@dynamic-labs-sdk/client 0.25.1 → 0.26.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{InvalidParamError-DcN56mC-.esm.js → InvalidParamError-8oTZu9Ss.esm.js} +76 -74
- package/dist/InvalidParamError-8oTZu9Ss.esm.js.map +1 -0
- package/dist/{InvalidParamError-BqDEZ6er.cjs.js → InvalidParamError-CDcFoUsR.cjs} +76 -74
- package/dist/InvalidParamError-CDcFoUsR.cjs.map +1 -0
- package/dist/{InvalidParamError-BDHw6nr1.native.esm.js → InvalidParamError-DfGUIqBR.native.esm.js} +76 -74
- package/dist/InvalidParamError-DfGUIqBR.native.esm.js.map +1 -0
- package/dist/{NotWaasWalletAccountError-CQ7CMol4.esm.js → NotWaasWalletAccountError-BXYbDiS5.esm.js} +3 -3
- package/dist/{NotWaasWalletAccountError-CQ7CMol4.esm.js.map → NotWaasWalletAccountError-BXYbDiS5.esm.js.map} +1 -1
- package/dist/{NotWaasWalletAccountError-ftYfHk_N.cjs.js → NotWaasWalletAccountError-Dz_L-UKa.cjs} +3 -3
- package/dist/NotWaasWalletAccountError-Dz_L-UKa.cjs.map +1 -0
- package/dist/{NotWaasWalletAccountError-B_TYSgak.native.esm.js → NotWaasWalletAccountError-zzSINA4C.native.esm.js} +3 -3
- package/dist/{NotWaasWalletAccountError-B_TYSgak.native.esm.js.map → NotWaasWalletAccountError-zzSINA4C.native.esm.js.map} +1 -1
- package/dist/client/core/createCore/createCore.d.ts.map +1 -1
- package/dist/{core.cjs.js → core.cjs} +6 -6
- package/dist/core.cjs.map +1 -0
- package/dist/core.esm.js +5 -5
- package/dist/core.native.esm.js +5 -19
- package/dist/core.native.esm.js.map +1 -1
- package/dist/exports/index.d.ts +6 -0
- package/dist/exports/index.d.ts.map +1 -1
- package/dist/{getNetworkProviderFromNetworkId-COHxfpo-.esm.js → getNetworkProviderFromNetworkId-CQ6-2hmD.esm.js} +5 -4
- package/dist/getNetworkProviderFromNetworkId-CQ6-2hmD.esm.js.map +1 -0
- package/dist/{getNetworkProviderFromNetworkId-ClfETwqS.cjs.js → getNetworkProviderFromNetworkId-D_s_Quuj.cjs} +5 -4
- package/dist/getNetworkProviderFromNetworkId-D_s_Quuj.cjs.map +1 -0
- package/dist/{getNetworkProviderFromNetworkId-BRWuk0I8.native.esm.js → getNetworkProviderFromNetworkId-Direm9Jd.native.esm.js} +46 -31
- package/dist/getNetworkProviderFromNetworkId-Direm9Jd.native.esm.js.map +1 -0
- package/dist/{getSignedSessionId-B6ry-rvs.esm.js → getSignedSessionId-B2eeBoo6.esm.js} +3 -3
- package/dist/{getSignedSessionId-B6ry-rvs.esm.js.map → getSignedSessionId-B2eeBoo6.esm.js.map} +1 -1
- package/dist/{getSignedSessionId-Bkw9TATj.cjs.js → getSignedSessionId-BRFJcCTN.cjs} +3 -3
- package/dist/getSignedSessionId-BRFJcCTN.cjs.map +1 -0
- package/dist/{getSignedSessionId-C58DvQAd.native.esm.js → getSignedSessionId-Dis6zpC8.native.esm.js} +3 -3
- package/dist/{getSignedSessionId-C58DvQAd.native.esm.js.map → getSignedSessionId-Dis6zpC8.native.esm.js.map} +1 -1
- package/dist/{getVerifiedCredentialForWalletAccount-DP4VQBly.esm.js → getVerifiedCredentialForWalletAccount-BIBPCcgg.native.esm.js} +27 -3
- package/dist/getVerifiedCredentialForWalletAccount-BIBPCcgg.native.esm.js.map +1 -0
- package/dist/{getVerifiedCredentialForWalletAccount-DEiU9FZG.cjs.js → getVerifiedCredentialForWalletAccount-BlbBwou9.cjs} +33 -3
- package/dist/getVerifiedCredentialForWalletAccount-BlbBwou9.cjs.map +1 -0
- package/dist/{getVerifiedCredentialForWalletAccount-d_bHvLLE.native.esm.js → getVerifiedCredentialForWalletAccount-DhETeEbE.esm.js} +27 -3
- package/dist/getVerifiedCredentialForWalletAccount-DhETeEbE.esm.js.map +1 -0
- package/dist/{index.cjs.js → index.cjs} +136 -112
- package/dist/index.cjs.map +1 -0
- package/dist/index.esm.js +128 -107
- package/dist/index.esm.js.map +1 -1
- package/dist/index.native.esm.js +179 -289
- package/dist/index.native.esm.js.map +1 -1
- package/dist/{isMfaRequiredForAction-D8GPFYzv.esm.js → isMfaRequiredForAction-BYL3bf1x.esm.js} +2 -2
- package/dist/{isMfaRequiredForAction-D8GPFYzv.esm.js.map → isMfaRequiredForAction-BYL3bf1x.esm.js.map} +1 -1
- package/dist/{isMfaRequiredForAction-Cjbuyen3.native.esm.js → isMfaRequiredForAction-DF-lP3Zt.native.esm.js} +2 -2
- package/dist/{isMfaRequiredForAction-Cjbuyen3.native.esm.js.map → isMfaRequiredForAction-DF-lP3Zt.native.esm.js.map} +1 -1
- package/dist/{isMfaRequiredForAction-mZub0YwI.cjs.js → isMfaRequiredForAction-_6Mr0I9D.cjs} +2 -2
- package/dist/isMfaRequiredForAction-_6Mr0I9D.cjs.map +1 -0
- package/dist/modules/apiClient/createApiClient.d.ts +1 -1
- package/dist/modules/apiClient/createApiClient.d.ts.map +1 -1
- package/dist/modules/auth/passkeys/signInWithPasskey/signInWithPasskey.d.ts +1 -1
- package/dist/modules/auth/social/oauth/authenticateWithSocial/authenticateWithSocial.d.ts +4 -12
- package/dist/modules/auth/social/oauth/authenticateWithSocial/authenticateWithSocial.d.ts.map +1 -1
- package/dist/modules/auth/social/oauth/completeSocialAuthentication/completeSocialAuthentication.d.ts +4 -12
- package/dist/modules/auth/social/oauth/completeSocialAuthentication/completeSocialAuthentication.d.ts.map +1 -1
- package/dist/modules/auth/social/oauth/completeSocialRedirect/completeSocialRedirect.d.ts +20 -0
- package/dist/modules/auth/social/oauth/completeSocialRedirect/completeSocialRedirect.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/completeSocialRedirect/completeSocialRedirect.types.d.ts +6 -0
