@@ -22,27 +22,27 @@ export interface BDCredentials {
2222 signedWebsocketUrl : string ;
2323}
2424
25- function getIdToken ( Username : string , Password : string , mfa ?: number ) : Promise < CognitoIdToken > {
25+ function getIdToken ( Username : string , Password : string , mfa ?: number , logger ?: Console ) : Promise < CognitoIdToken > {
2626 return new Promise ( ( resolve , reject ) => {
2727 try {
2828 const loginDetails = { Username, Password } ;
29- console . log ( "====" , Pool . getUserPoolId ( ) , Pool . getClientId ( ) , Pool . getCurrentUser ( ) ) ;
29+ logger ?. debug ( "====" , Pool . getUserPoolId ( ) , Pool . getClientId ( ) , Pool . getCurrentUser ( ) ) ;
3030 const userData = { Username, Pool } ;
3131 const cognitoUser = new CognitoUser ( userData ) ;
32- console . log ( "====" , cognitoUser . getUsername ( ) ) ;
32+ logger ?. debug ( "====" , cognitoUser . getUsername ( ) ) ;
3333 const authenticationDetails = new AuthenticationDetails ( loginDetails ) ;
3434 cognitoUser . authenticateUser ( authenticationDetails , {
3535 mfaRequired : async function ( challengeName : ChallengeName , challengeParameters : any ) {
36- console . log ( { callback : "mfaRequired" , challengeName, challengeParameters } ) ;
36+ logger ?. debug ( { callback : "mfaRequired" , challengeName, challengeParameters } ) ;
3737 if ( ! mfa ) return reject ( "MFA required" ) ;
3838 cognitoUser . sendMFACode ( `${ mfa } ` , this ) ;
3939 } ,
4040 totpRequired : async function ( challengeName : ChallengeName , challengeParameters : any ) {
41- console . log ( { callback : "totpRequired" , challengeName, challengeParameters } ) ;
41+ logger ?. debug ( { callback : "totpRequired" , challengeName, challengeParameters } ) ;
4242 if ( ! mfa ) return reject ( "TOTP required" ) ;
4343 cognitoUser . sendMFACode ( `${ mfa } ` , this , "SOFTWARE_TOKEN_MFA" ) ;
4444 } ,
45- onSuccess : ( result : any ) => resolve ( result ?. getIdToken ( ) ) ,
45+ onSuccess : ( result : any ) => resolve ( result ?. getIdToken ( undefined , undefined , undefined , logger ) ) ,
4646 onFailure : ( err : any ) => reject ( err ) ,
4747 } ) ;
4848 } catch ( err ) {
@@ -63,7 +63,7 @@ async function refreshCredsWithToken(jwtIdToken: string): Promise<any> {
6363 } ) ,
6464 } ) ;
6565 const creds = await cognitoidentity . config . credentials ( ) ;
66- console . log ( creds . expiration ) ;
66+ // console.log(creds.expiration);
6767 return creds ;
6868}
6969
@@ -83,15 +83,16 @@ export async function getBoilingDataCredentials(
8383 endpointUrl ?: string ,
8484 mfa ?: number ,
8585 authContext ?: { idToken ?: any ; accessToken ?: any ; refreshToken ?: any } ,
86+ logger ?: Console ,
8687) : Promise < BDCredentials > {
8788 const webSocketHost = getWsApiDomain ( region , endpointUrl ) ;
8889 let idToken : CognitoIdToken | undefined = undefined ;
8990 try {
9091 if ( ! authContext && username && password ) {
91- console . log ( "Fetching ID token with username and pw" ) ;
92- idToken = await getIdToken ( username , password , mfa ) ;
92+ logger ?. debug ( "Fetching ID token with username and pw" ) ;
93+ idToken = await getIdToken ( username , password , mfa , logger ) ;
9394 } else if ( authContext && authContext . idToken ?. jwtToken ) {
94- console . log ( "Using existing ID token" ) ;
95+ logger ?. debug ( "Using existing ID token" ) ;
9596 idToken = new CognitoIdToken ( { IdToken : authContext . idToken ?. jwtToken } ) ;
9697 }
9798 if ( ! idToken ) throw new Error ( "No credentials for creating signed WS URL" ) ;
0 commit comments