@croacroa/react-native-template 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (109) hide show
  1. package/.env.example +18 -0
  2. package/.eslintrc.js +55 -0
  3. package/.github/workflows/ci.yml +184 -0
  4. package/.github/workflows/eas-build.yml +55 -0
  5. package/.github/workflows/eas-update.yml +50 -0
  6. package/.gitignore +62 -0
  7. package/.prettierrc +11 -0
  8. package/.storybook/main.ts +28 -0
  9. package/.storybook/preview.tsx +30 -0
  10. package/CHANGELOG.md +106 -0
  11. package/CONTRIBUTING.md +377 -0
  12. package/README.md +399 -0
  13. package/__tests__/components/Button.test.tsx +74 -0
  14. package/__tests__/hooks/useAuth.test.tsx +499 -0
  15. package/__tests__/services/api.test.ts +535 -0
  16. package/__tests__/utils/cn.test.ts +39 -0
  17. package/app/(auth)/_layout.tsx +36 -0
  18. package/app/(auth)/home.tsx +117 -0
  19. package/app/(auth)/profile.tsx +152 -0
  20. package/app/(auth)/settings.tsx +147 -0
  21. package/app/(public)/_layout.tsx +21 -0
  22. package/app/(public)/forgot-password.tsx +127 -0
  23. package/app/(public)/login.tsx +120 -0
  24. package/app/(public)/onboarding.tsx +5 -0
  25. package/app/(public)/register.tsx +139 -0
  26. package/app/_layout.tsx +97 -0
  27. package/app/index.tsx +21 -0
  28. package/app.config.ts +72 -0
  29. package/assets/images/.gitkeep +7 -0
  30. package/assets/images/adaptive-icon.png +0 -0
  31. package/assets/images/favicon.png +0 -0
  32. package/assets/images/icon.png +0 -0
  33. package/assets/images/notification-icon.png +0 -0
  34. package/assets/images/splash.png +0 -0
  35. package/babel.config.js +10 -0
  36. package/components/ErrorBoundary.tsx +169 -0
  37. package/components/forms/FormInput.tsx +78 -0
  38. package/components/forms/index.ts +1 -0
  39. package/components/onboarding/OnboardingScreen.tsx +370 -0
  40. package/components/onboarding/index.ts +2 -0
  41. package/components/ui/AnimatedButton.tsx +156 -0
  42. package/components/ui/AnimatedCard.tsx +108 -0
  43. package/components/ui/Avatar.tsx +316 -0
  44. package/components/ui/Badge.tsx +416 -0
  45. package/components/ui/BottomSheet.tsx +307 -0
  46. package/components/ui/Button.stories.tsx +115 -0
  47. package/components/ui/Button.tsx +104 -0
  48. package/components/ui/Card.stories.tsx +84 -0
  49. package/components/ui/Card.tsx +32 -0
  50. package/components/ui/Checkbox.tsx +261 -0
  51. package/components/ui/Input.stories.tsx +106 -0
  52. package/components/ui/Input.tsx +117 -0
  53. package/components/ui/Modal.tsx +98 -0
  54. package/components/ui/OptimizedImage.tsx +369 -0
  55. package/components/ui/Select.tsx +240 -0
  56. package/components/ui/Skeleton.tsx +180 -0
  57. package/components/ui/index.ts +18 -0
  58. package/constants/config.ts +54 -0
  59. package/docs/adr/001-state-management.md +79 -0
  60. package/docs/adr/002-styling-approach.md +130 -0
  61. package/docs/adr/003-data-fetching.md +155 -0
  62. package/docs/adr/004-auth-adapter-pattern.md +144 -0
  63. package/docs/adr/README.md +78 -0
  64. package/eas.json +47 -0
  65. package/global.css +10 -0
  66. package/hooks/index.ts +25 -0
  67. package/hooks/useApi.ts +236 -0
  68. package/hooks/useAuth.tsx +290 -0
  69. package/hooks/useBiometrics.ts +295 -0
  70. package/hooks/useDeepLinking.ts +256 -0
  71. package/hooks/useNotifications.ts +138 -0
  72. package/hooks/useOffline.ts +69 -0
  73. package/hooks/usePerformance.ts +434 -0
  74. package/hooks/useTheme.tsx +85 -0
  75. package/hooks/useUpdates.ts +358 -0
  76. package/i18n/index.ts +77 -0
  77. package/i18n/locales/en.json +101 -0
  78. package/i18n/locales/fr.json +101 -0
  79. package/jest.config.js +32 -0
  80. package/maestro/README.md +113 -0
  81. package/maestro/config.yaml +35 -0
  82. package/maestro/flows/login.yaml +62 -0
