Skip to content

[ECUK In-App 3DS] refactor MFA REASON#87975

Open
dariusz-biela wants to merge 37 commits intoExpensify:mainfrom
software-mansion-labs:dariusz-biela/refactor/3ds/clean-up-reasons
Open

[ECUK In-App 3DS] refactor MFA REASON#87975
dariusz-biela wants to merge 37 commits intoExpensify:mainfrom
software-mansion-labs:dariusz-biela/refactor/3ds/clean-up-reasons

Conversation

@dariusz-biela
Copy link
Copy Markdown
Contributor

@dariusz-biela dariusz-biela commented Apr 15, 2026

Explanation of Change

Refactors MFA REASON constants to improve clarity, reduce dead code, and make error origin obvious from value strings alone.

Categories & values:

  • Reorganize from tech-source grouping (BACKEND/GENERIC/WEBAUTHN/HSM) → HTTP-status-based (SERVER_ERRORS/CLIENT_ERRORS/LOCAL_ERRORS with WEBAUTHN/HSM nested under LOCAL_ERRORS)
  • Add category prefixes to value strings (e.g. "Client: Registration required", "Local WebAuthn: Operation not allowed") so error origin is identifiable in logs without looking up constant name
  • Classify TRANSACTION_DENIED as alternative_outcome to prevent false error telemetry — it represents a successful deny API call (HTTP 200), not a client error
  • Derive server failure reasons dynamically from VALUES instead of hardcoding
  • Remove dead reason values: unused success reasons, backend message keys with no custom handling, REQUESTED_TRANSACTION_UNAVAILABLE

Type system & error handling:

  • Introduce MfaError discriminated union and MfaResult<TData> type (shared/MfaResult.ts) with factory functions — replaces scattered reason/httpStatusCode/message properties
  • addMFABreadcrumb now accepts MfaError directly; remove dead ErrorState.payload
  • Add DeepLeafValues utility type for 3-level REASON nesting

Decoupling & naming:

  • Decouple WebAuthn REASON values from DOMException.name strings via DOM_EXCEPTION_NAME_MAP
  • Unify reconciliation mismatch reason across WebAuthn and HSM hooks
  • Rename ambiguous identifiers: UNHANDLEDUNRECOGNIZED, UNHANDLED_ERRORUNHANDLED_EXCEPTION, isServerOrLocalErrorshouldShowServerFailureScreen, etc.
  • Refactor parseHttpResponse helpers: clearer names, extract resolveReason, case-insensitive message matching

Bug fixes:

  • Trigger re-registration for NO_MATCHING_LOCAL_CREDENTIAL reasons
  • Use numeric range check in isHttpSuccess instead of string prefix
  • Classify SIGNATURE_MISSING, UNHANDLED_EXCEPTION as ANOMALOUS for error-level logging

Tests & misc: updated unit tests for renamed values + new branch coverage, cspell.json additions.

Fixed Issues

$ #83036
PROPOSAL:

Tests

Biometrics registration (iOS / Android native):

  1. Open Expensify App on a native mobile device
  2. Navigate to Settings → Troubleshoot
  3. Click on the "Test" button next to the "Biometrics (Not registered)" text
  4. Fill the magic code input
  5. Click on the "Got it" button
  6. Authenticate using device credentials or biometry (Face ID / Touch ID / fingerprint)
  7. Verify that the Authentication was successful
  8. Verify that the registered label is now displayed

Biometrics authorization (iOS / Android native):

  1. Repeat step 3
  2. Verify that the validate code step is no longer required
  3. Authenticate using device biometrics
  4. Verify that the Authentication was successful

Passkeys registration (Web / mWeb):

  1. Open Expensify App on Web (Chrome/Safari)
  2. Navigate to Settings → Troubleshoot
  3. Click on the "Test" button next to the "Biometrics (Not registered)" text
  4. Fill the magic code input
  5. Click on the "Got it" button
  6. Authenticate using your browser's passkey/WebAuthn prompt (e.g. Touch ID, Windows Hello, security key)
  7. Verify that the Authentication was successful
  8. Verify that the registered label is now displayed

Passkeys authorization (Web / mWeb):
21. Repeat step 15
22. Verify that the validate code step is no longer required
23. Authenticate using the passkey prompt
24. Verify that the Authentication was successful

Failure scenarios:
25. Cancel the passkey/biometrics prompt during registration (step 6 or 18) — verify the Authentication failed
26. Cancel the passkey/biometrics prompt during authorization (step 11 or 23) — verify the Authentication failed
27. Exit the flow using the back button or by clicking the overlay — verify a confirmation modal is displayed
28. Enter a wrong validate code during registration — verify an error text is displayed and the magic code input is shown again to allow re-entry

  • Verify that no errors appear in the JS console

Offline tests

N/A, D - Full Page Blocking UI Pattern for this project.

