xeno-auth-sdk 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/api/authApiClient.d.ts +15 -0
- package/dist/api/authApiClient.d.ts.map +1 -0
- package/dist/api/authApiClient.js +107 -0
- package/dist/api/authApiClient.js.map +1 -0
- package/dist/api/types.d.ts +33 -0
- package/dist/api/types.d.ts.map +1 -0
- package/dist/api/types.js +2 -0
- package/dist/api/types.js.map +1 -0
- package/dist/components/PermissionGate.d.ts +10 -0
- package/dist/components/PermissionGate.d.ts.map +1 -0
- package/dist/components/PermissionGate.js +11 -0
- package/dist/components/PermissionGate.js.map +1 -0
- package/dist/components/ProtectedComponent.d.ts +11 -0
- package/dist/components/ProtectedComponent.d.ts.map +1 -0
- package/dist/components/ProtectedComponent.js +20 -0
- package/dist/components/ProtectedComponent.js.map +1 -0
- package/dist/components/ProtectedRoute.d.ts +11 -0
- package/dist/components/ProtectedRoute.d.ts.map +1 -0
- package/dist/components/ProtectedRoute.js +30 -0
- package/dist/components/ProtectedRoute.js.map +1 -0
- package/dist/components/RoleBasedUI.d.ts +14 -0
- package/dist/components/RoleBasedUI.d.ts.map +1 -0
- package/dist/components/RoleBasedUI.js +19 -0
- package/dist/components/RoleBasedUI.js.map +1 -0
- package/dist/config/authConfig.d.ts +12 -0
- package/dist/config/authConfig.d.ts.map +1 -0
- package/dist/config/authConfig.js +23 -0
- package/dist/config/authConfig.js.map +1 -0
- package/dist/context/AuthContext.d.ts +17 -0
- package/dist/context/AuthContext.d.ts.map +1 -0
- package/dist/context/AuthContext.js +6 -0
- package/dist/context/AuthContext.js.map +1 -0
- package/dist/context/AuthProvider.d.ts +7 -0
- package/dist/context/AuthProvider.d.ts.map +1 -0
- package/dist/context/AuthProvider.js +193 -0
- package/dist/context/AuthProvider.js.map +1 -0
- package/dist/hooks/useAuth.d.ts +3 -0
- package/dist/hooks/useAuth.d.ts.map +1 -0
- package/dist/hooks/useAuth.js +11 -0
- package/dist/hooks/useAuth.js.map +1 -0
- package/dist/hooks/useFeature.d.ts +2 -0
- package/dist/hooks/useFeature.d.ts.map +1 -0
- package/dist/hooks/useFeature.js +9 -0
- package/dist/hooks/useFeature.js.map +1 -0
- package/dist/hooks/usePermission.d.ts +2 -0
- package/dist/hooks/usePermission.d.ts.map +1 -0
- package/dist/hooks/usePermission.js +9 -0
- package/dist/hooks/usePermission.js.map +1 -0
- package/dist/hooks/useRole.d.ts +2 -0
- package/dist/hooks/useRole.d.ts.map +1 -0
- package/dist/hooks/useRole.js +6 -0
- package/dist/hooks/useRole.js.map +1 -0
- package/dist/index.d.ts +22 -0
- package/dist/index.d.ts.map +1 -0
- package/dist/index.js +16 -0
- package/dist/index.js.map +1 -0
- package/dist/utils/permissionHelper.d.ts +9 -0
- package/dist/utils/permissionHelper.d.ts.map +1 -0
- package/dist/utils/permissionHelper.js +27 -0
- package/dist/utils/permissionHelper.js.map +1 -0
- package/dist/utils/tokenDecoder.d.ts +14 -0
- package/dist/utils/tokenDecoder.d.ts.map +1 -0
- package/dist/utils/tokenDecoder.js +61 -0
- package/dist/utils/tokenDecoder.js.map +1 -0
- package/dist/utils/tokenStorage.d.ts +17 -0
- package/dist/utils/tokenStorage.d.ts.map +1 -0
- package/dist/utils/tokenStorage.js +60 -0
- package/dist/utils/tokenStorage.js.map +1 -0
- package/package.json +60 -0
|
@@ -0,0 +1,15 @@
|
|
|
1
|
+
import { UserAuthInfoDto, RoleFeatureDto, TokenResponse, LoginRequest } from './types';
|
|
2
|
+
export declare class AuthApiClient {
|
|
3
|
+
private httpClient;
|
|
4
|
+
private getTokenFn;
|
|
5
|
+
private onUnauthorized?;
|
|
6
|
+
constructor(baseUrl: string, getToken: () => string | null, onUnauthorized?: () => void);
|
|
7
|
+
private setupInterceptors;
|
|
8
|
+
login(credentials: LoginRequest): Promise<TokenResponse>;
|
|
9
|
+
getCurrentUserAuthInfo(): Promise<UserAuthInfoDto>;
|
|
10
|
+
getRoleFeature(roleName: string): Promise<RoleFeatureDto>;
|
|
11
|
+
logout(): Promise<void>;
|
|
12
|
+
refreshToken(refreshToken: string): Promise<TokenResponse>;
|
|
13
|
+
private handleError;
|
|
14
|
+
}
|
|
15
|
+
//# sourceMappingURL=authApiClient.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"authApiClient.d.ts","sourceRoot":"","sources":["../../src/api/authApiClient.ts"],"names":[],"mappings":"AACA,OAAO,EACL,eAAe,EACf,cAAc,EACd,aAAa,EACb,YAAY,EACb,MAAM,SAAS,CAAC;AAEjB,qBAAa,aAAa;IACxB,OAAO,CAAC,UAAU,CAAgB;IAClC,OAAO,CAAC,UAAU,CAAsB;IACxC,OAAO,CAAC,cAAc,CAAC,CAAa;gBAGlC,OAAO,EAAE,MAAM,EACf,QAAQ,EAAE,MAAM,MAAM,GAAG,IAAI,EAC7B,cAAc,CAAC,EAAE,MAAM,IAAI;IAa7B,OAAO,CAAC,iBAAiB;IA4BnB,KAAK,CAAC,WAAW,EAAE,YAAY,GAAG,OAAO,CAAC,aAAa,CAAC;IAYxD,sBAAsB,IAAI,OAAO,CAAC,eAAe,CAAC;IAWlD,cAAc,CAAC,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,cAAc,CAAC;IAWzD,MAAM,IAAI,OAAO,CAAC,IAAI,CAAC;IAQvB,YAAY,CAAC,YAAY,EAAE,MAAM,GAAG,OAAO,CAAC,aAAa,CAAC;IAYhE,OAAO,CAAC,WAAW;CAapB"}
|
|
@@ -0,0 +1,107 @@
|
|
|
1
|
+
import axios from 'axios';
|
|
2
|
+
export class AuthApiClient {
|
|
3
|
+
constructor(baseUrl, getToken, onUnauthorized) {
|
|
4
|
+
Object.defineProperty(this, "httpClient", {
|
|
5
|
+
enumerable: true,
|
|
6
|
+
configurable: true,
|
|
7
|
+
writable: true,
|
|
8
|
+
value: void 0
|
|
9
|
+
});
|
|
10
|
+
Object.defineProperty(this, "getTokenFn", {
|
|
11
|
+
enumerable: true,
|
|
12
|
+
configurable: true,
|
|
13
|
+
writable: true,
|
|
14
|
+
value: void 0
|
|
15
|
+
});
|
|
16
|
+
Object.defineProperty(this, "onUnauthorized", {
|
|
17
|
+
enumerable: true,
|
|
18
|
+
configurable: true,
|
|
19
|
+
writable: true,
|
|
20
|
+
value: void 0
|
|
21
|
+
});
|
|
22
|
+
this.getTokenFn = getToken;
|
|
23
|
+
this.onUnauthorized = onUnauthorized;
|
|
24
|
+
this.httpClient = axios.create({
|
|
25
|
+
baseURL: baseUrl,
|
|
26
|
+
timeout: 30000,
|
|
27
|
+
});
|
|
28
|
+
this.setupInterceptors();
|
|
29
|
+
}
|
|
30
|
+
setupInterceptors() {
|
|
31
|
+
this.httpClient.interceptors.request.use((config) => {
|
|
32
|
+
const token = this.getTokenFn();
|
|
33
|
+
if (token) {
|
|
34
|
+
config.headers.Authorization = `Bearer ${token}`;
|
|
35
|
+
}
|
|
36
|
+
return config;
|
|
37
|
+
}, (error) => Promise.reject(error));
|
|
38
|
+
this.httpClient.interceptors.response.use((response) => response, (error) => {
|
|
39
|
+
if (error.response?.status === 401) {
|
|
40
|
+
if (this.onUnauthorized) {
|
|
41
|
+
this.onUnauthorized();
|
|
42
|
+
}
|
|
43
|
+
if (typeof window !== 'undefined') {
|
|
44
|
+
window.dispatchEvent(new CustomEvent('auth:unauthorized'));
|
|
45
|
+
}
|
|
46
|
+
}
|
|
47
|
+
return Promise.reject(error);
|
|
48
|
+
});
|
|
49
|
+
}
|
|
50
|
+
async login(credentials) {
|
|
51
|
+
try {
|
|
52
|
+
const response = await this.httpClient.post('/api/identity/login', credentials);
|
|
53
|
+
return response.data;
|
|
54
|
+
}
|
|
55
|
+
catch (error) {
|
|
56
|
+
throw this.handleError(error);
|
|
57
|
+
}
|
|
58
|
+
}
|
|
59
|
+
async getCurrentUserAuthInfo() {
|
|
60
|
+
try {
|
|
61
|
+
const response = await this.httpClient.get('/api/authorization/current-user-auth-info');
|
|
62
|
+
return response.data;
|
|
63
|
+
}
|
|
64
|
+
catch (error) {
|
|
65
|
+
throw this.handleError(error);
|
|
66
|
+
}
|
|
67
|
+
}
|
|
68
|
+
async getRoleFeature(roleName) {
|
|
69
|
+
try {
|
|
70
|
+
const response = await this.httpClient.get(`/api/authorization/role-feature/${roleName}`);
|
|
71
|
+
return response.data;
|
|
72
|
+
}
|
|
73
|
+
catch (error) {
|
|
74
|
+
throw this.handleError(error);
|
|
75
|
+
}
|
|
76
|
+
}
|
|
77
|
+
async logout() {
|
|
78
|
+
try {
|
|
79
|
+
await this.httpClient.post('/api/identity/logout', {});
|
|
80
|
+
}
|
|
81
|
+
catch (error) {
|
|
82
|
+
console.error('Logout failed:', error);
|
|
83
|
+
}
|
|
84
|
+
}
|
|
85
|
+
async refreshToken(refreshToken) {
|
|
86
|
+
try {
|
|
87
|
+
const response = await this.httpClient.post('/api/identity/refresh-token', { refreshToken });
|
|
88
|
+
return response.data;
|
|
89
|
+
}
|
|
90
|
+
catch (error) {
|
|
91
|
+
throw this.handleError(error);
|
|
92
|
+
}
|
|
93
|
+
}
|
|
94
|
+
handleError(error) {
|
|
95
|
+
if (axios.isAxiosError(error)) {
|
|
96
|
+
const message = error.response?.data?.message ||
|
|
97
|
+
error.message ||
|
|
98
|
+
'An error occurred';
|
|
99
|
+
const statusCode = error.response?.status;
|
|
100
|
+
const customError = new Error(message);
|
|
101
|
+
customError.statusCode = statusCode;
|
|
102
|
+
return customError;
|
|
103
|
+
}
|
|
104
|
+
return error instanceof Error ? error : new Error('Unknown error');
|
|
105
|
+
}
|
|
106
|
+
}
|
|
107
|
+
