@ssplib/react-components 0.0.291 → 0.0.293
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -36,10 +36,10 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
|
36
36
|
};
|
|
37
37
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
38
38
|
exports.KeycloakAuthProvider = exports.cookieName = void 0;
|
|
39
|
-
const keycloak_js_1 = __importDefault(require("keycloak-js"));
|
|
40
39
|
const router_1 = require("next/router");
|
|
41
40
|
const react_1 = __importStar(require("react"));
|
|
42
41
|
const auth_1 = require("../../context/auth");
|
|
42
|
+
const keycloak_js_1 = __importDefault(require("keycloak-js"));
|
|
43
43
|
exports.cookieName = 'nextauth.token';
|
|
44
44
|
const userImgName = 'user-data.img';
|
|
45
45
|
function KeycloakAuthProvider({ url, realm, clientId, children, type = 'ad', resource_name = 'eventos-front', redirectUri = '', }) {
|
|
@@ -48,31 +48,6 @@ function KeycloakAuthProvider({ url, realm, clientId, children, type = 'ad', res
|
|
|
48
48
|
const [kc, setKc] = (0, react_1.useState)(null);
|
|
49
49
|
const router = (0, router_1.useRouter)();
|
|
50
50
|
const isAuth = !!user;
|
|
51
|
-
const updateUserData = (token) => {
|
|
52
|
-
var _a, _b;
|
|
53
|
-
if (!kc)
|
|
54
|
-
return;
|
|
55
|
-
const tokenParsed = kc.tokenParsed;
|
|
56
|
-
const roles = ((_b = ((_a = tokenParsed === null || tokenParsed === void 0 ? void 0 : tokenParsed.resource_access) !== null && _a !== void 0 ? _a : {})[resource_name]) === null || _b === void 0 ? void 0 : _b.roles) || [];
|
|
57
|
-
setUser(Object.assign(Object.assign({}, tokenParsed), { token,
|
|
58
|
-
roles }));
|
|
59
|
-
};
|
|
60
|
-
const refreshTokens = () => __awaiter(this, void 0, void 0, function* () {
|
|
61
|
-
if (!kc)
|
|
62
|
-
return false;
|
|
63
|
-
try {
|
|
64
|
-
const refreshed = yield kc.updateToken(5);
|
|
65
|
-
if (refreshed) {
|
|
66
|
-
updateUserData(kc.token);
|
|
67
|
-
}
|
|
68
|
-
return refreshed;
|
|
69
|
-
}
|
|
70
|
-
catch (err) {
|
|
71
|
-
console.error('Falha ao atualizar token:', err);
|
|
72
|
-
logout();
|
|
73
|
-
return false;
|
|
74
|
-
}
|
|
75
|
-
});
|
|
76
51
|
(0, react_1.useEffect)(() => {
|
|
77
52
|
const keycloak = new keycloak_js_1.default({
|
|
78
53
|
url: url,
|
|
@@ -80,12 +55,26 @@ function KeycloakAuthProvider({ url, realm, clientId, children, type = 'ad', res
|
|
|
80
55
|
clientId: clientId,
|
|
81
56
|
});
|
|
82
57
|
setKc(keycloak);
|
|
58
|
+
keycloak.onTokenExpired = () => __awaiter(this, void 0, void 0, function* () {
|
|
59
|
+
console.log('token expired');
|
|
60
|
+
try {
|
|
61
|
+
const refreshed = yield keycloak.updateToken(5);
|
|
62
|
+
if (refreshed) {
|
|
63
|
+
setUser((prevUser) => (Object.assign(Object.assign({}, prevUser), { token: keycloak.token })));
|
|
64
|
+
}
|
|
65
|
+
console.log(refreshed ? 'Token was refreshed' : 'Token is still valid');
|
|
66
|
+
}
|
|
67
|
+
catch (error) {
|
|
68
|
+
console.log('Failed to refresh token', error);
|
|
69
|
+
}
|
|
70
|
+
});
|
|
83
71
|
keycloak
|
|
84
72
|
.init({
|
|
85
73
|
onLoad: 'check-sso',
|
|
86
74
|
pkceMethod: 'S256',
|
|
87
75
|
})
|
|
88
76
|
.then((auth) => {
|
|
77
|
+
var _a, _b;
|
|
89
78
|
setUserLoaded(true);
|
|
90
79
|
if (!auth) {
|
|
91
80
|
console.log('NAO AUTENTICADO');
|
|
@@ -94,12 +83,9 @@ function KeycloakAuthProvider({ url, realm, clientId, children, type = 'ad', res
|
|
|
94
83
|
else {
|
|
95
84
|
const tokenParsed = keycloak.tokenParsed;
|
|
96
85
|
console.log('TOKEN-> ', tokenParsed);
|
|
97
|
-
|
|
86
|
+
const userData = Object.assign(Object.assign({}, tokenParsed), { token: keycloak.token, roles: ((_b = ((_a = tokenParsed === null || tokenParsed === void 0 ? void 0 : tokenParsed.resource_access) !== null && _a !== void 0 ? _a : {})[resource_name]) !== null && _b !== void 0 ? _b : []).roles });
|
|
87
|
+
setUser(userData);
|
|
98
88
|
console.info('Authenticated!!!');
|
|
99
|
-
keycloak.onTokenExpired = () => {
|
|
100
|
-
console.log('token expired');
|
|
101
|
-
refreshTokens();
|
|
102
|
-
};
|
|
103
89
|
}
|
|
104
90
|
}, () => {
|
|
105
91
|
console.error('Authenticated Failed');
|
|
@@ -127,6 +113,6 @@ function KeycloakAuthProvider({ url, realm, clientId, children, type = 'ad', res
|
|
|
127
113
|
setUser(null);
|
|
128
114
|
localStorage.removeItem(userImgName);
|
|
129
115
|
}
|
|
130
|
-
return react_1.default.createElement(auth_1.AuthContext.Provider, { value: { user, isAuth, userLoaded, login, logout, saveUserData: () => { }, type
|
|
116
|
+
return react_1.default.createElement(auth_1.AuthContext.Provider, { value: { user, isAuth, userLoaded, login, logout, saveUserData: () => { }, type } }, children);
|
|
131
117
|
}
|
|
132
118
|
exports.KeycloakAuthProvider = KeycloakAuthProvider;
|
package/package.json
CHANGED