  83. package/maestro/flows/navigation.yaml +68 -0
  84. package/maestro/flows/offline.yaml +60 -0
  85. package/maestro/flows/register.yaml +94 -0
  86. package/metro.config.js +6 -0
  87. package/nativewind-env.d.ts +1 -0
  88. package/package.json +170 -0
  89. package/scripts/init.ps1 +162 -0
  90. package/scripts/init.sh +174 -0
  91. package/services/analytics.ts +428 -0
  92. package/services/api.ts +340 -0
  93. package/services/authAdapter.ts +333 -0
  94. package/services/index.ts +22 -0
  95. package/services/queryClient.ts +97 -0
  96. package/services/sentry.ts +131 -0
  97. package/services/storage.ts +82 -0
  98. package/stores/appStore.ts +54 -0
  99. package/stores/index.ts +2 -0
  100. package/stores/notificationStore.ts +40 -0
  101. package/tailwind.config.js +47 -0
  102. package/tsconfig.json +26 -0
  103. package/types/index.ts +42 -0
  104. package/types/user.ts +63 -0
  105. package/utils/accessibility.ts +446 -0
  106. package/utils/cn.ts +14 -0
  107. package/utils/index.ts +43 -0
  108. package/utils/toast.ts +113 -0
  109. package/utils/validation.ts +67 -0
@@ -0,0 +1,340 @@
1
+ import * as SecureStore from "expo-secure-store";
2
+ import { router } from "expo-router";
3
+ import Bottleneck from "bottleneck";
4
+ import { API_URL } from "@/constants/config";
5
+ import { toast } from "@/utils/toast";
6
+ import type { AuthTokens } from "@/types";
7
+
8
+ type RequestMethod = "GET" | "POST" | "PUT" | "PATCH" | "DELETE";
9
+
10
+ // ============================================================================
11
+ // Rate Limiting Configuration
12
+ // ============================================================================
13
+
14
+ /**
15
+ * Rate limiter to prevent API abuse and handle rate limiting gracefully
16
+ * - maxConcurrent: Maximum concurrent requests
17
+ * - minTime: Minimum time between requests (ms)
18
+ * - reservoir: Number of requests allowed in the reservoir
19
+ * - reservoirRefreshAmount: How many requests to add on refresh
20
+ * - reservoirRefreshInterval: How often to refresh the reservoir (ms)
21
+ */
22
+ const limiter = new Bottleneck({
23
+ maxConcurrent: 5, // Max 5 concurrent requests
24
+ minTime: 100, // At least 100ms between requests
25
+ reservoir: 50, // 50 requests per interval
26
+ reservoirRefreshAmount: 50,
27
+ reservoirRefreshInterval: 60 * 1000, // Refresh every minute
28
+ });
29
+
30
+ // Track rate limit errors
31
+ let rateLimitRetryAfter = 0;
32
+
33
+ limiter.on("failed", async (error, _jobInfo) => {
34
+ // If we hit a rate limit, wait and retry
35
+ if (error instanceof Error && error.message.includes("429")) {
36
+ const retryAfter = rateLimitRetryAfter || 1000;
37
+ console.warn(`Rate limited, retrying in ${retryAfter}ms`);
38
+ return retryAfter;
39
+ }
40
+ return null;
41
+ });
42
+
43
+ limiter.on("retry", (error, jobInfo) => {
44
+ console.log(`Retrying request (attempt ${jobInfo.retryCount + 1})`);
45
+ });
46
+
47
+ interface RequestOptions {
48
+ method?: RequestMethod;
49
+ body?: Record<string, unknown>;
50
+ headers?: Record<string, string>;
51
+ requiresAuth?: boolean;
52
+ skipRefresh?: boolean;
53
+ }
54
+
55
+ interface ApiError extends Error {
56
+ status: number;
57
+ data?: unknown;
58
+ }
59
+
60
+ const TOKEN_KEY = "auth_tokens";
61
+ const TOKEN_REFRESH_THRESHOLD = 5 * 60 * 1000;
62
+
63
+ // Track if we're currently refreshing to prevent multiple refresh calls
64
+ let isRefreshing = false;
65
+ let refreshPromise: Promise<string | null> | null = null;
66
+
67
+ /**
68
+ * Get current auth tokens from secure storage
69
+ */
70
+ async function getTokens(): Promise<AuthTokens | null> {
71
+ try {
72
+ const stored = await SecureStore.getItemAsync(TOKEN_KEY);
73
+ return stored ? JSON.parse(stored) : null;
74
+ } catch {
75
+ return null;
76
+ }
77
+ }
78
+
79