QA Steps

Same as tests

PR Author Checklist

  • I linked the correct issue in the ### Fixed Issues section above
  • I wrote clear testing steps that cover the changes made in this PR
    • I added steps for local testing in the Tests section
    • I added steps for the expected offline behavior in the Offline steps section
    • I added steps for Staging and/or Production testing in the QA steps section
    • I added steps to cover failure scenarios (i.e. verify an input displays the correct error message if the entered data is not correct)
    • I turned off my network connection and tested it while offline to ensure it matches the expected behavior (i.e. verify the default avatar icon is displayed if app is offline)
    • I tested this PR with a High Traffic account against the staging or production API to ensure there are no regressions (e.g. long loading states that impact usability).
  • I included screenshots or videos for tests on all platforms
  • I ran the tests on all platforms & verified they passed on:
    • Android: Native
    • Android: mWeb Chrome
    • iOS: Native
    • iOS: mWeb Safari
    • MacOS: Chrome / Safari
  • I verified there are no console errors (if there's a console error not related to the PR, report it or open an issue for it to be fixed)
  • I followed proper code patterns (see Reviewing the code)
    • I verified that any callback methods that were added or modified are named for what the method does and never what callback they handle (i.e. toggleReport and not onIconClick)
    • I verified that comments were added to code that is not self explanatory
    • I verified that any new or modified comments were clear, correct English, and explained "why" the code was doing something instead of only explaining "what" the code was doing.
    • I verified any copy / text shown in the product is localized by adding it to src/languages/* files and using the translation method
      • If any non-english text was added/modified, I used JaimeGPT to get English > Spanish translation. I then posted it in #expensify-open-source and it was approved by an internal Expensify engineer. Link to Slack message:
    • I verified all numbers, amounts, dates and phone numbers shown in the product are using the localization methods
    • I verified any copy / text that was added to the app is grammatically correct in English. It adheres to proper capitalization guidelines (note: only the first word of header/labels should be capitalized), and is either coming verbatim from figma or has been approved by marketing (in order to get marketing approval, ask the Bug Zero team member to add the Waiting for copy label to the issue)
    • I verified proper file naming conventions were followed for any new files or renamed files. All non-platform specific files are named after what they export and are not named "index.js". All platform-specific files are named for the platform the code supports as outlined in the README.
    • I verified the JSDocs style guidelines (in STYLE.md) were followed
  • If a new code pattern is added I verified it was agreed to be used by multiple Expensify engineers
  • I followed the guidelines as stated in the Review Guidelines
  • I tested other components that can be impacted by my changes (i.e. if the PR modifies a shared library or component like Avatar, I verified the components using Avatar are working as expected)
  • I verified all code is DRY (the PR doesn't include any logic written more than once, with the exception of tests)
  • I verified any variables that can be defined as constants (ie. in CONST.ts or at the top of the file that uses the constant) are defined as such
  • I verified that if a function's arguments changed that all usages have also been updated correctly
  • If any new file was added I verified that:
    • The file has a description of what it does and/or why is needed at the top of the file if the code is not self explanatory
  • If a new CSS style is added I verified that:
    • A similar style doesn't already exist
    • The style can't be created with an existing StyleUtils function (i.e. StyleUtils.getBackgroundAndBorderStyle(theme.componentBG))
  • If new assets were added or existing ones were modified, I verified that:
    • The assets are optimized and compressed (for SVG files, run npm run compress-svg)
    • The assets load correctly across all supported platforms.
  • If the PR modifies code that runs when editing or sending messages, I tested and verified there is no unexpected behavior for all supported markdown - URLs, single line code, code blocks, quotes, headings, bold, strikethrough, and italic.
  • If the PR modifies a generic component, I tested and verified that those changes do not break usages of that component in the rest of the App (i.e. if a shared library or component like Avatar is modified, I verified that Avatar is working as expected in all cases)
  • If the PR modifies a component related to any of the existing Storybook stories, I tested and verified all stories for that component are still working as expected.
  • If the PR modifies a component or page that can be accessed by a direct deeplink, I verified that the code functions as expected when the deeplink is used - from a logged in and logged out account.
  • If the PR modifies the UI (e.g. new buttons, new UI components, changing the padding/spacing/sizing, moving components, etc) or modifies the form input styles:
    • I verified that all the inputs inside a form are aligned with each other.
    • I added Design label and/or tagged @Expensify/design so the design team can review the changes.
  • If a new page is added, I verified it's using the ScrollView component to make it scrollable when more elements are added to the page.
  • I added unit tests for any new feature or bug fix in this PR to help automatically prevent regressions in this user flow.
  • If the main branch was merged into this PR after a review, I tested again and verified the outcome was still expected according to the Test steps.

