@@ -260,7 +260,7 @@ export default class TwoFactorsAuthPlugin extends AdminForthPlugin {
260260 newSecret = tempSecret . secret ;
261261
262262 const totpTemporaryJWT = this . adminforth . auth . issueJWT ( { userName, newSecret, issuer :issuerName , pk :userPk , userCanSkipSetup, rememberMeDays } , 'temp2FA' , '10m' ) ;
263- this . adminforth . auth . setCustomCookie ( { response, payload : { name : "2FaTemporaryJWT" , value : totpTemporaryJWT , expirySeconds : 10 * 60 , httpOnly : true } } ) ;
263+ this . adminforth . auth . setCustomCookie ( { response, payload : { name : "2FaTemporaryJWT" , value : totpTemporaryJWT , expiry : undefined , expirySeconds : 10 * 60 , httpOnly : true } } ) ;
264264
265265 return {
266266 body :{
@@ -272,7 +272,7 @@ export default class TwoFactorsAuthPlugin extends AdminForthPlugin {
272272
273273 } else {
274274 const value = this . adminforth . auth . issueJWT ( { userName, issuer :issuerName , pk :userPk , userCanSkipSetup, rememberMeDays } , 'temp2FA' , '10m' ) ;
275- this . adminforth . auth . setCustomCookie ( { response, payload : { name : "2FaTemporaryJWT" , value : value , expirySeconds : 10 * 60 , httpOnly : true } } ) ;
275+ this . adminforth . auth . setCustomCookie ( { response, payload : { name : "2FaTemporaryJWT" , value : value , expiry : undefined , expirySeconds : 10 * 60 , httpOnly : true } } ) ;
276276
277277 return {
278278 body :{
@@ -456,7 +456,7 @@ export default class TwoFactorsAuthPlugin extends AdminForthPlugin {
456456 } ,
457457 } ) ;
458458 const value = this . adminforth . auth . issueJWT ( { "challenge" : options . challenge } , 'tempPasskeyChallenge' , '10m' ) ;
459- this . adminforth . auth . setCustomCookie ( { response, payload : { name : "registerPasskeyTemporaryJWT" , value : value , expirySeconds : 10 * 60 , httpOnly : true } } ) ;
459+ this . adminforth . auth . setCustomCookie ( { response, payload : { name : "registerPasskeyTemporaryJWT" , value : value , expiry : undefined , expirySeconds : 10 * 60 , httpOnly : true } } ) ;
460460 return { ok : true , data : options } ;
461461 }
462462 } ) ;
@@ -545,7 +545,7 @@ export default class TwoFactorsAuthPlugin extends AdminForthPlugin {
545545 userVerification : this . options . passkeys ?. settings . authenticatorSelection . userVerification || "required"
546546 } ) ;
547547 const value = this . adminforth . auth . issueJWT ( { "challenge" : options . challenge } , 'tempPasskeyChallenge' , '10m' ) ;
548- this . adminforth . auth . setCustomCookie ( { response, payload : { name : `passkeyLoginTemporaryJWT` , value : value , expirySeconds : 10 * 60 , httpOnly : true } } ) ;
548+ this . adminforth . auth . setCustomCookie ( { response, payload : { name : `passkeyLoginTemporaryJWT` , value : value , expiry : undefined , expirySeconds : 10 * 60 , httpOnly : true } } ) ;
549549 return { ok : true , data : options } ;
550550 } catch ( e ) {
551551 return { ok : false , error : e } ;
0 commit comments