@zengenti/contensis-react-base 3.0.0-beta.3 → 3.0.0-beta.30

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (138) hide show
  1. package/README.md +4 -4
  2. package/cjs/{App-581b6653.js → App-b681e8eb.js} +139 -124
  3. package/cjs/App-b681e8eb.js.map +1 -0
  4. package/cjs/{RouteLoader-282c03ab.js → RouteLoader-2ed14766.js} +44 -30
  5. package/cjs/RouteLoader-2ed14766.js.map +1 -0
  6. package/cjs/ToJs-09204afd.js +129 -0
  7. package/cjs/ToJs-09204afd.js.map +1 -0
  8. package/cjs/{actions-12871aca.js → actions-6b9ef168.js} +9 -8
  9. package/cjs/actions-6b9ef168.js.map +1 -0
  10. package/cjs/client.js +43 -22
  11. package/cjs/client.js.map +1 -1
  12. package/cjs/contensis-react-base.js +42 -46
  13. package/cjs/contensis-react-base.js.map +1 -1
  14. package/cjs/forms.js +275 -275
  15. package/cjs/forms.js.map +1 -1
  16. package/cjs/fromJSLeaveImmer-65d26804.js +28 -0
  17. package/cjs/fromJSLeaveImmer-65d26804.js.map +1 -0
  18. package/cjs/{login-81d7f9ef.js → login-d67b82aa.js} +113 -79
  19. package/cjs/login-d67b82aa.js.map +1 -0
  20. package/cjs/{reducers-fde41d6b.js → reducers-3a4f8971.js} +26 -25
  21. package/cjs/reducers-3a4f8971.js.map +1 -0
  22. package/cjs/redux.js +13 -14
  23. package/cjs/redux.js.map +1 -1
  24. package/cjs/routing.js +9 -8
  25. package/cjs/routing.js.map +1 -1
  26. package/cjs/search.js +226 -162
  27. package/cjs/search.js.map +1 -1
  28. package/cjs/{selectors-ed26ed97.js → selectors-2c1b1183.js} +8 -4
  29. package/cjs/selectors-2c1b1183.js.map +1 -0
  30. package/cjs/user.js +32 -23
  31. package/cjs/user.js.map +1 -1
  32. package/cjs/util.js +48 -45
  33. package/cjs/util.js.map +1 -1
  34. package/cjs/{version-f061e409.js → version-7c4ce67e.js} +58 -52
  35. package/cjs/version-7c4ce67e.js.map +1 -0
  36. package/cjs/{version-0c190929.js → version-dcfdafd9.js} +5 -5
  37. package/cjs/{version-0c190929.js.map → version-dcfdafd9.js.map} +1 -1
  38. package/esm/{App-122f28a3.js → App-c9e818ab.js} +120 -124
  39. package/esm/App-c9e818ab.js.map +1 -0
  40. package/esm/{RouteLoader-c2faac87.js → RouteLoader-d4b4d320.js} +37 -23
  41. package/esm/RouteLoader-d4b4d320.js.map +1 -0
  42. package/esm/ToJs-2627ce21.js +99 -0
  43. package/esm/ToJs-2627ce21.js.map +1 -0
  44. package/esm/{actions-3cc39599.js → actions-5437f43d.js} +8 -7
  45. package/esm/actions-5437f43d.js.map +1 -0
  46. package/esm/client.js +22 -20
  47. package/esm/client.js.map +1 -1
  48. package/esm/contensis-react-base.js +24 -28
  49. package/esm/contensis-react-base.js.map +1 -1
  50. package/esm/forms.js +5 -5
  51. package/esm/forms.js.map +1 -1
  52. package/esm/fromJSLeaveImmer-e2f0f331.js +26 -0
  53. package/esm/fromJSLeaveImmer-e2f0f331.js.map +1 -0
  54. package/esm/{login-92db44d1.js → login-f6dfbe1b.js} +97 -60
  55. package/esm/login-f6dfbe1b.js.map +1 -0
  56. package/esm/{reducers-d6c0edb1.js → reducers-8e5d6232.js} +26 -25
  57. package/esm/reducers-8e5d6232.js.map +1 -0
  58. package/esm/redux.js +14 -13
  59. package/esm/redux.js.map +1 -1
  60. package/esm/routing.js +9 -8
  61. package/esm/routing.js.map +1 -1
  62. package/esm/search.js +196 -150
  63. package/esm/search.js.map +1 -1
  64. package/esm/{selectors-82e71d8e.js → selectors-65f0f31c.js} +9 -6
  65. package/esm/selectors-65f0f31c.js.map +1 -0
  66. package/esm/user.js +31 -22
  67. package/esm/user.js.map +1 -1
  68. package/esm/util.js +17 -10
  69. package/esm/util.js.map +1 -1
  70. package/esm/version-696796d7.js +15 -0
  71. package/esm/{version-59c8f9be.js.map → version-696796d7.js.map} +1 -1
  72. package/esm/{version-cb9cd09d.js → version-e6a545e1.js} +38 -31
  73. package/esm/version-e6a545e1.js.map +1 -0
  74. package/models/redux/appstate.d.ts +5 -10
  75. package/models/redux/reducers/navigation.d.ts +1 -6
  76. package/models/redux/reducers/version.d.ts +1 -5
  77. package/models/redux/selectors/navigation.d.ts +2 -1
  78. package/models/routing/redux/actions.d.ts +1 -1
  79. package/models/routing/redux/reducers.d.ts +1 -21
  80. package/models/routing/redux/selectors.d.ts +1 -1
  81. package/models/routing/routes.d.ts +3 -2
  82. package/models/routing/util/expressions.d.ts +3 -2
  83. package/models/routing/util/queries.d.ts +1 -1
  84. package/models/search/models/Queries.d.ts +8 -5
  85. package/models/search/models/Search.d.ts +9 -8
  86. package/models/search/models/SearchActions.d.ts +1 -0
  87. package/models/search/models/SearchState.d.ts +3 -0
  88. package/models/search/models/index.d.ts +3 -2
  89. package/models/search/redux/actions.d.ts +2 -1
  90. package/models/search/redux/reducers.d.ts +226 -314
  91. package/models/search/redux/sagas.d.ts +2 -2
  92. package/models/search/redux/selectors.d.ts +5 -10
  93. package/models/search/search/expressions.d.ts +2 -6
  94. package/models/search/transformations/filter-to-filterexpression.mapper.d.ts +6 -0
  95. package/models/search/transformations/filters-to-filterexpressions.mapper.d.ts +3 -0
  96. package/models/server/util/headers.d.ts +3 -2
  97. package/models/testImmer/redux/reducer.d.ts +1 -7
  98. package/models/user/components/Login.d.ts +1 -2
  99. package/models/user/components/LoginForm.d.ts +1 -2
  100. package/models/user/hocs/withLogin.d.ts +2 -2
  101. package/models/user/hooks/useChangePassword.d.ts +5 -5
  102. package/models/user/hooks/useForgotPassword.d.ts +6 -6
  103. package/models/user/hooks/useLogin.d.ts +9 -45
  104. package/models/user/hooks/useRegistration.d.ts +4 -4
  105. package/models/user/redux/reducers.d.ts +5 -32
  106. package/models/user/redux/sagas/login.d.ts +11 -8
  107. package/models/user/redux/selectors.d.ts +33 -71
  108. package/models/user/util/LoginHelper.class.d.ts +4 -3
  109. package/models/util/json-mapper.d.ts +9 -3
  110. package/models/util/merge.d.ts +1 -0
  111. package/package-lock.json +2006 -4796
  112. package/package.json +47 -48
  113. package/cjs/App-581b6653.js.map +0 -1
  114. package/cjs/RouteLoader-282c03ab.js.map +0 -1
  115. package/cjs/ToJs-87edc45d.js +0 -230
  116. package/cjs/ToJs-87edc45d.js.map +0 -1
  117. package/cjs/actions-12871aca.js.map +0 -1
  118. package/cjs/fromJSLeaveImmer-9b550c8e.js +0 -40
  119. package/cjs/fromJSLeaveImmer-9b550c8e.js.map +0 -1
  120. package/cjs/login-81d7f9ef.js.map +0 -1
  121. package/cjs/reducers-fde41d6b.js.map +0 -1
  122. package/cjs/selectors-ed26ed97.js.map +0 -1
  123. package/cjs/version-f061e409.js.map +0 -1
  124. package/esm/App-122f28a3.js.map +0 -1
  125. package/esm/RouteLoader-c2faac87.js.map +0 -1
  126. package/esm/ToJs-52fee252.js +0 -199
  127. package/esm/ToJs-52fee252.js.map +0 -1
  128. package/esm/actions-3cc39599.js.map +0 -1
  129. package/esm/fromJSLeaveImmer-e44d1a91.js +0 -38
  130. package/esm/fromJSLeaveImmer-e44d1a91.js.map +0 -1
  131. package/esm/login-92db44d1.js.map +0 -1
  132. package/esm/reducers-d6c0edb1.js.map +0 -1
  133. package/esm/selectors-82e71d8e.js.map +0 -1
  134. package/esm/version-59c8f9be.js +0 -15
  135. package/esm/version-cb9cd09d.js.map +0 -1
  136. package/models/search/transformations/filters-to-filterexpression.d.ts +0 -1
  137. package/models/search/transformations/filters-to-filterexpression.mapper.d.ts +0 -2
  138. package/models/server/features/caching/cacheHashing.d.ts +0 -1
@@ -0,0 +1,28 @@
1
+ 'use strict';
2
+
3
+ var immutable = require('immutable');
4
+
5
+ const fromJSOrdered = js => {
6
+ return typeof js !== 'object' || js === null ? js : Array.isArray(js) ? immutable.Seq(js).map(fromJSOrdered).toList() : immutable.Seq(js).map(fromJSOrdered).toOrderedMap();
7
+ };
8
+
9
+ var fromJSOrdered$1 = fromJSOrdered;
10
+
11
+ const fromJSLeaveImmer = js => {
12
+ const immutableObj = fromJSOrdered$1(js);
13
+
14
+ if (immutableObj && 'set' in immutableObj && typeof immutableObj.set === 'function') {
15
+ // convert the immer parts of the state back
16
+ // to plain JS while retuning an immutable state object
17
+ let immutableState = immutableObj;
18
+ ['immer', 'form', 'navigation', 'routing', 'search', 'user', 'version'].map(key => {
19
+ if (js[key] && immutableObj.get(key)) immutableState = immutableState.set(key, js[key]);
20
+ });
21
+ return immutableState;
22
+ }
23
+
24
+ return immutableObj;
25
+ };
26
+
27
+ exports["default"] = fromJSLeaveImmer;
28
+ //# sourceMappingURL=fromJSLeaveImmer-65d26804.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"fromJSLeaveImmer-65d26804.js","sources":["../src/util/fromJSOrdered.js","../src/util/fromJSLeaveImmer.js"],"sourcesContent":["import { Seq } from 'immutable';\n\nconst fromJSOrdered = js => {\n return typeof js !== 'object' || js === null\n ? js\n : Array.isArray(js)\n ? Seq(js).map(fromJSOrdered).toList()\n : Seq(js).map(fromJSOrdered).toOrderedMap();\n};\n\nexport default fromJSOrdered;\n","import fromJSOrdered from './fromJSOrdered';\n\nconst fromJSLeaveImmer = js => {\n const immutableObj = fromJSOrdered(js);\n if (\n immutableObj &&\n 'set' in immutableObj &&\n typeof immutableObj.set === 'function'\n ) {\n // convert the immer parts of the state back\n // to plain JS while retuning an immutable state object\n let immutableState = immutableObj;\n ['immer', 'form', 'navigation', 'routing', 'search', 'user', 'version'].map(\n key => {\n if (js[key] && immutableObj.get(key))\n immutableState = immutableState.set(key, js[key]);\n }\n );\n return immutableState;\n }\n return immutableObj;\n};\nexport default fromJSLeaveImmer;\n"],"names":["fromJSOrdered","js","Array","isArray","Seq","map","toList","toOrderedMap","fromJSLeaveImmer","immutableObj","set","immutableState","key","get"],"mappings":";;;;AAEA,MAAMA,aAAa,GAAGC,EAAE,IAAI;AAC1B,SAAO,OAAOA,EAAP,KAAc,QAAd,IAA0BA,EAAE,KAAK,IAAjC,GACHA,EADG,GAEHC,KAAK,CAACC,OAAN,CAAcF,EAAd,IACAG,aAAG,CAACH,EAAD,CAAH,CAAQI,GAAR,CAAYL,aAAZ,EAA2BM,MAA3B,EADA,GAEAF,aAAG,CAACH,EAAD,CAAH,CAAQI,GAAR,CAAYL,aAAZ,EAA2BO,YAA3B,EAJJ;AAKD,CAND;;AAQA,sBAAeP,aAAf;;MCRMQ,gBAAgB,GAAGP,EAAE,IAAI;AAC7B,QAAMQ,YAAY,GAAGT,eAAa,CAACC,EAAD,CAAlC;;AACA,MACEQ,YAAY,IACZ,SAASA,YADT,IAEA,OAAOA,YAAY,CAACC,GAApB,KAA4B,UAH9B,EAIE;AACA;AACA;AACA,QAAIC,cAAc,GAAGF,YAArB;AACA,KAAC,OAAD,EAAU,MAAV,EAAkB,YAAlB,EAAgC,SAAhC,EAA2C,QAA3C,EAAqD,MAArD,EAA6D,SAA7D,EAAwEJ,GAAxE,CACEO,GAAG,IAAI;AACL,UAAIX,EAAE,CAACW,GAAD,CAAF,IAAWH,YAAY,CAACI,GAAb,CAAiBD,GAAjB,CAAf,EACED,cAAc,GAAGA,cAAc,CAACD,GAAf,CAAmBE,GAAnB,EAAwBX,EAAE,CAACW,GAAD,CAA1B,CAAjB;AACH,KAJH;AAMA,WAAOD,cAAP;AACD;;AACD,SAAOF,YAAP;AACD;;;;"}
@@ -1,35 +1,32 @@
1
1
  'use strict';
2
2
 
3
- var mapJson = require('jsonpath-mapper');
4
- var actions = require('./actions-12871aca.js');
5
- var reducers = require('./reducers-fde41d6b.js');
6
3
  var effects = require('@redux-saga/core/effects');
7
- var selectors = require('./selectors-ed26ed97.js');
8
- var ToJs = require('./ToJs-87edc45d.js');
4
+ var reducers = require('./reducers-3a4f8971.js');
5
+ var ToJs = require('./ToJs-09204afd.js');
6
+ var actions = require('./actions-6b9ef168.js');
7
+ var selectors = require('./selectors-2c1b1183.js');
8
+ var mapJson = require('jsonpath-mapper');
9
9
  var awaitToJs = require('await-to-js');
10
10
  var Cookies = require('js-cookie');
11
11
 
