@dynamic-labs-sdk/client 0.18.0 → 0.19.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (96) hide show
  1. package/dist/{InvalidParamError-Bxg4p9zQ.cjs.js → InvalidParamError-6MugNXi3.cjs.js} +4 -4
  2. package/dist/{InvalidParamError-Bxg4p9zQ.cjs.js.map → InvalidParamError-6MugNXi3.cjs.js.map} +1 -1
  3. package/dist/{InvalidParamError-ByAOflE2.esm.js → InvalidParamError-CnPeSjBW.esm.js} +3 -3
  4. package/dist/{InvalidParamError-ByAOflE2.esm.js.map → InvalidParamError-CnPeSjBW.esm.js.map} +1 -1
  5. package/dist/{NotWaasWalletAccountError-DMFf5i7j.esm.js → NotWaasWalletAccountError-B5QkZWrs.esm.js} +3 -3
  6. package/dist/{NotWaasWalletAccountError-DMFf5i7j.esm.js.map → NotWaasWalletAccountError-B5QkZWrs.esm.js.map} +1 -1
  7. package/dist/{NotWaasWalletAccountError-2CU35ult.cjs.js → NotWaasWalletAccountError-C204z_SH.cjs.js} +3 -3
  8. package/dist/{NotWaasWalletAccountError-2CU35ult.cjs.js.map → NotWaasWalletAccountError-C204z_SH.cjs.js.map} +1 -1
  9. package/dist/core.cjs.js +5 -5
  10. package/dist/core.cjs.js.map +1 -1
  11. package/dist/core.esm.js +5 -5
  12. package/dist/core.esm.js.map +1 -1
  13. package/dist/exports/core.d.ts +1 -1
  14. package/dist/exports/core.d.ts.map +1 -1
  15. package/dist/exports/index.d.ts +11 -1
  16. package/dist/exports/index.d.ts.map +1 -1
  17. package/dist/{getNetworkProviderFromNetworkId-BXH2tfrn.cjs.js → getNetworkProviderFromNetworkId-CoAKJyXQ.cjs.js} +23 -14
  18. package/dist/getNetworkProviderFromNetworkId-CoAKJyXQ.cjs.js.map +1 -0
  19. package/dist/{getNetworkProviderFromNetworkId-6QbuR0_i.esm.js → getNetworkProviderFromNetworkId-VEDzpV8Z.esm.js} +23 -14
  20. package/dist/getNetworkProviderFromNetworkId-VEDzpV8Z.esm.js.map +1 -0
  21. package/dist/{getSignedSessionId-KSSnmfwN.cjs.js → getSignedSessionId-BZL8lFjp.cjs.js} +5 -7
  22. package/dist/getSignedSessionId-BZL8lFjp.cjs.js.map +1 -0
  23. package/dist/{getSignedSessionId-yWd9_5u4.esm.js → getSignedSessionId-CgoBQlYG.esm.js} +5 -7
  24. package/dist/{getSignedSessionId-yWd9_5u4.esm.js.map → getSignedSessionId-CgoBQlYG.esm.js.map} +1 -1
  25. package/dist/{getVerifiedCredentialForWalletAccount-DbfbxLr9.esm.js → getVerifiedCredentialForWalletAccount-B58hODrW.esm.js} +2 -2
  26. package/dist/{getVerifiedCredentialForWalletAccount-DbfbxLr9.esm.js.map → getVerifiedCredentialForWalletAccount-B58hODrW.esm.js.map} +1 -1
  27. package/dist/{getVerifiedCredentialForWalletAccount-CJAgL4AJ.cjs.js → getVerifiedCredentialForWalletAccount-Zu778J_y.cjs.js} +3 -3
  28. package/dist/{getVerifiedCredentialForWalletAccount-CJAgL4AJ.cjs.js.map → getVerifiedCredentialForWalletAccount-Zu778J_y.cjs.js.map} +1 -1
  29. package/dist/index.cjs.js +235 -39
  30. package/dist/index.cjs.js.map +1 -1
  31. package/dist/index.esm.js +232 -40
  32. package/dist/index.esm.js.map +1 -1
  33. package/dist/{isMfaRequiredForAction-DnZ2ZWUB.cjs.js → isMfaRequiredForAction-D7amEpqp.cjs.js} +2 -2
  34. package/dist/{isMfaRequiredForAction-DnZ2ZWUB.cjs.js.map → isMfaRequiredForAction-D7amEpqp.cjs.js.map} +1 -1
  35. package/dist/{isMfaRequiredForAction-CG5JbTh1.esm.js → isMfaRequiredForAction-Dkj_caxl.esm.js} +2 -2
  36. package/dist/{isMfaRequiredForAction-CG5JbTh1.esm.js.map → isMfaRequiredForAction-Dkj_caxl.esm.js.map} +1 -1
  37. package/dist/modules/auth/checkStepUpAuth/checkStepUpAuth.d.ts +35 -0
  38. package/dist/modules/auth/checkStepUpAuth/checkStepUpAuth.d.ts.map +1 -0
  39. package/dist/modules/auth/checkStepUpAuth/index.d.ts +2 -0
  40. package/dist/modules/auth/checkStepUpAuth/index.d.ts.map +1 -0
  41. package/dist/modules/auth/events.d.ts +6 -2
  42. package/dist/modules/auth/events.d.ts.map +1 -1
  43. package/dist/modules/auth/handleSessionExpiration/handleSessionExpiration.d.ts +11 -0
  44. package/dist/modules/auth/handleSessionExpiration/handleSessionExpiration.d.ts.map +1 -0
  45. package/dist/modules/auth/handleSessionExpiration/index.d.ts +2 -0
  46. package/dist/modules/auth/handleSessionExpiration/index.d.ts.map +1 -0
  47. package/dist/modules/auth/logout/logout.d.ts +1 -1
  48. package/dist/modules/auth/logout/logout.d.ts.map +1 -1
  49. package/dist/modules/auth/logoutReason.d.ts +11 -0
  50. package/dist/modules/auth/logoutReason.d.ts.map +1 -0
  51. package/dist/modules/auth/performLogout/index.d.ts +2 -0
  52. package/dist/modules/auth/performLogout/index.d.ts.map +1 -0
  53. package/dist/modules/auth/performLogout/performLogout.d.ts +12 -0
  54. package/dist/modules/auth/performLogout/performLogout.d.ts.map +1 -0
  55. package/dist/modules/auth/social/oauth/completeSocialAuthentication/completeSocialAuthentication.d.ts +4 -1
  56. package/dist/modules/auth/social/oauth/completeSocialAuthentication/completeSocialAuthentication.d.ts.map +1 -1
  57. package/dist/modules/checkout/submitCheckoutTransaction/submitCheckoutTransaction.d.ts +2 -2
  58. package/dist/modules/checkout/submitCheckoutTransaction/submitCheckoutTransaction.d.ts.map +1 -1
  59. package/dist/modules/sessionKeys/getSignedSessionId/getSignedSessionId.d.ts.map +1 -1
  60. package/dist/modules/swap/constants.d.ts +2 -0
  61. package/dist/modules/swap/constants.d.ts.map +1 -0
  62. package/dist/modules/swap/executeSwapTransaction/executeSwapTransaction.d.ts +32 -0
  63. package/dist/modules/swap/executeSwapTransaction/executeSwapTransaction.d.ts.map +1 -0
  64. package/dist/modules/swap/executeSwapTransaction/index.d.ts +3 -0
  65. package/dist/modules/swap/executeSwapTransaction/index.d.ts.map +1 -0
  66. package/dist/modules/swap/getSwapQuote/getSwapQuote.d.ts +53 -0
  67. package/dist/modules/swap/getSwapQuote/getSwapQuote.d.ts.map +1 -0
  68. package/dist/modules/swap/getSwapQuote/index.d.ts +3 -0
  69. package/dist/modules/swap/getSwapQuote/index.d.ts.map +1 -0
  70. package/dist/modules/swap/getSwapStatus/getSwapStatus.d.ts +23 -0
  71. package/dist/modules/swap/getSwapStatus/getSwapStatus.d.ts.map +1 -0
  72. package/dist/modules/swap/getSwapStatus/index.d.ts +3 -0
  73. package/dist/modules/swap/getSwapStatus/index.d.ts.map +1 -0
  74. package/dist/modules/swap/swap.types.d.ts +14 -0
  75. package/dist/modules/swap/swap.types.d.ts.map +1 -0
  76. package/dist/modules/waas/createWaasProvider/createWaasProvider.d.ts.map +1 -1
  77. package/dist/modules/waas/waas.types.d.ts +4 -1
  78. package/dist/modules/waas/waas.types.d.ts.map +1 -1
  79. package/dist/modules/wallets/disconnectAndTerminateWalletProviders/disconnectAndTerminateWalletProviders.d.ts +5 -2
  80. package/dist/modules/wallets/disconnectAndTerminateWalletProviders/disconnectAndTerminateWalletProviders.d.ts.map +1 -1
  81. package/dist/modules/wallets/walletProvider/index.d.ts +1 -1
  82. package/dist/modules/wallets/walletProvider/index.d.ts.map +1 -1
  83. package/dist/modules/wallets/walletProvider/walletProvider.types.d.ts +17 -8
  84. package/dist/modules/wallets/walletProvider/walletProvider.types.d.ts.map +1 -1
  85. package/dist/services/keychain/createIndexedDBKeychainService/createIndexedDBKeychainService.d.ts.map +1 -1
  86. package/dist/tsconfig.lib.tsbuildinfo +1 -1
  87. package/dist/waas.cjs.js +4 -4
  88. package/dist/waas.esm.js +3 -3
  89. package/dist/waasCore.cjs.js +7 -6
  90. package/dist/waasCore.cjs.js.map +1 -1
  91. package/dist/waasCore.esm.js +6 -5
  92. package/dist/waasCore.esm.js.map +1 -1
  93. package/package.json +3 -3
  94. package/dist/getNetworkProviderFromNetworkId-6QbuR0_i.esm.js.map +0 -1
  95. package/dist/getNetworkProviderFromNetworkId-BXH2tfrn.cjs.js.map +0 -1
  96. package/dist/getSignedSessionId-KSSnmfwN.cjs.js.map +0 -1
@@ -25,8 +25,8 @@ var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__ge
25
25
  }) : target, mod));
26
26
 
27
27
  //#endregion
28
- const require_InvalidParamError = require('./InvalidParamError-Bxg4p9zQ.cjs.js');
29
- const require_getVerifiedCredentialForWalletAccount = require('./getVerifiedCredentialForWalletAccount-CJAgL4AJ.cjs.js');
28
+ const require_InvalidParamError = require('./InvalidParamError-6MugNXi3.cjs.js');
29
+ const require_getVerifiedCredentialForWalletAccount = require('./getVerifiedCredentialForWalletAccount-Zu778J_y.cjs.js');
30
30
  let _dynamic_labs_sdk_api_core = require("@dynamic-labs/sdk-api-core");
31
31
  let zod_mini = require("zod/mini");
32
32
  zod_mini = __toESM(zod_mini);
@@ -438,22 +438,19 @@ const DEFAULT_DB_NAME = "dynamic_keychain";
438
438
  /** @instrumented */
439
439
  const createIndexedDBKeychainService = (params) => {
440
440
  const dbName = params?.dbName ?? DEFAULT_DB_NAME;
441
- let dbPromise;
442
- const getDb = () => {
443
- dbPromise ??= openDatabase(dbName);
444
- return dbPromise;
445
- };
446
441
  const generateKey = async (keyName) => {
447
442
  const keyPair = await crypto.subtle.generateKey({
448
443
  name: "ECDSA",
449
444
  namedCurve: "P-256"
450
445
  }, false, ["sign"]);
451
446
  const publicKeyHex = bufferToHex(compressRawPublicKey(await crypto.subtle.exportKey("raw", keyPair.publicKey)));
452
- await setIndexedDBItem(await getDb(), {
447
+ const db = await openDatabase(dbName);
448
+ await setIndexedDBItem(db, {
453
449
  keyName,
454
450
  privateKey: keyPair.privateKey,
455
451
  publicKeyHex
456
452
  });
453
+ db.close();
457
454
  return publicKeyHex;
458
455
  };
459
456
  const importKey = async (keyName, jwk) => {
@@ -472,18 +469,25 @@ const createIndexedDBKeychainService = (params) => {
472
469
  namedCurve: "P-256"
473
470
  }, true, ["verify"]);
474
471
  const publicKeyHex = bufferToHex(compressRawPublicKey(await crypto.subtle.exportKey("raw", publicCryptoKey)));
475
- await setIndexedDBItem(await getDb(), {
472
+ const db = await openDatabase(dbName);
473
+ await setIndexedDBItem(db, {
476
474
  keyName,
477
475
  privateKey,
478
476
  publicKeyHex
479
477
  });
478
+ db.close();
480
479
  return publicKeyHex;
481
480
  };
482
481
  const getPublicKey = async (keyName) => {
483
- return (await getIndexedDBItem(await getDb(), keyName))?.publicKeyHex ?? null;
482
+ const db = await openDatabase(dbName);
483
+ const entry = await getIndexedDBItem(db, keyName);
484
+ db.close();
485
+ return entry?.publicKeyHex ?? null;
484
486
  };
485
487
  const sign = async (keyName, message) => {
486
- const entry = await getIndexedDBItem(await getDb(), keyName);
488
+ const db = await openDatabase(dbName);
489
+ const entry = await getIndexedDBItem(db, keyName);
490
+ db.close();
487
491
  if (!entry) throw new KeyNotFoundError(keyName);
488
492
  const data = new TextEncoder().encode(message);
489
493
  return bufferToHex(await crypto.subtle.sign({
@@ -492,10 +496,15 @@ const createIndexedDBKeychainService = (params) => {
492
496
  }, entry.privateKey, data));
493
497
  };
494
498
  const hasKey = async (keyName) => {
495
- return await getIndexedDBItem(await getDb(), keyName) !== void 0;
499
+ const db = await openDatabase(dbName);
500
+ const entry = await getIndexedDBItem(db, keyName);
501
+ db.close();
502
+ return entry !== void 0;
496
503
  };
497
504
  const removeKey = async (keyName) => {
498
- await deleteIndexedDBItem(await getDb(), keyName);
505
+ const db = await openDatabase(dbName);
506
+ await deleteIndexedDBItem(db, keyName);
507
+ db.close();
499
508
  };
500
509
  return {
501
510
  generateKey,
@@ -1248,4 +1257,4 @@ Object.defineProperty(exports, 'verifyMessageSignatureOwnership', {
1248
1257
  return verifyMessageSignatureOwnership;
1249
1258
  }
1250
1259
  });
1251
- //# sourceMappingURL=getNetworkProviderFromNetworkId-BXH2tfrn.cjs.js.map
1260
+ //# sourceMappingURL=getNetworkProviderFromNetworkId-CoAKJyXQ.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"getNetworkProviderFromNetworkId-CoAKJyXQ.cjs.js","names":["BaseError","item: StorageFormat<typeof value>","getCore","BufferPolyfill","resolve: (value: T) => void","reject: (reason?: unknown) => void","BaseError","z","EventEmitter","LOG_LEVELS: Record<LogLevel, number>","eventEmitter: LoggerEventEmitter","EventEmitter","minLevel: LogLevel","buffer","BaseError","BaseError","BaseError","ABLY_STATE_TO_REALTIME_STATE: Record<string, RealtimeConnectionState>","EventEmitter","ablyClient: BaseRealtime | undefined","connectionState: RealtimeConnectionState","connect: RealtimeService['connect']","getCore","createApiClient","disconnect: RealtimeService['disconnect']","subscribe: RealtimeService['subscribe']","handler: messageCallback<InboundMessage>","unsubscribe: RealtimeService['unsubscribe']","publish: RealtimeService['publish']","BaseError","BaseError","getDefaultClient","getCore","getDefaultClient","getCore","getDefaultClient","getCore","AuthModeEnum","getCore","createApiClient","getWalletProviderFromWalletAccount","normalizeWalletNameWithChain","connectRequest: ConnectRequest","getCore","filteredUnverifiedWalletAccounts: UnverifiedWalletAccount[]","suffixFields: string[]","getCore","getCore","getCore","createApiClient","normalizeWalletNameWithChain","getCore","CHAINS_INFO_MAP","getDefaultClient","getCore","createRuntimeServiceAccessKey","networkProvider"],"sources":["../src/utils/isEqualShallow/isEqualShallow.ts","../src/utils/observable/subscribeWithSelector/subscribeWithSelector.ts","../src/services/storage/createLocalStorageAdapter/createLocalStorageAdapter.ts","../src/errors/InvalidStorageSet.ts","../src/services/storage/createStorage/formatForStorage/isValidDateISOString/isValidDateISOString.ts","../src/services/storage/createStorage/formatForStorage/storageFormat.ts","../src/services/storage/createStorage/createStorage.ts","../src/services/storage/createStorageKeySchema/createStorageKeySchema.ts","../src/modules/sessionKeys/generateSessionKeys/generateSessionKeys.ts","../src/utils/getBuffer/getBuffer.ts","../src/utils/isServerSideRendering/isServerSideRendering.ts","../src/modules/initializeClient/consts.ts","../src/utils/deferredPromise/createDeferredPromise.ts","../src/errors/CannotTrackError.ts","../src/services/crossTabBroadcast/crossTabBroadcast.schema.ts","../src/services/crossTabBroadcast/createCrossTabBroadcast/createCrossTabBroadcast.ts","../src/services/logger/createLogger/createLogger.ts","../src/utils/bufferToHex/bufferToHex.ts","../src/utils/compressRawPublicKey/compressRawPublicKey.ts","../src/services/keychain/createIndexedDBKeychainService/KeyNotFoundError.ts","../src/services/keychain/createIndexedDBKeychainService/utils/constants.ts","../src/services/keychain/createIndexedDBKeychainService/utils/deleteIndexedDBItem.ts","../src/services/keychain/createIndexedDBKeychainService/utils/getIndexedDBItem.ts","../src/services/keychain/createIndexedDBKeychainService/utils/openDatabase.ts","../src/services/keychain/createIndexedDBKeychainService/utils/setIndexedDBItem.ts","../src/services/keychain/createIndexedDBKeychainService/createIndexedDBKeychainService.ts","../src/errors/InvalidRealtimePublishError.ts","../src/errors/RealtimeNotConnectedError.ts","../src/services/realtime/createRealtimeService/createRealtimeService.ts","../src/errors/NoNetworkProvidersError.ts","../src/errors/WalletAlreadyLinkedToAnotherUserError.ts","../src/modules/captcha/isCaptchaRequired/isCaptchaRequired.ts","../src/modules/captcha/consumeCaptchaToken/consumeCaptchaToken.ts","../src/modules/captcha/setCaptchaToken/setCaptchaToken.ts","../src/modules/extension/hasExtension/hasExtension.ts","../src/modules/auth/createVisit/createVisit.ts","../src/modules/wallets/unverifiedWalletAccounts/setUnverifiedWalletAccounts/setUnverifiedWalletAccounts.ts","../src/modules/wallets/utils/formatSignInMessage/formatSignInMessage.ts","../src/modules/wallets/utils/getSignInMessage/createSignInMessageStatement/createSignInMessageStatement.ts","../src/modules/wallets/unverifiedWalletAccounts/removeUnverifiedWalletAccount/removeUnverifiedWalletAccount.ts","../src/utils/isError/isError.ts","../src/utils/isErrorWithCode/isErrorWithCode.ts","../src/modules/wallets/verifyMessageSignatureOwnership/verifyMessageSignatureOwnership.ts","../src/modules/wallets/walletProvider/walletProviderKeyMap/updateWalletProviderKeysForVerifiedCredentials/updateWalletProviderKeysForVerifiedCredentials.ts","../src/modules/wallets/networks/getSdkChainFromApiChainName/getSdkChainFromApiChainName.ts","../src/modules/wallets/networks/getNetworksData/getNetworksData.ts","../src/modules/wallets/networks/networkProviderBuilderRegistry/createNetworkProviderBuilderRegistry/createNetworkProviderBuilderRegistry.ts","../src/modules/wallets/networks/networkProviderBuilderRegistry/getNetworkProviderBuilderRegistry/getNetworkProviderBuilderRegistry.ts","../src/modules/wallets/networks/getNetworkProviders/getNetworkProviders.ts","../src/modules/wallets/networks/getNetworkProviderFromNetworkId/getNetworkProviderFromNetworkId.ts"],"sourcesContent":["/**\n * Shallow compare two objects.\n *\n * Source: https://github.com/pmndrs/zustand/blob/main/src/vanilla/shallow.ts\n * @not-instrumented\n */\nexport const isEqualShallow = <T>(objA: T, objB: T) => {\n if (Object.is(objA, objB)) return true;\n\n if (\n typeof objA !== 'object' ||\n objA === null ||\n typeof objB !== 'object' ||\n objB === null\n ) {\n return objA === objB;\n }\n\n if (objA instanceof Map && objB instanceof Map) {\n if (objA.size !== objB.size) return false;\n\n for (const [key, value] of objA) {\n if (!Object.is(value, objB.get(key))) return false;\n }\n\n return true;\n }\n\n if (objA instanceof Set && objB instanceof Set) {\n if (objA.size !== objB.size) return false;\n\n for (const value of objA) {\n if (!objB.has(value)) return false;\n }\n return true;\n }\n\n const keysA = Object.keys(objA);\n\n if (keysA.length !== Object.keys(objB).length) return false;\n\n for (const keyA of keysA) {\n if (\n !Object.prototype.hasOwnProperty.call(objB, keyA as string) ||\n !Object.is(objA[keyA as keyof T], objB[keyA as keyof T])\n ) {\n return false;\n }\n }\n\n if (objA.constructor !== objB.constructor) return false;\n\n return true;\n};\n","import { isEqualShallow } from '../../isEqualShallow';\nimport type { ObservableState } from '../observable.types';\n\n/**\n * Allows subscribing to a slice of the state.\n * The slice is a computation of the states.\n *\n * The callback will only be called when the slice has changed.\n * Change is determined by shallow comparison.\n *\n * Returns a function to unsubscribe the callback.\n * @instrumented\n */\nexport const subscribeWithSelector =\n <T extends Record<string, unknown>, Slice>(\n observable: ObservableState<T>,\n selector: (value: T) => Slice\n ) =>\n (callback: (slice: Slice) => void) => {\n let lastSlice = selector(observable.get());\n\n return observable.subscribe((value) => {\n const nextSlice = selector(value);\n\n if (isEqualShallow(nextSlice, lastSlice)) return;\n\n lastSlice = nextSlice;\n\n callback(nextSlice);\n });\n };\n","/* eslint-disable no-restricted-globals -- this is the abstraction for localStorage */\nimport type { StorageAdapter } from '../storage.types';\n\n/**\n * Creates a localStorage adapter\n * @instrumented\n */\nexport const createLocalStorageAdapter = (): StorageAdapter => ({\n getItem: async (key) => localStorage.getItem(key),\n removeItem: async (key) => localStorage.removeItem(key),\n setItem: async (key, value) => localStorage.setItem(key, value),\n});\n","import { BaseError } from './base';\n\ntype InvalidStorageSetParams = {\n key: string;\n value: string;\n};\n\nexport class InvalidStorageSet extends BaseError {\n constructor({ key, value }: InvalidStorageSetParams) {\n super({\n cause: null,\n code: 'invalid_storage_set',\n docsUrl: null,\n metaMessages: [`key: ${key}`, value],\n name: 'InvalidStorageSet',\n shortMessage: 'Tried to store a value that does not match the schema',\n });\n }\n}\n","/**\n * Returns whether the given string is a valid ISO date string.\n *\n * Does not support timezone offsets.