@frontegg/redux-store 6.51.0 → 6.52.0-alpha.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/auth/MfaState/saga.js +156 -18
- package/index.js +1 -1
- package/node/auth/MfaState/saga.js +154 -18
- package/node/index.js +1 -1
- package/package.json +1 -1
package/auth/MfaState/saga.js
CHANGED
|
@@ -8,7 +8,9 @@ const _excluded = ["callback"],
|
|
|
8
8
|
_excluded6 = ["callback"],
|
|
9
9
|
_excluded7 = ["deviceId"],
|
|
10
10
|
_excluded8 = ["deviceId"],
|
|
11
|
-
_excluded9 = ["callback"]
|
|
11
|
+
_excluded9 = ["callback"],
|
|
12
|
+
_excluded10 = ["deviceId"],
|
|
13
|
+
_excluded11 = ["callback"];
|
|
12
14
|
import { call, put, select, takeEvery } from 'redux-saga/effects';
|
|
13
15
|
import { api } from '@frontegg/rest-api';
|
|
14
16
|
import { actions } from '../reducer';
|
|
@@ -216,7 +218,6 @@ function* enrollMfaWebAuthn(_ref3) {
|
|
|
216
218
|
yield put(actions.setMfaState(_extends({}, mfaState, {
|
|
217
219
|
mfaDevices
|
|
218
220
|
})));
|
|
219
|
-
console.log(callback, mfaState.recoveryCode);
|
|
220
221
|
callback == null ? void 0 : callback(mfaState.recoveryCode);
|
|
221
222
|
} catch (e) {
|
|
222
223
|
yield put(actions.setMfaState({
|
|
@@ -375,7 +376,6 @@ function* preDisableMfaSms(_ref7) {
|
|
|
375
376
|
try {
|
|
376
377
|
var _payload$callback7;
|
|
377
378
|
|
|
378
|
-
const user = yield select(state => state.auth.user);
|
|
379
379
|
const res = yield call(api.auth.preDisableMFASMS, deviceId);
|
|
380
380
|
yield put(actions.setMfaState({
|
|
381
381
|
saving: false,
|
|
@@ -383,9 +383,6 @@ function* preDisableMfaSms(_ref7) {
|
|
|
383
383
|
otcToken: res.otcToken,
|
|
384
384
|
phoneNumber: res.phoneNumber
|
|
385
385
|
}));
|
|
386
|
-
yield put(actions.setUser(_extends({}, user, {
|
|
387
|
-
mfaEnrolled: false
|
|
388
|
-
})));
|
|
389
386
|
(_payload$callback7 = payload.callback) == null ? void 0 : _payload$callback7.call(payload, true);
|
|
390
387
|
} catch (e) {
|
|
391
388
|
var _payload$callback8;
|
|
@@ -413,7 +410,6 @@ function* disableMfaSms(_ref8) {
|
|
|
413
410
|
try {
|
|
414
411
|
var _payload$callback9;
|
|
415
412
|
|
|
416
|
-
const user = yield select(state => state.auth.user);
|
|
417
413
|
yield call(api.auth.disableMFASMS, deviceId, payload);
|
|
418
414
|
const mfaDevices = yield call(api.auth.getMFADevices);
|
|
419
415
|
yield put(actions.setMfaState({
|
|
@@ -421,9 +417,6 @@ function* disableMfaSms(_ref8) {
|
|
|
421
417
|
error: undefined,
|
|
422
418
|
mfaDevices
|
|
423
419
|
}));
|
|
424
|
-
yield put(actions.setUser(_extends({}, user, {
|
|
425
|
-
mfaEnrolled: false
|
|
426
|
-
})));
|
|
427
420
|
(_payload$callback9 = payload.callback) == null ? void 0 : _payload$callback9.call(payload, true);
|
|
428
421
|
} catch (e) {
|
|
429
422
|
var _payload$callback10;
|
|
@@ -504,11 +497,11 @@ export function* mfaSagas() {
