@passlock/client 2.0.0-beta.1 → 2.0.0-beta.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.d.ts +3 -2
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +2 -1
- package/dist/index.js.map +1 -1
- package/dist/{network.d.ts → internal/network.d.ts} +5 -3
- package/dist/internal/network.d.ts.map +1 -0
- package/dist/{network.js → internal/network.js} +29 -10
- package/dist/internal/network.js.map +1 -0
- package/dist/internal/promise.d.ts.map +1 -0
- package/dist/internal/promise.js.map +1 -0
- package/dist/internal/tenancy.d.ts.map +1 -0
- package/dist/internal/tenancy.js.map +1 -0
- package/dist/logger/index.d.ts +3 -1
- package/dist/logger/index.d.ts.map +1 -1
- package/dist/logger/index.js +8 -3
- package/dist/logger/index.js.map +1 -1
- package/dist/passkey/authentication/index.d.ts +2 -2
- package/dist/passkey/authentication/index.d.ts.map +1 -1
- package/dist/passkey/authentication/index.js +4 -4
- package/dist/passkey/authentication/index.js.map +1 -1
- package/dist/passkey/authentication/micro.d.ts +54 -7
- package/dist/passkey/authentication/micro.d.ts.map +1 -1
- package/dist/passkey/authentication/micro.it.test.d.ts +2 -0
- package/dist/passkey/authentication/micro.it.test.d.ts.map +1 -0
- package/dist/passkey/authentication/micro.it.test.js +74 -0
- package/dist/passkey/authentication/micro.it.test.js.map +1 -0
- package/dist/passkey/authentication/micro.js +98 -31
- package/dist/passkey/authentication/micro.js.map +1 -1
- package/dist/passkey/authentication/micro.test.d.ts +2 -0
- package/dist/passkey/authentication/micro.test.d.ts.map +1 -0
- package/dist/passkey/authentication/micro.test.js +157 -0
- package/dist/passkey/authentication/micro.test.js.map +1 -0
- package/dist/passkey/{shared.d.ts → errors.d.ts} +3 -3
- package/dist/passkey/errors.d.ts.map +1 -0
- package/dist/passkey/{shared.js → errors.js} +3 -3
- package/dist/passkey/errors.js.map +1 -0
- package/dist/passkey/index.d.ts +4 -6
- package/dist/passkey/index.d.ts.map +1 -1
- package/dist/passkey/index.js +4 -4
- package/dist/passkey/index.js.map +1 -1
- package/dist/passkey/registration/index.d.ts +2 -2
- package/dist/passkey/registration/index.d.ts.map +1 -1
- package/dist/passkey/registration/index.js +4 -4
- package/dist/passkey/registration/index.js.map +1 -1
- package/dist/passkey/registration/micro.d.ts +43 -8
- package/dist/passkey/registration/micro.d.ts.map +1 -1
- package/dist/passkey/registration/micro.it.test.d.ts +2 -0
- package/dist/passkey/registration/micro.it.test.d.ts.map +1 -0
- package/dist/passkey/registration/micro.it.test.js +33 -0
- package/dist/passkey/registration/micro.it.test.js.map +1 -0
- package/dist/passkey/registration/micro.js +61 -40
- package/dist/passkey/registration/micro.js.map +1 -1
- package/dist/passkey/registration/micro.test.d.ts +2 -0
- package/dist/passkey/registration/micro.test.d.ts.map +1 -0
- package/dist/passkey/registration/micro.test.js +161 -0
- package/dist/passkey/registration/micro.test.js.map +1 -0
- package/dist/passkey/signals/micro.d.ts +12 -0
- package/dist/passkey/signals/micro.d.ts.map +1 -0
- package/dist/passkey/signals/micro.js +22 -0
- package/dist/passkey/signals/micro.js.map +1 -0
- package/dist/passkey/support.d.ts.map +1 -1
- package/dist/passkey/support.js +1 -1
- package/dist/passkey/support.js.map +1 -1
- package/dist/passkey/types.d.ts.map +1 -1
- package/dist/shared.d.ts.map +1 -1
- package/package.json +21 -25
- package/dist/network.d.ts.map +0 -1
- package/dist/network.js.map +0 -1
- package/dist/passkey/shared.d.ts.map +0 -1
- package/dist/passkey/shared.js.map +0 -1
- package/dist/promise.d.ts.map +0 -1
- package/dist/promise.js.map +0 -1
- package/dist/tenancy.d.ts.map +0 -1
- package/dist/tenancy.js.map +0 -1
- /package/dist/{promise.d.ts → internal/promise.d.ts} +0 -0
- /package/dist/{promise.js → internal/promise.js} +0 -0
- /package/dist/{tenancy.d.ts → internal/tenancy.d.ts} +0 -0
- /package/dist/{tenancy.js → internal/tenancy.js} +0 -0
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"micro.d.ts","sourceRoot":"","sources":["../../../src/passkey/registration/micro.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"micro.d.ts","sourceRoot":"","sources":["../../../src/passkey/registration/micro.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,cAAc,CAAA;AACnD,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,UAAU,CAAA;AAChD,OAAO,KAAK,MAAM,MAAM,yBAAyB,CAAA;AACjD,OAAO,EACL,KAAK,sCAAsC,EAC3C,KAAK,wBAAwB,EAE9B,MAAM,yBAAyB,CAAA;AAChC,OAAO,EAAE,OAAO,EAAE,KAAK,EAAQ,MAAM,QAAQ,CAAA;AAC7C,OAAO,EAAiB,QAAQ,EAAe,KAAK,eAAe,EAAE,MAAM,wBAAwB,CAAA;AACnG,OAAO,EAAE,SAAS,EAAE,MAAM,wBAAwB,CAAA;AAClD,OAAO,EAAE,MAAM,EAAE,MAAM,cAAc,CAAA;AACrC,OAAO,EAAE,iBAAiB,EAAE,wBAAwB,EAAE,MAAM,WAAW,CAAA;AAEvE,UAAU,eAAe;IACvB,YAAY,EAAE,MAAM,CAAA;IACpB,WAAW,EAAE,sCAAsC,CAAA;CACpD;;6BAK4B,OAAO,MAAM,CAAC,uBAAuB;uBAC3C,OAAO,MAAM,CAAC,iBAAiB;;AAJtD,qBAAa,kBAAmB,SAAQ,uBAMrC;IACD,MAAM,CAAC,OAAO;;;MAG+B;CAC9C;AAED,eAAO,MAAM,kBAAkB,GAAI,KAAK,OAAO,KAAG,GAAG,IAAI,qBACnB,CAAA;;;;AAEtC;;;;GAIG;AACH,qBAAa,qBAAsB,SAAQ,2BAAkD;IAC3F,QAAQ,CAAC,OAAO,EAAE,MAAM,CAAA;CACzB,CAAC;IACA,MAAM,CAAC,kBAAkB,QAXa,OAAO,KAAG,GAAG,IAAI,qBAAqB,CAW9B;CAC/C;AAgBD,eAAO,MAAM,iBAAiB,mEAAoE,CAAA;AAElG,MAAM,MAAM,iBAAiB,GAAG,CAAC,OAAO,iBAAiB,CAAC,CAAC,MAAM,CAAC,CAAA;AAElE,MAAM,MAAM,SAAS,GAAG,CAAC,KAAK,EAAE,iBAAiB,KAAK,IAAI,CAAA;AAE1D;;GAEG;AACH,MAAM,WAAW,mBAAoB,SAAQ,eAAe;IAC1D;;;;OAIG;IACH,QAAQ,EAAE,MAAM,CAAA;IAChB;;OAEG;IACH,eAAe,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IACpC;;;OAGG;IACH,MAAM,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IAC3B;;;;;OAKG;IACH,kBAAkB,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,GAAG,SAAS,CAAA;IAC9C;;;;OAIG;IACH,gBAAgB,CAAC,EAAE,gBAAgB,GAAG,SAAS,CAAA;IAC/C;;;;;;OAMG;IACH,OAAO,CAAC,EAAE,SAAS,CAAA;IACnB,OAAO,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;CAC7B;AAED,eAAO,MAAM,YAAY,GAAI,SAAS,IAAI,CAAC,mBAAmB,EAAE,MAAM,eAAe,CAAC,iFAoClF,CAAA;AAEJ,QAAA,MAAM,sBAAsB,EAAG,qBAA8B,CAAA;AAC7D,KAAK,sBAAsB,GAAG,OAAO,sBAAsB,CAAA;AAE3D;;;;;;;;GAQG;AACH,MAAM,WAAW,mBAAmB;IAClC,IAAI,EAAE,sBAAsB,CAAA;IAC5B,SAAS,EAAE;QACT,eAAe,EAAE,MAAM,CAAA;QACvB,MAAM,EAAE,MAAM,CAAA;KACf,CAAA;IACD;;;;;;OAMG;IACH,QAAQ,EAAE,MAAM,CAAA;IAChB;;;;;OAKG;IACH,IAAI,EAAE,MAAM,CAAA;CACb;AAED,eAAO,MAAM,qBAAqB,GAAI,SAAS,OAAO,KAAG,OAAO,IAAI,mBASnE,CAAA;AAED,eAAO,MAAM,iBAAiB,GAC5B,aAAa,sCAAsC,EACnD,aAAa;IAAE,OAAO,CAAC,EAAE,SAAS,GAAG,SAAS,CAAA;CAAE,oJAkC9C,CAAA;AAEJ,eAAO,MAAM,gBAAgB,GAC3B,cAAc,MAAM,EACpB,UAAU,wBAAwB,EAClC,aAAa;IAAE,OAAO,CAAC,EAAE,SAAS,GAAG,SAAS,CAAA;CAAE,qFA6B9C,CAAA;AAEJ;;GAEG;AACH,MAAM,MAAM,iBAAiB,GACzB,wBAAwB,GACxB,qBAAqB,GACrB,iBAAiB,GACjB,eAAe,CAAA;AAEnB;;;;;GAKG;AACH,eAAO,MAAM,eAAe,GAC1B,SAAS,mBAAmB,KAC3B,KAAK,CAAC,KAAK,CAAC,mBAAmB,EAAE,iBAAiB,EAAE,MAAM,GAAG,kBAAkB,CAkBjF,CAAA"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"micro.it.test.d.ts","sourceRoot":"","sources":["../../../src/passkey/registration/micro.it.test.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,33 @@