12
12
  function _interopDefaultLegacy (e) { return e && typeof e === 'object' && 'default' in e ? e : { 'default': e }; }
13
13
 
14
14
  function _interopNamespace(e) {
15
- if (e && e.__esModule) { return e; } else {
16
- var n = Object.create(null);
17
- if (e) {
18
- Object.keys(e).forEach(function (k) {
19
- if (k !== 'default') {
20
- var d = Object.getOwnPropertyDescriptor(e, k);
21
- Object.defineProperty(n, k, d.get ? d : {
22
- enumerable: true,
23
- get: function () {
24
- return e[k];
25
- }
26
- });
27
- }
28
- });
29
- }
30
- n['default'] = e;
31
- return Object.freeze(n);
15
+ if (e && e.__esModule) return e;
16
+ var n = Object.create(null);
17
+ if (e) {
18
+ Object.keys(e).forEach(function (k) {
19
+ if (k !== 'default') {
20
+ var d = Object.getOwnPropertyDescriptor(e, k);
21
+ Object.defineProperty(n, k, d.get ? d : {
22
+ enumerable: true,
23
+ get: function () { return e[k]; }
24
+ });
25
+ }
26
+ });
32
27
  }
28
+ n["default"] = e;
29
+ return Object.freeze(n);
33
30
  }
34
31
 
35
32
  var mapJson__default = /*#__PURE__*/_interopDefaultLegacy(mapJson);
@@ -48,7 +45,7 @@ const clientCredentials = {
48
45
  }) => refreshTokenExpiryDate.toISOString(),
49
46
  contensisClassicToken: 'contensisClassicToken'
50
47
  };
51
- var mapClientCredentials = (obj => mapJson__default['default'](obj, clientCredentials));
48
+ var mapClientCredentials = (obj => mapJson__default["default"](obj, clientCredentials));
52
49
 
53
50
  // import { Client } from 'contensis-management-api';
54
51
  const getManagementApiClient = async ({
@@ -104,7 +101,7 @@ const COOKIE_VALID_DAYS = 1; // 0 = Session cookie
104
101
  // Override the default js-cookie conversion / encoding
105
102
  // methods so the written values work with Contensis sites
106
103
 
107
- const _cookie = Cookies__default['default'].withConverter({
104
+ const _cookie = Cookies__default["default"].withConverter({
108
105
  read: value => decodeURIComponent(value),
109
106
  write: value => encodeURIComponent(value)
110
107
  });
@@ -132,10 +129,10 @@ class CookieHelper {
132
129
 
133
130
  }
134
131
 
135
- const context = typeof window != 'undefined' ? window : global;
132
+ const context$1 = typeof window != 'undefined' ? window : global;
136
133
  const requireOidc = process.env.NODE_ENV === 'development' ? WSFED_LOGIN === 'true'
137
134
  /* global WSFED_LOGIN */
138
- : context.WSFED_LOGIN === 'true';
135
+ : context$1.WSFED_LOGIN === 'true';
139
136
  const servers = SERVERS;
140
137
  /* global SERVERS */
141
138
 
@@ -168,7 +165,7 @@ const createUserManager = async config => {
168
165
  /* eslint-disable require-atomic-updates */
169
166
  const LOGIN_COOKIE = 'ContensisCMSUserName';
170
167
  const REFRESH_TOKEN_COOKIE = 'RefreshToken';
171
- const context$1 = typeof window != 'undefined' ? window : global;
168
+ const context = typeof window != 'undefined' ? window : global;
172
169
  class LoginHelper {
173
170
  static SetLoginCookies({
174
171
  contensisClassicToken,
@@ -192,6 +189,21 @@ class LoginHelper {
192
189
  static ClearCachedCredentials() {
193
190
  CookieHelper.DeleteCookie(LOGIN_COOKIE);
194
191
  CookieHelper.DeleteCookie(REFRESH_TOKEN_COOKIE);
192
+
193
+ if (LoginHelper.WSFED_LOGIN && typeof window !== 'undefined') {
194
+ // remove any oidc keys left over in localStorage
195
+ const {
196
+ localStorage
197
+ } = window;
198
+ const keys = [];
199
+
200
+ for (let i = 0; i < localStorage.length; i++) {
201
+ const key = localStorage.key(i);
202
+ if (typeof key === 'string' && key.startsWith('oidc.')) keys.push(localStorage.key(i));
203
+ }
204
+
205
+ keys.forEach(key => localStorage.removeItem(key));
206
+ }
195
207
  }
196
208
 
197
209
  static async LoginUser({
@@ -201,10 +213,10 @@ class LoginHelper {
201
213
  }) {
202
214
  let credentials = clientCredentials;
203
215
  let authenticationState = {
204
- authenticated: false,
205
- authenticationError: false,
206
- error: false,
207
- clientCredentials: null
216
+ clientCredentials: null,
217
+ isAuthenticated: false,
218
+ isAuthenticationError: false,
219
+ isError: false
208
220
  };
209
221
  let transientClient;
210
222
  let user;
@@ -219,14 +231,12 @@ class LoginHelper {
219
231
  const [loginError, clientBearerToken] = await awaitToJs.to(transientClient.ensureBearerToken()); // Problem getting token with username and password
220
232
 
221
233
  if (loginError) {
222
- const authenticationError = loginError.name.includes('ContensisAuthenticationError');
223
234
  authenticationState = {
224
- authenticated: false,
225
- authenticationError: authenticationError,
226
- authenticationErrorMessage: authenticationError && loginError.message || null,
227
- error: !authenticationError,
228
- errorMessage: !authenticationError && loginError.message || null,
229
- clientCredentials: null
235
+ clientCredentials: null,
236
+ errorMessage: loginError.message || null,
237
+ isAuthenticated: false,
238
+ isAuthenticationError: loginError.name.includes('ContensisAuthenticationError'),
239
+ isError: true
230
240
  };
231
241
  LoginHelper.ClearCachedCredentials();
232
242
  } // Got a token using username and password
@@ -237,10 +247,10 @@ class LoginHelper {
237
247
  credentials = mapClientCredentials(transientClient);
238
248
  LoginHelper.SetLoginCookies(credentials);
239
249
  authenticationState = {
240
- authenticated: true,
241
- authenticationError: false,
242
- error: false,
243
- clientCredentials: credentials
250
+ clientCredentials: credentials,
251
+ isAuthenticated: true,
252
+ isAuthenticationError: false,
253
+ isError: false
244
254
  };
245
255
  }
246
256
  } // If we have credentials supplied by a successful username and password login
@@ -254,13 +264,11 @@ class LoginHelper {
254
264
 
255
265
  if (error) {
256
266
  authenticationState = {
257
- authenticated: false,
258
- authenticationError: false,
259
- error: {
260
- message: error.message,
261
- stack: error.stack
262
- },
263
- clientCredentials: null
267
+ clientCredentials: null,
268
+ errorMessage: error.message,
269
+ isAuthenticated: false,
270
+ isAuthenticationError: false,
271
+ isError: true
264
272
  };
265
273
  LoginHelper.ClearCachedCredentials();
266
274
  } else {
@@ -269,10 +277,10 @@ class LoginHelper {
269
277
  LoginHelper.SetLoginCookies(latestCredentials);
270
278
  user = userDetails;
271
279
  authenticationState = {
272
- authenticated: true,
273
- authenticationError: false,
274
- error: false,
275
- clientCredentials: latestCredentials
280
+ clientCredentials: latestCredentials,
281
+ isAuthenticated: true,
282
+ isAuthenticationError: false,
283
+ isError: false
276
284
  };
277
285
  }
278
286
  }
@@ -344,6 +352,16 @@ class LoginHelper {
344
352
  });
345
353
  }
346
354
 
355
+ static RemoveSecurityTokenQuery() {
356
+ const params = new URLSearchParams(window.location.search);
357
+
358
+ if (params.has('securitytoken') || params.has('securityToken')) {
359
+ params.delete('securitytoken');
360
+ params.delete('securityToken');
361
+ window.location = `${window.location.pathname}${params.toString() ? `?${params}` : ''}`;
362
+ }
363
+ }
364
+
347
365
  static async WsFedLogout(redirectPath) {
348
366
  await fetch(`${LoginHelper.CMS_URL}/authenticate/logout?jsonResponseRequired=true`, {
349
367
  credentials: 'include'
@@ -351,6 +369,10 @@ class LoginHelper {
351
369
 
352
370
  if (redirectPath) {
353
371
  window.location = redirectPath;
372
+ } else {
373
+ // Explicitly check and remove any stale
374
+ // security token that may be in the query string
375
+ LoginHelper.RemoveSecurityTokenQuery();
354
376
  }
355
377
  }
356
378
 
@@ -424,7 +446,7 @@ LoginHelper.CMS_URL = SERVERS.cms
424
446
  ;
425
447
  LoginHelper.WSFED_LOGIN = process.env.NODE_ENV === 'development' ? WSFED_LOGIN === 'true'
426
448
  /* global WSFED_LOGIN */
427
- : context$1.WSFED_LOGIN === 'true';
449
+ : context.WSFED_LOGIN === 'true';
428
450
  LoginHelper.LOGIN_ROUTE = '/account/login';
429
451
  LoginHelper.ACCESS_DENIED_ROUTE = '/account/access-denied';
430
452
 
@@ -500,7 +522,7 @@ function* handleRequiresLoginSaga(action) {
500
522
  if (!userLoggedIn && !securityToken) {
501
523
  LoginHelper.ClientRedirectToSignInPage(action.location.pathname);
502
524
  } else if (routeRequiresGroups.length > 0) {
503
- const userGroups = yield effects.select(ToJs.selectUserGroups);
525
+ const userGroups = yield effects.select(ToJs.selectUserGroups, 'js');
504
526
  const groupMatch = ToJs.matchUserGroup(userGroups, routeRequiresGroups);
505
527
  if (!groupMatch) LoginHelper.ClientRedirectToAccessDeniedPage(action.location.pathname);
506
528
  }
@@ -510,32 +532,45 @@ function* handleRequiresLoginSaga(action) {
510
532
  function* validateUserSaga({
511
533
  securityToken
512
534
  }) {
513
- if (securityToken) {
514
- // If we have just a security token we will call a CMS endpoint
535
+ // Check for refreshToken in cookies
536
+ let clientCredentials = LoginHelper.GetCachedCredentials();
537
+
538
+ if (securityToken || clientCredentials.refreshToken) {
539
+ // We only attempt to validate the user if one of the stored
540
+ // tokens are found, in this case we set loading state manually
541
+ // so we don't need to set and unset loading if there are no stored
542
+ yield effects.put({
543
+ type: reducers.SET_AUTHENTICATION_STATE,
544
+ authenticationState: {
545
+ isLoading: true
546
+ }
547
+ }); // If we have just a security token we will call a CMS endpoint
515
548
  // and provide us with a RefreshToken cookie we can use during login
549
+
516
550
  const [error, refreshToken] = yield LoginHelper.GetCredentialsForSecurityToken(securityToken);
517
- if (refreshToken) LoginHelper.SetLoginCookies({
518
- contensisClassicToken: securityToken,
519
- refreshToken
520
- });
521
- if (error) yield effects.put({
551
+
552
+ if (refreshToken) {
553
+ // Set cookies and reload values
554
+ LoginHelper.SetLoginCookies({
555
+ contensisClassicToken: securityToken,
556
+ refreshToken
557
+ });
558
+ clientCredentials = LoginHelper.GetCachedCredentials();
559
+ } // Log the user in if a refreshToken is found
560
+
561
+
562
+ if (clientCredentials.refreshToken) yield effects.call(loginUserSaga, {
563
+ clientCredentials
564
+ });else if (error) yield effects.put({
522
565
  type: reducers.SET_AUTHENTICATION_STATE,
523
566
  authenticationState: {
524
- error: {
525
- message: error.message,
526
- stack: error.stack
527
- }
567
+ isError: true,
568
+ errorMessage: (error === null || error === void 0 ? void 0 : error.message) || error && 'toString' in error && error.toString()
528
569
  }
529
570
  });
530
- } // Check for refreshToken in cookies
571
+ } // Tell any callers have we successfully logged in?
531
572
 
532
573
 
533
- const clientCredentials = LoginHelper.GetCachedCredentials(); // Log the user in if a refreshToken is found
534
-
535
- if (clientCredentials.refreshToken) yield effects.call(loginUserSaga, {
536
- clientCredentials
537
- }); // Tell any callers have we successfully logged in?
538
-
539
574
  return yield effects.select(ToJs.selectUserIsAuthenticated);
540
575
  }
541
576
 
@@ -600,17 +635,16 @@ function* logoutUserSaga({
600
635
  }
601
636
 
602
637
  function* refreshSecurityToken() {
603
- const clientCredentials = yield effects.select(ToJs.selectClientCredentials);
638
+ const clientCredentials = yield effects.select(ToJs.selectClientCredentials, 'js');
604
639
 