|
|
|
504
497
|
|
|
505
498
|
function* enrollMfaMock() {
|
|
506
499
|
yield put(actions.setMfaState({
|
|
507
|
-
|
|
500
|
+
saving: true
|
|
508
501
|
}));
|
|
509
502
|
const qrCode = 'test';
|
|
510
503
|
yield put(actions.setMfaState({
|
|
511
|
-
|
|
504
|
+
saving: false,
|
|
512
505
|
error: undefined,
|
|
513
506
|
qrCode
|
|
514
507
|
}));
|
|
@@ -519,8 +512,15 @@ function* verifyMfaMock({
|
|
|
519
512
|
callback
|
|
520
513
|
}
|
|
521
514
|
}) {
|
|
515
|
+
const {
|
|
516
|
+
mfaDevices = {
|
|
517
|
+
webauthn: [],
|
|
518
|
+
phones: [],
|
|
519
|
+
authenticators: []
|
|
520
|
+
}
|
|
521
|
+
} = yield select(state => state.auth.mfaState);
|
|
522
522
|
yield put(actions.setMfaState({
|
|
523
|
-
|
|
523
|
+
saving: true
|
|
524
524
|
}));
|
|
525
525
|
yield delay();
|
|
526
526
|
const data = {
|
|
@@ -531,7 +531,12 @@ function* verifyMfaMock({
|
|
|
531
531
|
step: MFAStep.recoveryCode,
|
|
532
532
|
loading: false,
|
|
533
533
|
error: undefined,
|
|
534
|
-
saving: false
|
|
534
|
+
saving: false,
|
|
535
|
+
mfaDevices: _extends({}, mfaDevices, {
|
|
536
|
+
authenticators: [{
|
|
537
|
+
id: 'authenticator-id'
|
|
538
|
+
}]
|
|
539
|
+
})
|
|
535
540
|
};
|
|
536
541
|
|
|
537
542
|
if (data != null && data.recoveryCode) {
|
|
@@ -586,18 +591,147 @@ function* disableMfaMock({
|
|
|
586
591
|
}) {
|
|
587
592
|
var _payload$callback11;
|
|
588
593
|
|
|
594
|
+
const {
|
|
595
|
+
mfaDevices = {
|
|
596
|
+
webauthn: [],
|
|
597
|
+
phones: [],
|
|
598
|
+
authenticators: []
|
|
599
|
+
}
|
|
600
|
+
} = yield select(state => state.auth.mfaState);
|
|
589
601
|
yield put(actions.setMfaState({
|
|
590
|
-
|
|
602
|
+
saving: true
|
|
603
|
+
}));
|
|
604
|
+
yield delay();
|
|
605
|
+
yield put(actions.setMfaState({
|
|
606
|
+
saving: false,
|
|
607
|
+
error: undefined,
|
|
608
|
+
mfaDevices: _extends({}, mfaDevices, {
|
|
609
|
+
authenticators: []
|
|
610
|
+
})
|
|
611
|
+
}));
|
|
612
|
+
yield put(actions.setUser(_extends({}, userDemo)));
|
|
613
|
+
(_payload$callback11 = payload.callback) == null ? void 0 : _payload$callback11.call(payload, true);
|
|
614
|
+
}
|
|
615
|
+
|
|
616
|
+
function* preDisableMfaSmsMock(_ref10) {
|
|
617
|
+
let {} = _ref10,
|
|
618
|
+
payload = _objectWithoutPropertiesLoose(_ref10.payload, _excluded10);
|
|
619
|
+
|
|
620
|
+
yield put(actions.setMfaState({
|
|
621
|
+
saving: true
|
|
622
|
+
}));
|
|
623
|
+
|
|
624
|
+
try {
|
|
625
|
+
var _payload$callback12;
|
|
626
|
+
|
|
627
|
+
yield put(actions.setMfaState({
|
|
628
|
+
saving: false,
|
|
629
|
+
error: undefined,
|
|
630
|
+
otcToken: 'otc-token',
|
|
631
|
+
phoneNumber: '+972504589346'
|
|
632
|
+
}));
|
|
633
|
+
(_payload$callback12 = payload.callback) == null ? void 0 : _payload$callback12.call(payload, true);
|
|
634
|
+
} catch (e) {
|
|
635
|