|
|
|
1
|
+
import { Micro, pipe } from "effect";
|
|
2
|
+
import { describe, expect, it } from "vitest";
|
|
3
|
+
import { Endpoint } from "../../internal/network";
|
|
4
|
+
import { TenancyId } from "../../internal/tenancy";
|
|
5
|
+
import { Logger } from "../../logger";
|
|
6
|
+
import { fetchOptions } from "./micro";
|
|
7
|
+
describe(fetchOptions.name, () => {
|
|
8
|
+
const tenancyId = "itTenancy";
|
|
9
|
+
const username = "jdoe@gmail.com";
|
|
10
|
+
const userDisplayName = "John Doe";
|
|
11
|
+
const loggerTest = {
|
|
12
|
+
logDebug: () => Micro.void,
|
|
13
|
+
logError: () => Micro.void,
|
|
14
|
+
logInfo: () => Micro.void,
|
|
15
|
+
logWarn: () => Micro.void,
|
|
16
|
+
};
|
|
17
|
+
const endpoint = pipe(Micro.sync(() => process.env.PASSLOCK_ENDPOINT ?? "http://localhost:3000"), Micro.map((endpoint) => ({ endpoint })));
|
|
18
|
+
it("should fetch options from the int test env", async () => {
|
|
19
|
+
const { optionsJSON, sessionToken } = await pipe(fetchOptions({ userDisplayName, username }), Micro.provideServiceEffect(Endpoint, endpoint), Micro.provideService(Logger, loggerTest), Micro.provideService(TenancyId, { tenancyId }), Micro.runPromise);
|
|
20
|
+
expect(sessionToken).toEqual(expect.any(String));
|
|
21
|
+
expect(optionsJSON.challenge).toEqual(expect.any(String));
|
|
22
|
+
expect(optionsJSON.rp.name).toEqual("passlock.dev");
|
|
23
|
+
expect(optionsJSON.rp.id).toEqual("localhost");
|
|
24
|
+
expect(optionsJSON.user.name).toEqual(username);
|
|
25
|
+
expect(optionsJSON.user.displayName).toEqual(userDisplayName);
|
|
26
|
+
const { authenticatorSelection } = optionsJSON;
|
|
27
|
+
expect(authenticatorSelection?.residentKey).toEqual("preferred");
|
|
28
|
+
expect(authenticatorSelection?.userVerification).toEqual("preferred");
|
|
29
|
+
expect(authenticatorSelection?.authenticatorAttachment).toEqual("platform");
|
|
30
|
+
expect(authenticatorSelection?.requireResidentKey).toEqual(false);
|
|
31
|
+
});
|
|
32
|
+
});
|
|
33
|
+
//# sourceMappingURL=micro.it.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"micro.it.test.js","sourceRoot":"","sources":["../../../src/passkey/registration/micro.it.test.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,EAAE,IAAI,EAAE,MAAM,QAAQ,CAAA;AACpC,OAAO,EAAE,QAAQ,EAAE,MAAM,EAAE,EAAE,EAAE,MAAM,QAAQ,CAAA;AAC7C,OAAO,EAAE,QAAQ,EAAE,MAAM,wBAAwB,CAAA;AACjD,OAAO,EAAE,SAAS,EAAE,MAAM,wBAAwB,CAAA;AAClD,OAAO,EAAE,MAAM,EAAE,MAAM,cAAc,CAAA;AACrC,OAAO,EAAE,YAAY,EAAE,MAAM,SAAS,CAAA;AAEtC,QAAQ,CAAC,YAAY,CAAC,IAAI,EAAE,GAAG,EAAE;IAC/B,MAAM,SAAS,GAAG,WAAW,CAAA;IAC7B,MAAM,QAAQ,GAAG,gBAAgB,CAAA;IACjC,MAAM,eAAe,GAAG,UAAU,CAAA;IAElC,MAAM,UAAU,GAAG;QACjB,QAAQ,EAAE,GAAG,EAAE,CAAC,KAAK,CAAC,IAAI;QAC1B,QAAQ,EAAE,GAAG,EAAE,CAAC,KAAK,CAAC,IAAI;QAC1B,OAAO,EAAE,GAAG,EAAE,CAAC,KAAK,CAAC,IAAI;QACzB,OAAO,EAAE,GAAG,EAAE,CAAC,KAAK,CAAC,IAAI;KACM,CAAA;IAEjC,MAAM,QAAQ,GAAG,IAAI,CACnB,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,CAAC,OAAO,CAAC,GAAG,CAAC,iBAAiB,IAAI,uBAAuB,CAAC,EAC1E,KAAK,CAAC,GAAG,CAAC,CAAC,QAAQ,EAAE,EAAE,CAAC,CAAC,EAAE,QAAQ,EAAE,CAAC,CAAC,CACxC,CAAA;IAED,EAAE,CAAC,4CAA4C,EAAE,KAAK,IAAI,EAAE;QAC1D,MAAM,EAAE,WAAW,EAAE,YAAY,EAAE,GAAG,MAAM,IAAI,CAC9C,YAAY,CAAC,EAAE,eAAe,EAAE,QAAQ,EAAE,CAAC,EAC3C,KAAK,CAAC,oBAAoB,CAAC,QAAQ,EAAE,QAAQ,CAAC,EAC9C,KAAK,CAAC,cAAc,CAAC,MAAM,EAAE,UAAU,CAAC,EACxC,KAAK,CAAC,cAAc,CAAC,SAAS,EAAE,EAAE,SAAS,EAAE,CAAC,EAC9C,KAAK,CAAC,UAAU,CACjB,CAAA;QAED,MAAM,CAAC,YAAY,CAAC,CAAC,OAAO,CAAC,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,CAAA;QAChD,MAAM,CAAC,WAAW,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,CAAA;QACzD,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,OAAO,CAAC,cAAc,CAAC,CAAA;QACnD,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,OAAO,CAAC,WAAW,CAAC,CAAA;QAC9C,MAAM,CAAC,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAA;QAC/C,MAAM,CAAC,WAAW,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,OAAO,CAAC,eAAe,CAAC,CAAA;QAE7D,MAAM,EAAE,sBAAsB,EAAE,GAAG,WAAW,CAAA;QAC9C,MAAM,CAAC,sBAAsB,EAAE,WAAW,CAAC,CAAC,OAAO,CAAC,WAAW,CAAC,CAAA;QAChE,MAAM,CAAC,sBAAsB,EAAE,gBAAgB,CAAC,CAAC,OAAO,CAAC,WAAW,CAAC,CAAA;QACrE,MAAM,CAAC,sBAAsB,EAAE,uBAAuB,CAAC,CAAC,OAAO,CAAC,UAAU,CAAC,CAAA;QAC3E,MAAM,CAAC,sBAAsB,EAAE,kBAAkB,CAAC,CAAC,OAAO,CAAC,KAAK,CAAC,CAAA;IACnE,CAAC,CAAC,CAAA;AACJ,CAAC,CAAC,CAAA"}
|
|
@@ -1,18 +1,24 @@
|
|
|
1
|
-
import
|
|
2
|
-
import {
|
|
3
|
-
import {
|
|
4
|
-
import { buildEndpoint, Endpoint, makeRequest
|
|
5
|
-
import {
|
|
6
|
-
import {} from "../../shared";
|
|
1
|
+
import * as Helper from "@simplewebauthn/browser";
|
|
2
|
+
import { WebAuthnError, } from "@simplewebauthn/browser";
|
|
3
|
+
import { Context, Micro, pipe } from "effect";
|
|
4
|
+
import { buildEndpoint, Endpoint, makeRequest } from "../../internal/network";
|
|
5
|
+
import { TenancyId } from "../../internal/tenancy";
|
|
7
6
|
import { Logger } from "../../logger";
|
|
8
|
-
|
|
7
|
+
import { OtherPasskeyError, PasskeysUnsupportedError } from "../errors";
|
|
8
|
+
export class RegistrationHelper extends Context.Tag("RegistrationHelper")() {
|
|
9
|
+
static Default = {
|
|
10
|
+
browserSupportsWebAuthn: Helper.browserSupportsWebAuthn,
|
|
11
|
+
startRegistration: Helper.startRegistration,
|
|
12
|
+
};
|
|
13
|
+
}
|
|
14
|
+
export const isDuplicatePasskey = (err) => err instanceof DuplicatePasskeyError;
|
|
9
15
|
/**
|
|
10
16
|
* Raised if excludeCredentials or userId was provided and the
|
|
11
17
|
* device recognises one of the passkey ids i.e. the user currently
|
|
12
18
|
* has a passkey registered on the current device for a given userId.
