165
|
+
|
|
166
|
+
```typescript
|
|
167
|
+
// Synchronous JWT checks (no network call)
|
|
168
|
+
tx.rbac.setToken(accessToken);
|
|
169
|
+
const isAdmin = tx.rbac.hasRole('admin');
|
|
170
|
+
const canEdit = tx.rbac.hasPermission('users.edit');
|
|
171
|
+
const hasAny = tx.rbac.hasAnyRole(['admin', 'manager']);
|
|
172
|
+
const hasAll = tx.rbac.hasAllRoles(['admin', 'superadmin']);
|
|
173
|
+
|
|
174
|
+
// CRUD operations (network calls)
|
|
175
|
+
const roles = await tx.rbac.listRoles();
|
|
176
|
+
await tx.rbac.createRole({ code: 'editor', name: 'Editor' });
|
|
177
|
+
await tx.rbac.assignRoleToUser('user-id', 'editor');
|
|
178
|
+
await tx.rbac.removeRoleFromUser('user-id', 'editor');
|
|
179
|
+
|
|
180
|
+
const permissions = await tx.rbac.listPermissions();
|
|
181
|
+
await tx.rbac.assignPermissionsToUser('user-id', ['posts.create', 'posts.edit']);
|
|
182
|
+
await tx.rbac.removePermissionsFromUser('user-id', ['posts.create']);
|
|
183
|
+
|
|
184
|
+
// Fetch user's roles/permissions from backend
|
|
185
|
+
const userRoles = await tx.rbac.getUserRoles('user-id');
|
|
186
|
+
const userPerms = await tx.rbac.getUserPermissions('user-id');
|
|
187
|
+
```
|
|
188
|
+
|
|
189
|
+
### User Management (`tx.user`)
|
|
190
|
+
|
|
191
|
+
```typescript
|
|
192
|
+
const profile = await tx.user.getProfile();
|
|
193
|
+
await tx.user.updateProfile({ first_name: 'Updated' });
|
|
194
|
+
await tx.user.uploadAvatar(fileFormData);
|
|
195
|
+
await tx.user.deleteAccount('my-password');
|
|
196
|
+
const myRoles = await tx.user.getMyRoles();
|
|
197
|
+
|
|
198
|
+
// Admin operations
|
|
199
|
+
const users = await tx.user.listUsers({ page: 1, page_size: 20 });
|
|
200
|
+
const user = await tx.user.getUser('user-id');
|
|
201
|
+
await tx.user.adminUpdateUser('user-id', { is_active: false });
|
|
202
|
+
await tx.user.adminDeleteUser('user-id');
|
|
203
|
+
await tx.user.banUser('user-id', 'spam');
|
|
204
|
+
```
|
|
205
|
+
|
|
206
|
+
### B2B Organizations (`tx.b2b`)
|
|
207
|
+
|
|
208
|
+
```typescript
|
|
209
|
+
// Context switching — auto-injects X-Org-Slug header
|
|
210
|
+
tx.b2b.switchOrganization('acme-corp');
|
|
211
|
+
const slug = tx.b2b.getCurrentOrganizationSlug(); // 'acme-corp'
|
|
212
|
+
tx.b2b.clearOrganization();
|
|
213
|
+
|
|
214
|
+
// Organization CRUD
|
|
215
|
+
const orgs = await tx.b2b.listOrganizations();
|
|
216
|
+
const org = await tx.b2b.createOrganization({ name: 'Acme Corp', slug: 'acme-corp' });
|
|
217
|
+
await tx.b2b.updateOrganization('acme-corp', { name: 'Acme Corp Inc.' });
|
|
218
|
+
await tx.b2b.deleteOrganization('acme-corp');
|
|
219
|
+
|
|
220
|
+
// Members
|
|
221
|
+
const members = await tx.b2b.listMembers('acme-corp');
|
|
222
|
+
await tx.b2b.addMember('acme-corp', { user_id: 'uid', role_code: 'member' });
|
|
223
|
+
await tx.b2b.updateMember('acme-corp', 'uid', { role_code: 'admin' });
|
|
224
|
+
await tx.b2b.removeMember('acme-corp', 'uid');
|
|
225
|
+
|
|
226
|
+
// Invitations
|
|
227
|
+
