@dynamic-labs-sdk/client 0.25.0 → 0.25.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/android/build.gradle +71 -0
- package/android/src/main/java/xyz/dynamic/client/DynamicClientPackage.kt +42 -0
- package/android/src/main/java/xyz/dynamic/client/keychain/KeyStoreKeyManager.kt +147 -0
- package/android/src/main/java/xyz/dynamic/client/keychain/KeychainModule.kt +85 -0
- package/android/src/main/java/xyz/dynamic/client/manifest/ReactNativeManifestModule.kt +25 -0
- package/dist/{InvalidParamError-B5NwKSKU.native.esm.js → InvalidParamError-BDHw6nr1.native.esm.js} +7 -6
- package/dist/InvalidParamError-BDHw6nr1.native.esm.js.map +1 -0
- package/dist/{InvalidParamError-D-d-UfBL.cjs.js → InvalidParamError-BqDEZ6er.cjs.js} +3 -3
- package/dist/InvalidParamError-BqDEZ6er.cjs.js.map +1 -0
- package/dist/{InvalidParamError-BiVmL7nM.esm.js → InvalidParamError-DcN56mC-.esm.js} +2 -2
- package/dist/InvalidParamError-DcN56mC-.esm.js.map +1 -0
- package/dist/{NotWaasWalletAccountError-BX5lUnKT.native.esm.js → NotWaasWalletAccountError-B_TYSgak.native.esm.js} +3 -3
- package/dist/{NotWaasWalletAccountError-BX5lUnKT.native.esm.js.map → NotWaasWalletAccountError-B_TYSgak.native.esm.js.map} +1 -1
- package/dist/{NotWaasWalletAccountError-Bo4VhW4n.esm.js → NotWaasWalletAccountError-CQ7CMol4.esm.js} +3 -3
- package/dist/{NotWaasWalletAccountError-Bo4VhW4n.esm.js.map → NotWaasWalletAccountError-CQ7CMol4.esm.js.map} +1 -1
- package/dist/{NotWaasWalletAccountError-BJaemI4V.cjs.js → NotWaasWalletAccountError-ftYfHk_N.cjs.js} +3 -3
- package/dist/{NotWaasWalletAccountError-BJaemI4V.cjs.js.map → NotWaasWalletAccountError-ftYfHk_N.cjs.js.map} +1 -1
- package/dist/core.cjs.js +36 -6
- package/dist/core.cjs.js.map +1 -1
- package/dist/core.esm.js +34 -6
- package/dist/core.esm.js.map +1 -1
- package/dist/core.native.esm.js +46 -6
- package/dist/core.native.esm.js.map +1 -1
- package/dist/errors/NativeModuleNotLinkedError.d.ts +9 -0
- package/dist/errors/NativeModuleNotLinkedError.d.ts.map +1 -0
- package/dist/errors/ReactNativeOnlyError.d.ts +9 -0
- package/dist/errors/ReactNativeOnlyError.d.ts.map +1 -0
- package/dist/exports/core.d.ts +8 -2
- package/dist/exports/core.d.ts.map +1 -1
- package/dist/{getNetworkProviderFromNetworkId-5dK99mQR.esm.js → getNetworkProviderFromNetworkId-BRWuk0I8.native.esm.js} +408 -153
- package/dist/getNetworkProviderFromNetworkId-BRWuk0I8.native.esm.js.map +1 -0
- package/dist/{getNetworkProviderFromNetworkId-DWOYr3uv.native.esm.js → getNetworkProviderFromNetworkId-COHxfpo-.esm.js} +273 -46
- package/dist/getNetworkProviderFromNetworkId-COHxfpo-.esm.js.map +1 -0
- package/dist/{getNetworkProviderFromNetworkId-Cl2XDWo9.cjs.js → getNetworkProviderFromNetworkId-ClfETwqS.cjs.js} +302 -51
- package/dist/getNetworkProviderFromNetworkId-ClfETwqS.cjs.js.map +1 -0
- package/dist/{getSignedSessionId-DakTrfSz.esm.js → getSignedSessionId-B6ry-rvs.esm.js} +3 -3
- package/dist/{getSignedSessionId-DakTrfSz.esm.js.map → getSignedSessionId-B6ry-rvs.esm.js.map} +1 -1
- package/dist/{getSignedSessionId-BbhZjeRt.cjs.js → getSignedSessionId-Bkw9TATj.cjs.js} +3 -3
- package/dist/{getSignedSessionId-BbhZjeRt.cjs.js.map → getSignedSessionId-Bkw9TATj.cjs.js.map} +1 -1
- package/dist/{getSignedSessionId-Dk3_TQLq.native.esm.js → getSignedSessionId-C58DvQAd.native.esm.js} +3 -3
- package/dist/{getSignedSessionId-Dk3_TQLq.native.esm.js.map → getSignedSessionId-C58DvQAd.native.esm.js.map} +1 -1
- package/dist/{getVerifiedCredentialForWalletAccount-BDvkZbtb.cjs.js → getVerifiedCredentialForWalletAccount-DEiU9FZG.cjs.js} +11 -10
- package/dist/getVerifiedCredentialForWalletAccount-DEiU9FZG.cjs.js.map +1 -0
- package/dist/{getVerifiedCredentialForWalletAccount-ByUSFAHs.esm.js → getVerifiedCredentialForWalletAccount-DP4VQBly.esm.js} +10 -9
- package/dist/getVerifiedCredentialForWalletAccount-DP4VQBly.esm.js.map +1 -0
- package/dist/{getVerifiedCredentialForWalletAccount-Dhqf6Tdl.native.esm.js → getVerifiedCredentialForWalletAccount-d_bHvLLE.native.esm.js} +10 -9
- package/dist/getVerifiedCredentialForWalletAccount-d_bHvLLE.native.esm.js.map +1 -0
- package/dist/index.cjs.js +75 -276
- package/dist/index.cjs.js.map +1 -1
- package/dist/index.esm.js +71 -272
- package/dist/index.esm.js.map +1 -1
- package/dist/index.native.esm.js +71 -272
- package/dist/index.native.esm.js.map +1 -1
- package/dist/{isMfaRequiredForAction-y15A_lhP.native.esm.js → isMfaRequiredForAction-Cjbuyen3.native.esm.js} +2 -2
- package/dist/{isMfaRequiredForAction-y15A_lhP.native.esm.js.map → isMfaRequiredForAction-Cjbuyen3.native.esm.js.map} +1 -1
- package/dist/{isMfaRequiredForAction-SFbQW5j5.esm.js → isMfaRequiredForAction-D8GPFYzv.esm.js} +2 -2
- package/dist/{isMfaRequiredForAction-SFbQW5j5.esm.js.map → isMfaRequiredForAction-D8GPFYzv.esm.js.map} +1 -1
- package/dist/{isMfaRequiredForAction-CYrluCK-.cjs.js → isMfaRequiredForAction-mZub0YwI.cjs.js} +2 -2
- package/dist/{isMfaRequiredForAction-CYrluCK-.cjs.js.map → isMfaRequiredForAction-mZub0YwI.cjs.js.map} +1 -1
- package/dist/modules/auth/externalAuth/requestExternalAuthElevatedToken/requestExternalAuthElevatedToken.d.ts.map +1 -1
- package/dist/modules/auth/initializeAuth/initializeAuth.d.ts +1 -1
- package/dist/modules/auth/initializeAuth/setLongTimeout/setLongTimeout.d.ts +8 -2
- package/dist/modules/auth/initializeAuth/setLongTimeout/setLongTimeout.d.ts.map +1 -1
- package/dist/modules/auth/logout/logout.d.ts +1 -1
- package/dist/modules/auth/logout/logout.d.ts.map +1 -1
- package/dist/modules/auth/logoutReason.d.ts +4 -7
- package/dist/modules/auth/logoutReason.d.ts.map +1 -1
- package/dist/modules/auth/logoutWithReason/index.d.ts +2 -0
- package/dist/modules/auth/logoutWithReason/index.d.ts.map +1 -0
- package/dist/modules/auth/logoutWithReason/logoutWithReason.d.ts +24 -0
- package/dist/modules/auth/logoutWithReason/logoutWithReason.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/authenticateWithSocial/buildOAuthUrl/addOAuthUrlParams/addOAuthUrlParams.d.ts +7 -4