Screenshots/Videos

iOS: Native
Screen.Recording.2026-04-21.at.17.17.19.mp4
MacOS: Chrome / Safari
Screen.Recording.2026-04-21.at.16.57.49.mp4

…UTHN/HSM to SERVER_ERRORS/CLIENT_ERRORS/LOCAL_ERRORS

Reorganize error grouping by HTTP status type instead of technology source:
- BACKEND.* → CLIENT_ERRORS.* (all are 4xx API responses)
- GENERIC.CLIENT_ERROR/SERVER_ERROR/LOCAL_ERROR → CLIENT_ERRORS/SERVER_ERRORS/LOCAL_ERRORS.UNHANDLED
- WEBAUTHN.* → LOCAL_ERRORS.WEBAUTHN.* (nested under LOCAL_ERRORS)
- HSM.* → LOCAL_ERRORS.HSM.* (nested under LOCAL_ERRORS)

Also remove unused REASON/BACKEND_MESSAGE values, remove reason from success
result types, improve helpers.ts fallback logic with case-insensitive matching,
and update ReasonValue type to handle 3-level nesting via DeepLeafValues.
- Remove DeepLeafValues duplication: define once in VALUES.ts, export
  ReasonValue for types.ts to alias as MultifactorAuthenticationReason
- Move CLIENT_ERRORS.UNHANDLED from ROUTINE_FAILURES to ANOMALOUS_FAILURES
  since unexpected 4xx responses may indicate a bug or API change
- Return undefined reason for 200 success responses without SUCCESS map
  entry instead of misleading LOCAL_ERRORS.UNHANDLED; update parseHttpRequest,
  ProcessResult, ChallengeResponse, and ScenarioResponse types accordingly
- Add fallback reasons in SET_ERROR dispatches and null guard in
  failureScreens lookup for type safety
- Pass httpStatusCode and message to all SET_ERROR dispatches that use
  a generic fallback reason
- Document empty API_RESPONSE_MAP entries as relying on fallback reasons
@codecov
Copy link
Copy Markdown

codecov Bot commented Apr 15, 2026

… UNHANDLED_ERROR to UNHANDLED_EXCEPTION

UNHANDLED and UNHANDLED_ERROR were ambiguous. UNHANDLED_API_RESPONSE
clarifies it's the HTTP no-status fallback, while UNHANDLED_EXCEPTION
clarifies it catches code exceptions and invalid states.
…RANSACTION_UNAVAILABLE as ANOMALOUS

These rare edge cases may indicate bugs and were previously unclassified,
meaning they would be logged as UNCLASSIFIED instead of at 'error' level.
Better describes intent: function determines screen routing, not error classification.
- DENY_TRANSACTION SUCCESS branch (typeof responseMapEntry === 'string')
- Empty source map fallback (CHANGE_CARD_PIN with 4xx)
- endsWith prefix tolerance ('Error: Registration required' matches 'Registration required')
REASON.LOCAL_ERRORS.WEBAUTHN values no longer mirror DOMException.name
strings. A dedicated DOM_EXCEPTION_NAME_MAP in WebAuthn.ts maps
DOMException names to REASON constants (same pattern HSM already uses).
Also forwards DOMException.message for known errors.
Make vague fallback reasons more descriptive so they are
self-explanatory in logs without needing to cross-reference code.
Prefix every REASON string with its origin category (Server, Client,
Local, Local WebAuthn, Local HSM) so the source is immediately visible
in logs without needing to look up the constant key.
This reason was never dispatched by any code path. The case it was
meant to cover (transaction disappearing from Onyx mid-review) is
handled directly in AuthorizeTransactionPage without going through
the MFA state machine.
Copy link
Copy Markdown
Contributor