+
var _payload$callback13;
|
|
636
|
+
|
|
637
|
+
yield put(actions.setMfaState({
|
|
638
|
+
saving: false,
|
|
639
|
+
error: e.message
|
|
640
|
+
}));
|
|
641
|
+
(_payload$callback13 = payload.callback) == null ? void 0 : _payload$callback13.call(payload, false, e);
|
|
642
|
+
}
|
|
643
|
+
}
|
|
644
|
+
|
|
645
|
+
function* disableMfaSmsMock({
|
|
646
|
+
payload
|
|
647
|
+
}) {
|
|
648
|
+
var _payload$callback14;
|
|
649
|
+
|
|
650
|
+
const {
|
|
651
|
+
mfaDevices = {
|
|
652
|
+
webauthn: [],
|
|
653
|
+
phones: [],
|
|
654
|
+
authenticators: []
|
|
655
|
+
}
|
|
656
|
+
} = yield select(state => state.auth.mfaState);
|
|
657
|
+
yield put(actions.setMfaState({
|
|
658
|
+
saving: true
|
|
591
659
|
}));
|
|
592
660
|
yield delay();
|
|
593
661
|
yield put(actions.setMfaState({
|
|
594
662
|
loading: false,
|
|
595
|
-
error: undefined
|
|
663
|
+
error: undefined,
|
|
664
|
+
mfaDevices: _extends({}, mfaDevices, {
|
|
665
|
+
phones: []
|
|
666
|
+
})
|
|
596
667
|
}));
|
|
668
|
+
yield put(actions.setUser(_extends({}, userDemo)));
|
|
669
|
+
(_payload$callback14 = payload.callback) == null ? void 0 : _payload$callback14.call(payload, true);
|
|
670
|
+
}
|
|
671
|
+
|
|
672
|
+
function* preEnrollMfaSmsMock({
|
|
673
|
+
payload
|
|
674
|
+
}) {
|
|
675
|
+
var _payload$callback15;
|
|
676
|
+
|
|
677
|
+
yield put(actions.setMfaState({
|
|
678
|
+
saving: true
|
|
679
|
+
}));
|
|
680
|
+
yield delay();
|
|
681
|
+
yield put(actions.setMfaState({
|
|
682
|
+
saving: false,
|
|
683
|
+
error: undefined,
|
|
684
|
+
otcToken: 'otc-token',
|
|
685
|
+
phoneNumber: '+972504589346'
|
|
686
|
+
}));
|
|
687
|
+
(_payload$callback15 = payload.callback) == null ? void 0 : _payload$callback15.call(payload, true);
|
|
688
|
+
}
|
|
689
|
+
|
|
690
|
+
function* enrollMfaSmsMock(_ref11) {
|
|
691
|
+
let {
|
|
692
|
+
payload: {
|
|
693
|
+
callback
|
|
694
|
+
}
|
|
695
|
+
} = _ref11,
|
|
696
|
+
payload = _objectWithoutPropertiesLoose(_ref11.payload, _excluded11);
|
|
697
|
+
|
|
698
|
+
const {
|
|
699
|
+
mfaDevices = {
|
|
700
|
+
webauthn: [],
|
|
701
|
+
phones: [],
|
|
702
|
+
authenticators: []
|
|
703
|
+
}
|
|
704
|
+
} = yield select(state => state.auth.mfaState);
|
|
705
|
+
yield put(actions.setMfaState({
|
|
706
|
+
saving: true
|
|
707
|
+
}));
|
|
708
|
+
yield delay();
|
|
709
|
+
const data = {
|
|
710
|
+
token: 'token',
|
|
711
|
+
recoveryCode: 'recoveryCode'
|
|
712
|
+
};
|
|
713
|
+
const mfaState = {
|
|
714
|
+
step: MFAStep.recoveryCode,
|
|
715
|
+
loading: false,
|
|
716
|
+
error: undefined,
|
|
717
|
+
saving: false,
|
|
718
|
+
mfaDevices: _extends({}, mfaDevices, {
|
|
719
|
+
phones: [{
|
|
720
|
+
id: 'phone-id',
|
|
721
|
+
phoneNumber: '+972504589346'
|
|
722
|
+
}]
|
|
723
|
+
})
|
|
724
|
+
};
|
|
725
|
+
|
|
726
|
+
