@oussemasahbeni/keycloakify-login-shadcn 250004.0.2 → 250004.0.7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (174) hide show
  1. package/keycloak-theme/components/ui/alert.tsx +4 -4
  2. package/keycloak-theme/components/ui/dropdown-menu.tsx +5 -5
  3. package/keycloak-theme/components/ui/input.tsx +1 -1
  4. package/keycloak-theme/components/ui/select.tsx +4 -4
  5. package/keycloak-theme/components/ui/separator.tsx +1 -1
  6. package/keycloak-theme/login/KcContext.ts +23 -19
  7. package/keycloak-theme/login/KcPage.tsx +47 -60
  8. package/keycloak-theme/login/assets/img/auth-logo.svg +100 -100
  9. package/keycloak-theme/login/assets/img/shape.svg +71 -71
  10. package/keycloak-theme/login/components/LogoutOtherSessions.tsx +26 -26
  11. package/keycloak-theme/login/components/PasswordWrapper.tsx +35 -35
  12. package/keycloak-theme/login/components/Template/Template.tsx +227 -226
  13. package/keycloak-theme/login/components/Template/index.ts +1 -1
  14. package/keycloak-theme/login/components/Template/useInitializeTemplate.ts +61 -61
  15. package/keycloak-theme/login/components/UserProfileFormFields/AddRemoveButtonsMultiValuedAttribute.tsx +61 -61
  16. package/keycloak-theme/login/components/UserProfileFormFields/DO_MAKE_USER_CONFIRM_PASSWORD.ts +2 -2
  17. package/keycloak-theme/login/components/UserProfileFormFields/FieldErrors.tsx +28 -28
  18. package/keycloak-theme/login/components/UserProfileFormFields/GroupLabel.tsx +70 -70
  19. package/keycloak-theme/login/components/UserProfileFormFields/InputFieldByType.tsx +58 -58
  20. package/keycloak-theme/login/components/UserProfileFormFields/InputTag.tsx +116 -116
  21. package/keycloak-theme/login/components/UserProfileFormFields/InputTagSelects.tsx +135 -135
  22. package/keycloak-theme/login/components/UserProfileFormFields/SelectTag.tsx +114 -114
  23. package/keycloak-theme/login/components/UserProfileFormFields/TextareaTag.tsx +42 -42
  24. package/keycloak-theme/login/components/UserProfileFormFields/UserProfileFormFields.tsx +127 -127
  25. package/keycloak-theme/login/components/UserProfileFormFields/index.ts +1 -1
  26. package/keycloak-theme/login/i18n.ts +47 -51
  27. package/keycloak-theme/login/mocks/getKcContextMock.ts +22 -18
  28. package/keycloak-theme/login/pages/PageIndex.tsx +134 -134
  29. package/keycloak-theme/login/pages/code/Page.stories.tsx +62 -78
  30. package/keycloak-theme/login/pages/code/Page.tsx +89 -89
  31. package/keycloak-theme/login/pages/code/index.ts +3 -3
  32. package/keycloak-theme/login/pages/delete-account-confirm/Page.stories.tsx +39 -46
  33. package/keycloak-theme/login/pages/delete-account-confirm/Page.tsx +63 -63
  34. package/keycloak-theme/login/pages/delete-account-confirm/index.ts +3 -3
  35. package/keycloak-theme/login/pages/delete-credential/Page.stories.tsx +26 -30
  36. package/keycloak-theme/login/pages/delete-credential/Page.tsx +51 -51
  37. package/keycloak-theme/login/pages/delete-credential/index.ts +3 -3
  38. package/keycloak-theme/login/pages/error/Page.stories.tsx +47 -58
  39. package/keycloak-theme/login/pages/error/Page.tsx +42 -42
  40. package/keycloak-theme/login/pages/error/index.ts +3 -3
  41. package/keycloak-theme/login/pages/frontchannel-logout/Page.stories.tsx +25 -32
  42. package/keycloak-theme/login/pages/frontchannel-logout/Page.tsx +84 -84
  43. package/keycloak-theme/login/pages/frontchannel-logout/index.ts +3 -3
  44. package/keycloak-theme/login/pages/idp-review-user-profile/Page.stories.tsx +46 -58
  45. package/keycloak-theme/login/pages/idp-review-user-profile/Page.tsx +52 -52
  46. package/keycloak-theme/login/pages/idp-review-user-profile/index.ts +3 -3
  47. package/keycloak-theme/login/pages/info/Page.stories.tsx +50 -60
  48. package/keycloak-theme/login/pages/info/Page.tsx +92 -92
  49. package/keycloak-theme/login/pages/link-idp-action/Page.stories.tsx +32 -16
  50. package/keycloak-theme/login/pages/link-idp-action/Page.tsx +43 -43
  51. package/keycloak-theme/login/pages/link-idp-action/index.ts +3 -3
  52. package/keycloak-theme/login/pages/login/Form.tsx +242 -242
  53. package/keycloak-theme/login/pages/login/Info.tsx +29 -29
  54. package/keycloak-theme/login/pages/login/Page.stories.tsx +345 -365
  55. package/keycloak-theme/login/pages/login/Page.tsx +44 -44
  56. package/keycloak-theme/login/pages/login/SocialProviders.tsx +107 -107
  57. package/keycloak-theme/login/pages/login/index.ts +3 -3
  58. package/keycloak-theme/login/pages/login/providers/apple.svg +3 -3
  59. package/keycloak-theme/login/pages/login/providers/bitbucket.svg +11 -11
  60. package/keycloak-theme/login/pages/login/providers/discord.svg +4 -4
  61. package/keycloak-theme/login/pages/login/providers/facebook.svg +5 -5
  62. package/keycloak-theme/login/pages/login/providers/github.svg +3 -3
  63. package/keycloak-theme/login/pages/login/providers/gitlab.svg +7 -7
  64. package/keycloak-theme/login/pages/login/providers/google.svg +7 -7
  65. package/keycloak-theme/login/pages/login/providers/instagram.svg +31 -31
  66. package/keycloak-theme/login/pages/login/providers/linkedin.svg +3 -3
  67. package/keycloak-theme/login/pages/login/providers/microsoft.svg +6 -6
  68. package/keycloak-theme/login/pages/login/providers/oidc.svg +5 -5
  69. package/keycloak-theme/login/pages/login/providers/openshift.svg +7 -7
  70. package/keycloak-theme/login/pages/login/providers/paypal.svg +6 -6
  71. package/keycloak-theme/login/pages/login/providers/slack.svg +11 -11
  72. package/keycloak-theme/login/pages/login/providers/stackoverflow.svg +5 -5
  73. package/keycloak-theme/login/pages/login/providers/x.svg +3 -3