|
|
13
19
|
*/
|
|
14
20
|
export class DuplicatePasskeyError extends Micro.TaggedError("@error/DuplicatePasskeyError") {
|
|
15
|
-
static
|
|
21
|
+
static isDuplicatePasskey = isDuplicatePasskey;
|
|
16
22
|
}
|
|
17
23
|
const isOptionsResponse = (payload) => {
|
|
18
24
|
if (typeof payload !== "object")
|
|
@@ -31,24 +37,28 @@ const isOptionsResponse = (payload) => {
|
|
|
31
37
|
return false;
|
|
32
38
|
return true;
|
|
33
39
|
};
|
|
34
|
-
const
|
|
40
|
+
export const registrationEvent = ["optionsRequest", "createCredential", "saveCredential"];
|
|
41
|
+
export const fetchOptions = (options) => Micro.gen(function* () {
|
|
35
42
|
const logger = yield* Micro.service(Logger);
|
|
36
43
|
const { endpoint } = yield* Micro.service(Endpoint);
|
|
37
44
|
const { tenancyId } = yield* Micro.service(TenancyId);
|
|
45
|
+
const { username, userDisplayName, userId, excludeCredentials, userVerification, timeout, onEvent, } = options;
|
|
38
46
|
const url = new URL(`${tenancyId}/passkey/registration/options`, endpoint);
|
|
47
|
+
onEvent?.("optionsRequest");
|
|
39
48
|
yield* logger.logInfo("Fetching passkey registration options from Passlock");
|
|
49
|
+
const payload = {
|
|
50
|
+
excludeCredentials,
|
|
51
|
+
timeout,
|
|
52
|
+
userDisplayName,
|
|
53
|
+
userId,
|
|
54
|
+
username,
|
|
55
|
+
userVerification,
|
|
56
|
+
};
|
|
40
57
|
return yield* makeRequest({
|
|
41
|
-
url,
|
|
42
|
-
payload: {
|
|
43
|
-
username,
|
|
44
|
-
userDisplayName,
|
|
45
|
-
userId,
|
|
46
|
-
excludeCredentials,
|
|
47
|
-
userVerification,
|
|
48
|
-
timeout,
|
|
49
|
-
},
|
|
50
|
-
responsePredicate: isOptionsResponse,
|
|
51
58
|
label: "registration options",
|
|
59
|
+
payload,
|
|
60
|
+
responsePredicate: isOptionsResponse,
|
|
61
|
+
url,
|
|
52
62
|
});
|
|
53
63
|
});
|
|
54
64
|
const RegistrationSuccessTag = "RegistrationSuccess";
|
|
@@ -65,31 +75,17 @@ export const isRegistrationSuccess = (payload) => {
|
|
|
65
75
|
return false;
|
|
66
76
|
return true;
|
|
67
77
|
};
|
|
68
|
-
const
|
|
69
|
-
|
|
70
|
-
const { endpoint } = yield* Micro.service(Endpoint);
|
|
71
|
-
const { tenancyId } = yield* Micro.service(TenancyId);
|
|
72
|
-
const url = new URL(`${tenancyId}/passkey/registration/verification`, endpoint);
|
|
73
|
-
yield* logger.logInfo("Registering passkey in Passlock vault");
|
|
74
|
-
const registrationResponse = yield* makeRequest({
|
|
75
|
-
url,
|
|
76
|
-
payload: { sessionToken, response },
|
|
77
|
-
responsePredicate: isRegistrationSuccess,
|
|
78
|
-
label: "registration verification",
|
|
79
|
-
});
|
|
80
|
-
yield* logger.logInfo(`Passkey registered with id ${registrationResponse.principal.authenticatorId}`);
|
|
81
|
-
return registrationResponse;
|
|
82
|
-
});
|
|
83
|
-
const startRegistration = (optionsJSON) => Micro.gen(function* () {
|
|
78
|
+
export const startRegistration = (optionsJSON, { onEvent }) => Micro.gen(function* () {
|
|
79
|
+
onEvent?.("createCredential");
|
|
84
80
|
const logger = yield* Micro.service(Logger);
|
|
85
81
|
yield* logger.logInfo("Registering passkey on device");
|
|
86
|
-
const
|
|
82
|
+
const helper = yield* Micro.service(RegistrationHelper);
|
|
83
|
+
const isSupport = helper.browserSupportsWebAuthn();
|
|
87
84
|
if (!isSupport)
|
|
88
85
|
yield* new PasskeysUnsupportedError({
|
|
89
86
|
message: "Device does not support passkeys",
|
|
90
87
|
});
|
|
91
88
|
return yield* Micro.tryPromise({
|
|
92
|
-
try: () => simpleRegistration({ optionsJSON }),
|
|
93
89
|
catch: (error) => {
|
|
94
90
|
if (error instanceof WebAuthnError &&
|
|
95
91
|
error.code === "ERROR_AUTHENTICATOR_PREVIOUSLY_REGISTERED") {
|
|
@@ -97,16 +93,37 @@ const startRegistration = (optionsJSON) => Micro.gen(function* () {
|
|
|
97
93
|
}
|
|
98
94
|
else if (error instanceof WebAuthnError) {
|
|
99
95
|
return new OtherPasskeyError({
|
|
96
|
+
code: error.code,
|
|
100
97
|
error: error.cause,
|
|
101
98
|
message: error.message,
|
|
102
|
-
code: error.code,
|
|
103
99
|
});
|
|
104
100
|
}
|
|
105
101
|
else {
|
|
106
102
|
return new OtherPasskeyError({ error, message: "Unexpected error" });
|
|
107
103
|
}
|
|
108
104
|
},
|
|
105
|
+
try: () => helper.startRegistration({ optionsJSON }),
|
|
106
|
+
});
|
|
107
|
+
});
|
|
108
|
+
export const verifyCredential = (sessionToken, response, { onEvent }) => Micro.gen(function* () {
|
|
109
|
+
const logger = yield* Micro.service(Logger);
|
|
110
|
+
const { endpoint } = yield* Micro.service(Endpoint);
|
|
111
|
+
const { tenancyId } = yield* Micro.service(TenancyId);
|
|
112
|
+
const url = new URL(`${tenancyId}/passkey/registration/verification`, endpoint);
|
|
113
|
+
onEvent?.("saveCredential");
|
|
114
|
+
yield* logger.logInfo("Registering passkey in Passlock vault");
|
|
115
|
+
const payload = {
|
|
116
|
+
response,
|
|
117
|
+
sessionToken,
|
|
118
|
+
};
|
|
119
|
+
const registrationResponse = yield* makeRequest({
|
|
120
|
+
label: "registration verification",
|
|
121
|
+
payload,
|
|
122
|
+
responsePredicate: isRegistrationSuccess,
|
|
123
|
+
url,
|
|
109
124
|
});
|
|
125
|
+
yield* logger.logInfo(`Passkey registered with id ${registrationResponse.principal.authenticatorId}`);
|
|
126
|
+
return registrationResponse;
|
|
110
127
|
});
|
|
111
128
|
/**
|
|
112
129
|
* Register a passkey on the local device and store the
|
|
@@ -118,8 +135,12 @@ export const registerPasskey = (options) => {
|
|
|
118
135
|
const endpoint = buildEndpoint(options);
|
|
119
136
|
const effect = Micro.gen(function* () {
|
|
120
137
|
const { sessionToken, optionsJSON } = yield* fetchOptions(options);
|
|
121
|
-
const response = yield* startRegistration(optionsJSON
|
|
122
|
-
|
|
138
|
+
const response = yield* startRegistration(optionsJSON, {
|
|
139
|
+
onEvent: options.onEvent,
|
|
140
|
+
});
|
|
141
|
+
return yield* verifyCredential(sessionToken, response, {
|
|
142
|
+
onEvent: options.onEvent,
|
|
143
|
+
});
|
|
123
144
|
});
|
|
124
145
|
return pipe(effect, Micro.provideService(TenancyId, options), Micro.provideService(Endpoint, endpoint));
|
|
125
146
|