- package/dist/modules/auth/social/oauth/authenticateWithSocial/buildOAuthUrl/addOAuthUrlParams/addOAuthUrlParams.d.ts.map +1 -1
- package/dist/modules/auth/social/oauth/authenticateWithSocial/buildOAuthUrl/buildOAuthUrl.d.ts.map +1 -1
- package/dist/modules/auth/updateAuthFromVerifyResponse/elevatedAccessTokens/parseElevatedAccessToken/parseElevatedAccessToken.d.ts +6 -4
- package/dist/modules/auth/updateAuthFromVerifyResponse/elevatedAccessTokens/parseElevatedAccessToken/parseElevatedAccessToken.d.ts.map +1 -1
- package/dist/modules/auth/updateAuthFromVerifyResponse/updateAuthFromVerifyResponse.d.ts.map +1 -1
- package/dist/modules/initializeClient/initializeClient.d.ts.map +1 -1
- package/dist/modules/instrumentation/setInstrumentationEnabled/setInstrumentationEnabled.d.ts +6 -2
- package/dist/modules/instrumentation/setInstrumentationEnabled/setInstrumentationEnabled.d.ts.map +1 -1
- package/dist/modules/legacyWalletBook/getWalletConnectCatalog/shouldFilterWallet/shouldFilterWallet.d.ts +9 -5
- package/dist/modules/legacyWalletBook/getWalletConnectCatalog/shouldFilterWallet/shouldFilterWallet.d.ts.map +1 -1
- package/dist/modules/storageSync/schema.d.ts.map +1 -1
- package/dist/modules/user/deleteUser/deleteUser.d.ts +1 -1
- package/dist/modules/wallets/utils/isSameAddress/isSameAddress.d.ts +9 -1
- package/dist/modules/wallets/utils/isSameAddress/isSameAddress.d.ts.map +1 -1
- package/dist/modules/wallets/utils/normalizeAddress/normalizeAddress.d.ts +7 -1
- package/dist/modules/wallets/utils/normalizeAddress/normalizeAddress.d.ts.map +1 -1
- package/dist/modules/wallets/verifyWalletAccountForSignInOrTransfer/verifyWalletAccountForSignInOrTransfer.d.ts.map +1 -1
- package/dist/services/keychain/createKeychainService/ImportKeyNotSupportedError.d.ts +5 -0
- package/dist/services/keychain/createKeychainService/ImportKeyNotSupportedError.d.ts.map +1 -0
- package/dist/services/keychain/createKeychainService/KeyNotFoundError.d.ts.map +1 -0
- package/dist/services/keychain/createKeychainService/createKeychainService.d.ts +4 -0
- package/dist/services/keychain/createKeychainService/createKeychainService.d.ts.map +1 -0
- package/dist/services/keychain/createKeychainService/createKeychainService.types.d.ts +11 -0
- package/dist/services/keychain/createKeychainService/createKeychainService.types.d.ts.map +1 -0
- package/dist/services/keychain/createKeychainService/index.d.ts +2 -0
- package/dist/services/keychain/createKeychainService/index.d.ts.map +1 -0
- package/dist/services/keychain/createKeychainService/utils/constants.d.ts.map +1 -0
- package/dist/services/keychain/createKeychainService/utils/deleteIndexedDBItem.d.ts +9 -0
- package/dist/services/keychain/createKeychainService/utils/deleteIndexedDBItem.d.ts.map +1 -0
- package/dist/services/keychain/createKeychainService/utils/getIndexedDBItem.d.ts +10 -0
- package/dist/services/keychain/createKeychainService/utils/getIndexedDBItem.d.ts.map +1 -0
- package/dist/services/keychain/createKeychainService/utils/openDatabase.d.ts.map +1 -0
- package/dist/services/keychain/createKeychainService/utils/setIndexedDBItem.d.ts +10 -0
- package/dist/services/keychain/createKeychainService/utils/setIndexedDBItem.d.ts.map +1 -0
- package/dist/services/keychain/createKeychainService/utils/withDatabase/index.d.ts.map +1 -0
- package/dist/services/keychain/createKeychainService/utils/withDatabase/withDatabase.d.ts.map +1 -0
- package/dist/services/keychain/index.d.ts +1 -1
- package/dist/services/keychain/index.d.ts.map +1 -1
- package/dist/services/nativeManifest/getReactNativeManifest/getReactNativeManifest.d.ts +11 -0
- package/dist/services/nativeManifest/getReactNativeManifest/getReactNativeManifest.d.ts.map +1 -0
- package/dist/services/nativeManifest/getReactNativeManifest/index.d.ts +2 -0
- package/dist/services/nativeManifest/getReactNativeManifest/index.d.ts.map +1 -0
- package/dist/services/nativeManifest/nativeManifest.types.d.ts +14 -0
- package/dist/services/nativeManifest/nativeManifest.types.d.ts.map +1 -0
- package/dist/services/storage/createLocalStorageAdapter/createLocalStorageAdapter.d.ts +2 -2
- package/dist/services/storage/createStorage/createStorage.d.ts +4 -2
- package/dist/services/storage/createStorage/createStorage.d.ts.map +1 -1
- package/dist/services/storage/createStorageKeySchema/createStorageKeySchema.d.ts +2 -1
- package/dist/services/storage/createStorageKeySchema/createStorageKeySchema.d.ts.map +1 -1
- package/dist/services/storage/index.d.ts +1 -1
- package/dist/services/storage/index.d.ts.map +1 -1
- package/dist/services/storage/storage.types.d.ts +27 -3
- package/dist/services/storage/storage.types.d.ts.map +1 -1
- package/dist/tsconfig.lib.tsbuildinfo +1 -1
- package/dist/utils/base64urlFromBytes/base64urlFromBytes.d.ts +8 -0
- package/dist/utils/base64urlFromBytes/base64urlFromBytes.d.ts.map +1 -0
- package/dist/utils/base64urlFromBytes/index.d.ts +2 -0
- package/dist/utils/base64urlFromBytes/index.d.ts.map +1 -0
- package/dist/utils/bytesFromBase64url/bytesFromBase64url.d.ts +8 -0
- package/dist/utils/bytesFromBase64url/bytesFromBase64url.d.ts.map +1 -0
- package/dist/utils/bytesFromBase64url/index.d.ts +2 -0
- package/dist/utils/bytesFromBase64url/index.d.ts.map +1 -0
- package/dist/utils/derToP1363/InvalidDERSignatureError.d.ts +5 -0
- package/dist/utils/derToP1363/InvalidDERSignatureError.d.ts.map +1 -0
- package/dist/utils/derToP1363/derToP1363.d.ts +8 -0
- package/dist/utils/derToP1363/derToP1363.d.ts.map +1 -0
- package/dist/utils/derToP1363/index.d.ts +2 -0
- package/dist/utils/derToP1363/index.d.ts.map +1 -0
- package/dist/utils/randomString/randomString.d.ts +1 -1
- package/dist/utils/randomString/randomString.d.ts.map +1 -1
- package/dist/waas.cjs.js +4 -4
- package/dist/waas.esm.js +3 -3
- package/dist/waas.native.esm.js +3 -3
- package/dist/waasCore.cjs.js +4 -4
