@croacroa/react-native-template 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.env.example +18 -0
- package/.eslintrc.js +55 -0
- package/.github/workflows/ci.yml +184 -0
- package/.github/workflows/eas-build.yml +55 -0
- package/.github/workflows/eas-update.yml +50 -0
- package/.gitignore +62 -0
- package/.prettierrc +11 -0
- package/.storybook/main.ts +28 -0
- package/.storybook/preview.tsx +30 -0
- package/CHANGELOG.md +106 -0
- package/CONTRIBUTING.md +377 -0
- package/README.md +399 -0
- package/__tests__/components/Button.test.tsx +74 -0
- package/__tests__/hooks/useAuth.test.tsx +499 -0
- package/__tests__/services/api.test.ts +535 -0
- package/__tests__/utils/cn.test.ts +39 -0
- package/app/(auth)/_layout.tsx +36 -0
- package/app/(auth)/home.tsx +117 -0
- package/app/(auth)/profile.tsx +152 -0
- package/app/(auth)/settings.tsx +147 -0
- package/app/(public)/_layout.tsx +21 -0
- package/app/(public)/forgot-password.tsx +127 -0
- package/app/(public)/login.tsx +120 -0
- package/app/(public)/onboarding.tsx +5 -0
- package/app/(public)/register.tsx +139 -0
- package/app/_layout.tsx +97 -0
- package/app/index.tsx +21 -0
- package/app.config.ts +72 -0
- package/assets/images/.gitkeep +7 -0
- package/assets/images/adaptive-icon.png +0 -0
- package/assets/images/favicon.png +0 -0
- package/assets/images/icon.png +0 -0
- package/assets/images/notification-icon.png +0 -0
- package/assets/images/splash.png +0 -0
- package/babel.config.js +10 -0
- package/components/ErrorBoundary.tsx +169 -0
- package/components/forms/FormInput.tsx +78 -0
- package/components/forms/index.ts +1 -0
- package/components/onboarding/OnboardingScreen.tsx +370 -0
- package/components/onboarding/index.ts +2 -0
- package/components/ui/AnimatedButton.tsx +156 -0
- package/components/ui/AnimatedCard.tsx +108 -0
- package/components/ui/Avatar.tsx +316 -0
- package/components/ui/Badge.tsx +416 -0
- package/components/ui/BottomSheet.tsx +307 -0
- package/components/ui/Button.stories.tsx +115 -0
- package/components/ui/Button.tsx +104 -0
- package/components/ui/Card.stories.tsx +84 -0
- package/components/ui/Card.tsx +32 -0
- package/components/ui/Checkbox.tsx +261 -0
- package/components/ui/Input.stories.tsx +106 -0
- package/components/ui/Input.tsx +117 -0
- package/components/ui/Modal.tsx +98 -0
- package/components/ui/OptimizedImage.tsx +369 -0
- package/components/ui/Select.tsx +240 -0
- package/components/ui/Skeleton.tsx +180 -0
- package/components/ui/index.ts +18 -0
- package/constants/config.ts +54 -0
- package/docs/adr/001-state-management.md +79 -0
- package/docs/adr/002-styling-approach.md +130 -0
- package/docs/adr/003-data-fetching.md +155 -0
- package/docs/adr/004-auth-adapter-pattern.md +144 -0
- package/docs/adr/README.md +78 -0
- package/eas.json +47 -0
- package/global.css +10 -0
- package/hooks/index.ts +25 -0
- package/hooks/useApi.ts +236 -0
- package/hooks/useAuth.tsx +290 -0
- package/hooks/useBiometrics.ts +295 -0
- package/hooks/useDeepLinking.ts +256 -0
- package/hooks/useNotifications.ts +138 -0
- package/hooks/useOffline.ts +69 -0
- package/hooks/usePerformance.ts +434 -0
- package/hooks/useTheme.tsx +85 -0
- package/hooks/useUpdates.ts +358 -0
- package/i18n/index.ts +77 -0
- package/i18n/locales/en.json +101 -0
- package/i18n/locales/fr.json +101 -0
- package/jest.config.js +32 -0
- package/maestro/README.md +113 -0
- package/maestro/config.yaml +35 -0
- package/maestro/flows/login.yaml +62 -0
- package/maestro/flows/navigation.yaml +68 -0
- package/maestro/flows/offline.yaml +60 -0
- package/maestro/flows/register.yaml +94 -0
- package/metro.config.js +6 -0
- package/nativewind-env.d.ts +1 -0
- package/package.json +170 -0