if (data != null && data.recoveryCode) {
|
|
727
|
+
mfaState.recoveryCode = data.recoveryCode;
|
|
728
|
+
}
|
|
729
|
+
|
|
730
|
+
yield put(actions.setMfaState(mfaState));
|
|
597
731
|
yield put(actions.setUser(_extends({}, userDemo, {
|
|
598
|
-
mfaEnrolled:
|
|
732
|
+
mfaEnrolled: true
|
|
599
733
|
})));
|
|
600
|
-
|
|
734
|
+
callback == null ? void 0 : callback(mfaState.recoveryCode);
|
|
601
735
|
}
|
|
602
736
|
|
|
603
737
|
export function* mfaSagasMock() {
|
|
@@ -605,4 +739,8 @@ export function* mfaSagasMock() {
|
|
|
605
739
|
yield takeEvery(actions.verifyMfa, verifyMfaMock);
|
|
606
740
|
yield takeEvery(actions.disableMfa, disableMfaMock);
|
|
607
741
|
yield takeEvery(actions.verifyMfaAfterForce, verifyMfaAfterForceMock);
|
|
742
|
+
yield takeEvery(actions.preDisableMfaSms, preDisableMfaSmsMock);
|
|
743
|
+
yield takeEvery(actions.disableMfaSms, disableMfaSmsMock);
|
|
744
|
+
yield takeEvery(actions.preEnrollMfaSms, preEnrollMfaSmsMock);
|
|
745
|
+
yield takeEvery(actions.enrollMfaSms, enrollMfaSmsMock);
|
|
608
746
|
}
|
package/index.js
CHANGED
|
@@ -32,7 +32,9 @@ const _excluded = ["callback"],
|
|
|
32
32
|
_excluded6 = ["callback"],
|
|
33
33
|
_excluded7 = ["deviceId"],
|
|
34
34
|
_excluded8 = ["deviceId"],
|
|
35
|
-
_excluded9 = ["callback"]
|
|
35
|
+
_excluded9 = ["callback"],
|
|
36
|
+
_excluded10 = ["deviceId"],
|
|
37
|
+
_excluded11 = ["callback"];
|
|
36
38
|
|
|
37
39
|
function* getMfaStateAfterEnroll(res) {
|
|
38
40
|
const {
|
|
@@ -229,7 +231,6 @@ function* enrollMfaWebAuthn(_ref3) {
|
|
|
229
231
|
yield (0, _effects.put)(_reducer.actions.setMfaState((0, _extends2.default)({}, mfaState, {
|
|
230
232
|
mfaDevices
|
|
231
233
|
})));
|
|
232
|
-
console.log(callback, mfaState.recoveryCode);
|
|
233
234
|
callback == null ? void 0 : callback(mfaState.recoveryCode);
|
|
234
235
|
} catch (e) {
|
|
235
236
|
yield (0, _effects.put)(_reducer.actions.setMfaState({
|
|
@@ -382,7 +383,6 @@ function* preDisableMfaSms(_ref7) {
|
|
|
382
383
|
try {
|
|
383
384
|
var _payload$callback7;
|
|
384
385
|
|
|
385
|
-
const user = yield (0, _effects.select)(state => state.auth.user);
|
|
386
386
|
const res = yield (0, _effects.call)(_restApi.api.auth.preDisableMFASMS, deviceId);
|
|
387
387
|
yield (0, _effects.put)(_reducer.actions.setMfaState({
|
|
388
388
|
saving: false,
|
|
@@ -390,9 +390,6 @@ function* preDisableMfaSms(_ref7) {
|
|
|
390
390
|
otcToken: res.otcToken,
|
|
391
391
|
phoneNumber: res.phoneNumber
|
|
392
392
|
}));
|
|
393
|
-
yield (0, _effects.put)(_reducer.actions.setUser((0, _extends2.default)({}, user, {
|
|
394
|
-
mfaEnrolled: false
|
|
395
|
-
})));
|
|
396
393
|
(_payload$callback7 = payload.callback) == null ? void 0 : _payload$callback7.call(payload, true);
|
|
397
394
|
} catch (e) {
|
|
398
395
|
var _payload$callback8;
|
|
