@dynamic-labs-sdk/client 0.25.2 → 0.26.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{InvalidParamError-BxdCGMzn.esm.js → InvalidParamError-B55FwITx.esm.js} +76 -74
- package/dist/InvalidParamError-B55FwITx.esm.js.map +1 -0
- package/dist/{InvalidParamError-C5CPZiAb.native.esm.js → InvalidParamError-ByTZyQwv.native.esm.js} +76 -74
- package/dist/InvalidParamError-ByTZyQwv.native.esm.js.map +1 -0
- package/dist/{InvalidParamError-Dg0Tc6h7.cjs.js → InvalidParamError-D-SHhcTB.cjs} +76 -74
- package/dist/InvalidParamError-D-SHhcTB.cjs.map +1 -0
- package/dist/{NotWaasWalletAccountError-C3DRuoiZ.native.esm.js → NotWaasWalletAccountError-CeMjVe2F.native.esm.js} +3 -3
- package/dist/{NotWaasWalletAccountError-C3DRuoiZ.native.esm.js.map → NotWaasWalletAccountError-CeMjVe2F.native.esm.js.map} +1 -1
- package/dist/{NotWaasWalletAccountError-w4J6uXP2.cjs.js → NotWaasWalletAccountError-EPhK7TaK.cjs} +3 -3
- package/dist/NotWaasWalletAccountError-EPhK7TaK.cjs.map +1 -0
- package/dist/{NotWaasWalletAccountError-DjVbgGrH.esm.js → NotWaasWalletAccountError-_H23Gu_v.esm.js} +3 -3
- package/dist/{NotWaasWalletAccountError-DjVbgGrH.esm.js.map → NotWaasWalletAccountError-_H23Gu_v.esm.js.map} +1 -1
- package/dist/client/core/createCore/createCore.d.ts.map +1 -1
- package/dist/{core.cjs.js → core.cjs} +6 -6
- package/dist/core.cjs.map +1 -0
- package/dist/core.esm.js +5 -5
- package/dist/core.native.esm.js +5 -19
- package/dist/core.native.esm.js.map +1 -1
- package/dist/exports/index.d.ts +6 -0
- package/dist/exports/index.d.ts.map +1 -1
- package/dist/{getNetworkProviderFromNetworkId-DnfmH9wZ.native.esm.js → getNetworkProviderFromNetworkId-BVhQ3-C5.native.esm.js} +46 -31
- package/dist/getNetworkProviderFromNetworkId-BVhQ3-C5.native.esm.js.map +1 -0
- package/dist/{getNetworkProviderFromNetworkId-DRAq7tIx.cjs.js → getNetworkProviderFromNetworkId-CY555AiJ.cjs} +5 -4
- package/dist/getNetworkProviderFromNetworkId-CY555AiJ.cjs.map +1 -0
- package/dist/{getNetworkProviderFromNetworkId-BzJ_kChE.esm.js → getNetworkProviderFromNetworkId-DWSOEnSr.esm.js} +5 -4
- package/dist/getNetworkProviderFromNetworkId-DWSOEnSr.esm.js.map +1 -0
- package/dist/{getSignedSessionId-CDCWfHxY.cjs.js → getSignedSessionId-CWNj8rZW.cjs} +3 -3
- package/dist/getSignedSessionId-CWNj8rZW.cjs.map +1 -0
- package/dist/{getSignedSessionId-CZnVdASR.native.esm.js → getSignedSessionId-GTJp6UnP.native.esm.js} +3 -3
- package/dist/{getSignedSessionId-CZnVdASR.native.esm.js.map → getSignedSessionId-GTJp6UnP.native.esm.js.map} +1 -1
- package/dist/{getSignedSessionId-DerECbsD.esm.js → getSignedSessionId-GVIy9gR0.esm.js} +3 -3
- package/dist/{getSignedSessionId-DerECbsD.esm.js.map → getSignedSessionId-GVIy9gR0.esm.js.map} +1 -1
- package/dist/{getVerifiedCredentialForWalletAccount-Bznazz-w.cjs.js → getVerifiedCredentialForWalletAccount-BqaTVz4z.cjs} +33 -3
- package/dist/getVerifiedCredentialForWalletAccount-BqaTVz4z.cjs.map +1 -0
- package/dist/{getVerifiedCredentialForWalletAccount-C2LbBPET.esm.js → getVerifiedCredentialForWalletAccount-Bx9dMVjF.esm.js} +27 -3
- package/dist/getVerifiedCredentialForWalletAccount-Bx9dMVjF.esm.js.map +1 -0
- package/dist/{getVerifiedCredentialForWalletAccount-B18TOqzI.native.esm.js → getVerifiedCredentialForWalletAccount-KmSG5wRc.native.esm.js} +27 -3
- package/dist/getVerifiedCredentialForWalletAccount-KmSG5wRc.native.esm.js.map +1 -0
- package/dist/{index.cjs.js → index.cjs} +130 -70
- package/dist/index.cjs.map +1 -0
- package/dist/index.esm.js +125 -68
- package/dist/index.esm.js.map +1 -1
- package/dist/index.native.esm.js +176 -250
- package/dist/index.native.esm.js.map +1 -1
- package/dist/{isMfaRequiredForAction-HwI5Mu8R.native.esm.js → isMfaRequiredForAction-BS0JYBvl.native.esm.js} +2 -2
- package/dist/{isMfaRequiredForAction-HwI5Mu8R.native.esm.js.map → isMfaRequiredForAction-BS0JYBvl.native.esm.js.map} +1 -1
- package/dist/{isMfaRequiredForAction-BulokP-s.esm.js → isMfaRequiredForAction-DVA7aeXI.esm.js} +2 -2
- package/dist/{isMfaRequiredForAction-BulokP-s.esm.js.map → isMfaRequiredForAction-DVA7aeXI.esm.js.map} +1 -1
- package/dist/{isMfaRequiredForAction-DG4IaOFU.cjs.js → isMfaRequiredForAction-V3A2BO7c.cjs} +2 -2
- package/dist/isMfaRequiredForAction-V3A2BO7c.cjs.map +1 -0
- package/dist/modules/apiClient/createApiClient.d.ts +1 -1
- package/dist/modules/apiClient/createApiClient.d.ts.map +1 -1
- package/dist/modules/auth/passkeys/signInWithPasskey/signInWithPasskey.d.ts +1 -1
- package/dist/modules/auth/social/oauth/authenticateWithSocial/authenticateWithSocial.d.ts +4 -12
- package/dist/modules/auth/social/oauth/authenticateWithSocial/authenticateWithSocial.d.ts.map +1 -1
- package/dist/modules/auth/social/oauth/completeSocialAuthentication/completeSocialAuthentication.d.ts +4 -12
- package/dist/modules/auth/social/oauth/completeSocialAuthentication/completeSocialAuthentication.d.ts.map +1 -1
- package/dist/modules/auth/social/oauth/completeSocialRedirect/completeSocialRedirect.d.ts +20 -0
- package/dist/modules/auth/social/oauth/completeSocialRedirect/completeSocialRedirect.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/completeSocialRedirect/completeSocialRedirect.types.d.ts +6 -0
- package/dist/modules/auth/social/oauth/completeSocialRedirect/completeSocialRedirect.types.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/completeSocialRedirect/index.d.ts +2 -0
- package/dist/modules/auth/social/oauth/completeSocialRedirect/index.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/detectOAuthRedirect/detectOAuthRedirect.d.ts +4 -9
- package/dist/modules/auth/social/oauth/detectOAuthRedirect/detectOAuthRedirect.d.ts.map +1 -1
- package/dist/modules/auth/social/oauth/detectSocialRedirectUrl/detectSocialRedirectUrl.d.ts +16 -0
- package/dist/modules/auth/social/oauth/detectSocialRedirectUrl/detectSocialRedirectUrl.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/detectSocialRedirectUrl/detectSocialRedirectUrl.types.d.ts +4 -0
- package/dist/modules/auth/social/oauth/detectSocialRedirectUrl/detectSocialRedirectUrl.types.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/detectSocialRedirectUrl/index.d.ts +2 -0
- package/dist/modules/auth/social/oauth/detectSocialRedirectUrl/index.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/buildOAuthUrl/addOAuthUrlParams/addOAuthUrlParams.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/buildOAuthUrl/addOAuthUrlParams/index.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/{authenticateWithSocial → signInWithSocialRedirect}/buildOAuthUrl/buildOAuthUrl.d.ts +1 -1
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/buildOAuthUrl/buildOAuthUrl.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/buildOAuthUrl/getOAuthBaseUrl/getOAuthBaseUrl.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/buildOAuthUrl/getOAuthBaseUrl/index.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/buildOAuthUrl/index.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/index.d.ts +2 -0
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/index.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/signInWithSocialRedirect.d.ts +19 -0
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/signInWithSocialRedirect.d.ts.map +1 -0
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/signInWithSocialRedirect.types.d.ts +6 -0
- package/dist/modules/auth/social/oauth/signInWithSocialRedirect/signInWithSocialRedirect.types.d.ts.map +1 -0
- package/dist/modules/sessionKeys/generateSessionKeys/generateSessionKeys.d.ts.map +1 -1
- package/dist/modules/waas/restoreUserSharesForAllWalletAccounts/restoreUserSharesForAllWalletAccounts.d.ts.map +1 -1
- package/dist/services/instrumentation/connectLoggerToInstrumentation/connectLoggerToInstrumentation.d.ts +2 -1
- package/dist/services/instrumentation/connectLoggerToInstrumentation/connectLoggerToInstrumentation.d.ts.map +1 -1
- package/dist/services/instrumentation/instrumentFunction/instrumentFunction.d.ts.map +1 -1
- package/dist/services/instrumentation/instrumentation.types.d.ts +2 -0
- package/dist/services/instrumentation/instrumentation.types.d.ts.map +1 -1
- package/dist/services/passkey/createPasskeyService/createPasskeyService.d.ts +11 -0
- package/dist/services/passkey/createPasskeyService/createPasskeyService.d.ts.map +1 -0
- package/dist/services/passkey/createPasskeyService/index.d.ts +2 -0
- package/dist/services/passkey/createPasskeyService/index.d.ts.map +1 -0
- package/dist/services/passkey/index.d.ts +1 -1
- package/dist/services/passkey/index.d.ts.map +1 -1
- package/dist/services/passkey/passkey.types.d.ts +4 -0
- package/dist/services/passkey/passkey.types.d.ts.map +1 -1
- package/dist/tsconfig.lib.tsbuildinfo +1 -1
- package/dist/{waas.cjs.js → waas.cjs} +5 -5
- package/dist/waas.cjs.map +1 -0
- package/dist/waas.esm.js +3 -3
- package/dist/waas.native.esm.js +3 -3
- package/dist/{waasCore.cjs.js → waasCore.cjs} +5 -5
- package/dist/waasCore.cjs.map +1 -0
- package/dist/waasCore.esm.js +3 -3
- package/dist/waasCore.native.esm.js +3 -3
- package/package.json +13 -8
- package/dist/InvalidParamError-BxdCGMzn.esm.js.map +0 -1
- package/dist/InvalidParamError-C5CPZiAb.native.esm.js.map +0 -1
- package/dist/InvalidParamError-Dg0Tc6h7.cjs.js.map +0 -1
- package/dist/NotWaasWalletAccountError-w4J6uXP2.cjs.js.map +0 -1
- package/dist/core.cjs.js.map +0 -1
- package/dist/getNetworkProviderFromNetworkId-BzJ_kChE.esm.js.map +0 -1
- package/dist/getNetworkProviderFromNetworkId-DRAq7tIx.cjs.js.map +0 -1
- package/dist/getNetworkProviderFromNetworkId-DnfmH9wZ.native.esm.js.map +0 -1
- package/dist/getSignedSessionId-CDCWfHxY.cjs.js.map +0 -1
- package/dist/getVerifiedCredentialForWalletAccount-B18TOqzI.native.esm.js.map +0 -1
- package/dist/getVerifiedCredentialForWalletAccount-Bznazz-w.cjs.js.map +0 -1
- package/dist/getVerifiedCredentialForWalletAccount-C2LbBPET.esm.js.map +0 -1
- package/dist/index.cjs.js.map +0 -1
- package/dist/isMfaRequiredForAction-DG4IaOFU.cjs.js.map +0 -1
- package/dist/modules/auth/social/oauth/authenticateWithSocial/buildOAuthUrl/addOAuthUrlParams/addOAuthUrlParams.d.ts.map +0 -1
- package/dist/modules/auth/social/oauth/authenticateWithSocial/buildOAuthUrl/addOAuthUrlParams/index.d.ts.map +0 -1
- package/dist/modules/auth/social/oauth/authenticateWithSocial/buildOAuthUrl/buildOAuthUrl.d.ts.map +0 -1
- package/dist/modules/auth/social/oauth/authenticateWithSocial/buildOAuthUrl/getOAuthBaseUrl/getOAuthBaseUrl.d.ts.map +0 -1
- package/dist/modules/auth/social/oauth/authenticateWithSocial/buildOAuthUrl/getOAuthBaseUrl/index.d.ts.map +0 -1
- package/dist/modules/auth/social/oauth/authenticateWithSocial/buildOAuthUrl/index.d.ts.map +0 -1
- package/dist/services/passkey/createWebPasskeyService/createWebPasskeyService.d.ts +0 -7
- package/dist/services/passkey/createWebPasskeyService/createWebPasskeyService.d.ts.map +0 -1
- package/dist/services/passkey/createWebPasskeyService/index.d.ts +0 -2
- package/dist/services/passkey/createWebPasskeyService/index.d.ts.map +0 -1
- package/dist/waas.cjs.js.map +0 -1
- package/dist/waasCore.cjs.js.map +0 -1
- /package/dist/modules/auth/social/oauth/{authenticateWithSocial → signInWithSocialRedirect}/buildOAuthUrl/addOAuthUrlParams/addOAuthUrlParams.d.ts +0 -0
- /package/dist/modules/auth/social/oauth/{authenticateWithSocial → signInWithSocialRedirect}/buildOAuthUrl/addOAuthUrlParams/index.d.ts +0 -0
- /package/dist/modules/auth/social/oauth/{authenticateWithSocial → signInWithSocialRedirect}/buildOAuthUrl/getOAuthBaseUrl/getOAuthBaseUrl.d.ts +0 -0
- /package/dist/modules/auth/social/oauth/{authenticateWithSocial → signInWithSocialRedirect}/buildOAuthUrl/getOAuthBaseUrl/index.d.ts +0 -0
- /package/dist/modules/auth/social/oauth/{authenticateWithSocial → signInWithSocialRedirect}/buildOAuthUrl/index.d.ts +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
|
-
const require_getNetworkProviderFromNetworkId = require('./getNetworkProviderFromNetworkId-
|
|
2
|
-
const require_InvalidParamError = require('./InvalidParamError-
|
|
3
|
-
const require_getVerifiedCredentialForWalletAccount = require('./getVerifiedCredentialForWalletAccount-
|
|
4
|
-
const require_NotWaasWalletAccountError = require('./NotWaasWalletAccountError-
|
|
1
|
+
const require_getNetworkProviderFromNetworkId = require('./getNetworkProviderFromNetworkId-CY555AiJ.cjs');
|
|
2
|
+
const require_InvalidParamError = require('./InvalidParamError-D-SHhcTB.cjs');
|
|
3
|
+
const require_getVerifiedCredentialForWalletAccount = require('./getVerifiedCredentialForWalletAccount-BqaTVz4z.cjs');
|
|
4
|
+
const require_NotWaasWalletAccountError = require('./NotWaasWalletAccountError-EPhK7TaK.cjs');
|
|
5
5
|
let _dynamic_labs_sdk_assert_package_version = require("@dynamic-labs-sdk/assert-package-version");
|
|
6
6
|
let _dynamic_labs_sdk_api_core = require("@dynamic-labs/sdk-api-core");
|
|
7
7
|
|
|
@@ -524,4 +524,4 @@ exports.setWaasWalletAccountPassword = setWaasWalletAccountPassword;
|
|
|
524
524
|
exports.shouldAutoCreateWalletForChain = shouldAutoCreateWalletForChain;
|
|
525
525
|
exports.unlockWallet = unlockWallet;
|
|
526
526
|
exports.updateWaasPassword = updateWaasPassword;
|
|
527
|
-
//# sourceMappingURL=waas.cjs.