605
640
  if (Object.keys(clientCredentials).length > 0) {
606
641
  const client = yield getManagementApiClient(clientCredentials);
607
642
  yield client.authenticate();
608
- const authenticationState = {};
609
- const newClientCredentials = mapClientCredentials(client);
610
- authenticationState.clientCredentials = newClientCredentials;
611
643
  yield effects.put({
612
644
  type: reducers.SET_AUTHENTICATION_STATE,
613
- authenticationState
645
+ authenticationState: {
646
+ clientCredentials: mapClientCredentials(client)
647
+ }
614
648
  });
615
649
  }
616
650
  }
@@ -621,4 +655,4 @@ exports.getManagementApiClient = getManagementApiClient;
621
655
  exports.handleRequiresLoginSaga = handleRequiresLoginSaga;
622
656
  exports.loginSagas = loginSagas;
623
657
  exports.refreshSecurityToken = refreshSecurityToken;
624
- //# sourceMappingURL=login-81d7f9ef.js.map
658
+ //# sourceMappingURL=login-d67b82aa.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"login-d67b82aa.js","sources":["../src/routing/util/find-contenttype-mapping.ts","../src/user/transformations/mapClientCredentials.js","../src/user/util/ContensisManagementApi.js","../src/user/util/CookieHelper.class.js","../src/user/util/OidcUserManager.js","../src/user/util/LoginHelper.class.js","../src/user/redux/sagas/login.js"],"sourcesContent":["import { ContentTypeMapping } from '../routes';\n\nexport const findContentTypeMapping = (\n ContentTypeMappings: ContentTypeMapping[],\n contentTypeId: string\n) => ContentTypeMappings.find(ct => ct.contentTypeID === contentTypeId);\n","import { mapJson } from '~/util/json-mapper';\n\nconst clientCredentials = {\n bearerToken: 'bearerToken',\n bearerTokenExpiryDate: ({ bearerTokenExpiryDate }) =>\n bearerTokenExpiryDate.toISOString(),\n refreshToken: 'refreshToken',\n refreshTokenExpiryDate: ({ refreshTokenExpiryDate }) =>\n refreshTokenExpiryDate.toISOString(),\n contensisClassicToken: 'contensisClassicToken',\n};\nexport default obj => mapJson(obj, clientCredentials);\n","// import { Client } from 'contensis-management-api';\n\nexport const getManagementApiClient = async ({\n bearerToken,\n bearerTokenExpiryDate,\n refreshToken,\n refreshTokenExpiryDate,\n contensisClassicToken,\n username,\n password,\n}) => {\n const rootUrl = SERVERS.api || SERVERS.cms; /* global SERVERS */\n const projectId = PROJECTS[0].id; /* global PROJECTS */\n\n let config = {};\n if (refreshToken) {\n config = {\n clientType: 'contensis_classic_refresh_token',\n clientDetails: {\n refreshToken,\n },\n };\n } else {\n config = {\n clientType: 'contensis_classic',\n clientDetails: {\n username,\n password,\n },\n };\n }\n const { Client } = await import('contensis-management-api');\n\n const client = Client.create({\n ...config,\n projectId,\n rootUrl,\n });\n\n if (bearerToken) client.bearerToken = bearerToken;\n if (bearerTokenExpiryDate)\n client.bearerTokenExpiryDate = bearerTokenExpiryDate;\n if (refreshToken) client.refreshToken = refreshToken;\n if (refreshTokenExpiryDate)\n client.refreshTokenExpiryDate = refreshTokenExpiryDate;\n if (contensisClassicToken)\n client.contensisClassicToken = contensisClassicToken;\n\n return client;\n};\n","import Cookies from 'js-cookie';\n\nconst COOKIE_VALID_DAYS = 1; // 0 = Session cookie\n\n// Override the default js-cookie conversion / encoding\n// methods so the written values work with Contensis sites\nconst _cookie = Cookies.withConverter({\n read: value => decodeURIComponent(value),\n write: value => encodeURIComponent(value),\n});\n\nexport class CookieHelper {\n static GetCookie(name) {\n let cookie = _cookie.get(name);\n if (typeof cookie == 'undefined') {\n return null;\n }\n return cookie;\n }\n\n static SetCookie(name, value, maxAgeDays = COOKIE_VALID_DAYS) {\n maxAgeDays === 0\n ? _cookie.set(name, value)\n : _cookie.set(name, value, { expires: maxAgeDays });\n }\n\n static DeleteCookie(name) {\n _cookie.remove(name);\n }\n}\n","const context = typeof window != 'undefined' ? window : global;\nconst requireOidc =\n process.env.NODE_ENV === 'development'\n ? WSFED_LOGIN === 'true' /* global WSFED_LOGIN */\n : context.WSFED_LOGIN === 'true';\n\nconst servers = SERVERS; /* global SERVERS */\n\nexport const userManagerConfig =\n typeof window !== 'undefined'\n ? {\n authority: `${servers.cms}/authenticate/`,\n client_id: 'WebsiteAdfsClient',\n redirect_uri: window.location.toString(),\n post_logout_redirect_uri: window.location.toString(),\n response_type: 'id_token',\n scope: 'openid',\n filterProtocolClaims: false,\n }\n : {};\n\nexport const createUserManager = async config => {\n if (typeof window !== 'undefined' && requireOidc) {\n try {\n const { UserManager } = await import(\n /* webpackChunkName: \"oidcclient\" */ 'oidc-client'\n );\n return new UserManager(config);\n } catch (e) {\n // eslint-disable-next-line no-console\n console.log('Exception in createUserManager: ', e);\n }\n } else return {};\n};\n\n//const userManager = createUserManager(userManagerConfig);\n\n// export default userManager;\n","/* eslint-disable require-atomic-updates */\nimport { getManagementApiClient } from './ContensisManagementApi';\nimport { to } from 'await-to-js';\n\nimport { CookieHelper } from './CookieHelper.class';\n\nimport mapClientCredentials from '../transformations/mapClientCredentials';\nimport { createUserManager, userManagerConfig } from './OidcUserManager';\n\nexport const LOGIN_COOKIE = 'ContensisCMSUserName';\nexport const REFRESH_TOKEN_COOKIE = 'RefreshToken';\n\nconst context = typeof window != 'undefined' ? window : global;\n\nexport class LoginHelper {\n static CMS_URL = SERVERS.cms /* global SERVERS */;\n static WSFED_LOGIN =\n process.env.NODE_ENV === 'development'\n ? WSFED_LOGIN === 'true' /* global WSFED_LOGIN */\n : context.WSFED_LOGIN === 'true';\n static LOGIN_ROUTE = '/account/login';\n static ACCESS_DENIED_ROUTE = '/account/access-denied';\n\n static SetLoginCookies({ contensisClassicToken, refreshToken }) {\n console.info(\n 'SetLoginCookies:',\n LOGIN_COOKIE,\n contensisClassicToken,\n REFRESH_TOKEN_COOKIE,\n refreshToken\n );\n if (contensisClassicToken)\n CookieHelper.SetCookie(LOGIN_COOKIE, contensisClassicToken);\n if (refreshToken)\n CookieHelper.SetCookie(REFRESH_TOKEN_COOKIE, refreshToken);\n }\n\n static GetCachedCredentials() {\n return {\n bearerToken: null,\n bearerTokenExpiryDate: null,\n refreshToken: CookieHelper.GetCookie(REFRESH_TOKEN_COOKIE),\n refreshTokenExpiryDate: null,\n contensisClassicToken: CookieHelper.GetCookie(LOGIN_COOKIE),\n };\n }\n\n static ClearCachedCredentials() {\n CookieHelper.DeleteCookie(LOGIN_COOKIE);\n CookieHelper.DeleteCookie(REFRESH_TOKEN_COOKIE);\n\n if (LoginHelper.WSFED_LOGIN && typeof window !== 'undefined') {\n // remove any oidc keys left over in localStorage\n const { localStorage } = window;\n const keys = [];\n for (let i = 0; i < localStorage.length; i++) {\n const key = localStorage.key(i);\n if (typeof key === 'string' && key.startsWith('oidc.'))\n keys.push(localStorage.key(i));\n }\n keys.forEach(key => localStorage.removeItem(key));\n }\n }\n\n static async LoginUser({ username, password, clientCredentials }) {\n let credentials = clientCredentials;\n let authenticationState = {\n clientCredentials: null,\n isAuthenticated: false,\n isAuthenticationError: false,\n isError: false,\n };\n let transientClient;\n let user;\n\n if (username && password) {\n // Get a management client with username and password\n transientClient = await getManagementApiClient({\n username,\n password,\n });\n\n // Ensure the client has requested a bearer token\n const [loginError, clientBearerToken] = await to(\n transientClient.ensureBearerToken()\n );\n\n // Problem getting token with username and password\n if (loginError) {\n authenticationState = {\n clientCredentials: null,\n errorMessage: loginError.message || null,\n isAuthenticated: false,\n isAuthenticationError: loginError.name.includes(\n 'ContensisAuthenticationError'\n ),\n isError: true,\n };\n LoginHelper.ClearCachedCredentials();\n }\n\n // Got a token using username and password\n if (clientBearerToken) {\n // Set credentials so we can continue to GetUserDetails\n credentials = mapClientCredentials(transientClient);\n LoginHelper.SetLoginCookies(credentials);\n authenticationState = {\n clientCredentials: credentials,\n isAuthenticated: true,\n isAuthenticationError: false,\n isError: false,\n };\n }\n }\n\n // If we have credentials supplied by a successful username and password login\n // or clientCredentials supplied in the options argument we can continue to\n // fetch the user's details\n if (credentials) {\n const client =\n transientClient || (await getManagementApiClient(credentials));\n const [error, userDetails] = await LoginHelper.GetUserDetails(client);\n\n if (error) {\n authenticationState = {\n clientCredentials: null,\n errorMessage: error.message,\n isAuthenticated: false,\n isAuthenticationError: false,\n isError: true,\n };\n LoginHelper.ClearCachedCredentials();\n } else {\n // Ensure we get latest refreshToken and contensisClassicToken from the latest client\n const latestCredentials = mapClientCredentials(client);\n LoginHelper.SetLoginCookies(latestCredentials);\n\n user = userDetails;\n authenticationState = {\n clientCredentials: latestCredentials,\n isAuthenticated: true,\n isAuthenticationError: false,\n isError: false,\n };\n }\n }\n\n return { authenticationState, user };\n }\n\n static GetUserDetails = async client => {\n let userError,\n groupsError,\n user = {},\n groupsResult;\n\n [userError, user] = await to(client.security.users.getCurrent());\n if (user && user.id) {\n [groupsError, groupsResult] = await to(\n client.security.users.getUserGroups({\n userId: user.id,\n includeInherited: true,\n })\n );\n // Set groups attribute in user object to be the items\n // array from the getUserGroups result\n if (groupsResult && groupsResult.items) user.groups = groupsResult.items;\n\n //If groups call fails then log the error but allow the user to login still\n // eslint-disable-next-line no-console\n if (groupsError) console.log(groupsError);\n }\n return [userError, user];\n };\n\n static LogoutUser(redirectPath) {\n LoginHelper.ClearCachedCredentials();\n if (LoginHelper.WSFED_LOGIN) {\n LoginHelper.WsFedLogout(redirectPath);\n } else {\n if (redirectPath) LoginHelper.ClientRedirectToPath(redirectPath);\n else LoginHelper.ClientRedirectToSignInPage();\n }\n }\n\n static ClientRedirectToHome(location) {\n if (typeof window != 'undefined') {\n let url = '/';\n if (location) {\n const { search, hash } = location;\n url = search ? `${url}${search}` : url;\n url = hash ? `${url}${hash}` : url;\n }\n window.location.href = url;\n }\n }\n\n static async ClientRedirectToSignInPage(redirectPath) {\n if (LoginHelper.WSFED_LOGIN) {\n await LoginHelper.WsFedLogout();\n await LoginHelper.WsFedLogin();\n } else {\n // Standard Contensis Login\n let url = LoginHelper.LOGIN_ROUTE;\n if (typeof redirectPath === 'string')\n url = `${url}?redirect_uri=${redirectPath}`;\n if (\n typeof location !== 'undefined' &&\n redirectPath !== LoginHelper.LOGIN_ROUTE\n )\n location.replace(url);\n }\n }\n\n static ClientRedirectToAccessDeniedPage(originalPath) {\n let url = LoginHelper.ACCESS_DENIED_ROUTE;\n if (originalPath === url) return;\n\n if (typeof originalPath === 'string')\n url = `${url}?original_uri=${originalPath}`;\n if (typeof location !== 'undefined') location.href = url;\n }\n\n static ClientRedirectToPath(redirectPath) {\n if (typeof redirectPath === 'string') {\n if (typeof location !== 'undefined') window.location.href = redirectPath;\n } else LoginHelper.ClientRedirectToHome();\n }\n\n static async WsFedLogin(redirectUri) {\n const userManager = await createUserManager(userManagerConfig);\n userManager.signinRedirect({\n scope: 'openid',\n response_type: 'id_token',\n redirect_uri: redirectUri || window.location.toString(),\n });\n }\n\n static RemoveSecurityTokenQuery() {\n const params = new URLSearchParams(window.location.search);\n if (params.has('securitytoken') || params.has('securityToken')) {\n params.delete('securitytoken');\n params.delete('securityToken');\n window.location = `${window.location.pathname}${\n params.toString() ? `?${params}` : ''\n }`;\n }\n }\n\n static async WsFedLogout(redirectPath) {\n await fetch(\n `${LoginHelper.CMS_URL}/authenticate/logout?jsonResponseRequired=true`,\n {\n credentials: 'include',\n }\n );\n if (redirectPath) {\n window.location = redirectPath;\n } else {\n // Explicitly check and remove any stale\n // security token that may be in the query string\n LoginHelper.RemoveSecurityTokenQuery();\n }\n }\n\n static async GetCredentialsForSecurityToken(securityToken) {\n const [error, response] = await to(\n fetch(`${LoginHelper.CMS_URL}/REST/Contensis/Security/IsAuthenticated`, {\n method: 'POST',\n headers: {\n Accept: 'application/json',\n 'Content-Type': 'application/json',\n },\n body: JSON.stringify({\n securityToken: encodeURIComponent(securityToken),\n }),\n })\n );\n if (error) return [{ message: 'Failed to fetch credentials' }];\n if (response.ok) {\n const [parseError, body] = await to(response.json());\n if (parseError) return [parseError];\n\n const { LogonResult, ApplicationData = [] } = body;\n if (LogonResult !