summaryrefslogtreecommitdiffhomepage
diff options
context:
space:
mode:
-rw-r--r--packages/browser/src/helpers/browserSupportsWebAuthnAutofill.ts1
-rw-r--r--packages/browser/src/helpers/identifyAuthenticationError.ts37
-rw-r--r--packages/browser/src/helpers/identifyRegistrationError.ts85
-rw-r--r--packages/browser/src/helpers/structs.ts23
-rw-r--r--packages/browser/src/helpers/webAuthnAbortService.test.ts2
-rw-r--r--packages/browser/src/helpers/webAuthnError.ts56
-rw-r--r--packages/browser/src/index.ts2
-rw-r--r--packages/browser/src/methods/startAuthentication.test.ts16
-rw-r--r--packages/browser/src/methods/startRegistration.test.ts31
-rw-r--r--packages/browser/tsconfig.es5.json2
-rw-r--r--packages/browser/tsconfig.json6
11 files changed, 187 insertions, 74 deletions
diff --git a/packages/browser/src/helpers/browserSupportsWebAuthnAutofill.ts b/packages/browser/src/helpers/browserSupportsWebAuthnAutofill.ts
index 117bf4c..afc1176 100644
--- a/packages/browser/src/helpers/browserSupportsWebAuthnAutofill.ts
+++ b/packages/browser/src/helpers/browserSupportsWebAuthnAutofill.ts
@@ -1,4 +1,3 @@
-/* eslint-disable @typescript-eslint/ban-ts-comment */
import { PublicKeyCredentialFuture } from '@simplewebauthn/typescript-types';
/**
diff --git a/packages/browser/src/helpers/identifyAuthenticationError.ts b/packages/browser/src/helpers/identifyAuthenticationError.ts
index 600a2d6..e617a7d 100644
--- a/packages/browser/src/helpers/identifyAuthenticationError.ts
+++ b/packages/browser/src/helpers/identifyAuthenticationError.ts
@@ -1,5 +1,5 @@
import { isValidDomain } from './isValidDomain';
-import { WebAuthnError } from './structs';
+import { WebAuthnError } from './webAuthnError';
/**
* Attempt to intuit _why_ an error was raised after calling `navigator.credentials.get()`
@@ -20,32 +20,47 @@ export function identifyAuthenticationError({
if (error.name === 'AbortError') {
if (options.signal === new AbortController().signal) {
// https://www.w3.org/TR/webauthn-2/#sctn-createCredential (Step 16)
- return new WebAuthnError('Authentication ceremony was sent an abort signal', 'AbortError');
+ return new WebAuthnError({
+ message: 'Authentication ceremony was sent an abort signal',
+ code: 'ERROR_CEREMONY_ABORTED',
+ cause: error,
+ });
}
} else if (error.name === 'NotAllowedError') {
/**
* Pass the error directly through. Platforms are overloading this error beyond what the spec
* defines and we don't want to overwrite potentially useful error messages.