\n * @not-instrumented\n */\nexport const isValidDateISOString = (value: string): boolean => {\n const date = new Date(value);\n\n return !isNaN(date.getTime()) && date.toISOString() === value;\n};\n","import type { StorageFormat } from '../../storage.types';\nimport { isValidDateISOString } from './isValidDateISOString';\n\nconst DATE_PREFIX = '__DATE__';\n\n/** @not-instrumented */\nexport const formatForStorage = (value: unknown) => {\n const item: StorageFormat<typeof value> = { value };\n\n return JSON.stringify(item, (_, entry) => {\n // You might think that entry here would be a Date and one could simply do \"entry instanceof Date\",\n // but actually it will be a string already (no idea why JSON.stringify does this)\n if (isValidDateISOString(entry)) {\n return `${DATE_PREFIX}${entry}`;\n }\n\n return entry;\n });\n};\n\n/** @not-instrumented */\nexport const parseFromStorage = <T>(value: string): StorageFormat<T> | null => {\n try {\n const parsed = JSON.parse(value, (_, entry) => {\n if (typeof entry === 'string' && entry.startsWith(DATE_PREFIX)) {\n return new Date(entry.slice(DATE_PREFIX.length));\n }\n\n return entry;\n }) as StorageFormat<T>;\n\n return parsed;\n // eslint-disable-next-line @typescript-eslint/no-unused-vars\n } catch (error) {\n return null;\n }\n};\n","import type { Storage, StorageAdapter } from '../storage.types';\nimport { InvalidStorageSet } from './../../../errors/InvalidStorageSet';\nimport { formatForStorage } from './formatForStorage';\nimport { parseFromStorage } from './formatForStorage/storageFormat';\n\ntype CreateWebStorageParams = {\n prefix?: string;\n storageAdapter: StorageAdapter;\n};\n\n/**\n * Creates a Storage service to interact with storage adapter\n * @instrumented\n */\nexport const createStorage = ({\n prefix = '',\n storageAdapter,\n}: CreateWebStorageParams): Storage => {\n const getPrefixedKey = (key: string) => (prefix ? `${prefix}_${key}` : key);\n\n return {\n getItem: async (storageKeySchema) => {\n const rawItem = await storageAdapter.getItem(\n getPrefixedKey(storageKeySchema.key)\n );\n\n const parsedItem = rawItem ? parseFromStorage(rawItem) : null;\n\n /**\n * The item saved to localStorage may be malformed.\n * In this case, we remove it and return null.\n */\n if (parsedItem !== null) {\n const parsed = storageKeySchema.schema.safeParse(parsedItem.value);\n\n if (parsed.success) {\n return parsed.data;\n }\n }\n\n /**\n * The item saved to localStorage may be malformed.\n * In this case, we remove it and return null.\n */\n\n await storageAdapter.removeItem(getPrefixedKey(storageKeySchema.key));\n\n return null;\n },\n\n removeItem: async (storageKeySchema) => {\n await storageAdapter.removeItem(getPrefixedKey(storageKeySchema.key));\n },\n\n setItem: async (storageKeySchema, value) => {\n const parsed = storageKeySchema.schema.safeParse(value);\n\n if (!parsed.success) {\n throw new InvalidStorageSet({\n key: storageKeySchema.key,\n value: JSON.stringify(value),\n });\n }\n\n const item = formatForStorage(parsed.data);\n\n await storageAdapter.setItem(getPrefixedKey(storageKeySchema.key), item);\n },\n };\n};\n","import type * as z from 'zod/mini';\n\nimport type { StorageKeySchema } from '../storage.types';\n\n/** @instrumented */\nexport const createStorageKeySchema = <T>(params: {\n key: string;\n schema: z.ZodMiniType<T>;\n}): StorageKeySchema<T> => {\n return params;\n};\n","import { getCore } from '../../../client/core/getCore';\nimport type { DynamicClient } from '../../../client/types';\nimport type { SessionKeys } from '../sessionKeys.types';\n\n/** @instrumented */\nexport const generateSessionKeys = async (\n client: DynamicClient\n): Promise<SessionKeys> => {\n const core = getCore(client);\n\n const publicKey = await core.keychain.generateKey('session');\n\n core.state.set({\n sessionKeys: publicKey,\n });\n\n return { publicKey };\n};\n","/* eslint-disable no-restricted-globals */\nimport { Buffer as BufferPolyfill } from 'buffer';\n\n/** @not-instrumented */\nexport const getBuffer = () =>\n typeof Buffer !== 'undefined' ? Buffer : BufferPolyfill;\n","/**\n * Indicates if the code is running in a server-side environment.\n * @not-instrumented\n */\n// eslint-disable-next-line no-restricted-globals\nexport const isServerSideRendering = () => typeof window === 'undefined';\n","export const REFRESH_USER_STATE_FROM_COOKIE_TRACKER_KEY =\n 'refresh-user-state-from-cookie';\n\nexport const INITIALIZE_STORAGE_SYNC_TRACKER_KEY = 'initialize-storage-sync';\n\nexport const FETCH_PROJECT_SETTINGS_TRACKER_KEY = 'fetch-project-settings';\n\nexport const GENERATE_SESSION_KEYS_TRACKER_KEY = 'generate-session-keys';\n","import type { DeferredPromise } from './deferredPromise.types';\n\n/** @instrumented */\nexport const createDeferredPromise = <T>(): DeferredPromise<T> => {\n let resolve: (value: T) => void;\n let reject: (reason?: unknown) => void;\n\n const promise = new Promise<T>((_resolve, _reject) => {\n resolve = _resolve;\n reject = _reject;\n });\n\n return {\n promise,\n reject: (reason?: unknown) => reject?.(reason),\n resolve: (value: T) => resolve?.(value),\n };\n};\n","import { BaseError } from './base';\n\nexport class CannotTrackError extends BaseError {\n constructor() {\n super({\n cause: null,\n code: 'cannot_track_error',\n docsUrl: null,\n name: 'CannotTrackError',\n shortMessage: 'All track calls must be performed in the same node tick',\n });\n }\n}\n","import * as z from 'zod/mini';\n\n/**\n * Schema for validating cross-tab broadcast messages.\n */\nexport const CrossTabBroadcastMessageSchema = z.object({\n args: z.optional(z.unknown()),\n event: z.string(),\n});\n","import EventEmitter from 'eventemitter3';\n\nimport { isServerSideRendering } from '../../../utils/isServerSideRendering';\nimport { CrossTabBroadcastMessageSchema } from '../crossTabBroadcast.schema';\nimport type { CrossTabBroadcast } from '../crossTabBroadcast.types';\n\ntype CreateCrossTabBroadcastParams = {\n channelName: string;\n};\n\n/**\n * Creates a cross-tab broadcast service instance using the BroadcastChannel API.\n *\n * Enables communication between multiple tabs/windows of the same application.\n * Messages are validated against the schema and invalid messages are silently ignored.\n *\n * In SSR or when BroadcastChannel is unavailable, returns a no-op implementation.\n *\n * @param params - Configuration parameters\n * @param params.channelName - The name of the broadcast channel to use\n * @returns A cross-tab broadcast service instance\n * @instrumented\n */\nexport const createCrossTabBroadcast = ({\n channelName,\n}: CreateCrossTabBroadcastParams): CrossTabBroadcast => {\n // SSR check - return no-op implementation\n // eslint-disable-next-line no-restricted-globals\n if (isServerSideRendering() || typeof BroadcastChannel === 'undefined') {\n return {\n off: () => {},\n on: () => {},\n send: () => {},\n };\n }\n\n // eslint-disable-next-line no-restricted-globals\n const channel = new BroadcastChannel(channelName);\n const eventEmitter = new EventEmitter();\n\n // Message handler with validation\n const handleMessage = (messageEvent: MessageEvent) => {\n const parsed = CrossTabBroadcastMessageSchema.safeParse(messageEvent.data);\n\n if (!parsed.success) {\n // Silently ignore invalid messages (consistent with storage patterns)\n return;\n }\n\n const { args, event } = parsed.data;\n eventEmitter.emit(event, args);\n };\n\n channel.addEventListener('message', handleMessage);\n\n return {\n off: (event, callback) => {\n eventEmitter.off(event, callback);\n },\n\n on: (event, callback) => {\n eventEmitter.on(event, callback);\n },\n\n send: ({ args, event }) => {\n channel.postMessage({ args, event });\n },\n };\n};\n","import { EventEmitter } from 'eventemitter3';\n\nimport type { LogLevel, Logger, LoggerEventEmitter } from '../logger.types';\n\n/**\n * Configuration options for the logger\n * @instrumented\n */\ntype CreateLoggerOptions = {\n level?: LogLevel;\n};\n\n/**\n * Log levels and their corresponding numeric values\n */\nconst LOG_LEVELS: Record<LogLevel, number> = {\n debug: 0,\n error: 3,\n info: 1,\n warn: 2,\n};\n\n// Assign to avoid lint errors\nconst defaultConsole = console;\n\n/**\n * Creates a logger instance with configurable log level and event emission capabilities.\n * @returns A logger instance with debug, info, warn, and error methods\n * @not-instrumented\n */\nexport const createLogger = (options: CreateLoggerOptions = {}): Logger => {\n const eventEmitter: LoggerEventEmitter = new EventEmitter();\n\n // Default to 'debug' if no level is provided\n const minLevel: LogLevel = options.level ?? 'warn';\n\n // Helper to decide if we should log based on current log level\n const shouldLog = (level: LogLevel): boolean => {\n return LOG_LEVELS[level] >= LOG_LEVELS[minLevel];\n };\n\n // Helper to format the log message\n const formatMessage = (level: LogLevel, message: string): string => {\n const timestamp = new Date().toISOString();\n\n return `[${timestamp}] ${level.toUpperCase()}: ${message}`;\n };\n\n // Unified logger function that checks the level and calls the appropriate console method\n const log = (\n level: LogLevel,\n consoleMethod: (...data: unknown[]) => void,\n message: string,\n ...args: unknown[]\n ) => {\n eventEmitter.emit('log', level, message, ...args);\n\n if (!shouldLog(level)) return;\n\n consoleMethod(formatMessage(level, message), ...args);\n };\n\n return {\n debug: (message, ...args) =>\n log('debug', defaultConsole.debug, message, ...args),\n\n error: (message, ...args) =>\n log('error', defaultConsole.error, message, ...args),\n\n info: (message, ...args) =>\n log('info', defaultConsole.info, message, ...args),\n\n off: eventEmitter.off.bind(eventEmitter),\n\n on: eventEmitter.on.bind(eventEmitter),\n warn: (message, ...args) =>\n log('warn', defaultConsole.warn, message, ...args),\n };\n};\n","/**\n * Converts an ArrayBuffer or Uint8Array to a hex-encoded string\n * @not-instrumented\n */\nexport const bufferToHex = (buffer: ArrayBufferLike | Uint8Array) =>\n [...(buffer instanceof Uint8Array ? buffer : new Uint8Array(buffer))]\n .map((x) => x.toString(16).padStart(2, '0'))\n .join('');\n","/**\n * Accepts a public key array buffer, and returns a buffer with the compressed version of the public key\n * @not-instrumented\n */\nexport const compressRawPublicKey = (rawPublicKey: ArrayBuffer) => {\n const rawPublicKeyBytes = new Uint8Array(rawPublicKey);\n const len = rawPublicKeyBytes.byteLength;\n\n // Drop the y coordinate\n const compressedBytes = rawPublicKeyBytes.slice(0, (1 + len) >>> 1);\n\n // Encode the parity of `y` in first bit\n compressedBytes[0] = 0x2 | (rawPublicKeyBytes[len - 1] & 0x01);\n return compressedBytes.buffer;\n};\n","import { BaseError } from '../../../errors/base';\n\nexport class KeyNotFoundError extends BaseError {\n constructor(keyName: string) {\n super({\n cause: null,\n code: 'key_not_found',\n docsUrl: null,\n name: 'KeyNotFoundError',\n shortMessage: `Key \"${keyName}\" not found in keychain`,\n });\n }\n}\n","export const STORE_NAME = 'keys';\n","import { STORE_NAME } from './constants';\n\n/** @not-instrumented */\nexport const deleteIndexedDBItem = (\n db: IDBDatabase,\n keyName: string\n): Promise<void> =>\n new Promise((resolve, reject) => {\n const transaction = db.transaction(STORE_NAME, 'readwrite');\n const store = transaction.objectStore(STORE_NAME);\n const request = store.delete(keyName);\n\n request.onsuccess = () => resolve();\n request.onerror = () => reject(request.error as Error);\n });\n","import type { StoredKey } from '../createIndexedDBKeychainService.types';\nimport { STORE_NAME } from './constants';\n\n/** @not-instrumented */\nexport const getIndexedDBItem = (\n db: IDBDatabase,\n keyName: string\n): Promise<StoredKey | undefined> =>\n new Promise((resolve, reject) => {\n const transaction = db.transaction(STORE_NAME, 'readonly');\n const store = transaction.objectStore(STORE_NAME);\n const request = store.get(keyName);\n\n request.onsuccess = () => resolve(request.result as StoredKey | undefined);\n request.onerror = () => reject(request.error as Error);\n });\n","import { STORE_NAME } from './constants';\n\n/** @not-instrumented */\nexport const openDatabase = (dbName: string): Promise<IDBDatabase> =>\n new Promise((resolve, reject) => {\n const request = indexedDB.open(dbName, 1);\n\n request.onupgradeneeded = () => {\n const db = request.result;\n\n if (!db.objectStoreNames.contains(STORE_NAME)) {\n db.createObjectStore(STORE_NAME, { keyPath: 'keyName' });\n }\n };\n\n request.onsuccess = () => resolve(request.result);\n request.onerror = () => reject(request.error as Error);\n });\n","import type { StoredKey } from '../createIndexedDBKeychainService.types';\nimport { STORE_NAME } from './constants';\n\n/** @not-instrumented */\nexport const setIndexedDBItem = (\n db: IDBDatabase,\n entry: StoredKey\n): Promise<void> =>\n new Promise((resolve, reject) => {\n const transaction = db.transaction(STORE_NAME, 'readwrite');\n const store = transaction.objectStore(STORE_NAME);\n const request = store.put(entry);\n\n request.onsuccess = () => resolve();\n request.onerror = () => reject(request.error as Error);\n });\n","import { bufferToHex } from '../../../utils/bufferToHex';\nimport { compressRawPublicKey } from '../../../utils/compressRawPublicKey';\nimport type { KeychainService } from '../keychain.types';\nimport { KeyNotFoundError } from './KeyNotFoundError';\nimport { deleteIndexedDBItem } from './utils/deleteIndexedDBItem';\nimport { getIndexedDBItem } from './utils/getIndexedDBItem';\nimport { openDatabase } from './utils/openDatabase';\nimport { setIndexedDBItem } from './utils/setIndexedDBItem';\n\ntype CreateIndexedDBKeychainServiceParams = {\n dbName?: string;\n};\n\nconst DEFAULT_DB_NAME = 'dynamic_keychain';\n\n/** @instrumented */\nexport const createIndexedDBKeychainService = (\n params?: CreateIndexedDBKeychainServiceParams\n): KeychainService => {\n const dbName = params?.dbName ?? DEFAULT_DB_NAME;\n\n const generateKey = async (keyName: string): Promise<string> => {\n const keyPair = await crypto.subtle.generateKey(\n { name: 'ECDSA', namedCurve: 'P-256' },\n false,\n ['sign']\n );\n\n const rawPublicKey = await crypto.subtle.exportKey(\n 'raw',\n keyPair.publicKey\n );\n\n const compressedPublicKey = compressRawPublicKey(rawPublicKey);\n const publicKeyHex = bufferToHex(compressedPublicKey);\n\n const db = await openDatabase(dbName);\n await setIndexedDBItem(db, {\n keyName,\n privateKey: keyPair.privateKey,\n publicKeyHex,\n });\n db.close();\n\n return publicKeyHex;\n };\n\n const importKey = async (\n keyName: string,\n jwk: JsonWebKey\n ): Promise<string> => {\n const privateKey = await crypto.subtle.importKey(\n 'jwk',\n jwk,\n { name: 'ECDSA', namedCurve: 'P-256' },\n false,\n ['sign']\n );\n\n const publicJwk = { crv: jwk.crv, kty: jwk.kty, x: jwk.x, y: jwk.y };\n\n const publicCryptoKey = await crypto.subtle.importKey(\n 'jwk',\n publicJwk,\n { name: 'ECDSA', namedCurve: 'P-256' },\n true,\n ['verify']\n );\n\n const rawPublicKey = await crypto.subtle.exportKey('raw', publicCryptoKey);\n const compressedPublicKey = compressRawPublicKey(rawPublicKey);\n const publicKeyHex = bufferToHex(compressedPublicKey);\n\n const db = await openDatabase(dbName);\n await setIndexedDBItem(db, {\n keyName,\n privateKey,\n publicKeyHex,\n });\n db.close();\n\n return publicKeyHex;\n };\n\n const getPublicKey = async (keyName: string): Promise<string | null> => {\n const db = await openDatabase(dbName);\n const entry = await getIndexedDBItem(db, keyName);\n db.close();\n\n return entry?.publicKeyHex ?? null;\n };\n\n const sign = async (keyName: string, message: string): Promise<string> => {\n const db = await openDatabase(dbName);\n const entry = await getIndexedDBItem(db, keyName);\n db.close();\n\n if (!entry) {\n throw new KeyNotFoundError(keyName);\n }\n\n const encoder = new TextEncoder();\n const data = encoder.encode(message);\n\n const signature = await crypto.subtle.sign(\n { hash: { name: 'SHA-256' }, name: 'ECDSA' },\n entry.privateKey,\n data\n );\n\n return bufferToHex(signature);\n };\n\n const hasKey = async (keyName: string): Promise<boolean> => {\n const db = await openDatabase(dbName);\n const entry = await getIndexedDBItem(db, keyName);\n db.close();\n\n return entry !== undefined;\n };\n\n const removeKey = async (keyName: string): Promise<void> => {\n const db = await openDatabase(dbName);\n await deleteIndexedDBItem(db, keyName);\n db.close();\n };\n\n return {\n generateKey,\n getPublicKey,\n hasKey,\n importKey,\n removeKey,\n sign,\n };\n};\n","import { BaseError } from './base';\n\ntype InvalidRealtimePublishParams = {\n channel: string;\n};\n\nexport class InvalidRealtimePublishError extends BaseError {\n constructor({ channel }: InvalidRealtimePublishParams) {\n super({\n cause: null,\n code: 'invalid_realtime_publish',\n docsUrl: null,\n metaMessages: [`channel: ${channel}`],\n name: 'InvalidRealtimePublishError',\n shortMessage:\n 'Tried to publish data that does not match the channel schema',\n });\n }\n}\n","import { BaseError } from './base';\n\nexport class RealtimeNotConnectedError extends BaseError {\n constructor() {\n super({\n cause: null,\n code: 'realtime_not_connected_error',\n docsUrl: null,\n name: 'RealtimeNotConnectedError',\n shortMessage:\n 'Realtime service is not connected. Call connect() before subscribing or publishing.',\n });\n }\n}\n","import type { InboundMessage, RealtimeChannel, messageCallback } from 'ably';\nimport type { BaseRealtime } from 'ably/modular';\nimport EventEmitter from 'eventemitter3';\n\nimport { getCore } from '../../../client/core/getCore';\nimport { InvalidRealtimePublishError } from '../../../errors/InvalidRealtimePublishError';\nimport { RealtimeNotConnectedError } from '../../../errors/RealtimeNotConnectedError';\nimport { createApiClient } from '../../../modules/apiClient';\nimport { isServerSideRendering } from '../../../utils/isServerSideRendering';\nimport type {\n RealtimeChannelSchema,\n RealtimeConnectionState,\n RealtimeEventMap,\n RealtimeService,\n} from '../realtime.types';\n\nconst ABLY_STATE_TO_REALTIME_STATE: Record<string, RealtimeConnectionState> = {\n closed: 'closed',\n closing: 'closing',\n connected: 'connected',\n connecting: 'connecting',\n disconnected: 'disconnected',\n failed: 'failed',\n initialized: 'idle',\n suspended: 'suspended',\n};\n\nconst mapAblyState = (ablyState: string): RealtimeConnectionState =>\n ABLY_STATE_TO_REALTIME_STATE[ablyState] ?? 'idle';\n\n/**\n * Creates a realtime pub/sub service backed by Ably.\n *\n * The service starts idle. Call `connect({ client })` to establish\n * a connection, passing the DynamicClient explicitly.\n *\n * SSR environments receive a no-op implementation.\n * @instrumented\n */\nexport const createRealtimeService = (): RealtimeService => {\n if (isServerSideRendering()) {\n return {\n connect: () => Promise.resolve(),\n disconnect: () => {},\n getConnectionState: () => 'idle',\n off: () => {},\n on: () => {},\n publish: () => Promise.resolve(),\n subscribe: () => Promise.resolve(),\n unsubscribe: () => {},\n };\n }\n\n const eventEmitter = new EventEmitter<RealtimeEventMap>();\n const channels = new Map<string, RealtimeChannel>();\n // eslint-disable-next-line @typescript-eslint/no-explicit-any\n const handlerMap = new WeakMap<(message: { data: any }) => void, messageCallback<InboundMessage>>();\n\n let ablyClient: BaseRealtime | undefined;\n let connectionState: RealtimeConnectionState = 'idle';\n let isConnecting = false;\n\n const setConnectionState = (state: RealtimeConnectionState) => {\n connectionState = state;\n eventEmitter.emit('connectionStateChange', state);\n };\n\n const getOrCreateChannel = (channelName: string): RealtimeChannel => {\n const existing = channels.get(channelName);\n\n if (existing) {\n return existing;\n }\n\n if (!ablyClient) {\n throw new RealtimeNotConnectedError();\n }\n\n const channel = ablyClient.channels.get(channelName);\n channels.set(channelName, channel);\n\n return channel;\n };\n\n const connect: RealtimeService['connect'] = async ({ client }) => {\n if (isConnecting) {\n return;\n }\n\n isConnecting = true;\n\n try {\n const core = getCore(client);\n\n if (ablyClient) {\n ablyClient.close();\n channels.clear();\n }\n\n // Dynamic import to keep the module tree-shakeable\n // and avoid loading Ably in SSR environments\n const {\n BaseRealtime: AblyBaseRealtime,\n FetchRequest,\n WebSocketTransport,\n } = await import('ably/modular');\n\n ablyClient = new AblyBaseRealtime({\n // authCallback must return void (not Promise<void>), so we use\n // .then().catch() instead of async/await to avoid returning a Promise\n // to Ably's callback-style auth handler.