Skip to content

Commit e949bc2

Browse files
committed
fix: add consol logs for debug
1 parent 827d0a2 commit e949bc2

File tree

2 files changed

+17
-0
lines changed

2 files changed

+17
-0
lines changed

custom/TwoFactorsConfirmation.vue

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -150,8 +150,11 @@
150150
await nextTick();
151151
await isCMAAvailable();
152152
tagOtpInputs();
153+
console.log("Checking if device supports passkeys:", isPasskeysSupported.value);
153154
if (isPasskeysSupported.value === true) {
155+
console.log("Device supports passkeys, checking if user has passkeys...");
154156
await checkIfUserHasPasskeys();
157+
console.log("Does user have passkeys:", doesUserHavePasskeys.value);
155158
}
156159
document.addEventListener('focusin', handleGlobalFocusIn, true);
157160
focusFirstAvailableOtpInput();
@@ -190,6 +193,8 @@
190193
async function sendCode (value: any, factorMode: 'TOTP' | 'passkey', passkeyOptions: any) {
191194
inProgress.value = true;
192195
const usePasskey = factorMode === 'passkey';
196+
console.log("Sending code with factorMode:", factorMode);
197+
console.log("Passkey options:", passkeyOptions);
193198
const resp = await callAdminForthApi({
194199
method: 'POST',
195200
path: '/plugin/twofa/confirmLogin',
@@ -200,12 +205,15 @@
200205
secret: null,
201206
}
202207
})
208+
console.log("Response from confirmLogin:", resp);
203209
if ( resp.allowedLogin ) {
204210
if ( route.meta.isPasskeysEnabled && !doesUserHavePasskeys.value ) {
205211
handlePasskeyAlert(route.meta.suggestionPeriod, router);
206212
}
213+
console.log("Login confirmed, finishing login...");
207214
await user.finishLogin();
208215
} else {
216+
console.log("Login not allowed, showing error:", resp.error);
209217
if (usePasskey) {
210218
showErrorTost(t(resp.error));
211219
codeError.value = resp.error || t('Passkey authentication failed');
@@ -269,15 +277,18 @@
269277
270278
async function createSignInRequest() {
271279
let response;
280+
console.log("Creating sign-in request for passkey...");
272281
try {
273282
response = await callAdminForthApi({
274283
path: `/plugin/passkeys/signInRequest`,
275284
method: 'POST',
276285
});
277286
} catch (error) {
287+
console.log("Error creating sign-in request:", error);
278288
console.error('Error creating sign-in request:', error);
279289
return;
280290
}
291+
console.log("Sign-in request response:", response);
281292
if (response.ok === true) {
282293
return { _options: response.data, challengeId: response.challengeId };
283294
} else {

index.ts

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -383,15 +383,21 @@ export default class TwoFactorsAuthPlugin extends AdminForthPlugin {
383383
let verified = null;
384384
if (body.usePasskey && this.options.passkeys) {
385385
// passkeys are enabled and user wants to use them
386+
console.log("Using passkey for 2FA verification");
386387
const passkeysCookies = this.adminforth.auth.getCustomCookie({cookies: cookies, name: `passkeyLoginTemporaryJWT`});
388+
console.log("Passkey cookies:", passkeysCookies);
387389
if (!passkeysCookies) {
388390
return { error: 'Passkey token is required' };
389391
}
392+
console.log("Verifying passkey cookies");
390393
const decodedPasskeysCookies = await this.adminforth.auth.verify(passkeysCookies, 'tempLoginPasskeyChallenge', false);
391394
if (!decodedPasskeysCookies) {
392395
return { error: 'Invalid passkey' };
393396
}
397+
console.log("Passkey cookies decoded:", decodedPasskeysCookies);
398+
console.log("Verifying passkey response");
394399
const res = await this.verifyPasskeyResponse(body.passkeyOptions, decoded.pk, decodedPasskeysCookies);
400+
console.log("Passkey response verification result:", res);
395401
if (res.ok && res.passkeyConfirmed) {
396402
verified = true;
397403
}

0 commit comments

Comments
 (0)