//# sourceMappingURL=authApiClient.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"authApiClient.js","sourceRoot":"","sources":["../../src/api/authApiClient.ts"],"names":[],"mappings":"AAAA,OAAO,KAAoC,MAAM,OAAO,CAAC;AAQzD,MAAM,OAAO,aAAa;IAKxB,YACE,OAAe,EACf,QAA6B,EAC7B,cAA2B;QAPrB;;;;;WAA0B;QAC1B;;;;;WAAgC;QAChC;;;;;WAA4B;QAOlC,IAAI,CAAC,UAAU,GAAG,QAAQ,CAAC;QAC3B,IAAI,CAAC,cAAc,GAAG,cAAc,CAAC;QAErC,IAAI,CAAC,UAAU,GAAG,KAAK,CAAC,MAAM,CAAC;YAC7B,OAAO,EAAE,OAAO;YAChB,OAAO,EAAE,KAAK;SACf,CAAC,CAAC;QAEH,IAAI,CAAC,iBAAiB,EAAE,CAAC;IAC3B,CAAC;IAEO,iBAAiB;QACvB,IAAI,CAAC,UAAU,CAAC,YAAY,CAAC,OAAO,CAAC,GAAG,CACtC,CAAC,MAAM,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,IAAI,CAAC,UAAU,EAAE,CAAC;YAChC,IAAI,KAAK,EAAE,CAAC;gBACV,MAAM,CAAC,OAAO,CAAC,aAAa,GAAG,UAAU,KAAK,EAAE,CAAC;YACnD,CAAC;YACD,OAAO,MAAM,CAAC;QAChB,CAAC,EACD,CAAC,KAAK,EAAE,EAAE,CAAC,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,CACjC,CAAC;QAEF,IAAI,CAAC,UAAU,CAAC,YAAY,CAAC,QAAQ,CAAC,GAAG,CACvC,CAAC,QAAQ,EAAE,EAAE,CAAC,QAAQ,EACtB,CAAC,KAAiB,EAAE,EAAE;YACpB,IAAI,KAAK,CAAC,QAAQ,EAAE,MAAM,KAAK,GAAG,EAAE,CAAC;gBACnC,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;oBACxB,IAAI,CAAC,cAAc,EAAE,CAAC;gBACxB,CAAC;gBACD,IAAI,OAAO,MAAM,KAAK,WAAW,EAAE,CAAC;oBAClC,MAAM,CAAC,aAAa,CAAC,IAAI,WAAW,CAAC,mBAAmB,CAAC,CAAC,CAAC;gBAC7D,CAAC;YACH,CAAC;YACD,OAAO,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;QAC/B,CAAC,CACF,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,KAAK,CAAC,WAAyB;QACnC,IAAI,CAAC;YACH,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,IAAI,CACzC,qBAAqB,EACrB,WAAW,CACZ,CAAC;YACF,OAAO,QAAQ,CAAC,IAAI,CAAC;QACvB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,IAAI,CAAC,WAAW,CAAC,KAAK,CAAC,CAAC;QAChC,CAAC;IACH,CAAC;IAED,KAAK,CAAC,sBAAsB;QAC1B,IAAI,CAAC;YACH,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,GAAG,CACxC,2CAA2C,CAC5C,CAAC;YACF,OAAO,QAAQ,CAAC,IAAI,CAAC;QACvB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,IAAI,CAAC,WAAW,CAAC,KAAK,CAAC,CAAC;QAChC,CAAC;IACH,CAAC;IAED,KAAK,CAAC,cAAc,CAAC,QAAgB;QACnC,IAAI,CAAC;YACH,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,GAAG,CACxC,mCAAmC,QAAQ,EAAE,CAC9C,CAAC;YACF,OAAO,QAAQ,CAAC,IAAI,CAAC;QACvB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,IAAI,CAAC,WAAW,CAAC,KAAK,CAAC,CAAC;QAChC,CAAC;IACH,CAAC;IAED,KAAK,CAAC,MAAM;QACV,IAAI,CAAC;YACH,MAAM,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,sBAAsB,EAAE,EAAE,CAAC,CAAC;QACzD,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,CAAC,KAAK,CAAC,gBAAgB,EAAE,KAAK,CAAC,CAAC;QACzC,CAAC;IACH,CAAC;IAED,KAAK,CAAC,YAAY,CAAC,YAAoB;QACrC,IAAI,CAAC;YACH,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,IAAI,CACzC,6BAA6B,EAC7B,EAAE,YAAY,EAAE,CACjB,CAAC;YACF,OAAO,QAAQ,CAAC,IAAI,CAAC;QACvB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,IAAI,CAAC,WAAW,CAAC,KAAK,CAAC,CAAC;QAChC,CAAC;IACH,CAAC;IAEO,WAAW,CAAC,KAAc;QAChC,IAAI,KAAK,CAAC,YAAY,CAAC,KAAK,CAAC,EAAE,CAAC;YAC9B,MAAM,OAAO,GACV,KAAK,CAAC,QAAQ,EAAE,IAA6B,EAAE,OAAO;gBACvD,KAAK,CAAC,OAAO;gBACb,mBAAmB,CAAC;YACtB,MAAM,UAAU,GAAG,KAAK,CAAC,QAAQ,EAAE,MAAM,CAAC;YAC1C,MAAM,WAAW,GAAG,IAAI,KAAK,CAAC,OAAO,CAAC,CAAC;YACtC,WAA+C,CAAC,UAAU,GAAG,UAAU,CAAC;YACzE,OAAO,WAAW,CAAC;QACrB,CAAC;QACD,OAAO,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,KAAK,CAAC,eAAe,CAAC,CAAC;IACrE,CAAC;CACF"}
|
|
@@ -0,0 +1,33 @@
|
|
|
1
|
+
export interface UserAuthInfoDto {
|
|
2
|
+
userId: string;
|
|
3
|
+
userName: string;
|
|
4
|
+
email: string;
|
|
5
|
+
fullName: string;
|
|
6
|
+
departmentCode: string;
|
|
7
|
+
roles: string[];
|
|
8
|
+
permissions: Record<string, boolean>;
|
|
9
|
+
features: Record<string, boolean>;
|
|
10
|
+
accessiblePages: string[];
|
|
11
|
+
isAuthenticated: boolean;
|
|
12
|
+
}
|
|
13
|
+
export interface RoleFeatureDto {
|
|
14
|
+
roleName: string;
|
|
15
|
+
features: string[];
|
|
16
|
+
permissions: Record<string, boolean>;
|
|
17
|
+
}
|
|
18
|
+
export interface TokenResponse {
|
|
19
|
+
access_token: string;
|
|
20
|
+
expires_in: number;
|
|
21
|
+
token_type: string;
|
|
22
|
+
refresh_token?: string;
|
|
23
|
+
}
|
|
24
|
+
export interface LoginRequest {
|
|
25
|
+
username: string;
|
|
26
|
+
password: string;
|
|
27
|
+
}
|
|
28
|
+
export interface AuthError {
|
|
29
|
+
message: string;
|
|
30
|
+
code?: string;
|
|
31
|
+
statusCode?: number;
|
|
32
|
+
}
|
|
33
|
+
//# sourceMappingURL=types.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../src/api/types.ts"],"names":[],"mappings":"AAAA,MAAM,WAAW,eAAe;IAC9B,MAAM,EAAE,MAAM,CAAC;IACf,QAAQ,EAAE,MAAM,CAAC;IACjB,KAAK,EAAE,MAAM,CAAC;IACd,QAAQ,EAAE,MAAM,CAAC;IACjB,cAAc,EAAE,MAAM,CAAC;IAEvB,KAAK,EAAE,MAAM,EAAE,CAAC;IAChB,WAAW,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IACrC,QAAQ,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAClC,eAAe,EAAE,MAAM,EAAE,CAAC;IAE1B,eAAe,EAAE,OAAO,CAAC;CAC1B;AAED,MAAM,WAAW,cAAc;IAC7B,QAAQ,EAAE,MAAM,CAAC;IACjB,QAAQ,EAAE,MAAM,EAAE,CAAC;IACnB,WAAW,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;CACtC;AAED,MAAM,WAAW,aAAa;IAC5B,YAAY,EAAE,MAAM,CAAC;IACrB,UAAU,EAAE,MAAM,CAAC;IACnB,UAAU,EAAE,MAAM,CAAC;IACnB,aAAa,CAAC,EAAE,MAAM,CAAC;CACxB;AAED,MAAM,WAAW,YAAY;IAC3B,QAAQ,EAAE,MAAM,CAAC;IACjB,QAAQ,EAAE,MAAM,CAAC;CAClB;AAED,MAAM,WAAW,SAAS;IACxB,OAAO,EAAE,MAAM,CAAC;IAChB,IAAI,CAAC,EAAE,MAAM,CAAC;IACd,UAAU,CAAC,EAAE,MAAM,CAAC;CACrB"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"types.js","sourceRoot":"","sources":["../../src/api/types.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
import React, { ReactNode } from 'react';
|
|
2
|
+
interface PermissionGateProps {
|
|
3
|
+
permission: string | string[];
|
|
4
|
+
children: ReactNode;
|
|
5
|
+
fallback?: ReactNode;
|
|
6
|
+
requireAll?: boolean;
|
|
7
|
+
}
|
|
8
|
+
export declare const PermissionGate: React.FC<PermissionGateProps>;
|
|
9
|
+
export {};
|
|
10
|
+
//# sourceMappingURL=PermissionGate.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"PermissionGate.d.ts","sourceRoot":"","sources":["../../src/components/PermissionGate.tsx"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,EAAE,SAAS,EAAE,MAAM,OAAO,CAAC;AAGzC,UAAU,mBAAmB;IAC3B,UAAU,EAAE,MAAM,GAAG,MAAM,EAAE,CAAC;IAC9B,QAAQ,EAAE,SAAS,CAAC;IACpB,QAAQ,CAAC,EAAE,SAAS,CAAC;IACrB,UAAU,CAAC,EAAE,OAAO,CAAC;CACtB;AAED,eAAO,MAAM,cAAc,EAAE,KAAK,CAAC,EAAE,CAAC,mBAAmB,CAexD,CAAC"}
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
import { Fragment as _Fragment, jsx as _jsx } from "react/jsx-runtime";
|
|
2
|
+
import { useAuth } from '../hooks/useAuth';
|
|
3
|
+
export const PermissionGate = ({ permission, children, fallback = null, requireAll = false, }) => {
|
|
4
|
+
const { hasPermission } = useAuth();
|
|
5
|
+
const permissions = Array.isArray(permission) ? permission : [permission];
|
|
6
|
+
const hasAccess = requireAll
|
|
7
|
+
? permissions.every((p) => hasPermission(p))
|
|
8
|
+
: permissions.some((p) => hasPermission(p));
|
|
9
|
+
return _jsx(_Fragment, { children: hasAccess ? children : fallback });
|
|
10
|
+
};
|
|
11
|
+
//# sourceMappingURL=PermissionGate.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"PermissionGate.js","sourceRoot":"","sources":["../../src/components/PermissionGate.tsx"],"names":[],"mappings":";AACA,OAAO,EAAE,OAAO,EAAE,MAAM,kBAAkB,CAAC;AAS3C,MAAM,CAAC,MAAM,cAAc,GAAkC,CAAC,EAC5D,UAAU,EACV,QAAQ,EACR,QAAQ,GAAG,IAAI,EACf,UAAU,GAAG,KAAK,GACnB,EAAE,EAAE;IACH,MAAM,EAAE,aAAa,EAAE,GAAG,OAAO,EAAE,CAAC;IAEpC,MAAM,WAAW,GAAG,KAAK,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC;IAE1E,MAAM,SAAS,GAAG,UAAU;QAC1B,CAAC,CAAC,WAAW,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC;QAC5C,CAAC,CAAC,WAAW,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,CAAC;IAE9C,OAAO,4BAAG,SAAS,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,QAAQ,GAAI,CAAC;AAChD,CAAC,CAAC"}
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
import React, { ReactNode } from 'react';
|
|
2
|
+
interface ProtectedComponentProps {
|
|
3
|
+
children: ReactNode;
|
|
4
|
+
fallback?: ReactNode;
|
|
5
|
+
permissions?: string[];
|
|
6
|
+
roles?: string[];
|
|
7
|
+
requireAll?: boolean;
|
|
8
|
+
}
|
|
9
|
+
export declare const ProtectedComponent: React.FC<ProtectedComponentProps>;
|
|
10
|
+
export {};
|
|
11
|
+
//# sourceMappingURL=ProtectedComponent.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"ProtectedComponent.d.ts","sourceRoot":"","sources":["../../src/components/ProtectedComponent.tsx"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,EAAE,SAAS,EAAE,MAAM,OAAO,CAAC;AAGzC,UAAU,uBAAuB;IAC/B,QAAQ,EAAE,SAAS,CAAC;IACpB,QAAQ,CAAC,EAAE,SAAS,CAAC;IACrB,WAAW,CAAC,EAAE,MAAM,EAAE,CAAC;IACvB,KAAK,CAAC,EAAE,MAAM,EAAE,CAAC;IACjB,UAAU,CAAC,EAAE,OAAO,CAAC;CACtB;AAED,eAAO,MAAM,kBAAkB,EAAE,KAAK,CAAC,EAAE,CAAC,uBAAuB,CA0BhE,CAAC"}
|
|
@@ -0,0 +1,20 @@
|
|
|
1
|
+
import { Fragment as _Fragment, jsx as _jsx } from "react/jsx-runtime";
|
|
2
|
+
import { useAuth } from '../hooks/useAuth';
|
|
3
|
+
export const ProtectedComponent = ({ children, fallback = null, permissions = [], roles = [], requireAll = false, }) => {
|
|
4
|
+
const { hasPermission, hasRole } = useAuth();
|
|
5
|
+
let hasAccess = true;
|
|
6
|
+
if (permissions.length > 0) {
|
|
7
|
+
const permissionCheck = requireAll
|
|
8
|
+
? permissions.every((p) => hasPermission(p))
|
|
9
|
+
