authscape 1.0.180 → 1.0.188

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/index.js CHANGED
@@ -10,6 +10,8 @@ var _CircularProgress = _interopRequireDefault(require("@mui/material/CircularPr
10
10
  var _Backdrop = _interopRequireDefault(require("@mui/material/Backdrop"));
11
11
  var _reactToastify = require("react-toastify");
12
12
  var _router = require("next/router");
13
+ var _styles = require("@mui/material/styles");
14
+ var _material = require("@mui/material");
13
15
  function _interopRequireDefault(obj) { return obj && obj.__esModule ? obj : { "default": obj }; }
14
16
  function _getRequireWildcardCache(nodeInterop) { if (typeof WeakMap !== "function") return null; var cacheBabelInterop = new WeakMap(); var cacheNodeInterop = new WeakMap(); return (_getRequireWildcardCache = function _getRequireWildcardCache(nodeInterop) { return nodeInterop ? cacheNodeInterop : cacheBabelInterop; })(nodeInterop); }
15
17
  function _interopRequireWildcard(obj, nodeInterop) { if (!nodeInterop && obj && obj.__esModule) { return obj; } if (obj === null || _typeof(obj) !== "object" && typeof obj !== "function") { return { "default": obj }; } var cache = _getRequireWildcardCache(nodeInterop); if (cache && cache.has(obj)) { return cache.get(obj); } var newObj = {}; var hasPropertyDescriptor = Object.defineProperty && Object.getOwnPropertyDescriptor; for (var key in obj) { if (key !== "default" && Object.prototype.hasOwnProperty.call(obj, key)) { var desc = hasPropertyDescriptor ? Object.getOwnPropertyDescriptor(obj, key) : null; if (desc && (desc.get || desc.set)) { Object.defineProperty(newObj, key, desc); } else { newObj[key] = obj[key]; } } } newObj["default"] = obj; if (cache) { cache.set(obj, newObj); } return newObj; }
@@ -48,8 +50,8 @@ function AuthScapeApp(_ref) {
48
50
 
