@simplewebauthn/browser 4.0.0 → 5.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/bundle/index.es5.umd.min.js +2 -2
- package/dist/bundle/index.js +115 -3
- package/dist/bundle/index.umd.min.js +2 -2
- package/dist/types/helpers/identifyAuthenticationError.d.ts +5 -0
- package/dist/types/helpers/identifyRegistrationError.d.ts +5 -0
- package/dist/types/helpers/isValidDomain.d.ts +1 -0
- package/dist/types/helpers/structs.d.ts +3 -0
- package/package.json +3 -3
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
/* [@simplewebauthn/browser] Version:
|
|
2
|
-
!function(e,
|
|
1
|
+
/* [@simplewebauthn/browser] Version: 5.1.0 - Wednesday, April 13th, 2022, 8:40:47 AM */
|
|
2
|
+
!function(e,r){"object"==typeof exports&&"undefined"!=typeof module?r(exports):"function"==typeof define&&define.amd?define(["exports"],r):r((e="undefined"!=typeof globalThis?globalThis:e||self).SimpleWebAuthnBrowser={})}(this,(function(e){"use strict";var r=function(e,t){return r=Object.setPrototypeOf||{__proto__:[]}instanceof Array&&function(e,r){e.__proto__=r}||function(e,r){for(var t in r)Object.prototype.hasOwnProperty.call(r,t)&&(e[t]=r[t])},r(e,t)};var t=function(){return t=Object.assign||function(e){for(var r,t=1,n=arguments.length;t<n;t++)for(var o in r=arguments[t])Object.prototype.hasOwnProperty.call(r,o)&&(e[o]=r[o]);return e},t.apply(this,arguments)};function n(e,r,t,n){return new(t||(t=Promise))((function(o,i){function a(e){try{u(n.next(e))}catch(e){i(e)}}function l(e){try{u(n.throw(e))}catch(e){i(e)}}function u(e){var r;e.done?o(e.value):(r=e.value,r instanceof t?r:new t((function(e){e(r)}))).then(a,l)}u((n=n.apply(e,r||[])).next())}))}function o(e,r){var t,n,o,i,a={label:0,sent:function(){if(1&o[0])throw o[1];return o[1]},trys:[],ops:[]};return i={next:l(0),throw:l(1),return:l(2)},"function"==typeof Symbol&&(i[Symbol.iterator]=function(){return this}),i;function l(i){return function(l){return function(i){if(t)throw new TypeError("Generator is already executing.");for(;a;)try{if(t=1,n&&(o=2&i[0]?n.return:i[0]?n.throw||((o=n.return)&&o.call(n),0):n.next)&&!(o=o.call(n,i[1])).done)return o;switch(n=0,o&&(i=[2&i[0],o.value]),i[0]){case 0:case 1:o=i;break;case 4:return a.label++,{value:i[1],done:!1};case 5:a.label++,n=i[1],i=[0];continue;case 7:i=a.ops.pop(),a.trys.pop();continue;default:if(!(o=a.trys,(o=o.length>0&&o[o.length-1])||6!==i[0]&&2!==i[0])){a=0;continue}if(3===i[0]&&(!o||i[1]>o[0]&&i[1]<o[3])){a.label=i[1];break}if(6===i[0]&&a.label<o[1]){a.label=o[1],o=i;break}if(o&&a.label<o[2]){a.label=o[2],a.ops.push(i);break}o[2]&&a.ops.pop(),a.trys.pop();continue}i=r.call(e,a)}catch(e){i=[6,e],n=0}finally{t=o=0}if(5&i[0])throw i[1];return{value:i[0]?i[1]:void 0,done:!0}}([i,l])}}}function i(e){var r,t,n=new Uint8Array(e),o="";try{for(var i=function(e){var r="function"==typeof Symbol&&Symbol.iterator,t=r&&e[r],n=0;if(t)return t.call(e);if(e&&"number"==typeof e.length)return{next:function(){return e&&n>=e.length&&(e=void 0),{value:e&&e[n++],done:!e}}};throw new TypeError(r?"Object is not iterable.":"Symbol.iterator is not defined.")}(n),a=i.next();!a.done;a=i.next()){var l=a.value;o+=String.fromCharCode(l)}}catch(e){r={error:e}}finally{try{a&&!a.done&&(t=i.return)&&t.call(i)}finally{if(r)throw r.error}}return btoa(o).replace(/\+/g,"-").replace(/\//g,"_").replace(/=/g,"")}function a(e){for(var r=e.replace(/-/g,"+").replace(/_/g,"/"),t=(4-r.length%4)%4,n=r.padEnd(r.length+t,"="),o=atob(n),i=new ArrayBuffer(o.length),a=new Uint8Array(i),l=0;l<o.length;l++)a[l]=o.charCodeAt(l);return i}function l(){return void 0!