== 0) {\n return [\n { message: 'Security token is invalid', data: ApplicationData },\n ];\n }\n if (ApplicationData.length > 0) {\n let refreshToken;\n ApplicationData.forEach(item => {\n if (item.Key === 'ContensisSecurityRefreshToken')\n refreshToken = item.Value;\n });\n if (!refreshToken) {\n return [\n {\n message:\n 'Fetch credentials: Unable to find ContensisSecurityRefreshToken',\n },\n ];\n }\n return [undefined, refreshToken];\n } else {\n return [\n {\n message:\n 'Fetch credentials: Unable to find ContensisSecurityRefreshToken',\n },\n ];\n }\n } else {\n return [\n {\n message: `Fetch credentials error: ${response.status} ${response.statusText}`,\n },\n ];\n }\n }\n\n static isZengentiStaff(email) {\n const emailRefs = ['@zengenti', '@contensis'];\n\n return emailRefs.some(emailRef => {\n if (email.includes(emailRef)) {\n return true;\n }\n });\n }\n}\n","import { takeEvery, select, put, call } from 'redux-saga/effects';\nimport {\n SET_AUTHENTICATION_STATE,\n LOGIN_USER,\n LOGOUT_USER,\n VALIDATE_USER,\n} from '../types';\nimport {\n selectUserIsAuthenticated,\n selectClientCredentials,\n selectUserGroups,\n} from '../selectors';\n\nimport { setRoute } from '~/routing/redux/actions';\nimport { selectCurrentSearch } from '~/routing/redux/selectors';\nimport { findContentTypeMapping } from '~/routing/util/find-contenttype-mapping';\n\nimport mapClientCredentials from '~/user/transformations/mapClientCredentials';\n\nimport { getManagementApiClient } from '~/user/util/ContensisManagementApi';\nimport { LoginHelper } from '~/user/util/LoginHelper.class';\nimport { matchUserGroup } from '~/user/util/matchGroups';\nimport { queryParams } from '~/util/navigation';\n\nexport const loginSagas = [\n takeEvery(LOGIN_USER, loginUserSaga),\n takeEvery(LOGOUT_USER, logoutUserSaga),\n takeEvery(VALIDATE_USER, validateUserSaga),\n takeEvery(SET_AUTHENTICATION_STATE, redirectAfterSuccessfulLoginSaga),\n];\n\nexport function* handleRequiresLoginSaga(action) {\n const {\n entry,\n requireLogin,\n routes: { ContentTypeMappings },\n staticRoute,\n } = action;\n let userLoggedIn = yield select(selectUserIsAuthenticated);\n\n // Check for a securityToken in querystring\n const currentQs = queryParams(yield select(selectCurrentSearch));\n const securityToken = currentQs.securityToken || currentQs.securitytoken;\n\n // Check if any of the defined routes have \"requireLogin\" attribute\n const { requireLogin: authRoute } = (staticRoute && staticRoute.route) || {};\n const { requireLogin: authContentType } =\n (entry &&\n findContentTypeMapping(ContentTypeMappings, entry?.sys?.contentTypeId)) ||\n {};\n\n // If requireLogin, authRoute or authContentType has been specified as an\n // array of groups we can merge all the arrays and match on any group supplied\n const routeRequiresGroups = [\n ...((Array.isArray(authContentType) && authContentType) || []),\n ...((Array.isArray(authRoute) && authRoute) || []),\n ...((Array.isArray(requireLogin) && requireLogin) || []),\n ];\n const routeRequiresLogin = !!authContentType || !!authRoute || !!requireLogin;\n\n if (!userLoggedIn) {\n // If cookies or securityToken are found on any route change\n // always validate and login the user\n if (routeRequiresLogin) {\n // If routeRequiresLogin do a blocking call that returns userLoggedIn\n userLoggedIn = yield call(validateUserSaga, { securityToken });\n }\n // otherwise do a non blocking put to handle validation in the background\n else yield put({ type: VALIDATE_USER, securityToken });\n }\n\n if (routeRequiresLogin) {\n // If a security token is in the querystring and we are not already\n // logged in something is wrong and we won't bother going on another redirect loop\n if (!userLoggedIn && !securityToken) {\n LoginHelper.ClientRedirectToSignInPage(action.location.pathname);\n } else if (routeRequiresGroups.length > 0) {\n const userGroups = yield select(selectUserGroups, 'js');\n const groupMatch = matchUserGroup(userGroups, routeRequiresGroups);\n\n if (!groupMatch)\n LoginHelper.ClientRedirectToAccessDeniedPage(action.location.pathname);\n }\n }\n}\n\nfunction* validateUserSaga({ securityToken }) {\n // Check for refreshToken in cookies\n let clientCredentials = LoginHelper.GetCachedCredentials();\n\n if (securityToken || clientCredentials.refreshToken) {\n // We only attempt to validate the user if one of the stored\n // tokens are found, in this case we set loading state manually\n // so we don't need to set and unset loading if there are no stored\n yield put({\n type: SET_AUTHENTICATION_STATE,\n authenticationState: {\n isLoading: true,\n },\n });\n // If we have just a security token we will call a CMS endpoint\n // and provide us with a RefreshToken cookie we can use during login\n const [error, refreshToken] =\n yield LoginHelper.GetCredentialsForSecurityToken(securityToken);\n if (refreshToken) {\n // Set cookies and reload values\n LoginHelper.SetLoginCookies({\n contensisClassicToken: securityToken,\n refreshToken,\n });\n clientCredentials = LoginHelper.GetCachedCredentials();\n }\n\n // Log the user in if a refreshToken is found\n if (clientCredentials.refreshToken)\n yield call(loginUserSaga, { clientCredentials });\n else if (error)\n yield put({\n type: SET_AUTHENTICATION_STATE,\n authenticationState: {\n isError: true,\n errorMessage:\n error?.message ||\n (error && 'toString' in error && error.toString()),\n },\n });\n }\n\n // Tell any callers have we successfully logged in?\n return yield select(selectUserIsAuthenticated);\n}\n\nfunction* loginUserSaga(action = {}) {\n const { username, password, clientCredentials } = action;\n\n // If a WSFED_LOGIN site has dispatched the loginUser action\n // just redirect them to the Identity Provider sign in\n if (action.type === LOGIN_USER && LoginHelper.WSFED_LOGIN)\n LoginHelper.ClientRedirectToSignInPage();\n\n const { authenticationState, user } = yield LoginHelper.LoginUser({\n username,\n password,\n clientCredentials,\n });\n\n yield put({\n type: SET_AUTHENTICATION_STATE,\n authenticationState,\n user,\n });\n}\nconst removeHostnamePart = path => {\n // eslint-disable-next-line no-console\n console.log(path);\n const relativePath = '/' + path.split('/').splice(3).join('/');\n // eslint-disable-next-line no-console\n console.log(relativePath);\n return relativePath;\n};\n\nfunction* redirectAfterSuccessfulLoginSaga() {\n const isLoggedIn = yield select(selectUserIsAuthenticated);\n const { redirect_uri: redirectPath, ReturnURL: assetRedirectPath } =\n queryParams(yield select(selectCurrentSearch));\n\n if (isLoggedIn && assetRedirectPath && typeof window != 'undefined') {\n const path = removeHostnamePart(assetRedirectPath);\n // This has to be a hard href to get the app to\n // leave React and hit the server for the IIS hosted assets\n window.location.href = path;\n // yield put(setRoute(path)); // does not work in this scenario\n } else if (isLoggedIn && redirectPath) {\n yield put(setRoute(redirectPath));\n }\n}\n\nfunction* logoutUserSaga({ redirectPath }) {\n yield put({\n type: SET_AUTHENTICATION_STATE,\n user: null,\n });\n yield LoginHelper.LogoutUser(redirectPath);\n}\n\nexport function* refreshSecurityToken() {\n const clientCredentials = yield select(selectClientCredentials, 'js');\n if (Object.keys(clientCredentials).length > 0) {\n const client = yield getManagementApiClient(clientCredentials);\n yield client.authenticate();\n\n yield put({\n type: SET_AUTHENTICATION_STATE,\n authenticationState: {\n clientCredentials: mapClientCredentials(client),\n },\n });\n }\n}\n"],"names":["findContentTypeMapping","ContentTypeMappings","contentTypeId","find","ct","contentTypeID","clientCredentials","bearerToken","bearerTokenExpiryDate","toISOString","refreshToken","refreshTokenExpiryDate","contensisClassicToken","obj","mapJson","getManagementApiClient","username","password","rootUrl","SERVERS","api","cms","projectId","PROJECTS","id","config","clientType","clientDetails","Client","client","create","COOKIE_VALID_DAYS","_cookie","Cookies","withConverter","read","value","decodeURIComponent","write","encodeURIComponent","CookieHelper","GetCookie","name","cookie","get","SetCookie","maxAgeDays","set","expires","DeleteCookie","remove","context","window","global","requireOidc","process","env","NODE_ENV","WSFED_LOGIN","servers","userManagerConfig","authority","client_id","redirect_uri","location","toString","post_logout_redirect_uri","response_type","scope","filterProtocolClaims","createUserManager","UserManager","e","console","log","LOGIN_COOKIE","REFRESH_TOKEN_COOKIE","LoginHelper","SetLoginCookies","info","GetCachedCredentials","ClearCachedCredentials","localStorage","keys","i","length","key","startsWith","push","forEach","removeItem","LoginUser","credentials","authenticationState","isAuthenticated","isAuthenticationError","isError","transientClient","user","loginError","clientBearerToken","to","ensureBearerToken","errorMessage","message","includes","mapClientCredentials","error","userDetails","GetUserDetails","latestCredentials","LogoutUser","redirectPath","WsFedLogout","ClientRedirectToPath","ClientRedirectToSignInPage","ClientRedirectToHome","url","search","hash","href","WsFedLogin","LOGIN_ROUTE","replace","ClientRedirectToAccessDeniedPage","originalPath","ACCESS_DENIED_ROUTE","redirectUri","userManager","signinRedirect","RemoveSecurityTokenQuery","params","URLSearchParams","has","delete","pathname","fetch","CMS_URL","GetCredentialsForSecurityToken","securityToken","response","method","headers","Accept","body","JSON","stringify","ok","parseError","json","LogonResult","ApplicationData","data","item","Key","Value","undefined","status","statusText","isZengentiStaff","email","emailRefs","some","emailRef","userError","groupsError","groupsResult","security","users","getCurrent","getUserGroups","userId","includeInherited","items","groups","loginSagas","takeEvery","LOGIN_USER","loginUserSaga","LOGOUT_USER","logoutUserSaga","VALIDATE_USER","validateUserSaga","SET_AUTHENTICATION_STATE","redirectAfterSuccessfulLoginSaga","handleRequiresLoginSaga","action","entry","requireLogin","routes","staticRoute","userLoggedIn","select","selectUserIsAuthenticated","currentQs","queryParams","selectCurrentSearch","securitytoken","authRoute","route","authContentType","sys","routeRequiresGroups","Array","isArray","routeRequiresLogin","call","put","type","userGroups","selectUserGroups","groupMatch","matchUserGroup","isLoading","removeHostnamePart","path","relativePath","split","splice","join","isLoggedIn","ReturnURL","assetRedirectPath","setRoute","refreshSecurityToken","selectClientCredentials","Object","authenticate"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;MAEaA,sBAAsB,GAAG,CACpCC,mBADoC,EAEpCC,aAFoC,KAGjCD,mBAAmB,CAACE,IAApB,CAAyBC,EAAE,IAAIA,EAAE,CAACC,aAAH,KAAqBH,aAApD;;ACHL,MAAMI,iBAAiB,GAAG;AACxBC,EAAAA,WAAW,EAAE,aADW;AAExBC,EAAAA,qBAAqB,EAAE,CAAC;AAAEA,IAAAA;AAAF,GAAD,KACrBA,qBAAqB,CAACC,WAAtB,EAHsB;AAIxBC,EAAAA,YAAY,EAAE,cAJU;AAKxBC,EAAAA,sBAAsB,EAAE,CAAC;AAAEA,IAAAA;AAAF,GAAD,KACtBA,sBAAsB,CAACF,WAAvB,EANsB;AAOxBG,EAAAA,qBAAqB,EAAE;AAPC,CAA1B;AASA,4BAAeC,GAAG,IAAIC,2BAAO,CAACD,GAAD,EAAMP,iBAAN,CAA7B;;ACXA;MAEaS,sBAAsB,GAAG,OAAO;AAC3CR,EAAAA,WAD2C;AAE3CC,EAAAA,qBAF2C;AAG3CE,EAAAA,YAH2C;AAI3CC,EAAAA,sBAJ2C;AAK3CC,EAAAA,qBAL2C;AAM3CI,EAAAA,QAN2C;AAO3CC,EAAAA;AAP2C,CAAP,KAQhC;AACJ,QAAMC,OAAO,GAAGC,OAAO,CAACC,GAAR,IAAeD,OAAO,CAACE,GAAvC;AAA4C;;AAC5C,QAAMC,SAAS,GAAGC,QAAQ,CAAC,CAAD,CAAR,CAAYC,EAA9B;AAAkC;;AAElC,MAAIC,MAAM,GAAG,EAAb;;AACA,MAAIf,YAAJ,EAAkB;AAChBe,IAAAA,MAAM,GAAG;AACPC,MAAAA,UAAU,EAAE,iCADL;AAEPC,MAAAA,aAAa,EAAE;AACbjB,QAAAA;AADa;AAFR,KAAT;AAMD,GAPD,MAOO;AACLe,IAAAA,MAAM,GAAG;AACPC,MAAAA,UAAU,EAAE,mBADL;AAEPC,MAAAA,aAAa,EAAE;AACbX,QAAAA,QADa;AAEbC,QAAAA;AAFa;AAFR,KAAT;AAOD;;AACD,QAAM;AAAEW,IAAAA;AAAF,MAAa,MAAM,mFAAO,0BAAP,MAAzB;AAEA,QAAMC,MAAM,GAAGD,MAAM,CAACE,MAAP,CAAc,EAC3B,GAAGL,MADwB;AAE3BH,IAAAA,SAF2B;AAG3BJ,IAAAA;AAH2B,GAAd,CAAf;AAMA,MAAIX,WAAJ,EAAiBsB,MAAM,CAACtB,WAAP,GAAqBA,WAArB;AACjB,MAAIC,qBAAJ,EACEqB,MAAM,CAACrB,qBAAP,GAA+BA,qBAA/B;AACF,MAAIE,YAAJ,EAAkBmB,MAAM,CAACnB,YAAP,GAAsBA,YAAtB;AAClB,MAAIC,sBAAJ,EACEkB,MAAM,CAAClB,sBAAP,GAAgCA,sBAAhC;AACF,MAAIC,qBAAJ,EACEiB,MAAM,CAACjB,qBAAP,GAA+BA,qBAA/B;AAEF,SAAOiB,MAAP;AACD;;AC/CD,MAAME,iBAAiB,GAAG,CAA1B;AAEA;AACA;;AACA,MAAMC,OAAO,GAAGC,2BAAO,CAACC,aAAR,CAAsB;AACpCC,EAAAA,IAAI,EAAEC,KAAK,IAAIC,kBAAkB,CAACD,KAAD,CADG;AAEpCE,EAAAA,KAAK,EAAEF,KAAK,IAAIG,kBAAkB,CAACH,KAAD;AAFE,CAAtB,CAAhB;;AAKO,MAAMI,YAAN,CAAmB;AACR,SAATC,SAAS,CAACC,IAAD,EAAO;AACrB,QAAIC,MAAM,GAAGX,OAAO,CAACY,GAAR,CAAYF,IAAZ,CAAb;;AACA,QAAI,OAAOC,MAAP,IAAiB,WAArB,EAAkC;AAChC,aAAO,IAAP;AACD;;AACD,WAAOA,MAAP;AACD;;AAEe,SAATE,SAAS,CAACH,IAAD,EAAON,KAAP,EAAcU,UAAU,GAAGf,iBAA3B,EAA8C;AAC5De,IAAAA,UAAU,KAAK,CAAf,GACId,OAAO,CAACe,GAAR,CAAYL,IAAZ,EAAkBN,KAAlB,CADJ,GAEIJ,OAAO,CAACe,GAAR,CAAYL,IAAZ,EAAkBN,KAAlB,EAAyB;AAAEY,MAAAA,OAAO,EAAEF;AAAX,KAAzB,CAFJ;AAGD;;AAEkB,SAAZG,YAAY,CAACP,IAAD,EAAO;AACxBV,IAAAA,OAAO,CAACkB,MAAR,CAAeR,IAAf;AACD;;AAjBuB;;ACX1B,MAAMS,SAAO,GAAG,OAAOC,MAAP,IAAiB,WAAjB,GAA+BA,MAA/B,GAAwCC,MAAxD;AACA,MAAMC,WAAW,GACfC,OAAO,CAACC,GAAR,CAAYC,QAAZ,KAAyB,aAAzB,GACIC,WAAW,KAAK;AAAO;AAD3B,EAEIP,SAAO,CAACO,WAAR,KAAwB,MAH9B;AAKA,MAAMC,OAAO,GAAGxC,OAAhB;AAAyB;;AAElB,MAAMyC,iBAAiB,GAC5B,OAAOR,MAAP,KAAkB,WAAlB,GACI;AACES,EAAAA,SAAS,EAAG,GAAEF,OAAO,CAACtC,GAAI,gBAD5B;AAEEyC,EAAAA,SAAS,EAAE,mBAFb;AAGEC,EAAAA,YAAY,EAAEX,MAAM,CAACY,QAAP,CAAgBC,QAAhB,EAHhB;AAIEC,EAAAA,wBAAwB,EAAEd,MAAM,CAACY,QAAP,CAAgBC,QAAhB,EAJ5B;AAKEE,EAAAA,aAAa,EAAE,UALjB;AAMEC,EAAAA,KAAK