- package/dist/modules/auth/social/oauth/completeSocialRedirect/completeSocialRedirect.types.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/completeSocialRedirect/index.d.ts +2 -0
- package/dist/modules/auth/social/oauth/completeSocialRedirect/index.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/detectOAuthRedirect/detectOAuthRedirect.d.ts +4 -9
- package/dist/modules/auth/social/oauth/detectOAuthRedirect/detectOAuthRedirect.d.ts.map +1 -1
- package/dist/modules/auth/social/oauth/detectSocialRedirectUrl/detectSocialRedirectUrl.d.ts +16 -0
- package/dist/modules/auth/social/oauth/detectSocialRedirectUrl/detectSocialRedirectUrl.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/detectSocialRedirectUrl/detectSocialRedirectUrl.types.d.ts +4 -0
- package/dist/modules/auth/social/oauth/detectSocialRedirectUrl/detectSocialRedirectUrl.types.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/detectSocialRedirectUrl/index.d.ts +2 -0
- package/dist/modules/auth/social/oauth/detectSocialRedirectUrl/index.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/buildOAuthUrl/addOAuthUrlParams/addOAuthUrlParams.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/buildOAuthUrl/addOAuthUrlParams/index.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/{authenticateWithSocial → signInWithSocialRedirect}/buildOAuthUrl/buildOAuthUrl.d.ts +1 -1
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/buildOAuthUrl/buildOAuthUrl.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/buildOAuthUrl/getOAuthBaseUrl/getOAuthBaseUrl.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/buildOAuthUrl/getOAuthBaseUrl/index.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/buildOAuthUrl/index.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/index.d.ts +2 -0
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/index.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/signInWithSocialRedirect.d.ts +19 -0
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/signInWithSocialRedirect.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/signInWithSocialRedirect.types.d.ts +6 -0
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/signInWithSocialRedirect.types.d.ts.map +1 -0
- package/dist/modules/mfa/authenticateMfaRecoveryCode/authenticateMfaRecoveryCode.d.ts +3 -4
- package/dist/modules/mfa/authenticateMfaRecoveryCode/authenticateMfaRecoveryCode.d.ts.map +1 -1
- package/dist/modules/mfa/authenticatePasskeyMFA/authenticatePasskeyMFA.d.ts +4 -5
- package/dist/modules/mfa/authenticatePasskeyMFA/authenticatePasskeyMFA.d.ts.map +1 -1
- package/dist/modules/mfa/authenticateTotpMfaDevice/authenticateTotpMfaDevice.d.ts +3 -4
- package/dist/modules/mfa/authenticateTotpMfaDevice/authenticateTotpMfaDevice.d.ts.map +1 -1
- package/dist/modules/sessionKeys/generateSessionKeys/generateSessionKeys.d.ts.map +1 -1
- package/dist/modules/waas/restoreUserSharesForAllWalletAccounts/restoreUserSharesForAllWalletAccounts.d.ts.map +1 -1
- package/dist/services/instrumentation/connectLoggerToInstrumentation/connectLoggerToInstrumentation.d.ts +2 -1
- package/dist/services/instrumentation/connectLoggerToInstrumentation/connectLoggerToInstrumentation.d.ts.map +1 -1
- package/dist/services/instrumentation/instrumentFunction/instrumentFunction.d.ts.map +1 -1
- package/dist/services/instrumentation/instrumentation.types.d.ts +2 -0
- package/dist/services/instrumentation/instrumentation.types.d.ts.map +1 -1
- package/dist/services/passkey/createPasskeyService/createPasskeyService.d.ts +11 -0
- package/dist/services/passkey/createPasskeyService/createPasskeyService.d.ts.map +1 -0
- package/dist/services/passkey/createPasskeyService/index.d.ts +2 -0
- package/dist/services/passkey/createPasskeyService/index.d.ts.map +1 -0
- package/dist/services/passkey/index.d.ts +1 -1
- package/dist/services/passkey/index.d.ts.map +1 -1
- package/dist/services/passkey/passkey.types.d.ts +4 -0
- package/dist/services/passkey/passkey.types.d.ts.map +1 -1
- package/dist/tsconfig.lib.tsbuildinfo +1 -1
- package/dist/{waas.cjs.js → waas.cjs} +5 -5
- package/dist/waas.cjs.map +1 -0
- package/dist/waas.esm.js +3 -3
- package/dist/waas.native.esm.js +3 -3
- package/dist/{waasCore.cjs.js → waasCore.cjs} +5 -5
- package/dist/waasCore.cjs.map +1 -0
- package/dist/waasCore.esm.js +3 -3
- package/dist/waasCore.native.esm.js +3 -3
- package/package.json +13 -8
- package/dist/InvalidParamError-BDHw6nr1.native.esm.js.map +0 -1
- package/dist/InvalidParamError-BqDEZ6er.cjs.js.map +0 -1
- package/dist/InvalidParamError-DcN56mC-.esm.js.map +0 -1
- package/dist/NotWaasWalletAccountError-ftYfHk_N.cjs.js.map +0 -1
- package/dist/core.cjs.js.map +0 -1
- package/dist/getNetworkProviderFromNetworkId-BRWuk0I8.native.esm.js.map +0 -1
- package/dist/getNetworkProviderFromNetworkId-COHxfpo-.esm.js.map +0 -1
- package/dist/getNetworkProviderFromNetworkId-ClfETwqS.cjs.js.map +0 -1
- package/dist/getSignedSessionId-Bkw9TATj.cjs.js.map +0 -1
- package/dist/getVerifiedCredentialForWalletAccount-DEiU9FZG.cjs.js.map +0 -1
