@timbenniks/contentstack-platform-sdk 0.1.4 → 0.1.7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +11 -11
- package/dist/auth/index.cjs +179 -0
- package/dist/auth/index.cjs.map +1 -1
- package/dist/auth/index.d.cts +2 -1
- package/dist/auth/index.d.ts +2 -1
- package/dist/auth/index.mjs +5 -1
- package/dist/{chunk-2BOUGPJ5.mjs → chunk-DTMY6LNR.mjs} +4 -4
- package/dist/{chunk-OGTRGKYK.mjs → chunk-G4JKXIL2.mjs} +4 -4
- package/dist/chunk-K3QIVKGD.mjs +430 -0
- package/dist/chunk-K3QIVKGD.mjs.map +1 -0
- package/dist/{chunk-NKLOZ5VI.mjs → chunk-V33LD4WS.mjs} +1 -1
- package/dist/chunk-V33LD4WS.mjs.map +1 -0
- package/dist/{chunk-SU5QEKYW.mjs → chunk-VLZEA5NW.mjs} +3 -3
- package/dist/chunk-VLZEA5NW.mjs.map +1 -0
- package/dist/{chunk-3C6J2BDB.mjs → chunk-WFPYU6CJ.mjs} +1 -1
- package/dist/chunk-WFPYU6CJ.mjs.map +1 -0
- package/dist/index.cjs +179 -0
- package/dist/index.cjs.map +1 -1
- package/dist/index.d.cts +1 -1
- package/dist/index.d.ts +1 -1
- package/dist/index.mjs +8 -4
- package/dist/react/auth/index.cjs.map +1 -1
- package/dist/react/auth/index.d.cts +2 -2
- package/dist/react/auth/index.d.ts +2 -2
- package/dist/react/auth/index.mjs +1 -1
- package/dist/react/hooks/index.mjs +3 -3
- package/dist/react/index.cjs.map +1 -1
- package/dist/react/index.d.cts +1 -1
- package/dist/react/index.d.ts +1 -1
- package/dist/react/index.mjs +4 -4
- package/dist/server/index.cjs +1 -1
- package/dist/server/index.cjs.map +1 -1
- package/dist/server/index.d.cts +1 -1
- package/dist/server/index.d.ts +1 -1
- package/dist/server/index.mjs +3 -3
- package/dist/server/middleware/index.cjs +1 -1
- package/dist/server/middleware/index.cjs.map +1 -1
- package/dist/server/middleware/index.d.cts +3 -2
- package/dist/server/middleware/index.d.ts +3 -2
- package/dist/server/middleware/index.mjs +3 -3
- package/dist/server/proxy/index.mjs +2 -2
- package/dist/server/webhooks/index.mjs +2 -2
- package/dist/types-BPoq1WOf.d.cts +83 -0
- package/dist/types-CUCWv0Vp.d.ts +83 -0
- package/dist/vue/auth/index.cjs.map +1 -1
- package/dist/vue/auth/index.d.cts +4 -4
- package/dist/vue/auth/index.d.ts +4 -4
- package/dist/vue/auth/index.mjs +1 -1
- package/dist/vue/composables/index.mjs +3 -3
- package/dist/vue/index.cjs.map +1 -1
- package/dist/vue/index.d.cts +1 -1
- package/dist/vue/index.d.ts +1 -1
- package/dist/vue/index.mjs +7 -7
- package/package.json +10 -3
- package/dist/chunk-3C6J2BDB.mjs.map +0 -1
- package/dist/chunk-NKLOZ5VI.mjs.map +0 -1
- package/dist/chunk-SU5QEKYW.mjs.map +0 -1
- package/dist/chunk-VW7DD6HV.mjs +0 -253
- package/dist/chunk-VW7DD6HV.mjs.map +0 -1
- package/dist/types-6D9VR7pT.d.cts +0 -26
- package/dist/types-Bu5yCgmw.d.ts +0 -26
- /package/dist/{chunk-2BOUGPJ5.mjs.map → chunk-DTMY6LNR.mjs.map} +0 -0
- /package/dist/{chunk-OGTRGKYK.mjs.map → chunk-G4JKXIL2.mjs.map} +0 -0
package/dist/vue/index.d.cts
CHANGED
|
@@ -5,7 +5,7 @@ export { C as CreateEntryVariables, D as DeleteEntryVariables, P as PublishEntry
|
|
|
5
5
|
export { ContentstackRichText, RichTextNodeRenderer, RichTextRenderers } from './content/index.cjs';
|
|
6
6
|
import 'vue';
|
|
7
7
|
import '../regions/index.cjs';
|
|
8
|
-
import '../types-
|
|
8
|
+
import '../types-BPoq1WOf.cjs';
|
|
9
9
|
import '../errors-CAw-IRCP.cjs';
|
|
10
10
|
import '../launch/index.cjs';
|
|
11
11
|
import '../types-DgixK-ll.cjs';
|
package/dist/vue/index.d.ts
CHANGED
|
@@ -5,7 +5,7 @@ export { C as CreateEntryVariables, D as DeleteEntryVariables, P as PublishEntry
|
|
|
5
5
|
export { ContentstackRichText, RichTextNodeRenderer, RichTextRenderers } from './content/index.js';
|
|
6
6
|
import 'vue';
|
|
7
7
|
import '../regions/index.js';
|
|
8
|
-
import '../types-
|
|
8
|
+
import '../types-CUCWv0Vp.js';
|
|
9
9
|
import '../errors-CAw-IRCP.js';
|
|
10
10
|
import '../launch/index.js';
|
|
11
11
|
import '../types-DgixK-ll.js';
|
package/dist/vue/index.mjs
CHANGED
|
@@ -3,7 +3,7 @@ import {
|
|
|
3
3
|
ContentstackLoginButton,
|
|
4
4
|
ContentstackLogoutButton,
|
|
5
5
|
useContentstackUser
|
|
6
|
-
} from "../chunk-
|
|
6
|
+
} from "../chunk-V33LD4WS.mjs";
|
|
7
7
|
import {
|
|
8
8
|
useAssets,
|
|
9
9
|
useBrandKit,
|
|
@@ -18,10 +18,7 @@ import {
|
|
|
18
18
|
useLaunch,
|
|
19
19
|
usePublishEntry,
|
|
20
20
|
useUpdateEntry
|
|
21
|
-
} from "../chunk-
|
|
22
|
-
import {
|
|
23
|
-
ContentstackRichText
|
|
24
|
-
} from "../chunk-T5OIJQK7.mjs";
|
|
21
|
+
} from "../chunk-DTMY6LNR.mjs";
|
|
25
22
|
import {
|
|
26
23
|
ContentstackProvider
|
|
27
24
|
} from "../chunk-QW7TVYOA.mjs";
|
|
@@ -29,13 +26,16 @@ import {
|
|
|
29
26
|
CONTENTSTACK_KEY,
|
|
30
27
|
useContentstackContext
|
|
31
28
|
} from "../chunk-LPVVA5J3.mjs";
|
|
29
|
+
import {
|
|
30
|
+
ContentstackRichText
|
|
31
|
+
} from "../chunk-T5OIJQK7.mjs";
|
|
32
32
|
import "../chunk-7VFGD32I.mjs";
|
|
33
33
|
import "../chunk-T5A2E2RI.mjs";
|
|
34
|
-
import "../chunk-
|
|
34
|
+
import "../chunk-K3QIVKGD.mjs";
|
|
35
35
|
import "../chunk-DJQLN4TR.mjs";
|
|
36
36
|
import "../chunk-XH7NLHGW.mjs";
|
|
37
|
-
import "../chunk-EREPKWTW.mjs";
|
|
38
37
|
import "../chunk-AVJHCFRK.mjs";
|
|
38
|
+
import "../chunk-EREPKWTW.mjs";
|
|
39
39
|
import "../chunk-GNPQJBFX.mjs";
|
|
40
40
|
import "../chunk-3KE63N3I.mjs";
|
|
41
41
|
import "../chunk-KLVIROVU.mjs";
|
package/package.json
CHANGED
|
@@ -1,9 +1,11 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@timbenniks/contentstack-platform-sdk",
|
|
3
|
-
"version": "0.1.