- package/scripts/init.ps1 +162 -0
- package/scripts/init.sh +174 -0
- package/services/analytics.ts +428 -0
- package/services/api.ts +340 -0
- package/services/authAdapter.ts +333 -0
- package/services/index.ts +22 -0
- package/services/queryClient.ts +97 -0
- package/services/sentry.ts +131 -0
- package/services/storage.ts +82 -0
- package/stores/appStore.ts +54 -0
- package/stores/index.ts +2 -0
- package/stores/notificationStore.ts +40 -0
- package/tailwind.config.js +47 -0
- package/tsconfig.json +26 -0
- package/types/index.ts +42 -0
- package/types/user.ts +63 -0
- package/utils/accessibility.ts +446 -0
- package/utils/cn.ts +14 -0
- package/utils/index.ts +43 -0
- package/utils/toast.ts +113 -0
- package/utils/validation.ts +67 -0
package/services/api.ts
ADDED
|
@@ -0,0 +1,340 @@
|
|
|
1
|
+
import * as SecureStore from "expo-secure-store";
|
|
2
|
+
import { router } from "expo-router";
|
|
3
|
+
import Bottleneck from "bottleneck";
|
|
4
|
+
import { API_URL } from "@/constants/config";
|
|
5
|
+
import { toast } from "@/utils/toast";
|
|
6
|
+
import type { AuthTokens } from "@/types";
|
|
7
|
+
|
|
8
|
+
type RequestMethod = "GET" | "POST" | "PUT" | "PATCH" | "DELETE";
|
|
9
|
+
|
|
10
|
+
// ============================================================================
|
|
11
|
+
// Rate Limiting Configuration
|
|
12
|
+
// ============================================================================
|
|
13
|
+
|
|
14
|
+
/**
|
|
15
|
+
* Rate limiter to prevent API abuse and handle rate limiting gracefully
|
|
16
|
+
* - maxConcurrent: Maximum concurrent requests
|
|
17
|
+
* - minTime: Minimum time between requests (ms)
|
|
18
|
+
* - reservoir: Number of requests allowed in the reservoir
|
|
19
|
+
* - reservoirRefreshAmount: How many requests to add on refresh
|
|
20
|
+
* - reservoirRefreshInterval: How often to refresh the reservoir (ms)
|
|
21
|
+
*/
|
|
22
|
+
const limiter = new Bottleneck({
|
|
23
|
+
maxConcurrent: 5, // Max 5 concurrent requests
|
|
24
|
+
minTime: 100, // At least 100ms between requests
|
|
25
|
+
reservoir: 50, // 50 requests per interval
|
|
26
|
+
reservoirRefreshAmount: 50,
|
|
27
|
+
reservoirRefreshInterval: 60 * 1000, // Refresh every minute
|
|
28
|
+
});
|
|
29
|
+
|
|
30
|
+
// Track rate limit errors
|
|
31
|
+
let rateLimitRetryAfter = 0;
|
|
32
|
+
|
|
33
|
+
limiter.on("failed", async (error, _jobInfo) => {
|
|
34
|
+
// If we hit a rate limit, wait and retry
|
|
35
|
+
if (error instanceof Error && error.message.includes("429")) {
|
|
36
|
+
const retryAfter = rateLimitRetryAfter || 1000;
|
|
37
|
+
console.warn(`Rate limited, retrying in ${retryAfter}ms`);
|
|
38
|
+
return retryAfter;
|
|
39
|
+
}
|
|
40
|
+
return null;
|
|
41
|
+
});
|
|
42
|
+
|
|
43
|
+
limiter.on("retry", (error, jobInfo) => {
|
|
44
|
+
console.log(`Retrying request (attempt ${jobInfo.retryCount + 1})`);
|
|
45
|
+
});
|
|
46
|
+
|
|
47
|
+
interface RequestOptions {
|
|
48
|
+
method?: RequestMethod;
|
|
49
|
+
body?: Record<string, unknown>;
|
|
50
|
+
headers?: Record<string, string>;
|
|
51
|
+
requiresAuth?: boolean;
|
|
52
|
+
skipRefresh?: boolean;
|
|
53
|
+
}
|
|
54
|
+
|
|
55
|
+
interface ApiError extends Error {
|
|
56
|
+
status: number;
|
|
57
|
+
data?: unknown;
|
|
58
|
+
}
|
|
59
|
+
|
|
60
|
+
const TOKEN_KEY = "auth_tokens";
|
|
61
|
+
const TOKEN_REFRESH_THRESHOLD = 5 * 60 * 1000;
|
|
62
|
+
|
|
63
|
+
// Track if we're currently refreshing to prevent multiple refresh calls
|
|
64
|
+
let isRefreshing = false;
|
|
65
|
+
let refreshPromise: Promise<string | null> | null = null;
|
|
66
|
+
|
|
67
|
+
/**
|
|
68
|
+
* Get current auth tokens from secure storage
|
|
69
|
+
*/
|