*/
+ return new WebAuthnError({
+ message: error.message,
+ code: 'ERROR_PASSTHROUGH_SEE_CAUSE_PROPERTY',
+ cause: error,
+ });
} else if (error.name === 'SecurityError') {
const effectiveDomain = window.location.hostname;
if (!isValidDomain(effectiveDomain)) {
// https://www.w3.org/TR/webauthn-2/#sctn-discover-from-external-source (Step 5)
- return new WebAuthnError(`${window.location.hostname} is an invalid domain`, 'SecurityError');
+ return new WebAuthnError({
+ message: `${window.location.hostname} is an invalid domain`,
+ code: 'ERROR_INVALID_DOMAIN',
+ cause: error,
+ });
} else if (publicKey.rpId !== effectiveDomain) {
// https://www.w3.org/TR/webauthn-2/#sctn-discover-from-external-source (Step 6)
- return new WebAuthnError(
- `The RP ID "${publicKey.rpId}" is invalid for this domain`,
- 'SecurityError',
- );
+ return new WebAuthnError({
+ message: `The RP ID "${publicKey.rpId}" is invalid for this domain`,
+ code: 'ERROR_INVALID_RP_ID',
+ cause: error,
+ });
}
} else if (error.name === 'UnknownError') {
// https://www.w3.org/TR/webauthn-2/#sctn-op-get-assertion (Step 1)
// https://www.w3.org/TR/webauthn-2/#sctn-op-get-assertion (Step 12)
- return new WebAuthnError(
- 'The authenticator was unable to process the specified options, or could not create a new assertion signature',
- 'UnknownError',
- );
+ return new WebAuthnError({
+ message: 'The authenticator was unable to process the specified options, or could not create a new assertion signature',
+ code: 'ERROR_AUTHENTICATOR_GENERAL_ERROR',
+ cause: error,
+ });
}
return error;
diff --git a/packages/browser/src/helpers/identifyRegistrationError.ts b/packages/browser/src/helpers/identifyRegistrationError.ts
index 9b76454..4649fb9 100644
--- a/packages/browser/src/helpers/identifyRegistrationError.ts
+++ b/packages/browser/src/helpers/identifyRegistrationError.ts
@@ -1,5 +1,5 @@
import { isValidDomain } from './isValidDomain';
-import { WebAuthnError } from './structs';
+import { WebAuthnError } from './webAuthnError';
/**
* Attempt to intuit _why_ an error was raised after calling `navigator.credentials.create()`
@@ -20,31 +20,46 @@ export function identifyRegistrationError({
if (error.name === 'AbortError') {
if (options.signal === new AbortController().signal) {
// https://www.w3.org/TR/webauthn-2/#sctn-createCredential (Step 16)
- return new WebAuthnError('Registration ceremony was sent an abort signal', 'AbortError');
+ return new WebAuthnError({
+ message: 'Registration ceremony was sent an abort signal',
+ code: 'ERROR_CEREMONY_ABORTED',
+ cause: error,
+ });
}
} else if (error.name === 'ConstraintError') {
if (publicKey.authenticatorSelection?.requireResidentKey === true) {
// https://www.w3.org/TR/webauthn-2/#sctn-op-make-cred (Step 4)
- return new WebAuthnError(
- 'Discoverable credentials were required but no available authenticator supported it',
- 'ConstraintError',
- );
+ return new WebAuthnError({
+ message: 'Discoverable credentials were required but no available authenticator supported it',
+ code: 'ERROR_AUTHENTICATOR_MISSING_DISCOVERABLE_CREDENTIAL_SUPPORT',
+ cause: error,
+ });
} else if (publicKey.authenticatorSelection?.userVerification === 'required') {
// https://www.w3.org/TR/webauthn-2/#sctn-op-make-cred (Step 5)
- return new WebAuthnError(
- 'User verification was required but no available authenticator supported it',
- 'ConstraintError',
- );
+ return new WebAuthnError({
+ message: 'User verification was required but no available authenticator supported it',
+ code: 'ERROR_AUTHENTICATOR_MISSING_USER_VERIFICATION_SUPPORT',
+ cause: error,
+ });
}
} else if (error.name === 'InvalidStateError') {
// https://www.w3.org/TR/webauthn-2/#sctn-createCredential (Step 20)
// https://www.w3.org/TR/webauthn-2/#sctn-op-make-cred (Step 3)
- return new WebAuthnError('The authenticator was previously registered', 'InvalidStateError');
+ return new WebAuthnError({
+ message: 'The authenticator was previously registered',
+ code: 'ERROR_AUTHENTICATOR_PREVIOUSLY_REGISTERED',
+ cause: error
+ });
} else if (error.name === 'NotAllowedError') {
/**
* Pass the error directly through. Platforms are overloading this error beyond what the spec
* defines and we don't want to overwrite potentially useful error messages.