  74. package/keycloak-theme/login/pages/login/useProviderLogos.tsx +39 -39
  75. package/keycloak-theme/login/pages/login/useScript.tsx +62 -62
  76. package/keycloak-theme/login/pages/login-config-totp/Page.stories.tsx +45 -59
  77. package/keycloak-theme/login/pages/login-config-totp/Page.tsx +240 -240
  78. package/keycloak-theme/login/pages/login-config-totp/index.ts +3 -3
  79. package/keycloak-theme/login/pages/login-idp-link-confirm/Page.stories.tsx +30 -34
  80. package/keycloak-theme/login/pages/login-idp-link-confirm/Page.tsx +43 -43
  81. package/keycloak-theme/login/pages/login-idp-link-confirm/index.ts +3 -3
  82. package/keycloak-theme/login/pages/login-idp-link-confirm-override/Page.stories.tsx +16 -22
  83. package/keycloak-theme/login/pages/login-idp-link-confirm-override/Page.tsx +47 -47
  84. package/keycloak-theme/login/pages/login-idp-link-confirm-override/index.ts +3 -3
  85. package/keycloak-theme/login/pages/login-idp-link-email/Page.stories.tsx +54 -62
  86. package/keycloak-theme/login/pages/login-idp-link-email/Page.tsx +54 -54
  87. package/keycloak-theme/login/pages/login-idp-link-email/index.ts +3 -3
  88. package/keycloak-theme/login/pages/login-oauth-grant/Page.stories.tsx +39 -45
  89. package/keycloak-theme/login/pages/login-oauth-grant/Page.tsx +126 -126
  90. package/keycloak-theme/login/pages/login-oauth-grant/index.ts +3 -3
  91. package/keycloak-theme/login/pages/login-oauth2-device-verify-user-code/Page.stories.tsx +38 -48
  92. package/keycloak-theme/login/pages/login-oauth2-device-verify-user-code/Page.tsx +58 -58
  93. package/keycloak-theme/login/pages/login-oauth2-device-verify-user-code/index.ts +3 -3
  94. package/keycloak-theme/login/pages/login-otp/Page.stories.tsx +82 -96
  95. package/keycloak-theme/login/pages/login-otp/Page.tsx +108 -108
  96. package/keycloak-theme/login/pages/login-otp/index.ts +3 -3
  97. package/keycloak-theme/login/pages/login-page-expired/Page.stories.tsx +28 -36
  98. package/keycloak-theme/login/pages/login-page-expired/Page.tsx +47 -47
  99. package/keycloak-theme/login/pages/login-page-expired/index.ts +3 -3
  100. package/keycloak-theme/login/pages/login-passkeys-conditional-authenticate/Page.stories.tsx +20 -0
  101. package/keycloak-theme/login/pages/login-passkeys-conditional-authenticate/Page.tsx +233 -233
  102. package/keycloak-theme/login/pages/login-passkeys-conditional-authenticate/index.ts +3 -3
  103. package/keycloak-theme/login/pages/login-passkeys-conditional-authenticate/useScript.tsx +63 -63
  104. package/keycloak-theme/login/pages/login-password/Page.stories.tsx +55 -56
  105. package/keycloak-theme/login/pages/login-password/Page.tsx +149 -149
  106. package/keycloak-theme/login/pages/login-password/index.ts +3 -3
  107. package/keycloak-theme/login/pages/login-password/useScript.tsx +63 -63
  108. package/keycloak-theme/login/pages/login-recovery-authn-code-config/Page.stories.tsx +28 -36
  109. package/keycloak-theme/login/pages/login-recovery-authn-code-config/Page.tsx +181 -181
  110. package/keycloak-theme/login/pages/login-recovery-authn-code-config/index.ts +3 -3
  111. package/keycloak-theme/login/pages/login-recovery-authn-code-config/useScript.tsx +145 -145
  112. package/keycloak-theme/login/pages/login-recovery-authn-code-input/Page.stories.tsx +16 -22
  113. package/keycloak-theme/login/pages/login-recovery-authn-code-input/Page.tsx +70 -70
  114. package/keycloak-theme/login/pages/login-recovery-authn-code-input/index.ts +3 -3
  115. package/keycloak-theme/login/pages/login-reset-otp/Page.stories.tsx +62 -74
  116. package/keycloak-theme/login/pages/login-reset-otp/Page.tsx +86 -86
  117. package/keycloak-theme/login/pages/login-reset-otp/index.ts +3 -3
  118. package/keycloak-theme/login/pages/login-reset-password/Form.tsx +68 -68
  119. package/keycloak-theme/login/pages/login-reset-password/Page.stories.tsx +44 -54
  120. package/keycloak-theme/login/pages/login-reset-password/Page.tsx +27 -27
  121. package/keycloak-theme/login/pages/login-reset-password/index.ts +3 -3
  122. package/keycloak-theme/login/pages/login-update-password/Page.stories.tsx +40 -50
  123. package/keycloak-theme/login/pages/login-update-password/Page.tsx +111 -111
  124. package/keycloak-theme/login/pages/login-update-password/index.ts +3 -3
  125. package/keycloak-theme/login/pages/login-update-profile/Page.stories.tsx +28 -36
  126. package/keycloak-theme/login/pages/login-update-profile/Page.tsx +68 -68
  127. package/keycloak-theme/login/pages/login-update-profile/index.ts +3 -3
  128. package/keycloak-theme/login/pages/login-username/Page.stories.tsx +32 -42
  129. package/keycloak-theme/login/pages/login-username/Page.tsx +246 -246
  130. package/keycloak-theme/login/pages/login-username/index.ts +3 -3
  131. package/keycloak-theme/login/pages/login-username/useScript.tsx +62 -62
  132. package/keycloak-theme/login/pages/login-verify-email/Page.stories.tsx +68 -80
  133. package/keycloak-theme/login/pages/login-verify-email/Page.tsx +38 -38
  134. package/keycloak-theme/login/pages/login-verify-email/index.ts +3 -3
  135. package/keycloak-theme/login/pages/login-x509-info/Page.stories.tsx +29 -37
  136. package/keycloak-theme/login/pages/login-x509-info/Page.tsx +75 -75
  137. package/keycloak-theme/login/pages/login-x509-info/index.ts +3 -3
  138. package/keycloak-theme/login/pages/logout-confirm/Page.stories.tsx +34 -42
  139. package/keycloak-theme/login/pages/logout-confirm/Page.tsx +53 -53
  140. package/keycloak-theme/login/pages/logout-confirm/index.ts +3 -3
  141. package/keycloak-theme/login/pages/register/Form.tsx +106 -106