==(null===window||void 0===window?void 0:window.PublicKeyCredential)&&"function"==typeof window.PublicKeyCredential}function u(e){var r=e.id;return t(t({},e),{id:a(r)})}function s(e){return"localhost"===e||/^([a-z0-9]+(-[a-z0-9]+)*\.)+[a-z]{2,}$/i.test(e)}var c=function(e){function t(r,t){void 0===t&&(t="WebAuthnError");var n=e.call(this,r)||this;return n.name=t,n}return function(e,t){if("function"!=typeof t&&null!==t)throw new TypeError("Class extends value "+String(t)+" is not a constructor or null");function n(){this.constructor=e}r(e,t),e.prototype=null===t?Object.create(t):(n.prototype=t.prototype,new n)}(t,e),t}(Error);e.browserSupportsWebauthn=l,e.platformAuthenticatorIsAvailable=function(){return n(this,void 0,void 0,(function(){return o(this,(function(e){return l()?[2,PublicKeyCredential.isUserVerifyingPlatformAuthenticatorAvailable()]:[2,!1]}))}))},e.startAuthentication=function(e){var r,d;return n(this,void 0,void 0,(function(){var n,f,p,w,h,y,b,v,g;return o(this,(function(o){switch(o.label){case 0:if(!l())throw new Error("WebAuthn is not supported in this browser");0!==(null===(r=e.allowCredentials)||void 0===r?void 0:r.length)&&(n=null===(d=e.allowCredentials)||void 0===d?void 0:d.map(u)),f=t(t({},e),{challenge:a(e.challenge),allowCredentials:n}),p={publicKey:f},o.label=1;case 1:return o.trys.push([1,3,,4]),[4,navigator.credentials.get(p)];case 2:return w=o.sent(),[3,4];case 3:throw function(e){var r,t=e.error,n=e.options,o=n.publicKey;if(!o)throw Error("options was missing required publicKey property");if("AbortError"===t.name){if(n.signal===(new AbortController).signal)return new c("Authentication ceremony was sent an abort signal","AbortError")}else{if("NotAllowedError"===t.name)return(null===(r=o.allowCredentials)||void 0===r?void 0:r.length)?new c("No available authenticator recognized any of the allowed credentials","NotAllowedError"):new c("User clicked cancel, or the authentication ceremony timed out","NotAllowedError");if("SecurityError"===t.name){var i=window.location.hostname;if(!s(i))return new c(window.location.hostname+" is an invalid domain","SecurityError");if(o.rpId!==i)return new c('The RP ID "'+o.rpId+'" is invalid for this domain',"SecurityError")}else if("UnknownError"===t.name)return new c("The authenticator was unable to process the specified options, or could not create a new assertion signature","UnknownError")}return t}({error:o.sent(),options:p});case 4:if(!w)throw new Error("Authentication was not completed");return h=w.id,y=w.rawId,b=w.response,v=w.type,g=void 0,b.userHandle&&(m=b.userHandle,g=new TextDecoder("utf-8").decode(m)),[2,{id:h,rawId:i(y),response:{authenticatorData:i(b.authenticatorData),clientDataJSON:i(b.clientDataJSON),signature:i(b.signature),userHandle:g},type:v,clientExtensionResults:w.getClientExtensionResults()}]}var m}))}))},e.startRegistration=function(e){return n(this,void 0,void 0,(function(){var r,n,d,f,p,w,h,y;return o(this,(function(o){switch(o.label){case 0:if(!l())throw new Error("WebAuthn is not supported in this browser");r=t(t({},e),{challenge:a(e.challenge),user:t(t({},e.user),{id:(b=e.user.id,(new