@thetechfossil/auth2 1.2.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +218 -0
- package/dist/index.components.d.ts +62 -0
- package/dist/index.components.js +1757 -0
- package/dist/index.components.js.map +1 -0
- package/dist/index.components.mjs +1747 -0
- package/dist/index.components.mjs.map +1 -0
- package/dist/index.d.ts +228 -0
- package/dist/index.js +1853 -0
- package/dist/index.js.map +1 -0
- package/dist/index.mjs +1844 -0
- package/dist/index.mjs.map +1 -0
- package/dist/index.next.d.ts +232 -0
- package/dist/index.next.js +2093 -0
- package/dist/index.next.js.map +1 -0
- package/dist/index.next.mjs +2078 -0
- package/dist/index.next.mjs.map +1 -0
- package/dist/index.next.server.d.ts +142 -0
- package/dist/index.next.server.js +442 -0
- package/dist/index.next.server.js.map +1 -0
- package/dist/index.next.server.mjs +433 -0
- package/dist/index.next.server.mjs.map +1 -0
- package/dist/index.node.d.ts +133 -0
- package/dist/index.node.js +381 -0
- package/dist/index.node.js.map +1 -0
- package/dist/index.node.mjs +373 -0
- package/dist/index.node.mjs.map +1 -0
- package/package.json +63 -0
|
@@ -0,0 +1,373 @@
|
|
|
1
|
+
import axios from 'axios';
|
|
2
|
+
|
|
3
|
+
// src/core/http-client.ts
|
|
4
|
+
var HttpClient = class {
|
|
5
|
+
constructor(baseUrl, defaultHeaders = {}) {
|
|
6
|
+
this.csrfToken = null;
|
|
7
|
+
this.axiosInstance = axios.create({
|
|
8
|
+
baseURL: baseUrl.replace(/\/$/, ""),
|
|
9
|
+
headers: {
|
|
10
|
+
"Content-Type": "application/json",
|
|
11
|
+
...defaultHeaders
|
|
12
|
+
},
|
|
13
|
+
withCredentials: true,
|
|
14
|
+
// Include cookies for CSRF
|
|
15
|
+
timeout: 3e4
|
|
16
|
+
// 30 second timeout
|
|
17
|
+
});
|
|
18
|
+
this.axiosInstance.interceptors.request.use(
|
|
19
|
+
(config) => {
|
|
20
|
+
if (this.csrfToken && ["post", "put", "delete", "patch"].includes(config.method?.toLowerCase() || "")) {
|
|
21
|
+
config.headers["x-csrf-token"] = this.csrfToken;
|
|
22
|
+
}
|
|
23
|
+
return config;
|
|
24
|
+
},
|
|
25
|
+
(error) => Promise.reject(error)
|
|
26
|
+
);
|
|
27
|
+
this.axiosInstance.interceptors.response.use(
|
|
28
|
+
(response) => response,
|
|
29
|
+
async (error) => {
|
|
30
|
+
const originalRequest = error.config;
|
|
31
|
+
if (error.response?.status === 403 && !originalRequest._retry) {
|
|
32
|
+
originalRequest._retry = true;
|
|
33
|
+
try {
|
|
34
|
+
await this.refreshCsrfToken();
|
|
35
|
+
if (originalRequest.headers) {
|
|
36
|
+
originalRequest.headers["x-csrf-token"] = this.csrfToken;
|
|
37
|
+
}
|
|
38
|
+
return this.axiosInstance(originalRequest);
|
|
39
|
+
} catch (refreshError) {
|
|
40
|
+
return Promise.reject(refreshError);
|
|
41
|
+
}
|
|
42
|
+
}
|
|
43
|
+
return Promise.reject(error);
|
|
44
|
+
}
|
|
45
|
+
);
|
|
46
|
+
}
|
|
47
|
+
async get(endpoint, headers) {
|
|
48
|
+
const response = await this.axiosInstance.get(endpoint, { headers });
|
|
49
|
+
return response.data;
|
|
50
|
+
}
|
|
51
|
+
async post(endpoint, data, headers) {
|
|
52
|
+
const response = await this.axiosInstance.post(endpoint, data, { headers });
|
|
53
|
+
return response.data;
|
|
54
|
+
}
|
|
55
|
+
async put(endpoint, data, headers) {
|
|
56
|
+
const response = await this.axiosInstance.put(endpoint, data, { headers });
|
|
57
|
+
return response.data;
|
|
58
|
+
}
|
|
59
|
+
async delete(endpoint, headers) {
|
|
60
|
+
const response = await this.axiosInstance.delete(endpoint, { headers });
|
|
61
|
+
return response.data;
|
|
62
|
+
}
|
|
63
|
+
setAuthToken(token) {
|
|
64
|
+
this.axiosInstance.defaults.headers.common["Authorization"] = `Bearer ${token}`;
|
|
65
|
+
}
|
|
66
|
+
removeAuthToken() {
|
|
67
|
+
delete this.axiosInstance.defaults.headers.common["Authorization"];
|
|
68
|
+
}
|
|
69
|
+
setCsrfToken(token) {
|
|
70
|
+
this.csrfToken = token;
|
|
71
|
+
}
|
|
72
|
+
getCsrfToken() {
|
|
73
|
+
return this.csrfToken;
|
|
74
|
+
}
|
|
75
|
+
removeCsrfToken() {
|
|
76
|
+
this.csrfToken = null;
|
|
77
|
+
}
|
|
78
|
+
async refreshCsrfToken() {
|
|
79
|
+
try {
|
|
80
|
+
const response = await this.axiosInstance.get("/api/v1/auth/csrf-token");
|
|
81
|
+
this.csrfToken = response.data.csrfToken;
|
|
82
|
+
} catch (error) {
|
|
83
|
+
console.error("Failed to refresh CSRF token:", error);
|
|
84
|
+
throw error;
|
|
85
|
+
}
|
|
86
|
+
}
|
|
87
|
+
};
|
|
88
|
+
|
|
89
|
+
// src/core/auth-service.ts
|
|
90
|
+
var AuthService = class {
|
|
91
|
+
constructor(config) {
|
|
92
|
+
this.token = null;
|
|
93
|
+
this.config = {
|
|
94
|
+
localStorageKey: "auth_token",
|
|
95
|
+
csrfEnabled: true,
|
|
96
|
+
...config
|
|
97
|
+
};
|
|
98
|
+
this.httpClient = new HttpClient(this.config.baseUrl);
|
|
99
|
+
this.loadTokenFromStorage();
|
|
100
|
+
if (this.config.csrfEnabled && typeof window !== "undefined") {
|
|
101
|
+
this.refreshCsrfToken();
|
|
102
|
+
}
|
|
103
|
+
}
|
|
104
|
+
loadTokenFromStorage() {
|
|
105
|
+
if (typeof window !== "undefined" && this.config.localStorageKey) {
|
|
106
|
+
try {
|
|
107
|
+
const token = localStorage.getItem(this.config.localStorageKey);
|
|
108
|
+
if (token) {
|
|
109
|
+
this.token = token;
|
|
110
|
+
this.httpClient.setAuthToken(token);
|
|
111
|
+
}
|
|
112
|
+
} catch (error) {
|
|
113
|
+
console.warn("Failed to load token from storage:", error);
