@dynamic-labs-sdk/client 0.25.0 → 0.25.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (199) hide show
  1. package/android/build.gradle +71 -0
  2. package/android/src/main/java/xyz/dynamic/client/DynamicClientPackage.kt +42 -0
  3. package/android/src/main/java/xyz/dynamic/client/keychain/KeyStoreKeyManager.kt +147 -0
  4. package/android/src/main/java/xyz/dynamic/client/keychain/KeychainModule.kt +85 -0
  5. package/android/src/main/java/xyz/dynamic/client/manifest/ReactNativeManifestModule.kt +25 -0
  6. package/dist/{InvalidParamError-B5NwKSKU.native.esm.js → InvalidParamError-BDHw6nr1.native.esm.js} +7 -6
  7. package/dist/InvalidParamError-BDHw6nr1.native.esm.js.map +1 -0
  8. package/dist/{InvalidParamError-D-d-UfBL.cjs.js → InvalidParamError-BqDEZ6er.cjs.js} +3 -3
  9. package/dist/InvalidParamError-BqDEZ6er.cjs.js.map +1 -0
  10. package/dist/{InvalidParamError-BiVmL7nM.esm.js → InvalidParamError-DcN56mC-.esm.js} +2 -2
  11. package/dist/InvalidParamError-DcN56mC-.esm.js.map +1 -0
  12. package/dist/{NotWaasWalletAccountError-BX5lUnKT.native.esm.js → NotWaasWalletAccountError-B_TYSgak.native.esm.js} +3 -3
  13. package/dist/{NotWaasWalletAccountError-BX5lUnKT.native.esm.js.map → NotWaasWalletAccountError-B_TYSgak.native.esm.js.map} +1 -1
  14. package/dist/{NotWaasWalletAccountError-Bo4VhW4n.esm.js → NotWaasWalletAccountError-CQ7CMol4.esm.js} +3 -3
  15. package/dist/{NotWaasWalletAccountError-Bo4VhW4n.esm.js.map → NotWaasWalletAccountError-CQ7CMol4.esm.js.map} +1 -1
  16. package/dist/{NotWaasWalletAccountError-BJaemI4V.cjs.js → NotWaasWalletAccountError-ftYfHk_N.cjs.js} +3 -3
  17. package/dist/{NotWaasWalletAccountError-BJaemI4V.cjs.js.map → NotWaasWalletAccountError-ftYfHk_N.cjs.js.map} +1 -1
  18. package/dist/core.cjs.js +36 -6
  19. package/dist/core.cjs.js.map +1 -1
  20. package/dist/core.esm.js +34 -6
  21. package/dist/core.esm.js.map +1 -1
  22. package/dist/core.native.esm.js +46 -6
  23. package/dist/core.native.esm.js.map +1 -1
  24. package/dist/errors/NativeModuleNotLinkedError.d.ts +9 -0
  25. package/dist/errors/NativeModuleNotLinkedError.d.ts.map +1 -0
  26. package/dist/errors/ReactNativeOnlyError.d.ts +9 -0
  27. package/dist/errors/ReactNativeOnlyError.d.ts.map +1 -0
  28. package/dist/exports/core.d.ts +8 -2
  29. package/dist/exports/core.d.ts.map +1 -1
  30. package/dist/{getNetworkProviderFromNetworkId-5dK99mQR.esm.js → getNetworkProviderFromNetworkId-BRWuk0I8.native.esm.js} +408 -153
  31. package/dist/getNetworkProviderFromNetworkId-BRWuk0I8.native.esm.js.map +1 -0
  32. package/dist/{getNetworkProviderFromNetworkId-DWOYr3uv.native.esm.js → getNetworkProviderFromNetworkId-COHxfpo-.esm.js} +273 -46
  33. package/dist/getNetworkProviderFromNetworkId-COHxfpo-.esm.js.map +1 -0
  34. package/dist/{getNetworkProviderFromNetworkId-Cl2XDWo9.cjs.js → getNetworkProviderFromNetworkId-ClfETwqS.cjs.js} +302 -51
  35. package/dist/getNetworkProviderFromNetworkId-ClfETwqS.cjs.js.map +1 -0
  36. package/dist/{getSignedSessionId-DakTrfSz.esm.js → getSignedSessionId-B6ry-rvs.esm.js} +3 -3
  37. package/dist/{getSignedSessionId-DakTrfSz.esm.js.map → getSignedSessionId-B6ry-rvs.esm.js.map} +1 -1
  38. package/dist/{getSignedSessionId-BbhZjeRt.cjs.js → getSignedSessionId-Bkw9TATj.cjs.js} +3 -3
  39. package/dist/{getSignedSessionId-BbhZjeRt.cjs.js.map → getSignedSessionId-Bkw9TATj.cjs.js.map} +1 -1
  40. package/dist/{getSignedSessionId-Dk3_TQLq.native.esm.js → getSignedSessionId-C58DvQAd.native.esm.js} +3 -3
  41. package/dist/{getSignedSessionId-Dk3_TQLq.native.esm.js.map → getSignedSessionId-C58DvQAd.native.esm.js.map} +1 -1
  42. package/dist/{getVerifiedCredentialForWalletAccount-BDvkZbtb.cjs.js → getVerifiedCredentialForWalletAccount-DEiU9FZG.cjs.js} +11 -10
  43. package/dist/getVerifiedCredentialForWalletAccount-DEiU9FZG.cjs.js.map +1 -0
  44. package/dist/{getVerifiedCredentialForWalletAccount-ByUSFAHs.esm.js → getVerifiedCredentialForWalletAccount-DP4VQBly.esm.js} +10 -9
  45. package/dist/getVerifiedCredentialForWalletAccount-DP4VQBly.esm.js.map +1 -0
  46. package/dist/{getVerifiedCredentialForWalletAccount-Dhqf6Tdl.native.esm.js → getVerifiedCredentialForWalletAccount-d_bHvLLE.native.esm.js} +10 -9
  47. package/dist/getVerifiedCredentialForWalletAccount-d_bHvLLE.native.esm.js.map +1 -0
  48. package/dist/index.cjs.js +75 -276
  49. package/dist/index.cjs.js.map +1 -1
  50. package/dist/index.esm.js +71 -272
  51. package/dist/index.esm.js.map +1 -1
  52. package/dist/index.native.esm.js +71 -272
  53. package/dist/index.native.esm.js.map +1 -1
  54. package/dist/{isMfaRequiredForAction-y15A_lhP.native.esm.js → isMfaRequiredForAction-Cjbuyen3.native.esm.js} +2 -2
  55. package/dist/{isMfaRequiredForAction-y15A_lhP.native.esm.js.map → isMfaRequiredForAction-Cjbuyen3.native.esm.js.map} +1 -1
  56. package/dist/{isMfaRequiredForAction-SFbQW5j5.esm.js → isMfaRequiredForAction-D8GPFYzv.esm.js} +2 -2
  57. package/dist/{isMfaRequiredForAction-SFbQW5j5.esm.js.map → isMfaRequiredForAction-D8GPFYzv.esm.js.map} +1 -1
  58. package/dist/{isMfaRequiredForAction-CYrluCK-.cjs.js → isMfaRequiredForAction-mZub0YwI.cjs.js} +2 -2
  59. package/dist/{isMfaRequiredForAction-CYrluCK-.cjs.js.map → isMfaRequiredForAction-mZub0YwI.cjs.js.map} +1 -1
  60. package/dist/modules/auth/externalAuth/requestExternalAuthElevatedToken/requestExternalAuthElevatedToken.d.ts.map +1 -1
