@nibssplc/cams-sdk-react 1.0.0-rc.80 → 1.0.0-rc.81
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.cjs.js +20 -3
- package/dist/index.cjs.js.map +1 -1
- package/dist/index.esm.js +20 -3
- package/dist/index.esm.js.map +1 -1
- package/package.json +1 -1
package/dist/index.esm.js
CHANGED
|
@@ -499,8 +499,6 @@ function useCAMSMSALAuth(options) {
|
|
|
499
499
|
mfaConfig: mfaConfig,
|
|
500
500
|
userConfig: userConfig,
|
|
501
501
|
});
|
|
502
|
-
setAccessToken(response.accessToken);
|
|
503
|
-
setIdToken(response.idToken);
|
|
504
502
|
Logger.info("MSAL User Auth is Completed");
|
|
505
503
|
// Don't persist as authenticated until MFA is complete
|
|
506
504
|
if (userConfig.isValid && userConfig.userInfo.email) {
|
|
@@ -508,6 +506,8 @@ function useCAMSMSALAuth(options) {
|
|
|
508
506
|
storageKey: storageKey,
|
|
509
507
|
email: userConfig.userInfo.email,
|
|
510
508
|
});
|
|
509
|
+
setAccessToken(response.accessToken);
|
|
510
|
+
setIdToken(response.idToken);
|
|
511
511
|
localStorage.setItem(storageKey, JSON.stringify({
|
|
512
512
|
isAuthenticated: false,
|
|
513
513
|
requiresMFA: userConfig.userInfo.isMFAEnabled,
|
|
@@ -1864,7 +1864,13 @@ var MFAGate = function (_a) {
|
|
|
1864
1864
|
var timer = setTimeout(function () {
|
|
1865
1865
|
var shouldRequireMFA = requiresMFA !== null && requiresMFA !== void 0 ? requiresMFA : ("requiresMFA" in context ? context.requiresMFA : false);
|
|
1866
1866
|
var accessToken = "accessToken" in context ? context.accessToken : "";
|
|
1867
|
-
console.log(
|
|
1867
|
+
console.log("Auth State Debug:", {
|
|
1868
|
+
isAuthenticated: context.isAuthenticated,
|
|
1869
|
+
shouldRequireMFA: shouldRequireMFA,
|
|
1870
|
+
accessToken: !!accessToken,
|
|
1871
|
+
requiresMFA: requiresMFA,
|
|
1872
|
+
contextRequiresMFA: "requiresMFA" in context ? context.requiresMFA : "N/A"
|
|
1873
|
+
});
|
|
1868
1874
|
if (shouldRequireMFA && accessToken) {
|
|
1869
1875
|
setAuthState("MFA_Required");
|
|
1870
1876
|
}
|
|
@@ -1881,6 +1887,17 @@ var MFAGate = function (_a) {
|
|
|
1881
1887
|
requiresMFA,
|
|
1882
1888
|
context,
|
|
1883
1889
|
]);
|
|
1890
|
+
// Add this debug useEffect to see what's happening
|
|
1891
|
+
useEffect(function () {
|
|
1892
|
+
console.log("Current authState:", authState);
|
|
1893
|
+
console.log("Context state:", {
|
|
1894
|
+
isLoading: context.isLoading,
|
|
1895
|
+
isAuthenticated: context.isAuthenticated,
|
|
1896
|
+
authMode: context.authMode,
|
|
1897
|
+
requiresMFA: "requiresMFA" in context ? context.requiresMFA : "N/A",
|
|
1898
|
+
hasAccessToken: "accessToken" in context ? !!context.accessToken : false
|
|
1899
|
+
});
|
|
1900
|
+
}, [authState, context]);
|
|
1884
1901
|
if (useADLogin && !CredentialsAuthEndpoint)
|
|
1885
1902
|
return jsx(ErrorFallback, { message: "Invalid AD Login Configuration." });
|
|
1886
1903
|
if (!validatedMFAEndpoints)
|