TextEncoder).encode(b))}),excludeCredentials:e.excludeCredentials.map(u)}),n={publicKey:r},o.label=1;case 1:return o.trys.push([1,3,,4]),[4,navigator.credentials.create(n)];case 2:return d=o.sent(),[3,4];case 3:throw function(e){var r,t,n=e.error,o=e.options,i=o.publicKey;if(!i)throw Error("options was missing required publicKey property");if("AbortError"===n.name){if(o.signal===(new AbortController).signal)return new c("Registration ceremony was sent an abort signal","AbortError")}else if("ConstraintError"===n.name){if(!0===(null===(r=i.authenticatorSelection)||void 0===r?void 0:r.requireResidentKey))return new c("Discoverable credentials were required but no available authenticator supported it","ConstraintError");if("required"===(null===(t=i.authenticatorSelection)||void 0===t?void 0:t.userVerification))return new c("User verification was required but no available authenticator supported it","ConstraintError")}else{if("InvalidStateError"===n.name)return new c("The authenticator was previously registered","InvalidStateError");if("NotAllowedError"===n.name)return new c("User clicked cancel, or the registration ceremony timed out","NotAllowedError");if("NotSupportedError"===n.name)return 0===i.pubKeyCredParams.filter((function(e){return"public-key"===e.type})).length?new c('No entry in pubKeyCredParams was of type "public-key"',"NotSupportedError"):new c("No available authenticator supported any of the specified pubKeyCredParams algorithms","NotSupportedError");if("SecurityError"===n.name){var a=window.location.hostname;if(!s(a))return new c(window.location.hostname+" is an invalid domain","SecurityError");if(i.rp.id!==a)return new c('The RP ID "'+i.rp.id+'" is invalid for this domain',"SecurityError")}else if("TypeError"===n.name){if(i.user.id.byteLength<1||i.user.id.byteLength>64)return new c("User ID was not between 1 and 64 characters","TypeError")}else if("UnknownError"===n.name)return new c("The authenticator was unable to process the specified options, or could not create a new credential","UnknownError")}return n}({error:o.sent(),options:n});case 4:if(!d)throw new Error("Registration was not completed");return f=d.id,p=d.rawId,w=d.response,h=d.type,y={id:f,rawId:i(p),response:{attestationObject:i(w.attestationObject),clientDataJSON:i(w.clientDataJSON)},type:h,clientExtensionResults:d.getClientExtensionResults()},"function"==typeof w.getTransports&&(y.transports=w.getTransports()),[2,y]}var b}))}))},Object.defineProperty(e,"__esModule",{value:!0})}));
|
package/dist/bundle/index.js
CHANGED
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
/* [@simplewebauthn/browser] Version:
|
|
1
|
+
/* [@simplewebauthn/browser] Version: 5.1.0 - Wednesday, April 13th, 2022, 8:40:46 AM */
|
|
2
2
|
function utf8StringToBuffer(value) {
|
|
3
3
|
return new TextEncoder().encode(value);
|
|
4
4
|
}
|
|
@@ -38,6 +38,69 @@ function toPublicKeyCredentialDescriptor(descriptor) {
|
|
|
38
38
|
};
|
|
39
39
|
}
|
|
40
40
|
|
|
41
|
+
function isValidDomain(hostname) {
|
|
42
|
+
return (hostname === 'localhost' || /^([a-z0-9]+(-[a-z0-9]+)*\.)+[a-z]{2,}$/i.test(hostname));
|
|
43
|
+
}
|
|
44
|
+
|
|
45
|
+
class WebAuthnError extends Error {
|
|
46
|
+
constructor(message, name = 'WebAuthnError') {
|
|
47
|
+
super(message);
|
|
48
|
+
this.name = name;
|
|
49
|
+
}
|
|
50
|
+
}
|
|
51
|
+
|
|
52
|
+
function identifyRegistrationError({ error, options, }) {
|
|
53
|
+
