@passlock/client 2.0.1 → 2.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +2 -2
- package/README.template.md +2 -2
- package/dist/errors.d.ts +4 -0
- package/dist/errors.d.ts.map +1 -0
- package/dist/errors.js +14 -0
- package/dist/errors.js.map +1 -0
- package/dist/index.d.ts +236 -31
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +236 -34
- package/dist/index.js.map +1 -1
- package/dist/internal/index.d.ts +4 -0
- package/dist/internal/index.d.ts.map +1 -0
- package/dist/internal/index.js +4 -0
- package/dist/internal/index.js.map +1 -0
- package/dist/{shared → internal}/network.d.ts +19 -16
- package/dist/internal/network.d.ts.map +1 -0
- package/dist/{shared → internal}/network.js +40 -25
- package/dist/internal/network.js.map +1 -0
- package/dist/{shared → internal}/promise.d.ts +2 -2
- package/dist/internal/promise.d.ts.map +1 -0
- package/dist/{shared → internal}/promise.js +2 -2
- package/dist/internal/promise.js.map +1 -0
- package/dist/internal/tenancy.d.ts.map +1 -0
- package/dist/internal/tenancy.js.map +1 -0
- package/dist/{logger/index.d.ts → logger.d.ts} +19 -4
- package/dist/logger.d.ts.map +1 -0
- package/dist/{logger/index.js → logger.js} +19 -4
- package/dist/logger.js.map +1 -0
- package/dist/{shared/options.d.ts → options.d.ts} +4 -0
- package/dist/options.d.ts.map +1 -0
- package/dist/{shared/options.js.map → options.js.map} +1 -1
- package/dist/passkey/authentication/authentication.d.ts +134 -0
- package/dist/passkey/authentication/authentication.d.ts.map +1 -0
- package/dist/passkey/{authentication.js → authentication/authentication.js} +68 -50
- package/dist/passkey/authentication/authentication.js.map +1 -0
- package/dist/passkey/errors.d.ts +158 -16
- package/dist/passkey/errors.d.ts.map +1 -1
- package/dist/passkey/errors.js +214 -6
- package/dist/passkey/errors.js.map +1 -1
- package/dist/passkey/registration/registration.d.ts +145 -0
- package/dist/passkey/registration/registration.d.ts.map +1 -0
- package/dist/passkey/{registration.js → registration/registration.js} +43 -36
- package/dist/passkey/registration/registration.js.map +1 -0
- package/dist/passkey/shared.d.ts +8 -2
- package/dist/passkey/shared.d.ts.map +1 -1
- package/dist/passkey/signals/signals.d.ts +103 -0
- package/dist/passkey/signals/signals.d.ts.map +1 -0
- package/dist/passkey/{signals.js → signals/signals.js} +69 -71
- package/dist/passkey/signals/signals.js.map +1 -0
- package/dist/passkey/support.d.ts +15 -0
- package/dist/passkey/support.d.ts.map +1 -1
- package/dist/passkey/support.js +16 -1
- package/dist/passkey/support.js.map +1 -1
- package/dist/principal.d.ts +16 -0
- package/dist/principal.d.ts.map +1 -0
- package/dist/principal.js +2 -0
- package/dist/principal.js.map +1 -0
- package/dist/safe.d.ts +247 -0
- package/dist/safe.d.ts.map +1 -0
- package/dist/safe.js +254 -0
- package/dist/safe.js.map +1 -0
- package/package.json +21 -19
- package/dist/logger/index.d.ts.map +0 -1
- package/dist/logger/index.js.map +0 -1
- package/dist/passkey/authentication.d.ts +0 -118