@@ -419,7 +416,6 @@ function* disableMfaSms(_ref8) {
|
|
|
419
416
|
try {
|
|
420
417
|
var _payload$callback9;
|
|
421
418
|
|
|
422
|
-
const user = yield (0, _effects.select)(state => state.auth.user);
|
|
423
419
|
yield (0, _effects.call)(_restApi.api.auth.disableMFASMS, deviceId, payload);
|
|
424
420
|
const mfaDevices = yield (0, _effects.call)(_restApi.api.auth.getMFADevices);
|
|
425
421
|
yield (0, _effects.put)(_reducer.actions.setMfaState({
|
|
@@ -427,9 +423,6 @@ function* disableMfaSms(_ref8) {
|
|
|
427
423
|
error: undefined,
|
|
428
424
|
mfaDevices
|
|
429
425
|
}));
|
|
430
|
-
yield (0, _effects.put)(_reducer.actions.setUser((0, _extends2.default)({}, user, {
|
|
431
|
-
mfaEnrolled: false
|
|
432
|
-
})));
|
|
433
426
|
(_payload$callback9 = payload.callback) == null ? void 0 : _payload$callback9.call(payload, true);
|
|
434
427
|
} catch (e) {
|
|
435
428
|
var _payload$callback10;
|
|
@@ -511,11 +504,11 @@ function* mfaSagas() {
|
|
|
511
504
|
|
|
512
505
|
function* enrollMfaMock() {
|
|
513
506
|
yield (0, _effects.put)(_reducer.actions.setMfaState({
|
|
514
|
-
|
|
507
|
+
saving: true
|
|
515
508
|
}));
|
|
516
509
|
const qrCode = 'test';
|
|
517
510
|
yield (0, _effects.put)(_reducer.actions.setMfaState({
|
|
518
|
-
|
|
511
|
+
saving: false,
|
|
519
512
|
error: undefined,
|
|
520
513
|
qrCode
|
|
521
514
|
}));
|
|
@@ -526,8 +519,15 @@ function* verifyMfaMock({
|
|
|
526
519
|
callback
|
|
527
520
|
}
|
|
528
521
|
}) {
|
|
522
|
+
const {
|
|
523
|
+
mfaDevices = {
|
|
524
|
+
webauthn: [],
|
|
525
|
+
phones: [],
|
|
526
|
+
authenticators: []
|
|
527
|
+
}
|
|
528
|
+
} = yield (0, _effects.select)(state => state.auth.mfaState);
|
|
529
529
|
yield (0, _effects.put)(_reducer.actions.setMfaState({
|
|
530
|
-
|
|
530
|
+
saving: true
|
|
531
531
|
}));
|
|
532
532
|
yield (0, _utils.delay)();
|
|
533
533
|
const data = {
|
|
@@ -538,7 +538,12 @@ function* verifyMfaMock({
|
|
|
538
538
|
step: _interfaces.MFAStep.recoveryCode,
|
|
539
539
|
loading: false,
|
|
540
540
|
error: undefined,
|
|
541
|
-
saving: false
|
|
541
|
+
saving: false,
|
|
542
|
+
mfaDevices: (0, _extends2.default)({}, mfaDevices, {
|
|
543
|
+
authenticators: [{
|
|
544
|
+
id: 'authenticator-id'
|
|
545
|
+
}]
|
|
546
|
+
})
|
|
542
547
|
};
|
|
543
548
|
|
|
544
549
|
if (data != null && data.recoveryCode) {
|
|
@@ -590,18 +595,145 @@ function* disableMfaMock({
|
|
|
590
595
|
}) {
|
|
591
596
|
var _payload$callback11;
|
|
592
597
|
|
|
598
|
+
const {
|
|
599
|
+
mfaDevices = {
|
|
600
|
+
webauthn: [],
|
|
601
|
+
phones: [],
|
|
602
|
+
authenticators: []
|
|
603
|
+
}
|
|
604
|
+
} = yield (0, _effects.select)(state => state.auth.mfaState);
|
|
593
605
|
yield (0, _effects.put)(_reducer.actions.setMfaState({
|
|
594
|
-
|
|
606
|
+
saving: true
|
|
607
|
+
}));
|
|
608
|
+
yield (0, _utils.delay)();
|
|
609
|
+
yield (0, _effects.put)(_reducer.actions.setMfaState({
|
|
610
|
+
saving: false,
|
|
611
|
+
error: undefined,
|
|
612
|
+
mfaDevices: (0, _extends2.default)({}, mfaDevices, {
|
|
613
|
+
authenticators: []
|
|
614
|
+
})
|
|
615
|
+
}));
|
|
616
|
+
yield (0, _effects.put)(_reducer.actions.setUser((0, _extends2.default)({}, _dummy.userDemo)));
|
|
617
|
+
(_payload$callback11 = payload.callback) == null ? void 0 : _payload$callback11.call(payload, true);
|
|
618
|
+
}
|
|
619
|
+
|
|
620
|
+
function* preDisableMfaSmsMock(_ref10) {
|
|
621
|
+
let {} = _ref10,
|
|
622
|
+
payload = (0, _objectWithoutPropertiesLoose2.default)(_ref10.payload, _excluded10);
|
|
623
|
+
yield (0, _effects.put)(_reducer.actions.setMfaState({
|
|
624
|
+
saving: true
|
|
625
|
+
}));
|
|
626
|
+
|
|
627
|
+
try {
|
|
628
|
+
var _payload$callback12;
|
|
629
|
+
|
|
630
|
+
yield (0, _effects.put)(_reducer.actions.setMfaState({
|
|
631
|
+
saving: false,
|
|
632
|
+
error: undefined,
|
|
633
|
+
otcToken: 'otc-token',
|
|
634
|
+
phoneNumber: '+972504589346'
|
|
635
|
+
}));
|
|
636
|
+
(_payload$callback12 = payload.callback) == null ? void 0 : _payload$callback12.call(payload, true);
|
|
637
|
+
} catch (e) {
|
|
638
|
+
var _payload$callback13;
|
|
639
|
+
|
|
640
|
+
yield (0, _effects.put)(_reducer.actions.setMfaState({
|
|
641
|
+
saving: false,
|
|
642
|
+
error: e.message
|
|
643
|
+
}));
|
|
644
|
+
(_payload$callback13 = payload.callback) == null ? void 0 : _payload$callback13.call(payload, false, e);
|
|
645
|
+
}
|
|
646
|
+
}
|
|
647
|
+
|
|
648
|
+
function* disableMfaSmsMock({
|
|
649
|
+
payload
|
|
650
|
+
}) {
|
|
651
|
+
var _payload$callback14;
|
|
652
|
+
|
|
653
|
+
const {
|
|
654
|
+
mfaDevices = {
|
|
655
|
+
webauthn: [],
|
|
656
|
+
phones: [],
|
|
657
|
+
authenticators: []
|
|
658
|
+
}
|
|
659
|
+
} = yield (0, _effects.select)(state => state.auth.mfaState);
|
|
660
|
+
yield (0, _effects.put)(_reducer.actions.setMfaState({
|
|
661
|
+
saving: true
|
|
595
662
|
}));
|
|
596
663
|
yield (0, _utils.delay)();
|
|
597
664
|
yield (0, _effects.put)(_reducer.actions.setMfaState({
|
|
598
665
|
loading: false,
|
|
599
|
-
error: undefined
|
|
666
|
+
error: undefined,
|
|
667
|
+
mfaDevices: (0, _extends2.default)({}, mfaDevices, {
|
|
668
|
+
phones: []
|
|
669
|
+
})
|
|
670
|
+
}));
|
|
671
|
+
yield (0, _effects.put)(_reducer.actions.setUser((0, _extends2.default)({}, _dummy.userDemo)));
|
|
672
|
+
(_payload$callback14 = payload.callback) == null ? void 0 : _payload$callback14.call(payload, true);
|
|
673
|
+
}
|
|
674
|
+
|
|
675
|
+
function* preEnrollMfaSmsMock({
|
|
676
|
+
payload
|
|
677
|
+
}) {
|
|
678
|
+
var _payload$callback15;
|
|
679
|
+
|
|
680
|
+
yield (0, _effects.put)(_reducer.actions.setMfaState({
|
|
681
|
+
saving: true
|