|
70
|
+
async function getTokens(): Promise<AuthTokens | null> {
|
|
71
|
+
try {
|
|
72
|
+
const stored = await SecureStore.getItemAsync(TOKEN_KEY);
|
|
73
|
+
return stored ? JSON.parse(stored) : null;
|
|
74
|
+
} catch {
|
|
75
|
+
return null;
|
|
76
|
+
}
|
|
77
|
+
}
|
|
78
|
+
|
|
79
|
+
/**
|
|
80
|
+
* Save new tokens to secure storage
|
|
81
|
+
*/
|
|
82
|
+
async function saveTokens(tokens: AuthTokens): Promise<void> {
|
|
83
|
+
await SecureStore.setItemAsync(TOKEN_KEY, JSON.stringify(tokens));
|
|
84
|
+
}
|
|
85
|
+
|
|
86
|
+
/**
|
|
87
|
+
* Clear tokens and redirect to login
|
|
88
|
+
*/
|
|
89
|
+
async function handleAuthFailure(): Promise<void> {
|
|
90
|
+
await SecureStore.deleteItemAsync(TOKEN_KEY);
|
|
91
|
+
await SecureStore.deleteItemAsync("auth_user");
|
|
92
|
+
toast.error("Session expired", "Please sign in again");
|
|
93
|
+
router.replace("/(public)/login");
|
|
94
|
+
}
|
|
95
|
+
|
|
96
|
+
/**
|
|
97
|
+
* Refresh the access token using the refresh token
|
|
98
|
+
*/
|
|
99
|
+
async function refreshAccessToken(): Promise<string | null> {
|
|
100
|
+
// If already refreshing, wait for that request
|
|
101
|
+
if (isRefreshing && refreshPromise) {
|
|
102
|
+
return refreshPromise;
|
|
103
|
+
}
|
|
104
|
+
|
|
105
|
+
isRefreshing = true;
|
|
106
|
+
refreshPromise = (async () => {
|
|
107
|
+
try {
|
|
108
|
+
const tokens = await getTokens();
|
|
109
|
+
if (!tokens?.refreshToken) {
|
|
110
|
+
throw new Error("No refresh token");
|
|
111
|
+
}
|
|
112
|
+
|
|
113
|
+
// TODO: Replace with your actual refresh endpoint
|
|
114
|
+
const response = await fetch(`${API_URL}/auth/refresh`, {
|
|
115
|
+
method: "POST",
|
|
116
|
+
headers: { "Content-Type": "application/json" },
|
|
117
|
+
body: JSON.stringify({ refreshToken: tokens.refreshToken }),
|
|
118
|
+
});
|
|
119
|
+
|
|
120
|
+
if (!response.ok) {
|
|
121
|
+
throw new Error("Refresh failed");
|
|
122
|
+
}
|
|
123
|
+
|
|
124
|
+
const data = await response.json();
|
|
125
|
+
const newTokens: AuthTokens = {
|
|
126
|
+
accessToken: data.accessToken,
|
|
127
|
+
refreshToken: data.refreshToken || tokens.refreshToken,
|
|
128
|
+
expiresAt: Date.now() + (data.expiresIn || 3600) * 1000,
|
|
129
|
+
};
|
|
130
|
+
|
|
131
|
+
await saveTokens(newTokens);
|
|
132
|
+
return newTokens.accessToken;
|
|
133
|
+
} catch (error) {
|
|
134
|
+
console.error("Token refresh failed:", error);
|
|
135
|
+
await handleAuthFailure();
|
|
136
|
+
return null;
|
|
137
|
+
} finally {
|
|
138
|
+
isRefreshing = false;
|
|
139
|
+
refreshPromise = null;
|
|
140
|
+
}
|
|
141
|
+
})();
|
|
142
|
+
|
|
143
|
+
return refreshPromise;
|
|
144
|
+
}
|
|
145
|
+
|
|
146
|
+
/**
|
|
147
|
+
* Get a valid access token, refreshing if necessary
|
|
148
|
+
*/
|
|
149
|
+
async function getValidAccessToken(): Promise<string | null> {
|
|
150
|
+
const tokens = await getTokens();
|
|
151
|
+
if (!tokens) return null;
|
|
152
|
+
|
|
153
|
+
// Check if token needs refresh
|
|
154
|
+
const timeUntilExpiry = tokens.expiresAt - Date.now();
|
|
155
|
+
if (timeUntilExpiry < TOKEN_REFRESH_THRESHOLD) {
|
|
156
|
+
return refreshAccessToken();
|
|
157
|
+
}
|
|
158
|
+
|
|
159
|
+
return tokens.accessToken;
|
|
160
|
+
}
|
|
161
|
+
|
|
162
|
+
class ApiClient {
|
|
163
|
+
private baseUrl: string;
|
|
164
|
+
private defaultTimeout: number;
|
|
165
|
+
private enableRateLimiting: boolean;
|
|
166
|
+
|
|
167
|
+
constructor(baseUrl: string, timeout = 30000, enableRateLimiting = true) {
|
|
168
|
+
this.baseUrl = baseUrl;
|
|
169
|
+
this.defaultTimeout = timeout;
|
|
170
|
+
this.enableRateLimiting = enableRateLimiting;
|
|
171
|
+
}
|
|
172
|
+
|
|
173
|
+
/**