  61. package/dist/modules/auth/initializeAuth/initializeAuth.d.ts +1 -1
  62. package/dist/modules/auth/initializeAuth/setLongTimeout/setLongTimeout.d.ts +8 -2
  63. package/dist/modules/auth/initializeAuth/setLongTimeout/setLongTimeout.d.ts.map +1 -1
  64. package/dist/modules/auth/logout/logout.d.ts +1 -1
  65. package/dist/modules/auth/logout/logout.d.ts.map +1 -1
  66. package/dist/modules/auth/logoutReason.d.ts +4 -7
  67. package/dist/modules/auth/logoutReason.d.ts.map +1 -1
  68. package/dist/modules/auth/logoutWithReason/index.d.ts +2 -0
  69. package/dist/modules/auth/logoutWithReason/index.d.ts.map +1 -0
  70. package/dist/modules/auth/logoutWithReason/logoutWithReason.d.ts +24 -0
  71. package/dist/modules/auth/logoutWithReason/logoutWithReason.d.ts.map +1 -0
  72. package/dist/modules/auth/social/oauth/authenticateWithSocial/buildOAuthUrl/addOAuthUrlParams/addOAuthUrlParams.d.ts +7 -4
  73. package/dist/modules/auth/social/oauth/authenticateWithSocial/buildOAuthUrl/addOAuthUrlParams/addOAuthUrlParams.d.ts.map +1 -1
  74. package/dist/modules/auth/social/oauth/authenticateWithSocial/buildOAuthUrl/buildOAuthUrl.d.ts.map +1 -1
  75. package/dist/modules/auth/updateAuthFromVerifyResponse/elevatedAccessTokens/parseElevatedAccessToken/parseElevatedAccessToken.d.ts +6 -4
  76. package/dist/modules/auth/updateAuthFromVerifyResponse/elevatedAccessTokens/parseElevatedAccessToken/parseElevatedAccessToken.d.ts.map +1 -1
  77. package/dist/modules/auth/updateAuthFromVerifyResponse/updateAuthFromVerifyResponse.d.ts.map +1 -1
  78. package/dist/modules/initializeClient/initializeClient.d.ts.map +1 -1
  79. package/dist/modules/instrumentation/setInstrumentationEnabled/setInstrumentationEnabled.d.ts +6 -2
  80. package/dist/modules/instrumentation/setInstrumentationEnabled/setInstrumentationEnabled.d.ts.map +1 -1
  81. package/dist/modules/legacyWalletBook/getWalletConnectCatalog/shouldFilterWallet/shouldFilterWallet.d.ts +9 -5
  82. package/dist/modules/legacyWalletBook/getWalletConnectCatalog/shouldFilterWallet/shouldFilterWallet.d.ts.map +1 -1
  83. package/dist/modules/storageSync/schema.d.ts.map +1 -1
  84. package/dist/modules/user/deleteUser/deleteUser.d.ts +1 -1
  85. package/dist/modules/wallets/utils/isSameAddress/isSameAddress.d.ts +9 -1
  86. package/dist/modules/wallets/utils/isSameAddress/isSameAddress.d.ts.map +1 -1
  87. package/dist/modules/wallets/utils/normalizeAddress/normalizeAddress.d.ts +7 -1
  88. package/dist/modules/wallets/utils/normalizeAddress/normalizeAddress.d.ts.map +1 -1
  89. package/dist/modules/wallets/verifyWalletAccountForSignInOrTransfer/verifyWalletAccountForSignInOrTransfer.d.ts.map +1 -1
  90. package/dist/services/keychain/createKeychainService/ImportKeyNotSupportedError.d.ts +5 -0
  91. package/dist/services/keychain/createKeychainService/ImportKeyNotSupportedError.d.ts.map +1 -0
  92. package/dist/services/keychain/createKeychainService/KeyNotFoundError.d.ts.map +1 -0
  93. package/dist/services/keychain/createKeychainService/createKeychainService.d.ts +4 -0
  94. package/dist/services/keychain/createKeychainService/createKeychainService.d.ts.map +1 -0
  95. package/dist/services/keychain/createKeychainService/createKeychainService.types.d.ts +11 -0
  96. package/dist/services/keychain/createKeychainService/createKeychainService.types.d.ts.map +1 -0
  97. package/dist/services/keychain/createKeychainService/index.d.ts +2 -0
  98. package/dist/services/keychain/createKeychainService/index.d.ts.map +1 -0
  99. package/dist/services/keychain/createKeychainService/utils/constants.d.ts.map +1 -0
  100. package/dist/services/keychain/createKeychainService/utils/deleteIndexedDBItem.d.ts +9 -0
  101. package/dist/services/keychain/createKeychainService/utils/deleteIndexedDBItem.d.ts.map +1 -0
  102. package/dist/services/keychain/createKeychainService/utils/getIndexedDBItem.d.ts +10 -0
  103. package/dist/services/keychain/createKeychainService/utils/getIndexedDBItem.d.ts.map +1 -0
  104. package/dist/services/keychain/createKeychainService/utils/openDatabase.d.ts.map +1 -0
  105. package/dist/services/keychain/createKeychainService/utils/setIndexedDBItem.d.ts +10 -0
  106. package/dist/services/keychain/createKeychainService/utils/setIndexedDBItem.d.ts.map +1 -0
  107. package/dist/services/keychain/createKeychainService/utils/withDatabase/index.d.ts.map +1 -0
  108. package/dist/services/keychain/createKeychainService/utils/withDatabase/withDatabase.d.ts.map +1 -0
  109. package/dist/services/keychain/index.d.ts +1 -1
  110. package/dist/services/keychain/index.d.ts.map +1 -1
  111. package/dist/services/nativeManifest/getReactNativeManifest/getReactNativeManifest.d.ts +11 -0
  112. package/dist/services/nativeManifest/getReactNativeManifest/getReactNativeManifest.d.ts.map +1 -0
  113. package/dist/services/nativeManifest/getReactNativeManifest/index.d.ts +2 -0
  114. package/dist/services/nativeManifest/getReactNativeManifest/index.d.ts.map +1 -0
  115. package/dist/services/nativeManifest/nativeManifest.types.d.ts +14 -0
  116. package/dist/services/nativeManifest/nativeManifest.types.d.ts.map +1 -0
  117. package/dist/services/storage/createLocalStorageAdapter/createLocalStorageAdapter.d.ts +2 -2
  118. package/dist/services/storage/createStorage/createStorage.d.ts +4 -2