- package/dist/waasCore.cjs.js.map +1 -1
- package/dist/waasCore.esm.js +3 -3
- package/dist/waasCore.esm.js.map +1 -1
- package/dist/waasCore.native.esm.js +3 -3
- package/dist/waasCore.native.esm.js.map +1 -1
- package/dynamic-labs-sdk-client.podspec +27 -0
- package/ios/Keychain.h +4 -0
- package/ios/Keychain.mm +101 -0
- package/ios/ReactNativeManifest.h +4 -0
- package/ios/ReactNativeManifest.mm +45 -0
- package/ios/ReactNativeManifestImpl.swift +20 -0
- package/ios/SecureEnclaveKeyManager.swift +180 -0
- package/package.json +34 -4
- package/react-native.config.cjs +14 -0
- package/dist/InvalidParamError-B5NwKSKU.native.esm.js.map +0 -1
- package/dist/InvalidParamError-BiVmL7nM.esm.js.map +0 -1
- package/dist/InvalidParamError-D-d-UfBL.cjs.js.map +0 -1
- package/dist/getNetworkProviderFromNetworkId-5dK99mQR.esm.js.map +0 -1
- package/dist/getNetworkProviderFromNetworkId-Cl2XDWo9.cjs.js.map +0 -1
- package/dist/getNetworkProviderFromNetworkId-DWOYr3uv.native.esm.js.map +0 -1
- package/dist/getVerifiedCredentialForWalletAccount-BDvkZbtb.cjs.js.map +0 -1
- package/dist/getVerifiedCredentialForWalletAccount-ByUSFAHs.esm.js.map +0 -1
- package/dist/getVerifiedCredentialForWalletAccount-Dhqf6Tdl.native.esm.js.map +0 -1
- package/dist/modules/auth/handleSessionExpiration/handleSessionExpiration.d.ts +0 -11
- package/dist/modules/auth/handleSessionExpiration/handleSessionExpiration.d.ts.map +0 -1
- package/dist/modules/auth/handleSessionExpiration/index.d.ts +0 -2
- package/dist/modules/auth/handleSessionExpiration/index.d.ts.map +0 -1
- package/dist/modules/auth/performLogout/index.d.ts +0 -2
- package/dist/modules/auth/performLogout/index.d.ts.map +0 -1
- package/dist/modules/auth/performLogout/performLogout.d.ts +0 -12
- package/dist/modules/auth/performLogout/performLogout.d.ts.map +0 -1
- package/dist/services/keychain/createIndexedDBKeychainService/KeyNotFoundError.d.ts.map +0 -1
- package/dist/services/keychain/createIndexedDBKeychainService/createIndexedDBKeychainService.d.ts +0 -8
- package/dist/services/keychain/createIndexedDBKeychainService/createIndexedDBKeychainService.d.ts.map +0 -1
- package/dist/services/keychain/createIndexedDBKeychainService/createIndexedDBKeychainService.types.d.ts +0 -6
- package/dist/services/keychain/createIndexedDBKeychainService/createIndexedDBKeychainService.types.d.ts.map +0 -1
- package/dist/services/keychain/createIndexedDBKeychainService/index.d.ts +0 -2
- package/dist/services/keychain/createIndexedDBKeychainService/index.d.ts.map +0 -1
- package/dist/services/keychain/createIndexedDBKeychainService/utils/constants.d.ts.map +0 -1
- package/dist/services/keychain/createIndexedDBKeychainService/utils/deleteIndexedDBItem.d.ts +0 -3
- package/dist/services/keychain/createIndexedDBKeychainService/utils/deleteIndexedDBItem.d.ts.map +0 -1
- package/dist/services/keychain/createIndexedDBKeychainService/utils/getIndexedDBItem.d.ts +0 -4
- package/dist/services/keychain/createIndexedDBKeychainService/utils/getIndexedDBItem.d.ts.map +0 -1
- package/dist/services/keychain/createIndexedDBKeychainService/utils/openDatabase.d.ts.map +0 -1
- package/dist/services/keychain/createIndexedDBKeychainService/utils/setIndexedDBItem.d.ts +0 -4
- package/dist/services/keychain/createIndexedDBKeychainService/utils/setIndexedDBItem.d.ts.map +0 -1
- package/dist/services/keychain/createIndexedDBKeychainService/utils/withDatabase/index.d.ts.map +0 -1
- package/dist/services/keychain/createIndexedDBKeychainService/utils/withDatabase/withDatabase.d.ts.map +0 -1
- /package/dist/services/keychain/{createIndexedDBKeychainService → createKeychainService}/KeyNotFoundError.d.ts +0 -0
- /package/dist/services/keychain/{createIndexedDBKeychainService → createKeychainService}/utils/constants.d.ts +0 -0
- /package/dist/services/keychain/{createIndexedDBKeychainService → createKeychainService}/utils/openDatabase.d.ts +0 -0
- /package/dist/services/keychain/{createIndexedDBKeychainService → createKeychainService}/utils/withDatabase/index.d.ts +0 -0
- /package/dist/services/keychain/{createIndexedDBKeychainService → createKeychainService}/utils/withDatabase/withDatabase.d.ts +0 -0
package/dist/index.cjs.js
CHANGED
|
@@ -1,8 +1,8 @@
|
|
|
1
|
-
const require_getNetworkProviderFromNetworkId = require('./getNetworkProviderFromNetworkId-
|
|
2
|
-
const require_InvalidParamError = require('./InvalidParamError-
|
|
3
|
-
const require_getVerifiedCredentialForWalletAccount = require('./getVerifiedCredentialForWalletAccount-
|
|
4
|
-
const require_NotWaasWalletAccountError = require('./NotWaasWalletAccountError-
|
|
5
|
-
const require_isMfaRequiredForAction = require('./isMfaRequiredForAction-
|
|
1
|
+
const require_getNetworkProviderFromNetworkId = require('./getNetworkProviderFromNetworkId-ClfETwqS.cjs.js');
|
|
2
|
+
const require_InvalidParamError = require('./InvalidParamError-BqDEZ6er.cjs.js');
|
|
3
|
+
const require_getVerifiedCredentialForWalletAccount = require('./getVerifiedCredentialForWalletAccount-DEiU9FZG.cjs.js');
|
|
4
|
+
const require_NotWaasWalletAccountError = require('./NotWaasWalletAccountError-ftYfHk_N.cjs.js');
|
|
5
|
+
const require_isMfaRequiredForAction = require('./isMfaRequiredForAction-mZub0YwI.cjs.js');
|
|
6
6
|
let _dynamic_labs_sdk_assert_package_version = require("@dynamic-labs-sdk/assert-package-version");
|
|
7
7
|
let _dynamic_labs_sdk_api_core = require("@dynamic-labs/sdk-api-core");
|
|
8
8
|
let zod_mini = require("zod/mini");
|
|
@@ -35,113 +35,6 @@ const prefetchNoncesIfNeeded = async (client) => {
|
|
|
35
35
|
await require_InvalidParamError.fetchAndStoreNonces(client);
|
|
36
36
|
};
|
|
37
37
|
|
|
38
|
-
//#endregion
|
|
39
|
-
//#region src/utils/retryOnFail/InvalidRetryOnFailCallError.ts
|
|
40
|
-
/**
|
|
41
|
-
* This error is thrown when the `retryOnFail` function is called with an invalid
|
|
42
|
-
* number of retries (i.e. less than 0).