+ /**
80
+ * Save new tokens to secure storage
81
+ */
82
+ async function saveTokens(tokens: AuthTokens): Promise<void> {
83
+ await SecureStore.setItemAsync(TOKEN_KEY, JSON.stringify(tokens));
84
+ }
85
+
86
+ /**
87
+ * Clear tokens and redirect to login
88
+ */
89
+ async function handleAuthFailure(): Promise<void> {
90
+ await SecureStore.deleteItemAsync(TOKEN_KEY);
91
+ await SecureStore.deleteItemAsync("auth_user");
92
+ toast.error("Session expired", "Please sign in again");
93
+ router.replace("/(public)/login");
94
+ }
95
+
96
+ /**
97
+ * Refresh the access token using the refresh token
98
+ */
99
+ async function refreshAccessToken(): Promise<string | null> {
100
+ // If already refreshing, wait for that request
101
+ if (isRefreshing && refreshPromise) {
102
+ return refreshPromise;
103
+ }
104
+
105
+ isRefreshing = true;
106
+ refreshPromise = (async () => {
107
+ try {
108
+ const tokens = await getTokens();
109
+ if (!tokens?.refreshToken) {
110
+ throw new Error("No refresh token");
111
+ }
112
+
113
+ // TODO: Replace with your actual refresh endpoint
114
+ const response = await fetch(`${API_URL}/auth/refresh`, {
115
+ method: "POST",
116
+ headers: { "Content-Type": "application/json" },
117
+ body: JSON.stringify({ refreshToken: tokens.refreshToken }),
118
+ });
119
+
120
+ if (!response.ok) {
121
+ throw new Error("Refresh failed");
122
+ }
123
+
124
+ const data = await response.json();
125
+ const newTokens: AuthTokens = {
126
+ accessToken: data.accessToken,
127
+ refreshToken: data.refreshToken || tokens.refreshToken,
128
+ expiresAt: Date.now() + (data.expiresIn || 3600) * 1000,
129
+ };
130
+
131
+ await saveTokens(newTokens);
132
+ return newTokens.accessToken;
133
+ } catch (error) {
134
+ console.error("Token refresh failed:", error);
135
+ await handleAuthFailure();
136
+ return null;
137
+ } finally {
138
+ isRefreshing = false;
139
+ refreshPromise = null;
140
+ }
141
+ })();
142
+
143
+ return refreshPromise;
144
+ }
145
+
146
+ /**
147
+ * Get a valid access token, refreshing if necessary
148
+ */
149
+ async function getValidAccessToken(): Promise<string | null> {
150
+ const tokens = await getTokens();
151
+ if (!tokens) return null;
152
+
153
+ // Check if token needs refresh
154
+ const timeUntilExpiry = tokens.expiresAt - Date.now();
155
+ if (timeUntilExpiry < TOKEN_REFRESH_THRESHOLD) {
156
+ return refreshAccessToken();
157
+ }
158
+
159
+ return tokens.accessToken;
160
+ }
161
+
162
+ class ApiClient {
163
+ private baseUrl: string;
164
+ private defaultTimeout: number;
165
+ private enableRateLimiting: boolean;
166
+
167
+ constructor(baseUrl: string, timeout = 30000, enableRateLimiting = true) {
168
+ this.baseUrl = baseUrl;
169
+ this.defaultTimeout = timeout;
170
+ this.enableRateLimiting = enableRateLimiting;
171
+ }
172
+
173
+ /**
174
+ * Execute a request with rate limiting
175
+ */
176
+ private async executeWithRateLimiting<T>(fn: () => Promise<T>): Promise<T> {
177
+ if (!this.enableRateLimiting) {
178
+ return fn();
179
+ }
180
+ return limiter.schedule(fn);
181
+ }
182
+
183
+ private async request<T>(
184
+ endpoint: string,
185
+ options: RequestOptions = {}
186
+ ): Promise<T> {
187
+ const {
188
+ method = "GET",
189
+ body,
190
+ headers = {},
191
+ requiresAuth = true,
192
+ skipRefresh = false,
193
+ } = options;
194
+
195
+ const requestHeaders: Record<string, string> = {
196
+ "Content-Type": "application/json",
197
+ ...headers,
198
+ };
199
+
200
+ // Add auth token if required
201
+ if (requiresAuth) {
202
+ const token = await getValidAccessToken();
203
+ if (token) {
204
+ requestHeaders.Authorization = `Bearer ${token}`;
205
+ }
206
+ }
207
+
208
+ // Setup abort controller for timeout
209
+ const controller = new AbortController();
210
+ const timeoutId = setTimeout(() => controller.abort(), this.defaultTimeout);