,EAAE,QANT;AAOEC,EAAAA,oBAAoB,EAAE;AAPxB,CADJ,GAUI,EAXC;AAaA,MAAMC,iBAAiB,GAAG,MAAM7C,MAAN,IAAgB;AAC/C,MAAI,OAAO2B,MAAP,KAAkB,WAAlB,IAAiCE,WAArC,EAAkD;AAChD,QAAI;AACF,YAAM;AAAEiB,QAAAA;AAAF,UAAkB,MAAM;AAC5B;AAAqC,mBADT,MAA9B;AAGA,aAAO,IAAIA,WAAJ,CAAgB9C,MAAhB,CAAP;AACD,KALD,CAKE,OAAO+C,CAAP,EAAU;AACV;AACAC,MAAAA,OAAO,CAACC,GAAR,CAAY,kCAAZ,EAAgDF,CAAhD;AACD;AACF,GAVD,MAUO,OAAO,EAAP;AACR,CAZM;AAgBP;;ACrCA;AASO,MAAMG,YAAY,GAAG,sBAArB;AACA,MAAMC,oBAAoB,GAAG,cAA7B;AAEP,MAAMzB,OAAO,GAAG,OAAOC,MAAP,IAAiB,WAAjB,GAA+BA,MAA/B,GAAwCC,MAAxD;AAEO,MAAMwB,WAAN,CAAkB;AASD,SAAfC,eAAe,CAAC;AAAElE,IAAAA,qBAAF;AAAyBF,IAAAA;AAAzB,GAAD,EAA0C;AAC9D+D,IAAAA,OAAO,CAACM,IAAR,CACE,kBADF,EAEEJ,YAFF,EAGE/D,qBAHF,EAIEgE,oBAJF,EAKElE,YALF;AAOA,QAAIE,qBAAJ,EACE4B,YAAY,CAACK,SAAb,CAAuB8B,YAAvB,EAAqC/D,qBAArC;AACF,QAAIF,YAAJ,EACE8B,YAAY,CAACK,SAAb,CAAuB+B,oBAAvB,EAA6ClE,YAA7C;AACH;;AAE0B,SAApBsE,oBAAoB,GAAG;AAC5B,WAAO;AACLzE,MAAAA,WAAW,EAAE,IADR;AAELC,MAAAA,qBAAqB,EAAE,IAFlB;AAGLE,MAAAA,YAAY,EAAE8B,YAAY,CAACC,SAAb,CAAuBmC,oBAAvB,CAHT;AAILjE,MAAAA,sBAAsB,EAAE,IAJnB;AAKLC,MAAAA,qBAAqB,EAAE4B,YAAY,CAACC,SAAb,CAAuBkC,YAAvB;AALlB,KAAP;AAOD;;AAE4B,SAAtBM,sBAAsB,GAAG;AAC9BzC,IAAAA,YAAY,CAACS,YAAb,CAA0B0B,YAA1B;AACAnC,IAAAA,YAAY,CAACS,YAAb,CAA0B2B,oBAA1B;;AAEA,QAAIC,WAAW,CAACnB,WAAZ,IAA2B,OAAON,MAAP,KAAkB,WAAjD,EAA8D;AAC5D;AACA,YAAM;AAAE8B,QAAAA;AAAF,UAAmB9B,MAAzB;AACA,YAAM+B,IAAI,GAAG,EAAb;;AACA,WAAK,IAAIC,CAAC,GAAG,CAAb,EAAgBA,CAAC,GAAGF,YAAY,CAACG,MAAjC,EAAyCD,CAAC,EAA1C,EAA8C;AAC5C,cAAME,GAAG,GAAGJ,YAAY,CAACI,GAAb,CAAiBF,CAAjB,CAAZ;AACA,YAAI,OAAOE,GAAP,KAAe,QAAf,IAA2BA,GAAG,CAACC,UAAJ,CAAe,OAAf,CAA/B,EACEJ,IAAI,CAACK,IAAL,CAAUN,YAAY,CAACI,GAAb,CAAiBF,CAAjB,CAAV;AACH;;AACDD,MAAAA,IAAI,CAACM,OAAL,CAAaH,GAAG,IAAIJ,YAAY,CAACQ,UAAb,CAAwBJ,GAAxB,CAApB;AACD;AACF;;AAEqB,eAATK,SAAS,CAAC;AAAE3E,IAAAA,QAAF;AAAYC,IAAAA,QAAZ;AAAsBX,IAAAA;AAAtB,GAAD,EAA4C;AAChE,QAAIsF,WAAW,GAAGtF,iBAAlB;AACA,QAAIuF,mBAAmB,GAAG;AACxBvF,MAAAA,iBAAiB,EAAE,IADK;AAExBwF,MAAAA,eAAe,EAAE,KAFO;AAGxBC,MAAAA,qBAAqB,EAAE,KAHC;AAIxBC,MAAAA,OAAO,EAAE;AAJe,KAA1B;AAMA,QAAIC,eAAJ;AACA,QAAIC,IAAJ;;AAEA,QAAIlF,QAAQ,IAAIC,QAAhB,EAA0B;AACxB;AACAgF,MAAAA,eAAe,GAAG,MAAMlF,sBAAsB,CAAC;AAC7CC,QAAAA,QAD6C;AAE7CC,QAAAA;AAF6C,OAAD,CAA9C,CAFwB;;AAQxB,YAAM,CAACkF,UAAD,EAAaC,iBAAb,IAAkC,MAAMC,YAAE,CAC9CJ,eAAe,CAACK,iBAAhB,EAD8C,CAAhD,CARwB;;AAaxB,UAAIH,UAAJ,EAAgB;AACdN,QAAAA,mBAAmB,GAAG;AACpBvF,UAAAA,iBAAiB,EAAE,IADC;AAEpBiG,UAAAA,YAAY,EAAEJ,UAAU,CAACK,OAAX,IAAsB,IAFhB;AAGpBV,UAAAA,eAAe,EAAE,KAHG;AAIpBC,UAAAA,qBAAqB,EAAEI,UAAU,CAACzD,IAAX,CAAgB+D,QAAhB,CACrB,8BADqB,CAJH;AAOpBT,UAAAA,OAAO,EAAE;AAPW,SAAtB;AASAnB,QAAAA,WAAW,CAACI,sBAAZ;AACD,OAxBuB;;;AA2BxB,UAAImB,iBAAJ,EAAuB;AACrB;AACAR,QAAAA,WAAW,GAAGc,oBAAoB,CAACT,eAAD,CAAlC;AACApB,QAAAA,WAAW,CAACC,eAAZ,CAA4Bc,WAA5B;AACAC,QAAAA,mBAAmB,GAAG;AACpBvF,UAAAA,iBAAiB,EAAEsF,WADC;AAEpBE,UAAAA,eAAe,EAAE,IAFG;AAGpBC,UAAAA,qBAAqB,EAAE,KAHH;AAIpBC,UAAAA,OAAO,EAAE;AAJW,SAAtB;AAMD;AACF,KAjD+D;AAoDhE;AACA;;;AACA,QAAIJ,WAAJ,EAAiB;AACf,YAAM/D,MAAM,GACVoE,eAAe,KAAK,MAAMlF,sBAAsB,CAAC6E,WAAD,CAAjC,CADjB;AAEA,YAAM,CAACe,KAAD,EAAQC,WAAR,IAAuB,MAAM/B,WAAW,CAACgC,cAAZ,CAA2BhF,MAA3B,CAAnC;;AAEA,UAAI8E,KAAJ,EAAW;AACTd,QAAAA,mBAAmB,GAAG;AACpBvF,UAAAA,iBAAiB,EAAE,IADC;AAEpBiG,UAAAA,YAAY,EAAEI,KAAK,CAACH,OAFA;AAGpBV,UAAAA,eAAe,EAAE,KAHG;AAIpBC,UAAAA,qBAAqB,EAAE,KAJH;AAKpBC,UAAAA,OAAO,EAAE;AALW,SAAtB;AAOAnB,QAAAA,WAAW,CAACI,sBAAZ;AACD,OATD,MASO;AACL;AACA,cAAM6B,iBAAiB,GAAGJ,oBAAoB,CAAC7E,MAAD,CAA9C;AACAgD,QAAAA,WAAW,CAACC,eAAZ,CAA4BgC,iBAA5B;AAEAZ,QAAAA,IAAI,GAAGU,WAAP;AACAf,QAAAA,mBAAmB,GAAG;AACpBvF,UAAAA,iBAAiB,EAAEwG,iBADC;AAEpBhB,UAAAA,eAAe,EAAE,IAFG;AAGpBC,UAAAA,qBAAqB,EAAE,KAHH;AAIpBC,UAAAA,OAAO,EAAE;AAJW,SAAtB;AAMD;AACF;;AAED,WAAO;AAAEH,MAAAA,mBAAF;AAAuBK,MAAAA;AAAvB,KAAP;AACD;;AA2BgB,SAAVa,UAAU,CAACC,YAAD,EAAe;AAC9BnC,IAAAA,WAAW,CAACI,sBAAZ;;AACA,QAAIJ,WAAW,CAACnB,WAAhB,EAA6B;AAC3BmB,MAAAA,WAAW,CAACoC,WAAZ,CAAwBD,YAAxB;AACD,KAFD,MAEO;AACL,UAAIA,YAAJ,EAAkBnC,WAAW,CAACqC,oBAAZ,CAAiCF,YAAjC,EAAlB,KACKnC,WAAW,CAACsC,0BAAZ;AACN;AACF;;AAE0B,SAApBC,oBAAoB,CAACpD,QAAD,EAAW;AACpC,QAAI,OAAOZ,MAAP,IAAiB,WAArB,EAAkC;AAChC,UAAIiE,GAAG,GAAG,GAAV;;AACA,UAAIrD,QAAJ,EAAc;AACZ,cAAM;AAAEsD,UAAAA,MAAF;AAAUC,UAAAA;AAAV,YAAmBvD,QAAzB;AACAqD,QAAAA,GAAG,GAAGC,MAAM,GAAI,GAAED,GAAI,GAAEC,MAAO,EAAnB,GAAuBD,GAAnC;AACAA,QAAAA,GAAG,GAAGE,IAAI,GAAI,GAAEF,GAAI,GAAEE,IAAK,EAAjB,GAAqBF,GAA/B;AACD;;AACDjE,MAAAA,MAAM,CAACY,QAAP,CAAgBwD,IAAhB,GAAuBH,GAAvB;AACD;AACF;;AAEsC,eAA1BF,0BAA0B,CAACH,YAAD,EAAe;AACpD,QAAInC,WAAW,CAACnB,WAAhB,EAA6B;AAC3B,YAAMmB,WAAW,CAACoC,WAAZ,EAAN;AACA,YAAMpC,WAAW,CAAC4C,UAAZ,EAAN;AACD,KAHD,MAGO;AACL;AACA,UAAIJ,GAAG,GAAGxC,WAAW,CAAC6C,WAAtB;AACA,UAAI,OAAOV,YAAP,KAAwB,QAA5B,EACEK,GAAG,GAAI,GAAEA,GAAI,iBAAgBL,YAAa,EAA1C;AACF,UACE,OAAOhD,QAAP,KAAoB,WAApB,IACAgD,YAAY,KAAKnC,WAAW,CAAC6C,WAF/B,EAIE1D,QAAQ,CAAC2D,OAAT,CAAiBN,GAAjB;AACH;AACF;;AAEsC,SAAhCO,gCAAgC,CAACC,YAAD,EAAe;AACpD,QAAIR,GAAG,GAAGxC,WAAW,CAACiD,mBAAtB;AACA,QAAID,YAAY,KAAKR,GAArB,EAA0B;AAE1B,QAAI,OAAOQ,YAAP,KAAwB,QAA5B,EACER,GAAG,GAAI,GAAEA,GAAI,iBAAgBQ,YAAa,EAA1C;AACF,QAAI,OAAO7D,QAAP,KAAoB,WAAxB,EAAqCA,QAAQ,CAACwD,IAAT,GAAgBH,GAAhB;AACtC;;AAE0B,SAApBH,oBAAoB,CAACF,YAAD,EAAe;AACxC,QAAI,OAAOA,YAAP,KAAwB,QAA5B,EAAsC;AACpC,UAAI,OAAOhD,QAAP,KAAoB,WAAxB,EAAqCZ,MAAM,CAACY,QAAP,CAAgBwD,IAAhB,GAAuBR,YAAvB;AACtC,KAFD,MAEOnC,WAAW,CAACuC,oBAAZ;AACR;;AAEsB,eAAVK,UAAU,CAACM,WAAD,EAAc;AACnC,UAAMC,WAAW,GAAG,MAAM1D,iBAAiB,CAACV,iBAAD,CAA3C;AACAoE,IAAAA,WAAW,CAACC,cAAZ,CAA2B;AACzB7D,MAAAA,KAAK,EAAE,QADkB;AAEzBD,MAAAA,aAAa,EAAE,UAFU;AAGzBJ,MAAAA,YAAY,EAAEgE,WAAW,IAAI3E,MAAM,CAACY,QAAP,CAAgBC,QAAhB;AAHJ,KAA3B;AAKD;;AAE8B,SAAxBiE,wBAAwB,GAAG;AAChC,UAAMC,MAAM,GAAG,IAAIC,eAAJ,CAAoBhF,MAAM,CAACY,QAAP,CAAgBsD,MAApC,CAAf;;AACA,QAAIa,MAAM,CAACE,GAAP,CAAW,eAAX,KAA+BF,MAAM,CAACE,GAAP,CAAW,eAAX,CAAnC,EAAgE;AAC9DF,MAAAA,MAAM,CAACG,MAAP,CAAc,eAAd;AACAH,MAAAA,MAAM,CAACG,MAAP,CAAc,eAAd;AACAlF,MAAAA,MAAM,CAACY,QAAP,GAAmB,GAAEZ,MAAM,CAACY,QAAP,CAAgBuE,QAAS,GAC5CJ,MAAM,CAAClE,QAAP,KAAqB,IAAGkE,MAAO,EAA/B,GAAmC,EACpC,EAFD;AAGD;AACF;;AAEuB,eAAXlB,WAAW,CAACD,YAAD,EAAe;AACrC,UAAMwB,KAAK,CACR,GAAE3D,WAAW,CAAC4D,OAAQ,gDADd,EAET;AACE7C,MAAAA,WAAW,EAAE;AADf,KAFS,CAAX;;AAMA,QAAIoB,YAAJ,EAAkB;AAChB5D,MAAAA,MAAM,CAACY,QAAP,GAAkBgD,YAAlB;AACD,KAFD,MAEO;AACL;AACA;AACAnC,MAAAA,WAAW,CAACqD,wBAAZ;AACD;AACF;;AAE0C,eAA9BQ,8BAA8B,CAACC,aAAD,EAAgB;AACzD,UAAM,CAAChC,KAAD,EAAQiC,QAAR,IAAoB,MAAMvC,YAAE,CAChCmC,KAAK,CAAE,GAAE3D,WAAW,CAAC4D,OAAQ,0CAAxB,EAAmE;AACtEI,MAAAA,MAAM,EAAE,MAD8D;AAEtEC,MAAAA,OAAO,EAAE;AACPC,QAAAA,MAAM,EAAE,kBADD;AAEP,wBAAgB;AAFT,OAF6D;AAMtEC,MAAAA,IAAI,EAAEC,IAAI,CAACC,SAAL,CAAe;AACnBP,QAAAA,aAAa,EAAEpG,kBAAkB,CAACoG,aAAD;AADd,OAAf;AANgE,KAAnE,CAD2B,CAAlC;AAYA,QAAIhC,KAAJ,EAAW,OAAO,CAAC;AAAEH,MAAAA,OAAO,EAAE;AAAX,KAAD,CAAP;;AACX,QAAIoC,QAAQ,CAACO,EAAb,EAAiB;AACf,YAAM,CAACC,UAAD,EAAaJ,IAAb,IAAqB,MAAM3C,YAAE,CAACuC,QAAQ,CAACS,IAAT,EAAD,CAAnC;AACA,UAAID,UAAJ,EAAgB,OAAO,CAACA,UAAD,CAAP;AAEhB,YAAM;AAAEE,QAAAA,WAAF;AAAeC,QAAAA,eAAe,GAAG;AAAjC,UAAwCP,IAA9C;;AACA,UAAIM,WAAW,KAAK,CAApB,EAAuB;AACrB,eAAO,CACL;AAAE9C,UAAAA,OAAO,EAAE,2BAAX;AAAwCgD,UAAAA,IAAI,EAAED;AAA9C,SADK,CAAP;AAGD;;AACD,UAAIA,eAAe,CAAClE,MAAhB,GAAyB,CAA7B,EAAgC;AAC9B,YAAI3E,YAAJ;AACA6I,QAAAA,eAAe,CAAC9D,OAAhB,CAAwBgE,IAAI,IAAI;AAC9B,cAAIA,IAAI,CAACC,GAAL,KAAa,+BAAjB,EACEhJ,YAAY,GAAG+I,IAAI,CAACE,KAApB;AACH,SAHD;;AAIA,YAAI,CAACjJ,YAAL,EAAmB;AACjB,iBAAO,CACL;AACE8F,YAAAA,OAAO,EACL;AAFJ,WADK,CAAP;AAMD;;AACD,eAAO,CAACoD,SAAD,EAAYlJ,YAAZ,CAAP;AACD,OAfD,MAeO;AACL,eAAO,CACL;AACE8F,UAAAA,OAAO,EACL;AAFJ,SADK,CAAP;AAMD;AACF,KAjCD,MAiCO;AACL,aAAO,CACL;AACEA,QAAAA,OAAO,EAAG,4BAA2BoC,QAAQ,CAACiB,MAAO,IAAGjB,QAAQ,CAACkB,UAAW;AAD9E,OADK,CAAP;AAKD;AACF;;AAEqB,SAAfC,eAAe,CAACC,KAAD,EAAQ;AAC5B,UAAMC,SAAS,GAAG,CAAC,WAAD,EAAc,YAAd,CAAlB;AAEA,WAAOA,SAAS,CAACC,IAAV,CAAeC,QAAQ,IAAI;AAChC,UAAIH,KAAK,CAACvD,QAAN,CAAe0D,QAAf,CAAJ,EAA8B;AAC5B,eAAO,IAAP;AACD;AACF,KAJM,CAAP;AAKD;;AA3TsB;AAAZtF,YACJ4D,UAAUtH,OAAO,CAACE;AAAI;;AADlBwD,YAEJnB,cACLH,OAAO,CAACC,GAAR,CAAYC,QAAZ,KAAyB,aAAzB,GACIC,WAAW,KAAK;AAAO;AAD3B,EAEIP,OAAO,CAACO,WAAR,KAAwB;AALnBmB,YAMJ6C,cAAc;AANV7C,YAOJiD,sBAAsB;;AAPlBjD,YAwIJgC,iBAAiB,MAAMhF,MAAN,IAAgB;AACtC,MAAIuI,SAAJ;AAAA,MACEC,WADF;AAAA,MAEEnE,IAAI,GAAG,EAFT;AAAA,MAGEoE,YAHF;AAKA,GAACF,SAAD,EAAYlE,IAAZ,IAAoB,MAAMG,YAAE,CAACxE,MAAM,CAAC0I,QAAP,CAAgBC,KAAhB,CAAsBC,UAAtB,EAAD,CAA5B;;AACA,MAAIvE,IAAI,IAAIA,IAAI,CAAC1E,EAAjB,EAAqB;AACnB,KAAC6I,WAAD,EAAcC,YAAd,IAA8B,MAAMjE,YAAE,CACpCxE,MAAM,CAAC0I,QAAP,CAAgBC,KAAhB,CAAsBE,aAAtB,CAAoC;AAClCC,MAAAA,MAAM,EAAEzE,IAAI,CAAC1E,EADqB;AAElCoJ,MAAAA,gBAAgB,EAAE;AAFgB,KAApC,CADoC,CAAtC,CADmB;AAQnB;;AACA,QAAIN,YAAY,IAAIA,YAAY,CAACO,KAAjC,EAAwC3E,IAAI,CAAC4E,MAAL,GAAcR,YAAY,CAACO,KAA3B,CATrB;AAYnB;;AACA,QAAIR,WAAJ,EAAiB5F,OAAO,CAACC,GAAR,CAAY2F,WAAZ;AAClB;;AACD,SAAO,CAACD,SAAD,EAAYlE,IAAZ,CAAP;AACD;;MCrJU6E,UAAU,GAAG,CACxBC,iBAAS,CAACC,mBAAD,EAAaC,aAAb,CADe,EAExBF,iBAAS,CAACG,oBAAD,EAAcC,cAAd,CAFe,EAGxBJ,iBAAS,CAACK,sBAAD,EAAgBC,gBAAhB,CAHe,EAIxBN,iBAAS,CAACO,iCAAD,EAA2BC,gCAA3B,CAJe;AAOnB,UAAUC,uBAAV,CAAkCC,MAAlC,EAA0C;AAAA;;AAC/C,QAAM;AACJC,IAAAA,KADI;AAEJC,IAAAA,YAFI;AAGJC,IAAAA,MAAM,EAAE;AAAE5L,MAAAA;AAAF,KAHJ;AAIJ6L,IAAAA;AAJI,MAKFJ,MALJ;AAMA,MAAIK,YAAY,GAAG,MAAMC,cAAM,CAACC,8BAAD,CAA/B,CAP+C;;AAU/C,QAAMC,SAAS,GAAGC,qBAAW,CAAC,MAAMH,cAAM,CAACI,6BAAD,CAAb,CAA7B;AACA,QAAMzD,aAAa,GAAGuD,SAAS,CAACvD,aAAV,IAA2BuD,SAAS,CAACG,aAA3D,CAX+C;;AAc/C,QAAM;AAAET,IAAAA,YAAY,EAAEU;AAAhB,MAA+BR,WAAW,IAAIA,WAAW,CAACS,KAA5B,IAAsC,EAA1E;AACA,QAAM;AAAEX,IAAAA,YAAY,EAAEY;AAAhB,MACHb,KAAK,IACJ3L,sBAAsB,CAACC,mBAAD,EAAsB0L,KAAtB,aAAsBA,KAAtB,qCAAsBA,KAAK,CAAEc,GAA7B,+CAAsB,WAAYvM,aAAlC,CADxB,IAEA,EAHF,CAf+C;AAqB/C;;AACA,QAAMwM,mBAAmB,GAAG,CAC1B,IAAKC,KAAK,CAACC,OAAN,CAAcJ,eAAd,KAAkCA,eAAnC,IAAuD,EAA3D,CAD0B,EAE1B,IAAKG,KAAK,CAACC,OAAN,CAAcN,SAAd,KAA4BA,SAA7B,IAA2C,EAA/C,CAF0B,EAG1B,IAAKK,KAAK,CAACC,OAAN,CAAchB,YAAd,KAA+BA,YAAhC,IAAiD,EAArD,CAH0B,CAA5B;AAKA,QAAMiB,kBAAkB,GAAG,CAAC,CAACL,eAAF,IAAqB,CAAC,CAACF,SAAvB,IAAoC,CAAC,CAACV,YAAjE;;AAEA,MAAI,CAACG,YAAL,EAAmB;AACjB;AACA;AACA,QAAIc,kBAAJ,EAAwB;AACtB;AACAd,MAAAA,YAAY,GAAG,MAAMe,YAAI,CAACxB,gBAAD,EAAmB;AAAE3C,QAAAA;AAAF,OAAnB,CAAzB;AACD,KAHD;AAAA,SAKK,MAAMoE,WAAG,CAAC;AAAEC,MAAAA,IAAI,EAAE3B,sBAAR;AAAuB1C,MAAAA;AAAvB,KAAD,CAAT;AACN;;AAED,MAAIkE,kBAAJ,EAAwB;AACtB;AACA;AACA,QAAI,CAACd,YAAD,IAAiB,CAACpD,aAAtB,EAAqC;AACnC9D,MAAAA,WAAW,CAACsC,0BAAZ,CAAuCuE,MAAM,CAAC1H,QAAP,CAAgBuE,QAAvD;AACD,KAFD,MAEO,IAAImE,mBAAmB,CAACrH,MAApB,GAA6B,CAAjC,EAAoC;AACzC,YAAM4H,UAAU,GAAG,MAAMjB,cAAM,CAACkB,qBAAD,EAAmB,IAAnB,CAA/B;AACA,YAAMC,UAAU,GAAGC,mBAAc,CAACH,UAAD,EAAaP,mBAAb,CAAjC;AAEA,UAAI,CAACS,UAAL,EACEtI,WAAW,CAAC+C,gCAAZ,CAA6C8D,MAAM,CAAC1H,QAAP,CAAgBuE,QAA7D;AACH;AACF;AACF;;AAED,UAAU+C,gBAAV,CAA2B;AAAE3C,EAAAA;AAAF,CAA3B,EAA8C;AAC5C;AACA,MAAIrI,iBAAiB,GAAGuE,WAAW,CAACG,oBAAZ,EAAxB;;AAEA,MAAI2D,aAAa,IAAIrI,iBAAiB,CAACI,YAAvC,EAAqD;AACnD;AACA;AACA;AACA,UAAMqM,WAAG,CAAC;AACRC,MAAAA,IAAI,EAAEzB,iCADE;AAER1F,MAAAA,mBAAmB,EAAE;AACnBwH,QAAAA,SAAS,EAAE;AADQ;AAFb,KAAD,CAAT,CAJmD;AAWnD;;AACA,UAAM,CAAC1G,KAAD,EAAQjG,YAAR,IACJ,MAAMmE,WAAW,CAAC6D,8BAAZ,CAA2CC,aAA3C,CADR;;AAEA,QAAIjI,YAAJ,EAAkB;AAChB;AACAmE,MAAAA,WAAW,CAACC,eAAZ,CAA4B;AAC1BlE,QAAAA,qBAAqB,EAAE+H,aADG;AAE1BjI,QAAAA;AAF0B,OAA5B;AAIAJ,MAAAA,iBAAiB,GAAGuE,WAAW,CAACG,oBAAZ,EAApB;AACD,KArBkD;;;AAwBnD,QAAI1E,iBAAiB,CAACI,YAAtB,EACE,MAAMoM,YAAI,CAAC5B,aAAD,EAAgB;AAAE5K,MAAAA;AAAF,KAAhB,CAAV,CADF,KAEK,IAAIqG,KAAJ,EACH,MAAMoG,WAAG,CAAC;AACRC,MAAAA,IAAI,EAAEzB,iCADE;AAER1F,MAAAA,mBAAmB,EAAE;AACnBG,QAAAA,OAAO,EAAE,IADU;AAEnBO,QAAAA,YAAY,EACV,CAAAI,KAAK,SAAL,IAAAA,KAAK,WAAL,YAAAA,KAAK,CAAEH,OAAP,KACCG,KAAK,IAAI,cAAcA,KAAvB,IAAgCA,KAAK,CAAC1C,QAAN;AAJhB;AAFb,KAAD,CAAT;AASH,GAxC2C;;;AA2C5C,SAAO,MAAM+H,cAAM,CAACC,8BAAD,CAAnB;AACD;;AAED,UAAUf,aAAV,CAAwBQ,MAAM,GAAG,EAAjC,EAAqC;AACnC,QAAM;AAAE1K,IAAAA,QAAF;AAAYC,IAAAA,QAAZ;AAAsBX,IAAAA;AAAtB,MAA4CoL,MAAlD,CADmC;AAInC;;AACA,MAAIA,MAAM,CAACsB,IAAP,KAAgB/B,mBAAhB,IAA8BpG,WAAW,CAACnB,WAA9C,EACEmB,WAAW,CAACsC,0BAAZ;AAEF,QAAM;AAAEtB,IAAAA,mBAAF;AAAuBK,IAAAA;AAAvB,MAAgC,MAAMrB,WAAW,CAACc,SAAZ,CAAsB;AAChE3E,IAAAA,QADgE;AAEhEC,IAAAA,QAFgE;AAGhEX,IAAAA;AAHgE,GAAtB,CAA5C;AAMA,QAAMyM,WAAG,CAAC;AACRC,IAAAA,IAAI,EAAEzB,iCADE;AAER1F,IAAAA,mBAFQ;AAGRK,IAAAA;AAHQ,GAAD,CAAT;AAKD;;AACD,MAAMoH,kBAAkB,GAAGC,IAAI,IAAI;AACjC;AACA9I,EAAAA,OAAO,CAACC,GAAR,CAAY6I,IAAZ;AACA,QAAMC,YAAY,GAAG,MAAMD,IAAI,CAACE,KAAL,CAAW,GAAX,EAAgBC,MAAhB,CAAuB,CAAvB,EAA0BC,IAA1B,CAA+B,GAA/B,CAA3B,CAHiC;;AAKjClJ,EAAAA,OAAO,CAACC,GAAR,CAAY8I,YAAZ;AACA,SAAOA,YAAP;AACD,CAPD;;AASA,UAAUhC,gCAAV,GAA6C;AAC3C,QAAMoC,UAAU,GAAG,MAAM5B,cAAM,CAACC,8BAAD,CAA/B;AACA,QAAM;AAAElI,IAAAA,YAAY,EAAEiD,YAAhB;AAA8B6G,IAAAA,SAAS,EAAEC;AAAzC,MACJ3B,qBAAW,CAAC,MAAMH,cAAM,CAACI,6BAAD,CAAb,CADb;;AAGA,MAAIwB,UAAU,IAAIE,iBAAd,IAAmC,OAAO1K,MAAP,IAAiB,WAAxD,EAAqE;AACnE,UAAMmK,IAAI,GAAGD,kBAAkB,CAACQ,iBAAD,CAA/B,CADmE;AAGnE;;AACA1K,IAAAA,MAAM,CAACY,QAAP,CAAgBwD,IAAhB,GAAuB+F,IAAvB,CAJmE;AAMpE,GAND,MAMO,IAAIK,UAAU,IAAI5G,YAAlB,EAAgC;AACrC,UAAM+F,WAAG,CAACgB,gBAAQ,CAAC/G,YAAD,CAAT,CAAT;AACD;AACF;;AAED,UAAUoE,cAAV,CAAyB;AAAEpE,EAAAA;AAAF,CAAzB,EAA2C;AACzC,QAAM+F,WAAG,CAAC;AACRC,IAAAA,IAAI,EAAEzB,iCADE;AAERrF,IAAAA,IAAI,EAAE;AAFE,GAAD,CAAT;AAIA,QAAMrB,WAAW,CAACkC,UAAZ,CAAuBC,YAAvB,CAAN;AACD;;AAEM,UAAUgH,oBAAV,GAAiC;AACtC,QAAM1N,iBAAiB,GAAG,MAAM0L,cAAM,CAACiC,4BAAD,EAA0B,IAA1B,CAAtC;;AACA,MAAIC,MAAM,CAAC/I,IAAP,CAAY7E,iBAAZ,EAA+B+E,MAA/B,GAAwC,CAA5C,EAA+C;AAC7C,UAAMxD,MAAM,GAAG,MAAMd,sBAAsB,CAACT,iBAAD,CAA3C;AACA,UAAMuB,MAAM,CAACsM,YAAP,EAAN;AAEA,UAAMpB,WAAG,CAAC;AACRC,MAAAA,IAAI,EAAEzB,iCADE;AAER1F,MAAAA,mBAAmB,EAAE;AACnBvF,QAAAA,iBAAiB,EAAEoG,oBAAoB,CAAC7E,MAAD;AADpB;AAFb,KAAD,CAAT;AAMD;AACF;;;;;;;;;"}
@@ -51,13 +51,12 @@ var types = /*#__PURE__*/Object.freeze({
51
51
  });
52
52
 