: permissions.some((p) => hasPermission(p));
|
|
10
|
+
hasAccess = hasAccess && permissionCheck;
|
|
11
|
+
}
|
|
12
|
+
if (roles.length > 0) {
|
|
13
|
+
const roleCheck = requireAll
|
|
14
|
+
? roles.every((r) => hasRole(r))
|
|
15
|
+
: roles.some((r) => hasRole(r));
|
|
16
|
+
hasAccess = hasAccess && roleCheck;
|
|
17
|
+
}
|
|
18
|
+
return _jsx(_Fragment, { children: hasAccess ? children : fallback });
|
|
19
|
+
};
|
|
20
|
+
//# sourceMappingURL=ProtectedComponent.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"ProtectedComponent.js","sourceRoot":"","sources":["../../src/components/ProtectedComponent.tsx"],"names":[],"mappings":";AACA,OAAO,EAAE,OAAO,EAAE,MAAM,kBAAkB,CAAC;AAU3C,MAAM,CAAC,MAAM,kBAAkB,GAAsC,CAAC,EACpE,QAAQ,EACR,QAAQ,GAAG,IAAI,EACf,WAAW,GAAG,EAAE,EAChB,KAAK,GAAG,EAAE,EACV,UAAU,GAAG,KAAK,GACnB,EAAE,EAAE;IACH,MAAM,EAAE,aAAa,EAAE,OAAO,EAAE,GAAG,OAAO,EAAE,CAAC;IAE7C,IAAI,SAAS,GAAG,IAAI,CAAC;IAErB,IAAI,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;QAC3B,MAAM,eAAe,GAAG,UAAU;YAChC,CAAC,CAAC,WAAW,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC;YAC5C,CAAC,CAAC,WAAW,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,CAAC;QAC9C,SAAS,GAAG,SAAS,IAAI,eAAe,CAAC;IAC3C,CAAC;IAED,IAAI,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;QACrB,MAAM,SAAS,GAAG,UAAU;YAC1B,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;YAChC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC;QAClC,SAAS,GAAG,SAAS,IAAI,SAAS,CAAC;IACrC,CAAC;IAED,OAAO,4BAAG,SAAS,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,QAAQ,GAAI,CAAC;AAChD,CAAC,CAAC"}
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
import React, { ReactNode } from 'react';
|
|
2
|
+
interface ProtectedRouteProps {
|
|
3
|
+
children: ReactNode;
|
|
4
|
+
requiredPermissions?: string[];
|
|
5
|
+
requiredRoles?: string[];
|
|
6
|
+
requireAll?: boolean;
|
|
7
|
+
fallback?: ReactNode;
|
|
8
|
+
}
|
|
9
|
+
export declare const ProtectedRoute: React.FC<ProtectedRouteProps>;
|
|
10
|
+
export {};
|
|
11
|
+
//# sourceMappingURL=ProtectedRoute.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"ProtectedRoute.d.ts","sourceRoot":"","sources":["../../src/components/ProtectedRoute.tsx"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,EAAE,SAAS,EAAE,MAAM,OAAO,CAAC;AAIzC,UAAU,mBAAmB;IAC3B,QAAQ,EAAE,SAAS,CAAC;IACpB,mBAAmB,CAAC,EAAE,MAAM,EAAE,CAAC;IAC/B,aAAa,CAAC,EAAE,MAAM,EAAE,CAAC;IACzB,UAAU,CAAC,EAAE,OAAO,CAAC;IACrB,QAAQ,CAAC,EAAE,SAAS,CAAC;CACtB;AAED,eAAO,MAAM,cAAc,EAAE,KAAK,CAAC,EAAE,CAAC,mBAAmB,CAsCxD,CAAC"}
|
|
@@ -0,0 +1,30 @@
|
|
|
1
|
+
import { jsx as _jsx, Fragment as _Fragment } from "react/jsx-runtime";
|
|
2
|
+
import { Navigate } from 'react-router-dom';
|
|
3
|
+
import { useAuth } from '../hooks/useAuth';
|
|
4
|
+
export const ProtectedRoute = ({ children, requiredPermissions = [], requiredRoles = [], requireAll = false, fallback, }) => {
|
|
5
|
+
const { isAuthenticated, hasPermission, hasRole, isLoading } = useAuth();
|
|
6
|
+
if (isLoading) {
|
|
7
|
+
return _jsx("div", { children: "Loading..." });
|
|
8
|
+
}
|
|
9
|
+
if (!isAuthenticated) {
|
|
10
|
+
return _jsx(Navigate, { to: "/login", replace: true });
|
|
11
|
+
}
|
|
12
|
+
if (requiredPermissions.length > 0) {
|
|
13
|
+
const hasAccess = requireAll
|
|
14
|
+
? requiredPermissions.every((p) => hasPermission(p))
|
|
15
|
+
: requiredPermissions.some((p) => hasPermission(p));
|
|
16
|
+
if (!hasAccess) {
|
|
17
|
+
return fallback ? _jsx(_Fragment, { children: fallback }) : _jsx(Navigate, { to: "/unauthorized", replace: true });
|
|
18
|
+
}
|
|
19
|
+
}
|
|
20
|
+
if (requiredRoles.length > 0) {
|
|
21
|
+
const hasAccess = requireAll
|
|
22
|
+
? requiredRoles.every((r) => hasRole(r))
|
|
23
|
+
: requiredRoles.some((r) => hasRole(r));
|
|
24
|
+
if (!hasAccess) {
|
|
25
|
+
return fallback ? _jsx(_Fragment, { children: fallback }) : _jsx(Navigate, { to: "/unauthorized", replace: true });
|
|
26
|
+
}
|
|
27
|
+
}
|
|
28
|
+
return _jsx(_Fragment, { children: children });
|
|
29
|
+
};
|
|
30
|
+
//# sourceMappingURL=ProtectedRoute.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"ProtectedRoute.js","sourceRoot":"","sources":["../../src/components/ProtectedRoute.tsx"],"names":[],"mappings":";AACA,OAAO,EAAE,QAAQ,EAAE,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAAE,OAAO,EAAE,MAAM,kBAAkB,CAAC;AAU3C,MAAM,CAAC,MAAM,cAAc,GAAkC,CAAC,EAC5D,QAAQ,EACR,mBAAmB,GAAG,EAAE,EACxB,aAAa,GAAG,EAAE,EAClB,UAAU,GAAG,KAAK,EAClB,QAAQ,GACT,EAAE,EAAE;IACH,MAAM,EAAE,eAAe,EAAE,aAAa,EAAE,OAAO,EAAE,SAAS,EAAE,GAAG,OAAO,EAAE,CAAC;IAEzE,IAAI,SAAS,EAAE,CAAC;QACd,OAAO,uCAAqB,CAAC;IAC/B,CAAC;IAED,IAAI,CAAC,eAAe,EAAE,CAAC;QACrB,OAAO,KAAC,QAAQ,IAAC,EAAE,EAAC,QAAQ,EAAC,OAAO,SAAG,CAAC;IAC1C,CAAC;IAED,IAAI,mBAAmB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;QACnC,MAAM,SAAS,GAAG,UAAU;YAC1B,CAAC,CAAC,mBAAmB,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC;YACpD,CAAC,CAAC,mBAAmB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,CAAC;QAEtD,IAAI,CAAC,SAAS,EAAE,CAAC;YACf,OAAO,QAAQ,CAAC,CAAC,CAAC,4BAAG,QAAQ,GAAI,CAAC,CAAC,CAAC,KAAC,QAAQ,IAAC,EAAE,EAAC,eAAe,EAAC,OAAO,SAAG,CAAC;QAC9E,CAAC;IACH,CAAC;IAED,IAAI,aAAa,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;QAC7B,MAAM,SAAS,GAAG,UAAU;YAC1B,CAAC,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;YACxC,CAAC,CAAC,aAAa,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC;QAE1C,IAAI,CAAC,SAAS,EAAE,CAAC;YACf,OAAO,QAAQ,CAAC,CAAC,CAAC,4BAAG,QAAQ,GAAI,CAAC,CAAC,CAAC,KAAC,QAAQ,IAAC,EAAE,EAAC,eAAe,EAAC,OAAO,SAAG,CAAC;QAC9E,CAAC;IACH,CAAC;IAED,OAAO,4BAAG,QAAQ,GAAI,CAAC;AACzB,CAAC,CAAC"}
|
|
@@ -0,0 +1,14 @@
|
|
|
1
|
+
import React, { ComponentType, ReactNode } from 'react';
|
|
2
|
+
export interface RoleConfig {
|
|
3
|
+
role: string | string[];
|
|
4
|
+
component: ComponentType<Record<string, unknown>>;
|
|
5
|
+
props?: Record<string, unknown>;
|
|
6
|
+
}
|
|
7
|
+
interface RoleBasedUIProps {
|
|
8
|
+
roles: RoleConfig[];
|
|
9
|
+
fallback?: ComponentType<Record<string, unknown>> | ReactNode;
|
|
10
|
+
defaultProps?: Record<string, unknown>;
|
|
11
|
+
}
|
|
12
|
+
export declare const RoleBasedUI: React.FC<RoleBasedUIProps>;
|
|
13
|
+
export {};
|
|
14
|
+
//# sourceMappingURL=RoleBasedUI.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"RoleBasedUI.d.ts","sourceRoot":"","sources":["../../src/components/RoleBasedUI.tsx"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,EAAE,aAAa,EAAE,SAAS,EAAE,MAAM,OAAO,CAAC;AAGxD,MAAM,WAAW,UAAU;IACzB,IAAI,EAAE,MAAM,GAAG,MAAM,EAAE,CAAC;IACxB,SAAS,EAAE,aAAa,CAAC,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC,CAAC;IAClD,KAAK,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;CACjC;AAED,UAAU,gBAAgB;IACxB,KAAK,EAAE,UAAU,EAAE,CAAC;IACpB,QAAQ,CAAC,EAAE,aAAa,CAAC,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC,GAAG,SAAS,CAAC;IAC9D,YAAY,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;CACxC;AAED,eAAO,MAAM,WAAW,EAAE,KAAK,CAAC,EAAE,CAAC,gBAAgB,CAsBlD,CAAC"}
|
|
@@ -0,0 +1,19 @@
|
|
|
1
|
+
import { jsx as _jsx, Fragment as _Fragment } from "react/jsx-runtime";
|
|
2
|
+
import { useRole } from '../hooks/useRole';
|
|
3
|
+
export const RoleBasedUI = ({ roles, fallback: Fallback, defaultProps = {}, }) => {
|
|
4
|
+
for (const config of roles) {
|
|
5
|
+
if (useRole(config.role)) {
|
|
6
|
+
const Component = config.component;
|
|
7
|
+
return _jsx(Component, { ...defaultProps, ...(config.props || {}) });
|
|
8
|
+
}
|
|
9
|
+
}
|
|
10
|
+
if (Fallback) {
|
|
11
|
+
if (typeof Fallback === 'function') {
|
|
12
|
+
const FallbackComponent = Fallback;
|
|
13
|
+
return _jsx(FallbackComponent, { ...defaultProps });
|
|
14
|
+
}
|
|
15
|
+
return _jsx(_Fragment, { children: Fallback });
|
|
16
|
+
}
|
|
17
|
+
return null;
|
|
18
|
+
};
|
|
19
|
+
//# sourceMappingURL=RoleBasedUI.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"RoleBasedUI.js","sourceRoot":"","sources":["../../src/components/RoleBasedUI.tsx"],"names":[],"mappings":";AACA,OAAO,EAAE,OAAO,EAAE,MAAM,kBAAkB,CAAC;AAc3C,MAAM,CAAC,MAAM,WAAW,GAA+B,CAAC,EACtD,KAAK,EACL,QAAQ,EAAE,QAAQ,EAClB,YAAY,GAAG,EAAE,GAClB,EAAE,EAAE;IACH,KAAK,MAAM,MAAM,IAAI,KAAK,EAAE,CAAC;QAE3B,IAAI,OAAO,CAAC,MAAM,CAAC,IAAI,CAAC,EAAE,CAAC;YACzB,MAAM,SAAS,GAAG,MAAM,CAAC,SAAS,CAAC;YACnC,OAAO,KAAC,SAAS,OAAK,YAAY,KAAM,CAAC,MAAM,CAAC,KAAK,IAAI,EAAE,CAAC,GAAI,CAAC;QACnE,CAAC;IACH,CAAC;IAED,IAAI,QAAQ,EAAE,CAAC;QACb,IAAI,OAAO,QAAQ,KAAK,UAAU,EAAE,CAAC;YACnC,MAAM,iBAAiB,GAAG,QAAkD,CAAC;YAC7E,OAAO,KAAC,iBAAiB,OAAK,YAAY,GAAI,CAAC;QACjD,CAAC;QACD,OAAO,4BAAG,QAAQ,GAAI,CAAC;IACzB,CAAC;IAED,OAAO,IAAI,CAAC;AACd,CAAC,CAAC"}
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
export interface AuthConfig {
|
|
2
|
+
apiBaseUrl: string;
|
|
3
|
+
clientId?: string;
|
|
4
|
+
clientSecret?: string;
|
|
5
|
+
scope?: string;
|
|
6
|
+
redirectUri?: string;
|
|
7
|
+
enableLogging?: boolean;
|
|
8
|
+
}
|