  119. package/dist/services/storage/createStorage/createStorage.d.ts.map +1 -1
  120. package/dist/services/storage/createStorageKeySchema/createStorageKeySchema.d.ts +2 -1
  121. package/dist/services/storage/createStorageKeySchema/createStorageKeySchema.d.ts.map +1 -1
  122. package/dist/services/storage/index.d.ts +1 -1
  123. package/dist/services/storage/index.d.ts.map +1 -1
  124. package/dist/services/storage/storage.types.d.ts +27 -3
  125. package/dist/services/storage/storage.types.d.ts.map +1 -1
  126. package/dist/tsconfig.lib.tsbuildinfo +1 -1
  127. package/dist/utils/base64urlFromBytes/base64urlFromBytes.d.ts +8 -0
  128. package/dist/utils/base64urlFromBytes/base64urlFromBytes.d.ts.map +1 -0
  129. package/dist/utils/base64urlFromBytes/index.d.ts +2 -0
  130. package/dist/utils/base64urlFromBytes/index.d.ts.map +1 -0
  131. package/dist/utils/bytesFromBase64url/bytesFromBase64url.d.ts +8 -0
  132. package/dist/utils/bytesFromBase64url/bytesFromBase64url.d.ts.map +1 -0
  133. package/dist/utils/bytesFromBase64url/index.d.ts +2 -0
  134. package/dist/utils/bytesFromBase64url/index.d.ts.map +1 -0
  135. package/dist/utils/derToP1363/InvalidDERSignatureError.d.ts +5 -0
  136. package/dist/utils/derToP1363/InvalidDERSignatureError.d.ts.map +1 -0
  137. package/dist/utils/derToP1363/derToP1363.d.ts +8 -0
  138. package/dist/utils/derToP1363/derToP1363.d.ts.map +1 -0
  139. package/dist/utils/derToP1363/index.d.ts +2 -0
  140. package/dist/utils/derToP1363/index.d.ts.map +1 -0
  141. package/dist/utils/randomString/randomString.d.ts +1 -1
  142. package/dist/utils/randomString/randomString.d.ts.map +1 -1
  143. package/dist/waas.cjs.js +4 -4
  144. package/dist/waas.esm.js +3 -3
  145. package/dist/waas.native.esm.js +3 -3
  146. package/dist/waasCore.cjs.js +4 -4
  147. package/dist/waasCore.cjs.js.map +1 -1
  148. package/dist/waasCore.esm.js +3 -3
  149. package/dist/waasCore.esm.js.map +1 -1
  150. package/dist/waasCore.native.esm.js +3 -3
  151. package/dist/waasCore.native.esm.js.map +1 -1
  152. package/dynamic-labs-sdk-client.podspec +27 -0
  153. package/ios/Keychain.h +4 -0
  154. package/ios/Keychain.mm +101 -0
  155. package/ios/ReactNativeManifest.h +4 -0
  156. package/ios/ReactNativeManifest.mm +45 -0
  157. package/ios/ReactNativeManifestImpl.swift +20 -0
  158. package/ios/SecureEnclaveKeyManager.swift +180 -0
  159. package/package.json +34 -4
  160. package/react-native.config.cjs +14 -0
  161. package/dist/InvalidParamError-B5NwKSKU.native.esm.js.map +0 -1
  162. package/dist/InvalidParamError-BiVmL7nM.esm.js.map +0 -1
  163. package/dist/InvalidParamError-D-d-UfBL.cjs.js.map +0 -1
  164. package/dist/getNetworkProviderFromNetworkId-5dK99mQR.esm.js.map +0 -1
  165. package/dist/getNetworkProviderFromNetworkId-Cl2XDWo9.cjs.js.map +0 -1
  166. package/dist/getNetworkProviderFromNetworkId-DWOYr3uv.native.esm.js.map +0 -1
  167. package/dist/getVerifiedCredentialForWalletAccount-BDvkZbtb.cjs.js.map +0 -1
  168. package/dist/getVerifiedCredentialForWalletAccount-ByUSFAHs.esm.js.map +0 -1
  169. package/dist/getVerifiedCredentialForWalletAccount-Dhqf6Tdl.native.esm.js.map +0 -1
  170. package/dist/modules/auth/handleSessionExpiration/handleSessionExpiration.d.ts +0 -11
  171. package/dist/modules/auth/handleSessionExpiration/handleSessionExpiration.d.ts.map +0 -1
  172. package/dist/modules/auth/handleSessionExpiration/index.d.ts +0 -2
  173. package/dist/modules/auth/handleSessionExpiration/index.d.ts.map +0 -1
  174. package/dist/modules/auth/performLogout/index.d.ts +0 -2
  175. package/dist/modules/auth/performLogout/index.d.ts.map +0 -1
  176. package/dist/modules/auth/performLogout/performLogout.d.ts +0 -12
  177. package/dist/modules/auth/performLogout/performLogout.d.ts.map +0 -1
  178. package/dist/services/keychain/createIndexedDBKeychainService/KeyNotFoundError.d.ts.map +0 -1
  179. package/dist/services/keychain/createIndexedDBKeychainService/createIndexedDBKeychainService.d.ts +0 -8
  180. package/dist/services/keychain/createIndexedDBKeychainService/createIndexedDBKeychainService.d.ts.map +0 -1
  181. package/dist/services/keychain/createIndexedDBKeychainService/createIndexedDBKeychainService.types.d.ts +0 -6
  182. package/dist/services/keychain/createIndexedDBKeychainService/createIndexedDBKeychainService.types.d.ts.map +0 -1
  183. package/dist/services/keychain/createIndexedDBKeychainService/index.d.ts +0 -2
  184. package/dist/services/keychain/createIndexedDBKeychainService/index.d.ts.map +0 -1
  185. package/dist/services/keychain/createIndexedDBKeychainService/utils/constants.d.ts.map +0 -1
  186. package/dist/services/keychain/createIndexedDBKeychainService/utils/deleteIndexedDBItem.d.ts +0 -3
  187. package/dist/services/keychain/createIndexedDBKeychainService/utils/deleteIndexedDBItem.d.ts.map +0 -1
  188. package/dist/services/keychain/createIndexedDBKeychainService/utils/getIndexedDBItem.d.ts +0 -4
  189. package/dist/services/keychain/createIndexedDBKeychainService/utils/getIndexedDBItem.d.ts.map +0 -1
  190. package/dist/services/keychain/createIndexedDBKeychainService/utils/openDatabase.d.ts.map +0 -1
  191. package/dist/services/keychain/createIndexedDBKeychainService/utils/setIndexedDBItem.d.ts +0 -4
  192. package/dist/services/keychain/createIndexedDBKeychainService/utils/setIndexedDBItem.d.ts.map +0 -1