211
+
212
+ try {
213
+ const config: RequestInit = {
214
+ method,
215
+ headers: requestHeaders,
216
+ signal: controller.signal,
217
+ };
218
+
219
+ if (body && method !== "GET") {
220
+ config.body = JSON.stringify(body);
221
+ }
222
+
223
+ const response = await this.executeWithRateLimiting(() =>
224
+ fetch(`${this.baseUrl}${endpoint}`, config)
225
+ );
226
+
227
+ // Handle 401 - try refresh once
228
+ if (response.status === 401 && requiresAuth && !skipRefresh) {
229
+ const newToken = await refreshAccessToken();
230
+ if (newToken) {
231
+ // Retry the request with new token
232
+ return this.request(endpoint, { ...options, skipRefresh: true });
233
+ }
234
+ throw new Error("Authentication failed");
235
+ }
236
+
237
+ // Handle rate limiting (429)
238
+ if (response.status === 429) {
239
+ const retryAfter = response.headers.get("Retry-After");
240
+ rateLimitRetryAfter = retryAfter
241
+ ? parseInt(retryAfter, 10) * 1000
242
+ : 1000;
243
+ const error = new Error("Rate limited - too many requests") as ApiError;
244
+ error.status = 429;
245
+ throw error;
246
+ }
247
+
248
+ // Handle other errors
249
+ if (!response.ok) {
250
+ const error = new Error(
251
+ `API Error: ${response.status} ${response.statusText}`
252
+ ) as ApiError;
253
+ error.status = response.status;
254
+ try {
255
+ error.data = await response.json();
256
+ } catch {
257
+ // Response body is not JSON
258
+ }
259
+ throw error;
260
+ }
261
+
262
+ // Handle empty responses
263
+ const text = await response.text();
264
+ if (!text) {
265
+ return {} as T;
266
+ }
267
+
268
+ return JSON.parse(text);
269
+ } catch (error) {
270
+ if (error instanceof Error) {
271
+ // Handle abort (timeout)
272
+ if (error.name === "AbortError") {
273
+ const timeoutError = new Error("Request timeout") as ApiError;
274
+ timeoutError.status = 408;
275
+ throw timeoutError;
276
+ }
277
+
278
+ // Handle network errors
279
+ if (
280
+ error.message.includes("Network") ||
281
+ error.message.includes("fetch")
282
+ ) {
283
+ const networkError = new Error("Network error") as ApiError;
284
+ networkError.status = 0;
285
+ throw networkError;
286
+ }
287
+ }
288
+ throw error;
289
+ } finally {
290
+ clearTimeout(timeoutId);
291
+ }
292
+ }
293
+
294
+ async get<T>(
295
+ endpoint: string,
296
+ options?: Omit<RequestOptions, "method" | "body">
297
+ ) {
298
+ return this.request<T>(endpoint, { ...options, method: "GET" });
299
+ }
300
+
301
+ async post<T>(
302
+ endpoint: string,
303
+ body?: Record<string, unknown>,
304
+ options?: Omit<RequestOptions, "method">
305
+ ) {
306
+ return this.request<T>(endpoint, { ...options, method: "POST", body });
307
+ }
308
+
309
+ async put<T>(
310
+ endpoint: string,
311
+ body?: Record<string, unknown>,
312
+ options?: Omit<RequestOptions, "method">
313
+ ) {
314
+ return this.request<T>(endpoint, { ...options, method: "PUT", body });
315
+ }
316
+
317
+ async patch<T>(
318
+ endpoint: string,
319
+ body?: Record<string, unknown>,
320
+ options?: Omit<RequestOptions, "method">
321
+ ) {
322
+ return this.request<T>(endpoint, { ...options, method: "PATCH", body });
323
+ }
324
+
325
+ async delete<T>(
326
+ endpoint: string,
327
+ options?: Omit<RequestOptions, "method" | "body">
328
+ ) {
329
+ return this.request<T>(endpoint, { ...options, method: "DELETE" });
330
+ }
331
+ }
332
+
333
+ // Export singleton instance
334
+ export const api = new ApiClient(API_URL);
335
+
336
+ // Export class for testing or creating additional instances
337
+ export { ApiClient };
338
+
339
+ // Export token utilities for auth hook
340
+ export { getTokens, saveTokens, getValidAccessToken };
@@ -0,0 +1,333 @@
1
+ /**
2
+ * Auth Adapter Pattern
3
+ *
4
+ * This module provides an abstraction layer for authentication providers.
