Skip to content

Commit

Permalink
Merge branch 'main' into ds.feat/rm-component-context
Browse files Browse the repository at this point in the history
  • Loading branch information
dstaley authored Nov 6, 2024
2 parents b4225f1 + 8bad902 commit fdcbbed
Show file tree
Hide file tree
Showing 72 changed files with 3,165 additions and 9,602 deletions.
2 changes: 2 additions & 0 deletions .changeset/eleven-doors-shop.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
---
---
7 changes: 7 additions & 0 deletions .changeset/grumpy-snakes-approve.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
---
'@clerk/backend': minor
---

Introduce experimental verification helpers exported from `@clerk/backend/internal`
- __experimental_reverificationMismatch
- __experimental_reverificationMismatchResponse
50 changes: 50 additions & 0 deletions .changeset/late-camels-talk.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,50 @@
---
"@clerk/clerk-js": minor
"@clerk/shared": minor
"@clerk/types": minor
"@clerk/clerk-expo": minor
"@clerk/expo-passkeys": patch
---

Introduce experimental support for passkeys in Expo (iOS, Android, and Web).

To use passkeys in Expo projects, pass the `__experimental_passkeys` object, which can be imported from `@clerk/clerk-expo/passkeys`, to the `ClerkProvider` component:

```tsx

import { ClerkProvider } from '@clerk/clerk-expo';
import { passkeys } from '@clerk/clerk-expo/passkeys';

<ClerkProvider __experimental_passkeys={passkeys}>
{/* Your app here */}
</ClerkProvider>
```

The API for using passkeys in Expo projects is the same as the one used in web apps:

```tsx
// passkey creation
const { user } = useUser();

const handleCreatePasskey = async () => {
if (!user) return;
try {
return await user.createPasskey();
} catch (e: any) {
// handle error
}
};


// passkey authentication
const { signIn, setActive } = useSignIn();

const handlePasskeySignIn = async () => {
try {
const signInResponse = await signIn.authenticateWithPasskey();
await setActive({ session: signInResponse.createdSessionId });
} catch (err: any) {
//handle error
}
};
```
7 changes: 7 additions & 0 deletions .changeset/plenty-seas-hammer.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
---
'@clerk/nextjs': minor
---

Introduce experimental verification helpers exported from `@clerk/nextjs/server`
- __experimental_reverificationMismatch
- __experimental_reverificationMismatchResponse
5 changes: 5 additions & 0 deletions .changeset/stupid-ants-talk.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
'@clerk/nextjs': patch
---

Add timestamp to debug logger output.
24 changes: 24 additions & 0 deletions .github/workflows/ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,11 @@ name: CI

on:
workflow_dispatch:
inputs:
run_integration_tests:
description: 'Run integration tests'
type: boolean
default: false
merge_group:
pull_request:
branches:
Expand Down Expand Up @@ -154,11 +159,30 @@ jobs:
next-version: '15'

steps:
# Skip integration tests from fork PRs to prevent secret exfiltration
- name: Get User Permission
id: checkAccess
uses: actions-cool/check-user-permission@v2
with:
require: write
username: ${{ github.triggering_actor }}
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
- name: Check User Permission
if: steps.checkAccess.outputs.require-result == 'false'
run: |
echo "${{ github.triggering_actor }} does not have permissions on this repo."
echo "Current permission level is ${{ steps.checkAccess.outputs.user-permission }}"
echo "Job originally triggered by ${{ github.actor }}"
exit 1
- name: Checkout Repo
uses: actions/checkout@v4
with:
fetch-depth: 0
show-progress: false
# We must first verify the user permissions before checking out PR code
ref: ${{ github.event.pull_request.head.sha }}

- name: Setup
id: config
Expand Down
Loading

0 comments on commit fdcbbed

Please sign in to comment.