|
|
527
|
+
//# sourceMappingURL=waas.cjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"waas.cjs","names":["BaseError","getWalletProviderFromWalletAccount","isWaasWalletProvider","NotWaasWalletAccountError","getDefaultClient","requirement: WalletCreationRequirement","getDefaultClient","formatWalletProviderKey","DYNAMIC_WAAS_METADATA","WalletProviderEnum","getWalletProviderByKey","NoWalletProviderFoundError","isWaasWalletProvider","refreshAuth","getDefaultClient","refreshAuth","getDefaultClient","getDefaultClient","WalletProviderEnum","getChainFromVerifiedCredentialChain","getDefaultClient","EmbeddedWalletVersionEnum","getDefaultClient","getDefaultClient","getDefaultClient","getVerifiedCredentialForWalletAccount","findWaasWalletProviderByChain","NoWalletProviderFoundError","formatWalletProviderKey","DYNAMIC_WAAS_METADATA","WalletProviderEnum","getDefaultClient","getDefaultClient","getDefaultClient","getDefaultClient","refreshAuth","getDefaultClient","JwtVerifiedCredentialFormatEnum","WalletProviderEnum","getDefaultClient","getDefaultClient","getDefaultClient","packageName","packageVersion"],"sources":["../src/errors/NotWaasWalletProviderError.ts","../src/modules/waas/getWaasWalletProviderFromWalletAccount/getWaasWalletProviderFromWalletAccount.ts","../src/modules/waas/backupWaasKeySharesToGoogleDrive/backupWaasKeySharesToGoogleDrive.ts","../src/modules/waas/isWalletCreationRequirement/isWalletCreationRequirement.ts","../src/modules/waas/normalizeWalletRequirements/normalizeWalletRequirements.ts","../src/modules/waas/createWaasWalletAccounts/createWaasWalletAccounts.ts","../src/modules/waas/delegateWaasKeyShares/delegateWaasKeyShares.ts","../src/modules/waas/exportWaasClientKeyshares/exportWaasClientKeyshares.ts","../src/modules/waas/exportWaasPrivateKey/exportWaasPrivateKey.ts","../src/modules/wallets/userHasEmbeddedWalletForChain/userHasEmbeddedWalletForChain.ts","../src/modules/waas/isDynamicWaasEnabled/isDynamicWaasEnabled.ts","../src/modules/waas/getChainsMissingWaasWalletAccounts/getChainsMissingWaasWalletAccounts.ts","../src/modules/waas/getWalletRecoveryState/getWalletRecoveryState.ts","../src/modules/waas/hasDelegatedAccess/hasDelegatedAccess.ts","../src/modules/waas/getWaasWalletProviderByChain/getWaasWalletProviderByChain.ts","../src/modules/waas/importWaasPrivateKey/importWaasPrivateKey.ts","../src/modules/waas/isPasswordRequiredForWaasWallets/isPasswordRequiredForWaasWallets.ts","../src/modules/waas/refreshWaasWalletAccountShares/refreshWaasWalletAccountShares.ts","../src/modules/waas/revokeWaasDelegation/revokeWaasDelegation.ts","../src/modules/waas/setWaasWalletAccountPassword/setWaasWalletAccountPassword.ts","../src/modules/wallets/userHasExternalWallet/userHasExternalWallet.ts","../src/modules/waas/shouldAutoCreateWalletForChain/shouldAutoCreateWalletForChain.ts","../src/modules/waas/unlockWallet/unlockWallet.ts","../src/modules/waas/updateWaasPassword/updateWaasPassword.ts","../src/exports/waas.ts"],"sourcesContent":["import { BaseError } from './base';\n\ntype NotWaasWalletProviderErrorParams = {\n walletProviderKey: string;\n};\n\nexport class NotWaasWalletProviderError extends BaseError {\n constructor({ walletProviderKey }: NotWaasWalletProviderErrorParams) {\n super({\n cause: null,\n code: 'not_waas_wallet_provider_error',\n docsUrl: null,\n name: 'NotWaasWalletProviderError',\n shortMessage: `Wallet provider ${walletProviderKey} is not a Dynamic WaaS wallet provider`,\n });\n }\n}\n","import type { DynamicClient } from '../../../client/types/DynamicClient';\nimport { NotWaasWalletAccountError } from '../../../errors/NotWaasWalletAccountError';\nimport { getWalletProviderFromWalletAccount } from '../../wallets/utils/getWalletProviderFromWalletAccount';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { isWaasWalletProvider } from '../isWaasWalletProvider';\nimport type { WaasWalletProvider } from '../waas.types';\n\ntype GetWalletProviderFromWalletAccountParams = {\n walletAccount: WalletAccount;\n};\n\n/** @not-instrumented */\nexport const getWaasWalletProviderFromWalletAccount = (\n { walletAccount }: GetWalletProviderFromWalletAccountParams,\n client: DynamicClient\n): WaasWalletProvider => {\n const walletProvider = getWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n if (!isWaasWalletProvider(walletProvider)) {\n throw new NotWaasWalletAccountError({\n walletAddress: walletAccount.address,\n });\n }\n\n return walletProvider;\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype BackupWaasKeySharesToGoogleDriveParams = {\n password?: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Backs up WaaS wallet key shares to Google Drive for secure recovery.\n *\n * This function creates a backup of the wallet's cryptographic key shares\n * to Google Drive, allowing users to recover their wallet later.\n *\n * @param params.walletAccount - The WaaS wallet account to backup.\n * @param [params.password] - Optional password to encrypt the backup.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when the backup process is complete.\n * @not-instrumented\n */\nexport const backupWaasKeySharesToGoogleDrive = async (\n { password, walletAccount }: BackupWaasKeySharesToGoogleDriveParams,\n client = getDefaultClient()\n) => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n return provider.backupKeySharesToGoogleDrive({\n password,\n walletAccount,\n });\n};\n","import type { Chain } from '../../chain';\nimport type { WalletCreationRequirement } from '../waas.types';\n\n/**\n * Type guard to check if an item is a WalletCreationRequirement object.\n * Chain values are strings, so we can distinguish by checking if it's an object with a 'chain' property.\n *\n * @param item - The item to check, either a WalletCreationRequirement or Chain string\n * @returns True if the item is a WalletCreationRequirement object\n * @not-instrumented\n */\nexport const isWalletCreationRequirement = (\n item: WalletCreationRequirement | Chain\n): item is WalletCreationRequirement =>\n typeof item === 'object' && item !== null && 'chain' in item;\n","import type { Chain } from '../../chain';\nimport { isWalletCreationRequirement } from '../isWalletCreationRequirement/isWalletCreationRequirement';\nimport type {\n WalletCreationBitcoinConfig,\n WalletCreationRequirement,\n} from '../waas.types';\n\nconst DEFAULT_BITCOIN_ADDRESS_TYPE = 'native_segwit' as const;\n\ntype NormalizeWalletRequirementsParams = {\n defaultBitcoinConfig?: WalletCreationBitcoinConfig;\n input: WalletCreationRequirement[] | Chain[];\n};\n\n/**\n * Normalizes wallet creation input from either legacy Chain[] format\n * or new WalletCreationRequirement[] format to WalletCreationRequirement[].\n *\n * For BTC chains without explicit bitcoinConfig, defaults to native_segwit.\n *\n * @param params.input - Either an array of Chain strings or WalletCreationRequirement objects\n * @param params.defaultBitcoinConfig - Optional default bitcoin config to use for BTC chains when converting from legacy format\n * @returns Array of WalletCreationRequirement objects\n * @not-instrumented\n */\nexport const normalizeWalletRequirements = ({\n defaultBitcoinConfig,\n input,\n}: NormalizeWalletRequirementsParams): WalletCreationRequirement[] => {\n if (input.length === 0) {\n return [];\n }\n\n const [firstItem] = input;\n\n if (isWalletCreationRequirement(firstItem)) {\n return (input as WalletCreationRequirement[]).map((requirement) => {\n if (requirement.chain === 'BTC' && !requirement.bitcoinConfig) {\n return {\n ...requirement,\n bitcoinConfig: { addressType: DEFAULT_BITCOIN_ADDRESS_TYPE },\n };\n }\n\n return requirement;\n });\n }\n\n return (input as Chain[]).map((chain) => {\n const requirement: WalletCreationRequirement = { chain };\n\n if (chain === 'BTC') {\n requirement.bitcoinConfig = defaultBitcoinConfig ?? {\n addressType: DEFAULT_BITCOIN_ADDRESS_TYPE,\n };\n }\n\n return requirement;\n });\n};\n","import type { ThresholdSignatureScheme } from '@dynamic-labs-wallet/browser-wallet-client';\nimport { WalletProviderEnum } from '@dynamic-labs/sdk-api-core';\n\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport { NotWaasWalletProviderError } from '../../../errors/NotWaasWalletProviderError';\nimport { NoWalletProviderFoundError } from '../../../errors/NoWalletProviderFoundError';\nimport type { Chain } from '../../chain';\nimport { refreshAuth } from '../../user/refreshAuth';\nimport { getWalletProviderByKey } from '../../wallets/getWalletProviderByKey';\nimport { formatWalletProviderKey } from '../../wallets/utils/formatWalletProviderKey';\nimport { DYNAMIC_WAAS_METADATA } from '../constants';\nimport { isWaasWalletProvider } from '../isWaasWalletProvider';\nimport { normalizeWalletRequirements } from '../normalizeWalletRequirements/normalizeWalletRequirements';\nimport type { WalletCreationRequirement } from '../waas.types';\n\ntype CreateWaasWalletAccountsParams = {\n /**\n * For which chains to create wallet accounts.\n * Accepts either an array of chain strings (legacy format) or an array of\n * WalletCreationRequirement objects for chain-specific configuration.\n *\n * For Bitcoin, you can specify the address type ('native_segwit' or 'taproot').\n * If not specified, defaults to 'native_segwit'.\n *\n * If a chain is passed multiple times, just as many wallet accounts will be created\n * for that chain.\n * @not-instrumented\n */\n chains: Chain[] | WalletCreationRequirement[];\n /**\n * The optional password to use for the wallet accounts.\n * It's used to encrypt the user shares.\n * The same password must be used for all waas wallet accounts created for the same user.\n */\n password?: string;\n /**\n * The threshold signature scheme to use for the wallet accounts.\n * If not provided, TWO_OF_TWO will be used.\n */\n thresholdSignatureScheme?: ThresholdSignatureScheme;\n};\n\n/**\n * Creates wallet accounts for the specified chains.\n *\n * This function creates wallet accounts for the specified chains.\n * If the same chain is passed multiple times, just as many wallet accounts will be created\n * for that chain.\n *\n * @example\n * ```ts\n * // Legacy format - will create wallet accounts for EVM and SOL, BTC defaults to native_segwit\n * await createWaasWalletAccounts({ chains: ['EVM', 'SOL', 'BTC'] });\n *\n * // New format with chain-specific config\n * await createWaasWalletAccounts({\n * chains: [\n * { chain: 'BTC', bitcoinConfig: { addressType: 'taproot' } },\n * { chain: 'EVM' },\n * ]\n * });\n *\n * // Create both BTC address types\n * await createWaasWalletAccounts({\n * chains: [\n * { chain: 'BTC', bitcoinConfig: { addressType: 'native_segwit' } },\n * { chain: 'BTC', bitcoinConfig: { addressType: 'taproot' } },\n * ]\n * });\n * ```\n *\n * @param params.chains - The chains to create wallet accounts for.\n * @param params.password - The optional password to use for the wallet accounts.\n * @param params.thresholdSignatureScheme - The threshold signature scheme to use for the wallet accounts. (Default: TWO_OF_TWO)\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when all wallet accounts are created.\n * @not-instrumented\n */\nexport const createWaasWalletAccounts = async (\n {\n chains,\n password,\n thresholdSignatureScheme,\n }: CreateWaasWalletAccountsParams,\n client = getDefaultClient()\n): Promise<void> => {\n const normalizedRequirements = normalizeWalletRequirements({ input: chains });\n\n // we need this right now so we don't try to create wallet accounts for chains\n // that we don't support Dynamic Waas yet in the JS SDK, like TRON\n const supportedChains = ['BTC', 'EVM', 'SOL', 'SUI', 'TON'];\n\n const filteredRequirements = normalizedRequirements.filter((requirement) =>\n supportedChains.includes(requirement.chain)\n );\n\n if (filteredRequirements.length === 0) {\n return;\n }\n\n const walletProviderMap = new Map<\n string,\n ReturnType<typeof getWalletProviderByKey>\n >();\n\n for (const requirement of filteredRequirements) {\n const walletProviderKey = formatWalletProviderKey({\n chain: requirement.chain,\n displayName: DYNAMIC_WAAS_METADATA.displayName,\n walletProviderType: WalletProviderEnum.EmbeddedWallet,\n });\n\n if (!walletProviderMap.has(walletProviderKey)) {\n const walletProvider = getWalletProviderByKey(\n { walletProviderKey },\n client\n );\n\n if (!walletProvider) {\n throw new NoWalletProviderFoundError({\n walletProviderKey,\n });\n }\n\n if (!isWaasWalletProvider(walletProvider)) {\n throw new NotWaasWalletProviderError({\n walletProviderKey,\n });\n }\n\n walletProviderMap.set(walletProviderKey, walletProvider);\n }\n }\n\n await Promise.all(\n filteredRequirements.map((requirement) => {\n const walletProviderKey = formatWalletProviderKey({\n chain: requirement.chain,\n displayName: DYNAMIC_WAAS_METADATA.displayName,\n walletProviderType: WalletProviderEnum.EmbeddedWallet,\n });\n\n const walletProvider = walletProviderMap.get(walletProviderKey);\n\n if (!walletProvider || !isWaasWalletProvider(walletProvider)) {\n return Promise.resolve();\n }\n\n return walletProvider.createWalletAccount({\n bitcoinConfig: requirement.bitcoinConfig,\n password,\n thresholdSignatureScheme,\n });\n })\n );\n\n await refreshAuth(client);\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport { refreshAuth } from '../../user/refreshAuth';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype DelegateWaasKeySharesParams = {\n password?: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Delegates cryptographic key shares for a WaaS wallet account.\n *\n * This function allows the delegation of key management responsibilities,\n * enabling distributed key management for enhanced security.\n *\n * @param params.walletAccount - The WaaS wallet account to delegate shares for.\n * @param [params.password] - Optional password for key share operations.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when the key delegation is complete.\n * @not-instrumented\n */\nexport const delegateWaasKeyShares = async (\n { password, walletAccount }: DelegateWaasKeySharesParams,\n client = getDefaultClient()\n): Promise<void> => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n await provider.delegateKeyShares({\n password,\n walletAccount,\n });\n\n await refreshAuth(client);\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype ExportWaasClientKeysharesParams = {\n password?: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Exports the client-side key shares for a WaaS wallet account.\n *\n * This function retrieves the cryptographic key shares that are stored\n * on the client side for backup or migration purposes.\n *\n * @param params.walletAccount - The WaaS wallet account to export shares from.\n * @param [params.password] - Optional password to encrypt the exported shares.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves to the exported key shares.\n * @not-instrumented\n */\nexport const exportWaasClientKeyshares = async (\n { password, walletAccount }: ExportWaasClientKeysharesParams,\n client = getDefaultClient()\n) => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n return provider.exportClientKeyshares({\n password,\n walletAccount,\n });\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype ExportWaasPrivateKeyParams = {\n displayContainer: HTMLElement;\n password?: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Exports the private key for a WaaS wallet account with secure display.\n *\n * This function reveals the private key for a WaaS wallet and displays it\n * securely within an iframe dynamically inserted into the specified HTML container element.\n *\n * @param params.walletAccount - The WaaS wallet account to export the private key from.\n * @param params.displayContainer - The HTML element where the iframe will be injected.\n * @param [params.password] - Optional password to decrypt the private key.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when the private key export is complete.\n * @not-instrumented\n */\nexport const exportWaasPrivateKey = async (\n { displayContainer, password, walletAccount }: ExportWaasPrivateKeyParams,\n client = getDefaultClient()\n) => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n return provider.exportPrivateKey({\n displayContainer,\n password,\n walletAccount,\n });\n};\n","import { type SdkUser, WalletProviderEnum } from '@dynamic-labs/sdk-api-core';\n\nimport { getChainFromVerifiedCredentialChain } from '../../../utils/getChainFromVerifiedCredentialChain';\nimport type { Chain } from '../../chain/chain.types';\n\ntype UserHasEmbeddedWalletForChainProps = {\n chain: Chain;\n user: SdkUser;\n};\n\n/** @not-instrumented */\nexport const userHasEmbeddedWalletForChain = ({\n user,\n chain,\n}: UserHasEmbeddedWalletForChainProps): boolean => {\n const hasEmbeddedWalletForChain = user.verifiedCredentials.some(\n (vc) =>\n vc.walletProvider === WalletProviderEnum.EmbeddedWallet &&\n vc.chain &&\n getChainFromVerifiedCredentialChain(vc.chain) === chain\n );\n\n return hasEmbeddedWalletForChain;\n};\n","import { EmbeddedWalletVersionEnum } from '@dynamic-labs/sdk-api-core';\n\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport { assertDefined } from '../../../utils/assertDefined';\n\n/**\n * Checks if Dynamic WaaS (Wallet as a Service) is enabled for the current project.\n *\n * This function examines the project settings to determine if Dynamic WaaS is\n * enabled in the Dynamic Dashboard or not.\n *\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns True if Dynamic WaaS is enabled, false otherwise.\n * @not-instrumented\n */\nexport const isDynamicWaasEnabled = (client = getDefaultClient()) => {\n const projectSettings = client.projectSettings;\n\n assertDefined(projectSettings, 'Project settings are not available');\n\n const embeddedWalletSettings = projectSettings.sdk.embeddedWallets;\n\n const dynamicWaasIsEnabled =\n embeddedWalletSettings?.defaultWalletVersion ===\n EmbeddedWalletVersionEnum.V3;\n\n return dynamicWaasIsEnabled;\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport { assertDefined } from '../../../utils/assertDefined';\nimport type { Chain } from '../../chain/chain.types';\nimport { userHasEmbeddedWalletForChain } from '../../wallets/userHasEmbeddedWalletForChain';\nimport { isDynamicWaasEnabled } from '../isDynamicWaasEnabled';\n\n/**\n * Gets all chains missing a waas wallet account for the current user.\n *\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns An array of all chains that have waas wallet accounts enabled\n * but for which the current user does not yet have an embedded wallet account.\n * @not-instrumented\n */\nexport const getChainsMissingWaasWalletAccounts = (\n client = getDefaultClient()\n): Chain[] => {\n const projectSettings = client.projectSettings;\n\n assertDefined(projectSettings, 'Project settings are not available');\n\n const embeddedWalletSettings = projectSettings.sdk.embeddedWallets;\n\n const isWaasEnabled = isDynamicWaasEnabled(client);\n\n const user = client.user;\n\n if (!user || !isWaasEnabled) {\n return [];\n }\n\n const enabledChainForWaas: Chain[] = (\n embeddedWalletSettings?.chainConfigurations?.filter(\n (chain) => chain.enabled\n ) ?? []\n ).map((chain) => chain.name as Chain);\n\n // For each enabled chain, if user does NOT have an embedded wallet, add to missing\n return enabledChainForWaas.filter(\n (chain) => !userHasEmbeddedWalletForChain({ chain, user })\n );\n};\n","import type { WalletRecoveryState } from '@dynamic-labs-wallet/browser-wallet-client';\n\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport type { DynamicClient } from '../../../client/types/DynamicClient';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype GetWalletRecoveryStateParams = {\n walletAccount: WalletAccount;\n};\n\n/**\n * Retrieves the recovery state of a WaaS wallet account.\n *\n * @param params.walletAccount - The WaaS wallet account to get the recovery state for.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves with the wallet recovery state.\n * @not-instrumented\n */\nexport const getWalletRecoveryState = async (\n { walletAccount }: GetWalletRecoveryStateParams,\n client: DynamicClient = getDefaultClient()\n): Promise<WalletRecoveryState> => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n return provider.getWalletRecoveryState({\n walletAccount,\n });\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport { assertDefined } from '../../../utils/assertDefined';\nimport { getVerifiedCredentialForWalletAccount } from '../../wallets/utils/getVerifiedCredentialForWalletAccount';\nimport type { WalletAccount } from '../../wallets/walletAccount';\n\ntype HasDelegatedAccessParams = {\n walletAccount: WalletAccount;\n};\n\n/**\n * Checks if a WaaS wallet account has delegated access.\n *\n * @param params.walletAccount - The WaaS wallet account to check for delegated access.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns True if the wallet account has delegated access, false otherwise.