@nibssplc/cams-sdk-react 0.0.1-beta.93 → 0.0.1-beta.95
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/components/MFAGate.d.ts +2 -1
- package/dist/index.cjs.js +26 -7
- package/dist/index.cjs.js.map +1 -1
- package/dist/index.d.ts +1 -1
- package/dist/index.esm.js +26 -7
- package/dist/index.esm.js.map +1 -1
- package/package.json +1 -1
package/dist/index.d.ts
CHANGED
|
@@ -7,7 +7,7 @@ export * from './components/ClientOnly';
|
|
|
7
7
|
export * from './components/UnifiedCAMSProvider';
|
|
8
8
|
export { default as MFAOptions } from './components/MFAOptions';
|
|
9
9
|
export { default as MFAGate } from './components/MFAGate';
|
|
10
|
-
export { default as
|
|
10
|
+
export { default as DefaultLoginPage } from './components/DefaultLoginPage';
|
|
11
11
|
export { default as ClientOnly } from './components/ClientOnly';
|
|
12
12
|
export { register, authenticate } from './components/CoreFIDO';
|
|
13
13
|
export { useCAMSContext } from './context/CAMSContext';
|
package/dist/index.esm.js
CHANGED
|
@@ -1850,7 +1850,12 @@ var MFAOptions = function (_a) {
|
|
|
1850
1850
|
_a.trys.push([0, 4, , 5]);
|
|
1851
1851
|
// 1. Fetch authentication challenge from your server
|
|
1852
1852
|
console.log("Requesting authentication challenge from server...");
|
|
1853
|
-
return [4 /*yield*/, axios.post(MFAEndpoints.RetrieveAuthChallenge
|
|
1853
|
+
return [4 /*yield*/, axios.post(MFAEndpoints.RetrieveAuthChallenge, {}, {
|
|
1854
|
+
headers: {
|
|
1855
|
+
"X-DEVICE-ID": GenerateDeviceId(),
|
|
1856
|
+
"X-API-VERSION": "1.0",
|
|
1857
|
+
},
|
|
1858
|
+
})];
|
|
1854
1859
|
case 1:
|
|
1855
1860
|
options = (_a.sent()).data;
|
|
1856
1861
|
console.log("Received challenge:", options);
|
|
@@ -1862,7 +1867,13 @@ var MFAOptions = function (_a) {
|
|
|
1862
1867
|
console.log("Authentication assertion received from client:", assertionResponse);
|
|
1863
1868
|
// 3. Send the assertion back to the server for verification
|
|
1864
1869
|
console.log("Sending assertion to server for verification...");
|
|
1865
|
-
return [4 /*yield*/, axios.post(MFAEndpoints.AuthChallengeVerify, assertionResponse
|
|
1870
|
+
return [4 /*yield*/, axios.post(MFAEndpoints.AuthChallengeVerify, assertionResponse, {
|
|
1871
|
+
headers: {
|
|
1872
|
+
"X-DEVICE-ID": GenerateDeviceId(),
|
|
1873
|
+
"X-API-VERSION": "1.0",
|
|
1874
|
+
},
|
|
1875
|
+
withCredentials: true, // credentials: 'include'
|
|
1876
|
+
})];
|
|
1866
1877
|
case 3:
|
|
1867
1878
|
_a.sent();
|
|
1868
1879
|
toast.success("🔑 Sign-in successful!");
|
|
@@ -2086,7 +2097,12 @@ var DefaultLoginPage = function (_a) {
|
|
|
2086
2097
|
_a.trys.push([0, 4, , 5]);
|
|
2087
2098
|
// 1. Fetch challenge from your server
|
|
2088
2099
|
console.log("Requesting registration challenge from server...");
|
|
2089
|
-