};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"micro.js","sourceRoot":"","sources":["../../../src/passkey/registration/micro.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"micro.js","sourceRoot":"","sources":["../../../src/passkey/registration/micro.ts"],"names":[],"mappings":"AAEA,OAAO,KAAK,MAAM,MAAM,yBAAyB,CAAA;AACjD,OAAO,EAGL,aAAa,GACd,MAAM,yBAAyB,CAAA;AAChC,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,IAAI,EAAE,MAAM,QAAQ,CAAA;AAC7C,OAAO,EAAE,aAAa,EAAE,QAAQ,EAAE,WAAW,EAAwB,MAAM,wBAAwB,CAAA;AACnG,OAAO,EAAE,SAAS,EAAE,MAAM,wBAAwB,CAAA;AAClD,OAAO,EAAE,MAAM,EAAE,MAAM,cAAc,CAAA;AACrC,OAAO,EAAE,iBAAiB,EAAE,wBAAwB,EAAE,MAAM,WAAW,CAAA;AAOvE,MAAM,OAAO,kBAAmB,SAAQ,OAAO,CAAC,GAAG,CAAC,oBAAoB,CAAC,EAMtE;IACD,MAAM,CAAC,OAAO,GAAG;QACf,uBAAuB,EAAE,MAAM,CAAC,uBAAuB;QACvD,iBAAiB,EAAE,MAAM,CAAC,iBAAiB;KACA,CAAA;;AAG/C,MAAM,CAAC,MAAM,kBAAkB,GAAG,CAAC,GAAY,EAAgC,EAAE,CAC/E,GAAG,YAAY,qBAAqB,CAAA;AAEtC;;;;GAIG;AACH,MAAM,OAAO,qBAAsB,SAAQ,KAAK,CAAC,WAAW,CAAC,8BAA8B,CAEzF;IACA,MAAM,CAAC,kBAAkB,GAAG,kBAAkB,CAAA;;AAGhD,MAAM,iBAAiB,GAAG,CAAC,OAAgB,EAA8B,EAAE;IACzE,IAAI,OAAO,OAAO,KAAK,QAAQ;QAAE,OAAO,KAAK,CAAA;IAC7C,IAAI,OAAO,KAAK,IAAI;QAAE,OAAO,KAAK,CAAA;IAElC,IAAI,CAAC,CAAC,aAAa,IAAI,OAAO,CAAC;QAAE,OAAO,KAAK,CAAA;IAC7C,IAAI,OAAO,OAAO,CAAC,WAAW,KAAK,QAAQ;QAAE,OAAO,KAAK,CAAA;IACzD,IAAI,OAAO,CAAC,WAAW,KAAK,IAAI;QAAE,OAAO,KAAK,CAAA;IAE9C,IAAI,CAAC,CAAC,cAAc,IAAI,OAAO,CAAC;QAAE,OAAO,KAAK,CAAA;IAC9C,IAAI,OAAO,OAAO,CAAC,YAAY,KAAK,QAAQ;QAAE,OAAO,KAAK,CAAA;IAE1D,OAAO,IAAI,CAAA;AACb,CAAC,CAAA;AAED,MAAM,CAAC,MAAM,iBAAiB,GAAG,CAAC,gBAAgB,EAAE,kBAAkB,EAAE,gBAAgB,CAAU,CAAA;AAiDlG,MAAM,CAAC,MAAM,YAAY,GAAG,CAAC,OAAyD,EAAE,EAAE,CACxF,KAAK,CAAC,GAAG,CAAC,QAAQ,CAAC;IACjB,MAAM,MAAM,GAAG,KAAK,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,MAAM,CAAC,CAAA;IAC3C,MAAM,EAAE,QAAQ,EAAE,GAAG,KAAK,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAA;IACnD,MAAM,EAAE,SAAS,EAAE,GAAG,KAAK,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;IAErD,MAAM,EACJ,QAAQ,EACR,eAAe,EACf,MAAM,EACN,kBAAkB,EAClB,gBAAgB,EAChB,OAAO,EACP,OAAO,GACR,GAAG,OAAO,CAAA;IAEX,MAAM,GAAG,GAAG,IAAI,GAAG,CAAC,GAAG,SAAS,+BAA+B,EAAE,QAAQ,CAAC,CAAA;IAE1E,OAAO,EAAE,CAAC,gBAAgB,CAAC,CAAA;IAC3B,KAAK,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,qDAAqD,CAAC,CAAA;IAE5E,MAAM,OAAO,GAAG;QACd,kBAAkB;QAClB,OAAO;QACP,eAAe;QACf,MAAM;QACN,QAAQ;QACR,gBAAgB;KACjB,CAAA;IAED,OAAO,KAAK,CAAC,CAAC,WAAW,CAAC;QACxB,KAAK,EAAE,sBAAsB;QAC7B,OAAO;QACP,iBAAiB,EAAE,iBAAiB;QACpC,GAAG;KACJ,CAAC,CAAA;AACJ,CAAC,CAAC,CAAA;AAEJ,MAAM,sBAAsB,GAAG,qBAA8B,CAAA;AAmC7D,MAAM,CAAC,MAAM,qBAAqB,GAAG,CAAC,OAAgB,EAAkC,EAAE;IACxF,IAAI,OAAO,OAAO,KAAK,QAAQ;QAAE,OAAO,KAAK,CAAA;IAC7C,IAAI,OAAO,KAAK,IAAI;QAAE,OAAO,KAAK,CAAA;IAElC,IAAI,CAAC,CAAC,MAAM,IAAI,OAAO,CAAC;QAAE,OAAO,KAAK,CAAA;IACtC,IAAI,OAAO,OAAO,CAAC,IAAI,KAAK,QAAQ;QAAE,OAAO,KAAK,CAAA;IAClD,IAAI,OAAO,CAAC,IAAI,KAAK,sBAAsB;QAAE,OAAO,KAAK,CAAA;IAEzD,OAAO,IAAI,CAAA;AACb,CAAC,CAAA;AAED,MAAM,CAAC,MAAM,iBAAiB,GAAG,CAC/B,WAAmD,EACnD,EAAE,OAAO,EAAuC,EAChD,EAAE,CACF,KAAK,CAAC,GAAG,CAAC,QAAQ,CAAC;IACjB,OAAO,EAAE,CAAC,kBAAkB,CAAC,CAAA;IAC7B,MAAM,MAAM,GAAG,KAAK,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,MAAM,CAAC,CAAA;IAC3C,KAAK,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,+BAA+B,CAAC,CAAA;IAEtD,MAAM,MAAM,GAAG,KAAK,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,kBAAkB,CAAC,CAAA;IAEvD,MAAM,SAAS,GAAG,MAAM,CAAC,uBAAuB,EAAE,CAAA;IAClD,IAAI,CAAC,SAAS;QACZ,KAAK,CAAC,CAAC,IAAI,wBAAwB,CAAC;YAClC,OAAO,EAAE,kCAAkC;SAC5C,CAAC,CAAA;IAEJ,OAAO,KAAK,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC;QAC7B,KAAK,EAAE,CAAC,KAAK,EAAE,EAAE;YACf,IACE,KAAK,YAAY,aAAa;gBAC9B,KAAK,CAAC,IAAI,KAAK,2CAA2C,EAC1D,CAAC;gBACD,OAAO,IAAI,qBAAqB,CAAC,EAAE,OAAO,EAAE,KAAK,CAAC,OAAO,EAAE,CAAC,CAAA;YAC9D,CAAC;iBAAM,IAAI,KAAK,YAAY,aAAa,EAAE,CAAC;gBAC1C,OAAO,IAAI,iBAAiB,CAAC;oBAC3B,IAAI,EAAE,KAAK,CAAC,IAAI;oBAChB,KAAK,EAAE,KAAK,CAAC,KAAK;oBAClB,OAAO,EAAE,KAAK,CAAC,OAAO;iBACvB,CAAC,CAAA;YACJ,CAAC;iBAAM,CAAC;gBACN,OAAO,IAAI,iBAAiB,CAAC,EAAE,KAAK,EAAE,OAAO,EAAE,kBAAkB,EAAE,CAAC,CAAA;YACtE,CAAC;QACH,CAAC;QACD,GAAG,EAAE,GAAG,EAAE,CAAC,MAAM,CAAC,iBAAiB,CAAC,EAAE,WAAW,EAAE,CAAC;KACrD,CAAC,CAAA;AACJ,CAAC,CAAC,CAAA;AAEJ,MAAM,CAAC,MAAM,gBAAgB,GAAG,CAC9B,YAAoB,EACpB,QAAkC,EAClC,EAAE,OAAO,EAAuC,EAChD,EAAE,CACF,KAAK,CAAC,GAAG,CAAC,QAAQ,CAAC;IACjB,MAAM,MAAM,GAAG,KAAK,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,MAAM,CAAC,CAAA;IAC3C,MAAM,EAAE,QAAQ,EAAE,GAAG,KAAK,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAA;IACnD,MAAM,EAAE,SAAS,EAAE,GAAG,KAAK,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;IAErD,MAAM,GAAG,GAAG,IAAI,GAAG,CAAC,GAAG,SAAS,oCAAoC,EAAE,QAAQ,CAAC,CAAA;IAE/E,OAAO,EAAE,CAAC,gBAAgB,CAAC,CAAA;IAC3B,KAAK,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,uCAAuC,CAAC,CAAA;IAE9D,MAAM,OAAO,GAAG;QACd,QAAQ;QACR,YAAY;KACb,CAAA;IAED,MAAM,oBAAoB,GAAG,KAAK,CAAC,CAAC,WAAW,CAAC;QAC9C,KAAK,EAAE,2BAA2B;QAClC,OAAO;QACP,iBAAiB,EAAE,qBAAqB;QACxC,GAAG;KACJ,CAAC,CAAA;IAEF,KAAK,CAAC,CAAC,MAAM,CAAC,OAAO,CACnB,8BAA8B,oBAAoB,CAAC,SAAS,CAAC,eAAe,EAAE,CAC/E,CAAA;IAED,OAAO,oBAAoB,CAAA;AAC7B,CAAC,CAAC,CAAA;AAWJ;;;;;GAKG;AACH,MAAM,CAAC,MAAM,eAAe,GAAG,CAC7B,OAA4B,EACsD,EAAE;IACpF,MAAM,QAAQ,GAAG,aAAa,CAAC,OAAO,CAAC,CAAA;IAEvC,MAAM,MAAM,GAAG,KAAK,CAAC,GAAG,CAAC,QAAQ,CAAC;QAChC,MAAM,EAAE,YAAY,EAAE,WAAW,EAAE,GAAG,KAAK,CAAC,CAAC,YAAY,CAAC,OAAO,CAAC,CAAA;QAClE,MAAM,QAAQ,GAAG,KAAK,CAAC,CAAC,iBAAiB,CAAC,WAAW,EAAE;YACrD,OAAO,EAAE,OAAO,CAAC,OAAO;SACzB,CAAC,CAAA;QACF,OAAO,KAAK,CAAC,CAAC,gBAAgB,CAAC,YAAY,EAAE,QAAQ,EAAE;YACrD,OAAO,EAAE,OAAO,CAAC,OAAO;SACzB,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF,OAAO,IAAI,CACT,MAAM,EACN,KAAK,CAAC,cAAc,CAAC,SAAS,EAAE,OAAO,CAAC,EACxC,KAAK,CAAC,cAAc,CAAC,QAAQ,EAAE,QAAQ,CAAC,CACzC,CAAA;AACH,CAAC,CAAA"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"micro.test.d.ts","sourceRoot":"","sources":["../../../src/passkey/registration/micro.test.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,161 @@
|
|
|
1
|
+
import fetchMock from "@fetch-mock/vitest";
|
|
2
|
+
import { Context, Micro, pipe } from "effect";
|
|
3
|
+
import { afterAll, describe, expect, it, vi } from "vitest";
|
|
4
|
+
import { Endpoint } from "../../internal/network";
|
|
5
|
+
import { TenancyId } from "../../internal/tenancy";
|
|
6
|
+
import { Logger } from "../../logger";
|
|
7
|
+
import { PasskeysUnsupportedError } from "../errors";
|
|
8
|
+
import { fetchOptions, RegistrationHelper, registerPasskey, startRegistration, verifyCredential, } from "./micro";
|
|
9
|
+
const loggerTest = {
|
|
10
|
+
logDebug: () => Micro.void,
|
|
11
|
+
logError: () => Micro.void,
|
|
12
|
+
logInfo: () => Micro.void,
|
|
13
|
+
logWarn: () => Micro.void,
|
|
14
|
+
};
|
|
15
|
+
describe(fetchOptions.name, () => {
|
|
16
|
+
const endpoint = "https://api.passlock.dev";
|
|
17
|
+
const tenancyId = "dummyTenancyId";
|
|
18
|
+
const username = "dummyUsername";
|
|
19
|
+
const userDisplayName = "dummyDisplayName";
|
|
20
|
+
const userId = "dummyUserId";
|
|
21
|
+
const ctx = pipe(Context.make(Endpoint, { endpoint }), Context.add(Logger, loggerTest), Context.add(TenancyId, { tenancyId }));
|
|
22
|
+
const expectedRoute = `${endpoint}/${tenancyId}/passkey/registration/options`;
|
|
23
|
+
const mockResponse = {
|
|
24
|
+
optionsJSON: {},
|
|
25
|
+
sessionToken: "dummySessionToken",
|
|
26
|
+
};
|
|
27
|
+
describe("given an empty set of options", () => {
|
|
28
|
+
it("should fetch some PublicKeyCredentialCreationOptions", async () => {
|
|
29
|
+
fetchMock.mockGlobal().postOnce(expectedRoute, mockResponse);
|
|
30
|
+
const result = await pipe(fetchOptions({ username }), Micro.provideContext(ctx), Micro.runPromise);
|
|
31
|
+
expect(result.sessionToken).toBeTruthy();
|
|
32
|
+
expect(result.optionsJSON).toBeTruthy();
|
|
33
|
+
});
|
|
34
|
+
});
|
|
35
|
+
describe("given a username", () => {
|
|
36
|
+
it("should send it to the backend", async () => {
|
|
37
|
+
fetchMock.mockGlobal().postOnce(expectedRoute, mockResponse);
|
|
38
|
+
await pipe(fetchOptions({ username }), Micro.provideContext(ctx), Micro.runPromise);