- package/dist/getVerifiedCredentialForWalletAccount-DP4VQBly.esm.js.map +0 -1
- package/dist/getVerifiedCredentialForWalletAccount-d_bHvLLE.native.esm.js.map +0 -1
- package/dist/index.cjs.js.map +0 -1
- package/dist/isMfaRequiredForAction-mZub0YwI.cjs.js.map +0 -1
- package/dist/modules/auth/social/oauth/authenticateWithSocial/buildOAuthUrl/addOAuthUrlParams/addOAuthUrlParams.d.ts.map +0 -1
- package/dist/modules/auth/social/oauth/authenticateWithSocial/buildOAuthUrl/addOAuthUrlParams/index.d.ts.map +0 -1
- package/dist/modules/auth/social/oauth/authenticateWithSocial/buildOAuthUrl/buildOAuthUrl.d.ts.map +0 -1
- package/dist/modules/auth/social/oauth/authenticateWithSocial/buildOAuthUrl/getOAuthBaseUrl/getOAuthBaseUrl.d.ts.map +0 -1
- package/dist/modules/auth/social/oauth/authenticateWithSocial/buildOAuthUrl/getOAuthBaseUrl/index.d.ts.map +0 -1
- package/dist/modules/auth/social/oauth/authenticateWithSocial/buildOAuthUrl/index.d.ts.map +0 -1
- package/dist/services/passkey/createWebPasskeyService/createWebPasskeyService.d.ts +0 -7
- package/dist/services/passkey/createWebPasskeyService/createWebPasskeyService.d.ts.map +0 -1
- package/dist/services/passkey/createWebPasskeyService/index.d.ts +0 -2
- package/dist/services/passkey/createWebPasskeyService/index.d.ts.map +0 -1
- package/dist/waas.cjs.js.map +0 -1
- package/dist/waasCore.cjs.js.map +0 -1
- /package/dist/modules/auth/social/oauth/{authenticateWithSocial → signInWithSocialRedirect}/buildOAuthUrl/addOAuthUrlParams/addOAuthUrlParams.d.ts +0 -0
- /package/dist/modules/auth/social/oauth/{authenticateWithSocial → signInWithSocialRedirect}/buildOAuthUrl/addOAuthUrlParams/index.d.ts +0 -0
- /package/dist/modules/auth/social/oauth/{authenticateWithSocial → signInWithSocialRedirect}/buildOAuthUrl/getOAuthBaseUrl/getOAuthBaseUrl.d.ts +0 -0
- /package/dist/modules/auth/social/oauth/{authenticateWithSocial → signInWithSocialRedirect}/buildOAuthUrl/getOAuthBaseUrl/index.d.ts +0 -0
- /package/dist/modules/auth/social/oauth/{authenticateWithSocial → signInWithSocialRedirect}/buildOAuthUrl/index.d.ts +0 -0
|
@@ -1,8 +1,8 @@
|
|
|
1
|
-
const require_getNetworkProviderFromNetworkId = require('./getNetworkProviderFromNetworkId-
|
|
2
|
-
const require_InvalidParamError = require('./InvalidParamError-
|
|
3
|
-
const require_getVerifiedCredentialForWalletAccount = require('./getVerifiedCredentialForWalletAccount-
|
|
4
|
-
const require_NotWaasWalletAccountError = require('./NotWaasWalletAccountError-
|
|
5
|
-
const require_isMfaRequiredForAction = require('./isMfaRequiredForAction-
|
|
1
|
+
const require_getNetworkProviderFromNetworkId = require('./getNetworkProviderFromNetworkId-D_s_Quuj.cjs');
|
|
2
|
+
const require_InvalidParamError = require('./InvalidParamError-CDcFoUsR.cjs');
|
|
3
|
+
const require_getVerifiedCredentialForWalletAccount = require('./getVerifiedCredentialForWalletAccount-BlbBwou9.cjs');
|
|
4
|
+
const require_NotWaasWalletAccountError = require('./NotWaasWalletAccountError-Dz_L-UKa.cjs');
|
|
5
|
+
const require_isMfaRequiredForAction = require('./isMfaRequiredForAction-_6Mr0I9D.cjs');
|
|
6
6
|
let _dynamic_labs_sdk_assert_package_version = require("@dynamic-labs-sdk/assert-package-version");
|
|
7
7
|
let _dynamic_labs_sdk_api_core = require("@dynamic-labs/sdk-api-core");
|
|
8
8
|
let zod_mini = require("zod/mini");
|
|
@@ -622,7 +622,7 @@ const createWebFetch = () => {
|
|
|
622
622
|
* Only error-level log entries are forwarded.
|
|
623
623
|
* @not-instrumented
|
|
624
624
|
*/
|
|
625
|
-
const connectLoggerToInstrumentation = ({ environmentId, instrumentation, logger, sdkSessionId, sdkVersion, state }) => {
|
|
625
|
+
const connectLoggerToInstrumentation = ({ environmentId, extensions, instrumentation, logger, sdkSessionId, sdkVersion, state }) => {
|
|
626
626
|
logger.on("log", (level, message, ...args) => {
|
|
627
627
|
if (level !== "error") return;
|
|
628
628
|
const { token, user } = state.get();
|
|
@@ -632,6 +632,7 @@ const connectLoggerToInstrumentation = ({ environmentId, instrumentation, logger
|
|
|
632
632
|
args,
|
|
633
633
|
message
|
|
634
634
|
},
|
|
635
|
+
registeredExtensionKeys: Array.from(extensions),
|
|
635
636
|
sdkSessionId,
|
|
636
637
|
sdkVersion,
|
|
637
638
|
status: "error",
|
|
@@ -763,7 +764,7 @@ const createWebDeeplinkOpener = () => {
|
|
|
763
764
|
};
|
|
764
765
|
|
|
765
766
|
//#endregion
|
|
766
|
-
//#region src/services/passkey/
|
|
767
|
+
//#region src/services/passkey/createPasskeyService/createPasskeyService.ts
|
|
767
768
|
/**
|
|
768
769
|
* Because this is the web implementation of the passkey service, we need to
|
|
769
770
|
* import the browser's WebAuthn API directly.
|
|
@@ -771,9 +772,13 @@ const createWebDeeplinkOpener = () => {
|
|
|
771
772
|
*/
|
|
772
773
|
/**
|
|
773
774
|
* Create a passkey service that uses the browser's WebAuthn API.
|
|
775
|
+
*
|
|
776
|
+
* Metadata is accepted for parity with the native implementation (which uses
|
|
777
|
+
* `universalLink` to validate the associated domain) but is unused on web —
|
|
778
|
+
* the browser derives the relying party from `window.location.origin`.