|
|
174
|
+
* Execute a request with rate limiting
|
|
175
|
+
*/
|
|
176
|
+
private async executeWithRateLimiting<T>(fn: () => Promise<T>): Promise<T> {
|
|
177
|
+
if (!this.enableRateLimiting) {
|
|
178
|
+
return fn();
|
|
179
|
+
}
|
|
180
|
+
return limiter.schedule(fn);
|
|
181
|
+
}
|
|
182
|
+
|
|
183
|
+
private async request<T>(
|
|
184
|
+
endpoint: string,
|
|
185
|
+
options: RequestOptions = {}
|
|
186
|
+
): Promise<T> {
|
|
187
|
+
const {
|
|
188
|
+
method = "GET",
|
|
189
|
+
body,
|
|
190
|
+
headers = {},
|
|
191
|
+
requiresAuth = true,
|
|
192
|
+
skipRefresh = false,
|
|
193
|
+
} = options;
|
|
194
|
+
|
|
195
|
+
const requestHeaders: Record<string, string> = {
|
|
196
|
+
"Content-Type": "application/json",
|
|
197
|
+
...headers,
|
|
198
|
+
};
|
|
199
|
+
|
|
200
|
+
// Add auth token if required
|
|
201
|
+
if (requiresAuth) {
|
|
202
|
+
const token = await getValidAccessToken();
|
|
203
|
+
if (token) {
|
|
204
|
+
requestHeaders.Authorization = `Bearer ${token}`;
|
|
205
|
+
}
|
|
206
|
+
}
|
|
207
|
+
|
|
208
|
+
// Setup abort controller for timeout
|
|
209
|
+
const controller = new AbortController();
|
|
210
|
+
const timeoutId = setTimeout(() => controller.abort(), this.defaultTimeout);
|
|
211
|
+
|
|
212
|
+
try {
|
|
213
|
+
const config: RequestInit = {
|
|
214
|
+
method,
|
|
215
|
+
headers: requestHeaders,
|
|
216
|
+
signal: controller.signal,
|
|
217
|
+
};
|
|
218
|
+
|
|
219
|
+
if (body && method !== "GET") {
|
|
220
|
+
config.body = JSON.stringify(body);
|
|
221
|
+
}
|
|
222
|
+
|
|
223
|
+
const response = await this.executeWithRateLimiting(() =>
|
|
224
|
+
fetch(`${this.baseUrl}${endpoint}`, config)
|
|
225
|
+
);
|
|
226
|
+
|
|
227
|
+
// Handle 401 - try refresh once
|
|
228
|
+
if (response.status === 401 && requiresAuth && !skipRefresh) {
|
|
229
|
+
const newToken = await refreshAccessToken();
|
|
230
|
+
if (newToken) {
|
|
231
|
+
// Retry the request with new token
|
|
232
|
+
return this.request(endpoint, { ...options, skipRefresh: true });
|
|
233
|
+
}
|
|
234
|
+
throw new Error("Authentication failed");
|
|
235
|
+
}
|
|
236
|
+
|
|
237
|
+
// Handle rate limiting (429)
|
|
238
|
+
if (response.status === 429) {
|
|
239
|
+
const retryAfter = response.headers.get("Retry-After");
|
|
240
|
+
rateLimitRetryAfter = retryAfter
|
|
241
|
+
? parseInt(retryAfter, 10) * 1000
|
|
242
|
+
: 1000;
|
|
243
|
+
const error = new Error("Rate limited - too many requests") as ApiError;
|
|
244
|
+
error.status = 429;
|
|
245
|
+
throw error;
|
|
246
|
+
}
|
|
247
|
+
|
|
248
|
+
// Handle other errors
|
|
249
|
+
if (!response.ok) {
|
|
250
|
+
const error = new Error(
|
|
251
|
+
`API Error: ${response.status} ${response.statusText}`
|
|
252
|
+
) as ApiError;
|
|
253
|
+
error.status = response.status;
|
|
254
|
+
try {
|
|
255
|
+
error.data = await response.json();
|
|
256
|
+
} catch {
|
|
257
|
+
// Response body is not JSON
|
|
258
|
+
}
|
|
259
|
+
throw error;
|
|
260
|
+
}
|
|
261
|
+
|
|
262
|
+
// Handle empty responses
|
|
263
|
+
const text = await response.text();
|
|
264
|
+
if (!text) {
|
|
265
|
+
return {} as T;
|
|
266
|
+
}
|
|
267
|
+
|
|
268
|
+
return JSON.parse(text);
|
|
269
|
+
} catch (error) {
|
|
270
|
+
if (error instanceof Error) {
|
|
271
|
+
// Handle abort (timeout)
|
|
272
|
+
if (error.name === "AbortError") {
|
|
273
|
+
const timeoutError = new Error("Request timeout") as ApiError;
|
|
274
|
+
timeoutError.status = 408;
|
|
275
|
+
throw timeoutError;
|
|
276
|
+
}
|
|
277
|
+
|
|
278
|
+
// Handle network errors
|
|
279
|
+
if (
|
|
280
|
+
error.message.includes("Network") ||
|
|
281
|
+
error.message.includes("fetch")
|
|
282
|
