react-native-authsignal 1.0.9 → 1.0.10

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -129,7 +129,7 @@ dependencies {
129
129
 
130
130
  implementation "androidx.browser:browser:1.2.0"
131
131
 
132
- implementation("com.authsignal:authsignal-android:1.0.11")
132
+ implementation("com.authsignal:authsignal-android:1.0.12")
133
133
  }
134
134
 
135
135
  if (isNewArchitectureEnabled()) {
@@ -63,8 +63,8 @@ public class AuthsignalEmailModule extends ReactContextBaseJavaModule {
63
63
  authsignalEmail
64
64
  .enrollAsync(email)
65
65
  .thenAcceptAsync(response -> {
66
- if (response.getErrorType() != null && response.getErrorType().equals("TYPE_TOKEN_NOT_SET")) {
67
- promise.reject("tokenNotSetError", "TOKEN_NOT_SET");
66
+ if (response.getErrorType() != null) {
67
+ promise.reject("enrollError", response.getErrorType());
68
68
  } else if (response.getError() != null) {
69
69
  promise.reject("enrollError", response.getError());
70
70
  } else {
@@ -87,8 +87,8 @@ public class AuthsignalEmailModule extends ReactContextBaseJavaModule {
87
87
  authsignalEmail
88
88
  .challengeAsync()
89
89
  .thenAcceptAsync(response -> {
90
- if (response.getErrorType() != null && response.getErrorType().equals("TYPE_TOKEN_NOT_SET")) {
91
- promise.reject("tokenNotSetError", "TOKEN_NOT_SET");
90
+ if (response.getErrorType() != null) {
91
+ promise.reject("challengeError", response.getErrorType());
92
92
  } else if (response.getError() != null) {
93
93
  promise.reject("challengeError", response.getError());
94
94
  } else {
@@ -111,8 +111,8 @@ public class AuthsignalEmailModule extends ReactContextBaseJavaModule {
111
111
  authsignalEmail
112
112
  .verifyAsync(code)
113
113
  .thenAcceptAsync(response -> {
114
- if (response.getErrorType() != null && response.getErrorType().equals("TYPE_TOKEN_NOT_SET")) {
115
- promise.reject("tokenNotSetError", "TOKEN_NOT_SET");
114
+ if (response.getErrorType() != null) {
115
+ promise.reject("verifyError", response.getErrorType());
116
116
  } else if (response.getError() != null) {
117
117
  promise.reject("verifyError", response.getError());
118
118
  } else {
@@ -65,8 +65,8 @@ public class AuthsignalPasskeyModule extends ReactContextBaseJavaModule {
65
65
  authsignalPasskey
66
66
  .signUpAsync(token, username, displayName)
67
67
  .thenAcceptAsync(response -> {
68
- if (response.getErrorType() != null && response.getErrorType().equals("TYPE_TOKEN_NOT_SET")) {
69
- promise.reject("tokenNotSetError", "TOKEN_NOT_SET");
68
+ if (response.getErrorType() != null) {
69
+ promise.reject("signUpError", response.getErrorType());
70
70
  } else if (response.getError() != null) {
71
71
  promise.reject("signUpError", response.getError());
72
72
  } else {
@@ -90,13 +90,7 @@ public class AuthsignalPasskeyModule extends ReactContextBaseJavaModule {
90
90
  .signInAsync(action, token)
91
91
  .thenAcceptAsync(response -> {
92
92
  if (response.getErrorType() != null) {
93
- if (response.getErrorType().equals("android.credentials.GetCredentialException.TYPE_NO_CREDENTIAL")) {
94
- promise.reject("signInNoCredential", "SIGN_IN_NO_CREDENTIAL");
95
- }
96
-
97
- if (response.getErrorType().equals("android.credentials.GetCredentialException.TYPE_USER_CANCELED")) {
98
- promise.reject("signInCanceled", "SIGN_IN_CANCELED");
99
- }
93
+ promise.reject("signInError", response.getErrorType());
100
94
  } else if (response.getError() != null) {
101
95
  promise.reject("signInError", response.getError());
102
96
  } else {
@@ -82,8 +82,8 @@ public class AuthsignalPushModule extends ReactContextBaseJavaModule {
82
82
  authsignalPush
83
83
  .addCredentialAsync(token, null)
84
84
  .thenAcceptAsync(response -> {
85
- if (response.getErrorType() != null && response.getErrorType().equals("TYPE_TOKEN_NOT_SET")) {
86
- promise.reject("tokenNotSetError", "TOKEN_NOT_SET");
85
+ if (response.getErrorType() != null) {
86
+ promise.reject("addCredentialError", response.getErrorType());
87
87
  } else if (response.getError() != null) {
88
88
  promise.reject("addCredentialError", response.getError());
89
89
  } else {
@@ -103,7 +103,9 @@ public class AuthsignalPushModule extends ReactContextBaseJavaModule {
103
103
  authsignalPush
104
104
  .removeCredentialAsync()
105
105
  .thenAcceptAsync(response -> {
106
- if (response.getError() != null) {
106
+ if (response.getErrorType() != null) {
107
+ promise.reject("removeCredentialError", response.getErrorType());
108
+ } else if (response.getError() != null) {
107
109
  promise.reject("removeCredentialError", response.getError());
108
110
  } else {
109
111
  promise.resolve(response.getData());
@@ -122,7 +124,9 @@ public class AuthsignalPushModule extends ReactContextBaseJavaModule {
122
124
  authsignalPush
123
125
  .getChallengeAsync()
124
126
  .thenAcceptAsync(response -> {
125
- if (response.getError() != null) {
127
+ if (response.getErrorType() != null) {
128
+ promise.reject("getChallengeError", response.getErrorType());
129
+ } else if (response.getError() != null) {
126
130
  promise.reject("getChallengeError", response.getError());
127
131
  } else {
128
132
  PushChallenge challenge = response.getData();
@@ -159,7 +163,9 @@ public class AuthsignalPushModule extends ReactContextBaseJavaModule {
159
163
  authsignalPush
160
164
  .updateChallengeAsync(challengeId, approved, verificationCode)
161
165
  .thenAcceptAsync(response -> {
162
- if (response.getError() != null) {
166
+ if (response.getErrorType() != null) {
167
+ promise.reject("updateChallengeError", response.getErrorType());
168
+ } else if (response.getError() != null) {
163
169
  promise.reject("updateChallengeError", response.getError());
164
170
  } else {
165
171
  promise.resolve(response.getData());
@@ -63,8 +63,8 @@ public class AuthsignalSMSModule extends ReactContextBaseJavaModule {
63
63
  authsignalSMS
64
64
  .enrollAsync(phoneNumber)
65
65
  .thenAcceptAsync(response -> {
66
- if (response.getErrorType() != null && response.getErrorType().equals("TYPE_TOKEN_NOT_SET")) {
67
- promise.reject("tokenNotSetError", "TOKEN_NOT_SET");
66
+ if (response.getErrorType() != null) {
67
+ promise.reject("enrollError", response.getErrorType());
68
68
  } else if (response.getError() != null) {
69
69
  promise.reject("enrollError", response.getError());
70
70
  } else {
@@ -87,8 +87,8 @@ public class AuthsignalSMSModule extends ReactContextBaseJavaModule {
87
87
  authsignalSMS
88
88
  .challengeAsync()
89
89
  .thenAcceptAsync(response -> {
90
- if (response.getErrorType() != null && response.getErrorType().equals("TYPE_TOKEN_NOT_SET")) {
91
- promise.reject("tokenNotSetError", "TOKEN_NOT_SET");
90
+ if (response.getErrorType() != null) {
91
+ promise.reject("challengeError", response.getErrorType());
92
92
  } else if (response.getError() != null) {
93
93
  promise.reject("challengeError", response.getError());
94
94
  } else {
@@ -111,8 +111,8 @@ public class AuthsignalSMSModule extends ReactContextBaseJavaModule {
111
111
  authsignalSMS
112
112
  .verifyAsync(code)
113
113
  .thenAcceptAsync(response -> {
114
- if (response.getErrorType() != null && response.getErrorType().equals("TYPE_TOKEN_NOT_SET")) {
115
- promise.reject("tokenNotSetError", "TOKEN_NOT_SET");
114
+ if (response.getErrorType() != null) {
115
+ promise.reject("verifyError", response.getErrorType());
116
116
  } else if (response.getError() != null) {
117
117
  promise.reject("verifyError", response.getError());
118
118
  } else {
@@ -64,8 +64,8 @@ public class AuthsignalTOTPModule extends ReactContextBaseJavaModule {
64
64
  authsignalTOTP
65
65
  .enrollAsync()
66
66
  .thenAcceptAsync(response -> {
67
- if (response.getErrorType() != null && response.getErrorType().equals("TYPE_TOKEN_NOT_SET")) {
68
- promise.reject("tokenNotSetError", "TOKEN_NOT_SET");
67
+ if (response.getErrorType() != null) {
68
+ promise.reject("enrollError", response.getErrorType());
69
69
  } else if (response.getError() != null) {
70
70
  promise.reject("enrollError", response.getError());
71
71
  } else {
@@ -90,8 +90,8 @@ public class AuthsignalTOTPModule extends ReactContextBaseJavaModule {
90
90
  authsignalTOTP
91
91
  .verifyAsync(code)
92
92
  .thenAcceptAsync(response -> {
93
- if (response.getErrorType() != null && response.getErrorType().equals("TYPE_TOKEN_NOT_SET")) {
94
- promise.reject("tokenNotSetError", "TOKEN_NOT_SET");
93
+ if (response.getErrorType() != null) {
94
+ promise.reject("verifyError", response.getErrorType());
95
95
  } else if (response.getError() != null) {
96
96
  promise.reject("verifyError", response.getError());
97
97
  } else {
@@ -36,8 +36,8 @@ class AuthsignalEmailModule: NSObject {
36
36
  Task.init {
37
37
  let response = await authsignal!.enroll(email: emailStr)
38
38
 
