@nibssplc/cams-sdk-react 1.0.0-rc.100 → 1.0.0-rc.101
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.cjs.js +14 -20
- package/dist/index.cjs.js.map +1 -1
- package/dist/index.esm.js +14 -20
- package/dist/index.esm.js.map +1 -1
- package/package.json +1 -1
package/dist/index.cjs.js
CHANGED
|
@@ -443,8 +443,11 @@ function useCAMSMSALAuth(options) {
|
|
|
443
443
|
var _f = React.useState(""), email = _f[0], setEmail = _f[1];
|
|
444
444
|
var _g = React.useState(false), requiresMFA = _g[0], setRequiresMFA = _g[1];
|
|
445
445
|
var _h = React.useState(false), isFetchingMFAConfig = _h[0], setIsFetchingMFAConfig = _h[1];
|
|
446
|
+
var _j = React.useState(false), isAuthenticated = _j[0], setIsAuthenticated = _j[1];
|
|
446
447
|
var isLoading = inProgress !== msalBrowser.InteractionStatus.None || isFetchingMFAConfig;
|
|
447
|
-
|
|
448
|
+
React.useEffect(function () {
|
|
449
|
+
setIsAuthenticated(!!account && !!accessToken && !requiresMFA);
|
|
450
|
+
}, [account, accessToken, requiresMFA]);
|
|
448
451
|
var scopes = optScopes || ["openid", "profile", "email"];
|
|
449
452
|
var isTokenValid = function (token) {
|
|
450
453
|
try {
|
|
@@ -610,7 +613,7 @@ function useCAMSMSALAuth(options) {
|
|
|
610
613
|
profile: __assign({}, data),
|
|
611
614
|
}), activeCookiePeriod);
|
|
612
615
|
setRequiresMFA(false);
|
|
613
|
-
|
|
616
|
+
setIsAuthenticated(true);
|
|
614
617
|
camsSdk.Logger.debug("MFA completed successfully, storage updated", {
|
|
615
618
|
accessToken: accessToken,
|
|
616
619
|
idToken: idToken,
|
|
@@ -650,6 +653,7 @@ function useCAMSMSALAuth(options) {
|
|
|
650
653
|
setIdToken("");
|
|
651
654
|
setError(null);
|
|
652
655
|
setRequiresMFA(false);
|
|
656
|
+
setIsAuthenticated(false);
|
|
653
657
|
if (typeof window !== "undefined") {
|
|
654
658
|
localStorage.removeItem(storageKey);
|
|
655
659
|
deleteCookie(storageKey + "-PROFILE");
|
|
@@ -982,7 +986,7 @@ function CAMSProviderCore(props) {
|
|
|
982
986
|
var children = props.children, mode = props.mode, appCode = props.appCode;
|
|
983
987
|
// Always call both hooks to satisfy Rules of Hooks
|
|
984
988
|
var regularAuth = useCAMSAuth(mode === "REGULAR"
|
|
985
|
-
? __assign(__assign({}, props), { appCode: appCode })
|
|
989
|
+
? __assign(__assign({}, props), { appCode: appCode, idleTimeout: 0 })
|
|
986
990
|
: { appCode: "" });
|
|
987
991
|
var msalAuth = useCAMSMSALAuth(mode === "MSAL"
|
|
988
992
|
? __assign(__assign({}, props), { appCode: appCode, ValidateUserEndpoint: props.ValidateUserEndpoint, activeCookiePeriod: 1 })
|
|
@@ -1591,7 +1595,7 @@ var MFAOptions = function (_a) {
|
|
|
1591
1595
|
if (!(state && (data === null || data === void 0 ? void 0 : data.isValid))) return [3 /*break*/, 2];
|
|
1592
1596
|
// Call completeMFA to update context state
|
|
1593
1597
|
console.log("IN Complete MFA Block. Handling MFA", data);
|
|
1594
|
-
return [4 /*yield*/,
|
|
1598
|
+