|
|
43
|
-
*/
|
|
44
|
-
var InvalidRetryOnFailCallError = class extends require_InvalidParamError.BaseError {
|
|
45
|
-
constructor(maxRetries) {
|
|
46
|
-
super({
|
|
47
|
-
cause: null,
|
|
48
|
-
code: "invalid_retry_on_fail_call_error",
|
|
49
|
-
docsUrl: null,
|
|
50
|
-
name: "InvalidRetryOnFailCallError",
|
|
51
|
-
shortMessage: `Invalid retries parameter for retryOnFail call: ${maxRetries}`
|
|
52
|
-
});
|
|
53
|
-
}
|
|
54
|
-
};
|
|
55
|
-
|
|
56
|
-
//#endregion
|
|
57
|
-
//#region src/utils/retryOnFail/retryOnFail.ts
|
|
58
|
-
/** @not-instrumented */
|
|
59
|
-
const retryOnFail = async ({ delay = 0, fn, maxRetries }) => {
|
|
60
|
-
for (let retry = 0; retry <= maxRetries; retry++) try {
|
|
61
|
-
return await fn();
|
|
62
|
-
} catch (error) {
|
|
63
|
-
if (retry >= maxRetries) throw error;
|
|
64
|
-
if (delay > 0) await new Promise((resolve) => setTimeout(resolve, delay));
|
|
65
|
-
}
|
|
66
|
-
/**
|
|
67
|
-
* Reaching this point should never happen and this
|
|
68
|
-
* error is thrown to help us debug the issue.
|
|
69
|
-
*/
|
|
70
|
-
throw new InvalidRetryOnFailCallError(maxRetries);
|
|
71
|
-
};
|
|
72
|
-
|
|
73
|
-
//#endregion
|
|
74
|
-
//#region src/modules/auth/isSignedIn/isSignedIn.ts
|
|
75
|
-
/**
|
|
76
|
-
* Checks if the user is currently signed in to the Dynamic client.
|
|
77
|
-
*
|
|
78
|
-
* The client is considered to be in a signed in state if a user has
|
|
79
|
-
* authenticated or if the client has at least one wallet connected.
|
|
80
|
-
*
|
|
81
|
-
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
82
|
-
* @returns True if the user is signed in, false otherwise.
|
|
83
|
-
* @not-instrumented
|
|
84
|
-
*/
|
|
85
|
-
const isSignedIn = (client = require_InvalidParamError.getDefaultClient()) => Boolean(client.user || require_getVerifiedCredentialForWalletAccount.__getWalletAccounts_wrapped(client).length > 0);
|
|
86
|
-
|
|
87
|
-
//#endregion
|
|
88
|
-
//#region src/modules/projectSettings/fetchProjectSettings/projectSettingsExpirationScheme.ts
|
|
89
|
-
/**
|
|
90
|
-
* The schema to track the expiration time of the project settings.
|
|
91
|
-
*/
|
|
92
|
-
const projectSettingsExpirationStorageKeySchema = require_getNetworkProviderFromNetworkId.__createStorageKeySchema_wrapped({
|
|
93
|
-
key: "projectSettingsExpiration",
|
|
94
|
-
schema: zod_mini.number()
|
|
95
|
-
});
|
|
96
|
-
|
|
97
|
-
//#endregion
|
|
98
|
-
//#region src/modules/projectSettings/fetchProjectSettings/fetchProjectSettings.ts
|
|
99
|
-
/**
|
|
100
|
-
* Expiration time of the project settings in milliseconds.
|
|
101
|
-
*/
|
|
102
|
-
const PROJECT_SETTINGS_EXPIRATION_TIME = 1e3 * 60 * 5;
|
|
103
|
-
/**
|
|
104
|
-
* Fetches and updates the project settings from the API.
|
|
105
|
-
*
|
|
106
|
-
* This function retrieves the latest project configuration settings
|
|
107
|
-
* from Dynamic's servers, including authentication options, enabled chains,
|
|
108
|
-
* and security configurations. The settings are cached for performance.
|
|
109
|
-
*
|
|
110
|
-
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
111
|
-
* @returns A promise that resolves to the updated project settings.
|
|
112
|
-
* @instrumented
|
|
113
|
-
*/
|
|
114
|
-
const fetchProjectSettings = async (client = require_InvalidParamError.getDefaultClient()) => {
|
|
115
|
-
const core = require_InvalidParamError.getCore(client);
|
|
116
|
-
const currentExpiration = await core.storage.getItem(projectSettingsExpirationStorageKeySchema);
|
|
117
|
-
if (Boolean(client.projectSettings) && !(currentExpiration && currentExpiration < Date.now()) && isSignedIn(client)) return client.projectSettings;
|
|
118
|
-
const apiClient = require_InvalidParamError.__createApiClient_wrapped({}, client);
|
|
119
|
-
core.logger.debug("[fetchProjectSettings] Fetching project settings...");
|
|
120
|
-
const doFetch = async () => apiClient.getEnvironmentSettings({
|
|
121
|
-
environmentId: core.environmentId,
|
|
122
|
-
sdkVersion: `${require_InvalidParamError.CLIENT_SDK_NAME}/${core.version}`
|
|
123
|
-
}, { credentials: "omit" });
|
|
124
|
-
const projectSettings = await retryOnFail({
|
|
125
|
-
fn: doFetch,
|
|
126
|
-
maxRetries: 2
|
|
127
|
-
});
|
|
128
|
-
core.state.set({ projectSettings: projectSettings ?? null });
|
|
129
|
-
await core.storage.setItem(projectSettingsExpirationStorageKeySchema, Date.now() + PROJECT_SETTINGS_EXPIRATION_TIME);
|
|
130
|
-
return projectSettings;
|
|
131
|
-
};
|
|
132
|
-
const __fetchProjectSettings_impl = fetchProjectSettings;
|
|
133
|
-
const __fetchProjectSettings_wrapped = require_InvalidParamError.instrumentFunction({
|
|
134
|
-
fn: __fetchProjectSettings_impl,
|
|
135
|
-
functionName: "fetchProjectSettings",
|
|
136
|
-
getCore: () => {
|
|
137
|
-
try {
|
|
138
|
-
return require_InvalidParamError.getCore(require_InvalidParamError.getDefaultClient());
|
|
139
|
-
} catch {
|
|
140
|
-
return;
|
|
141
|
-
}
|
|
142
|
-
}
|
|
143
|
-
});
|
|
144
|
-
|
|
145
38
|
//#endregion
|
|
146
39
|
//#region src/services/runtimeServices/createRuntimeServices/createRuntimeServices.ts
|
|
147
40
|
/**
|
|
@@ -159,124 +52,13 @@ const createRuntimeServices = () => {
|
|
|
159
52
|
};
|
|
160
53
|
};
|
|
161
54
|
|
|
162
|
-
//#endregion
|
|
163
|
-
//#region src/modules/wallets/utils/getAvailableWalletProvidersFromWalletAccounts/getAvailableWalletProvidersFromWalletAccounts.ts
|
|
164
|
-
/** @not-instrumented */
|
|
165
|
-
const getAvailableWalletProvidersFromWalletAccounts = (client) => {
|
|
166
|
-
const core = require_InvalidParamError.getCore(client);
|
|
167
|
-
const walletProvidersMap = /* @__PURE__ */ new Map();
|
|
168
|
-
require_getVerifiedCredentialForWalletAccount.__getWalletAccounts_wrapped(client).forEach((walletAccount) => {
|
|
169
|
-
if (walletProvidersMap.has(walletAccount.walletProviderKey)) return;
|
|
170
|
-
try {
|
|
171
|
-
const walletProvider = require_getVerifiedCredentialForWalletAccount.__getWalletProviderFromWalletAccount_wrapped({ walletAccount }, client);
|
|
172
|
-
walletProvidersMap.set(walletAccount.walletProviderKey, walletProvider);
|
|
173
|
-
} catch (error) {
|
|
174
|
-
core.logger.debug("Wallet provider not found for wallet account", {
|
|
175
|
-
error,
|
|
176
|
-
walletAccount: walletAccount.address
|
|
177
|
-
});
|
|
178
|
-
}
|
|
179
|
-
});
|
|
180
|
-
return Array.from(walletProvidersMap.values());
|
|
181
|
-
};
|
|
182
|
-
|
|
183
|
-
//#endregion
|
|
184
|
-
//#region src/modules/wallets/disconnectAndTerminateWalletProviders/disconnectAndTerminateWalletProviders.ts
|
|
185
|
-
/**
|
|
186
|
-
* Disconnect and terminate each wallet provider, if available.