49
51
  (0, _react.useEffect)(function () {
50
52
  if (loadedUser) {
51
- if (process.env.authscape.googleAnalytics4 != null) {
52
- init(process.env.authscape.googleAnalytics4);
53
+ if (process.env.googleAnalytics4 != null) {
54
+ init(process.env.googleAnalytics4);
53
55
  }
54
56
  if (router.query.r != null) {
55
57
  localStorage.setItem("ref", router.query.r);
@@ -66,11 +68,11 @@ function AuthScapeApp(_ref) {
66
68
  authService().login();
67
69
  }
68
70
  }, [router.isReady]);
69
- return /*#__PURE__*/_react["default"].createElement(_react["default"].Fragment, null, /*#__PURE__*/_react["default"].createElement(ThemeProvider, {
71
+ return /*#__PURE__*/_react["default"].createElement(_react["default"].Fragment, null, /*#__PURE__*/_react["default"].createElement(_styles.ThemeProvider, {
70
72
  theme: muiTheme
71
- }, loadingLogin && /*#__PURE__*/_react["default"].createElement(Box, null, "Please wait. Loading..."), !loadingLogin && /*#__PURE__*/_react["default"].createElement(_react["default"].Fragment, null, /*#__PURE__*/_react["default"].createElement(AuthorizationComponent, {
73
+ }, loadingLogin && /*#__PURE__*/_react["default"].createElement(_material.Box, null, "Please wait. Loading..."), !loadingLogin && /*#__PURE__*/_react["default"].createElement(_react["default"].Fragment, null, /*#__PURE__*/_react["default"].createElement(AuthorizationComponent, {
72
74
  setCurrentUser: setCurrentUser,
73
- isEnabled: process.env.authscape.enableAuth,
75
+ isEnabled: process.env.enableAuth,
74
76
  userLoaded: function userLoaded() {
75
77
  setLoadedUser(true);
76
78
  if (onAuthenticationLoaded != null) {
@@ -91,9 +93,9 @@ function AuthScapeApp(_ref) {
91
93
  open: isLoading
92
94
  }, /*#__PURE__*/_react["default"].createElement(_CircularProgress["default"], {
93
95
  color: "inherit"
94
- })), /*#__PURE__*/_react["default"].createElement(_reactToastify.ToastContainer, null))), process.env.authscape.microsoftClarityTrackingCode != null && /*#__PURE__*/_react["default"].createElement("script", {
96
+ })), /*#__PURE__*/_react["default"].createElement(_reactToastify.ToastContainer, null))), process.env.microsoftClarityTrackingCode != null && /*#__PURE__*/_react["default"].createElement("script", {
95
97
  dangerouslySetInnerHTML: {
96
- __html: "\n (function(c,l,a,r,i,t,y){\n c[a] = c[a] || function () { (c[a].q = c[a].q || []).push(arguments) };\n t=l.createElement(r);\n t.async=1;\n t.src=\"https://www.clarity.ms/tag/\"+i;\n y=l.getElementsByTagName(r)[0];\n y.parentNode.insertBefore(t,y);\n })(window, document, \"clarity\", \"script\", \"" + process.env.authscape.microsoftClarityTrackingCode + "\");"
98
+ __html: "\n (function(c,l,a,r,i,t,y){\n c[a] = c[a] || function () { (c[a].q = c[a].q || []).push(arguments) };\n t=l.createElement(r);\n t.async=1;\n t.src=\"https://www.clarity.ms/tag/\"+i;\n y=l.getElementsByTagName(r)[0];\n y.parentNode.insertBefore(t,y);\n })(window, document, \"clarity\", \"script\", \"" + process.env.microsoftClarityTrackingCode + "\");"
97
99
  }
98
100
  }));
99
101
  }
@@ -1373,7 +1375,7 @@ var CheckoutForm = function CheckoutForm(_ref) {
1373
1375
  elements: elements,
1374
1376
  redirect: "if_required"
1375
1377
  // confirmParams: {
1376
- // return_url: process.env.authscape.websiteBaseUri + '/confirmSetup?redirectUrl=' + encodeURIComponent(window.location.search),
1378
+ // return_url: process.env.websiteBaseUri + '/confirmSetup?redirectUrl=' + encodeURIComponent(window.location.search),
1377
1379
  // },
1378
1380
  });
1379
1381
  case 7:
@@ -1430,7 +1432,7 @@ var CheckoutForm = function CheckoutForm(_ref) {
1430
1432
  elements: elements,
1431
1433
  redirect: "if_required",