*/
+ return new WebAuthnError({
+ message: error.message,
+ code: 'ERROR_PASSTHROUGH_SEE_CAUSE_PROPERTY',
+ cause: error,
+ });
} else if (error.name === 'NotSupportedError') {
const validPubKeyCredParams = publicKey.pubKeyCredParams.filter(
param => param.type === 'public-key',
@@ -52,41 +67,53 @@ export function identifyRegistrationError({
if (validPubKeyCredParams.length === 0) {
// https://www.w3.org/TR/webauthn-2/#sctn-createCredential (Step 10)
- return new WebAuthnError(
- 'No entry in pubKeyCredParams was of type "public-key"',
- 'NotSupportedError',
- );
+ return new WebAuthnError({
+ message: 'No entry in pubKeyCredParams was of type "public-key"',
+ code: 'ERROR_MALFORMED_PUBKEYCREDPARAMS',
+ cause: error,
+ });
}
// https://www.w3.org/TR/webauthn-2/#sctn-op-make-cred (Step 2)
- return new WebAuthnError(
- 'No available authenticator supported any of the specified pubKeyCredParams algorithms',
- 'NotSupportedError',
- );
+ return new WebAuthnError({
+ message: 'No available authenticator supported any of the specified pubKeyCredParams algorithms',
+ code: 'ERROR_AUTHENTICATOR_NO_SUPPORTED_PUBKEYCREDPARAMS_ALG',
+ cause: error,
+ });
} else if (error.name === 'SecurityError') {
const effectiveDomain = window.location.hostname;
if (!isValidDomain(effectiveDomain)) {
// https://www.w3.org/TR/webauthn-2/#sctn-createCredential (Step 7)
- return new WebAuthnError(`${window.location.hostname} is an invalid domain`, 'SecurityError');
+ return new WebAuthnError({
+ message: `${window.location.hostname} is an invalid domain`,
+ code: 'ERROR_INVALID_DOMAIN',
+ cause: error
+ });
} else if (publicKey.rp.id !== effectiveDomain) {
// https://www.w3.org/TR/webauthn-2/#sctn-createCredential (Step 8)
- return new WebAuthnError(
- `The RP ID "${publicKey.rp.id}" is invalid for this domain`,
- 'SecurityError',
- );
+ return new WebAuthnError({
+ message: `The RP ID "${publicKey.rp.id}" is invalid for this domain`,
+ code: 'ERROR_INVALID_RP_ID',
+ cause: error,
+ });
}
} else if (error.name === 'TypeError') {
if (publicKey.user.id.byteLength < 1 || publicKey.user.id.byteLength > 64) {
// https://www.w3.org/TR/webauthn-2/#sctn-createCredential (Step 5)
- return new WebAuthnError('User ID was not between 1 and 64 characters', 'TypeError');
+ return new WebAuthnError({
+ message: 'User ID was not between 1 and 64 characters',
+ code: 'ERROR_INVALID_USER_ID_LENGTH',
+ cause: error,
+ });
}
} else if (error.name === 'UnknownError') {
// https://www.w3.org/TR/webauthn-2/#sctn-op-make-cred (Step 1)
// https://www.w3.org/TR/webauthn-2/#sctn-op-make-cred (Step 8)
- return new WebAuthnError(
- 'The authenticator was unable to process the specified options, or could not create a new credential',
- 'UnknownError',
- );
+ return new WebAuthnError({
+ message: 'The authenticator was unable to process the specified options, or could not create a new credential',
+ code: 'ERROR_AUTHENTICATOR_GENERAL_ERROR',
+ cause: error,
+ });
}
return error;
diff --git a/packages/browser/src/helpers/structs.ts b/packages/browser/src/helpers/structs.ts
deleted file mode 100644
index 8ae01b7..0000000
--- a/packages/browser/src/helpers/structs.ts
+++ /dev/null
@@ -1,23 +0,0 @@
-/**
- * A custom Error used to return a more nuanced error detailing _why_ one of the eight documented
- * errors in the spec was raised after calling `navigator.credentials.create()` or
- * `navigator.credentials.get()`:
- *
- * - `AbortError`
- * - `ConstraintError`
- * - `InvalidStateError`
- * - `NotAllowedError`
- * - `NotSupportedError`
- * - `SecurityError`
- * - `TypeError`
- * - `UnknownError`
- *
- * Error messages were determined through investigation of the spec to determine under which
- * scenarios a given error would be raised.