39
- if (response.errorCode == "TOKEN_NOT_SET") {
40
- reject("tokenNotSetError", "TOKEN_NOT_SET", nil)
39
+ if (response.errorCode != nil) {
40
+ reject("enrollError", response.errorCode, nil)
41
41
  } else if (response.error != nil) {
42
42
  reject("enrollError", response.error, nil)
43
43
  } else {
@@ -62,8 +62,8 @@ class AuthsignalEmailModule: NSObject {
62
62
  Task.init {
63
63
  let response = await authsignal!.challenge()
64
64
 
65
- if (response.errorCode == "TOKEN_NOT_SET") {
66
- reject("tokenNotSetError", "TOKEN_NOT_SET", nil)
65
+ if (response.errorCode != nil) {
66
+ reject("challengeError", response.errorCode, nil)
67
67
  } else if (response.error != nil) {
68
68
  reject("challengeError", response.error, nil)
69
69
  } else {
@@ -91,8 +91,8 @@ class AuthsignalEmailModule: NSObject {
91
91
  Task.init {
92
92
  let response = await authsignal!.verify(code: codeStr)
93
93
 
94
- if (response.errorCode == "TOKEN_NOT_SET") {
95
- reject("tokenNotSetError", "TOKEN_NOT_SET", nil)
94
+ if (response.errorCode != nil) {
95
+ reject("verifyError", response.errorCode, nil)
96
96
  } else if (response.error != nil) {
97
97
  reject("verifyError", response.error, nil)
98
98
  } else {
@@ -25,7 +25,7 @@ class AuthsignalModule: NSObject, ASWebAuthenticationPresentationContextProvidin
25
25
  let urlStr = url as String?
26
26
 
27
27
  guard let authUrl = URL(string: urlStr!) else {
28
- reject("AS_ERROR", "Invalid URL", nil)
28
+ reject("launchError", "Invalid URL", nil)
29
29
 
30
30
  return
31
31
  }
@@ -35,7 +35,7 @@ class AuthsignalModule: NSObject, ASWebAuthenticationPresentationContextProvidin
35
35
  if self.isCanceledLoginError(error) {
36
36
  resolve(nil)
37
37
  } else {
38
- reject("AS_ERROR", error.localizedDescription, nil)
38
+ reject("launchError", error.localizedDescription, nil)
39
39
  }
40
40
  } else if let callbackURL = callbackURL {
41
41
  let components = URLComponents(string: callbackURL.absoluteString)
@@ -40,8 +40,8 @@ class AuthsignalPasskeyModule: NSObject {
40
40
  Task.init {
41
41
  let response = await authsignal!.signUp(token: tokenStr, username: usernameStr, displayName: displayNameStr)
42
42
 
43
- if (response.errorCode == "TOKEN_NOT_SET") {
44
- reject("tokenNotSetError", "TOKEN_NOT_SET", nil)
43
+ if (response.errorCode != nil) {
44
+ reject("signUpError", response.errorCode, nil)
45
45
  } else if (response.error != nil) {
46
46
  reject("signUpError", response.error, nil)
47
47
  } else {
@@ -78,8 +78,8 @@ class AuthsignalPasskeyModule: NSObject {
78
78
  preferImmediatelyAvailableCredentials: preferImmediatelyAvailableCredentials
79
79
  )
80
80
 
81
- if (response.errorCode == "SIGN_IN_CANCELED") {
82
- reject("signInCanceled", "SIGN_IN_CANCELED", nil)
81
+ if (response.errorCode != nil) {
82
+ reject("signInError", response.errorCode, nil)
83
83
  } else if (response.error != nil) {
84
84
  reject("signInError", response.error, nil)
85
85
  } else {
@@ -65,8 +65,8 @@ class AuthsignalPushModule: NSObject {
65
65
  Task.init {
66
66
  let response = await authsignal.addCredential(token: tokenStr, keychainAccess: keychainAccess)
67
67
 
68
- if (response.errorCode == "TOKEN_NOT_SET") {
69
- reject("tokenNotSetError", "TOKEN_NOT_SET", nil)
68
+ if let errorCode = response.errorCode {
69
+ reject("addCredentialError", errorCode, nil)
70
70
  } else if let error = response.error {
71
71
  reject("addCredentialError", error, nil)
72
72
  } else {
@@ -87,7 +87,9 @@ class AuthsignalPushModule: NSObject {
87
87
  Task.init {
88
88
  let response = await authsignal.removeCredential()
89
89
 