\n * @not-instrumented\n */\nexport const hasDelegatedAccess = (\n { walletAccount }: HasDelegatedAccessParams,\n client = getDefaultClient()\n): boolean => {\n const verifiedCredential = getVerifiedCredentialForWalletAccount(\n { walletAccount },\n client\n );\n\n assertDefined(\n verifiedCredential,\n 'Verified credential not found for Waas wallet account'\n );\n\n const hasDelegatedKeyShare =\n verifiedCredential.walletProperties?.keyShares?.some(\n (keyShare) => keyShare.backupLocation === 'delegated'\n );\n\n return !!hasDelegatedKeyShare;\n};\n","import { WalletProviderEnum } from '@dynamic-labs/sdk-api-core';\n\nimport type { DynamicClient } from '../../../client/types/DynamicClient';\nimport { NoWalletProviderFoundError } from '../../../errors/NoWalletProviderFoundError';\nimport type { Chain } from '../../chain';\nimport { formatWalletProviderKey } from '../../wallets/utils/formatWalletProviderKey';\nimport { DYNAMIC_WAAS_METADATA } from '../constants';\nimport type { WaasWalletProvider } from '../waas.types';\nimport { findWaasWalletProviderByChain } from '../findWaasWalletProviderByChain/findWaasWalletProviderByChain';\n\ntype GetWaasWalletProviderByChainParams = {\n chain: Chain;\n};\n\n/** @not-instrumented */\nexport const getWaasWalletProviderByChain = (\n { chain }: GetWaasWalletProviderByChainParams,\n client: DynamicClient\n): WaasWalletProvider => {\n const waasProvider = findWaasWalletProviderByChain({ chain }, client);\n\n if (!waasProvider) {\n const waasProviderKey = formatWalletProviderKey({\n chain,\n displayName: DYNAMIC_WAAS_METADATA.displayName,\n walletProviderType: WalletProviderEnum.EmbeddedWallet,\n });\n\n throw new NoWalletProviderFoundError({\n walletProviderKey: waasProviderKey,\n });\n }\n\n return waasProvider;\n};\n","import type { ThresholdSignatureScheme } from '@dynamic-labs-wallet/browser-wallet-client';\n\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport type { Chain } from '../../chain';\nimport { getWaasWalletProviderByChain } from '../getWaasWalletProviderByChain';\n\ntype ImportWaasPrivateKeyParams = {\n chain: Chain;\n privateKey: string;\n thresholdSignatureScheme?: ThresholdSignatureScheme;\n};\n\n/**\n * Imports an existing private key to create a new WaaS wallet account.\n *\n * This function allows users to import their existing private key into\n * Dynamic's WaaS infrastructure for secure management.\n *\n * @param params.chain - The chain for the imported wallet.\n * @param params.privateKey - The private key to import.\n * @param [params.thresholdSignatureScheme] - Optional threshold signature scheme configuration. Default is TWO_OF_TWO.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when the private key is successfully imported.\n * @not-instrumented\n */\nexport const importWaasPrivateKey = async (\n { chain, privateKey, thresholdSignatureScheme }: ImportWaasPrivateKeyParams,\n client = getDefaultClient()\n) => {\n const provider = getWaasWalletProviderByChain({ chain }, client);\n\n return provider.importPrivateKey({\n privateKey,\n thresholdSignatureScheme,\n });\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport { assertDefined } from '../../../utils/assertDefined';\n\n/**\n * Checks if the user Waas wallets are password protected.\n *\n * If the user's Waas wallets are password protected, it means that user's will have to be prompted for a\n * password for the first wallet action that happens on each session.\n * The password is also required for creating any new Waas wallets.\n *\n * @param client - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns True if the user has any password protected Waas wallets, false otherwise\n * @not-instrumented\n */\nexport const isPasswordRequiredForWaasWallets = (\n client = getDefaultClient()\n): boolean => {\n const { user } = client;\n\n assertDefined(user, 'User is not authenticated');\n\n return user.verifiedCredentials.some((credential) =>\n credential.walletProperties?.keyShares?.some(\n (keyShare) => keyShare.passwordEncrypted\n )\n );\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype RefreshWaasWalletAccountSharesParams = {\n password?: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Refreshes the cryptographic key shares for a WaaS wallet account.\n *\n * This function generates new key shares for the wallet while maintaining\n * the same threshold signature scheme.\n *\n * @param params.walletAccount - The WaaS wallet account to refresh shares for.\n * @param [params.password] - Optional password for key share operations.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when the key shares are refreshed.\n * @not-instrumented\n */\nexport const refreshWaasWalletAccountShares = async (\n { walletAccount, password }: RefreshWaasWalletAccountSharesParams,\n client = getDefaultClient()\n) => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n return provider.refreshWalletAccountShares({\n password,\n walletAccount,\n });\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport { refreshAuth } from '../../user/refreshAuth';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype RevokeWaasDelegationParams = {\n password?: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Revokes the delegation of a WaaS wallet account.\n *\n * @param params.walletAccount - The WaaS wallet account to revoke delegation for.\n * @param [params.password] - Optional password for delegation operations.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when the delegation is revoked.\n * @not-instrumented\n */\nexport const revokeWaasDelegation = async (\n { password, walletAccount }: RevokeWaasDelegationParams,\n client = getDefaultClient()\n): Promise<void> => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n await provider.revokeDelegation({\n password,\n walletAccount,\n });\n\n await refreshAuth(client);\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype SetWaasWalletAccountPasswordParams = {\n password: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Sets a password for a WaaS wallet account.\n *\n * @param params.walletAccount - The WaaS wallet account to set the password for.\n * @param params.password - The password to set for the wallet.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when the password is successfully set.\n * @not-instrumented\n */\nexport const setWaasWalletAccountPassword = async (\n { password, walletAccount }: SetWaasWalletAccountPasswordParams,\n client = getDefaultClient()\n) => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n return provider.setWaasWalletAccountPassword({\n password,\n walletAccount,\n });\n};\n","import {\n JwtVerifiedCredentialFormatEnum,\n type SdkUser,\n WalletProviderEnum,\n} from '@dynamic-labs/sdk-api-core';\n\n/** @not-instrumented */\nexport const userHasExternalWallet = (user: SdkUser) => {\n const hasExternalWallet = user?.verifiedCredentials.some(\n (vc) =>\n vc.format === JwtVerifiedCredentialFormatEnum.Blockchain &&\n vc.walletProvider !== WalletProviderEnum.EmbeddedWallet\n );\n\n return hasExternalWallet;\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport { assertDefined } from '../../../utils/assertDefined';\nimport type { Chain } from '../../chain';\nimport { userHasExternalWallet } from '../../wallets/userHasExternalWallet';\nimport { getChainsMissingWaasWalletAccounts } from '../getChainsMissingWaasWalletAccounts';\n\ntype ShouldAutoCreateWalletForChainParams = {\n chain: Chain;\n};\n\n/**\n * Checks if a WaaS wallet should be automatically created for the specified blockchain.\n *\n * This function determines whether the current user configuration and project\n * settings require automatic wallet creation for the given chain, considering\n * whether the user already has an embedded wallet for the enabled chains or an external wallet.\n *\n * @param params.chain - The blockchain network to check.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns True if a wallet should be auto-created for the chain, false otherwise.\n * @not-instrumented\n */\nexport const shouldAutoCreateWalletForChain = (\n { chain }: ShouldAutoCreateWalletForChainParams,\n client = getDefaultClient()\n) => {\n assertDefined(client.projectSettings, 'Project settings are not available');\n\n const embeddedWalletSettings = client.projectSettings.sdk.embeddedWallets;\n\n const automaticEmbeddedWalletCreationEnabled =\n embeddedWalletSettings?.automaticEmbeddedWalletCreation;\n\n if (!automaticEmbeddedWalletCreationEnabled || !client.user) {\n return false;\n }\n\n const automaticEmbeddedWalletCreationForExternalEnabled =\n embeddedWalletSettings?.automaticEmbeddedWalletCreationForExternal;\n\n // If user has an external wallet (e.g metamask, phantom, etc), should only\n // create if automaticEmbeddedWalletCreationForExternalEnabled is true\n const shouldCreateDynamicWaasWallet =\n !userHasExternalWallet(client.user) ||\n automaticEmbeddedWalletCreationForExternalEnabled;\n\n if (!shouldCreateDynamicWaasWallet) {\n return false;\n }\n\n const chainsMissingAutoCreatedWallet =\n getChainsMissingWaasWalletAccounts(client);\n\n return chainsMissingAutoCreatedWallet.includes(chain);\n};\n","import type { GetWalletResponse } from '@dynamic-labs-wallet/browser-wallet-client';\n\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype UnlockWalletParams = {\n password: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Unlocks a WaaS wallet account.\n *\n * @param params.walletAccount - The WaaS wallet account to unlock.\n * @param params.password - The password to unlock the wallet.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves with the wallet information.\n * @not-instrumented\n */\nexport const unlockWallet = async (\n { password, walletAccount }: UnlockWalletParams,\n client = getDefaultClient()\n): Promise<GetWalletResponse> => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n return provider.unlockWallet({\n password,\n walletAccount,\n });\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype UpdateWaasPasswordParams = {\n currentPassword: string;\n newPassword: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Updates the password for a WaaS wallet account.\n *\n * This function changes the password used to encrypt and protect the\n * cryptographic key shares for the specified wallet account.\n *\n * @param params.walletAccount - The WaaS wallet account to update the password for.\n * @param params.currentPassword - The current password for the wallet.\n * @param params.newPassword - The new password to set for the wallet.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when the password is successfully updated.\n * @not-instrumented\n */\nexport const updateWaasPassword = async (\n { currentPassword, newPassword, walletAccount }: UpdateWaasPasswordParams,\n client = getDefaultClient()\n) => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n return provider.updatePassword({\n currentPassword,\n newPassword,\n walletAccount,\n });\n};\n","import { assertPackageVersion } from '@dynamic-labs-sdk/assert-package-version';\n\nimport {\n name as packageName,\n version as packageVersion,\n} from '../../package.json';\nassertPackageVersion(packageName, packageVersion);\n\nexport type {\n GetWalletResponse,\n WalletRecoveryState,\n} from '@dynamic-labs-wallet/browser-wallet-client';\nexport { NotWaasWalletProviderError } from '../errors/NotWaasWalletProviderError';\nexport { backupWaasKeySharesToGoogleDrive } from '../modules/waas/backupWaasKeySharesToGoogleDrive';\nexport { createWaasWalletAccounts } from '../modules/waas/createWaasWalletAccounts';\nexport { delegateWaasKeyShares } from '../modules/waas/delegateWaasKeyShares';\nexport { exportWaasClientKeyshares } from '../modules/waas/exportWaasClientKeyshares';\nexport { exportWaasPrivateKey } from '../modules/waas/exportWaasPrivateKey';\nexport { getChainsMissingWaasWalletAccounts } from '../modules/waas/getChainsMissingWaasWalletAccounts';\nexport { getWalletRecoveryState } from '../modules/waas/getWalletRecoveryState';\nexport { hasDelegatedAccess } from '../modules/waas/hasDelegatedAccess';\nexport { importWaasPrivateKey } from '../modules/waas/importWaasPrivateKey';\nexport { isDynamicWaasEnabled } from '../modules/waas/isDynamicWaasEnabled';\nexport { isPasswordRequiredForWaasWallets } from '../modules/waas/isPasswordRequiredForWaasWallets';\nexport { isWaasWalletAccount } from '../modules/waas/isWaasWalletAccount';\nexport { isWalletCreationRequirement } from '../modules/waas/isWalletCreationRequirement/isWalletCreationRequirement';\nexport { normalizeWalletRequirements } from '../modules/waas/normalizeWalletRequirements/normalizeWalletRequirements';\nexport { refreshWaasWalletAccountShares } from '../modules/waas/refreshWaasWalletAccountShares';\nexport { revokeWaasDelegation } from '../modules/waas/revokeWaasDelegation';\nexport { setWaasWalletAccountPassword } from '../modules/waas/setWaasWalletAccountPassword';\nexport { shouldAutoCreateWalletForChain } from '../modules/waas/shouldAutoCreateWalletForChain';\nexport { unlockWallet } from '../modules/waas/unlockWallet';\nexport { updateWaasPassword } from '../modules/waas/updateWaasPassword';\nexport type {\n WalletCreationBitcoinConfig,\n WalletCreationRequirement,\n} from '../modules/waas/waas.types';\n"],"mappings":";;;;;;;;AAMA,IAAa,6BAAb,cAAgDA,oCAAU;CACxD,YAAY,EAAE,qBAAuD;AACnE,QAAM;GACJ,OAAO;GACP,MAAM;GACN,SAAS;GACT,MAAM;GACN,cAAc,mBAAmB,kBAAkB;GACpD,CAAC;;;;;;;ACFN,MAAa,0CACX,EAAE,iBACF,WACuB;CACvB,MAAM,iBAAiBC,2FACrB,EAAE,eAAe,EACjB,OACD;AAED,KAAI,CAACC,mEAAqB,eAAe,CACvC,OAAM,IAAIC,4DAA0B,EAClC,eAAe,cAAc,SAC9B,CAAC;AAGJ,QAAO;;;;;;;;;;;;;;;;;ACNT,MAAa,mCAAmC,OAC9C,EAAE,UAAU,iBACZ,SAASC,4CAAkB,KACxB;AAMH,QALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEe,6BAA6B;EAC3C;EACA;EACD,CAAC;;;;;;;;;;;;;ACtBJ,MAAa,+BACX,SAEA,OAAO,SAAS,YAAY,SAAS,QAAQ,WAAW;;;;ACP1D,MAAM,+BAA+B;;;;;;;;;;;;AAkBrC,MAAa,+BAA+B,EAC1C,sBACA,YACoE;AACpE,KAAI,MAAM,WAAW,EACnB,QAAO,EAAE;CAGX,MAAM,CAAC,aAAa;AAEpB,KAAI,4BAA4B,UAAU,CACxC,QAAQ,MAAsC,KAAK,gBAAgB;AACjE,MAAI,YAAY,UAAU,SAAS,CAAC,YAAY,cAC9C,QAAO;GACL,GAAG;GACH,eAAe,EAAE,aAAa,8BAA8B;GAC7D;AAGH,SAAO;GACP;AAGJ,QAAQ,MAAkB,KAAK,UAAU;EACvC,MAAMC,cAAyC,EAAE,OAAO;AAExD,MAAI,UAAU,MACZ,aAAY,gBAAgB,wBAAwB,EAClD,aAAa,8BACd;AAGH,SAAO;GACP;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;ACoBJ,MAAa,2BAA2B,OACtC,EACE,QACA,UACA,4BAEF,SAASC,4CAAkB,KACT;CAClB,MAAM,yBAAyB,4BAA4B,EAAE,OAAO,QAAQ,CAAC;CAI7E,MAAM,kBAAkB;EAAC;EAAO;EAAO;EAAO;EAAO;EAAM;CAE3D,MAAM,uBAAuB,uBAAuB,QAAQ,gBAC1D,gBAAgB,SAAS,YAAY,MAAM,CAC5C;AAED,KAAI,qBAAqB,WAAW,EAClC;CAGF,MAAM,oCAAoB,IAAI,KAG3B;AAEH,MAAK,MAAM,eAAe,sBAAsB;EAC9C,MAAM,oBAAoBC,sEAAwB;GAChD,OAAO,YAAY;GACnB,aAAaC,gDAAsB;GACnC,oBAAoBC,8CAAmB;GACxC,CAAC;AAEF,MAAI,CAAC,kBAAkB,IAAI,kBAAkB,EAAE;GAC7C,MAAM,iBAAiBC,qEACrB,EAAE,mBAAmB,EACrB,OACD;AAED,OAAI,CAAC,eACH,OAAM,IAAIC,yEAA2B,EACnC,mBACD,CAAC;AAGJ,OAAI,CAACC,mEAAqB,eAAe,CACvC,OAAM,IAAI,2BAA2B,EACnC,mBACD,CAAC;AAGJ,qBAAkB,IAAI,mBAAmB,eAAe;;;AAI5D,OAAM,QAAQ,IACZ,qBAAqB,KAAK,gBAAgB;EACxC,MAAM,oBAAoBL,sEAAwB;GAChD,OAAO,YAAY;GACnB,aAAaC,gDAAsB;GACnC,oBAAoBC,8CAAmB;GACxC,CAAC;EAEF,MAAM,iBAAiB,kBAAkB,IAAI,kBAAkB;AAE/D,MAAI,CAAC,kBAAkB,CAACG,mEAAqB,eAAe,CAC1D,QAAO,QAAQ,SAAS;AAG1B,SAAO,eAAe,oBAAoB;GACxC,eAAe,YAAY;GAC3B;GACA;GACD,CAAC;GACF,CACH;AAED,OAAMC,wDAAY,OAAO;;;;;;;;;;;;;;;;;ACtI3B,MAAa,wBAAwB,OACnC,EAAE,UAAU,iBACZ,SAASC,4CAAkB,KACT;AAMlB,OALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEc,kBAAkB;EAC/B;EACA;EACD,CAAC;AAEF,OAAMC,wDAAY,OAAO;;;;;;;;;;;;;;;;;ACf3B,MAAa,4BAA4B,OACvC,EAAE,UAAU,iBACZ,SAASC,4CAAkB,KACxB;AAMH,QALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEe,sBAAsB;EACpC;EACA;EACD,CAAC;;;;;;;;;;;;;;;;;;ACVJ,MAAa,uBAAuB,OAClC,EAAE,kBAAkB,UAAU,iBAC9B,SAASC,4CAAkB,KACxB;AAMH,QALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEe,iBAAiB;EAC/B;EACA;EACA;EACD,CAAC;;;;;;ACzBJ,MAAa,iCAAiC,EAC5C,MACA,YACiD;AAQjD,QAPkC,KAAK,oBAAoB,MACxD,OACC,GAAG,mBAAmBC,8CAAmB,kBACzC,GAAG,SACHC,wEAAoC,GAAG,MAAM,KAAK,MACrD;;;;;;;;;;;;;;;ACLH,MAAa,wBAAwB,SAASC,4CAAkB,KAAK;CACnE,MAAM,kBAAkB,OAAO;AAE/B,yCAAc,iBAAiB,qCAAqC;AAQpE,QAN+B,gBAAgB,IAAI,iBAGzB,yBACxBC,qDAA0B;;;;;;;;;;;;;ACV9B,MAAa,sCACX,SAASC,4CAAkB,KACf;CACZ,MAAM,kBAAkB,OAAO;AAE/B,yCAAc,iBAAiB,qCAAqC;CAEpE,MAAM,yBAAyB,gBAAgB,IAAI;CAEnD,MAAM,gBAAgB,qBAAqB,OAAO;CAElD,MAAM,OAAO,OAAO;AAEpB,KAAI,CAAC,QAAQ,CAAC,cACZ,QAAO,EAAE;AAUX,SANE,wBAAwB,qBAAqB,QAC1C,UAAU,MAAM,QAClB,IAAI,EAAE,EACP,KAAK,UAAU,MAAM,KAAc,CAGV,QACxB,UAAU,CAAC,8BAA8B;EAAE;EAAO;EAAM,CAAC,CAC3D;;;;;;;;;;;;;ACrBH,MAAa,yBAAyB,OACpC,EAAE,iBACF,SAAwBC,4CAAkB,KACT;AAMjC,QALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEe,uBAAuB,EACrC,eACD,CAAC;;;;;;;;;;;;;ACbJ,MAAa,sBACX,EAAE,iBACF,SAASC,4CAAkB,KACf;CACZ,MAAM,qBAAqBC,8FACzB,EAAE,eAAe,EACjB,OACD;AAED,yCACE,oBACA,wDACD;AAOD,QAAO,CAAC,CAJN,mBAAmB,kBAAkB,WAAW,MAC7C,aAAa,SAAS,mBAAmB,YAC3C;;;;;;ACnBL,MAAa,gCACX,EAAE,SACF,WACuB;CACvB,MAAM,eAAeC,4EAA8B,EAAE,OAAO,EAAE,OAAO;AAErE,KAAI,CAAC,aAOH,OAAM,IAAIC,yEAA2B,EACnC,mBAPsBC,sEAAwB;EAC9C;EACA,aAAaC,gDAAsB;EACnC,oBAAoBC,8CAAmB;EACxC,CAAC,EAID,CAAC;AAGJ,QAAO;;;;;;;;;;;;;;;;;;ACRT,MAAa,uBAAuB,OAClC,EAAE,OAAO,YAAY,4BACrB,SAASC,4CAAkB,KACxB;AAGH,QAFiB,6BAA6B,EAAE,OAAO,EAAE,OAAO,CAEhD,iBAAiB;EAC/B;EACA;EACD,CAAC;;;;;;;;;;;;;;;;ACpBJ,MAAa,oCACX,SAASC,4CAAkB,KACf;CACZ,MAAM,EAAE,SAAS;AAEjB,yCAAc,MAAM,4BAA4B;AAEhD,QAAO,KAAK,oBAAoB,MAAM,eACpC,WAAW,kBAAkB,WAAW,MACrC,aAAa,SAAS,kBACxB,CACF;;;;;;;;;;;;;;;;;ACJH,MAAa,iCAAiC,OAC5C,EAAE,eAAe,YACjB,SAASC,4CAAkB,KACxB;AAMH,QALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEe,2BAA2B;EACzC;EACA;EACD,CAAC;;;;;;;;;;;;;;ACdJ,MAAa,uBAAuB,OAClC,EAAE,UAAU,iBACZ,SAASC,4CAAkB,KACT;AAMlB,OALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEc,iBAAiB;EAC9B;EACA;EACD,CAAC;AAEF,OAAMC,wDAAY,OAAO;;;;;;;;;;;;;;ACf3B,MAAa,+BAA+B,OAC1C,EAAE,UAAU,iBACZ,SAASC,4CAAkB,KACxB;AAMH,QALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEe,6BAA6B;EAC3C;EACA;EACD,CAAC;;;;;;ACvBJ,MAAa,yBAAyB,SAAkB;AAOtD,QAN0B,MAAM,oBAAoB,MACjD,OACC,GAAG,WAAWC,2DAAgC,cAC9C,GAAG,mBAAmBC,8CAAmB,eAC5C;;;;;;;;;;;;;;;;;ACUH,MAAa,kCACX,EAAE,SACF,SAASC,4CAAkB,KACxB;AACH,yCAAc,OAAO,iBAAiB,qCAAqC;CAE3E,MAAM,yBAAyB,OAAO,gBAAgB,IAAI;AAK1D,KAAI,CAFF,wBAAwB,mCAEqB,CAAC,OAAO,KACrD,QAAO;CAGT,MAAM,oDACJ,wBAAwB;AAQ1B,KAAI,EAHF,CAAC,sBAAsB,OAAO,KAAK,IACnC,mDAGA,QAAO;AAMT,QAFE,mCAAmC,OAAO,CAEN,SAAS,MAAM;;;;;;;;;;;;;;ACjCvD,MAAa,eAAe,OAC1B,EAAE,UAAU,iBACZ,SAASC,4CAAkB,KACI;AAM/B,QALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEe,aAAa;EAC3B;EACA;EACD,CAAC;;;;;;;;;;;;;;;;;;ACTJ,MAAa,qBAAqB,OAChC,EAAE,iBAAiB,aAAa,iBAChC,SAASC,4CAAkB,KACxB;AAMH,QALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEe,eAAe;EAC7B;EACA;EACA;EACD,CAAC;;;;;mEC9BiBC,gCAAaC,kCAAe"}
|
package/dist/waas.esm.js
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
|
-
import { B as name, F as getDefaultClient, R as BaseError, V as version, i as DYNAMIC_WAAS_METADATA,
|
|
2
|
-
import {
|
|
3
|
-
import { n as __refreshAuth_wrapped, t as NotWaasWalletAccountError } from "./NotWaasWalletAccountError-
|
|
1
|
+
import { B as name, F as getDefaultClient, R as BaseError, V as version, i as DYNAMIC_WAAS_METADATA, s as __getChainFromVerifiedCredentialChain_wrapped, w as assertDefined } from "./InvalidParamError-B55FwITx.esm.js";
|
|
2
|
+
import { c as findWaasWalletProviderByChain, h as __getWalletProviderFromWalletAccount_wrapped, l as isWaasWalletProvider, n as getWalletProviderByKey, s as isWaasWalletAccount, t as __getVerifiedCredentialForWalletAccount_wrapped, x as formatWalletProviderKey, y as NoWalletProviderFoundError } from "./getVerifiedCredentialForWalletAccount-Bx9dMVjF.esm.js";
|
|
3
|
+
import { n as __refreshAuth_wrapped, t as NotWaasWalletAccountError } from "./NotWaasWalletAccountError-_H23Gu_v.esm.js";
|
|
4
4
|
import { assertPackageVersion } from "@dynamic-labs-sdk/assert-package-version";
|
|
5
5
|
import { EmbeddedWalletVersionEnum, JwtVerifiedCredentialFormatEnum, WalletProviderEnum } from "@dynamic-labs/sdk-api-core";
|
|
6
6
|
|
package/dist/waas.native.esm.js
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
|
-
import { B as name, F as getDefaultClient, R as BaseError, V as version, i as DYNAMIC_WAAS_METADATA,
|
|
2
|
-
import {
|
|
3
|
-
import { n as __refreshAuth_wrapped, t as NotWaasWalletAccountError } from "./NotWaasWalletAccountError-
|
|
1
|
+
import { B as name, F as getDefaultClient, R as BaseError, V as version, i as DYNAMIC_WAAS_METADATA, s as __getChainFromVerifiedCredentialChain_wrapped, w as assertDefined } from "./InvalidParamError-ByTZyQwv.native.esm.js";
|
|
2
|
+
import { c as findWaasWalletProviderByChain, h as __getWalletProviderFromWalletAccount_wrapped, l as isWaasWalletProvider, n as getWalletProviderByKey, s as isWaasWalletAccount, t as __getVerifiedCredentialForWalletAccount_wrapped, x as formatWalletProviderKey, y as NoWalletProviderFoundError } from "./getVerifiedCredentialForWalletAccount-KmSG5wRc.native.esm.js";
|
|
3
|
+
import { n as __refreshAuth_wrapped, t as NotWaasWalletAccountError } from "./NotWaasWalletAccountError-CeMjVe2F.native.esm.js";
|
|
4
4
|
import { assertPackageVersion } from "@dynamic-labs-sdk/assert-package-version";
|
|
5
5
|
import { EmbeddedWalletVersionEnum, JwtVerifiedCredentialFormatEnum, WalletProviderEnum } from "@dynamic-labs/sdk-api-core";
|
|
6
6
|
|
|
@@ -1,7 +1,7 @@
|
|
|
1
|
-
const require_getNetworkProviderFromNetworkId = require('./getNetworkProviderFromNetworkId-
|
|
2
|
-
const require_InvalidParamError = require('./InvalidParamError-
|
|
3
|
-
require('./isMfaRequiredForAction-
|
|
4
|
-
const require_getSignedSessionId = require('./getSignedSessionId-
|
|
1
|
+
const require_getNetworkProviderFromNetworkId = require('./getNetworkProviderFromNetworkId-CY555AiJ.cjs');
|
|
2
|
+
const require_InvalidParamError = require('./InvalidParamError-D-SHhcTB.cjs');
|
|
3
|
+
require('./isMfaRequiredForAction-V3A2BO7c.cjs');
|
|
4
|
+
const require_getSignedSessionId = require('./getSignedSessionId-CWNj8rZW.cjs');
|
|
5
5
|
let _dynamic_labs_sdk_assert_package_version = require("@dynamic-labs-sdk/assert-package-version");
|
|
6
6
|
let _dynamic_labs_sdk_api_core = require("@dynamic-labs/sdk-api-core");
|
|
7
7
|
let _dynamic_labs_wallet_browser_wallet_client = require("@dynamic-labs-wallet/browser-wallet-client");
|
|
@@ -255,4 +255,4 @@ exports.createWaasClient = createWaasClient;
|
|
|
255
255
|
exports.createWaasProvider = createWaasProvider;
|
|
256
256
|
exports.getAllUserWaasAddressesForChain = getAllUserWaasAddressesForChain;
|
|
257
257
|
exports.getWaasChainNameFromChain = getWaasChainNameFromChain;
|
|
258
|
-
//# sourceMappingURL=waasCore.cjs.
