export const authActions = unionize({
LOGIN: {},
- LOGOUT: ofType<{ deleteLinkData: boolean }>(),
+ LOGOUT: ofType<{ deleteLinkData: boolean, preservePath: boolean }>(),
SET_CONFIG: ofType<{ config: Config }>(),
SET_EXTRA_TOKEN: ofType<{ extraApiToken: string, extraApiTokenExpiration?: Date }>(),
RESET_EXTRA_TOKEN: {},
// If the token is from a LoginCluster federation, get user & token data
// from the token issuing cluster.
+ if (!config) {
+ return;
+ }
const lc = (config as Config).loginCluster
const tokenCluster = tokenParts.length === 3
? tokenParts[1].substring(0, 5)
const tokenLocation = await svc.authService.getStorageType();
dispatch(authActions.INIT_USER({ user, token, tokenExpiration, tokenLocation }));
} catch (e) {
- dispatch(authActions.LOGOUT({ deleteLinkData: false }));
+ dispatch(authActions.LOGOUT({ deleteLinkData: false, preservePath: false }));
}
};
const client = await svc.apiClientAuthorizationService.get('current');
dispatch(authActions.SET_EXTRA_TOKEN({
extraApiToken: extraToken,
- extraApiTokenExpiration: client.expiresAt ? new Date(client.expiresAt): undefined,
+ extraApiTokenExpiration: client.expiresAt ? new Date(client.expiresAt) : undefined,
}));
return extraToken;
} catch (e) {
const newExtraToken = getTokenV2(client);
dispatch(authActions.SET_EXTRA_TOKEN({
extraApiToken: newExtraToken,
- extraApiTokenExpiration: client.expiresAt ? new Date(client.expiresAt): undefined,
+ extraApiTokenExpiration: client.expiresAt ? new Date(client.expiresAt) : undefined,
}));
return newExtraToken;
} catch {
dispatch(authActions.LOGIN());
};
-export const logout = (deleteLinkData: boolean = false) =>
+export const logout = (deleteLinkData: boolean = false, preservePath: boolean = false) =>
(dispatch: Dispatch, getState: () => RootState, services: ServiceRepository) =>
- dispatch(authActions.LOGOUT({ deleteLinkData }));
+ dispatch(authActions.LOGOUT({ deleteLinkData, preservePath }))
export type AuthAction = UnionOf<typeof authActions>;