|
|
187
|
-
* @not-instrumented
|
|
188
|
-
*/
|
|
189
|
-
const disconnectAndTerminateWalletProviders = async ({ reason }, client) => {
|
|
190
|
-
const core = require_InvalidParamError.getCore(client);
|
|
191
|
-
const walletProviders = getAvailableWalletProvidersFromWalletAccounts(client);
|
|
192
|
-
await Promise.all(walletProviders.map(async (walletProvider) => {
|
|
193
|
-
if (walletProvider.terminate) await walletProvider.terminate({ reason });
|
|
194
|
-
if (walletProvider.disconnect) try {
|
|
195
|
-
await walletProvider.disconnect();
|
|
196
|
-
} catch (err) {
|
|
197
|
-
core.logger.error(`Error disconnecting from wallet ${walletProvider.key}`, err);
|
|
198
|
-
}
|
|
199
|
-
}));
|
|
200
|
-
};
|
|
201
|
-
|
|
202
|
-
//#endregion
|
|
203
|
-
//#region src/modules/auth/performLogout/performLogout.ts
|
|
204
|
-
/**
|
|
205
|
-
* Shared logout implementation that revokes the session, clears auth state,
|
|
206
|
-
* terminates wallet providers, and emits the logout event with the given reason.
|
|
207
|
-
*
|
|
208
|
-
* @not-instrumented
|
|
209
|
-
*/
|
|
210
|
-
const performLogout = async ({ reason }, client) => {
|
|
211
|
-
const core = require_InvalidParamError.getCore(client);
|
|
212
|
-
core.logger.debug("[logout] Logging out...");
|
|
213
|
-
await disconnectAndTerminateWalletProviders({ reason }, client);
|
|
214
|
-
if (client.user !== null) {
|
|
215
|
-
const apiClient = require_InvalidParamError.__createApiClient_wrapped({}, client);
|
|
216
|
-
try {
|
|
217
|
-
await apiClient.revokeSession({ environmentId: core.environmentId });
|
|
218
|
-
} catch (error) {
|
|
219
|
-
core.logger.error("Failed to revoke session", error);
|
|
220
|
-
}
|
|
221
|
-
/**
|
|
222
|
-
* This deletes the auth cookie if it exists.
|
|
223
|
-
* If the cookie doesn't exist, this sets a new cookie that expires immediately.
|
|
224
|
-
*/
|
|
225
|
-
if (require_InvalidParamError.isCookieEnabled(client)) require_getVerifiedCredentialForWalletAccount.setCookie(`${require_getVerifiedCredentialForWalletAccount.DYNAMIC_AUTH_COOKIE_NAME}=; Max-Age=-99999999; path=/; SameSite=Lax`);
|
|
226
|
-
}
|
|
227
|
-
await core.keychain.removeKey("session");
|
|
228
|
-
core.state.set({
|
|
229
|
-
captchaToken: null,
|
|
230
|
-
elevatedAccessTokens: [],
|
|
231
|
-
legacyToken: null,
|
|
232
|
-
mfaToken: null,
|
|
233
|
-
sessionExpiresAt: null,
|
|
234
|
-
sessionKeys: null,
|
|
235
|
-
token: null,
|
|
236
|
-
unverifiedWalletAccounts: [],
|
|
237
|
-
user: null
|
|
238
|
-
});
|
|
239
|
-
require_getVerifiedCredentialForWalletAccount.emitEvent({
|
|
240
|
-
args: { reason },
|
|
241
|
-
event: "logout"
|
|
242
|
-
}, client);
|
|
243
|
-
__fetchProjectSettings_wrapped(client);
|
|
244
|
-
require_getNetworkProviderFromNetworkId.__generateSessionKeys_wrapped(client);
|
|
245
|
-
};
|
|
246
|
-
|
|
247
|
-
//#endregion
|
|
248
|
-
//#region src/modules/auth/handleSessionExpiration/handleSessionExpiration.ts
|
|
249
|
-
/**
|
|
250
|
-
* Logs out due to session expiry with a token-expired reason,
|
|
251
|
-
* allowing downstream providers to decide their own cleanup behavior.
|
|
252
|
-
*
|
|
253
|
-
* @param client - The Dynamic client instance.
|
|
254
|
-
* @returns A promise that resolves when the logout process is complete.
|
|
255
|
-
* @instrumented
|
|
256
|
-
*/
|
|
257
|
-
const handleSessionExpiration = async (client) => {
|
|
258
|
-
return performLogout({ reason: "token-expired" }, client);
|
|
259
|
-
};
|
|
260
|
-
const __handleSessionExpiration_impl = handleSessionExpiration;
|
|
261
|
-
const __handleSessionExpiration_wrapped = require_InvalidParamError.instrumentFunction({
|
|
262
|
-
fn: __handleSessionExpiration_impl,
|
|
263
|
-
functionName: "handleSessionExpiration",
|
|
264
|
-
getCore: () => {
|
|
265
|
-
try {
|
|
266
|
-
return require_InvalidParamError.getCore(require_InvalidParamError.getDefaultClient());
|
|
267
|
-
} catch {
|
|
268
|
-
return;
|
|
269
|
-
}
|
|
270
|
-
}
|
|
271
|
-
});
|
|
272
|
-
|
|
273
55
|
//#endregion
|
|
274
56
|
//#region src/modules/auth/initializeAuth/setLongTimeout/setLongTimeout.ts
|
|
275
57
|
/**
|
|
276
58
|
* A replacement for setTimeout that supports delays longer than 2147483647ms (~24.8 days).
|
|
277
59
|
* @not-instrumented
|
|
278
60
|
*/
|
|
279
|
-
const setLongTimeout = (callback, delay) => {
|
|
61
|
+
const setLongTimeout = ({ callback, delay }) => {
|
|
280
62
|
const MAX_DELAY = 2147483647;
|
|
281
63
|
let timeoutId = null;
|
|
282
64
|
let remaining = delay;
|
|
@@ -310,40 +92,18 @@ const initializeAuth = (client) => {
|
|
|
310
92
|
const now = /* @__PURE__ */ new Date();
|
|
311
93
|
const timeUntilExpiration = expiration.getTime() - now.getTime();
|
|
312
94
|
if (timeUntilExpiration <= 0) {
|
|
313
|
-
|
|
95
|
+
require_getNetworkProviderFromNetworkId.__logoutWithReason_wrapped({ reason: "token-expired" }, client);
|
|
314
96
|
return;
|
|
315
97
|
}
|
|
316
|
-
clearExpirationTimeout = setLongTimeout(
|
|
98
|
+
clearExpirationTimeout = setLongTimeout({
|
|
99
|
+
callback: checkExpiration,
|
|
100
|
+
delay: timeUntilExpiration
|
|
101
|
+
});
|
|
317
102
|
};
|
|
318
103
|
onChangeExpiration(checkExpiration);
|
|
319
104
|
checkExpiration();
|
|
320
105
|
};
|
|
321
106
|
|
|
322
|
-
//#endregion
|
|
323
|
-
//#region src/modules/auth/logout/logout.ts
|
|
324
|
-
/**
|
|
325
|
-
* Logs out the current user and clears all authentication data.
|
|
326
|
-
*
|
|
327
|
-
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
328
|
-
* @returns A promise that resolves when the logout process is complete.