|
|
258
|
+
//# sourceMappingURL=waasCore.cjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"waasCore.cjs","names":["getCore","DynamicWalletClient","isCookieEnabled","DEFAULT_WAAS_BASE_API_URL","DEFAULT_WAAS_BASE_MPC_RELAY_API_URL","CLIENT_SDK_NAME","CHAINS_INFO_MAP","getCore","_waasClient: DynamicWalletClient | undefined","getWaasClient: WaasProvider['getWaasClient']","backupKeySharesToGoogleDrive: WaasProvider['backupKeySharesToGoogleDrive']","getSignedSessionId","createWalletAccount: WaasProvider['createWalletAccount']","ThresholdSignatureScheme","delegateKeyShares: WaasProvider['delegateKeyShares']","exportClientKeyshares: WaasProvider['exportClientKeyshares']","exportPrivateKey: WaasProvider['exportPrivateKey']","consumeMfaTokenIfRequiredForAction","MFAAction","restoreUserShareForWalletAccount: WaasProvider['restoreUserShareForWalletAccount']","WalletOperation","importPrivateKey: WaasProvider['importPrivateKey']","refreshWalletAccountShares: WaasProvider['refreshWalletAccountShares']","revokeDelegation: WaasProvider['revokeDelegation']","setWaasWalletAccountPassword: WaasProvider['setWaasWalletAccountPassword']","signRawMessage: WaasProvider['signRawMessage']","InvalidParamError","terminate: WaasProvider['terminate']","updatePassword: WaasProvider['updatePassword']","signMessage: WaasProvider['signMessage']","signSerializedTransaction: WaasProvider['signSerializedTransaction']","getWalletRecoveryState: WaasProvider['getWalletRecoveryState']","unlockWallet: WaasProvider['unlockWallet']","WalletProviderEnum","DYNAMIC_WAAS_METADATA","getChainFromVerifiedCredentialChain","packageName","packageVersion"],"sources":["../src/modules/waas/createWaasClient/createWaasClient.ts","../src/modules/waas/getWaasChainNameFromChain/getWaasChainNameFromChain.ts","../src/modules/waas/createWaasProvider/createWaasProvider.ts","../src/modules/waas/getAllUserWaasAddressesForChain/getAllUserWaasAddressesForChain.ts","../src/exports/waasCore.ts"],"sourcesContent":["import type { AuthMode } from '@dynamic-labs-wallet/browser-wallet-client';\nimport { DynamicWalletClient } from '@dynamic-labs-wallet/browser-wallet-client';\n\nimport { getCore } from '../../../client/core/getCore';\nimport type { DynamicClient } from '../../../client/types/DynamicClient';\nimport { CLIENT_SDK_NAME } from '../../apiClient/constants';\nimport { isCookieEnabled } from '../../projectSettings/isCookieEnabled';\nimport {\n DEFAULT_WAAS_BASE_API_URL,\n DEFAULT_WAAS_BASE_MPC_RELAY_API_URL,\n} from '../constants';\n\ntype CreateWaasClientParams = {\n chainName: string;\n};\n\n/** @not-instrumented */\nexport const createWaasClient = (\n { chainName }: CreateWaasClientParams,\n client: DynamicClient\n) => {\n const core = getCore(client);\n\n const additionalTrustedOrigins = core.waas?.additionalTrustedOrigins;\n\n return new DynamicWalletClient({\n authMode: (isCookieEnabled(client) ? 'cookie' : 'header') as AuthMode,\n authToken: client.token || '',\n baseApiUrl: (core.apiBaseUrl || DEFAULT_WAAS_BASE_API_URL).replace(\n '/api/v0',\n ''\n ),\n baseMPCRelayApiUrl:\n client.projectSettings?.sdk.waas?.relayUrl ||\n DEFAULT_WAAS_BASE_MPC_RELAY_API_URL,\n chainName,\n environmentId: core.environmentId,\n sdkVersion: `${CLIENT_SDK_NAME}/${core.version}`,\n ...(additionalTrustedOrigins == undefined\n ? {}\n : { additionalTrustedOrigins }),\n });\n};\n","import type { Chain } from '../../chain';\nimport { CHAINS_INFO_MAP } from '../../wallets/constants';\n\n/** @not-instrumented */\n// eslint-disable-next-line custom-rules/require-single-object-param\nexport const getWaasChainNameFromChain = (chain: Chain): string => {\n return CHAINS_INFO_MAP[chain].waasChainNameOverride || chain;\n};\n","import {\n type BitcoinConfig,\n type DynamicWalletClient,\n ThresholdSignatureScheme,\n WalletOperation,\n} from '@dynamic-labs-wallet/browser-wallet-client';\nimport { MFAAction } from '@dynamic-labs/sdk-api-core';\n\nimport { getCore } from '../../../client/core/getCore';\nimport type { DynamicClient } from '../../../client/types/DynamicClient';\nimport { InvalidParamError } from '../../../errors/InvalidParamError';\nimport type { Chain } from '../../chain';\nimport { consumeMfaTokenIfRequiredForAction } from '../../mfa/consumeMfaTokenIfRequiredForAction';\nimport { getSignedSessionId } from '../../sessionKeys/getSignedSessionId';\nimport { createWaasClient } from '../createWaasClient';\nimport { getWaasChainNameFromChain } from '../getWaasChainNameFromChain';\nimport type { WaasProvider } from '../waas.types';\n\nconst RAW_MESSAGE_MESSAGE_REQUIRED_LENGTH = 64;\n\ntype CreateWaasProviderParams = {\n chain: Chain;\n sdkClient: DynamicClient;\n};\n\n/** @not-instrumented */\nexport const createWaasProvider = ({\n sdkClient,\n chain,\n}: CreateWaasProviderParams): WaasProvider => {\n const logger = getCore(sdkClient).logger;\n\n let _waasClient: DynamicWalletClient | undefined;\n\n // because the waas client needs the authToken to be set, we can only create it\n // the first time it's needed, which is after the user has logged in\n const getWaasClient: WaasProvider['getWaasClient'] = async () => {\n if (!_waasClient) {\n _waasClient = createWaasClient(\n { chainName: getWaasChainNameFromChain(chain) },\n sdkClient\n );\n await _waasClient.initialize();\n }\n return _waasClient;\n };\n\n const backupKeySharesToGoogleDrive: WaasProvider['backupKeySharesToGoogleDrive'] =\n async ({ password, walletAccount }) => {\n const { signature: signedSessionId } = await getSignedSessionId(\n sdkClient\n );\n\n const waasClient = await getWaasClient();\n\n return waasClient.backupKeySharesToGoogleDrive({\n accountAddress: walletAccount.address,\n authToken: sdkClient.token ?? undefined,\n password,\n signedSessionId,\n });\n };\n\n const createWalletAccount: WaasProvider['createWalletAccount'] = async (\n args = {}\n ) => {\n logger.debug('[createWaasProvider] createWalletAccount', {\n bitcoinConfig: args.bitcoinConfig,\n thresholdSignatureScheme: args.thresholdSignatureScheme,\n });\n\n const { signature: signedSessionId } = await getSignedSessionId(sdkClient);\n\n const waasClient = await getWaasClient();\n\n const waasWallet = await waasClient.createWalletAccount({\n authToken: sdkClient.token ?? undefined,\n bitcoinConfig: args.bitcoinConfig as BitcoinConfig | undefined,\n password: args.password,\n signedSessionId,\n thresholdSignatureScheme:\n args.thresholdSignatureScheme ?? ThresholdSignatureScheme.TWO_OF_TWO,\n });\n\n return waasWallet;\n };\n\n const delegateKeyShares: WaasProvider['delegateKeyShares'] = async ({\n password,\n walletAccount,\n }) => {\n const { signature: signedSessionId } = await getSignedSessionId(sdkClient);\n\n const waasClient = await getWaasClient();\n\n return waasClient.delegateKeyShares({\n accountAddress: walletAccount.address,\n authToken: sdkClient.token ?? undefined,\n password,\n signedSessionId,\n });\n };\n\n const exportClientKeyshares: WaasProvider['exportClientKeyshares'] = async ({\n password,\n walletAccount,\n }) => {\n const { signature: signedSessionId } = await getSignedSessionId(sdkClient);\n\n const waasClient = await getWaasClient();\n\n await waasClient.exportClientKeyshares({\n accountAddress: walletAccount.address,\n authToken: sdkClient.token ?? undefined,\n password,\n signedSessionId,\n });\n };\n\n const exportPrivateKey: WaasProvider['exportPrivateKey'] = async ({\n displayContainer,\n walletAccount,\n password,\n }) => {\n const { signature: signedSessionId } = await getSignedSessionId(sdkClient);\n\n const waasClient = await getWaasClient();\n\n const mfaToken = await consumeMfaTokenIfRequiredForAction(\n { mfaAction: MFAAction.WalletWaasExport },\n sdkClient\n );\n\n await waasClient.exportPrivateKey({\n accountAddress: walletAccount.address,\n authToken: sdkClient.token ?? undefined,\n displayContainer,\n mfaToken,\n password,\n signedSessionId,\n });\n };\n\n const restoreUserShareForWalletAccount: WaasProvider['restoreUserShareForWalletAccount'] =\n async ({ walletAccount }) => {\n const { signature: signedSessionId } = await getSignedSessionId(\n sdkClient\n );\n\n const waasClient = await getWaasClient();\n\n await waasClient.getWallet({\n accountAddress: walletAccount.address,\n authToken: sdkClient.token ?? undefined,\n signedSessionId,\n walletOperation: WalletOperation.SIGN_MESSAGE,\n });\n };\n\n const importPrivateKey: WaasProvider['importPrivateKey'] = async ({\n privateKey,\n thresholdSignatureScheme = ThresholdSignatureScheme.TWO_OF_TWO,\n }) => {\n const { signature: signedSessionId } = await getSignedSessionId(sdkClient);\n\n const walletClient = await getWaasClient();\n\n await walletClient.importPrivateKey({\n authToken: sdkClient.token ?? undefined,\n privateKey,\n signedSessionId,\n thresholdSignatureScheme,\n });\n };\n\n const refreshWalletAccountShares: WaasProvider['refreshWalletAccountShares'] =\n async ({ password, walletAccount }) => {\n const { signature: signedSessionId } = await getSignedSessionId(\n sdkClient\n );\n\n const walletClient = await getWaasClient();\n\n const mfaToken = await consumeMfaTokenIfRequiredForAction(\n { mfaAction: MFAAction.WalletWaasRefresh },\n sdkClient\n );\n\n return walletClient.refreshWalletAccountShares({\n accountAddress: walletAccount.address,\n authToken: sdkClient.token ?? undefined,\n mfaToken,\n password,\n signedSessionId,\n });\n };\n\n const revokeDelegation: WaasProvider['revokeDelegation'] = async ({\n password,\n walletAccount,\n }) => {\n const { signature: signedSessionId } = await getSignedSessionId(sdkClient);\n\n const waasClient = await getWaasClient();\n\n return waasClient.revokeDelegation({\n accountAddress: walletAccount.address,\n authToken: sdkClient.token ?? undefined,\n password,\n signedSessionId,\n });\n };\n\n const setWaasWalletAccountPassword: WaasProvider['setWaasWalletAccountPassword'] =\n async ({ password, walletAccount }) => {\n const { signature: signedSessionId } = await getSignedSessionId(\n sdkClient\n );\n\n const waasClient = await getWaasClient();\n\n return waasClient.setPassword({\n accountAddress: walletAccount.address,\n authToken: sdkClient.token ?? undefined,\n newPassword: password,\n signedSessionId,\n });\n };\n\n const signRawMessage: WaasProvider['signRawMessage'] = async ({\n message,\n password,\n walletAccount,\n }) => {\n if (message.length !== RAW_MESSAGE_MESSAGE_REQUIRED_LENGTH) {\n throw new InvalidParamError(\n `Message must be ${RAW_MESSAGE_MESSAGE_REQUIRED_LENGTH} characters long`\n );\n }\n\n const { signature: signedSessionId } = await getSignedSessionId(sdkClient);\n\n const mfaToken = await consumeMfaTokenIfRequiredForAction(\n { mfaAction: MFAAction.WalletWaasSign },\n sdkClient\n );\n\n const walletClient = await getWaasClient();\n\n const signature = await walletClient.signRawMessage({\n accountAddress: walletAccount.address,\n authToken: sdkClient.token ?? undefined,\n message,\n mfaToken,\n password,\n signedSessionId,\n });\n\n return { signature };\n };\n\n \n const terminate: WaasProvider['terminate'] = async (args) => {\n if (!_waasClient) {\n return;\n }\n\n const waasClient = await getWaasClient();\n // When a session token expires, we preserve key shares in storage instead\n // of clearing them. Customers with short-lived sessions (minutes) were\n // hitting excessive server-side share recovery on every re-login, which\n // also forced users to re-enter their wallet password since the unlocked\n // share only lives for the duration of the session.\n //\n // This is safe because the waas-sdk separately fingerprints the user\n // (sub + environment_id) and clears all storage if a different user logs\n // in. On explicit user-initiated logout, shares are always cleared for\n // security.\n if (args?.reason !