KEYCLOAK-11193 Allow JavaScript logging to be disabled
This commit is contained in:
parent
f35d3a8ec9
commit
0b9c6192a3
2 changed files with 28 additions and 9 deletions
|
@ -134,6 +134,12 @@ declare namespace Keycloak {
|
|||
* If not configured, PKCE will not be used.
|
||||
*/
|
||||
pkceMethod?: KeycloakPkceMethod;
|
||||
|
||||
/**
|
||||
* Disables any information from being logged to the console.
|
||||
* @default false
|
||||
*/
|
||||
disableLogging?: boolean
|
||||
}
|
||||
|
||||
interface KeycloakLoginOptions {
|
||||
|
|
|
@ -75,6 +75,8 @@
|
|||
}
|
||||
|
||||
var useNonce = true;
|
||||
var logInfo = createLogger(console.info);
|
||||
var logWarn = createLogger(console.warn);
|
||||
|
||||
kc.init = function (initOptions) {
|
||||
kc.authenticated = false;
|
||||
|
@ -161,6 +163,9 @@
|
|||
kc.pkceMethod = initOptions.pkceMethod;
|
||||
}
|
||||
|
||||
if (typeof initOptions.disableLogging === 'boolean') {
|
||||
kc.disableLogging = initOptions.disableLogging;
|
||||
}
|
||||
}
|
||||
|
||||
if (!kc.responseMode) {
|
||||
|
@ -557,7 +562,7 @@
|
|||
}
|
||||
|
||||
if (kc.timeSkew == null) {
|
||||
console.info('[KEYCLOAK] Unable to determine if token is expired as timeskew is not set');
|
||||
logInfo('[KEYCLOAK] Unable to determine if token is expired as timeskew is not set');
|
||||
return true;
|
||||
}
|
||||
|
||||
|
@ -585,10 +590,10 @@
|
|||
var refreshToken = false;
|
||||
if (minValidity == -1) {
|
||||
refreshToken = true;
|
||||
console.info('[KEYCLOAK] Refreshing token: forced refresh');
|
||||
logInfo('[KEYCLOAK] Refreshing token: forced refresh');
|
||||
} else if (!kc.tokenParsed || kc.isTokenExpired(minValidity)) {
|
||||
refreshToken = true;
|
||||
console.info('[KEYCLOAK] Refreshing token: token expired');
|
||||
logInfo('[KEYCLOAK] Refreshing token: token expired');
|
||||
}
|
||||
|
||||
if (!refreshToken) {
|
||||
|
@ -616,7 +621,7 @@
|
|||
req.onreadystatechange = function () {
|
||||
if (req.readyState == 4) {
|
||||
if (req.status == 200) {
|
||||
console.info('[KEYCLOAK] Token refreshed');
|
||||
logInfo('[KEYCLOAK] Token refreshed');
|
||||
|
||||
timeLocal = (timeLocal + new Date().getTime()) / 2;
|
||||
|
||||
|
@ -629,7 +634,7 @@
|
|||
p.setSuccess(true);
|
||||
}
|
||||
} else {
|
||||
console.warn('[KEYCLOAK] Failed to refresh token');
|
||||
logWarn('[KEYCLOAK] Failed to refresh token');
|
||||
|
||||
if (req.status == 400) {
|
||||
kc.clearToken();
|
||||
|
@ -760,7 +765,7 @@
|
|||
(kc.refreshTokenParsed && kc.refreshTokenParsed.nonce != oauth.storedNonce) ||
|
||||
(kc.idTokenParsed && kc.idTokenParsed.nonce != oauth.storedNonce))) {
|
||||
|
||||
console.info('[KEYCLOAK] Invalid nonce, clearing token');
|
||||
logInfo('[KEYCLOAK] Invalid nonce, clearing token');
|
||||
kc.clearToken();
|
||||
promise && promise.setError();
|
||||
} else {
|
||||
|
@ -967,11 +972,11 @@
|
|||
}
|
||||
|
||||
if (kc.timeSkew != null) {
|
||||
console.info('[KEYCLOAK] Estimated time difference between browser and server is ' + kc.timeSkew + ' seconds');
|
||||
logInfo('[KEYCLOAK] Estimated time difference between browser and server is ' + kc.timeSkew + ' seconds');
|
||||
|
||||
if (kc.onTokenExpired) {
|
||||
var expiresIn = (kc.tokenParsed['exp'] - (new Date().getTime() / 1000) + kc.timeSkew) * 1000;
|
||||
console.info('[KEYCLOAK] Token expires in ' + Math.round(expiresIn / 1000) + ' s');
|
||||
logInfo('[KEYCLOAK] Token expires in ' + Math.round(expiresIn / 1000) + ' s');
|
||||
if (expiresIn <= 0) {
|
||||
kc.onTokenExpired();
|
||||
} else {
|
||||
|
@ -1675,6 +1680,14 @@
|
|||
|
||||
return new CookieStorage();
|
||||
}
|
||||
|
||||
function createLogger(fn) {
|
||||
return function() {
|
||||
if (!kc.disableLogging) {
|
||||
fn.apply(console, Array.prototype.slice.call(arguments));
|
||||
}
|
||||
};
|
||||
}
|
||||
}
|
||||
|
||||
return Keycloak;
|
||||
|
|
Loading…
Reference in a new issue