+
) {
|
|
283
|
+
const networkError = new Error("Network error") as ApiError;
|
|
284
|
+
networkError.status = 0;
|
|
285
|
+
throw networkError;
|
|
286
|
+
}
|
|
287
|
+
}
|
|
288
|
+
throw error;
|
|
289
|
+
} finally {
|
|
290
|
+
clearTimeout(timeoutId);
|
|
291
|
+
}
|
|
292
|
+
}
|
|
293
|
+
|
|
294
|
+
async get<T>(
|
|
295
|
+
endpoint: string,
|
|
296
|
+
options?: Omit<RequestOptions, "method" | "body">
|
|
297
|
+
) {
|
|
298
|
+
return this.request<T>(endpoint, { ...options, method: "GET" });
|
|
299
|
+
}
|
|
300
|
+
|
|
301
|
+
async post<T>(
|
|
302
|
+
endpoint: string,
|
|
303
|
+
body?: Record<string, unknown>,
|
|
304
|
+
options?: Omit<RequestOptions, "method">
|
|
305
|
+
) {
|
|
306
|
+
return this.request<T>(endpoint, { ...options, method: "POST", body });
|
|
307
|
+
}
|
|
308
|
+
|
|
309
|
+
async put<T>(
|
|
310
|
+
endpoint: string,
|
|
311
|
+
body?: Record<string, unknown>,
|
|
312
|
+
options?: Omit<RequestOptions, "method">
|
|
313
|
+
) {
|
|
314
|
+
return this.request<T>(endpoint, { ...options, method: "PUT", body });
|
|
315
|
+
}
|
|
316
|
+
|
|
317
|
+
async patch<T>(
|
|
318
|
+
endpoint: string,
|
|
319
|
+
body?: Record<string, unknown>,
|
|
320
|
+
options?: Omit<RequestOptions, "method">
|
|
321
|
+
) {
|
|
322
|
+
return this.request<T>(endpoint, { ...options, method: "PATCH", body });
|
|
323
|
+
}
|
|
324
|
+
|
|
325
|
+
async delete<T>(
|
|
326
|
+
endpoint: string,
|
|
327
|
+
options?: Omit<RequestOptions, "method" | "body">
|
|
328
|
+
) {
|
|
329
|
+
return this.request<T>(endpoint, { ...options, method: "DELETE" });
|
|
330
|
+
}
|
|
331
|
+
}
|
|
332
|
+
|
|
333
|
+
// Export singleton instance
|
|
334
|
+
export const api = new ApiClient(API_URL);
|
|
335
|
+
|
|
336
|
+
// Export class for testing or creating additional instances
|
|
337
|
+
export { ApiClient };
|
|
338
|
+
|
|
339
|
+
// Export token utilities for auth hook
|
|
340
|
+
export { getTokens, saveTokens, getValidAccessToken };
|
|
@@ -0,0 +1,333 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Auth Adapter Pattern
|
|
3
|
+
*
|
|
4
|
+
* This module provides an abstraction layer for authentication providers.
|
|
5
|
+
* Replace the mock implementation with your actual provider (Supabase, Firebase, etc.)
|
|
6
|
+
*/
|
|
7
|
+
|
|
8
|
+
import * as SecureStore from "expo-secure-store";
|
|
9
|
+
import type { User, AuthTokens } from "@/types";
|
|
10
|
+
|
|
11
|
+
// ============================================================================
|
|
12
|
+
// Types
|
|
13
|
+
// ============================================================================
|
|
14
|
+
|
|
15
|
+
export interface AuthResult {
|
|
16
|
+
user: User;
|
|
17
|
+
tokens: AuthTokens;
|
|
18
|
+
}
|
|
19
|
+
|
|
20
|
+
export interface AuthError {
|
|
21
|
+
code: string;
|
|
22
|
+
message: string;
|
|
23
|
+
}
|
|
24
|
+
|
|
25
|
+
export interface AuthAdapter {
|
|
26
|
+
/**
|
|
27
|
+
* Sign in with email and password
|
|
28
|
+
*/
|
|
29
|
+
signIn(email: string, password: string): Promise<AuthResult>;
|
|
30
|
+
|
|
31
|
+
/**
|
|
32
|
+
* Sign up with email, password, and name
|
|
33
|
+
*/
|
|
34
|
+
signUp(email: string, password: string, name: string): Promise<AuthResult>;
|
|
35
|
+
|
|
36
|
+
/**
|
|
37
|
+
* Sign out the current user
|
|
38
|
+
*/
|
|
39
|
+
signOut(): Promise<void>;
|
|
40
|
+
|
|
41
|
+
/**
|
|
42
|
+
* Refresh the access token using the refresh token
|
|
43
|
+
*/
|
|
44
|
+
refreshToken(refreshToken: string): Promise<AuthTokens>;
|
|
45
|
+
|
|
46
|
+
/**
|
|
47
|
+
* Send a password reset email
|
|
48
|
+
*/
|
|
49
|
+
forgotPassword(email: string): Promise<void>;
|
|
50
|
+
|
|
51
|
+
/**
|
|