|
9
|
+
export declare function setAuthConfig(newConfig: Partial<AuthConfig>): void;
|
|
10
|
+
export declare function getAuthConfig(): AuthConfig;
|
|
11
|
+
export declare function resetAuthConfig(): void;
|
|
12
|
+
//# sourceMappingURL=authConfig.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"authConfig.d.ts","sourceRoot":"","sources":["../../src/config/authConfig.ts"],"names":[],"mappings":"AAAA,MAAM,WAAW,UAAU;IACzB,UAAU,EAAE,MAAM,CAAC;IACnB,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,aAAa,CAAC,EAAE,OAAO,CAAC;CACzB;AAOD,wBAAgB,aAAa,CAAC,SAAS,EAAE,OAAO,CAAC,UAAU,CAAC,GAAG,IAAI,CAKlE;AAED,wBAAgB,aAAa,IAAI,UAAU,CAO1C;AAED,wBAAgB,eAAe,IAAI,IAAI,CAKtC"}
|
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
let config = {
|
|
2
|
+
apiBaseUrl: '',
|
|
3
|
+
enableLogging: false,
|
|
4
|
+
};
|
|
5
|
+
export function setAuthConfig(newConfig) {
|
|
6
|
+
config = { ...config, ...newConfig };
|
|
7
|
+
if (config.enableLogging) {
|
|
8
|
+
console.log('Auth config updated:', config);
|
|
9
|
+
}
|
|
10
|
+
}
|
|
11
|
+
export function getAuthConfig() {
|
|
12
|
+
if (!config.apiBaseUrl) {
|
|
13
|
+
throw new Error('[xeno/auth-sdk] apiBaseUrl is not set. Call setAuthConfig({ apiBaseUrl: "https://your-api.com" }) before using the SDK.');
|
|
14
|
+
}
|
|
15
|
+
return { ...config };
|
|
16
|
+
}
|
|
17
|
+
export function resetAuthConfig() {
|
|
18
|
+
config = {
|
|
19
|
+
apiBaseUrl: '',
|
|
20
|
+
enableLogging: false,
|
|
21
|
+
};
|
|
22
|
+
}
|
|
23
|
+
//# sourceMappingURL=authConfig.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"authConfig.js","sourceRoot":"","sources":["../../src/config/authConfig.ts"],"names":[],"mappings":"AASA,IAAI,MAAM,GAAe;IACvB,UAAU,EAAE,EAAE;IACd,aAAa,EAAE,KAAK;CACrB,CAAC;AAEF,MAAM,UAAU,aAAa,CAAC,SAA8B;IAC1D,MAAM,GAAG,EAAE,GAAG,MAAM,EAAE,GAAG,SAAS,EAAE,CAAC;IACrC,IAAI,MAAM,CAAC,aAAa,EAAE,CAAC;QACzB,OAAO,CAAC,GAAG,CAAC,sBAAsB,EAAE,MAAM,CAAC,CAAC;IAC9C,CAAC;AACH,CAAC;AAED,MAAM,UAAU,aAAa;IAC3B,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,CAAC;QACvB,MAAM,IAAI,KAAK,CACb,yHAAyH,CAC1H,CAAC;IACJ,CAAC;IACD,OAAO,EAAE,GAAG,MAAM,EAAE,CAAC;AACvB,CAAC;AAED,MAAM,UAAU,eAAe;IAC7B,MAAM,GAAG;QACP,UAAU,EAAE,EAAE;QACd,aAAa,EAAE,KAAK;KACrB,CAAC;AACJ,CAAC"}
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
import { UserAuthInfoDto } from '../api/types';
|
|
2
|
+
export interface AuthContextType {
|
|
3
|
+
authInfo: UserAuthInfoDto | null;
|
|
4
|
+
isLoading: boolean;
|
|
5
|
+
isAuthenticated: boolean;
|
|
6
|
+
token: string | null;
|
|
7
|
+
error: string | null;
|
|
8
|
+
login: (username: string, password: string) => Promise<void>;
|
|
9
|
+
logout: () => Promise<void>;
|
|
10
|
+
refreshAuthInfo: () => Promise<void>;
|
|
11
|
+
hasPermission: (permission: string) => boolean;
|
|
12
|
+
hasRole: (role: string | string[]) => boolean;
|
|
13
|
+
hasFeature: (feature: string) => boolean;
|
|
14
|
+
canAccessPage: (pageName: string) => boolean;
|
|
15
|
+
}
|
|
16
|
+
export declare const AuthContext: import("react").Context<AuthContextType | undefined>;
|
|
17
|
+
//# sourceMappingURL=AuthContext.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"AuthContext.d.ts","sourceRoot":"","sources":["../../src/context/AuthContext.tsx"],"names":[],"mappings":"AACA,OAAO,EAAE,eAAe,EAAE,MAAM,cAAc,CAAC;AAE/C,MAAM,WAAW,eAAe;IAC9B,QAAQ,EAAE,eAAe,GAAG,IAAI,CAAC;IACjC,SAAS,EAAE,OAAO,CAAC;IACnB,eAAe,EAAE,OAAO,CAAC;IACzB,KAAK,EAAE,MAAM,GAAG,IAAI,CAAC;IACrB,KAAK,EAAE,MAAM,GAAG,IAAI,CAAC;IAErB,KAAK,EAAE,CAAC,QAAQ,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,OAAO,CAAC,IAAI,CAAC,CAAC;IAC7D,MAAM,EAAE,MAAM,OAAO,CAAC,IAAI,CAAC,CAAC;IAC5B,eAAe,EAAE,MAAM,OAAO,CAAC,IAAI,CAAC,CAAC;IAErC,aAAa,EAAE,CAAC,UAAU,EAAE,MAAM,KAAK,OAAO,CAAC;IAC/C,OAAO,EAAE,CAAC,IAAI,EAAE,MAAM,GAAG,MAAM,EAAE,KAAK,OAAO,CAAC;IAC9C,UAAU,EAAE,CAAC,OAAO,EAAE,MAAM,KAAK,OAAO,CAAC;IACzC,aAAa,EAAE,CAAC,QAAQ,EAAE,MAAM,KAAK,OAAO,CAAC;CAC9C;AAED,eAAO,MAAM,WAAW,sDAAwD,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"AuthContext.js","sourceRoot":"","sources":["../../src/context/AuthContext.tsx"],"names":[],"mappings":"AAAA,OAAO,EAAE,aAAa,EAAE,MAAM,OAAO,CAAC;AAoBtC,MAAM,CAAC,MAAM,WAAW,GAAG,aAAa,CAA8B,SAAS,CAAC,CAAC;AAEjF,IAAI,OAAO,CAAC,GAAG,CAAC,QAAQ,KAAK,aAAa,EAAE,CAAC;IAC3C,WAAW,CAAC,WAAW,GAAG,aAAa,CAAC;AAC1C,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"AuthProvider.d.ts","sourceRoot":"","sources":["../../src/context/AuthProvider.tsx"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,EAA4C,SAAS,EAAE,MAAM,OAAO,CAAC;AAYnF,UAAU,iBAAiB;IACzB,QAAQ,EAAE,SAAS,CAAC;CACrB;AAID,eAAO,MAAM,YAAY,EAAE,KAAK,CAAC,EAAE,CAAC,iBAAiB,CAsNpD,CAAC"}
|
|
@@ -0,0 +1,193 @@
|
|
|
1
|
+
import { jsx as _jsx } from "react/jsx-runtime";
|
|
2
|
+
import { useEffect, useState, useRef, useCallback } from 'react';
|
|
3
|
+
import { AuthContext } from './AuthContext';
|
|
4
|
+
import { AuthApiClient } from '../api/authApiClient';
|
|
5
|
+
import { saveToken, getToken, clearToken, isTokenExpired, } from '../utils/tokenStorage';
|
|
6
|
+
import { getAuthConfig } from '../config/authConfig';
|
|
7
|
+
const REFRESH_INTERVAL = 5 * 60 * 1000;
|
|
8
|
+
export const AuthProvider = ({ children }) => {
|
|
9
|
+
const [authInfo, setAuthInfo] = useState(null);
|
|
10
|
+
const [token, setToken] = useState(null);
|
|
11
|
+
const [isLoading, setIsLoading] = useState(true);
|
|
12
|
+
const [error, setError] = useState(null);
|
|
13
|
+
const tokenRef = useRef(null);
|
|
14
|
+
const setTokenBoth = (newToken) => {
|
|
15
|
+
tokenRef.current = newToken;
|
|
16
|
+
setToken(newToken);
|
|
17
|
+
};
|
|
18
|
+
const config = getAuthConfig();
|
|
19
|
+
const [apiClient] = useState(() => new AuthApiClient(config.apiBaseUrl, () => tokenRef.current, handleUnauthorized));
|
|
20
|
+
const logout = useCallback(async () => {
|
|
21
|
+
try {
|
|
22
|
+
await apiClient.logout();
|
|
23
|
+
}
|
|
24
|
+
catch (err) {
|
|
25
|
+
console.error('Logout API call failed:', err);
|
|
26
|
+
}
|
|
27
|
+
finally {
|
|
28
|
+
await clearToken();
|
|
29
|
+
setTokenBoth(null);
|
|
30
|
+
setAuthInfo(null);
|
|
31
|
+
setError(null);
|
|
32
|
+
}
|
|
33
|
+
}, [apiClient]);
|
|
34
|
+
const refreshAuthInfo = useCallback(async () => {
|
|
35
|
+
try {
|
|
36
|
+
setIsLoading(true);
|
|
37
|
+
const info = await apiClient.getCurrentUserAuthInfo();
|
|
38
|
+
setAuthInfo(info);
|
|
39
|
+
setError(null);
|
|
40
|
+
}
|
|
41
|
+
catch (err) {
|
|
42
|
+
console.error('Failed to refresh auth info:', err);
|
|
43
|
+
setError('Failed to load user info');
|
|
44
|
+
await logout();
|
|
45
|
+
}
|
|
46
|
+
finally {
|
|
47
|
+
setIsLoading(false);
|
|
48
|
+
}
|
|
49
|
+
}, [apiClient, logout]);
|
|
50
|
+
useEffect(() => {
|
|
51
|
+
const initializeAuth = async () => {
|
|
52
|
+
try {
|
|
53
|
+
setIsLoading(true);
|
|
54
|
+
setError(null);
|
|
55
|
+
const storedToken = await getToken();
|
|
56
|
+
if (storedToken?.accessToken) {
|
|
57
|
+
if (await isTokenExpired()) {
|
|
58
|
+
if (storedToken.refreshToken) {
|
|
59
|
+
try {
|
|
60
|
+
const newToken = await apiClient.refreshToken(storedToken.refreshToken);
|
|
61
|
+
await saveToken({
|
|
62
|
+
accessToken: newToken.access_token,
|
|
63
|
+
refreshToken: storedToken.refreshToken,
|
|
64
|
+
expiresAt: newToken.expires_in,
|
|
65
|
+
});
|
|
66
|
+
setTokenBoth(newToken.access_token);
|
|
67
|
+
await refreshAuthInfo();
|
|
68
|
+
}
|
|
69
|
+
catch {
|
|
70
|
+
setError('Token refresh failed');
|
|
71
|
+
await clearToken();
|
|
72
|
+
setTokenBoth(null);
|
|
73
|
+
}
|
|
74
|
+
}
|
|
75
|
+
else {
|
|
76
|
+
await clearToken();
|
|
77
|
+
setTokenBoth(null);
|
|
78
|
+
}
|
|
79
|
+
}
|
|
80
|
+
else {
|
|
81
|
+
setTokenBoth(storedToken.accessToken);
|
|
82
|
+
await refreshAuthInfo();
|
|
83
|
+
}
|
|
84
|
+
}
|
|
85
|
+
}
|
|
86
|
+
catch (err) {
|
|
87
|
+
console.error('Auth initialization failed:', err);
|
|
88
|
+
setError('Failed to initialize auth');
|
|
89
|
+
}
|
|
90
|
+
finally {
|
|
91
|
+
setIsLoading(false);
|
|
92
|
+
}
|
|
93
|
+
};
|
|
94
|
+
initializeAuth();
|
|
95
|
+
}, []);
|
|
96
|
+
function handleUnauthorized() {
|
|
97
|
+
logout();
|
|
98
|
+
}
|
|
99
|
+
useEffect(() => {
|
|
100
|
+
if (typeof window !== 'undefined') {
|
|
101
|
+
const listener = () => handleUnauthorized();
|
|
102
|
+
window.addEventListener('auth:unauthorized', listener);
|
|
103
|
+
return () => window.removeEventListener('auth:unauthorized', listener);
|
|
104
|
+
}
|
|
105
|
+
}, []);
|
|
106
|
+
useEffect(() => {
|
|
107
|
+
if (!token)
|
|
108
|
+
return;
|
|
109
|
+
const interval = setInterval(async () => {
|
|
110
|
+
const expired = await isTokenExpired();
|
|
111
|
+
if (expired) {
|
|
112
|
+
const storedToken = await getToken();
|
|
113
|
+
if (storedToken?.refreshToken) {
|
|
114
|
+
try {
|
|
115
|
+
const newToken = await apiClient.refreshToken(storedToken.refreshToken);