53
53
  const defaultAuthenticationState = {
54
- authenticated: false,
55
- authenticationError: false,
56
- authenticationErrorMessage: null,
57
54
  clientCredentials: null,
58
- error: false,
59
55
  errorMessage: null,
60
- loading: false
56
+ isAuthenticated: false,
57
+ isAuthenticationError: false,
58
+ isError: false,
59
+ isLoading: false
61
60
  };
62
61
  const defaultPasswordResetRequestValues = {
63
62
  isSending: false,
@@ -75,7 +74,7 @@ const defaultChangePasswordValues = {
75
74
  error: null
76
75
  };
77
76
  const defaultRegistrationValues = {
78
- loading: false,
77
+ isLoading: false,
79
78
  success: false,
80
79
  error: null
81
80
  };
@@ -88,8 +87,12 @@ const initialUserState = {
88
87
  };
89
88
  var UserReducer = immer.produce((state, action) => {
90
89
  switch (action.type) {
91
- case LOGIN_USER:
92
90
  case LOGOUT_USER:
91
+ {
92
+ return initialUserState;
93
+ }
94
+
95
+ case LOGIN_USER:
93
96
  case SET_AUTHENTICATION_STATE:
94
97
  {
95
98
  var _state, _state$authentication;
@@ -98,43 +101,41 @@ var UserReducer = immer.produce((state, action) => {
98
101
  action.authenticationState = defaultAuthenticationState;
99
102
  }
100
103
 