\n authCallback: (_tokenParams, callback) => {\n const apiClient = createApiClient({}, client);\n\n apiClient\n .getRealtimeAuthToken({ environmentId: core.environmentId })\n .then((response) => {\n callback(null, response.token);\n })\n .catch((err: unknown) => {\n const message = err instanceof Error ? err.message : String(err);\n callback(message, null);\n });\n },\n autoConnect: false,\n plugins: { FetchRequest, WebSocketTransport },\n });\n\n ablyClient.connection.on((stateChange) => {\n setConnectionState(mapAblyState(stateChange.current));\n });\n\n ablyClient.connect();\n } finally {\n isConnecting = false;\n }\n };\n\n const disconnect: RealtimeService['disconnect'] = () => {\n if (!ablyClient) {\n return;\n }\n\n for (const channel of channels.values()) {\n channel.detach().catch(() => {});\n }\n\n channels.clear();\n ablyClient.close();\n ablyClient = undefined;\n };\n\n const subscribe: RealtimeService['subscribe'] = async <T>({\n channelSchema,\n callback,\n }: {\n callback: (message: { data: T }) => void;\n channelSchema: RealtimeChannelSchema<T>;\n }) => {\n const channel = getOrCreateChannel(channelSchema.channel);\n\n const handler: messageCallback<InboundMessage> = (message) => {\n const parsed = channelSchema.schema.safeParse(message.data);\n\n if (!parsed.success) {\n return;\n }\n\n callback({ data: parsed.data });\n };\n\n handlerMap.set(callback, handler);\n\n await channel.subscribe(handler);\n };\n\n const unsubscribe: RealtimeService['unsubscribe'] = <T>({\n channelSchema,\n callback,\n }: {\n callback: (message: { data: T }) => void;\n channelSchema: RealtimeChannelSchema<T>;\n }) => {\n const channel = channels.get(channelSchema.channel);\n\n if (!channel) {\n return;\n }\n\n const handler = handlerMap.get(callback);\n\n if (handler) {\n channel.unsubscribe(handler);\n handlerMap.delete(callback);\n }\n };\n\n const publish: RealtimeService['publish'] = async <T>({\n channelSchema,\n data,\n }: {\n channelSchema: RealtimeChannelSchema<T>;\n data: T;\n }) => {\n const parsed = channelSchema.schema.safeParse(data);\n\n if (!parsed.success) {\n throw new InvalidRealtimePublishError({ channel: channelSchema.channel });\n }\n\n const channel = getOrCreateChannel(channelSchema.channel);\n await channel.publish('message', parsed.data);\n };\n\n return {\n connect,\n disconnect,\n getConnectionState: () => connectionState,\n off: (event, callback) => {\n eventEmitter.off(event, callback);\n },\n on: (event, callback) => {\n eventEmitter.on(event, callback);\n },\n publish,\n subscribe,\n unsubscribe,\n };\n};\n","import { BaseError } from './base';\n\nexport class NoNetworkProvidersError extends BaseError {\n constructor() {\n super({\n cause: null,\n code: 'no_network_providers',\n docsUrl: null,\n name: 'NoNetworkProvidersError',\n shortMessage: 'No networks were registered in the client',\n });\n }\n}\n","import { BaseError, type BaseErrorParameters } from './base';\n\nexport class WalletAlreadyLinkedToAnotherUserError extends BaseError {\n constructor({ cause }: Pick<BaseErrorParameters, 'cause'>) {\n super({\n cause,\n code: 'wallet_already_linked_to_another_user_error',\n docsUrl: null,\n name: 'WalletAlreadyLinkedToAnotherUserError',\n shortMessage: 'This wallet is already linked to another user',\n });\n }\n}\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport { assertDefined } from '../../../utils/assertDefined';\n\n/** @not-instrumented */\nexport const isCaptchaRequired = (client = getDefaultClient()) => {\n const projectSettings = client.projectSettings;\n\n assertDefined(projectSettings, 'Project settings are not available');\n\n return projectSettings.security.hCaptcha?.enabled ?? false;\n};\n","import { getCore } from '../../../client/core/getCore';\nimport type { DynamicClient } from '../../../client/types';\nimport { assertDefined } from '../../../utils/assertDefined';\nimport { isCaptchaRequired } from '../isCaptchaRequired';\n\n/**\n * Retrieves the current captcha token from the client state and sets it to null.\n * @instrumented\n */\nexport const consumeCaptchaToken = (\n client: DynamicClient\n): string | undefined => {\n const core = getCore(client);\n\n const captchaToken = core.state.get().captchaToken;\n\n if (isCaptchaRequired(client)) {\n assertDefined(captchaToken, 'Captcha token is required');\n }\n\n core.state.set({\n captchaToken: null,\n });\n\n return captchaToken ?? undefined;\n};\n","import { getCore } from '../../../client/core/getCore';\nimport { getDefaultClient } from '../../../client/defaultClient';\n\ntype SetCaptchaTokenProps = {\n captchaToken: string;\n};\n\n/**\n * Sets the given captcha token in the client state.\n *\n * @param params.captchaToken - The captcha token to set.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @instrumented\n */\nexport const setCaptchaToken = (\n { captchaToken }: SetCaptchaTokenProps,\n client = getDefaultClient()\n) => {\n const core = getCore(client);\n\n core.state.set({\n captchaToken,\n });\n};\n","import { getCore } from '../../../client/core/getCore';\nimport { getDefaultClient } from '../../../client/defaultClient';\n\ntype HasExtensionParams = {\n extensionKey: string;\n};\n\n/**\n * Checks if a specific extension has been applied to the Dynamic client.\n *\n * Extensions add optional features to the Dynamic SDK,\n * such as EVM, Solana, or other chain support.\n *\n * @param params.extensionKey - The unique key identifying the extension to check for.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns True if the extension is applied, false otherwise.\n * @not-instrumented\n */\nexport const hasExtension = (\n { extensionKey }: HasExtensionParams,\n client = getDefaultClient()\n) => {\n const core = getCore(client);\n\n return core.extensions.has(extensionKey);\n};\n","import {\n AuthModeEnum,\n type ChainEnum,\n type ConnectRequest,\n} from '@dynamic-labs/sdk-api-core';\n\nimport { getCore } from '../../../client/core/getCore';\nimport type { DynamicClient } from '../../../client/types';\nimport { createApiClient } from '../../apiClient';\nimport { getWalletProviderFromWalletAccount } from '../../wallets/utils/getWalletProviderFromWalletAccount';\nimport { normalizeWalletNameWithChain } from '../../wallets/utils/normalizeWalletNameWithChain';\nimport type { WalletAccount } from '../../wallets/walletAccount';\n\ntype CreateVisitParams = {\n authMode?: AuthModeEnum;\n walletAccount: WalletAccount;\n};\n\n/* \n In older SDK versions we used to have the concept of \"connect-only\" vs \"connect-and-sign\". \n The only difference in backend is it stores some extra data for connect-only, \n so we can just default to using it.\n*/\n/** @instrumented */\nexport const createVisit = async (\n { walletAccount, authMode = AuthModeEnum.Only }: CreateVisitParams,\n client: DynamicClient\n) => {\n const core = getCore(client);\n const apiClient = createApiClient({}, client);\n\n const walletProvider = getWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n try {\n const walletName = normalizeWalletNameWithChain({\n chain: walletProvider.chain,\n displayName: walletProvider.metadata.displayName,\n });\n\n const connectRequest: ConnectRequest = {\n address: walletAccount.address,\n authMode,\n // eslint-disable-next-line custom-rules/ban-chain-enum\n chain: walletProvider.chain as ChainEnum,\n provider: walletProvider.walletProviderType,\n walletName,\n };\n\n await apiClient.createVisit({\n connectRequest,\n environmentId: core.environmentId,\n });\n } catch (error) {\n core.logger.error('Error creating visit', { error });\n }\n};\n","import { getCore } from '../../../../client/core/getCore';\nimport type { DynamicClient } from '../../../../client/types';\nimport type { UnverifiedWalletAccount } from '../unverifiedWalletAccounts.types';\n\ntype SetUnverifiedWalletAccountsParams = {\n unverifiedWalletAccountsToUpdate: UnverifiedWalletAccount[];\n};\n\n/**\n * Updates the unverified wallet account in the client state.\n * This will add new wallet accounts and override those with matching ids,\n * but will leave other preexisting wallet accounts unchanged.\n * @instrumented\n */\nexport const setUnverifiedWalletAccounts = (\n { unverifiedWalletAccountsToUpdate }: SetUnverifiedWalletAccountsParams,\n client: DynamicClient\n): void => {\n if (unverifiedWalletAccountsToUpdate.length === 0) {\n return;\n }\n\n const core = getCore(client);\n\n const unverifiedWalletAccountsToUpdateIds =\n unverifiedWalletAccountsToUpdate.map(({ id }) => id);\n\n const filteredUnverifiedWalletAccounts: UnverifiedWalletAccount[] = core.state\n .get()\n .unverifiedWalletAccounts.filter(\n (unverifiedWalletAccount) =>\n !unverifiedWalletAccountsToUpdateIds.includes(\n unverifiedWalletAccount.id\n )\n );\n\n core.state.set({\n unverifiedWalletAccounts: [\n ...filteredUnverifiedWalletAccounts,\n ...unverifiedWalletAccountsToUpdate,\n ],\n });\n};\n","type FormatSignInMessageParams = {\n address: string;\n blockchainName: string;\n chainId?: string;\n domain: string;\n issuedAt?: string;\n nonce: string;\n requestId?: string;\n resources?: string[];\n statement?: string;\n uri: string;\n};\n\n/**\n * Formats a sign in message to prove ownership of an address.\n * @not-instrumented\n */\nexport const formatSignInMessage = async ({\n domain,\n blockchainName,\n address,\n uri,\n chainId,\n nonce,\n issuedAt,\n requestId,\n statement,\n resources,\n}: FormatSignInMessageParams) => {\n // This format follows the sign-in with ethereum (SIWE) standard,\n // but we are using it also for non-ethereum wallets for now (eg. Solana)\n // for more context on format and fields, please see:\n // https://docs.login.xyz/general-information/siwe-overview/eip-4361\n const header = `${domain} wants you to sign in with your ${blockchainName} account:`;\n const prefix = [header, address].join('\\n');\n\n // If there is a statement, we want to add a gap between the prefix and the statement\n // two times '\\n', first to move statement to next line and second to add a gap between prefix and statement\n const prefixWithStatementGap = statement ? '\\n\\n' : '\\n';\n const prefixWithStatement = `${[prefix, statement].join(\n prefixWithStatementGap\n )}\\n`;\n\n const suffixFields: string[] = [];\n suffixFields.push(`URI: ${uri}`);\n suffixFields.push('Version: 1');\n if (chainId) {\n suffixFields.push(`Chain ID: ${chainId}`);\n }\n\n suffixFields.push(`Nonce: ${nonce}`);\n\n if (issuedAt) {\n suffixFields.push(`Issued At: ${issuedAt}`);\n }\n\n if (requestId) {\n suffixFields.push(`Request ID: ${requestId}`);\n }\n\n if (resources?.length) {\n suffixFields.push(\n `Resources:${resources.map((resource) => '\\n- ' + resource).join()}`\n );\n }\n\n const suffix = suffixFields.join('\\n');\n\n return [prefixWithStatement, suffix].join('\\n');\n};\n","import { getCore } from '../../../../../client/core/getCore';\nimport type { DynamicClient } from '../../../../../client/types';\n\n/** @instrumented */\nexport const createSignInMessageStatement = (client: DynamicClient) => {\n const core = getCore(client);\n\n const appName =\n core.metadata?.name ?? client.projectSettings?.general.displayName;\n\n return `Welcome to ${appName}. Signing is the only way we can truly know that you are the owner of the wallet you are connecting. Signing is a safe, gas-less transaction that does not in any way give ${appName} permission to perform any transactions with your wallet.`;\n};\n","import { getCore } from '../../../../client/core/getCore';\nimport type { DynamicClient } from '../../../../client/types';\nimport { checkAndRaiseWalletAccountsChangedEvent } from '../../../auth/updateAuthFromVerifyResponse/checkAndRaiseWalletAccountsChangedEvent';\nimport type { UnverifiedWalletAccount } from '../unverifiedWalletAccounts.types';\n\ntype RemoveUnverifiedWalletAccountParams = {\n unverifiedWalletAccount: UnverifiedWalletAccount;\n};\n\n/**\n * Removes an unverified wallet account from the client's state.\n * @instrumented\n */\nexport const removeUnverifiedWalletAccount = (\n { unverifiedWalletAccount }: RemoveUnverifiedWalletAccountParams,\n client: DynamicClient\n) => {\n const core = getCore(client);\n\n const previousState = core.state.get();\n\n const { unverifiedWalletAccounts } = core.state.get();\n\n const filteredUnverifiedWalletAccounts = unverifiedWalletAccounts.filter(\n (account) => account.id !== unverifiedWalletAccount.id\n );\n\n core.state.set({\n unverifiedWalletAccounts: filteredUnverifiedWalletAccounts,\n });\n\n /**\n * We check before raising because the wallet account we are removing might still\n * be present in wallet accounts due to having been moved to verified credentials.\n */\n checkAndRaiseWalletAccountsChangedEvent({ previousState }, client);\n};\n","/**\n * Check if the given value is an Error object\n * @not-instrumented\n */\nexport const isError = (error: unknown): error is Error =>\n error instanceof Error;\n","import { isError } from '../isError';\n\n/**\n * Check if the given value is an Error object with a specific code\n * @not-instrumented\n */\nexport const isErrorWithCode = <T extends string>(\n error: unknown,\n code: T\n): error is Error & { code: T } => {\n if (!isError(error)) return false;\n\n return 'code' in error && error.code === code;\n};\n","import type {\n ChainEnum,\n TokenScope,\n VerifyResponse,\n WalletAddressType,\n WalletProviderEnum,\n} from '@dynamic-labs/sdk-api-core';\n\nimport { getCore } from '../../../client/core/getCore';\nimport type { DynamicClient } from '../../../client/types';\nimport { isErrorWithCode } from '../../../utils/isErrorWithCode';\nimport { createApiClient } from '../../apiClient';\nimport { consumeCaptchaToken } from '../../captcha/consumeCaptchaToken';\nimport type { Chain } from '../../chain';\nimport { normalizeWalletNameWithChain } from '../utils/normalizeWalletNameWithChain';\nimport type { WalletAddressWithType } from '../walletAccount/walletAccount.types';\nimport { WalletAlreadyLinkedToAnotherUserError } from './../../../errors/WalletAlreadyLinkedToAnotherUserError';\n\ntype VerifyMessageSignatureOwnershipParams = {\n addressesWithTypes?: WalletAddressWithType[];\n chain: Chain;\n isTransfer?: boolean;\n messageToSign: string;\n networkId?: string;\n requestedScopes?: TokenScope[];\n signature: string;\n walletAddress: string;\n walletDisplayName: string;\n walletProviderType: WalletProviderEnum;\n};\n\n/**\n * Verifies a signed message by calling either the verifyLink, verifyTransfer or verify API function,\n * depending on whether the user is signing in, linking or transferring a wallet.\n *\n * Does NOT call updateAuthFromVerifyResponse, it should be called from the return of this function.\n * @instrumented\n */\nexport const verifyMessageSignatureOwnership = async (\n {\n messageToSign,\n walletAddress,\n addressesWithTypes,\n signature,\n chain,\n isTransfer = false,\n walletDisplayName,\n walletProviderType,\n networkId,\n requestedScopes,\n }: VerifyMessageSignatureOwnershipParams,\n client: DynamicClient\n): Promise<VerifyResponse> => {\n const core = getCore(client);\n const apiClient = createApiClient({}, client);\n\n const walletName = normalizeWalletNameWithChain({\n chain,\n displayName: walletDisplayName,\n });\n\n let verifyApiFunction;\n\n if (!client.user) {\n // If the user is not authenticated, call the walletsSignin API function to sign in\n verifyApiFunction = apiClient.walletsSignin.bind(apiClient);\n } else if (isTransfer) {\n // If the user is authenticated and is transferring a wallet, call the verifyTransfer API function\n verifyApiFunction = apiClient.verifyTransfer.bind(apiClient);\n } else if (client.user && requestedScopes) {\n // Scopes = step-up auth: user requests permission for a sensitive op (e.g. wallet export).\n // We grant it only if they prove they own an existing credential (walletsVerify).\n // Must use walletsVerify: user is already logged in (not signin) and credential exists (not transfer/link).\n // If the user is authenticated and requested scopes are provided, call the walletsVerify API function\n verifyApiFunction = apiClient.walletsVerify.bind(apiClient);\n } else {\n // If the user is authenticated and is signing in, call the verifyLink API function\n verifyApiFunction = apiClient.verifyLink.bind(apiClient);\n }\n\n try {\n return await verifyApiFunction({\n environmentId: core.environmentId,\n verifyRequest: {\n // mapping to handle typecasting for address type\n additionalWalletAddresses: addressesWithTypes?.map((address) => ({\n address: address.address,\n publicKey: address.publicKey,\n type: address.type as WalletAddressType,\n })),\n captchaToken: consumeCaptchaToken(client),\n // eslint-disable-next-line custom-rules/ban-chain-enum\n chain: chain as ChainEnum,\n messageToSign,\n network: networkId,\n publicWalletAddress: walletAddress,\n requestedScopes,\n signedMessage: signature,\n walletName,\n walletProvider: walletProviderType,\n },\n });\n } catch (error) {\n core.logger.error('Failed to verify message signature ownership', error);\n\n if (\n isErrorWithCode(error, 'reassign_wallet_confirm') ||\n isErrorWithCode(error, 'merge_accounts_confirmation')\n ) {\n throw new WalletAlreadyLinkedToAnotherUserError({\n cause: error,\n });\n }\n\n throw error;\n }\n};\n","import { getCore } from '../../../../../client/core/getCore';\nimport type { DynamicClient } from '../../../../../client/types';\n\ntype updateWalletProviderKeysForVerifiedCredentialsParams = {\n keysToUpdate: Record<string, string>;\n};\n\n/** @instrumented */\nexport const updateWalletProviderKeysForVerifiedCredentials = (\n { keysToUpdate }: updateWalletProviderKeysForVerifiedCredentialsParams,\n client: DynamicClient\n) => {\n const core = getCore(client);\n\n core.state.set({\n walletProviderKeyMap: {\n ...core.state.get().walletProviderKeyMap,\n ...keysToUpdate,\n },\n });\n};\n","import type { Chain } from '../../../chain';\nimport { CHAINS_INFO_MAP } from '../../constants';\n\n/**\n * Maps the chain name from the API to the SDK chain name\n * @not-instrumented\n */\nexport const getSdkChainFromApiChainName = (\n chainName: string\n): Chain | null => {\n const chains = Object.keys(CHAINS_INFO_MAP) as Chain[];\n\n const chain = chains.find(\n (chain) => CHAINS_INFO_MAP[chain].apiChainName === chainName\n );\n\n return chain || null;\n};\n","import { getCore } from '../../../../client/core/getCore';\nimport { getDefaultClient } from '../../../../client/defaultClient';\nimport { assertDefined } from '../../../../utils/assertDefined';\nimport { getSdkChainFromApiChainName } from '../getSdkChainFromApiChainName';\nimport type { NetworkData } from '../networkProvider/networkProvider.types';\n\n/**\n * Retrieves all available network configurations from project settings.\n *\n * This function returns detailed configuration data for all networks enabled\n * in your Dynamic project, including RPC URLs, native currencies, and metadata.