|
|
116
|
+
await saveToken({
|
|
117
|
+
accessToken: newToken.access_token,
|
|
118
|
+
refreshToken: storedToken.refreshToken,
|
|
119
|
+
expiresAt: newToken.expires_in,
|
|
120
|
+
});
|
|
121
|
+
setTokenBoth(newToken.access_token);
|
|
122
|
+
}
|
|
123
|
+
catch (err) {
|
|
124
|
+
console.error('Auto refresh failed:', err);
|
|
125
|
+
logout();
|
|
126
|
+
}
|
|
127
|
+
}
|
|
128
|
+
}
|
|
129
|
+
}, REFRESH_INTERVAL);
|
|
130
|
+
return () => clearInterval(interval);
|
|
131
|
+
}, [token, apiClient, logout]);
|
|
132
|
+
const login = useCallback(async (username, password) => {
|
|
133
|
+
try {
|
|
134
|
+
setIsLoading(true);
|
|
135
|
+
setError(null);
|
|
136
|
+
const response = await apiClient.login({ username, password });
|
|
137
|
+
await saveToken({
|
|
138
|
+
accessToken: response.access_token,
|
|
139
|
+
refreshToken: response.refresh_token,
|
|
140
|
+
expiresAt: response.expires_in,
|
|
141
|
+
});
|
|
142
|
+
setTokenBoth(response.access_token);
|
|
143
|
+
await refreshAuthInfo();
|
|
144
|
+
}
|
|
145
|
+
catch (err) {
|
|
146
|
+
const errorMsg = err instanceof Error ? err.message : 'Login failed';
|
|
147
|
+
setError(errorMsg);
|
|
148
|
+
throw err;
|
|
149
|
+
}
|
|
150
|
+
finally {
|
|
151
|
+
setIsLoading(false);
|
|
152
|
+
}
|
|
153
|
+
}, [apiClient, refreshAuthInfo]);
|
|
154
|
+
const hasPermission = useCallback((permission) => {
|
|
155
|
+
if (!authInfo)
|
|
156
|
+
return false;
|
|
157
|
+
return authInfo.permissions[permission] ?? false;
|
|
158
|
+
}, [authInfo]);
|
|
159
|
+
const hasRole = useCallback((role) => {
|
|
160
|
+
if (!authInfo)
|
|
161
|
+
return false;
|
|
162
|
+
if (Array.isArray(role)) {
|
|
163
|
+
return role.some((r) => authInfo.roles.includes(r));
|
|
164
|
+
}
|
|
165
|
+
return authInfo.roles.includes(role);
|
|
166
|
+
}, [authInfo]);
|
|
167
|
+
const hasFeature = useCallback((feature) => {
|
|
168
|
+
if (!authInfo)
|
|
169
|
+
return false;
|
|
170
|
+
return authInfo.features[feature] ?? false;
|
|
171
|
+
}, [authInfo]);
|
|
172
|
+
const canAccessPage = useCallback((pageName) => {
|
|
173
|
+
if (!authInfo)
|
|
174
|
+
return false;
|
|
175
|
+
return authInfo.accessiblePages.includes(pageName);
|
|
176
|
+
}, [authInfo]);
|
|
177
|
+
const value = {
|
|
178
|
+
authInfo,
|
|
179
|
+
isLoading,
|
|
180
|
+
isAuthenticated: !!token && !!authInfo,
|
|
181
|
+
token,
|
|
182
|
+
error,
|
|
183
|
+
login,
|
|
184
|
+
logout,
|
|
185
|
+
refreshAuthInfo,
|
|
186
|
+
hasPermission,
|
|
187
|
+
hasRole,
|
|
188
|
+
hasFeature,
|
|
189
|
+
canAccessPage,
|
|
190
|
+
};
|
|
191
|
+
return _jsx(AuthContext.Provider, { value: value, children: children });
|
|
192
|
+
};
|
|
193
|
+
//# sourceMappingURL=AuthProvider.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"AuthProvider.js","sourceRoot":"","sources":["../../src/context/AuthProvider.tsx"],"names":[],"mappings":";AAAA,OAAc,EAAE,SAAS,EAAE,QAAQ,EAAE,MAAM,EAAE,WAAW,EAAa,MAAM,OAAO,CAAC;AACnF,OAAO,EAAE,WAAW,EAAmB,MAAM,eAAe,CAAC;AAC7D,OAAO,EAAE,aAAa,EAAE,MAAM,sBAAsB,CAAC;AAErD,OAAO,EACL,SAAS,EACT,QAAQ,EACR,UAAU,EACV,cAAc,GACf,MAAM,uBAAuB,CAAC;AAC/B,OAAO,EAAE,aAAa,EAAE,MAAM,sBAAsB,CAAC;AAMrD,MAAM,gBAAgB,GAAG,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC;AAEvC,MAAM,CAAC,MAAM,YAAY,GAAgC,CAAC,EAAE,QAAQ,EAAE,EAAE,EAAE;IACxE,MAAM,CAAC,QAAQ,EAAE,WAAW,CAAC,GAAG,QAAQ,CAAyB,IAAI,CAAC,CAAC;IACvE,MAAM,CAAC,KAAK,EAAE,QAAQ,CAAC,GAAG,QAAQ,CAAgB,IAAI,CAAC,CAAC;IACxD,MAAM,CAAC,SAAS,EAAE,YAAY,CAAC,GAAG,QAAQ,CAAC,IAAI,CAAC,CAAC;IACjD,MAAM,CAAC,KAAK,EAAE,QAAQ,CAAC,GAAG,QAAQ,CAAgB,IAAI,CAAC,CAAC;IAGxD,MAAM,QAAQ,GAAG,MAAM,CAAgB,IAAI,CAAC,CAAC;IAE7C,MAAM,YAAY,GAAG,CAAC,QAAuB,EAAE,EAAE;QAC/C,QAAQ,CAAC,OAAO,GAAG,QAAQ,CAAC;QAC5B,QAAQ,CAAC,QAAQ,CAAC,CAAC;IACrB,CAAC,CAAC;IAEF,MAAM,MAAM,GAAG,aAAa,EAAE,CAAC;IAC/B,MAAM,CAAC,SAAS,CAAC,GAAG,QAAQ,CAC1B,GAAG,EAAE,CAAC,IAAI,aAAa,CAAC,MAAM,CAAC,UAAU,EAAE,GAAG,EAAE,CAAC,QAAQ,CAAC,OAAO,EAAE,kBAAkB,CAAC,CACvF,CAAC;IAEF,MAAM,MAAM,GAAG,WAAW,CAAC,KAAK,IAAI,EAAE;QACpC,IAAI,CAAC;YACH,MAAM,SAAS,CAAC,MAAM,EAAE,CAAC;QAC3B,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,KAAK,CAAC,yBAAyB,EAAE,GAAG,CAAC,CAAC;QAChD,CAAC;gBAAS,CAAC;YACT,MAAM,UAAU,EAAE,CAAC;YACnB,YAAY,CAAC,IAAI,CAAC,CAAC;YACnB,WAAW,CAAC,IAAI,CAAC,CAAC;YAClB,QAAQ,CAAC,IAAI,CAAC,CAAC;QACjB,CAAC;IACH,CAAC,EAAE,CAAC,SAAS,CAAC,CAAC,CAAC;IAEhB,MAAM,eAAe,GAAG,WAAW,CAAC,KAAK,IAAI,EAAE;QAC7C,IAAI,CAAC;YACH,YAAY,CAAC,IAAI,CAAC,CAAC;YACnB,MAAM,IAAI,GAAG,MAAM,SAAS,CAAC,sBAAsB,EAAE,CAAC;YACtD,WAAW,CAAC,IAAI,CAAC,CAAC;YAClB,QAAQ,CAAC,IAAI,CAAC,CAAC;QACjB,CAAC;QAAC,OAAO,GAAY,EAAE,CAAC;YACtB,OAAO,CAAC,KAAK,CAAC,8BAA8B,EAAE,GAAG,CAAC,CAAC;YACnD,QAAQ,CAAC,0BAA0B,CAAC,CAAC;YACrC,MAAM,MAAM,EAAE,CAAC;QACjB,CAAC;gBAAS,CAAC;YACT,YAAY,CAAC,KAAK,CAAC,CAAC;QACtB,CAAC;IACH,CAAC,EAAE,CAAC,SAAS,EAAE,MAAM,CAAC,CAAC,CAAC;IAExB,SAAS,CAAC,GAAG,EAAE;QACb,MAAM,cAAc,GAAG,KAAK,IAAI,EAAE;YAChC,IAAI,CAAC;gBACH,YAAY,CAAC,IAAI,CAAC,CAAC;gBACnB,QAAQ,CAAC,IAAI,CAAC,CAAC;gBAEf,MAAM,WAAW,GAAG,MAAM,QAAQ,EAAE,CAAC;gBAErC,IAAI,WAAW,EAAE,WAAW,EAAE,CAAC;oBAC7B,IAAI,MAAM,cAAc,EAAE,EAAE,CAAC;wBAC3B,IAAI,WAAW,CAAC,YAAY,EAAE,CAAC;4BAC7B,IAAI,CAAC;gCACH,MAAM,QAAQ,GAAG,MAAM,SAAS,CAAC,YAAY,CAC3C,WAAW,CAAC,YAAY,CACzB,CAAC;gCACF,MAAM,SAAS,CAAC;oCACd,WAAW,EAAE,QAAQ,CAAC,YAAY;oCAClC,YAAY,EAAE,WAAW,CAAC,YAAY;oCACtC,SAAS,EAAE,QAAQ,CAAC,UAAU;iCAC/B,CAAC,CAAC;gCACH,YAAY,CAAC,QAAQ,CAAC,YAAY,CAAC,CAAC;gCACpC,MAAM,eAAe,EAAE,CAAC;4BAC1B,CAAC;4BAAC,MAAM,CAAC;gCACP,QAAQ,CAAC,sBAAsB,CAAC,CAAC;gCACjC,MAAM,UAAU,EAAE,CAAC;gCACnB,YAAY,CAAC,IAAI,CAAC,CAAC;4BACrB,CAAC;wBACH,CAAC;6BAAM,CAAC;4BACN,MAAM,UAAU,EAAE,CAAC;4BACnB,YAAY,CAAC,IAAI,CAAC,CAAC;wBACrB,CAAC;oBACH,CAAC;yBAAM,CAAC;wBACN,YAAY,CAAC,WAAW,CAAC,WAAW,CAAC,CAAC;wBACtC,MAAM,eAAe,EAAE,CAAC;oBAC1B,CAAC;gBACH,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,KAAK,CAAC,6BAA6B,EAAE,GAAG,CAAC,CAAC;gBAClD,QAAQ,CAAC,2BAA2B,CAAC,CAAC;YACxC,CAAC;oBAAS,CAAC;gBACT,YAAY,CAAC,KAAK,CAAC,CAAC;YACtB,CAAC;QACH,CAAC,CAAC;QAEF,cAAc,EAAE,CAAC;IACnB,CAAC,EAAE,EAAE,CAAC,CAAC;IAEP,SAAS,kBAAkB;QACzB,MAAM,EAAE,CAAC;IACX,CAAC;IAED,SAAS,CAAC,GAAG,EAAE;QACb,IAAI,OAAO,MAAM,KAAK,WAAW,EAAE,CAAC;YAClC,MAAM,QAAQ,GAAG,GAAG,EAAE,CAAC,kBAAkB,EAAE,CAAC;YAC5C,MAAM,CAAC,gBAAgB,CAAC,mBAAmB,EAAE,QAAQ,CAAC,CAAC;YACvD,OAAO,GAAG,EAAE,CAAC,MAAM,CAAC,mBAAmB,CAAC,mBAAmB,EAAE,QAAQ,CAAC,CAAC;QACzE,CAAC;IACH,CAAC,EAAE,EAAE,CAAC,CAAC;IAEP,SAAS,CAAC,GAAG,EAAE;QACb,IAAI,CAAC,KAAK;YAAE,OAAO;QAEnB,MAAM,QAAQ,GAAG,WAAW,CAAC,KAAK,IAAI,EAAE;YACtC,MAAM,OAAO,GAAG,MAAM,cAAc,EAAE,CAAC;YACvC,IAAI,OAAO,EAAE,CAAC;gBACZ,MAAM,WAAW,GAAG,MAAM,QAAQ,EAAE,CAAC;gBACrC,IAAI,WAAW,EAAE,YAAY,EAAE,CAAC;oBAC9B,IAAI,CAAC;wBACH,MAAM,QAAQ,GAAG,MAAM,SAAS,CAAC,YAAY,CAC3C,WAAW,CAAC,YAAY,CACzB,CAAC;wBACF,MAAM,SAAS,CAAC;4BACd,WAAW,EAAE,QAAQ,CAAC,YAAY;4BAClC,YAAY,EAAE,WAAW,CAAC,YAAY;4BACtC,SAAS,EAAE,QAAQ,CAAC,UAAU;yBAC/B,CAAC,CAAC;wBACH,YAAY,CAAC,QAAQ,CAAC,YAAY,CAAC,CAAC;oBACtC,CAAC;oBAAC,OAAO,GAAG,EAAE,CAAC;wBACb,OAAO,CAAC,KAAK,CAAC,sBAAsB,EAAE,GAAG,CAAC,CAAC;wBAC3C,MAAM,EAAE,CAAC;oBACX,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC,EAAE,gBAAgB,CAAC,CAAC;QAErB,OAAO,GAAG,EAAE,CAAC,aAAa,CAAC,QAAQ,CAAC,CAAC;IACvC,CAAC,EAAE,CAAC,KAAK,EAAE,SAAS,EAAE,MAAM,CAAC,CAAC,CAAC;IAE/B,MAAM,KAAK,GAAG,WAAW,CACvB,KAAK,EAAE,QAAgB,EAAE,QAAgB,EAAE,EAAE;QAC3C,IAAI,CAAC;YACH,YAAY,CAAC,IAAI,CAAC,CAAC;YACnB,QAAQ,CAAC,IAAI,CAAC,CAAC;YAEf,MAAM,QAAQ,GAAG,MAAM,SAAS,CAAC,KAAK,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC,CAAC;YAE/D,MAAM,SAAS,CAAC;gBACd,WAAW,EAAE,QAAQ,CAAC,YAAY;gBAClC,YAAY,EAAE,QAAQ,CAAC,aAAa;gBACpC,SAAS,EAAE,QAAQ,CAAC,UAAU;aAC/B,CAAC,CAAC;YAGH,YAAY,CAAC,QAAQ,CAAC,YAAY,CAAC,CAAC;YACpC,MAAM,eAAe,EAAE,CAAC;QAC1B,CAAC;QAAC,OAAO,GAAY,EAAE,CAAC;YACtB,MAAM,QAAQ,GAAG,GAAG,YAAY,KAAK,CAAC,CAAC,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC,CAAC,cAAc,CAAC;YACrE,QAAQ,CAAC,QAAQ,CAAC,CAAC;YACnB,MAAM,GAAG,CAAC;QACZ,CAAC;gBAAS,CAAC;YACT,YAAY,CAAC,KAAK,CAAC,CAAC;QACtB,CAAC;IACH,CAAC,EACD,CAAC,SAAS,EAAE,eAAe,CAAC,CAC7B,CAAC;IAEF,MAAM,aAAa,GAAG,WAAW,CAC/B,CAAC,UAAkB,EAAW,EAAE;QAC9B,IAAI,CAAC,QAAQ;YAAE,OAAO,KAAK,CAAC;QAC5B,OAAO,QAAQ,CAAC,WAAW,CAAC,UAAU,CAAC,IAAI,KAAK,CAAC;IACnD,CAAC,EACD,CAAC,QAAQ,CAAC,CACX,CAAC;IAEF,MAAM,OAAO,GAAG,WAAW,CACzB,CAAC,IAAuB,EAAW,EAAE;QACnC,IAAI,CAAC,QAAQ;YAAE,OAAO,KAAK,CAAC;QAC5B,IAAI,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;YACxB,OAAO,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC;QACtD,CAAC;QACD,OAAO,QAAQ,CAAC,KAAK,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC;IACvC,CAAC,EACD,CAAC,QAAQ,CAAC,CACX,CAAC;IAEF,MAAM,UAAU,GAAG,WAAW,CAC5B,CAAC,OAAe,EAAW,EAAE;QAC3B,IAAI,CAAC,QAAQ;YAAE,OAAO,KAAK,CAAC;QAC5B,OAAO,QAAQ,CAAC,QAAQ,CAAC,OAAO,CAAC,IAAI,KAAK,CAAC;IAC7C,CAAC,EACD,CAAC,QAAQ,CAAC,CACX,CAAC;IAEF,MAAM,aAAa,GAAG,WAAW,CAC/B,CAAC,QAAgB,EAAW,EAAE;QAC5B,IAAI,CAAC,QAAQ;YAAE,OAAO,KAAK,CAAC;QAC5B,OAAO,QAAQ,CAAC,eAAe,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;IACrD,CAAC,EACD,CAAC,QAAQ,CAAC,CACX,CAAC;IAEF,MAAM,KAAK,GAAoB;QAC7B,QAAQ;QACR,SAAS;QACT,eAAe,EAAE,CAAC,CAAC,KAAK,IAAI,CAAC,CAAC,QAAQ;QACtC,KAAK;QACL,KAAK;QACL,KAAK;QACL,MAAM;QACN,eAAe;QACf,aAAa;QACb,OAAO;QACP,UAAU;QACV,aAAa;KACd,CAAC;IAEF,OAAO,KAAC,WAAW,CAAC,QAAQ,IAAC,KAAK,EAAE,KAAK,YAAG,QAAQ,GAAwB,CAAC;AAC/E,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"useAuth.d.ts","sourceRoot":"","sources":["../../src/hooks/useAuth.ts"],"names":[],"mappings":"AACA,OAAO,EAAe,eAAe,EAAE,MAAM,wBAAwB,CAAC;AAEtE,wBAAgB,OAAO,IAAI,eAAe,CAWzC"}