await tx.b2b.inviteMember('acme-corp', { email: 'dev@example.com', role_code: 'admin' });
|
|
228
|
+
const roles = await tx.b2b.listOrgRoles('acme-corp');
|
|
229
|
+
```
|
|
230
|
+
|
|
231
|
+
### AI Agent Security (`tx.ai`)
|
|
232
|
+
|
|
233
|
+
```typescript
|
|
234
|
+
// Agent token lifecycle
|
|
235
|
+
const agentData = await tx.ai.createAgentToken({
|
|
236
|
+
agent_id: 'Invoice-Parser-Bot',
|
|
237
|
+
permissions: ['invoices.read', 'invoices.create'],
|
|
238
|
+
budget_limit_usd: 5.00,
|
|
239
|
+
circuit_breaker: { max_requests: 100, window_seconds: 60 },
|
|
240
|
+
});
|
|
241
|
+
|
|
242
|
+
tx.ai.setAgentToken(agentData.token); // SDK switches to AgentBearer auth
|
|
243
|
+
tx.ai.isAgentMode(); // true
|
|
244
|
+
tx.ai.clearAgentToken(); // back to standard Bearer
|
|
245
|
+
|
|
246
|
+
// Token management
|
|
247
|
+
const tokens = await tx.ai.listAgentTokens();
|
|
248
|
+
const token = await tx.ai.getAgentToken('token-id');
|
|
249
|
+
await tx.ai.revokeAgentToken('token-id');
|
|
250
|
+
await tx.ai.suspendAgentToken('token-id');
|
|
251
|
+
await tx.ai.revokeAllAgentTokens();
|
|
252
|
+
|
|
253
|
+
// Human-in-the-Loop
|
|
254
|
+
const pending = await tx.ai.listPendingActions();
|
|
255
|
+
await tx.ai.confirmPendingAction('confirmation-token');
|
|
256
|
+
await tx.ai.denyPendingAction('confirmation-token');
|
|
257
|
+
|
|
258
|
+
// Monitoring
|
|
259
|
+
await tx.ai.sendHeartbeat('token-id');
|
|
260
|
+
await tx.ai.reportUsage('token-id', {
|
|
261
|
+
cost_usd: 0.015,
|
|
262
|
+
prompt_tokens: 1540,
|
|
263
|
+
completion_tokens: 420,
|
|
264
|
+
});
|
|
265
|
+
|
|
266
|
+
// Traceability
|
|
267
|
+
tx.ai.setTraceId('trace-1234'); // adds X-Prompt-Trace-ID header
|
|
268
|
+
tx.ai.clearTraceId();
|
|
269
|
+
```
|
|
270
|
+
|
|
271
|
+
### Applications (`tx.applications`)
|
|
272
|
+
|
|
273
|
+
```typescript
|
|
274
|
+
const apps = await tx.applications.listApplications();
|
|
275
|
+
const app = await tx.applications.createApplication({
|
|
276
|
+
name: 'My API Client',
|
|
277
|
+
description: 'Backend service',
|
|
278
|
+
});
|
|
279
|
+
const detail = await tx.applications.getApplication('app-id');
|
|
280
|
+
await tx.applications.updateApplication('app-id', { name: 'Renamed' });
|
|
281
|
+
await tx.applications.patchApplication('app-id', { description: 'Updated desc' });
|
|
282
|
+
await tx.applications.deleteApplication('app-id');
|
|
283
|
+
const newCreds = await tx.applications.regenerateCredentials('app-id');
|
|
284
|
+
```
|
|
285
|
+
|
|
286
|
+
### Admin (`tx.admin`)
|
|
287
|
+
|
|
288
|
+
```typescript
|
|
289
|
+
// Audit logs
|
|
290
|
+
const logs = await tx.admin.listAuditLogs({ page: 1 });
|
|
291
|
+
const log = await tx.admin.getAuditLog('log-id');
|
|
292
|
+
|
|
293
|
+
// Login attempts
|
|
294
|
+
const attempts = await tx.admin.listLoginAttempts({ user_id: 'uid' });
|
|
295
|
+
|
|
296
|
+
// Blacklisted tokens
|
|
297
|
+
const blacklisted = await tx.admin.listBlacklistedTokens();
|
|
298
|
+
await tx.admin.cleanupBlacklistedTokens();