101
- const loading = action.type === LOGIN_USER;
102
104
  const {
103
105
  authenticationState: {
104
- error = false,
106
+ clientCredentials = null,
105
107
  errorMessage = null,
106
- authenticated,
107
- authenticationError = false,
108
- authenticationErrorMessage = null,
109
- clientCredentials = null
108
+ isAuthenticated,
109
+ isAuthenticationError = false,
110
+ isError = false,
111
+ isLoading = action.type === LOGIN_USER
110
112
  },
111
113
  user
112
114
  } = action;
113
115
 
114
116
  if (user) {
115
- user.name = `${user.firstName} ${user.lastName}`;
117
+ user.name = `${user.firstName}${user.lastName ? ` ${user.lastName}` : ''}` || null;
116
118
  user.isZengentiStaff = user.email.includes('@zengenti.com');
117
119
  }
118
120
 
119
121
  state = { ...initialUserState,
120
122
  ...(user || state),
121
123
  authenticationState: {
122
- authenticated: authenticated || ((_state = state) === null || _state === void 0 ? void 0 : (_state$authentication = _state.authenticationState) === null || _state$authentication === void 0 ? void 0 : _state$authentication.authenticated),
123
- authenticationError,
124
- authenticationErrorMessage,
125
124
  clientCredentials,
126
- error,
127
125
  errorMessage,
128
- loading
126
+ isAuthenticated: isAuthenticated || ((_state = state) === null || _state === void 0 ? void 0 : (_state$authentication = _state.authenticationState) === null || _state$authentication === void 0 ? void 0 : _state$authentication.isAuthenticated),
127
+ isAuthenticationError,
128
+ isError,
129
+ isLoading
129
130
  }
130
131
  };
131
- return;
132
+ return state;
132
133
  }
133
134
  // REGISTER_USER is the trigger to set the user.registration initial state
134
- // and will set user.registration.loading to true
135
- // REGISTER_USER_FAILED will unset user.registration.loading and will set
135
+ // and will set user.registration.isLoading to true
136
+ // REGISTER_USER_FAILED will unset user.registration.isLoading and will set
136
137
  // the value in user.registration.error
137
- // REGISTER_USER_SUCCESS will unset user.registration.loading and will
138
+ // REGISTER_USER_SUCCESS will unset user.registration.isLoading and will
138
139
  // set user.registration to the created user from the api response
139
140
 
140
141
  case REGISTER_USER:
@@ -151,7 +152,7 @@ var UserReducer = immer.produce((state, action) => {
151
152
 
152
153
  state.registration.success = action.type === REGISTER_USER_SUCCESS;
153
154
  state.registration.error = error || false;
154
- state.registration.loading = action.type === REGISTER_USER;
155
+ state.registration.isLoading = action.type === REGISTER_USER;
155
156
  return;
156
157
  }
157
158
 