52
|
+
* Reset password with token
|
|
53
|
+
*/
|
|
54
|
+
resetPassword(token: string, newPassword: string): Promise<void>;
|
|
55
|
+
|
|
56
|
+
/**
|
|
57
|
+
* Get current session (useful for providers like Supabase)
|
|
58
|
+
*/
|
|
59
|
+
getSession(): Promise<AuthResult | null>;
|
|
60
|
+
|
|
61
|
+
/**
|
|
62
|
+
* Subscribe to auth state changes (optional)
|
|
63
|
+
*/
|
|
64
|
+
onAuthStateChange?(callback: (user: User | null) => void): () => void;
|
|
65
|
+
}
|
|
66
|
+
|
|
67
|
+
// ============================================================================
|
|
68
|
+
// Mock Implementation (for development/testing)
|
|
69
|
+
// ============================================================================
|
|
70
|
+
|
|
71
|
+
export const mockAuthAdapter: AuthAdapter = {
|
|
72
|
+
async signIn(email: string, password: string): Promise<AuthResult> {
|
|
73
|
+
// Simulate network delay
|
|
74
|
+
await new Promise((resolve) => setTimeout(resolve, 1000));
|
|
75
|
+
|
|
76
|
+
// Simulate validation
|
|
77
|
+
if (!email.includes("@")) {
|
|
78
|
+
throw { code: "invalid_email", message: "Invalid email format" };
|
|
79
|
+
}
|
|
80
|
+
if (password.length < 6) {
|
|
81
|
+
throw { code: "weak_password", message: "Password too short" };
|
|
82
|
+
}
|
|
83
|
+
|
|
84
|
+
return {
|
|
85
|
+
user: {
|
|
86
|
+
id: "mock_user_1",
|
|
87
|
+
email,
|
|
88
|
+
name: email.split("@")[0],
|
|
89
|
+
createdAt: new Date().toISOString(),
|
|
90
|
+
},
|
|
91
|
+
tokens: {
|
|
92
|
+
accessToken: `mock_access_${Date.now()}`,
|
|
93
|
+
refreshToken: `mock_refresh_${Date.now()}`,
|
|
94
|
+
expiresAt: Date.now() + 60 * 60 * 1000, // 1 hour
|
|
95
|
+
},
|
|
96
|
+
};
|
|
97
|
+
},
|
|
98
|
+
|
|
99
|
+
async signUp(
|
|
100
|
+
email: string,
|
|
101
|
+
password: string,
|
|
102
|
+
name: string
|
|
103
|
+
): Promise<AuthResult> {
|
|
104
|
+
await new Promise((resolve) => setTimeout(resolve, 1000));
|
|
105
|
+
|
|
106
|
+
if (!email.includes("@")) {
|
|
107
|
+
throw { code: "invalid_email", message: "Invalid email format" };
|
|
108
|
+
}
|
|
109
|
+
if (password.length < 8) {
|
|
110
|
+
throw {
|
|
111
|
+
code: "weak_password",
|
|
112
|
+
message: "Password must be at least 8 characters",
|
|
113
|
+
};
|
|
114
|
+
}
|
|
115
|
+
|
|
116
|
+
return {
|
|
117
|
+
user: {
|
|
118
|
+
id: "mock_user_new",
|
|
119
|
+
email,
|
|
120
|
+
name,
|
|
121
|
+
createdAt: new Date().toISOString(),
|
|
122
|
+
},
|
|
123
|
+
tokens: {
|
|
124
|
+
accessToken: `mock_access_${Date.now()}`,
|
|
125
|
+
refreshToken: `mock_refresh_${Date.now()}`,
|
|
126
|
+
expiresAt: Date.now() + 60 * 60 * 1000,
|
|
127
|
+
},
|
|
128
|
+
};
|
|
129
|
+
},
|
|
130
|
+
|
|
131
|
+
async signOut(): Promise<void> {
|
|
132
|
+
await new Promise((resolve) => setTimeout(resolve, 500));
|
|
133
|
+
// Clear any stored tokens
|
|
134
|
+
await SecureStore.deleteItemAsync("auth_tokens");
|
|
135
|
+
await SecureStore.deleteItemAsync("auth_user");
|
|
136
|
+
},
|
|
137
|
+
|
|
138
|
+
async refreshToken(refreshToken: string): Promise<AuthTokens> {
|
|
139
|
+
await new Promise((resolve) => setTimeout(resolve, 500));
|
|
140
|
+
|
|
141
|
+
if (!refreshToken) {
|
|
142
|
+
throw { code: "invalid_token", message: "Invalid refresh token" };
|
|
143
|
+
}
|
|
144
|
+
|
|
145
|
+
return {
|
|
146
|
+
accessToken: `mock_access_${Date.now()}`,
|
|
147
|
+
refreshToken: `mock_refresh_${Date.now()}`,
|
|
148
|
+
expiresAt: Date.now() + 60 * 60 * 1000,
|
|
149
|
+
};
|
|
150
|
+
},
|
|
151
|
+
|
|
152
|
+
async forgotPassword(email: string): Promise<void> {
|
|
153
|
+
await new Promise((resolve) => setTimeout(resolve, 1000));
|
|
154
|
+
|
|
155
|
+