  193. package/dist/services/keychain/createIndexedDBKeychainService/utils/withDatabase/index.d.ts.map +0 -1
  194. package/dist/services/keychain/createIndexedDBKeychainService/utils/withDatabase/withDatabase.d.ts.map +0 -1
  195. /package/dist/services/keychain/{createIndexedDBKeychainService → createKeychainService}/KeyNotFoundError.d.ts +0 -0
  196. /package/dist/services/keychain/{createIndexedDBKeychainService → createKeychainService}/utils/constants.d.ts +0 -0
  197. /package/dist/services/keychain/{createIndexedDBKeychainService → createKeychainService}/utils/openDatabase.d.ts +0 -0
  198. /package/dist/services/keychain/{createIndexedDBKeychainService → createKeychainService}/utils/withDatabase/index.d.ts +0 -0
  199. /package/dist/services/keychain/{createIndexedDBKeychainService → createKeychainService}/utils/withDatabase/withDatabase.d.ts +0 -0
package/dist/index.cjs.js CHANGED
@@ -1,8 +1,8 @@
1
- const require_getNetworkProviderFromNetworkId = require('./getNetworkProviderFromNetworkId-Cl2XDWo9.cjs.js');
2
- const require_InvalidParamError = require('./InvalidParamError-D-d-UfBL.cjs.js');
3
- const require_getVerifiedCredentialForWalletAccount = require('./getVerifiedCredentialForWalletAccount-BDvkZbtb.cjs.js');
4
- const require_NotWaasWalletAccountError = require('./NotWaasWalletAccountError-BJaemI4V.cjs.js');
5
- const require_isMfaRequiredForAction = require('./isMfaRequiredForAction-CYrluCK-.cjs.js');
1
+ const require_getNetworkProviderFromNetworkId = require('./getNetworkProviderFromNetworkId-ClfETwqS.cjs.js');
2
+ const require_InvalidParamError = require('./InvalidParamError-BqDEZ6er.cjs.js');
3
+ const require_getVerifiedCredentialForWalletAccount = require('./getVerifiedCredentialForWalletAccount-DEiU9FZG.cjs.js');
4
+ const require_NotWaasWalletAccountError = require('./NotWaasWalletAccountError-ftYfHk_N.cjs.js');
5
+ const require_isMfaRequiredForAction = require('./isMfaRequiredForAction-mZub0YwI.cjs.js');
6
6
  let _dynamic_labs_sdk_assert_package_version = require("@dynamic-labs-sdk/assert-package-version");
7
7
  let _dynamic_labs_sdk_api_core = require("@dynamic-labs/sdk-api-core");
8
8
  let zod_mini = require("zod/mini");
@@ -35,113 +35,6 @@ const prefetchNoncesIfNeeded = async (client) => {
35
35
  await require_InvalidParamError.fetchAndStoreNonces(client);
36
36
  };
37
37
 
38
- //#endregion
39
- //#region src/utils/retryOnFail/InvalidRetryOnFailCallError.ts
40
- /**
41
- * This error is thrown when the `retryOnFail` function is called with an invalid
42
- * number of retries (i.e. less than 0).
43
- */
44
- var InvalidRetryOnFailCallError = class extends require_InvalidParamError.BaseError {
45
- constructor(maxRetries) {
46
- super({
47
- cause: null,
48
- code: "invalid_retry_on_fail_call_error",
49
- docsUrl: null,
50
- name: "InvalidRetryOnFailCallError",
51
- shortMessage: `Invalid retries parameter for retryOnFail call: ${maxRetries}`
52
- });
53
- }
54
- };
55
-
56
- //#endregion
57
- //#region src/utils/retryOnFail/retryOnFail.ts
58
- /** @not-instrumented */
59
- const retryOnFail = async ({ delay = 0, fn, maxRetries }) => {
60
- for (let retry = 0; retry <= maxRetries; retry++) try {
61
- return await fn();
62
- } catch (error) {
63
- if (retry >= maxRetries) throw error;
64
- if (delay > 0) await new Promise((resolve) => setTimeout(resolve, delay));
65
- }
66
- /**
67
- * Reaching this point should never happen and this
68
- * error is thrown to help us debug the issue.
69
- */
70
- throw new InvalidRetryOnFailCallError(maxRetries);
71
- };
72
-
73
- //#endregion
74
- //#region src/modules/auth/isSignedIn/isSignedIn.ts
75
- /**
76
- * Checks if the user is currently signed in to the Dynamic client.
77
- *
78
- * The client is considered to be in a signed in state if a user has
79
- * authenticated or if the client has at least one wallet connected.
80
- *
81
- * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
82
- * @returns True if the user is signed in, false otherwise.
83
- * @not-instrumented
84
- */
85
- const isSignedIn = (client = require_InvalidParamError.getDefaultClient()) => Boolean(client.user || require_getVerifiedCredentialForWalletAccount.__getWalletAccounts_wrapped(client).length > 0);
86
-
87
- //#endregion
88
- //#region src/modules/projectSettings/fetchProjectSettings/projectSettingsExpirationScheme.ts
89
- /**
90
- * The schema to track the expiration time of the project settings.
91
- */
92
- const projectSettingsExpirationStorageKeySchema = require_getNetworkProviderFromNetworkId.__createStorageKeySchema_wrapped({
93
- key: "projectSettingsExpiration",
94
- schema: zod_mini.number()
95
- });
96
-
97
- //#endregion
98
- //#region src/modules/projectSettings/fetchProjectSettings/fetchProjectSettings.ts
99
- /**
100
- * Expiration time of the project settings in milliseconds.
101
- */
102
- const PROJECT_SETTINGS_EXPIRATION_TIME = 1e3 * 60 * 5;
103
- /**
104
- * Fetches and updates the project settings from the API.
105
- *
106
- * This function retrieves the latest project configuration settings
107
- * from Dynamic's servers, including authentication options, enabled chains,
108
- * and security configurations. The settings are cached for performance.
109
- *
110
- * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
111
- * @returns A promise that resolves to the updated project settings.