|
|
3
|
+
"version": "0.1.7",
|
|
4
4
|
"description": "Unified TypeScript SDK for building apps on Contentstack",
|
|
5
5
|
"type": "module",
|
|
6
|
-
"sideEffects":
|
|
6
|
+
"sideEffects": [
|
|
7
|
+
"*.css"
|
|
8
|
+
],
|
|
7
9
|
"engines": {
|
|
8
10
|
"node": ">=18"
|
|
9
11
|
},
|
|
@@ -151,7 +153,12 @@
|
|
|
151
153
|
"import": "./dist/ui/css/index.mjs",
|
|
152
154
|
"require": "./dist/ui/css/index.cjs"
|
|
153
155
|
},
|
|
154
|
-
"./ui/tokens.css":
|
|
156
|
+
"./ui/tokens.css": {
|
|
157
|
+
"style": "./dist/ui/tokens.css",
|
|
158
|
+
"import": "./dist/ui/tokens.css",
|
|
159
|
+
"default": "./dist/ui/tokens.css"
|
|
160
|
+
},
|
|
161
|
+
"./dist/ui/tokens.css": "./dist/ui/tokens.css"
|
|
155
162
|
},
|
|
156
163
|
"scripts": {
|
|
157
164
|
"build": "tsup",
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"sources":["../src/react/auth/useContentstackUser.ts","../src/react/auth/ContentstackLoginButton.tsx","../src/react/auth/ContentstackLogoutButton.tsx","../src/react/auth/ContentstackAuthGuard.tsx"],"sourcesContent":["\"use client\"\n\nimport { useCallback, useEffect, useState } from \"react\"\nimport type { ContentstackUser } from \"../../index.js\"\n\nexport interface UseContentstackUserReturn {\n user: ContentstackUser | null\n loading: boolean\n isAuthenticated: boolean\n}\n\nexport function useContentstackUser(): UseContentstackUserReturn {\n const [user, setUser] = useState<ContentstackUser | null>(null)\n const [loading, setLoading] = useState(true)\n\n const fetchSession = useCallback(async () => {\n setLoading(true)\n try {\n const res = await fetch(\"/api/auth/session\")\n if (!res.ok) {\n setUser(null)\n return\n }\n const data = await res.json()\n if (data?.user) {\n setUser({\n uid: data.user.uid ?? data.user.id ?? \"\",\n email: data.user.email ?? \"\",\n firstName: data.user.firstName ?? data.user.name?.split(\" \")[0],\n lastName: data.user.lastName ?? data.user.name?.split(\" \").slice(1).join(\" \"),\n username: data.user.username,\n profileImage: data.user.profileImage ?? data.user.image,\n })\n } else {\n setUser(null)\n }\n } catch {\n setUser(null)\n } finally {\n setLoading(false)\n }\n }, [])\n\n useEffect(() => {\n fetchSession()\n }, [fetchSession])\n\n return { user, loading, isAuthenticated: user !== null }\n}\n","export interface ContentstackLoginButtonProps {\n scopes?: string[]\n redirectTo?: string\n className?: string\n children?: React.ReactNode\n}\n\nexport function ContentstackLoginButton({\n redirectTo,\n className,\n children = \"Sign in with Contentstack\",\n}: ContentstackLoginButtonProps): React.JSX.Element {\n return (\n <form action=\"/api/auth/signin/contentstack\" method=\"POST\">\n {redirectTo && <input type=\"hidden\" name=\"callbackUrl\" value={redirectTo} />}\n <button type=\"submit\" className={className}>\n {children}\n </button>\n </form>\n )\n}\n","export interface ContentstackLogoutButtonProps {\n redirectTo?: string\n className?: string\n children?: React.ReactNode\n}\n\nexport function ContentstackLogoutButton({\n redirectTo,\n className,\n children = \"Sign out\",\n}: ContentstackLogoutButtonProps): React.JSX.Element {\n return (\n <form action=\"/api/auth/signout\" method=\"POST\">\n {redirectTo && <input type=\"hidden\" name=\"callbackUrl\" value={redirectTo} />}\n <button type=\"submit\" className={className}>\n {children}\n </button>\n </form>\n )\n}\n","\"use client\"\n\nimport { ContentstackLoginButton } from \"./ContentstackLoginButton\"\nimport { useContentstackUser } from \"./useContentstackUser\"\n\nexport interface ContentstackAuthGuardProps {\n children: React.ReactNode\n fallback?: React.ReactNode\n loadingFallback?: React.ReactNode\n}\n\nexport function ContentstackAuthGuard({\n children,\n fallback,\n loadingFallback = null,\n}: ContentstackAuthGuardProps): React.JSX.Element | null {\n const { isAuthenticated, loading } = useContentstackUser()\n\n if (loading) return <>{loadingFallback}</>\n if (isAuthenticated) return <>{children}</>\n return <>{fallback ?? <ContentstackLoginButton />}</>\n}\n"],"mappings":";AAEA,SAAS,aAAa,WAAW,gBAAgB;AAS1C,SAAS,sBAAiD;AAC/D,QAAM,CAAC,MAAM,OAAO,IAAI,SAAkC,IAAI;AAC9D,QAAM,CAAC,SAAS,UAAU,IAAI,SAAS,IAAI;AAE3C,QAAM,eAAe,YAAY,YAAY;AAC3C,eAAW,IAAI;AACf,QAAI;AACF,YAAM,MAAM,MAAM,MAAM,mBAAmB;AAC3C,UAAI,CAAC,IAAI,IAAI;AACX,gBAAQ,IAAI;AACZ;AAAA,MACF;AACA,YAAM,OAAO,MAAM,IAAI,KAAK;AAC5B,UAAI,MAAM,MAAM;AACd,gBAAQ;AAAA,UACN,KAAK,KAAK,KAAK,OAAO,KAAK,KAAK,MAAM;AAAA,UACtC,OAAO,KAAK,KAAK,SAAS;AAAA,UAC1B,WAAW,KAAK,KAAK,aAAa,KAAK,KAAK,MAAM,MAAM,GAAG,EAAE,CAAC;AAAA,UAC9D,UAAU,KAAK,KAAK,YAAY,KAAK,KAAK,MAAM,MAAM,GAAG,EAAE,MAAM,CAAC,EAAE,KAAK,GAAG;AAAA,UAC5E,UAAU,KAAK,KAAK;AAAA,UACpB,cAAc,KAAK,KAAK,gBAAgB,KAAK,KAAK;AAAA,QACpD,CAAC;AAAA,MACH,OAAO;AACL,gBAAQ,IAAI;AAAA,MACd;AAAA,IACF,QAAQ;AACN,cAAQ,IAAI;AAAA,IACd,UAAE;AACA,iBAAW,KAAK;AAAA,IAClB;AAAA,EACF,GAAG,CAAC,CAAC;AAEL,YAAU,MAAM;AACd,iBAAa;AAAA,EACf,GAAG,CAAC,YAAY,CAAC;AAEjB,SAAO,EAAE,MAAM,SAAS,iBAAiB,SAAS,KAAK;AACzD;;;ACnCI,SACiB,KADjB;AANG,SAAS,wBAAwB;AAAA,EACtC;AAAA,EACA;AAAA,EACA,WAAW;AACb,GAAoD;AAClD,SACE,qBAAC,UAAK,QAAO,iCAAgC,QAAO,QACjD;AAAA,kBAAc,oBAAC,WAAM,MAAK,UAAS,MAAK,eAAc,OAAO,YAAY;AAAA,IAC1E,oBAAC,YAAO,MAAK,UAAS,WACnB,UACH;AAAA,KACF;AAEJ;;;ACRI,SACiB,OAAAA,MADjB,QAAAC,aAAA;AANG,SAAS,yBAAyB;AAAA,EACvC;AAAA,EACA;AAAA,EACA,WAAW;AACb,GAAqD;AACnD,SACE,gBAAAA,MAAC,UAAK,QAAO,qBAAoB,QAAO,QACrC;AAAA,kBAAc,gBAAAD,KAAC,WAAM,MAAK,UAAS,MAAK,eAAc,OAAO,YAAY;AAAA,IAC1E,gBAAAA,KAAC,YAAO,MAAK,UAAS,WACnB,UACH;AAAA,KACF;AAEJ;;;ACDsB,0BAAAE,YAAA;AAPf,SAAS,sBAAsB;AAAA,EACpC;AAAA,EACA;AAAA,EACA,kBAAkB;AACpB,GAAyD;AACvD,QAAM,EAAE,iBAAiB,QAAQ,IAAI,oBAAoB;AAEzD,MAAI,QAAS,QAAO,gBAAAA,KAAA,YAAG,2BAAgB;AACvC,MAAI,gBAAiB,QAAO,gBAAAA,KAAA,YAAG,UAAS;AACxC,SAAO,gBAAAA,KAAA,YAAG,sBAAY,gBAAAA,KAAC,2BAAwB,GAAG;AACpD;","names":["jsx","jsxs","jsx"]}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"sources":["../src/vue/auth/useContentstackUser.ts","../src/vue/auth/ContentstackLoginButton.ts","../src/vue/auth/ContentstackLogoutButton.ts","../src/vue/auth/ContentstackAuthGuard.ts"],"sourcesContent":["import { type Ref, computed, onMounted, ref } from \"vue\"\nimport type { ContentstackUser } from \"../../index.js\"\n\nexport interface UseContentstackUserReturn {\n user: Ref<ContentstackUser | null>\n loading: Ref<boolean>\n isAuthenticated: Ref<boolean>\n}\n\nexport function useContentstackUser(): UseContentstackUserReturn {\n const user = ref<ContentstackUser | null>(null)\n const loading = ref(true)\n const isAuthenticated = computed(() => user.value !