90
- if let error = response.error {
90
+ if let errorCode = response.errorCode {
91
+ reject("removeCredentialError", errorCode, nil)
92
+ } else if let error = response.error {
91
93
  reject("removeCredentialError", error, nil)
92
94
  } else {
93
95
  resolve(response.data)
@@ -107,7 +109,9 @@ class AuthsignalPushModule: NSObject {
107
109
  Task.init {
108
110
  let response = await authsignal.getChallenge()
109
111
 
110
- if let error = response.error {
112
+ if let errorCode = response.errorCode {
113
+ reject("getChallengeError", errorCode, nil)
114
+ } else if let error = response.error {
111
115
  reject("getChallengeError", error, nil)
112
116
  } else if let data = response.data as? PushChallenge {
113
117
  let challenge: [String: String?] = [
@@ -149,7 +153,9 @@ class AuthsignalPushModule: NSObject {
149
153
  verificationCode: code
150
154
  )
151
155
 
152
- if let error = response.error {
156
+ if let errorCode = response.errorCode {
157
+ reject("updateChallengeError", errorCode, nil)
158
+ } else if let error = response.error {
153
159
  reject("updateChallengeError", error, nil)
154
160
  } else {
155
161
  resolve(response.data)
@@ -36,8 +36,8 @@ class AuthsignalSMSModule: NSObject {
36
36
  Task.init {
37
37
  let response = await authsignal!.enroll(phoneNumber: phoneNumberStr)
38
38
 
39
- if (response.errorCode == "TOKEN_NOT_SET") {
40
- reject("tokenNotSetError", "TOKEN_NOT_SET", nil)
39
+ if (response.errorCode != nil) {
40
+ reject("enrollError", response.errorCode, nil)
41
41
  } else if (response.error != nil) {
42
42
  reject("enrollError", response.error, nil)
43
43
  } else {
@@ -62,8 +62,8 @@ class AuthsignalSMSModule: NSObject {
62
62
  Task.init {
63
63
  let response = await authsignal!.challenge()
64
64
 
65
- if (response.errorCode == "TOKEN_NOT_SET") {
66
- reject("tokenNotSetError", "TOKEN_NOT_SET", nil)
65
+ if (response.errorCode != nil) {
66
+ reject("challengeError", response.errorCode, nil)
67
67
  } else if (response.error != nil) {
68
68
  reject("challengeError", response.error, nil)
69
69
  } else {
@@ -91,8 +91,8 @@ class AuthsignalSMSModule: NSObject {
91
91
  Task.init {
92
92
  let response = await authsignal!.verify(code: codeStr)
93
93
 
94
- if (response.errorCode == "TOKEN_NOT_SET") {
95
- reject("tokenNotSetError", "TOKEN_NOT_SET", nil)
94
+ if (response.errorCode != nil) {
95
+ reject("verifyError", response.errorCode, nil)
96
96
  } else if (response.error != nil) {
97
97
  reject("verifyError", response.error, nil)
98
98
  } else {
@@ -33,8 +33,8 @@ class AuthsignalTOTPModule: NSObject {
33
33
  Task.init {
34
34
  let response = await authsignal!.enroll()
35
35
 
36
- if (response.errorCode == "TOKEN_NOT_SET") {
37
- reject("tokenNotSetError", "TOKEN_NOT_SET", nil)
36
+ if (response.errorCode != nil) {
37
+ reject("enrollError", response.errorCode, nil)
38
38
  } else if (response.error != nil) {
39
39
  reject("enrollError", response.error, nil)
40
40
  } else {
@@ -64,8 +64,8 @@ class AuthsignalTOTPModule: NSObject {
64
64
  Task.init {
65
65
  let response = await authsignal!.verify(code: codeStr)
66
66
 