112
- * @instrumented
113
- */
114
- const fetchProjectSettings = async (client = require_InvalidParamError.getDefaultClient()) => {
115
- const core = require_InvalidParamError.getCore(client);
116
- const currentExpiration = await core.storage.getItem(projectSettingsExpirationStorageKeySchema);
117
- if (Boolean(client.projectSettings) && !(currentExpiration && currentExpiration < Date.now()) && isSignedIn(client)) return client.projectSettings;
118
- const apiClient = require_InvalidParamError.__createApiClient_wrapped({}, client);
119
- core.logger.debug("[fetchProjectSettings] Fetching project settings...");
120
- const doFetch = async () => apiClient.getEnvironmentSettings({
121
- environmentId: core.environmentId,
122
- sdkVersion: `${require_InvalidParamError.CLIENT_SDK_NAME}/${core.version}`
123
- }, { credentials: "omit" });
124
- const projectSettings = await retryOnFail({
125
- fn: doFetch,
126
- maxRetries: 2
127
- });
128
- core.state.set({ projectSettings: projectSettings ?? null });
129
- await core.storage.setItem(projectSettingsExpirationStorageKeySchema, Date.now() + PROJECT_SETTINGS_EXPIRATION_TIME);
130
- return projectSettings;
131
- };
132
- const __fetchProjectSettings_impl = fetchProjectSettings;
133
- const __fetchProjectSettings_wrapped = require_InvalidParamError.instrumentFunction({
134
- fn: __fetchProjectSettings_impl,
135
- functionName: "fetchProjectSettings",
136
- getCore: () => {
137
- try {
138
- return require_InvalidParamError.getCore(require_InvalidParamError.getDefaultClient());
139
- } catch {
140
- return;
141
- }
142
- }
143
- });
144
-
145
38
  //#endregion
146
39
  //#region src/services/runtimeServices/createRuntimeServices/createRuntimeServices.ts
147
40
  /**
@@ -159,124 +52,13 @@ const createRuntimeServices = () => {
159
52
  };
160
53
  };
161
54
 
162
- //#endregion
163
- //#region src/modules/wallets/utils/getAvailableWalletProvidersFromWalletAccounts/getAvailableWalletProvidersFromWalletAccounts.ts
164
- /** @not-instrumented */
165
- const getAvailableWalletProvidersFromWalletAccounts = (client) => {
166
- const core = require_InvalidParamError.getCore(client);
167
- const walletProvidersMap = /* @__PURE__ */ new Map();
168
- require_getVerifiedCredentialForWalletAccount.__getWalletAccounts_wrapped(client).forEach((walletAccount) => {
169
- if (walletProvidersMap.has(walletAccount.walletProviderKey)) return;
170
- try {
171
- const walletProvider = require_getVerifiedCredentialForWalletAccount.__getWalletProviderFromWalletAccount_wrapped({ walletAccount }, client);
172
- walletProvidersMap.set(walletAccount.walletProviderKey, walletProvider);
173
- } catch (error) {
174
- core.logger.debug("Wallet provider not found for wallet account", {
175
- error,
176
- walletAccount: walletAccount.address
177
- });
178
- }
179
- });
180
- return Array.from(walletProvidersMap.values());
181
- };
182
-
183
- //#endregion
184
- //#region src/modules/wallets/disconnectAndTerminateWalletProviders/disconnectAndTerminateWalletProviders.ts
185
- /**
186
- * Disconnect and terminate each wallet provider, if available.
187
- * @not-instrumented
188
- */
189
- const disconnectAndTerminateWalletProviders = async ({ reason }, client) => {
190
- const core = require_InvalidParamError.getCore(client);
191
- const walletProviders = getAvailableWalletProvidersFromWalletAccounts(client);
192
- await Promise.all(walletProviders.map(async (walletProvider) => {
193
- if (walletProvider.terminate) await walletProvider.terminate({ reason });
194
- if (walletProvider.disconnect) try {
195
- await walletProvider.disconnect();
196
- } catch (err) {
197
- core.logger.error(`Error disconnecting from wallet ${walletProvider.key}`, err);
198
- }
199
- }));
200
- };
201
-
202
- //#endregion
203
- //#region src/modules/auth/performLogout/performLogout.ts
204
- /**
205
- * Shared logout implementation that revokes the session, clears auth state,
206
- * terminates wallet providers, and emits the logout event with the given reason.
207
- *
208
- * @not-instrumented
209
- */
210
- const performLogout = async ({ reason }, client) => {
211
- const core = require_InvalidParamError.getCore(client);
212
- core.logger.debug("[logout] Logging out...");
213
- await disconnectAndTerminateWalletProviders({ reason }, client);
214
- if (client.user !== null) {
215
- const apiClient = require_InvalidParamError.__createApiClient_wrapped({}, client);
216
- try {
217
- await apiClient.revokeSession({ environmentId: core.environmentId });
218
- } catch (error) {
219
- core.logger.error("Failed to revoke session", error);
220
- }
221
- /**
222
- * This deletes the auth cookie if it exists.
223
- * If the cookie doesn't exist, this sets a new cookie that expires immediately.
224
- */
225
- if (require_InvalidParamError.isCookieEnabled(client)) require_getVerifiedCredentialForWalletAccount.setCookie(`${require_getVerifiedCredentialForWalletAccount.DYNAMIC_AUTH_COOKIE_NAME}=; Max-Age=-99999999; path=/; SameSite=Lax`);
226
- }
227
- await core.keychain.removeKey("session");
228
- core.state.set({
229
- captchaToken: null,
230
- elevatedAccessTokens: [],
231
- legacyToken: null,
232
- mfaToken: null,
233
- sessionExpiresAt: null,
234
- sessionKeys: null,
235
- token: null,
236
- unverifiedWalletAccounts: [],
237
- user: null
238
- });
239
- require_getVerifiedCredentialForWalletAccount.emitEvent({
240
- args: { reason },
241
- event: "logout"
242
- }, client);
243
- __fetchProjectSettings_wrapped(client);
244
- require_getNetworkProviderFromNetworkId.__generateSessionKeys_wrapped(client);
245
- };
246
-
247
- //#endregion
248
- //#region src/modules/auth/handleSessionExpiration/handleSessionExpiration.ts
249
- /**
250
- * Logs out due to session expiry with a token-expired reason,
251
- * allowing downstream providers to decide their own cleanup behavior.
252
- *
253
- * @param client - The Dynamic client instance.
254
- * @returns A promise that resolves when the logout process is complete.
255
- * @instrumented
256
- */
257
- const handleSessionExpiration = async (client) => {
258
- return performLogout({ reason: "token-expired" }, client);
259
- };
260
- const __handleSessionExpiration_impl = handleSessionExpiration;
261
- const __handleSessionExpiration_wrapped = require_InvalidParamError.instrumentFunction({
262
- fn: __handleSessionExpiration_impl,
263
- functionName: "handleSessionExpiration",
264
- getCore: () => {
265
- try {
266
- return require_InvalidParamError.getCore(require_InvalidParamError.getDefaultClient());
267
- } catch {
268
- return;
269
- }
270
- }
271
- });
272
-
273
55
  //#endregion
274
56
  //#region src/modules/auth/initializeAuth/setLongTimeout/setLongTimeout.ts
275
57
  /**
276
58
  * A replacement for setTimeout that supports delays longer than 2147483647ms (~24.8 days).
277
59
  * @not-instrumented
278
60
  */
279
- const setLongTimeout = (callback, delay) => {
61
+ const setLongTimeout = ({ callback, delay }) => {
280
62
  const MAX_DELAY = 2147483647;
281
63
  let timeoutId = null;
282
64
  let remaining = delay;
@@ -310,40 +92,18 @@ const initializeAuth = (client) => {
310
92
  const now = /* @__PURE__ */ new Date();
311
93
  const timeUntilExpiration = expiration.getTime() - now.getTime();
312
94
  if (timeUntilExpiration <= 0) {
313
- __handleSessionExpiration_wrapped(client);
95
+ require_getNetworkProviderFromNetworkId.__logoutWithReason_wrapped({ reason: "token-expired" }, client);
314
96
  return;
315
97
  }
316
- clearExpirationTimeout = setLongTimeout(checkExpiration, timeUntilExpiration);
98
+ clearExpirationTimeout = setLongTimeout({
99
+ callback: checkExpiration,
100
+ delay: timeUntilExpiration
101
+ });
317
102
  };
318
103
  onChangeExpiration(checkExpiration);
319
104
  checkExpiration();
320
105
  };
321
106
 
322
- //#endregion
323
- //#region src/modules/auth/logout/logout.ts
324
- /**
325
- * Logs out the current user and clears all authentication data.