|
|
329
|
-
* @instrumented
|
|
330
|
-
*/
|
|
331
|
-
const logout = async (client = require_InvalidParamError.getDefaultClient()) => {
|
|
332
|
-
return performLogout({ reason: "user-intent" }, client);
|
|
333
|
-
};
|
|
334
|
-
const __logout_impl = logout;
|
|
335
|
-
const __logout_wrapped = require_InvalidParamError.instrumentFunction({
|
|
336
|
-
fn: __logout_impl,
|
|
337
|
-
functionName: "logout",
|
|
338
|
-
getCore: () => {
|
|
339
|
-
try {
|
|
340
|
-
return require_InvalidParamError.getCore(require_InvalidParamError.getDefaultClient());
|
|
341
|
-
} catch {
|
|
342
|
-
return;
|
|
343
|
-
}
|
|
344
|
-
}
|
|
345
|
-
});
|
|
346
|
-
|
|
347
107
|
//#endregion
|
|
348
108
|
//#region src/modules/crossTabEventSync/setupCrossTabEventSync/setupCrossTabEventSync.ts
|
|
349
109
|
/**
|
|
@@ -410,6 +170,7 @@ const stateStorageKeySchema = require_getNetworkProviderFromNetworkId.__createSt
|
|
|
410
170
|
})
|
|
411
171
|
});
|
|
412
172
|
const sessionStorageKeySchema = require_getNetworkProviderFromNetworkId.__createStorageKeySchema_wrapped({
|
|
173
|
+
config: { storageTier: "secure" },
|
|
413
174
|
key: "session",
|
|
414
175
|
schema: zod_mini.object({
|
|
415
176
|
captchaToken: zod_mini.nullable(zod_mini.string()),
|
|
@@ -668,10 +429,10 @@ const initializeClient = async (client = require_InvalidParamError.getDefaultCli
|
|
|
668
429
|
logger: core.logger,
|
|
669
430
|
state: core.state,
|
|
670
431
|
storage: core.storage
|
|
671
|
-
}).catch(() =>
|
|
672
|
-
if (core.state.get().sessionKeys && !await core.keychain.hasKey("session")) await
|
|
432
|
+
}).catch(() => require_getNetworkProviderFromNetworkId.__logoutWithReason_wrapped({ reason: "keychain-migration-failed" }, client));
|
|
433
|
+
if (core.state.get().sessionKeys && !await core.keychain.hasKey("session")) await require_getNetworkProviderFromNetworkId.__logoutWithReason_wrapped({ reason: "keychain-key-missing" }, client);
|
|
673
434
|
}).then(async () => {
|
|
674
|
-
if (!core.state.get().projectSettings) await __fetchProjectSettings_wrapped(client);
|
|
435
|
+
if (!core.state.get().projectSettings) await require_getNetworkProviderFromNetworkId.__fetchProjectSettings_wrapped(client);
|
|
675
436
|
});
|
|
676
437
|
fetchProjectSettingsPromise.then(() => prefetchNoncesIfNeeded(client)).catch((error) => {
|
|
677
438
|
core.logger.error("Failed to prefetch nonces:", error);
|
|
@@ -705,7 +466,7 @@ const initializeClient = async (client = require_InvalidParamError.getDefaultCli
|
|
|
705
466
|
if (require_InvalidParamError.isCookieEnabled(client)) await require_NotWaasWalletAccountError.__refreshAuth_wrapped(client).catch(async (error) => {
|
|
706
467
|
if (error.status === 401) {
|
|
707
468
|
core.logger.error("Session expired during initialization", error);
|
|
708
|
-
if (client.user) await
|
|
469
|
+
if (client.user) await require_getNetworkProviderFromNetworkId.__logoutWithReason_wrapped({ reason: "session-refresh-unauthorized" }, client);
|
|
709
470
|
} else throw error;
|
|
710
471
|
});
|
|
711
472
|
});
|
|
@@ -716,7 +477,7 @@ const initializeClient = async (client = require_InvalidParamError.getDefaultCli
|
|
|
716
477
|
*/
|
|
717
478
|
const refreshUserStateFromValidTokenPromise = refreshUserStateFromCookiePromise.then(async () => {
|
|
718
479
|
if (core.state.get().token && !core.state.get().user) await __refreshUser_wrapped(client).catch(async () => {
|
|
719
|
-
await
|
|
480
|
+
await require_getNetworkProviderFromNetworkId.__logoutWithReason_wrapped({ reason: "user-refresh-failed" }, client);
|
|
720
481
|
});
|
|
721
482
|
});
|
|
722
483
|
core.initTrack.track({
|
|
@@ -1206,7 +967,7 @@ const createCore = (config) => {
|
|
|
1206
967
|
const passkey = config.coreConfig?.passkey ?? createWebPasskeyService();
|
|
1207
968
|
const realtime = config.coreConfig?.realtime ?? require_getNetworkProviderFromNetworkId.__createRealtimeService_wrapped();
|
|
1208
969
|
const deviceSigner = config.coreConfig?.deviceSigner;
|
|
1209
|
-
const keychain = config.coreConfig?.keychain ?? require_getNetworkProviderFromNetworkId.
|
|
970
|
+
const keychain = config.coreConfig?.keychain ?? require_getNetworkProviderFromNetworkId.createKeychainService({ dbName: `dynamic_${config.environmentId}_keychain` });
|
|
1210
971
|
return {
|
|
1211
972
|
apiBaseUrl,
|
|
1212
973
|
crossTabBroadcast: config.coreConfig?.crossTabBroadcast ?? require_getNetworkProviderFromNetworkId.__createCrossTabBroadcast_wrapped({ channelName: `dynamic_${config.environmentId}_broadcast` }),
|
|
@@ -1751,7 +1512,7 @@ const requestExternalAuthElevatedToken = async ({ externalJwt }, client = requir
|
|
|
1751
1512
|
environmentId: core.environmentId,
|
|
1752
1513
|
externalAuthSigninRequest: { jwt: externalJwt }
|
|
1753
1514
|
});
|
|
1754
|
-
const parsedToken = require_getVerifiedCredentialForWalletAccount.parseElevatedAccessToken(response.elevatedAccessToken);
|
|
1515
|
+
const parsedToken = require_getVerifiedCredentialForWalletAccount.parseElevatedAccessToken({ token: response.elevatedAccessToken });
|
|
1755
1516
|
if (parsedToken) {
|
|
1756
1517
|
const currentTokens = core.state.get().elevatedAccessTokens || [];
|
|
1757
1518
|
core.state.set({ elevatedAccessTokens: require_getVerifiedCredentialForWalletAccount.upsertElevatedAccessToken({
|
|
@@ -1814,6 +1575,25 @@ const __signInWithExternalJwt_wrapped = require_InvalidParamError.instrumentFunc
|
|
|
1814
1575
|
redactAll: true
|
|
1815
1576
|
});
|
|
1816
1577
|
|
|
1578
|
+
//#endregion
|
|
1579
|
+
//#region src/modules/auth/logout/logout.ts
|
|
1580
|
+
/**
|
|
1581
|
+
* Logs out the current user and clears all authentication data.
|
|
1582
|
+
*
|
|
1583
|
+
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
1584
|
+
* @returns A promise that resolves when the logout process is complete.
|
|
1585
|
+
* @not-instrumented
|
|
1586
|
+
*/
|
|
1587
|
+
const logout = async (client = require_InvalidParamError.getDefaultClient()) => {
|
|
1588
|
+
/**
|
|
1589
|
+
* Delegates to `logoutWithReason` with `'user-intent'` so telemetry correctly
|
|
1590
|
+
* attributes the logout to an explicit user action. Instrumentation lives on
|
|
1591
|
+
* `logoutWithReason` — this wrapper is intentionally not instrumented so that
|
|
1592
|
+
* Datadog sees a single function name per logout regardless of entry point.
