@frontegg/redux-store 6.145.0-alpha.0 → 6.145.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/auth/LoginState/saga.js +5 -4
- package/index.js +1 -1
- package/node/auth/LoginState/saga.js +5 -4
- package/node/index.js +1 -1
- package/package.json +1 -1
package/auth/LoginState/saga.js
CHANGED
|
@@ -1295,7 +1295,7 @@ function* login({
|
|
|
1295
1295
|
});
|
|
1296
1296
|
const [securityCenterLoginFlows] = yield call(getFeatureFlags, ['security-center-show-login-flows']);
|
|
1297
1297
|
if (loginState.flow === LoginFlow.Login) {
|
|
1298
|
-
if (securityCenterLoginFlows && user.isBreachedPassword) {
|
|
1298
|
+
if (securityCenterLoginFlows && user.isBreachedPassword && !isAuthenticated) {
|
|
1299
1299
|
yield put(actions.setLoginState({
|
|
1300
1300
|
step: LoginStep.breachedPassword,
|
|
1301
1301
|
loading: false
|
|
@@ -1383,7 +1383,7 @@ function* loginWithMfa({
|
|
|
1383
1383
|
}));
|
|
1384
1384
|
const [securityCenterLoginFlows] = yield call(getFeatureFlags, ['security-center-show-login-flows']);
|
|
1385
1385
|
if (loginState.flow === LoginFlow.Login) {
|
|
1386
|
-
if (securityCenterLoginFlows && loginState.isBreachedPassword) {
|
|
1386
|
+
if (securityCenterLoginFlows && loginState.isBreachedPassword && !isAuthenticated) {
|
|
1387
1387
|
yield put(actions.setLoginState({
|
|
1388
1388
|
step: LoginStep.breachedPassword,
|
|
1389
1389
|
loading: false
|
|
@@ -1515,8 +1515,9 @@ function* handleVerifyMFAResponse({
|
|
|
1515
1515
|
step: mfaStep
|
|
1516
1516
|
} = yield select(state => state.auth.mfaState);
|
|
1517
1517
|
const [securityCenterLoginFlows] = yield call(getFeatureFlags, ['security-center-show-login-flows']);
|
|
1518
|
+
const isAuthenticated = !!user.accessToken;
|
|
1518
1519
|
if (loginState.flow === LoginFlow.Login) {
|
|
1519
|
-
if (securityCenterLoginFlows && loginState.isBreachedPassword) {
|
|
1520
|
+
if (securityCenterLoginFlows && loginState.isBreachedPassword && !isAuthenticated) {
|
|
1520
1521
|
yield put(actions.setLoginState({
|
|
1521
1522
|
step: LoginStep.breachedPassword,
|
|
1522
1523
|
loading: false
|
|
@@ -1534,7 +1535,7 @@ function* handleVerifyMFAResponse({
|
|
|
1534
1535
|
}
|
|
1535
1536
|
}
|
|
1536
1537
|
yield put(actions.setState({
|
|
1537
|
-
isAuthenticated
|
|
1538
|
+
isAuthenticated
|
|
1538
1539
|
}));
|
|
1539
1540
|
}
|
|
1540
1541
|
function* preEnrollMFASMSForLogin(_ref13) {
|
package/index.js
CHANGED
|
@@ -1309,7 +1309,7 @@ function* login({
|
|
|
1309
1309
|
});
|
|
1310
1310
|
const [securityCenterLoginFlows] = yield (0, _effects.call)(_helpers.getFeatureFlags, ['security-center-show-login-flows']);
|
|
1311
1311
|
if (loginState.flow === _interfaces2.LoginFlow.Login) {
|
|
1312
|
-
if (securityCenterLoginFlows && user.isBreachedPassword) {
|
|
1312
|
+
if (securityCenterLoginFlows && user.isBreachedPassword && !isAuthenticated) {
|
|
1313
1313
|
yield (0, _effects.put)(_reducer.actions.setLoginState({
|
|
1314
1314
|
step: _interfaces2.LoginStep.breachedPassword,
|
|
1315
1315
|
loading: false
|
|
@@ -1397,7 +1397,7 @@ function* loginWithMfa({
|
|
|
1397
1397
|
}));
|
|
1398
1398
|
const [securityCenterLoginFlows] = yield (0, _effects.call)(_helpers.getFeatureFlags, ['security-center-show-login-flows']);
|
|
1399
1399
|
if (loginState.flow === _interfaces2.LoginFlow.Login) {
|
|
1400
|
-
if (securityCenterLoginFlows && loginState.isBreachedPassword) {
|
|
1400
|
+
if (securityCenterLoginFlows && loginState.isBreachedPassword && !isAuthenticated) {
|
|
1401
1401
|
yield (0, _effects.put)(_reducer.actions.setLoginState({
|
|
1402
1402
|
step: _interfaces2.LoginStep.breachedPassword,
|
|
1403
1403
|
loading: false
|
|
@@ -1529,8 +1529,9 @@ function* handleVerifyMFAResponse({
|
|
|
1529
1529
|
step: mfaStep
|
|
1530
1530
|
} = yield (0, _effects.select)(state => state.auth.mfaState);
|
|
1531
1531
|
const [securityCenterLoginFlows] = yield (0, _effects.call)(_helpers.getFeatureFlags, ['security-center-show-login-flows']);
|
|
1532
|
+
const isAuthenticated = !!user.accessToken;
|
|
1532
1533
|
if (loginState.flow === _interfaces2.LoginFlow.Login) {
|
|
1533
|
-
if (securityCenterLoginFlows && loginState.isBreachedPassword) {
|
|
1534
|
+
if (securityCenterLoginFlows && loginState.isBreachedPassword && !isAuthenticated) {
|
|
1534
1535
|
yield (0, _effects.put)(_reducer.actions.setLoginState({
|
|
1535
1536
|
step: _interfaces2.LoginStep.breachedPassword,
|
|
1536
1537
|
loading: false
|
|
@@ -1548,7 +1549,7 @@ function* handleVerifyMFAResponse({
|
|
|
1548
1549
|
}
|
|
1549
1550
|
}
|
|
1550
1551
|
yield (0, _effects.put)(_reducer.actions.setState({
|
|
1551
|
-
isAuthenticated
|
|
1552
|
+
isAuthenticated
|
|
1552
1553
|
}));
|
|
1553
1554
|
}
|
|
1554
1555
|
function* preEnrollMFASMSForLogin(_ref13) {
|
package/node/index.js
CHANGED