5
+ * Replace the mock implementation with your actual provider (Supabase, Firebase, etc.)
6
+ */
7
+
8
+ import * as SecureStore from "expo-secure-store";
9
+ import type { User, AuthTokens } from "@/types";
10
+
11
+ // ============================================================================
12
+ // Types
13
+ // ============================================================================
14
+
15
+ export interface AuthResult {
16
+ user: User;
17
+ tokens: AuthTokens;
18
+ }
19
+
20
+ export interface AuthError {
21
+ code: string;
22
+ message: string;
23
+ }
24
+
25
+ export interface AuthAdapter {
26
+ /**
27
+ * Sign in with email and password
28
+ */
29
+ signIn(email: string, password: string): Promise<AuthResult>;
30
+
31
+ /**
32
+ * Sign up with email, password, and name
33
+ */
34
+ signUp(email: string, password: string, name: string): Promise<AuthResult>;
35
+
36
+ /**
37
+ * Sign out the current user
38
+ */
39
+ signOut(): Promise<void>;
40
+
41
+ /**
42
+ * Refresh the access token using the refresh token
43
+ */
44
+ refreshToken(refreshToken: string): Promise<AuthTokens>;
45
+
46
+ /**
47
+ * Send a password reset email
48
+ */
49
+ forgotPassword(email: string): Promise<void>;
50
+
51
+ /**
52
+ * Reset password with token
53
+ */
54
+ resetPassword(token: string, newPassword: string): Promise<void>;
55
+
56
+ /**
57
+ * Get current session (useful for providers like Supabase)
58
+ */
59
+ getSession(): Promise<AuthResult | null>;
60
+
61
+ /**
62
+ * Subscribe to auth state changes (optional)
63
+ */
64
+ onAuthStateChange?(callback: (user: User | null) => void): () => void;
65
+ }
66
+
67
+ // ============================================================================
68
+ // Mock Implementation (for development/testing)
69
+ // ============================================================================
70
+
71
+ export const mockAuthAdapter: AuthAdapter = {
72
+ async signIn(email: string, password: string): Promise<AuthResult> {
73
+ // Simulate network delay
74
+ await new Promise((resolve) => setTimeout(resolve, 1000));
75
+
76
+ // Simulate validation
77
+ if (!email.includes("@")) {
78
+ throw { code: "invalid_email", message: "Invalid email format" };
79
+ }
80
+ if (password.length < 6) {
81
+ throw { code: "weak_password", message: "Password too short" };
82
+ }
83
+
84
+ return {
85
+ user: {
86
+ id: "mock_user_1",
87
+ email,
88
+ name: email.split("@")[0],
89
+ createdAt: new Date().toISOString(),
90
+ },
91
+ tokens: {
92
+ accessToken: `mock_access_${Date.now()}`,
93
+ refreshToken: `mock_refresh_${Date.now()}`,
94
+ expiresAt: Date.now() + 60 * 60 * 1000, // 1 hour
95
+ },
96
+ };
97
+ },
98
+
99
+ async signUp(
100
+ email: string,
101
+ password: string,
102
+ name: string
103
+ ): Promise<AuthResult> {
104
+ await new Promise((resolve) => setTimeout(resolve, 1000));
105
+
106
+ if (!email.includes("@")) {