@JakubKorytko JakubKorytko left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good job overall, left some comments

Comment thread src/components/MultifactorAuthentication/biometrics/useNativeBiometricsHSM.ts Outdated
Comment thread src/libs/MultifactorAuthentication/shared/VALUES.ts
Comment thread src/libs/MultifactorAuthentication/shared/VALUES.ts
Comment thread src/libs/actions/MultifactorAuthentication/processing.ts Outdated
Comment thread src/libs/MultifactorAuthentication/shared/helpers.ts Outdated
Comment thread src/components/MultifactorAuthentication/biometrics/shared/types.ts
Comment thread src/libs/MultifactorAuthentication/shared/VALUES.ts
…rors

Replace scattered reason/httpStatusCode/message properties with a single
MfaError type using factory functions (local, fromApiResponse) and a
MfaResult<TData> discriminated union. This eliminates redundant fallback
logic, removes manual object construction at dispatch sites, and ensures
every error carries a descriptive message.
addMFABreadcrumb now accepts MfaError directly, eliminating manual
destructuring at call sites. Removed unused payload property from
ErrorState since it was never read anywhere.
mapAuthTypeNumber returning undefined is a local validation failure
(client cannot interpret HSM sign result), not a server 4xx response.
Add LOCAL_ERRORS.HSM.UNRECOGNIZED_AUTH_TYPE and use it instead of
CLIENT_ERRORS.BAD_REQUEST.
TRANSACTION_DENIED represents a successful deny API call (HTTP 200),
not a server 4xx error. Placing it under CLIENT_ERRORS contradicted
the naming convention. New REASON.FLOW_OUTCOMES category holds results
that are completed flow outcomes rather than errors.
Extract resolveReason to collapse 4 return paths into one. Rename
helpers for clarity:
- parseHttpRequest → parseHttpResponse (parses response, not request)
- getHttpStatusCategory → categorizeHttpStatus
- getCategoryFallbackReason → getFallbackReason (accepts undefined,
  eliminating dead code branch)
- httpStatusCategoryIsDefined → hasHttpStatusCategory
- findMessageInSource → findReasonByBackendMessage
- ParseHTTPSource → ResponseToReasonMap
@dariusz-biela
Copy link
Copy Markdown
Contributor Author

@codex review

@chatgpt-codex-connector
Copy link
Copy Markdown

Codex Review: Something went wrong. Try again later by commenting “@codex review”.

Failed to set up container
ℹ️ About Codex in GitHub

Codex has been enabled to automatically review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

When you sign up for Codex through ChatGPT, Codex can also answer questions or update the PR, like "@codex address that feedback".

Tests were asserting flat `{ success: false, reason }` but the actual
MfaResult failure type nests error details under `error` property:
`{ success: false, error: { reason, message } }`.

Also corrected the mapAuthTypeNumber failure test to expect
UNRECOGNIZED_AUTH_TYPE (matching production code) instead of BAD_REQUEST.
String(httpStatusCode).startsWith('2') incorrectly returns true for
values like 2, 20, or 2000. Use proper HTTP range check (200-299).
Instead of hardcoding individual reason constants, use Object.values()
so new SERVER_ERRORS entries are automatically picked up.
TRANSACTION_DENIED is a flow outcome, not a failure. Let it fall
through to 'unclassified' severity rather than mislabel it as routine.
…tion map

Complete coverage of production-relevant DOMException names per WebAuthn
spec. Each gets a dedicated REASON for observability. TimeoutError is
classified as routine; DataError and UnknownError as anomalous.