  142. package/keycloak-theme/login/pages/register/Page.stories.tsx +23 -6
  143. package/keycloak-theme/login/pages/register/Page.tsx +26 -26
  144. package/keycloak-theme/login/pages/register/TermsAcceptance.tsx +56 -56
  145. package/keycloak-theme/login/pages/register/index.ts +3 -3
  146. package/keycloak-theme/login/pages/saml-post-form/Page.stories.tsx +16 -22
  147. package/keycloak-theme/login/pages/saml-post-form/Page.tsx +66 -66
  148. package/keycloak-theme/login/pages/saml-post-form/index.ts +3 -3
  149. package/keycloak-theme/login/pages/select-authenticator/Page.stories.tsx +83 -95
  150. package/keycloak-theme/login/pages/select-authenticator/Page.tsx +100 -100
  151. package/keycloak-theme/login/pages/select-authenticator/index.ts +3 -3
  152. package/keycloak-theme/login/pages/select-organization/Page.stories.tsx +62 -49
  153. package/keycloak-theme/login/pages/select-organization/Page.tsx +126 -126
  154. package/keycloak-theme/login/pages/select-organization/index.ts +3 -3
  155. package/keycloak-theme/login/pages/terms/Page.stories.tsx +15 -0
  156. package/keycloak-theme/login/pages/terms/Page.tsx +51 -51
  157. package/keycloak-theme/login/pages/terms/index.ts +3 -3
  158. package/keycloak-theme/login/pages/update-email/Page.stories.tsx +27 -35
  159. package/keycloak-theme/login/pages/update-email/Page.tsx +62 -62
  160. package/keycloak-theme/login/pages/update-email/index.ts +3 -3
  161. package/keycloak-theme/login/pages/webauthn-authenticate/Page.stories.tsx +112 -126
  162. package/keycloak-theme/login/pages/webauthn-authenticate/Page.tsx +202 -202
  163. package/keycloak-theme/login/pages/webauthn-authenticate/index.ts +3 -3
  164. package/keycloak-theme/login/pages/webauthn-authenticate/useScript.tsx +55 -55
  165. package/keycloak-theme/login/pages/webauthn-error/Page.stories.tsx +54 -66
  166. package/keycloak-theme/login/pages/webauthn-error/Page.tsx +73 -73
  167. package/keycloak-theme/login/pages/webauthn-error/index.ts +3 -3
  168. package/keycloak-theme/login/pages/webauthn-register/Page.stories.tsx +39 -49
  169. package/keycloak-theme/login/pages/webauthn-register/Page.tsx +78 -78
  170. package/keycloak-theme/login/pages/webauthn-register/index.ts +3 -3
  171. package/keycloak-theme/login/pages/webauthn-register/useScript.tsx +62 -62
  172. package/keycloak-theme/login/shared/getColorScheme.ts +45 -0
  173. package/keycloak-theme/login/styleLevelCustomization.tsx +36 -17
  174. package/package.json +6 -5
@@ -1,365 +1,345 @@
1
- import { KcContextExtension } from '@/login/KcContext';
2
- import { KcContext } from '@keycloakify/login-ui/core/KcContext/KcContext';
3
- import { DeepPartial } from '@keycloakify/login-ui/tools/DeepPartial';
4
- import { JSX } from 'react/jsx-runtime';
5
- import { createKcPageStory, type Meta, type StoryObj } from "../../mocks/KcPageStory";
6
-
7
-
8
- const { KcPageStory } = createKcPageStory({ pageId: "login.ftl" });
9
-
10
- const meta = {
11
- title: "login/login.ftl",
12
- component: KcPageStory
13
- } satisfies Meta<typeof KcPageStory>;
14
-
15
- export default meta;
16
-
17
- type Story = StoryObj<typeof meta>;
18
-
19
- export const Default: Story = {
20
- render: (args: JSX.IntrinsicAttributes & { kcContext?: DeepPartial<KcContext.Common & { pageId: "login.ftl"; url: { loginResetCredentialsUrl: string; registrationUrl: string; }; realm: { loginWithEmailAllowed: boolean; rememberMe: boolean; password: boolean; resetPasswordAllowed: boolean; registrationAllowed: boolean; }; auth: { selectedCredential?: string; }; registrationDisabled: boolean; login: { username?: string; rememberMe?: string; password?: string; }; usernameHidden?: boolean; social?: { displayInfo: boolean; providers?: { loginUrl: string; alias: string; providerId: string; displayName: string; iconClasses?: string; }[]; }; enableWebAuthnConditionalUI?: boolean; authenticators?: { authenticators: KcContext.WebauthnAuthenticate.WebauthnAuthenticator[]; }; challenge: string; userVerification: KcContext.WebauthnAuthenticate["userVerification"]; rpId: string; createTimeout: number | string; isUserIdentified: "true" | "false"; shouldDisplayAuthenticators?: boolean; } & KcContextExtension> | undefined; }) => <KcPageStory {...args} />
21
- };
22
-
23
- export const WithInvalidCredential: Story = {
24
- render: (args: JSX.IntrinsicAttributes & { kcContext?: DeepPartial<KcContext.Common & { pageId: "login.ftl"; url: { loginResetCredentialsUrl: string; registrationUrl: string; }; realm: { loginWithEmailAllowed: boolean; rememberMe: boolean; password: boolean; resetPasswordAllowed: boolean; registrationAllowed: boolean; }; auth: { selectedCredential?: string; }; registrationDisabled: boolean; login: { username?: string; rememberMe?: string; password?: string; }; usernameHidden?: boolean; social?: { displayInfo: boolean; providers?: { loginUrl: string; alias: string; providerId: string; displayName: string; iconClasses?: string; }[]; }; enableWebAuthnConditionalUI?: boolean; authenticators?: { authenticators: KcContext.WebauthnAuthenticate.WebauthnAuthenticator[]; }; challenge: string; userVerification: KcContext.WebauthnAuthenticate["userVerification"]; rpId: string; createTimeout: number | string; isUserIdentified: "true" | "false"; shouldDisplayAuthenticators?: boolean; } & KcContextExtension> | undefined; }) => (
25
- <KcPageStory
26
- {...args}
27
- kcContext={{
28
- login: {
29
- username: "johndoe"
30
- },
31
- messagesPerField: {
32
- // NOTE: The other functions of messagesPerField are derived from get() and
33
- // existsError() so they are the only ones that need to mock.
