@nibssplc/cams-sdk-react 1.0.0-rc.100 → 1.0.0-rc.101

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.esm.js CHANGED
@@ -422,8 +422,11 @@ function useCAMSMSALAuth(options) {
422
422
  var _f = useState(""), email = _f[0], setEmail = _f[1];
423
423
  var _g = useState(false), requiresMFA = _g[0], setRequiresMFA = _g[1];
424
424
  var _h = useState(false), isFetchingMFAConfig = _h[0], setIsFetchingMFAConfig = _h[1];
425
+ var _j = useState(false), isAuthenticated = _j[0], setIsAuthenticated = _j[1];
425
426
  var isLoading = inProgress !== InteractionStatus.None || isFetchingMFAConfig;
426
- var isAuthenticated = !!account && !!accessToken;
427
+ useEffect(function () {
428
+ setIsAuthenticated(!!account && !!accessToken && !requiresMFA);
429
+ }, [account, accessToken, requiresMFA]);
427
430
  var scopes = optScopes || ["openid", "profile", "email"];
428
431
  var isTokenValid = function (token) {
429
432
  try {
@@ -589,7 +592,7 @@ function useCAMSMSALAuth(options) {
589
592
  profile: __assign({}, data),
590
593
  }), activeCookiePeriod);
591
594
  setRequiresMFA(false);
592
- // Set requiresMFA to false after storage update
595
+ setIsAuthenticated(true);
593
596
  Logger.debug("MFA completed successfully, storage updated", {
594
597
  accessToken: accessToken,
595
598
  idToken: idToken,
@@ -629,6 +632,7 @@ function useCAMSMSALAuth(options) {
629
632
  setIdToken("");
630
633
  setError(null);
631
634
  setRequiresMFA(false);
635
+ setIsAuthenticated(false);
632
636
  if (typeof window !== "undefined") {
633
637
  localStorage.removeItem(storageKey);
634
638
  deleteCookie(storageKey + "-PROFILE");
@@ -961,7 +965,7 @@ function CAMSProviderCore(props) {
961
965
  var children = props.children, mode = props.mode, appCode = props.appCode;
962
966
  // Always call both hooks to satisfy Rules of Hooks
963
967
  var regularAuth = useCAMSAuth(mode === "REGULAR"
964
- ? __assign(__assign({}, props), { appCode: appCode })
968
+ ? __assign(__assign({}, props), { appCode: appCode, idleTimeout: 0 })
965
969
  : { appCode: "" });
966
970
  var msalAuth = useCAMSMSALAuth(mode === "MSAL"
967
971
  ? __assign(__assign({}, props), { appCode: appCode, ValidateUserEndpoint: props.ValidateUserEndpoint, activeCookiePeriod: 1 })
@@ -1570,7 +1574,7 @@ var MFAOptions = function (_a) {
1570
1574
  if (!(state && (data === null || data === void 0 ? void 0 : data.isValid))) return [3 /*break*/, 2];
1571
1575
  // Call completeMFA to update context state
1572
1576
  console.log("IN Complete MFA Block. Handling MFA", data);
1573
- return [4 /*yield*/, (completeMFA === null || completeMFA === void 0 ? void 0 : completeMFA(data))];
1577
+ return [4 /*yield*/, completeMFA(data)];
1574
1578
  case 1:
1575
1579
  _a.sent();
1576
1580
  context.setUserProfile({
@@ -1754,15 +1758,9 @@ var DefaultLoginPage = function (_a) {
1754
1758
  }));
1755
1759
  context.setUserProfile({
1756
1760
  state: "AUTH_SUCCESS",
1757
- message: data.message,
1761
+ message: (data === null || data === void 0 ? void 0 : data.message) || "Authentication Successful",
1758
1762
  role: data.userInfo.role,
1759
- profile: {
1760
- id: data.userInfo.id,
1761
- name: data.userInfo.name,
1762
- email: data.userInfo.email,
1763
- isMFAEnabled: data.userInfo.isMFAEnabled,
1764
- tokens: data.tokens,
1765
- },
1763
+ profile: __assign(__assign({}, data.userInfo), { tokens: __assign({}, data.tokens) }),
1766
1764
  });
1767
1765
  setShowADModal(false);
1768
1766
  }
@@ -1847,8 +1845,7 @@ var MFAGate = function (_a) {
1847
1845
  if (success) {
1848
1846
  var accessToken = "accessToken" in context ? context.accessToken : "";
1849
1847
  var idToken = "idToken" in context ? context.idToken : "";
1850
- Logger.info("MFA Authentication Successful", { context: context || null });
1851
- context.isAuthenticated = true;
1848
+ Logger.info("MFA Authentication Successful");
1852
1849
  setAuthState("Authenticated");
1853
1850
  if (context.authMode === "MSAL") {
1854
1851
  var tokens = { accessToken: accessToken, idToken: idToken };
@@ -1858,8 +1855,8 @@ var MFAGate = function (_a) {
1858
1855
  }
1859
1856
  }
1860
1857
  }
1861
- else if (!success) {
1862
- Logger.error("MFA Authentication Failed", { context: context || null });
1858
+ else {
1859
+ Logger.error("MFA Authentication Failed");
1863
1860
  }
1864
1861
  }, [context, onAuthSuccess]);
1865
1862
  var handleAuthFailed = useCallback(function () { return __awaiter$1(void 0, void 0, void 0, function () {
@@ -1912,10 +1909,7 @@ var MFAGate = function (_a) {
1912
1909
  return jsx(Fragment, { children: children });
1913
1910
  case "Unauthenticated":
1914
1911
  default:
1915
- return (jsx(DefaultLoginPage, { usePassKey: usePassKey, useADLogin: useADLogin, MFAEndpoints: ValidatedMFAEndpoints, PassKeysRegisterProps: PassKeysRegisterProps, CredentialsAuthEndpoint: CredentialsAuthEndpoint, onADLoginSuccess: function () {
1916
- context.isAuthenticated = true;
1917
- setAuthState("Authenticated");
1918
- } }));
1912
+ return (jsx(DefaultLoginPage, { usePassKey: usePassKey, useADLogin: useADLogin, MFAEndpoints: ValidatedMFAEndpoints, PassKeysRegisterProps: PassKeysRegisterProps, CredentialsAuthEndpoint: CredentialsAuthEndpoint, onADLoginSuccess: function () { return setAuthState("Authenticated"); } }));
1919
1913
  }
1920
1914
  };
1921
1915