@nibssplc/cams-sdk-react 1.0.0-rc.100 → 1.0.0-rc.102

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.esm.js CHANGED
@@ -422,8 +422,11 @@ function useCAMSMSALAuth(options) {
422
422
  var _f = useState(""), email = _f[0], setEmail = _f[1];
423
423
  var _g = useState(false), requiresMFA = _g[0], setRequiresMFA = _g[1];
424
424
  var _h = useState(false), isFetchingMFAConfig = _h[0], setIsFetchingMFAConfig = _h[1];
425
+ var _j = useState(false), isAuthenticated = _j[0], setIsAuthenticated = _j[1];
425
426
  var isLoading = inProgress !== InteractionStatus.None || isFetchingMFAConfig;
426
- var isAuthenticated = !!account && !!accessToken;
427
+ useEffect(function () {
428
+ setIsAuthenticated(!!account && !!accessToken && !requiresMFA);
429
+ }, [account, accessToken, requiresMFA]);
427
430
  var scopes = optScopes || ["openid", "profile", "email"];
428
431
  var isTokenValid = function (token) {
429
432
  try {
@@ -589,7 +592,7 @@ function useCAMSMSALAuth(options) {
589
592
  profile: __assign({}, data),
590
593
  }), activeCookiePeriod);
591
594
  setRequiresMFA(false);
592
- // Set requiresMFA to false after storage update
595
+ setIsAuthenticated(true);
593
596
  Logger.debug("MFA completed successfully, storage updated", {
594
597
  accessToken: accessToken,
595
598
  idToken: idToken,
@@ -629,6 +632,7 @@ function useCAMSMSALAuth(options) {
629
632
  setIdToken("");
630
633
  setError(null);
631
634
  setRequiresMFA(false);
635
+ setIsAuthenticated(false);
632
636
  if (typeof window !== "undefined") {
633
637
  localStorage.removeItem(storageKey);
634
638
  deleteCookie(storageKey + "-PROFILE");
@@ -961,7 +965,7 @@ function CAMSProviderCore(props) {
961
965
  var children = props.children, mode = props.mode, appCode = props.appCode;
962
966
  // Always call both hooks to satisfy Rules of Hooks
963
967
  var regularAuth = useCAMSAuth(mode === "REGULAR"
964
- ? __assign(__assign({}, props), { appCode: appCode })
968
+ ? __assign(__assign({}, props), { appCode: appCode, idleTimeout: 0 })
965
969
  : { appCode: "" });
966
970
  var msalAuth = useCAMSMSALAuth(mode === "MSAL"
967
971
  ? __assign(__assign({}, props), { appCode: appCode, ValidateUserEndpoint: props.ValidateUserEndpoint, activeCookiePeriod: 1 })
@@ -1551,9 +1555,11 @@ var MFAOptions = function (_a) {
1551
1555
  var _f = useState(false), showSuccessAnimation = _f[0], setShowSuccessAnimation = _f[1];
1552
1556
  var _g = useState(null), authType = _g[0], setAuthType = _g[1];
1553
1557
  var context = useCAMSContext();
1554
- var _h = context.authMode === "MSAL" && "EmailOTP" in context
1558
+ var _h = context.authMode === "MSAL"
1555
1559
  ? context
1556
- : { completeMFA: null, logout: function () { return __awaiter$1(void 0, void 0, void 0, function () { return __generator$1(this, function (_a) {
1560
+ : { completeMFA: function (data) { return __awaiter$1(void 0, void 0, void 0, function () { return __generator$1(this, function (_a) {
1561
+ return [2 /*return*/, data];
1562
+ }); }); }, logout: function () { return __awaiter$1(void 0, void 0, void 0, function () { return __generator$1(this, function (_a) {
1557
1563
  return [2 /*return*/];
1558
1564
  }); }); } }, completeMFA = _h.completeMFA, logout = _h.logout;
1559
1565
  var authenticate = useWebAuthn().authenticate;
@@ -1570,7 +1576,7 @@ var MFAOptions = function (_a) {
1570
1576
  if (!(state && (data === null || data === void 0 ? void 0 : data.isValid))) return [3 /*break*/, 2];
1571
1577
  // Call completeMFA to update context state
1572
1578
  console.log("IN Complete MFA Block. Handling MFA", data);
1573
- return [4 /*yield*/, (completeMFA === null || completeMFA === void 0 ? void 0 : completeMFA(data))];
1579
+ return [4 /*yield*/, completeMFA(data)];
1574
1580
  case 1:
1575
1581
  _a.sent();
1576
1582
  context.setUserProfile({
@@ -1754,15 +1760,9 @@ var DefaultLoginPage = function (_a) {
1754
1760
  }));
1755
1761
  context.setUserProfile({
1756
1762
  state: "AUTH_SUCCESS",
1757
- message: data.message,
1763
+ message: (data === null || data === void 0 ? void 0 : data.message) || "Authentication Successful",
1758
1764
  role: data.userInfo.role,
1759
- profile: {
1760
- id: data.userInfo.id,
1761
- name: data.userInfo.name,
1762
- email: data.userInfo.email,
1763
- isMFAEnabled: data.userInfo.isMFAEnabled,
1764
- tokens: data.tokens,
1765
- },
1765
+ profile: __assign(__assign({}, data.userInfo), { tokens: __assign({}, data.tokens) }),
1766
1766
  });
1767
1767
  setShowADModal(false);
1768
1768
  }
@@ -1847,8 +1847,7 @@ var MFAGate = function (_a) {
1847
1847
  if (success) {
1848
1848
  var accessToken = "accessToken" in context ? context.accessToken : "";
1849
1849
  var idToken = "idToken" in context ? context.idToken : "";
1850
- Logger.info("MFA Authentication Successful", { context: context || null });
1851
- context.isAuthenticated = true;
1850
+ Logger.info("MFA Authentication Successful");
1852
1851
  setAuthState("Authenticated");
1853
1852
  if (context.authMode === "MSAL") {
1854
1853
  var tokens = { accessToken: accessToken, idToken: idToken };
@@ -1858,8 +1857,8 @@ var MFAGate = function (_a) {
1858
1857
  }
1859
1858
  }
1860
1859
  }
1861
- else if (!success) {
1862
- Logger.error("MFA Authentication Failed", { context: context || null });
1860
+ else {
1861
+ Logger.error("MFA Authentication Failed");
1863
1862
  }
1864
1863
  }, [context, onAuthSuccess]);
1865
1864
  var handleAuthFailed = useCallback(function () { return __awaiter$1(void 0, void 0, void 0, function () {
@@ -1912,10 +1911,7 @@ var MFAGate = function (_a) {
1912
1911
  return jsx(Fragment, { children: children });
1913
1912
  case "Unauthenticated":
1914
1913
  default:
1915
- return (jsx(DefaultLoginPage, { usePassKey: usePassKey, useADLogin: useADLogin, MFAEndpoints: ValidatedMFAEndpoints, PassKeysRegisterProps: PassKeysRegisterProps, CredentialsAuthEndpoint: CredentialsAuthEndpoint, onADLoginSuccess: function () {
1916
- context.isAuthenticated = true;
1917
- setAuthState("Authenticated");
1918
- } }));
1914
+ return (jsx(DefaultLoginPage, { usePassKey: usePassKey, useADLogin: useADLogin, MFAEndpoints: ValidatedMFAEndpoints, PassKeysRegisterProps: PassKeysRegisterProps, CredentialsAuthEndpoint: CredentialsAuthEndpoint, onADLoginSuccess: function () { return setAuthState("Authenticated"); } }));
1919
1915
  }
1920
1916
  };
1921
1917