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
import { useContext } from 'react';
|
|
2
|
+
import { AuthContext } from '../context/AuthContext';
|
|
3
|
+
export function useAuth() {
|
|
4
|
+
const context = useContext(AuthContext);
|
|
5
|
+
if (!context) {
|
|
6
|
+
throw new Error('useAuth must be used within an AuthProvider. ' +
|
|
7
|
+
'Make sure your component is wrapped with <AuthProvider>.');
|
|
8
|
+
}
|
|
9
|
+
return context;
|
|
10
|
+
}
|
|
11
|
+
//# sourceMappingURL=useAuth.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"useAuth.js","sourceRoot":"","sources":["../../src/hooks/useAuth.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,OAAO,CAAC;AACnC,OAAO,EAAE,WAAW,EAAmB,MAAM,wBAAwB,CAAC;AAEtE,MAAM,UAAU,OAAO;IACrB,MAAM,OAAO,GAAG,UAAU,CAAC,WAAW,CAAC,CAAC;IAExC,IAAI,CAAC,OAAO,EAAE,CAAC;QACb,MAAM,IAAI,KAAK,CACb,+CAA+C;YAC7C,0DAA0D,CAC7D,CAAC;IACJ,CAAC;IAED,OAAO,OAAO,CAAC;AACjB,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"useFeature.d.ts","sourceRoot":"","sources":["../../src/hooks/useFeature.ts"],"names":[],"mappings":"AAEA,wBAAgB,UAAU,CAAC,OAAO,EAAE,MAAM,GAAG,MAAM,EAAE,GAAG,OAAO,CAQ9D"}
|
|
@@ -0,0 +1,9 @@
|
|
|
1
|
+
import { useAuth } from './useAuth';
|
|
2
|
+
export function useFeature(feature) {
|
|
3
|
+
const { hasFeature } = useAuth();
|
|
4
|
+
if (Array.isArray(feature)) {
|
|
5
|
+
return feature.some((f) => hasFeature(f));
|
|
6
|
+
}
|
|
7
|
+
return hasFeature(feature);
|
|
8
|
+
}
|
|
9
|
+
//# sourceMappingURL=useFeature.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"useFeature.js","sourceRoot":"","sources":["../../src/hooks/useFeature.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,OAAO,EAAE,MAAM,WAAW,CAAC;AAEpC,MAAM,UAAU,UAAU,CAAC,OAA0B;IACnD,MAAM,EAAE,UAAU,EAAE,GAAG,OAAO,EAAE,CAAC;IAEjC,IAAI,KAAK,CAAC,OAAO,CAAC,OAAO,CAAC,EAAE,CAAC;QAC3B,OAAO,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC;IAC5C,CAAC;IAED,OAAO,UAAU,CAAC,OAAO,CAAC,CAAC;AAC7B,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"usePermission.d.ts","sourceRoot":"","sources":["../../src/hooks/usePermission.ts"],"names":[],"mappings":"AAEA,wBAAgB,aAAa,CAAC,UAAU,EAAE,MAAM,GAAG,MAAM,EAAE,GAAG,OAAO,CAQpE"}
|
|
@@ -0,0 +1,9 @@
|
|
|
1
|
+
import { useAuth } from './useAuth';
|
|
2
|
+
export function usePermission(permission) {
|
|
3
|
+
const { hasPermission } = useAuth();
|
|
4
|
+
if (Array.isArray(permission)) {
|
|
5
|
+
return permission.some((p) => hasPermission(p));
|
|
6
|
+
}
|
|
7
|
+
return hasPermission(permission);
|
|
8
|
+
}
|
|
9
|
+
//# sourceMappingURL=usePermission.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"usePermission.js","sourceRoot":"","sources":["../../src/hooks/usePermission.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,OAAO,EAAE,MAAM,WAAW,CAAC;AAEpC,MAAM,UAAU,aAAa,CAAC,UAA6B;IACzD,MAAM,EAAE,aAAa,EAAE,GAAG,OAAO,EAAE,CAAC;IAEpC,IAAI,KAAK,CAAC,OAAO,CAAC,UAAU,CAAC,EAAE,CAAC;QAC9B,OAAO,UAAU,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,CAAC;IAClD,CAAC;IAED,OAAO,aAAa,CAAC,UAAU,CAAC,CAAC;AACnC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"useRole.d.ts","sourceRoot":"","sources":["../../src/hooks/useRole.ts"],"names":[],"mappings":"AAEA,wBAAgB,OAAO,CAAC,IAAI,EAAE,MAAM,GAAG,MAAM,EAAE,GAAG,OAAO,CAGxD"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"useRole.js","sourceRoot":"","sources":["../../src/hooks/useRole.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,OAAO,EAAE,MAAM,WAAW,CAAC;AAEpC,MAAM,UAAU,OAAO,CAAC,IAAuB;IAC7C,MAAM,EAAE,OAAO,EAAE,GAAG,OAAO,EAAE,CAAC;IAC9B,OAAO,OAAO,CAAC,IAAI,CAAC,CAAC;AACvB,CAAC"}
|
package/dist/index.d.ts
ADDED
|
@@ -0,0 +1,22 @@
|
|
|
1
|
+
export { AuthContext } from './context/AuthContext';
|
|
2
|
+
export type { AuthContextType } from './context/AuthContext';
|
|
3
|
+
export { AuthProvider } from './context/AuthProvider';
|
|
4
|
+
export { useAuth } from './hooks/useAuth';
|
|
5
|
+
export { usePermission } from './hooks/usePermission';
|
|
6
|
+
export { useRole } from './hooks/useRole';
|
|
7
|
+
export { useFeature } from './hooks/useFeature';
|
|
8
|
+
export { ProtectedRoute } from './components/ProtectedRoute';
|
|
9
|
+
export { ProtectedComponent } from './components/ProtectedComponent';
|
|
10
|
+
export { PermissionGate } from './components/PermissionGate';
|
|
11
|
+
export { RoleBasedUI } from './components/RoleBasedUI';
|
|
12
|
+
export type { RoleConfig } from './components/RoleBasedUI';
|
|
13
|
+
export { AuthApiClient } from './api/authApiClient';
|
|
14
|
+
export type { UserAuthInfoDto, RoleFeatureDto, TokenResponse, LoginRequest, AuthError, } from './api/types';
|
|
15
|
+
export { setAuthConfig, getAuthConfig, resetAuthConfig } from './config/authConfig';
|
|
16
|
+
export type { AuthConfig } from './config/authConfig';
|
|
17
|
+
export { initializeStorage } from './utils/tokenStorage';
|
|
18
|
+
export type { StorageImplementation, TokenStore } from './utils/tokenStorage';
|
|
19
|
+
export { decodeJWT, isTokenExpired, getTokenExpirationTime, getTokenTimeRemaining, } from './utils/tokenDecoder';
|
|
20
|
+
export type { DecodedToken } from './utils/tokenDecoder';
|
|
21
|
+
export { checkPermissions, checkRoles, filterByPermission, filterByRole, } from './utils/permissionHelper';
|
|
22
|
+
//# sourceMappingURL=index.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,WAAW,EAAE,MAAM,uBAAuB,CAAC;AACpD,YAAY,EAAE,eAAe,EAAE,MAAM,uBAAuB,CAAC;AAC7D,OAAO,EAAE,YAAY,EAAE,MAAM,wBAAwB,CAAC;AAGtD,OAAO,EAAE,OAAO,EAAE,MAAM,iBAAiB,CAAC;AAC1C,OAAO,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AACtD,OAAO,EAAE,OAAO,EAAE,MAAM,iBAAiB,CAAC;AAC1C,OAAO,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AAGhD,OAAO,EAAE,cAAc,EAAE,MAAM,6BAA6B,CAAC;AAC7D,OAAO,EAAE,kBAAkB,EAAE,MAAM,iCAAiC,CAAC;AACrE,OAAO,EAAE,cAAc,EAAE,MAAM,6BAA6B,CAAC;AAC7D,OAAO,EAAE,WAAW,EAAE,MAAM,0BAA0B,CAAC;AACvD,YAAY,EAAE,UAAU,EAAE,MAAM,0BAA0B,CAAC;AAG3D,OAAO,EAAE,aAAa,EAAE,MAAM,qBAAqB,CAAC;AACpD,YAAY,EACV,eAAe,EACf,cAAc,EACd,aAAa,EACb,YAAY,EACZ,SAAS,GACV,MAAM,aAAa,CAAC;AAGrB,OAAO,EAAE,aAAa,EAAE,aAAa,EAAE,eAAe,EAAE,MAAM,qBAAqB,CAAC;AACpF,YAAY,EAAE,UAAU,EAAE,MAAM,qBAAqB,CAAC;AAGtD,OAAO,EAAE,iBAAiB,EAAE,MAAM,sBAAsB,CAAC;AACzD,YAAY,EAAE,qBAAqB,EAAE,UAAU,EAAE,MAAM,sBAAsB,CAAC;AAG9E,OAAO,EACL,SAAS,EACT,cAAc,EACd,sBAAsB,EACtB,qBAAqB,GACtB,MAAM,sBAAsB,CAAC;AAC9B,YAAY,EAAE,YAAY,EAAE,MAAM,sBAAsB,CAAC;AAGzD,OAAO,EACL,gBAAgB,EAChB,UAAU,EACV,kBAAkB,EAClB,YAAY,GACb,MAAM,0BAA0B,CAAC"}
|
package/dist/index.js
ADDED
|
@@ -0,0 +1,16 @@
|
|
|
1
|
+
export { AuthContext } from './context/AuthContext';
|
|
2
|
+
export { AuthProvider } from './context/AuthProvider';
|
|
3
|
+
export { useAuth } from './hooks/useAuth';
|
|
4
|
+
export { usePermission } from './hooks/usePermission';
|
|
5
|
+
export { useRole } from './hooks/useRole';
|
|
6
|
+
export { useFeature } from './hooks/useFeature';
|
|
7
|
+
export { ProtectedRoute } from './components/ProtectedRoute';
|
|
8
|
+
export { ProtectedComponent } from './components/ProtectedComponent';
|
|
9
|
+
export { PermissionGate } from './components/PermissionGate';
|
|
10
|
+
export { RoleBasedUI } from './components/RoleBasedUI';
|
|
11
|
+
export { AuthApiClient } from './api/authApiClient';
|
|
12
|
+
export { setAuthConfig, getAuthConfig, resetAuthConfig } from './config/authConfig';
|
|
13
|
+
export { initializeStorage } from './utils/tokenStorage';
|
|
14
|
+
export { decodeJWT, isTokenExpired, getTokenExpirationTime, getTokenTimeRemaining, } from './utils/tokenDecoder';
|
|
15
|
+
export { checkPermissions, checkRoles, filterByPermission, filterByRole, } from './utils/permissionHelper';
|
|
16
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,WAAW,EAAE,MAAM,uBAAuB,CAAC;AAEpD,OAAO,EAAE,YAAY,EAAE,MAAM,wBAAwB,CAAC;AAGtD,OAAO,EAAE,OAAO,EAAE,MAAM,iBAAiB,CAAC;AAC1C,OAAO,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AACtD,OAAO,EAAE,OAAO,EAAE,MAAM,iBAAiB,CAAC;AAC1C,OAAO,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AAGhD,OAAO,EAAE,cAAc,EAAE,MAAM,6BAA6B,CAAC;AAC7D,OAAO,EAAE,kBAAkB,EAAE,MAAM,iCAAiC,CAAC;AACrE,OAAO,EAAE,cAAc,EAAE,MAAM,6BAA6B,CAAC;AAC7D,OAAO,EAAE,WAAW,EAAE,MAAM,0BAA0B,CAAC;AAIvD,OAAO,EAAE,aAAa,EAAE,MAAM,qBAAqB,CAAC;AAUpD,OAAO,EAAE,aAAa,EAAE,aAAa,EAAE,eAAe,EAAE,MAAM,qBAAqB,CAAC;AAIpF,OAAO,EAAE,iBAAiB,EAAE,MAAM,sBAAsB,CAAC;AAIzD,OAAO,EACL,SAAS,EACT,cAAc,EACd,sBAAsB,EACtB,qBAAqB,GACtB,MAAM,sBAAsB,CAAC;AAI9B,OAAO,EACL,gBAAgB,EAChB,UAAU,EACV,kBAAkB,EAClB,YAAY,GACb,MAAM,0BAA0B,CAAC"}