326
- *
327
- * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
328
- * @returns A promise that resolves when the logout process is complete.
329
- * @instrumented
330
- */
331
- const logout = async (client = require_InvalidParamError.getDefaultClient()) => {
332
- return performLogout({ reason: "user-intent" }, client);
333
- };
334
- const __logout_impl = logout;
335
- const __logout_wrapped = require_InvalidParamError.instrumentFunction({
336
- fn: __logout_impl,
337
- functionName: "logout",
338
- getCore: () => {
339
- try {
340
- return require_InvalidParamError.getCore(require_InvalidParamError.getDefaultClient());
341
- } catch {
342
- return;
343
- }
344
- }
345
- });
346
-
347
107
  //#endregion
348
108
  //#region src/modules/crossTabEventSync/setupCrossTabEventSync/setupCrossTabEventSync.ts
349
109
  /**
@@ -410,6 +170,7 @@ const stateStorageKeySchema = require_getNetworkProviderFromNetworkId.__createSt
410
170
  })
411
171
  });
412
172
  const sessionStorageKeySchema = require_getNetworkProviderFromNetworkId.__createStorageKeySchema_wrapped({
173
+ config: { storageTier: "secure" },
413
174
  key: "session",
414
175
  schema: zod_mini.object({
415
176
  captchaToken: zod_mini.nullable(zod_mini.string()),
@@ -668,10 +429,10 @@ const initializeClient = async (client = require_InvalidParamError.getDefaultCli
668
429
  logger: core.logger,
669
430
  state: core.state,
670
431
  storage: core.storage
671
- }).catch(() => __logout_wrapped(client));
672
- if (core.state.get().sessionKeys && !await core.keychain.hasKey("session")) await __logout_wrapped(client);
432
+ }).catch(() => require_getNetworkProviderFromNetworkId.__logoutWithReason_wrapped({ reason: "keychain-migration-failed" }, client));
433
+ if (core.state.get().sessionKeys && !await core.keychain.hasKey("session")) await require_getNetworkProviderFromNetworkId.__logoutWithReason_wrapped({ reason: "keychain-key-missing" }, client);
673
434
  }).then(async () => {
674
- if (!core.state.get().projectSettings) await __fetchProjectSettings_wrapped(client);
435
+ if (!core.state.get().projectSettings) await require_getNetworkProviderFromNetworkId.__fetchProjectSettings_wrapped(client);
675
436
  });
676
437
  fetchProjectSettingsPromise.then(() => prefetchNoncesIfNeeded(client)).catch((error) => {
677
438
  core.logger.error("Failed to prefetch nonces:", error);
@@ -705,7 +466,7 @@ const initializeClient = async (client = require_InvalidParamError.getDefaultCli
705
466
  if (require_InvalidParamError.isCookieEnabled(client)) await require_NotWaasWalletAccountError.__refreshAuth_wrapped(client).catch(async (error) => {
706
467
  if (error.status === 401) {
707
468
  core.logger.error("Session expired during initialization", error);
708
- if (client.user) await __logout_wrapped(client);
469
+ if (client.user) await require_getNetworkProviderFromNetworkId.__logoutWithReason_wrapped({ reason: "session-refresh-unauthorized" }, client);
709
470
  } else throw error;
710
471
  });
711
472
  });
@@ -716,7 +477,7 @@ const initializeClient = async (client = require_InvalidParamError.getDefaultCli
716
477
  */
717
478
  const refreshUserStateFromValidTokenPromise = refreshUserStateFromCookiePromise.then(async () => {
718
479
  if (core.state.get().token && !core.state.get().user) await __refreshUser_wrapped(client).catch(async () => {
719
- await __logout_wrapped(client);
480
+ await require_getNetworkProviderFromNetworkId.__logoutWithReason_wrapped({ reason: "user-refresh-failed" }, client);
720
481
  });
721
482
  });
722
483
  core.initTrack.track({
@@ -1206,7 +967,7 @@ const createCore = (config) => {
1206
967
  const passkey = config.coreConfig?.passkey ?? createWebPasskeyService();
1207
968
  const realtime = config.coreConfig?.realtime ?? require_getNetworkProviderFromNetworkId.__createRealtimeService_wrapped();
1208
969
  const deviceSigner = config.coreConfig?.deviceSigner;
1209
- const keychain = config.coreConfig?.keychain ?? require_getNetworkProviderFromNetworkId.__createIndexedDBKeychainService_wrapped({ dbName: `dynamic_${config.environmentId}_keychain` });
970
+ const keychain = config.coreConfig?.keychain ?? require_getNetworkProviderFromNetworkId.createKeychainService({ dbName: `dynamic_${config.environmentId}_keychain` });
1210
971
  return {
1211
972
  apiBaseUrl,
1212
973
  crossTabBroadcast: config.coreConfig?.crossTabBroadcast ?? require_getNetworkProviderFromNetworkId.__createCrossTabBroadcast_wrapped({ channelName: `dynamic_${config.environmentId}_broadcast` }),
@@ -1751,7 +1512,7 @@ const requestExternalAuthElevatedToken = async ({ externalJwt }, client = requir
1751
1512
  environmentId: core.environmentId,
1752
1513
  externalAuthSigninRequest: { jwt: externalJwt }
1753
1514
  });
1754
- const parsedToken = require_getVerifiedCredentialForWalletAccount.parseElevatedAccessToken(response.elevatedAccessToken);
1515
+ const parsedToken = require_getVerifiedCredentialForWalletAccount.parseElevatedAccessToken({ token: response.elevatedAccessToken });
1755
1516
  if (parsedToken) {
1756
1517
  const currentTokens = core.state.get().elevatedAccessTokens || [];
1757
1518
  core.state.set({ elevatedAccessTokens: require_getVerifiedCredentialForWalletAccount.upsertElevatedAccessToken({
@@ -1814,6 +1575,25 @@ const __signInWithExternalJwt_wrapped = require_InvalidParamError.instrumentFunc
1814
1575
  redactAll: true
1815
1576
  });
1816
1577
 
1578
+ //#endregion
1579
+ //#region src/modules/auth/logout/logout.ts
1580
+ /**
1581
+ * Logs out the current user and clears all authentication data.
1582
+ *
1583
+ * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
1584
+ * @returns A promise that resolves when the logout process is complete.
1585
+ * @not-instrumented
1586
+ */
1587
+ const logout = async (client = require_InvalidParamError.getDefaultClient()) => {
1588
+ /**
1589
+ * Delegates to `logoutWithReason` with `'user-intent'` so telemetry correctly
1590
+ * attributes the logout to an explicit user action. Instrumentation lives on
1591
+ * `logoutWithReason` — this wrapper is intentionally not instrumented so that
1592
+ * Datadog sees a single function name per logout regardless of entry point.