if (!email.includes("@")) {
|
|
156
|
+
throw { code: "invalid_email", message: "Invalid email format" };
|
|
157
|
+
}
|
|
158
|
+
|
|
159
|
+
console.log(`[Mock] Password reset email sent to ${email}`);
|
|
160
|
+
},
|
|
161
|
+
|
|
162
|
+
async resetPassword(_token: string, newPassword: string): Promise<void> {
|
|
163
|
+
await new Promise((resolve) => setTimeout(resolve, 1000));
|
|
164
|
+
|
|
165
|
+
if (newPassword.length < 8) {
|
|
166
|
+
throw {
|
|
167
|
+
code: "weak_password",
|
|
168
|
+
message: "Password must be at least 8 characters",
|
|
169
|
+
};
|
|
170
|
+
}
|
|
171
|
+
|
|
172
|
+
console.log("[Mock] Password reset successful");
|
|
173
|
+
},
|
|
174
|
+
|
|
175
|
+
async getSession(): Promise<AuthResult | null> {
|
|
176
|
+
try {
|
|
177
|
+
const storedTokens = await SecureStore.getItemAsync("auth_tokens");
|
|
178
|
+
const storedUser = await SecureStore.getItemAsync("auth_user");
|
|
179
|
+
|
|
180
|
+
if (storedTokens && storedUser) {
|
|
181
|
+
return {
|
|
182
|
+
tokens: JSON.parse(storedTokens),
|
|
183
|
+
user: JSON.parse(storedUser),
|
|
184
|
+
};
|
|
185
|
+
}
|
|
186
|
+
return null;
|
|
187
|
+
} catch {
|
|
188
|
+
return null;
|
|
189
|
+
}
|
|
190
|
+
},
|
|
191
|
+
};
|
|
192
|
+
|
|
193
|
+
// ============================================================================
|
|
194
|
+
// Supabase Implementation Example
|
|
195
|
+
// ============================================================================
|
|
196
|
+
|
|
197
|
+
/**
|
|
198
|
+
* Example Supabase implementation:
|
|
199
|
+
*
|
|
200
|
+
* import { createClient } from "@supabase/supabase-js";
|
|
201
|
+
*
|
|
202
|
+
* const supabase = createClient(
|
|
203
|
+
* process.env.EXPO_PUBLIC_SUPABASE_URL!,
|
|
204
|
+
* process.env.EXPO_PUBLIC_SUPABASE_ANON_KEY!
|
|
205
|
+
* );
|
|
206
|
+
*
|
|
207
|
+
* export const supabaseAuthAdapter: AuthAdapter = {
|
|
208
|
+
* async signIn(email, password) {
|
|
209
|
+
* const { data, error } = await supabase.auth.signInWithPassword({
|
|
210
|
+
* email,
|
|
211
|
+
* password,
|
|
212
|
+
* });
|
|
213
|
+
*
|
|
214
|
+
* if (error) throw { code: error.name, message: error.message };
|
|
215
|
+
*
|
|
216
|
+
* return {
|
|
217
|
+
* user: {
|
|
218
|
+
* id: data.user!.id,
|
|
219
|
+
* email: data.user!.email!,
|
|
220
|
+
* name: data.user!.user_metadata.name || email.split("@")[0],
|
|
221
|
+
* avatar: data.user!.user_metadata.avatar_url,
|
|
222
|
+
* createdAt: data.user!.created_at,
|
|
223
|
+
* },
|
|
224
|
+
* tokens: {
|
|
225
|
+
* accessToken: data.session!.access_token,
|
|
226
|
+
* refreshToken: data.session!.refresh_token,
|
|
227
|
+
* expiresAt: data.session!.expires_at! * 1000,
|
|
228
|
+
* },
|
|
229
|
+
* };
|
|
230
|
+
* },
|
|
231
|
+
*
|
|
232
|
+
* async signUp(email, password, name) {
|
|
233
|
+
* const { data, error } = await supabase.auth.signUp({
|
|
234
|
+
* email,
|
|
235
|
+
* password,
|
|
236
|
+
* options: { data: { name } },
|
|
237
|
+
* });
|
|
238
|
+
*
|
|
239
|
+
* if (error) throw { code: error.name, message: error.message };
|
|
240
|
+
*
|
|
241
|
+
* return {
|
|
242
|
+
* user: {
|
|
243
|
+
* id: data.user!.id,
|
|
244
|
+
* email: data.user!.email!,
|
|
245
|
+
* name,
|
|
246
|
+
* createdAt: data.user!.created_at,
|
|
247
|
+
* },
|
|
248
|
+
* tokens: {
|
|
249
|
+
* accessToken: data.session!.access_token,
|
|
250
|
+
* refreshToken: data.session!.refresh_token,
|
|
251
|
+
* expiresAt: data.session!.expires_at! * 1000,
|
|
252
|
+
* },
|
|
253
|
+
* };
|
|
254
|
+
* },
|
|
255
|
+
*
|
|
256
|
+
* async signOut() {
|
|
257
|
+
* await supabase.auth.signOut();
|
|
258
|
+
* },
|
|
259
|
+
*
|
|
260
|
+
* async refreshToken() {
