@nibssplc/cams-sdk-react 1.0.0-rc.100 → 1.0.0-rc.101
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.cjs.js +14 -20
- package/dist/index.cjs.js.map +1 -1
- package/dist/index.esm.js +14 -20
- package/dist/index.esm.js.map +1 -1
- package/package.json +1 -1
package/dist/index.esm.js
CHANGED
|
@@ -422,8 +422,11 @@ function useCAMSMSALAuth(options) {
|
|
|
422
422
|
var _f = useState(""), email = _f[0], setEmail = _f[1];
|
|
423
423
|
var _g = useState(false), requiresMFA = _g[0], setRequiresMFA = _g[1];
|
|
424
424
|
var _h = useState(false), isFetchingMFAConfig = _h[0], setIsFetchingMFAConfig = _h[1];
|
|
425
|
+
var _j = useState(false), isAuthenticated = _j[0], setIsAuthenticated = _j[1];
|
|
425
426
|
var isLoading = inProgress !== InteractionStatus.None || isFetchingMFAConfig;
|
|
426
|
-
|
|
427
|
+
useEffect(function () {
|
|
428
|
+
setIsAuthenticated(!!account && !!accessToken && !requiresMFA);
|
|
429
|
+
}, [account, accessToken, requiresMFA]);
|
|
427
430
|
var scopes = optScopes || ["openid", "profile", "email"];
|
|
428
431
|
var isTokenValid = function (token) {
|
|
429
432
|
try {
|
|
@@ -589,7 +592,7 @@ function useCAMSMSALAuth(options) {
|
|
|
589
592
|
profile: __assign({}, data),
|
|
590
593
|
}), activeCookiePeriod);
|
|
591
594
|
setRequiresMFA(false);
|
|
592
|
-
|
|
595
|
+
setIsAuthenticated(true);
|
|
593
596
|
Logger.debug("MFA completed successfully, storage updated", {
|
|
594
597
|
accessToken: accessToken,
|
|
595
598
|
idToken: idToken,
|
|
@@ -629,6 +632,7 @@ function useCAMSMSALAuth(options) {
|
|
|
629
632
|
setIdToken("");
|
|
630
633
|
setError(null);
|
|
631
634
|
setRequiresMFA(false);
|
|
635
|
+
setIsAuthenticated(false);
|
|
632
636
|
if (typeof window !== "undefined") {
|
|
633
637
|
localStorage.removeItem(storageKey);
|
|
634
638
|
deleteCookie(storageKey + "-PROFILE");
|
|
@@ -961,7 +965,7 @@ function CAMSProviderCore(props) {
|
|
|
961
965
|
var children = props.children, mode = props.mode, appCode = props.appCode;
|
|
962
966
|
// Always call both hooks to satisfy Rules of Hooks
|
|
963
967
|
var regularAuth = useCAMSAuth(mode === "REGULAR"
|
|
964
|
-
? __assign(__assign({}, props), { appCode: appCode })
|
|
968
|
+
? __assign(__assign({}, props), { appCode: appCode, idleTimeout: 0 })
|
|
965
969
|
: { appCode: "" });
|
|
966
970
|
var msalAuth = useCAMSMSALAuth(mode === "MSAL"
|
|
967
971
|
? __assign(__assign({}, props), { appCode: appCode, ValidateUserEndpoint: props.ValidateUserEndpoint, activeCookiePeriod: 1 })
|
|
@@ -1570,7 +1574,7 @@ var MFAOptions = function (_a) {
|
|
|
1570
1574
|
if (!(state && (data === null || data === void 0 ? void 0 : data.isValid))) return [3 /*break*/, 2];
|
|
1571
1575
|
// Call completeMFA to update context state
|
|
1572
1576
|
console.log("IN Complete MFA Block. Handling MFA", data);
|
|
1573
|
-
return [4 /*yield*/,
|
|