- package/dist/passkey/authentication.d.ts.map +0 -1
- package/dist/passkey/authentication.js.map +0 -1
- package/dist/passkey/authentication.test.d.ts +0 -2
- package/dist/passkey/authentication.test.d.ts.map +0 -1
- package/dist/passkey/authentication.test.js +0 -157
- package/dist/passkey/authentication.test.js.map +0 -1
- package/dist/passkey/registration.d.ts +0 -136
- package/dist/passkey/registration.d.ts.map +0 -1
- package/dist/passkey/registration.js.map +0 -1
- package/dist/passkey/registration.test.d.ts +0 -2
- package/dist/passkey/registration.test.d.ts.map +0 -1
- package/dist/passkey/registration.test.js +0 -161
- package/dist/passkey/registration.test.js.map +0 -1
- package/dist/passkey/signals.d.ts +0 -113
- package/dist/passkey/signals.d.ts.map +0 -1
- package/dist/passkey/signals.js.map +0 -1
- package/dist/shared/network.d.ts.map +0 -1
- package/dist/shared/network.js.map +0 -1
- package/dist/shared/options.d.ts.map +0 -1
- package/dist/shared/promise.d.ts.map +0 -1
- package/dist/shared/promise.js.map +0 -1
- package/dist/shared/tenancy.d.ts.map +0 -1
- package/dist/shared/tenancy.js.map +0 -1
- package/dist/surface.test.d.ts +0 -2
- package/dist/surface.test.d.ts.map +0 -1
- package/dist/surface.test.js +0 -38
- package/dist/surface.test.js.map +0 -1
- package/dist/unsafe.d.ts +0 -41
- package/dist/unsafe.d.ts.map +0 -1
- package/dist/unsafe.js +0 -52
- package/dist/unsafe.js.map +0 -1
- /package/dist/{shared → internal}/tenancy.d.ts +0 -0
- /package/dist/{shared → internal}/tenancy.js +0 -0
- /package/dist/{shared/options.js → options.js} +0 -0
package/README.md
CHANGED
|
@@ -36,7 +36,7 @@ in README.template.md and outputs to README.md
|
|
|
36
36
|
|
|
37
37
|
Powerful features including signals and related origin requests...
|
|
38
38
|
|
|
39
|
-
1. **🔓 No lock-in**
|
|
39
|
+
1. **🔓 No lock-in**
|
|
40
40
|
Framework agnostic. Standards compliant.
|
|
41
41
|
|
|
42
42
|
2. **🔑 Related origins (domain migration)**
|
|
@@ -48,7 +48,7 @@ Works out of the box with sensible defaults.
|
|
|
48
48
|
4. **📱 Credential management**
|
|
49
49
|
Programmatically manage passkeys on end user devices
|
|
50
50
|
|
|
51
|
-
5. **💪 Powerful**
|
|
51
|
+
5. **💪 Powerful**
|
|
52
52
|
User verification, autofill, roaming authenticators and more.
|
|
53
53
|
|
|
54
54
|
## More information
|
package/README.template.md
CHANGED
|
@@ -36,7 +36,7 @@ in README.template.md and outputs to README.md
|
|
|
36
36
|
|
|
37
37
|
Powerful features including signals and related origin requests...
|
|
38
38
|
|
|
39
|
-
1. **🔓 No lock-in**
|
|
39
|
+
1. **🔓 No lock-in**
|
|
40
40
|
Framework agnostic. Standards compliant.
|
|
41
41
|
|
|
42
42
|
2. **🔑 Related origins (domain migration)**
|
|
@@ -48,7 +48,7 @@ Works out of the box with sensible defaults.
|
|
|
48
48
|
4. **📱 Credential management**
|
|
49
49
|
Programmatically manage passkeys on end user devices
|
|
50
50
|
|
|
51
|
-
5. **💪 Powerful**
|
|
51
|
+
5. **💪 Powerful**
|
|
52
52
|
User verification, autofill, roaming authenticators and more.
|
|
53
53
|
|
|
54
54
|
## More information
|
package/dist/errors.d.ts
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"errors.d.ts","sourceRoot":"","sources":["../src/errors.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,QAAQ,GAClB,CAAC,SAAS;IAAE,IAAI,EAAE,MAAM,CAAA;CAAE,EAAE,KAAK,CAAC,CAAC,MAAM,CAAC,MAC1C,SAAS,OAAO,KAAG,OAAO,IAAI,CAS9B,CAAA"}
|
package/dist/errors.js
ADDED
|
@@ -0,0 +1,14 @@
|
|
|
1
|
+
export const isTagged = (tag) => (payload) => {
|
|
2
|
+
if (typeof payload !== "object")
|
|
3
|
+
return false;
|
|
4
|
+
if (payload === null)
|
|
5
|
+
return false;
|
|
6
|
+
if (!("_tag" in payload))
|
|
7
|
+
return false;
|
|
8
|
+
if (typeof payload._tag !== "string")
|
|
9
|
+
return false;
|
|
10
|
+
if (payload._tag !== tag)
|
|
11
|
+
return false;
|
|
12
|
+
return true;
|
|
13
|
+
};
|
|
14
|
+
//# sourceMappingURL=errors.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"errors.js","sourceRoot":"","sources":["../src/errors.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,QAAQ,GACnB,CAA6B,GAAc,EAAE,EAAE,CAC/C,CAAC,OAAgB,EAAgB,EAAE;IACjC,IAAI,OAAO,OAAO,KAAK,QAAQ;QAAE,OAAO,KAAK,CAAA;IAC7C,IAAI,OAAO,KAAK,IAAI;QAAE,OAAO,KAAK,CAAA;IAElC,IAAI,CAAC,CAAC,MAAM,IAAI,OAAO,CAAC;QAAE,OAAO,KAAK,CAAA;IACtC,IAAI,OAAO,OAAO,CAAC,IAAI,KAAK,QAAQ;QAAE,OAAO,KAAK,CAAA;IAClD,IAAI,OAAO,CAAC,IAAI,KAAK,GAAG;QAAE,OAAO,KAAK,CAAA;IAEtC,OAAO,IAAI,CAAA;AACb,CAAC,CAAA"}
|
package/dist/index.d.ts
CHANGED
|
@@ -1,41 +1,246 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
3
|
-
|
|
1
|
+
/**
|
|
2
|
+
* _unsafe_ functions that could throw an error. Be sure to catch errors and use one of the
|
|
3
|
+
* type guards to narrow the thrown error down to a specific type.
|
|
4
|
+
*
|
|
5
|
+
* @categoryDescription Passkeys (core)
|
|
6
|
+
* Creating, updating, authenticating and deleting passkeys.
|
|
7
|
+
*
|
|
8
|
+
* @categoryDescription Passkeys (other)
|
|
9
|
+
* Testing for browser capabilities related to passkeys, type guards and other utilities.
|
|
10
|
+
*
|
|
11
|
+
* @showCategories
|
|
12
|
+
* @module unsafe
|
|
13
|
+
*/
|
|
4
14
|
import { Logger } from "./logger";
|
|
5
|
-
import
|
|
6
|
-
|
|
7
|
-
|
|
15
|
+
import type { PasslockOptions } from "./options";
|
|
16
|
+
import type { AuthenticationOptions, AuthenticationSuccess } from "./passkey/authentication/authentication";
|
|
17
|
+
import type { RegistrationOptions, RegistrationSuccess } from "./passkey/registration/registration";
|
|
18
|
+
import type { CredentialMapping, UpdatePasskeyOptions } from "./passkey/signals/signals";
|
|
19
|
+
/**
|
|
20
|
+
* Registers a passkey on the user's device, then saves the server-side component in your vault.
|
|
21
|
+
* If successful, this function returns a `code` or `id_token` (JWT). The code and/or jwt should
|
|
22
|
+
* be sent to your backend for verification. See
|
|
23
|
+
* [register a passkey](https://passlock.dev/passkeys/registration/) in the documentation.
|
|
24
|
+
*
|
|
25
|
+
* @param options
|
|
26
|
+
*
|
|
27
|
+
* @returns A successful registration payload.
|
|
28
|
+
*
|
|
29
|
+
* @see {@link isRegistrationSuccess}
|
|
30
|
+
* @see {@link isPasskeyUnsupportedError}
|
|
31
|
+
* @see {@link isDuplicatePasskeyError}
|
|
32
|
+
* @see {@link isOtherPasskeyError}
|
|
33
|
+
*
|
|
34
|
+
* @throws {@link RegistrationError} (alias to a union of potential errors)
|
|
35
|
+
* @throws {@link PasskeyUnsupportedError} if the device does not support passkeys
|
|
36
|
+
* @throws {@link DuplicatePasskeyError} if `allowCredentials` includes a passkey that already exists on the device
|
|
37
|
+
* @throws {@link OtherPasskeyError} typically a low level failure
|
|
38
|
+
* @throws {@link NetworkError}
|
|
39
|
+
*
|
|
40
|
+
* @example
|
|
41
|
+
* // from your Passlock console settings
|
|
42
|
+
* const tenancyId = "myTenancyId";
|
|
43
|
+
* const username = "jdoe@gmail.com";
|
|
44
|
+
*
|
|
45
|
+
* try {
|
|
46
|
+
* const result = await registerPasskey({ tenancyId, username });
|
|
47
|
+
* // send this to your backend for verification
|
|
48
|
+
* console.log(result.code);
|
|
49
|
+
* } catch (error) {
|
|
50
|
+
* if (isPasskeyUnsupportedError(error)) {
|
|
51
|
+
* alert("passkeys not supported on this device");
|
|
52
|
+
* } else {
|
|
53
|
+
* console.error(error);
|
|
54
|
+
* }
|
|
55
|
+
* }
|
|
56
|
+
*
|
|
57
|
+
* @category Passkeys (core)
|
|
58
|
+
*/
|
|
59
|
+
export declare const registerPasskey: (options: RegistrationOptions,
|
|
60
|
+
/** @hidden */
|
|
61
|
+
logger?: typeof Logger.Service) => Promise<RegistrationSuccess>;
|
|
8
62
|
/**
|
|
9
|
-
*
|
|
10
|
-
*
|
|
63
|
+
* Asks the client to present a passkey, which is then verified against the server-side component in your vault.
|
|
64
|
+
* If successful, this function returns a `code` or `id_token` (JWT). The code and/or jwt should
|
|
65
|
+
* be sent to your backend for verification. See
|
|
66
|
+
* [authenticate a passkey](https://passlock.dev/passkeys/authentication/) in the documentation.
|
|
67
|
+
*
|
|
11
68
|
* @param options
|
|
12
|
-
*
|
|
69
|
+
*
|
|
70
|
+
* @returns A successful authentication payload.
|
|
71
|
+
*
|
|
72
|
+
* @see {@link isAuthenticationSuccess}
|
|
73
|
+
* @see {@link isPasskeyUnsupportedError}
|
|
74
|
+
* @see {@link isPasskeyNotFoundError}
|
|
75
|
+
* @see {@link isOtherPasskeyError}
|
|
76
|
+
*
|
|
77
|
+
* @throws {@link AuthenticationError} (alias to a union of potential errors)
|
|
78
|
+
* @throws {@link PasskeyUnsupportedError} if the device does not support passkeys
|
|
79
|
+
* @throws {@link PasskeyNotFoundError} if the passkey is orhpaned i.e. deleted from the vault but still present on the local device
|
|
80
|
+
* @throws {@link OtherPasskeyError} typically a low level failure
|
|
81
|
+
* @throws {@link NetworkError}
|
|
82
|
+
*
|
|
83
|
+
* @example
|
|
84
|
+
* // from your Passlock console settings
|
|
85
|
+
* const tenancyId = "myTenancyId";
|
|
86
|
+
*
|
|
87
|
+
* try {
|
|
88
|
+
* const result = await authenticatePasskey({ tenancyId });
|
|
89
|
+
* // send this to your backend for verification
|
|
90
|
+
* console.log(result.code);
|
|
91
|
+
* } catch (error) {
|
|
92
|
+
* if (isPasskeyUnsupportedError(error)) {
|
|
93
|
+
* alert("passkeys not supported on this device");
|
|
94
|
+
* } else {
|
|
95
|
+
* console.error(error);
|
|
96
|
+
* }
|
|
97
|
+
* }
|
|
98
|
+
*
|
|
99
|
+
* @category Passkeys (core)
|
|
13
100
|
*/
|
|
14
|
-
export declare const
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
export { DuplicatePasskeyError, isDuplicatePasskey, isRegistrationSuccess, } from "./passkey/registration";
|
|
18
|
-
export { isUnexpectedError, UnexpectedError } from "./shared/network";
|
|
101
|
+
export declare const authenticatePasskey: (options: AuthenticationOptions,
|
|
102
|
+
/** @hidden */
|
|
103
|
+
logger?: typeof Logger.Service) => Promise<AuthenticationSuccess>;
|
|
19
104
|
/**
|
|
20
|
-
*
|
|
21
|
-
*
|
|
105
|
+
* Attempt to update the username or display name for a passkey (client-side only).
|
|
106
|
+
*
|
|
107
|
+
* Useful if the user has changed their account identifier. For example, they register
|
|
108
|
+
* using jdoe@gmail.com but later change their account username to jdoe@yahoo.com.
|
|
109
|
+
* Even after you update their account details in your backend, their local password
|
|
110
|
+
* manager will continue to display jdoe@gmail.com.
|
|
111
|
+
*
|
|
112
|
+
* By calling this function and supplying a new username/display name, their local
|
|
113
|
+
* password manager will align with their updated account identifier.
|
|
22
114
|
*
|
|
23
115
|
* @param options
|
|
24
|
-
* @returns
|
|
116
|
+
* @returns Update status
|
|
117
|
+
* @see {@link isUpdateError}
|
|
118
|
+
* @throws {@link UpdateError} if the passkey cannot be updated
|
|
119
|
+
*
|
|
120
|
+
* @example
|
|
121
|
+
* // from your Passlock console settings
|
|
122
|
+
* const tenancyId = "myTenancyId";
|
|
123
|
+
* const passkeyId = "myPasskeyId";
|
|
124
|
+
* const username = "newUsername@gmail.com";
|
|
125
|
+
* const displayName = "New Account Name";
|
|
126
|
+
*
|
|
127
|
+
* try {
|
|
128
|
+
* const result = await updatePasskey({ tenancyId, passkeyId, username, displayName });
|
|
129
|
+
* console.log("passkey updated");
|
|
130
|
+
* } catch (error) {
|
|
131
|
+
* console.error(error);
|
|
132
|
+
* }
|
|
133
|
+
*
|
|
134
|
+
* @category Passkeys (core)
|
|
135
|
+
*/
|
|
136
|
+
export declare const updatePasskey: (options: UpdatePasskeyOptions,
|
|
137
|
+
/** @hidden */
|
|
138
|
+
logger?: typeof Logger.Service) => Promise<boolean>;
|
|
139
|
+
/**
|
|
140
|
+
* Attempts to delete a passkey from a local device. There are two scenarios in which this function proves useful:
|
|
141
|
+
*
|
|
142
|
+
* 1. **Deleting a passkey**. Use the `@passlock/node` package or make vanilla REST calls from your
|
|
143
|
+
* backend to delete the server-side component, then use this function to delete the client-side component.
|
|
144
|
+
*
|
|
145
|
+
* 2. **Missing passkey**. The user tried to present a passkey, but the server-side component could not be found.
|
|
146
|
+
* Remove the passkey from the local device to prevent it happening again.
|
|
147
|
+
*
|
|
148
|
+
* See [deleting passkeys](https://passlock.dev/passkeys/passkey-removal/) and
|
|
149
|
+
* [handling missing passkeys](https://passlock.dev/handling-missing-passkeys/) in the documentation.
|
|
150
|
+
*
|
|
151
|
+
* @param identifiers Passkey identifier or credential mapping.
|
|
152
|
+
* @param options Passlock tenancy and endpoint options.
|
|
153
|
+
* @returns Delete status
|
|
154
|
+
* @see {@link isDeleteError}
|
|
155
|
+
* @throws {@link DeleteError} if the passkey cannot be deleted
|
|
156
|
+
*
|
|
157
|
+
* @example
|
|
158
|
+
* // from your Passlock console settings
|
|
159
|
+
* const tenancyId = "myTenancyId";
|
|
160
|
+
* const passkeyId = "myPasskeyId";
|
|
161
|
+
*
|
|
162
|
+
* try {
|
|
163
|
+
* const result = await deletePasskey(passkeyId, { tenancyId });
|
|
164
|
+
* console.log("passkey deleted");
|
|
165
|
+
* } catch (error) {
|
|
166
|
+
* console.error(error);
|
|
167
|
+
* }
|
|
168
|
+
*
|
|
169
|
+
* @category Passkeys (core)
|
|
170
|
+
*/
|
|
171
|
+
export declare const deletePasskey: (identifiers: string | CredentialMapping, options: PasslockOptions,
|
|
172
|
+
/** @hidden */
|
|
173
|
+
logger?: typeof Logger.Service) => Promise<boolean>;
|
|
174
|
+
/**
|
|
175
|
+
* Attempt to prune local passkeys by keeping only the passkey IDs you trust.
|
|
176
|
+
*
|
|
177
|
+
* This is useful when your backend is the source of truth for which passkeys
|
|
178
|
+
* should still exist for a given account on this device.
|
|
179
|
+
*
|
|
180
|
+
* @param passkeyIds IDs to keep on-device.
|
|
181
|
+
* @param options Passlock tenancy and endpoint options.
|
|
182
|
+
* @returns `true` if local passkeys were pruned.
|
|
183
|
+
* @see {@link isPruningError}
|
|
184
|
+
*
|
|
185
|
+
* @throws {@link PruningError}
|
|
186
|
+
*
|
|
187
|
+
* @example
|
|
188
|
+
* // from your Passlock console settings
|
|
189
|
+
* const tenancyId = "myTenancyId";
|
|
190
|
+
* const activePasskeyIds = ["passkey-1", "passkey-2"];
|
|
191
|
+
*
|
|
192
|
+
* try {
|
|
193
|
+
* const result = await prunePasskeys(activePasskeyIds, { tenancyId });
|
|
194
|
+
* console.log("local passkeys pruned", result);
|
|
195
|
+
* } catch (error) {
|
|
196
|
+
* if (isPruningError(error)) {
|
|
197
|
+
* console.error(error.code);
|
|
198
|
+
* } else {
|
|
199
|
+
* console.error(error);
|
|
200
|
+
* }
|
|
201
|
+
* }
|
|
202
|
+
*
|
|
203
|
+
* @category Passkeys (core)
|
|
204
|
+
*/
|
|
205
|
+
export declare const prunePasskeys: (passkeyIds: Array<string>, options: PasslockOptions,
|
|
206
|
+
/** @hidden */
|
|
207
|
+
logger?: typeof Logger.Service) => Promise<boolean>;
|
|
208
|
+
/**
|
|
209
|
+
* Does the local device support programmatic passkey deletion
|
|
210
|
+
*
|
|
211
|
+
* @returns `true` if local passkey deletion is supported.
|
|
212
|
+
*
|
|
213
|
+
* @category Passkeys (other)
|
|
214
|
+
*/
|
|
215
|
+
export declare const isPasskeyDeleteSupport: () => boolean;
|
|
216
|
+
/**
|
|
217
|
+
* Does the local device support programmatic passkey pruning
|
|
218
|
+
*
|
|
219
|
+
* @returns `true` if local passkey pruning is supported.
|
|
220
|
+
*
|
|
221
|
+
* @category Passkeys (other)
|
|
222
|
+
*/
|
|
223
|
+
export declare const isPasskeyPruningSupport: () => boolean;
|
|
224
|
+
/**
|
|
225
|
+
* Does the local device support programmatic passkey updates
|
|
226
|
+
*
|
|
227
|
+
* @returns `true` if local passkey updates are supported.
|
|
228
|
+
*
|
|
229
|
+
* @category Passkeys (other)
|
|
25
230
|
*/
|
|
26
|
-
export declare const authenticatePasskey: (options: AuthenticationOptions, logger?: typeof Logger.Service) => Promise<AuthenticationSuccess | AuthenticationError>;
|
|
27
|
-
export type { AuthenticationError, AuthenticationOptions, AuthenticationSuccess, PasskeyNotFound, } from "./passkey/authentication";
|
|
28
|
-
export { isAuthenticationSuccess, isPasskeyNotFound, } from "./passkey/authentication";
|
|
29
|
-
export declare const isPasskeyDeletionSupport: () => boolean;
|
|
30
|
-
export declare const isPasskeySyncSupport: () => boolean;
|
|
31
231
|
export declare const isPasskeyUpdateSupport: () => boolean;
|
|
32
|
-
export
|
|
33
|
-
export
|
|
34
|
-
export {
|
|
35
|
-
export
|
|
36
|
-
export {
|
|
37
|
-
export
|
|
38
|
-
export type {
|
|
39
|
-
export { isUpdateError, UpdateError } from "./passkey/
|
|
40
|
-
export {
|
|
232
|
+
export type { NetworkError } from "./internal/network";
|
|
233
|
+
export { isNetworkError } from "./internal/network";
|
|
234
|
+
export { LogEvent, Logger, LogLevel, } from "./logger";
|
|
235
|
+
export type { PasslockOptions } from "./options";
|
|
236
|
+
export type { AuthenticationError, AuthenticationEvent, AuthenticationOptions, AuthenticationSuccess, OnAuthenticationEvent, } from "./passkey/authentication/authentication";
|
|
237
|
+
export { AuthenticationHelper, isAuthenticationSuccess, } from "./passkey/authentication/authentication";
|
|
238
|
+
export type { ErrorCode } from "./passkey/errors";
|
|
239
|
+
export { DeleteError, DuplicatePasskeyError, isDeleteError, isDuplicatePasskeyError, isOtherPasskeyError, isPasskeyNotFoundError, isPasskeyUnsupportedError, isPruningError, isUpdateError, OtherPasskeyError, PasskeyNotFoundError, PasskeyUnsupportedError, PruningError, UpdateError, } from "./passkey/errors";
|
|
240
|
+
export type { OnRegistrationEvent, RegistrationError, RegistrationEvent, RegistrationOptions, RegistrationSuccess, } from "./passkey/registration/registration";
|
|
241
|
+
export { isRegistrationSuccess, RegistrationHelper, } from "./passkey/registration/registration";
|
|
242
|
+
export type { UserVerification } from "./passkey/shared";
|
|
243
|
+
export type { CredentialMapping, UpdatePasskeyOptions, } from "./passkey/signals/signals";
|
|
244
|
+
export { isAutofillSupport, isPasskeySupport, } from "./passkey/support";
|
|
245
|
+
export type { Principal } from "./principal";
|
|
41
246
|