34
- existsError: (fieldName: string, ...otherFieldNames: string[]) => {
35
- const fieldNames = [fieldName, ...otherFieldNames];
36
- return (
37
- fieldNames.includes("username") ||
38
- fieldNames.includes("password")
39
- );
40
- },
41
- get: (fieldName: string) => {
42
- if (fieldName === "username" || fieldName === "password") {
43
- return "Invalid username or password.";
44
- }
45
- return "";
46
- }
47
- }
48
- }}
49
- />
50
- )
51
- };
52
-
53
- export const WithoutRegistration: Story = {
54
- render: (args: JSX.IntrinsicAttributes & { kcContext?: DeepPartial<KcContext.Common & { pageId: "login.ftl"; url: { loginResetCredentialsUrl: string; registrationUrl: string; }; realm: { loginWithEmailAllowed: boolean; rememberMe: boolean; password: boolean; resetPasswordAllowed: boolean; registrationAllowed: boolean; }; auth: { selectedCredential?: string; }; registrationDisabled: boolean; login: { username?: string; rememberMe?: string; password?: string; }; usernameHidden?: boolean; social?: { displayInfo: boolean; providers?: { loginUrl: string; alias: string; providerId: string; displayName: string; iconClasses?: string; }[]; }; enableWebAuthnConditionalUI?: boolean; authenticators?: { authenticators: KcContext.WebauthnAuthenticate.WebauthnAuthenticator[]; }; challenge: string; userVerification: KcContext.WebauthnAuthenticate["userVerification"]; rpId: string; createTimeout: number | string; isUserIdentified: "true" | "false"; shouldDisplayAuthenticators?: boolean; } & KcContextExtension> | undefined; }) => (
55
- <KcPageStory
56
- {...args}
57
- kcContext={{
58
- realm: { registrationAllowed: false }
59
- }}
60
- />
61
- )
62
- };
63
-
64
- export const Arabic: Story = {
65
- render: () => (
66
- <KcPageStory
67
- kcContext={{
68
- locale: {
69
- currentLanguageTag: "ar",
70
- rtl: true
71
- }
72
- }}
73
- />
74
- )
75
- };
76
- export const French: Story = {
77
- render: () => (
78
- <KcPageStory
79
- kcContext={{
80
- locale: {
81
- currentLanguageTag: "fr"
82
- }
83
- }}
84
- />
85
- )
86
- };
87
-
88
- export const WithoutRememberMe: Story = {
89
- render: (args: JSX.IntrinsicAttributes & { kcContext?: DeepPartial<KcContext.Common & { pageId: "login.ftl"; url: { loginResetCredentialsUrl: string; registrationUrl: string; }; realm: { loginWithEmailAllowed: boolean; rememberMe: boolean; password: boolean; resetPasswordAllowed: boolean; registrationAllowed: boolean; }; auth: { selectedCredential?: string; }; registrationDisabled: boolean; login: { username?: string; rememberMe?: string; password?: string; }; usernameHidden?: boolean; social?: { displayInfo: boolean; providers?: { loginUrl: string; alias: string; providerId: string; displayName: string; iconClasses?: string; }[]; }; enableWebAuthnConditionalUI?: boolean; authenticators?: { authenticators: KcContext.WebauthnAuthenticate.WebauthnAuthenticator[]; }; challenge: string; userVerification: KcContext.WebauthnAuthenticate["userVerification"]; rpId: string; createTimeout: number | string; isUserIdentified: "true" | "false"; shouldDisplayAuthenticators?: boolean; } & KcContextExtension> | undefined; }) => (
90
- <KcPageStory
91
- {...args}
92
- kcContext={{
93
- realm: { rememberMe: false }
94
- }}
95
- />
96
- )
97
- };
98
-
99
- export const WithoutPasswordReset: Story = {
100
- render: (args: JSX.IntrinsicAttributes & { kcContext?: DeepPartial<KcContext.Common & { pageId: "login.ftl"; url: { loginResetCredentialsUrl: string; registrationUrl: string; }; realm: { loginWithEmailAllowed: boolean; rememberMe: boolean; password: boolean; resetPasswordAllowed: boolean; registrationAllowed: boolean; }; auth: { selectedCredential?: string; }; registrationDisabled: boolean; login: { username?: string; rememberMe?: string; password?: string; }; usernameHidden?: boolean; social?: { displayInfo: boolean; providers?: { loginUrl: string; alias: string; providerId: string; displayName: string; iconClasses?: string; }[]; }; enableWebAuthnConditionalUI?: boolean; authenticators?: { authenticators: KcContext.WebauthnAuthenticate.WebauthnAuthenticator[]; }; challenge: string; userVerification: KcContext.WebauthnAuthenticate["userVerification"]; rpId: string; createTimeout: number | string; isUserIdentified: "true" | "false"; shouldDisplayAuthenticators?: boolean; } & KcContextExtension> | undefined; }) => (
101
- <KcPageStory
102
- {...args}
103
- kcContext={{
104
- realm: { resetPasswordAllowed: false }
105
- }}
106
- />
107
- )
108
- };
109
-
110
- export const WithEmailAsUsername: Story = {
111
- render: (args: JSX.IntrinsicAttributes & { kcContext?: DeepPartial<KcContext.Common & { pageId: "login.ftl"; url: { loginResetCredentialsUrl: string; registrationUrl: string; }; realm: { loginWithEmailAllowed: boolean; rememberMe: boolean; password: boolean; resetPasswordAllowed: boolean; registrationAllowed: boolean; }; auth: { selectedCredential?: string; }; registrationDisabled: boolean; login: { username?: string; rememberMe?: string; password?: string; }; usernameHidden?: boolean; social?: { displayInfo: boolean; providers?: { loginUrl: string; alias: string; providerId: string; displayName: string; iconClasses?: string; }[]; }; enableWebAuthnConditionalUI?: boolean; authenticators?: { authenticators: KcContext.WebauthnAuthenticate.WebauthnAuthenticator[]; }; challenge: string; userVerification: KcContext.WebauthnAuthenticate["userVerification"]; rpId: string; createTimeout: number | string; isUserIdentified: "true" | "false"; shouldDisplayAuthenticators?: boolean; } & KcContextExtension> | undefined; }) => (