|
|
114
|
+
}
|
|
115
|
+
}
|
|
116
|
+
}
|
|
117
|
+
saveTokenToStorage(token) {
|
|
118
|
+
if (typeof window !== "undefined" && this.config.localStorageKey) {
|
|
119
|
+
try {
|
|
120
|
+
localStorage.setItem(this.config.localStorageKey, token);
|
|
121
|
+
} catch (error) {
|
|
122
|
+
console.warn("Failed to save token to storage:", error);
|
|
123
|
+
}
|
|
124
|
+
}
|
|
125
|
+
}
|
|
126
|
+
removeTokenFromStorage() {
|
|
127
|
+
if (typeof window !== "undefined" && this.config.localStorageKey) {
|
|
128
|
+
try {
|
|
129
|
+
localStorage.removeItem(this.config.localStorageKey);
|
|
130
|
+
} catch (error) {
|
|
131
|
+
console.warn("Failed to remove token from storage:", error);
|
|
132
|
+
}
|
|
133
|
+
}
|
|
134
|
+
}
|
|
135
|
+
isAuthenticated() {
|
|
136
|
+
return !!this.token;
|
|
137
|
+
}
|
|
138
|
+
getToken() {
|
|
139
|
+
return this.token;
|
|
140
|
+
}
|
|
141
|
+
getCurrentUser() {
|
|
142
|
+
if (!this.token)
|
|
143
|
+
return null;
|
|
144
|
+
try {
|
|
145
|
+
const payload = JSON.parse(atob(this.token.split(".")[1]));
|
|
146
|
+
return payload.user || null;
|
|
147
|
+
} catch (error) {
|
|
148
|
+
console.error("Failed to parse user from token:", error);
|
|
149
|
+
return null;
|
|
150
|
+
}
|
|
151
|
+
}
|
|
152
|
+
// CSRF Token Management
|
|
153
|
+
async refreshCsrfToken() {
|
|
154
|
+
if (!this.config.csrfEnabled)
|
|
155
|
+
return;
|
|
156
|
+
try {
|
|
157
|
+
const response = await this.httpClient.get("/api/v1/auth/csrf-token");
|
|
158
|
+
if (response.csrfToken) {
|
|
159
|
+
this.httpClient.setCsrfToken(response.csrfToken);
|
|
160
|
+
}
|
|
161
|
+
} catch (error) {
|
|
162
|
+
console.error("Failed to get CSRF token:", error);
|
|
163
|
+
}
|
|
164
|
+
}
|
|
165
|
+
getCsrfToken() {
|
|
166
|
+
return this.httpClient.getCsrfToken();
|
|
167
|
+
}
|
|
168
|
+
// OAuth Methods
|
|
169
|
+
loginWithOAuth(provider) {
|
|
170
|
+
if (typeof window === "undefined") {
|
|
171
|
+
throw new Error("OAuth login is only available in browser environments");
|
|
172
|
+
}
|
|
173
|
+
const oauthUrl = `${this.config.baseUrl}/api/v1/auth/oauth/${provider}`;
|
|
174
|
+
window.location.href = oauthUrl;
|
|
175
|
+
}
|
|
176
|
+
linkOAuthProvider(provider) {
|
|
177
|
+
if (typeof window === "undefined") {
|
|
178
|
+
throw new Error("OAuth linking is only available in browser environments");
|
|
179
|
+
}
|
|
180
|
+
if (!this.token) {
|
|
181
|
+
throw new Error("Must be authenticated to link OAuth provider");
|
|
182
|
+
}
|
|
183
|
+
const linkUrl = `${this.config.baseUrl}/api/v1/auth/oauth/${provider}/link`;
|
|
184
|
+
window.location.href = linkUrl;
|
|
185
|
+
}
|
|
186
|
+
async unlinkOAuthProvider(provider) {
|
|
187
|
+
if (!this.token) {
|
|
188
|
+
throw new Error("Not authenticated");
|
|
189
|
+
}
|
|
190
|
+
const response = await this.httpClient.delete(
|
|
191
|
+
`/api/v1/auth/oauth/${provider}/unlink`
|
|
192
|
+
);
|
|
193
|
+
return response;
|
|
194
|
+
}
|
|
195
|
+
// Standard Auth Methods
|
|
196
|
+
async login(data) {
|
|
197
|
+
const response = await this.httpClient.post("/api/v1/auth/login", data);
|
|
198
|
+
if (response.success && response.token) {
|
|
199
|
+
this.token = response.token;
|
|
200
|
+
this.httpClient.setAuthToken(response.token);
|
|
201
|
+
this.saveTokenToStorage(response.token);
|
|
202
|
+
return response;
|
|
203
|
+
}
|
|
204
|
+
if (response.success && response.message === "OTP sent to your email.") {
|
|
205
|
+
return response;
|
|
206
|
+
}
|
|
207
|
+
if (response.success && response.message === "OTP verified successfully." && response.token) {
|
|
208
|
+
this.token = response.token;
|
|
209
|
+
this.httpClient.setAuthToken(response.token);
|
|
210
|
+
this.saveTokenToStorage(response.token);
|
|
211
|
+
return response;
|
|
212
|
+
}
|
|
213
|
+
throw new Error(response.message || "Login failed");
|
|
214
|
+
}
|
|
215
|
+
async register(data) {
|
|
216
|
+
const registerData = { ...data };
|
|
217
|
+
if (!registerData.frontendBaseUrl && typeof window !== "undefined") {
|
|
218
|
+
registerData.frontendBaseUrl = process.env.FRONTEND_BASE_URL || process.env.NEXT_PUBLIC_FRONTEND_BASE_URL || process.env.REACT_APP_FRONTEND_BASE_URL || process.env.NEXT_PUBLIC_APP_URL || window.location.origin;
|
|
219
|
+
}
|
|
220
|
+
const response = await this.httpClient.post("/api/v1/auth/register", registerData);
|
|
221
|
+
if (response.success && response.message === "Registration data saved. Verification email sent. Please check your inbox.") {
|
|
222
|
+
return response;
|
|
223
|
+
}
|
|
224
|
+
throw new Error(response.message || "Registration failed");
|
|
225
|
+
}
|
|
226
|
+
async verify(data) {
|
|
227
|
+
const response = await this.httpClient.post("/api/v1/auth/verify", data);
|
|
228
|
+
if (response.success && response.token) {
|
|
229
|
+
this.token = response.token;
|
|
230
|
+
this.httpClient.setAuthToken(response.token);
|
|
231
|
+
this.saveTokenToStorage(response.token);
|
|
232
|
+
}
|
|
233
|
+
return response;
|
|
234
|
+
}
|
|
235
|
+
async verifyEmailToken(token) {
|
|
236
|
+
const response = await this.httpClient.get(`/api/v1/auth/verify-email?token=${token}`);
|
|
237
|
+
if (response.success && response.token) {
|
|
238
|
+
this.token = response.token;
|
|
239
|
+