1593
+ */
1594
+ return require_getNetworkProviderFromNetworkId.__logoutWithReason_wrapped({ reason: "user-intent" }, client);
1595
+ };
1596
+
1817
1597
  //#endregion
1818
1598
  //#region src/modules/auth/passkeys/deletePasskey/deletePasskey.ts
1819
1599
  /**
@@ -2091,7 +1871,7 @@ const APPLE_RESPONSE_MODE = "form_post";
2091
1871
  const APPLE_RESPONSE_TYPE = "code id_token";
2092
1872
  /** Helper function to add OAuth URL parameters to a given base URL. * @not-instrumented
2093
1873
  */
2094
- const addOAuthUrlParams = (provider, baseUrl, options = {}) => {
1874
+ const addOAuthUrlParams = ({ baseUrl, isGoogleDriveBackupEnabled, provider }) => {
2095
1875
  require_InvalidParamError.assertDefined(provider.clientId, "Client ID not found");
2096
1876
  require_InvalidParamError.assertDefined(provider.provider, "Provider type not found");
2097
1877
  require_InvalidParamError.assertDefined(provider.redirectUrl, "Redirect URL not found");
@@ -2105,7 +1885,7 @@ const addOAuthUrlParams = (provider, baseUrl, options = {}) => {
2105
1885
  }
2106
1886
  if (providerType === _dynamic_labs_sdk_api_core.ProviderEnum.Google) {
2107
1887
  baseUrl.searchParams.set("access_type", "offline");
2108
- if (options.isGoogleDriveBackupEnabled) baseUrl.searchParams.set("prompt", "consent");
1888
+ if (isGoogleDriveBackupEnabled) baseUrl.searchParams.set("prompt", "consent");
2109
1889
  }
2110
1890
  if (providerType === _dynamic_labs_sdk_api_core.ProviderEnum.Apple) {
2111
1891
  baseUrl.searchParams.set("response_mode", APPLE_RESPONSE_MODE);
@@ -2147,7 +1927,11 @@ const buildOAuthUrl = async (core, provider) => {
2147
1927
  const socialProvider = projectSettings.providers.find((p) => p.provider === provider);
2148
1928
  require_InvalidParamError.assertDefined(socialProvider, `Social provider ${provider} not supported`);
2149
1929
  const isGoogleDriveBackupEnabled = projectSettings.sdk.waas?.backupOptions?.includes(_dynamic_labs_sdk_api_core.WaasBackupOptionsEnum.GoogleDrive);
2150
- const socialProviderUrl = addOAuthUrlParams(socialProvider, getOAuthBaseUrl(socialProvider), { isGoogleDriveBackupEnabled });
1930
+ const socialProviderUrl = addOAuthUrlParams({
1931
+ baseUrl: getOAuthBaseUrl(socialProvider),
1932
+ isGoogleDriveBackupEnabled,
1933
+ provider: socialProvider
1934
+ });
2151
1935
  const usingPkce = providersRequiringPkce.includes(provider);
2152
1936
  const state = require_InvalidParamError.randomString({ length: 32 });
2153
1937
  const codeVerifier = require_InvalidParamError.randomString({ length: 43 });
@@ -3176,7 +2960,7 @@ const isDeviceRegistrationRequired = (user) => Boolean(user.scope?.includes("dev
3176
2960
  const revokeAllRegisteredDevices = async (client = require_InvalidParamError.getDefaultClient()) => {
3177
2961
  const core = require_InvalidParamError.getCore(client);
3178
2962
  await require_InvalidParamError.__createApiClient_wrapped({}, client).deleteAllDeviceRegistrations({ environmentId: core.environmentId });
3179
- await __logout_wrapped(client);
2963
+ await require_getNetworkProviderFromNetworkId.__logoutWithReason_wrapped({ reason: "all-devices-revoked" }, client);
3180
2964
  };
3181
2965
  const __revokeAllRegisteredDevices_impl = revokeAllRegisteredDevices;
3182
2966
  const __revokeAllRegisteredDevices_wrapped = require_InvalidParamError.instrumentFunction({
@@ -3200,7 +2984,7 @@ const revokeRegisteredDevice = async ({ deviceRegistrationId }, client = require
3200
2984
  if ((await require_InvalidParamError.__createApiClient_wrapped({}, client).deleteDeviceRegistration({
3201
2985
  deviceRegistrationId,
3202
2986
  environmentId: core.environmentId
3203
- })).currentDeviceRevoked) await __logout_wrapped(client);
2987
+ })).currentDeviceRevoked) await require_getNetworkProviderFromNetworkId.__logoutWithReason_wrapped({ reason: "device-revoked" }, client);
3204
2988
  };
3205
2989
  const __revokeRegisteredDevice_impl = revokeRegisteredDevice;
3206
2990
  const __revokeRegisteredDevice_wrapped = require_InvalidParamError.instrumentFunction({
@@ -3588,7 +3372,7 @@ const __waitForClientInitialized_wrapped = require_InvalidParamError.instrumentF
3588
3372
  * normally but emit no telemetry.
3589
3373
  * @instrumented
3590
3374
  */
3591
- const setInstrumentationEnabled = (enabled, client = require_InvalidParamError.getDefaultClient()) => {
3375
+ const setInstrumentationEnabled = ({ enabled }, client = require_InvalidParamError.getDefaultClient()) => {
3592
3376
  require_InvalidParamError.getCore(client).instrumentation.setEnabled(enabled);
3593
3377
  };
3594
3378
  const __setInstrumentationEnabled_impl = setInstrumentationEnabled;
@@ -3697,7 +3481,7 @@ const fetchLegacyWalletBook = async (client) => {
3697
3481
  const core = require_InvalidParamError.getCore(client);
3698
3482
  core.logger.debug("[fetchLegacyWalletBook] Fetching wallet book...");
3699
3483
  try {
3700
- const walletBook = await retryOnFail({
3484
+ const walletBook = await require_getNetworkProviderFromNetworkId.retryOnFail({
3701
3485
  delay: RETRY_DELAY_MS,
3702
3486
  fn: async () => fetchWithTimeout(client),
3703
3487
  maxRetries: MAX_RETRIES
@@ -3739,12 +3523,10 @@ const EMBEDDED_WALLET_KEYS = [
3739
3523
  /**
3740
3524
  * Checks if a wallet should be filtered out from the WalletConnect catalog.
3741
3525
  *
3742
- * @param walletKey - The wallet key identifier.
3743
- * @param wallet - The wallet schema to check.
3744
3526
  * @returns True if the wallet should be filtered out, false otherwise.