== null)\n\n async function fetchSession() {\n loading.value = true\n try {\n const res = await fetch(\"/api/auth/session\")\n if (!res.ok) {\n user.value = null\n return\n }\n const data = await res.json()\n if (data?.user) {\n user.value = {\n uid: data.user.uid ?? data.user.id ?? \"\",\n email: data.user.email ?? \"\",\n firstName: data.user.firstName ?? data.user.name?.split(\" \")[0],\n lastName: data.user.lastName ?? data.user.name?.split(\" \").slice(1).join(\" \"),\n username: data.user.username,\n profileImage: data.user.profileImage ?? data.user.image,\n }\n } else {\n user.value = null\n }\n } catch {\n user.value = null\n } finally {\n loading.value = false\n }\n }\n\n onMounted(() => {\n fetchSession()\n })\n\n return { user, loading, isAuthenticated }\n}\n","import { type PropType, defineComponent, h } from \"vue\"\n\nexport const ContentstackLoginButton = defineComponent({\n name: \"ContentstackLoginButton\",\n props: {\n scopes: {\n type: Array as PropType<string[]>,\n default: undefined,\n },\n redirectTo: {\n type: String,\n default: undefined,\n },\n class: {\n type: String,\n default: undefined,\n },\n },\n setup(props, { slots }) {\n return () =>\n h(\"form\", { action: \"/api/auth/signin/contentstack\", method: \"POST\" }, [\n props.redirectTo\n ? h(\"input\", { type: \"hidden\", name: \"callbackUrl\", value: props.redirectTo })\n : null,\n h(\n \"button\",\n { type: \"submit\", class: props.class },\n slots.default?.() ?? \"Sign in with Contentstack\",\n ),\n ])\n },\n})\n","import { defineComponent, h } from \"vue\"\n\nexport const ContentstackLogoutButton = defineComponent({\n name: \"ContentstackLogoutButton\",\n props: {\n redirectTo: {\n type: String,\n default: undefined,\n },\n class: {\n type: String,\n default: undefined,\n },\n },\n setup(props, { slots }) {\n return () =>\n h(\"form\", { action: \"/api/auth/signout\", method: \"POST\" }, [\n props.redirectTo\n ? h(\"input\", { type: \"hidden\", name: \"callbackUrl\", value: props.redirectTo })\n : null,\n h(\"button\", { type: \"submit\", class: props.class }, slots.default?.() ?? \"Sign out\"),\n ])\n },\n})\n","import { defineComponent, h } from \"vue\"\nimport { ContentstackLoginButton } from \"./ContentstackLoginButton\"\nimport { useContentstackUser } from \"./useContentstackUser\"\n\nexport const ContentstackAuthGuard = defineComponent({\n name: \"ContentstackAuthGuard\",\n setup(_props, { slots }) {\n const { isAuthenticated, loading } = useContentstackUser()\n\n return () => {\n if (loading.value) return slots.loading?.() ?? null\n if (isAuthenticated.value) return slots.default?.()\n return slots.fallback?.() ?? h(ContentstackLoginButton)\n }\n },\n})\n"],"mappings":";AAAA,SAAmB,UAAU,WAAW,WAAW;AAS5C,SAAS,sBAAiD;AAC/D,QAAM,OAAO,IAA6B,IAAI;AAC9C,QAAM,UAAU,IAAI,IAAI;AACxB,QAAM,kBAAkB,SAAS,MAAM,KAAK,UAAU,IAAI;AAE1D,iBAAe,eAAe;AAC5B,YAAQ,QAAQ;AAChB,QAAI;AACF,YAAM,MAAM,MAAM,MAAM,mBAAmB;AAC3C,UAAI,CAAC,IAAI,IAAI;AACX,aAAK,QAAQ;AACb;AAAA,MACF;AACA,YAAM,OAAO,MAAM,IAAI,KAAK;AAC5B,UAAI,MAAM,MAAM;AACd,aAAK,QAAQ;AAAA,UACX,KAAK,KAAK,KAAK,OAAO,KAAK,KAAK,MAAM;AAAA,UACtC,OAAO,KAAK,KAAK,SAAS;AAAA,UAC1B,WAAW,KAAK,KAAK,aAAa,KAAK,KAAK,MAAM,MAAM,GAAG,EAAE,CAAC;AAAA,UAC9D,UAAU,KAAK,KAAK,YAAY,KAAK,KAAK,MAAM,MAAM,GAAG,EAAE,MAAM,CAAC,EAAE,KAAK,GAAG;AAAA,UAC5E,UAAU,KAAK,KAAK;AAAA,UACpB,cAAc,KAAK,KAAK,gBAAgB,KAAK,KAAK;AAAA,QACpD;AAAA,MACF,OAAO;AACL,aAAK,QAAQ;AAAA,MACf;AAAA,IACF,QAAQ;AACN,WAAK,QAAQ;AAAA,IACf,UAAE;AACA,cAAQ,QAAQ;AAAA,IAClB;AAAA,EACF;AAEA,YAAU,MAAM;AACd,iBAAa;AAAA,EACf,CAAC;AAED,SAAO,EAAE,MAAM,SAAS,gBAAgB;AAC1C;;;AC/CA,SAAwB,iBAAiB,SAAS;AAE3C,IAAM,0BAA0B,gBAAgB;AAAA,EACrD,MAAM;AAAA,EACN,OAAO;AAAA,IACL,QAAQ;AAAA,MACN,MAAM;AAAA,MACN,SAAS;AAAA,IACX;AAAA,IACA,YAAY;AAAA,MACV,MAAM;AAAA,MACN,SAAS;AAAA,IACX;AAAA,IACA,OAAO;AAAA,MACL,MAAM;AAAA,MACN,SAAS;AAAA,IACX;AAAA,EACF;AAAA,EACA,MAAM,OAAO,EAAE,MAAM,GAAG;AACtB,WAAO,MACL,EAAE,QAAQ,EAAE,QAAQ,iCAAiC,QAAQ,OAAO,GAAG;AAAA,MACrE,MAAM,aACF,EAAE,SAAS,EAAE,MAAM,UAAU,MAAM,eAAe,OAAO,MAAM,WAAW,CAAC,IAC3E;AAAA,MACJ;AAAA,QACE;AAAA,QACA,EAAE,MAAM,UAAU,OAAO,MAAM,MAAM;AAAA,QACrC,MAAM,UAAU,KAAK;AAAA,MACvB;AAAA,IACF,CAAC;AAAA,EACL;AACF,CAAC;;;AC/BD,SAAS,mBAAAA,kBAAiB,KAAAC,UAAS;AAE5B,IAAM,2BAA2BD,iBAAgB;AAAA,EACtD,MAAM;AAAA,EACN,OAAO;AAAA,IACL,YAAY;AAAA,MACV,MAAM;AAAA,MACN,SAAS;AAAA,IACX;AAAA,IACA,OAAO;AAAA,MACL,MAAM;AAAA,MACN,SAAS;AAAA,IACX;AAAA,EACF;AAAA,EACA,MAAM,OAAO,EAAE,MAAM,GAAG;AACtB,WAAO,MACLC,GAAE,QAAQ,EAAE,QAAQ,qBAAqB,QAAQ,OAAO,GAAG;AAAA,MACzD,MAAM,aACFA,GAAE,SAAS,EAAE,MAAM,UAAU,MAAM,eAAe,OAAO,MAAM,WAAW,CAAC,IAC3E;AAAA,MACJA,GAAE,UAAU,EAAE,MAAM,UAAU,OAAO,MAAM,MAAM,GAAG,MAAM,UAAU,KAAK,UAAU;AAAA,IACrF,CAAC;AAAA,EACL;AACF,CAAC;;;ACvBD,SAAS,mBAAAC,kBAAiB,KAAAC,UAAS;AAI5B,IAAM,wBAAwBC,iBAAgB;AAAA,EACnD,MAAM;AAAA,EACN,MAAM,QAAQ,EAAE,MAAM,GAAG;AACvB,UAAM,EAAE,iBAAiB,QAAQ,IAAI,oBAAoB;AAEzD,WAAO,MAAM;AACX,UAAI,QAAQ,MAAO,QAAO,MAAM,UAAU,KAAK;AAC/C,UAAI,gBAAgB,MAAO,QAAO,MAAM,UAAU;AAClD,aAAO,MAAM,WAAW,KAAKC,GAAE,uBAAuB;AAAA,IACxD;AAAA,EACF;AACF,CAAC;","names":["defineComponent","h","defineComponent","h","defineComponent","h"]}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"sources":["../src/server/middleware/auth.ts","../src/server/middleware/session.ts"],"sourcesContent":["import { contentstackAuthCallbacks, createAuthProvider, getUser } from \"../../index.js\"\nimport type { OAuthMiddlewareConfig } from \"./types.js\"\n\n/**\n * Create a complete Auth.js v5 (NextAuth) configuration for Contentstack OAuth.\n *\n * This wraps NextAuth with all Contentstack-specific config baked in, reducing\n * ~150 lines of Auth.js configuration down to ~10 lines.\n *\n * Requires `next-auth@>=5.0.0-beta.0` as an installed peer dependency.\n *\n * @example\n * ```ts\n * import { createContentstackAuth } from \"@timbenniks/contentstack-platform-sdk/server/middleware\"\n *\n * const { handlers, auth, signIn, signOut } = await createContentstackAuth({\n * region: \"us\",\n * appId: \"your-app-uid\",\n * clientId: \"your-client-id\",\n * clientSecret: \"your-client-secret\",\n * scopes: [\"user:read\"],\n * secret: process.env.AUTH_SECRET!,\n * })\n *\n * // app/api/auth/[...nextauth]/route.ts\n * export const { GET, POST } = handlers\n * ```\n */\nexport async function createContentstackAuth(config: OAuthMiddlewareConfig) {\n // Dynamic import — next-auth is an optional peer dependency.\n // This prevents module resolution errors when importing the middleware\n // module in environments where next-auth is not installed.