Package Exports
- amazon-user-pool-srp-client
This package does not declare an exports field, so the exports above have been automatically detected and optimized by JSPM instead. If any package subpath is missing, it is recommended to post an issue to the original package (amazon-user-pool-srp-client) to support the "exports" field. If that is not possible, create a JSPM override to customize the exports field for this package.
Readme
amazon-user-pool-srp-client
standalone srp client for amazon user pool service (no dependency in aws-sdk)
Inspired by amazon-cognito-identity-js
install
npm install amazon-user-pool-srp-client --saveusage
import axios from 'axios'
import { SRPClient, calculateSignature, getNowString } from 'amazon-user-pool-srp-client'
function call (action, body) {
const request = {
url: 'https://cognito-idp.us-east-1.amazonaws.com',
method: 'POST',
headers: {
'Content-Type': 'application/x-amz-json-1.1',
'X-Amz-Target': action
},
data: JSON.stringify(body),
transformResponse: (data) => data
}
return axios(request)
.then((result) => JSON.parse(result.data))
.catch((error) => {
const _err = JSON.parse(error.response.data)
const err = new Error()
err.code = _err.__type
err.message = _err.message
return Promise.reject(err)
})
}
export function login (email, password) {
const userPoolId = process.env.CognitoUserPoolUsers.split('_')[1]
const srp = new SRPClient(userPoolId)
const SRP_A = srp.calculateA()
return call('AWSCognitoIdentityProviderService.InitiateAuth', {
ClientId: process.env.CognitoUserPoolClientWeb,
AuthFlow: 'USER_SRP_AUTH',
AuthParameters: {
USERNAME: email,
SRP_A
}
})
.then(({ ChallengeName, ChallengeParameters, Session }) => {
const hkdf = srp.getPasswordAuthenticationKey(ChallengeParameters.USER_ID_FOR_SRP, password, ChallengeParameters.SRP_B, ChallengeParameters.SALT)
const dateNow = getNowString()
const signatureString = calculateSignature(hkdf, userPoolId, ChallengeParameters.USER_ID_FOR_SRP, ChallengeParameters.SECRET_BLOCK, dateNow)
return call('AWSCognitoIdentityProviderService.RespondToAuthChallenge', {
ClientId: process.env.CognitoUserPoolClientWeb,
ChallengeName,
ChallengeResponses: {
PASSWORD_CLAIM_SIGNATURE: signatureString,
PASSWORD_CLAIM_SECRET_BLOCK: ChallengeParameters.SECRET_BLOCK,
TIMESTAMP: dateNow,
USERNAME: ChallengeParameters.USER_ID_FOR_SRP
},
Session
})
.then(({ AuthenticationResult }) => ({ username: ChallengeParameters.USERNAME, credentials: AuthenticationResult }))
})
}
/* Additional calls as part of standalone user pool client */
export function refreshCredentials (refreshToken) {
return call('AWSCognitoIdentityProviderService.InitiateAuth', {
ClientId: process.env.CognitoUserPoolClientWeb,
AuthFlow: 'REFRESH_TOKEN_AUTH',
AuthParameters: {
REFRESH_TOKEN: refreshToken
}
})
.then(({ AuthenticationResult }) => ({ ...AuthenticationResult, RefreshToken: AuthenticationResult.RefreshToken || refreshToken }))
}
export function signup (Username, Password, AttributeList) {
return call('AWSCognitoIdentityProviderService.SignUp', {
ClientId: process.env.CognitoUserPoolClientWeb,
Username,
Password,
UserAttributes: Object.keys(AttributeList).map((key) => ({ Name: key, Value: AttributeList[key] }))
})
}
export function resendConfirmationCode (Username) {
return call('AWSCognitoIdentityProviderService.ResendConfirmationCode', {
ClientId: process.env.CognitoUserPoolClientWeb,
Username
})
}
export function signupConfirm (Username, ConfirmationCode, ForceAliasCreation) {
return call('AWSCognitoIdentityProviderService.ConfirmSignUp', {
ClientId: process.env.CognitoUserPoolClientWeb,
Username,
ConfirmationCode,
ForceAliasCreation
})
}
...webpack
Due to internal usage of sjcl, in order not to bundle crypto-browserify, add to config:
module.exports = {
...
module: {
noParse: /sjcl-aws/, // it requires crypto so webpack will bundle the browserified version. if the require fails it fallback to the browser api.
...
}
...
}license
MIT