== 'token-expired') {\n await waasClient.cleanup();\n }\n _waasClient = undefined;\n };\n\n const updatePassword: WaasProvider['updatePassword'] = async ({\n walletAccount,\n currentPassword,\n newPassword,\n }) => {\n const { signature: signedSessionId } = await getSignedSessionId(sdkClient);\n\n const waasClient = await getWaasClient();\n\n return waasClient.updatePassword({\n accountAddress: walletAccount.address,\n authToken: sdkClient.token ?? undefined,\n existingPassword: currentPassword,\n newPassword,\n signedSessionId,\n });\n };\n\n const signMessage: WaasProvider['signMessage'] = async ({\n message,\n walletAccount,\n }) => {\n const { signature: signedSessionId } = await getSignedSessionId(sdkClient);\n\n const mfaToken = await consumeMfaTokenIfRequiredForAction(\n { mfaAction: MFAAction.WalletWaasSign },\n sdkClient\n );\n\n const waasClient = await getWaasClient();\n\n const signature = await waasClient.signMessage({\n accountAddress: walletAccount.address,\n authToken: sdkClient.token ?? undefined,\n message,\n mfaToken,\n signedSessionId,\n });\n\n return { signature };\n };\n\n const signSerializedTransaction: WaasProvider['signSerializedTransaction'] =\n async ({ chainId, serializedTransaction, walletAccount }) => {\n const { signature: signedSessionId } = await getSignedSessionId(\n sdkClient\n );\n\n const mfaToken = await consumeMfaTokenIfRequiredForAction(\n { mfaAction: MFAAction.WalletWaasSign },\n sdkClient\n );\n\n const waasClient = await getWaasClient();\n\n const signature = await waasClient.signTransaction({\n authToken: sdkClient.token ?? undefined,\n chainId,\n mfaToken,\n senderAddress: walletAccount.address,\n signedSessionId,\n transaction: serializedTransaction,\n });\n\n return { signature };\n };\n\n const getWalletRecoveryState: WaasProvider['getWalletRecoveryState'] =\n async ({ walletAccount }) => {\n const { signature: signedSessionId } = await getSignedSessionId(\n sdkClient\n );\n\n const waasClient = await getWaasClient();\n\n return waasClient.getWalletRecoveryState({\n accountAddress: walletAccount.address,\n authToken: sdkClient.token ?? undefined,\n signedSessionId,\n });\n };\n\n const unlockWallet: WaasProvider['unlockWallet'] = async ({\n password,\n walletAccount,\n }) => {\n const { signature: signedSessionId } = await getSignedSessionId(sdkClient);\n\n const waasClient = await getWaasClient();\n\n return waasClient.unlockWallet({\n accountAddress: walletAccount.address,\n authToken: sdkClient.token ?? undefined,\n password,\n signedSessionId,\n });\n };\n\n return {\n backupKeySharesToGoogleDrive,\n createWalletAccount,\n delegateKeyShares,\n exportClientKeyshares,\n exportPrivateKey,\n getWaasClient,\n getWalletRecoveryState,\n importPrivateKey,\n refreshWalletAccountShares,\n restoreUserShareForWalletAccount,\n revokeDelegation,\n setWaasWalletAccountPassword,\n signMessage,\n signRawMessage,\n signSerializedTransaction,\n terminate,\n unlockWallet,\n updatePassword,\n };\n};\n","import { WalletProviderEnum } from '@dynamic-labs/sdk-api-core';\n\nimport type { DynamicClient } from '../../../client/types';\nimport { getChainFromVerifiedCredentialChain } from '../../../utils/getChainFromVerifiedCredentialChain';\nimport type { Chain } from '../../chain';\nimport { DYNAMIC_WAAS_METADATA } from '../constants';\n\ntype GetAllUserWaasAddressesForChainParams = {\n chain: Chain;\n};\n\n/** @not-instrumented */\nexport const getAllUserWaasAddressesForChain = (\n { chain }: GetAllUserWaasAddressesForChainParams,\n client: DynamicClient\n): string[] => {\n if (!client.user) {\n return [];\n }\n\n const waasWalletCredentials =\n client.user.verifiedCredentials.filter(\n (credential) =>\n credential.walletProvider === WalletProviderEnum.EmbeddedWallet &&\n credential.walletName\n ?.toLowerCase()\n .startsWith(DYNAMIC_WAAS_METADATA.normalizedWalletName) &&\n credential.address &&\n credential.chain &&\n getChainFromVerifiedCredentialChain(credential.chain) === chain\n ) ?? [];\n\n const waasAddresses: string[] = waasWalletCredentials.map(\n // casting because we're already filtering out credentials without an address\n (credential) => credential.address as string\n );\n\n return waasAddresses;\n};\n","import { assertPackageVersion } from '@dynamic-labs-sdk/assert-package-version';\n\nimport {\n name as packageName,\n version as packageVersion,\n} from '../../package.json';\nassertPackageVersion(packageName, packageVersion);\n\nexport type {\n BitcoinNetwork,\n DynamicWalletClient,\n ThresholdSignatureScheme\n} from '@dynamic-labs-wallet/browser-wallet-client';\nexport { DYNAMIC_WAAS_METADATA } from '../modules/waas/constants';\nexport { createWaasClient } from '../modules/waas/createWaasClient';\nexport { createWaasProvider } from '../modules/waas/createWaasProvider';\nexport { getAllUserWaasAddressesForChain } from '../modules/waas/getAllUserWaasAddressesForChain';\nexport { getWaasChainNameFromChain } from '../modules/waas/getWaasChainNameFromChain';\nexport type {\n WaasProvider,\n WaasWalletProvider\n} from '../modules/waas/waas.types';\n\n"],"mappings":";;;;;;;;;;AAiBA,MAAa,oBACX,EAAE,aACF,WACG;CACH,MAAM,OAAOA,kCAAQ,OAAO;CAE5B,MAAM,2BAA2B,KAAK,MAAM;AAE5C,QAAO,IAAIC,+DAAoB;EAC7B,UAAWC,0CAAgB,OAAO,GAAG,WAAW;EAChD,WAAW,OAAO,SAAS;EAC3B,aAAa,KAAK,cAAcC,qDAA2B,QACzD,WACA,GACD;EACD,oBACE,OAAO,iBAAiB,IAAI,MAAM,YAClCC;EACF;EACA,eAAe,KAAK;EACpB,YAAY,GAAGC,0CAAgB,GAAG,KAAK;EACvC,GAAI,4BAA4B,SAC5B,EAAE,GACF,EAAE,0BAA0B;EACjC,CAAC;;;;;;ACpCJ,MAAa,6BAA6B,UAAyB;AACjE,QAAOC,0CAAgB,OAAO,yBAAyB;;;;;ACYzD,MAAM,sCAAsC;;AAQ5C,MAAa,sBAAsB,EACjC,WACA,YAC4C;CAC5C,MAAM,SAASC,kCAAQ,UAAU,CAAC;CAElC,IAAIC;CAIJ,MAAMC,gBAA+C,YAAY;AAC/D,MAAI,CAAC,aAAa;AAChB,iBAAc,iBACZ,EAAE,WAAW,0BAA0B,MAAM,EAAE,EAC/C,UACD;AACD,SAAM,YAAY,YAAY;;AAEhC,SAAO;;CAGT,MAAMC,+BACJ,OAAO,EAAE,UAAU,oBAAoB;EACrC,MAAM,EAAE,WAAW,oBAAoB,MAAMC,wDAC3C,UACD;AAID,UAFmB,MAAM,eAAe,EAEtB,6BAA6B;GAC7C,gBAAgB,cAAc;GAC9B,WAAW,UAAU,SAAS;GAC9B;GACA;GACD,CAAC;;CAGN,MAAMC,sBAA2D,OAC/D,OAAO,EAAE,KACN;AACH,SAAO,MAAM,4CAA4C;GACvD,eAAe,KAAK;GACpB,0BAA0B,KAAK;GAChC,CAAC;EAEF,MAAM,EAAE,WAAW,oBAAoB,MAAMD,wDAAmB,UAAU;AAa1E,SATmB,OAFA,MAAM,eAAe,EAEJ,oBAAoB;GACtD,WAAW,UAAU,SAAS;GAC9B,eAAe,KAAK;GACpB,UAAU,KAAK;GACf;GACA,0BACE,KAAK,4BAA4BE,oEAAyB;GAC7D,CAAC;;CAKJ,MAAMC,oBAAuD,OAAO,EAClE,UACA,oBACI;EACJ,MAAM,EAAE,WAAW,oBAAoB,MAAMH,wDAAmB,UAAU;AAI1E,UAFmB,MAAM,eAAe,EAEtB,kBAAkB;GAClC,gBAAgB,cAAc;GAC9B,WAAW,UAAU,SAAS;GAC9B;GACA;GACD,CAAC;;CAGJ,MAAMI,wBAA+D,OAAO,EAC1E,UACA,oBACI;EACJ,MAAM,EAAE,WAAW,oBAAoB,MAAMJ,wDAAmB,UAAU;AAI1E,SAFmB,MAAM,eAAe,EAEvB,sBAAsB;GACrC,gBAAgB,cAAc;GAC9B,WAAW,UAAU,SAAS;GAC9B;GACA;GACD,CAAC;;CAGJ,MAAMK,mBAAqD,OAAO,EAChE,kBACA,eACA,eACI;EACJ,MAAM,EAAE,WAAW,oBAAoB,MAAML,wDAAmB,UAAU;EAE1E,MAAM,aAAa,MAAM,eAAe;EAExC,MAAM,WAAW,MAAMM,wEACrB,EAAE,WAAWC,qCAAU,kBAAkB,EACzC,UACD;AAED,QAAM,WAAW,iBAAiB;GAChC,gBAAgB,cAAc;GAC9B,WAAW,UAAU,SAAS;GAC9B;GACA;GACA;GACA;GACD,CAAC;;CAGJ,MAAMC,mCACJ,OAAO,EAAE,oBAAoB;EAC3B,MAAM,EAAE,WAAW,oBAAoB,MAAMR,wDAC3C,UACD;AAID,SAFmB,MAAM,eAAe,EAEvB,UAAU;GACzB,gBAAgB,cAAc;GAC9B,WAAW,UAAU,SAAS;GAC9B;GACA,iBAAiBS,2DAAgB;GAClC,CAAC;;CAGN,MAAMC,mBAAqD,OAAO,EAChE,YACA,2BAA2BR,oEAAyB,iBAChD;EACJ,MAAM,EAAE,WAAW,oBAAoB,MAAMF,wDAAmB,UAAU;AAI1E,SAFqB,MAAM,eAAe,EAEvB,iBAAiB;GAClC,WAAW,UAAU,SAAS;GAC9B;GACA;GACA;GACD,CAAC;;CAGJ,MAAMW,6BACJ,OAAO,EAAE,UAAU,oBAAoB;EACrC,MAAM,EAAE,WAAW,oBAAoB,MAAMX,wDAC3C,UACD;EAED,MAAM,eAAe,MAAM,eAAe;EAE1C,MAAM,WAAW,MAAMM,wEACrB,EAAE,WAAWC,qCAAU,mBAAmB,EAC1C,UACD;AAED,SAAO,aAAa,2BAA2B;GAC7C,gBAAgB,cAAc;GAC9B,WAAW,UAAU,SAAS;GAC9B;GACA;GACA;GACD,CAAC;;CAGN,MAAMK,mBAAqD,OAAO,EAChE,UACA,oBACI;EACJ,MAAM,EAAE,WAAW,oBAAoB,MAAMZ,wDAAmB,UAAU;AAI1E,UAFmB,MAAM,eAAe,EAEtB,iBAAiB;GACjC,gBAAgB,cAAc;GAC9B,WAAW,UAAU,SAAS;GAC9B;GACA;GACD,CAAC;;CAGJ,MAAMa,+BACJ,OAAO,EAAE,UAAU,oBAAoB;EACrC,MAAM,EAAE,WAAW,oBAAoB,MAAMb,wDAC3C,UACD;AAID,UAFmB,MAAM,eAAe,EAEtB,YAAY;GAC5B,gBAAgB,cAAc;GAC9B,WAAW,UAAU,SAAS;GAC9B,aAAa;GACb;GACD,CAAC;;CAGN,MAAMc,iBAAiD,OAAO,EAC5D,SACA,UACA,oBACI;AACJ,MAAI,QAAQ,WAAW,oCACrB,OAAM,IAAIC,4CACR,mBAAmB,oCAAoC,kBACxD;EAGH,MAAM,EAAE,WAAW,oBAAoB,MAAMf,wDAAmB,UAAU;EAE1E,MAAM,WAAW,MAAMM,wEACrB,EAAE,WAAWC,qCAAU,gBAAgB,EACvC,UACD;AAaD,SAAO,EAAE,WATS,OAFG,MAAM,eAAe,EAEL,eAAe;GAClD,gBAAgB,cAAc;GAC9B,WAAW,UAAU,SAAS;GAC9B;GACA;GACA;GACA;GACD,CAAC,EAEkB;;CAItB,MAAMS,YAAuC,OAAO,SAAS;AAC3D,MAAI,CAAC,YACH;EAGF,MAAM,aAAa,MAAM,eAAe;AAWxC,MAAI,MAAM,WAAW,gBACnB,OAAM,WAAW,SAAS;AAE5B,gBAAc;;CAGhB,MAAMC,iBAAiD,OAAO,EAC5D,eACA,iBACA,kBACI;EACJ,MAAM,EAAE,WAAW,oBAAoB,MAAMjB,wDAAmB,UAAU;AAI1E,UAFmB,MAAM,eAAe,EAEtB,eAAe;GAC/B,gBAAgB,cAAc;GAC9B,WAAW,UAAU,SAAS;GAC9B,kBAAkB;GAClB;GACA;GACD,CAAC;;CAGJ,MAAMkB,cAA2C,OAAO,EACtD,SACA,oBACI;EACJ,MAAM,EAAE,WAAW,oBAAoB,MAAMlB,wDAAmB,UAAU;EAE1E,MAAM,WAAW,MAAMM,wEACrB,EAAE,WAAWC,qCAAU,gBAAgB,EACvC,UACD;AAYD,SAAO,EAAE,WARS,OAFC,MAAM,eAAe,EAEL,YAAY;GAC7C,gBAAgB,cAAc;GAC9B,WAAW,UAAU,SAAS;GAC9B;GACA;GACA;GACD,CAAC,EAEkB;;CAGtB,MAAMY,4BACJ,OAAO,EAAE,SAAS,uBAAuB,oBAAoB;EAC3D,MAAM,EAAE,WAAW,oBAAoB,MAAMnB,wDAC3C,UACD;EAED,MAAM,WAAW,MAAMM,wEACrB,EAAE,WAAWC,qCAAU,gBAAgB,EACvC,UACD;AAaD,SAAO,EAAE,WATS,OAFC,MAAM,eAAe,EAEL,gBAAgB;GACjD,WAAW,UAAU,SAAS;GAC9B;GACA;GACA,eAAe,cAAc;GAC7B;GACA,aAAa;GACd,CAAC,EAEkB;;CAGxB,MAAMa,yBACJ,OAAO,EAAE,oBAAoB;EAC3B,MAAM,EAAE,WAAW,oBAAoB,MAAMpB,wDAC3C,UACD;AAID,UAFmB,MAAM,eAAe,EAEtB,uBAAuB;GACvC,gBAAgB,cAAc;GAC9B,WAAW,UAAU,SAAS;GAC9B;GACD,CAAC;;CAGN,MAAMqB,eAA6C,OAAO,EACxD,UACA,oBACI;EACJ,MAAM,EAAE,WAAW,oBAAoB,MAAMrB,wDAAmB,UAAU;AAI1E,UAFmB,MAAM,eAAe,EAEtB,aAAa;GAC7B,gBAAgB,cAAc;GAC9B,WAAW,UAAU,SAAS;GAC9B;GACA;GACD,CAAC;;AAGJ,QAAO;EACL;EACA;EACA;EACA;EACA;EACA;EACA;EACA;EACA;EACA;EACA;EACA;EACA;EACA;EACA;EACA;EACA;EACA;EACD;;;;;;ACrYH,MAAa,mCACX,EAAE,SACF,WACa;AACb,KAAI,CAAC,OAAO,KACV,QAAO,EAAE;AAoBX,SAhBE,OAAO,KAAK,oBAAoB,QAC7B,eACC,WAAW,mBAAmBsB,8CAAmB,kBACjD,WAAW,YACP,aAAa,CACd,WAAWC,gDAAsB,qBAAqB,IACzD,WAAW,WACX,WAAW,SACXC,wEAAoC,WAAW,MAAM,KAAK,MAC7D,IAAI,EAAE,EAE6C,KAEnD,eAAe,WAAW,QAC5B;;;;;mEC7BkBC,gCAAaC,kCAAe"}
|
package/dist/waasCore.esm.js
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
|
-
import { B as name,
|
|
2
|
-
import "./isMfaRequiredForAction-
|
|
3
|
-
import { n as __consumeMfaTokenIfRequiredForAction_wrapped, t as __getSignedSessionId_wrapped } from "./getSignedSessionId-
|
|
1
|
+
import { B as name, C as isCookieEnabled, M as CLIENT_SDK_NAME, V as version, c as CHAINS_INFO_MAP, i as DYNAMIC_WAAS_METADATA, n as DEFAULT_WAAS_BASE_API_URL, r as DEFAULT_WAAS_BASE_MPC_RELAY_API_URL, s as __getChainFromVerifiedCredentialChain_wrapped, t as InvalidParamError, z as getCore } from "./InvalidParamError-B55FwITx.esm.js";
|
|
2
|
+
import "./isMfaRequiredForAction-DVA7aeXI.esm.js";
|
|
3
|
+
import { n as __consumeMfaTokenIfRequiredForAction_wrapped, t as __getSignedSessionId_wrapped } from "./getSignedSessionId-GVIy9gR0.esm.js";
|
|
4
4
|
import { assertPackageVersion } from "@dynamic-labs-sdk/assert-package-version";
|
|
5
5
|
import { MFAAction, WalletProviderEnum } from "@dynamic-labs/sdk-api-core";
|
|
6
6
|
import { DynamicWalletClient, ThresholdSignatureScheme, WalletOperation } from "@dynamic-labs-wallet/browser-wallet-client";
|
|
@@ -1,6 +1,6 @@
|
|
|
1
|
-
import { B as name,
|
|
2
|
-
import "./isMfaRequiredForAction-
|
|
3
|
-
import { n as __consumeMfaTokenIfRequiredForAction_wrapped, t as __getSignedSessionId_wrapped } from "./getSignedSessionId-
|
|
1
|
+
import { B as name, C as isCookieEnabled, M as CLIENT_SDK_NAME, V as version, c as CHAINS_INFO_MAP, i as DYNAMIC_WAAS_METADATA, n as DEFAULT_WAAS_BASE_API_URL, r as DEFAULT_WAAS_BASE_MPC_RELAY_API_URL, s as __getChainFromVerifiedCredentialChain_wrapped, t as InvalidParamError, z as getCore } from "./InvalidParamError-ByTZyQwv.native.esm.js";
|
|
2
|
+
import "./isMfaRequiredForAction-BS0JYBvl.native.esm.js";
|
|
3
|
+
import { n as __consumeMfaTokenIfRequiredForAction_wrapped, t as __getSignedSessionId_wrapped } from "./getSignedSessionId-GTJp6UnP.native.esm.js";
|
|
4
4
|
import { assertPackageVersion } from "@dynamic-labs-sdk/assert-package-version";
|
|
5
5
|
import { MFAAction, WalletProviderEnum } from "@dynamic-labs/sdk-api-core";
|
|
6
6
|
import { DynamicWalletClient, ThresholdSignatureScheme, WalletOperation } from "@dynamic-labs-wallet/browser-wallet-client";
|
package/package.json
CHANGED
|
@@ -1,8 +1,8 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@dynamic-labs-sdk/client",
|
|
3
|
-
"version": "0.
|
|
3
|
+
"version": "0.26.1",
|
|
4
4
|
"type": "module",
|
|
5
|
-
"main": "./dist/index.cjs
|
|
5
|
+
"main": "./dist/index.cjs",
|
|
6
6
|
"module": "./dist/index.esm.js",
|
|
7
7
|
"types": "./dist/exports/index.d.ts",
|
|
8
8
|
"files": [
|
|
@@ -18,25 +18,25 @@
|
|
|
18
18
|
"react-native": "./dist/index.native.esm.js",
|
|
19
19
|
"types": "./dist/exports/index.d.ts",
|
|
20
20
|
"import": "./dist/index.esm.js",
|
|
21
|
-
"default": "./dist/index.cjs
|
|
21
|
+
"default": "./dist/index.cjs"
|
|
22
22
|
},
|
|
23
23
|
"./core": {
|
|
24
24
|
"react-native": "./dist/core.native.esm.js",
|
|
25
25
|
"types": "./dist/exports/core.d.ts",
|
|
26
26
|
"import": "./dist/core.esm.js",
|
|
27
|
-
"default": "./dist/core.cjs
|
|
27
|
+
"default": "./dist/core.cjs"
|
|
28
28
|
},
|
|
29
29
|
"./waas": {
|
|
30
30
|
"react-native": "./dist/waas.native.esm.js",
|
|
31
31
|
"types": "./dist/exports/waas.d.ts",
|
|
32
32
|
"import": "./dist/waas.esm.js",
|
|
33
|
-
"default": "./dist/waas.cjs
|
|
33
|
+
"default": "./dist/waas.cjs"
|
|
34
34
|
},
|
|
35
35
|
"./waas/core": {
|
|
36
36
|
"react-native": "./dist/waasCore.native.esm.js",
|
|
37
37
|
"types": "./dist/exports/waasCore.d.ts",
|
|
38
38
|
"import": "./dist/waasCore.esm.js",
|
|
39
|
-
"default": "./dist/waasCore.cjs
|
|
39
|
+
"default": "./dist/waasCore.cjs"
|
|
40
40
|
}
|
|
41
41
|
},
|
|
42
42
|
"dependencies": {
|
|
@@ -47,12 +47,13 @@
|
|
|
47
47
|
"buffer": "6.0.3",
|
|
48
48
|
"eventemitter3": "5.0.1",
|
|
49
49
|
"zod": "4.0.5",
|
|
50
|
-
"@dynamic-labs-sdk/assert-package-version": "0.