|
|
299
|
+
|
|
300
|
+
// Refresh tokens
|
|
301
|
+
const refreshTokens = await tx.admin.listRefreshTokens({ user_id: 'uid' });
|
|
302
|
+
await tx.admin.revokeRefreshToken('token-id');
|
|
303
|
+
```
|
|
304
|
+
|
|
305
|
+
### GDPR (`tx.gdpr`)
|
|
306
|
+
|
|
307
|
+
```typescript
|
|
308
|
+
// User-facing
|
|
309
|
+
await tx.gdpr.requestAccountDeletion({ reason: 'No longer needed' });
|
|
310
|
+
await tx.gdpr.confirmAccountDeletion('confirmation-code');
|
|
311
|
+
await tx.gdpr.cancelAccountDeletion();
|
|
312
|
+
const status = await tx.gdpr.getDeletionStatus();
|
|
313
|
+
const data = await tx.gdpr.exportUserData();
|
|
314
|
+
|
|
315
|
+
// Admin-facing
|
|
316
|
+
const requests = await tx.gdpr.listDeletionRequests({ status: 'pending' });
|
|
317
|
+
const request = await tx.gdpr.getDeletionRequest('request-id');
|
|
318
|
+
await tx.gdpr.processDeletionRequest('request-id', { action: 'approve' });
|
|
319
|
+
await tx.gdpr.processExpiredDeletions();
|
|
320
|
+
```
|
|
321
|
+
|
|
322
|
+
### Dashboard (`tx.dashboard`)
|
|
323
|
+
|
|
324
|
+
```typescript
|
|
325
|
+
const global = await tx.dashboard.getStats({ period: 'last_30_days' });
|
|
326
|
+
const auth = await tx.dashboard.getAuthStats();
|
|
327
|
+
const security = await tx.dashboard.getSecurityStats();
|
|
328
|
+
const gdpr = await tx.dashboard.getGdprStats();
|
|
329
|
+
const orgStats = await tx.dashboard.getOrganizationStats('acme-corp');
|
|
330
|
+
```
|
|
331
|
+
|
|
332
|
+
---
|
|
333
|
+
|
|
334
|
+
## SDK Events
|
|
335
|
+
|
|
336
|
+
The SDK emits events via a built-in `EventEmitter`. Use `tx.on()`, `tx.once()`, and `tx.off()` to subscribe.
|
|
337
|
+
|
|
338
|
+
| Event | Payload | When |
|
|
339
|
+
|---|---|---|
|
|
340
|
+
| `session:expired` | `void` | Refresh token expired/revoked, session unrecoverable |
|
|
341
|
+
| `token:refreshed` | `{ accessToken: string }` | Access token silently rotated via auto-refresh |
|
|
342
|
+
| `token:stored` | `{ accessToken: string; refreshToken?: string }` | Tokens persisted after login, register, or refresh |
|
|
343
|
+
| `agent:awaiting_approval` | `{ action: unknown }` | AI agent action requires human confirmation (HTTP 202) |
|
|
344
|
+
| `error` | `{ error: unknown }` | Unrecoverable SDK error not tied to a specific call |
|
|
345
|
+
|
|
346
|
+
```typescript
|
|
347
|
+
// React to session expiry
|
|
348
|
+
tx.on('session:expired', () => {
|
|
349
|
+
router.push('/login');
|
|
350
|
+
});
|
|
351
|
+
|
|
352
|
+
// Track token refreshes
|
|
353
|
+
tx.on('token:refreshed', ({ accessToken }) => {
|
|
354
|
+
console.log('Token refreshed silently');
|
|
355
|
+
});
|
|
356
|
+
|
|
357
|
+
// HITL notification
|
|
358
|
+
tx.on('agent:awaiting_approval', ({ action }) => {
|
|
359
|
+
showApprovalDialog(action);
|
|
360
|
+
});
|
|
361
|
+
```
|
|
362
|
+
|
|
363
|
+
---
|
|
364
|
+
|
|
365
|
+
## High-Level Helpers
|
|
366
|
+
|
|
367
|
+
```typescript
|
|
368
|
+
// Check if user is authenticated (synchronous JWT expiry check)
|
|
369
|