this.httpClient.setAuthToken(response.token);
|
|
240
|
+
this.saveTokenToStorage(response.token);
|
|
241
|
+
}
|
|
242
|
+
return response;
|
|
243
|
+
}
|
|
244
|
+
async logout() {
|
|
245
|
+
this.token = null;
|
|
246
|
+
this.httpClient.removeAuthToken();
|
|
247
|
+
this.httpClient.removeCsrfToken();
|
|
248
|
+
this.removeTokenFromStorage();
|
|
249
|
+
}
|
|
250
|
+
async getProfile() {
|
|
251
|
+
if (!this.token) {
|
|
252
|
+
throw new Error("Not authenticated");
|
|
253
|
+
}
|
|
254
|
+
const response = await this.httpClient.get("/api/v1/user/me");
|
|
255
|
+
return response.user;
|
|
256
|
+
}
|
|
257
|
+
async updateProfile(data) {
|
|
258
|
+
if (!this.token) {
|
|
259
|
+
throw new Error("Not authenticated");
|
|
260
|
+
}
|
|
261
|
+
const response = await this.httpClient.post("/api/v1/user/update/user", data);
|
|
262
|
+
if (response.success && response.token) {
|
|
263
|
+
this.token = response.token;
|
|
264
|
+
this.httpClient.setAuthToken(response.token);
|
|
265
|
+
this.saveTokenToStorage(response.token);
|
|
266
|
+
}
|
|
267
|
+
return response;
|
|
268
|
+
}
|
|
269
|
+
async getAllUsers() {
|
|
270
|
+
if (!this.token) {
|
|
271
|
+
throw new Error("Not authenticated");
|
|
272
|
+
}
|
|
273
|
+
const response = await this.httpClient.get("/api/v1/user/all");
|
|
274
|
+
return response.users;
|
|
275
|
+
}
|
|
276
|
+
async getUserById(id) {
|
|
277
|
+
const response = await this.httpClient.get(`/api/v1/user/${id}`);
|
|
278
|
+
return response.user;
|
|
279
|
+
}
|
|
280
|
+
async forgotPassword(email) {
|
|
281
|
+
if (typeof window !== "undefined") {
|
|
282
|
+
process.env.FRONTEND_BASE_URL || process.env.NEXT_PUBLIC_FRONTEND_BASE_URL || process.env.REACT_APP_FRONTEND_BASE_URL || process.env.NEXT_PUBLIC_APP_URL || window.location.origin;
|
|
283
|
+
}
|
|
284
|
+
const response = await this.httpClient.post("/api/v1/auth/forgot-password", { email });
|
|
285
|
+
return response;
|
|
286
|
+
}
|
|
287
|
+
async resetPassword(token, password) {
|
|
288
|
+
const response = await this.httpClient.post("/api/v1/auth/reset-password", { token, password });
|
|
289
|
+
return response;
|
|
290
|
+
}
|
|
291
|
+
};
|
|
292
|
+
|
|
293
|
+
// src/node/auth-client.ts
|
|
294
|
+
var AuthClient = class extends AuthService {
|
|
295
|
+
constructor(config) {
|
|
296
|
+
super(config);
|
|
297
|
+
}
|
|
298
|
+
// Override methods that require browser-specific features
|
|
299
|
+
// For Node.js, token persistence must be handled manually
|
|
300
|
+
async register(data) {
|
|
301
|
+
const registerData = { ...data };
|
|
302
|
+
if (!registerData.frontendBaseUrl) {
|
|
303
|
+
registerData.frontendBaseUrl = process.env.FRONTEND_BASE_URL || process.env.NEXT_PUBLIC_FRONTEND_BASE_URL || process.env.REACT_APP_FRONTEND_BASE_URL;
|
|
304
|
+
}
|
|
305
|
+
const response = await this["httpClient"].post("/api/v1/auth/register", registerData);
|
|
306
|
+
if (response.success && response.message === "Registration data saved. Verification email sent. Please check your inbox.") {
|
|
307
|
+
return response;
|
|
308
|
+
}
|
|
309
|
+
throw new Error(response.message || "Registration failed");
|
|
310
|
+
}
|
|
311
|
+
async login(data) {
|
|
312
|
+
const response = await this["httpClient"].post("/api/v1/auth/login", data);
|
|
313
|
+
if (response.success && response.token) {
|
|
314
|
+
this["token"] = response.token;
|
|
315
|
+
this["httpClient"].setAuthToken(response.token);
|
|
316
|
+
return response;
|
|
317
|
+
}
|
|
318
|
+
if (response.success && response.message === "OTP sent to your email.") {
|
|
319
|
+
return response;
|
|
320
|
+
}
|
|
321
|
+
if (response.success && response.message === "OTP verified successfully." && response.token) {
|
|
322
|
+
this["token"] = response.token;
|
|
323
|
+
this["httpClient"].setAuthToken(response.token);
|
|
324
|
+
return response;
|
|
325
|
+
}
|
|
326
|
+
throw new Error(response.message || "Login failed");
|
|
327
|
+
}
|
|
328
|
+
async verify(data) {
|
|
329
|
+
const response = await this["httpClient"].post("/api/v1/auth/verify", data);
|
|
330
|
+
if (response.success && response.token) {
|
|
331
|
+
this["token"] = response.token;
|
|
332
|
+
this["httpClient"].setAuthToken(response.token);
|
|
333
|
+
}
|
|
334
|
+
return response;
|
|
335
|
+
}
|
|
336
|
+
async logout() {
|
|
337
|
+
this["token"] = null;
|
|
338
|
+
this["httpClient"].removeAuthToken();
|
|
339
|
+
}
|
|
340
|
+
async getProfile() {
|
|
341
|
+
if (!this["token"]) {
|
|
342
|
+
throw new Error("Not authenticated");
|
|
343
|
+
}
|
|
344
|
+
const response = await this["httpClient"].get("/api/v1/user/me");
|
|
345
|
+
return response.user;
|
|
346
|
+
}
|
|
347
|
+
async getUserById(id) {
|
|
348
|
+
const response = await this["httpClient"].get(`/api/v1/user/${id}`);
|
|
349
|
+
return response.user;
|
|
350
|
+
}
|
|
351
|
+
async updateProfile(data) {
|
|
352
|
+
if (!this["token"]) {
|
|
353
|
+
throw new Error("Not authenticated");
|
|
354
|
+
}
|
|
355
|
+
const response = await this["httpClient"].post("/api/v1/user/update/name", data);
|
|
356
|
+
if (response.success && response.token) {
|
|
357
|
+
this["token"] = response.token;
|
|
358
|
+
this["httpClient"].setAuthToken(response.token);
|
|
359
|
+
}
|
|
360
|
+
return response;
|
|
361
|
+
}
|
|
362
|
+