return [4 /*yield*/, axios.post(MFAEndpoints.RegisterNewChallenge, __assign({}, data)
|
|
2100
|
+
return [4 /*yield*/, axios.post(MFAEndpoints.RegisterNewChallenge, __assign({}, data), {
|
|
2101
|
+
headers: {
|
|
2102
|
+
"X-DEVICE-ID": GenerateDeviceId(),
|
|
2103
|
+
"X-API-VERSION": "1.0",
|
|
2104
|
+
},
|
|
2105
|
+
})];
|
|
2090
2106
|
case 1:
|
|
2091
2107
|
options = (_a.sent()).data;
|
|
2092
2108
|
console.log("Received challenge:", options);
|
|
@@ -2099,7 +2115,10 @@ var DefaultLoginPage = function (_a) {
|
|
|
2099
2115
|
// 3. Send the response back to the server for verification
|
|
2100
2116
|
console.log("Sending attestation to server for verification...");
|
|
2101
2117
|
return [4 /*yield*/, axios.post(MFAEndpoints.RegisterVerify, attestationResponse, {
|
|
2102
|
-
headers: {
|
|
2118
|
+
headers: {
|
|
2119
|
+
"X-DEVICE-ID": GenerateDeviceId(),
|
|
2120
|
+
"X-API-VERSION": "1.0",
|
|
2121
|
+
},
|
|
2103
2122
|
withCredentials: true, // credentials: 'include'
|
|
2104
2123
|
})];
|
|
2105
2124
|
case 3:
|
|
@@ -2146,7 +2165,7 @@ var MFAGate = function (_a) {
|
|
|
2146
2165
|
// loginComponent: LoginComponent = DefaultLoginPage,
|
|
2147
2166
|
_c = _a.usePassKey,
|
|
2148
2167
|
// loginComponent: LoginComponent = DefaultLoginPage,
|
|
2149
|
-
usePassKey = _c === void 0 ? false : _c, MFAEndpoints = _a.MFAEndpoints;
|
|
2168
|
+
usePassKey = _c === void 0 ? false : _c, PassKeysRegisterProps = _a.PassKeysRegisterProps, MFAEndpoints = _a.MFAEndpoints;
|
|
2150
2169
|
var context = useCAMSContext();
|
|
2151
2170
|
var validatedMFAEndpoints = useMemo(function () {
|
|
2152
2171
|
var parsed = MFAEndpointsSchema.safeParse(MFAEndpoints);
|
|
@@ -2181,10 +2200,10 @@ var MFAGate = function (_a) {
|
|
|
2181
2200
|
return (jsxRuntimeExports.jsx(MFAOptions, { MFAEndpoints: validatedMFAEndpoints, usePassKey: usePassKey, onComplete: handleComplete, onAuthFailed: handleAuthFailed }));
|
|
2182
2201
|
}
|
|
2183
2202
|
if (!context.isAuthenticated) {
|
|
2184
|
-
return jsxRuntimeExports.jsx(DefaultLoginPage, { usePassKey: usePassKey, MFAEndpoints: MFAEndpoints });
|
|
2203
|
+
return (jsxRuntimeExports.jsx(DefaultLoginPage, { usePassKey: usePassKey, MFAEndpoints: MFAEndpoints, PassKeysRegisterProps: PassKeysRegisterProps }));
|
|
2185
2204
|
}
|
|
2186
2205
|
return jsxRuntimeExports.jsx(jsxRuntimeExports.Fragment, { children: children });
|
|
2187
2206
|
};
|
|
2188
2207
|
|
|
2189
|
-
export { CAMSMSALProvider, CAMSProvider, ClientOnly, DefaultLoginPage
|
|
2208
|
+
export { CAMSMSALProvider, CAMSProvider, ClientOnly, DefaultLoginPage, MFAGate, MFAOptions, ProtectedRoute, UnifiedCAMSProvider, authenticate, register, useCAMSAuth, useCAMSContext, useCAMSMSALAuth, useCAMSMSALContext, useWebAuthn };
|
|
2190
2209
|
//# sourceMappingURL=index.esm.js.map
|