67
- if (response.errorCode == "TOKEN_NOT_SET") {
68
- reject("tokenNotSetError", "TOKEN_NOT_SET", nil)
67
+ if (response.errorCode != nil) {
68
+ reject("verifyError", response.errorCode, nil)
69
69
  } else if (response.error != nil) {
70
70
  reject("verifyError", response.error, nil)
71
71
  } else {
@@ -15,13 +15,12 @@ let ErrorCode;
15
15
  exports.ErrorCode = ErrorCode;
16
16
  (function (ErrorCode) {
17
17
  ErrorCode["tokenRequired"] = "tokenRequired";
18
- ErrorCode["tokenExpired"] = "tokenExpired";
19
18
  ErrorCode["passkeySignInCanceled"] = "passkeySignInCanceled";
20
19
  ErrorCode["noPasskeyCredentialAvailable"] = "noPasskeyCredentialAvailable";
21
20
  })(ErrorCode || (exports.ErrorCode = ErrorCode = {}));
22
21
  function handleErrorCodes(ex) {
23
22
  if (ex instanceof Error) {
24
- if (ex.message === 'NO_TOKEN_SET') {
23
+ if (ex.message === 'token_not_set') {
25
24
  return {
26
25
  error: 'Token is required. Call `setToken` first.',
27
26
  errorCode: ErrorCode.tokenRequired
@@ -1 +1 @@
1
- {"version":3,"names":["LINKING_ERROR","Platform","select","ios","default","ErrorCode","handleErrorCodes","ex","Error","message","error","errorCode","tokenRequired"],"sourceRoot":"../../src","sources":["error.ts"],"mappings":";;;;;;;AAAA;AAEO,MAAMA,aAAa,GACvB,kFAAiF,GAClFC,qBAAQ,CAACC,MAAM,CAAC;EAAEC,GAAG,EAAE,gCAAgC;EAAEC,OAAO,EAAE;AAAG,CAAC,CAAC,GACvE,sDAAsD,GACtD,+BAA+B;AAAC;AAAA,IAEtBC,SAAS;AAAA;AAAA,WAATA,SAAS;EAATA,SAAS;EAATA,SAAS;EAATA,SAAS;EAATA,SAAS;AAAA,GAATA,SAAS,yBAATA,SAAS;AAOd,SAASC,gBAAgB,CAACC,EAAW,EAAE;EAC5C,IAAIA,EAAE,YAAYC,KAAK,EAAE;IACvB,IAAID,EAAE,CAACE,OAAO,KAAK,cAAc,EAAE;MACjC,OAAO;QACLC,KAAK,EAAE,2CAA2C;QAClDC,SAAS,EAAEN,SAAS,CAACO;MACvB,CAAC;IACH,CAAC,MAAM;MACL,OAAO;QACLF,KAAK,EAAEH,EAAE,CAACE;MACZ,CAAC;IACH;EACF;EAEA,MAAMF,EAAE;AACV"}
1
+ {"version":3,"names":["LINKING_ERROR","Platform","select","ios","default","ErrorCode","handleErrorCodes","ex","Error","message","error","errorCode","tokenRequired"],"sourceRoot":"../../src","sources":["error.ts"],"mappings":";;;;;;;AAAA;AAEO,MAAMA,aAAa,GACvB,kFAAiF,GAClFC,qBAAQ,CAACC,MAAM,CAAC;EAAEC,GAAG,EAAE,gCAAgC;EAAEC,OAAO,EAAE;AAAG,CAAC,CAAC,GACvE,sDAAsD,GACtD,+BAA+B;AAAC;AAAA,IAEtBC,SAAS;AAAA;AAAA,WAATA,SAAS;EAATA,SAAS;EAATA,SAAS;EAATA,SAAS;AAAA,GAATA,SAAS,yBAATA,SAAS;AAMd,SAASC,gBAAgB,CAACC,EAAW,EAAE;EAC5C,IAAIA,EAAE,YAAYC,KAAK,EAAE;IACvB,IAAID,EAAE,CAACE,OAAO,KAAK,eAAe,EAAE;MAClC,OAAO;QACLC,KAAK,EAAE,2CAA2C;QAClDC,SAAS,EAAEN,SAAS,CAACO;MACvB,CAAC;IACH,CAAC,MAAM;MACL,OAAO;QACLF,KAAK,EAAEH,EAAE,CAACE;MACZ,CAAC;IACH;EACF;EAEA,MAAMF,EAAE;AACV"}
@@ -88,12 +88,12 @@ class AuthsignalPasskey {
88
88
  autofillRequestPending = false;
89
89
  if (ex instanceof Error) {
90
90
  switch (ex.message) {
91
- case 'SIGN_IN_CANCELED':
91
+ case 'user_canceled':
92
92
  return {
93
93
  errorCode: _error.ErrorCode.passkeySignInCanceled,
94
94
  error: 'Passkey sign-in canceled'
95
95
  };
96
- case 'SIGN_IN_NO_CREDENTIAL':
96
+ case 'no_credential':
97
97
  return {
98
98
  errorCode: _error.ErrorCode.noPasskeyCredentialAvailable,
99
99
  error: 'No passkey credential available'
@@ -1 +1 @@
1
- {"version":3,"names":["initialized","autofillRequestPending","AuthsignalPasskeyModule","NativeModules","Proxy","get","Error","LINKING_ERROR","AuthsignalPasskey","constructor","tenantID","baseURL","enableLogging","signUp","token","username","displayName","ensureModuleIsInitialized","data","ex","console","log","error","message","signIn","action","autofill","preferImmediatelyAvailableCredentials","Platform","OS","errorCode","ErrorCode","passkeySignInCanceled","noPasskeyCredentialAvailable","cancel","isAvailableOnDevice","initialize"],"sourceRoot":"../../src","sources":["passkey.ts"],"mappings":";;;;;;AAAA;AACA;AAAmD;AA0BnD,IAAIA,WAAW,GAAG,KAAK;AACvB,IAAIC,sBAAsB,GAAG,KAAK;AAElC,MAAMC,uBAAuB,GAAGC,0BAAa,CAACD,uBAAuB,GACjEC,0BAAa,CAACD,uBAAuB,GACrC,IAAIE,KAAK,CACP,CAAC,CAAC,EACF;EACEC,GAAG,GAAG;IACJ,MAAM,IAAIC,KAAK,CAACC,oBAAa,CAAC;EAChC;AACF,CAAC,CACF;AAEE,MAAMC,iBAAiB,CAAC;EAK7BC,WAAW,OAAwD;IAAA,IAAvD;MAAEC,QAAQ;MAAEC,OAAO;MAAEC;IAA+B,CAAC;IAAA;IAAA;IAAA;IAC/D,IAAI,CAACF,QAAQ,GAAGA,QAAQ;IACxB,IAAI,CAACC,OAAO,GAAGA,OAAO;IACtB,IAAI,CAACC,aAAa,GAAGA,aAAa;EACpC;EAEA,MAAMC,MAAM,GAI6D;IAAA,IAJ5D;MACXC,KAAK;MACLC,QAAQ;MACRC;IACkB,CAAC,uEAAG,CAAC,CAAC;IACxB,MAAM,IAAI,CAACC,yBAAyB,EAAE;IAEtC,IAAI;MACF,MAAMC,IAAI,GAAG,MAAMhB,uBAAuB,CAACW,MAAM,CAC/CC,KAAK,EACLC,QAAQ,EACRC,WAAW,CACZ;MAED,OAAO;QAAEE;MAAK,CAAC;IACjB,CAAC,CAAC,OAAOC,EAAE,EAAE;MACX,IAAI,IAAI,CAACP,aAAa,EAAE;QACtBQ,OAAO,CAACC,GAAG,CAACF,EAAE,CAAC;MACjB;MAEA,IAAIA,EAAE,YAAYb,KAAK,EAAE;QACvB,OAAO;UAAEgB,KAAK,EAAEH,EAAE,CAACI;QAAQ,CAAC;MAC9B;MAEA,MAAMJ,EAAE;IACV;EACF;EAEA,MAAMK,MAAM,GAK6D;IAAA,IAL5D;MACXC,MAAM;MACNX,KAAK;MACLY,QAAQ,GAAG,KAAK;MAChBC,qCAAqC,GAAG;IACtB,CAAC,uEAAG,CAAC,CAAC;IACxB,MAAM,IAAI,CAACV,yBAAyB,EAAE;IAEtC,IAAI;MACF,IAAIS,QAAQ,EAAE;QACZ,IAAIzB,sBAAsB,EAAE;UAC1B,OAAO,CAAC,CAAC;QACX,CAAC,MAAM;UACLA,sBAAsB,GAAG,IAAI;QAC/B;MACF;MAEA,IAAI2B,qBAAQ,CAACC,EAAE,KAAK,KAAK,EAAE;QACzB,MAAMX,IAAI,GAAG,MAAMhB,uBAAuB,CAACsB,MAAM,CAC/CC,MAAM,EACNX,KAAK,EACLY,QAAQ,EACRC,qCAAqC,CACtC;QAED1B,sBAAsB,GAAG,KAAK;QAE9B,OAAO;UAAEiB;QAAK,CAAC;MACjB,CAAC,MAAM;QACL,MAAMA,IAAI,GAAG,MAAMhB,uBAAuB,CAACsB,MAAM,CAACC,MAAM,EAAEX,KAAK,CAAC;QAEhEb,sBAAsB,GAAG,KAAK;QAE9B,OAAO;UAAEiB;QAAK,CAAC;MACjB;IACF,CAAC,CAAC,OAAOC,EAAE,EAAE;MACX,IAAI,IAAI,CAACP,aAAa,IAAI,CAACc,QAAQ,EAAE;QACnCN,OAAO,CAACC,GAAG,CAACF,EAAE,CAAC;MACjB;MAEAlB,sBAAsB,GAAG,KAAK;MAE9B,IAAIkB,EAAE,YAAYb,KAAK,EAAE;QACvB,QAAQa,EAAE,CAACI,OAAO;UAChB,KAAK,kBAAkB;YACrB,OAAO;cACLO,SAAS,EAAEC,gBAAS,CAACC,qBAAqB;cAC1CV,KAAK,EAAE;YACT,CAAC;UACH,KAAK,uBAAuB;YAC1B,OAAO;cACLQ,SAAS,EAAEC,gBAAS,CAACE,4BAA4B;cACjDX,KAAK,EAAE;YACT,CAAC;UACH;YACE,OAAO;cAAEA,KAAK,EAAEH,EAAE,CAACI;YAAQ,CAAC;QAAC;MAEnC;MAEA,MAAMJ,EAAE;IACV;EACF;EAEAe,MAAM,GAAG;IACP,IAAIN,qBAAQ,CAACC,EAAE,KAAK,KAAK,EAAE;MACzB3B,uBAAuB,CAACgC,MAAM,EAAE;IAClC;EACF;EAEA,MAAMC,mBAAmB,GAAqB;IAC5C,MAAM,IAAI,CAAClB,yBAAyB,EAAE;IAEtC,OAAO,MAAMf,uBAAuB,CAACiC,mBAAmB,EAAE;EAC5D;EAEA,MAAclB,yBAAyB,GAAG;IACxC,IAAIjB,WAAW,EAAE;MACf;IACF;IAEA,MAAME,uBAAuB,CAACkC,UAAU,CAAC,IAAI,CAAC1B,QAAQ,EAAE,IAAI,CAACC,OAAO,CAAC;IAErEX,WAAW,GAAG,IAAI;EACpB;AACF;AAAC"}
1
+ {"version":3,"names":["initialized","autofillRequestPending","AuthsignalPasskeyModule","NativeModules","Proxy","get","Error","LINKING_ERROR","AuthsignalPasskey","constructor","tenantID","baseURL","enableLogging","signUp","token","username","displayName","ensureModuleIsInitialized","data","ex","console","log","error","message","signIn","action","autofill","preferImmediatelyAvailableCredentials","Platform","OS","errorCode","ErrorCode","passkeySignInCanceled","noPasskeyCredentialAvailable","cancel","isAvailableOnDevice","initialize"],"sourceRoot":"../../src","sources":["passkey.ts"],"mappings":";;;;;;AAAA;AACA;AAAmD;AA0BnD,IAAIA,WAAW,GAAG,KAAK;AACvB,IAAIC,sBAAsB,GAAG,KAAK;AAElC,MAAMC,uBAAuB,GAAGC,0BAAa,CAACD,uBAAuB,GACjEC,0BAAa,CAACD,uBAAuB,GACrC,IAAIE,KAAK,CACP,CAAC,CAAC,EACF;EACEC,GAAG,GAAG;IACJ,MAAM,IAAIC,KAAK,CAACC,oBAAa,CAAC;EAChC;AACF,CAAC,CACF;AAEE,MAAMC,iBAAiB,CAAC;EAK7BC,WAAW,OAAwD;IAAA,IAAvD;MAAEC,QAAQ;MAAEC,OAAO;MAAEC;IAA+B,CAAC;IAAA;IAAA;IAAA;IAC/D,IAAI,CAACF,QAAQ,GAAGA,QAAQ;IACxB,IAAI,CAACC,OAAO,GAAGA,OAAO;IACtB,IAAI,CAACC,aAAa,GAAGA,aAAa;EACpC;EAEA,MAAMC,MAAM,GAI6D;IAAA,IAJ5D;MACXC,KAAK;MACLC,QAAQ;MACRC;IACkB,CAAC,uEAAG,CAAC,CAAC;IACxB,MAAM,IAAI,CAACC,yBAAyB,EAAE;IAEtC,IAAI;MACF,MAAMC,IAAI,GAAG,MAAMhB,uBAAuB,CAACW,MAAM,CAC/CC,KAAK,EACLC,QAAQ,EACRC,WAAW,CACZ;MAED,OAAO;QAAEE;MAAK,CAAC;IACjB,CAAC,CAAC,OAAOC,EAAE,EAAE;MACX,IAAI,IAAI,CAACP,aAAa,EAAE;QACtBQ,OAAO,CAACC,GAAG,CAACF,EAAE,CAAC;MACjB;MAEA,IAAIA,EAAE,YAAYb,KAAK,EAAE;QACvB,OAAO;UAAEgB,KAAK,EAAEH,EAAE,CAACI;QAAQ,CAAC;MAC9B;MAEA,MAAMJ,EAAE;IACV;EACF;EAEA,MAAMK,MAAM,GAK6D;IAAA,IAL5D;MACXC,MAAM;MACNX,KAAK;MACLY,QAAQ,GAAG,KAAK;MAChBC,qCAAqC,GAAG;IACtB,CAAC,uEAAG,CAAC,CAAC;IACxB,MAAM,IAAI,CAACV,yBAAyB,EAAE;IAEtC,IAAI;MACF,IAAIS,QAAQ,EAAE;QACZ,IAAIzB,sBAAsB,EAAE;UAC1B,OAAO,CAAC,CAAC;QACX,CAAC,MAAM;UACLA,sBAAsB,GAAG,IAAI;QAC/B;MACF;MAEA,IAAI2B,qBAAQ,CAACC,EAAE,KAAK,KAAK,EAAE;QACzB,MAAMX,IAAI,GAAG,MAAMhB,uBAAuB,CAACsB,MAAM,CAC/CC,MAAM,EACNX,KAAK,EACLY,QAAQ,EACRC,qCAAqC,CACtC;QAED1B,sBAAsB,GAAG,KAAK;QAE9B,OAAO;UAAEiB;QAAK,CAAC;MACjB,CAAC,MAAM;QACL,MAAMA,IAAI,GAAG,MAAMhB,uBAAuB,CAACsB,MAAM,CAACC,MAAM,EAAEX,KAAK,CAAC;QAEhEb,sBAAsB,GAAG,KAAK;QAE9B,OAAO;UAAEiB;QAAK,CAAC;MACjB;IACF,CAAC,CAAC,OAAOC,EAAE,EAAE;MACX,IAAI,IAAI,CAACP,aAAa,IAAI,CAACc,QAAQ,EAAE;QACnCN,OAAO,CAACC,GAAG,CAACF,EAAE,CAAC;MACjB;MAEAlB,sBAAsB,GAAG,KAAK;MAE9B,IAAIkB,EAAE,YAAYb,KAAK,EAAE;QACvB,QAAQa,EAAE,CAACI,OAAO;UAChB,KAAK,eAAe;YAClB,OAAO;cACLO,SAAS,EAAEC,gBAAS,CAACC,qBAAqB;cAC1CV,KAAK,EAAE;YACT,CAAC;UACH,KAAK,eAAe;YAClB,OAAO;cACLQ,SAAS,EAAEC,gBAAS,CAACE,4BAA4B;cACjDX,KAAK,EAAE;YACT,CAAC;UACH;YACE,OAAO;cAAEA,KAAK,EAAEH,EAAE,CAACI;YAAQ,CAAC;QAAC;MAEnC;MAEA,MAAMJ,EAAE;IACV;EACF;EAEAe,MAAM,GAAG;IACP,IAAIN,qBAAQ,CAACC,EAAE,KAAK,KAAK,EAAE;MACzB3B,uBAAuB,CAACgC,MAAM,EAAE;IAClC;EACF;EAEA,MAAMC,mBAAmB,GAAqB;IAC5C,MAAM,IAAI,CAAClB,yBAAyB,EAAE;IAEtC,OAAO,MAAMf,uBAAuB,CAACiC,mBAAmB,EAAE;EAC5D;EAEA,MAAclB,yBAAyB,GAAG;IACxC,IAAIjB,WAAW,EAAE;MACf;IACF;IAEA,MAAME,uBAAuB,CAACkC,UAAU,CAAC,IAAI,CAAC1B,QAAQ,EAAE,IAAI,CAACC,OAAO,CAAC;IAErEX,WAAW,GAAG,IAAI;EACpB;AACF;AAAC"}
@@ -6,13 +6,12 @@ export const LINKING_ERROR = `The package 'react-native-authsignal' doesn't seem
6
6
  export let ErrorCode;
7
7
  (function (ErrorCode) {
8
8
  ErrorCode["tokenRequired"] = "tokenRequired";
9
- ErrorCode["tokenExpired"] = "tokenExpired";
10
9
  ErrorCode["passkeySignInCanceled"] = "passkeySignInCanceled";
11
10
  ErrorCode["noPasskeyCredentialAvailable"] = "noPasskeyCredentialAvailable";
12
11
  })(ErrorCode || (ErrorCode = {}));
13
12
  export function handleErrorCodes(ex) {
14
13
  if (ex instanceof Error) {
15
