@nibssplc/cams-sdk-react 1.0.0-rc.100 → 1.0.0-rc.102

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.cjs.js CHANGED
@@ -443,8 +443,11 @@ function useCAMSMSALAuth(options) {
443
443
  var _f = React.useState(""), email = _f[0], setEmail = _f[1];
444
444
  var _g = React.useState(false), requiresMFA = _g[0], setRequiresMFA = _g[1];
445
445
  var _h = React.useState(false), isFetchingMFAConfig = _h[0], setIsFetchingMFAConfig = _h[1];
446
+ var _j = React.useState(false), isAuthenticated = _j[0], setIsAuthenticated = _j[1];
446
447
  var isLoading = inProgress !== msalBrowser.InteractionStatus.None || isFetchingMFAConfig;
447
- var isAuthenticated = !!account && !!accessToken;
448
+ React.useEffect(function () {
449
+ setIsAuthenticated(!!account && !!accessToken && !requiresMFA);
450
+ }, [account, accessToken, requiresMFA]);
448
451
  var scopes = optScopes || ["openid", "profile", "email"];
449
452
  var isTokenValid = function (token) {
450
453
  try {
@@ -610,7 +613,7 @@ function useCAMSMSALAuth(options) {
610
613
  profile: __assign({}, data),
611
614
  }), activeCookiePeriod);
612
615
  setRequiresMFA(false);
613
- // Set requiresMFA to false after storage update
616
+ setIsAuthenticated(true);
614
617
  camsSdk.Logger.debug("MFA completed successfully, storage updated", {
615
618
  accessToken: accessToken,
616
619
  idToken: idToken,
@@ -650,6 +653,7 @@ function useCAMSMSALAuth(options) {
650
653
  setIdToken("");
651
654
  setError(null);
652
655
  setRequiresMFA(false);
656
+ setIsAuthenticated(false);
653
657
  if (typeof window !== "undefined") {
654
658
  localStorage.removeItem(storageKey);
655
659
  deleteCookie(storageKey + "-PROFILE");
@@ -982,7 +986,7 @@ function CAMSProviderCore(props) {
982
986
  var children = props.children, mode = props.mode, appCode = props.appCode;
983
987
  // Always call both hooks to satisfy Rules of Hooks
984
988
  var regularAuth = useCAMSAuth(mode === "REGULAR"
985
- ? __assign(__assign({}, props), { appCode: appCode })
989
+ ? __assign(__assign({}, props), { appCode: appCode, idleTimeout: 0 })
986
990
  : { appCode: "" });
987
991
  var msalAuth = useCAMSMSALAuth(mode === "MSAL"
988
992
  ? __assign(__assign({}, props), { appCode: appCode, ValidateUserEndpoint: props.ValidateUserEndpoint, activeCookiePeriod: 1 })
@@ -1572,9 +1576,11 @@ var MFAOptions = function (_a) {
1572
1576
  var _f = React.useState(false), showSuccessAnimation = _f[0], setShowSuccessAnimation = _f[1];
1573
1577
  var _g = React.useState(null), authType = _g[0], setAuthType = _g[1];
1574
1578
  var context = useCAMSContext();
1575
- var _h = context.authMode === "MSAL" && "EmailOTP" in context
1579
+ var _h = context.authMode === "MSAL"
1576
1580
  ? context
1577
- : { completeMFA: null, logout: function () { return __awaiter$1(void 0, void 0, void 0, function () { return __generator$1(this, function (_a) {
1581
+ : { completeMFA: function (data) { return __awaiter$1(void 0, void 0, void 0, function () { return __generator$1(this, function (_a) {
1582
+ return [2 /*return*/, data];
1583
+ }); }); }, logout: function () { return __awaiter$1(void 0, void 0, void 0, function () { return __generator$1(this, function (_a) {
1578
1584
  return [2 /*return*/];
1579
1585