|
|
50
|
+
"@dynamic-labs-sdk/assert-package-version": "0.26.1"
|
|
51
51
|
},
|
|
52
52
|
"devDependencies": {
|
|
53
53
|
"@inrupt/jest-jsdom-polyfills": "4.0.5",
|
|
54
54
|
"@react-native-async-storage/async-storage": "2.2.0",
|
|
55
55
|
"react-native-keychain": "10.0.0",
|
|
56
|
+
"react-native-passkey": "3.3.2",
|
|
56
57
|
"vitest": "1.6.1"
|
|
57
58
|
},
|
|
58
59
|
"codegenConfig": {
|
|
@@ -65,8 +66,9 @@
|
|
|
65
66
|
},
|
|
66
67
|
"peerDependencies": {
|
|
67
68
|
"@react-native-async-storage/async-storage": "^2.2.0",
|
|
69
|
+
"react-native": ">=0.73.6",
|
|
68
70
|
"react-native-keychain": "^10.0.0",
|
|
69
|
-
"react-native": ">=
|
|
71
|
+
"react-native-passkey": ">=3.3.2"
|
|
70
72
|
},
|
|
71
73
|
"peerDependenciesMeta": {
|
|
72
74
|
"@react-native-async-storage/async-storage": {
|
|
@@ -77,6 +79,9 @@
|
|
|
77
79
|
},
|
|
78
80
|
"react-native": {
|
|
79
81
|
"optional": true
|
|
82
|
+
},
|
|
83
|
+
"react-native-passkey": {
|
|
84
|
+
"optional": true
|
|
80
85
|
}
|
|
81
86
|
},
|
|
82
87
|
"scripts": {
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"InvalidParamError-BxdCGMzn.esm.js","names":["defaultClient: DynamicClient | null","result: Record<string, unknown>","getCore","baseEvent: Omit<FunctionInstrumentationEvent, 'phase' | 'timestamp'>","clientErrorMapper: ErrorMapper","errorToThrow: Error","cause: Error | null","createApiClient","CHAINS_INFO_MAP: Record<Chain, ChainInfo>"],"sources":["../package.json","../src/client/core/getCore/getCore.ts","../src/errors/base/BaseError.ts","../src/errors/ClientNotFoundError.ts","../src/client/defaultClient/defaultClient.ts","../src/utils/getNonce/constants.ts","../src/modules/apiClient/constants.ts","../src/utils/randomString/randomString.ts","../src/errors/ValueMustBeDefinedError.ts","../src/utils/assertDefined/assertDefined.ts","../src/modules/projectSettings/isCookieEnabled/isCookieEnabled.ts","../src/modules/auth/extractSessionId/extractSessionId.ts","../src/utils/getUserAgent/getUserAgent.ts","../src/services/instrumentation/constants.ts","../src/services/instrumentation/scrubParameters/scrubParameters.ts","../src/services/instrumentation/instrumentFunction/extractParams/extractParams.ts","../src/services/instrumentation/instrumentFunction/scrubResolvedValue/scrubResolvedValue.ts","../src/services/instrumentation/instrumentFunction/instrumentFunction.ts","../src/modules/sessionKeys/getSessionKeys/getSessionKeys.ts","../src/modules/auth/getElevatedAccessToken/getElevatedAccessToken.ts","../src/errors/APIError/APIError.ts","../src/errors/InvalidExternalAuthError.ts","../src/errors/LinkCredentialError.ts","../src/errors/MfaInvalidOtpError.ts","../src/errors/MfaRateLimitedError.ts","../src/errors/SandboxMaximumThresholdReachedError.ts","../src/modules/apiClient/utils/clientErrorMapper/clientErrorMapper.ts","../src/modules/apiClient/utils/convertToApiErrorMiddleware/convertToApiErrorMiddleware.ts","../src/utils/getNonce/getNonce.ts","../src/modules/deviceRegistration/getDeviceSigner/getDeviceSigner.ts","../src/modules/deviceRegistration/getHeadersForNonceSignedByDeviceSigners/getHeadersForNonceSignedByDeviceSigners.ts","../src/modules/apiClient/utils/deviceSignatureHeadersMiddleware/createDeviceSignatureHeadersMiddleware.ts","../src/errors/UnauthorizedError.ts","../src/modules/apiClient/utils/unauthorizedMiddleware/createUnauthorizedMiddleware.ts","../src/modules/apiClient/createApiClient.ts","../src/utils/getNonce/fetchAndStoreNonces/fetchAndStoreNonces.ts","../src/modules/wallets/constants.ts","../src/utils/getChainFromVerifiedCredentialChain/getChainFromVerifiedCredentialChain.ts","../src/constants.ts","../src/modules/waas/constants.ts","../src/errors/InvalidParamError.ts"],"sourcesContent":["","import type { DynamicClient } from '../../types';\nimport type { DynamicCore } from '../types';\n\n/** @not-instrumented */\nexport const getCore = (client: DynamicClient): DynamicCore => {\n // @ts-expect-error - this was hidden from the public API\n return client.__core;\n};\n","/* eslint-disable custom-rules/function-name-matches-filename */\nimport { version } from '../../../package.json';\n\nexport type BaseErrorParameters = {\n /** The underlying error that caused this error, if any */\n cause: Error | null;\n /** The error unique code */\n code: string;\n /** Additional detailed information about the error */\n details?: string;\n /** URL to relevant documentation for this error */\n docsUrl: string | null;\n /** Array of additional contextual messages to be displayed */\n metaMessages?: string[];\n /** Custom name for the error. Defaults to 'BaseError' if not provided */\n name: string;\n /** A brief, human-readable description of the error */\n shortMessage: string;\n};\n\nconst getDetails = ({ details, cause }: BaseErrorParameters) => {\n if (cause instanceof BaseError) {\n return cause.details;\n }\n\n if (cause?.message) {\n return cause.message;\n }\n\n return details;\n};\n\n/**\n * Formats the error message with all available information\n */\n// eslint-disable-next-line custom-rules/one-function-per-file\nconst formatMessage = ({\n shortMessage,\n details,\n docsUrl,\n metaMessages,\n}: BaseErrorParameters) => {\n return [\n '[Dynamic JS SDK]',\n shortMessage,\n '',\n ...(metaMessages ? [...metaMessages, ''] : []),\n ...(docsUrl ? [`Docs: ${docsUrl}`] : []),\n ...(details ? [`Details: ${details}`] : []),\n `Version: ${version}`,\n `Timestamp: ${new Date().toISOString()}`,\n ].join('\\n');\n};\n\n/**\n * Base error class that provides structured error handling with detailed information\n */\nexport abstract class BaseError extends Error {\n /** The error unique code */\n code: string;\n details: string | undefined;\n private readonly formattedMessage: string | undefined;\n override name = 'BaseError';\n override cause: BaseError | Error | undefined;\n\n constructor(args: BaseErrorParameters) {\n const details = getDetails(args);\n const formattedMessage = formatMessage({ ...args, details });\n super(\n args.shortMessage ?? formattedMessage,\n args.cause ? { cause: args.cause } : undefined\n );\n\n this.formattedMessage = formattedMessage;\n this.details = details;\n this.name = args.name ?? this.name;\n this.cause = args.cause ?? this.cause;\n this.code = args.code;\n }\n\n /**\n * Walks the cause chain of the error and returns the root error\n */\n walk(): Error | undefined {\n const cause = this.cause;\n\n if (cause instanceof BaseError) {\n return cause.walk();\n }\n\n return cause;\n }\n\n override toString() {\n return this.formattedMessage;\n }\n}\n","import { BaseError } from './base';\n\nexport class ClientNotFoundError extends BaseError {\n constructor() {\n super({\n cause: null,\n code: 'client_not_found_error',\n docsUrl: null,\n name: 'ClientNotFoundError',\n shortMessage:\n 'No Dynamic client has been created yet. Make sure you have called createDynamicClient() first.',\n });\n }\n}\n","/* eslint-disable custom-rules/function-name-matches-filename */\nimport { ClientNotFoundError } from '../../errors/ClientNotFoundError';\nimport { getCore } from '../core/getCore';\nimport type { DynamicClient } from '../types';\n\nlet defaultClient: DynamicClient | null = null;\nlet numOfInitializedClients = 0;\n\n/**\n * Returns the DynamicClient instance that was initialized with createDynamicClient.\n *\n * If more than one instance of DynamicClient was initialized, you should not use this function.\n * Instead, you should pass the client instance you stored to the function that needs it.\n * @not-instrumented\n */\nexport const getDefaultClient = (): DynamicClient => {\n if (!defaultClient) {\n throw new ClientNotFoundError();\n }\n\n if (numOfInitializedClients > 1) {\n const core = getCore(defaultClient);\n core.logger.debug(\n 'Multiple instances of DynamicClient found. If you are only using one client (recommended), make sure you are not calling ' +\n '\"createDynamicClient\" multiple times. If you are using multiple clients, make sure you are passing which client to use as ' +\n 'the last param of all Dynamic functions.'\n );\n }\n\n return defaultClient;\n};\n\n/** @not-instrumented */\n// eslint-disable-next-line custom-rules/one-function-per-file\nexport const setDefaultClient = (client: DynamicClient) => {\n defaultClient = client;\n numOfInitializedClients++;\n};\n","export const NONCE_POOL_EXPIRATION_TIME = 60000 * 60 * 24;\n\nexport const NONCE_POOL_SIZE = 5;\n","import { dependencies } from '../../../package.json';\n\nexport const DYNAMIC_API_VERSION_HEADER = 'x-dyn-api-version';\n\nexport const DYNAMIC_REQUEST_ID_HEADER = 'x-dyn-request-id';\n\nexport const DYNAMIC_SDK_VERSION_HEADER = 'x-dyn-version';\n\nexport const ELEVATED_ACCESS_TOKEN_HEADER = 'x-dyn-elevated-access-token';\n\nexport const MFA_TOKEN_HEADER = 'x-mfa-auth-token';\n\nexport const SESSION_PUBLIC_KEY_HEADER = 'x-dyn-session-public-key';\n\nexport const DYNAMIC_SDK_API_VERSION =\n dependencies['@dynamic-labs/sdk-api-core'];\n\nexport const DYNAMIC_SDK_SESSION_ID_HEADER = 'x-dyn-session-id';\n\nexport const CLIENT_SDK_NAME = 'ClientSDK';\n","const DEFAULT_CHARS =\n 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789';\n\ntype RandomStringParams = {\n chars?: string;\n length: number;\n};\n\n/** @not-instrumented */\nexport const randomString = ({\n chars = DEFAULT_CHARS,\n length,\n}: RandomStringParams) => {\n const bytes = new Uint8Array(length);\n crypto.getRandomValues(bytes);\n\n let result = '';\n for (let i = 0; i < length; i++) {\n result += chars[bytes[i] % chars.length];\n }\n return result;\n};\n","import { BaseError } from './base';\n\nexport class ValueMustBeDefinedError extends BaseError {\n // eslint-disable-next-line custom-rules/require-single-object-param\n constructor(message: string) {\n super({\n cause: null,\n code: 'value_must_be_defined_error',\n docsUrl: null,\n name: 'ValueMustBeDefined',\n shortMessage: message,\n });\n }\n}\n","/* eslint-disable func-style -- javascript requires this to be a function */\n\nimport { ValueMustBeDefinedError } from './../../errors/ValueMustBeDefinedError';\n\n/**\n * Asserts that a value is not null or undefined, throwing an error if it is.\n * This function acts as a type guard, narrowing the type to exclude null and undefined.\n *\n * @template T - The type of the value being checked\n * @param value - The value to check for null or undefined\n * @param message - The error message to throw if the value is null or undefined\n * @throws Throws an error with the provided message if value is null or undefined\n * @example\n * ```typescript\n * const maybeString: string | null = getValue();\n * assertDefined(maybeString, 'String value is required');\n * // maybeString is now typed as string (null is excluded)\n * ```\n */\n// eslint-disable-next-line custom-rules/require-single-object-param\nexport function assertDefined<T>(\n value: T,\n message: string\n): asserts value is Exclude<NonNullable<T>, void> {\n if (value === null || value === undefined) {\n throw new ValueMustBeDefinedError(message);\n }\n}\n","import { AuthStorageEnum } from '@dynamic-labs/sdk-api-core';\n\nimport type { DynamicClient } from '../../../client/types';\nimport { assertDefined } from '../../../utils/assertDefined';\n\n/**\n * Returns true if the client is using Dynamic cookies or a BYO JWT cookie.\n * @not-instrumented\n */\nexport const isCookieEnabled = (client: DynamicClient): boolean => {\n assertDefined(client.projectSettings, 'Project settings are not defined');\n\n const securitySettings = client.projectSettings.security;\n\n if (!securitySettings) return false;\n\n // client uses Dynamic cookies\n const dynamicCookiesEnabled = (securitySettings.auth?.storage || []).includes(\n AuthStorageEnum.Cookie\n );\n\n // BYO JWT client puts their non-Dynamic JWT in a cookie\n const byoJwtCookieEnabled = Boolean(\n securitySettings.externalAuth?.cookieName\n );\n\n // should return true for both of these scenarios\n // because we also need to do `credentials: true` in api.ts when\n // a byo jwt client sets their named cookie for their jwt and\n // needs to send it to our backend\n return dynamicCookiesEnabled || byoJwtCookieEnabled;\n};\n","/**\n * Extracts the session ID (`sid` claim) from a JWT token string.\n *\n * Decodes the base64url-encoded payload segment of the token and reads the\n * `sid` field. This is used to correlate instrumentation events with the\n * authenticated session, without ever forwarding the full token.\n *\n * Returns `null` when no token is present, when the token is malformed, or\n * when the payload does not contain a `sid` claim.\n * @not-instrumented\n */\n// eslint-disable-next-line custom-rules/require-single-object-param\nexport const extractSessionId = (token: string): string | null => {\n try {\n const payload = token.split('.')[1];\n const decoded = JSON.parse(atob(payload));\n\n return decoded.sid ?? null;\n } catch {\n return null;\n }\n};\n","/**\n * Returns the browser's `navigator.userAgent` string for inclusion in\n * instrumentation events.\n *\n * Falls back to an empty string in environments where `navigator` is not\n * available (e.g., Node.js SSR, service workers) so that callers never need\n * to guard against undefined.\n * @not-instrumented\n */\nexport const getUserAgent = (): string => {\n try {\n // eslint-disable-next-line no-restricted-globals\n return navigator.userAgent;\n } catch {\n return '';\n }\n};\n","export const DEFAULT_PII_FIELDS = [\n 'password',\n 'token',\n 'secret',\n 'privateKey',\n 'mnemonic',\n 'seed',\n 'email',\n 'phone',\n 'ssn',\n 'address',\n 'authorization',\n];\n\nexport const REDACTED_VALUE = '[REDACTED]';\n\nexport const MAX_STRING_LENGTH = 500;\n\nexport const TRUNCATED_SUFFIX = '...[truncated]';\n\n/**\n * Label prefix for binary data placeholders. The full placeholder includes the\n * byte length, e.g. `[Binary:16 bytes]`, so consumers can gauge data size\n * without the actual bytes appearing in logs.\n */\nexport const BINARY_LABEL = 'Binary';\n\n/**\n * Placeholder emitted when a circular reference is detected in the value tree.\n * Using a named constant makes it easy to search for or filter in downstream\n * log tooling.\n */\nexport const CIRCULAR_VALUE = '[Circular]';\n","import {\n BINARY_LABEL,\n CIRCULAR_VALUE,\n MAX_STRING_LENGTH,\n REDACTED_VALUE,\n TRUNCATED_SUFFIX,\n} from '../constants';\n\ntype ScrubContext = {\n piiFieldsLower: string[];\n redactAll?: boolean;\n visited: WeakSet<object>;\n};\n\ntype ScrubParametersParams = {\n piiFields: string[];\n redactAll?: boolean;\n value: Record<string, unknown>;\n};\n\ntype ScrubStringParams = {\n key: string;\n piiFieldsLower: string[];\n redactAll?: boolean;\n value: string;\n};\n\ntype ScrubArrayParams = {\n context: ScrubContext;\n value: unknown[];\n};\n\ntype ScrubObjectParams = {\n context: ScrubContext;\n value: Record<string, unknown>;\n};\n\ntype ScrubValueParams = {\n context: ScrubContext;\n key: string;\n value: unknown;\n};\n\nconst scrubString = ({\n key,\n piiFieldsLower,\n redactAll,\n value,\n}: ScrubStringParams): string => {\n if (piiFieldsLower.includes(key.toLowerCase())) {\n return REDACTED_VALUE;\n }\n\n if (redactAll) {\n return REDACTED_VALUE;\n }\n\n if (value.length > MAX_STRING_LENGTH) {\n return value.slice(0, MAX_STRING_LENGTH) + TRUNCATED_SUFFIX;\n }\n\n return value;\n};\n\n// eslint-disable-next-line custom-rules/one-function-per-file\nconst scrubArray = ({ context, value }: ScrubArrayParams): unknown[] => {\n if (context.visited.has(value)) {\n return [CIRCULAR_VALUE];\n }\n\n context.visited.add(value);\n\n const result = value.map((item, index) =>\n scrubValue({ context, key: String(index), value: item })\n );\n\n context.visited.delete(value);\n\n return result;\n};\n\n// eslint-disable-next-line custom-rules/one-function-per-file\nconst scrubObject = ({\n context,\n value,\n}: ScrubObjectParams): Record<string, unknown> => {\n if (context.visited.has(value)) {\n return { [CIRCULAR_VALUE]: true };\n }\n\n context.visited.add(value);\n\n // Object.create(null) prevents prototype pollution when keys like '__proto__'\n // are present (e.g. from a Map converted to a plain object).\n const result = Object.create(null) as Record<string, unknown>;\n\n for (const key of Object.keys(value)) {\n result[key] = scrubValue({ context, key, value: value[key] });\n }\n\n context.visited.delete(value);\n\n return result;\n};\n\n// eslint-disable-next-line custom-rules/one-function-per-file\nconst scrubValue = ({ context, key, value }: ScrubValueParams): unknown => {\n if (value === null || value === undefined) {\n return value;\n }\n\n if (value instanceof Uint8Array) {\n return `[${BINARY_LABEL}:${value.byteLength} bytes]`;\n }\n\n if (context.piiFieldsLower.includes(key.toLowerCase())) {\n return REDACTED_VALUE;\n }\n\n if (typeof value === 'string') {\n return scrubString({\n key,\n piiFieldsLower: context.piiFieldsLower,\n redactAll: context.redactAll,\n value,\n });\n }\n\n if (Array.isArray(value)) {\n return scrubArray({ context, value });\n }\n\n if (value instanceof Set) {\n if (context.visited.has(value)) {\n return [CIRCULAR_VALUE];\n }\n\n context.visited.add(value);\n const setResult = scrubArray({ context, value: [...value] });\n context.visited.delete(value);\n\n return setResult;\n }\n\n if (value instanceof Map) {\n if (context.visited.has(value)) {\n return { [CIRCULAR_VALUE]: true };\n }\n\n context.visited.add(value);\n // Object.create(null) avoids prototype pollution when Map keys include\n // '__proto__', 'constructor', or 'prototype'\n const asObject = Object.create(null) as Record<string, unknown>;\n\n for (const [k, v] of value.entries()) {\n asObject[String(k)] = v;\n }\n\n const mapResult = scrubObject({ context, value: asObject });\n context.visited.delete(value);\n\n return mapResult;\n }\n\n // WeakMap and WeakSet are not iterable and expose no `.size` or enumeration\n // methods by design — their entries are held weakly and are not accessible\n // programmatically. We emit a tagged placeholder that identifies the type so\n // the log record remains self-describing without attempting enumeration.\n if (value instanceof WeakMap) {\n return '[WeakMap]';\n }\n\n if (value instanceof WeakSet) {\n return '[WeakSet]';\n }\n\n if (value instanceof Date) {\n return value.toISOString();\n }\n\n if (value instanceof Error) {\n return `[Error: ${value.message}]`;\n }\n\n if (typeof value === 'object') {\n return scrubObject({ context, value: value as Record<string, unknown> });\n }\n\n return value;\n};\n\n/** @not-instrumented */\n// eslint-disable-next-line custom-rules/one-function-per-file\nexport const scrubParameters = ({\n piiFields,\n redactAll,\n value,\n}: ScrubParametersParams): Record<string, unknown> => {\n const context: ScrubContext = {\n piiFieldsLower: piiFields.map((field) => field.toLowerCase()),\n redactAll,\n visited: new WeakSet<object>(),\n };\n\n return scrubObject({ context, value });\n};\n","/**\n * Normalises the raw positional arguments of an instrumented function call\n * into a flat `Record<string, unknown>` suitable for structured logging.\n *\n * ## Why this is needed\n *\n * Instrumented functions are wrapped with `(...args: unknown[])`, so their\n * parameters arrive as an array. Logging a raw array loses the semantic names\n * of each argument. This function recovers a named representation:\n *\n * - **No arguments** → `{}`\n * - **Single plain-object argument** → that object is returned as-is, because\n * SDK functions follow the single-object-parameter convention, so the object\n * already carries named keys (`{ amount, to }`, etc.).\n * - **Everything else** (multiple args, a single primitive, a single array) →\n * each value is indexed as `arg0`, `arg1`, …\n *\n * ## Why arrays are NOT treated as plain objects\n *\n * `typeof [] === 'object'` and `[] !== null`, so without the `Array.isArray`\n * guard a single-array argument would be returned as-is. That would produce\n * an object with numeric string keys (`{ '0': ..., '1': ... }`), which is\n * misleading and inconsistent with how multi-arg calls are handled. Instead,\n * arrays fall through to the indexed `arg0` path.\n * @not-instrumented\n */\n// eslint-disable-next-line custom-rules/require-single-object-param\nexport const extractParams = (args: unknown[]): Record<string, unknown> => {\n if (args.length === 0) {\n return {};\n }\n\n if (\n args.length === 1 &&\n typeof args[0] === 'object' &&\n args[0] !== null &&\n !Array.isArray(args[0])\n ) {\n // Single plain-object argument: return it directly so named keys are preserved.\n return args[0] as Record<string, unknown>;\n }\n\n // Multiple args, a primitive, or an array: index each value positionally.\n const result: Record<string, unknown> = {};\n\n for (let i = 0; i < args.length; i++) {\n result[`arg${i}`] = args[i];\n }\n\n return result;\n};\n","import { scrubParameters } from '../../scrubParameters';\n\ntype ScrubResolvedValueParams = {\n piiFields: string[];\n redactAll?: boolean;\n value: unknown;\n};\n\n/**\n * Scrubs a resolved return value of any type before logging it.\n * Routes through `scrubParameters` by wrapping the value so that strings,\n * arrays, Dates, Errors, and all other types are handled identically to\n * nested object fields.\n * @not-instrumented\n */\nexport const scrubResolvedValue = ({\n piiFields,\n redactAll,\n value,\n}: ScrubResolvedValueParams): unknown =>\n scrubParameters({\n piiFields,\n redactAll,\n value: { result: value },\n }).result;\n","import type { DynamicCore } from '../../../client/core/types/DynamicCore';\nimport { extractSessionId } from '../../../modules/auth/extractSessionId/extractSessionId';\nimport { getUserAgent } from '../../../utils/getUserAgent/getUserAgent';\nimport type {\n FunctionInstrumentationEvent,\n SerializedError,\n} from '../instrumentation.types';\nimport { scrubParameters } from '../scrubParameters';\nimport { extractParams } from './extractParams/extractParams';\nimport { scrubResolvedValue } from './scrubResolvedValue/scrubResolvedValue';\n\n// Error properties (message, name, stack) are non-enumerable so JSON.stringify\n// produces {} for raw Error objects. This helper extracts them explicitly.\nconst serializeError = (error: unknown): SerializedError => {\n if (error instanceof Error) {\n return { message: error.message, name: error.name, stack: error.stack };\n }\n return { message: String(error), name: 'UnknownError' };\n};\n\ntype InstrumentFunctionParams<T extends (...args: unknown[]) => unknown> = {\n /** The original function to wrap. */\n fn: T;\n /** Human-readable name recorded in every emitted event. */\n functionName: string;\n /**\n * Returns the current `DynamicCore` instance, or `undefined` when the SDK\n * has not yet been initialised. Instrumentation is skipped when this returns\n * `undefined` or when `core.instrumentation.config.enabled` is `false`.\n */\n getCore: () => DynamicCore | undefined;\n /**\n * When `true`, every field in `parameters` and `resolvedValue` is replaced\n * with `\"[redacted]\"` regardless of `piiFields`. Use this for functions\n * whose arguments are inherently sensitive (e.g., signing, authentication).\n */\n redactAll?: boolean;\n};\n\n/**\n * Wraps a function so that each invocation emits a structured\n * `FunctionInstrumentationEvent` at three lifecycle points:\n *\n * - **started** — immediately before the function body executes, with the\n * PII-scrubbed call parameters.\n * - **resolved** — after the function (or its returned Promise) settles\n * successfully, with the PII-scrubbed return value.\n * - **rejected** — if the function throws synchronously or its returned\n * Promise rejects.\n *\n * The original return value (or thrown error) is always forwarded to the\n * caller unchanged — instrumentation is purely observational.\n *\n * ## Usage\n *\n * ```ts\n * const transfer = instrumentFunction({\n * fn: rawTransfer,\n * functionName: 'transfer',\n * getCore: () => core,\n * });\n *\n * // When called, three events are emitted automatically:\n * await transfer({ amount: 1, to: '0xabc' });\n * ```\n *\n * ## How functions are wrapped\n *\n * `instrumentFunction` is not called manually in application code. Instead,\n * the esbuild instrumentation plugin (`tools/instrumentation-plugin`) injects\n * it at build time: any exported function annotated with `@instrumented` in its\n * JSDoc is automatically wrapped by the plugin during the build step.\n * The plugin strips the original `export`, renames the function, and re-exports\n * it under the original name via `instrumentFunction(...)` — so the public API\n * is unchanged and no call sites need to be updated.\n *\n * ## Opting out\n *\n * Instrumentation is skipped entirely when:\n * - `getCore()` returns `undefined` (SDK not initialised), or\n * - `core.instrumentation.config.enabled` is `false`.\n *\n * In both cases the original function is called directly with no overhead.\n *\n * ## PII scrubbing\n *\n * All string values whose key appears in `piiFields` are replaced with\n * `\"[redacted]\"` before events are emitted. Pass `redactAll: true` to redact\n * every field, regardless of key name.\n * @not-instrumented\n */\n// eslint-disable-next-line custom-rules/one-function-per-file\nexport const instrumentFunction = <T extends (...args: unknown[]) => unknown>({\n fn,\n functionName,\n getCore,\n redactAll,\n}: InstrumentFunctionParams<T>): T => {\n const wrapped = (...args: unknown[]) => {\n const core = getCore();\n\n if (!core) {\n return fn(...args);\n }\n\n if (!core.instrumentation.config.enabled) {\n return fn(...args);\n }\n\n const instrumentation = core.instrumentation;\n const state = core.state.get();\n\n const baseEvent: Omit<FunctionInstrumentationEvent, 'phase' | 'timestamp'> =\n {\n environmentId: core.environmentId,\n functionName,\n parameters: scrubParameters({\n piiFields: instrumentation.config.piiFields,\n redactAll,\n value: extractParams(args),\n }),\n sdkSessionId: core.sdkSessionId,\n sdkVersion: core.version,\n // Function events always use 'info' — phase already conveys whether the call\n // succeeded or failed, so status is not needed to signal severity here.\n status: 'info',\n tokenSessionId: state.token ? extractSessionId(state.token) : null,\n userAgent: getUserAgent(),\n userId: state.user?.id ?? null,\n };\n\n instrumentation.logFunction({\n ...baseEvent,\n phase: 'started',\n timestamp: new Date().toISOString(),\n });\n\n try {\n const result = fn(...args);\n\n if (result instanceof Promise) {\n return result\n .then((value) => {\n instrumentation.logFunction({\n ...baseEvent,\n phase: 'resolved',\n resolvedValue: scrubResolvedValue({\n piiFields: instrumentation.config.piiFields,\n redactAll,\n value,\n }),\n timestamp: new Date().toISOString(),\n });\n\n return value;\n })\n .catch((error) => {\n instrumentation.logFunction({\n ...baseEvent,\n phase: 'rejected',\n rejectedError: serializeError(error),\n timestamp: new Date().toISOString(),\n });\n throw error;\n });\n }\n\n instrumentation.logFunction({\n ...baseEvent,\n phase: 'resolved',\n resolvedValue: scrubResolvedValue({\n piiFields: instrumentation.config.piiFields,\n redactAll,\n value: result,\n }),\n timestamp: new Date().toISOString(),\n });\n\n return result;\n } catch (error) {\n instrumentation.logFunction({\n ...baseEvent,\n phase: 'rejected',\n rejectedError: serializeError(error),\n timestamp: new Date().toISOString(),\n });\n\n throw error;\n }\n };\n\n return wrapped as T;\n};\n","import { getCore } from '../../../client/core/getCore';\nimport type { DynamicClient } from '../../../client/types';\nimport type { SessionKeys } from '../sessionKeys.types';\n\n/** @instrumented */\nexport const getSessionKeys = (client: DynamicClient): SessionKeys | undefined => {\n const core = getCore(client);\n\n const publicKey = core.state.get().sessionKeys;\n\n if (!publicKey) {\n return undefined;\n }\n\n return { publicKey };\n};\n","import { getCore } from '../../../client/core/getCore';\nimport { getDefaultClient } from '../../../client/defaultClient';\n\ntype GetElevatedAccessTokenParams = {\n /**\n * Whether to consume single-use tokens after retrieval.\n * Set to `false` to check for token existence without side-effects.\n * @default true\n * @instrumented\n */\n consume?: boolean;\n scope: string;\n};\n\n/**\n * Gets an elevated access token by scope.\n *\n * This function retrieves an elevated access token that contains the specified scope.\n * Expired tokens are automatically filtered out.\n *\n * By default, if the token has `singleUse: true`, it will be automatically\n * consumed (removed from state) after retrieval. Pass `consume: false` to\n * check for token existence without consuming it.\n *\n * @param params - The parameters object.\n * @param params.scope - The scope to match (e.g., 'wallet:export').\n * @param params.consume - Whether to consume single-use tokens (default: true).\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns The elevated access token if found and not expired, or undefined if not found or expired.\n *\n * @example\n * ```typescript\n * // Retrieve and consume (default)\n * const token = getElevatedAccessToken({ scope: 'wallet:export' });\n *\n * // Check existence without consuming\n * const token = getElevatedAccessToken({ scope: 'credential:unlink', consume: false });\n * ```\n * @not-instrumented\n */\nexport const getElevatedAccessToken = (\n { consume = true, scope }: GetElevatedAccessTokenParams,\n client = getDefaultClient()\n): string | undefined => {\n const core = getCore(client);\n\n const now = new Date();\n const elevatedAccessTokens = core.state.get().elevatedAccessTokens || [];\n\n // Filter out expired tokens\n const validTokens = elevatedAccessTokens.filter(\n (token) => !token.expiresAt || token.expiresAt > now\n );\n\n // Remove expired tokens from state if any were found\n if (validTokens.length !== elevatedAccessTokens.length) {\n core.state.set({\n elevatedAccessTokens: validTokens,\n });\n }\n\n const token = validTokens.find((token) => token.scopes.includes(scope));\n\n if (!token) {\n return undefined;\n }\n\n // Check if token should be consumed based on singleUse property\n if (consume && token.singleUse) {\n const updatedTokens = validTokens.filter((t) => t !== token);\n core.state.set({\n elevatedAccessTokens: updatedTokens,\n });\n }\n\n return token.token;\n};\n","import { BaseError } from '../base';\n\nexport class APIError extends BaseError {\n status: number;\n\n // eslint-disable-next-line custom-rules/require-single-object-param\n constructor(message: string, code: string, status: number) {\n super({\n cause: null,\n code,\n docsUrl: null,\n name: 'APIError',\n shortMessage: message,\n });\n\n this.status = status;\n }\n\n static async fromResponse(response: Response) {\n try {\n const errorBody = await response.clone().json();\n\n if (\n errorBody &&\n 'error' in errorBody &&\n typeof errorBody.error === 'string'\n ) {\n const errorCode =\n 'code' in errorBody && typeof errorBody.code === 'string'\n ? errorBody.code\n : 'unknown_error';\n\n return new APIError(errorBody.error, errorCode, response.status);\n }\n\n return null;\n } catch {\n return null;\n }\n }\n}\n","import { BaseError, type BaseErrorParameters } from './base';\n\nexport class InvalidExternalAuthError extends BaseError {\n constructor({ cause }: Pick<BaseErrorParameters, 'cause'>) {\n super({\n cause,\n code: 'invalid_external_auth_error',\n docsUrl:\n 'https://www.dynamic.xyz/docs/external-auth/third-party-auth-overview',\n name: 'InvalidExternalAuthError',\n shortMessage: 'Error authenticating with external JWT',\n });\n }\n}\n","import { BaseError, type BaseErrorParameters } from './base';\n\nexport class LinkCredentialError extends BaseError {\n constructor({ cause }: Pick<BaseErrorParameters, 'cause'>) {\n super({\n cause,\n code: 'link_credential_error',\n docsUrl: null,\n name: 'LinkCredentialError',\n shortMessage:\n 'The credential you are trying to link is associated with another account and cannot be reassigned.',\n });\n }\n}\n","import { BaseError, type BaseErrorParameters } from './base';\n\nexport class MfaInvalidOtpError extends BaseError {\n constructor({ cause }: Pick<BaseErrorParameters, 'cause'>) {\n super({\n cause,\n code: 'mfa_invalid_otp_error',\n docsUrl: null,\n name: 'MfaInvalidOtpError',\n shortMessage: 'Invalid OTP',\n });\n }\n}\n","import { BaseError, type BaseErrorParameters } from './base';\n\nexport class MfaRateLimitedError extends BaseError {\n constructor({ cause }: Pick<BaseErrorParameters, 'cause'>) {\n super({\n cause,\n code: 'mfa_rate_limited_error',\n docsUrl: null,\n name: 'MfaRateLimitedError',\n shortMessage: 'Rate limited',\n });\n }\n}\n","import { BaseError, type BaseErrorParameters } from './base';\n\nexport class SandboxMaximumThresholdReachedError extends BaseError {\n constructor({ cause }: Pick<BaseErrorParameters, 'cause'>) {\n super({\n cause,\n code: 'sandbox_maximum_threshold_reached_error',\n docsUrl:\n 'https://www.dynamic.xyz/docs/developer-dashboard/sandbox-vs-live#sandbox-vs-live',\n name: 'SandboxMaximumThresholdReachedError',\n shortMessage:\n 'Your sandbox environment has reached the maximum MAU. Please use a live environment for production traffic.',\n });\n }\n}\n","import { APIError } from '../../../../errors/APIError';\nimport { InvalidExternalAuthError } from '../../../../errors/InvalidExternalAuthError';\nimport { LinkCredentialError } from '../../../../errors/LinkCredentialError';\nimport { MfaInvalidOtpError } from '../../../../errors/MfaInvalidOtpError';\nimport { MfaRateLimitedError } from '../../../../errors/MfaRateLimitedError';\nimport { SandboxMaximumThresholdReachedError } from '../../../../errors/SandboxMaximumThresholdReachedError';\nimport type { ErrorMapper } from '../../apiClient.types';\n\n/**\n * Default error mapper for the client that handles common API error codes.\n *\n * This mapper transforms specific API error codes into more specific error types:\n * - `mfa_invalid_code` → `MfaInvalidOtpError`\n * - `mfa_rate_limited` → `MfaRateLimitedError`\n *\n * @param error - The error to be mapped\n * @returns A transformed error if the error code matches a known pattern, or null if no transformation is needed\n *\n * @example\n * ```typescript\n * // This will be automatically applied to all API errors\n * const apiClient = createApiClient({}, client);\n *\n * // The clientErrorMapper will automatically convert mfa_invalid_code errors\n * // to MfaInvalidOtpError instances\n * ```\n * @not-instrumented\n */\nexport const clientErrorMapper: ErrorMapper = (error) => {\n if (error instanceof APIError) {\n if (error.code === 'mfa_invalid_code') {\n return new MfaInvalidOtpError({ cause: error });\n }\n\n if (error.code === 'mfa_rate_limited') {\n return new MfaRateLimitedError({ cause: error });\n }\n\n if (error.code === 'invalid_external_auth') {\n return new InvalidExternalAuthError({ cause: error });\n }\n\n if (error.code === 'sandbox_maximum_threshold_reached') {\n return new SandboxMaximumThresholdReachedError({ cause: error });\n }\n\n if (\n error.code === 'merge_accounts_invalid' ||\n error.code === 'reassign_wallet_error'\n ) {\n return new LinkCredentialError({ cause: error });\n }\n }\n\n return null;\n};\n","/* eslint-disable custom-rules/function-name-matches-filename */\nimport type { Middleware, ResponseContext } from '@dynamic-labs/sdk-api-core';\n\nimport { APIError } from '../../../../errors/APIError';\nimport type { ErrorMapper } from '../../apiClient.types';\n\ntype CreateConvertToApiErrorMiddlewareOptions = {\n errorMappers?: ErrorMapper[];\n};\n\n/**\n * Creates middleware that converts HTTP error responses to APIError instances\n * and optionally applies custom error mappers to transform them into specific error types.\n *\n * @param options.errorMappers - Array of error mappers to apply to API errors\n * @returns A middleware function that handles error conversion and mapping\n * @not-instrumented\n */\nexport const createConvertToApiErrorMiddleware = ({\n errorMappers = [],\n}: CreateConvertToApiErrorMiddlewareOptions): Middleware => ({\n post: async (context: ResponseContext) => {\n if (context.response.status >= 400) {\n const apiError = await APIError.fromResponse(context.response);\n\n if (apiError) {\n let errorToThrow: Error = apiError;\n\n for (const mapper of errorMappers) {\n const newError = mapper(apiError);\n\n if (newError) {\n errorToThrow = newError;\n break;\n }\n }\n\n throw errorToThrow;\n }\n }\n\n return context.response;\n },\n});\n","import { getCore } from '../../client/core/getCore';\nimport type { DynamicClient } from '../../client/types';\nimport { fetchAndStoreNonces } from './fetchAndStoreNonces/fetchAndStoreNonces';\n\n/**\n * Returns a nonce for wallet ownership verification.\n *\n * Pops the first nonce from the prefetched pool. When the pool is running low\n * (≤1 remaining after pop) a background refetch is triggered. If the pool is\n * empty, nonces are fetched on-demand before returning.