|
|
774
779
|
* @not-instrumented
|
|
775
780
|
*/
|
|
776
|
-
const
|
|
781
|
+
const createPasskeyService = (_params) => ({
|
|
777
782
|
authenticate: (options) => (0, _simplewebauthn_browser.startAuthentication)(options),
|
|
778
783
|
isSupported: () => (0, _simplewebauthn_browser.browserSupportsWebAuthn)(),
|
|
779
784
|
register: (options) => (0, _simplewebauthn_browser.startRegistration)(options)
|
|
@@ -951,8 +956,10 @@ const createCore = (config) => {
|
|
|
951
956
|
const initTrack = createAsyncTrack();
|
|
952
957
|
const sdkSessionId = require_InvalidParamError.randomString({ length: 32 });
|
|
953
958
|
const instrumentation = createInstrumentation({ config: config.instrumentation });
|
|
959
|
+
const extensions = /* @__PURE__ */ new Set();
|
|
954
960
|
connectLoggerToInstrumentation({
|
|
955
961
|
environmentId: config.environmentId,
|
|
962
|
+
extensions,
|
|
956
963
|
instrumentation,
|
|
957
964
|
logger,
|
|
958
965
|
sdkSessionId,
|
|
@@ -964,7 +971,11 @@ const createCore = (config) => {
|
|
|
964
971
|
fetch
|
|
965
972
|
}));
|
|
966
973
|
const runtimeServices = createRuntimeServices();
|
|
967
|
-
const
|
|
974
|
+
const metadata = {
|
|
975
|
+
...config.metadata,
|
|
976
|
+
universalLink: config.metadata?.universalLink ?? (require_getNetworkProviderFromNetworkId.isServerSideRendering() ? void 0 : window.location.origin)
|
|
977
|
+
};
|
|
978
|
+
const passkey = config.coreConfig?.passkey ?? createPasskeyService({ metadata });
|
|
968
979
|
const realtime = config.coreConfig?.realtime ?? require_getNetworkProviderFromNetworkId.__createRealtimeService_wrapped();
|
|
969
980
|
const deviceSigner = config.coreConfig?.deviceSigner;
|
|
970
981
|
const keychain = config.coreConfig?.keychain ?? require_getNetworkProviderFromNetworkId.createKeychainService({ dbName: `dynamic_${config.environmentId}_keychain` });
|
|
@@ -975,17 +986,14 @@ const createCore = (config) => {
|
|
|
975
986
|
deviceSigner,
|
|
976
987
|
environmentId: config.environmentId,
|
|
977
988
|
eventEmitter,
|
|
978
|
-
extensions
|
|
989
|
+
extensions,
|
|
979
990
|
fetch,
|
|
980
991
|
getApiHeaders: config.coreConfig?.getApiHeaders ?? (() => ({})),
|
|
981
992
|
initTrack,
|
|
982
993
|
instrumentation,
|
|
983
994
|
keychain,
|
|
984
995
|
logger,
|
|
985
|
-
metadata
|
|
986
|
-
...config.metadata,
|
|
987
|
-
universalLink: config.metadata?.universalLink ?? (require_getNetworkProviderFromNetworkId.isServerSideRendering() ? void 0 : window.location.origin)
|
|
988
|
-
},
|
|
996
|
+
metadata,
|
|
989
997
|
navigate,
|
|
990
998
|
openDeeplink,
|
|
991
999
|
passkey,
|
|
@@ -1866,7 +1874,7 @@ const encodeBase64Url = (str) => {
|
|
|
1866
1874
|
};
|
|
1867
1875
|
|
|
1868
1876
|
//#endregion
|
|
1869
|
-
//#region src/modules/auth/social/oauth/
|
|
1877
|
+
//#region src/modules/auth/social/oauth/signInWithSocialRedirect/buildOAuthUrl/addOAuthUrlParams/addOAuthUrlParams.ts
|
|
1870
1878
|
const APPLE_RESPONSE_MODE = "form_post";
|
|
1871
1879
|
const APPLE_RESPONSE_TYPE = "code id_token";
|
|
1872
1880
|
/** Helper function to add OAuth URL parameters to a given base URL. * @not-instrumented
|
|
@@ -1896,7 +1904,7 @@ const addOAuthUrlParams = ({ baseUrl, isGoogleDriveBackupEnabled, provider }) =>
|
|
|
1896
1904
|
};
|
|
1897
1905
|
|
|
1898
1906
|
//#endregion
|
|
1899
|
-
//#region src/modules/auth/social/oauth/
|
|
1907
|
+
//#region src/modules/auth/social/oauth/signInWithSocialRedirect/buildOAuthUrl/getOAuthBaseUrl/getOAuthBaseUrl.ts
|
|
1900
1908
|
/** Helper function to build the OAuth base URL for a given provider. * @not-instrumented
|
|
1901
1909
|
*/
|
|
1902
1910
|
const getOAuthBaseUrl = (provider) => {
|
|
@@ -1916,7 +1924,7 @@ const getOAuthBaseUrl = (provider) => {
|
|
|
1916
1924
|
};
|
|
1917
1925
|
|
|
1918
1926
|
//#endregion
|
|
1919
|
-
//#region src/modules/auth/social/oauth/
|
|
1927
|
+
//#region src/modules/auth/social/oauth/signInWithSocialRedirect/buildOAuthUrl/buildOAuthUrl.ts
|
|
1920
1928
|
const providersRequiringPkce = ["twitter", "github"];
|
|
1921
1929
|
/** Helper function to build the OAuth URL for a given provider. * @not-instrumented
|
|
1922
1930
|
*/
|
|
@@ -1950,22 +1958,23 @@ const buildOAuthUrl = async (core, provider) => {
|
|
|
1950
1958
|
};
|
|
1951
1959
|
|
|
1952
1960
|
//#endregion
|
|
1953
|
-
//#region src/modules/auth/social/oauth/
|
|
1961
|
+
//#region src/modules/auth/social/oauth/signInWithSocialRedirect/signInWithSocialRedirect.ts
|
|
1954
1962
|
/**
|
|
1955
1963
|
* Initiates social authentication by redirecting to the OAuth provider.
|
|
1956
1964
|
*
|
|
1957
1965
|
* This function redirects the user to the specified social provider's
|
|
1958
|
-
* authorization page to complete OAuth authentication flow.
|
|
1959
|
-
* After the
|
|
1960
|
-
*
|
|
1961
|
-
*
|
|
1966
|
+
* authorization page to complete the OAuth authentication flow.
|
|
1967
|
+
* After the flow is complete, the user is redirected back to your app.
|
|
1968
|
+
* Call `detectSocialRedirectUrl` to check whether the user was redirected
|
|
1969
|
+
* back because of this flow, then call `completeSocialRedirect` to finish
|
|
1970
|
+
* the social authentication.
|
|
1962
1971
|
*
|
|
1963
1972
|
* @param params.provider - The social provider to authenticate with (e.g., 'google', 'github').