|
|
39
|
+
expect(fetchMock).toHavePosted(expectedRoute, { body: { username } });
|
|
40
|
+
});
|
|
41
|
+
});
|
|
42
|
+
describe("given a userDisplayName", () => {
|
|
43
|
+
it("should send it to the backend", async () => {
|
|
44
|
+
fetchMock.mockGlobal().postOnce(expectedRoute, mockResponse);
|
|
45
|
+
await pipe(fetchOptions({ userDisplayName, username }), Micro.provideContext(ctx), Micro.runPromise);
|
|
46
|
+
expect(fetchMock).toHavePosted(expectedRoute, {
|
|
47
|
+
body: { userDisplayName, username },
|
|
48
|
+
});
|
|
49
|
+
});
|
|
50
|
+
});
|
|
51
|
+
describe("given a userId", () => {
|
|
52
|
+
it("should send it to the backend", async () => {
|
|
53
|
+
fetchMock.mockGlobal().postOnce(expectedRoute, mockResponse);
|
|
54
|
+
await pipe(fetchOptions({ userId, username }), Micro.provideContext(ctx), Micro.runPromise);
|
|
55
|
+
expect(fetchMock).toHavePosted(expectedRoute, {
|
|
56
|
+
body: { userId, username },
|
|
57
|
+
});
|
|
58
|
+
});
|
|
59
|
+
});
|
|
60
|
+
describe("given a list of excludeCredentials", () => {
|
|
61
|
+
const excludeCredentials = ["dummyCredential"];
|
|
62
|
+
it("should send them to the backend", async () => {
|
|
63
|
+
fetchMock.mockGlobal().postOnce(expectedRoute, mockResponse);
|
|
64
|
+
await pipe(fetchOptions({ excludeCredentials, username }), Micro.provideContext(ctx), Micro.runPromise);
|
|
65
|
+
expect(fetchMock).toHavePosted(expectedRoute, {
|
|
66
|
+
body: { excludeCredentials, username },
|
|
67
|
+
});
|
|
68
|
+
});
|
|
69
|
+
});
|
|
70
|
+
describe("given a userVerification", () => {
|
|
71
|
+
const userVerification = "required";
|
|
72
|
+
it("should send it to the backend", async () => {
|
|
73
|
+
fetchMock.mockGlobal().postOnce(expectedRoute, mockResponse);
|
|
74
|
+
await pipe(fetchOptions({ username, userVerification }), Micro.provideContext(ctx), Micro.runPromise);
|
|
75
|
+
expect(fetchMock).toHavePosted(expectedRoute, {
|
|
76
|
+
body: { username, userVerification },
|
|
77
|
+
});
|
|
78
|
+
});
|
|
79
|
+
});
|
|
80
|
+
it("should invoke the onEvent handler", async () => {
|
|
81
|
+
fetchMock.mockGlobal().postOnce(expectedRoute, mockResponse);
|
|
82
|
+
const onEvent = vi.fn();
|
|
83
|
+
await pipe(fetchOptions({ onEvent, username }), Micro.provideContext(ctx), Micro.runPromise);
|
|
84
|
+
expect(onEvent).toHaveBeenCalledWith("optionsRequest");
|
|
85
|
+
});
|
|
86
|
+
});
|
|
87
|
+
describe(startRegistration.name, () => {
|
|
88
|
+
describe("given valid options", () => {
|
|
89
|
+
const registrationHelperTest = {
|
|
90
|
+
browserSupportsWebAuthn: () => true,
|
|
91
|
+
startRegistration: () => Promise.resolve({}),
|
|
92
|
+
};
|
|
93
|
+
it("should invoke the underlying startRegistration function", async () => {
|
|
94
|
+
await pipe(startRegistration({}, {}), Micro.provideService(Logger, loggerTest), Micro.provideService(RegistrationHelper, registrationHelperTest), Micro.runPromise);
|
|
95
|
+
});
|
|
96
|
+
});
|
|
97
|
+
describe("if the device does not support passkeys", () => {
|
|
98
|
+
const registrationHelperTest = {
|
|
99
|
+
browserSupportsWebAuthn: () => false,
|
|
100
|
+
startRegistration: () => Promise.resolve({}),
|
|
101
|
+
};
|
|
102
|
+
it("should return an error", async () => {
|
|
103
|
+
const result = await pipe(startRegistration({}, {}), Micro.flip, Micro.provideService(Logger, loggerTest), Micro.provideService(RegistrationHelper, registrationHelperTest), Micro.runPromise);
|
|
104
|
+
expect(result).toBeInstanceOf(PasskeysUnsupportedError);
|
|
105
|
+
});
|
|
106
|
+
});
|
|
107
|
+
});
|
|
108
|
+
describe(verifyCredential.name, () => {
|
|
109
|
+
const endpoint = "https://api.passlock.dev";
|
|
110
|
+
const tenancyId = "dummyTenancyId";
|
|
111
|
+
const ctx = pipe(Context.make(Endpoint, { endpoint }), Context.add(Logger, loggerTest), Context.add(TenancyId, { tenancyId }));
|
|
112
|
+
const expectedRoute = `${endpoint}/${tenancyId}/passkey/registration/verification`;
|
|
113
|
+
describe("when the passkey exists", () => {
|
|
114
|
+
const mockResponse = {
|
|
115
|
+
_tag: "RegistrationSuccess",
|
|
116
|
+
code: "dummyCode",
|
|
117
|
+
id_token: "dummyIdToken",
|
|
118
|
+
principal: {
|
|
119
|
+
authenticatorId: "dummyPasskeyId",
|
|
120
|
+
},
|
|
121
|
+
};
|
|
122
|
+
it("should return a successful response", async () => {
|
|
123
|
+
fetchMock.mockGlobal().postOnce(expectedRoute, mockResponse);
|
|
124
|
+
const result = await pipe(verifyCredential("dummySessionToken", {}, {}), Micro.provideContext(ctx), Micro.runPromise);
|
|
125
|
+
expect(result).toStrictEqual(mockResponse);
|
|
126
|
+
});
|
|
127
|
+
});
|
|
128
|
+
});
|
|
129
|
+
describe(registerPasskey.name, () => {
|
|
130
|
+
const endpoint = "https://api.passlock.dev";
|
|
131
|
+
const tenancyId = "dummyTenancyId";
|
|
132
|
+
const username = "dummyUsername";
|
|
133
|
+
const registrationHelperTest = {
|
|
134
|
+
browserSupportsWebAuthn: () => true,
|
|
135
|
+
startRegistration: () => Promise.resolve({}),
|
|
136
|
+
};
|
|
137
|
+
const ctx = pipe(Context.make(Endpoint, { endpoint }), Context.add(Logger, loggerTest), Context.add(TenancyId, { tenancyId }), Context.add(RegistrationHelper, registrationHelperTest));
|
|
138
|
+
const optionsRoute = `${endpoint}/${tenancyId}/passkey/registration/options`;
|
|
139
|
+
const optionsResponse = {
|
|
140
|
+
optionsJSON: {},
|
|
141
|
+
sessionToken: "dummySessionToken",
|
|
142
|
+
};
|
|
143
|
+
const verificationRoute = `${endpoint}/${tenancyId}/passkey/registration/verification`;
|
|
144
|
+
const verificationResponse = {
|
|
145
|
+
_tag: "RegistrationSuccess",
|
|
146
|
+
code: "dummyCode",
|
|
147
|
+
id_token: "dummyIdToken",
|
|
148
|
+
principal: {
|
|
149
|
+
authenticatorId: "dummyPasskeyId",
|
|
150
|
+
},
|
|
151
|
+
};
|
|
152
|
+
it("should fetch the options and kick off the registration", async () => {
|
|
153
|
+
fetchMock.mockGlobal().postOnce(optionsRoute, optionsResponse);
|
|
154
|
+
fetchMock.mockGlobal().postOnce(verificationRoute, verificationResponse);
|
|
155
|
+
pipe(registerPasskey({ tenancyId, username }), Micro.provideContext(ctx), Micro.runPromise);
|
|
156
|
+
});
|
|
157
|
+
});
|
|
158
|
+
afterAll(() => {
|
|
159
|
+
fetchMock.unmockGlobal();
|
|
160
|
+
});
|
|
161
|
+