Also reverts accidental ROUTINE_FAILURES rename from previous commit.
The authorize error handler only checked KEY_ACCESS_FAILED and KEY_NOT_FOUND,
but the hooks now emit NO_MATCHING_LOCAL_CREDENTIAL when the local credential
is absent from the challenge's allowCredentials list. Without this condition,
users see a terminal failure screen instead of automatic re-registration
recovery.
…lse error telemetry

TRANSACTION_DENIED was moved to FLOW_OUTCOMES but not included in any
classification set, causing trackMFAFlowOutcome to log it as unclassified
at error level. Add ALTERNATIVE_OUTCOMES set for valid non-success terminal
states and classify them at info level.
@dariusz-biela
Copy link
Copy Markdown
Contributor Author

@codex review

Copy link
Copy Markdown
Contributor

@JakubKorytko JakubKorytko left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for addressing the comments! I'll leave the rest up to C+, Codex and the internal team.

@chatgpt-codex-connector
Copy link
Copy Markdown

Codex Review: Didn't find any major issues. Can't wait for the next one!

ℹ️ About Codex in GitHub

Codex has been enabled to automatically review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

When you sign up for Codex through ChatGPT, Codex can also answer questions or update the PR, like "@codex address that feedback".

@dariusz-biela dariusz-biela changed the title refactor MFA REASON [ECUK In-App 3DS] refactor MFA REASON Apr 21, 2026
No code path ever dispatched this reason — it only existed in its
definition and the ANOMALOUS_FAILURES classification set.
@dariusz-biela dariusz-biela marked this pull request as ready for review April 21, 2026 16:08
@dariusz-biela dariusz-biela requested review from a team as code owners April 21, 2026 16:08
@melvin-bot melvin-bot Bot requested review from cretadn22 and heyjennahay and removed request for a team and heyjennahay April 21, 2026 16:08
@melvin-bot
Copy link
Copy Markdown

melvin-bot Bot commented Apr 21, 2026

@cretadn22 Please copy/paste the Reviewer Checklist from here into a new comment on this PR and complete it. If you have the K2 extension, you can simply click: [this button]

const result = await state.scenario.onCancel(state.payload);
addMFABreadcrumb('Flow cancelled with onCancel', {reason: result.reason}, 'warning');
dispatch({type: 'SET_ERROR', payload: {reason: result.reason, payload: result.payload}});
dispatch({type: 'SET_ERROR', payload: {reason: result.reason, message: undefined}});
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

❌ CONSISTENCY-3 (docs)

Every other SET_ERROR dispatch in this file creates error payloads using either MfaError.local(...), MfaError.fromApiResponse(...), or passes through an existing .error object from a result. This single instance constructs a raw object literal {reason: result.reason, message: undefined} instead of using the MfaError.local() factory, breaking the consistent pattern.

Use the factory function to be consistent with the rest of the file:

dispatch({type: 'SET_ERROR', payload: MfaError.local(result.reason, undefined)});

Reviewed at: aa7c675 | Please rate this suggestion with 👍 or 👎 to help us improve! Reactions are used to monitor reviewer efficiency.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Here we have an error passed from a callback scenario, and I'm not sure if it's a local error or one from the API.

Additionally, we had an issue where the payload was being written to the error object, which was unsafe because it could have contained sensitive

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Or actually, I'll tweak it a bit so that we also include the httpStatus and message here.

@dariusz-biela dariusz-biela force-pushed the dariusz-biela/refactor/3ds/clean-up-reasons branch from 2492f94 to 05820ab Compare April 21, 2026 16:40
@chuckdries chuckdries requested review from chuckdries and rafecolton and removed request for cretadn22 April 21, 2026 19:47
Copy link
Copy Markdown
Contributor

@chuckdries chuckdries left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm a little unclear on the semantic meaning of the MfaResult type. We return it in src/libs/actions/MultifactorAuthentication/index.ts from requestAuthorizationChallenge and requestRegistrationChallenge. But, none of the actions which actually are MFA calls - actions which take a signedChallenge parameter - return it. Is that intentional?

@chuckdries chuckdries requested a review from DylanDylann April 22, 2026 00:08
* `fromApiResponse` — errors derived from an API response; defaults reason to UNHANDLED_API_RESPONSE when undefined.
*/
// eslint-disable-next-line @typescript-eslint/no-redeclare -- Intentional: companion object shares name with MfaError type (type+value merge pattern)
const MfaError = {
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
const MfaError = {
const MFAError = {

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please update in all places

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I prefer to use another name and remove the disable lint. E.g. MFAErrorHandler

};

/**
* Factory functions for creating MfaError instances.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Factory functions for creating MfaError instances.
* Factory functions for creating MFAError instances.