|
|
1964
1973
|
* @param params.redirectUrl - The URL to redirect back to after authentication.
|
|
1965
1974
|
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
1966
1975
|
* @instrumented
|
|
1967
1976
|
*/
|
|
1968
|
-
const
|
|
1977
|
+
const signInWithSocialRedirect = async ({ provider, redirectUrl }, client = require_InvalidParamError.getDefaultClient()) => {
|
|
1969
1978
|
const core = require_InvalidParamError.getCore(client);
|
|
1970
1979
|
const apiClient = require_InvalidParamError.__createApiClient_wrapped({}, client);
|
|
1971
1980
|
await core.initTrack.waitForAll();
|
|
@@ -1986,10 +1995,10 @@ const authenticateWithSocial = async ({ provider, redirectUrl }, client = requir
|
|
|
1986
1995
|
});
|
|
1987
1996
|
await core.navigate(url.toString());
|
|
1988
1997
|
};
|
|
1989
|
-
const
|
|
1990
|
-
const
|
|
1991
|
-
fn:
|
|
1992
|
-
functionName: "
|
|
1998
|
+
const __signInWithSocialRedirect_impl = signInWithSocialRedirect;
|
|
1999
|
+
const __signInWithSocialRedirect_wrapped = require_InvalidParamError.instrumentFunction({
|
|
2000
|
+
fn: __signInWithSocialRedirect_impl,
|
|
2001
|
+
functionName: "signInWithSocialRedirect",
|
|
1993
2002
|
getCore: () => {
|
|
1994
2003
|
try {
|
|
1995
2004
|
return require_InvalidParamError.getCore(require_InvalidParamError.getDefaultClient());
|
|
@@ -2000,12 +2009,48 @@ const __authenticateWithSocial_wrapped = require_InvalidParamError.instrumentFun
|
|
|
2000
2009
|
});
|
|
2001
2010
|
|
|
2002
2011
|
//#endregion
|
|
2003
|
-
//#region src/modules/auth/social/oauth/
|
|
2012
|
+
//#region src/modules/auth/social/oauth/detectSocialRedirectUrl/detectSocialRedirectUrl.ts
|
|
2004
2013
|
/**
|
|
2005
|
-
*
|
|
2014
|
+
* Detects whether the given URL is an OAuth redirect from a social provider.
|
|
2006
2015
|
*
|
|
2007
|
-
*
|
|
2008
|
-
*
|
|
2016
|
+
* Examines the URL parameters to determine whether it carries OAuth callback
|
|
2017
|
+
* data that originated from a social authentication flow started by
|
|
2018
|
+
* `signInWithSocialRedirect`.
|
|
2019
|
+
*
|
|
2020
|
+
* @param params.url - The URL to check for OAuth redirect parameters.
|
|
2021
|
+
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
2022
|
+
* @returns A promise that resolves to true if the URL is an OAuth redirect, false otherwise.
|
|
2023
|
+
* @instrumented
|
|
2024
|
+
*/
|
|
2025
|
+
const detectSocialRedirectUrl = async ({ url }, client = require_InvalidParamError.getDefaultClient()) => {
|
|
2026
|
+
const core = require_InvalidParamError.getCore(client);
|
|
2027
|
+
const dynamicOauthState = url.searchParams.get("dynamicOauthState");
|
|
2028
|
+
const dynamicOauthCode = url.searchParams.get("dynamicOauthCode");
|
|
2029
|
+
if (!dynamicOauthState || !dynamicOauthCode) return false;
|
|
2030
|
+
await core.initTrack.waitForAll();
|
|
2031
|
+
return (await core.storage.getItem(redirectStateStorageKeySchema))?.state === dynamicOauthState;
|
|
2032
|
+
};
|
|
2033
|
+
const __detectSocialRedirectUrl_impl = detectSocialRedirectUrl;
|
|
2034
|
+
const __detectSocialRedirectUrl_wrapped = require_InvalidParamError.instrumentFunction({
|
|
2035
|
+
fn: __detectSocialRedirectUrl_impl,
|
|
2036
|
+
functionName: "detectSocialRedirectUrl",
|
|
2037
|
+
getCore: () => {
|
|
2038
|
+
try {
|
|
2039
|
+
return require_InvalidParamError.getCore(require_InvalidParamError.getDefaultClient());
|
|
2040
|
+
} catch {
|
|
2041
|
+
return;
|
|
2042
|
+
}
|
|
2043
|
+
}
|
|
2044
|
+
});
|
|
2045
|
+
|
|
2046
|
+
//#endregion
|
|
2047
|
+
//#region src/modules/auth/social/oauth/completeSocialRedirect/completeSocialRedirect.ts
|
|
2048
|
+
/**
|
|
2049
|
+
* Completes the social authentication flow after the OAuth redirect.
|
|
2050
|
+
*
|
|
2051
|
+
* Processes the OAuth callback URL with the authorization code and finishes
|
|
2052
|
+
* authenticating (or linking) the user with the social provider. This is the
|
|
2053
|
+
* final step after `signInWithSocialRedirect` + `detectSocialRedirectUrl`.
|
|
2009
2054
|
*
|
|
2010
2055
|
* @param params.url - The callback URL containing OAuth response parameters.
|
|
2011
2056
|
* @param [params.requestedScopes] - Optional scopes to request an elevated access token when verifying (linking) a social account.
|
|
@@ -2015,7 +2060,7 @@ const __authenticateWithSocial_wrapped = require_InvalidParamError.instrumentFun
|
|
|
2015
2060
|
* @throws InvalidRedirectStorageStateError If the stored state doesn't match.
|
|
2016
2061
|
* @instrumented
|
|
2017
2062
|
*/
|
|
2018
|
-
const
|
|
2063
|
+
const completeSocialRedirect = async ({ url, requestedScopes }, client = require_InvalidParamError.getDefaultClient()) => {
|
|
2019
2064
|
const core = require_InvalidParamError.getCore(client);
|
|
2020
2065
|
const apiClient = require_InvalidParamError.__createApiClient_wrapped({}, client);
|
|
2021
2066
|
await core.initTrack.waitForAll();
|
|
@@ -2052,6 +2097,50 @@ const completeSocialAuthentication = async ({ url, requestedScopes }, client = r
|
|
|
2052
2097
|
require_getVerifiedCredentialForWalletAccount.__updateAuthFromVerifyResponse_wrapped({ response }, client);
|
|
2053
2098
|
return response.user;
|
|
2054
2099
|
};
|
|
2100
|
+
const __completeSocialRedirect_impl = completeSocialRedirect;
|
|
2101
|
+
const __completeSocialRedirect_wrapped = require_InvalidParamError.instrumentFunction({
|
|
2102
|
+
fn: __completeSocialRedirect_impl,
|
|
2103
|
+
functionName: "completeSocialRedirect",
|
|
2104
|
+
getCore: () => {
|
|
2105
|
+
try {
|
|
2106
|
+
return require_InvalidParamError.getCore(require_InvalidParamError.getDefaultClient());
|
|
2107
|
+
} catch {
|
|
2108
|
+
return;
|
|
2109
|
+
}
|
|
2110
|
+
}
|
|
2111
|
+
});
|
|
2112
|
+
|
|
2113
|
+
//#endregion
|
|
2114
|
+
//#region src/modules/auth/social/oauth/authenticateWithSocial/authenticateWithSocial.ts
|
|
2115
|
+
/**
|
|
2116
|
+
* @deprecated Renamed to {@link signInWithSocialRedirect}. This alias will be
|
|
2117
|
+
* removed in a future major version.