async getAllUsers() {
|
|
363
|
+
if (!this["token"]) {
|
|
364
|
+
throw new Error("Not authenticated");
|
|
365
|
+
}
|
|
366
|
+
const response = await this["httpClient"].get("/api/v1/user/all");
|
|
367
|
+
return response.users;
|
|
368
|
+
}
|
|
369
|
+
};
|
|
370
|
+
|
|
371
|
+
export { AuthClient, AuthService, HttpClient };
|
|
372
|
+
//# sourceMappingURL=out.js.map
|
|
373
|
+
//# sourceMappingURL=index.node.mjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/core/http-client.ts","../src/core/auth-service.ts","../src/node/auth-client.ts"],"names":[],"mappings":";AAAA,OAAO,WAA8D;AAE9D,IAAM,aAAN,MAAiB;AAAA,EAItB,YAAY,SAAiB,iBAAyC,CAAC,GAAG;AAF1E,SAAQ,YAA2B;AAGjC,SAAK,gBAAgB,MAAM,OAAO;AAAA,MAChC,SAAS,QAAQ,QAAQ,OAAO,EAAE;AAAA,MAClC,SAAS;AAAA,QACP,gBAAgB;AAAA,QAChB,GAAG;AAAA,MACL;AAAA,MACA,iBAAiB;AAAA;AAAA,MACjB,SAAS;AAAA;AAAA,IACX,CAAC;AAGD,SAAK,cAAc,aAAa,QAAQ;AAAA,MACtC,CAAC,WAAW;AAEV,YAAI,KAAK,aAAa,CAAC,QAAQ,OAAO,UAAU,OAAO,EAAE,SAAS,OAAO,QAAQ,YAAY,KAAK,EAAE,GAAG;AACrG,iBAAO,QAAQ,cAAc,IAAI,KAAK;AAAA,QACxC;AACA,eAAO;AAAA,MACT;AAAA,MACA,CAAC,UAAU,QAAQ,OAAO,KAAK;AAAA,IACjC;AAGA,SAAK,cAAc,aAAa,SAAS;AAAA,MACvC,CAAC,aAAa;AAAA,MACd,OAAO,UAAsB;AAC3B,cAAM,kBAAkB,MAAM;AAG9B,YAAI,MAAM,UAAU,WAAW,OAAO,CAAC,gBAAgB,QAAQ;AAC7D,0BAAgB,SAAS;AAEzB,cAAI;AACF,kBAAM,KAAK,iBAAiB;AAC5B,gBAAI,gBAAgB,SAAS;AAC3B,8BAAgB,QAAQ,cAAc,IAAI,KAAK;AAAA,YACjD;AACA,mBAAO,KAAK,cAAc,eAAe;AAAA,UAC3C,SAAS,cAAP;AACA,mBAAO,QAAQ,OAAO,YAAY;AAAA,UACpC;AAAA,QACF;AAEA,eAAO,QAAQ,OAAO,KAAK;AAAA,MAC7B;AAAA,IACF;AAAA,EACF;AAAA,EAEA,MAAa,IAAO,UAAkB,SAA8C;AAClF,UAAM,WAAW,MAAM,KAAK,cAAc,IAAO,UAAU,EAAE,QAAQ,CAAC;AACtE,WAAO,SAAS;AAAA,EAClB;AAAA,EAEA,MAAa,KAAQ,UAAkB,MAAY,SAA8C;AAC/F,UAAM,WAAW,MAAM,KAAK,cAAc,KAAQ,UAAU,MAAM,EAAE,QAAQ,CAAC;AAC7E,WAAO,SAAS;AAAA,EAClB;AAAA,EAEA,MAAa,IAAO,UAAkB,MAAY,SAA8C;AAC9F,UAAM,WAAW,MAAM,KAAK,cAAc,IAAO,UAAU,MAAM,EAAE,QAAQ,CAAC;AAC5E,WAAO,SAAS;AAAA,EAClB;AAAA,EAEA,MAAa,OAAU,UAAkB,SAA8C;AACrF,UAAM,WAAW,MAAM,KAAK,cAAc,OAAU,UAAU,EAAE,QAAQ,CAAC;AACzE,WAAO,SAAS;AAAA,EAClB;AAAA,EAEO,aAAa,OAAqB;AACvC,SAAK,cAAc,SAAS,QAAQ,OAAO,eAAe,IAAI,UAAU;AAAA,EAC1E;AAAA,EAEO,kBAAwB;AAC7B,WAAO,KAAK,cAAc,SAAS,QAAQ,OAAO,eAAe;AAAA,EACnE;AAAA,EAEO,aAAa,OAAqB;AACvC,SAAK,YAAY;AAAA,EACnB;AAAA,EAEO,eAA8B;AACnC,WAAO,KAAK;AAAA,EACd;AAAA,EAEO,kBAAwB;AAC7B,SAAK,YAAY;AAAA,EACnB;AAAA,EAEA,MAAc,mBAAkC;AAC9C,QAAI;AACF,YAAM,WAAW,MAAM,KAAK,cAAc,IAA2B,yBAAyB;AAC9F,WAAK,YAAY,SAAS,KAAK;AAAA,IACjC,SAAS,OAAP;AACA,cAAQ,MAAM,iCAAiC,KAAK;AACpD,YAAM;AAAA,IACR;AAAA,EACF;AACF;;;AC3FO,IAAM,cAAN,MAAkB;AAAA,EAKvB,YAAY,QAAoB;AAFhC,SAAQ,QAAuB;AAG7B,SAAK,SAAS;AAAA,MACZ,iBAAiB;AAAA,MACjB,aAAa;AAAA,MACb,GAAG;AAAA,IACL;AAEA,SAAK,aAAa,IAAI,WAAW,KAAK,OAAO,OAAO;AACpD,SAAK,qBAAqB;AAG1B,QAAI,KAAK,OAAO,eAAe,OAAO,WAAW,aAAa;AAC5D,WAAK,iBAAiB;AAAA,IACxB;AAAA,EACF;AAAA,EAEQ,uBAA6B;AACnC,QAAI,OAAO,WAAW,eAAe,KAAK,OAAO,iBAAiB;AAChE,UAAI;AACF,cAAM,QAAQ,aAAa,QAAQ,KAAK,OAAO,eAAe;AAC9D,YAAI,OAAO;AACT,eAAK,QAAQ;AACb,eAAK,WAAW,aAAa,KAAK;AAAA,QACpC;AAAA,MACF,SAAS,OAAP;AACA,gBAAQ,KAAK,sCAAsC,KAAK;AAAA,MAC1D;AAAA,IACF;AAAA,EACF;AAAA,EAEQ,mBAAmB,OAAqB;AAC9C,QAAI,OAAO,WAAW,eAAe,KAAK,OAAO,iBAAiB;AAChE,UAAI;AACF,qBAAa,QAAQ,KAAK,OAAO,iBAAiB,KAAK;AAAA,MACzD,SAAS,OAAP;AACA,gBAAQ,KAAK,oCAAoC,KAAK;AAAA,MACxD;AAAA,IACF;AAAA,EACF;AAAA,EAEQ,yBAA+B;AACrC,QAAI,OAAO,WAAW,eAAe,KAAK,OAAO,iBAAiB;AAChE,UAAI;AACF,qBAAa,WAAW,KAAK,OAAO,eAAe;AAAA,MACrD,SAAS,OAAP;AACA,gBAAQ,KAAK,wCAAwC,KAAK;AAAA,MAC5D;AAAA,IACF;AAAA,EACF;AAAA,EAEO,kBAA2B;AAChC,WAAO,CAAC,CAAC,KAAK;AAAA,EAChB;AAAA,EAEO,WAA0B;AAC/B,WAAO,KAAK;AAAA,EACd;AAAA,EAEO,iBAA8B;AACnC,QAAI,CAAC,KAAK;AAAO,aAAO;AAExB,QAAI;AACF,YAAM,UAAU,KAAK,MAAM,KAAK,KAAK,MAAM,MAAM,GAAG,EAAE,CAAC,CAAC,CAAC;AACzD,aAAO,QAAQ,QAAQ;AAAA,IACzB,SAAS,OAAP;AACA,cAAQ,MAAM,oCAAoC,KAAK;AACvD,aAAO;AAAA,IACT;AAAA,EACF;AAAA;AAAA,EAGA,MAAa,mBAAkC;AAC7C,QAAI,CAAC,KAAK,OAAO;AAAa;AAE9B,QAAI;AACF,YAAM,WAAW,MAAM,KAAK,WAAW,IAAuB,yBAAyB;AACvF,UAAI,SAAS,WAAW;AACtB,aAAK,WAAW,aAAa,SAAS,SAAS;AAAA,MACjD;AAAA,IACF,SAAS,OAAP;AACA,cAAQ,MAAM,6BAA6B,KAAK;AAAA,IAClD;AAAA,EACF;AAAA,EAEO,eAA8B;AACnC,WAAO,KAAK,WAAW,aAAa;AAAA,EACtC;AAAA;AAAA,EAGO,eAAe,UAA+B;AACnD,QAAI,OAAO,WAAW,aAAa;AACjC,YAAM,IAAI,MAAM,uDAAuD;AAAA,IACzE;AAEA,UAAM,WAAW,GAAG,KAAK,OAAO,6BAA6B;AAC7D,WAAO,SAAS,OAAO;AAAA,EACzB;AAAA,EAEO,kBAAkB,UAA+B;AACtD,QAAI,OAAO,WAAW,aAAa;AACjC,YAAM,IAAI,MAAM,yDAAyD;AAAA,IAC3E;AAEA,QAAI,CAAC,KAAK,OAAO;AACf,YAAM,IAAI,MAAM,8CAA8C;AAAA,IAChE;AAEA,UAAM,UAAU,GAAG,KAAK,OAAO,6BAA6B;AAC5D,WAAO,SAAS,OAAO;AAAA,EACzB;AAAA,EAEA,MAAa,oBAAoB,UAAgD;AAC/E,QAAI,CAAC,KAAK,OAAO;AACf,YAAM,IAAI,MAAM,mBAAmB;AAAA,IACrC;AAEA,UAAM,WAAW,MAAM,KAAK,WAAW;AAAA,MACrC,sBAAsB;AAAA,IACxB;AACA,WAAO;AAAA,EACT;AAAA;AAAA,EAGA,MAAa,MAAM,MAAwC;AACzD,UAAM,WAAW,MAAM,KAAK,WAAW,KAAmB,sBAAsB,IAAI;AAEpF,QAAI,SAAS,WAAW,SAAS,OAAO;AACtC,WAAK,QAAQ,SAAS;AACtB,WAAK,WAAW,aAAa,SAAS,KAAK;AAC3C,WAAK,mBAAmB,SAAS,KAAK;AACtC,aAAO;AAAA,IACT;AAEA,QAAI,SAAS,WAAW,SAAS,YAAY,2BAA2B;AACtE,aAAO;AAAA,IACT;AAEA,QAAI,SAAS,WAAW,SAAS,YAAY,gCAAgC,SAAS,OAAO;AAC3F,WAAK,QAAQ,SAAS;AACtB,WAAK,WAAW,aAAa,SAAS,KAAK;AAC3C,WAAK,mBAAmB,SAAS,KAAK;AACtC,aAAO;AAAA,IACT;AAEA,UAAM,IAAI,MAAM,SAAS,WAAW,cAAc;AAAA,EACpD;AAAA,EAEA,MAAa,SAAS,MAA2C;AAC/D,UAAM,eAAe,EAAE,GAAG,KAAK;AAC/B,QAAI,CAAC,aAAa,mBAAmB,OAAO,WAAW,aAAa;AAClE,mBAAa,kBACX,QAAQ,IAAI,qBACZ,QAAQ,IAAI,iCACZ,QAAQ,IAAI,+BACZ,QAAQ,IAAI,uBACZ,OAAO,SAAS;AAAA,IACpB;AAEA,UAAM,WAAW,MAAM,KAAK,WAAW,KAAmB,yBAAyB,YAAY;AAE/F,QAAI,SAAS,WAAW,SAAS,YAAY,8EAA8E;AACzH,aAAO;AAAA,IACT;AAEA,UAAM,IAAI,MAAM,SAAS,WAAW,qBAAqB;AAAA,EAC3D;AAAA,EAEA,MAAa,OAAO,MAAyC;AAC3D,UAAM,WAAW,MAAM,KAAK,WAAW,KAAmB,uBAAuB,IAAI;AAErF,QAAI,SAAS,WAAW,SAAS,OAAO;AACtC,WAAK,QAAQ,SAAS;AACtB,WAAK,WAAW,aAAa,SAAS,KAAK;AAC3C,WAAK,mBAAmB,SAAS,KAAK;AAAA,IACxC;AAEA,WAAO;AAAA,EACT;AAAA,EAEA,MAAa,iBAAiB,OAAsC;AAClE,UAAM,WAAW,MAAM,KAAK,WAAW,IAAkB,mCAAmC,OAAO;AAEnG,QAAI,SAAS,WAAW,SAAS,OAAO;AACtC,WAAK,QAAQ,SAAS;AACtB,WAAK,WAAW,aAAa,SAAS,KAAK;AAC3C,WAAK,mBAAmB,SAAS,KAAK;AAAA,IACxC;AAEA,WAAO;AAAA,EACT;AAAA,EAEA,MAAa,SAAwB;AACnC,SAAK,QAAQ;AACb,SAAK,WAAW,gBAAgB;AAChC,SAAK,WAAW,gBAAgB;AAChC,SAAK,uBAAuB;AAAA,EAC9B;AAAA,EAEA,MAAa,aAA4B;AACvC,QAAI,CAAC,KAAK,OAAO;AACf,YAAM,IAAI,MAAM,mBAAmB;AAAA,IACrC;AAEA,UAAM,WAAW,MAAM,KAAK,WAAW,IAAoB,iBAAiB;AAC5E,WAAO,SAAS;AAAA,EAClB;AAAA,EAEA,MAAa,cAAc,MAA6C;AACtE,QAAI,CAAC,KAAK,OAAO;AACf,YAAM,IAAI,MAAM,mBAAmB;AAAA,IACrC;AAEA,UAAM,WAAW,MAAM,KAAK,WAAW,KAAmB,4BAA4B,IAAI;AAE1F,QAAI,SAAS,WAAW,SAAS,OAAO;AACtC,WAAK,QAAQ,SAAS;AACtB,WAAK,WAAW,aAAa,SAAS,KAAK;AAC3C,WAAK,mBAAmB,SAAS,KAAK;AAAA,IACxC;AAEA,WAAO;AAAA,EACT;AAAA,EAEA,MAAa,cAA+B;AAC1C,QAAI,CAAC,KAAK,OAAO;AACf,YAAM,IAAI,MAAM,mBAAmB;AAAA,IACrC;AAEA,UAAM,WAAW,MAAM,KAAK,WAAW,IAAuB,kBAAkB;AAChF,WAAO,SAAS;AAAA,EAClB;AAAA,EAEA,MAAa,YAAY,IAA2B;AAClD,UAAM,WAAW,MAAM,KAAK,WAAW,IAAoB,gBAAgB,IAAI;AAC/E,WAAO,SAAS;AAAA,EAClB;AAAA,EAEA,MAAa,eAAe,OAAsC;AAChE,QAAI;AACJ,QAAI,OAAO,WAAW,aAAa;AACjC,wBACE,QAAQ,IAAI,qBACZ,QAAQ,IAAI,iCACZ,QAAQ,IAAI,+BACZ,QAAQ,IAAI,uBACZ,OAAO,SAAS;AAAA,IACpB;AAEA,UAAM,WAAW,MAAM,KAAK,WAAW,KAAmB,gCAAgC,EAAE,MAAM,CAAC;AACnG,WAAO;AAAA,EACT;AAAA,EAEA,MAAa,cAAc,OAAe,UAAyC;AACjF,UAAM,WAAW,MAAM,KAAK,WAAW,KAAmB,+BAA+B,EAAE,OAAO,SAAS,CAAC;AAC5G,WAAO;AAAA,EACT;AACF;;;ACvQO,IAAM,aAAN,cAAyB,YAAY;AAAA,EAC1C,YAAY,QAAoB;AAC9B,UAAM,MAAM;AAAA,EACd;AAAA;AAAA;AAAA,EAKA,MAAa,SAAS,MAA2C;AAE/D,UAAM,eAAe,EAAE,GAAG,KAAK;AAC/B,QAAI,CAAC,aAAa,iBAAiB;AAEjC,mBAAa,kBACX,QAAQ,IAAI,qBACZ,QAAQ,IAAI,iCACZ,QAAQ,IAAI;AAAA,IAChB;AAEA,UAAM,WAAW,MAAM,KAAK,YAAY,EAAE,KAAmB,yBAAyB,YAAY;AAElG,QAAI,SAAS,WAAW,SAAS,YAAY,8EAA8E;AACzH,aAAO;AAAA,IACT;AAEA,UAAM,IAAI,MAAM,SAAS,WAAW,qBAAqB;AAAA,EAC3D;AAAA,EAEA,MAAa,MAAM,MAAwC;AACzD,UAAM,WAAW,MAAM,KAAK,YAAY,EAAE,KAAmB,sBAAsB,IAAI;AAGvF,QAAI,SAAS,WAAW,SAAS,OAAO;AACtC,WAAK,OAAO,IAAI,SAAS;AACzB,WAAK,YAAY,EAAE,aAAa,SAAS,KAAK;AAE9C,aAAO;AAAA,IACT;AAGA,QAAI,SAAS,WAAW,SAAS,YAAY,2BAA2B;AACtE,aAAO;AAAA,IACT;AAGA,QAAI,SAAS,WAAW,SAAS,YAAY,gCAAgC,SAAS,OAAO;AAC3F,WAAK,OAAO,IAAI,SAAS;AACzB,WAAK,YAAY,EAAE,aAAa,SAAS,KAAK;AAE9C,aAAO;AAAA,IACT;AAEA,UAAM,IAAI,MAAM,SAAS,WAAW,cAAc;AAAA,EACpD;AAAA,EAEA,MAAa,OAAO,MAAyC;AAC3D,UAAM,WAAW,MAAM,KAAK,YAAY,EAAE,KAAmB,uBAAuB,IAAI;AAExF,QAAI,SAAS,WAAW,SAAS,OAAO;AACtC,WAAK,OAAO,IAAI,SAAS;AACzB,WAAK,YAAY,EAAE,aAAa,SAAS,KAAK;AAAA,IAEhD;AAEA,WAAO;AAAA,EACT;AAAA,EAEA,MAAa,SAAwB;AACnC,SAAK,OAAO,IAAI;AAChB,SAAK,YAAY,EAAE,gBAAgB;AAAA,EAErC;AAAA,EAEA,MAAa,aAA4B;AACvC,QAAI,CAAC,KAAK,OAAO,GAAG;AAClB,YAAM,IAAI,MAAM,mBAAmB;AAAA,IACrC;AAEA,UAAM,WAAW,MAAM,KAAK,YAAY,EAAE,IAAoB,iBAAiB;AAC/E,WAAO,SAAS;AAAA,EAClB;AAAA,EAEA,MAAa,YAAY,IAA2B;AAClD,UAAM,WAAW,MAAM,KAAK,YAAY,EAAE,IAAoB,gBAAgB,IAAI;AAClF,WAAO,SAAS;AAAA,EAClB;AAAA,EAEA,MAAa,cAAc,MAA6C;AACtE,QAAI,CAAC,KAAK,OAAO,GAAG;AAClB,YAAM,IAAI,MAAM,mBAAmB;AAAA,IACrC;AAEA,UAAM,WAAW,MAAM,KAAK,YAAY,EAAE,KAAmB,4BAA4B,IAAI;AAE7F,QAAI,SAAS,WAAW,SAAS,OAAO;AACtC,WAAK,OAAO,IAAI,SAAS;AACzB,WAAK,YAAY,EAAE,aAAa,SAAS,KAAK;AAAA,IAEhD;AAEA,WAAO;AAAA,EACT;AAAA,EAEA,MAAa,cAA+B;AAC1C,QAAI,CAAC,KAAK,OAAO,GAAG;AAClB,YAAM,IAAI,MAAM,mBAAmB;AAAA,IACrC;AAEA,UAAM,WAAW,MAAM,KAAK,YAAY,EAAE,IAAuB,kBAAkB;AACnF,WAAO,SAAS;AAAA,EAClB;AACF","sourcesContent":["import axios, { AxiosInstance, AxiosRequestConfig, AxiosError } from 'axios';\r\n\r\nexport class HttpClient {\r\n private axiosInstance: AxiosInstance;\r\n private csrfToken: string | null = null;\r\n\r\n constructor(baseUrl: string, defaultHeaders: Record<string, string> = {}) {\r\n this.axiosInstance = axios.create({\r\n baseURL: baseUrl.replace(/\\/$/, ''),\r\n headers: {\r\n 'Content-Type': 'application/json',\r\n ...defaultHeaders\r\n },\r\n withCredentials: true, // Include cookies for CSRF\r\n timeout: 30000 // 30 second timeout\r\n });\r\n\r\n // Request interceptor to add CSRF token\r\n this.axiosInstance.interceptors.request.use(\r\n (config) => {\r\n // Add CSRF token to mutating requests\r\n if (this.csrfToken && ['post', 'put', 'delete', 'patch'].includes(config.method?.toLowerCase() || '')) {\r\n config.headers['x-csrf-token'] = this.csrfToken;\r\n }\r\n return config;\r\n },\r\n (error) => Promise.reject(error)\r\n );\r\n\r\n // Response interceptor for error handling and CSRF token refresh\r\n this.axiosInstance.interceptors.response.use(\r\n (response) => response,\r\n async (error: AxiosError) => {\r\n const originalRequest = error.config as AxiosRequestConfig & { _retry?: boolean };\r\n\r\n // Handle CSRF token refresh on 403\r\n if (error.response?.status === 403 && !originalRequest._retry) {\r\n originalRequest._retry = true;\r\n\r\n try {\r\n await this.refreshCsrfToken();\r\n if (originalRequest.headers) {\r\n originalRequest.headers['x-csrf-token'] = this.csrfToken!;\r\n }\r\n return this.axiosInstance(originalRequest);\r\n } catch (refreshError) {\r\n return Promise.reject(refreshError);\r\n }\r\n }\r\n\r\n return Promise.reject(error);\r\n }\r\n );\r\n }\r\n\r\n public async get<T>(endpoint: string, headers?: Record<string, string>): Promise<T> {\r\n