|
|
@@ -0,0 +1,9 @@
|
|
|
1
|
+
export declare function checkPermissions(userPermissions: Record<string, boolean>, requiredPermissions: string[], requireAll?: boolean): boolean;
|
|
2
|
+
export declare function checkRoles(userRoles: string[], requiredRoles: string[], requireAll?: boolean): boolean;
|
|
3
|
+
export declare function filterByPermission<T extends {
|
|
4
|
+
requiredPermission?: string;
|
|
5
|
+
}>(items: T[], userPermissions: Record<string, boolean>): T[];
|
|
6
|
+
export declare function filterByRole<T extends {
|
|
7
|
+
requiredRole?: string;
|
|
8
|
+
}>(items: T[], userRoles: string[]): T[];
|
|
9
|
+
//# sourceMappingURL=permissionHelper.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"permissionHelper.d.ts","sourceRoot":"","sources":["../../src/utils/permissionHelper.ts"],"names":[],"mappings":"AAAA,wBAAgB,gBAAgB,CAC9B,eAAe,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,EACxC,mBAAmB,EAAE,MAAM,EAAE,EAC7B,UAAU,UAAQ,GACjB,OAAO,CAMT;AAED,wBAAgB,UAAU,CACxB,SAAS,EAAE,MAAM,EAAE,EACnB,aAAa,EAAE,MAAM,EAAE,EACvB,UAAU,UAAQ,GACjB,OAAO,CAIT;AAED,wBAAgB,kBAAkB,CAAC,CAAC,SAAS;IAAE,kBAAkB,CAAC,EAAE,MAAM,CAAA;CAAE,EAC1E,KAAK,EAAE,CAAC,EAAE,EACV,eAAe,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GACvC,CAAC,EAAE,CAKL;AAED,wBAAgB,YAAY,CAAC,CAAC,SAAS;IAAE,YAAY,CAAC,EAAE,MAAM,CAAA;CAAE,EAC9D,KAAK,EAAE,CAAC,EAAE,EACV,SAAS,EAAE,MAAM,EAAE,GAClB,CAAC,EAAE,CAKL"}
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
export function checkPermissions(userPermissions, requiredPermissions, requireAll = false) {
|
|
2
|
+
if (requiredPermissions.length === 0)
|
|
3
|
+
return true;
|
|
4
|
+
const results = requiredPermissions.map((perm) => userPermissions[perm] ?? false);
|
|
5
|
+
return requireAll ? results.every((r) => r) : results.some((r) => r);
|
|
6
|
+
}
|
|
7
|
+
export function checkRoles(userRoles, requiredRoles, requireAll = false) {
|
|
8
|
+
if (requiredRoles.length === 0)
|
|
9
|
+
return true;
|
|
10
|
+
const results = requiredRoles.map((role) => userRoles.includes(role));
|
|
11
|
+
return requireAll ? results.every((r) => r) : results.some((r) => r);
|
|
12
|
+
}
|
|
13
|
+
export function filterByPermission(items, userPermissions) {
|
|
14
|
+
return items.filter((item) => {
|
|
15
|
+
if (!item.requiredPermission)
|
|
16
|
+
return true;
|
|
17
|
+
return userPermissions[item.requiredPermission] ?? false;
|
|
18
|
+
});
|
|
19
|
+
}
|
|
20
|
+
export function filterByRole(items, userRoles) {
|
|
21
|
+
return items.filter((item) => {
|
|
22
|
+
if (!item.requiredRole)
|
|
23
|
+
return true;
|
|
24
|
+
return userRoles.includes(item.requiredRole);
|
|
25
|
+
});
|
|
26
|
+
}
|
|
27
|
+
//# sourceMappingURL=permissionHelper.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"permissionHelper.js","sourceRoot":"","sources":["../../src/utils/permissionHelper.ts"],"names":[],"mappings":"AAAA,MAAM,UAAU,gBAAgB,CAC9B,eAAwC,EACxC,mBAA6B,EAC7B,UAAU,GAAG,KAAK;IAElB,IAAI,mBAAmB,CAAC,MAAM,KAAK,CAAC;QAAE,OAAO,IAAI,CAAC;IAClD,MAAM,OAAO,GAAG,mBAAmB,CAAC,GAAG,CACrC,CAAC,IAAI,EAAE,EAAE,CAAC,eAAe,CAAC,IAAI,CAAC,IAAI,KAAK,CACzC,CAAC;IACF,OAAO,UAAU,CAAC,CAAC,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC;AACvE,CAAC;AAED,MAAM,UAAU,UAAU,CACxB,SAAmB,EACnB,aAAuB,EACvB,UAAU,GAAG,KAAK;IAElB,IAAI,aAAa,CAAC,MAAM,KAAK,CAAC;QAAE,OAAO,IAAI,CAAC;IAC5C,MAAM,OAAO,GAAG,aAAa,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,SAAS,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,CAAC;IACtE,OAAO,UAAU,CAAC,CAAC,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC;AACvE,CAAC;AAED,MAAM,UAAU,kBAAkB,CAChC,KAAU,EACV,eAAwC;IAExC,OAAO,KAAK,CAAC,MAAM,CAAC,CAAC,IAAI,EAAE,EAAE;QAC3B,IAAI,CAAC,IAAI,CAAC,kBAAkB;YAAE,OAAO,IAAI,CAAC;QAC1C,OAAO,eAAe,CAAC,IAAI,CAAC,kBAAkB,CAAC,IAAI,KAAK,CAAC;IAC3D,CAAC,CAAC,CAAC;AACL,CAAC;AAED,MAAM,UAAU,YAAY,CAC1B,KAAU,EACV,SAAmB;IAEnB,OAAO,KAAK,CAAC,MAAM,CAAC,CAAC,IAAI,EAAE,EAAE;QAC3B,IAAI,CAAC,IAAI,CAAC,YAAY;YAAE,OAAO,IAAI,CAAC;QACpC,OAAO,SAAS,CAAC,QAAQ,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;IAC/C,CAAC,CAAC,CAAC;AACL,CAAC"}
|
|
@@ -0,0 +1,14 @@
|
|
|
1
|
+
export interface DecodedToken {
|
|
2
|
+
sub: string;
|
|
3
|
+
name?: string;
|
|
4
|
+
email?: string;
|
|
5
|
+
role?: string[];
|
|
6
|
+
exp: number;
|
|
7
|
+
iat: number;
|
|
8
|
+
[key: string]: unknown;
|
|
9
|
+
}
|
|
10
|
+
export declare function decodeJWT(token: string): DecodedToken | null;
|
|
11
|
+
export declare function isTokenExpired(token: string): boolean;
|
|
12
|
+
export declare function getTokenExpirationTime(token: string): Date | null;
|
|
13
|
+
export declare function getTokenTimeRemaining(token: string): number;
|
|
14
|
+
//# sourceMappingURL=tokenDecoder.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"tokenDecoder.d.ts","sourceRoot":"","sources":["../../src/utils/tokenDecoder.ts"],"names":[],"mappings":"AAAA,MAAM,WAAW,YAAY;IAC3B,GAAG,EAAE,MAAM,CAAC;IACZ,IAAI,CAAC,EAAE,MAAM,CAAC;IACd,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,IAAI,CAAC,EAAE,MAAM,EAAE,CAAC;IAChB,GAAG,EAAE,MAAM,CAAC;IACZ,GAAG,EAAE,MAAM,CAAC;IACZ,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC;CACxB;AAgCD,wBAAgB,SAAS,CAAC,KAAK,EAAE,MAAM,GAAG,YAAY,GAAG,IAAI,CAa5D;AAED,wBAAgB,cAAc,CAAC,KAAK,EAAE,MAAM,GAAG,OAAO,CAIrD;AAED,wBAAgB,sBAAsB,CAAC,KAAK,EAAE,MAAM,GAAG,IAAI,GAAG,IAAI,CAIjE;AAED,wBAAgB,qBAAqB,CAAC,KAAK,EAAE,MAAM,GAAG,MAAM,CAI3D"}
|
|
@@ -0,0 +1,61 @@
|
|
|
1
|
+
function base64UrlDecode(str) {
|
|
2
|
+
let output = str.replace(/-/g, '+').replace(/_/g, '/');
|
|
3
|
+
switch (output.length % 4) {
|
|
4
|
+
case 0:
|
|
5
|
+
break;
|
|
6
|
+
case 2:
|
|
7
|
+
output += '==';
|
|
8
|
+
break;
|
|
9
|
+
case 3:
|
|
10
|
+
output += '=';
|
|
11
|
+
break;
|
|
12
|
+
default:
|
|
13
|
+
throw new Error('Invalid base64url string');
|
|
14
|
+
}
|
|
15
|
+
try {
|
|
16
|
+
if (typeof Buffer !== 'undefined') {
|
|
17
|
+
return Buffer.from(output, 'base64').toString('utf-8');
|
|
18
|
+
}
|
|
19
|
+
return decodeURIComponent(atob(output)
|
|
20
|
+
.split('')
|
|
21
|
+
.map((c) => '%' + ('00' + c.charCodeAt(0).toString(16)).slice(-2))
|
|
22
|
+
.join(''));
|
|
23
|
+
}
|
|
24
|
+
catch (e) {
|
|
25
|
+
return '';
|
|
26
|
+
}
|
|
27
|
+
}
|
|
28
|
+
export function decodeJWT(token) {
|
|
29
|
+
try {
|
|
30
|
+
const parts = token.split('.');
|
|
31
|
+
if (parts.length !== 3) {
|
|
32
|
+
console.error('Invalid JWT format');
|
|
33
|
+
return null;
|
|
34
|
+
}
|
|
35
|
+
const decoded = JSON.parse(base64UrlDecode(parts[1]));
|
|
36
|
+
return decoded;
|
|
37
|
+
}
|
|
38
|
+
catch (e) {
|
|
39
|
+
console.error('Token decode failed:', e);
|
|
40
|
+
return null;
|
|
41
|
+
}
|
|
42
|
+
}
|
|
43
|
+
export function isTokenExpired(token) {
|
|
44
|
+
const decoded = decodeJWT(token);
|
|
45
|
+
if (!decoded?.exp)
|
|
46
|
+
return true;
|
|
47
|
+
return decoded.exp * 1000 < Date.now();
|
|
48
|
+
}
|
|
49
|
+
export function getTokenExpirationTime(token) {
|
|
50
|
+
const decoded = decodeJWT(token);
|
|
51
|
+
if (!decoded?.exp)
|
|
52
|
+
return null;
|
|
53
|
+
return new Date(decoded.exp * 1000);
|
|
54
|
+
}
|
|
55
|
+
export function getTokenTimeRemaining(token) {
|
|
56
|
+
const decoded = decodeJWT(token);
|
|
57
|
+
if (!decoded?.exp)
|
|
58
|
+
return 0;
|
|
59
|
+
return decoded.exp * 1000 - Date.now();
|
|
60
|
+
}
|
|
61
|
+
//# sourceMappingURL=tokenDecoder.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"tokenDecoder.js","sourceRoot":"","sources":["../../src/utils/tokenDecoder.ts"],"names":[],"mappings":"AAUA,SAAS,eAAe,CAAC,GAAW;IAClC,IAAI,MAAM,GAAG,GAAG,CAAC,OAAO,CAAC,IAAI,EAAE,GAAG,CAAC,CAAC,OAAO,CAAC,IAAI,EAAE,GAAG,CAAC,CAAC;IACvD,QAAQ,MAAM,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;QAC1B,KAAK,CAAC;YACJ,MAAM;QACR,KAAK,CAAC;YACJ,MAAM,IAAI,IAAI,CAAC;YACf,MAAM;QACR,KAAK,CAAC;YACJ,MAAM,IAAI,GAAG,CAAC;YACd,MAAM;QACR;YACE,MAAM,IAAI,KAAK,CAAC,0BAA0B,CAAC,CAAC;IAChD,CAAC;IAED,IAAI,CAAC;QACH,IAAI,OAAO,MAAM,KAAK,WAAW,EAAE,CAAC;YAClC,OAAO,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;QACzD,CAAC;QACD,OAAO,kBAAkB,CACvB,IAAI,CAAC,MAAM,CAAC;aACT,KAAK,CAAC,EAAE,CAAC;aACT,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,GAAG,GAAG,CAAC,IAAI,GAAG,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC;aACjE,IAAI,CAAC,EAAE,CAAC,CACZ,CAAC;IACJ,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,OAAO,EAAE,CAAC;IACZ,CAAC;AACH,CAAC;AAED,MAAM,UAAU,SAAS,CAAC,KAAa;IACrC,IAAI,CAAC;QACH,MAAM,KAAK,GAAG,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QAC/B,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACvB,OAAO,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC;YACpC,OAAO,IAAI,CAAC;QACd,CAAC;QACD,MAAM,OAAO,GAAG,IAAI,CAAC,KAAK,CAAC,eAAe,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;QACtD,OAAO,OAAuB,CAAC;IACjC,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,OAAO,CAAC,KAAK,CAAC,sBAAsB,EAAE,CAAC,CAAC,CAAC;QACzC,OAAO,IAAI,CAAC;IACd,CAAC;AACH,CAAC;AAED,MAAM,UAAU,cAAc,CAAC,KAAa;IAC1C,MAAM,OAAO,GAAG,SAAS,CAAC,KAAK,CAAC,CAAC;IACjC,IAAI,CAAC,OAAO,EAAE,GAAG;QAAE,OAAO,IAAI,CAAC;IAC/B,OAAO,OAAO,CAAC,GAAG,GAAG,IAAI,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;AACzC,CAAC;AAED,MAAM,UAAU,sBAAsB,CAAC,KAAa;IAClD,MAAM,OAAO,GAAG,SAAS,CAAC,KAAK,CAAC,CAAC;IACjC,IAAI,CAAC,OAAO,EAAE,GAAG;QAAE,OAAO,IAAI,CAAC;IAC/B,OAAO,IAAI,IAAI,CAAC,OAAO,CAAC,GAAG,GAAG,IAAI,CAAC,CAAC;AACtC,CAAC;AAED,MAAM,UAAU,qBAAqB,CAAC,KAAa;IACjD,MAAM,OAAO,GAAG,SAAS,CAAC,KAAK,CAAC,CAAC;IACjC,IAAI,CAAC,OAAO,EAAE,GAAG;QAAE,OAAO,CAAC,CAAC;IAC5B,OAAO,OAAO,CAAC,GAAG,GAAG,IAAI,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;AACzC,CAAC"}