3745
3527
  * @not-instrumented
3746
3528
  */
3747
- const shouldFilterWallet = (walletKey, wallet) => {
3529
+ const shouldFilterWallet = ({ wallet, walletKey }) => {
3748
3530
  if (EMBEDDED_WALLET_KEYS.includes(walletKey)) return true;
3749
3531
  if (!wallet.walletConnect || !wallet.walletConnect.sdks.includes("sign_v2")) return true;
3750
3532
  const hasInjectedConfig = wallet.injectedConfig && wallet.injectedConfig.length > 0;
@@ -3959,7 +3741,10 @@ const transformWalletBook = ({ walletBook }) => {
3959
3741
  for (const [groupKey, group] of Object.entries(walletBook.groups)) groups[groupKey] = transformGroup({ group });
3960
3742
  const wallets = {};
3961
3743
  for (const [walletKey, wallet] of Object.entries(walletBook.wallets)) {
3962
- if (shouldFilterWallet(walletKey, wallet)) continue;
3744
+ if (shouldFilterWallet({
3745
+ wallet,
3746
+ walletKey
3747
+ })) continue;
3963
3748
  wallets[walletKey] = transformWallet({
3964
3749
  wallet,
3965
3750
  walletKey
@@ -5782,7 +5567,7 @@ const __getSwapStatus_wrapped = require_InvalidParamError.instrumentFunction({
5782
5567
  const deleteUser = async (client = require_InvalidParamError.getDefaultClient()) => {
5783
5568
  const core = require_InvalidParamError.getCore(client);
5784
5569
  await require_InvalidParamError.__createApiClient_wrapped({ includeMfaToken: true }, client).hardDeleteUser({ environmentId: core.environmentId });
5785
- await __logout_wrapped(client);
5570
+ await require_getNetworkProviderFromNetworkId.__logoutWithReason_wrapped({ reason: "user-deleted" }, client);
5786
5571
  };
5787
5572
  const __deleteUser_impl = deleteUser;
5788
5573
  const __deleteUser_wrapped = require_InvalidParamError.instrumentFunction({
@@ -6086,7 +5871,13 @@ const __proveWalletAccountOwnership_wrapped = require_InvalidParamError.instrume
6086
5871
  //#endregion
6087
5872
  //#region src/modules/wallets/utils/isSameAddress/isSameAddress.ts
6088
5873
  /** @not-instrumented */
6089
- const isSameAddress = (left, right, chain) => require_getVerifiedCredentialForWalletAccount.normalizeAddress(left, chain) === require_getVerifiedCredentialForWalletAccount.normalizeAddress(right, chain);
5874
+ const isSameAddress = ({ chain, left, right }) => require_getVerifiedCredentialForWalletAccount.normalizeAddress({
5875
+ address: left,
5876
+ chain
5877
+ }) === require_getVerifiedCredentialForWalletAccount.normalizeAddress({
5878
+ address: right,
5879
+ chain
5880
+ });
6090
5881
 
6091
5882
  //#endregion
6092
5883
  //#region src/modules/wallets/verifyWalletAccountForSignInOrTransfer/verifyWalletAccountForSignInOrTransfer.ts
@@ -6112,7 +5903,11 @@ const verifyWalletAccountForSignInOrTransfer = async ({ walletAccount, isTransfe
6112
5903
  walletDisplayName: walletProvider.metadata.displayName,
6113
5904
  walletProviderType: walletProvider.walletProviderType
6114
5905
  }, client);
6115
- const walletVerifiedCredential = response.user?.verifiedCredentials.find((verifiedCredential) => isSameAddress(verifiedCredential.address ?? "", walletAccount.address, walletAccount.chain));
5906
+ const walletVerifiedCredential = response.user?.verifiedCredentials.find((verifiedCredential) => isSameAddress({
5907
+ chain: walletAccount.chain,
5908
+ left: verifiedCredential.address ?? "",
5909
+ right: walletAccount.address
5910
+ }));
6116
5911
  require_InvalidParamError.assertDefined(walletVerifiedCredential, `After verifying, still unable to find verified wallet credential for wallet account ${walletAccount.address} on chain ${walletAccount.chain}`);
6117
5912
  require_getNetworkProviderFromNetworkId.__updateWalletProviderKeysForVerifiedCredentials_wrapped({ keysToUpdate: { [walletVerifiedCredential.id]: walletProvider.key } }, client);
6118
5913
  /**
@@ -6124,7 +5919,11 @@ const verifyWalletAccountForSignInOrTransfer = async ({ walletAccount, isTransfe
6124
5919
  * Remove the now verified wallet account from the unverified wallet accounts
6125
5920
  */
6126
5921
  require_getNetworkProviderFromNetworkId.__removeUnverifiedWalletAccount_wrapped({ unverifiedWalletAccount: walletAccount }, client);
6127
- const verifiedWalletAccount = require_getVerifiedCredentialForWalletAccount.__getWalletAccounts_wrapped(client).find(({ address }) => isSameAddress(address, walletAccount.address, walletAccount.chain));
5922
+ const verifiedWalletAccount = require_getVerifiedCredentialForWalletAccount.__getWalletAccounts_wrapped(client).find(({ address }) => isSameAddress({
5923
+ chain: walletAccount.chain,
5924
+ left: address,
5925
+ right: walletAccount.address
5926
+ }));
6128
5927
  require_InvalidParamError.assertDefined(verifiedWalletAccount, `Unable to find wallet account ${walletAccount.address} on chain ${walletAccount.chain} for verified credential ${walletVerifiedCredential.id}`);
6129
5928
  return verifiedWalletAccount;
6130
5929
  };
@@ -7072,7 +6871,7 @@ exports.deleteUser = __deleteUser_wrapped;
7072
6871
  exports.detectDeviceRegistrationRedirect = __detectDeviceRegistrationRedirect_wrapped;
7073
6872
  exports.detectOAuthRedirect = __detectOAuthRedirect_wrapped;
7074
6873
  exports.executeSwapTransaction = __executeSwapTransaction_wrapped;
7075
- exports.fetchProjectSettings = __fetchProjectSettings_wrapped;
6874
+ exports.fetchProjectSettings = require_getNetworkProviderFromNetworkId.__fetchProjectSettings_wrapped;
7076
6875
  exports.getActiveNetworkData = __getActiveNetworkData_wrapped;
7077
6876
  exports.getActiveNetworkId = __getActiveNetworkId_wrapped;
7078
6877
  exports.getAvailableWalletProvidersData = __getAvailableWalletProvidersData_wrapped;
@@ -7118,11 +6917,11 @@ exports.isMfaRequiredForAction = require_isMfaRequiredForAction.isMfaRequiredFor
7118
6917
  exports.isMobile = isMobile;
7119
6918
  exports.isPendingRecoveryCodesAcknowledgment = isPendingRecoveryCodesAcknowledgment;
7120
6919
  exports.isProgrammaticNetworkSwitchAvailable = isProgrammaticNetworkSwitchAvailable;
7121
- exports.isSignedIn = isSignedIn;
6920
+ exports.isSignedIn = require_getNetworkProviderFromNetworkId.isSignedIn;
7122
6921
  exports.isUserMissingMfaAuth = isUserMissingMfaAuth;
7123
6922
  exports.isUserOnboardingComplete = isUserOnboardingComplete;
7124
6923
  exports.isWalletAccountVerified = isWalletAccountVerified;
7125
- exports.logout = __logout_wrapped;
6924
+ exports.logout = logout;
7126
6925
  exports.offEvent = require_getVerifiedCredentialForWalletAccount.__offEvent_wrapped;
7127
6926
  exports.offWalletProviderEvent = __offWalletProviderEvent_wrapped;
7128
6927
  exports.onEvent = require_getVerifiedCredentialForWalletAccount.__onEvent_wrapped;