const response = await this.axiosInstance.get<T>(endpoint, { headers });\r\n return response.data;\r\n }\r\n\r\n public async post<T>(endpoint: string, data?: any, headers?: Record<string, string>): Promise<T> {\r\n const response = await this.axiosInstance.post<T>(endpoint, data, { headers });\r\n return response.data;\r\n }\r\n\r\n public async put<T>(endpoint: string, data?: any, headers?: Record<string, string>): Promise<T> {\r\n const response = await this.axiosInstance.put<T>(endpoint, data, { headers });\r\n return response.data;\r\n }\r\n\r\n public async delete<T>(endpoint: string, headers?: Record<string, string>): Promise<T> {\r\n const response = await this.axiosInstance.delete<T>(endpoint, { headers });\r\n return response.data;\r\n }\r\n\r\n public setAuthToken(token: string): void {\r\n this.axiosInstance.defaults.headers.common['Authorization'] = `Bearer ${token}`;\r\n }\r\n\r\n public removeAuthToken(): void {\r\n delete this.axiosInstance.defaults.headers.common['Authorization'];\r\n }\r\n\r\n public setCsrfToken(token: string): void {\r\n this.csrfToken = token;\r\n }\r\n\r\n public getCsrfToken(): string | null {\r\n return this.csrfToken;\r\n }\r\n\r\n public removeCsrfToken(): void {\r\n this.csrfToken = null;\r\n }\r\n\r\n private async refreshCsrfToken(): Promise<void> {\r\n try {\r\n const response = await this.axiosInstance.get<{ csrfToken: string }>('/api/v1/auth/csrf-token');\r\n this.csrfToken = response.data.csrfToken;\r\n } catch (error) {\r\n console.error('Failed to refresh CSRF token:', error);\r\n throw error;\r\n }\r\n }\r\n}","import { HttpClient } from './http-client';\r\nimport {\r\n AuthResponse,\r\n LoginData,\r\n VerifyData,\r\n UpdateUserData,\r\n User,\r\n AuthConfig,\r\n RegisterData,\r\n OAuthProvider,\r\n CsrfTokenResponse\r\n} from '../types';\r\n\r\nexport class AuthService {\r\n private httpClient: HttpClient;\r\n private config: AuthConfig;\r\n private token: string | null = null;\r\n\r\n constructor(config: AuthConfig) {\r\n this.config = {\r\n localStorageKey: 'auth_token',\r\n csrfEnabled: true,\r\n ...config\r\n };\r\n\r\n this.httpClient = new HttpClient(this.config.baseUrl);\r\n this.loadTokenFromStorage();\r\n\r\n // Initialize CSRF token if enabled\r\n if (this.config.csrfEnabled && typeof window !== 'undefined') {\r\n this.refreshCsrfToken();\r\n }\r\n }\r\n\r\n private loadTokenFromStorage(): void {\r\n if (typeof window !== 'undefined' && this.config.localStorageKey) {\r\n try {\r\n const token = localStorage.getItem(this.config.localStorageKey);\r\n if (token) {\r\n this.token = token;\r\n this.httpClient.setAuthToken(token);\r\n }\r\n } catch (error) {\r\n console.warn('Failed to load token from storage:', error);\r\n }\r\n }\r\n }\r\n\r\n private saveTokenToStorage(token: string): void {\r\n if (typeof window !== 'undefined' && this.config.localStorageKey) {\r\n try {\r\n localStorage.setItem(this.config.localStorageKey, token);\r\n } catch (error) {\r\n console.warn('Failed to save token to storage:', error);\r\n }\r\n }\r\n }\r\n\r\n private removeTokenFromStorage(): void {\r\n if (typeof window !== 'undefined' && this.config.localStorageKey) {\r\n try {\r\n localStorage.removeItem(this.config.localStorageKey);\r\n } catch (error) {\r\n console.warn('Failed to remove token from storage:', error);\r\n }\r\n }\r\n }\r\n\r\n public isAuthenticated(): boolean {\r\n return !!this.token;\r\n }\r\n\r\n public getToken(): string | null {\r\n return this.token;\r\n }\r\n\r\n public getCurrentUser(): User | null {\r\n if (!this.token) return null;\r\n\r\n try {\r\n const payload = JSON.parse(atob(this.token.split('.')[1]));\r\n return payload.user || null;\r\n } catch (error) {\r\n console.error('Failed to parse user from token:', error);\r\n return null;\r\n }\r\n }\r\n\r\n // CSRF Token Management\r\n public async refreshCsrfToken(): Promise<void> {\r\n if (!this.config.csrfEnabled) return;\r\n\r\n try {\r\n const response = await this.httpClient.get<CsrfTokenResponse>('/api/v1/auth/csrf-token');\r\n if (response.csrfToken) {\r\n this.httpClient.setCsrfToken(response.csrfToken);\r\n }\r\n } catch (error) {\r\n console.error('Failed to get CSRF token:', error);\r\n }\r\n }\r\n\r\n public getCsrfToken(): string | null {\r\n return this.httpClient.getCsrfToken();\r\n }\r\n\r\n // OAuth Methods\r\n public loginWithOAuth(provider: OAuthProvider): void {\r\n if (typeof window === 'undefined') {\r\n throw new Error('OAuth login is only available in browser environments');\r\n }\r\n\r\n const oauthUrl = `${this.config.baseUrl}/api/v1/auth/oauth/${provider}`;\r\n window.location.href = oauthUrl;\r\n }\r\n\r\n public linkOAuthProvider(provider: OAuthProvider): void {\r\n if (typeof window === 'undefined') {\r\n throw new Error('OAuth linking is only available in browser environments');\r\n }\r\n\r\n if (!this.token) {\r\n throw new Error('Must be authenticated to link OAuth provider');\r\n }\r\n\r\n const linkUrl = `${this.config.baseUrl}/api/v1/auth/oauth/${provider}/link`;\r\n window.location.href = linkUrl;\r\n }\r\n\r\n public async unlinkOAuthProvider(provider: OAuthProvider): Promise<AuthResponse> {\r\n if (!this.token) {\r\n throw new Error('Not authenticated');\r\n }\r\n\r\n const response = await this.httpClient.delete<AuthResponse>(\r\n `/api/v1/auth/oauth/${provider}/unlink`\r\n );\r\n return response;\r\n }\r\n\r\n // Standard Auth Methods\r\n public async login(data: LoginData): Promise<AuthResponse> {\r\n const response = await this.httpClient.post<AuthResponse>('/api/v1/auth/login', data);\r\n\r\n if (response.success && response.token) {\r\n this.token = response.token;\r\n this.httpClient.setAuthToken(response.token);\r\n this.saveTokenToStorage(response.token);\r\n return response;\r\n }\r\n\r\n if (response.success && response.message === 'OTP sent to your email.') {\r\n return response;\r\n }\r\n\r\n if (response.success && response.message === 'OTP verified successfully.' && response.token) {\r\n this.token = response.token;\r\n this.httpClient.setAuthToken(response.token);\r\n this.saveTokenToStorage(response.token);\r\n return response;\r\n }\r\n\r\n throw new Error(response.message || 'Login failed');\r\n }\r\n\r\n public async register(data: RegisterData): Promise<AuthResponse> {\r\n const registerData = { ...data };\r\n if (!registerData.frontendBaseUrl && typeof window !== 'undefined') {\r\n registerData.frontendBaseUrl =\r\n process.env.FRONTEND_BASE_URL ||\r\n process.env.NEXT_PUBLIC_FRONTEND_BASE_URL ||\r\n process.env.REACT_APP_FRONTEND_BASE_URL ||\r\n process.env.NEXT_PUBLIC_APP_URL ||\r\n window.location.origin;\r\n }\r\n\r\n const response = await this.httpClient.post<AuthResponse>('/api/v1/auth/register', registerData);\r\n\r\n if (response.success && response.message === 'Registration data saved. Verification email sent. Please check your inbox.') {\r\n return response;\r\n }\r\n\r\n throw new Error(response.message || 'Registration failed');\r\n }\r\n\r\n public async verify(data: VerifyData): Promise<AuthResponse> {\r\n const response = await this.httpClient.post<AuthResponse>('/api/v1/auth/verify', data);\r\n\r\n if (response.success && response.token) {\r\n this.token = response.token;\r\n this.httpClient.setAuthToken(response.token);\r\n this.saveTokenToStorage(response.token);\r\n }\r\n\r\n return response;\r\n }\r\n\r\n public async verifyEmailToken(token: string): Promise<AuthResponse> {\r\n const response = await this.httpClient.get<AuthResponse>(`/api/v1/auth/verify-email?token=${token}`);\r\n\r\n if (response.success && response.token) {\r\n this.token = response.token;\r\n this.httpClient.setAuthToken(response.token);\r\n this.saveTokenToStorage(response.token);\r\n }\r\n\r\n return response;\r\n }\r\n\r\n public async logout(): Promise<void> {\r\n this.token = null;\r\n this.httpClient.removeAuthToken();\r\n this.httpClient.removeCsrfToken();\r\n this.removeTokenFromStorage();\r\n }\r\n\r\n public async getProfile(): Promise<User> {\r\n if (!this.token) {\r\n throw new Error('Not authenticated');\r\n }\r\n\r\n const response = await this.httpClient.get<{ user: User }>('/api/v1/user/me');\r\n return response.user;\r\n }\r\n\r\n public async updateProfile(data: UpdateUserData): Promise<AuthResponse> {\r\n if (!this.token) {\r\n throw new Error('Not authenticated');\r\n }\r\n\r\n const response = await this.httpClient.post<AuthResponse>('/api/v1/user/update/user', data);\r\n\r\n if (response.success && response.token) {\r\n this.token = response.token;\r\n this.httpClient.setAuthToken(response.token);\r\n this.saveTokenToStorage(response.token);\r\n }\r\n\r\n return response;\r\n }\r\n\r\n public async getAllUsers(): Promise<User[]> {\r\n if (!this.token) {\r\n throw new Error('Not authenticated');\r\n }\r\n\r\n const response = await this.httpClient.get<{ users: User[] }>('/api/v1/user/all');\r\n return response.users;\r\n }\r\n\r\n public async getUserById(id: string): Promise<User> {\r\n const response = await this.httpClient.get<{ user: User }>(`/api/v1/user/${id}`);\r\n return response.user;\r\n }\r\n\r\n public async forgotPassword(email: string): Promise<AuthResponse> {\r\n let frontendBaseUrl: string | undefined;\r\n if (typeof window !== 'undefined') {\r\n frontendBaseUrl =\r\n process.env.FRONTEND_BASE_URL ||\r\n process.env.NEXT_PUBLIC_FRONTEND_BASE_URL ||\r\n process.env.REACT_APP_FRONTEND_BASE_URL ||\r\n process.env.NEXT_PUBLIC_APP_URL ||\r\n window.location.origin;\r\n }\r\n\r\n const response = await this.httpClient.post<AuthResponse>('/api/v1/auth/forgot-password', { email });\r\n return response;\r\n }\r\n\r\n public async resetPassword(token: string, password: string): Promise<AuthResponse> {\r\n const response = await this.httpClient.post<AuthResponse>('/api/v1/auth/reset-password', { token, password });\r\n return response;\r\n }\r\n}","import { AuthService } from '../core/auth-service';\r\nimport { \r\n AuthResponse, \r\n LoginData, \r\n VerifyData, \r\n UpdateUserData, \r\n User,\r\n AuthConfig,\r\n RegisterData\r\n} from '../types';\r\n\r\nexport class AuthClient extends AuthService {\r\n constructor(config: AuthConfig) {\r\n super(config);\r\n }\r\n\r\n // Override methods that require browser-specific features\r\n // For Node.js, token persistence must be handled manually\r\n \r\n public async register(data: RegisterData): Promise<AuthResponse> {\r\n // Automatically add frontend base URL if not provided\r\n const registerData = { ...data };\r\n if (!registerData.frontendBaseUrl) {\r\n // Check for environment variable\r\n registerData.frontendBaseUrl = \r\n