|
|
2118
|
+
*
|
|
2119
|
+
* @instrumented
|
|
2120
|
+
*/
|
|
2121
|
+
const authenticateWithSocial = (params, client = require_InvalidParamError.getDefaultClient()) => __signInWithSocialRedirect_wrapped(params, client);
|
|
2122
|
+
const __authenticateWithSocial_impl = authenticateWithSocial;
|
|
2123
|
+
const __authenticateWithSocial_wrapped = require_InvalidParamError.instrumentFunction({
|
|
2124
|
+
fn: __authenticateWithSocial_impl,
|
|
2125
|
+
functionName: "authenticateWithSocial",
|
|
2126
|
+
getCore: () => {
|
|
2127
|
+
try {
|
|
2128
|
+
return require_InvalidParamError.getCore(require_InvalidParamError.getDefaultClient());
|
|
2129
|
+
} catch {
|
|
2130
|
+
return;
|
|
2131
|
+
}
|
|
2132
|
+
}
|
|
2133
|
+
});
|
|
2134
|
+
|
|
2135
|
+
//#endregion
|
|
2136
|
+
//#region src/modules/auth/social/oauth/completeSocialAuthentication/completeSocialAuthentication.ts
|
|
2137
|
+
/**
|
|
2138
|
+
* @deprecated Renamed to {@link completeSocialRedirect}. This alias will be
|
|
2139
|
+
* removed in a future major version.
|
|
2140
|
+
*
|
|
2141
|
+
* @instrumented
|
|
2142
|
+
*/
|
|
2143
|
+
const completeSocialAuthentication = (params, client = require_InvalidParamError.getDefaultClient()) => __completeSocialRedirect_wrapped(params, client);
|
|
2055
2144
|
const __completeSocialAuthentication_impl = completeSocialAuthentication;
|
|
2056
2145
|
const __completeSocialAuthentication_wrapped = require_InvalidParamError.instrumentFunction({
|
|
2057
2146
|
fn: __completeSocialAuthentication_impl,
|
|
@@ -2068,26 +2157,12 @@ const __completeSocialAuthentication_wrapped = require_InvalidParamError.instrum
|
|
|
2068
2157
|
//#endregion
|
|
2069
2158
|
//#region src/modules/auth/social/oauth/detectOAuthRedirect/detectOAuthRedirect.ts
|
|
2070
2159
|
/**
|
|
2071
|
-
*
|
|
2072
|
-
*
|
|
2073
|
-
* This function examines the URL parameters to determine if it contains
|
|
2074
|
-
* OAuth callback data from a social authentication flow.
|
|
2160
|
+
* @deprecated Renamed to {@link detectSocialRedirectUrl}. This alias will be
|
|
2161
|
+
* removed in a future major version.
|
|
2075
2162
|
*
|
|
2076
|
-
* @param params.url - The URL to check for OAuth redirect parameters.
|
|
2077
|
-
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
2078
|
-
* @returns A promise that resolves to true if the URL is an OAuth redirect, false otherwise.
|
|
2079
2163
|
* @instrumented
|
|
2080
2164
|
*/
|
|
2081
|
-
const detectOAuthRedirect =
|
|
2082
|
-
const core = require_InvalidParamError.getCore(client);
|
|
2083
|
-
const dynamicOauthState = url.searchParams.get("dynamicOauthState");
|
|
2084
|
-
const dynamicOauthCode = url.searchParams.get("dynamicOauthCode");
|
|
2085
|
-
if (!dynamicOauthState || !dynamicOauthCode) return false;
|
|
2086
|
-
await core.initTrack.waitForAll();
|
|
2087
|
-
const storedSocialRedirectState = await core.storage.getItem(redirectStateStorageKeySchema);
|
|
2088
|
-
if (!storedSocialRedirectState || storedSocialRedirectState.state !== dynamicOauthState) return false;
|
|
2089
|
-
return true;
|
|
2090
|
-
};
|
|
2165
|
+
const detectOAuthRedirect = (params, client = require_InvalidParamError.getDefaultClient()) => __detectSocialRedirectUrl_wrapped(params, client);
|
|
2091
2166
|
const __detectOAuthRedirect_impl = detectOAuthRedirect;
|
|
2092
2167
|
const __detectOAuthRedirect_wrapped = require_InvalidParamError.instrumentFunction({
|
|
2093
2168
|
fn: __detectOAuthRedirect_impl,
|
|
@@ -3927,7 +4002,7 @@ const __acknowledgeRecoveryCodes_wrapped = require_InvalidParamError.instrumentF
|
|
|
3927
4002
|
* one of their backup recovery codes when none of the registered MFA methods are available.
|
|
3928
4003
|
*
|
|
3929
4004
|
* @param params.code - The recovery code to authenticate with.
|
|
3930
|
-
* @param [params.createMfaTokenOptions] -
|
|
4005
|
+
* @param [params.createMfaTokenOptions] - **Deprecated**: use `requestedScopes` instead. Optional configuration for MFA token creation.
|
|
3931
4006
|
* @param [params.requestedScopes] - Optional scopes to request an elevated access token instead of an MFA token.
|
|
3932
4007
|
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
3933
4008
|
* @returns A promise that resolves to the MFA authentication response.