- */
-export class WebAuthnError extends Error {
- constructor(message: string, name = 'WebAuthnError') {
- super(message);
- this.name = name;
- }
-}
diff --git a/packages/browser/src/helpers/webAuthnAbortService.test.ts b/packages/browser/src/helpers/webAuthnAbortService.test.ts
index 294a894..b3ec518 100644
--- a/packages/browser/src/helpers/webAuthnAbortService.test.ts
+++ b/packages/browser/src/helpers/webAuthnAbortService.test.ts
@@ -14,7 +14,7 @@ test('should call abort() on existing controller when creating a new signal', ()
// Spy on the existing instance of AbortController
const abortSpy = jest.fn();
// @ts-ignore
- webauthnAbortService.controller?.abort = abortSpy;
+ webauthnAbortService.controller.abort = abortSpy;
// Generate a new signal, which should call `abort()` on the existing controller
webauthnAbortService.createNewAbortSignal();
diff --git a/packages/browser/src/helpers/webAuthnError.ts b/packages/browser/src/helpers/webAuthnError.ts
new file mode 100644
index 0000000..1debec0
--- /dev/null
+++ b/packages/browser/src/helpers/webAuthnError.ts
@@ -0,0 +1,56 @@
+/* eslint-disable @typescript-eslint/ban-ts-comment */
+/**
+ * A custom Error used to return a more nuanced error detailing _why_ one of the eight documented
+ * errors in the spec was raised after calling `navigator.credentials.create()` or
+ * `navigator.credentials.get()`:
+ *
+ * - `AbortError`
+ * - `ConstraintError`
+ * - `InvalidStateError`
+ * - `NotAllowedError`
+ * - `NotSupportedError`
+ * - `SecurityError`
+ * - `TypeError`
+ * - `UnknownError`
+ *
+ * Error messages were determined through investigation of the spec to determine under which
+ * scenarios a given error would be raised.
+ */
+export class WebAuthnError extends Error {
+ code: WebAuthnErrorCode;
+
+ constructor({
+ message,
+ code,
+ cause,
+ name,
+ }: {
+ message: string,
+ code: WebAuthnErrorCode,
+ cause: Error,
+ name?: string,
+ }) {
+ /**
+ * `cause` is supported in evergreen browsers, but not IE10, so this ts-ignore is to
+ * help Rollup complete the ES5 build.
+ */
+ // @ts-ignore
+ super(message, { cause })
+ this.name = name ?? cause.name;
+ this.code = code;
+ }
+}
+
+export type WebAuthnErrorCode =
+ 'ERROR_CEREMONY_ABORTED'
+ | 'ERROR_INVALID_DOMAIN'
+ | 'ERROR_INVALID_RP_ID'
+ | 'ERROR_INVALID_USER_ID_LENGTH'
+ | 'ERROR_MALFORMED_PUBKEYCREDPARAMS'
+ | 'ERROR_AUTHENTICATOR_GENERAL_ERROR'
+ | 'ERROR_AUTHENTICATOR_MISSING_DISCOVERABLE_CREDENTIAL_SUPPORT'
+ | 'ERROR_AUTHENTICATOR_MISSING_USER_VERIFICATION_SUPPORT'
+ | 'ERROR_AUTHENTICATOR_PREVIOUSLY_REGISTERED'
+ | 'ERROR_AUTHENTICATOR_NO_SUPPORTED_PUBKEYCREDPARAMS_ALG'
+ | 'ERROR_PASSTHROUGH_SEE_CAUSE_PROPERTY'
+ ;
diff --git a/packages/browser/src/index.ts b/packages/browser/src/index.ts
index 41e040f..67c7c74 100644
--- a/packages/browser/src/index.ts
+++ b/packages/browser/src/index.ts
@@ -15,3 +15,5 @@ export {
browserSupportsWebAuthnAutofill,
platformAuthenticatorIsAvailable,
};
+
+export type { WebAuthnErrorCode } from './helpers/webAuthnError';
diff --git a/packages/browser/src/methods/startAuthentication.test.ts b/packages/browser/src/methods/startAuthentication.test.ts