\n const { default: NextAuth } = await import(\"next-auth\")\n\n const oauthConfig = {\n region: config.region,\n appId: config.appId,\n clientId: config.clientId,\n clientSecret: config.clientSecret,\n scopes: config.scopes,\n redirectUri: \"auto\",\n }\n\n const provider = createAuthProvider(oauthConfig)\n const baseCallbacks = contentstackAuthCallbacks(oauthConfig)\n\n const callbacks = {\n async jwt(params: {\n token: Record<string, unknown>\n account?: Record<string, unknown> | null\n }) {\n const token = await baseCallbacks.jwt(params)\n\n // Call onSignIn on initial sign-in (account is only present once)\n if (params.account && config.onSignIn) {\n try {\n const user = await getUser(config.region, token.accessToken as string)\n const tokens = {\n accessToken: token.accessToken as string,\n refreshToken: token.refreshToken as string,\n expiresIn: Math.floor(((token.accessTokenExpiresAt as number) - Date.now()) / 1000),\n tokenType: \"Bearer\",\n }\n await config.onSignIn(user, tokens)\n } catch {\n // onSignIn errors should not block authentication\n }\n }\n\n return token\n },\n session: baseCallbacks.session,\n }\n\n // The core package returns generic `Record<string, unknown>` for framework\n // independence. Cast to `never` at the NextAuth boundary — the shape is\n // guaranteed correct by createAuthProvider/contentstackAuthCallbacks.\n return NextAuth({\n providers: [provider as never],\n callbacks: callbacks as never,\n secret: config.secret,\n trustHost: config.trustHost ?? true,\n session: { strategy: \"jwt\" as const },\n pages: {\n signIn: config.signInPage ?? \"/login\",\n error: config.errorPage ?? \"/login\",\n },\n })\n}\n","import { ContentstackAuthError } from \"../../index.js\"\nimport type { AuthFn, ContentstackSession } from \"./types.js\"\n\n/**\n * Get the current Contentstack session.\n *\n * @param authFn - Framework-agnostic auth function (e.g., the `auth()` function from NextAuth)\n * @returns The session with `accessToken`, or `null` if unauthenticated.\n */\nexport async function getSession(authFn: AuthFn): Promise<ContentstackSession | null> {\n const session = await authFn()\n if (!session?.accessToken) return null\n return { accessToken: session.accessToken, user: session.user }\n}\n\n/**\n * Require an authenticated Contentstack session.\n * Throws `ContentstackAuthError` if no session or no access token is present.\n *\n * @param authFn - Framework-agnostic auth function\n * @param redirectTo - Optional redirect path included in the error for the caller to use\n * @returns The session with a guaranteed `accessToken`.\n */\nexport async function requireSession(\n authFn: AuthFn,\n redirectTo?: string,\n): Promise<ContentstackSession> {\n const session = await getSession(authFn)\n if (!session) {\n throw new ContentstackAuthError(\n redirectTo\n ? `Authentication required. Redirect to: ${redirectTo}`\n : \"Authentication required\",\n { status: 401 },\n )\n }\n return session\n}\n\n/**\n * Get the OAuth access token from the current session.\n *\n * @param authFn - Framework-agnostic auth function\n * @returns The access token string, or `null` if unauthenticated.\n */\nexport async function getAccessToken(authFn: AuthFn): Promise<string | null> {\n const session = await authFn()\n return session?.accessToken ?? null\n}\n"],"mappings":";;;;;;;;;;AA4BA,eAAsB,uBAAuB,QAA+B;AAI1E,QAAM,EAAE,SAAS,SAAS,IAAI,MAAM,OAAO,WAAW;AAEtD,QAAM,cAAc;AAAA,IAClB,QAAQ,OAAO;AAAA,IACf,OAAO,OAAO;AAAA,IACd,UAAU,OAAO;AAAA,IACjB,cAAc,OAAO;AAAA,IACrB,QAAQ,OAAO;AAAA,IACf,aAAa;AAAA,EACf;AAEA,QAAM,WAAW,mBAAmB,WAAW;AAC/C,QAAM,gBAAgB,0BAA0B,WAAW;AAE3D,QAAM,YAAY;AAAA,IAChB,MAAM,IAAI,QAGP;AACD,YAAM,QAAQ,MAAM,cAAc,IAAI,MAAM;AAG5C,UAAI,OAAO,WAAW,OAAO,UAAU;AACrC,YAAI;AACF,gBAAM,OAAO,MAAM,QAAQ,OAAO,QAAQ,MAAM,WAAqB;AACrE,gBAAM,SAAS;AAAA,YACb,aAAa,MAAM;AAAA,YACnB,cAAc,MAAM;AAAA,YACpB,WAAW,KAAK,OAAQ,MAAM,uBAAkC,KAAK,IAAI,KAAK,GAAI;AAAA,YAClF,WAAW;AAAA,UACb;AACA,gBAAM,OAAO,SAAS,MAAM,MAAM;AAAA,QACpC,QAAQ;AAAA,QAER;AAAA,MACF;AAEA,aAAO;AAAA,IACT;AAAA,IACA,SAAS,cAAc;AAAA,EACzB;AAKA,SAAO,SAAS;AAAA,IACd,WAAW,CAAC,QAAiB;AAAA,IAC7B;AAAA,IACA,QAAQ,OAAO;AAAA,IACf,WAAW,OAAO,aAAa;AAAA,IAC/B,SAAS,EAAE,UAAU,MAAe;AAAA,IACpC,OAAO;AAAA,MACL,QAAQ,OAAO,cAAc;AAAA,MAC7B,OAAO,OAAO,aAAa;AAAA,IAC7B;AAAA,EACF,CAAC;AACH;;;AC/EA,eAAsB,WAAW,QAAqD;AACpF,QAAM,UAAU,MAAM,OAAO;AAC7B,MAAI,CAAC,SAAS,YAAa,QAAO;AAClC,SAAO,EAAE,aAAa,QAAQ,aAAa,MAAM,QAAQ,KAAK;AAChE;AAUA,eAAsB,eACpB,QACA,YAC8B;AAC9B,QAAM,UAAU,MAAM,WAAW,MAAM;AACvC,MAAI,CAAC,SAAS;AACZ,UAAM,IAAI;AAAA,MACR,aACI,yCAAyC,UAAU,KACnD;AAAA,MACJ,EAAE,QAAQ,IAAI;AAAA,IAChB;AAAA,EACF;AACA,SAAO;AACT;AAQA,eAAsB,eAAe,QAAwC;AAC3E,QAAM,UAAU,MAAM,OAAO;AAC7B,SAAO,SAAS,eAAe;AACjC;","names":[]}
|
package/dist/chunk-VW7DD6HV.mjs
DELETED
|
@@ -1,253 +0,0 @@
|
|
|
1
|
-
import {
|
|
2
|
-
ContentstackHttpClient
|
|
3
|
-
} from "./chunk-4CJ4IVPJ.mjs";
|
|
4
|
-
import {
|
|
5
|
-
resolveEndpoints
|
|
6
|
-
} from "./chunk-BK2IBTQS.mjs";
|
|
7
|
-
import {
|
|
8
|
-
ContentstackAuthError,
|
|
9
|
-
ContentstackConfigError,
|
|
10
|
-
ContentstackError
|
|
11
|
-
} from "./chunk-DMERADWM.mjs";
|
|
12
|
-
|
|
13
|
-
// src/auth/pkce.ts
|
|
14
|
-
var CHARSET = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-._~";
|
|
15
|
-
function generateCodeVerifier() {
|
|
16
|
-
const bytes = new Uint8Array(43);
|
|
17
|
-
globalThis.crypto.getRandomValues(bytes);
|
|
18
|
-
let result = "";
|
|
19
|
-
for (const byte of bytes) {
|
|
20
|
-
result += CHARSET[byte % CHARSET.length];
|
|
21
|
-
}
|
|
22
|
-
return result;
|
|
23
|
-
}
|
|
24
|
-
async function generateCodeChallenge(verifier) {
|
|
25
|
-
const encoder = new TextEncoder();
|
|
26
|
-
const data = encoder.encode(verifier);
|
|
27
|
-
const digest = await globalThis.crypto.subtle.digest("SHA-256", data);
|
|
28
|
-
const bytes = new Uint8Array(digest);
|
|
29
|
-
let binary = "";
|
|
30
|
-
for (const byte of bytes) {
|
|
31
|
-
binary += String.fromCharCode(byte);
|
|
32
|
-
}
|
|
33
|
-
return btoa(binary).replace(/\+/g, "-").replace(/\//g, "_").replace(/=+$/, "");
|
|
34
|
-
}
|
|
35
|
-
|
|
36
|
-
// src/auth/oauth-client.ts
|
|
37
|
-
function validateConfig(config) {
|
|
38
|
-
if (!config.appId) {
|
|
39
|
-
throw new ContentstackConfigError(
|
|
40
|
-
"appId is required for OAuth. This is your Contentstack app's UID, not the client ID."
|
|
41
|
-
);
|
|
42
|
-
}
|
|
43
|
-
if (config.appId === config.clientId) {
|
|
44
|
-
throw new ContentstackConfigError(
|
|
45
|
-
"appId and clientId must be different. appId is your Contentstack app UID; clientId is the OAuth client identifier."