@@ -249,4 +250,4 @@ exports.UserReducer = UserReducer;
249
250
  exports.VALIDATE_USER = VALIDATE_USER;
250
251
  exports.initialUserState = initialUserState;
251
252
  exports.types = types;
252
- //# sourceMappingURL=reducers-fde41d6b.js.map
253
+ //# sourceMappingURL=reducers-3a4f8971.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"reducers-3a4f8971.js","sources":["../src/user/redux/types.js","../src/user/redux/reducers.ts"],"sourcesContent":["const ACTION_PREFIX = '@USER/';\nexport const VALIDATE_USER = `${ACTION_PREFIX}VALIDATE_USER`;\nexport const SET_AUTHENTICATION_STATE = `${ACTION_PREFIX}SET_AUTHENTICATION_STATE`;\nexport const LOGIN_USER = `${ACTION_PREFIX}LOGIN_USER`;\nexport const LOGIN_SUCCESSFUL = `${ACTION_PREFIX}LOGIN_SUCCESSFUL`;\nexport const LOGIN_FAILED = `${ACTION_PREFIX}LOGIN_FAILED`;\nexport const LOGOUT_USER = `${ACTION_PREFIX}LOGOUT_USER`;\nexport const REGISTER_USER = `${ACTION_PREFIX}REGISTER_USER`;\nexport const REGISTER_USER_SUCCESS = `${ACTION_PREFIX}REGISTER_USER_SUCCESS`;\nexport const REGISTER_USER_FAILED = `${ACTION_PREFIX}REGISTER_USER_FAILED`;\n\nexport const REQUEST_USER_PASSWORD_RESET = `${ACTION_PREFIX}REQUEST_USER_PASSWORD_RESET`;\nexport const RESET_USER_PASSWORD = `${ACTION_PREFIX}RESET_USER_PASSWORD`;\nexport const REQUEST_USER_PASSWORD_RESET_SENDING = `${ACTION_PREFIX}REQUEST_USER_PASSWORD_RESET_SENDING`;\nexport const REQUEST_USER_PASSWORD_RESET_SUCCESS = `${ACTION_PREFIX}REQUEST_USER_PASSWORD_RESET_SUCCESS`;\nexport const REQUEST_USER_PASSWORD_RESET_ERROR = `${ACTION_PREFIX}REQUEST_USER_PASSWORD_RESET_ERROR`;\nexport const RESET_USER_PASSWORD_SENDING = `${ACTION_PREFIX}RESET_USER_PASSWORD_SENDING`;\nexport const RESET_USER_PASSWORD_SUCCESS = `${ACTION_PREFIX}RESET_USER_PASSWORD_SUCCESS`;\nexport const RESET_USER_PASSWORD_ERROR = `${ACTION_PREFIX}RESET_USER_PASSWORD_ERROR`;\n\nexport const CHANGE_USER_PASSWORD = `${ACTION_PREFIX}CHANGE_USER_PASSWORD`;\nexport const CHANGE_USER_PASSWORD_SENDING = `${ACTION_PREFIX}CHANGE_USER_PASSWORD_SENDING`;\nexport const CHANGE_USER_PASSWORD_SUCCESS = `${ACTION_PREFIX}CHANGE_USER_PASSWORD_SUCCESS`;\nexport const CHANGE_USER_PASSWORD_ERROR = `${ACTION_PREFIX}CHANGE_USER_PASSWORD_ERROR`;\n","import { Draft, produce } from 'immer';\nimport { AppState } from '~/redux/appstate';\nimport {\n REGISTER_USER,\n REGISTER_USER_FAILED,\n REGISTER_USER_SUCCESS,\n SET_AUTHENTICATION_STATE,\n LOGIN_USER,\n LOGOUT_USER,\n REQUEST_USER_PASSWORD_RESET_SENDING,\n REQUEST_USER_PASSWORD_RESET_SUCCESS,\n REQUEST_USER_PASSWORD_RESET_ERROR,\n RESET_USER_PASSWORD_SENDING,\n RESET_USER_PASSWORD_SUCCESS,\n RESET_USER_PASSWORD_ERROR,\n CHANGE_USER_PASSWORD_SENDING,\n CHANGE_USER_PASSWORD_SUCCESS,\n CHANGE_USER_PASSWORD_ERROR,\n} from './types';\n\nconst defaultAuthenticationState = {\n clientCredentials: null,\n errorMessage: null,\n isAuthenticated: false,\n isAuthenticationError: false,\n isError: false,\n isLoading: false,\n};\n\nconst defaultPasswordResetRequestValues = {\n isSending: false,\n sent: false,\n error: null,\n};\n\nconst defaultResetPasswordValues = {\n isSending: false,\n sent: false,\n error: null,\n};\n\nconst defaultChangePasswordValues = {\n isSending: false,\n sent: false,\n error: null,\n};\n\nconst defaultRegistrationValues = {\n isLoading: false,\n success: false,\n error: null,\n};\n\nexport const initialUserState = {\n authenticationState: defaultAuthenticationState,\n passwordResetRequest: defaultPasswordResetRequestValues,\n resetPassword: defaultResetPasswordValues,\n changePassword: defaultChangePasswordValues,\n groups: [],\n};\n\nexport default produce((state: Draft<AppState['user']>, action) => {\n switch (action.type) {\n case LOGOUT_USER: {\n return initialUserState;\n }\n case LOGIN_USER:\n case SET_AUTHENTICATION_STATE: {\n if (!action.authenticationState) {\n action.authenticationState = defaultAuthenticationState;\n }\n\n const {\n authenticationState: {\n clientCredentials = null,\n errorMessage = null,\n isAuthenticated,\n isAuthenticationError = false,\n isError = false,\n isLoading = action.type === LOGIN_USER,\n },\n user,\n } = action;\n\n if (user) {\n user.name =\n `${user.firstName}${user.lastName ? ` ${user.lastName}` : ''}` ||\n null;\n user.isZengentiStaff = user.email.includes('@zengenti.com');\n }\n\n state = {\n ...initialUserState,\n ...(user || state),\n authenticationState: {\n clientCredentials,\n errorMessage,\n isAuthenticated:\n isAuthenticated || state?.authenticationState?.isAuthenticated,\n isAuthenticationError,\n isError,\n isLoading,\n },\n };\n return state;\n }\n // REGISTER_USER is the trigger to set the user.registration initial state\n // and will set user.registration.isLoading to true\n // REGISTER_USER_FAILED will unset user.registration.isLoading and will set\n // the value in user.registration.error\n // REGISTER_USER_SUCCESS will unset user.registration.isLoading and will\n // set user.registration to the created user from the api response\n case REGISTER_USER:\n case REGISTER_USER_FAILED:\n case REGISTER_USER_SUCCESS: {\n const { error, user } = action;\n\n // Set registration object from the supplied action.user\n // so we can call these values back later\n state.registration = (user ||\n state.registration ||\n defaultRegistrationValues) as typeof defaultRegistrationValues;\n\n // Set registration flags so the UI can track the status\n state.registration.success = action.type === REGISTER_USER_SUCCESS;\n state.registration.error = error || false;\n state.registration.isLoading = action.type === REGISTER_USER;\n return;\n }\n case REQUEST_USER_PASSWORD_RESET_SENDING:\n state.passwordResetRequest = defaultPasswordResetRequestValues;\n state.passwordResetRequest.isSending = true;\n return;\n case REQUEST_USER_PASSWORD_RESET_SUCCESS:\n if (state.passwordResetRequest) {\n state.passwordResetRequest.isSending = false;\n state.passwordResetRequest.sent = true;\n }\n return;\n case REQUEST_USER_PASSWORD_RESET_ERROR:\n if (state.passwordResetRequest) {\n state.passwordResetRequest.isSending = false;\n state.passwordResetRequest.error = action.error;\n }\n return;\n case RESET_USER_PASSWORD_SENDING:\n if (state.resetPassword) {\n state.resetPassword.isSending = true;\n }\n return;\n case RESET_USER_PASSWORD_SUCCESS:\n if (state.resetPassword) {\n state.resetPassword.isSending = false;\n state.resetPassword.sent = true;\n }\n return;\n case RESET_USER_PASSWORD_ERROR:\n if (state.resetPassword) {\n state.resetPassword.isSending = false;\n state.resetPassword.error = action.error;\n }\n return;\n case CHANGE_USER_PASSWORD_SENDING:\n if (state.changePassword) {\n state.changePassword.isSending = true;\n }\n return;\n case CHANGE_USER_PASSWORD_SUCCESS:\n if (state.changePassword) {\n state.changePassword.isSending = false;\n state.changePassword.sent = true;\n }\n return;\n case CHANGE_USER_PASSWORD_ERROR:\n if (state.changePassword) {\n state.changePassword.isSending = false;\n state.changePassword.error = action.error;\n }\n return;\n default:\n return;\n }\n}, initialUserState);\n"],"names":["ACTION_PREFIX","VALIDATE_USER","SET_AUTHENTICATION_STATE","LOGIN_USER","LOGIN_SUCCESSFUL","LOGIN_FAILED","LOGOUT_USER","REGISTER_USER","REGISTER_USER_SUCCESS","REGISTER_USER_FAILED","REQUEST_USER_PASSWORD_RESET","RESET_USER_PASSWORD","REQUEST_USER_PASSWORD_RESET_SENDING","REQUEST_USER_PASSWORD_RESET_SUCCESS","REQUEST_USER_PASSWORD_RESET_ERROR","RESET_USER_PASSWORD_SENDING","RESET_USER_PASSWORD_SUCCESS","RESET_USER_PASSWORD_ERROR","CHANGE_USER_PASSWORD","CHANGE_USER_PASSWORD_SENDING","CHANGE_USER_PASSWORD_SUCCESS","CHANGE_USER_PASSWORD_ERROR","defaultAuthenticationState","clientCredentials","errorMessage","isAuthenticated","isAuthenticationError","isError","isLoading","defaultPasswordResetRequestValues","isSending","sent","error","defaultResetPasswordValues","defaultChangePasswordValues","defaultRegistrationValues","success","initialUserState","authenticationState","passwordResetRequest","resetPassword","changePassword","groups","produce","state","action","type","user","name","firstName","lastName","isZengentiStaff","email","includes","registration"],"mappings":";;;;AAAA,MAAMA,aAAa,GAAG,QAAtB;MACaC,aAAa,GAAI,GAAED,aAAc;MACjCE,wBAAwB,GAAI,GAAEF,aAAc;MAC5CG,UAAU,GAAI,GAAEH,aAAc;AACpC,MAAMI,gBAAgB,GAAI,GAAEJ,aAAc,kBAA1C;AACA,MAAMK,YAAY,GAAI,GAAEL,aAAc,cAAtC;MACMM,WAAW,GAAI,GAAEN,aAAc;MAC/BO,aAAa,GAAI,GAAEP,aAAc;MACjCQ,qBAAqB,GAAI,GAAER,aAAc;MACzCS,oBAAoB,GAAI,GAAET,aAAc;MAExCU,2BAA2B,GAAI,GAAEV,aAAc;MAC/CW,mBAAmB,GAAI,GAAEX,aAAc;MACvCY,mCAAmC,GAAI,GAAEZ,aAAc;MACvDa,mCAAmC,GAAI,GAAEb,aAAc;MACvDc,iCAAiC,GAAI,GAAEd,aAAc;MACrDe,2BAA2B,GAAI,GAAEf,aAAc;MAC/CgB,2BAA2B,GAAI,GAAEhB,aAAc;MAC/CiB,yBAAyB,GAAI,GAAEjB,aAAc;MAE7CkB,oBAAoB,GAAI,GAAElB,aAAc;MACxCmB,4BAA4B,GAAI,GAAEnB,aAAc;MAChDoB,4BAA4B,GAAI,GAAEpB,aAAc;MAChDqB,0BAA0B,GAAI,GAAErB,aAAc;;;;;;;;;;;;;;;;;;;;;;;;;;;ACH3D,MAAMsB,0BAA0B,GAAG;AACjCC,EAAAA,iBAAiB,EAAE,IADc;AAEjCC,EAAAA,YAAY,EAAE,IAFmB;AAGjCC,EAAAA,eAAe,EAAE,KAHgB;AAIjCC,EAAAA,qBAAqB,EAAE,KAJU;AAKjCC,EAAAA,OAAO,EAAE,KALwB;AAMjCC,EAAAA,SAAS,EAAE;AANsB,CAAnC;AASA,MAAMC,iCAAiC,GAAG;AACxCC,EAAAA,SAAS,EAAE,KAD6B;AAExCC,EAAAA,IAAI,EAAE,KAFkC;AAGxCC,EAAAA,KAAK,EAAE;AAHiC,CAA1C;AAMA,MAAMC,0BAA0B,GAAG;AACjCH,EAAAA,SAAS,EAAE,KADsB;AAEjCC,EAAAA,IAAI,EAAE,KAF2B;AAGjCC,EAAAA,KAAK,EAAE;AAH0B,CAAnC;AAMA,MAAME,2BAA2B,GAAG;AAClCJ,EAAAA,SAAS,EAAE,KADuB;AAElCC,EAAAA,IAAI,EAAE,KAF4B;AAGlCC,EAAAA,KAAK,EAAE;AAH2B,CAApC;AAMA,MAAMG,yBAAyB,GAAG;AAChCP,EAAAA,SAAS,EAAE,KADqB;AAEhCQ,EAAAA,OAAO,EAAE,KAFuB;AAGhCJ,EAAAA,KAAK,EAAE;AAHyB,CAAlC;MAMaK,gBAAgB,GAAG;AAC9BC,EAAAA,mBAAmB,EAAEhB,0BADS;AAE9BiB,EAAAA,oBAAoB,EAAEV,iCAFQ;AAG9BW,EAAAA,aAAa,EAAEP,0BAHe;AAI9BQ,EAAAA,cAAc,EAAEP,2BAJc;AAK9BQ,EAAAA,MAAM,EAAE;AALsB;AAQhC,kBAAeC,aAAO,CAAC,CAACC,KAAD,EAAiCC,MAAjC,KAA4C;AACjE,UAAQA,MAAM,CAACC,IAAf;AACE,SAAKxC,WAAL;AAAkB;AAChB,eAAO+B,gBAAP;AACD;;AACD,SAAKlC,UAAL;AACA,SAAKD,wBAAL;AAA+B;AAAA;;AAC7B,YAAI,CAAC2C,MAAM,CAACP,mBAAZ,EAAiC;AAC/BO,UAAAA,MAAM,CAACP,mBAAP,GAA6BhB,0BAA7B;AACD;;AAED,cAAM;AACJgB,UAAAA,mBAAmB,EAAE;AACnBf,YAAAA,iBAAiB,GAAG,IADD;AAEnBC,YAAAA,YAAY,GAAG,IAFI;AAGnBC,YAAAA,eAHmB;AAInBC,YAAAA,qBAAqB,GAAG,KAJL;AAKnBC,YAAAA,OAAO,GAAG,KALS;AAMnBC,YAAAA,SAAS,GAAGiB,MAAM,CAACC,IAAP,KAAgB3C;AANT,WADjB;AASJ4C,UAAAA;AATI,YAUFF,MAVJ;;AAYA,YAAIE,IAAJ,EAAU;AACRA,UAAAA,IAAI,CAACC,IAAL,GACG,GAAED,IAAI,CAACE,SAAU,GAAEF,IAAI,CAACG,QAAL,GAAiB,IAAGH,IAAI,CAACG,QAAS,EAAlC,GAAsC,EAAG,EAA7D,IACA,IAFF;AAGAH,UAAAA,IAAI,CAACI,eAAL,GAAuBJ,IAAI,CAACK,KAAL,CAAWC,QAAX,CAAoB,eAApB,CAAvB;AACD;;AAEDT,QAAAA,KAAK,GAAG,EACN,GAAGP,gBADG;AAEN,cAAIU,IAAI,IAAIH,KAAZ,CAFM;AAGNN,UAAAA,mBAAmB,EAAE;AACnBf,YAAAA,iBADmB;AAEnBC,YAAAA,YAFmB;AAGnBC,YAAAA,eAAe,EACbA,eAAe,eAAImB,KAAJ,oEAAI,OAAON,mBAAX,0DAAI,sBAA4Bb,eAAhC,CAJE;AAKnBC,YAAAA,qBALmB;AAMnBC,YAAAA,OANmB;AAOnBC,YAAAA;AAPmB;AAHf,SAAR;AAaA,eAAOgB,KAAP;AACD;AACD;AACA;AACA;AACA;AACA;AACA;;AACA,SAAKrC,aAAL;AACA,SAAKE,oBAAL;AACA,SAAKD,qBAAL;AAA4B;AAC1B,cAAM;AAAEwB,UAAAA,KAAF;AAASe,UAAAA;AAAT,YAAkBF,MAAxB,CAD0B;AAI1B;;AACAD,QAAAA,KAAK,CAACU,YAAN,GAAsBP,IAAI,IACxBH,KAAK,CAACU,YADc,IAEpBnB,yBAFF,CAL0B;;AAU1BS,QAAAA,KAAK,CAACU,YAAN,CAAmBlB,OAAnB,GAA6BS,MAAM,CAACC,IAAP,KAAgBtC,qBAA7C;AACAoC,QAAAA,KAAK,CAACU,YAAN,CAAmBtB,KAAnB,GAA2BA,KAAK,IAAI,KAApC;AACAY,QAAAA,KAAK,CAACU,YAAN,CAAmB1B,SAAnB,GAA+BiB,MAAM,CAACC,IAAP,KAAgBvC,aAA/C;AACA;AACD;;AACD,SAAKK,mCAAL;AACEgC,MAAAA,KAAK,CAACL,oBAAN,GAA6BV,iCAA7B;AACAe,MAAAA,KAAK,CAACL,oBAAN,CAA2BT,SAA3B,GAAuC,IAAvC;AACA;;AACF,SAAKjB,mCAAL;AACE,UAAI+B,KAAK,CAACL,oBAAV,EAAgC;AAC9BK,QAAAA,KAAK,CAACL,oBAAN,CAA2BT,SAA3B,GAAuC,KAAvC;AACAc,QAAAA,KAAK,CAACL,oBAAN,CAA2BR,IAA3B,GAAkC,IAAlC;AACD;;AACD;;AACF,SAAKjB,iCAAL;AACE,UAAI8B,KAAK,CAACL,oBAAV,EAAgC;AAC9BK,QAAAA,KAAK,CAACL,oBAAN,CAA2BT,SAA3B,GAAuC,KAAvC;AACAc,QAAAA,KAAK,CAACL,oBAAN,CAA2BP,KAA3B,GAAmCa,MAAM,CAACb,KAA1C;AACD;;AACD;;AACF,SAAKjB,2BAAL;AACE,UAAI6B,KAAK,CAACJ,aAAV,EAAyB;AACvBI,QAAAA,KAAK,CAACJ,aAAN,CAAoBV,SAApB,GAAgC,IAAhC;AACD;;AACD;;AACF,SAAKd,2BAAL;AACE,UAAI4B,KAAK,CAACJ,aAAV,EAAyB;AACvBI,QAAAA,KAAK,CAACJ,aAAN,CAAoBV,SAApB,GAAgC,KAAhC;AACAc,QAAAA,KAAK,CAACJ,aAAN,CAAoBT,IAApB,GAA2B,IAA3B;AACD;;AACD;;AACF,SAAKd,yBAAL;AACE,UAAI2B,KAAK,CAACJ,aAAV,EAAyB;AACvBI,QAAAA,KAAK,CAACJ,aAAN,CAAoBV,SAApB,GAAgC,KAAhC;AACAc,QAAAA,KAAK,CAACJ,aAAN,CAAoBR,KAApB,GAA4Ba,MAAM,CAACb,KAAnC;AACD;;AACD;;AACF,SAAKb,4BAAL;AACE,UAAIyB,KAAK,CAACH,cAAV,EAA0B;AACxBG,QAAAA,KAAK,CAACH,cAAN,CAAqBX,SAArB,GAAiC,IAAjC;AACD;;AACD;;AACF,SAAKV,4BAAL;AACE,UAAIwB,KAAK,CAACH,cAAV,EAA0B;AACxBG,QAAAA,KAAK,CAACH,cAAN,CAAqBX,SAArB,GAAiC,KAAjC;AACAc,QAAAA,KAAK,CAACH,cAAN,CAAqBV,IAArB,GAA4B,IAA5B;AACD;;AACD;;AACF,SAAKV,0BAAL;AACE,UAAIuB,KAAK,CAACH,cAAV,EAA0B;AACxBG,QAAAA,KAAK,CAACH,cAAN,CAAqBX,SAArB,GAAiC,KAAjC;AACAc,QAAAA,KAAK,CAACH,cAAN,CAAqBT,KAArB,GAA6Ba,MAAM,CAACb,KAApC;AACD;;AACD;;AACF;AACE;AAtHJ;AAwHD,CAzHqB,EAyHnBK,gBAzHmB,CAAtB;;;;;;;;;;;;;;;;;;;;;;;;;"}