index 1708651..f8830ae 100644
--- a/packages/browser/src/methods/startAuthentication.test.ts
+++ b/packages/browser/src/methods/startAuthentication.test.ts
@@ -9,7 +9,7 @@ import { browserSupportsWebAuthn } from '../helpers/browserSupportsWebAuthn';
import { browserSupportsWebAuthnAutofill } from '../helpers/browserSupportsWebAuthnAutofill';
import { utf8StringToBuffer } from '../helpers/utf8StringToBuffer';
import { bufferToBase64URLString } from '../helpers/bufferToBase64URLString';
-import { WebAuthnError } from '../helpers/structs';
+import { WebAuthnError } from '../helpers/webAuthnError';
import { generateCustomError } from '../helpers/__jest__/generateCustomError';
import { webauthnAbortService } from '../helpers/webAuthnAbortService';
@@ -299,7 +299,7 @@ test('should return authenticatorAttachment if present', async () => {
return new Promise(resolve => {
resolve({
response: {},
- getClientExtensionResults: () => {},
+ getClientExtensionResults: () => { },
authenticatorAttachment: 'cross-platform',
});
});
@@ -328,6 +328,8 @@ describe('WebAuthnError', () => {
rejected.toThrow(WebAuthnError);
rejected.toThrow(/abort signal/i);
rejected.toHaveProperty('name', 'AbortError');
+ rejected.toHaveProperty('code', 'ERROR_CEREMONY_ABORTED');
+ rejected.toHaveProperty('cause', AbortError);
});
});
@@ -346,6 +348,8 @@ describe('WebAuthnError', () => {
rejected.toThrow(Error);
rejected.toThrow(/operation failed/i);
rejected.toHaveProperty('name', 'NotAllowedError');
+ rejected.toHaveProperty('code', 'ERROR_PASSTHROUGH_SEE_CAUSE_PROPERTY');
+ rejected.toHaveProperty('cause', NotAllowedError);
});
test('should pass through error message (Chrome M110 - Bad TLS Cert)', async () => {
@@ -365,6 +369,8 @@ describe('WebAuthnError', () => {
rejected.toThrow(Error);
rejected.toThrow(/sites with TLS certificate errors/i);
rejected.toHaveProperty('name', 'NotAllowedError');
+ rejected.toHaveProperty('code', 'ERROR_PASSTHROUGH_SEE_CAUSE_PROPERTY');
+ rejected.toHaveProperty('cause', NotAllowedError);
});
});
@@ -391,6 +397,8 @@ describe('WebAuthnError', () => {
rejected.toThrow(/1\.2\.3\.4/);
rejected.toThrow(/invalid domain/i);
rejected.toHaveProperty('name', 'SecurityError');
+ rejected.toHaveProperty('code', 'ERROR_INVALID_DOMAIN');
+ rejected.toHaveProperty('cause', SecurityError);
});
test('should identify invalid RP ID', async () => {
@@ -403,6 +411,8 @@ describe('WebAuthnError', () => {
rejected.toThrow(goodOpts1.rpId);
rejected.toThrow(/invalid for this domain/i);
rejected.toHaveProperty('name', 'SecurityError');
+ rejected.toHaveProperty('code', 'ERROR_INVALID_RP_ID');
+ rejected.toHaveProperty('cause', SecurityError);
});
});
@@ -418,6 +428,8 @@ describe('WebAuthnError', () => {
rejected.toThrow(/unable to process the specified options/i);
rejected.toThrow(/could not create a new assertion signature/i);
rejected.toHaveProperty('name', 'UnknownError');
+ rejected.toHaveProperty('code', 'ERROR_AUTHENTICATOR_GENERAL_ERROR');
+ rejected.toHaveProperty('cause', UnknownError);
});
});
});
diff --git a/packages/browser/src/methods/startRegistration.test.ts b/packages/browser/src/methods/startRegistration.test.ts