+
const isLoggedIn = await tx.isAuthenticated();
|
|
370
|
+
|
|
371
|
+
// Get the raw access token
|
|
372
|
+
const token = await tx.getAccessToken();
|
|
373
|
+
|
|
374
|
+
// Get decoded JWT payload (no network call)
|
|
375
|
+
const user = await tx.getCurrentUser();
|
|
376
|
+
|
|
377
|
+
// Check token expiry
|
|
378
|
+
const expired = await tx.isTokenExpired();
|
|
379
|
+
|
|
380
|
+
// Get full SDK state snapshot (for framework wrappers)
|
|
381
|
+
const state = await tx.getState();
|
|
382
|
+
// { isAuthenticated, user, accessToken, activeOrg, isAgentMode }
|
|
383
|
+
```
|
|
384
|
+
|
|
385
|
+
---
|
|
386
|
+
|
|
387
|
+
## Migration Guide: v0.9 → v1.0
|
|
388
|
+
|
|
389
|
+
### Breaking Changes
|
|
390
|
+
|
|
391
|
+
1. **Constructor signature changed** — The client now accepts a `TenxyteClientConfig` object:
|
|
392
|
+
```typescript
|
|
393
|
+
// Before (v0.9)
|
|
394
|
+
const tx = new TenxyteClient({ baseUrl: '...', headers: { ... } });
|
|
395
|
+
|
|
396
|
+
// After (v1.0) — same, but new options available
|
|
397
|
+
const tx = new TenxyteClient({
|
|
398
|
+
baseUrl: '...',
|
|
399
|
+
headers: { ... },
|
|
400
|
+
autoRefresh: true, // NEW
|
|
401
|
+
autoDeviceInfo: true, // NEW
|
|
402
|
+
retryConfig: { ... }, // NEW
|
|
403
|
+
});
|
|
404
|
+
```
|
|
405
|
+
|
|
406
|
+
2. **`loginWithEmail` now requires `device_info`**:
|
|
407
|
+
```typescript
|
|
408
|
+
// Before (v0.9)
|
|
409
|
+
await tx.auth.loginWithEmail({ email, password });
|
|
410
|
+
|
|
411
|
+
// After (v1.0)
|
|
412
|
+
await tx.auth.loginWithEmail({ email, password, device_info: '' });
|
|
413
|
+
```
|
|
414
|
+
|
|
415
|
+
3. **`requestMagicLink` now requires `validation_url`**:
|
|
416
|
+
```typescript
|
|
417
|
+
// Before
|
|
418
|
+
await tx.auth.requestMagicLink({ email });
|
|
419
|
+
|
|
420
|
+
// After
|
|
421
|
+
await tx.auth.requestMagicLink({ email, validation_url: 'https://...' });
|
|
422
|
+
```
|
|
423
|
+
|
|
424
|
+
4. **Auto-session management** — Tokens are now automatically stored and the `Authorization` header is automatically injected. You no longer need to manage this manually.
|
|
425
|
+
|
|
426
|
+
5. **New modules added** — `tx.applications`, `tx.admin`, `tx.gdpr`, `tx.dashboard` are now available.
|
|
427
|
+
|
|
428
|
+
6. **`register()` return type changed** — Now returns `RegisterResponse` (may include tokens if auto-login is enabled).
|
|
429
|
+
|
|
430
|
+
### New Features in v1.0
|
|
431
|
+
|
|
432
|
+
- Auto-refresh interceptor (silent 401 → refresh → retry)
|
|
433
|
+
- Configurable retry with exponential backoff (429/5xx)
|
|
434
|
+
- Device info auto-injection
|
|
435
|
+
- Pluggable logger with log levels
|
|
436
|
+
- High-level helpers (`isAuthenticated`, `getCurrentUser`, `isTokenExpired`)
|
|
437
|
+
- `getState()` for framework wrapper integration
|
|
438
|
+
- EventEmitter for reactive state (`session:expired`, `token:refreshed`, etc.)
|
|
439
|
+
|
|
440
|
+
---
|
|
441
|
+
|
|
442
|
+
## License
|
|
443
|
+
|
|
444
|
+
MIT
|