\n *\n * If a `transformers.networkData` callback was provided in the client configuration,\n * it will be applied to each network before returning the data. This allows you to\n * customize network properties (such as RPC URLs) in a centralized way.\n *\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns An array of network configuration data for all enabled networks.\n * @instrumented\n */\nexport const getNetworksData = (client = getDefaultClient()): NetworkData[] => {\n const core = getCore(client);\n const { state, transformers } = core;\n\n const networkDataTransformer =\n transformers?.networkData ?? ((networkData) => networkData);\n\n const { projectSettings } = state.get();\n\n assertDefined(projectSettings, 'projectSettings not found');\n\n const networks = projectSettings.networks;\n\n if (!networks) {\n return [];\n }\n\n const networksData = networks\n .map((network) => {\n if (!network.chainName) return [];\n\n const chain = getSdkChainFromApiChainName(network.chainName);\n\n if (!network?.networks?.length || !chain) return [];\n\n return network.networks.map((networkConfiguration) => {\n const networkData: NetworkData = {\n blockExplorerUrls: networkConfiguration.blockExplorerUrls,\n chain,\n cluster: networkConfiguration.cluster,\n displayName:\n networkConfiguration.vanityName || networkConfiguration.name,\n genesisHash: networkConfiguration.genesisHash,\n iconUrl: networkConfiguration.iconUrls[0],\n nativeCurrency: {\n decimals: networkConfiguration.nativeCurrency.decimals,\n iconUrl: networkConfiguration.nativeCurrency.iconUrl,\n name: networkConfiguration.nativeCurrency.name,\n symbol: networkConfiguration.nativeCurrency.symbol,\n },\n networkId: networkConfiguration.networkId,\n rpcUrls: {\n http: [\n ...(networkConfiguration.privateCustomerRpcUrls ?? []),\n ...(networkConfiguration.rpcUrls ?? []),\n ],\n },\n testnet: networkConfiguration.isTestnet ?? false,\n };\n\n return networkDataTransformer(networkData);\n });\n })\n .flat();\n\n return networksData;\n};\n","import type { Chain } from '../../../../chain';\nimport type {\n NetworkProviderBuilder,\n NetworkProviderBuilderRegistry,\n} from '../networkProviderBuilderRegistry.types';\n\n/** @not-instrumented */\nexport const createNetworkProviderBuilderRegistry =\n (): NetworkProviderBuilderRegistry => {\n const registry = new Map<Chain, NetworkProviderBuilder>();\n\n return {\n get: () => registry,\n register: (networkProviderBuilder) => {\n registry.set(networkProviderBuilder.chain, networkProviderBuilder);\n },\n };\n };\n","import { createRuntimeServiceAccessKey } from '../../../../../services/runtimeServices';\nimport { createNetworkProviderBuilderRegistry } from '../createNetworkProviderBuilderRegistry';\n\nexport const getNetworkProviderBuilderRegistry = createRuntimeServiceAccessKey(\n 'networkProviderBuilderRegistry',\n createNetworkProviderBuilderRegistry\n);\n","import type { DynamicClient } from '../../../../client/types';\nimport { getNetworksData } from '../getNetworksData';\nimport type { NetworkProvider } from '../networkProvider';\nimport { getNetworkProviderBuilderRegistry } from '../networkProviderBuilderRegistry';\n\n/**\n * Retrieves all registered network providers for enabled chains.\n * @instrumented\n */\nexport const getNetworkProviders = (\n client: DynamicClient\n): NetworkProvider[] => {\n const networkProviderBuilderRegistry =\n getNetworkProviderBuilderRegistry(client);\n\n const registeredNetworkProviderBuilders = Array.from(\n networkProviderBuilderRegistry.get().values()\n );\n\n const networksData = getNetworksData(client);\n\n const networkProviders = registeredNetworkProviderBuilders.map(\n ({ builder, chain }) => {\n const networksDataForChain = networksData.filter(\n (networkData) => networkData.chain === chain\n );\n\n return networksDataForChain.map(builder);\n }\n );\n\n return networkProviders.flat();\n};\n","import type { DynamicClient } from '../../../../client/types';\nimport { NoNetworkProvidersError } from '../../../../errors/NoNetworkProvidersError';\nimport { assertDefined } from '../../../../utils/assertDefined';\nimport type { Chain } from '../../../chain';\nimport { getNetworkProviders } from '../getNetworkProviders';\nimport type { NetworkProvider } from '../networkProvider/networkProvider.types';\n\ntype GetNetworkProviderFromNetworkIdProps = {\n chain: Chain;\n networkId: string;\n};\n\n/** @instrumented */\nexport const getNetworkProviderFromNetworkId = (\n { networkId, chain }: GetNetworkProviderFromNetworkIdProps,\n client: DynamicClient\n): NetworkProvider => {\n const networkProviders = getNetworkProviders(client);\n\n if (networkProviders.length === 0) {\n throw new NoNetworkProvidersError();\n }\n\n const networkProvider = networkProviders.find(\n (networkProvider) =>\n networkProvider.networkId === networkId && networkProvider.chain === chain\n );\n\n assertDefined(\n networkProvider,\n `No network provider found for chain ${chain} with network id ${networkId}`\n );\n\n return networkProvider;\n};\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAMA,MAAa,kBAAqB,MAAS,SAAY;AACrD,KAAI,OAAO,GAAG,MAAM,KAAK,CAAE,QAAO;AAElC,KACE,OAAO,SAAS,YAChB,SAAS,QACT,OAAO,SAAS,YAChB,SAAS,KAET,QAAO,SAAS;AAGlB,KAAI,gBAAgB,OAAO,gBAAgB,KAAK;AAC9C,MAAI,KAAK,SAAS,KAAK,KAAM,QAAO;AAEpC,OAAK,MAAM,CAAC,KAAK,UAAU,KACzB,KAAI,CAAC,OAAO,GAAG,OAAO,KAAK,IAAI,IAAI,CAAC,CAAE,QAAO;AAG/C,SAAO;;AAGT,KAAI,gBAAgB,OAAO,gBAAgB,KAAK;AAC9C,MAAI,KAAK,SAAS,KAAK,KAAM,QAAO;AAEpC,OAAK,MAAM,SAAS,KAClB,KAAI,CAAC,KAAK,IAAI,MAAM,CAAE,QAAO;AAE/B,SAAO;;CAGT,MAAM,QAAQ,OAAO,KAAK,KAAK;AAE/B,KAAI,MAAM,WAAW,OAAO,KAAK,KAAK,CAAC,OAAQ,QAAO;AAEtD,MAAK,MAAM,QAAQ,MACjB,KACE,CAAC,OAAO,UAAU,eAAe,KAAK,MAAM,KAAe,IAC3D,CAAC,OAAO,GAAG,KAAK,OAAkB,KAAK,MAAiB,CAExD,QAAO;AAIX,KAAI,KAAK,gBAAgB,KAAK,YAAa,QAAO;AAElD,QAAO;;;;;;;;;;;;;;;ACvCT,MAAa,yBAET,YACA,cAED,aAAqC;CACpC,IAAI,YAAY,SAAS,WAAW,KAAK,CAAC;AAE1C,QAAO,WAAW,WAAW,UAAU;EACrC,MAAM,YAAY,SAAS,MAAM;AAEjC,MAAI,eAAe,WAAW,UAAU,CAAE;AAE1C,cAAY;AAEZ,WAAS,UAAU;GACnB;;;;;;;;;ACtBN,MAAa,mCAAmD;CAC9D,SAAS,OAAO,QAAQ,aAAa,QAAQ,IAAI;CACjD,YAAY,OAAO,QAAQ,aAAa,WAAW,IAAI;CACvD,SAAS,OAAO,KAAK,UAAU,aAAa,QAAQ,KAAK,MAAM;CAChE;;;;ACJD,IAAa,oBAAb,cAAuCA,oCAAU;CAC/C,YAAY,EAAE,KAAK,SAAkC;AACnD,QAAM;GACJ,OAAO;GACP,MAAM;GACN,SAAS;GACT,cAAc,CAAC,QAAQ,OAAO,MAAM;GACpC,MAAM;GACN,cAAc;GACf,CAAC;;;;;;;;;;;;ACVN,MAAa,wBAAwB,UAA2B;CAC9D,MAAM,OAAO,IAAI,KAAK,MAAM;AAE5B,QAAO,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,KAAK,aAAa,KAAK;;;;;ACN1D,MAAM,cAAc;;AAGpB,MAAa,oBAAoB,UAAmB;CAClD,MAAMC,OAAoC,EAAE,OAAO;AAEnD,QAAO,KAAK,UAAU,OAAO,GAAG,UAAU;AAGxC,MAAI,qBAAqB,MAAM,CAC7B,QAAO,GAAG,cAAc;AAG1B,SAAO;GACP;;;AAIJ,MAAa,oBAAuB,UAA2C;AAC7E,KAAI;AASF,SARe,KAAK,MAAM,QAAQ,GAAG,UAAU;AAC7C,OAAI,OAAO,UAAU,YAAY,MAAM,WAAW,YAAY,CAC5D,QAAO,IAAI,KAAK,MAAM,MAAM,EAAmB,CAAC;AAGlD,UAAO;IACP;UAIK,OAAO;AACd,SAAO;;;;;;;;;;ACpBX,MAAa,iBAAiB,EAC5B,SAAS,IACT,qBACqC;CACrC,MAAM,kBAAkB,QAAiB,SAAS,GAAG,OAAO,GAAG,QAAQ;AAEvE,QAAO;EACL,SAAS,OAAO,qBAAqB;GACnC,MAAM,UAAU,MAAM,eAAe,QACnC,eAAe,iBAAiB,IAAI,CACrC;GAED,MAAM,aAAa,UAAU,iBAAiB,QAAQ,GAAG;;;;;AAMzD,OAAI,eAAe,MAAM;IACvB,MAAM,SAAS,iBAAiB,OAAO,UAAU,WAAW,MAAM;AAElE,QAAI,OAAO,QACT,QAAO,OAAO;;;;;;AASlB,SAAM,eAAe,WAAW,eAAe,iBAAiB,IAAI,CAAC;AAErE,UAAO;;EAGT,YAAY,OAAO,qBAAqB;AACtC,SAAM,eAAe,WAAW,eAAe,iBAAiB,IAAI,CAAC;;EAGvE,SAAS,OAAO,kBAAkB,UAAU;GAC1C,MAAM,SAAS,iBAAiB,OAAO,UAAU,MAAM;AAEvD,OAAI,CAAC,OAAO,QACV,OAAM,IAAI,kBAAkB;IAC1B,KAAK,iBAAiB;IACtB,OAAO,KAAK,UAAU,MAAM;IAC7B,CAAC;GAGJ,MAAM,OAAO,iBAAiB,OAAO,KAAK;AAE1C,SAAM,eAAe,QAAQ,eAAe,iBAAiB,IAAI,EAAE,KAAK;;EAE3E;;;;;;AC/DH,MAAa,0BAA6B,WAGf;AACzB,QAAO;;;;;;ACJT,MAAa,sBAAsB,OACjC,WACyB;CACzB,MAAM,OAAOC,kCAAQ,OAAO;CAE5B,MAAM,YAAY,MAAM,KAAK,SAAS,YAAY,UAAU;AAE5D,MAAK,MAAM,IAAI,EACb,aAAa,WACd,CAAC;AAEF,QAAO,EAAE,WAAW;;;;;;ACZtB,MAAa,kBACX,OAAO,WAAW,cAAc,SAASC;;;;;;;;ACA3C,MAAa,8BAA8B,OAAO,WAAW;;;;ACL7D,MAAa,6CACX;AAEF,MAAa,sCAAsC;AAEnD,MAAa,qCAAqC;AAElD,MAAa,oCAAoC;;;;;ACJjD,MAAa,8BAAqD;CAChE,IAAIC;CACJ,IAAIC;AAOJ,QAAO;EACL,SANc,IAAI,SAAY,UAAU,YAAY;AACpD,aAAU;AACV,YAAS;IACT;EAIA,SAAS,WAAqB,SAAS,OAAO;EAC9C,UAAU,UAAa,UAAU,MAAM;EACxC;;;;;ACdH,IAAa,mBAAb,cAAsCC,oCAAU;CAC9C,cAAc;AACZ,QAAM;GACJ,OAAO;GACP,MAAM;GACN,SAAS;GACT,MAAM;GACN,cAAc;GACf,CAAC;;;;;;;;;ACLN,MAAa,iCAAiCC,SAAE,OAAO;CACrD,MAAMA,SAAE,SAASA,SAAE,SAAS,CAAC;CAC7B,OAAOA,SAAE,QAAQ;CAClB,CAAC;;;;;;;;;;;;;;;;;ACeF,MAAa,2BAA2B,EACtC,kBACsD;AAGtD,KAAI,uBAAuB,IAAI,OAAO,qBAAqB,YACzD,QAAO;EACL,WAAW;EACX,UAAU;EACV,YAAY;EACb;CAIH,MAAM,UAAU,IAAI,iBAAiB,YAAY;CACjD,MAAM,eAAe,IAAIC,uBAAc;CAGvC,MAAM,iBAAiB,iBAA+B;EACpD,MAAM,SAAS,+BAA+B,UAAU,aAAa,KAAK;AAE1E,MAAI,CAAC,OAAO,QAEV;EAGF,MAAM,EAAE,MAAM,UAAU,OAAO;AAC/B,eAAa,KAAK,OAAO,KAAK;;AAGhC,SAAQ,iBAAiB,WAAW,cAAc;AAElD,QAAO;EACL,MAAM,OAAO,aAAa;AACxB,gBAAa,IAAI,OAAO,SAAS;;EAGnC,KAAK,OAAO,aAAa;AACvB,gBAAa,GAAG,OAAO,SAAS;;EAGlC,OAAO,EAAE,MAAM,YAAY;AACzB,WAAQ,YAAY;IAAE;IAAM;IAAO,CAAC;;EAEvC;;;;;;;;ACpDH,MAAMC,aAAuC;CAC3C,OAAO;CACP,OAAO;CACP,MAAM;CACN,MAAM;CACP;AAGD,MAAM,iBAAiB;;;;;;AAOvB,MAAa,gBAAgB,UAA+B,EAAE,KAAa;CACzE,MAAMC,eAAmC,IAAIC,4BAAc;CAG3D,MAAMC,WAAqB,QAAQ,SAAS;CAG5C,MAAM,aAAa,UAA6B;AAC9C,SAAO,WAAW,UAAU,WAAW;;CAIzC,MAAM,iBAAiB,OAAiB,YAA4B;AAGlE,SAAO,qBAFW,IAAI,MAAM,EAAC,aAAa,CAErB,IAAI,MAAM,aAAa,CAAC,IAAI;;CAInD,MAAM,OACJ,OACA,eACA,SACA,GAAG,SACA;AACH,eAAa,KAAK,OAAO,OAAO,SAAS,GAAG,KAAK;AAEjD,MAAI,CAAC,UAAU,MAAM,CAAE;AAEvB,gBAAc,cAAc,OAAO,QAAQ,EAAE,GAAG,KAAK;;AAGvD,QAAO;EACL,QAAQ,SAAS,GAAG,SAClB,IAAI,SAAS,eAAe,OAAO,SAAS,GAAG,KAAK;EAEtD,QAAQ,SAAS,GAAG,SAClB,IAAI,SAAS,eAAe,OAAO,SAAS,GAAG,KAAK;EAEtD,OAAO,SAAS,GAAG,SACjB,IAAI,QAAQ,eAAe,MAAM,SAAS,GAAG,KAAK;EAEpD,KAAK,aAAa,IAAI,KAAK,aAAa;EAExC,IAAI,aAAa,GAAG,KAAK,aAAa;EACtC,OAAO,SAAS,GAAG,SACjB,IAAI,QAAQ,eAAe,MAAM,SAAS,GAAG,KAAK;EACrD;;;;;;;;;ACzEH,MAAa,eAAe,aAC1B,CAAC,GAAIC,oBAAkB,aAAaA,WAAS,IAAI,WAAWA,SAAO,CAAE,CAClE,KAAK,MAAM,EAAE,SAAS,GAAG,CAAC,SAAS,GAAG,IAAI,CAAC,CAC3C,KAAK,GAAG;;;;;;;;ACHb,MAAa,wBAAwB,iBAA8B;CACjE,MAAM,oBAAoB,IAAI,WAAW,aAAa;CACtD,MAAM,MAAM,kBAAkB;CAG9B,MAAM,kBAAkB,kBAAkB,MAAM,GAAI,IAAI,QAAS,EAAE;AAGnE,iBAAgB,KAAK,IAAO,kBAAkB,MAAM,KAAK;AACzD,QAAO,gBAAgB;;;;;ACXzB,IAAa,mBAAb,cAAsCC,oCAAU;CAC9C,YAAY,SAAiB;AAC3B,QAAM;GACJ,OAAO;GACP,MAAM;GACN,SAAS;GACT,MAAM;GACN,cAAc,QAAQ,QAAQ;GAC/B,CAAC;;;;;;ACVN,MAAa,aAAa;;;;;ACG1B,MAAa,uBACX,IACA,YAEA,IAAI,SAAS,SAAS,WAAW;CAG/B,MAAM,UAFc,GAAG,YAAY,YAAY,YAAY,CACjC,YAAY,WAAW,CAC3B,OAAO,QAAQ;AAErC,SAAQ,kBAAkB,SAAS;AACnC,SAAQ,gBAAgB,OAAO,QAAQ,MAAe;EACtD;;;;;ACVJ,MAAa,oBACX,IACA,YAEA,IAAI,SAAS,SAAS,WAAW;CAG/B,MAAM,UAFc,GAAG,YAAY,YAAY,WAAW,CAChC,YAAY,WAAW,CAC3B,IAAI,QAAQ;AAElC,SAAQ,kBAAkB,QAAQ,QAAQ,OAAgC;AAC1E,SAAQ,gBAAgB,OAAO,QAAQ,MAAe;EACtD;;;;;ACZJ,MAAa,gBAAgB,WAC3B,IAAI,SAAS,SAAS,WAAW;CAC/B,MAAM,UAAU,UAAU,KAAK,QAAQ,EAAE;AAEzC,SAAQ,wBAAwB;EAC9B,MAAM,KAAK,QAAQ;AAEnB,MAAI,CAAC,GAAG,iBAAiB,SAAS,WAAW,CAC3C,IAAG,kBAAkB,YAAY,EAAE,SAAS,WAAW,CAAC;;AAI5D,SAAQ,kBAAkB,QAAQ,QAAQ,OAAO;AACjD,SAAQ,gBAAgB,OAAO,QAAQ,MAAe;EACtD;;;;;ACbJ,MAAa,oBACX,IACA,UAEA,IAAI,SAAS,SAAS,WAAW;CAG/B,MAAM,UAFc,GAAG,YAAY,YAAY,YAAY,CACjC,YAAY,WAAW,CAC3B,IAAI,MAAM;AAEhC,SAAQ,kBAAkB,SAAS;AACnC,SAAQ,gBAAgB,OAAO,QAAQ,MAAe;EACtD;;;;ACFJ,MAAM,kBAAkB;;AAGxB,MAAa,kCACX,WACoB;CACpB,MAAM,SAAS,QAAQ,UAAU;CAEjC,MAAM,cAAc,OAAO,YAAqC;EAC9D,MAAM,UAAU,MAAM,OAAO,OAAO,YAClC;GAAE,MAAM;GAAS,YAAY;GAAS,EACtC,OACA,CAAC,OAAO,CACT;EAQD,MAAM,eAAe,YADO,qBALP,MAAM,OAAO,OAAO,UACvC,OACA,QAAQ,UACT,CAE6D,CACT;EAErD,MAAM,KAAK,MAAM,aAAa,OAAO;AACrC,QAAM,iBAAiB,IAAI;GACzB;GACA,YAAY,QAAQ;GACpB;GACD,CAAC;AACF,KAAG,OAAO;AAEV,SAAO;;CAGT,MAAM,YAAY,OAChB,SACA,QACoB;EACpB,MAAM,aAAa,MAAM,OAAO,OAAO,UACrC,OACA,KACA;GAAE,MAAM;GAAS,YAAY;GAAS,EACtC,OACA,CAAC,OAAO,CACT;EAED,MAAM,YAAY;GAAE,KAAK,IAAI;GAAK,KAAK,IAAI;GAAK,GAAG,IAAI;GAAG,GAAG,IAAI;GAAG;EAEpE,MAAM,kBAAkB,MAAM,OAAO,OAAO,UAC1C,OACA,WACA;GAAE,MAAM;GAAS,YAAY;GAAS,EACtC,MACA,CAAC,SAAS,CACX;EAID,MAAM,eAAe,YADO,qBADP,MAAM,OAAO,OAAO,UAAU,OAAO,gBAAgB,CACZ,CACT;EAErD,MAAM,KAAK,MAAM,aAAa,OAAO;AACrC,QAAM,iBAAiB,IAAI;GACzB;GACA;GACA;GACD,CAAC;AACF,KAAG,OAAO;AAEV,SAAO;;CAGT,MAAM,eAAe,OAAO,YAA4C;EACtE,MAAM,KAAK,MAAM,aAAa,OAAO;EACrC,MAAM,QAAQ,MAAM,iBAAiB,IAAI,QAAQ;AACjD,KAAG,OAAO;AAEV,SAAO,OAAO,gBAAgB;;CAGhC,MAAM,OAAO,OAAO,SAAiB,YAAqC;EACxE,MAAM,KAAK,MAAM,aAAa,OAAO;EACrC,MAAM,QAAQ,MAAM,iBAAiB,IAAI,QAAQ;AACjD,KAAG,OAAO;AAEV,MAAI,CAAC,MACH,OAAM,IAAI,iBAAiB,QAAQ;EAIrC,MAAM,OADU,IAAI,aAAa,CACZ,OAAO,QAAQ;AAQpC,SAAO,YANW,MAAM,OAAO,OAAO,KACpC;GAAE,MAAM,EAAE,MAAM,WAAW;GAAE,MAAM;GAAS,EAC5C,MAAM,YACN,KACD,CAE4B;;CAG/B,MAAM,SAAS,OAAO,YAAsC;EAC1D,MAAM,KAAK,MAAM,aAAa,OAAO;EACrC,MAAM,QAAQ,MAAM,iBAAiB,IAAI,QAAQ;AACjD,KAAG,OAAO;AAEV,SAAO,UAAU;;CAGnB,MAAM,YAAY,OAAO,YAAmC;EAC1D,MAAM,KAAK,MAAM,aAAa,OAAO;AACrC,QAAM,oBAAoB,IAAI,QAAQ;AACtC,KAAG,OAAO;;AAGZ,QAAO;EACL;EACA;EACA;EACA;EACA;EACA;EACD;;;;;AChIH,IAAa,8BAAb,cAAiDC,oCAAU;CACzD,YAAY,EAAE,WAAyC;AACrD,QAAM;GACJ,OAAO;GACP,MAAM;GACN,SAAS;GACT,cAAc,CAAC,YAAY,UAAU;GACrC,MAAM;GACN,cACE;GACH,CAAC;;;;;;ACdN,IAAa,4BAAb,cAA+CC,oCAAU;CACvD,cAAc;AACZ,QAAM;GACJ,OAAO;GACP,MAAM;GACN,SAAS;GACT,MAAM;GACN,cACE;GACH,CAAC;;;;;;ACKN,MAAMC,+BAAwE;CAC5E,QAAQ;CACR,SAAS;CACT,WAAW;CACX,YAAY;CACZ,cAAc;CACd,QAAQ;CACR,aAAa;CACb,WAAW;CACZ;AAED,MAAM,gBAAgB,cACpB,6BAA6B,cAAc;;;;;;;;;;AAW7C,MAAa,8BAA+C;AAC1D,KAAI,uBAAuB,CACzB,QAAO;EACL,eAAe,QAAQ,SAAS;EAChC,kBAAkB;EAClB,0BAA0B;EAC1B,WAAW;EACX,UAAU;EACV,eAAe,QAAQ,SAAS;EAChC,iBAAiB,QAAQ,SAAS;EAClC,mBAAmB;EACpB;CAGH,MAAM,eAAe,IAAIC,uBAAgC;CACzD,MAAM,2BAAW,IAAI,KAA8B;CAEnD,MAAM,6BAAa,IAAI,SAA4E;CAEnG,IAAIC;CACJ,IAAIC,kBAA2C;CAC/C,IAAI,eAAe;CAEnB,MAAM,sBAAsB,UAAmC;AAC7D,oBAAkB;AAClB,eAAa,KAAK,yBAAyB,MAAM;;CAGnD,MAAM,sBAAsB,gBAAyC;EACnE,MAAM,WAAW,SAAS,IAAI,YAAY;AAE1C,MAAI,SACF,QAAO;AAGT,MAAI,CAAC,WACH,OAAM,IAAI,2BAA2B;EAGvC,MAAM,UAAU,WAAW,SAAS,IAAI,YAAY;AACpD,WAAS,IAAI,aAAa,QAAQ;AAElC,SAAO;;CAGT,MAAMC,UAAsC,OAAO,EAAE,aAAa;AAChE,MAAI,aACF;AAGF,iBAAe;AAEf,MAAI;GACF,MAAM,OAAOC,kCAAQ,OAAO;AAE5B,OAAI,YAAY;AACd,eAAW,OAAO;AAClB,aAAS,OAAO;;GAKlB,MAAM,EACJ,cAAc,kBACd,cACA,uBACE,MAAM,OAAO;AAEjB,gBAAa,IAAI,iBAAiB;IAIhC,eAAe,cAAc,aAAa;AAGxC,KAFkBC,0CAAgB,EAAE,EAAE,OAAO,CAG1C,qBAAqB,EAAE,eAAe,KAAK,eAAe,CAAC,CAC3D,MAAM,aAAa;AAClB,eAAS,MAAM,SAAS,MAAM;OAC9B,CACD,OAAO,QAAiB;AAEvB,eADgB,eAAe,QAAQ,IAAI,UAAU,OAAO,IAAI,EAC9C,KAAK;OACvB;;IAEN,aAAa;IACb,SAAS;KAAE;KAAc;KAAoB;IAC9C,CAAC;AAEF,cAAW,WAAW,IAAI,gBAAgB;AACxC,uBAAmB,aAAa,YAAY,QAAQ,CAAC;KACrD;AAEF,cAAW,SAAS;YACZ;AACR,kBAAe;;;CAInB,MAAMC,mBAAkD;AACtD,MAAI,CAAC,WACH;AAGF,OAAK,MAAM,WAAW,SAAS,QAAQ,CACrC,SAAQ,QAAQ,CAAC,YAAY,GAAG;AAGlC,WAAS,OAAO;AAChB,aAAW,OAAO;AAClB,eAAa;;CAGf,MAAMC,YAA0C,OAAU,EACxD,eACA,eAII;EACJ,MAAM,UAAU,mBAAmB,cAAc,QAAQ;EAEzD,MAAMC,WAA4C,YAAY;GAC5D,MAAM,SAAS,cAAc,OAAO,UAAU,QAAQ,KAAK;AAE3D,OAAI,CAAC,OAAO,QACV;AAGF,YAAS,EAAE,MAAM,OAAO,MAAM,CAAC;;AAGjC,aAAW,IAAI,UAAU,QAAQ;AAEjC,QAAM,QAAQ,UAAU,QAAQ;;CAGlC,MAAMC,eAAkD,EACtD,eACA,eAII;EACJ,MAAM,UAAU,SAAS,IAAI,cAAc,QAAQ;AAEnD,MAAI,CAAC,QACH;EAGF,MAAM,UAAU,WAAW,IAAI,SAAS;AAExC,MAAI,SAAS;AACX,WAAQ,YAAY,QAAQ;AAC5B,cAAW,OAAO,SAAS;;;CAI/B,MAAMC,UAAsC,OAAU,EACpD,eACA,WAII;EACJ,MAAM,SAAS,cAAc,OAAO,UAAU,KAAK;AAEnD,MAAI,CAAC,OAAO,QACV,OAAM,IAAI,4BAA4B,EAAE,SAAS,cAAc,SAAS,CAAC;AAI3E,QADgB,mBAAmB,cAAc,QAAQ,CAC3C,QAAQ,WAAW,OAAO,KAAK;;AAG/C,QAAO;EACL;EACA;EACA,0BAA0B;EAC1B,MAAM,OAAO,aAAa;AACxB,gBAAa,IAAI,OAAO,SAAS;;EAEnC,KAAK,OAAO,aAAa;AACvB,gBAAa,GAAG,OAAO,SAAS;;EAElC;EACA;EACA;EACD;;;;;ACjOH,IAAa,0BAAb,cAA6CC,oCAAU;CACrD,cAAc;AACZ,QAAM;GACJ,OAAO;GACP,MAAM;GACN,SAAS;GACT,MAAM;GACN,cAAc;GACf,CAAC;;;;;;ACRN,IAAa,wCAAb,cAA2DC,oCAAU;CACnE,YAAY,EAAE,SAA6C;AACzD,QAAM;GACJ;GACA,MAAM;GACN,SAAS;GACT,MAAM;GACN,cAAc;GACf,CAAC;;;;;;;ACNN,MAAa,qBAAqB,SAASC,4CAAkB,KAAK;CAChE,MAAM,kBAAkB,OAAO;AAE/B,yCAAc,iBAAiB,qCAAqC;AAEpE,QAAO,gBAAgB,SAAS,UAAU,WAAW;;;;;;;;;ACAvD,MAAa,uBACX,WACuB;CACvB,MAAM,OAAOC,kCAAQ,OAAO;CAE5B,MAAM,eAAe,KAAK,MAAM,KAAK,CAAC;AAEtC,KAAI,kBAAkB,OAAO,CAC3B,yCAAc,cAAc,4BAA4B;AAG1D,MAAK,MAAM,IAAI,EACb,cAAc,MACf,CAAC;AAEF,QAAO,gBAAgB;;;;;;;;;;;;ACVzB,MAAa,mBACX,EAAE,gBACF,SAASC,4CAAkB,KACxB;AAGH,CAFaC,kCAAQ,OAAO,CAEvB,MAAM,IAAI,EACb,cACD,CAAC;;;;;;;;;;;;;;;;ACJJ,MAAa,gBACX,EAAE,gBACF,SAASC,4CAAkB,KACxB;AAGH,QAFaC,kCAAQ,OAAO,CAEhB,WAAW,IAAI,aAAa;;;;;;ACA1C,MAAa,cAAc,OACzB,EAAE,eAAe,WAAWC,wCAAa,QACzC,WACG;CACH,MAAM,OAAOC,kCAAQ,OAAO;CAC5B,MAAM,YAAYC,0CAAgB,EAAE,EAAE,OAAO;CAE7C,MAAM,iBAAiBC,iFACrB,EAAE,eAAe,EACjB,OACD;AAED,KAAI;EACF,MAAM,aAAaC,2EAA6B;GAC9C,OAAO,eAAe;GACtB,aAAa,eAAe,SAAS;GACtC,CAAC;EAEF,MAAMC,iBAAiC;GACrC,SAAS,cAAc;GACvB;GAEA,OAAO,eAAe;GACtB,UAAU,eAAe;GACzB;GACD;AAED,QAAM,UAAU,YAAY;GAC1B;GACA,eAAe,KAAK;GACrB,CAAC;UACK,OAAO;AACd,OAAK,OAAO,MAAM,wBAAwB,EAAE,OAAO,CAAC;;;;;;;;;;;;AC1CxD,MAAa,+BACX,EAAE,oCACF,WACS;AACT,KAAI,iCAAiC,WAAW,EAC9C;CAGF,MAAM,OAAOC,kCAAQ,OAAO;CAE5B,MAAM,sCACJ,iCAAiC,KAAK,EAAE,SAAS,GAAG;CAEtD,MAAMC,mCAA8D,KAAK,MACtE,KAAK,CACL,yBAAyB,QACvB,4BACC,CAAC,oCAAoC,SACnC,wBAAwB,GACzB,CACJ;AAEH,MAAK,MAAM,IAAI,EACb,0BAA0B,CACxB,GAAG,kCACH,GAAG,iCACJ,EACF,CAAC;;;;;;;;;ACxBJ,MAAa,sBAAsB,OAAO,EACxC,QACA,gBACA,SACA,KACA,SACA,OACA,UACA,WACA,WACA,gBAC+B;CAM/B,MAAM,SAAS,CADA,GAAG,OAAO,kCAAkC,eAAe,YAClD,QAAQ,CAAC,KAAK,KAAK;CAI3C,MAAM,yBAAyB,YAAY,SAAS;CACpD,MAAM,sBAAsB,GAAG,CAAC,QAAQ,UAAU,CAAC,KACjD,uBACD,CAAC;CAEF,MAAMC,eAAyB,EAAE;AACjC,cAAa,KAAK,QAAQ,MAAM;AAChC,cAAa,KAAK,aAAa;AAC/B,KAAI,QACF,cAAa,KAAK,aAAa,UAAU;AAG3C,cAAa,KAAK,UAAU,QAAQ;AAEpC,KAAI,SACF,cAAa,KAAK,cAAc,WAAW;AAG7C,KAAI,UACF,cAAa,KAAK,eAAe,YAAY;AAG/C,KAAI,WAAW,OACb,cAAa,KACX,aAAa,UAAU,KAAK,aAAa,SAAS,SAAS,CAAC,MAAM,GACnE;AAKH,QAAO,CAAC,qBAFO,aAAa,KAAK,KAAK,CAEF,CAAC,KAAK,KAAK;;;;;;AChEjD,MAAa,gCAAgC,WAA0B;CAGrE,MAAM,UAFOC,kCAAQ,OAAO,CAGrB,UAAU,QAAQ,OAAO,iBAAiB,QAAQ;AAEzD,QAAO,cAAc,QAAQ,6KAA6K,QAAQ;;;;;;;;;ACGpN,MAAa,iCACX,EAAE,2BACF,WACG;CACH,MAAM,OAAOC,kCAAQ,OAAO;CAE5B,MAAM,gBAAgB,KAAK,MAAM,KAAK;CAEtC,MAAM,EAAE,6BAA6B,KAAK,MAAM,KAAK;CAErD,MAAM,mCAAmC,yBAAyB,QAC/D,YAAY,QAAQ,OAAO,wBAAwB,GACrD;AAED,MAAK,MAAM,IAAI,EACb,0BAA0B,kCAC3B,CAAC;;;;;AAMF,uFAAwC,EAAE,eAAe,EAAE,OAAO;;;;;;;;;AC/BpE,MAAa,WAAW,UACtB,iBAAiB;;;;;;;;ACCnB,MAAa,mBACX,OACA,SACiC;AACjC,KAAI,CAAC,QAAQ,MAAM,CAAE,QAAO;AAE5B,QAAO,UAAU,SAAS,MAAM,SAAS;;;;;;;;;;;;AC0B3C,MAAa,kCAAkC,OAC7C,EACE,eACA,eACA,oBACA,WACA,OACA,aAAa,OACb,mBACA,oBACA,WACA,mBAEF,WAC4B;CAC5B,MAAM,OAAOC,kCAAQ,OAAO;CAC5B,MAAM,YAAYC,0CAAgB,EAAE,EAAE,OAAO;CAE7C,MAAM,aAAaC,2EAA6B;EAC9C;EACA,aAAa;EACd,CAAC;CAEF,IAAI;AAEJ,KAAI,CAAC,OAAO,KAEV,qBAAoB,UAAU,cAAc,KAAK,UAAU;UAClD,WAET,qBAAoB,UAAU,eAAe,KAAK,UAAU;UACnD,OAAO,QAAQ,gBAKxB,qBAAoB,UAAU,cAAc,KAAK,UAAU;KAG3D,qBAAoB,UAAU,WAAW,KAAK,UAAU;AAG1D,KAAI;AACF,SAAO,MAAM,kBAAkB;GAC7B,eAAe,KAAK;GACpB,eAAe;IAEb,2BAA2B,oBAAoB,KAAK,aAAa;KAC/D,SAAS,QAAQ;KACjB,WAAW,QAAQ;KACnB,MAAM,QAAQ;KACf,EAAE;IACH,cAAc,oBAAoB,OAAO;IAElC;IACP;IACA,SAAS;IACT,qBAAqB;IACrB;IACA,eAAe;IACf;IACA,gBAAgB;IACjB;GACF,CAAC;UACK,OAAO;AACd,OAAK,OAAO,MAAM,gDAAgD,MAAM;AAExE,MACE,gBAAgB,OAAO,0BAA0B,IACjD,gBAAgB,OAAO,8BAA8B,CAErD,OAAM,IAAI,sCAAsC,EAC9C,OAAO,OACR,CAAC;AAGJ,QAAM;;;;;;;AC1GV,MAAa,kDACX,EAAE,gBACF,WACG;CACH,MAAM,OAAOC,kCAAQ,OAAO;AAE5B,MAAK,MAAM,IAAI,EACb,sBAAsB;EACpB,GAAG,KAAK,MAAM,KAAK,CAAC;EACpB,GAAG;EACJ,EACF,CAAC;;;;;;;;;ACZJ,MAAa,+BACX,cACiB;AAOjB,QANe,OAAO,KAAKC,0CAAgB,CAEtB,MAClB,UAAUA,0CAAgB,OAAO,iBAAiB,UACpD,IAEe;;;;;;;;;;;;;;;;;;;ACIlB,MAAa,mBAAmB,SAASC,4CAAkB,KAAoB;CAE7E,MAAM,EAAE,OAAO,iBADFC,kCAAQ,OAAO;CAG5B,MAAM,yBACJ,cAAc,iBAAiB,gBAAgB;CAEjD,MAAM,EAAE,oBAAoB,MAAM,KAAK;AAEvC,yCAAc,iBAAiB,4BAA4B;CAE3D,MAAM,WAAW,gBAAgB;AAEjC,KAAI,CAAC,SACH,QAAO,EAAE;AAyCX,QAtCqB,SAClB,KAAK,YAAY;AAChB,MAAI,CAAC,QAAQ,UAAW,QAAO,EAAE;EAEjC,MAAM,QAAQ,4BAA4B,QAAQ,UAAU;AAE5D,MAAI,CAAC,SAAS,UAAU,UAAU,CAAC,MAAO,QAAO,EAAE;AAEnD,SAAO,QAAQ,SAAS,KAAK,yBAAyB;AAyBpD,UAAO,uBAxB0B;IAC/B,mBAAmB,qBAAqB;IACxC;IACA,SAAS,qBAAqB;IAC9B,aACE,qBAAqB,cAAc,qBAAqB;IAC1D,aAAa,qBAAqB;IAClC,SAAS,qBAAqB,SAAS;IACvC,gBAAgB;KACd,UAAU,qBAAqB,eAAe;KAC9C,SAAS,qBAAqB,eAAe;KAC7C,MAAM,qBAAqB,eAAe;KAC1C,QAAQ,qBAAqB,eAAe;KAC7C;IACD,WAAW,qBAAqB;IAChC,SAAS,EACP,MAAM,CACJ,GAAI,qBAAqB,0BAA0B,EAAE,EACrD,GAAI,qBAAqB,WAAW,EAAE,CACvC,EACF;IACD,SAAS,qBAAqB,aAAa;IAC5C,CAEyC;IAC1C;GACF,CACD,MAAM;;;;;;AClEX,MAAa,6CAC2B;CACpC,MAAM,2BAAW,IAAI,KAAoC;AAEzD,QAAO;EACL,WAAW;EACX,WAAW,2BAA2B;AACpC,YAAS,IAAI,uBAAuB,OAAO,uBAAuB;;EAErE;;;;;ACbL,MAAa,oCAAoCC,4EAC/C,kCACA,qCACD;;;;;;;;ACGD,MAAa,uBACX,WACsB;CACtB,MAAM,iCACJ,kCAAkC,OAAO;CAE3C,MAAM,oCAAoC,MAAM,KAC9C,+BAA+B,KAAK,CAAC,QAAQ,CAC9C;CAED,MAAM,eAAe,gBAAgB,OAAO;AAY5C,QAVyB,kCAAkC,KACxD,EAAE,SAAS,YAAY;AAKtB,SAJ6B,aAAa,QACvC,gBAAgB,YAAY,UAAU,MACxC,CAE2B,IAAI,QAAQ;GAE3C,CAEuB,MAAM;;;;;;AClBhC,MAAa,mCACX,EAAE,WAAW,SACb,WACoB;CACpB,MAAM,mBAAmB,oBAAoB,OAAO;AAEpD,KAAI,iBAAiB,WAAW,EAC9B,OAAM,IAAI,yBAAyB;CAGrC,MAAM,kBAAkB,iBAAiB,MACtC,sBACCC,kBAAgB,cAAc,aAAaA,kBAAgB,UAAU,MACxE;AAED,yCACE,iBACA,uCAAuC,MAAM,mBAAmB,YACjE;AAED,QAAO"}
@@ -1,5 +1,5 @@
1
- import { F as getCore, P as BaseError, T as assertDefined, c as CHAINS_INFO_MAP, j as getDefaultClient, u as createApiClient } from "./InvalidParamError-ByAOflE2.esm.js";
2
- import { _ as createRuntimeServiceAccessKey, d as checkAndRaiseWalletAccountsChangedEvent, m as getWalletProviderFromWalletAccount, x as normalizeWalletNameWithChain } from "./getVerifiedCredentialForWalletAccount-DbfbxLr9.esm.js";
1
+ import { F as getCore, P as BaseError, T as assertDefined, c as CHAINS_INFO_MAP, j as getDefaultClient, u as createApiClient } from "./InvalidParamError-CnPeSjBW.esm.js";
2
+ import { _ as createRuntimeServiceAccessKey, d as checkAndRaiseWalletAccountsChangedEvent, m as getWalletProviderFromWalletAccount, x as normalizeWalletNameWithChain } from "./getVerifiedCredentialForWalletAccount-B58hODrW.esm.js";
3
3
  import { AuthModeEnum } from "@dynamic-labs/sdk-api-core";
4
4
  import * as z from "zod/mini";
5
5
  import { Buffer as Buffer$1 } from "buffer";
@@ -409,22 +409,19 @@ const DEFAULT_DB_NAME = "dynamic_keychain";
409
409
  /** @instrumented */
410
410
  const createIndexedDBKeychainService = (params) => {
411
411
  const dbName = params?.dbName ?? DEFAULT_DB_NAME;
412
- let dbPromise;
413
- const getDb = () => {
414
- dbPromise ??= openDatabase(dbName);
415
- return dbPromise;
416
- };
417
412
  const generateKey = async (keyName) => {
418
413
  const keyPair = await crypto.subtle.generateKey({
419
414
  name: "ECDSA",
420
415
  namedCurve: "P-256"
421
416
  }, false, ["sign"]);
422
417
  const publicKeyHex = bufferToHex(compressRawPublicKey(await crypto.subtle.exportKey("raw", keyPair.publicKey)));
423
- await setIndexedDBItem(await getDb(), {
418
+ const db = await openDatabase(dbName);
419
+ await setIndexedDBItem(db, {
424
420
  keyName,
425
421
  privateKey: keyPair.privateKey,
426
422
  publicKeyHex
427
423
  });
424
+ db.close();
428
425
  return publicKeyHex;
429
426
  };
430
427
  const importKey = async (keyName, jwk) => {
@@ -443,18 +440,25 @@ const createIndexedDBKeychainService = (params) => {
443
440
  namedCurve: "P-256"
444
441
  }, true, ["verify"]);
445
442
  const publicKeyHex = bufferToHex(compressRawPublicKey(await crypto.subtle.exportKey("raw", publicCryptoKey)));
446
- await setIndexedDBItem(await getDb(), {
443
+ const db = await openDatabase(dbName);
444
+ await setIndexedDBItem(db, {
447
445
  keyName,
448
446
  privateKey,
449
447
  publicKeyHex
450
448
  });
449
+ db.close();
451
450
  return publicKeyHex;
452
451
  };
453
452
  const getPublicKey = async (keyName) => {
454
- return (await getIndexedDBItem(await getDb(), keyName))?.publicKeyHex ?? null;
453
+ const db = await openDatabase(dbName);
454
+ const entry = await getIndexedDBItem(db, keyName);
455
+ db.close();
456
+ return entry?.publicKeyHex ?? null;
455
457
  };
456
458
  const sign = async (keyName, message) => {
457
- const entry = await getIndexedDBItem(await getDb(), keyName);
459
+ const db = await openDatabase(dbName);
460
+ const entry = await getIndexedDBItem(db, keyName);
461
+ db.close();
458
462
  if (!entry) throw new KeyNotFoundError(keyName);
459
463
  const data = new TextEncoder().encode(message);
460
464
  return bufferToHex(await crypto.subtle.sign({
@@ -463,10 +467,15 @@ const createIndexedDBKeychainService = (params) => {
463
467
  }, entry.privateKey, data));
464
468
  };
465
469
  const hasKey = async (keyName) => {
466
- return await getIndexedDBItem(await getDb(), keyName) !== void 0;
470
+ const db = await openDatabase(dbName);
471
+ const entry = await getIndexedDBItem(db, keyName);
472
+ db.close();
473
+ return entry !== void 0;
467
474
  };
468
475
  const removeKey = async (keyName) => {
469
- await deleteIndexedDBItem(await getDb(), keyName);
476
+ const db = await openDatabase(dbName);
477
+ await deleteIndexedDBItem(db, keyName);
478
+ db.close();
470
479
  };
471
480
  return {
472
481
  generateKey,
@@ -992,4 +1001,4 @@ const getNetworkProviderFromNetworkId = ({ networkId, chain }, client) => {
992
1001
 
993
1002
  //#endregion
994
1003
  export { getBuffer as A, CannotTrackError as C, INITIALIZE_STORAGE_SYNC_TRACKER_KEY as D, GENERATE_SESSION_KEYS_TRACKER_KEY as E, createLocalStorageAdapter as F, subscribeWithSelector as I, isEqualShallow as L, createStorageKeySchema as M, createStorage as N, REFRESH_USER_STATE_FROM_COOKIE_TRACKER_KEY as O, InvalidStorageSet as P, CrossTabBroadcastMessageSchema as S, FETCH_PROJECT_SETTINGS_TRACKER_KEY as T, NoNetworkProvidersError as _, updateWalletProviderKeysForVerifiedCredentials as a, createLogger as b, createSignInMessageStatement as c, createVisit as d, hasExtension as f, WalletAlreadyLinkedToAnotherUserError as g, isCaptchaRequired as h, getNetworksData as i, generateSessionKeys as j, isServerSideRendering as k, formatSignInMessage as l, consumeCaptchaToken as m, getNetworkProviders as n, verifyMessageSignatureOwnership as o, setCaptchaToken as p, getNetworkProviderBuilderRegistry as r, removeUnverifiedWalletAccount as s, getNetworkProviderFromNetworkId as t, setUnverifiedWalletAccounts as u, createRealtimeService as v, createDeferredPromise as w, createCrossTabBroadcast as x, createIndexedDBKeychainService as y };
995
- //# sourceMappingURL=getNetworkProviderFromNetworkId-6QbuR0_i.esm.js.map
1004
+ //# sourceMappingURL=getNetworkProviderFromNetworkId-VEDzpV8Z.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"getNetworkProviderFromNetworkId-VEDzpV8Z.esm.js","names":["item: StorageFormat<typeof value>","BufferPolyfill","resolve: (value: T) => void","reject: (reason?: unknown) => void","LOG_LEVELS: Record<LogLevel, number>","eventEmitter: LoggerEventEmitter","EventEmitter","minLevel: LogLevel","ABLY_STATE_TO_REALTIME_STATE: Record<string, RealtimeConnectionState>","ablyClient: BaseRealtime | undefined","connectionState: RealtimeConnectionState","connect: RealtimeService['connect']","disconnect: RealtimeService['disconnect']","subscribe: RealtimeService['subscribe']","handler: messageCallback<InboundMessage>","unsubscribe: RealtimeService['unsubscribe']","publish: RealtimeService['publish']","connectRequest: ConnectRequest","filteredUnverifiedWalletAccounts: UnverifiedWalletAccount[]","suffixFields: string[]","networkProvider"],"sources":["../src/utils/isEqualShallow/isEqualShallow.ts","../src/utils/observable/subscribeWithSelector/subscribeWithSelector.ts","../src/services/storage/createLocalStorageAdapter/createLocalStorageAdapter.ts","../src/errors/InvalidStorageSet.ts","../src/services/storage/createStorage/formatForStorage/isValidDateISOString/isValidDateISOString.ts","../src/services/storage/createStorage/formatForStorage/storageFormat.ts","../src/services/storage/createStorage/createStorage.ts","../src/services/storage/createStorageKeySchema/createStorageKeySchema.ts","../src/modules/sessionKeys/generateSessionKeys/generateSessionKeys.ts","../src/utils/getBuffer/getBuffer.ts","../src/utils/isServerSideRendering/isServerSideRendering.ts","../src/modules/initializeClient/consts.ts","../src/utils/deferredPromise/createDeferredPromise.ts","../src/errors/CannotTrackError.ts","../src/services/crossTabBroadcast/crossTabBroadcast.schema.ts","../src/services/crossTabBroadcast/createCrossTabBroadcast/createCrossTabBroadcast.ts","../src/services/logger/createLogger/createLogger.ts","../src/utils/bufferToHex/bufferToHex.ts","../src/utils/compressRawPublicKey/compressRawPublicKey.ts","../src/services/keychain/createIndexedDBKeychainService/KeyNotFoundError.ts","../src/services/keychain/createIndexedDBKeychainService/utils/constants.ts","../src/services/keychain/createIndexedDBKeychainService/utils/deleteIndexedDBItem.ts","../src/services/keychain/createIndexedDBKeychainService/utils/getIndexedDBItem.ts","../src/services/keychain/createIndexedDBKeychainService/utils/openDatabase.ts","../src/services/keychain/createIndexedDBKeychainService/utils/setIndexedDBItem.ts","../src/services/keychain/createIndexedDBKeychainService/createIndexedDBKeychainService.ts","../src/errors/InvalidRealtimePublishError.ts","../src/errors/RealtimeNotConnectedError.ts","../src/services/realtime/createRealtimeService/createRealtimeService.ts","../src/errors/NoNetworkProvidersError.ts","../src/errors/WalletAlreadyLinkedToAnotherUserError.ts","../src/modules/captcha/isCaptchaRequired/isCaptchaRequired.ts","../src/modules/captcha/consumeCaptchaToken/consumeCaptchaToken.ts","../src/modules/captcha/setCaptchaToken/setCaptchaToken.ts","../src/modules/extension/hasExtension/hasExtension.ts","../src/modules/auth/createVisit/createVisit.ts","../src/modules/wallets/unverifiedWalletAccounts/setUnverifiedWalletAccounts/setUnverifiedWalletAccounts.ts","../src/modules/wallets/utils/formatSignInMessage/formatSignInMessage.ts","../src/modules/wallets/utils/getSignInMessage/createSignInMessageStatement/createSignInMessageStatement.ts","../src/modules/wallets/unverifiedWalletAccounts/removeUnverifiedWalletAccount/removeUnverifiedWalletAccount.ts","../src/utils/isError/isError.ts","../src/utils/isErrorWithCode/isErrorWithCode.ts","../src/modules/wallets/verifyMessageSignatureOwnership/verifyMessageSignatureOwnership.ts","../src/modules/wallets/walletProvider/walletProviderKeyMap/updateWalletProviderKeysForVerifiedCredentials/updateWalletProviderKeysForVerifiedCredentials.ts","../src/modules/wallets/networks/getSdkChainFromApiChainName/getSdkChainFromApiChainName.ts","../src/modules/wallets/networks/getNetworksData/getNetworksData.ts","../src/modules/wallets/networks/networkProviderBuilderRegistry/createNetworkProviderBuilderRegistry/createNetworkProviderBuilderRegistry.ts","../src/modules/wallets/networks/networkProviderBuilderRegistry/getNetworkProviderBuilderRegistry/getNetworkProviderBuilderRegistry.ts","../src/modules/wallets/networks/getNetworkProviders/getNetworkProviders.ts","../src/modules/wallets/networks/getNetworkProviderFromNetworkId/getNetworkProviderFromNetworkId.ts"],"sourcesContent":["/**\n * Shallow compare two objects.\n *\n * Source: https://github.com/pmndrs/zustand/blob/main/src/vanilla/shallow.ts\n * @not-instrumented\n */\nexport const isEqualShallow = <T>(objA: T, objB: T) => {\n if (Object.is(objA, objB)) return true;\n\n if (\n typeof objA !== 'object' ||\n objA === null ||\n typeof objB !== 'object' ||\n objB === null\n ) {\n return objA === objB;\n }\n\n if (objA instanceof Map && objB instanceof Map) {\n if (objA.size !== objB.size) return false;\n\n for (const [key, value] of objA) {\n if (!Object.is(value, objB.get(key))) return false;\n }\n\n return true;\n }\n\n if (objA instanceof Set && objB instanceof Set) {\n if (objA.size !== objB.size) return false;\n\n for (const value of objA) {\n if (!objB.has(value)) return false;\n }\n return true;\n }\n\n const keysA = Object.keys(objA);\n\n if (keysA.length !== Object.keys(objB).length) return false;\n\n for (const keyA of keysA) {\n if (\n !Object.prototype.hasOwnProperty.call(objB, keyA as string) ||\n !Object.is(objA[keyA as keyof T], objB[keyA as keyof T])\n ) {\n return false;\n }\n }\n\n if (objA.constructor !== objB.constructor) return false;\n\n return true;\n};\n","import { isEqualShallow } from '../../isEqualShallow';\nimport type { ObservableState } from '../observable.types';\n\n/**\n * Allows subscribing to a slice of the state.\n * The slice is a computation of the states.\n *\n * The callback will only be called when the slice has changed.\n * Change is determined by shallow comparison.\n *\n * Returns a function to unsubscribe the callback.\n * @instrumented\n */\nexport const subscribeWithSelector =\n <T extends Record<string, unknown>, Slice>(\n observable: ObservableState<T>,\n selector: (value: T) => Slice\n ) =>\n (callback: (slice: Slice) => void) => {\n let lastSlice = selector(observable.get());\n\n return observable.subscribe((value) => {\n const nextSlice = selector(value);\n\n if (isEqualShallow(nextSlice, lastSlice)) return;\n\n lastSlice = nextSlice;\n\n callback(nextSlice);\n });\n };\n","/* eslint-disable no-restricted-globals -- this is the abstraction for localStorage */\nimport type { StorageAdapter } from '../storage.types';\n\n/**\n * Creates a localStorage adapter\n * @instrumented\n */\nexport const createLocalStorageAdapter = (): StorageAdapter => ({\n getItem: async (key) => localStorage.getItem(key),\n removeItem: async (key) => localStorage.removeItem(key),\n setItem: async (key, value) => localStorage.setItem(key, value),\n});\n","import { BaseError } from './base';\n\ntype InvalidStorageSetParams = {\n key: string;\n value: string;\n};\n\nexport class InvalidStorageSet extends BaseError {\n constructor({ key, value }: InvalidStorageSetParams) {\n super({\n cause: null,\n code: 'invalid_storage_set',\n docsUrl: null,\n metaMessages: [`key: ${key}`, value],\n name: 'InvalidStorageSet',\n shortMessage: 'Tried to store a value that does not match the schema',\n });\n }\n}\n","/**\n * Returns whether the given string is a valid ISO date string.\n *\n * Does not support timezone offsets.\n * @not-instrumented\n */\nexport const isValidDateISOString = (value: string): boolean => {\n const date = new Date(value);\n\n return !isNaN(date.getTime()) && date.toISOString() === value;\n};\n","import type { StorageFormat } from '../../storage.types';\nimport { isValidDateISOString } from './isValidDateISOString';\n\nconst DATE_PREFIX = '__DATE__';\n\n/** @not-instrumented */\nexport const formatForStorage = (value: unknown) => {\n const item: StorageFormat<typeof value> = { value };\n\n return JSON.stringify(item, (_, entry) => {\n // You might think that entry here would be a Date and one could simply do \"entry instanceof Date\",\n // but actually it will be a string already (no idea why JSON.stringify does this)\n if (isValidDateISOString(entry)) {\n return `${DATE_PREFIX}${entry}`;\n }\n\n return entry;\n });\n};\n\n/** @not-instrumented */\nexport const parseFromStorage = <T>(value: string): StorageFormat<T> | null => {\n try {\n const parsed = JSON.parse(value, (_, entry) => {\n if (typeof entry === 'string' && entry.startsWith(DATE_PREFIX)) {\n return new Date(entry.slice(DATE_PREFIX.length));\n }\n\n return entry;\n }) as StorageFormat<T>;\n\n return parsed;\n // eslint-disable-next-line @typescript-eslint/no-unused-vars\n } catch (error) {\n return null;\n }\n};\n","import type { Storage, StorageAdapter } from '../storage.types';\nimport { InvalidStorageSet } from './../../../errors/InvalidStorageSet';\nimport { formatForStorage } from './formatForStorage';\nimport { parseFromStorage } from './formatForStorage/storageFormat';\n\ntype CreateWebStorageParams = {\n prefix?: string;\n storageAdapter: StorageAdapter;\n};\n\n/**\n * Creates a Storage service to interact with storage adapter\n * @instrumented\n */\nexport const createStorage = ({\n prefix = '',\n storageAdapter,\n}: CreateWebStorageParams): Storage => {\n const getPrefixedKey = (key: string) => (prefix ? `${prefix}_${key}` : key);\n\n return {\n getItem: async (storageKeySchema) => {\n const rawItem = await storageAdapter.getItem(\n getPrefixedKey(storageKeySchema.key)\n );\n\n const parsedItem = rawItem ? parseFromStorage(rawItem) : null;\n\n /**\n * The item saved to localStorage may be malformed.\n * In this case, we remove it and return null.\n */\n if (parsedItem !== null) {\n const parsed = storageKeySchema.schema.safeParse(parsedItem.value);\n\n if (parsed.success) {\n return parsed.data;\n }\n }\n\n /**\n * The item saved to localStorage may be malformed.\n * In this case, we remove it and return null.\n */\n\n await storageAdapter.removeItem(getPrefixedKey(storageKeySchema.key));\n\n return null;\n },\n\n removeItem: async (storageKeySchema) => {\n await storageAdapter.removeItem(getPrefixedKey(storageKeySchema.key));\n },\n\n setItem: async (storageKeySchema, value) => {\n const parsed = storageKeySchema.schema.safeParse(value);\n\n if (!parsed.success) {\n throw new InvalidStorageSet({\n key: storageKeySchema.key,\n value: JSON.stringify(value),\n });\n }\n\n const item = formatForStorage(parsed.data);\n\n await storageAdapter.setItem(getPrefixedKey(storageKeySchema.key), item);\n },\n };\n};\n","import type * as z from 'zod/mini';\n\nimport type { StorageKeySchema } from '../storage.types';\n\n/** @instrumented */\nexport const createStorageKeySchema = <T>(params: {\n key: string;\n schema: z.ZodMiniType<T>;\n}): StorageKeySchema<T> => {\n return params;\n};\n","import { getCore } from '../../../client/core/getCore';\nimport type { DynamicClient } from '../../../client/types';\nimport type { SessionKeys } from '../sessionKeys.types';\n\n/** @instrumented */\nexport const generateSessionKeys = async (\n client: DynamicClient\n): Promise<SessionKeys> => {\n const core = getCore(client);\n\n const publicKey = await core.keychain.generateKey('session');\n\n core.state.set({\n sessionKeys: publicKey,\n });\n\n return { publicKey };\n};\n","/* eslint-disable no-restricted-globals */\nimport { Buffer as BufferPolyfill } from 'buffer';\n\n/** @not-instrumented */\nexport const getBuffer = () =>\n typeof Buffer !== 'undefined' ? Buffer : BufferPolyfill;\n","/**\n * Indicates if the code is running in a server-side environment.\n * @not-instrumented\n */\n// eslint-disable-next-line no-restricted-globals\nexport const isServerSideRendering = () => typeof window === 'undefined';\n","export const REFRESH_USER_STATE_FROM_COOKIE_TRACKER_KEY =\n 'refresh-user-state-from-cookie';\n\nexport const INITIALIZE_STORAGE_SYNC_TRACKER_KEY = 'initialize-storage-sync';\n\nexport const FETCH_PROJECT_SETTINGS_TRACKER_KEY = 'fetch-project-settings';\n\nexport const GENERATE_SESSION_KEYS_TRACKER_KEY = 'generate-session-keys';\n","import type { DeferredPromise } from './deferredPromise.types';\n\n/** @instrumented */\nexport const createDeferredPromise = <T>(): DeferredPromise<T> => {\n let resolve: (value: T) => void;\n let reject: (reason?: unknown) => void;\n\n const promise = new Promise<T>((_resolve, _reject) => {\n resolve = _resolve;\n reject = _reject;\n });\n\n return {\n promise,\n reject: (reason?: unknown) => reject?.(reason),\n resolve: (value: T) => resolve?.(value),\n };\n};\n","import { BaseError } from './base';\n\nexport class CannotTrackError extends BaseError {\n constructor() {\n super({\n cause: null,\n code: 'cannot_track_error',\n docsUrl: null,\n name: 'CannotTrackError',\n shortMessage: 'All track calls must be performed in the same node tick',\n });\n }\n}\n","import * as z from 'zod/mini';\n\n/**\n * Schema for validating cross-tab broadcast messages.\n */\nexport const CrossTabBroadcastMessageSchema = z.object({\n args: z.optional(z.unknown()),\n event: z.string(),\n});\n","import EventEmitter from 'eventemitter3';\n\nimport { isServerSideRendering } from '../../../utils/isServerSideRendering';\nimport { CrossTabBroadcastMessageSchema } from '../crossTabBroadcast.schema';\nimport type { CrossTabBroadcast } from '../crossTabBroadcast.types';\n\ntype CreateCrossTabBroadcastParams = {\n channelName: string;\n};\n\n/**\n * Creates a cross-tab broadcast service instance using the BroadcastChannel API.\n *\n * Enables communication between multiple tabs/windows of the same application.\n * Messages are validated against the schema and invalid messages are silently ignored.\n *\n * In SSR or when BroadcastChannel is unavailable, returns a no-op implementation.\n *\n * @param params - Configuration parameters\n * @param params.channelName - The name of the broadcast channel to use\n * @returns A cross-tab broadcast service instance\n * @instrumented\n */\nexport const createCrossTabBroadcast = ({\n channelName,\n}: CreateCrossTabBroadcastParams): CrossTabBroadcast => {\n // SSR check - return no-op implementation\n // eslint-disable-next-line no-restricted-globals\n if (isServerSideRendering() || typeof BroadcastChannel === 'undefined') {\n return {\n off: () => {},\n on: () => {},\n send: () => {},\n };\n }\n\n // eslint-disable-next-line no-restricted-globals\n const channel = new BroadcastChannel(channelName);\n const eventEmitter = new EventEmitter();\n\n // Message handler with validation\n const handleMessage = (messageEvent: MessageEvent) => {\n const parsed = CrossTabBroadcastMessageSchema.safeParse(messageEvent.data);\n\n if (!parsed.success) {\n // Silently ignore invalid messages (consistent with storage patterns)\n return;\n }\n\n const { args, event } = parsed.data;\n eventEmitter.emit(event, args);\n };\n\n channel.addEventListener('message', handleMessage);\n\n return {\n off: (event, callback) => {\n eventEmitter.off(event, callback);\n },\n\n on: (event, callback) => {\n eventEmitter.on(event, callback);\n },\n\n send: ({ args, event }) => {\n channel.postMessage({ args, event });\n },\n };\n};\n","import { EventEmitter } from 'eventemitter3';\n\nimport type { LogLevel, Logger, LoggerEventEmitter } from '../logger.types';\n\n/**\n * Configuration options for the logger\n * @instrumented\n */\ntype CreateLoggerOptions = {\n level?: LogLevel;\n};\n\n/**\n * Log levels and their corresponding numeric values\n */\nconst LOG_LEVELS: Record<LogLevel, number> = {\n debug: 0,\n error: 3,\n info: 1,\n warn: 2,\n};\n\n// Assign to avoid lint errors\nconst defaultConsole = console;\n\n/**\n * Creates a logger instance with configurable log level and event emission capabilities.\n * @returns A logger instance with debug, info, warn, and error methods\n * @not-instrumented\n */\nexport const createLogger = (options: CreateLoggerOptions = {}): Logger => {\n const eventEmitter: LoggerEventEmitter = new EventEmitter();\n\n // Default to 'debug' if no level is provided\n const minLevel: LogLevel = options.level ?? 'warn';\n\n // Helper to decide if we should log based on current log level\n const shouldLog = (level: LogLevel): boolean => {\n return LOG_LEVELS[level] >= LOG_LEVELS[minLevel];\n };\n\n // Helper to format the log message\n const formatMessage = (level: LogLevel, message: string): string => {\n const timestamp = new Date().toISOString();\n\n return `[${timestamp}] ${level.toUpperCase()}: ${message}`;\n };\n\n // Unified logger function that checks the level and calls the appropriate console method\n const log = (\n level: LogLevel,\n consoleMethod: (...data: unknown[]) => void,\n message: string,\n ...args: unknown[]\n ) => {\n eventEmitter.emit('log', level, message, ...args);\n\n if (!shouldLog(level)) return;\n\n consoleMethod(formatMessage(level, message), ...args);\n };\n\n return {\n debug: (message, ...args) =>\n log('debug', defaultConsole.debug, message, ...args),\n\n error: (message, ...args) =>\n log('error', defaultConsole.error, message, ...args),\n\n info: (message, ...args) =>\n log('info', defaultConsole.info, message, ...args),\n\n off: eventEmitter.off.bind(eventEmitter),\n\n on: eventEmitter.on.bind(eventEmitter),\n warn: (message, ...args) =>\n log('warn', defaultConsole.warn, message, ...args),\n };\n};\n","/**\n * Converts an ArrayBuffer or Uint8Array to a hex-encoded string\n * @not-instrumented\n */\nexport const bufferToHex = (buffer: ArrayBufferLike | Uint8Array) =>\n [...(buffer instanceof Uint8Array ? buffer : new Uint8Array(buffer))]\n .map((x) => x.toString(16).padStart(2, '0'))\n .join('');\n","/**\n * Accepts a public key array buffer, and returns a buffer with the compressed version of the public key\n * @not-instrumented\n */\nexport const compressRawPublicKey = (rawPublicKey: ArrayBuffer) => {\n const rawPublicKeyBytes = new Uint8Array(rawPublicKey);\n const len = rawPublicKeyBytes.byteLength;\n\n // Drop the y coordinate\n const compressedBytes = rawPublicKeyBytes.slice(0, (1 + len) >>> 1);\n\n // Encode the parity of `y` in first bit\n compressedBytes[0] = 0x2 | (rawPublicKeyBytes[len - 1] & 0x01);\n return compressedBytes.buffer;\n};\n","import { BaseError } from '../../../errors/base';\n\nexport class KeyNotFoundError extends BaseError {\n constructor(keyName: string) {\n super({\n cause: null,\n code: 'key_not_found',\n docsUrl: null,\n name: 'KeyNotFoundError',\n shortMessage: `Key \"${keyName}\" not found in keychain`,\n });\n }\n}\n","export const STORE_NAME = 'keys';\n","import { STORE_NAME } from './constants';\n\n/** @not-instrumented */\nexport const deleteIndexedDBItem = (\n db: IDBDatabase,\n keyName: string\n): Promise<void> =>\n new Promise((resolve, reject) => {\n const transaction = db.transaction(STORE_NAME, 'readwrite');\n const store = transaction.objectStore(STORE_NAME);\n const request = store.delete(keyName);\n\n request.onsuccess = () => resolve();\n request.onerror = () => reject(request.error as Error);\n });\n","import type { StoredKey } from '../createIndexedDBKeychainService.types';\nimport { STORE_NAME } from './constants';\n\n/** @not-instrumented */\nexport const getIndexedDBItem = (\n db: IDBDatabase,\n keyName: string\n): Promise<StoredKey | undefined> =>\n new Promise((resolve, reject) => {\n const transaction = db.transaction(STORE_NAME, 'readonly');\n const store = transaction.objectStore(STORE_NAME);\n const request = store.get(keyName);\n\n request.onsuccess = () => resolve(request.result as StoredKey | undefined);\n request.onerror = () => reject(request.error as Error);\n });\n","import { STORE_NAME } from './constants';\n\n/** @not-instrumented */\nexport const openDatabase = (dbName: string): Promise<IDBDatabase> =>\n new Promise((resolve, reject) => {\n const request = indexedDB.open(dbName, 1);\n\n request.onupgradeneeded = () => {\n const db = request.result;\n\n if (!db.objectStoreNames.contains(STORE_NAME)) {\n db.createObjectStore(STORE_NAME, { keyPath: 'keyName' });\n }\n };\n\n request.onsuccess = () => resolve(request.result);\n request.onerror = () => reject(request.error as Error);\n });\n","import type { StoredKey } from '../createIndexedDBKeychainService.types';\nimport { STORE_NAME } from './constants';\n\n/** @not-instrumented */\nexport const setIndexedDBItem = (\n db: IDBDatabase,\n entry: StoredKey\n): Promise<void> =>\n new Promise((resolve, reject) => {\n const transaction = db.transaction(STORE_NAME, 'readwrite');\n const store = transaction.objectStore(STORE_NAME);\n const request = store.put(entry);\n\n request.onsuccess = () => resolve();\n request.onerror = () => reject(request.error as Error);\n });\n","import { bufferToHex } from '../../../utils/bufferToHex';\nimport { compressRawPublicKey } from '../../../utils/compressRawPublicKey';\nimport type { KeychainService } from '../keychain.types';\nimport { KeyNotFoundError } from './KeyNotFoundError';\nimport { deleteIndexedDBItem } from './utils/deleteIndexedDBItem';\nimport { getIndexedDBItem } from './utils/getIndexedDBItem';\nimport { openDatabase } from './utils/openDatabase';\nimport { setIndexedDBItem } from './utils/setIndexedDBItem';\n\ntype CreateIndexedDBKeychainServiceParams = {\n dbName?: string;\n};\n\nconst DEFAULT_DB_NAME = 'dynamic_keychain';\n\n/** @instrumented */\nexport const createIndexedDBKeychainService = (\n params?: CreateIndexedDBKeychainServiceParams\n): KeychainService => {\n const dbName = params?.dbName ?? DEFAULT_DB_NAME;\n\n const generateKey = async (keyName: string): Promise<string> => {\n const keyPair = await crypto.subtle.generateKey(\n { name: 'ECDSA', namedCurve: 'P-256' },\n false,\n ['sign']\n );\n\n const rawPublicKey = await crypto.subtle.exportKey(\n 'raw',\n keyPair.publicKey\n );\n\n const compressedPublicKey = compressRawPublicKey(rawPublicKey);\n const publicKeyHex = bufferToHex(compressedPublicKey);\n\n const db = await openDatabase(dbName);\n await setIndexedDBItem(db, {\n keyName,\n privateKey: keyPair.privateKey,\n publicKeyHex,\n });\n db.close();\n\n return publicKeyHex;\n };\n\n const importKey = async (\n keyName: string,\n jwk: JsonWebKey\n ): Promise<string> => {\n const privateKey = await crypto.subtle.importKey(\n 'jwk',\n jwk,\n { name: 'ECDSA', namedCurve: 'P-256' },\n false,\n ['sign']\n );\n\n const publicJwk = { crv: jwk.crv, kty: jwk.kty, x: jwk.x, y: jwk.y };\n\n const publicCryptoKey = await crypto.subtle.importKey(\n 'jwk',\n publicJwk,\n { name: 'ECDSA', namedCurve: 'P-256' },\n true,\n ['verify']\n );\n\n const rawPublicKey = await crypto.subtle.exportKey('raw', publicCryptoKey);\n const compressedPublicKey = compressRawPublicKey(rawPublicKey);\n const publicKeyHex = bufferToHex(compressedPublicKey);\n\n const db = await openDatabase(dbName);\n await setIndexedDBItem(db, {\n keyName,\n privateKey,\n publicKeyHex,\n });\n db.close();\n\n return publicKeyHex;\n };\n\n const getPublicKey = async (keyName: string): Promise<string | null> => {\n const db = await openDatabase(dbName);\n const entry = await getIndexedDBItem(db, keyName);\n db.close();\n\n return entry?.publicKeyHex ?? null;\n };\n\n const sign = async (keyName: string, message: string): Promise<string> => {\n const db = await openDatabase(dbName);\n const entry = await getIndexedDBItem(db, keyName);\n db.close();\n\n if (!entry) {\n throw new KeyNotFoundError(keyName);\n }\n\n const encoder = new TextEncoder();\n const data = encoder.encode(message);\n\n const signature = await crypto.subtle.sign(\n { hash: { name: 'SHA-256' }, name: 'ECDSA' },\n entry.privateKey,\n data\n );\n\n return bufferToHex(signature);\n };\n\n const hasKey = async (keyName: string): Promise<boolean> => {\n const db = await openDatabase(dbName);\n const entry = await getIndexedDBItem(db, keyName);\n db.close();\n\n return entry !== undefined;\n };\n\n const removeKey = async (keyName: string): Promise<void> => {\n const db = await openDatabase(dbName);\n await deleteIndexedDBItem(db, keyName);\n db.close();\n };\n\n return {\n generateKey,\n getPublicKey,\n hasKey,\n importKey,\n removeKey,\n sign,\n };\n};\n","import { BaseError } from './base';\n\ntype InvalidRealtimePublishParams = {\n channel: string;\n};\n\nexport class InvalidRealtimePublishError extends BaseError {\n constructor({ channel }: InvalidRealtimePublishParams) {\n super({\n cause: null,\n code: 'invalid_realtime_publish',\n docsUrl: null,\n metaMessages: [`channel: ${channel}`],\n name: 'InvalidRealtimePublishError',\n shortMessage:\n 'Tried to publish data that does not match the channel schema',\n });\n }\n}\n","import { BaseError } from './base';\n\nexport class RealtimeNotConnectedError extends BaseError {\n constructor() {\n super({\n cause: null,\n code: 'realtime_not_connected_error',\n docsUrl: null,\n name: 'RealtimeNotConnectedError',\n shortMessage:\n 'Realtime service is not connected. Call connect() before subscribing or publishing.',\n });\n }\n}\n","import type { InboundMessage, RealtimeChannel, messageCallback } from 'ably';\nimport type { BaseRealtime } from 'ably/modular';\nimport EventEmitter from 'eventemitter3';\n\nimport { getCore } from '../../../client/core/getCore';\nimport { InvalidRealtimePublishError } from '../../../errors/InvalidRealtimePublishError';\nimport { RealtimeNotConnectedError } from '../../../errors/RealtimeNotConnectedError';\nimport { createApiClient } from '../../../modules/apiClient';\nimport { isServerSideRendering } from '../../../utils/isServerSideRendering';\nimport type {\n RealtimeChannelSchema,\n RealtimeConnectionState,\n RealtimeEventMap,\n RealtimeService,\n} from '../realtime.types';\n\nconst ABLY_STATE_TO_REALTIME_STATE: Record<string, RealtimeConnectionState> = {\n closed: 'closed',\n closing: 'closing',\n connected: 'connected',\n connecting: 'connecting',\n disconnected: 'disconnected',\n failed: 'failed',\n initialized: 'idle',\n suspended: 'suspended',\n};\n\nconst mapAblyState = (ablyState: string): RealtimeConnectionState =>\n ABLY_STATE_TO_REALTIME_STATE[ablyState] ?? 'idle';\n\n/**\n * Creates a realtime pub/sub service backed by Ably.\n *\n * The service starts idle. Call `connect({ client })` to establish\n * a connection, passing the DynamicClient explicitly.\n *\n * SSR environments receive a no-op implementation.\n * @instrumented\n */\nexport const createRealtimeService = (): RealtimeService => {\n if (isServerSideRendering()) {\n return {\n connect: () => Promise.resolve(),\n disconnect: () => {},\n getConnectionState: () => 'idle',\n off: () => {},\n on: () => {},\n publish: () => Promise.resolve(),\n subscribe: () => Promise.resolve(),\n unsubscribe: () => {},\n };\n }\n\n const eventEmitter = new EventEmitter<RealtimeEventMap>();\n const channels = new Map<string, RealtimeChannel>();\n // eslint-disable-next-line @typescript-eslint/no-explicit-any\n const handlerMap = new WeakMap<(message: { data: any }) => void, messageCallback<InboundMessage>>();\n\n let ablyClient: BaseRealtime | undefined;\n let connectionState: RealtimeConnectionState = 'idle';\n let isConnecting = false;\n\n const setConnectionState = (state: RealtimeConnectionState) => {\n connectionState = state;\n eventEmitter.emit('connectionStateChange', state);\n };\n\n const getOrCreateChannel = (channelName: string): RealtimeChannel => {\n const existing = channels.get(channelName);\n\n if (existing) {\n return existing;\n }\n\n if (!ablyClient) {\n throw new RealtimeNotConnectedError();\n }\n\n const channel = ablyClient.channels.get(channelName);\n channels.set(channelName, channel);\n\n return channel;\n };\n\n const connect: RealtimeService['connect'] = async ({ client }) => {\n if (isConnecting) {\n return;\n }\n\n isConnecting = true;\n\n try {\n const core = getCore(client);\n\n if (ablyClient) {\n ablyClient.close();\n channels.clear();\n }\n\n // Dynamic import to keep the module tree-shakeable\n // and avoid loading Ably in SSR environments\n const {\n BaseRealtime: AblyBaseRealtime,\n FetchRequest,\n WebSocketTransport,\n } = await import('ably/modular');\n\n ablyClient = new AblyBaseRealtime({\n // authCallback must return void (not Promise<void>), so we use\n // .then().catch() instead of async/await to avoid returning a Promise\n // to Ably's callback-style auth handler.\n authCallback: (_tokenParams, callback) => {\n const apiClient = createApiClient({}, client);\n\n apiClient\n .getRealtimeAuthToken({ environmentId: core.environmentId })\n .then((response) => {\n callback(null, response.token);\n })\n .catch((err: unknown) => {\n const message = err instanceof Error ? err.message : String(err);\n callback(message, null);\n });\n },\n autoConnect: false,\n plugins: { FetchRequest, WebSocketTransport },\n });\n\n ablyClient.connection.on((stateChange) => {\n setConnectionState(mapAblyState(stateChange.current));\n });\n\n ablyClient.connect();\n } finally {\n isConnecting = false;\n }\n };\n\n const disconnect: RealtimeService['disconnect'] = () => {\n if (!ablyClient) {\n return;\n }\n\n for (const channel of channels.values()) {\n channel.detach().catch(() => {});\n }\n\n channels.clear();\n ablyClient.close();\n ablyClient = undefined;\n };\n\n const subscribe: RealtimeService['subscribe'] = async <T>({\n channelSchema,\n callback,\n }: {\n callback: (message: { data: T }) => void;\n channelSchema: RealtimeChannelSchema<T>;\n }) => {\n const channel = getOrCreateChannel(channelSchema.channel);\n\n const handler: messageCallback<InboundMessage> = (message) => {\n const parsed = channelSchema.schema.safeParse(message.data);\n\n if (!parsed.success) {\n return;\n }\n\n callback({ data: parsed.data });\n };\n\n handlerMap.set(callback, handler);\n\n await channel.subscribe(handler);\n };\n\n const unsubscribe: RealtimeService['unsubscribe'] = <T>({\n channelSchema,\n callback,\n }: {\n callback: (message: { data: T }) => void;\n channelSchema: RealtimeChannelSchema<T>;\n }) => {\n const channel = channels.get(channelSchema.channel);\n\n if (!channel) {\n return;\n }\n\n const handler = handlerMap.get(callback);\n\n if (handler) {\n channel.unsubscribe(handler);\n handlerMap.delete(callback);\n }\n };\n\n const publish: RealtimeService['publish'] = async <T>({\n channelSchema,\n data,\n }: {\n channelSchema: RealtimeChannelSchema<T>;\n data: T;\n }) => {\n const parsed = channelSchema.schema.safeParse(data);\n\n if (!parsed.success) {\n throw new InvalidRealtimePublishError({ channel: channelSchema.channel });\n }\n\n const channel = getOrCreateChannel(channelSchema.channel);\n await channel.publish('message', parsed.data);\n };\n\n return {\n connect,\n disconnect,\n getConnectionState: () => connectionState,\n off: (event, callback) => {\n eventEmitter.off(event, callback);\n },\n on: (event, callback) => {\n eventEmitter.on(event, callback);\n },\n publish,\n subscribe,\n unsubscribe,\n };\n};\n","import { BaseError } from './base';\n\nexport class NoNetworkProvidersError extends BaseError {\n constructor() {\n super({\n cause: null,\n code: 'no_network_providers',\n docsUrl: null,\n name: 'NoNetworkProvidersError',\n shortMessage: 'No networks were registered in the client',\n });\n }\n}\n","import { BaseError, type BaseErrorParameters } from './base';\n\nexport class WalletAlreadyLinkedToAnotherUserError extends BaseError {\n constructor({ cause }: Pick<BaseErrorParameters, 'cause'>) {\n super({\n cause,\n code: 'wallet_already_linked_to_another_user_error',\n docsUrl: null,\n name: 'WalletAlreadyLinkedToAnotherUserError',\n shortMessage: 'This wallet is already linked to another user',\n });\n }\n}\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport { assertDefined } from '../../../utils/assertDefined';\n\n/** @not-instrumented */\nexport const isCaptchaRequired = (client = getDefaultClient()) => {\n const projectSettings = client.projectSettings;\n\n assertDefined(projectSettings, 'Project settings are not available');\n\n return projectSettings.security.hCaptcha?.enabled ?? false;\n};\n","import { getCore } from '../../../client/core/getCore';\nimport type { DynamicClient } from '../../../client/types';\nimport { assertDefined } from '../../../utils/assertDefined';\nimport { isCaptchaRequired } from '../isCaptchaRequired';\n\n/**\n * Retrieves the current captcha token from the client state and sets it to null.\n * @instrumented\n */\nexport const consumeCaptchaToken = (\n client: DynamicClient\n): string | undefined => {\n const core = getCore(client);\n\n const captchaToken = core.state.get().captchaToken;\n\n if (isCaptchaRequired(client)) {\n assertDefined(captchaToken, 'Captcha token is required');\n }\n\n core.state.set({\n captchaToken: null,\n });\n\n return captchaToken ?? undefined;\n};\n","import { getCore } from '../../../client/core/getCore';\nimport { getDefaultClient } from '../../../client/defaultClient';\n\ntype SetCaptchaTokenProps = {\n captchaToken: string;\n};\n\n/**\n * Sets the given captcha token in the client state.\n *\n * @param params.captchaToken - The captcha token to set.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @instrumented\n */\nexport const setCaptchaToken = (\n { captchaToken }: SetCaptchaTokenProps,\n client = getDefaultClient()\n) => {\n const core = getCore(client);\n\n core.state.set({\n captchaToken,\n });\n};\n","import { getCore } from '../../../client/core/getCore';\nimport { getDefaultClient } from '../../../client/defaultClient';\n\ntype HasExtensionParams = {\n extensionKey: string;\n};\n\n/**\n * Checks if a specific extension has been applied to the Dynamic client.\n *\n * Extensions add optional features to the Dynamic SDK,\n * such as EVM, Solana, or other chain support.\n *\n * @param params.extensionKey - The unique key identifying the extension to check for.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns True if the extension is applied, false otherwise.\n * @not-instrumented\n */\nexport const hasExtension = (\n { extensionKey }: HasExtensionParams,\n client = getDefaultClient()\n) => {\n const core = getCore(client);\n\n return core.extensions.has(extensionKey);\n};\n","import {\n AuthModeEnum,\n type ChainEnum,\n type ConnectRequest,\n} from '@dynamic-labs/sdk-api-core';\n\nimport { getCore } from '../../../client/core/getCore';\nimport type { DynamicClient } from '../../../client/types';\nimport { createApiClient } from '../../apiClient';\nimport { getWalletProviderFromWalletAccount } from '../../wallets/utils/getWalletProviderFromWalletAccount';\nimport { normalizeWalletNameWithChain } from '../../wallets/utils/normalizeWalletNameWithChain';\nimport type { WalletAccount } from '../../wallets/walletAccount';\n\ntype CreateVisitParams = {\n authMode?: AuthModeEnum;\n walletAccount: WalletAccount;\n};\n\n/* \n In older SDK versions we used to have the concept of \"connect-only\" vs \"connect-and-sign\". \n The only difference in backend is it stores some extra data for connect-only, \n so we can just default to using it.\n*/\n/** @instrumented */\nexport const createVisit = async (\n { walletAccount, authMode = AuthModeEnum.Only }: CreateVisitParams,\n client: DynamicClient\n) => {\n const core = getCore(client);\n const apiClient = createApiClient({}, client);\n\n const walletProvider = getWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n try {\n const walletName = normalizeWalletNameWithChain({\n chain: walletProvider.chain,\n displayName: walletProvider.metadata.displayName,\n });\n\n const connectRequest: ConnectRequest = {\n address: walletAccount.address,\n authMode,\n // eslint-disable-next-line custom-rules/ban-chain-enum\n chain: walletProvider.chain as ChainEnum,\n provider: walletProvider.walletProviderType,\n walletName,\n };\n\n await apiClient.createVisit({\n connectRequest,\n environmentId: core.environmentId,\n });\n } catch (error) {\n core.logger.error('Error creating visit', { error });\n }\n};\n","import { getCore } from '../../../../client/core/getCore';\nimport type { DynamicClient } from '../../../../client/types';\nimport type { UnverifiedWalletAccount } from '../unverifiedWalletAccounts.types';\n\ntype SetUnverifiedWalletAccountsParams = {\n unverifiedWalletAccountsToUpdate: UnverifiedWalletAccount[];\n};\n\n/**\n * Updates the unverified wallet account in the client state.\n * This will add new wallet accounts and override those with matching ids,\n * but will leave other preexisting wallet accounts unchanged.\n * @instrumented\n */\nexport const setUnverifiedWalletAccounts = (\n { unverifiedWalletAccountsToUpdate }: SetUnverifiedWalletAccountsParams,\n client: DynamicClient\n): void => {\n if (unverifiedWalletAccountsToUpdate.length === 0) {\n return;\n }\n\n const core = getCore(client);\n\n const unverifiedWalletAccountsToUpdateIds =\n unverifiedWalletAccountsToUpdate.map(({ id }) => id);\n\n const filteredUnverifiedWalletAccounts: UnverifiedWalletAccount[] = core.state\n .get()\n .unverifiedWalletAccounts.filter(\n (unverifiedWalletAccount) =>\n !unverifiedWalletAccountsToUpdateIds.includes(\n unverifiedWalletAccount.id\n )\n );\n\n core.state.set({\n unverifiedWalletAccounts: [\n ...filteredUnverifiedWalletAccounts,\n ...unverifiedWalletAccountsToUpdate,\n ],\n });\n};\n","type FormatSignInMessageParams = {\n address: string;\n blockchainName: string;\n chainId?: string;\n domain: string;\n issuedAt?: string;\n nonce: string;\n requestId?: string;\n resources?: string[];\n statement?: string;\n uri: string;\n};\n\n/**\n * Formats a sign in message to prove ownership of an address.\n * @not-instrumented\n */\nexport const formatSignInMessage = async ({\n domain,\n blockchainName,\n address,\n uri,\n chainId,\n nonce,\n issuedAt,\n requestId,\n statement,\n resources,\n}: FormatSignInMessageParams) => {\n // This format follows the sign-in with ethereum (SIWE) standard,\n // but we are using it also for non-ethereum wallets for now (eg. Solana)\n // for more context on format and fields, please see:\n // https://docs.login.xyz/general-information/siwe-overview/eip-4361\n const header = `${domain} wants you to sign in with your ${blockchainName} account:`;\n const prefix = [header, address].join('\\n');\n\n // If there is a statement, we want to add a gap between the prefix and the statement\n // two times '\\n', first to move statement to next line and second to add a gap between prefix and statement\n const prefixWithStatementGap = statement ? '\\n\\n' : '\\n';\n const prefixWithStatement = `${[prefix, statement].join(\n prefixWithStatementGap\n )}\\n`;\n\n const suffixFields: string[] = [];\n suffixFields.push(`URI: ${uri}`);\n suffixFields.push('Version: 1');\n if (chainId) {\n suffixFields.push(`Chain ID: ${chainId}`);\n }\n\n suffixFields.push(`Nonce: ${nonce}`);\n\n if (issuedAt) {\n suffixFields.push(`Issued At: ${issuedAt}`);\n }\n\n if (requestId) {\n suffixFields.push(`Request ID: ${requestId}`);\n }\n\n if (resources?.length) {\n suffixFields.push(\n `Resources:${resources.map((resource) => '\\n- ' + resource).join()}`\n );\n }\n\n const suffix = suffixFields.join('\\n');\n\n return [prefixWithStatement, suffix].join('\\n');\n};\n","import { getCore } from '../../../../../client/core/getCore';\nimport type { DynamicClient } from '../../../../../client/types';\n\n/** @instrumented */\nexport const createSignInMessageStatement = (client: DynamicClient) => {\n const core = getCore(client);\n\n const appName =\n core.metadata?.name ?? client.projectSettings?.general.displayName;\n\n return `Welcome to ${appName}. Signing is the only way we can truly know that you are the owner of the wallet you are connecting. Signing is a safe, gas-less transaction that does not in any way give ${appName} permission to perform any transactions with your wallet.`;\n};\n","import { getCore } from '../../../../client/core/getCore';\nimport type { DynamicClient } from '../../../../client/types';\nimport { checkAndRaiseWalletAccountsChangedEvent } from '../../../auth/updateAuthFromVerifyResponse/checkAndRaiseWalletAccountsChangedEvent';\nimport type { UnverifiedWalletAccount } from '../unverifiedWalletAccounts.types';\n\ntype RemoveUnverifiedWalletAccountParams = {\n unverifiedWalletAccount: UnverifiedWalletAccount;\n};\n\n/**\n * Removes an unverified wallet account from the client's state.\n * @instrumented\n */\nexport const removeUnverifiedWalletAccount = (\n { unverifiedWalletAccount }: RemoveUnverifiedWalletAccountParams,\n client: DynamicClient\n) => {\n const core = getCore(client);\n\n const previousState = core.state.get();\n\n const { unverifiedWalletAccounts } = core.state.get();\n\n const filteredUnverifiedWalletAccounts = unverifiedWalletAccounts.filter(\n (account) => account.id !== unverifiedWalletAccount.id\n );\n\n core.state.set({\n unverifiedWalletAccounts: filteredUnverifiedWalletAccounts,\n });\n\n /**\n * We check before raising because the wallet account we are removing might still\n * be present in wallet accounts due to having been moved to verified credentials.\n */\n checkAndRaiseWalletAccountsChangedEvent({ previousState }, client);\n};\n","/**\n * Check if the given value is an Error object\n * @not-instrumented\n */\nexport const isError = (error: unknown): error is Error =>\n error instanceof Error;\n","import { isError } from '../isError';\n\n/**\n * Check if the given value is an Error object with a specific code\n * @not-instrumented\n */\nexport const isErrorWithCode = <T extends string>(\n error: unknown,\n code: T\n): error is Error & { code: T } => {\n if (!isError(error)) return false;\n\n return 'code' in error && error.code === code;\n};\n","import type {\n ChainEnum,\n TokenScope,\n VerifyResponse,\n WalletAddressType,\n WalletProviderEnum,\n} from '@dynamic-labs/sdk-api-core';\n\nimport { getCore } from '../../../client/core/getCore';\nimport type { DynamicClient } from '../../../client/types';\nimport { isErrorWithCode } from '../../../utils/isErrorWithCode';\nimport { createApiClient } from '../../apiClient';\nimport { consumeCaptchaToken } from '../../captcha/consumeCaptchaToken';\nimport type { Chain } from '../../chain';\nimport { normalizeWalletNameWithChain } from '../utils/normalizeWalletNameWithChain';\nimport type { WalletAddressWithType } from '../walletAccount/walletAccount.types';\nimport { WalletAlreadyLinkedToAnotherUserError } from './../../../errors/WalletAlreadyLinkedToAnotherUserError';\n\ntype VerifyMessageSignatureOwnershipParams = {\n addressesWithTypes?: WalletAddressWithType[];\n chain: Chain;\n isTransfer?: boolean;\n messageToSign: string;\n networkId?: string;\n requestedScopes?: TokenScope[];\n signature: string;\n walletAddress: string;\n walletDisplayName: string;\n walletProviderType: WalletProviderEnum;\n};\n\n/**\n * Verifies a signed message by calling either the verifyLink, verifyTransfer or verify API function,\n * depending on whether the user is signing in, linking or transferring a wallet.\n *\n * Does NOT call updateAuthFromVerifyResponse, it should be called from the return of this function.\n * @instrumented\n */\nexport const verifyMessageSignatureOwnership = async (\n {\n messageToSign,\n walletAddress,\n addressesWithTypes,\n signature,\n chain,\n isTransfer = false,\n walletDisplayName,\n walletProviderType,\n networkId,\n requestedScopes,\n }: VerifyMessageSignatureOwnershipParams,\n client: DynamicClient\n): Promise<VerifyResponse> => {\n const core = getCore(client);\n const apiClient = createApiClient({}, client);\n\n const walletName = normalizeWalletNameWithChain({\n chain,\n displayName: walletDisplayName,\n });\n\n let verifyApiFunction;\n\n if (!client.user) {\n // If the user is not authenticated, call the walletsSignin API function to sign in\n verifyApiFunction = apiClient.walletsSignin.bind(apiClient);\n } else if (isTransfer) {\n // If the user is authenticated and is transferring a wallet, call the verifyTransfer API function\n verifyApiFunction = apiClient.verifyTransfer.bind(apiClient);\n } else if (client.user && requestedScopes) {\n // Scopes = step-up auth: user requests permission for a sensitive op (e.g. wallet export).\n // We grant it only if they prove they own an existing credential (walletsVerify).\n // Must use walletsVerify: user is already logged in (not signin) and credential exists (not transfer/link).\n // If the user is authenticated and requested scopes are provided, call the walletsVerify API function\n verifyApiFunction = apiClient.walletsVerify.bind(apiClient);\n } else {\n // If the user is authenticated and is signing in, call the verifyLink API function\n verifyApiFunction = apiClient.verifyLink.bind(apiClient);\n }\n\n try {\n return await verifyApiFunction({\n environmentId: core.environmentId,\n verifyRequest: {\n // mapping to handle typecasting for address type\n additionalWalletAddresses: addressesWithTypes?.map((address) => ({\n address: address.address,\n publicKey: address.publicKey,\n type: address.type as WalletAddressType,\n })),\n captchaToken: consumeCaptchaToken(client),\n // eslint-disable-next-line custom-rules/ban-chain-enum\n chain: chain as ChainEnum,\n messageToSign,\n network: networkId,\n publicWalletAddress: walletAddress,\n requestedScopes,\n signedMessage: signature,\n walletName,\n walletProvider: walletProviderType,\n },\n });\n } catch (error) {\n core.logger.error('Failed to verify message signature ownership', error);\n\n if (\n isErrorWithCode(error, 'reassign_wallet_confirm') ||\n isErrorWithCode(error, 'merge_accounts_confirmation')\n ) {\n throw new WalletAlreadyLinkedToAnotherUserError({\n cause: error,\n });\n }\n\n throw error;\n }\n};\n","import { getCore } from '../../../../../client/core/getCore';\nimport type { DynamicClient } from '../../../../../client/types';\n\ntype updateWalletProviderKeysForVerifiedCredentialsParams = {\n keysToUpdate: Record<string, string>;\n};\n\n/** @instrumented */\nexport const updateWalletProviderKeysForVerifiedCredentials = (\n { keysToUpdate }: updateWalletProviderKeysForVerifiedCredentialsParams,\n client: DynamicClient\n) => {\n const core = getCore(client);\n\n core.state.set({\n walletProviderKeyMap: {\n ...core.state.get().walletProviderKeyMap,\n ...keysToUpdate,\n },\n });\n};\n","import type { Chain } from '../../../chain';\nimport { CHAINS_INFO_MAP } from '../../constants';\n\n/**\n * Maps the chain name from the API to the SDK chain name\n * @not-instrumented\n */\nexport const getSdkChainFromApiChainName = (\n chainName: string\n): Chain | null => {\n const chains = Object.keys(CHAINS_INFO_MAP) as Chain[];\n\n const chain = chains.find(\n (chain) => CHAINS_INFO_MAP[chain].apiChainName === chainName\n );\n\n return chain || null;\n};\n","import { getCore } from '../../../../client/core/getCore';\nimport { getDefaultClient } from '../../../../client/defaultClient';\nimport { assertDefined } from '../../../../utils/assertDefined';\nimport { getSdkChainFromApiChainName } from '../getSdkChainFromApiChainName';\nimport type { NetworkData } from '../networkProvider/networkProvider.types';\n\n/**\n * Retrieves all available network configurations from project settings.\n *\n * This function returns detailed configuration data for all networks enabled\n * in your Dynamic project, including RPC URLs, native currencies, and metadata.\n *\n * If a `transformers.networkData` callback was provided in the client configuration,\n * it will be applied to each network before returning the data. This allows you to\n * customize network properties (such as RPC URLs) in a centralized way.\n *\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns An array of network configuration data for all enabled networks.\n * @instrumented\n */\nexport const getNetworksData = (client = getDefaultClient()): NetworkData[] => {\n const core = getCore(client);\n const { state, transformers } = core;\n\n const networkDataTransformer =\n transformers?.networkData ?? ((networkData) => networkData);\n\n const { projectSettings } = state.get();\n\n assertDefined(projectSettings, 'projectSettings not found');\n\n const networks = projectSettings.networks;\n\n if (!networks) {\n return [];\n }\n\n const networksData = networks\n .map((network) => {\n if (!network.chainName) return [];\n\n const chain = getSdkChainFromApiChainName(network.chainName);\n\n if (!network?.networks?.length || !chain) return [];\n\n return network.networks.map((networkConfiguration) => {\n const networkData: NetworkData = {\n blockExplorerUrls: networkConfiguration.blockExplorerUrls,\n chain,\n cluster: networkConfiguration.cluster,\n displayName:\n networkConfiguration.vanityName || networkConfiguration.name,\n genesisHash: networkConfiguration.genesisHash,\n iconUrl: networkConfiguration.iconUrls[0],\n nativeCurrency: {\n decimals: networkConfiguration.nativeCurrency.decimals,\n iconUrl: networkConfiguration.nativeCurrency.iconUrl,\n name: networkConfiguration.nativeCurrency.name,\n symbol: networkConfiguration.nativeCurrency.symbol,\n },\n networkId: networkConfiguration.networkId,\n rpcUrls: {\n http: [\n ...(networkConfiguration.privateCustomerRpcUrls ?? []),\n ...(networkConfiguration.rpcUrls ?? []),\n ],\n },\n testnet: networkConfiguration.isTestnet ?? false,\n };\n\n return networkDataTransformer(networkData);\n });\n })\n .flat();\n\n return networksData;\n};\n","import type { Chain } from '../../../../chain';\nimport type {\n NetworkProviderBuilder,\n NetworkProviderBuilderRegistry,\n} from '../networkProviderBuilderRegistry.types';\n\n/** @not-instrumented */\nexport const createNetworkProviderBuilderRegistry =\n (): NetworkProviderBuilderRegistry => {\n const registry = new Map<Chain, NetworkProviderBuilder>();\n\n return {\n get: () => registry,\n register: (networkProviderBuilder) => {\n registry.set(networkProviderBuilder.chain, networkProviderBuilder);\n },\n };\n };\n","import { createRuntimeServiceAccessKey } from '../../../../../services/runtimeServices';\nimport { createNetworkProviderBuilderRegistry } from '../createNetworkProviderBuilderRegistry';\n\nexport const getNetworkProviderBuilderRegistry = createRuntimeServiceAccessKey(\n 'networkProviderBuilderRegistry',\n createNetworkProviderBuilderRegistry\n);\n","import type { DynamicClient } from '../../../../client/types';\nimport { getNetworksData } from '../getNetworksData';\nimport type { NetworkProvider } from '../networkProvider';\nimport { getNetworkProviderBuilderRegistry } from '../networkProviderBuilderRegistry';\n\n/**\n * Retrieves all registered network providers for enabled chains.\n * @instrumented\n */\nexport const getNetworkProviders = (\n client: DynamicClient\n): NetworkProvider[] => {\n const networkProviderBuilderRegistry =\n getNetworkProviderBuilderRegistry(client);\n\n const registeredNetworkProviderBuilders = Array.from(\n networkProviderBuilderRegistry.get().values()\n );\n\n const networksData = getNetworksData(client);\n\n const networkProviders = registeredNetworkProviderBuilders.map(\n ({ builder, chain }) => {\n const networksDataForChain = networksData.filter(\n (networkData) => networkData.chain === chain\n );\n\n return networksDataForChain.map(builder);\n }\n );\n\n return networkProviders.flat();\n};\n","import type { DynamicClient } from '../../../../client/types';\nimport { NoNetworkProvidersError } from '../../../../errors/NoNetworkProvidersError';\nimport { assertDefined } from '../../../../utils/assertDefined';\nimport type { Chain } from '../../../chain';\nimport { getNetworkProviders } from '../getNetworkProviders';\nimport type { NetworkProvider } from '../networkProvider/networkProvider.types';\n\ntype GetNetworkProviderFromNetworkIdProps = {\n chain: Chain;\n networkId: string;\n};\n\n/** @instrumented */\nexport const getNetworkProviderFromNetworkId = (\n { networkId, chain }: GetNetworkProviderFromNetworkIdProps,\n client: DynamicClient\n): NetworkProvider => {\n const networkProviders = getNetworkProviders(client);\n\n if (networkProviders.length === 0) {\n throw new NoNetworkProvidersError();\n }\n\n const networkProvider = networkProviders.find(\n (networkProvider) =>\n networkProvider.networkId === networkId && networkProvider.chain === chain\n );\n\n assertDefined(\n networkProvider,\n `No network provider found for chain ${chain} with network id ${networkId}`\n );\n\n return