- if (ex.message === 'NO_TOKEN_SET') {
14
+ if (ex.message === 'token_not_set') {
16
15
  return {
17
16
  error: 'Token is required. Call `setToken` first.',
18
17
  errorCode: ErrorCode.tokenRequired
@@ -1 +1 @@
1
- {"version":3,"names":["Platform","LINKING_ERROR","select","ios","default","ErrorCode","handleErrorCodes","ex","Error","message","error","errorCode","tokenRequired"],"sourceRoot":"../../src","sources":["error.ts"],"mappings":"AAAA,SAASA,QAAQ,QAAQ,cAAc;AAEvC,OAAO,MAAMC,aAAa,GACvB,kFAAiF,GAClFD,QAAQ,CAACE,MAAM,CAAC;EAAEC,GAAG,EAAE,gCAAgC;EAAEC,OAAO,EAAE;AAAG,CAAC,CAAC,GACvE,sDAAsD,GACtD,+BAA+B;AAEjC,WAAYC,SAAS;AAKpB,WALWA,SAAS;EAATA,SAAS;EAATA,SAAS;EAATA,SAAS;EAATA,SAAS;AAAA,GAATA,SAAS,KAATA,SAAS;AAOrB,OAAO,SAASC,gBAAgB,CAACC,EAAW,EAAE;EAC5C,IAAIA,EAAE,YAAYC,KAAK,EAAE;IACvB,IAAID,EAAE,CAACE,OAAO,KAAK,cAAc,EAAE;MACjC,OAAO;QACLC,KAAK,EAAE,2CAA2C;QAClDC,SAAS,EAAEN,SAAS,CAACO;MACvB,CAAC;IACH,CAAC,MAAM;MACL,OAAO;QACLF,KAAK,EAAEH,EAAE,CAACE;MACZ,CAAC;IACH;EACF;EAEA,MAAMF,EAAE;AACV"}
1
+ {"version":3,"names":["Platform","LINKING_ERROR","select","ios","default","ErrorCode","handleErrorCodes","ex","Error","message","error","errorCode","tokenRequired"],"sourceRoot":"../../src","sources":["error.ts"],"mappings":"AAAA,SAASA,QAAQ,QAAQ,cAAc;AAEvC,OAAO,MAAMC,aAAa,GACvB,kFAAiF,GAClFD,QAAQ,CAACE,MAAM,CAAC;EAAEC,GAAG,EAAE,gCAAgC;EAAEC,OAAO,EAAE;AAAG,CAAC,CAAC,GACvE,sDAAsD,GACtD,+BAA+B;AAEjC,WAAYC,SAAS;AAIpB,WAJWA,SAAS;EAATA,SAAS;EAATA,SAAS;EAATA,SAAS;AAAA,GAATA,SAAS,KAATA,SAAS;AAMrB,OAAO,SAASC,gBAAgB,CAACC,EAAW,EAAE;EAC5C,IAAIA,EAAE,YAAYC,KAAK,EAAE;IACvB,IAAID,EAAE,CAACE,OAAO,KAAK,eAAe,EAAE;MAClC,OAAO;QACLC,KAAK,EAAE,2CAA2C;QAClDC,SAAS,EAAEN,SAAS,CAACO;MACvB,CAAC;IACH,CAAC,MAAM;MACL,OAAO;QACLF,KAAK,EAAEH,EAAE,CAACE;MACZ,CAAC;IACH;EACF;EAEA,MAAMF,EAAE;AACV"}
@@ -82,12 +82,12 @@ export class AuthsignalPasskey {
82
82
  autofillRequestPending = false;
83
83
  if (ex instanceof Error) {
84
84
  switch (ex.message) {
85
- case 'SIGN_IN_CANCELED':
85
+ case 'user_canceled':
86
86
  return {
87
87
  errorCode: ErrorCode.passkeySignInCanceled,
88
88
  error: 'Passkey sign-in canceled'
89
89
  };
90
- case 'SIGN_IN_NO_CREDENTIAL':
90
+ case 'no_credential':
91
91
  return {
92
92
  errorCode: ErrorCode.noPasskeyCredentialAvailable,
93
93
  error: 'No passkey credential available'
@@ -1 +1 @@
1
- {"version":3,"names":["NativeModules","Platform","LINKING_ERROR","ErrorCode","initialized","autofillRequestPending","AuthsignalPasskeyModule","Proxy","get","Error","AuthsignalPasskey","constructor","tenantID","baseURL","enableLogging","signUp","token","username","displayName","ensureModuleIsInitialized","data","ex","console","log","error","message","signIn","action","autofill","preferImmediatelyAvailableCredentials","OS","errorCode","passkeySignInCanceled","noPasskeyCredentialAvailable","cancel","isAvailableOnDevice","initialize"],"sourceRoot":"../../src","sources":["passkey.ts"],"mappings":";AAAA,SAASA,aAAa,EAAEC,QAAQ,QAAQ,cAAc;AACtD,SAASC,aAAa,EAAEC,SAAS,QAAQ,SAAS;AA0BlD,IAAIC,WAAW,GAAG,KAAK;AACvB,IAAIC,sBAAsB,GAAG,KAAK;AAElC,MAAMC,uBAAuB,GAAGN,aAAa,CAACM,uBAAuB,GACjEN,aAAa,CAACM,uBAAuB,GACrC,IAAIC,KAAK,CACP,CAAC,CAAC,EACF;EACEC,GAAG,GAAG;IACJ,MAAM,IAAIC,KAAK,CAACP,aAAa,CAAC;EAChC;AACF,CAAC,CACF;AAEL,OAAO,MAAMQ,iBAAiB,CAAC;EAK7BC,WAAW,OAAwD;IAAA,IAAvD;MAAEC,QAAQ;MAAEC,OAAO;MAAEC;IAA+B,CAAC;IAAA;IAAA;IAAA;IAC/D,IAAI,CAACF,QAAQ,GAAGA,QAAQ;IACxB,IAAI,CAACC,OAAO,GAAGA,OAAO;IACtB,IAAI,CAACC,aAAa,GAAGA,aAAa;EACpC;EAEA,MAAMC,MAAM,GAI6D;IAAA,IAJ5D;MACXC,KAAK;MACLC,QAAQ;MACRC;IACkB,CAAC,uEAAG,CAAC,CAAC;IACxB,MAAM,IAAI,CAACC,yBAAyB,EAAE;IAEtC,IAAI;MACF,MAAMC,IAAI,GAAG,MAAMd,uBAAuB,CAACS,MAAM,CAC/CC,KAAK,EACLC,QAAQ,EACRC,WAAW,CACZ;MAED,OAAO;QAAEE;MAAK,CAAC;IACjB,CAAC,CAAC,OAAOC,EAAE,EAAE;MACX,IAAI,IAAI,CAACP,aAAa,EAAE;QACtBQ,OAAO,CAACC,GAAG,CAACF,EAAE,CAAC;MACjB;MAEA,IAAIA,EAAE,YAAYZ,KAAK,EAAE;QACvB,OAAO;UAAEe,KAAK,EAAEH,EAAE,CAACI;QAAQ,CAAC;MAC9B;MAEA,MAAMJ,EAAE;IACV;EACF;EAEA,MAAMK,MAAM,GAK6D;IAAA,IAL5D;MACXC,MAAM;MACNX,KAAK;MACLY,QAAQ,GAAG,KAAK;MAChBC,qCAAqC,GAAG;IACtB,CAAC,uEAAG,CAAC,CAAC;IACxB,MAAM,IAAI,CAACV,yBAAyB,EAAE;IAEtC,IAAI;MACF,IAAIS,QAAQ,EAAE;QACZ,IAAIvB,sBAAsB,EAAE;UAC1B,OAAO,CAAC,CAAC;QACX,CAAC,MAAM;UACLA,sBAAsB,GAAG,IAAI;QAC/B;MACF;MAEA,IAAIJ,QAAQ,CAAC6B,EAAE,KAAK,KAAK,EAAE;QACzB,MAAMV,IAAI,GAAG,MAAMd,uBAAuB,CAACoB,MAAM,CAC/CC,MAAM,EACNX,KAAK,EACLY,QAAQ,EACRC,qCAAqC,CACtC;QAEDxB,sBAAsB,GAAG,KAAK;QAE9B,OAAO;UAAEe;QAAK,CAAC;MACjB,CAAC,MAAM;QACL,MAAMA,IAAI,GAAG,MAAMd,uBAAuB,CAACoB,MAAM,CAACC,MAAM,EAAEX,KAAK,CAAC;QAEhEX,sBAAsB,GAAG,KAAK;QAE9B,OAAO;UAAEe;QAAK,CAAC;MACjB;IACF,CAAC,CAAC,OAAOC,EAAE,EAAE;MACX,IAAI,IAAI,CAACP,aAAa,IAAI,CAACc,QAAQ,EAAE;QACnCN,OAAO,CAACC,GAAG,CAACF,EAAE,CAAC;MACjB;MAEAhB,sBAAsB,GAAG,KAAK;MAE9B,IAAIgB,EAAE,YAAYZ,KAAK,EAAE;QACvB,QAAQY,EAAE,CAACI,OAAO;UAChB,KAAK,kBAAkB;YACrB,OAAO;cACLM,SAAS,EAAE5B,SAAS,CAAC6B,qBAAqB;cAC1CR,KAAK,EAAE;YACT,CAAC;UACH,KAAK,uBAAuB;YAC1B,OAAO;cACLO,SAAS,EAAE5B,SAAS,CAAC8B,4BAA4B;cACjDT,KAAK,EAAE;YACT,CAAC;UACH;YACE,OAAO;cAAEA,KAAK,EAAEH,EAAE,CAACI;YAAQ,CAAC;QAAC;MAEnC;MAEA,MAAMJ,EAAE;IACV;EACF;EAEAa,MAAM,GAAG;IACP,IAAIjC,QAAQ,CAAC6B,EAAE,KAAK,KAAK,EAAE;MACzBxB,uBAAuB,CAAC4B,MAAM,EAAE;IAClC;EACF;EAEA,MAAMC,mBAAmB,GAAqB;IAC5C,MAAM,IAAI,CAAChB,yBAAyB,EAAE;IAEtC,OAAO,MAAMb,uBAAuB,CAAC6B,mBAAmB,EAAE;EAC5D;EAEA,MAAchB,yBAAyB,GAAG;IACxC,IAAIf,WAAW,EAAE;MACf;IACF;IAEA,MAAME,uBAAuB,CAAC8B,UAAU,CAAC,IAAI,CAACxB,QAAQ,EAAE,IAAI,CAACC,OAAO,CAAC;IAErET,WAAW,GAAG,IAAI;EACpB;AACF"}