|
|
1593
|
+
*/
|
|
1594
|
+
return require_getNetworkProviderFromNetworkId.__logoutWithReason_wrapped({ reason: "user-intent" }, client);
|
|
1595
|
+
};
|
|
1596
|
+
|
|
1817
1597
|
//#endregion
|
|
1818
1598
|
//#region src/modules/auth/passkeys/deletePasskey/deletePasskey.ts
|
|
1819
1599
|
/**
|
|
@@ -2091,7 +1871,7 @@ const APPLE_RESPONSE_MODE = "form_post";
|
|
|
2091
1871
|
const APPLE_RESPONSE_TYPE = "code id_token";
|
|
2092
1872
|
/** Helper function to add OAuth URL parameters to a given base URL. * @not-instrumented
|
|
2093
1873
|
*/
|
|
2094
|
-
const addOAuthUrlParams = (
|
|
1874
|
+
const addOAuthUrlParams = ({ baseUrl, isGoogleDriveBackupEnabled, provider }) => {
|
|
2095
1875
|
require_InvalidParamError.assertDefined(provider.clientId, "Client ID not found");
|
|
2096
1876
|
require_InvalidParamError.assertDefined(provider.provider, "Provider type not found");
|
|
2097
1877
|
require_InvalidParamError.assertDefined(provider.redirectUrl, "Redirect URL not found");
|
|
@@ -2105,7 +1885,7 @@ const addOAuthUrlParams = (provider, baseUrl, options = {}) => {
|
|
|
2105
1885
|
}
|
|
2106
1886
|
if (providerType === _dynamic_labs_sdk_api_core.ProviderEnum.Google) {
|
|
2107
1887
|
baseUrl.searchParams.set("access_type", "offline");
|
|
2108
|
-
if (
|
|
1888
|
+
if (isGoogleDriveBackupEnabled) baseUrl.searchParams.set("prompt", "consent");
|
|
2109
1889
|
}
|
|
2110
1890
|
if (providerType === _dynamic_labs_sdk_api_core.ProviderEnum.Apple) {
|
|
2111
1891
|
baseUrl.searchParams.set("response_mode", APPLE_RESPONSE_MODE);
|
|
@@ -2147,7 +1927,11 @@ const buildOAuthUrl = async (core, provider) => {
|
|
|
2147
1927
|
const socialProvider = projectSettings.providers.find((p) => p.provider === provider);
|
|
2148
1928
|
require_InvalidParamError.assertDefined(socialProvider, `Social provider ${provider} not supported`);
|
|
2149
1929
|
const isGoogleDriveBackupEnabled = projectSettings.sdk.waas?.backupOptions?.includes(_dynamic_labs_sdk_api_core.WaasBackupOptionsEnum.GoogleDrive);
|
|
2150
|
-
const socialProviderUrl = addOAuthUrlParams(
|
|
1930
|
+
const socialProviderUrl = addOAuthUrlParams({
|
|
1931
|
+
baseUrl: getOAuthBaseUrl(socialProvider),
|
|
1932
|
+
isGoogleDriveBackupEnabled,
|
|
1933
|
+
provider: socialProvider
|
|
1934
|
+
});
|
|
2151
1935
|
const usingPkce = providersRequiringPkce.includes(provider);
|
|
2152
1936
|
const state = require_InvalidParamError.randomString({ length: 32 });
|
|
2153
1937
|
const codeVerifier = require_InvalidParamError.randomString({ length: 43 });
|
|
@@ -3176,7 +2960,7 @@ const isDeviceRegistrationRequired = (user) => Boolean(user.scope?.includes("dev
|
|
|
3176
2960
|
const revokeAllRegisteredDevices = async (client = require_InvalidParamError.getDefaultClient()) => {
|
|
3177
2961
|
const core = require_InvalidParamError.getCore(client);
|
|
3178
2962
|
await require_InvalidParamError.__createApiClient_wrapped({}, client).deleteAllDeviceRegistrations({ environmentId: core.environmentId });
|
|
3179
|
-
await
|
|
2963
|
+
await require_getNetworkProviderFromNetworkId.__logoutWithReason_wrapped({ reason: "all-devices-revoked" }, client);
|
|
3180
2964
|
};
|
|
3181
2965
|
const __revokeAllRegisteredDevices_impl = revokeAllRegisteredDevices;
|
|
3182
2966
|
const __revokeAllRegisteredDevices_wrapped = require_InvalidParamError.instrumentFunction({
|
|
@@ -3200,7 +2984,7 @@ const revokeRegisteredDevice = async ({ deviceRegistrationId }, client = require
|
|
|
3200
2984
|
if ((await require_InvalidParamError.__createApiClient_wrapped({}, client).deleteDeviceRegistration({
|
|
3201
2985
|
deviceRegistrationId,
|
|
3202
2986
|
environmentId: core.environmentId
|
|
3203
|
-
})).currentDeviceRevoked) await
|
|
2987
|
+
})).currentDeviceRevoked) await require_getNetworkProviderFromNetworkId.__logoutWithReason_wrapped({ reason: "device-revoked" }, client);
|
|
3204
2988
|
};
|
|
3205
2989
|
const __revokeRegisteredDevice_impl = revokeRegisteredDevice;
|
|
3206
2990
|
const __revokeRegisteredDevice_wrapped = require_InvalidParamError.instrumentFunction({
|
|
@@ -3588,7 +3372,7 @@ const __waitForClientInitialized_wrapped = require_InvalidParamError.instrumentF
|
|
|
3588
3372
|
* normally but emit no telemetry.
|
|
3589
3373
|
* @instrumented
|
|
3590
3374
|
*/
|
|
3591
|
-
const setInstrumentationEnabled = (enabled, client = require_InvalidParamError.getDefaultClient()) => {
|
|
3375
|
+
const setInstrumentationEnabled = ({ enabled }, client = require_InvalidParamError.getDefaultClient()) => {
|
|
3592
3376
|
require_InvalidParamError.getCore(client).instrumentation.setEnabled(enabled);
|
|
3593
3377
|
};
|
|
3594
3378
|
const __setInstrumentationEnabled_impl = setInstrumentationEnabled;
|
|
@@ -3697,7 +3481,7 @@ const fetchLegacyWalletBook = async (client) => {
|
|
|
3697
3481
|
const core = require_InvalidParamError.getCore(client);
|
|
3698
3482
|
core.logger.debug("[fetchLegacyWalletBook] Fetching wallet book...");
|
|
3699
3483
|
try {
|
|
3700
|
-
const walletBook = await retryOnFail({
|
|
3484
|
+
const walletBook = await require_getNetworkProviderFromNetworkId.retryOnFail({
|
|
3701
3485
|
delay: RETRY_DELAY_MS,
|
|
3702
3486
|
fn: async () => fetchWithTimeout(client),
|
|
3703
3487
|
maxRetries: MAX_RETRIES
|
|
@@ -3739,12 +3523,10 @@ const EMBEDDED_WALLET_KEYS = [
|
|
|
3739
3523
|
/**
|
|
3740
3524
|
* Checks if a wallet should be filtered out from the WalletConnect catalog.
|
|
3741
3525
|
*
|
|
3742
|
-
* @param walletKey - The wallet key identifier.
|
|
3743
|
-
* @param wallet - The wallet schema to check.
|
|
3744
3526
|
* @returns True if the wallet should be filtered out, false otherwise.