//# sourceMappingURL=micro.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"micro.test.js","sourceRoot":"","sources":["../../../src/passkey/registration/micro.test.ts"],"names":[],"mappings":"AAIA,OAAO,SAAS,MAAM,oBAAoB,CAAA;AAC1C,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,IAAI,EAAE,MAAM,QAAQ,CAAA;AAC7C,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,MAAM,EAAE,EAAE,EAAE,EAAE,EAAE,MAAM,QAAQ,CAAA;AAC3D,OAAO,EAAE,QAAQ,EAAE,MAAM,wBAAwB,CAAA;AACjD,OAAO,EAAE,SAAS,EAAE,MAAM,wBAAwB,CAAA;AAClD,OAAO,EAAE,MAAM,EAAE,MAAM,cAAc,CAAA;AACrC,OAAO,EAAE,wBAAwB,EAAE,MAAM,WAAW,CAAA;AACpD,OAAO,EACL,YAAY,EACZ,kBAAkB,EAClB,eAAe,EACf,iBAAiB,EACjB,gBAAgB,GACjB,MAAM,SAAS,CAAA;AAEhB,MAAM,UAAU,GAAG;IACjB,QAAQ,EAAE,GAAG,EAAE,CAAC,KAAK,CAAC,IAAI;IAC1B,QAAQ,EAAE,GAAG,EAAE,CAAC,KAAK,CAAC,IAAI;IAC1B,OAAO,EAAE,GAAG,EAAE,CAAC,KAAK,CAAC,IAAI;IACzB,OAAO,EAAE,GAAG,EAAE,CAAC,KAAK,CAAC,IAAI;CACM,CAAA;AAEjC,QAAQ,CAAC,YAAY,CAAC,IAAI,EAAE,GAAG,EAAE;IAC/B,MAAM,QAAQ,GAAG,0BAA0B,CAAA;IAC3C,MAAM,SAAS,GAAG,gBAAgB,CAAA;IAClC,MAAM,QAAQ,GAAG,eAAe,CAAA;IAChC,MAAM,eAAe,GAAG,kBAAkB,CAAA;IAC1C,MAAM,MAAM,GAAG,aAAa,CAAA;IAE5B,MAAM,GAAG,GAAG,IAAI,CACd,OAAO,CAAC,IAAI,CAAC,QAAQ,EAAE,EAAE,QAAQ,EAAE,CAAC,EACpC,OAAO,CAAC,GAAG,CAAC,MAAM,EAAE,UAAU,CAAC,EAC/B,OAAO,CAAC,GAAG,CAAC,SAAS,EAAE,EAAE,SAAS,EAAE,CAAC,CACtC,CAAA;IAED,MAAM,aAAa,GAAG,GAAG,QAAQ,IAAI,SAAS,+BAA+B,CAAA;IAE7E,MAAM,YAAY,GAAG;QACnB,WAAW,EAAE,EAAE;QACf,YAAY,EAAE,mBAAmB;KAClC,CAAA;IAED,QAAQ,CAAC,+BAA+B,EAAE,GAAG,EAAE;QAC7C,EAAE,CAAC,sDAAsD,EAAE,KAAK,IAAI,EAAE;YACpE,SAAS,CAAC,UAAU,EAAE,CAAC,QAAQ,CAAC,aAAa,EAAE,YAAY,CAAC,CAAA;YAE5D,MAAM,MAAM,GAAG,MAAM,IAAI,CACvB,YAAY,CAAC,EAAE,QAAQ,EAAE,CAAC,EAC1B,KAAK,CAAC,cAAc,CAAC,GAAG,CAAC,EACzB,KAAK,CAAC,UAAU,CACjB,CAAA;YAED,MAAM,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,UAAU,EAAE,CAAA;YACxC,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC,UAAU,EAAE,CAAA;QACzC,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF,QAAQ,CAAC,kBAAkB,EAAE,GAAG,EAAE;QAChC,EAAE,CAAC,+BAA+B,EAAE,KAAK,IAAI,EAAE;YAC7C,SAAS,CAAC,UAAU,EAAE,CAAC,QAAQ,CAAC,aAAa,EAAE,YAAY,CAAC,CAAA;YAE5D,MAAM,IAAI,CAAC,YAAY,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,KAAK,CAAC,cAAc,CAAC,GAAG,CAAC,EAAE,KAAK,CAAC,UAAU,CAAC,CAAA;YAEnF,MAAM,CAAC,SAAS,CAAC,CAAC,YAAY,CAAC,aAAa,EAAE,EAAE,IAAI,EAAE,EAAE,QAAQ,EAAE,EAAE,CAAC,CAAA;QACvE,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF,QAAQ,CAAC,yBAAyB,EAAE,GAAG,EAAE;QACvC,EAAE,CAAC,+BAA+B,EAAE,KAAK,IAAI,EAAE;YAC7C,SAAS,CAAC,UAAU,EAAE,CAAC,QAAQ,CAAC,aAAa,EAAE,YAAY,CAAC,CAAA;YAE5D,MAAM,IAAI,CACR,YAAY,CAAC,EAAE,eAAe,EAAE,QAAQ,EAAE,CAAC,EAC3C,KAAK,CAAC,cAAc,CAAC,GAAG,CAAC,EACzB,KAAK,CAAC,UAAU,CACjB,CAAA;YAED,MAAM,CAAC,SAAS,CAAC,CAAC,YAAY,CAAC,aAAa,EAAE;gBAC5C,IAAI,EAAE,EAAE,eAAe,EAAE,QAAQ,EAAE;aACpC,CAAC,CAAA;QACJ,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF,QAAQ,CAAC,gBAAgB,EAAE,GAAG,EAAE;QAC9B,EAAE,CAAC,+BAA+B,EAAE,KAAK,IAAI,EAAE;YAC7C,SAAS,CAAC,UAAU,EAAE,CAAC,QAAQ,CAAC,aAAa,EAAE,YAAY,CAAC,CAAA;YAE5D,MAAM,IAAI,CAAC,YAAY,CAAC,EAAE,MAAM,EAAE,QAAQ,EAAE,CAAC,EAAE,KAAK,CAAC,cAAc,CAAC,GAAG,CAAC,EAAE,KAAK,CAAC,UAAU,CAAC,CAAA;YAE3F,MAAM,CAAC,SAAS,CAAC,CAAC,YAAY,CAAC,aAAa,EAAE;gBAC5C,IAAI,EAAE,EAAE,MAAM,EAAE,QAAQ,EAAE;aAC3B,CAAC,CAAA;QACJ,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF,QAAQ,CAAC,oCAAoC,EAAE,GAAG,EAAE;QAClD,MAAM,kBAAkB,GAAG,CAAC,iBAAiB,CAAC,CAAA;QAE9C,EAAE,CAAC,iCAAiC,EAAE,KAAK,IAAI,EAAE;YAC/C,SAAS,CAAC,UAAU,EAAE,CAAC,QAAQ,CAAC,aAAa,EAAE,YAAY,CAAC,CAAA;YAE5D,MAAM,IAAI,CACR,YAAY,CAAC,EAAE,kBAAkB,EAAE,QAAQ,EAAE,CAAC,EAC9C,KAAK,CAAC,cAAc,CAAC,GAAG,CAAC,EACzB,KAAK,CAAC,UAAU,CACjB,CAAA;YAED,MAAM,CAAC,SAAS,CAAC,CAAC,YAAY,CAAC,aAAa,EAAE;gBAC5C,IAAI,EAAE,EAAE,kBAAkB,EAAE,QAAQ,EAAE;aACvC,CAAC,CAAA;QACJ,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF,QAAQ,CAAC,0BAA0B,EAAE,GAAG,EAAE;QACxC,MAAM,gBAAgB,GAAG,UAAmB,CAAA;QAE5C,EAAE,CAAC,+BAA+B,EAAE,KAAK,IAAI,EAAE;YAC7C,SAAS,CAAC,UAAU,EAAE,CAAC,QAAQ,CAAC,aAAa,EAAE,YAAY,CAAC,CAAA;YAE5D,MAAM,IAAI,CACR,YAAY,CAAC,EAAE,QAAQ,EAAE,gBAAgB,EAAE,CAAC,EAC5C,KAAK,CAAC,cAAc,CAAC,GAAG,CAAC,EACzB,KAAK,CAAC,UAAU,CACjB,CAAA;YAED,MAAM,CAAC,SAAS,CAAC,CAAC,YAAY,CAAC,aAAa,EAAE;gBAC5C,IAAI,EAAE,EAAE,QAAQ,EAAE,gBAAgB,EAAE;aACrC,CAAC,CAAA;QACJ,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,mCAAmC,EAAE,KAAK,IAAI,EAAE;QACjD,SAAS,CAAC,UAAU,EAAE,CAAC,QAAQ,CAAC,aAAa,EAAE,YAAY,CAAC,CAAA;QAE5D,MAAM,OAAO,GAAG,EAAE,CAAC,EAAE,EAAE,CAAA;QAEvB,MAAM,IAAI,CAAC,YAAY,CAAC,EAAE,OAAO,EAAE,QAAQ,EAAE,CAAC,EAAE,KAAK,CAAC,cAAc,CAAC,GAAG,CAAC,EAAE,KAAK,CAAC,UAAU,CAAC,CAAA;QAE5F,MAAM,CAAC,OAAO,CAAC,CAAC,oBAAoB,CAAC,gBAAgB,CAAC,CAAA;IACxD,CAAC,CAAC,CAAA;AACJ,CAAC,CAAC,CAAA;AAEF,QAAQ,CAAC,iBAAiB,CAAC,IAAI,EAAE,GAAG,EAAE;IACpC,QAAQ,CAAC,qBAAqB,EAAE,GAAG,EAAE;QACnC,MAAM,sBAAsB,GAAG;YAC7B,uBAAuB,EAAE,GAAG,EAAE,CAAC,IAAI;YACnC,iBAAiB,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,OAAO,CAAC,EAA8B,CAAC;SAC7B,CAAA;QAE7C,EAAE,CAAC,yDAAyD,EAAE,KAAK,IAAI,EAAE;YACvE,MAAM,IAAI,CACR,iBAAiB,CAAC,EAA4C,EAAE,EAAE,CAAC,EACnE,KAAK,CAAC,cAAc,CAAC,MAAM,EAAE,UAAU,CAAC,EACxC,KAAK,CAAC,cAAc,CAAC,kBAAkB,EAAE,sBAAsB,CAAC,EAChE,KAAK,CAAC,UAAU,CACjB,CAAA;QACH,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;IAEF,QAAQ,CAAC,yCAAyC,EAAE,GAAG,EAAE;QACvD,MAAM,sBAAsB,GAAG;YAC7B,uBAAuB,EAAE,GAAG,EAAE,CAAC,KAAK;YACpC,iBAAiB,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,OAAO,CAAC,EAA8B,CAAC;SAC7B,CAAA;QAE7C,EAAE,CAAC,wBAAwB,EAAE,KAAK,IAAI,EAAE;YACtC,MAAM,MAAM,GAAG,MAAM,IAAI,CACvB,iBAAiB,CAAC,EAA4C,EAAE,EAAE,CAAC,EACnE,KAAK,CAAC,IAAI,EACV,KAAK,CAAC,cAAc,CAAC,MAAM,EAAE,UAAU,CAAC,EACxC,KAAK,CAAC,cAAc,CAAC,kBAAkB,EAAE,sBAAsB,CAAC,EAChE,KAAK,CAAC,UAAU,CACjB,CAAA;YAED,MAAM,CAAC,MAAM,CAAC,CAAC,cAAc,CAAC,wBAAwB,CAAC,CAAA;QACzD,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;AACJ,CAAC,CAAC,CAAA;AAEF,QAAQ,CAAC,gBAAgB,CAAC,IAAI,EAAE,GAAG,EAAE;IACnC,MAAM,QAAQ,GAAG,0BAA0B,CAAA;IAC3C,MAAM,SAAS,GAAG,gBAAgB,CAAA;IAElC,MAAM,GAAG,GAAG,IAAI,CACd,OAAO,CAAC,IAAI,CAAC,QAAQ,EAAE,EAAE,QAAQ,EAAE,CAAC,EACpC,OAAO,CAAC,GAAG,CAAC,MAAM,EAAE,UAAU,CAAC,EAC/B,OAAO,CAAC,GAAG,CAAC,SAAS,EAAE,EAAE,SAAS,EAAE,CAAC,CACtC,CAAA;IAED,MAAM,aAAa,GAAG,GAAG,QAAQ,IAAI,SAAS,oCAAoC,CAAA;IAElF,QAAQ,CAAC,yBAAyB,EAAE,GAAG,EAAE;QACvC,MAAM,YAAY,GAAG;YACnB,IAAI,EAAE,qBAAqB;YAC3B,IAAI,EAAE,WAAW;YACjB,QAAQ,EAAE,cAAc;YACxB,SAAS,EAAE;gBACT,eAAe,EAAE,gBAAgB;aAClC;SACF,CAAA;QAED,EAAE,CAAC,qCAAqC,EAAE,KAAK,IAAI,EAAE;YACnD,SAAS,CAAC,UAAU,EAAE,CAAC,QAAQ,CAAC,aAAa,EAAE,YAAY,CAAC,CAAA;YAE5D,MAAM,MAAM,GAAG,MAAM,IAAI,CACvB,gBAAgB,CAAC,mBAAmB,EAAE,EAA8B,EAAE,EAAE,CAAC,EACzE,KAAK,CAAC,cAAc,CAAC,GAAG,CAAC,EACzB,KAAK,CAAC,UAAU,CACjB,CAAA;YAED,MAAM,CAAC,MAAM,CAAC,CAAC,aAAa,CAAC,YAAY,CAAC,CAAA;QAC5C,CAAC,CAAC,CAAA;IACJ,CAAC,CAAC,CAAA;AACJ,CAAC,CAAC,CAAA;AAEF,QAAQ,CAAC,eAAe,CAAC,IAAI,EAAE,GAAG,EAAE;IAClC,MAAM,QAAQ,GAAG,0BAA0B,CAAA;IAC3C,MAAM,SAAS,GAAG,gBAAgB,CAAA;IAClC,MAAM,QAAQ,GAAG,eAAe,CAAA;IAEhC,MAAM,sBAAsB,GAAG;QAC7B,uBAAuB,EAAE,GAAG,EAAE,CAAC,IAAI;QACnC,iBAAiB,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,OAAO,CAAC,EAA8B,CAAC;KAC7B,CAAA;IAE7C,MAAM,GAAG,GAAG,IAAI,CACd,OAAO,CAAC,IAAI,CAAC,QAAQ,EAAE,EAAE,QAAQ,EAAE,CAAC,EACpC,OAAO,CAAC,GAAG,CAAC,MAAM,EAAE,UAAU,CAAC,EAC/B,OAAO,CAAC,GAAG,CAAC,SAAS,EAAE,EAAE,SAAS,EAAE,CAAC,EACrC,OAAO,CAAC,GAAG,CAAC,kBAAkB,EAAE,sBAAsB,CAAC,CACxD,CAAA;IAED,MAAM,YAAY,GAAG,GAAG,QAAQ,IAAI,SAAS,+BAA+B,CAAA;IAE5E,MAAM,eAAe,GAAG;QACtB,WAAW,EAAE,EAAE;QACf,YAAY,EAAE,mBAAmB;KAClC,CAAA;IAED,MAAM,iBAAiB,GAAG,GAAG,QAAQ,IAAI,SAAS,oCAAoC,CAAA;IAEtF,MAAM,oBAAoB,GAAG;QAC3B,IAAI,EAAE,qBAAqB;QAC3B,IAAI,EAAE,WAAW;QACjB,QAAQ,EAAE,cAAc;QACxB,SAAS,EAAE;YACT,eAAe,EAAE,gBAAgB;SAClC;KACF,CAAA;IAED,EAAE,CAAC,wDAAwD,EAAE,KAAK,IAAI,EAAE;QACtE,SAAS,CAAC,UAAU,EAAE,CAAC,QAAQ,CAAC,YAAY,EAAE,eAAe,CAAC,CAAA;QAC9D,SAAS,CAAC,UAAU,EAAE,CAAC,QAAQ,CAAC,iBAAiB,EAAE,oBAAoB,CAAC,CAAA;QAExE,IAAI,CAAC,eAAe,CAAC,EAAE,SAAS,EAAE,QAAQ,EAAE,CAAC,EAAE,KAAK,CAAC,cAAc,CAAC,GAAG,CAAC,EAAE,KAAK,CAAC,UAAU,CAAC,CAAA;IAC7F,CAAC,CAAC,CAAA;AACJ,CAAC,CAAC,CAAA;AAEF,QAAQ,CAAC,GAAG,EAAE;IACZ,SAAS,CAAC,YAAY,EAAE,CAAA;AAC1B,CAAC,CAAC,CAAA"}