|
682
|
+
}));
|
|
683
|
+
yield (0, _utils.delay)();
|
|
684
|
+
yield (0, _effects.put)(_reducer.actions.setMfaState({
|
|
685
|
+
saving: false,
|
|
686
|
+
error: undefined,
|
|
687
|
+
otcToken: 'otc-token',
|
|
688
|
+
phoneNumber: '+972504589346'
|
|
689
|
+
}));
|
|
690
|
+
(_payload$callback15 = payload.callback) == null ? void 0 : _payload$callback15.call(payload, true);
|
|
691
|
+
}
|
|
692
|
+
|
|
693
|
+
function* enrollMfaSmsMock(_ref11) {
|
|
694
|
+
let {
|
|
695
|
+
payload: {
|
|
696
|
+
callback
|
|
697
|
+
}
|
|
698
|
+
} = _ref11,
|
|
699
|
+
payload = (0, _objectWithoutPropertiesLoose2.default)(_ref11.payload, _excluded11);
|
|
700
|
+
const {
|
|
701
|
+
mfaDevices = {
|
|
702
|
+
webauthn: [],
|
|
703
|
+
phones: [],
|
|
704
|
+
authenticators: []
|
|
705
|
+
}
|
|
706
|
+
} = yield (0, _effects.select)(state => state.auth.mfaState);
|
|
707
|
+
yield (0, _effects.put)(_reducer.actions.setMfaState({
|
|
708
|
+
saving: true
|
|
600
709
|
}));
|
|
710
|
+
yield (0, _utils.delay)();
|
|
711
|
+
const data = {
|
|
712
|
+
token: 'token',
|
|
713
|
+
recoveryCode: 'recoveryCode'
|
|
714
|
+
};
|
|
715
|
+
const mfaState = {
|
|
716
|
+
step: _interfaces.MFAStep.recoveryCode,
|
|
717
|
+
loading: false,
|
|
718
|
+
error: undefined,
|
|
719
|
+
saving: false,
|
|
720
|
+
mfaDevices: (0, _extends2.default)({}, mfaDevices, {
|
|
721
|
+
phones: [{
|
|
722
|
+
id: 'phone-id',
|
|
723
|
+
phoneNumber: '+972504589346'
|
|
724
|
+
}]
|
|
725
|
+
})
|
|
726
|
+
};
|
|
727
|
+
|
|
728
|
+
if (data != null && data.recoveryCode) {
|
|
729
|
+
mfaState.recoveryCode = data.recoveryCode;
|
|
730
|
+
}
|
|
731
|
+
|
|
732
|
+
yield (0, _effects.put)(_reducer.actions.setMfaState(mfaState));
|
|
601
733
|
yield (0, _effects.put)(_reducer.actions.setUser((0, _extends2.default)({}, _dummy.userDemo, {
|
|
602
|
-
mfaEnrolled:
|
|
734
|
+
mfaEnrolled: true
|
|
603
735
|
})));
|
|
604
|
-
|
|
736
|
+
callback == null ? void 0 : callback(mfaState.recoveryCode);
|
|
605
737
|
}
|
|
606
738
|
|
|
607
739
|
function* mfaSagasMock() {
|
|
@@ -609,4 +741,8 @@ function* mfaSagasMock() {
|
|
|
609
741
|
yield (0, _effects.takeEvery)(_reducer.actions.verifyMfa, verifyMfaMock);
|
|
610
742
|
yield (0, _effects.takeEvery)(_reducer.actions.disableMfa, disableMfaMock);
|
|
611
743
|
yield (0, _effects.takeEvery)(_reducer.actions.verifyMfaAfterForce, verifyMfaAfterForceMock);
|
|
744
|
+
yield (0, _effects.takeEvery)(_reducer.actions.preDisableMfaSms, preDisableMfaSmsMock);
|
|
745
|
+
yield (0, _effects.takeEvery)(_reducer.actions.disableMfaSms, disableMfaSmsMock);
|
|
746
|
+
yield (0, _effects.takeEvery)(_reducer.actions.preEnrollMfaSms, preEnrollMfaSmsMock);
|
|
747
|
+
yield (0, _effects.takeEvery)(_reducer.actions.enrollMfaSms, enrollMfaSmsMock);
|
|
612
748
|
}
|
package/node/index.js
CHANGED