UNPKG

@aws-amplify/auth

Version:
76 lines (74 loc) 3.89 kB
'use strict'; // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 Object.defineProperty(exports, "__esModule", { value: true }); exports.handleSelectChallengeWithPasswordSRP = handleSelectChallengeWithPasswordSRP; const utils_1 = require("@aws-amplify/core/internals/utils"); const cognitoIdentityProvider_1 = require("../../../foundation/factories/serviceClients/cognitoIdentityProvider"); const factories_1 = require("../../../providers/cognito/factories"); const parsers_1 = require("../../../foundation/parsers"); const utils_2 = require("../../../utils"); const srp_1 = require("../../../providers/cognito/utils/srp"); const userContextData_1 = require("../../../providers/cognito/utils/userContextData"); const setActiveSignInUsername_1 = require("../../../providers/cognito/utils/setActiveSignInUsername"); const retryOnResourceNotFoundException_1 = require("../../../providers/cognito/utils/retryOnResourceNotFoundException"); const handlePasswordVerifierChallenge_1 = require("../../../providers/cognito/utils/handlePasswordVerifierChallenge"); /** * Handles the SELECT_CHALLENGE response specifically for Password SRP authentication. * This function combines the SELECT_CHALLENGE flow with Password SRP protocol. * * @param {string} username - The username for authentication * @param {string} password - The user's password * @param {ClientMetadata} [clientMetadata] - Optional metadata to be sent with auth requests * @param {CognitoUserPoolConfig} config - Cognito User Pool configuration * @param {string} session - The current authentication session token * @param {AuthTokenOrchestrator} tokenOrchestrator - Token orchestrator for managing auth tokens * * @returns {Promise<RespondToAuthChallengeCommandOutput>} The challenge response */ async function handleSelectChallengeWithPasswordSRP(username, password, clientMetadata, config, session, tokenOrchestrator) { const { userPoolId, userPoolClientId, userPoolEndpoint } = config; const userPoolName = userPoolId.split('_')[1] || ''; const authenticationHelper = await (0, srp_1.getAuthenticationHelper)(userPoolName); const authParameters = { ANSWER: 'PASSWORD_SRP', USERNAME: username, SRP_A: authenticationHelper.A.toString(16), }; const userContextData = (0, userContextData_1.getUserContextData)({ username, userPoolId, userPoolClientId, }); const respondToAuthChallenge = (0, cognitoIdentityProvider_1.createRespondToAuthChallengeClient)({ endpointResolver: (0, factories_1.createCognitoUserPoolEndpointResolver)({ endpointOverride: userPoolEndpoint, }), }); const response = await respondToAuthChallenge({ region: (0, parsers_1.getRegionFromUserPoolId)(userPoolId), userAgentValue: (0, utils_2.getAuthUserAgentValue)(utils_1.AuthAction.ConfirmSignIn), }, { ChallengeName: 'SELECT_CHALLENGE', ChallengeResponses: authParameters, ClientId: userPoolClientId, ClientMetadata: clientMetadata, Session: session, UserContextData: userContextData, }); const activeUsername = response.ChallengeParameters?.USERNAME ?? username; (0, setActiveSignInUsername_1.setActiveSignInUsername)(activeUsername); if (response.ChallengeName === 'PASSWORD_VERIFIER') { return (0, retryOnResourceNotFoundException_1.retryOnResourceNotFoundException)(handlePasswordVerifierChallenge_1.handlePasswordVerifierChallenge, [ password, response.ChallengeParameters, clientMetadata, response.Session, authenticationHelper, config, tokenOrchestrator, ], activeUsername, tokenOrchestrator); } return response; } //# sourceMappingURL=handleSelectChallengeWithPasswordSRP.js.map