UNPKG

@aws-amplify/auth

Version:
87 lines (85 loc) 4.5 kB
'use strict'; // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 Object.defineProperty(exports, "__esModule", { value: true }); exports.signInWithUserPassword = signInWithUserPassword; const core_1 = require("@aws-amplify/core"); const utils_1 = require("@aws-amplify/core/internals/utils"); const validation_1 = require("../../../errors/types/validation"); const assertServiceError_1 = require("../../../errors/utils/assertServiceError"); const assertValidationError_1 = require("../../../errors/utils/assertValidationError"); const signInHelpers_1 = require("../utils/signInHelpers"); const signInStore_1 = require("../../../client/utils/store/signInStore"); const cacheTokens_1 = require("../tokenProvider/cacheTokens"); const tokenProvider_1 = require("../tokenProvider"); const dispatchSignedInHubEvent_1 = require("../utils/dispatchSignedInHubEvent"); const retryOnResourceNotFoundException_1 = require("../utils/retryOnResourceNotFoundException"); const getNewDeviceMetadata_1 = require("../utils/getNewDeviceMetadata"); const autoSignIn_1 = require("./autoSignIn"); /** * Signs a user in using USER_PASSWORD_AUTH AuthFlowType * * @param input - The SignInWithUserPasswordInput object * @returns SignInWithUserPasswordOutput * @throws service: {@link InitiateAuthException } - Cognito service error thrown during the sign-in process. * @throws validation: {@link AuthValidationErrorCode } - Validation errors thrown when either username or password * are not defined. * @throws AuthTokenConfigException - Thrown when the token provider config is invalid. */ async function signInWithUserPassword(input) { const { username, password, options } = input; const authConfig = core_1.Amplify.getConfig().Auth?.Cognito; const signInDetails = { loginId: username, authFlowType: 'USER_PASSWORD_AUTH', }; (0, utils_1.assertTokenProviderConfig)(authConfig); const metadata = options?.clientMetadata; (0, assertValidationError_1.assertValidationError)(!!username, validation_1.AuthValidationErrorCode.EmptySignInUsername); (0, assertValidationError_1.assertValidationError)(!!password, validation_1.AuthValidationErrorCode.EmptySignInPassword); try { const { ChallengeName: retiredChallengeName, ChallengeParameters: retriedChallengeParameters, AuthenticationResult, Session, } = await (0, retryOnResourceNotFoundException_1.retryOnResourceNotFoundException)(signInHelpers_1.handleUserPasswordAuthFlow, [username, password, metadata, authConfig, tokenProvider_1.tokenOrchestrator], username, tokenProvider_1.tokenOrchestrator); const activeUsername = (0, signInHelpers_1.getActiveSignInUsername)(username); // sets up local state used during the sign-in process (0, signInStore_1.setActiveSignInState)({ signInSession: Session, username: activeUsername, challengeName: retiredChallengeName, signInDetails, }); if (AuthenticationResult) { await (0, cacheTokens_1.cacheCognitoTokens)({ ...AuthenticationResult, username: activeUsername, NewDeviceMetadata: await (0, getNewDeviceMetadata_1.getNewDeviceMetadata)({ userPoolId: authConfig.userPoolId, userPoolEndpoint: authConfig.userPoolEndpoint, newDeviceMetadata: AuthenticationResult.NewDeviceMetadata, accessToken: AuthenticationResult.AccessToken, }), signInDetails, }); (0, signInStore_1.resetActiveSignInState)(); await (0, dispatchSignedInHubEvent_1.dispatchSignedInHubEvent)(); (0, autoSignIn_1.resetAutoSignIn)(); return { isSignedIn: true, nextStep: { signInStep: 'DONE' }, }; } return (0, signInHelpers_1.getSignInResult)({ challengeName: retiredChallengeName, challengeParameters: retriedChallengeParameters, }); } catch (error) { (0, signInStore_1.resetActiveSignInState)(); (0, autoSignIn_1.resetAutoSignIn)(); (0, assertServiceError_1.assertServiceError)(error); const result = (0, signInHelpers_1.getSignInResultFromError)(error.name); if (result) return result; throw error; } } //# sourceMappingURL=signInWithUserPassword.js.map