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
import { Micro } from "effect";
|
|
2
|
+
import { Logger } from "../../logger";
|
|
3
|
+
/**
|
|
4
|
+
* Tell the client device to remove a given credential
|
|
5
|
+
* @param error
|
|
6
|
+
* @returns
|
|
7
|
+
*/
|
|
8
|
+
export declare const signalCredentialRemoval: (credential: {
|
|
9
|
+
credentialId: string;
|
|
10
|
+
rpId: string;
|
|
11
|
+
}) => Micro.Micro<void, never, Logger>;
|
|
12
|
+
//# sourceMappingURL=micro.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"micro.d.ts","sourceRoot":"","sources":["../../../src/passkey/signals/micro.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,EAAQ,MAAM,QAAQ,CAAA;AACpC,OAAO,EAAE,MAAM,EAAE,MAAM,cAAc,CAAA;AAErC;;;;GAIG;AACH,eAAO,MAAM,uBAAuB,GAAI,YAAY;IAClD,YAAY,EAAE,MAAM,CAAA;IACpB,IAAI,EAAE,MAAM,CAAA;CACb,KAAG,KAAK,CAAC,KAAK,CAAC,IAAI,EAAE,KAAK,EAAE,MAAM,CAwBhC,CAAA"}
|
|
@@ -0,0 +1,22 @@
|
|
|
1
|
+
import { Micro, pipe } from "effect";
|
|
2
|
+
import { Logger } from "../../logger";
|
|
3
|
+
/**
|
|
4
|
+
* Tell the client device to remove a given credential
|
|
5
|
+
* @param error
|
|
6
|
+
* @returns
|
|
7
|
+
*/
|
|
8
|
+
export const signalCredentialRemoval = (credential) => pipe(Micro.gen(function* () {
|
|
9
|
+
const logger = yield* Micro.service(Logger);
|
|
10
|
+
// might not be defined in older browsers
|
|
11
|
+
if (typeof PublicKeyCredential.signalUnknownCredential === "function") {
|
|
12
|
+
yield* logger.logInfo("Signalling browser to remove passkey");
|
|
13
|
+
yield* pipe(Micro.tryPromise({
|
|
14
|
+
catch: (err) => err,
|
|
15
|
+
try: () => PublicKeyCredential.signalUnknownCredential(credential),
|
|
16
|
+
}), Micro.catchAll((err) => err instanceof Error
|
|
17
|
+
? logger.logWarn(err.message)
|
|
18
|
+
: logger.logWarn("Unable to signal credential removal")));
|
|
19
|
+
yield* logger.logInfo("Passkey removed");
|
|
20
|
+
}
|
|
21
|
+
}));
|
|
22
|
+
//# sourceMappingURL=micro.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"micro.js","sourceRoot":"","sources":["../../../src/passkey/signals/micro.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,EAAE,IAAI,EAAE,MAAM,QAAQ,CAAA;AACpC,OAAO,EAAE,MAAM,EAAE,MAAM,cAAc,CAAA;AAErC;;;;GAIG;AACH,MAAM,CAAC,MAAM,uBAAuB,GAAG,CAAC,UAGvC,EAAoC,EAAE,CACrC,IAAI,CACF,KAAK,CAAC,GAAG,CAAC,QAAQ,CAAC;IACjB,MAAM,MAAM,GAAG,KAAK,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,MAAM,CAAC,CAAA;IAE3C,yCAAyC;IACzC,IAAI,OAAO,mBAAmB,CAAC,uBAAuB,KAAK,UAAU,EAAE,CAAC;QACtE,KAAK,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,sCAAsC,CAAC,CAAA;QAE7D,KAAK,CAAC,CAAC,IAAI,CACT,KAAK,CAAC,UAAU,CAAC;YACf,KAAK,EAAE,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG;YACnB,GAAG,EAAE,GAAG,EAAE,CAAC,mBAAmB,CAAC,uBAAuB,CAAC,UAAU,CAAC;SACnE,CAAC,EACF,KAAK,CAAC,QAAQ,CAAC,CAAC,GAAG,EAAE,EAAE,CACrB,GAAG,YAAY,KAAK;YAClB,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,GAAG,CAAC,OAAO,CAAC;YAC7B,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,qCAAqC,CAAC,CAC1D,CACF,CAAA;QAED,KAAK,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAA;IAC1C,CAAC;AACH,CAAC,CAAC,CACH,CAAA"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"support.d.ts","sourceRoot":"","sources":["../../src/passkey/support.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"support.d.ts","sourceRoot":"","sources":["../../src/passkey/support.ts"],"names":[],"mappings":"AAEA,eAAO,MAAM,gBAAgB,QAAO,OAAoC,CAAA;AAExE,eAAO,MAAM,iBAAiB,QAAO,OAAO,CAAC,OAAO,CAAsC,CAAA"}
|
package/dist/passkey/support.js
CHANGED
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import { browserSupportsWebAuthn, browserSupportsWebAuthnAutofill
|
|
1
|
+
import { browserSupportsWebAuthn, browserSupportsWebAuthnAutofill } from "@simplewebauthn/browser";
|
|
2
2
|
export const isPasskeySupport = () => browserSupportsWebAuthn();
|
|
3
3
|
export const isAutofillSupport = () => browserSupportsWebAuthnAutofill();
|
|
4
4
|
//# sourceMappingURL=support.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"support.js","sourceRoot":"","sources":["../../src/passkey/support.ts"],"names":[],"mappings":"AAAA,OAAO,
|
|
1
|
+
{"version":3,"file":"support.js","sourceRoot":"","sources":["../../src/passkey/support.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,uBAAuB,EAAE,+BAA+B,EAAE,MAAM,yBAAyB,CAAA;AAElG,MAAM,CAAC,MAAM,gBAAgB,GAAG,GAAY,EAAE,CAAC,uBAAuB,EAAE,CAAA;AAExE,MAAM,CAAC,MAAM,iBAAiB,GAAG,GAAqB,EAAE,CAAC,+BAA+B,EAAE,CAAA"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../src/passkey/types.ts"],"names":[],"mappings":"AAAA,MAAM,MAAM,gBAAgB,GAAG,aAAa,GAAG,WAAW,GAAG,UAAU,
|
|
1
|
+
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../src/passkey/types.ts"],"names":[],"mappings":"AAAA,MAAM,MAAM,gBAAgB,GAAG,aAAa,GAAG,WAAW,GAAG,UAAU,CAAA;AAEvE;;GAEG;AACH,MAAM,MAAM,uBAAuB,GAAG,QAAQ,GAAG,cAAc,GAAG,eAAe,CAAA;AAEjF;;GAEG;AACH,MAAM,MAAM,iBAAiB,GACzB,UAAU,GACV,QAAQ,GACR,mBAAmB,GACnB,aAAa,GACb,KAAK,GACL,OAAO,GACP,MAAM,CAAA;AAEV;;GAEG;AACH,MAAM,WAAW,sCAAsC;IACrD,EAAE,EAAE,2BAA2B,CAAA;IAC/B,IAAI,EAAE,iCAAiC,CAAA;IACvC,SAAS,EAAE,eAAe,CAAA;IAC1B,gBAAgB,EAAE,KAAK,CAAC,6BAA6B,CAAC,CAAA;IACtD,OAAO,CAAC,EAAE,MAAM,CAAA;IAChB,kBAAkB,CAAC,EAAE,KAAK,CAAC,iCAAiC,CAAC,CAAA;IAC7D,sBAAsB,CAAC,EAAE,8BAA8B,CAAA;IACvD,KAAK,CAAC,EAAE,KAAK,CAAC,uBAAuB,CAAC,CAAA;IACtC,WAAW,CAAC,EAAE,+BAA+B,CAAA;IAC7C,kBAAkB,CAAC,EAAE,KAAK,CAAC,iBAAiB,CAAC,CAAA;IAC7C,UAAU,CAAC,EAAE,oCAAoC,CAAA;CAClD"}
|
package/dist/shared.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"shared.d.ts","sourceRoot":"","sources":["../src/shared.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AACH,MAAM,WAAW,eAAe;IAC9B;;;;OAIG;IACH,SAAS,EAAE,MAAM,
|
|
1
|
+
{"version":3,"file":"shared.d.ts","sourceRoot":"","sources":["../src/shared.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AACH,MAAM,WAAW,eAAe;IAC9B;;;;OAIG;IACH,SAAS,EAAE,MAAM,CAAA;IACjB,QAAQ,CAAC,EAAE,MAAM,CAAA;CAClB"}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@passlock/client",
|
|
3
|
-
"version": "2.0.0-beta.
|
|
3
|
+
"version": "2.0.0-beta.3",
|
|
4
4
|
"description": "Flexible passkey authentication for Astro, SvelteKit, NextJS and other frameworks",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"passkey",
|
|
@@ -34,16 +34,6 @@
|
|
|
34
34
|
"types": "./dist/index.d.ts",
|
|
35
35
|
"import": "./dist/index.js",
|
|
36
36
|
"default": "./dist/index.js"
|
|
37
|
-
},
|
|
38
|
-
"./passkey": {
|
|
39
|
-
"types": "./dist/passkey/index.d.ts",
|
|
40
|
-
"import": "./dist/passkey/index.js",
|
|
41
|
-
"default": "./dist/passkey/index.js"
|
|
42
|
-
},
|
|
43
|
-
"./logger": {
|
|
44
|
-
"types": "./dist/logger/index.d.ts",
|
|
45
|
-
"import": "./dist/logger/index.js",
|
|
46
|
-
"default": "./dist/logger/index.js"
|
|
47
37
|
}
|
|
48
38
|
},
|
|
49
39
|
"module": "./dist/index.js",
|
|
@@ -53,20 +43,22 @@
|
|
|
53
43
|
],
|
|
54
44
|
"dependencies": {
|
|
55
45
|
"@simplewebauthn/browser": "^13.2.2",
|
|
56
|
-
"effect": "3.19.