112
- <KcPageStory
113
- {...args}
114
- kcContext={{
115
- realm: { loginWithEmailAllowed: false }
116
- }}
117
- />
118
- )
119
- };
120
-
121
- export const WithPresetUsername: Story = {
122
- render: (args: JSX.IntrinsicAttributes & { kcContext?: DeepPartial<KcContext.Common & { pageId: "login.ftl"; url: { loginResetCredentialsUrl: string; registrationUrl: string; }; realm: { loginWithEmailAllowed: boolean; rememberMe: boolean; password: boolean; resetPasswordAllowed: boolean; registrationAllowed: boolean; }; auth: { selectedCredential?: string; }; registrationDisabled: boolean; login: { username?: string; rememberMe?: string; password?: string; }; usernameHidden?: boolean; social?: { displayInfo: boolean; providers?: { loginUrl: string; alias: string; providerId: string; displayName: string; iconClasses?: string; }[]; }; enableWebAuthnConditionalUI?: boolean; authenticators?: { authenticators: KcContext.WebauthnAuthenticate.WebauthnAuthenticator[]; }; challenge: string; userVerification: KcContext.WebauthnAuthenticate["userVerification"]; rpId: string; createTimeout: number | string; isUserIdentified: "true" | "false"; shouldDisplayAuthenticators?: boolean; } & KcContextExtension> | undefined; }) => (
123
- <KcPageStory
124
- {...args}
125
- kcContext={{
126
- login: { username: "max.mustermann@mail.com" }
127
- }}
128
- />
129
- )
130
- };
131
-
132
- export const WithImmutablePresetUsername: Story = {
133
- render: (args: JSX.IntrinsicAttributes & { kcContext?: DeepPartial<KcContext.Common & { pageId: "login.ftl"; url: { loginResetCredentialsUrl: string; registrationUrl: string; }; realm: { loginWithEmailAllowed: boolean; rememberMe: boolean; password: boolean; resetPasswordAllowed: boolean; registrationAllowed: boolean; }; auth: { selectedCredential?: string; }; registrationDisabled: boolean; login: { username?: string; rememberMe?: string; password?: string; }; usernameHidden?: boolean; social?: { displayInfo: boolean; providers?: { loginUrl: string; alias: string; providerId: string; displayName: string; iconClasses?: string; }[]; }; enableWebAuthnConditionalUI?: boolean; authenticators?: { authenticators: KcContext.WebauthnAuthenticate.WebauthnAuthenticator[]; }; challenge: string; userVerification: KcContext.WebauthnAuthenticate["userVerification"]; rpId: string; createTimeout: number | string; isUserIdentified: "true" | "false"; shouldDisplayAuthenticators?: boolean; } & KcContextExtension> | undefined; }) => (
134
- <KcPageStory
135
- {...args}
136
- kcContext={{
137
- auth: {
138
- attemptedUsername: "max.mustermann@mail.com",
139
- showUsername: true
140
- },
141
- usernameHidden: true,
142
- message: {
143
- type: "info",
144
- summary: "Please re-authenticate to continue"
145
- }
146
- }}
147
- />
148
- )
149
- };
150
- export const WithOneSocialProvider: Story = {
151
- render: (args: JSX.IntrinsicAttributes & { kcContext?: DeepPartial<KcContext.Common & { pageId: "login.ftl"; url: { loginResetCredentialsUrl: string; registrationUrl: string; }; realm: { loginWithEmailAllowed: boolean; rememberMe: boolean; password: boolean; resetPasswordAllowed: boolean; registrationAllowed: boolean; }; auth: { selectedCredential?: string; }; registrationDisabled: boolean; login: { username?: string; rememberMe?: string; password?: string; }; usernameHidden?: boolean; social?: { displayInfo: boolean; providers?: { loginUrl: string; alias: string; providerId: string; displayName: string; iconClasses?: string; }[]; }; enableWebAuthnConditionalUI?: boolean; authenticators?: { authenticators: KcContext.WebauthnAuthenticate.WebauthnAuthenticator[]; }; challenge: string; userVerification: KcContext.WebauthnAuthenticate["userVerification"]; rpId: string; createTimeout: number | string; isUserIdentified: "true" | "false"; shouldDisplayAuthenticators?: boolean; } & KcContextExtension> | undefined; }) => (
152
- <KcPageStory
153
- {...args}
154
- kcContext={{
155
- social: {
156
- displayInfo: true,
157
- providers: [
158
- {
159
- loginUrl: "google",
160
- alias: "google",
161
- providerId: "google",
162
- displayName: "Google",
163
- iconClasses: "fa fa-google"
164
- }
165
- ]
166
- }
167
- }}
168
- />
169
- )
170
- };
171
- export const WithTwoSocialProviders: Story = {
172
- render: (args: JSX.IntrinsicAttributes & { kcContext?: DeepPartial<KcContext.Common & { pageId: "login.ftl"; url: { loginResetCredentialsUrl: string; registrationUrl: string; }; realm: { loginWithEmailAllowed: boolean; rememberMe: boolean; password: boolean; resetPasswordAllowed: boolean; registrationAllowed: boolean; }; auth: { selectedCredential?: string; }; registrationDisabled: boolean; login: { username?: string; rememberMe?: string; password?: string; }; usernameHidden?: boolean; social?: { displayInfo: boolean; providers?: { loginUrl: string; alias: string; providerId: string; displayName: string; iconClasses?: string; }[]; }; enableWebAuthnConditionalUI?: boolean; authenticators?: { authenticators: KcContext.WebauthnAuthenticate.WebauthnAuthenticator[]; }; challenge: string; userVerification: KcContext.WebauthnAuthenticate["userVerification"]; rpId: string; createTimeout: number | string; isUserIdentified: "true" | "false"; shouldDisplayAuthenticators?: boolean; } & KcContextExtension> | undefined; }) => (
