@nibssplc/cams-sdk-react 1.0.0-rc.80 → 1.0.0-rc.81
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.cjs.js +20 -3
- package/dist/index.cjs.js.map +1 -1
- package/dist/index.esm.js +20 -3
- package/dist/index.esm.js.map +1 -1
- package/package.json +1 -1
package/dist/index.cjs.js
CHANGED
|
@@ -520,8 +520,6 @@ function useCAMSMSALAuth(options) {
|
|
|
520
520
|
mfaConfig: mfaConfig,
|
|
521
521
|
userConfig: userConfig,
|
|
522
522
|
});
|
|
523
|
-
setAccessToken(response.accessToken);
|
|
524
|
-
setIdToken(response.idToken);
|
|
525
523
|
camsSdk.Logger.info("MSAL User Auth is Completed");
|
|
526
524
|
// Don't persist as authenticated until MFA is complete
|
|
527
525
|
if (userConfig.isValid && userConfig.userInfo.email) {
|
|
@@ -529,6 +527,8 @@ function useCAMSMSALAuth(options) {
|
|
|
529
527
|
storageKey: storageKey,
|
|
530
528
|
email: userConfig.userInfo.email,
|
|
531
529
|
});
|
|
530
|
+
setAccessToken(response.accessToken);
|
|
531
|
+
setIdToken(response.idToken);
|
|
532
532
|
localStorage.setItem(storageKey, JSON.stringify({
|
|
533
533
|
isAuthenticated: false,
|
|
534
534
|
requiresMFA: userConfig.userInfo.isMFAEnabled,
|
|
@@ -1885,7 +1885,13 @@ var MFAGate = function (_a) {
|
|
|
1885
1885
|
var timer = setTimeout(function () {
|
|
1886
1886
|
var shouldRequireMFA = requiresMFA !== null && requiresMFA !== void 0 ? requiresMFA : ("requiresMFA" in context ? context.requiresMFA : false);
|
|
1887
1887
|
var accessToken = "accessToken" in context ? context.accessToken : "";
|
|
1888
|
-
console.log(
|
|
1888
|
+
console.log("Auth State Debug:", {
|
|
1889
|
+
isAuthenticated: context.isAuthenticated,
|
|
1890
|
+
shouldRequireMFA: shouldRequireMFA,
|
|
1891
|
+
accessToken: !!accessToken,
|
|
1892
|
+
requiresMFA: requiresMFA,
|
|
1893
|
+
contextRequiresMFA: "requiresMFA" in context ? context.requiresMFA : "N/A"
|
|
1894
|
+
});
|
|
1889
1895
|
if (shouldRequireMFA && accessToken) {
|
|
1890
1896
|
setAuthState("MFA_Required");
|
|
1891
1897
|
}
|
|
@@ -1902,6 +1908,17 @@ var MFAGate = function (_a) {
|
|
|
1902
1908
|
requiresMFA,
|
|
1903
1909
|
context,
|
|
1904
1910
|
]);
|
|
1911
|
+
// Add this debug useEffect to see what's happening
|
|
1912
|
+
React.useEffect(function () {
|
|
1913
|
+
console.log("Current authState:", authState);
|
|
1914
|
+
console.log("Context state:", {
|
|
1915
|
+
isLoading: context.isLoading,
|
|
1916
|
+
isAuthenticated: context.isAuthenticated,
|
|
1917
|
+
authMode: context.authMode,
|
|
1918
|
+
requiresMFA: "requiresMFA" in context ? context.requiresMFA : "N/A",
|
|
1919
|
+
hasAccessToken: "accessToken" in context ? !!context.accessToken : false
|
|
1920
|
+
});
|
|
1921
|
+
}, [authState, context]);
|
|
1905
1922
|
if (useADLogin && !CredentialsAuthEndpoint)
|
|
1906
1923
|
return jsxRuntime.jsx(ErrorFallback, { message: "Invalid AD Login Configuration." });
|
|
1907
1924
|
if (!validatedMFAEndpoints)
|