|
|
3745
3527
|
* @not-instrumented
|
|
3746
3528
|
*/
|
|
3747
|
-
const shouldFilterWallet = (
|
|
3529
|
+
const shouldFilterWallet = ({ wallet, walletKey }) => {
|
|
3748
3530
|
if (EMBEDDED_WALLET_KEYS.includes(walletKey)) return true;
|
|
3749
3531
|
if (!wallet.walletConnect || !wallet.walletConnect.sdks.includes("sign_v2")) return true;
|
|
3750
3532
|
const hasInjectedConfig = wallet.injectedConfig && wallet.injectedConfig.length > 0;
|
|
@@ -3959,7 +3741,10 @@ const transformWalletBook = ({ walletBook }) => {
|
|
|
3959
3741
|
for (const [groupKey, group] of Object.entries(walletBook.groups)) groups[groupKey] = transformGroup({ group });
|
|
3960
3742
|
const wallets = {};
|
|
3961
3743
|
for (const [walletKey, wallet] of Object.entries(walletBook.wallets)) {
|
|
3962
|
-
if (shouldFilterWallet(
|
|
3744
|
+
if (shouldFilterWallet({
|
|
3745
|
+
wallet,
|
|
3746
|
+
walletKey
|
|
3747
|
+
})) continue;
|
|
3963
3748
|
wallets[walletKey] = transformWallet({
|
|
3964
3749
|
wallet,
|
|
3965
3750
|
walletKey
|
|
@@ -5782,7 +5567,7 @@ const __getSwapStatus_wrapped = require_InvalidParamError.instrumentFunction({
|
|
|
5782
5567
|
const deleteUser = async (client = require_InvalidParamError.getDefaultClient()) => {
|
|
5783
5568
|
const core = require_InvalidParamError.getCore(client);
|
|
5784
5569
|
await require_InvalidParamError.__createApiClient_wrapped({ includeMfaToken: true }, client).hardDeleteUser({ environmentId: core.environmentId });
|
|
5785
|
-
await
|
|
5570
|
+
await require_getNetworkProviderFromNetworkId.__logoutWithReason_wrapped({ reason: "user-deleted" }, client);
|
|
5786
5571
|
};
|
|
5787
5572
|
const __deleteUser_impl = deleteUser;
|
|
5788
5573
|
const __deleteUser_wrapped = require_InvalidParamError.instrumentFunction({
|
|
@@ -6086,7 +5871,13 @@ const __proveWalletAccountOwnership_wrapped = require_InvalidParamError.instrume
|
|
|
6086
5871
|
//#endregion
|
|
6087
5872
|
//#region src/modules/wallets/utils/isSameAddress/isSameAddress.ts
|
|
6088
5873
|
/** @not-instrumented */
|
|
6089
|
-
const isSameAddress = (left, right
|
|
5874
|
+
const isSameAddress = ({ chain, left, right }) => require_getVerifiedCredentialForWalletAccount.normalizeAddress({
|
|
5875
|
+
address: left,
|
|
5876
|
+
chain
|
|
5877
|
+
}) === require_getVerifiedCredentialForWalletAccount.normalizeAddress({
|
|
5878
|
+
address: right,
|
|
5879
|
+
chain
|
|
5880
|
+
});
|
|
6090
5881
|
|
|
6091
5882
|
//#endregion
|
|
6092
5883
|
//#region src/modules/wallets/verifyWalletAccountForSignInOrTransfer/verifyWalletAccountForSignInOrTransfer.ts
|
|
@@ -6112,7 +5903,11 @@ const verifyWalletAccountForSignInOrTransfer = async ({ walletAccount, isTransfe
|
|
|
6112
5903
|
walletDisplayName: walletProvider.metadata.displayName,
|
|
6113
5904
|
walletProviderType: walletProvider.walletProviderType
|
|
6114
5905
|
}, client);
|
|
6115
|
-
const walletVerifiedCredential = response.user?.verifiedCredentials.find((verifiedCredential) => isSameAddress(
|
|
5906
|
+
const walletVerifiedCredential = response.user?.verifiedCredentials.find((verifiedCredential) => isSameAddress({
|
|
5907
|
+
chain: walletAccount.chain,
|
|
5908
|
+
left: verifiedCredential.address ?? "",
|
|
5909
|
+
right: walletAccount.address
|
|
5910
|
+
}));
|
|
6116
5911
|
require_InvalidParamError.assertDefined(walletVerifiedCredential, `After verifying, still unable to find verified wallet credential for wallet account ${walletAccount.address} on chain ${walletAccount.chain}`);
|
|
6117
5912
|
require_getNetworkProviderFromNetworkId.__updateWalletProviderKeysForVerifiedCredentials_wrapped({ keysToUpdate: { [walletVerifiedCredential.id]: walletProvider.key } }, client);
|
|
6118
5913
|
/**
|
|
@@ -6124,7 +5919,11 @@ const verifyWalletAccountForSignInOrTransfer = async ({ walletAccount, isTransfe
|
|
|
6124
5919
|
* Remove the now verified wallet account from the unverified wallet accounts
|
|
6125
5920
|
*/
|
|
6126
5921
|
require_getNetworkProviderFromNetworkId.__removeUnverifiedWalletAccount_wrapped({ unverifiedWalletAccount: walletAccount }, client);
|
|
6127
|
-
const verifiedWalletAccount = require_getVerifiedCredentialForWalletAccount.__getWalletAccounts_wrapped(client).find(({ address }) => isSameAddress(
|
|
5922
|
+
const verifiedWalletAccount = require_getVerifiedCredentialForWalletAccount.__getWalletAccounts_wrapped(client).find(({ address }) => isSameAddress({
|
|
5923
|
+
chain: walletAccount.chain,
|
|
5924
|
+
left: address,
|
|
5925
|
+
right: walletAccount.address
|
|
5926
|
+
}));
|
|
6128
5927
|
require_InvalidParamError.assertDefined(verifiedWalletAccount, `Unable to find wallet account ${walletAccount.address} on chain ${walletAccount.chain} for verified credential ${walletVerifiedCredential.id}`);
|
|
6129
5928
|
return verifiedWalletAccount;
|
|
6130
5929
|
};
|
|
@@ -7072,7 +6871,7 @@ exports.deleteUser = __deleteUser_wrapped;
|
|
|
7072
6871
|
exports.detectDeviceRegistrationRedirect = __detectDeviceRegistrationRedirect_wrapped;
|
|
7073
6872
|
exports.detectOAuthRedirect = __detectOAuthRedirect_wrapped;
|
|
7074
6873
|
exports.executeSwapTransaction = __executeSwapTransaction_wrapped;
|
|
7075
|
-
exports.fetchProjectSettings = __fetchProjectSettings_wrapped;
|
|
6874
|
+
exports.fetchProjectSettings = require_getNetworkProviderFromNetworkId.__fetchProjectSettings_wrapped;
|
|
7076
6875
|
exports.getActiveNetworkData = __getActiveNetworkData_wrapped;
|
|
7077
6876
|
exports.getActiveNetworkId = __getActiveNetworkId_wrapped;
|
|
7078
6877
|
exports.getAvailableWalletProvidersData = __getAvailableWalletProvidersData_wrapped;
|
|
@@ -7118,11 +6917,11 @@ exports.isMfaRequiredForAction = require_isMfaRequiredForAction.isMfaRequiredFor
|
|
|
7118
6917
|
exports.isMobile = isMobile;
|
|
7119
6918
|
exports.isPendingRecoveryCodesAcknowledgment = isPendingRecoveryCodesAcknowledgment;
|
|
7120
6919
|
exports.isProgrammaticNetworkSwitchAvailable = isProgrammaticNetworkSwitchAvailable;
|
|
7121
|
-
exports.isSignedIn = isSignedIn;
|
|
6920
|
+
exports.isSignedIn = require_getNetworkProviderFromNetworkId.isSignedIn;
|
|
7122
6921
|
exports.isUserMissingMfaAuth = isUserMissingMfaAuth;
|
|
7123
6922
|
exports.isUserOnboardingComplete = isUserOnboardingComplete;
|
|
7124
6923
|
exports.isWalletAccountVerified = isWalletAccountVerified;
|
|
7125
|
-
exports.logout =
|
|
6924
|
+
exports.logout = logout;
|
|
7126
6925
|
exports.offEvent = require_getVerifiedCredentialForWalletAccount.__offEvent_wrapped;
|
|
7127
6926
|
exports.offWalletProviderEvent = __offWalletProviderEvent_wrapped;
|
|
7128
6927
|
exports.onEvent = require_getVerifiedCredentialForWalletAccount.__onEvent_wrapped;
|