1
+ {"version":3,"names":["NativeModules","Platform","LINKING_ERROR","ErrorCode","initialized","autofillRequestPending","AuthsignalPasskeyModule","Proxy","get","Error","AuthsignalPasskey","constructor","tenantID","baseURL","enableLogging","signUp","token","username","displayName","ensureModuleIsInitialized","data","ex","console","log","error","message","signIn","action","autofill","preferImmediatelyAvailableCredentials","OS","errorCode","passkeySignInCanceled","noPasskeyCredentialAvailable","cancel","isAvailableOnDevice","initialize"],"sourceRoot":"../../src","sources":["passkey.ts"],"mappings":";AAAA,SAASA,aAAa,EAAEC,QAAQ,QAAQ,cAAc;AACtD,SAASC,aAAa,EAAEC,SAAS,QAAQ,SAAS;AA0BlD,IAAIC,WAAW,GAAG,KAAK;AACvB,IAAIC,sBAAsB,GAAG,KAAK;AAElC,MAAMC,uBAAuB,GAAGN,aAAa,CAACM,uBAAuB,GACjEN,aAAa,CAACM,uBAAuB,GACrC,IAAIC,KAAK,CACP,CAAC,CAAC,EACF;EACEC,GAAG,GAAG;IACJ,MAAM,IAAIC,KAAK,CAACP,aAAa,CAAC;EAChC;AACF,CAAC,CACF;AAEL,OAAO,MAAMQ,iBAAiB,CAAC;EAK7BC,WAAW,OAAwD;IAAA,IAAvD;MAAEC,QAAQ;MAAEC,OAAO;MAAEC;IAA+B,CAAC;IAAA;IAAA;IAAA;IAC/D,IAAI,CAACF,QAAQ,GAAGA,QAAQ;IACxB,IAAI,CAACC,OAAO,GAAGA,OAAO;IACtB,IAAI,CAACC,aAAa,GAAGA,aAAa;EACpC;EAEA,MAAMC,MAAM,GAI6D;IAAA,IAJ5D;MACXC,KAAK;MACLC,QAAQ;MACRC;IACkB,CAAC,uEAAG,CAAC,CAAC;IACxB,MAAM,IAAI,CAACC,yBAAyB,EAAE;IAEtC,IAAI;MACF,MAAMC,IAAI,GAAG,MAAMd,uBAAuB,CAACS,MAAM,CAC/CC,KAAK,EACLC,QAAQ,EACRC,WAAW,CACZ;MAED,OAAO;QAAEE;MAAK,CAAC;IACjB,CAAC,CAAC,OAAOC,EAAE,EAAE;MACX,IAAI,IAAI,CAACP,aAAa,EAAE;QACtBQ,OAAO,CAACC,GAAG,CAACF,EAAE,CAAC;MACjB;MAEA,IAAIA,EAAE,YAAYZ,KAAK,EAAE;QACvB,OAAO;UAAEe,KAAK,EAAEH,EAAE,CAACI;QAAQ,CAAC;MAC9B;MAEA,MAAMJ,EAAE;IACV;EACF;EAEA,MAAMK,MAAM,GAK6D;IAAA,IAL5D;MACXC,MAAM;MACNX,KAAK;MACLY,QAAQ,GAAG,KAAK;MAChBC,qCAAqC,GAAG;IACtB,CAAC,uEAAG,CAAC,CAAC;IACxB,MAAM,IAAI,CAACV,yBAAyB,EAAE;IAEtC,IAAI;MACF,IAAIS,QAAQ,EAAE;QACZ,IAAIvB,sBAAsB,EAAE;UAC1B,OAAO,CAAC,CAAC;QACX,CAAC,MAAM;UACLA,sBAAsB,GAAG,IAAI;QAC/B;MACF;MAEA,IAAIJ,QAAQ,CAAC6B,EAAE,KAAK,KAAK,EAAE;QACzB,MAAMV,IAAI,GAAG,MAAMd,uBAAuB,CAACoB,MAAM,CAC/CC,MAAM,EACNX,KAAK,EACLY,QAAQ,EACRC,qCAAqC,CACtC;QAEDxB,sBAAsB,GAAG,KAAK;QAE9B,OAAO;UAAEe;QAAK,CAAC;MACjB,CAAC,MAAM;QACL,MAAMA,IAAI,GAAG,MAAMd,uBAAuB,CAACoB,MAAM,CAACC,MAAM,EAAEX,KAAK,CAAC;QAEhEX,sBAAsB,GAAG,KAAK;QAE9B,OAAO;UAAEe;QAAK,CAAC;MACjB;IACF,CAAC,CAAC,OAAOC,EAAE,EAAE;MACX,IAAI,IAAI,CAACP,aAAa,IAAI,CAACc,QAAQ,EAAE;QACnCN,OAAO,CAACC,GAAG,CAACF,EAAE,CAAC;MACjB;MAEAhB,sBAAsB,GAAG,KAAK;MAE9B,IAAIgB,EAAE,YAAYZ,KAAK,EAAE;QACvB,QAAQY,EAAE,CAACI,OAAO;UAChB,KAAK,eAAe;YAClB,OAAO;cACLM,SAAS,EAAE5B,SAAS,CAAC6B,qBAAqB;cAC1CR,KAAK,EAAE;YACT,CAAC;UACH,KAAK,eAAe;YAClB,OAAO;cACLO,SAAS,EAAE5B,SAAS,CAAC8B,4BAA4B;cACjDT,KAAK,EAAE;YACT,CAAC;UACH;YACE,OAAO;cAAEA,KAAK,EAAEH,EAAE,CAACI;YAAQ,CAAC;QAAC;MAEnC;MAEA,MAAMJ,EAAE;IACV;EACF;EAEAa,MAAM,GAAG;IACP,IAAIjC,QAAQ,CAAC6B,EAAE,KAAK,KAAK,EAAE;MACzBxB,uBAAuB,CAAC4B,MAAM,EAAE;IAClC;EACF;EAEA,MAAMC,mBAAmB,GAAqB;IAC5C,MAAM,IAAI,CAAChB,yBAAyB,EAAE;IAEtC,OAAO,MAAMb,uBAAuB,CAAC6B,mBAAmB,EAAE;EAC5D;EAEA,MAAchB,yBAAyB,GAAG;IACxC,IAAIf,WAAW,EAAE;MACf;IACF;IAEA,MAAME,uBAAuB,CAAC8B,UAAU,CAAC,IAAI,CAACxB,QAAQ,EAAE,IAAI,CAACC,OAAO,CAAC;IAErET,WAAW,GAAG,IAAI;EACpB;AACF"}
@@ -1,7 +1,6 @@
1
1
  export declare const LINKING_ERROR: string;
2
2
  export declare enum ErrorCode {
3
3
  tokenRequired = "tokenRequired",
4
- tokenExpired = "tokenExpired",
5
4
  passkeySignInCanceled = "passkeySignInCanceled",
6
5
  noPasskeyCredentialAvailable = "noPasskeyCredentialAvailable"
7
6
  }
@@ -1 +1 @@
1
- {"version":3,"file":"error.d.ts","sourceRoot":"","sources":["../../src/error.ts"],"names":[],"mappings":"AAEA,eAAO,MAAM,aAAa,QAIO,CAAC;AAElC,oBAAY,SAAS;IACnB,aAAa,kBAAkB;IAC/B,YAAY,iBAAiB;IAC7B,qBAAqB,0BAA0B;IAC/C,4BAA4B,iCAAiC;CAC9D;AAED,wBAAgB,gBAAgB,CAAC,EAAE,EAAE,OAAO;;;;;;EAe3C"}
1
+ {"version":3,"file":"error.d.ts","sourceRoot":"","sources":["../../src/error.ts"],"names":[],"mappings":"AAEA,eAAO,MAAM,aAAa,QAIO,CAAC;AAElC,oBAAY,SAAS;IACnB,aAAa,kBAAkB;IAC/B,qBAAqB,0BAA0B;IAC/C,4BAA4B,iCAAiC;CAC9D;AAED,wBAAgB,gBAAgB,CAAC,EAAE,EAAE,OAAO;;;;;;EAe3C"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "react-native-authsignal",
3
- "version": "1.0.9",
3
+ "version": "1.0.10",
4
4
  "description": "The official Authsignal React Native library.",
5
5
  "main": "lib/commonjs/index",
6
6
  "module": "lib/module/index",
@@ -17,7 +17,7 @@ Pod::Spec.new do |s|
17
17
  s.source_files = "ios/**/*.{h,m,mm,swift}"
18
18
 