173
- <KcPageStory
174
- {...args}
175
- kcContext={{
176
- social: {
177
- displayInfo: true,
178
- providers: [
179
- {
180
- loginUrl: "google",
181
- alias: "google",
182
- providerId: "google",
183
- displayName: "Google",
184
- iconClasses: "fa fa-google"
185
- },
186
- {
187
- loginUrl: "linkedin",
188
- alias: "linkedin-openid-connect",
189
- providerId: "linkedin-openid-connect",
190
- displayName: "LinkedIn",
191
- iconClasses: "fa fa-linkedin"
192
- }
193
- ]
194
- }
195
- }}
196
- />
197
- )
198
- };
199
-
200
- export const WithTwoSocialProvidersArabic: Story = {
201
- render: (args: JSX.IntrinsicAttributes & { kcContext?: DeepPartial<KcContext.Common & { pageId: "login.ftl"; url: { loginResetCredentialsUrl: string; registrationUrl: string; }; realm: { loginWithEmailAllowed: boolean; rememberMe: boolean; password: boolean; resetPasswordAllowed: boolean; registrationAllowed: boolean; }; auth: { selectedCredential?: string; }; registrationDisabled: boolean; login: { username?: string; rememberMe?: string; password?: string; }; usernameHidden?: boolean; social?: { displayInfo: boolean; providers?: { loginUrl: string; alias: string; providerId: string; displayName: string; iconClasses?: string; }[]; }; enableWebAuthnConditionalUI?: boolean; authenticators?: { authenticators: KcContext.WebauthnAuthenticate.WebauthnAuthenticator[]; }; challenge: string; userVerification: KcContext.WebauthnAuthenticate["userVerification"]; rpId: string; createTimeout: number | string; isUserIdentified: "true" | "false"; shouldDisplayAuthenticators?: boolean; } & KcContextExtension> | undefined; }) => (
202
- <KcPageStory
203
- {...args}
204
- kcContext={{
205
- locale: {
206
- currentLanguageTag: "ar",
207
- rtl: true
208
- },
209
- social: {
210
- displayInfo: true,
211
- providers: [
212
- {
213
- loginUrl: "google",
214
- alias: "google",
215
- providerId: "google",
216
- displayName: "Google",
217
- iconClasses: "fa fa-google"
218
- },
219
- {
220
- loginUrl: "linkedin",
221
- alias: "linkedin-openid-connect",
222
- providerId: "linkedin-openid-connect",
223
- displayName: "LinkedIn",
224
- iconClasses: "fa fa-linkedin"
225
- }
226
- ]
227
- }
228
- }}
229
- />
230
- )
231
- };
232
- export const WithSocialProviders: Story = {
233
- render: (args: JSX.IntrinsicAttributes & { kcContext?: DeepPartial<KcContext.Common & { pageId: "login.ftl"; url: { loginResetCredentialsUrl: string; registrationUrl: string; }; realm: { loginWithEmailAllowed: boolean; rememberMe: boolean; password: boolean; resetPasswordAllowed: boolean; registrationAllowed: boolean; }; auth: { selectedCredential?: string; }; registrationDisabled: boolean; login: { username?: string; rememberMe?: string; password?: string; }; usernameHidden?: boolean; social?: { displayInfo: boolean; providers?: { loginUrl: string; alias: string; providerId: string; displayName: string; iconClasses?: string; }[]; }; enableWebAuthnConditionalUI?: boolean; authenticators?: { authenticators: KcContext.WebauthnAuthenticate.WebauthnAuthenticator[]; }; challenge: string; userVerification: KcContext.WebauthnAuthenticate["userVerification"]; rpId: string; createTimeout: number | string; isUserIdentified: "true" | "false"; shouldDisplayAuthenticators?: boolean; } & KcContextExtension> | undefined; }) => (
234
- <KcPageStory
235
- {...args}
236
- kcContext={{
237
- social: {
238
- displayInfo: true,
239
- providers: [
240
- {
241
- loginUrl: "google",
242
- alias: "google",
243
- providerId: "google",
244
- displayName: "Google",
245
- iconClasses: "fa fa-google"
246
- },
247
- {
248
- loginUrl: "microsoft",
249
- alias: "microsoft",
250
- providerId: "microsoft",
251
- displayName: "Microsoft",
252
- iconClasses: "fa fa-windows"
253
- },
254
- {
255
- loginUrl: "facebook",
256
- alias: "facebook",
257
- providerId: "facebook",
258
- displayName: "Facebook",
259
- iconClasses: "fa fa-facebook"
260
- },
261
- {
262
- loginUrl: "instagram",
263
- alias: "instagram",
264
- providerId: "instagram",
265
- displayName: "Instagram",
266
- iconClasses: "fa fa-instagram"
267
- },
268
- {
269
- loginUrl: "twitter",
270
- alias: "twitter",
271
- providerId: "twitter",
272
- displayName: "Twitter",
273
- iconClasses: "fa fa-twitter"
274
- },
275
- {
276
- loginUrl: "linkedin",
277
- alias: "linkedin-openid-connect",
278
- providerId: "linkedin-openid-connect",
279
- displayName: "LinkedIn",
280
- iconClasses: "fa fa-linkedin"
281
- },
282
- {
283
- loginUrl: "stackoverflow",
284
- alias: "stackoverflow",
285
- providerId: "stackoverflow",
286
- displayName: "Stackoverflow",
287
- iconClasses: "fa fa-stack-overflow"
288
- },
289
- {
290
- loginUrl: "github",
291
- alias: "github",
292
- providerId: "github",
293
- displayName: "Github",
294
- iconClasses: "fa fa-github"
295
- },
296
- {
297
- loginUrl: "gitlab",
298
- alias: "gitlab",
299
- providerId: "gitlab",
300
- displayName: "Gitlab",
301
- iconClasses: "fa fa-gitlab"
302
- },
303
- {
304
- loginUrl: "bitbucket",
305
- alias: "bitbucket",
306
- providerId: "bitbucket",
307
- displayName: "Bitbucket",
308
- iconClasses: "fa fa-bitbucket"