//# sourceMappingURL=index.d.ts.map
|
package/dist/index.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA,OAAO,
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;GAYG;AAIH,OAAO,EAAe,MAAM,EAAE,MAAM,UAAU,CAAA;AAC9C,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,WAAW,CAAA;AAChD,OAAO,KAAK,EACV,qBAAqB,EACrB,qBAAqB,EACtB,MAAM,yCAAyC,CAAA;AAKhD,OAAO,KAAK,EACV,mBAAmB,EACnB,mBAAmB,EACpB,MAAM,qCAAqC,CAAA;AAK5C,OAAO,KAAK,EACV,iBAAiB,EACjB,oBAAoB,EACrB,MAAM,2BAA2B,CAAA;AAalC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAuCG;AACH,eAAO,MAAM,eAAe,GAC1B,SAAS,mBAAmB;AAC5B,cAAc;AACd,SAAQ,OAAO,MAAM,CAAC,OAAqB,KAC1C,OAAO,CAAC,mBAAmB,CAM3B,CAAA;AAIH;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAsCG;AACH,eAAO,MAAM,mBAAmB,GAC9B,SAAS,qBAAqB;AAC9B,cAAc;AACd,SAAQ,OAAO,MAAM,CAAC,OAAqB,KAC1C,OAAO,CAAC,qBAAqB,CAM7B,CAAA;AAIH;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+BG;AACH,eAAO,MAAM,aAAa,GACxB,SAAS,oBAAoB;AAC7B,cAAc;AACd,SAAQ,OAAO,MAAM,CAAC,OAAqB,KAC1C,OAAO,CAAC,OAAO,CAGjB,CAAA;AAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+BG;AACH,eAAO,MAAM,aAAa,GACxB,aAAa,MAAM,GAAG,iBAAiB,EACvC,SAAS,eAAe;AACxB,cAAc;AACd,SAAQ,OAAO,MAAM,CAAC,OAAqB,KAC1C,OAAO,CAAC,OAAO,CAOjB,CAAA;AAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,eAAO,MAAM,aAAa,GACxB,YAAY,KAAK,CAAC,MAAM,CAAC,EACzB,SAAS,eAAe;AACxB,cAAc;AACd,SAAQ,OAAO,MAAM,CAAC,OAAqB,KAC1C,OAAO,CAAC,OAAO,CAGjB,CAAA;AAID;;;;;;GAMG;AACH,eAAO,MAAM,sBAAsB,eACW,CAAA;AAE9C;;;;;;GAMG;AACH,eAAO,MAAM,uBAAuB,eACW,CAAA;AAE/C;;;;;;GAMG;AACH,eAAO,MAAM,sBAAsB,eACW,CAAA;AAI9C,YAAY,EAAE,YAAY,EAAE,MAAM,oBAAoB,CAAA;AACtD,OAAO,EAAE,cAAc,EAAE,MAAM,oBAAoB,CAAA;AACnD,OAAO,EACL,QAAQ,EACR,MAAM,EACN,QAAQ,GACT,MAAM,UAAU,CAAA;AACjB,YAAY,EAAE,eAAe,EAAE,MAAM,WAAW,CAAA;AAChD,YAAY,EACV,mBAAmB,EACnB,mBAAmB,EACnB,qBAAqB,EACrB,qBAAqB,EACrB,qBAAqB,GACtB,MAAM,yCAAyC,CAAA;AAChD,OAAO,EACL,oBAAoB,EACpB,uBAAuB,GACxB,MAAM,yCAAyC,CAAA;AAChD,YAAY,EAAE,SAAS,EAAE,MAAM,kBAAkB,CAAA;AACjD,OAAO,EACL,WAAW,EACX,qBAAqB,EACrB,aAAa,EACb,uBAAuB,EACvB,mBAAmB,EACnB,sBAAsB,EACtB,yBAAyB,EACzB,cAAc,EACd,aAAa,EACb,iBAAiB,EACjB,oBAAoB,EACpB,uBAAuB,EACvB,YAAY,EACZ,WAAW,GACZ,MAAM,kBAAkB,CAAA;AACzB,YAAY,EACV,mBAAmB,EACnB,iBAAiB,EACjB,iBAAiB,EACjB,mBAAmB,EACnB,mBAAmB,GACpB,MAAM,qCAAqC,CAAA;AAC5C,OAAO,EACL,qBAAqB,EACrB,kBAAkB,GACnB,MAAM,qCAAqC,CAAA;AAC5C,YAAY,EAAE,gBAAgB,EAAE,MAAM,kBAAkB,CAAA;AACxD,YAAY,EACV,iBAAiB,EACjB,oBAAoB,GACrB,MAAM,2BAA2B,CAAA;AAClC,OAAO,EACL,iBAAiB,EACjB,gBAAgB,GACjB,MAAM,mBAAmB,CAAA;AAC1B,YAAY,EAAE,SAAS,EAAE,MAAM,aAAa,CAAA"}
|