return [4 /*yield*/, completeMFA(data)];
|
|
1595
1599
|
case 1:
|
|
1596
1600
|
_a.sent();
|
|
1597
1601
|
context.setUserProfile({
|
|
@@ -1775,15 +1779,9 @@ var DefaultLoginPage = function (_a) {
|
|
|
1775
1779
|
}));
|
|
1776
1780
|
context.setUserProfile({
|
|
1777
1781
|
state: "AUTH_SUCCESS",
|
|
1778
|
-
message: data.message,
|
|
1782
|
+
message: (data === null || data === void 0 ? void 0 : data.message) || "Authentication Successful",
|
|
1779
1783
|
role: data.userInfo.role,
|
|
1780
|
-
profile: {
|
|
1781
|
-
id: data.userInfo.id,
|
|
1782
|
-
name: data.userInfo.name,
|
|
1783
|
-
email: data.userInfo.email,
|
|
1784
|
-
isMFAEnabled: data.userInfo.isMFAEnabled,
|
|
1785
|
-
tokens: data.tokens,
|
|
1786
|
-
},
|
|
1784
|
+
profile: __assign(__assign({}, data.userInfo), { tokens: __assign({}, data.tokens) }),
|
|
1787
1785
|
});
|
|
1788
1786
|
setShowADModal(false);
|
|
1789
1787
|
}
|
|
@@ -1868,8 +1866,7 @@ var MFAGate = function (_a) {
|
|
|
1868
1866
|
if (success) {
|
|
1869
1867
|
var accessToken = "accessToken" in context ? context.accessToken : "";
|
|
1870
1868
|
var idToken = "idToken" in context ? context.idToken : "";
|
|
1871
|
-
camsSdk.Logger.info("MFA Authentication Successful"
|
|
1872
|
-
context.isAuthenticated = true;
|
|
1869
|
+
camsSdk.Logger.info("MFA Authentication Successful");
|
|
1873
1870
|
setAuthState("Authenticated");
|
|
1874
1871
|
if (context.authMode === "MSAL") {
|
|
1875
1872
|
var tokens = { accessToken: accessToken, idToken: idToken };
|
|
@@ -1879,8 +1876,8 @@ var MFAGate = function (_a) {
|
|
|
1879
1876
|
}
|
|
1880
1877
|
}
|
|
1881
1878
|
}
|
|
1882
|
-
else
|
|
1883
|
-
camsSdk.Logger.error("MFA Authentication Failed"
|
|
1879
|
+
else {
|
|
1880
|
+
camsSdk.Logger.error("MFA Authentication Failed");
|
|
1884
1881
|
}
|
|
1885
1882
|
}, [context, onAuthSuccess]);
|
|
1886
1883
|
var handleAuthFailed = React.useCallback(function () { return __awaiter$1(void 0, void 0, void 0, function () {
|
|
@@ -1933,10 +1930,7 @@ var MFAGate = function (_a) {
|
|
|
1933
1930
|
return jsxRuntime.jsx(jsxRuntime.Fragment, { children: children });
|
|
1934
1931
|
case "Unauthenticated":
|
|
1935
1932
|
default:
|
|
1936
|
-
return (jsxRuntime.jsx(DefaultLoginPage, { usePassKey: usePassKey, useADLogin: useADLogin, MFAEndpoints: ValidatedMFAEndpoints, PassKeysRegisterProps: PassKeysRegisterProps, CredentialsAuthEndpoint: CredentialsAuthEndpoint, onADLoginSuccess: function () {
|
|
1937
|
-
context.isAuthenticated = true;
|
|
1938
|
-
setAuthState("Authenticated");
|
|
1939
|
-
} }));
|
|
1933
|
+
return (jsxRuntime.jsx(DefaultLoginPage, { usePassKey: usePassKey, useADLogin: useADLogin, MFAEndpoints: ValidatedMFAEndpoints, PassKeysRegisterProps: PassKeysRegisterProps, CredentialsAuthEndpoint: CredentialsAuthEndpoint, onADLoginSuccess: function () { return setAuthState("Authenticated"); } }));
|
|
1940
1934
|
}
|
|
1941
1935
|
};
|
|
1942
1936
|
|