|
|
46
|
-
);
|
|
47
|
-
}
|
|
48
|
-
}
|
|
49
|
-
async function buildAuthorizationUrl(config, options) {
|
|
50
|
-
validateConfig(config);
|
|
51
|
-
const endpoints = resolveEndpoints(config.region);
|
|
52
|
-
const authorizationUrl = `${endpoints.app}/apps/${config.appId}/authorize`;
|
|
53
|
-
const state = options?.state ?? generateCodeVerifier();
|
|
54
|
-
const params = new URLSearchParams({
|
|
55
|
-
response_type: "code",
|
|
56
|
-
client_id: config.clientId,
|
|
57
|
-
redirect_uri: config.redirectUri,
|
|
58
|
-
scope: config.scopes.join(" "),
|
|
59
|
-
state
|
|
60
|
-
});
|
|
61
|
-
let codeVerifier;
|
|
62
|
-
if (options?.usePKCE) {
|
|
63
|
-
codeVerifier = generateCodeVerifier();
|
|
64
|
-
const codeChallenge = await generateCodeChallenge(codeVerifier);
|
|
65
|
-
params.set("code_challenge", codeChallenge);
|
|
66
|
-
params.set("code_challenge_method", "S256");
|
|
67
|
-
}
|
|
68
|
-
return {
|
|
69
|
-
url: `${authorizationUrl}?${params.toString()}`,
|
|
70
|
-
state,
|
|
71
|
-
codeVerifier
|
|
72
|
-
};
|
|
73
|
-
}
|
|
74
|
-
function mapTokenResponse(data) {
|
|
75
|
-
return {
|
|
76
|
-
accessToken: data.access_token,
|
|
77
|
-
refreshToken: data.refresh_token,
|
|
78
|
-
expiresIn: data.expires_in,
|
|
79
|
-
tokenType: data.token_type
|
|
80
|
-
};
|
|
81
|
-
}
|
|
82
|
-
async function makeTokenRequest(appBaseUrl, body, errorMessage) {
|
|
83
|
-
const client = new ContentstackHttpClient({ baseUrl: appBaseUrl });
|
|
84
|
-
try {
|
|
85
|
-
const { data } = await client.postForm("/apps-api/token", body);
|
|
86
|
-
return mapTokenResponse(data);
|
|
87
|
-
} catch (err) {
|
|
88
|
-
if (err instanceof ContentstackError) {
|
|
89
|
-
throw new ContentstackAuthError(err.message || errorMessage, {
|
|
90
|
-
status: err.status,
|
|
91
|
-
requestPath: "/apps-api/token",
|
|
92
|
-
cause: err
|
|
93
|
-
});
|
|
94
|
-
}
|
|
95
|
-
throw new ContentstackAuthError(errorMessage, {
|
|
96
|
-
requestPath: "/apps-api/token",
|
|
97
|
-
cause: err instanceof Error ? err : void 0
|
|
98
|
-
});
|
|
99
|
-
}
|
|
100
|
-
}
|
|
101
|
-
async function exchangeCode(config, code, options) {
|
|
102
|
-
const endpoints = resolveEndpoints(config.region);
|
|
103
|
-
const body = new URLSearchParams({
|
|
104
|
-
grant_type: "authorization_code",
|
|
105
|
-
code,
|
|
106
|
-
redirect_uri: config.redirectUri,
|
|
107
|
-
client_id: config.clientId,
|
|
108
|
-
client_secret: config.clientSecret
|
|
109
|
-
});
|
|
110
|
-
if (options?.codeVerifier) {
|
|
111
|
-
body.set("code_verifier", options.codeVerifier);
|
|
112
|
-
}
|
|
113
|
-
return makeTokenRequest(endpoints.app, body, "Failed to exchange authorization code");
|
|
114
|
-
}
|
|
115
|
-
async function refreshToken(config, token) {
|
|
116
|
-
const endpoints = resolveEndpoints(config.region);
|
|
117
|
-
const body = new URLSearchParams({
|
|
118
|
-
grant_type: "refresh_token",
|
|
119
|
-
refresh_token: token,
|
|
120
|
-
client_id: config.clientId,
|
|
121
|
-
client_secret: config.clientSecret
|
|
122
|
-
});
|
|
123
|
-
return makeTokenRequest(endpoints.app, body, "Failed to refresh token");
|
|
124
|
-
}
|
|
125
|
-
function mapUser(user) {
|
|
126
|
-
return {
|
|
127
|
-
uid: user.uid,
|
|
128
|
-
email: user.email,
|
|
129
|
-
firstName: user.first_name ?? void 0,
|
|
130
|
-
lastName: user.last_name ?? void 0,
|
|
131
|
-
username: user.username ?? void 0,
|
|
132
|
-
profileImage: user.profile_image ?? void 0
|
|
133
|
-
};
|
|
134
|
-
}
|
|
135
|
-
async function getUser(region, accessToken) {
|
|
136
|
-
const endpoints = resolveEndpoints(region);
|
|
137
|
-
const client = new ContentstackHttpClient({
|
|
138
|
-
baseUrl: `${endpoints.cma}/v3`,
|
|
139
|
-
headers: { Authorization: `Bearer ${accessToken}` }
|
|
140
|
-
});
|
|
141
|
-
try {
|
|
142
|
-
const { data } = await client.get("/user");
|
|
143
|
-
return mapUser(data.user);
|
|
144
|
-
} catch (err) {
|
|
145
|
-
if (err instanceof ContentstackError) {
|
|
146
|
-
throw new ContentstackAuthError(err.message || "Failed to fetch user profile", {
|
|
147
|
-
status: err.status,
|
|
148
|
-
requestPath: "/v3/user",
|
|
149
|
-
cause: err
|
|
150
|
-
});
|
|
151
|
-
}
|
|
152
|
-
throw new ContentstackAuthError("Failed to fetch user profile", {
|
|
153
|
-
requestPath: "/v3/user",
|
|
154
|
-
cause: err instanceof Error ? err : void 0
|
|
155
|
-
});
|
|
156
|
-
}
|
|
157
|
-
}
|
|
158
|
-
function createAuthProvider(config) {
|
|
159
|
-
validateConfig(config);
|
|
160
|
-
const endpoints = resolveEndpoints(config.region);
|
|
161
|
-
const userClient = new ContentstackHttpClient({ baseUrl: `${endpoints.cma}/v3` });
|
|
162
|
-
return {
|
|
163
|
-
id: "contentstack",
|
|
164
|
-
name: "Contentstack",
|
|
165
|
-
type: "oauth",
|
|
166
|
-
checks: ["state"],
|
|
167
|
-
authorization: {
|
|
168
|
-
url: `${endpoints.app}/apps/${config.appId}/authorize`,
|
|
169
|
-
params: {
|
|
170
|
-
response_type: "code",
|
|
171
|
-
scope: config.scopes.join(" ")
|
|
172
|
-
}
|
|
173
|
-
},
|
|
174
|
-
token: `${endpoints.app}/apps-api/token`,
|
|
175
|
-
userinfo: {
|
|
176
|
-
url: `${endpoints.cma}/v3/user`,
|
|
177
|
-
async request({ tokens }) {
|
|
178
|
-
const authedClient = userClient.withHeaders({
|
|
179
|
-
Authorization: `Bearer ${tokens.access_token}`
|
|
180
|
-
});
|
|
181
|
-
const { data } = await authedClient.get("/user");
|
|
182
|
-
return data;
|
|
183
|
-
}
|
|
184
|
-
},
|
|
185
|
-
profile(profile) {
|
|
186
|
-
const user = profile.user;
|
|
187
|
-
return {
|
|
188
|
-
id: user.uid,
|
|
189
|
-
name: [user.first_name, user.last_name].filter(Boolean).join(" ") || user.username,
|
|
190
|
-
email: user.email,
|
|
191
|
-
image: user.profile_image ?? null
|
|
192
|
-
};
|
|
193
|
-
},
|
|
194
|
-
clientId: config.clientId,
|
|
195
|
-
clientSecret: config.clientSecret
|
|
196
|
-
};
|
|
197
|
-
}
|
|
198
|
-
function contentstackAuthCallbacks(config) {
|
|
199
|
-
return {
|
|
200
|
-
async jwt({
|
|
201
|
-
token,
|
|
202
|
-
account
|
|
203
|
-
}) {
|
|
204
|
-
if (account) {
|
|
205
|
-
token.accessToken = account.access_token;
|
|
206
|
-
token.refreshToken = account.refresh_token;
|
|
207
|
-
token.accessTokenExpiresAt = Date.now() + (account.expires_in ?? 3600) * 1e3;
|
|
208
|
-
return token;
|
|
209
|
-
}
|
|
210
|
-
const expiresAt = token.accessTokenExpiresAt;
|
|
211