|
|
46
|
+
"effect": "3.19.14"
|
|
57
47
|
},
|
|
58
48
|
"devDependencies": {
|
|
59
|
-
"@
|
|
60
|
-
"@
|
|
61
|
-
"
|
|
62
|
-
"globals": "^
|
|
63
|
-
"npm-check-updates": "19.1
|
|
64
|
-
"
|
|
65
|
-
"publint": "^0.3.15",
|
|
49
|
+
"@fetch-mock/vitest": "^0.2.18",
|
|
50
|
+
"@typescript/lib-dom": "npm:@types/web@^0.0.312",
|
|
51
|
+
"@biomejs/biome": "^2.3.10",
|
|
52
|
+
"globals": "^17.0.0",
|
|
53
|
+
"npm-check-updates": "^19.2.1",
|
|
54
|
+
"publint": "0.3.16",
|
|
66
55
|
"rimraf": "^6.1.2",
|
|
67
56
|
"tsx": "4.21.0",
|
|
68
57
|
"typescript": "^5.9.3",
|
|
69
|
-
"
|
|
58
|
+
"vitest": "^4.0.16"
|
|
59
|
+
},
|
|
60
|
+
"peerDependencies": {
|
|
61
|
+
"effect": "3.19.14"
|
|
70
62
|
},
|
|
71
63
|
"scripts": {
|
|
72
64
|
"build": "tsc --build",
|
|
@@ -75,14 +67,18 @@
|
|
|
75
67
|
"build:readme": "LATEST=${npm_package_version} tsx ../../scripts/replace-readme-tokens.ts ./packages/client",
|
|
76
68
|
"clean": "tsc --build --clean",
|
|
77
69
|
"clean:full": "rimraf dist tsconfig.tsbuildinfo",
|
|
78
|
-
"format": "prettier --write \"src/**/*.+(js|ts|json)\"",
|
|
79
|
-
"lint": "prettier --check \"src/**/*.+(js|ts|json)\" && eslint ./src",
|
|
80
|
-
"lint:fix": "prettier --check \"src/**/*.+(js|ts|json)\" && eslint ./src --fix",
|
|
81
70
|
"replaceTokens": "LATEST=${npm_package_version} tsx ../../scripts/replace-tokens.ts ./packages/client",
|
|
82
|
-
"test": "vitest
|
|
71
|
+
"test": "vitest --project unit",
|
|
72
|
+
"test:it": "vitest --project integration",
|
|
73
|
+
"test:full": "vitest run --project unit --project integration",
|
|
83
74
|
"test:coverage": "vitest run --coverage",
|
|
84
75
|
"test:ui": "vitest --coverage.enabled=true --ui",
|
|
85
76
|
"test:watch": "vitest dev",
|
|
86
|
-
"typecheck": "tsc --noEmit"
|
|
77
|
+
"typecheck": "tsc --noEmit",
|
|
78
|
+
"lint": "biome check .",
|
|
79
|
+
"lint:fix": "biome check --fix .",
|
|
80
|
+
"lint:ci": "biome ci .",
|
|
81
|
+
"format": "biome format --fix .",
|
|
82
|
+
"format:check": "biome format ."
|
|
87
83
|
}
|
|
88
84
|
}
|
package/dist/network.d.ts.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"network.d.ts","sourceRoot":"","sources":["../src/network.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,MAAM,QAAQ,CAAC;AAexC,eAAO,MAAM,iBAAiB,GAAI,KAAK,OAAO,KAAG,GAAG,IAAI,eACxB,CAAC;;;;AAEjC,qBAAa,eAAgB,SAAQ,qBAEnC;IACA,QAAQ,CAAC,OAAO,EAAE,MAAM,CAAC;IACzB,QAAQ,CAAC,GAAG,EAAE,MAAM,CAAC;CACtB,CAAC;IACA,MAAM,CAAC,iBAAiB,QATa,OAAO,KAAG,GAAG,IAAI,eAAe,CASxB;CAC9C;;uBAOsB,MAAM;;AAL7B;;GAEG;AACH,qBAAa,QAAS,SAAQ,aAG3B;CAAG;AAEN,eAAO,MAAM,aAAa,GAAI,eAE3B;IACD,QAAQ,CAAC,EAAE,MAAM,CAAC;CACnB,KAAG,QAAQ,CAAC,MAAM,CAA8B,CAAC;AAoBlD;;;;;GAKG;AACH,eAAO,MAAM,WAAW,GAAI,GAAG,SAAS,MAAM,EAAE,6CAK7C;IACD,GAAG,EAAE,GAAG,CAAC;IACT,sBAAsB;IACtB,OAAO,EAAE,MAAM,CAAC;IAChB,0BAA0B;IAC1B,iBAAiB,EAAE,CAAC,GAAG,EAAE,OAAO,KAAK,GAAG,IAAI,GAAG,CAAC;IAChD,kCAAkC;IAClC,KAAK,EAAE,MAAM,CAAC;CACf,KAAG,KAAK,CAAC,KAAK,CAAC,GAAG,EAAE,eAAe,CAiDhC,CAAC"}
|
package/dist/network.js.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"network.js","sourceRoot":"","sources":["../src/network.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,MAAM,QAAQ,CAAC;AAExC;;;;;GAKG;AAEH;;GAEG;AAEH,MAAM,eAAe,GAAG,0BAA0B,CAAC;AAEnD,MAAM,CAAC,MAAM,iBAAiB,GAAG,CAAC,GAAY,EAA0B,EAAE,CACxE,GAAG,YAAY,eAAe,CAAC;AAEjC,MAAM,OAAO,eAAgB,SAAQ,KAAK,CAAC,WAAW,CACpD,wBAAwB,CAIxB;IACA,MAAM,CAAC,iBAAiB,GAAG,iBAAiB,CAAC;;AAG/C;;GAEG;AACH,MAAM,OAAO,QAAS,SAAQ,OAAO,CAAC,GAAG,CAAC,UAAU,CAAC,EAGlD;CAAG;AAEN,MAAM,CAAC,MAAM,aAAa,GAAG,CAAC,EAC5B,QAAQ,GAAG,eAAe,GAG3B,EAAoB,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,EAAE,QAAQ,EAAE,CAAC,CAAC;AAOlD,MAAM,eAAe,GAAG,CAAC,OAAgB,EAA4B,EAAE;IACrE,IAAI,OAAO,OAAO,KAAK,QAAQ;QAAE,OAAO,KAAK,CAAC;IAC9C,IAAI,OAAO,KAAK,IAAI;QAAE,OAAO,KAAK,CAAC;IAEnC,IAAI,CAAC,CAAC,SAAS,IAAI,OAAO,CAAC;QAAE,OAAO,KAAK,CAAC;IAC1C,IAAI,OAAO,OAAO,CAAC,OAAO,KAAK,QAAQ;QAAE,OAAO,KAAK,CAAC;IAEtD,IAAI,CAAC,CAAC,MAAM,IAAI,OAAO,CAAC;QAAE,OAAO,KAAK,CAAC;IACvC,IAAI,OAAO,OAAO,CAAC,IAAI,KAAK,QAAQ;QAAE,OAAO,KAAK,CAAC;IAEnD,OAAO,IAAI,CAAC;AACd,CAAC,CAAC;AAEF;;;;;GAKG;AACH,MAAM,CAAC,MAAM,WAAW,GAAG,CAAqB,EAC9C,GAAG,EACH,OAAO,EACP,iBAAiB,EACjB,KAAK,GASN,EAAqC,EAAE,CACtC,KAAK,CAAC,GAAG,CAAC,QAAQ,CAAC;IACjB,MAAM,OAAO,GAAG;QACd,cAAc,EAAE,kBAAkB;QAClC,MAAM,EAAE,kBAAkB;KAClB,CAAC;IAEX,MAAM,IAAI,GAAG,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC;IAErC,MAAM,YAAY,GAAG,IAAI,eAAe,CAAC;QACvC,OAAO,EAAE,cAAc;QACvB,GAAG,EAAE,MAAM,CAAC,GAAG,CAAC;KACjB,CAAC,CAAC;IAEH,MAAM,UAAU,GAAG,IAAI,eAAe,CAAC;QACrC,OAAO,EAAE,+BAA+B;QACxC,GAAG,EAAE,MAAM,CAAC,GAAG,CAAC;KACjB,CAAC,CAAC;IAEH,MAAM,sBAAsB,GAAG,IAAI,eAAe,CAAC;QACjD,OAAO,EAAE,WAAW,KAAK,WAAW;QACpC,GAAG,EAAE,MAAM,CAAC,GAAG,CAAC;KACjB,CAAC,CAAC;IAEH,MAAM,aAAa,GAAG,KAAK,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC;QAC5C,GAAG,EAAE,GAAG,EAAE,CAAC,KAAK,CAAC,GAAG,EAAE,EAAE,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;QACxD,KAAK,EAAE,GAAG,EAAE,CAAC,YAAY;KAC1B,CAAC,CAAC;IAEH,IAAI,CAAC,aAAa,CAAC,EAAE,EAAE,CAAC;QACtB,MAAM,QAAQ,GAAG,KAAK,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC;YACvC,GAAG,EAAE,GAAG,EAAE,CAAC,aAAa,CAAC,IAAI,EAAsB;YACnD,KAAK,EAAE,GAAG,EAAE,CAAC,UAAU;SACxB,CAAC,CAAC;QAEH,OAAO,eAAe,CAAC,QAAQ,CAAC;YAC9B,CAAC,CAAC,KAAK,CAAC,CAAC,IAAI,eAAe,CAAC;gBACzB,GAAG,QAAQ;gBACX,GAAG,EAAE,MAAM,CAAC,GAAG,CAAC;aACjB,CAAC;YACJ,CAAC,CAAC,KAAK,CAAC,CAAC,UAAU,CAAC;IACxB,CAAC;IAED,MAAM,IAAI,GAAG,KAAK,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC;QACnC,GAAG,EAAE,GAAG,EAAE,CAAC,aAAa,CAAC,IAAI,EAAsB;QACnD,KAAK,EAAE,GAAG,EAAE,CAAC,UAAU;KACxB,CAAC,CAAC;IAEH,OAAO,iBAAiB,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,sBAAsB,CAAC;AACxE,CAAC,CAAC,CAAC"}
|