107
+ throw { code: "invalid_email", message: "Invalid email format" };
108
+ }
109
+ if (password.length < 8) {
110
+ throw {
111
+ code: "weak_password",
112
+ message: "Password must be at least 8 characters",
113
+ };
114
+ }
115
+
116
+ return {
117
+ user: {
118
+ id: "mock_user_new",
119
+ email,
120
+ name,
121
+ createdAt: new Date().toISOString(),
122
+ },
123
+ tokens: {
124
+ accessToken: `mock_access_${Date.now()}`,
125
+ refreshToken: `mock_refresh_${Date.now()}`,
126
+ expiresAt: Date.now() + 60 * 60 * 1000,
127
+ },
128
+ };
129
+ },
130
+
131
+ async signOut(): Promise<void> {
132
+ await new Promise((resolve) => setTimeout(resolve, 500));
133
+ // Clear any stored tokens
134
+ await SecureStore.deleteItemAsync("auth_tokens");
135
+ await SecureStore.deleteItemAsync("auth_user");
136
+ },
137
+
138
+ async refreshToken(refreshToken: string): Promise<AuthTokens> {
139
+ await new Promise((resolve) => setTimeout(resolve, 500));
140
+
141
+ if (!refreshToken) {
142
+ throw { code: "invalid_token", message: "Invalid refresh token" };
143
+ }
144
+
145
+ return {
146
+ accessToken: `mock_access_${Date.now()}`,
147
+ refreshToken: `mock_refresh_${Date.now()}`,
148
+ expiresAt: Date.now() + 60 * 60 * 1000,
149
+ };
150
+ },
151
+
152
+ async forgotPassword(email: string): Promise<void> {
153
+ await new Promise((resolve) => setTimeout(resolve, 1000));
154
+
155
+ if (!email.includes("@")) {
156
+ throw { code: "invalid_email", message: "Invalid email format" };
157
+ }
158
+
159
+ console.log(`[Mock] Password reset email sent to ${email}`);
160
+ },
161
+
162
+ async resetPassword(_token: string, newPassword: string): Promise<void> {
163
+ await new Promise((resolve) => setTimeout(resolve, 1000));
164
+
165
+ if (newPassword.length < 8) {
166
+ throw {
167
+ code: "weak_password",
168
+ message: "Password must be at least 8 characters",
169
+ };
170
+ }
171
+
172
+ console.log("[Mock] Password reset successful");
173
+ },
174
+
175
+ async getSession(): Promise<AuthResult | null> {
176
+ try {
177
+ const storedTokens = await SecureStore.getItemAsync("auth_tokens");
178
+ const storedUser = await SecureStore.getItemAsync("auth_user");
179
+
180
+ if (storedTokens && storedUser) {
181
+ return {
182
+ tokens: JSON.parse(storedTokens),
183
+ user: JSON.parse(storedUser),
184
+ };
185
+ }
186
+ return null;
187
+ } catch {
188
+ return null;
189
+ }
190
+ },
191
+ };
192
+
193
+ // ============================================================================
194
+ // Supabase Implementation Example
195
+ // ============================================================================
196
+
197
+ /**
198
+ * Example Supabase implementation:
199
+ *
200
+ * import { createClient } from "@supabase/supabase-js";
201
+ *
202
+ * const supabase = createClient(
203
+ * process.env.EXPO_PUBLIC_SUPABASE_URL!,
204
+ * process.env.EXPO_PUBLIC_SUPABASE_ANON_KEY!