1432
1434
  confirmParams: {
1433
- return_url: process.env.authscape.websiteBaseUri + '/confirmPayment?redirectUrl=' + encodeURIComponent(window.location.search)
1435
+ return_url: process.env.websiteBaseUri + '/confirmPayment?redirectUrl=' + encodeURIComponent(window.location.search)
1434
1436
  }
1435
1437
  });
1436
1438
  case 37:
@@ -1926,7 +1928,7 @@ var RefreshToken = /*#__PURE__*/function () {
1926
1928
  accessToken = (0, _nookies.parseCookies)().access_token || '';
1927
1929
  refreshToken = (0, _nookies.parseCookies)().refresh_token || '';
1928
1930
  _context2.next = 4;
1929
- return instance.post(process.env.authscape.authorityUri + "/connect/token", _queryString["default"].stringify({
1931
+ return instance.post(process.env.authorityUri + "/connect/token", _queryString["default"].stringify({
1930
1932
  grant_type: 'refresh_token',
1931
1933
  client_id: process.env.client_id,
1932
1934
  client_secret: process.env.client_secret,
@@ -1948,7 +1950,7 @@ var RefreshToken = /*#__PURE__*/function () {
1948
1950
  return (0, _nookies.setCookie)(null, "access_token", response.data.access_token, {
1949
1951
  maxAge: 2147483647,
1950
1952
  path: '/',
1951
- domain: process.env.authscape.cookieDomain,
1953
+ domain: process.env.cookieDomain,
1952
1954
  secure: true
1953
1955
  });
1954
1956
  case 9:
@@ -1956,7 +1958,7 @@ var RefreshToken = /*#__PURE__*/function () {
1956
1958
  return (0, _nookies.setCookie)(null, "expires_in", response.data.expires_in, {
1957
1959
  maxAge: 2147483647,
1958
1960
  path: '/',
1959
- domain: process.env.authscape.cookieDomain,
1961
+ domain: process.env.cookieDomain,
1960
1962
  secure: true
1961
1963
  });
1962
1964
  case 11:
@@ -1964,7 +1966,7 @@ var RefreshToken = /*#__PURE__*/function () {
1964
1966
  return (0, _nookies.setCookie)(null, "refresh_token", response.data.refresh_token, {
1965
1967
  maxAge: 2147483647,
1966
1968
  path: '/',
1967
- domain: process.env.authscape.cookieDomain,
1969
+ domain: process.env.cookieDomain,
1968
1970
  secure: true
1969
1971
  });
1970
1972
  case 13:
@@ -1979,11 +1981,11 @@ var RefreshToken = /*#__PURE__*/function () {
1979
1981
  }();
1980
1982
  var apiService = function apiService() {
1981
1983
  var ctx = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : null;
1982
- var env = process.env.authscape.stage;
1984
+ var env = process.env.stage;
1983
1985
  if (env == "development") {
1984
1986
  process.env.NODE_TLS_REJECT_UNAUTHORIZED = "0";
1985
1987
  }
1986
- var baseUri = process.env.authscape.apiUri + "/api";
1988
+ var baseUri = process.env.apiUri + "/api";
1987
1989
  var instance = _axios["default"].create({
1988
1990
  baseURL: baseUri,
1989
1991
  //timeout: 10000,
@@ -2027,17 +2029,17 @@ var apiService = function apiService() {
2027
2029
  (0, _nookies.destroyCookie)(null, "access_token", {
2028
2030
  maxAge: 2147483647,
2029
2031
  path: '/',
2030
- domain: process.env.authscape.cookieDomain
2032
+ domain: process.env.cookieDomain
2031
2033
  });
2032
2034
  (0, _nookies.destroyCookie)(null, "refresh_token", {
2033
2035
  maxAge: 2147483647,
2034
2036
  path: '/',
2035
- domain: process.env.authscape.cookieDomain
2037
+ domain: process.env.cookieDomain
2036
2038
  });
2037
2039
  (0, _nookies.destroyCookie)(null, "expires_in", {
2038
2040
  maxAge: 2147483647,
2039
2041
  path: '/',
2040
- domain: process.env.authscape.cookieDomain
2042
+ domain: process.env.cookieDomain
2041
2043
  });
2042
2044
  }
2043
2045
  return _context3.abrupt("return", Promise.reject(error));
@@ -2439,7 +2441,7 @@ var authService = function authService() {
2439
2441
  challenge = _context2.sent;
2440
2442
  window.localStorage.setItem("verifier", verifier);
2441
2443
  redirectUri = window.location.origin + "/signin-oidc";
2442
- loginUri = process.env.authscape.authorityUri + "/connect/authorize?response_type=code&state=" + state + "&client_id=" + process.env.client_id + "&scope=email%20openid%20offline_access%20profile%20api1&redirect_uri=" + redirectUri + "&code_challenge=" + challenge + "&code_challenge_method=S256";
2444
+ loginUri = process.env.authorityUri + "/connect/authorize?response_type=code&state=" + state + "&client_id=" + process.env.client_id + "&scope=email%20openid%20offline_access%20profile%20api1&redirect_uri=" + redirectUri + "&code_challenge=" + challenge + "&code_challenge_method=S256";
2443
2445
  if (deviceId) {
2444
2446
  loginUri += "&deviceId=" + deviceId; // will be for chrome extention and mobile apps later
2445
2447
  }
@@ -2458,7 +2460,7 @@ var authService = function authService() {
2458
2460
  }(),
2459
2461
  signUp: function signUp() {
2460
2462
  var redirectUrl = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : null;
2461
- var AuthUri = process.env.authscape.authorityUri;
2463
+ var AuthUri = process.env.authorityUri;
2462
2464
  var url = "";
2463
2465
  if (redirectUrl == null) {
2464
2466
  url = AuthUri + "/Identity/Account/Register?returnUrl=" + window.location.href;
@@ -2474,7 +2476,7 @@ var authService = function authService() {
2474
2476
  return _regeneratorRuntime().wrap(function _callee3$(_context3) {
2475
2477
  while (1) switch (_context3.prev = _context3.next) {
2476
2478
  case 0:
2477
- window.location.href = process.env.authscape.authorityUri + "/Identity/Account/Manage";
2479
+ window.location.href = process.env.authorityUri + "/Identity/Account/Manage";
2478
2480
  case 1:
2479
2481
  case "end":
2480
2482
  return _context3.stop();
@@ -2496,8 +2498,8 @@ var authService = function authService() {
2496
2498
  while (1) switch (_context4.prev = _context4.next) {
2497
2499
  case 0:
2498
2500
  redirectUri = _args4.length > 0 && _args4[0] !== undefined ? _args4[0] : null;
2499
- AuthUri = process.env.authscape.authorityUri;
2500
- cookieDomain = process.env.authscape.cookieDomain;
2501
+ AuthUri = process.env.authorityUri;
2502
+ cookieDomain = process.env.cookieDomain;
2501
2503
  (0, _nookies.destroyCookie)({}, "access_token", {
2502
2504
  maxAge: 2147483647,
2503
2505
  path: '/',
@@ -2574,13 +2576,13 @@ var signInValidator = /*#__PURE__*/function () {
2574
2576
  code_verifier: codeVerifier
2575
2577
  });
2576
2578
  _context.next = 6;
2577
- return _axios["default"].post(process.env.authscape.authorityUri + '/connect/token', queryString, {
2579
+ return _axios["default"].post(process.env.authorityUri + '/connect/token', queryString, {
2578
2580
  headers: headers
2579
2581
  });
2580
2582
  case 6:
2581
2583
  response = _context.sent;
2582
2584
  window.localStorage.removeItem("verifier");
2583
- domain = process.env.authscape.cookieDomain;
2585
+ domain = process.env.cookieDomain;
2584
2586
  _context.next = 11;
2585
2587
  return (0, _nookies.setCookie)(null, "access_token", response.data.access_token, {
2586
2588
  maxAge: 2147483647,
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "authscape",
3
- "version": "1.0.180",
3
+ "version": "1.0.188",
4
4
  "description": "",
5
5
  "main": "index.js",
6
6
  "scripts": {
@@ -3,6 +3,8 @@ import CircularProgress from '@mui/material/CircularProgress';
3
3
  import Backdrop from '@mui/material/Backdrop';
4
4
  import { ToastContainer, toast } from 'react-toastify';
5
5
  import { useRouter } from 'next/router';
6
+ import { ThemeProvider } from '@mui/material/styles';
7
+ import { Box } from '@mui/material';
6
8
 
7
9
  export function AuthScapeApp({Component, pageProps, muiTheme = null, onAuthenticationLoaded = null}) {
8
10
 
@@ -16,9 +18,9 @@ export function AuthScapeApp({Component, pageProps, muiTheme = null, onAuthentic
16
18
  useEffect(() => {
17
19
  if (loadedUser)
18
20
  {
19
- if (process.env.authscape.googleAnalytics4 != null)
21
+ if (process.env.googleAnalytics4 != null)
20
22
  {
21
- init(process.env.authscape.googleAnalytics4);
23
+ init(process.env.googleAnalytics4);
22
24
  }
23
25
 
24
26
  if (router.query.r != null)
@@ -56,7 +58,7 @@ export function AuthScapeApp({Component, pageProps, muiTheme = null, onAuthentic
56
58
 
57
59
  {!loadingLogin &&
58
60
  <>
59
- <AuthorizationComponent setCurrentUser={setCurrentUser} isEnabled={process.env.authscape.enableAuth} userLoaded={() => {
61
+ <AuthorizationComponent setCurrentUser={setCurrentUser} isEnabled={process.env.enableAuth} userLoaded={() => {
60
62
  setLoadedUser(true);
61
63
 
62
64
  if (onAuthenticationLoaded != null)
@@ -76,7 +78,7 @@ export function AuthScapeApp({Component, pageProps, muiTheme = null, onAuthentic
76
78
  }
77
79
  </ThemeProvider>
78
80
 
79
- {process.env.authscape.microsoftClarityTrackingCode != null &&
81
+ {process.env.microsoftClarityTrackingCode != null &&
80
82
  <script
81
83
  dangerouslySetInnerHTML={{
82
84
  __html: `
@@ -87,7 +89,7 @@ export function AuthScapeApp({Component, pageProps, muiTheme = null, onAuthentic
87
89
  t.src="https://www.clarity.ms/tag/"+i;
88
90
  y=l.getElementsByTagName(r)[0];
89
91
  y.parentNode.insertBefore(t,y);
90
- })(window, document, "clarity", "script", "` + process.env.authscape.microsoftClarityTrackingCode + `");`,
92
+ })(window, document, "clarity", "script", "` + process.env.microsoftClarityTrackingCode + `");`,
91
93
  }}
92
94
  />
93
95
  }
@@ -48,7 +48,7 @@ const CheckoutForm = ({payButtonText, clientSecret, onResponse, amount}) => {
48
48
  elements,
49
49
  redirect:"if_required",
50
50
  // confirmParams: {
51
- // return_url: process.env.authscape.websiteBaseUri + '/confirmSetup?redirectUrl=' + encodeURIComponent(window.location.search),
51
+ // return_url: process.env.websiteBaseUri + '/confirmSetup?redirectUrl=' + encodeURIComponent(window.location.search),
52
52
  // },
53
53
  });
54
54
 
@@ -103,7 +103,7 @@ const CheckoutForm = ({payButtonText, clientSecret, onResponse, amount}) => {
103
103
  elements,
104
104
  redirect:"if_required",
105
105
  confirmParams: {
106
- return_url: process.env.authscape.websiteBaseUri + '/confirmPayment?redirectUrl=' + encodeURIComponent(window.location.search),
106
+ return_url: process.env.websiteBaseUri + '/confirmPayment?redirectUrl=' + encodeURIComponent(window.location.search),
107
107
  },
108
108
  });
109
109
 
@@ -40,7 +40,7 @@ const RefreshToken = async (originalRequest, instance) => {
40
40
  let accessToken = parseCookies().access_token || '';
41
41
  let refreshToken = parseCookies().refresh_token || '';
42
42
 
43
- let response = await instance.post(process.env.authscape.authorityUri + "/connect/token",
43
+ let response = await instance.post(process.env.authorityUri + "/connect/token",
44
44
  querystring.stringify({
45
45
  grant_type: 'refresh_token',
46
46
  client_id: process.env.client_id,
@@ -61,7 +61,7 @@ const RefreshToken = async (originalRequest, instance) => {
61
61
  {
62
62
  maxAge: 2147483647,
63
63
  path: '/',
64
- domain: process.env.authscape.cookieDomain,
64
+ domain: process.env.cookieDomain,
65
65
  secure: true
66
66
  });
67
67
 
@@ -69,7 +69,7 @@ const RefreshToken = async (originalRequest, instance) => {
69
69
  {
70
70
  maxAge: 2147483647,
71
71
  path: '/',
72
- domain: process.env.authscape.cookieDomain,
72
+ domain: process.env.cookieDomain,
73
73
  secure: true
74
74
  });
75
75
 
@@ -77,7 +77,7 @@ const RefreshToken = async (originalRequest, instance) => {
77
77
  {
78
78
  maxAge: 2147483647,
79
79
  path: '/',
80
- domain: process.env.authscape.cookieDomain,
80
+ domain: process.env.cookieDomain,
81
81
  secure: true
82
82
  });
83
83
  }
@@ -85,13 +85,13 @@ const RefreshToken = async (originalRequest, instance) => {
85
85
 
86
86
  export const apiService = (ctx = null) => {
87
87
 
88
- let env = process.env.authscape.stage;
88
+ let env = process.env.stage;
89
89
  if (env == "development")
90
90
  {
91
91
  process.env.NODE_TLS_REJECT_UNAUTHORIZED = "0";
92
92
  }
93
93
 
94
- let baseUri = process.env.authscape.apiUri + "/api";
94
+ let baseUri = process.env.apiUri + "/api";
95
95
 
96
96
  const instance = axios.create({
97
97
  baseURL: baseUri,
@@ -126,19 +126,19 @@ export const apiService = (ctx = null) => {
126
126
  destroyCookie(null, "access_token", {
127
127
  maxAge: 2147483647,
128
128
  path: '/',
129
- domain: process.env.authscape.cookieDomain
129
+ domain: process.env.cookieDomain
130
130
  });
131
131
 
132
132
  destroyCookie(null, "refresh_token", {
133
133
  maxAge: 2147483647,
134
134
  path: '/',
135
- domain: process.env.authscape.cookieDomain
135
+ domain: process.env.cookieDomain
136
136
  });
137
137
 
138
138
  destroyCookie(null, "expires_in", {
139
139
  maxAge: 2147483647,
140
140
  path: '/',
141
- domain: process.env.authscape.cookieDomain
141
+ domain: process.env.cookieDomain
142
142
  });
143
143
  }
144
144
 
@@ -49,7 +49,7 @@ export const authService = () => {
49
49
  window.localStorage.setItem("verifier", verifier);
50
50
 
51
51
  let redirectUri = window.location.origin + "/signin-oidc";
52
- let loginUri = process.env.authscape.authorityUri + "/connect/authorize?response_type=code&state=" + state + "&client_id=" + process.env.client_id + "&scope=email%20openid%20offline_access%20profile%20api1&redirect_uri=" + redirectUri + "&code_challenge=" + challenge + "&code_challenge_method=S256";
52
+ let loginUri = process.env.authorityUri + "/connect/authorize?response_type=code&state=" + state + "&client_id=" + process.env.client_id + "&scope=email%20openid%20offline_access%20profile%20api1&redirect_uri=" + redirectUri + "&code_challenge=" + challenge + "&code_challenge_method=S256";
53
53
 
54
54
  if (deviceId)
55
55
  {
@@ -60,7 +60,7 @@ export const authService = () => {
60
60
  },
61
61
  signUp: (redirectUrl = null) => {
62
62
 
63
- let AuthUri = process.env.authscape.authorityUri;
63
+ let AuthUri = process.env.authorityUri;
64
64
 
65
65
  let url = "";
66
66
  if (redirectUrl == null)
@@ -78,13 +78,13 @@ export const authService = () => {
78
78
  },
79
79
  manageAccount: async () => {
80
80
 
81
- window.location.href = process.env.authscape.authorityUri + "/Identity/Account/Manage";
81
+ window.location.href = process.env.authorityUri + "/Identity/Account/Manage";
82
82
 
83
83
  },
84
84
  logout: async (redirectUri = null) => {
85
85
 
86
- let AuthUri = process.env.authscape.authorityUri;
87
- let cookieDomain = process.env.authscape.cookieDomain;
86
+ let AuthUri = process.env.authorityUri;
87
+ let cookieDomain = process.env.cookieDomain;
88
88
 
89
89
  destroyCookie({}, "access_token", {
90
90
  maxAge: 2147483647,
@@ -19,13 +19,13 @@ export const signInValidator = async (queryCode) => {
19
19
  code_verifier: codeVerifier
20
20
  });
21
21
 
22
- let response = await axios.post(process.env.authscape.authorityUri + '/connect/token', queryString, {
22
+ let response = await axios.post(process.env.authorityUri + '/connect/token', queryString, {
23
23
  headers: headers
24
24
  });
25
25
 
26
26
  window.localStorage.removeItem("verifier");
27
27
 
28
- let domain = process.env.authscape.cookieDomain;
28
+ let domain = process.env.cookieDomain;
29
29
 
30
30
  await setCookie(null, "access_token", response.data.access_token,
31
31
  {