var _a, _b;
|
|
54
|
+
const { publicKey } = options;
|
|
55
|
+
if (!publicKey) {
|
|
56
|
+
throw Error('options was missing required publicKey property');
|
|
57
|
+
}
|
|
58
|
+
if (error.name === 'AbortError') {
|
|
59
|
+
if (options.signal === new AbortController().signal) {
|
|
60
|
+
return new WebAuthnError('Registration ceremony was sent an abort signal', 'AbortError');
|
|
61
|
+
}
|
|
62
|
+
}
|
|
63
|
+
else if (error.name === 'ConstraintError') {
|
|
64
|
+
if (((_a = publicKey.authenticatorSelection) === null || _a === void 0 ? void 0 : _a.requireResidentKey) === true) {
|
|
65
|
+
return new WebAuthnError('Discoverable credentials were required but no available authenticator supported it', 'ConstraintError');
|
|
66
|
+
}
|
|
67
|
+
else if (((_b = publicKey.authenticatorSelection) === null || _b === void 0 ? void 0 : _b.userVerification) === 'required') {
|
|
68
|
+
return new WebAuthnError('User verification was required but no available authenticator supported it', 'ConstraintError');
|
|
69
|
+
}
|
|
70
|
+
}
|
|
71
|
+
else if (error.name === 'InvalidStateError') {
|
|
72
|
+
return new WebAuthnError('The authenticator was previously registered', 'InvalidStateError');
|
|
73
|
+
}
|
|
74
|
+
else if (error.name === 'NotAllowedError') {
|
|
75
|
+
return new WebAuthnError('User clicked cancel, or the registration ceremony timed out', 'NotAllowedError');
|
|
76
|
+
}
|
|
77
|
+
else if (error.name === 'NotSupportedError') {
|
|
78
|
+
const validPubKeyCredParams = publicKey.pubKeyCredParams.filter(param => param.type === 'public-key');
|
|
79
|
+
if (validPubKeyCredParams.length === 0) {
|
|
80
|
+
return new WebAuthnError('No entry in pubKeyCredParams was of type "public-key"', 'NotSupportedError');
|
|
81
|
+
}
|
|
82
|
+
return new WebAuthnError('No available authenticator supported any of the specified pubKeyCredParams algorithms', 'NotSupportedError');
|
|
83
|
+
}
|
|
84
|
+
else if (error.name === 'SecurityError') {
|
|
85
|
+
const effectiveDomain = window.location.hostname;
|
|
86
|
+
if (!isValidDomain(effectiveDomain)) {
|
|
87
|
+
return new WebAuthnError(`${window.location.hostname} is an invalid domain`, 'SecurityError');
|
|
88
|
+
}
|
|
89
|
+
else if (publicKey.rp.id !== effectiveDomain) {
|
|
90
|
+
return new WebAuthnError(`The RP ID "${publicKey.rp.id}" is invalid for this domain`, 'SecurityError');
|
|
91
|
+
}
|
|
92
|
+
}
|
|
93
|
+
else if (error.name === 'TypeError') {
|
|
94
|
+
if (publicKey.user.id.byteLength < 1 || publicKey.user.id.byteLength > 64) {
|
|
95
|
+
return new WebAuthnError('User ID was not between 1 and 64 characters', 'TypeError');
|
|
96
|
+
}
|
|
97
|
+
}
|
|
98
|
+
else if (error.name === 'UnknownError') {
|
|
99
|
+
return new WebAuthnError('The authenticator was unable to process the specified options, or could not create a new credential', 'UnknownError');
|
|
100
|
+
}
|
|
101
|
+
return error;
|
|
102
|
+
}
|
|
103
|
+
|
|
41
104
|
async function startRegistration(creationOptionsJSON) {
|
|
42
105
|
if (!browserSupportsWebauthn()) {
|
|
43
106
|
throw new Error('WebAuthn is not supported in this browser');
|
|
@@ -51,7 +114,14 @@ async function startRegistration(creationOptionsJSON) {
|
|
|
51
114
|
},
|
|
52
115
|
excludeCredentials: creationOptionsJSON.excludeCredentials.map(toPublicKeyCredentialDescriptor),
|
|
53
116
|
};
|
|
54
|
-
const