*/
// eslint-disable-next-line @typescript-eslint/no-redeclare -- Intentional: companion object shares name with MfaError type (type+value merge pattern)
const MfaError = {
local(reason: MultifactorAuthenticationReason, message: string | undefined): MfaError {
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

handle

Suggested change
local(reason: MultifactorAuthenticationReason, message: string | undefined): MfaError {
handleLocalError(reason: MultifactorAuthenticationReason, message: string | undefined): MfaError {

return {reason, message};
},

fromApiResponse(httpStatusCode: number | undefined, reason: MultifactorAuthenticationReason | undefined, message?: string): MfaError {
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
fromApiResponse(httpStatusCode: number | undefined, reason: MultifactorAuthenticationReason | undefined, message?: string): MfaError {
hanldeAPIError(httpStatusCode: number | undefined, reason: MultifactorAuthenticationReason | undefined, message: string | undefined): MfaError {

Comment on lines +27 to +28
// eslint-disable-next-line @typescript-eslint/no-empty-object-type -- {} means "no additional data fields" as default generic parameter
type MfaResult<TData = {}> = ({success: true} & TData) | {success: false; error: MfaError};
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
// eslint-disable-next-line @typescript-eslint/no-empty-object-type -- {} means "no additional data fields" as default generic parameter
type MfaResult<TData = {}> = ({success: true} & TData) | {success: false; error: MfaError};
type MfaResult<TData = Record<string, never>> = ({success: true} & TData) | {success: false; error: MfaError};

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I should limit use lint disableWe should limit the use of eslint-disable.

let reason = mapLibraryErrorToReason(error);
if (reason === undefined) {
reason = VALUES.REASON.HSM.KEY_CREATION_FAILED;
reason = VALUES.REASON.LOCAL_ERRORS.HSM.KEY_CREATION_FAILED;
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we should use VALUES.REASON.LOCAL_ERRORS.HSM.UNRECOGNIZED here for consistency. This way, when we see this error, it means that it hasn’t been handled by mapLibraryErrorToReason. It will be easier to debug

Wdyt?

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Alternatively, what do you think about using UNRECOGNIZED as a prefix, like UNRECOGNIZED_KEY_CREATION_FAILED?

Use UNRECOGNIZED to indicate that HSM doesn’t handle this case.

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If we use VALUES.REASON.LOCAL_ERRORS.HSM.UNRECOGNIZED as a fallback, we can move this fallback handler into mapLibraryErrorToReason function as we did with decodeWebAuthnError

[CONST.MULTIFACTOR_AUTHENTICATION.REASON.CLIENT_ERRORS.ALREADY_DENIED_APPROVE_ATTEMPTED]: <AlreadyReviewedFailureScreen />,
[CONST.MULTIFACTOR_AUTHENTICATION.REASON.CLIENT_ERRORS.ALREADY_REVIEWED]: <AlreadyReviewedFailureScreen />,

// Client-side errors (not returned by the backend API)
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
// Client-side errors (not returned by the backend API)
// Local errors (not returned by the backend API)

httpStatusCode?: number;
message?: string;
};
type ErrorState = MfaError;
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please use MfaError directly and remove ErrorState

@DylanDylann
Copy link
Copy Markdown
Contributor

@dariusz-biela For future PRs, if possible, could we avoid combining too many changes into one? It would be better to split them into smaller PRs

@dariusz-biela
Copy link
Copy Markdown
Contributor Author

I'm a little unclear on the semantic meaning of the MfaResult type. We return it in src/libs/actions/MultifactorAuthentication/index.ts from requestAuthorizationChallenge and requestRegistrationChallenge. But, none of the actions which actually are MFA calls - actions which take a signedChallenge parameter - return it. Is that intentional?

Actually, it did cross my mind, but at that point I figured it might be too much for this PR.

But now that you mention it, I’ll go ahead and do it. But I’m warning you, this is the last feature, because Dylan is going to kill me. 😄

@dariusz-biela For future PRs, if possible, could we avoid combining too many changes into one? It would be better to split them into smaller PRs

Sorry

This PR was supposed to be half as big, but Jakub noticed some issues and I wanted to fix them properly, so it ended up getting a bit bigger.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants