@frontegg/redux-store 6.51.0 → 6.52.0-alpha.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -8,7 +8,9 @@ const _excluded = ["callback"],
8
8
  _excluded6 = ["callback"],
9
9
  _excluded7 = ["deviceId"],
10
10
  _excluded8 = ["deviceId"],
11
- _excluded9 = ["callback"];
11
+ _excluded9 = ["callback"],
12
+ _excluded10 = ["deviceId"],
13
+ _excluded11 = ["callback"];
12
14
  import { call, put, select, takeEvery } from 'redux-saga/effects';
13
15
  import { api } from '@frontegg/rest-api';
14
16
  import { actions } from '../reducer';
@@ -216,7 +218,6 @@ function* enrollMfaWebAuthn(_ref3) {
216
218
  yield put(actions.setMfaState(_extends({}, mfaState, {
217
219
  mfaDevices
218
220
  })));
219
- console.log(callback, mfaState.recoveryCode);
220
221
  callback == null ? void 0 : callback(mfaState.recoveryCode);
221
222
  } catch (e) {
222
223
  yield put(actions.setMfaState({
@@ -375,7 +376,6 @@ function* preDisableMfaSms(_ref7) {
375
376
  try {
376
377
  var _payload$callback7;
377
378
 
378
- const user = yield select(state => state.auth.user);
379
379
  const res = yield call(api.auth.preDisableMFASMS, deviceId);
380
380
  yield put(actions.setMfaState({
381
381
  saving: false,
@@ -383,9 +383,6 @@ function* preDisableMfaSms(_ref7) {
383
383
  otcToken: res.otcToken,
384
384
  phoneNumber: res.phoneNumber
385
385
  }));
386
- yield put(actions.setUser(_extends({}, user, {
387
- mfaEnrolled: false
388
- })));
389
386
  (_payload$callback7 = payload.callback) == null ? void 0 : _payload$callback7.call(payload, true);
390
387
  } catch (e) {
391
388
  var _payload$callback8;
@@ -413,7 +410,6 @@ function* disableMfaSms(_ref8) {
413
410
  try {
414
411
  var _payload$callback9;
415
412
 
416
- const user = yield select(state => state.auth.user);
417
413
  yield call(api.auth.disableMFASMS, deviceId, payload);
418
414
  const mfaDevices = yield call(api.auth.getMFADevices);
419
415
  yield put(actions.setMfaState({
@@ -421,9 +417,6 @@ function* disableMfaSms(_ref8) {
421
417
  error: undefined,
422
418
  mfaDevices
423
419
  }));
424
- yield put(actions.setUser(_extends({}, user, {
425
- mfaEnrolled: false
426
- })));
427
420
  (_payload$callback9 = payload.callback) == null ? void 0 : _payload$callback9.call(payload, true);
428
421
  } catch (e) {
429
422
  var _payload$callback10;
@@ -504,11 +497,11 @@ export function* mfaSagas() {
504
497
 
505
498
  function* enrollMfaMock() {
506
499
  yield put(actions.setMfaState({
507
- loading: true
500
+ saving: true
508
501
  }));
509
502
  const qrCode = 'test';
510
503
  yield put(actions.setMfaState({
511
- loading: false,
504
+ saving: false,
512
505
  error: undefined,
513
506
  qrCode
514
507
  }));
@@ -519,8 +512,15 @@ function* verifyMfaMock({
519
512
  callback
520
513
  }
521
514
  }) {
515
+ const {
516
+ mfaDevices = {
517
+ webauthn: [],
518
+ phones: [],
519
+ authenticators: []
520
+ }
521
+ } = yield select(state => state.auth.mfaState);
522
522
  yield put(actions.setMfaState({
523
- loading: true
523
+ saving: true
524
524
  }));
525
525
  yield delay();
526
526
  const data = {
@@ -531,7 +531,12 @@ function* verifyMfaMock({
531
531
  step: MFAStep.recoveryCode,
532
532
  loading: false,
533
533
  error: undefined,
534
- saving: false
534
+ saving: false,
535
+ mfaDevices: _extends({}, mfaDevices, {
536
+ authenticators: [{
537
+ id: 'authenticator-id'
538
+ }]
539
+ })
535
540
  };
536
541
 
537
542
  if (data != null && data.recoveryCode) {
@@ -586,18 +591,147 @@ function* disableMfaMock({
586
591
  }) {
587
592
  var _payload$callback11;
588
593
 
594
+ const {
595
+ mfaDevices = {
596
+ webauthn: [],
597
+ phones: [],
598
+ authenticators: []
599
+ }
600
+ } = yield select(state => state.auth.mfaState);
589
601
  yield put(actions.setMfaState({
590
- loading: true
602
+ saving: true
603
+ }));
604
+ yield delay();
605
+ yield put(actions.setMfaState({
606
+ saving: false,
607
+ error: undefined,
608
+ mfaDevices: _extends({}, mfaDevices, {
609
+ authenticators: []
610
+ })
611
+ }));
612
+ yield put(actions.setUser(_extends({}, userDemo)));
613
+ (_payload$callback11 = payload.callback) == null ? void 0 : _payload$callback11.call(payload, true);
614
+ }
615
+
616
+ function* preDisableMfaSmsMock(_ref10) {
617
+ let {} = _ref10,
618
+ payload = _objectWithoutPropertiesLoose(_ref10.payload, _excluded10);
619
+
620
+ yield put(actions.setMfaState({
621
+ saving: true
622
+ }));
623
+
624
+ try {
625
+ var _payload$callback12;
626
+
627
+ yield put(actions.setMfaState({
628
+ saving: false,
629
+ error: undefined,
630
+ otcToken: 'otc-token',
631
+ phoneNumber: '+972504589346'
632
+ }));
633
+ (_payload$callback12 = payload.callback) == null ? void 0 : _payload$callback12.call(payload, true);
634
+ } catch (e) {
635
+ var _payload$callback13;
636
+
637
+ yield put(actions.setMfaState({
638
+ saving: false,
639
+ error: e.message
640
+ }));
641
+ (_payload$callback13 = payload.callback) == null ? void 0 : _payload$callback13.call(payload, false, e);
642
+ }
643
+ }
644
+
645
+ function* disableMfaSmsMock({
646
+ payload
647
+ }) {
648
+ var _payload$callback14;
649
+
650
+ const {
651
+ mfaDevices = {
652
+ webauthn: [],
653
+ phones: [],
654
+ authenticators: []
655
+ }
656
+ } = yield select(state => state.auth.mfaState);
657
+ yield put(actions.setMfaState({
658
+ saving: true
591
659
  }));
592
660
  yield delay();
593
661
  yield put(actions.setMfaState({
594
662
  loading: false,
595
- error: undefined
663
+ error: undefined,
664
+ mfaDevices: _extends({}, mfaDevices, {
665
+ phones: []
666
+ })
596
667
  }));
668
+ yield put(actions.setUser(_extends({}, userDemo)));
669
+ (_payload$callback14 = payload.callback) == null ? void 0 : _payload$callback14.call(payload, true);
670
+ }
671
+
672
+ function* preEnrollMfaSmsMock({
673
+ payload
674
+ }) {
675
+ var _payload$callback15;
676
+
677
+ yield put(actions.setMfaState({
678
+ saving: true
679
+ }));
680
+ yield delay();
681
+ yield put(actions.setMfaState({
682
+ saving: false,
683
+ error: undefined,
684
+ otcToken: 'otc-token',
685
+ phoneNumber: '+972504589346'
686
+ }));
687
+ (_payload$callback15 = payload.callback) == null ? void 0 : _payload$callback15.call(payload, true);
688
+ }
689
+
690
+ function* enrollMfaSmsMock(_ref11) {
691
+ let {
692
+ payload: {
693
+ callback
694
+ }
695
+ } = _ref11,
696
+ payload = _objectWithoutPropertiesLoose(_ref11.payload, _excluded11);
697
+
698
+ const {
699
+ mfaDevices = {
700
+ webauthn: [],
701
+ phones: [],
702
+ authenticators: []
703
+ }
704
+ } = yield select(state => state.auth.mfaState);
705
+ yield put(actions.setMfaState({
706
+ saving: true
707
+ }));
708
+ yield delay();
709
+ const data = {
710
+ token: 'token',
711
+ recoveryCode: 'recoveryCode'
712
+ };
713
+ const mfaState = {
714
+ step: MFAStep.recoveryCode,
715
+ loading: false,
716
+ error: undefined,
717
+ saving: false,
718
+ mfaDevices: _extends({}, mfaDevices, {
719
+ phones: [{
720
+ id: 'phone-id',
721
+ phoneNumber: '+972504589346'
722
+ }]
723
+ })
724
+ };
725
+
726
+ if (data != null && data.recoveryCode) {
727
+ mfaState.recoveryCode = data.recoveryCode;
728
+ }
729
+
730
+ yield put(actions.setMfaState(mfaState));
597
731
  yield put(actions.setUser(_extends({}, userDemo, {
598
- mfaEnrolled: false
732
+ mfaEnrolled: true
599
733
  })));
600
- (_payload$callback11 = payload.callback) == null ? void 0 : _payload$callback11.call(payload, true);
734
+ callback == null ? void 0 : callback(mfaState.recoveryCode);
601
735
  }
602
736
 
603
737
  export function* mfaSagasMock() {
@@ -605,4 +739,8 @@ export function* mfaSagasMock() {
605
739
  yield takeEvery(actions.verifyMfa, verifyMfaMock);
606
740
  yield takeEvery(actions.disableMfa, disableMfaMock);
607
741
  yield takeEvery(actions.verifyMfaAfterForce, verifyMfaAfterForceMock);
742
+ yield takeEvery(actions.preDisableMfaSms, preDisableMfaSmsMock);
743
+ yield takeEvery(actions.disableMfaSms, disableMfaSmsMock);
744
+ yield takeEvery(actions.preEnrollMfaSms, preEnrollMfaSmsMock);
745
+ yield takeEvery(actions.enrollMfaSms, enrollMfaSmsMock);
608
746
  }
package/index.js CHANGED
@@ -1,4 +1,4 @@
1
- /** @license Frontegg v6.51.0
1
+ /** @license Frontegg v6.52.0-alpha.0
2
2
  *
3
3
  * This source code is licensed under the MIT license found in the
4
4
  * LICENSE file in the root directory of this source tree.
@@ -32,7 +32,9 @@ const _excluded = ["callback"],
32
32
  _excluded6 = ["callback"],
33
33
  _excluded7 = ["deviceId"],
34
34
  _excluded8 = ["deviceId"],
35
- _excluded9 = ["callback"];
35
+ _excluded9 = ["callback"],
36
+ _excluded10 = ["deviceId"],
37
+ _excluded11 = ["callback"];
36
38
 
37
39
  function* getMfaStateAfterEnroll(res) {
38
40
  const {
@@ -229,7 +231,6 @@ function* enrollMfaWebAuthn(_ref3) {
229
231
  yield (0, _effects.put)(_reducer.actions.setMfaState((0, _extends2.default)({}, mfaState, {
230
232
  mfaDevices
231
233
  })));
232
- console.log(callback, mfaState.recoveryCode);
233
234
  callback == null ? void 0 : callback(mfaState.recoveryCode);
234
235
  } catch (e) {
235
236
  yield (0, _effects.put)(_reducer.actions.setMfaState({
@@ -382,7 +383,6 @@ function* preDisableMfaSms(_ref7) {
382
383
  try {
383
384
  var _payload$callback7;
384
385
 
385
- const user = yield (0, _effects.select)(state => state.auth.user);
386
386
  const res = yield (0, _effects.call)(_restApi.api.auth.preDisableMFASMS, deviceId);
387
387
  yield (0, _effects.put)(_reducer.actions.setMfaState({
388
388
  saving: false,
@@ -390,9 +390,6 @@ function* preDisableMfaSms(_ref7) {
390
390
  otcToken: res.otcToken,
391
391
  phoneNumber: res.phoneNumber
392
392
  }));
393
- yield (0, _effects.put)(_reducer.actions.setUser((0, _extends2.default)({}, user, {
394
- mfaEnrolled: false
395
- })));
396
393
  (_payload$callback7 = payload.callback) == null ? void 0 : _payload$callback7.call(payload, true);
397
394
  } catch (e) {
398
395
  var _payload$callback8;
@@ -419,7 +416,6 @@ function* disableMfaSms(_ref8) {
419
416
  try {
420
417
  var _payload$callback9;
421
418
 
422
- const user = yield (0, _effects.select)(state => state.auth.user);
423
419
  yield (0, _effects.call)(_restApi.api.auth.disableMFASMS, deviceId, payload);
424
420
  const mfaDevices = yield (0, _effects.call)(_restApi.api.auth.getMFADevices);
425
421
  yield (0, _effects.put)(_reducer.actions.setMfaState({
@@ -427,9 +423,6 @@ function* disableMfaSms(_ref8) {
427
423
  error: undefined,
428
424
  mfaDevices
429
425
  }));
430
- yield (0, _effects.put)(_reducer.actions.setUser((0, _extends2.default)({}, user, {
431
- mfaEnrolled: false
432
- })));
433
426
  (_payload$callback9 = payload.callback) == null ? void 0 : _payload$callback9.call(payload, true);
434
427
  } catch (e) {
435
428
  var _payload$callback10;
@@ -511,11 +504,11 @@ function* mfaSagas() {
511
504
 