networkProvider;\n};\n"],"mappings":";;;;;;;;;;;;;;AAMA,MAAa,kBAAqB,MAAS,SAAY;AACrD,KAAI,OAAO,GAAG,MAAM,KAAK,CAAE,QAAO;AAElC,KACE,OAAO,SAAS,YAChB,SAAS,QACT,OAAO,SAAS,YAChB,SAAS,KAET,QAAO,SAAS;AAGlB,KAAI,gBAAgB,OAAO,gBAAgB,KAAK;AAC9C,MAAI,KAAK,SAAS,KAAK,KAAM,QAAO;AAEpC,OAAK,MAAM,CAAC,KAAK,UAAU,KACzB,KAAI,CAAC,OAAO,GAAG,OAAO,KAAK,IAAI,IAAI,CAAC,CAAE,QAAO;AAG/C,SAAO;;AAGT,KAAI,gBAAgB,OAAO,gBAAgB,KAAK;AAC9C,MAAI,KAAK,SAAS,KAAK,KAAM,QAAO;AAEpC,OAAK,MAAM,SAAS,KAClB,KAAI,CAAC,KAAK,IAAI,MAAM,CAAE,QAAO;AAE/B,SAAO;;CAGT,MAAM,QAAQ,OAAO,KAAK,KAAK;AAE/B,KAAI,MAAM,WAAW,OAAO,KAAK,KAAK,CAAC,OAAQ,QAAO;AAEtD,MAAK,MAAM,QAAQ,MACjB,KACE,CAAC,OAAO,UAAU,eAAe,KAAK,MAAM,KAAe,IAC3D,CAAC,OAAO,GAAG,KAAK,OAAkB,KAAK,MAAiB,CAExD,QAAO;AAIX,KAAI,KAAK,gBAAgB,KAAK,YAAa,QAAO;AAElD,QAAO;;;;;;;;;;;;;;;ACvCT,MAAa,yBAET,YACA,cAED,aAAqC;CACpC,IAAI,YAAY,SAAS,WAAW,KAAK,CAAC;AAE1C,QAAO,WAAW,WAAW,UAAU;EACrC,MAAM,YAAY,SAAS,MAAM;AAEjC,MAAI,eAAe,WAAW,UAAU,CAAE;AAE1C,cAAY;AAEZ,WAAS,UAAU;GACnB;;;;;;;;;ACtBN,MAAa,mCAAmD;CAC9D,SAAS,OAAO,QAAQ,aAAa,QAAQ,IAAI;CACjD,YAAY,OAAO,QAAQ,aAAa,WAAW,IAAI;CACvD,SAAS,OAAO,KAAK,UAAU,aAAa,QAAQ,KAAK,MAAM;CAChE;;;;ACJD,IAAa,oBAAb,cAAuC,UAAU;CAC/C,YAAY,EAAE,KAAK,SAAkC;AACnD,QAAM;GACJ,OAAO;GACP,MAAM;GACN,SAAS;GACT,cAAc,CAAC,QAAQ,OAAO,MAAM;GACpC,MAAM;GACN,cAAc;GACf,CAAC;;;;;;;;;;;;ACVN,MAAa,wBAAwB,UAA2B;CAC9D,MAAM,OAAO,IAAI,KAAK,MAAM;AAE5B,QAAO,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,KAAK,aAAa,KAAK;;;;;ACN1D,MAAM,cAAc;;AAGpB,MAAa,oBAAoB,UAAmB;CAClD,MAAMA,OAAoC,EAAE,OAAO;AAEnD,QAAO,KAAK,UAAU,OAAO,GAAG,UAAU;AAGxC,MAAI,qBAAqB,MAAM,CAC7B,QAAO,GAAG,cAAc;AAG1B,SAAO;GACP;;;AAIJ,MAAa,oBAAuB,UAA2C;AAC7E,KAAI;AASF,SARe,KAAK,MAAM,QAAQ,GAAG,UAAU;AAC7C,OAAI,OAAO,UAAU,YAAY,MAAM,WAAW,YAAY,CAC5D,QAAO,IAAI,KAAK,MAAM,MAAM,EAAmB,CAAC;AAGlD,UAAO;IACP;UAIK,OAAO;AACd,SAAO;;;;;;;;;;ACpBX,MAAa,iBAAiB,EAC5B,SAAS,IACT,qBACqC;CACrC,MAAM,kBAAkB,QAAiB,SAAS,GAAG,OAAO,GAAG,QAAQ;AAEvE,QAAO;EACL,SAAS,OAAO,qBAAqB;GACnC,MAAM,UAAU,MAAM,eAAe,QACnC,eAAe,iBAAiB,IAAI,CACrC;GAED,MAAM,aAAa,UAAU,iBAAiB,QAAQ,GAAG;;;;;AAMzD,OAAI,eAAe,MAAM;IACvB,MAAM,SAAS,iBAAiB,OAAO,UAAU,WAAW,MAAM;AAElE,QAAI,OAAO,QACT,QAAO,OAAO;;;;;;AASlB,SAAM,eAAe,WAAW,eAAe,iBAAiB,IAAI,CAAC;AAErE,UAAO;;EAGT,YAAY,OAAO,qBAAqB;AACtC,SAAM,eAAe,WAAW,eAAe,iBAAiB,IAAI,CAAC;;EAGvE,SAAS,OAAO,kBAAkB,UAAU;GAC1C,MAAM,SAAS,iBAAiB,OAAO,UAAU,MAAM;AAEvD,OAAI,CAAC,OAAO,QACV,OAAM,IAAI,kBAAkB;IAC1B,KAAK,iBAAiB;IACtB,OAAO,KAAK,UAAU,MAAM;IAC7B,CAAC;GAGJ,MAAM,OAAO,iBAAiB,OAAO,KAAK;AAE1C,SAAM,eAAe,QAAQ,eAAe,iBAAiB,IAAI,EAAE,KAAK;;EAE3E;;;;;;AC/DH,MAAa,0BAA6B,WAGf;AACzB,QAAO;;;;;;ACJT,MAAa,sBAAsB,OACjC,WACyB;CACzB,MAAM,OAAO,QAAQ,OAAO;CAE5B,MAAM,YAAY,MAAM,KAAK,SAAS,YAAY,UAAU;AAE5D,MAAK,MAAM,IAAI,EACb,aAAa,WACd,CAAC;AAEF,QAAO,EAAE,WAAW;;;;;;ACZtB,MAAa,kBACX,OAAO,WAAW,cAAc,SAASC;;;;;;;;ACA3C,MAAa,8BAA8B,OAAO,WAAW;;;;ACL7D,MAAa,6CACX;AAEF,MAAa,sCAAsC;AAEnD,MAAa,qCAAqC;AAElD,MAAa,oCAAoC;;;;;ACJjD,MAAa,8BAAqD;CAChE,IAAIC;CACJ,IAAIC;AAOJ,QAAO;EACL,SANc,IAAI,SAAY,UAAU,YAAY;AACpD,aAAU;AACV,YAAS;IACT;EAIA,SAAS,WAAqB,SAAS,OAAO;EAC9C,UAAU,UAAa,UAAU,MAAM;EACxC;;;;;ACdH,IAAa,mBAAb,cAAsC,UAAU;CAC9C,cAAc;AACZ,QAAM;GACJ,OAAO;GACP,MAAM;GACN,SAAS;GACT,MAAM;GACN,cAAc;GACf,CAAC;;;;;;;;;ACLN,MAAa,iCAAiC,EAAE,OAAO;CACrD,MAAM,EAAE,SAAS,EAAE,SAAS,CAAC;CAC7B,OAAO,EAAE,QAAQ;CAClB,CAAC;;;;;;;;;;;;;;;;;ACeF,MAAa,2BAA2B,EACtC,kBACsD;AAGtD,KAAI,uBAAuB,IAAI,OAAO,qBAAqB,YACzD,QAAO;EACL,WAAW;EACX,UAAU;EACV,YAAY;EACb;CAIH,MAAM,UAAU,IAAI,iBAAiB,YAAY;CACjD,MAAM,eAAe,IAAI,cAAc;CAGvC,MAAM,iBAAiB,iBAA+B;EACpD,MAAM,SAAS,+BAA+B,UAAU,aAAa,KAAK;AAE1E,MAAI,CAAC,OAAO,QAEV;EAGF,MAAM,EAAE,MAAM,UAAU,OAAO;AAC/B,eAAa,KAAK,OAAO,KAAK;;AAGhC,SAAQ,iBAAiB,WAAW,cAAc;AAElD,QAAO;EACL,MAAM,OAAO,aAAa;AACxB,gBAAa,IAAI,OAAO,SAAS;;EAGnC,KAAK,OAAO,aAAa;AACvB,gBAAa,GAAG,OAAO,SAAS;;EAGlC,OAAO,EAAE,MAAM,YAAY;AACzB,WAAQ,YAAY;IAAE;IAAM;IAAO,CAAC;;EAEvC;;;;;;;;ACpDH,MAAMC,aAAuC;CAC3C,OAAO;CACP,OAAO;CACP,MAAM;CACN,MAAM;CACP;AAGD,MAAM,iBAAiB;;;;;;AAOvB,MAAa,gBAAgB,UAA+B,EAAE,KAAa;CACzE,MAAMC,eAAmC,IAAIC,gBAAc;CAG3D,MAAMC,WAAqB,QAAQ,SAAS;CAG5C,MAAM,aAAa,UAA6B;AAC9C,SAAO,WAAW,UAAU,WAAW;;CAIzC,MAAM,iBAAiB,OAAiB,YAA4B;AAGlE,SAAO,qBAFW,IAAI,MAAM,EAAC,aAAa,CAErB,IAAI,MAAM,aAAa,CAAC,IAAI;;CAInD,MAAM,OACJ,OACA,eACA,SACA,GAAG,SACA;AACH,eAAa,KAAK,OAAO,OAAO,SAAS,GAAG,KAAK;AAEjD,MAAI,CAAC,UAAU,MAAM,CAAE;AAEvB,gBAAc,cAAc,OAAO,QAAQ,EAAE,GAAG,KAAK;;AAGvD,QAAO;EACL,QAAQ,SAAS,GAAG,SAClB,IAAI,SAAS,eAAe,OAAO,SAAS,GAAG,KAAK;EAEtD,QAAQ,SAAS,GAAG,SAClB,IAAI,SAAS,eAAe,OAAO,SAAS,GAAG,KAAK;EAEtD,OAAO,SAAS,GAAG,SACjB,IAAI,QAAQ,eAAe,MAAM,SAAS,GAAG,KAAK;EAEpD,KAAK,aAAa,IAAI,KAAK,aAAa;EAExC,IAAI,aAAa,GAAG,KAAK,aAAa;EACtC,OAAO,SAAS,GAAG,SACjB,IAAI,QAAQ,eAAe,MAAM,SAAS,GAAG,KAAK;EACrD;;;;;;;;;ACzEH,MAAa,eAAe,WAC1B,CAAC,GAAI,kBAAkB,aAAa,SAAS,IAAI,WAAW,OAAO,CAAE,CAClE,KAAK,MAAM,EAAE,SAAS,GAAG,CAAC,SAAS,GAAG,IAAI,CAAC,CAC3C,KAAK,GAAG;;;;;;;;ACHb,MAAa,wBAAwB,iBAA8B;CACjE,MAAM,oBAAoB,IAAI,WAAW,aAAa;CACtD,MAAM,MAAM,kBAAkB;CAG9B,MAAM,kBAAkB,kBAAkB,MAAM,GAAI,IAAI,QAAS,EAAE;AAGnE,iBAAgB,KAAK,IAAO,kBAAkB,MAAM,KAAK;AACzD,QAAO,gBAAgB;;;;;ACXzB,IAAa,mBAAb,cAAsC,UAAU;CAC9C,YAAY,SAAiB;AAC3B,QAAM;GACJ,OAAO;GACP,MAAM;GACN,SAAS;GACT,MAAM;GACN,cAAc,QAAQ,QAAQ;GAC/B,CAAC;;;;;;ACVN,MAAa,aAAa;;;;;ACG1B,MAAa,uBACX,IACA,YAEA,IAAI,SAAS,SAAS,WAAW;CAG/B,MAAM,UAFc,GAAG,YAAY,YAAY,YAAY,CACjC,YAAY,WAAW,CAC3B,OAAO,QAAQ;AAErC,SAAQ,kBAAkB,SAAS;AACnC,SAAQ,gBAAgB,OAAO,QAAQ,MAAe;EACtD;;;;;ACVJ,MAAa,oBACX,IACA,YAEA,IAAI,SAAS,SAAS,WAAW;CAG/B,MAAM,UAFc,GAAG,YAAY,YAAY,WAAW,CAChC,YAAY,WAAW,CAC3B,IAAI,QAAQ;AAElC,SAAQ,kBAAkB,QAAQ,QAAQ,OAAgC;AAC1E,SAAQ,gBAAgB,OAAO,QAAQ,MAAe;EACtD;;;;;ACZJ,MAAa,gBAAgB,WAC3B,IAAI,SAAS,SAAS,WAAW;CAC/B,MAAM,UAAU,UAAU,KAAK,QAAQ,EAAE;AAEzC,SAAQ,wBAAwB;EAC9B,MAAM,KAAK,QAAQ;AAEnB,MAAI,CAAC,GAAG,iBAAiB,SAAS,WAAW,CAC3C,IAAG,kBAAkB,YAAY,EAAE,SAAS,WAAW,CAAC;;AAI5D,SAAQ,kBAAkB,QAAQ,QAAQ,OAAO;AACjD,SAAQ,gBAAgB,OAAO,QAAQ,MAAe;EACtD;;;;;ACbJ,MAAa,oBACX,IACA,UAEA,IAAI,SAAS,SAAS,WAAW;CAG/B,MAAM,UAFc,GAAG,YAAY,YAAY,YAAY,CACjC,YAAY,WAAW,CAC3B,IAAI,MAAM;AAEhC,SAAQ,kBAAkB,SAAS;AACnC,SAAQ,gBAAgB,OAAO,QAAQ,MAAe;EACtD;;;;ACFJ,MAAM,kBAAkB;;AAGxB,MAAa,kCACX,WACoB;CACpB,MAAM,SAAS,QAAQ,UAAU;CAEjC,MAAM,cAAc,OAAO,YAAqC;EAC9D,MAAM,UAAU,MAAM,OAAO,OAAO,YAClC;GAAE,MAAM;GAAS,YAAY;GAAS,EACtC,OACA,CAAC,OAAO,CACT;EAQD,MAAM,eAAe,YADO,qBALP,MAAM,OAAO,OAAO,UACvC,OACA,QAAQ,UACT,CAE6D,CACT;EAErD,MAAM,KAAK,MAAM,aAAa,OAAO;AACrC,QAAM,iBAAiB,IAAI;GACzB;GACA,YAAY,QAAQ;GACpB;GACD,CAAC;AACF,KAAG,OAAO;AAEV,SAAO;;CAGT,MAAM,YAAY,OAChB,SACA,QACoB;EACpB,MAAM,aAAa,MAAM,OAAO,OAAO,UACrC,OACA,KACA;GAAE,MAAM;GAAS,YAAY;GAAS,EACtC,OACA,CAAC,OAAO,CACT;EAED,MAAM,YAAY;GAAE,KAAK,IAAI;GAAK,KAAK,IAAI;GAAK,GAAG,IAAI;GAAG,GAAG,IAAI;GAAG;EAEpE,MAAM,kBAAkB,MAAM,OAAO,OAAO,UAC1C,OACA,WACA;GAAE,MAAM;GAAS,YAAY;GAAS,EACtC,MACA,CAAC,SAAS,CACX;EAID,MAAM,eAAe,YADO,qBADP,MAAM,OAAO,OAAO,UAAU,OAAO,gBAAgB,CACZ,CACT;EAErD,MAAM,KAAK,MAAM,aAAa,OAAO;AACrC,QAAM,iBAAiB,IAAI;GACzB;GACA;GACA;GACD,CAAC;AACF,KAAG,OAAO;AAEV,SAAO;;CAGT,MAAM,eAAe,OAAO,YAA4C;EACtE,MAAM,KAAK,MAAM,aAAa,OAAO;EACrC,MAAM,QAAQ,MAAM,iBAAiB,IAAI,QAAQ;AACjD,KAAG,OAAO;AAEV,SAAO,OAAO,gBAAgB;;CAGhC,MAAM,OAAO,OAAO,SAAiB,YAAqC;EACxE,MAAM,KAAK,MAAM,aAAa,OAAO;EACrC,MAAM,QAAQ,MAAM,iBAAiB,IAAI,QAAQ;AACjD,KAAG,OAAO;AAEV,MAAI,CAAC,MACH,OAAM,IAAI,iBAAiB,QAAQ;EAIrC,MAAM,OADU,IAAI,aAAa,CACZ,OAAO,QAAQ;AAQpC,SAAO,YANW,MAAM,OAAO,OAAO,KACpC;GAAE,MAAM,EAAE,MAAM,WAAW;GAAE,MAAM;GAAS,EAC5C,MAAM,YACN,KACD,CAE4B;;CAG/B,MAAM,SAAS,OAAO,YAAsC;EAC1D,MAAM,KAAK,MAAM,aAAa,OAAO;EACrC,MAAM,QAAQ,MAAM,iBAAiB,IAAI,QAAQ;AACjD,KAAG,OAAO;AAEV,SAAO,UAAU;;CAGnB,MAAM,YAAY,OAAO,YAAmC;EAC1D,MAAM,KAAK,MAAM,aAAa,OAAO;AACrC,QAAM,oBAAoB,IAAI,QAAQ;AACtC,KAAG,OAAO;;AAGZ,QAAO;EACL;EACA;EACA;EACA;EACA;EACA;EACD;;;;;AChIH,IAAa,8BAAb,cAAiD,UAAU;CACzD,YAAY,EAAE,WAAyC;AACrD,QAAM;GACJ,OAAO;GACP,MAAM;GACN,SAAS;GACT,cAAc,CAAC,YAAY,UAAU;GACrC,MAAM;GACN,cACE;GACH,CAAC;;;;;;ACdN,IAAa,4BAAb,cAA+C,UAAU;CACvD,cAAc;AACZ,QAAM;GACJ,OAAO;GACP,MAAM;GACN,SAAS;GACT,MAAM;GACN,cACE;GACH,CAAC;;;;;;ACKN,MAAMC,+BAAwE;CAC5E,QAAQ;CACR,SAAS;CACT,WAAW;CACX,YAAY;CACZ,cAAc;CACd,QAAQ;CACR,aAAa;CACb,WAAW;CACZ;AAED,MAAM,gBAAgB,cACpB,6BAA6B,cAAc;;;;;;;;;;AAW7C,MAAa,8BAA+C;AAC1D,KAAI,uBAAuB,CACzB,QAAO;EACL,eAAe,QAAQ,SAAS;EAChC,kBAAkB;EAClB,0BAA0B;EAC1B,WAAW;EACX,UAAU;EACV,eAAe,QAAQ,SAAS;EAChC,iBAAiB,QAAQ,SAAS;EAClC,mBAAmB;EACpB;CAGH,MAAM,eAAe,IAAI,cAAgC;CACzD,MAAM,2BAAW,IAAI,KAA8B;CAEnD,MAAM,6BAAa,IAAI,SAA4E;CAEnG,IAAIC;CACJ,IAAIC,kBAA2C;CAC/C,IAAI,eAAe;CAEnB,MAAM,sBAAsB,UAAmC;AAC7D,oBAAkB;AAClB,eAAa,KAAK,yBAAyB,MAAM;;CAGnD,MAAM,sBAAsB,gBAAyC;EACnE,MAAM,WAAW,SAAS,IAAI,YAAY;AAE1C,MAAI,SACF,QAAO;AAGT,MAAI,CAAC,WACH,OAAM,IAAI,2BAA2B;EAGvC,MAAM,UAAU,WAAW,SAAS,IAAI,YAAY;AACpD,WAAS,IAAI,aAAa,QAAQ;AAElC,SAAO;;CAGT,MAAMC,UAAsC,OAAO,EAAE,aAAa;AAChE,MAAI,aACF;AAGF,iBAAe;AAEf,MAAI;GACF,MAAM,OAAO,QAAQ,OAAO;AAE5B,OAAI,YAAY;AACd,eAAW,OAAO;AAClB,aAAS,OAAO;;GAKlB,MAAM,EACJ,cAAc,kBACd,cACA,uBACE,MAAM,OAAO;AAEjB,gBAAa,IAAI,iBAAiB;IAIhC,eAAe,cAAc,aAAa;AAGxC,KAFkB,gBAAgB,EAAE,EAAE,OAAO,CAG1C,qBAAqB,EAAE,eAAe,KAAK,eAAe,CAAC,CAC3D,MAAM,aAAa;AAClB,eAAS,MAAM,SAAS,MAAM;OAC9B,CACD,OAAO,QAAiB;AAEvB,eADgB,eAAe,QAAQ,IAAI,UAAU,OAAO,IAAI,EAC9C,KAAK;OACvB;;IAEN,aAAa;IACb,SAAS;KAAE;KAAc;KAAoB;IAC9C,CAAC;AAEF,cAAW,WAAW,IAAI,gBAAgB;AACxC,uBAAmB,aAAa,YAAY,QAAQ,CAAC;KACrD;AAEF,cAAW,SAAS;YACZ;AACR,kBAAe;;;CAInB,MAAMC,mBAAkD;AACtD,MAAI,CAAC,WACH;AAGF,OAAK,MAAM,WAAW,SAAS,QAAQ,CACrC,SAAQ,QAAQ,CAAC,YAAY,GAAG;AAGlC,WAAS,OAAO;AAChB,aAAW,OAAO;AAClB,eAAa;;CAGf,MAAMC,YAA0C,OAAU,EACxD,eACA,eAII;EACJ,MAAM,UAAU,mBAAmB,cAAc,QAAQ;EAEzD,MAAMC,WAA4C,YAAY;GAC5D,MAAM,SAAS,cAAc,OAAO,UAAU,QAAQ,KAAK;AAE3D,OAAI,CAAC,OAAO,QACV;AAGF,YAAS,EAAE,MAAM,OAAO,MAAM,CAAC;;AAGjC,aAAW,IAAI,UAAU,QAAQ;AAEjC,QAAM,QAAQ,UAAU,QAAQ;;CAGlC,MAAMC,eAAkD,EACtD,eACA,eAII;EACJ,MAAM,UAAU,SAAS,IAAI,cAAc,QAAQ;AAEnD,MAAI,CAAC,QACH;EAGF,MAAM,UAAU,WAAW,IAAI,SAAS;AAExC,MAAI,SAAS;AACX,WAAQ,YAAY,QAAQ;AAC5B,cAAW,OAAO,SAAS;;;CAI/B,MAAMC,UAAsC,OAAU,EACpD,eACA,WAII;EACJ,MAAM,SAAS,cAAc,OAAO,UAAU,KAAK;AAEnD,MAAI,CAAC,OAAO,QACV,OAAM,IAAI,4BAA4B,EAAE,SAAS,cAAc,SAAS,CAAC;AAI3E,QADgB,mBAAmB,cAAc,QAAQ,CAC3C,QAAQ,WAAW,OAAO,KAAK;;AAG/C,QAAO;EACL;EACA;EACA,0BAA0B;EAC1B,MAAM,OAAO,aAAa;AACxB,gBAAa,IAAI,OAAO,SAAS;;EAEnC,KAAK,OAAO,aAAa;AACvB,gBAAa,GAAG,OAAO,SAAS;;EAElC;EACA;EACA;EACD;;;;;ACjOH,IAAa,0BAAb,cAA6C,UAAU;CACrD,cAAc;AACZ,QAAM;GACJ,OAAO;GACP,MAAM;GACN,SAAS;GACT,MAAM;GACN,cAAc;GACf,CAAC;;;;;;ACRN,IAAa,wCAAb,cAA2D,UAAU;CACnE,YAAY,EAAE,SAA6C;AACzD,QAAM;GACJ;GACA,MAAM;GACN,SAAS;GACT,MAAM;GACN,cAAc;GACf,CAAC;;;;;;;ACNN,MAAa,qBAAqB,SAAS,kBAAkB,KAAK;CAChE,MAAM,kBAAkB,OAAO;AAE/B,eAAc,iBAAiB,qCAAqC;AAEpE,QAAO,gBAAgB,SAAS,UAAU,WAAW;;;;;;;;;ACAvD,MAAa,uBACX,WACuB;CACvB,MAAM,OAAO,QAAQ,OAAO;CAE5B,MAAM,eAAe,KAAK,MAAM,KAAK,CAAC;AAEtC,KAAI,kBAAkB,OAAO,CAC3B,eAAc,cAAc,4BAA4B;AAG1D,MAAK,MAAM,IAAI,EACb,cAAc,MACf,CAAC;AAEF,QAAO,gBAAgB;;;;;;;;;;;;ACVzB,MAAa,mBACX,EAAE,gBACF,SAAS,kBAAkB,KACxB;AAGH,CAFa,QAAQ,OAAO,CAEvB,MAAM,IAAI,EACb,cACD,CAAC;;;;;;;;;;;;;;;;ACJJ,MAAa,gBACX,EAAE,gBACF,SAAS,kBAAkB,KACxB;AAGH,QAFa,QAAQ,OAAO,CAEhB,WAAW,IAAI,aAAa;;;;;;ACA1C,MAAa,cAAc,OACzB,EAAE,eAAe,WAAW,aAAa,QACzC,WACG;CACH,MAAM,OAAO,QAAQ,OAAO;CAC5B,MAAM,YAAY,gBAAgB,EAAE,EAAE,OAAO;CAE7C,MAAM,iBAAiB,mCACrB,EAAE,eAAe,EACjB,OACD;AAED,KAAI;EACF,MAAM,aAAa,6BAA6B;GAC9C,OAAO,eAAe;GACtB,aAAa,eAAe,SAAS;GACtC,CAAC;EAEF,MAAMC,iBAAiC;GACrC,SAAS,cAAc;GACvB;GAEA,OAAO,eAAe;GACtB,UAAU,eAAe;GACzB;GACD;AAED,QAAM,UAAU,YAAY;GAC1B;GACA,eAAe,KAAK;GACrB,CAAC;UACK,OAAO;AACd,OAAK,OAAO,MAAM,wBAAwB,EAAE,OAAO,CAAC;;;;;;;;;;;;AC1CxD,MAAa,+BACX,EAAE,oCACF,WACS;AACT,KAAI,iCAAiC,WAAW,EAC9C;CAGF,MAAM,OAAO,QAAQ,OAAO;CAE5B,MAAM,sCACJ,iCAAiC,KAAK,EAAE,SAAS,GAAG;CAEtD,MAAMC,mCAA8D,KAAK,MACtE,KAAK,CACL,yBAAyB,QACvB,4BACC,CAAC,oCAAoC,SACnC,wBAAwB,GACzB,CACJ;AAEH,MAAK,MAAM,IAAI,EACb,0BAA0B,CACxB,GAAG,kCACH,GAAG,iCACJ,EACF,CAAC;;;;;;;;;ACxBJ,MAAa,sBAAsB,OAAO,EACxC,QACA,gBACA,SACA,KACA,SACA,OACA,UACA,WACA,WACA,gBAC+B;CAM/B,MAAM,SAAS,CADA,GAAG,OAAO,kCAAkC,eAAe,YAClD,QAAQ,CAAC,KAAK,KAAK;CAI3C,MAAM,yBAAyB,YAAY,SAAS;CACpD,MAAM,sBAAsB,GAAG,CAAC,QAAQ,UAAU,CAAC,KACjD,uBACD,CAAC;CAEF,MAAMC,eAAyB,EAAE;AACjC,cAAa,KAAK,QAAQ,MAAM;AAChC,cAAa,KAAK,aAAa;AAC/B,KAAI,QACF,cAAa,KAAK,aAAa,UAAU;AAG3C,cAAa,KAAK,UAAU,QAAQ;AAEpC,KAAI,SACF,cAAa,KAAK,cAAc,WAAW;AAG7C,KAAI,UACF,cAAa,KAAK,eAAe,YAAY;AAG/C,KAAI,WAAW,OACb,cAAa,KACX,aAAa,UAAU,KAAK,aAAa,SAAS,SAAS,CAAC,MAAM,GACnE;AAKH,QAAO,CAAC,qBAFO,aAAa,KAAK,KAAK,CAEF,CAAC,KAAK,KAAK;;;;;;AChEjD,MAAa,gCAAgC,WAA0B;CAGrE,MAAM,UAFO,QAAQ,OAAO,CAGrB,UAAU,QAAQ,OAAO,iBAAiB,QAAQ;AAEzD,QAAO,cAAc,QAAQ,6KAA6K,QAAQ;;;;;;;;;ACGpN,MAAa,iCACX,EAAE,2BACF,WACG;CACH,MAAM,OAAO,QAAQ,OAAO;CAE5B,MAAM,gBAAgB,KAAK,MAAM,KAAK;CAEtC,MAAM,EAAE,6BAA6B,KAAK,MAAM,KAAK;CAErD,MAAM,mCAAmC,yBAAyB,QAC/D,YAAY,QAAQ,OAAO,wBAAwB,GACrD;AAED,MAAK,MAAM,IAAI,EACb,0BAA0B,kCAC3B,CAAC;;;;;AAMF,yCAAwC,EAAE,eAAe,EAAE,OAAO;;;;;;;;;AC/BpE,MAAa,WAAW,UACtB,iBAAiB;;;;;;;;ACCnB,MAAa,mBACX,OACA,SACiC;AACjC,KAAI,CAAC,QAAQ,MAAM,CAAE,QAAO;AAE5B,QAAO,UAAU,SAAS,MAAM,SAAS;;;;;;;;;;;;AC0B3C,MAAa,kCAAkC,OAC7C,EACE,eACA,eACA,oBACA,WACA,OACA,aAAa,OACb,mBACA,oBACA,WACA,mBAEF,WAC4B;CAC5B,MAAM,OAAO,QAAQ,OAAO;CAC5B,MAAM,YAAY,gBAAgB,EAAE,EAAE,OAAO;CAE7C,MAAM,aAAa,6BAA6B;EAC9C;EACA,aAAa;EACd,CAAC;CAEF,IAAI;AAEJ,KAAI,CAAC,OAAO,KAEV,qBAAoB,UAAU,cAAc,KAAK,UAAU;UAClD,WAET,qBAAoB,UAAU,eAAe,KAAK,UAAU;UACnD,OAAO,QAAQ,gBAKxB,qBAAoB,UAAU,cAAc,KAAK,UAAU;KAG3D,qBAAoB,UAAU,WAAW,KAAK,UAAU;AAG1D,KAAI;AACF,SAAO,MAAM,kBAAkB;GAC7B,eAAe,KAAK;GACpB,eAAe;IAEb,2BAA2B,oBAAoB,KAAK,aAAa;KAC/D,SAAS,QAAQ;KACjB,WAAW,QAAQ;KACnB,MAAM,QAAQ;KACf,EAAE;IACH,cAAc,oBAAoB,OAAO;IAElC;IACP;IACA,SAAS;IACT,qBAAqB;IACrB;IACA,eAAe;IACf;IACA,gBAAgB;IACjB;GACF,CAAC;UACK,OAAO;AACd,OAAK,OAAO,MAAM,gDAAgD,MAAM;AAExE,MACE,gBAAgB,OAAO,0BAA0B,IACjD,gBAAgB,OAAO,8BAA8B,CAErD,OAAM,IAAI,sCAAsC,EAC9C,OAAO,OACR,CAAC;AAGJ,QAAM;;;;;;;AC1GV,MAAa,kDACX,EAAE,gBACF,WACG;CACH,MAAM,OAAO,QAAQ,OAAO;AAE5B,MAAK,MAAM,IAAI,EACb,sBAAsB;EACpB,GAAG,KAAK,MAAM,KAAK,CAAC;EACpB,GAAG;EACJ,EACF,CAAC;;;;;;;;;ACZJ,MAAa,+BACX,cACiB;AAOjB,QANe,OAAO,KAAK,gBAAgB,CAEtB,MAClB,UAAU,gBAAgB,OAAO,iBAAiB,UACpD,IAEe;;;;;;;;;;;;;;;;;;;ACIlB,MAAa,mBAAmB,SAAS,kBAAkB,KAAoB;CAE7E,MAAM,EAAE,OAAO,iBADF,QAAQ,OAAO;CAG5B,MAAM,yBACJ,cAAc,iBAAiB,gBAAgB;CAEjD,MAAM,EAAE,oBAAoB,MAAM,KAAK;AAEvC,eAAc,iBAAiB,4BAA4B;CAE3D,MAAM,WAAW,gBAAgB;AAEjC,KAAI,CAAC,SACH,QAAO,EAAE;AAyCX,QAtCqB,SAClB,KAAK,YAAY;AAChB,MAAI,CAAC,QAAQ,UAAW,QAAO,EAAE;EAEjC,MAAM,QAAQ,4BAA4B,QAAQ,UAAU;AAE5D,MAAI,CAAC,SAAS,UAAU,UAAU,CAAC,MAAO,QAAO,EAAE;AAEnD,SAAO,QAAQ,SAAS,KAAK,yBAAyB;AAyBpD,UAAO,uBAxB0B;IAC/B,mBAAmB,qBAAqB;IACxC;IACA,SAAS,qBAAqB;IAC9B,aACE,qBAAqB,cAAc,qBAAqB;IAC1D,aAAa,qBAAqB;IAClC,SAAS,qBAAqB,SAAS;IACvC,gBAAgB;KACd,UAAU,qBAAqB,eAAe;KAC9C,SAAS,qBAAqB,eAAe;KAC7C,MAAM,qBAAqB,eAAe;KAC1C,QAAQ,qBAAqB,eAAe;KAC7C;IACD,WAAW,qBAAqB;IAChC,SAAS,EACP,MAAM,CACJ,GAAI,qBAAqB,0BAA0B,EAAE,EACrD,GAAI,qBAAqB,WAAW,EAAE,CACvC,EACF;IACD,SAAS,qBAAqB,aAAa;IAC5C,CAEyC;IAC1C;GACF,CACD,MAAM;;;;;;AClEX,MAAa,6CAC2B;CACpC,MAAM,2BAAW,IAAI,KAAoC;AAEzD,QAAO;EACL,WAAW;EACX,WAAW,2BAA2B;AACpC,YAAS,IAAI,uBAAuB,OAAO,uBAAuB;;EAErE;;;;;ACbL,MAAa,oCAAoC,8BAC/C,kCACA,qCACD;;;;;;;;ACGD,MAAa,uBACX,WACsB;CACtB,MAAM,iCACJ,kCAAkC,OAAO;CAE3C,MAAM,oCAAoC,MAAM,KAC9C,+BAA+B,KAAK,CAAC,QAAQ,CAC9C;CAED,MAAM,eAAe,gBAAgB,OAAO;AAY5C,QAVyB,kCAAkC,KACxD,EAAE,SAAS,YAAY;AAKtB,SAJ6B,aAAa,QACvC,gBAAgB,YAAY,UAAU,MACxC,CAE2B,IAAI,QAAQ;GAE3C,CAEuB,MAAM;;;;;;AClBhC,MAAa,mCACX,EAAE,WAAW,SACb,WACoB;CACpB,MAAM,mBAAmB,oBAAoB,OAAO;AAEpD,KAAI,iBAAiB,WAAW,EAC9B,OAAM,IAAI,yBAAyB;CAGrC,MAAM,kBAAkB,iBAAiB,MACtC,sBACCC,kBAAgB,cAAc,aAAaA,kBAAgB,UAAU,MACxE;AAED,eACE,iBACA,uCAAuC,MAAM,mBAAmB,YACjE;AAED,QAAO"}
@@ -1,5 +1,5 @@
1
- const require_InvalidParamError = require('./InvalidParamError-Bxg4p9zQ.cjs.js');
2
- const require_isMfaRequiredForAction = require('./isMfaRequiredForAction-DnZ2ZWUB.cjs.js');
1
+ const require_InvalidParamError = require('./InvalidParamError-6MugNXi3.cjs.js');
2
+ const require_isMfaRequiredForAction = require('./isMfaRequiredForAction-D7amEpqp.cjs.js');
3
3
 
4
4
  //#region src/modules/mfa/consumeMfaTokenIfRequiredForAction/consumeMfaTokenIfRequiredForAction.ts
5
5
  /** @instrumented */
@@ -28,13 +28,11 @@ const generateSessionSignature = async ({ sessionId }, client) => {
28
28
  //#region src/modules/sessionKeys/getSignedSessionId/getSignedSessionId.ts
29
29
  /** @instrumented */
30
30
  const getSignedSessionId = async (client) => {
31
- const core = require_InvalidParamError.getCore(client);
32
- const sessionId = core.state.get().user?.sessionId;
31
+ const sessionId = require_InvalidParamError.getCore(client).state.get().user?.sessionId;
33
32
  require_InvalidParamError.assertDefined(sessionId, "Session ID is required");
34
33
  const { signature: signedSessionId } = await generateSessionSignature({ sessionId }, client);
35
34
  require_InvalidParamError.assertDefined(signedSessionId, "Signed session ID is required");
36
- const { nonce } = await require_InvalidParamError.createApiClient({}, client).getNonce({ environmentId: core.environmentId });
37
- require_InvalidParamError.assertDefined(nonce, "Nonce is required");
35
+ const nonce = await require_InvalidParamError.getNonce(client);
38
36
  const { signature: nonceSignature } = await generateNonceSignature({ nonce }, client);
39
37
  require_InvalidParamError.assertDefined(nonceSignature, "Nonce signature is required");
40
38
  return { signature: `${signedSessionId}/${nonceSignature}/${nonce}` };
@@ -53,4 +51,4 @@ Object.defineProperty(exports, 'getSignedSessionId', {
53
51
  return getSignedSessionId;
54
52
  }
55
53
  });
56
- //# sourceMappingURL=getSignedSessionId-KSSnmfwN.cjs.js.map
54
+ //# sourceMappingURL=getSignedSessionId-BZL8lFjp.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"getSignedSessionId-BZL8lFjp.cjs.js","names":["isMfaRequiredForAction","consumeMfaToken","getCore","getCore","getCore","getNonce"],"sources":["../src/modules/mfa/consumeMfaTokenIfRequiredForAction/consumeMfaTokenIfRequiredForAction.ts","../src/modules/sessionKeys/generateNonceSignature/generateNonceSignature.ts","../src/modules/sessionKeys/generateSessionSignature/generateSessionSignature.ts","../src/modules/sessionKeys/getSignedSessionId/getSignedSessionId.ts"],"sourcesContent":["import type { MFAAction } from '@dynamic-labs/sdk-api-core';\n\nimport type { DynamicClient } from '../../../client/types/DynamicClient';\nimport { consumeMfaToken } from '../consumeMfaToken';\nimport { isMfaRequiredForAction } from '../isMfaRequiredForAction';\n\ntype ConsumeMfaTokenIfRequiredForActionParams = {\n mfaAction: MFAAction;\n};\n\n/** @instrumented */\nexport const consumeMfaTokenIfRequiredForAction = async (\n { mfaAction }: ConsumeMfaTokenIfRequiredForActionParams,\n client: DynamicClient\n): Promise<string | undefined> => {\n const isRequiredForAction = await isMfaRequiredForAction(\n { mfaAction },\n client\n );\n\n if (!isRequiredForAction) {\n return;\n }\n\n return consumeMfaToken(client);\n};\n","import { getCore } from '../../../client/core/getCore';\nimport type { DynamicClient } from '../../../client/types';\nimport { assertDefined } from '../../../utils/assertDefined';\n\ntype GenerateNonceSignatureParams = {\n nonce: string;\n};\n\n/** @not-instrumented */\nexport const generateNonceSignature = async (\n { nonce }: GenerateNonceSignatureParams,\n client: DynamicClient\n) => {\n const core = getCore(client);\n\n assertDefined(core.keychain, 'Keychain service not available');\n\n const signature = await core.keychain.sign('session', nonce);\n\n return { signature };\n};\n","import { getCore } from '../../../client/core/getCore';\nimport type { DynamicClient } from '../../../client/types';\n\ntype GenerateSessionSignatureParams = {\n sessionId: string;\n};\n\n/** @not-instrumented */\nexport const generateSessionSignature = async (\n { sessionId }: GenerateSessionSignatureParams,\n client: DynamicClient\n) => {\n const core = getCore(client);\n\n const signature = await core.keychain.sign('session', sessionId);\n\n return { signature };\n};\n","import { getCore } from '../../../client/core/getCore';\nimport type { DynamicClient } from '../../../client/types';\nimport { assertDefined } from '../../../utils/assertDefined';\nimport { getNonce } from '../../../utils/getNonce';\nimport { generateNonceSignature } from '../generateNonceSignature';\nimport { generateSessionSignature } from '../generateSessionSignature';\n\n/** @instrumented */\nexport const getSignedSessionId = async (client: DynamicClient) => {\n const core = getCore(client);\n\n const sessionId = core.state.get().user?.sessionId;\n assertDefined(sessionId, 'Session ID is required');\n\n const { signature: signedSessionId } = await generateSessionSignature(\n {\n sessionId,\n },\n client\n );\n\n assertDefined(signedSessionId, 'Signed session ID is required');\n\n const nonce = await getNonce(client);\n\n const { signature: nonceSignature } = await generateNonceSignature(\n {\n nonce,\n },\n client\n );\n\n assertDefined(nonceSignature, 'Nonce signature is required');\n\n const signature = `${signedSessionId}/${nonceSignature}/${nonce}`;\n\n return { signature };\n};\n"],"mappings":";;;;;AAWA,MAAa,qCAAqC,OAChD,EAAE,aACF,WACgC;AAMhC,KAAI,CALwB,MAAMA,sDAChC,EAAE,WAAW,EACb,OACD,CAGC;AAGF,QAAOC,+CAAgB,OAAO;;;;;;ACfhC,MAAa,yBAAyB,OACpC,EAAE,SACF,WACG;CACH,MAAM,OAAOC,kCAAQ,OAAO;AAE5B,yCAAc,KAAK,UAAU,iCAAiC;AAI9D,QAAO,EAAE,WAFS,MAAM,KAAK,SAAS,KAAK,WAAW,MAAM,EAExC;;;;;;ACXtB,MAAa,2BAA2B,OACtC,EAAE,aACF,WACG;AAKH,QAAO,EAAE,WAFS,MAFLC,kCAAQ,OAAO,CAEC,SAAS,KAAK,WAAW,UAAU,EAE5C;;;;;;ACRtB,MAAa,qBAAqB,OAAO,WAA0B;CAGjE,MAAM,YAFOC,kCAAQ,OAAO,CAEL,MAAM,KAAK,CAAC,MAAM;AACzC,yCAAc,WAAW,yBAAyB;CAElD,MAAM,EAAE,WAAW,oBAAoB,MAAM,yBAC3C,EACE,WACD,EACD,OACD;AAED,yCAAc,iBAAiB,gCAAgC;CAE/D,MAAM,QAAQ,MAAMC,mCAAS,OAAO;CAEpC,MAAM,EAAE,WAAW,mBAAmB,MAAM,uBAC1C,EACE,OACD,EACD,OACD;AAED,yCAAc,gBAAgB,8BAA8B;AAI5D,QAAO,EAAE,WAFS,GAAG,gBAAgB,GAAG,eAAe,GAAG,SAEtC"}