|
|
117
|
+
const options = { publicKey };
|
|
118
|
+
let credential;
|
|
119
|
+
try {
|
|
120
|
+
credential = (await navigator.credentials.create(options));
|
|
121
|
+
}
|
|
122
|
+
catch (err) {
|
|
123
|
+
throw identifyRegistrationError({ error: err, options });
|
|
124
|
+
}
|
|
55
125
|
if (!credential) {
|
|
56
126
|
throw new Error('Registration was not completed');
|
|
57
127
|
}
|
|
@@ -76,6 +146,38 @@ function bufferToUTF8String(value) {
|
|
|
76
146
|
return new TextDecoder('utf-8').decode(value);
|
|
77
147
|
}
|
|
78
148
|
|
|
149
|
+
function identifyAuthenticationError({ error, options, }) {
|
|
150
|
+
var _a;
|
|
151
|
+
const { publicKey } = options;
|
|
152
|
+
if (!publicKey) {
|
|
153
|
+
throw Error('options was missing required publicKey property');
|
|
154
|
+
}
|
|
155
|
+
if (error.name === 'AbortError') {
|
|
156
|
+
if (options.signal === new AbortController().signal) {
|
|
157
|
+
return new WebAuthnError('Authentication ceremony was sent an abort signal', 'AbortError');
|
|
158
|
+
}
|
|
159
|
+
}
|
|
160
|
+
else if (error.name === 'NotAllowedError') {
|
|
161
|
+
if ((_a = publicKey.allowCredentials) === null || _a === void 0 ? void 0 : _a.length) {
|
|
162
|
+
return new WebAuthnError('No available authenticator recognized any of the allowed credentials', 'NotAllowedError');
|
|
163
|
+
}
|
|
164
|
+
return new WebAuthnError('User clicked cancel, or the authentication ceremony timed out', 'NotAllowedError');
|
|
165
|
+
}
|
|
166
|
+
else if (error.name === 'SecurityError') {
|
|
167
|
+
const effectiveDomain = window.location.hostname;
|
|
168
|
+
if (!isValidDomain(effectiveDomain)) {
|
|
169
|
+
return new WebAuthnError(`${window.location.hostname} is an invalid domain`, 'SecurityError');
|
|
170
|
+
}
|
|
171
|
+
else if (publicKey.rpId !== effectiveDomain) {
|
|
172
|
+
return new WebAuthnError(`The RP ID "${publicKey.rpId}" is invalid for this domain`, 'SecurityError');
|
|
173
|
+
}
|
|
174
|
+
}
|
|
175
|
+
else if (error.name === 'UnknownError') {
|
|
176
|
+
return new WebAuthnError('The authenticator was unable to process the specified options, or could not create a new assertion signature', 'UnknownError');
|
|
177
|
+
}
|
|
178
|
+
return error;
|
|
179
|
+
}
|
|
180
|
+
|
|
79
181
|
async function startAuthentication(requestOptionsJSON) {
|
|
80
182
|
var _a, _b;
|
|
81
183
|
if (!browserSupportsWebauthn()) {
|
|
@@ -90,7 +192,14 @@ async function startAuthentication(requestOptionsJSON) {
|
|
|
90
192
|
challenge: base64URLStringToBuffer(requestOptionsJSON.challenge),
|
|
91
193
|
allowCredentials,
|
|
92
194
|
};
|
|
93
|
-
const
|
|
195
|
+
const options = { publicKey };
|
|
196
|
+
let credential;
|
|
197
|
+
try {
|
|
198
|
+
credential = (await navigator.credentials.get(options));
|
|
199
|
+
}
|
|
200
|
+
catch (err) {
|
|
201
|
+
throw identifyAuthenticationError({ error: err, options });
|
|
202
|
+
}
|
|
94
203
|
if (!credential) {
|
|
95
204
|
throw new Error('Authentication was not completed');
|
|
96
205
|
}
|
|
@@ -114,6 +223,9 @@ async function startAuthentication(requestOptionsJSON) {
|
|
|
114
223
|
}
|
|
115
224
|
|
|
116
225
|
async function platformAuthenticatorIsAvailable() {
|
|
226
|
+
if (!browserSupportsWebauthn()) {
|
|
227
|
+
return false;
|
|
228
|
+
}
|
|
117
229
|
return PublicKeyCredential.isUserVerifyingPlatformAuthenticatorAvailable();