|
-
if (expiresAt && Date.now() < expiresAt - 6e4) {
|
|
212
|
-
return token;
|
|
213
|
-
}
|
|
214
|
-
const currentRefreshToken = token.refreshToken;
|
|
215
|
-
if (!currentRefreshToken) {
|
|
216
|
-
token.error = "RefreshAccessTokenError";
|
|
217
|
-
return token;
|
|
218
|
-
}
|
|
219
|
-
try {
|
|
220
|
-
const tokens = await refreshToken(config, currentRefreshToken);
|
|
221
|
-
token.accessToken = tokens.accessToken;
|
|
222
|
-
token.refreshToken = tokens.refreshToken;
|
|
223
|
-
token.accessTokenExpiresAt = Date.now() + tokens.expiresIn * 1e3;
|
|
224
|
-
token.error = void 0;
|
|
225
|
-
} catch {
|
|
226
|
-
token.error = "RefreshAccessTokenError";
|
|
227
|
-
}
|
|
228
|
-
return token;
|
|
229
|
-
},
|
|
230
|
-
async session({
|
|
231
|
-
session,
|
|
232
|
-
token
|
|
233
|
-
}) {
|
|
234
|
-
session.accessToken = token.accessToken;
|
|
235
|
-
if (token.error) {
|
|
236
|
-
session.error = token.error;
|
|
237
|
-
}
|
|
238
|
-
return session;
|
|
239
|
-
}
|
|
240
|
-
};
|
|
241
|
-
}
|
|
242
|
-
|
|
243
|
-
export {
|
|
244
|
-
generateCodeVerifier,
|
|
245
|
-
generateCodeChallenge,
|
|
246
|
-
buildAuthorizationUrl,
|
|
247
|
-
exchangeCode,
|
|
248
|
-
refreshToken,
|
|
249
|
-
getUser,
|
|
250
|
-
createAuthProvider,
|
|
251
|
-
contentstackAuthCallbacks
|
|
252
|
-
};
|
|
253
|
-
//# sourceMappingURL=chunk-VW7DD6HV.mjs.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"sources":["../src/auth/pkce.ts","../src/auth/oauth-client.ts"],"sourcesContent":["const CHARSET = \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-._~\"\n\n/**\n * Generate a cryptographically random code verifier for PKCE.\n * Returns a 43-character URL-safe string (the minimum length per RFC 7636).\n * Uses globalThis.crypto for cross-runtime compatibility (Node 18+, Deno, Bun, edge).\n */\nexport function generateCodeVerifier(): string {\n const bytes = new Uint8Array(43)\n globalThis.crypto.getRandomValues(bytes)\n let result = \"\"\n for (const byte of bytes) {\n result += CHARSET[byte % CHARSET.length]\n }\n return result\n}\n\n/**\n * Compute an S256 code challenge from a code verifier.\n * SHA-256 hash → base64url encoded (no padding).\n * Uses globalThis.crypto.subtle for cross-runtime compatibility.\n */\nexport async function generateCodeChallenge(verifier: string): Promise<string> {\n const encoder = new TextEncoder()\n const data = encoder.encode(verifier)\n const digest = await globalThis.crypto.subtle.digest(\"SHA-256\", data)\n const bytes = new Uint8Array(digest)\n let binary = \"\"\n for (const byte of bytes) {\n binary += String.fromCharCode(byte)\n }\n return btoa(binary).replace(/\\+/g, \"-\").replace(/\\//g, \"_\").replace(/=+$/, \"\")\n}\n","import { ContentstackHttpClient } from \"../http/client.js\"\nimport {\n ContentstackAuthError,\n ContentstackConfigError,\n ContentstackError,\n} from \"../http/errors.js\"\nimport type { ContentstackRegion } from \"../regions/index.js\"\nimport { resolveEndpoints } from \"../regions/index.js\"\nimport { generateCodeChallenge, generateCodeVerifier } from \"./pkce.js\"\nimport type { ContentstackUser, OAuthConfig, OAuthTokens } from \"./types.js\"\n\ninterface AuthorizationUrlOptions {\n state?: string\n usePKCE?: boolean\n}\n\ninterface AuthorizationUrlResult {\n url: string\n state: string\n codeVerifier?: string\n}\n\ninterface ExchangeCodeOptions {\n codeVerifier?: string\n}\n\nfunction validateConfig(config: OAuthConfig): void {\n if (!config.appId) {\n throw new ContentstackConfigError(\n \"appId is required for OAuth. This is your Contentstack app's UID, not the client ID.\",\n )\n }\n if (config.appId === config.clientId) {\n throw new ContentstackConfigError(\n \"appId and clientId must be different. appId is your Contentstack app UID; clientId is the OAuth client identifier.\",\n )\n }\n}\n\n/**\n * Build a Contentstack OAuth authorization URL.\n *\n * @example\n * ```ts\n * const { url, state, codeVerifier } = await buildAuthorizationUrl({\n * region: \"us\",\n * appId: \"app-uid\",\n * clientId: \"client-id\",\n * clientSecret: \"secret\",\n * scopes: [\"user:read\"],\n * redirectUri: \"http://localhost:3000/api/auth/callback/contentstack\",\n * }, { usePKCE: true })\n * ```\n */\nexport async function buildAuthorizationUrl(\n config: OAuthConfig,\n options?: AuthorizationUrlOptions,\n): Promise<AuthorizationUrlResult> {\n validateConfig(config)\n\n const endpoints = resolveEndpoints(config.region)\n const authorizationUrl = `${endpoints.app}/apps/${config.appId}/authorize`\n\n const state = options?.state ?? generateCodeVerifier()\n\n const params = new URLSearchParams({\n response_type: \"code\",\n client_id: config.clientId,\n redirect_uri: config.redirectUri,\n scope: config.scopes.join(\" \"),\n state,\n })\n\n let codeVerifier: string | undefined\n if (options?.usePKCE) {\n codeVerifier = generateCodeVerifier()\n const codeChallenge = await generateCodeChallenge(codeVerifier)\n params.set(\"code_challenge\", codeChallenge)\n params.set(\"code_challenge_method\", \"S256\")\n }\n\n return {\n url: `${authorizationUrl}?${params.toString()}`,\n state,\n codeVerifier,\n }\n}\n\nfunction mapTokenResponse(data: Record<string, unknown>): OAuthTokens {\n return {\n accessToken: data.access_token as string,\n refreshToken: data.refresh_token as string,\n expiresIn: data.expires_in as number,\n tokenType: data.token_type as string,\n }\n}\n\nasync function makeTokenRequest(\n appBaseUrl: string,\n body: URLSearchParams,\n errorMessage: string,\n): Promise<OAuthTokens> {\n const client = new ContentstackHttpClient({ baseUrl: appBaseUrl })\n try {\n const { data } = await client.postForm<Record<string, unknown>>(\"/apps-api/token\", body)\n return mapTokenResponse(data)\n } catch (err) {\n if (err instanceof ContentstackError) {\n throw new ContentstackAuthError(err.message || errorMessage, {\n status: err.status,\n requestPath: \"/apps-api/token\",\n cause: err,\n })\n }\n throw new ContentstackAuthError(errorMessage, {\n requestPath: \"/apps-api/token\",\n cause: err instanceof Error ? err : undefined,\n })\n }\n}\n\n/**\n * Exchange an authorization code for OAuth tokens.\n */\nexport async function exchangeCode(\n config: OAuthConfig,\n code: string,\n options?: ExchangeCodeOptions,\n): Promise<OAuthTokens> {\n const endpoints = resolveEndpoints(config.region)\n\n const body = new URLSearchParams({\n grant_type: \"authorization_code\",\n code,\n redirect_uri: config.redirectUri,\n client_id: config.clientId,\n client_secret: config.clientSecret,\n })\n\n if (options?.codeVerifier) {\n body.set(\"code_verifier\", options.codeVerifier)\n }\n\n return makeTokenRequest(endpoints.app, body, \"Failed to exchange authorization code\")\n}\n\n/**\n * Refresh an expired access token using a refresh token.\n */\nexport async function refreshToken(config: OAuthConfig, token: string): Promise<OAuthTokens> {\n const endpoints = resolveEndpoints(config.region)\n\n const body = new URLSearchParams({\n grant_type: \"refresh_token\",\n refresh_token: token,\n client_id: config.clientId,\n client_secret: config.clientSecret,\n })\n\n return makeTokenRequest(endpoints.app, body, \"Failed to refresh token\")\n}\n\nfunction mapUser(user: Record<string, unknown>): ContentstackUser {\n return {\n uid: user.uid as string,\n email: user.email as string,\n firstName: (user.first_name as string) ?? undefined,\n lastName: (user.last_name as string) ?? undefined,\n username: (user.username as string) ?? undefined,\n profileImage: (user.profile_image as string) ?? undefined,\n }\n}\n\n/**\n * Fetch the authenticated user's profile from Contentstack.\n * Unwraps the nested `user` key and maps snake_case → camelCase.\n */\nexport async function getUser(\n region: ContentstackRegion,\n accessToken: string,\n): Promise<ContentstackUser> {\n const endpoints = resolveEndpoints(region)\n const client = new ContentstackHttpClient({\n baseUrl: `${endpoints.cma}/v3`,\n headers: { Authorization: `Bearer ${accessToken}` },\n })\n\n try {\n const { data } = await client.get<{ user: Record<string, unknown> }>(\"/user\")\n return mapUser(data.user)\n } catch (err) {\n if (err instanceof ContentstackError) {\n throw new ContentstackAuthError(err.message || \"Failed to fetch user profile\", {\n status: err.status,\n requestPath: \"/v3/user\",\n cause: err,\n })\n }\n throw new ContentstackAuthError(\"Failed to fetch user profile\", {\n requestPath: \"/v3/user\",\n cause: err instanceof Error ? err : undefined,\n })\n }\n}\n\n/**\n * Create an Auth.js v5 provider config object for Contentstack.\n *\n * No Auth.js dependency is required in this package — the returned object\n * conforms to the Auth.js OAuthConfig shape and can be passed directly to\n * `next-auth` or `@auth/core`.\n *\n * @example\n * ```ts\n * // app/api/auth/[...nextauth]/route.ts\n * import NextAuth from \"next-auth\"\n * import { createAuthProvider } from \"@timbenniks/contentstack-platform-sdk/auth\"\n *\n * export const { handlers, signIn, signOut, auth } = NextAuth({\n * providers: [createAuthProvider({ region: \"us\", appId: \"...\", ... })],\n * })\n * ```\n */\nexport function createAuthProvider(config: OAuthConfig): Record<string, unknown> {\n validateConfig(config)\n\n const endpoints = resolveEndpoints(config.region)\n const userClient = new ContentstackHttpClient({ baseUrl: `${endpoints.cma}/v3` })\n\n return {\n id: \"contentstack\",\n name: \"Contentstack\",\n type: \"oauth\",\n checks: [\"state\"],\n authorization: {\n url: `${endpoints.app}/apps/${config.appId}/authorize`,\n params: {\n response_type: \"code\",\n scope: config.scopes.join(\" \"),\n },\n },\n token: `${endpoints.app}/apps-api/token`,\n userinfo: {\n url: `${endpoints.cma}/v3/user`,\n async request({ tokens }: { tokens: { access_token: string } }) {\n const authedClient = userClient.withHeaders({\n Authorization: `Bearer ${tokens.access_token}`,\n })\n const { data } = await authedClient.get<Record<string, unknown>>(\"/user\")\n return data\n },\n },\n profile(profile: { user: Record<string, unknown> }) {\n const user = profile.user\n return {\n id: user.uid as string,\n name:\n [user.first_name, user.last_name].filter(Boolean).join(\" \") || (user.username as string),\n email: user.email as string,\n image: (user.profile_image as string) ?? null,\n }\n },\n clientId: config.clientId,\n clientSecret: config.clientSecret,\n }\n}\n\n/**\n * Create Auth.js v5 callbacks for token persistence and automatic refresh.\n *\n * The `jwt` callback persists OAuth tokens on initial sign-in and attempts\n * to refresh expired tokens (with a 60-second safety window).\n *\n * The `session` callback exposes the access token and any refresh errors\n * on the session object.\n *\n * @example\n * ```ts\n * import NextAuth from \"next-auth\"\n * import { createAuthProvider, contentstackAuthCallbacks } from \"@timbenniks/contentstack-platform-sdk/auth\"\n *\n * export const { handlers, auth } = NextAuth({\n * providers: [createAuthProvider({ ... })],\n * callbacks: contentstackAuthCallbacks({ region: \"us\", ... }),\n * })\n * ```\n */\nexport function contentstackAuthCallbacks(config: OAuthConfig) {\n return {\n async jwt({\n token,\n account,\n }: { token: Record<string, unknown>; account?: Record<string, unknown> | null }) {\n // Initial sign-in: persist tokens from the OAuth account\n if (account) {\n token.accessToken = account.access_token\n token.refreshToken = account.refresh_token\n token.accessTokenExpiresAt = Date.now() + ((account.expires_in as number) ?? 3600) * 1000\n return token\n }\n\n // Subsequent calls: check if token needs refresh (60s safety window)\n const expiresAt = token.accessTokenExpiresAt as number | undefined\n if (expiresAt && Date.now() < expiresAt - 60_000) {\n return token\n }\n\n // Token is expired or about to expire — attempt refresh\n const currentRefreshToken = token.refreshToken as string | undefined\n if (!currentRefreshToken) {\n token.error = \"RefreshAccessTokenError\"\n return token\n }\n\n try {\n const tokens = await refreshToken(config, currentRefreshToken)\n token.accessToken = tokens.accessToken\n token.refreshToken = tokens.refreshToken\n token.accessTokenExpiresAt = Date.now() + tokens.expiresIn * 1000\n token.error = undefined\n } catch {\n token.error = \"RefreshAccessTokenError\"\n }\n\n return token\n },\n async session({\n session,\n token,\n }: { session: Record<string, unknown>; token: Record<string, unknown> }) {\n session.accessToken = token.accessToken\n if (token.error) {\n session.error = token.error\n }\n return session\n },\n }\n}\n"],"mappings":";;;;;;;;;;;;;AAAA,IAAM,UAAU;AAOT,SAAS,uBAA+B;AAC7C,QAAM,QAAQ,IAAI,WAAW,EAAE;AAC/B,aAAW,OAAO,gBAAgB,KAAK;AACvC,MAAI,SAAS;AACb,aAAW,QAAQ,OAAO;AACxB,cAAU,QAAQ,OAAO,QAAQ,MAAM;AAAA,EACzC;AACA,SAAO;AACT;AAOA,eAAsB,sBAAsB,UAAmC;AAC7E,QAAM,UAAU,IAAI,YAAY;AAChC,QAAM,OAAO,QAAQ,OAAO,QAAQ;AACpC,QAAM,SAAS,MAAM,WAAW,OAAO,OAAO,OAAO,WAAW,IAAI;AACpE,QAAM,QAAQ,IAAI,WAAW,MAAM;AACnC,MAAI,SAAS;AACb,aAAW,QAAQ,OAAO;AACxB,cAAU,OAAO,aAAa,IAAI;AAAA,EACpC;AACA,SAAO,KAAK,MAAM,EAAE,QAAQ,OAAO,GAAG,EAAE,QAAQ,OAAO,GAAG,EAAE,QAAQ,OAAO,EAAE;AAC/E;;;ACNA,SAAS,eAAe,QAA2B;AACjD,MAAI,CAAC,OAAO,OAAO;AACjB,UAAM,IAAI;AAAA,MACR;AAAA,IACF;AAAA,EACF;AACA,MAAI,OAAO,UAAU,OAAO,UAAU;AACpC,UAAM,IAAI;AAAA,MACR;AAAA,IACF;AAAA,EACF;AACF;AAiBA,eAAsB,sBACpB,QACA,SACiC;AACjC,iBAAe,MAAM;AAErB,QAAM,YAAY,iBAAiB,OAAO,MAAM;AAChD,QAAM,mBAAmB,GAAG,UAAU,GAAG,SAAS,OAAO,KAAK;AAE9D,QAAM,QAAQ,SAAS,SAAS,qBAAqB;AAErD,QAAM,SAAS,IAAI,gBAAgB;AAAA,IACjC,eAAe;AAAA,IACf,WAAW,OAAO;AAAA,IAClB,cAAc,OAAO;AAAA,IACrB,OAAO,OAAO,OAAO,KAAK,GAAG;AAAA,IAC7B;AAAA,EACF,CAAC;AAED,MAAI;AACJ,MAAI,SAAS,SAAS;AACpB,mBAAe,qBAAqB;AACpC,UAAM,gBAAgB,MAAM,sBAAsB,YAAY;AAC9D,WAAO,IAAI,kBAAkB,aAAa;AAC1C,WAAO,IAAI,yBAAyB,MAAM;AAAA,EAC5C;AAEA,SAAO;AAAA,IACL,KAAK,GAAG,gBAAgB,IAAI,OAAO,SAAS,CAAC;AAAA,IAC7C;AAAA,IACA;AAAA,EACF;AACF;AAEA,SAAS,iBAAiB,MAA4C;AACpE,SAAO;AAAA,IACL,aAAa,KAAK;AAAA,IAClB,cAAc,KAAK;AAAA,IACnB,WAAW,KAAK;AAAA,IAChB,WAAW,KAAK;AAAA,EAClB;AACF;AAEA,eAAe,iBACb,YACA,MACA,cACsB;AACtB,QAAM,SAAS,IAAI,uBAAuB,EAAE,SAAS,WAAW,CAAC;AACjE,MAAI;AACF,UAAM,EAAE,KAAK,IAAI,MAAM,OAAO,SAAkC,mBAAmB,IAAI;AACvF,WAAO,iBAAiB,IAAI;AAAA,EAC9B,SAAS,KAAK;AACZ,QAAI,eAAe,mBAAmB;AACpC,YAAM,IAAI,sBAAsB,IAAI,WAAW,cAAc;AAAA,QAC3D,QAAQ,IAAI;AAAA,QACZ,aAAa;AAAA,QACb,OAAO;AAAA,MACT,CAAC;AAAA,IACH;AACA,UAAM,IAAI,sBAAsB,cAAc;AAAA,MAC5C,aAAa;AAAA,MACb,OAAO,eAAe,QAAQ,MAAM;AAAA,IACtC,CAAC;AAAA,EACH;AACF;AAKA,eAAsB,aACpB,QACA,MACA,SACsB;AACtB,QAAM,YAAY,iBAAiB,OAAO,MAAM;AAEhD,QAAM,OAAO,IAAI,gBAAgB;AAAA,IAC/B,YAAY;AAAA,IACZ;AAAA,IACA,cAAc,OAAO;AAAA,IACrB,WAAW,OAAO;AAAA,IAClB,eAAe,OAAO;AAAA,EACxB,CAAC;AAED,MAAI,SAAS,cAAc;AACzB,SAAK,IAAI,iBAAiB,QAAQ,YAAY;AAAA,EAChD;AAEA,SAAO,iBAAiB,UAAU,KAAK,MAAM,uCAAuC;AACtF;AAKA,eAAsB,aAAa,QAAqB,OAAqC;AAC3F,QAAM,YAAY,iBAAiB,OAAO,MAAM;AAEhD,QAAM,OAAO,IAAI,gBAAgB;AAAA,IAC/B,YAAY;AAAA,IACZ,eAAe;AAAA,IACf,WAAW,OAAO;AAAA,IAClB,eAAe,OAAO;AAAA,EACxB,CAAC;AAED,SAAO,iBAAiB,UAAU,KAAK,MAAM,yBAAyB;AACxE;AAEA,SAAS,QAAQ,MAAiD;AAChE,SAAO;AAAA,IACL,KAAK,KAAK;AAAA,IACV,OAAO,KAAK;AAAA,IACZ,WAAY,KAAK,cAAyB;AAAA,IAC1C,UAAW,KAAK,aAAwB;AAAA,IACxC,UAAW,KAAK,YAAuB;AAAA,IACvC,cAAe,KAAK,iBAA4B;AAAA,EAClD;AACF;AAMA,eAAsB,QACpB,QACA,aAC2B;AAC3B,QAAM,YAAY,iBAAiB,MAAM;AACzC,QAAM,SAAS,IAAI,uBAAuB;AAAA,IACxC,SAAS,GAAG,UAAU,GAAG;AAAA,IACzB,SAAS,EAAE,eAAe,UAAU,WAAW,GAAG;AAAA,EACpD,CAAC;AAED,MAAI;AACF,UAAM,EAAE,KAAK,IAAI,MAAM,OAAO,IAAuC,OAAO;AAC5E,WAAO,QAAQ,KAAK,IAAI;AAAA,EAC1B,SAAS,KAAK;AACZ,QAAI,eAAe,mBAAmB;AACpC,YAAM,IAAI,sBAAsB,IAAI,WAAW,gCAAgC;AAAA,QAC7E,QAAQ,IAAI;AAAA,QACZ,aAAa;AAAA,QACb,OAAO;AAAA,MACT,CAAC;AAAA,IACH;AACA,UAAM,IAAI,sBAAsB,gCAAgC;AAAA,MAC9D,aAAa;AAAA,MACb,OAAO,eAAe,QAAQ,MAAM;AAAA,IACtC,CAAC;AAAA,EACH;AACF;AAoBO,SAAS,mBAAmB,QAA8C;AAC/E,iBAAe,MAAM;AAErB,QAAM,YAAY,iBAAiB,OAAO,MAAM;AAChD,QAAM,aAAa,IAAI,uBAAuB,EAAE,SAAS,GAAG,UAAU,GAAG,MAAM,CAAC;AAEhF,SAAO;AAAA,IACL,IAAI;AAAA,IACJ,MAAM;AAAA,IACN,MAAM;AAAA,IACN,QAAQ,CAAC,OAAO;AAAA,IAChB,eAAe;AAAA,MACb,KAAK,GAAG,UAAU,GAAG,SAAS,OAAO,KAAK;AAAA,MAC1C,QAAQ;AAAA,QACN,eAAe;AAAA,QACf,OAAO,OAAO,OAAO,KAAK,GAAG;AAAA,MAC/B;AAAA,IACF;AAAA,IACA,OAAO,GAAG,UAAU,GAAG;AAAA,IACvB,UAAU;AAAA,MACR,KAAK,GAAG,UAAU,GAAG;AAAA,MACrB,MAAM,QAAQ,EAAE,OAAO,GAAyC;AAC9D,cAAM,eAAe,WAAW,YAAY;AAAA,UAC1C,eAAe,UAAU,OAAO,YAAY;AAAA,QAC9C,CAAC;AACD,cAAM,EAAE,KAAK,IAAI,MAAM,aAAa,IAA6B,OAAO;AACxE,eAAO;AAAA,MACT;AAAA,IACF;AAAA,IACA,QAAQ,SAA4C;AAClD,YAAM,OAAO,QAAQ;AACrB,aAAO;AAAA,QACL,IAAI,KAAK;AAAA,QACT,MACE,CAAC,KAAK,YAAY,KAAK,SAAS,EAAE,OAAO,OAAO,EAAE,KAAK,GAAG,KAAM,KAAK;AAAA,QACvE,OAAO,KAAK;AAAA,QACZ,OAAQ,KAAK,iBAA4B;AAAA,MAC3C;AAAA,IACF;AAAA,IACA,UAAU,OAAO;AAAA,IACjB,cAAc,OAAO;AAAA,EACvB;AACF;AAsBO,SAAS,0BAA0B,QAAqB;AAC7D,SAAO;AAAA,IACL,MAAM,IAAI;AAAA,MACR;AAAA,MACA;AAAA,IACF,GAAiF;AAE/E,UAAI,SAAS;AACX,cAAM,cAAc,QAAQ;AAC5B,cAAM,eAAe,QAAQ;AAC7B,cAAM,uBAAuB,KAAK,IAAI,KAAM,QAAQ,cAAyB,QAAQ;AACrF,eAAO;AAAA,MACT;AAGA,YAAM,YAAY,MAAM;AACxB,UAAI,aAAa,KAAK,IAAI,IAAI,YAAY,KAAQ;AAChD,eAAO;AAAA,MACT;AAGA,YAAM,sBAAsB,MAAM;AAClC,UAAI,CAAC,qBAAqB;AACxB,cAAM,QAAQ;AACd,eAAO;AAAA,MACT;AAEA,UAAI;AACF,cAAM,SAAS,MAAM,aAAa,QAAQ,mBAAmB;AAC7D,cAAM,cAAc,OAAO;AAC3B,cAAM,eAAe,OAAO;AAC5B,cAAM,uBAAuB,KAAK,IAAI,IAAI,OAAO,YAAY;AAC7D,cAAM,QAAQ;AAAA,MAChB,QAAQ;AACN,cAAM,QAAQ;AAAA,MAChB;AAEA,aAAO;AAAA,IACT;AAAA,IACA,MAAM,QAAQ;AAAA,MACZ;AAAA,MACA;AAAA,IACF,GAAyE;AACvE,cAAQ,cAAc,MAAM;AAC5B,UAAI,MAAM,OAAO;AACf,gBAAQ,QAAQ,MAAM;AAAA,MACxB;AACA,aAAO;AAAA,IACT;AAAA,EACF;AACF;","names":[]}
|
|
@@ -1,26 +0,0 @@
|
|
|
1
|
-
import { ContentstackRegion } from './regions/index.cjs';
|
|
2
|
-
|
|
3
|
-
interface OAuthConfig {
|
|
4
|
-
region: ContentstackRegion;
|
|
5
|
-
appId: string;
|
|
6
|
-
clientId: string;
|
|
7
|
-
clientSecret: string;
|
|
8
|
-
scopes: string[];
|
|
9
|
-
redirectUri: string;
|
|
10
|
-
}
|
|
11
|
-
interface OAuthTokens {
|
|
12
|
-
accessToken: string;
|
|
13
|
-
refreshToken: string;
|
|
14
|
-
expiresIn: number;
|
|
15
|
-
tokenType: string;
|
|
16
|
-
}
|
|
17
|
-
interface ContentstackUser {
|
|
18
|
-
uid: string;
|
|
19
|
-
email: string;
|
|
20
|
-
firstName?: string;
|
|
21
|
-
lastName?: string;
|
|
22
|
-
username?: string;
|
|
23
|
-
profileImage?: string;
|
|
24
|
-
}
|
|
25
|
-
|
|
26
|
-
export type { ContentstackUser as C, OAuthConfig as O, OAuthTokens as a };
|
package/dist/types-Bu5yCgmw.d.ts
DELETED
|
@@ -1,26 +0,0 @@
|
|
|
1
|
-
import { ContentstackRegion } from './regions/index.js';
|
|
2
|
-
|
|
3
|
-
interface OAuthConfig {
|
|
4
|
-
region: ContentstackRegion;
|
|
5
|
-
appId: string;
|
|
6
|
-
clientId: string;
|
|
7
|
-
clientSecret: string;
|
|
8
|
-
scopes: string[];
|
|
9
|
-
redirectUri: string;
|
|
10
|
-
}
|
|
11
|
-
interface OAuthTokens {
|
|
12
|
-
accessToken: string;
|
|
13
|
-
refreshToken: string;
|
|
14
|
-
expiresIn: number;
|
|
15
|
-
tokenType: string;
|
|
16
|
-
}
|
|
17
|
-
interface ContentstackUser {
|
|
18
|
-
uid: string;
|
|
19
|
-
email: string;
|
|
20
|
-
firstName?: string;
|
|
21
|
-
lastName?: string;
|
|
22
|
-
username?: string;
|
|
23
|
-
profileImage?: string;
|
|
24
|
-
}
|
|
25
|
-
|
|
26
|
-
export type { ContentstackUser as C, OAuthConfig as O, OAuthTokens as a };
|
|
File without changes
|
|
File without changes
|