309
- },
310
- {
311
- loginUrl: "paypal",
312
- alias: "paypal",
313
- providerId: "paypal",
314
- displayName: "PayPal",
315
- iconClasses: "fa fa-paypal"
316
- },
317
- {
318
- loginUrl: "openshift",
319
- alias: "openshift-v4",
320
- providerId: "openshift-v4",
321
- displayName: "OpenShift",
322
- iconClasses: "fa fa-cloud"
323
- }
324
- ]
325
- }
326
- }}
327
- />
328
- )
329
- };
330
-
331
- export const WithoutPasswordField: Story = {
332
- render: (args: JSX.IntrinsicAttributes & { kcContext?: DeepPartial<KcContext.Common & { pageId: "login.ftl"; url: { loginResetCredentialsUrl: string; registrationUrl: string; }; realm: { loginWithEmailAllowed: boolean; rememberMe: boolean; password: boolean; resetPasswordAllowed: boolean; registrationAllowed: boolean; }; auth: { selectedCredential?: string; }; registrationDisabled: boolean; login: { username?: string; rememberMe?: string; password?: string; }; usernameHidden?: boolean; social?: { displayInfo: boolean; providers?: { loginUrl: string; alias: string; providerId: string; displayName: string; iconClasses?: string; }[]; }; enableWebAuthnConditionalUI?: boolean; authenticators?: { authenticators: KcContext.WebauthnAuthenticate.WebauthnAuthenticator[]; }; challenge: string; userVerification: KcContext.WebauthnAuthenticate["userVerification"]; rpId: string; createTimeout: number | string; isUserIdentified: "true" | "false"; shouldDisplayAuthenticators?: boolean; } & KcContextExtension> | undefined; }) => (
333
- <KcPageStory
334
- {...args}
335
- kcContext={{
336
- realm: { password: false }
337
- }}
338
- />
339
- )
340
- };
341
-
342
- export const WithWebauthn: Story = {
343
- render: () => (
344
- <KcPageStory
345
- kcContext={{
346
- enableWebAuthnConditionalUI: true
347
- }}
348
- />
349
- )
350
- };
351
-
352
- export const WithErrorMessage: Story = {
353
- render: (args: JSX.IntrinsicAttributes & { kcContext?: DeepPartial<KcContext.Common & { pageId: "login.ftl"; url: { loginResetCredentialsUrl: string; registrationUrl: string; }; realm: { loginWithEmailAllowed: boolean; rememberMe: boolean; password: boolean; resetPasswordAllowed: boolean; registrationAllowed: boolean; }; auth: { selectedCredential?: string; }; registrationDisabled: boolean; login: { username?: string; rememberMe?: string; password?: string; }; usernameHidden?: boolean; social?: { displayInfo: boolean; providers?: { loginUrl: string; alias: string; providerId: string; displayName: string; iconClasses?: string; }[]; }; enableWebAuthnConditionalUI?: boolean; authenticators?: { authenticators: KcContext.WebauthnAuthenticate.WebauthnAuthenticator[]; }; challenge: string; userVerification: KcContext.WebauthnAuthenticate["userVerification"]; rpId: string; createTimeout: number | string; isUserIdentified: "true" | "false"; shouldDisplayAuthenticators?: boolean; } & KcContextExtension> | undefined; }) => (
354
- <KcPageStory
355
- {...args}
356
- kcContext={{
357
- message: {
358
- summary:
359
- "The time allotted for the connection has elapsed.<br/>The login process will restart from the beginning.",
360
- type: "error"
361
- }
362
- }}
363
- />
364
- )
365
- };
1
+ import { createKcPageStory, type Meta, type StoryObj } from "../../mocks/KcPageStory";
2
+
3
+ const { KcPageStory } = createKcPageStory({ pageId: "login.ftl" });
4
+
5
+ const meta = {
6
+ title: "login/login.ftl",
7
+ component: KcPageStory
8
+ } satisfies Meta<typeof KcPageStory>;
9
+
10
+ export default meta;
11
+
12
+ type Story = StoryObj<typeof meta>;
13
+
14
+ export const Default: Story = {};
15
+
16
+
17
+ export const Arabic: Story = {
18
+ args: {
19
+ kcContext: {
20
+ locale: {
21
+ currentLanguageTag: "ar",
22
+ rtl: true
23
+ }
24
+ }
25
+ }
26
+ };
27
+ export const French: Story = {
28
+ args: {
29
+ kcContext: {
30
+ locale: {
31
+ currentLanguageTag: "fr",
32
+ rtl: false
33
+ }
34
+ }
35
+ }
36
+ };
37
+
38
+ export const WithInvalidCredential: Story = {
39
+ args: {
40
+ kcContext: {
41
+ login: {
42
+ username: "johndoe"
43
+ },
44
+ messagesPerField: {
45
+ // NOTE: The other functions of messagesPerField are derived from get() and
46
+ // existsError() so they are the only ones that need to mock.
47
+ existsError: (fieldName: string, ...otherFieldNames: string[]) => {
48
+ const fieldNames = [fieldName, ...otherFieldNames];
49
+ return fieldNames.includes("username") || fieldNames.includes("password");
50
+ },
51
+ get: (fieldName: string) => {
52
+ if (fieldName === "username" || fieldName === "password") {
53
+ return "Invalid username or password.";
54
+ }
55
+ return "";
56
+ }
57
+ }
58
+ }
59
+ }
60
+ };
61
+
62
+ export const WithoutRegistration: Story = {
63
+ args: {
64
+ kcContext: {
65
+ realm: { registrationAllowed: false }
66
+ }
67
+ }
68
+ };
69
+
70
+ export const WithoutRememberMe: Story = {
71
+ args: {
72
+ kcContext: {
73
+ realm: { rememberMe: false }
74
+ }
75
+ }
76
+ };
77
+
78
+ export const WithoutPasswordReset: Story = {
79
+ args: {
80
+ kcContext: {
81
+ realm: { resetPasswordAllowed: false }
82
+ }
83
+ }
84
+ };
85
+
86
+ export const WithEmailAsUsername: Story = {
87
+ args: {
88
+ kcContext: {
89
+ realm: { loginWithEmailAllowed: false }
90
+ }
91
+ }
92
+ };
93
+
94
+ export const WithPresetUsername: Story = {
95
+ args: {
96
+ kcContext: {
97