|
|
118
230
|
}
|
|
119
231
|
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
/* [@simplewebauthn/browser] Version:
|
|
2
|
-
!function(e,
|
|
1
|
+
/* [@simplewebauthn/browser] Version: 5.1.0 - Wednesday, April 13th, 2022, 8:40:46 AM */
|
|
2
|
+
!function(e,r){"object"==typeof exports&&"undefined"!=typeof module?r(exports):"function"==typeof define&&define.amd?define(["exports"],r):r((e="undefined"!=typeof globalThis?globalThis:e||self).SimpleWebAuthnBrowser={})}(this,(function(e){"use strict";function r(e){const r=new Uint8Array(e);let t="";for(const e of r)t+=String.fromCharCode(e);return btoa(t).replace(/\+/g,"-").replace(/\//g,"_").replace(/=/g,"")}function t(e){const r=e.replace(/-/g,"+").replace(/_/g,"/"),t=(4-r.length%4)%4,n=r.padEnd(r.length+t,"="),o=atob(n),i=new ArrayBuffer(o.length),a=new Uint8Array(i);for(let e=0;e<o.length;e++)a[e]=o.charCodeAt(e);return i}function n(){return void 0!==(null===window||void 0===window?void 0:window.PublicKeyCredential)&&"function"==typeof window.PublicKeyCredential}function o(e){const{id:r}=e;return{...e,id:t(r)}}function i(e){return"localhost"===e||/^([a-z0-9]+(-[a-z0-9]+)*\.)+[a-z]{2,}$/i.test(e)}class a extends Error{constructor(e,r="WebAuthnError"){super(e),this.name=r}}e.browserSupportsWebauthn=n,e.platformAuthenticatorIsAvailable=async function(){return!!n()&&PublicKeyCredential.isUserVerifyingPlatformAuthenticatorAvailable()},e.startAuthentication=async function(e){var s,l;if(!n())throw new Error("WebAuthn is not supported in this browser");let c;0!==(null===(s=e.allowCredentials)||void 0===s?void 0:s.length)&&(c=null===(l=e.allowCredentials)||void 0===l?void 0:l.map(o));const u={publicKey:{...e,challenge:t(e.challenge),allowCredentials:c}};let d;try{d=await navigator.credentials.get(u)}catch(e){throw function({error:e,options:r}){var t;const{publicKey:n}=r;if(!n)throw Error("options was missing required publicKey property");if("AbortError"===e.name){if(r.signal===(new AbortController).signal)return new a("Authentication ceremony was sent an abort signal","AbortError")}else{if("NotAllowedError"===e.name)return(null===(t=n.allowCredentials)||void 0===t?void 0:t.length)?new a("No available authenticator recognized any of the allowed credentials","NotAllowedError"):new a("User clicked cancel, or the authentication ceremony timed out","NotAllowedError");if("SecurityError"===e.name){const e=window.location.hostname;if(!i(e))return new a(`${window.location.hostname} is an invalid domain`,"SecurityError");if(n.rpId!==e)return new a(`The RP ID "${n.rpId}" is invalid for this domain`,"SecurityError")}else if("UnknownError"===e.name)return new a("The authenticator was unable to process the specified options, or could not create a new assertion signature","UnknownError")}return e}({error:e,options:u})}if(!d)throw new Error("Authentication was not completed");const{id:w,rawId:p,response:f,type:h}=d;let y;var b;return f.userHandle&&(b=f.userHandle,y=new TextDecoder("utf-8").decode(b)),{id:w,rawId:r(p),response:{authenticatorData:r(f.authenticatorData),clientDataJSON:r(f.clientDataJSON),signature:r(f.signature),userHandle:y},type:h,clientExtensionResults:d.getClientExtensionResults()}},e.startRegistration=async function(e){if(!n())throw new Error("WebAuthn is not supported in this browser");var s;const l={publicKey:{...e,challenge:t(e.challenge),user:{...e.user,id:(s=e.user.id,(new TextEncoder).encode(s))},excludeCredentials:e.excludeCredentials.map(o)}};let c;try{c=await navigator.credentials.create(l)}catch(e){throw function({error:e,options:r}){var t,n;const{publicKey:o}=r;if(!o)throw Error("options was missing required publicKey property");if("AbortError"===e.name){if(r.signal===(new AbortController).signal)return new a("Registration ceremony was sent an abort signal","AbortError")}else if("ConstraintError"===e.name){if(!0===(null===(t=o.authenticatorSelection)||void 0===t?void 0:t.requireResidentKey))return new a("Discoverable credentials were required but no available authenticator supported it","ConstraintError");if("required"===(null===(n=o.authenticatorSelection)||void 0===n?void 0:n.userVerification))return new a("User verification was required but no available authenticator supported it","ConstraintError")}else{if("InvalidStateError"===e.name)return new a("The authenticator was previously registered","InvalidStateError");if("NotAllowedError"===e.name)return new a("User clicked cancel, or the registration ceremony timed out","NotAllowedError");if("NotSupportedError"===e.name)return 0===o.pubKeyCredParams.filter((e=>"public-key"===e.type)).length?new a('No entry in pubKeyCredParams was of type "public-key"',"NotSupportedError"):new a("No available authenticator supported any of the specified pubKeyCredParams algorithms","NotSupportedError");if("SecurityError"===e.name){const e=window.location.hostname;if(!i(e))return new a(`${window.location.hostname} is an invalid domain`,"SecurityError");if(o.rp.id!==e)return new a(`The RP ID "${o.rp.id}" is invalid for this domain`,"SecurityError")}else if("TypeError"===e.name){if(o.user.id.byteLength<1||o.user.id.byteLength>64)return new a("User ID was not between 1 and 64 characters","TypeError")}else if("UnknownError"===e.name)return new a("The authenticator was unable to process the specified options, or could not create a new credential","UnknownError")}return e}({error:e,options:l})}if(!c)throw new Error("Registration was not completed");const{id:u,rawId:d,response:w,type:p}=c,f={id:u,rawId:r(d),response:{attestationObject:r(w.attestationObject),clientDataJSON:r(w.clientDataJSON)},type:p,clientExtensionResults:c.getClientExtensionResults()};return"function"==typeof w.getTransports&&(f.transports=w.getTransports()),f},Object.defineProperty(e,"__esModule",{value:!0})}));
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export declare function isValidDomain(hostname: string): boolean;
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@simplewebauthn/browser",
|
|
3
|
-
"version": "
|
|
3
|
+
"version": "5.1.0",
|
|
4
4
|
"description": "SimpleWebAuthn for Browsers",
|
|
5
5
|
"main": "dist/bundle/index.js",
|
|
6
6
|
"unpkg": "dist/bundle/index.umd.min.js",
|
|
@@ -32,11 +32,11 @@
|
|
|
32
32
|
"devDependencies": {
|
|
33
33
|
"@rollup/plugin-node-resolve": "^13.0.0",
|
|
34
34
|
"@rollup/plugin-typescript": "^8.2.1",
|
|
35
|
-
"@simplewebauthn/typescript-types": "^
|
|
35
|
+
"@simplewebauthn/typescript-types": "^5.0.0",
|
|
36
36
|
"rollup": "^2.52.1",
|
|
37
37
|
"rollup-plugin-terser": "^7.0.2",
|
|
38
38
|
"rollup-plugin-version-injector": "^1.3.3",
|
|
39
39
|
"typescript": "~4.3.5"
|
|
40
40
|
},
|
|
41
|
-
"gitHead": "
|
|
41
|
+
"gitHead": "3393143f68ecb428d61f43d2fa65915fbd38fa49"
|
|
42
42
|
}
|