  }); }); } }, completeMFA = _h.completeMFA, logout = _h.logout;
1580
1586
  var authenticate = useWebAuthn().authenticate;
@@ -1591,7 +1597,7 @@ var MFAOptions = function (_a) {
1591
1597
  if (!(state && (data === null || data === void 0 ? void 0 : data.isValid))) return [3 /*break*/, 2];
1592
1598
  // Call completeMFA to update context state
1593
1599
  console.log("IN Complete MFA Block. Handling MFA", data);
1594
- return [4 /*yield*/, (completeMFA === null || completeMFA === void 0 ? void 0 : completeMFA(data))];
1600
+ return [4 /*yield*/, completeMFA(data)];
1595
1601
  case 1:
1596
1602
  _a.sent();
1597
1603
  context.setUserProfile({
@@ -1775,15 +1781,9 @@ var DefaultLoginPage = function (_a) {
1775
1781
  }));
1776
1782
  context.setUserProfile({
1777
1783
  state: "AUTH_SUCCESS",
1778
- message: data.message,
1784
+ message: (data === null || data === void 0 ? void 0 : data.message) || "Authentication Successful",
1779
1785
  role: data.userInfo.role,
1780
- profile: {
1781
- id: data.userInfo.id,
1782
- name: data.userInfo.name,
1783
- email: data.userInfo.email,
1784
- isMFAEnabled: data.userInfo.isMFAEnabled,
1785
- tokens: data.tokens,
1786
- },
1786
+ profile: __assign(__assign({}, data.userInfo), { tokens: __assign({}, data.tokens) }),
1787
1787
  });
1788
1788
  setShowADModal(false);
1789
1789
  }
@@ -1868,8 +1868,7 @@ var MFAGate = function (_a) {
1868
1868
  if (success) {
1869
1869
  var accessToken = "accessToken" in context ? context.accessToken : "";
1870
1870
  var idToken = "idToken" in context ? context.idToken : "";
1871
- camsSdk.Logger.info("MFA Authentication Successful", { context: context || null });
1872
- context.isAuthenticated = true;
1871
+ camsSdk.Logger.info("MFA Authentication Successful");
1873
1872
  setAuthState("Authenticated");
1874
1873
  if (context.authMode === "MSAL") {
1875
1874
  var tokens = { accessToken: accessToken, idToken: idToken };
@@ -1879,8 +1878,8 @@ var MFAGate = function (_a) {
1879
1878
  }
1880
1879
  }
1881
1880
  }
1882
- else if (!success) {
1883
- camsSdk.Logger.error("MFA Authentication Failed", { context: context || null });
1881
+ else {
1882
+ camsSdk.Logger.error("MFA Authentication Failed");
1884
1883
  }
1885
1884
  }, [context, onAuthSuccess]);
1886
1885
  var handleAuthFailed = React.useCallback(function () { return __awaiter$1(void 0, void 0, void 0, function () {
@@ -1933,10 +1932,7 @@ var MFAGate = function (_a) {
1933
1932
  return jsxRuntime.jsx(jsxRuntime.Fragment, { children: children });
1934
1933
  case "Unauthenticated":
1935
1934
  default:
1936
- return (jsxRuntime.jsx(DefaultLoginPage, { usePassKey: usePassKey, useADLogin: useADLogin, MFAEndpoints: ValidatedMFAEndpoints, PassKeysRegisterProps: PassKeysRegisterProps, CredentialsAuthEndpoint: CredentialsAuthEndpoint, onADLoginSuccess: function () {
1937
- context.isAuthenticated = true;
1938
- setAuthState("Authenticated");
1939
- } }));
1935
+ return (jsxRuntime.jsx(DefaultLoginPage, { usePassKey: usePassKey, useADLogin: useADLogin, MFAEndpoints: ValidatedMFAEndpoints, PassKeysRegisterProps: PassKeysRegisterProps, CredentialsAuthEndpoint: CredentialsAuthEndpoint, onADLoginSuccess: function () { return setAuthState("Authenticated"); } }));
1940
1936
  }
1941
1937
  };
1942
1938