|
|
@@ -3959,18 +4034,6 @@ const authenticateMfaRecoveryCode = async ({ code, createMfaTokenOptions, reques
|
|
|
3959
4034
|
throw error;
|
|
3960
4035
|
}
|
|
3961
4036
|
};
|
|
3962
|
-
const __authenticateMfaRecoveryCode_impl = authenticateMfaRecoveryCode;
|
|
3963
|
-
const __authenticateMfaRecoveryCode_wrapped = require_InvalidParamError.instrumentFunction({
|
|
3964
|
-
fn: __authenticateMfaRecoveryCode_impl,
|
|
3965
|
-
functionName: "authenticateMfaRecoveryCode",
|
|
3966
|
-
getCore: () => {
|
|
3967
|
-
try {
|
|
3968
|
-
return require_InvalidParamError.getCore(require_InvalidParamError.getDefaultClient());
|
|
3969
|
-
} catch {
|
|
3970
|
-
return;
|
|
3971
|
-
}
|
|
3972
|
-
}
|
|
3973
|
-
});
|
|
3974
4037
|
|
|
3975
4038
|
//#endregion
|
|
3976
4039
|
//#region src/modules/auth/passkeys/getPasskeyAuthenticationOptions/getPasskeyAuthenticationOptions.ts
|
|
@@ -4010,7 +4073,7 @@ const serverAuthenticatePasskey = async ({ authentication, createMfaToken, reque
|
|
|
4010
4073
|
* This function prompts the user to authenticate with their registered
|
|
4011
4074
|
* passkey to complete an MFA challenge and obtain an MFA token.
|
|
4012
4075
|
*
|
|
4013
|
-
* @param [params.createMfaToken] -
|
|
4076
|
+
* @param [params.createMfaToken] - **Deprecated**: use `requestedScopes` instead. Optional configuration for MFA token creation.
|
|
4014
4077
|
* @param [params.requestedScopes] - Optional scopes to request an elevated access token instead of an MFA token.
|
|
4015
4078
|
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
4016
4079
|
* @returns A promise that resolves to the MFA authentication response.
|
|
@@ -4051,18 +4114,6 @@ const authenticatePasskeyMFA = async ({ createMfaToken, relatedOriginRpId, reque
|
|
|
4051
4114
|
throw error;
|
|
4052
4115
|
}
|
|
4053
4116
|
};
|
|
4054
|
-
const __authenticatePasskeyMFA_impl = authenticatePasskeyMFA;
|
|
4055
|
-
const __authenticatePasskeyMFA_wrapped = require_InvalidParamError.instrumentFunction({
|
|
4056
|
-
fn: __authenticatePasskeyMFA_impl,
|
|
4057
|
-
functionName: "authenticatePasskeyMFA",
|
|
4058
|
-
getCore: () => {
|
|
4059
|
-
try {
|
|
4060
|
-
return require_InvalidParamError.getCore(require_InvalidParamError.getDefaultClient());
|
|
4061
|
-
} catch {
|
|
4062
|
-
return;
|
|
4063
|
-
}
|
|
4064
|
-
}
|
|
4065
|
-
});
|
|
4066
4117
|
|
|
4067
4118
|
//#endregion
|
|
4068
4119
|
//#region src/modules/mfa/authenticateTotpMfaDevice/authenticateTotpMfaDevice.ts
|
|
@@ -4074,7 +4125,7 @@ const __authenticatePasskeyMFA_wrapped = require_InvalidParamError.instrumentFun
|
|
|
4074
4125
|
*
|
|
4075
4126
|
* @param params.code - The 6-digit TOTP code from the authenticator app.
|
|
4076
4127
|
* @param [params.deviceId] - The ID of the specific TOTP device to authenticate with.
|
|
4077
|
-
* @param [params.createMfaTokenOptions] -
|
|
4128
|
+
* @param [params.createMfaTokenOptions] - **Deprecated**: use `requestedScopes` instead. Optional configuration for MFA token creation.
|
|
4078
4129
|
* @param [params.requestedScopes] - Optional scopes to request an elevated access token instead of an MFA token.
|
|
4079
4130
|
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
4080
4131
|
* @returns A promise that resolves to the MFA authentication response.
|
|
@@ -4113,18 +4164,6 @@ const authenticateTotpMfaDevice = async ({ deviceId, code, createMfaTokenOptions
|
|
|
4113
4164
|
throw error;
|
|
4114
4165
|
}
|
|
4115
4166
|
};
|
|
4116
|
-
const __authenticateTotpMfaDevice_impl = authenticateTotpMfaDevice;
|
|
4117
|
-
const __authenticateTotpMfaDevice_wrapped = require_InvalidParamError.instrumentFunction({
|
|
4118
|
-
fn: __authenticateTotpMfaDevice_impl,
|
|
4119
|
-
functionName: "authenticateTotpMfaDevice",
|
|
4120
|
-
getCore: () => {
|
|
4121
|
-
try {
|
|
4122
|
-
return require_InvalidParamError.getCore(require_InvalidParamError.getDefaultClient());
|
|
4123
|
-
} catch {
|
|
4124
|
-
return;
|
|
4125
|
-
}
|
|
4126
|
-
}
|
|
4127
|
-
});
|
|
4128
4167
|
|
|
4129
4168
|
//#endregion
|
|
4130
4169
|
//#region src/modules/mfa/createNewMfaRecoveryCodes/createNewMfaRecoveryCodes.ts
|
|
@@ -4276,24 +4315,6 @@ const isPendingRecoveryCodesAcknowledgment = (client = require_InvalidParamError
|
|
|
4276
4315
|
return user.mfaBackupCodeAcknowledgement === _dynamic_labs_sdk_api_core.MfaBackupCodeAcknowledgement.Pending;
|
|
4277
4316
|
};
|
|
4278
4317
|
|
|
4279
|
-
//#endregion
|
|
4280
|
-
//#region src/modules/mfa/isUserMissingMfaAuth/isUserMissingMfaAuth.ts
|
|
4281
|
-
/**
|
|
4282
|
-
* Checks if the user requires additional MFA authentication.
|
|
4283
|
-
*
|
|
4284
|
-
* This function determines if the current user session requires
|
|
4285
|
-
* additional multi-factor authentication to access certain features.
|
|
4286
|
-
*
|
|
4287
|
-
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
4288
|
-
* @returns True if the user needs additional MFA authentication, false otherwise.