process.env.FRONTEND_BASE_URL || \r\n process.env.NEXT_PUBLIC_FRONTEND_BASE_URL ||\r\n process.env.REACT_APP_FRONTEND_BASE_URL;\r\n }\r\n \r\n const response = await this['httpClient'].post<AuthResponse>('/api/v1/auth/register', registerData);\r\n \r\n if (response.success && response.message === 'Registration data saved. Verification email sent. Please check your inbox.') {\r\n return response;\r\n }\r\n \r\n throw new Error(response.message || 'Registration failed');\r\n }\r\n\r\n public async login(data: LoginData): Promise<AuthResponse> {\r\n const response = await this['httpClient'].post<AuthResponse>('/api/v1/auth/login', data);\r\n \r\n // Handle successful login with token\r\n if (response.success && response.token) {\r\n this['token'] = response.token;\r\n this['httpClient'].setAuthToken(response.token);\r\n // Note: In Node.js, you need to handle token persistence manually\r\n return response;\r\n }\r\n \r\n // Handle OTP sent response\r\n if (response.success && response.message === 'OTP sent to your email.') {\r\n return response;\r\n }\r\n \r\n // Handle verification response\r\n if (response.success && response.message === 'OTP verified successfully.' && response.token) {\r\n this['token'] = response.token;\r\n this['httpClient'].setAuthToken(response.token);\r\n // Note: In Node.js, you need to handle token persistence manually\r\n return response;\r\n }\r\n \r\n throw new Error(response.message || 'Login failed');\r\n }\r\n\r\n public async verify(data: VerifyData): Promise<AuthResponse> {\r\n const response = await this['httpClient'].post<AuthResponse>('/api/v1/auth/verify', data);\r\n \r\n if (response.success && response.token) {\r\n this['token'] = response.token;\r\n this['httpClient'].setAuthToken(response.token);\r\n // Note: In Node.js, you need to handle token persistence manually\r\n }\r\n \r\n return response;\r\n }\r\n\r\n public async logout(): Promise<void> {\r\n this['token'] = null;\r\n this['httpClient'].removeAuthToken();\r\n // Note: In Node.js, you need to handle token removal manually\r\n }\r\n\r\n public async getProfile(): Promise<User> {\r\n if (!this['token']) {\r\n throw new Error('Not authenticated');\r\n }\r\n \r\n const response = await this['httpClient'].get<{ user: User }>('/api/v1/user/me');\r\n return response.user;\r\n }\r\n\r\n public async getUserById(id: string): Promise<User> {\r\n const response = await this['httpClient'].get<{ user: User }>(`/api/v1/user/${id}`);\r\n return response.user;\r\n }\r\n\r\n public async updateProfile(data: UpdateUserData): Promise<AuthResponse> {\r\n if (!this['token']) {\r\n throw new Error('Not authenticated');\r\n }\r\n \r\n const response = await this['httpClient'].post<AuthResponse>('/api/v1/user/update/name', data);\r\n \r\n if (response.success && response.token) {\r\n this['token'] = response.token;\r\n this['httpClient'].setAuthToken(response.token);\r\n // Note: In Node.js, you need to handle token persistence manually\r\n }\r\n \r\n return response;\r\n }\r\n\r\n public async getAllUsers(): Promise<User[]> {\r\n if (!this['token']) {\r\n throw new Error('Not authenticated');\r\n }\r\n \r\n const response = await this['httpClient'].get<{ users: User[] }>('/api/v1/user/all');\r\n return response.users;\r\n }\r\n}"]}
|
package/package.json
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "@thetechfossil/auth2",
|
|
3
|
+
"version": "1.2.1",
|
|
4
|
+
"description": "Authentication SDK for easy integration with Auth backend",
|
|
5
|
+
"main": "dist/index.js",
|
|
6
|
+
"module": "dist/index.mjs",
|
|
7
|
+
"types": "dist/index.d.ts",
|
|
8
|
+
"exports": {
|
|
9
|
+
".": "./dist/index.js",
|
|
10
|
+
"./next": "./dist/index.next.js",
|
|
11
|
+
"./next/server": "./dist/index.next.server.js",
|
|
12
|
+
"./node": "./dist/index.node.js",
|
|
13
|
+
"./react": "./dist/index.js"
|
|
14
|
+
},
|
|
15
|
+
"files": [
|
|
16
|
+
"dist/**/*"
|
|
17
|
+
],
|
|
18
|
+
"scripts": {
|
|
19
|
+
"build": "tsup",
|
|
20
|
+
"dev": "tsup --watch",
|
|
21
|
+
"test": "jest",
|
|
22
|
+
"test:integration": "node scripts/test-node-integration.js",
|
|
23
|
+
"test:react": "node scripts/test-react-integration.js",
|
|
24
|
+
"test:nextjs": "node scripts/test-nextjs-integration.js",
|
|
25
|
+
"test:ui": "node scripts/test-ui-components.js",
|
|
26
|
+
"validate:docs": "node scripts/validate-docs.js",
|
|
27
|
+
"prepublishOnly": "pnpm run build"
|
|
28
|
+
},
|
|
29
|
+
"keywords": [
|
|
30
|
+
"auth",
|
|
31
|
+
"authentication",
|
|
32
|
+
"sdk",
|
|
33
|
+
"react",
|
|
34
|
+
"nextjs",
|
|
35
|
+
"nodejs"
|
|
36
|
+
],
|
|
37
|
+
"author": "Auth Team",
|
|
38
|
+
"license": "MIT",
|
|
39
|
+
"devDependencies": {
|
|
40
|
+
"@types/jest": "^29.0.0",
|
|
41
|
+
"@types/node": "^18.0.0",
|
|
42
|
+
"@types/react": "^19.2.5",
|
|
43
|
+
"@types/react-dom": "^19.2.3",
|
|
44
|
+
"jest": "^29.0.0",
|
|
45
|
+
"tsup": "^6.7.0",
|
|
46
|
+
"typescript": "^5.0.0"
|
|
47
|
+
},
|
|
48
|
+
"peerDependencies": {
|
|
49
|
+
"next": ">=12.0.0",
|
|
50
|
+
"react": ">=17.0.0"
|
|
51
|
+
},
|
|
52
|
+
"peerDependenciesMeta": {
|
|
53
|
+
"react": {
|
|
54
|
+
"optional": true
|
|
55
|
+
},
|
|
56
|
+
"next": {
|
|
57
|
+
"optional": true
|
|
58
|
+
}
|
|
59
|
+
},
|
|
60
|
+
"dependencies": {
|
|
61
|
+
"axios": "^1.13.2"
|
|
62
|
+
}
|
|
63
|
+
}
|