aboutsummaryrefslogtreecommitdiff
path: root/packages/demobank-ui/src/hooks/useCredentialsChecker.ts
diff options
context:
space:
mode:
authorSebastian <sebasjm@gmail.com>2023-09-25 09:31:17 -0300
committerSebastian <sebasjm@gmail.com>2023-09-25 14:50:45 -0300
commit0b2c03dc5e1060cd229aeafb84263f171b5a9788 (patch)
treed95fc53b31cb8188be8f4697b1a8d01495b3a41b /packages/demobank-ui/src/hooks/useCredentialsChecker.ts
parentfd9ed97fdc60baaa3f74a3f7b02c6831c6d6948b (diff)
new libeufin api
Diffstat (limited to 'packages/demobank-ui/src/hooks/useCredentialsChecker.ts')
-rw-r--r--packages/demobank-ui/src/hooks/useCredentialsChecker.ts12
1 files changed, 6 insertions, 6 deletions
diff --git a/packages/demobank-ui/src/hooks/useCredentialsChecker.ts b/packages/demobank-ui/src/hooks/useCredentialsChecker.ts
index 05954348f..f66a4a7c6 100644
--- a/packages/demobank-ui/src/hooks/useCredentialsChecker.ts
+++ b/packages/demobank-ui/src/hooks/useCredentialsChecker.ts
@@ -23,13 +23,13 @@ export function useCredentialsChecker() {
const response = await request<LoginTokenSuccessResponse>(baseUrl, `accounts/${username}/token`, {
method: "POST",
basicAuth: {
- username: username,
+ username,
password,
},
data,
contentType: "json"
});
- return { valid: true, token: response.data.token, expiration: response.data.expiration };
+ return { valid: true, token: `secret-token:${response.data.access_token}` as AccessToken, expiration: response.data.expiration };
} catch (error) {
if (error instanceof RequestError) {
return { valid: false, cause: error.cause };
@@ -76,13 +76,13 @@ export function useCredentialsChecker() {
}
}
- return requestNewLoginToken(baseUrl, token.token as AccessToken)
+ return requestNewLoginToken(baseUrl, token.token)
}
return { requestNewLoginToken, refreshLoginToken }
}
export interface LoginToken {
- token: string,
+ token: AccessToken,
expiration: Timestamp,
}
// token used to get loginToken
@@ -95,7 +95,7 @@ export type AccessToken = string & {
type YesOrNo = "yes" | "no";
export type LoginResult = {
valid: true;
- token: string;
+ token: AccessToken;
expiration: Timestamp;
} | {
valid: false;
@@ -121,7 +121,7 @@ export interface LoginTokenSuccessResponse {
// that are in scope for some time. Must be prefixed
// with "Bearer " when used in the "Authorization" HTTP header.
// Will already begin with the RFC 8959 prefix.
- token: string;
+ access_token: AccessToken;
// Scope of the token (which kinds of operations it will allow)
scope: "readonly" | "write";