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
export interface TokenStore {
|
|
2
|
+
accessToken: string;
|
|
3
|
+
refreshToken?: string;
|
|
4
|
+
expiresAt?: number;
|
|
5
|
+
}
|
|
6
|
+
export interface StorageImplementation {
|
|
7
|
+
getItem(key: string): Promise<string | null>;
|
|
8
|
+
setItem(key: string, value: string): Promise<void>;
|
|
9
|
+
removeItem(key: string): Promise<void>;
|
|
10
|
+
}
|
|
11
|
+
export declare function initializeStorage(implementation: StorageImplementation): void;
|
|
12
|
+
export declare function saveToken(data: TokenStore): Promise<void>;
|
|
13
|
+
export declare function getToken(): Promise<TokenStore | null>;
|
|
14
|
+
export declare function clearToken(): Promise<void>;
|
|
15
|
+
export declare function isTokenExpired(): Promise<boolean>;
|
|
16
|
+
export declare function getAccessToken(): Promise<string | null>;
|
|
17
|
+
//# sourceMappingURL=tokenStorage.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"tokenStorage.d.ts","sourceRoot":"","sources":["../../src/utils/tokenStorage.ts"],"names":[],"mappings":"AAAA,MAAM,WAAW,UAAU;IACzB,WAAW,EAAE,MAAM,CAAC;IACpB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,SAAS,CAAC,EAAE,MAAM,CAAC;CACpB;AAED,MAAM,WAAW,qBAAqB;IACpC,OAAO,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC,CAAC;IAC7C,OAAO,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC,CAAC;IACnD,UAAU,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC,CAAC;CACxC;AAqBD,wBAAgB,iBAAiB,CAAC,cAAc,EAAE,qBAAqB,GAAG,IAAI,CAE7E;AASD,wBAAsB,SAAS,CAAC,IAAI,EAAE,UAAU,GAAG,OAAO,CAAC,IAAI,CAAC,CAG/D;AAED,wBAAsB,QAAQ,IAAI,OAAO,CAAC,UAAU,GAAG,IAAI,CAAC,CAW3D;AAED,wBAAsB,UAAU,IAAI,OAAO,CAAC,IAAI,CAAC,CAGhD;AAED,wBAAsB,cAAc,IAAI,OAAO,CAAC,OAAO,CAAC,CAIvD;AAED,wBAAsB,cAAc,IAAI,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC,CAG7D"}
|
|
@@ -0,0 +1,60 @@
|
|
|
1
|
+
const TOKEN_KEY = '@xeno_auth:token';
|
|
2
|
+
let storageImpl = null;
|
|
3
|
+
const defaultWebStorage = {
|
|
4
|
+
getItem: async (key) => {
|
|
5
|
+
if (typeof window === 'undefined')
|
|
6
|
+
return null;
|
|
7
|
+
return localStorage.getItem(key);
|
|
8
|
+
},
|
|
9
|
+
setItem: async (key, value) => {
|
|
10
|
+
if (typeof window === 'undefined')
|
|
11
|
+
return;
|
|
12
|
+
localStorage.setItem(key, value);
|
|
13
|
+
},
|
|
14
|
+
removeItem: async (key) => {
|
|
15
|
+
if (typeof window === 'undefined')
|
|
16
|
+
return;
|
|
17
|
+
localStorage.removeItem(key);
|
|
18
|
+
},
|
|
19
|
+
};
|
|
20
|
+
export function initializeStorage(implementation) {
|
|
21
|
+
storageImpl = implementation;
|
|
22
|
+
}
|
|
23
|
+
async function getStorage() {
|
|
24
|
+
if (!storageImpl) {
|
|
25
|
+
storageImpl = defaultWebStorage;
|
|
26
|
+
}
|
|
27
|
+
return storageImpl;
|
|
28
|
+
}
|
|
29
|
+
export async function saveToken(data) {
|
|
30
|
+
const storage = await getStorage();
|
|
31
|
+
await storage.setItem(TOKEN_KEY, JSON.stringify(data));
|
|
32
|
+
}
|
|
33
|
+
export async function getToken() {
|
|
34
|
+
const storage = await getStorage();
|
|
35
|
+
const data = await storage.getItem(TOKEN_KEY);
|
|
36
|
+
if (!data)
|
|
37
|
+
return null;
|
|
38
|
+
try {
|
|
39
|
+
return JSON.parse(data);
|
|
40
|
+
}
|
|
41
|
+
catch (e) {
|
|
42
|
+
console.error('Failed to parse token:', e);
|
|
43
|
+
return null;
|
|
44
|
+
}
|
|
45
|
+
}
|
|
46
|
+
export async function clearToken() {
|
|
47
|
+
const storage = await getStorage();
|
|
48
|
+
await storage.removeItem(TOKEN_KEY);
|
|
49
|
+
}
|
|
50
|
+
export async function isTokenExpired() {
|
|
51
|
+
const token = await getToken();
|
|
52
|
+
if (!token?.expiresAt)
|
|
53
|
+
return true;
|
|
54
|
+
return Date.now() > token.expiresAt * 1000;
|
|
55
|
+
}
|
|
56
|
+
export async function getAccessToken() {
|
|
57
|
+
const token = await getToken();
|
|
58
|
+
return token?.accessToken ?? null;
|
|
59
|
+
}
|
|
60
|
+
//# sourceMappingURL=tokenStorage.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"tokenStorage.js","sourceRoot":"","sources":["../../src/utils/tokenStorage.ts"],"names":[],"mappings":"AAYA,MAAM,SAAS,GAAG,kBAAkB,CAAC;AAErC,IAAI,WAAW,GAAiC,IAAI,CAAC;AAErD,MAAM,iBAAiB,GAA0B;IAC/C,OAAO,EAAE,KAAK,EAAE,GAAW,EAAE,EAAE;QAC7B,IAAI,OAAO,MAAM,KAAK,WAAW;YAAE,OAAO,IAAI,CAAC;QAC/C,OAAO,YAAY,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC;IACnC,CAAC;IACD,OAAO,EAAE,KAAK,EAAE,GAAW,EAAE,KAAa,EAAE,EAAE;QAC5C,IAAI,OAAO,MAAM,KAAK,WAAW;YAAE,OAAO;QAC1C,YAAY,CAAC,OAAO,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC;IACnC,CAAC;IACD,UAAU,EAAE,KAAK,EAAE,GAAW,EAAE,EAAE;QAChC,IAAI,OAAO,MAAM,KAAK,WAAW;YAAE,OAAO;QAC1C,YAAY,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC;IAC/B,CAAC;CACF,CAAC;AAEF,MAAM,UAAU,iBAAiB,CAAC,cAAqC;IACrE,WAAW,GAAG,cAAc,CAAC;AAC/B,CAAC;AAED,KAAK,UAAU,UAAU;IACvB,IAAI,CAAC,WAAW,EAAE,CAAC;QACjB,WAAW,GAAG,iBAAiB,CAAC;IAClC,CAAC;IACD,OAAO,WAAW,CAAC;AACrB,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,SAAS,CAAC,IAAgB;IAC9C,MAAM,OAAO,GAAG,MAAM,UAAU,EAAE,CAAC;IACnC,MAAM,OAAO,CAAC,OAAO,CAAC,SAAS,EAAE,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,CAAC;AACzD,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,QAAQ;IAC5B,MAAM,OAAO,GAAG,MAAM,UAAU,EAAE,CAAC;IACnC,MAAM,IAAI,GAAG,MAAM,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC;IAC9C,IAAI,CAAC,IAAI;QAAE,OAAO,IAAI,CAAC;IAEvB,IAAI,CAAC;QACH,OAAO,IAAI,CAAC,KAAK,CAAC,IAAI,CAAe,CAAC;IACxC,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,OAAO,CAAC,KAAK,CAAC,wBAAwB,EAAE,CAAC,CAAC,CAAC;QAC3C,OAAO,IAAI,CAAC;IACd,CAAC;AACH,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,UAAU;IAC9B,MAAM,OAAO,GAAG,MAAM,UAAU,EAAE,CAAC;IACnC,MAAM,OAAO,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC;AACtC,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,cAAc;IAClC,MAAM,KAAK,GAAG,MAAM,QAAQ,EAAE,CAAC;IAC/B,IAAI,CAAC,KAAK,EAAE,SAAS;QAAE,OAAO,IAAI,CAAC;IACnC,OAAO,IAAI,CAAC,GAAG,EAAE,GAAG,KAAK,CAAC,SAAS,GAAG,IAAI,CAAC;AAC7C,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,cAAc;IAClC,MAAM,KAAK,GAAG,MAAM,QAAQ,EAAE,CAAC;IAC/B,OAAO,KAAK,EAAE,WAAW,IAAI,IAAI,CAAC;AACpC,CAAC"}
|
package/package.json
ADDED
|
@@ -0,0 +1,60 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "xeno-auth-sdk",
|
|
3
|
+
"version": "1.0.0",
|
|
4
|
+
"description": "Reusable Auth SDK for React and React Native with ABP.io backend",
|
|
5
|
+
"main": "dist/index.js",
|
|
6
|
+
"module": "dist/index.js",
|
|
7
|
+
"types": "dist/index.d.ts",
|
|
8
|
+
"exports": {
|
|
9
|
+
".": {
|
|
10
|
+
"import": "./dist/index.js",
|
|
11
|
+
"require": "./dist/index.js",
|
|
12
|
+
"types": "./dist/index.d.ts"
|
|
13
|
+
}
|
|
14
|
+
},
|
|
15
|
+
"scripts": {
|
|
16
|
+
"build": "tsc",
|
|
17
|
+
"watch": "tsc --watch",
|
|
18
|
+
"dev": "tsc --watch",
|
|
19
|
+
"clean": "rimraf dist",
|
|
20
|
+
"prebuild": "npm run clean",
|
|
21
|
+
"prepare": "npm run build",
|
|
22
|
+
"test": "jest",
|
|
23
|
+
"test:watch": "jest --watch",
|
|
24
|
+
"lint": "eslint src --ext .ts,.tsx",
|
|
25
|
+
"format": "prettier --write \"src/**/*.{ts,tsx}\""
|
|
26
|
+
},
|
|
27
|
+
"keywords": [
|
|
28
|
+
"auth",
|
|
29
|
+
"abp",
|
|
30
|
+
"react",
|
|
31
|
+
"react-native",
|
|
32
|
+
"sdk"
|
|
33
|
+
],
|
|
34
|
+
"author": "Xeno",
|
|
35
|
+
"license": "MIT",
|
|
36
|
+
"peerDependencies": {
|
|
37
|
+
"axios": "^1.0.0",
|
|
38
|
+
"react": "^18.0.0",
|
|
39
|
+
"react-dom": "^18.0.0",
|
|
40
|
+
"react-router-dom": "^6.0.0"
|
|
41
|
+
},
|
|
42
|
+
"devDependencies": {
|
|
43
|
+
"@types/jest": "^29.0.0",
|
|
44
|
+
"@types/node": "^20.0.0",
|
|
45
|
+
"@types/react": "^18.2.0",
|
|
46
|
+
"@types/react-dom": "^18.2.0",
|
|
47
|
+
"@typescript-eslint/eslint-plugin": "^6.0.0",
|
|
48
|
+
"@typescript-eslint/parser": "^6.0.0",
|
|
49
|
+
"axios": "^1.6.0",
|
|
50
|
+
"eslint": "^8.0.0",
|
|
51
|
+
"jest": "^29.0.0",
|
|
52
|
+
"prettier": "^3.0.0",
|
|
53
|
+
"react": "^18.2.0",
|
|
54
|
+
"react-dom": "^18.2.0",
|
|
55
|
+
"react-router-dom": "^6.30.3",
|
|
56
|
+
"rimraf": "^5.0.0",
|
|
57
|
+
"ts-jest": "^29.0.0",
|
|
58
|
+
"typescript": "^5.0.0"
|
|
59
|
+
}
|
|
60
|
+
}
|