205
+ * );
206
+ *
207
+ * export const supabaseAuthAdapter: AuthAdapter = {
208
+ * async signIn(email, password) {
209
+ * const { data, error } = await supabase.auth.signInWithPassword({
210
+ * email,
211
+ * password,
212
+ * });
213
+ *
214
+ * if (error) throw { code: error.name, message: error.message };
215
+ *
216
+ * return {
217
+ * user: {
218
+ * id: data.user!.id,
219
+ * email: data.user!.email!,
220
+ * name: data.user!.user_metadata.name || email.split("@")[0],
221
+ * avatar: data.user!.user_metadata.avatar_url,
222
+ * createdAt: data.user!.created_at,
223
+ * },
224
+ * tokens: {
225
+ * accessToken: data.session!.access_token,
226
+ * refreshToken: data.session!.refresh_token,
227
+ * expiresAt: data.session!.expires_at! * 1000,
228
+ * },
229
+ * };
230
+ * },
231
+ *
232
+ * async signUp(email, password, name) {
233
+ * const { data, error } = await supabase.auth.signUp({
234
+ * email,
235
+ * password,
236
+ * options: { data: { name } },
237
+ * });
238
+ *
239
+ * if (error) throw { code: error.name, message: error.message };
240
+ *
241
+ * return {
242
+ * user: {
243
+ * id: data.user!.id,
244
+ * email: data.user!.email!,
245
+ * name,
246
+ * createdAt: data.user!.created_at,
247
+ * },
248
+ * tokens: {
249
+ * accessToken: data.session!.access_token,
250
+ * refreshToken: data.session!.refresh_token,
251
+ * expiresAt: data.session!.expires_at! * 1000,
252
+ * },
253
+ * };
254
+ * },
255
+ *
256
+ * async signOut() {
257
+ * await supabase.auth.signOut();
258
+ * },
259
+ *
260
+ * async refreshToken() {
261
+ * const { data, error } = await supabase.auth.refreshSession();
262
+ * if (error) throw { code: error.name, message: error.message };
263
+ *
264
+ * return {
265
+ * accessToken: data.session!.access_token,
266
+ * refreshToken: data.session!.refresh_token,
267
+ * expiresAt: data.session!.expires_at! * 1000,
268
+ * };
269
+ * },
270
+ *
271
+ * async forgotPassword(email) {
272
+ * const { error } = await supabase.auth.resetPasswordForEmail(email);
273
+ * if (error) throw { code: error.name, message: error.message };
274
+ * },
275
+ *
276
+ * async resetPassword(token, newPassword) {
277
+ * const { error } = await supabase.auth.updateUser({ password: newPassword });
278
+ * if (error) throw { code: error.name, message: error.message };
279
+ * },
280
+ *
281
+ * async getSession() {
282
+ * const { data } = await supabase.auth.getSession();
283
+ * if (!data.session) return null;
284
+ *
285
+ * const { data: userData } = await supabase.auth.getUser();
286
+ *
287
+ * return {
288
+ * user: {
289
+ * id: userData.user!.id,
290
+ * email: userData.user!.email!,
291
+ * name: userData.user!.user_metadata.name,
292
+ * avatar: userData.user!.user_metadata.avatar_url,
293
+ * createdAt: userData.user!.created_at,
294
+ * },
295
+ * tokens: {
296
+ * accessToken: data.session.access_token,
297
+ * refreshToken: data.session.refresh_token,
298
+ * expiresAt: data.session.expires_at! * 1000,
299
+ * },
300
+ * };
301
+ * },
302
+ *
303
+ * onAuthStateChange(callback) {
304
+ * const { data: { subscription } } = supabase.auth.onAuthStateChange(
305
+ * async (event, session) => {
306
+ * if (session) {
307
+ * callback({
308
+ * id: session.user.id,
309
+ * email: session.user.email!,
310
+ * name: session.user.user_metadata.name,
311
+ * avatar: session.user.user_metadata.avatar_url,
312
+ * createdAt: session.user.created_at,
313
+ * });
314
+ * } else {
315
+ * callback(null);
316
+ * }
317
+ * }
318
+ * );
319
+ *
320
+ * return () => subscription.unsubscribe();
321
+ * },
322
+ * };
323
+ */
324
+
325
+ // ============================================================================
326
+ // Active Adapter
327
+ // ============================================================================
328
+
329
+ /**
330
+ * Change this to use your preferred auth provider
331
+ * Options: mockAuthAdapter, supabaseAuthAdapter, firebaseAuthAdapter, etc.
332
+ */
333
+ export const authAdapter: AuthAdapter = mockAuthAdapter;
@@ -0,0 +1,22 @@
1
+ export { api, ApiClient } from "./api";
2
+ export { storage, secureStorage } from "./storage";
3
+ export {
4
+ initSentry,
5
+ captureException,
6
+ captureMessage,
7
+ setUser,
8
+ addBreadcrumb,
9
+ } from "./sentry";
10
+ export { authAdapter, mockAuthAdapter } from "./authAdapter";
11
+ export type { AuthAdapter, AuthResult, AuthError } from "./authAdapter";
12
+ export {
13
+ analytics,
14
+ track,
15
+ identify,
16
+ screen,
17
+ resetAnalytics,
18
+ setUserProperties,
19
+ trackRevenue,
20
+ AnalyticsEvents,
21
+ } from "./analytics";
22
+ export type { AnalyticsAdapter, AnalyticsEvent } from "./analytics";