19
19
  s.dependency "React-Core"
20
- s.dependency 'Authsignal', '1.0.7'
20
+ s.dependency 'Authsignal', '1.0.8'
21
21
 
22
22
  # Don't install the dependencies when we run `pod install` in the old architecture.
23
23
  if ENV['RCT_NEW_ARCH_ENABLED'] == '1' then
package/src/error.ts CHANGED
@@ -8,14 +8,13 @@ export const LINKING_ERROR =
8
8
 
9
9
  export enum ErrorCode {
10
10
  tokenRequired = 'tokenRequired',
11
- tokenExpired = 'tokenExpired',
12
11
  passkeySignInCanceled = 'passkeySignInCanceled',
13
12
  noPasskeyCredentialAvailable = 'noPasskeyCredentialAvailable',
14
13
  }
15
14
 
16
15
  export function handleErrorCodes(ex: unknown) {
17
16
  if (ex instanceof Error) {
18
- if (ex.message === 'NO_TOKEN_SET') {
17
+ if (ex.message === 'token_not_set') {
19
18
  return {
20
19
  error: 'Token is required. Call `setToken` first.',
21
20
  errorCode: ErrorCode.tokenRequired,
package/src/passkey.ts CHANGED
@@ -122,12 +122,12 @@ export class AuthsignalPasskey {
122
122
 
123
123
  if (ex instanceof Error) {
124
124
  switch (ex.message) {
125
- case 'SIGN_IN_CANCELED':
125
+ case 'user_canceled':
126
126
  return {
127
127
  errorCode: ErrorCode.passkeySignInCanceled,
128
128
  error: 'Passkey sign-in canceled',
129
129
  };
130
- case 'SIGN_IN_NO_CREDENTIAL':
130
+ case 'no_credential':
131
131
  return {
132
132
  errorCode: ErrorCode.noPasskeyCredentialAvailable,
133
133
  error: 'No passkey credential available',