index 2c2d2de..debaba3 100644
--- a/packages/browser/src/methods/startRegistration.test.ts
+++ b/packages/browser/src/methods/startRegistration.test.ts
@@ -7,7 +7,7 @@ import {
import { generateCustomError } from '../helpers/__jest__/generateCustomError';
import { browserSupportsWebAuthn } from '../helpers/browserSupportsWebAuthn';
import { bufferToBase64URLString } from '../helpers/bufferToBase64URLString';
-import { WebAuthnError } from '../helpers/structs';
+import { WebAuthnError } from '../helpers/webAuthnError';
import { webauthnAbortService } from '../helpers/webAuthnAbortService';
import { utf8StringToBuffer } from '../helpers/utf8StringToBuffer';
@@ -239,7 +239,7 @@ test('should return authenticatorAttachment if present', async () => {
return new Promise(resolve => {
resolve({
response: {},
- getClientExtensionResults: () => {},
+ getClientExtensionResults: () => { },
authenticatorAttachment: 'cross-platform',
});
});
@@ -267,6 +267,8 @@ describe('WebAuthnError', () => {
rejected.toThrow(WebAuthnError);
rejected.toThrow(/abort signal/i);
rejected.toThrow(/AbortError/);
+ rejected.toHaveProperty('code', 'ERROR_CEREMONY_ABORTED');
+ rejected.toHaveProperty('cause', AbortError);
});
});
@@ -289,6 +291,8 @@ describe('WebAuthnError', () => {
rejected.toThrow(/discoverable credentials were required/i);
rejected.toThrow(/no available authenticator supported/i);
rejected.toHaveProperty('name', 'ConstraintError');
+ rejected.toHaveProperty('code', 'ERROR_AUTHENTICATOR_MISSING_DISCOVERABLE_CREDENTIAL_SUPPORT');
+ rejected.toHaveProperty('cause', ConstraintError);
});
test('should identify unsupported user verification', async () => {
@@ -306,6 +310,8 @@ describe('WebAuthnError', () => {
rejected.toThrow(/user verification was required/i);
rejected.toThrow(/no available authenticator supported/i);
rejected.toHaveProperty('name', 'ConstraintError');
+ rejected.toHaveProperty('code', 'ERROR_AUTHENTICATOR_MISSING_USER_VERIFICATION_SUPPORT');
+ rejected.toHaveProperty('cause', ConstraintError);
});
});
@@ -320,6 +326,8 @@ describe('WebAuthnError', () => {
rejected.toThrow(/authenticator/i);
rejected.toThrow(/previously registered/i);
rejected.toHaveProperty('name', 'InvalidStateError');
+ rejected.toHaveProperty('code', 'ERROR_AUTHENTICATOR_PREVIOUSLY_REGISTERED');
+ rejected.toHaveProperty('cause', InvalidStateError);
});
});
@@ -338,6 +346,8 @@ describe('WebAuthnError', () => {
rejected.toThrow(Error);
rejected.toThrow(/operation failed/i);
rejected.toHaveProperty('name', 'NotAllowedError');
+ rejected.toHaveProperty('code', 'ERROR_PASSTHROUGH_SEE_CAUSE_PROPERTY');
+ rejected.toHaveProperty('cause', NotAllowedError);
});
test('should pass through error message (Chrome M110 - Bad TLS Cert)', async () => {
@@ -357,6 +367,8 @@ describe('WebAuthnError', () => {
rejected.toThrow(Error);
rejected.toThrow(/sites with TLS certificate errors/i);
rejected.toHaveProperty('name', 'NotAllowedError');
+ rejected.toHaveProperty('code', 'ERROR_PASSTHROUGH_SEE_CAUSE_PROPERTY');
+ rejected.toHaveProperty('cause', NotAllowedError);
});
});