512
505
  function* enrollMfaMock() {
513
506
  yield (0, _effects.put)(_reducer.actions.setMfaState({
514
- loading: true
507
+ saving: true
515
508
  }));
516
509
  const qrCode = 'test';
517
510
  yield (0, _effects.put)(_reducer.actions.setMfaState({
518
- loading: false,
511
+ saving: false,
519
512
  error: undefined,
520
513
  qrCode
521
514
  }));
@@ -526,8 +519,15 @@ function* verifyMfaMock({
526
519
  callback
527
520
  }
528
521
  }) {
522
+ const {
523
+ mfaDevices = {
524
+ webauthn: [],
525
+ phones: [],
526
+ authenticators: []
527
+ }
528
+ } = yield (0, _effects.select)(state => state.auth.mfaState);
529
529
  yield (0, _effects.put)(_reducer.actions.setMfaState({
530
- loading: true
530
+ saving: true
531
531
  }));
532
532
  yield (0, _utils.delay)();
533
533
  const data = {
@@ -538,7 +538,12 @@ function* verifyMfaMock({
538
538
  step: _interfaces.MFAStep.recoveryCode,
539
539
  loading: false,
540
540
  error: undefined,
541
- saving: false
541
+ saving: false,
542
+ mfaDevices: (0, _extends2.default)({}, mfaDevices, {
543
+ authenticators: [{
544
+ id: 'authenticator-id'
545
+ }]
546
+ })
542
547
  };
543
548
 
544
549
  if (data != null && data.recoveryCode) {
@@ -590,18 +595,145 @@ function* disableMfaMock({
590
595
  }) {
591
596
  var _payload$callback11;
592
597
 