+ login: { username: "max.mustermann@mail.com" }
98
+ }
99
+ }
100
+ };
101
+
102
+ export const WithImmutablePresetUsername: Story = {
103
+ args: {
104
+ kcContext: {
105
+ auth: {
106
+ attemptedUsername: "max.mustermann@mail.com",
107
+ showUsername: true
108
+ },
109
+ usernameHidden: true,
110
+ message: {
111
+ type: "info",
112
+ summary: "Please re-authenticate to continue"
113
+ }
114
+ }
115
+ }
116
+ };
117
+
118
+ export const WithSocialProviders: Story = {
119
+ args: {
120
+ kcContext: {
121
+ social: {
122
+ displayInfo: true,
123
+ providers: [
124
+ {
125
+ loginUrl: "google",
126
+ alias: "google",
127
+ providerId: "google",
128
+ displayName: "Google",
129
+ iconClasses: "fa fa-google"
130
+ },
131
+ {
132
+ loginUrl: "microsoft",
133
+ alias: "microsoft",
134
+ providerId: "microsoft",
135
+ displayName: "Microsoft",
136
+ iconClasses: "fa fa-windows"
137
+ },
138
+ {
139
+ loginUrl: "facebook",
140
+ alias: "facebook",
141
+ providerId: "facebook",
142
+ displayName: "Facebook",
143
+ iconClasses: "fa fa-facebook"
144
+ },
145
+ {
146
+ loginUrl: "instagram",
147
+ alias: "instagram",
148
+ providerId: "instagram",
149
+ displayName: "Instagram",
150
+ iconClasses: "fa fa-instagram"
151
+ },
152
+ {
153
+ loginUrl: "twitter",
154
+ alias: "twitter",
155
+ providerId: "twitter",
156
+ displayName: "Twitter",
157
+ iconClasses: "fa fa-twitter"
158
+ },
159
+ {
160
+ loginUrl: "linkedin",
161
+ alias: "linkedin",
162
+ providerId: "linkedin",
163
+ displayName: "LinkedIn",
164
+ iconClasses: "fa fa-linkedin"
165
+ },
166
+ {
167
+ loginUrl: "stackoverflow",
168
+ alias: "stackoverflow",
169
+ providerId: "stackoverflow",
170
+ displayName: "Stackoverflow",
171
+ iconClasses: "fa fa-stack-overflow"
172
+ },
173
+ {
174
+ loginUrl: "github",
175
+ alias: "github",
176
+ providerId: "github",
177
+ displayName: "Github",
178
+ iconClasses: "fa fa-github"
179
+ },
180
+ {
181
+ loginUrl: "gitlab",
182
+ alias: "gitlab",
183
+ providerId: "gitlab",
184
+ displayName: "Gitlab",
185
+ iconClasses: "fa fa-gitlab"
186
+ },
187
+ {
188
+ loginUrl: "bitbucket",
189
+ alias: "bitbucket",
190
+ providerId: "bitbucket",
191
+ displayName: "Bitbucket",
192
+ iconClasses: "fa fa-bitbucket"
193
+ },
194
+ {
195
+ loginUrl: "paypal",
196
+ alias: "paypal",
197
+ providerId: "paypal",
198
+ displayName: "PayPal",
199
+ iconClasses: "fa fa-paypal"
200
+ },
201
+ {
202
+ loginUrl: "openshift",
203
+ alias: "openshift",
204
+ providerId: "openshift",
205
+ displayName: "OpenShift",
206
+ iconClasses: "fa fa-cloud"
207
+ }
208
+ ]
209
+ }
210
+ }
211
+ }
212
+ };
213
+
214
+ export const WithoutPasswordField: Story = {
215
+ args: {
216
+ kcContext: {
217
+ realm: { password: false }
218
+ }
219
+ }
220
+ };
221
+
222
+ export const WithErrorMessage: Story = {
223
+ args: {
224
+ kcContext: {
225
+ message: {
226
+ summary:
227
+ "The time allotted for the connection has elapsed.<br/>The login process will restart from the beginning.",
228
+ type: "error"
229
+ }
230
+ }
231
+ }
232
+ };
233
+
234
+ export const WithOneSocialProvider: Story = {
235
+ args: {
236
+ kcContext: {
237
+ social: {
238
+ displayInfo: true,
239
+ providers: [
240
+ {
241
+ loginUrl: "google",
242
+ alias: "google",
243
+ providerId: "google",
244
+ displayName: "Google",
245
+ iconClasses: "fa fa-google"
246
+ }
247
+ ]
248
+ }
249
+ }
250
+ }
251
+ };
252
+
253
+ export const WithTwoSocialProviders: Story = {
254
+ args: {
255
+ kcContext: {
256
+ social: {
257
+ displayInfo: true,
258
+ providers: [
259
+ {
260
+ loginUrl: "google",
261
+ alias: "google",
262
+ providerId: "google",
263
+ displayName: "Google",
264
+ iconClasses: "fa fa-google"
265
+ },
266
+ {
267
+ loginUrl: "microsoft",
268
+ alias: "microsoft",
269
+ providerId: "microsoft",
270
+ displayName: "Microsoft",
271
+ iconClasses: "fa fa-windows"
272
+ }
273
+ ]
274
+ }
275
+ }
276
+ }
277
+ };
278
+ export const WithNoSocialProviders: Story = {
279
+ args: {
280
+ kcContext: {
281
+ social: {
282
+ displayInfo: true,
283
+ providers: []
284
+ }
285
+ }
286
+ }
287
+ };
288
+ export const WithMoreThanTwoSocialProviders: Story = {
289
+ args: {
290
+ kcContext: {
291
+ social: {
292
+ displayInfo: true,
293
+ providers: [
294
+ {
295
+ loginUrl: "google",
296
+ alias: "google",
297
+ providerId: "google",
298
+ displayName: "Google",
299
+ iconClasses: "fa fa-google"
300
+ },
301
+ {
302
+ loginUrl: "microsoft",
303
+ alias: "microsoft",
304
+ providerId: "microsoft",
305
+ displayName: "Microsoft",
306
+ iconClasses: "fa fa-windows"
307
+ },
308
+ {
309
+ loginUrl: "facebook",
310
+ alias: "facebook",
311
+ providerId: "facebook",
312
+ displayName: "Facebook",
313
+ iconClasses: "fa fa-facebook"
314
+ },
315
+ {
316
+ loginUrl: "twitter",
317
+ alias: "twitter",
318
+ providerId: "twitter",
319
+ displayName: "Twitter",
320
+ iconClasses: "fa fa-twitter"
321
+ }
322
+ ]
323
+ }
324
+ }
325
+ }
326
+ };
327
+ export const WithSocialProvidersAndWithoutRememberMe: Story = {
328
+ args: {
329
+ kcContext: {
330
+ social: {
331
+ displayInfo: true,
332
+ providers: [
333
+ {
334
+ loginUrl: "google",
335
+ alias: "google",
336
+ providerId: "google",
337
+ displayName: "Google",
338
+ iconClasses: "fa fa-google"
339
+ }
340
+ ]
341
+ },
342
+ realm: { rememberMe: false }
343
+ }
344
+ }
345
+ };