@@ -376,6 +388,8 @@ describe('WebAuthnError', () => {
rejected.toThrow(/pubKeyCredParams/i);
rejected.toThrow(/public-key/i);
rejected.toHaveProperty('name', 'NotSupportedError');
+ rejected.toHaveProperty('code', 'ERROR_MALFORMED_PUBKEYCREDPARAMS');
+ rejected.toHaveProperty('cause', NotSupportedError);
});
test('should identify no authenticator supports algs in pubKeyCredParams', async () => {
@@ -391,6 +405,8 @@ describe('WebAuthnError', () => {
rejected.toThrow(/No available authenticator/i);
rejected.toThrow(/pubKeyCredParams/i);
rejected.toHaveProperty('name', 'NotSupportedError');
+ rejected.toHaveProperty('code', 'ERROR_AUTHENTICATOR_NO_SUPPORTED_PUBKEYCREDPARAMS_ALG');
+ rejected.toHaveProperty('cause', NotSupportedError);
});
});
@@ -417,6 +433,8 @@ describe('WebAuthnError', () => {
rejected.toThrow(/1\.2\.3\.4/);
rejected.toThrow(/invalid domain/i);
rejected.toHaveProperty('name', 'SecurityError');
+ rejected.toHaveProperty('code', 'ERROR_INVALID_DOMAIN');
+ rejected.toHaveProperty('cause', SecurityError);
});
test('should identify invalid RP ID', async () => {
@@ -429,12 +447,15 @@ describe('WebAuthnError', () => {
rejected.toThrow(goodOpts1.rp.id);
rejected.toThrow(/invalid for this domain/i);
rejected.toHaveProperty('name', 'SecurityError');
+ rejected.toHaveProperty('code', 'ERROR_INVALID_RP_ID');
+ rejected.toHaveProperty('cause', SecurityError);
});
});
describe('TypeError', () => {
test('should identify malformed user ID', async () => {
- mockNavigatorCreate.mockRejectedValueOnce(new TypeError('user id is bad'));
+ const typeError = new TypeError('user id is bad');
+ mockNavigatorCreate.mockRejectedValueOnce(typeError);
const opts = {
...goodOpts1,
@@ -449,6 +470,8 @@ describe('WebAuthnError', () => {
rejected.toThrow(/user id/i);
rejected.toThrow(/not between 1 and 64 characters/i);
rejected.toHaveProperty('name', 'TypeError');
+ rejected.toHaveProperty('code', 'ERROR_INVALID_USER_ID_LENGTH');
+ rejected.toHaveProperty('cause', typeError);
});
});
@@ -464,6 +487,8 @@ describe('WebAuthnError', () => {
rejected.toThrow(/unable to process the specified options/i);
rejected.toThrow(/could not create a new credential/i);
rejected.toHaveProperty('name', 'UnknownError');
+ rejected.toHaveProperty('code', 'ERROR_AUTHENTICATOR_GENERAL_ERROR');
+ rejected.toHaveProperty('cause', UnknownError);
});
});
});
diff --git a/packages/browser/tsconfig.es5.json b/packages/browser/tsconfig.es5.json
index b652f4b..186b4f4 100644
--- a/packages/browser/tsconfig.es5.json
+++ b/packages/browser/tsconfig.es5.json
@@ -2,7 +2,7 @@
"extends": "./tsconfig.json",
"compilerOptions": {
"target": "ES5",
- "module": "ES2020",
+ "module": "ESNext",
"moduleResolution": "node",
"lib": [
"ES5",
diff --git a/packages/browser/tsconfig.json b/packages/browser/tsconfig.json
index 7eb93cb..4b2c29e 100644
--- a/packages/browser/tsconfig.json
+++ b/packages/browser/tsconfig.json
@@ -1,11 +1,11 @@
{
"extends": "../../tsconfig.json",
"compilerOptions": {
- "target": "ES2018",
- "module": "ES2020",
+ "target": "ES2022",
+ "module": "ESNext",
"moduleResolution": "node",
"lib": [
- "ES2018",
+ "ES2022",
"DOM"
],
"baseUrl": "./src",