598
+ const {
599
+ mfaDevices = {
600
+ webauthn: [],
601
+ phones: [],
602
+ authenticators: []
603
+ }
604
+ } = yield (0, _effects.select)(state => state.auth.mfaState);
593
605
  yield (0, _effects.put)(_reducer.actions.setMfaState({
594
- loading: true
606
+ saving: true
607
+ }));
608
+ yield (0, _utils.delay)();
609
+ yield (0, _effects.put)(_reducer.actions.setMfaState({
610
+ saving: false,
611
+ error: undefined,
612
+ mfaDevices: (0, _extends2.default)({}, mfaDevices, {
613
+ authenticators: []
614
+ })
615
+ }));
616
+ yield (0, _effects.put)(_reducer.actions.setUser((0, _extends2.default)({}, _dummy.userDemo)));
617
+ (_payload$callback11 = payload.callback) == null ? void 0 : _payload$callback11.call(payload, true);
618
+ }
619
+
620
+ function* preDisableMfaSmsMock(_ref10) {
621
+ let {} = _ref10,
622
+ payload = (0, _objectWithoutPropertiesLoose2.default)(_ref10.payload, _excluded10);
623
+ yield (0, _effects.put)(_reducer.actions.setMfaState({
624
+ saving: true
625
+ }));
626
+
627
+ try {
628
+ var _payload$callback12;
629
+
630
+ yield (0, _effects.put)(_reducer.actions.setMfaState({
631
+ saving: false,
632
+ error: undefined,
633
+ otcToken: 'otc-token',
634
+ phoneNumber: '+972504589346'
635
+ }));
636
+ (_payload$callback12 = payload.callback) == null ? void 0 : _payload$callback12.call(payload, true);
637
+ } catch (e) {
638
+ var _payload$callback13;
639
+
640
+ yield (0, _effects.put)(_reducer.actions.setMfaState({
641
+ saving: false,
642
+ error: e.message
643
+ }));
644
+ (_payload$callback13 = payload.callback) == null ? void 0 : _payload$callback13.call(payload, false, e);
645
+ }
646
+ }
647
+
648
+ function* disableMfaSmsMock({
649
+ payload
650
+ }) {
651
+ var _payload$callback14;
652
+
653
+ const {
654
+ mfaDevices = {
655
+ webauthn: [],
656
+ phones: [],
657
+ authenticators: []
658
+ }
659
+ } = yield (0, _effects.select)(state => state.auth.mfaState);
660
+ yield (0, _effects.put)(_reducer.actions.setMfaState({
661
+ saving: true
595
662
  }));
596
663
  yield (0, _utils.delay)();
597
664
  yield (0, _effects.put)(_reducer.actions.setMfaState({
598
665
  loading: false,
599
- error: undefined
666
+ error: undefined,
667
+ mfaDevices: (0, _extends2.default)({}, mfaDevices, {
668
+ phones: []
669
+ })
670
+ }));
671
+ yield (0, _effects.put)(_reducer.actions.setUser((0, _extends2.default)({}, _dummy.userDemo)));
672
+ (_payload$callback14 = payload.callback) == null ? void 0 : _payload$callback14.call(payload, true);
673
+ }
674
+
675
+ function* preEnrollMfaSmsMock({
676
+ payload
677
+ }) {
678
+ var _payload$callback15;
679
+
680
+ yield (0, _effects.put)(_reducer.actions.setMfaState({
681
+ saving: true
682
+ }));
683
+ yield (0, _utils.delay)();
684
+ yield (0, _effects.put)(_reducer.actions.setMfaState({
685
+ saving: false,
686
+ error: undefined,
687
+ otcToken: 'otc-token',
688
+ phoneNumber: '+972504589346'
689
+ }));
690
+ (_payload$callback15 = payload.callback) == null ? void 0 : _payload$callback15.call(payload, true);
691
+ }
692
+
693
+ function* enrollMfaSmsMock(_ref11) {
694
+ let {
695
+ payload: {
696
+ callback
697
+ }
698
+ } = _ref11,
699
+ payload = (0, _objectWithoutPropertiesLoose2.default)(_ref11.payload, _excluded11);
700
+ const {
701
+ mfaDevices = {
702
+ webauthn: [],
703
+ phones: [],
704
+ authenticators: []
705
+ }
706
+ } = yield (0, _effects.select)(state => state.auth.mfaState);
707
+ yield (0, _effects.put)(_reducer.actions.setMfaState({
708
+ saving: true
600
709
  }));
710
+ yield (0, _utils.delay)();
711
+ const data = {
712
+ token: 'token',
713
+ recoveryCode: 'recoveryCode'
714
+ };
715
+ const mfaState = {
716
+ step: _interfaces.MFAStep.recoveryCode,
717
+ loading: false,
718
+ error: undefined,
719
+ saving: false,
720
+ mfaDevices: (0, _extends2.default)({}, mfaDevices, {
721
+ phones: [{
722
+ id: 'phone-id',
723
+ phoneNumber: '+972504589346'
724
+ }]
725
+ })
726
+ };
727
+
728
+ if (data != null && data.recoveryCode) {
729
+ mfaState.recoveryCode = data.recoveryCode;
730
+ }
731
+
732
+ yield (0, _effects.put)(_reducer.actions.setMfaState(mfaState));
601
733
  yield (0, _effects.put)(_reducer.actions.setUser((0, _extends2.default)({}, _dummy.userDemo, {
602
- mfaEnrolled: false
734
+ mfaEnrolled: true
603
735
  })));
604
- (_payload$callback11 = payload.callback) == null ? void 0 : _payload$callback11.call(payload, true);
736
+ callback == null ? void 0 : callback(mfaState.recoveryCode);
605
737
  }
606
738
 
607
739
  function* mfaSagasMock() {
@@ -609,4 +741,8 @@ function* mfaSagasMock() {
609
741
  yield (0, _effects.takeEvery)(_reducer.actions.verifyMfa, verifyMfaMock);
610
742
  yield (0, _effects.takeEvery)(_reducer.actions.disableMfa, disableMfaMock);
611
743
  yield (0, _effects.takeEvery)(_reducer.actions.verifyMfaAfterForce, verifyMfaAfterForceMock);
744
+ yield (0, _effects.takeEvery)(_reducer.actions.preDisableMfaSms, preDisableMfaSmsMock);
745
+ yield (0, _effects.takeEvery)(_reducer.actions.disableMfaSms, disableMfaSmsMock);
746
+ yield (0, _effects.takeEvery)(_reducer.actions.preEnrollMfaSms, preEnrollMfaSmsMock);
747
+ yield (0, _effects.takeEvery)(_reducer.actions.enrollMfaSms, enrollMfaSmsMock);
612
748
  }
package/node/index.js CHANGED
@@ -1,4 +1,4 @@
1
- /** @license Frontegg v6.51.0
1
+ /** @license Frontegg v6.52.0-alpha.0
2
2
  *
3
3
  * This source code is licensed under the MIT license found in the
4
4
  * LICENSE file in the root directory of this source tree.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@frontegg/redux-store",
3
- "version": "6.51.0",
3
+ "version": "6.52.0-alpha.0",
4
4
  "main": "./node/index.js",
5
5
  "license": "MIT",
6
6
  "author": "Frontegg LTD",