|
|
261
|
+
* const { data, error } = await supabase.auth.refreshSession();
|
|
262
|
+
* if (error) throw { code: error.name, message: error.message };
|
|
263
|
+
*
|
|
264
|
+
* return {
|
|
265
|
+
* accessToken: data.session!.access_token,
|
|
266
|
+
* refreshToken: data.session!.refresh_token,
|
|
267
|
+
* expiresAt: data.session!.expires_at! * 1000,
|
|
268
|
+
* };
|
|
269
|
+
* },
|
|
270
|
+
*
|
|
271
|
+
* async forgotPassword(email) {
|
|
272
|
+
* const { error } = await supabase.auth.resetPasswordForEmail(email);
|
|
273
|
+
* if (error) throw { code: error.name, message: error.message };
|
|
274
|
+
* },
|
|
275
|
+
*
|
|
276
|
+
* async resetPassword(token, newPassword) {
|
|
277
|
+
* const { error } = await supabase.auth.updateUser({ password: newPassword });
|
|
278
|
+
* if (error) throw { code: error.name, message: error.message };
|
|
279
|
+
* },
|
|
280
|
+
*
|
|
281
|
+
* async getSession() {
|
|
282
|
+
* const { data } = await supabase.auth.getSession();
|
|
283
|
+
* if (!data.session) return null;
|
|
284
|
+
*
|
|
285
|
+
* const { data: userData } = await supabase.auth.getUser();
|
|
286
|
+
*
|
|
287
|
+
* return {
|
|
288
|
+
* user: {
|
|
289
|
+
* id: userData.user!.id,
|
|
290
|
+
* email: userData.user!.email!,
|
|
291
|
+
* name: userData.user!.user_metadata.name,
|
|
292
|
+
* avatar: userData.user!.user_metadata.avatar_url,
|
|
293
|
+
* createdAt: userData.user!.created_at,
|
|
294
|
+
* },
|
|
295
|
+
* tokens: {
|
|
296
|
+
* accessToken: data.session.access_token,
|
|
297
|
+
* refreshToken: data.session.refresh_token,
|
|
298
|
+
* expiresAt: data.session.expires_at! * 1000,
|
|
299
|
+
* },
|
|
300
|
+
* };
|
|
301
|
+
* },
|
|
302
|
+
*
|
|
303
|
+
* onAuthStateChange(callback) {
|
|
304
|
+
* const { data: { subscription } } = supabase.auth.onAuthStateChange(
|
|
305
|
+
* async (event, session) => {
|
|
306
|
+
* if (session) {
|
|
307
|
+
* callback({
|
|
308
|
+
* id: session.user.id,
|
|
309
|
+
* email: session.user.email!,
|
|
310
|
+
* name: session.user.user_metadata.name,
|
|
311
|
+
* avatar: session.user.user_metadata.avatar_url,
|
|
312
|
+
* createdAt: session.user.created_at,
|
|
313
|
+
* });
|
|
314
|
+
* } else {
|
|
315
|
+
* callback(null);
|
|
316
|
+
* }
|
|
317
|
+
* }
|
|
318
|
+
* );
|
|
319
|
+
*
|
|
320
|
+
* return () => subscription.unsubscribe();
|
|
321
|
+
* },
|
|
322
|
+
* };
|
|
323
|
+
*/
|
|
324
|
+
|
|
325
|
+
// ============================================================================
|
|
326
|
+
// Active Adapter
|
|
327
|
+
// ============================================================================
|
|
328
|
+
|
|
329
|
+
/**
|
|
330
|
+
* Change this to use your preferred auth provider
|
|
331
|
+
* Options: mockAuthAdapter, supabaseAuthAdapter, firebaseAuthAdapter, etc.
|
|
332
|
+
*/
|
|
333
|
+
export const authAdapter: AuthAdapter = mockAuthAdapter;
|
|
@@ -0,0 +1,22 @@
|
|
|
1
|
+
export { api, ApiClient } from "./api";
|
|
2
|
+
export { storage, secureStorage } from "./storage";
|
|
3
|
+
export {
|
|
4
|
+
initSentry,
|
|
5
|
+
captureException,
|
|
6
|
+
captureMessage,
|
|
7
|
+
setUser,
|
|
8
|
+
addBreadcrumb,
|
|
9
|
+
} from "./sentry";
|
|
10
|
+
export { authAdapter, mockAuthAdapter } from "./authAdapter";
|
|
11
|
+
export type { AuthAdapter, AuthResult, AuthError } from "./authAdapter";
|
|
12
|
+
export {
|
|
13
|
+
analytics,
|
|
14
|
+
track,
|
|
15
|
+
identify,
|
|
16
|
+
screen,
|
|
17
|
+
resetAnalytics,
|
|
18
|
+
setUserProperties,
|
|
19
|
+
trackRevenue,
|
|
20
|
+
AnalyticsEvents,
|
|
21
|
+
} from "./analytics";
|
|
22
|
+
export type { AnalyticsAdapter, AnalyticsEvent } from "./analytics";
|