|
|
4289
|
-
* @not-instrumented
|
|
4290
|
-
*/
|
|
4291
|
-
const isUserMissingMfaAuth = (client = require_InvalidParamError.getDefaultClient()) => {
|
|
4292
|
-
const user = client.user;
|
|
4293
|
-
require_InvalidParamError.assertDefined(user, "User not logged in");
|
|
4294
|
-
return Boolean(user.scope?.includes("requiresAdditionalAuth"));
|
|
4295
|
-
};
|
|
4296
|
-
|
|
4297
4318
|
//#endregion
|
|
4298
4319
|
//#region src/modules/mfa/registerTotpMfaDevice/registerTotpMfaDevice.ts
|
|
4299
4320
|
/**
|
|
@@ -5599,7 +5620,7 @@ const isUserOnboardingComplete = (client = require_InvalidParamError.getDefaultC
|
|
|
5599
5620
|
const user = client.user;
|
|
5600
5621
|
require_InvalidParamError.assertDefined(user, "User not logged in");
|
|
5601
5622
|
const hasMissingKycFields = Boolean(user.missingFields?.length);
|
|
5602
|
-
const hasPendingMfaAuth = isUserMissingMfaAuth(client);
|
|
5623
|
+
const hasPendingMfaAuth = require_getVerifiedCredentialForWalletAccount.isUserMissingMfaAuth(client);
|
|
5603
5624
|
const hasPendingRecoveryCodes = isPendingRecoveryCodesAcknowledgment(client);
|
|
5604
5625
|
return !hasMissingKycFields && !hasPendingMfaAuth && !hasPendingRecoveryCodes;
|
|
5605
5626
|
};
|
|
@@ -6845,9 +6866,9 @@ exports.addNetwork = __addNetwork_wrapped;
|
|
|
6845
6866
|
exports.assertWalletAccountSigningAvailability = assertWalletAccountSigningAvailability;
|
|
6846
6867
|
exports.assertWalletProviderMethodDefined = assertWalletProviderMethodDefined;
|
|
6847
6868
|
exports.attachCheckoutTransactionSource = __attachCheckoutTransactionSource_wrapped;
|
|
6848
|
-
exports.authenticateMfaRecoveryCode =
|
|
6849
|
-
exports.authenticatePasskeyMFA =
|
|
6850
|
-
exports.authenticateTotpMfaDevice =
|
|
6869
|
+
exports.authenticateMfaRecoveryCode = authenticateMfaRecoveryCode;
|
|
6870
|
+
exports.authenticatePasskeyMFA = authenticatePasskeyMFA;
|
|
6871
|
+
exports.authenticateTotpMfaDevice = authenticateTotpMfaDevice;
|
|
6851
6872
|
exports.authenticateWithSocial = __authenticateWithSocial_wrapped;
|
|
6852
6873
|
exports.broadcastCheckoutTransaction = __broadcastCheckoutTransaction_wrapped;
|
|
6853
6874
|
exports.canConnectWithHardwareWallet = canConnectWithHardwareWallet;
|
|
@@ -6855,6 +6876,7 @@ exports.cancelCheckoutTransaction = __cancelCheckoutTransaction_wrapped;
|
|
|
6855
6876
|
exports.checkStepUpAuth = __checkStepUpAuth_wrapped;
|
|
6856
6877
|
exports.completeDeviceRegistration = __completeDeviceRegistration_wrapped;
|
|
6857
6878
|
exports.completeSocialAuthentication = __completeSocialAuthentication_wrapped;
|
|
6879
|
+
exports.completeSocialRedirect = __completeSocialRedirect_wrapped;
|
|
6858
6880
|
exports.confirmTransaction = __confirmTransaction_wrapped;
|
|
6859
6881
|
exports.connectAndVerifyWithWalletProvider = __connectAndVerifyWithWalletProvider_wrapped;
|
|
6860
6882
|
exports.connectWithWalletProvider = __connectWithWalletProvider_wrapped;
|
|
@@ -6870,6 +6892,7 @@ exports.deletePasskey = __deletePasskey_wrapped;
|
|
|
6870
6892
|
exports.deleteUser = __deleteUser_wrapped;
|
|
6871
6893
|
exports.detectDeviceRegistrationRedirect = __detectDeviceRegistrationRedirect_wrapped;
|
|
6872
6894
|
exports.detectOAuthRedirect = __detectOAuthRedirect_wrapped;
|
|
6895
|
+
exports.detectSocialRedirectUrl = __detectSocialRedirectUrl_wrapped;
|
|
6873
6896
|
exports.executeSwapTransaction = __executeSwapTransaction_wrapped;
|
|
6874
6897
|
exports.fetchProjectSettings = require_getNetworkProviderFromNetworkId.__fetchProjectSettings_wrapped;
|
|
6875
6898
|
exports.getActiveNetworkData = __getActiveNetworkData_wrapped;
|
|
@@ -6918,7 +6941,7 @@ exports.isMobile = isMobile;
|
|
|
6918
6941
|
exports.isPendingRecoveryCodesAcknowledgment = isPendingRecoveryCodesAcknowledgment;
|
|
6919
6942
|
exports.isProgrammaticNetworkSwitchAvailable = isProgrammaticNetworkSwitchAvailable;
|
|
6920
6943
|
exports.isSignedIn = require_getNetworkProviderFromNetworkId.isSignedIn;
|
|
6921
|
-
exports.isUserMissingMfaAuth = isUserMissingMfaAuth;
|
|
6944
|
+
exports.isUserMissingMfaAuth = require_getVerifiedCredentialForWalletAccount.isUserMissingMfaAuth;
|
|
6922
6945
|
exports.isUserOnboardingComplete = isUserOnboardingComplete;
|
|
6923
6946
|
exports.isWalletAccountVerified = isWalletAccountVerified;
|
|
6924
6947
|
exports.logout = logout;
|
|
@@ -6947,6 +6970,7 @@ exports.setDefaultMfaDevice = __setDefaultMfaDevice_wrapped;
|
|
|
6947
6970
|
exports.setInstrumentationEnabled = __setInstrumentationEnabled_wrapped;
|
|
6948
6971
|
exports.signInWithExternalJwt = __signInWithExternalJwt_wrapped;
|
|
6949
6972
|
exports.signInWithPasskey = __signInWithPasskey_wrapped;
|
|
6973
|
+
exports.signInWithSocialRedirect = __signInWithSocialRedirect_wrapped;
|
|
6950
6974
|
exports.signMessage = __signMessage_wrapped;
|
|
6951
6975
|
exports.submitCheckoutTransaction = __submitCheckoutTransaction_wrapped;
|
|
6952
6976
|
exports.supportedCountries = supportedCountries;
|
|
@@ -6959,4 +6983,4 @@ exports.updateUser = __updateUser_wrapped;
|
|
|
6959
6983
|
exports.verifyOTP = __verifyOTP_wrapped;
|
|
6960
6984
|
exports.verifyWalletAccount = __verifyWalletAccount_wrapped;
|
|
6961
6985
|
exports.waitForClientInitialized = __waitForClientInitialized_wrapped;
|
|
6962
|
-
//# sourceMappingURL=index.cjs.
|
|
6986
|
+
//# sourceMappingURL=index.cjs.map
|