1577
|
+
return [4 /*yield*/, completeMFA(data)];
|
|
1574
1578
|
case 1:
|
|
1575
1579
|
_a.sent();
|
|
1576
1580
|
context.setUserProfile({
|
|
@@ -1754,15 +1758,9 @@ var DefaultLoginPage = function (_a) {
|
|
|
1754
1758
|
}));
|
|
1755
1759
|
context.setUserProfile({
|
|
1756
1760
|
state: "AUTH_SUCCESS",
|
|
1757
|
-
message: data.message,
|
|
1761
|
+
message: (data === null || data === void 0 ? void 0 : data.message) || "Authentication Successful",
|
|
1758
1762
|
role: data.userInfo.role,
|
|
1759
|
-
profile: {
|
|
1760
|
-
id: data.userInfo.id,
|
|
1761
|
-
name: data.userInfo.name,
|
|
1762
|
-
email: data.userInfo.email,
|
|
1763
|
-
isMFAEnabled: data.userInfo.isMFAEnabled,
|
|
1764
|
-
tokens: data.tokens,
|
|
1765
|
-
},
|
|
1763
|
+
profile: __assign(__assign({}, data.userInfo), { tokens: __assign({}, data.tokens) }),
|
|
1766
1764
|
});
|
|
1767
1765
|
setShowADModal(false);
|
|
1768
1766
|
}
|
|
@@ -1847,8 +1845,7 @@ var MFAGate = function (_a) {
|
|
|
1847
1845
|
if (success) {
|
|
1848
1846
|
var accessToken = "accessToken" in context ? context.accessToken : "";
|
|
1849
1847
|
var idToken = "idToken" in context ? context.idToken : "";
|
|
1850
|
-
Logger.info("MFA Authentication Successful"
|
|
1851
|
-
context.isAuthenticated = true;
|
|
1848
|
+
Logger.info("MFA Authentication Successful");
|
|
1852
1849
|
setAuthState("Authenticated");
|
|
1853
1850
|
if (context.authMode === "MSAL") {
|
|
1854
1851
|
var tokens = { accessToken: accessToken, idToken: idToken };
|
|
@@ -1858,8 +1855,8 @@ var MFAGate = function (_a) {
|
|
|
1858
1855
|
}
|
|
1859
1856
|
}
|
|
1860
1857
|
}
|
|
1861
|
-
else
|
|
1862
|
-
Logger.error("MFA Authentication Failed"
|
|
1858
|
+
else {
|
|
1859
|
+
Logger.error("MFA Authentication Failed");
|
|
1863
1860
|
}
|
|
1864
1861
|
}, [context, onAuthSuccess]);
|
|
1865
1862
|
var handleAuthFailed = useCallback(function () { return __awaiter$1(void 0, void 0, void 0, function () {
|
|
@@ -1912,10 +1909,7 @@ var MFAGate = function (_a) {
|
|
|
1912
1909
|
return jsx(Fragment, { children: children });
|
|
1913
1910
|
case "Unauthenticated":
|
|
1914
1911
|
default:
|
|
1915
|
-
return (jsx(DefaultLoginPage, { usePassKey: usePassKey, useADLogin: useADLogin, MFAEndpoints: ValidatedMFAEndpoints, PassKeysRegisterProps: PassKeysRegisterProps, CredentialsAuthEndpoint: CredentialsAuthEndpoint, onADLoginSuccess: function () {
|
|
1916
|
-
context.isAuthenticated = true;
|
|
1917
|
-
setAuthState("Authenticated");
|
|
1918
|
-
} }));
|
|
1912
|
+
return (jsx(DefaultLoginPage, { usePassKey: usePassKey, useADLogin: useADLogin, MFAEndpoints: ValidatedMFAEndpoints, PassKeysRegisterProps: PassKeysRegisterProps, CredentialsAuthEndpoint: CredentialsAuthEndpoint, onADLoginSuccess: function () { return setAuthState("Authenticated"); } }));
|
|
1919
1913
|
}
|
|
1920
1914
|
};
|
|
1921
1915
|
|