\n * @instrumented\n */\nexport const getNonce = async (\n client: DynamicClient\n): Promise<string> => {\n const core = getCore(client);\n const pool = core.state.get().prefetchedNonces;\n\n if (pool.length > 0) {\n const [nonce, ...remaining] = pool;\n\n core.state.set({ prefetchedNonces: remaining });\n\n if (remaining.length <= 1) {\n void fetchAndStoreNonces(client);\n }\n\n return nonce;\n }\n\n await fetchAndStoreNonces(client);\n\n return getNonce(client);\n};\n","import { getCore } from '../../../client/core/getCore';\nimport type { DynamicClient } from '../../../client/types';\nimport type { DeviceSigner } from '../../../services/deviceSigner';\n\n/** @instrumented */\nexport const getDeviceSigner = async (\n client: DynamicClient\n): Promise<DeviceSigner> => {\n const { deviceSigner, keychain } = getCore(client);\n\n /**\n * If the device signer is available, it should handle the device signing.\n * This is used for mobile devices with secure enclave.\n */\n if (deviceSigner) {\n return deviceSigner;\n }\n\n const keyName = 'device';\n\n const existingPublicKey = await keychain.getPublicKey(keyName);\n\n if (!existingPublicKey) {\n await keychain.generateKey(keyName);\n }\n\n return {\n getPublicKey: () => keychain.getPublicKey(keyName) as Promise<string>,\n sign: (payload: string) => keychain.sign(keyName, payload),\n };\n};\n","import type { DynamicClient } from '../../../client/types';\nimport { assertDefined } from '../../../utils/assertDefined';\nimport { getNonce } from '../../../utils/getNonce';\nimport { isCookieEnabled } from '../../projectSettings/isCookieEnabled';\nimport { getDeviceSigner } from '../getDeviceSigner';\n\n/** @instrumented */\nexport const getHeadersForNonceSignedByDeviceSigners = async (\n client: DynamicClient\n): Promise<Record<string, string>> => {\n const { projectSettings } = client;\n\n assertDefined(projectSettings, 'Project settings not found');\n\n /**\n * For cookie based environments, the device registration is handled\n * by settings the cookie in the browser.\n * Then we dont need to provide the headers\n */\n if (isCookieEnabled(client)) {\n return {};\n }\n\n const deviceSigner = await getDeviceSigner(client);\n\n const nonce = await getNonce(client);\n\n const signedNonce = await deviceSigner.sign(nonce);\n const publicKey = await deviceSigner.getPublicKey();\n\n return {\n 'x-dynamic-device-nonce': nonce,\n 'x-dynamic-device-publickey': publicKey,\n 'x-dynamic-device-signed-nonce': signedNonce,\n };\n};\n","import type { Middleware } from '@dynamic-labs/sdk-api-core';\nimport { isDeviceNonceSignatureRequiredForUrl } from '@dynamic-labs/sdk-api-core';\n\nimport type { DynamicClient } from '../../../../client/types';\nimport { getHeadersForNonceSignedByDeviceSigners } from '../../../deviceRegistration/getHeadersForNonceSignedByDeviceSigners';\nimport { isCookieEnabled } from '../../../projectSettings/isCookieEnabled';\n\n/** @instrumented */\nexport const createDeviceSignatureHeadersMiddleware = (\n client: DynamicClient\n): Middleware => {\n return {\n pre: async (context) => {\n /**\n * The signed nonce is not required for cookie based environments.\n */\n if (\n isDeviceNonceSignatureRequiredForUrl(context.url) &&\n !isCookieEnabled(client)\n ) {\n const deviceSignerHeaders = await getHeadersForNonceSignedByDeviceSigners(\n client\n );\n\n return {\n init: {\n ...context.init,\n headers: {\n ...context.init.headers,\n ...deviceSignerHeaders,\n },\n },\n url: context.url,\n };\n }\n\n return;\n },\n };\n};\n","import { BaseError, type BaseErrorParameters } from './base';\n\nexport class UnauthorizedError extends BaseError {\n constructor({ cause }: Pick<BaseErrorParameters, 'cause'>) {\n super({\n cause,\n code: 'unauthorized_error',\n docsUrl: null,\n name: 'UnauthorizedError',\n shortMessage: 'Unauthorized',\n });\n }\n}\n","import type { Middleware, ResponseContext } from '@dynamic-labs/sdk-api-core';\n\nimport { UnauthorizedError } from '../../../../errors/UnauthorizedError';\n\n/** @not-instrumented */\nexport const createUnauthorizedMiddleware = (): Middleware => ({\n post: async (context: ResponseContext) => {\n if (context.response.status === 401) {\n let cause: Error | null = null;\n\n try {\n const errorBody = await context.response.clone().json();\n\n if (\n errorBody &&\n 'error' in errorBody &&\n typeof errorBody.error === 'string'\n ) {\n // eslint-disable-next-line no-restricted-syntax\n cause = new Error(errorBody.error);\n }\n } catch {\n // Response body isn't valid JSON — proceed without a cause\n }\n\n throw new UnauthorizedError({ cause });\n }\n\n return context.response;\n },\n});\n","import { Configuration, SDKApi } from '@dynamic-labs/sdk-api-core';\n\nimport { version } from '../../../package.json';\nimport { getCore } from '../../client/core/getCore';\nimport type { DynamicClient } from '../../client/types';\nimport { randomString } from '../../utils/randomString';\nimport { isCookieEnabled } from '../projectSettings/isCookieEnabled';\nimport { getSessionKeys } from '../sessionKeys/getSessionKeys';\nimport type { CreateApiClientOptions } from './apiClient.types';\nimport { getElevatedAccessToken } from '../auth/getElevatedAccessToken';\nimport {\n CLIENT_SDK_NAME,\n DYNAMIC_API_VERSION_HEADER,\n DYNAMIC_REQUEST_ID_HEADER,\n DYNAMIC_SDK_API_VERSION,\n DYNAMIC_SDK_SESSION_ID_HEADER,\n DYNAMIC_SDK_VERSION_HEADER,\n ELEVATED_ACCESS_TOKEN_HEADER,\n MFA_TOKEN_HEADER,\n SESSION_PUBLIC_KEY_HEADER,\n} from './constants';\nimport { clientErrorMapper } from './utils/clientErrorMapper';\nimport { createConvertToApiErrorMiddleware } from './utils/convertToApiErrorMiddleware/convertToApiErrorMiddleware';\nimport { createDeviceSignatureHeadersMiddleware } from './utils/deviceSignatureHeadersMiddleware';\nimport { createUnauthorizedMiddleware } from './utils/unauthorizedMiddleware/createUnauthorizedMiddleware';\n\ntype ISettings = {\n basePath: string;\n credentials?: 'include';\n headers: {\n Authorization?: string;\n 'Content-Type': string;\n [DYNAMIC_API_VERSION_HEADER]: string;\n [DYNAMIC_REQUEST_ID_HEADER]: string;\n [DYNAMIC_SDK_SESSION_ID_HEADER]: string;\n [DYNAMIC_SDK_VERSION_HEADER]: string;\n [ELEVATED_ACCESS_TOKEN_HEADER]?: string;\n [MFA_TOKEN_HEADER]?: string;\n [SESSION_PUBLIC_KEY_HEADER]?: string;\n };\n};\n\n/**\n * Returns a new instance of the SDK API client.\n *\n * This is not meant for storing, as it is very light we can create it whenever needed.\n * @instrumented\n */\nexport const createApiClient = (\n options: CreateApiClientOptions = {},\n client: DynamicClient\n) => {\n const core = getCore(client);\n const coreState = core.state.get();\n\n const settings: ISettings = {\n basePath: core.apiBaseUrl,\n headers: {\n 'Content-Type': 'application/json',\n [DYNAMIC_API_VERSION_HEADER]: `API/${DYNAMIC_SDK_API_VERSION}`,\n [DYNAMIC_REQUEST_ID_HEADER]: randomString({ length: 50 }),\n [DYNAMIC_SDK_SESSION_ID_HEADER]: core.sdkSessionId,\n [DYNAMIC_SDK_VERSION_HEADER]: `${CLIENT_SDK_NAME}/${version}`,\n ...core.getApiHeaders(),\n ...options.headers,\n },\n };\n\n if (client.token) {\n settings.headers.Authorization = `Bearer ${client.token}`;\n }\n\n if (client.projectSettings && isCookieEnabled(client)) {\n settings.credentials = 'include';\n }\n\n if (options.includeMfaToken && coreState.mfaToken) {\n settings.headers[MFA_TOKEN_HEADER] = coreState.mfaToken;\n }\n\n if (options.elevatedAccessTokenScope) {\n const elevatedToken = getElevatedAccessToken(\n { scope: options.elevatedAccessTokenScope },\n client\n );\n if (elevatedToken) {\n settings.headers[ELEVATED_ACCESS_TOKEN_HEADER] = elevatedToken;\n }\n }\n\n const sessionPublicKey = getSessionKeys(client)?.publicKey;\n\n // This check is required to avoid overriding the session public key header\n // that is set by any of our other SDKs using the Dynamic Client SDK.\n const isSessionPublicKeyHeaderPresent =\n settings.headers[SESSION_PUBLIC_KEY_HEADER] !== undefined;\n\n if (sessionPublicKey && !isSessionPublicKeyHeaderPresent) {\n settings.headers[SESSION_PUBLIC_KEY_HEADER] = sessionPublicKey;\n }\n\n return new SDKApi(\n new Configuration({\n ...settings,\n fetchApi: core.fetch,\n middleware: [\n createDeviceSignatureHeadersMiddleware(client),\n createConvertToApiErrorMiddleware({\n errorMappers: [...(options.errorMappers || []), clientErrorMapper],\n }),\n createUnauthorizedMiddleware(),\n ],\n })\n );\n};\n","import { getCore } from '../../../client/core/getCore';\nimport type { DynamicClient } from '../../../client/types';\nimport { createApiClient } from '../../../modules/apiClient';\nimport { NONCE_POOL_EXPIRATION_TIME, NONCE_POOL_SIZE } from '../constants';\n\n/**\n * Fetches a batch of nonces from the API.\n *\n * Prefetching is critical for iOS deep link wallet providers (e.g. Phantom\n * redirect). On iOS, a network request (like fetching a nonce) between a user\n * action and a deeplink call will break the gesture chain, causing iOS to\n * silently ignore the deeplink. By prefetching nonces ahead of time,\n * `getNonce` can return synchronously from cache and the deeplink fires\n * without an interrupting network round-trip.\n *\n * New nonces are **appended** to the existing pool so that unconsumed entries\n * are not discarded by a background refetch.\n * @not-instrumented\n */\nexport const fetchAndStoreNonces = async (\n client: DynamicClient\n): Promise<void> => {\n const core = getCore(client);\n\n const { environmentId } = core;\n\n const apiClient = createApiClient({}, client);\n\n const { nonces } = await apiClient.getNonces({\n count: NONCE_POOL_SIZE,\n environmentId,\n });\n\n const existing = core.state.get().prefetchedNonces;\n\n core.state.set({\n prefetchedNonces: [...existing, ...nonces],\n prefetchedNoncesExpiration: Date.now() + NONCE_POOL_EXPIRATION_TIME,\n });\n};\n","import type { Chain } from '../chain';\n\ntype ChainInfo = {\n apiChainName: string;\n blockchainName: string;\n verifiedCredentialChainName: string;\n waasChainNameOverride?: string;\n};\n\nexport const CHAINS_INFO_MAP: Record<Chain, ChainInfo> = {\n ALEO: {\n apiChainName: 'aleo',\n blockchainName: 'Aleo',\n verifiedCredentialChainName: 'aleo',\n },\n ALGO: {\n apiChainName: 'algo',\n blockchainName: 'Algorand',\n verifiedCredentialChainName: 'algorand',\n },\n APTOS: {\n apiChainName: 'aptos',\n blockchainName: 'Aptos',\n verifiedCredentialChainName: 'aptos',\n },\n BTC: {\n apiChainName: 'bitcoin',\n blockchainName: 'Bitcoin',\n verifiedCredentialChainName: 'bip122',\n },\n COSMOS: {\n apiChainName: 'cosmos',\n blockchainName: 'Cosmos',\n verifiedCredentialChainName: 'cosmos',\n },\n ECLIPSE: {\n apiChainName: 'eclipse',\n blockchainName: 'Eclipse',\n verifiedCredentialChainName: 'eclipse',\n },\n EVM: {\n apiChainName: 'evm',\n // eslint-disable-next-line custom-rules/ban-ethereum-eth-terms\n blockchainName: 'Ethereum',\n verifiedCredentialChainName: 'eip155',\n },\n FLOW: {\n apiChainName: 'flow',\n blockchainName: 'Flow',\n verifiedCredentialChainName: 'flow',\n },\n MIDNIGHT: {\n apiChainName: 'midnight',\n blockchainName: 'Midnight',\n verifiedCredentialChainName: 'midnight',\n },\n SOL: {\n apiChainName: 'solana',\n blockchainName: 'Solana',\n verifiedCredentialChainName: 'solana',\n waasChainNameOverride: 'SVM',\n },\n SPARK: {\n apiChainName: 'spark',\n blockchainName: 'Spark',\n verifiedCredentialChainName: 'spark',\n },\n STARK: {\n apiChainName: 'starknet',\n blockchainName: 'Starknet',\n verifiedCredentialChainName: 'starknet',\n },\n STELLAR: {\n apiChainName: 'stellar',\n blockchainName: 'Stellar',\n verifiedCredentialChainName: 'stellar',\n },\n SUI: {\n apiChainName: 'sui',\n blockchainName: 'Sui',\n verifiedCredentialChainName: 'sui',\n },\n TEMPO: {\n apiChainName: 'tempo',\n blockchainName: 'Tempo',\n verifiedCredentialChainName: 'tempo',\n },\n TON: {\n apiChainName: 'ton',\n blockchainName: 'TON',\n verifiedCredentialChainName: 'ton',\n },\n TRON: {\n apiChainName: 'tron',\n blockchainName: 'Tron',\n verifiedCredentialChainName: 'tron',\n },\n};\n","import type { Chain } from '../../modules/chain';\nimport { CHAINS_INFO_MAP } from '../../modules/wallets/constants';\nimport { assertDefined } from '../assertDefined';\n\n/** @instrumented */\n// eslint-disable-next-line custom-rules/require-single-object-param\nexport const getChainFromVerifiedCredentialChain = (\n verifiedCredentialChain: string\n): Chain => {\n const chains = Object.keys(CHAINS_INFO_MAP) as Chain[];\n\n const chain = chains.find(\n (chain) =>\n CHAINS_INFO_MAP[chain].verifiedCredentialChainName ===\n verifiedCredentialChain\n );\n\n assertDefined(chain, `Unknown chain: ${verifiedCredentialChain}`);\n\n return chain;\n};\n","import { dependencies } from '../package.json';\n\nexport const SDK_API_CORE_VERSION = dependencies['@dynamic-labs/sdk-api-core'];\n\nexport const DYNAMIC_ICONIC_SPRITE_URL =\n 'https://iconic.dynamic-static-assets.com/icons/sprite.svg';\n","import { DYNAMIC_ICONIC_SPRITE_URL } from '../../constants';\n\nexport const DEFAULT_WAAS_BASE_API_URL = 'https://app.dynamicauth.com';\nexport const DEFAULT_WAAS_BASE_MPC_RELAY_API_URL =\n 'https://relay.dynamicauth.com';\n\nexport const DYNAMIC_WAAS_METADATA = {\n displayName: 'Dynamic WaaS',\n icon: `${DYNAMIC_ICONIC_SPRITE_URL}#dynamicwaas`,\n normalizedWalletName: 'dynamicwaas',\n};\n","import { BaseError } from './base';\n\nexport class InvalidParamError extends BaseError {\n // eslint-disable-next-line custom-rules/require-single-object-param\n constructor(message: string) {\n super({\n cause: null,\n code: 'invalid_param_error',\n docsUrl: null,\n name: 'InvalidParamError',\n shortMessage: message,\n });\n }\n}\n"],"mappings":";;;;;;;;;;;;;;;;;;;ACIA,MAAa,WAAW,WAAuC;AAE7D,QAAO,OAAO;;;;;ACchB,MAAM,cAAc,EAAE,SAAS,YAAiC;AAC9D,KAAI,iBAAiB,UACnB,QAAO,MAAM;AAGf,KAAI,OAAO,QACT,QAAO,MAAM;AAGf,QAAO;;;;;AAOT,MAAM,iBAAiB,EACrB,cACA,SACA,SACA,mBACyB;AACzB,QAAO;EACL;EACA;EACA;EACA,GAAI,eAAe,CAAC,GAAG,cAAc,GAAG,GAAG,EAAE;EAC7C,GAAI,UAAU,CAAC,SAAS,UAAU,GAAG,EAAE;EACvC,GAAI,UAAU,CAAC,YAAY,UAAU,GAAG,EAAE;EAC1C,YAAY;EACZ,+BAAc,IAAI,MAAM,EAAC,aAAa;EACvC,CAAC,KAAK,KAAK;;;;;AAMd,IAAsB,YAAtB,MAAsB,kBAAkB,MAAM;;CAE5C;CACA;CACA,AAAiB;CACjB,AAAS,OAAO;CAChB,AAAS;CAET,YAAY,MAA2B;EACrC,MAAM,UAAU,WAAW,KAAK;EAChC,MAAM,mBAAmB,cAAc;GAAE,GAAG;GAAM;GAAS,CAAC;AAC5D,QACE,KAAK,gBAAgB,kBACrB,KAAK,QAAQ,EAAE,OAAO,KAAK,OAAO,GAAG,OACtC;AAED,OAAK,mBAAmB;AACxB,OAAK,UAAU;AACf,OAAK,OAAO,KAAK,QAAQ,KAAK;AAC9B,OAAK,QAAQ,KAAK,SAAS,KAAK;AAChC,OAAK,OAAO,KAAK;;;;;CAMnB,OAA0B;EACxB,MAAM,QAAQ,KAAK;AAEnB,MAAI,iBAAiB,UACnB,QAAO,MAAM,MAAM;AAGrB,SAAO;;CAGT,AAAS,WAAW;AAClB,SAAO,KAAK;;;;;;AC5FhB,IAAa,sBAAb,cAAyC,UAAU;CACjD,cAAc;AACZ,QAAM;GACJ,OAAO;GACP,MAAM;GACN,SAAS;GACT,MAAM;GACN,cACE;GACH,CAAC;;;;;;ACNN,IAAIA,gBAAsC;AAC1C,IAAI,0BAA0B;;;;;;;;AAS9B,MAAa,yBAAwC;AACnD,KAAI,CAAC,cACH,OAAM,IAAI,qBAAqB;AAGjC,KAAI,0BAA0B,EAE5B,CADa,QAAQ,cAAc,CAC9B,OAAO,MACV,gSAGD;AAGH,QAAO;;;AAKT,MAAa,oBAAoB,WAA0B;AACzD,iBAAgB;AAChB;;;;;ACpCF,MAAa,6BAA6B,MAAQ,KAAK;AAEvD,MAAa,kBAAkB;;;;ACA/B,MAAa,6BAA6B;AAE1C,MAAa,4BAA4B;AAEzC,MAAa,6BAA6B;AAE1C,MAAa,+BAA+B;AAE5C,MAAa,mBAAmB;AAEhC,MAAa,4BAA4B;AAEzC,MAAa,0BACX,aAAa;AAEf,MAAa,gCAAgC;AAE7C,MAAa,kBAAkB;;;;ACnB/B,MAAM,gBACJ;;AAQF,MAAa,gBAAgB,EAC3B,QAAQ,eACR,aACwB;CACxB,MAAM,QAAQ,IAAI,WAAW,OAAO;AACpC,QAAO,gBAAgB,MAAM;CAE7B,IAAI,SAAS;AACb,MAAK,IAAI,IAAI,GAAG,IAAI,QAAQ,IAC1B,WAAU,MAAM,MAAM,KAAK,MAAM;AAEnC,QAAO;;;;;AClBT,IAAa,0BAAb,cAA6C,UAAU;CAErD,YAAY,SAAiB;AAC3B,QAAM;GACJ,OAAO;GACP,MAAM;GACN,SAAS;GACT,MAAM;GACN,cAAc;GACf,CAAC;;;;;;;;;;;;;;;;;;;;;ACSN,SAAgB,cACd,OACA,SACgD;AAChD,KAAI,UAAU,QAAQ,UAAU,OAC9B,OAAM,IAAI,wBAAwB,QAAQ;;;;;;;;;AChB9C,MAAa,mBAAmB,WAAmC;AACjE,eAAc,OAAO,iBAAiB,mCAAmC;CAEzE,MAAM,mBAAmB,OAAO,gBAAgB;AAEhD,KAAI,CAAC,iBAAkB,QAAO;CAG9B,MAAM,yBAAyB,iBAAiB,MAAM,WAAW,EAAE,EAAE,SACnE,gBAAgB,OACjB;CAGD,MAAM,sBAAsB,QAC1B,iBAAiB,cAAc,WAChC;AAMD,QAAO,yBAAyB;;;;;;;;;;;;;;;;AClBlC,MAAa,oBAAoB,UAAiC;AAChE,KAAI;EACF,MAAM,UAAU,MAAM,MAAM,IAAI,CAAC;AAGjC,SAFgB,KAAK,MAAM,KAAK,QAAQ,CAAC,CAE1B,OAAO;SAChB;AACN,SAAO;;;;;;;;;;;;;;;ACVX,MAAa,qBAA6B;AACxC,KAAI;AAEF,SAAO,UAAU;SACX;AACN,SAAO;;;;;;ACdX,MAAa,qBAAqB;CAChC;CACA;CACA;CACA;CACA;CACA;CACA;CACA;CACA;CACA;CACA;CACD;AAED,MAAa,iBAAiB;AAE9B,MAAa,oBAAoB;AAEjC,MAAa,mBAAmB;;;;;;AAOhC,MAAa,eAAe;;;;;;AAO5B,MAAa,iBAAiB;;;;ACW9B,MAAM,eAAe,EACnB,KACA,gBACA,WACA,YAC+B;AAC/B,KAAI,eAAe,SAAS,IAAI,aAAa,CAAC,CAC5C,QAAO;AAGT,KAAI,UACF,QAAO;AAGT,KAAI,MAAM,SAAS,kBACjB,QAAO,MAAM,MAAM,GAAG,kBAAkB,GAAG;AAG7C,QAAO;;AAIT,MAAM,cAAc,EAAE,SAAS,YAAyC;AACtE,KAAI,QAAQ,QAAQ,IAAI,MAAM,CAC5B,QAAO,CAAC,eAAe;AAGzB,SAAQ,QAAQ,IAAI,MAAM;CAE1B,MAAM,SAAS,MAAM,KAAK,MAAM,UAC9B,WAAW;EAAE;EAAS,KAAK,OAAO,MAAM;EAAE,OAAO;EAAM,CAAC,CACzD;AAED,SAAQ,QAAQ,OAAO,MAAM;AAE7B,QAAO;;AAIT,MAAM,eAAe,EACnB,SACA,YACgD;AAChD,KAAI,QAAQ,QAAQ,IAAI,MAAM,CAC5B,QAAO,GAAG,iBAAiB,MAAM;AAGnC,SAAQ,QAAQ,IAAI,MAAM;CAI1B,MAAM,SAAS,OAAO,OAAO,KAAK;AAElC,MAAK,MAAM,OAAO,OAAO,KAAK,MAAM,CAClC,QAAO,OAAO,WAAW;EAAE;EAAS;EAAK,OAAO,MAAM;EAAM,CAAC;AAG/D,SAAQ,QAAQ,OAAO,MAAM;AAE7B,QAAO;;AAIT,MAAM,cAAc,EAAE,SAAS,KAAK,YAAuC;AACzE,KAAI,UAAU,QAAQ,UAAU,OAC9B,QAAO;AAGT,KAAI,iBAAiB,WACnB,QAAO,IAAI,aAAa,GAAG,MAAM,WAAW;AAG9C,KAAI,QAAQ,eAAe,SAAS,IAAI,aAAa,CAAC,CACpD,QAAO;AAGT,KAAI,OAAO,UAAU,SACnB,QAAO,YAAY;EACjB;EACA,gBAAgB,QAAQ;EACxB,WAAW,QAAQ;EACnB;EACD,CAAC;AAGJ,KAAI,MAAM,QAAQ,MAAM,CACtB,QAAO,WAAW;EAAE;EAAS;EAAO,CAAC;AAGvC,KAAI,iBAAiB,KAAK;AACxB,MAAI,QAAQ,QAAQ,IAAI,MAAM,CAC5B,QAAO,CAAC,eAAe;AAGzB,UAAQ,QAAQ,IAAI,MAAM;EAC1B,MAAM,YAAY,WAAW;GAAE;GAAS,OAAO,CAAC,GAAG,MAAM;GAAE,CAAC;AAC5D,UAAQ,QAAQ,OAAO,MAAM;AAE7B,SAAO;;AAGT,KAAI,iBAAiB,KAAK;AACxB,MAAI,QAAQ,QAAQ,IAAI,MAAM,CAC5B,QAAO,GAAG,iBAAiB,MAAM;AAGnC,UAAQ,QAAQ,IAAI,MAAM;EAG1B,MAAM,WAAW,OAAO,OAAO,KAAK;AAEpC,OAAK,MAAM,CAAC,GAAG,MAAM,MAAM,SAAS,CAClC,UAAS,OAAO,EAAE,IAAI;EAGxB,MAAM,YAAY,YAAY;GAAE;GAAS,OAAO;GAAU,CAAC;AAC3D,UAAQ,QAAQ,OAAO,MAAM;AAE7B,SAAO;;AAOT,KAAI,iBAAiB,QACnB,QAAO;AAGT,KAAI,iBAAiB,QACnB,QAAO;AAGT,KAAI,iBAAiB,KACnB,QAAO,MAAM,aAAa;AAG5B,KAAI,iBAAiB,MACnB,QAAO,WAAW,MAAM,QAAQ;AAGlC,KAAI,OAAO,UAAU,SACnB,QAAO,YAAY;EAAE;EAAgB;EAAkC,CAAC;AAG1E,QAAO;;;AAKT,MAAa,mBAAmB,EAC9B,WACA,WACA,YACoD;AAOpD,QAAO,YAAY;EAAE,SANS;GAC5B,gBAAgB,UAAU,KAAK,UAAU,MAAM,aAAa,CAAC;GAC7D;GACA,yBAAS,IAAI,SAAiB;GAC/B;EAE6B;EAAO,CAAC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;ACjLxC,MAAa,iBAAiB,SAA6C;AACzE,KAAI,KAAK,WAAW,EAClB,QAAO,EAAE;AAGX,KACE,KAAK,WAAW,KAChB,OAAO,KAAK,OAAO,YACnB,KAAK,OAAO,QACZ,CAAC,MAAM,QAAQ,KAAK,GAAG,CAGvB,QAAO,KAAK;CAId,MAAMC,SAAkC,EAAE;AAE1C,MAAK,IAAI,IAAI,GAAG,IAAI,KAAK,QAAQ,IAC/B,QAAO,MAAM,OAAO,KAAK;AAG3B,QAAO;;;;;;;;;;;;AClCT,MAAa,sBAAsB,EACjC,WACA,WACA,YAEA,gBAAgB;CACd;CACA;CACA,OAAO,EAAE,QAAQ,OAAO;CACzB,CAAC,CAAC;;;;ACXL,MAAM,kBAAkB,UAAoC;AAC1D,KAAI,iBAAiB,MACnB,QAAO;EAAE,SAAS,MAAM;EAAS,MAAM,MAAM;EAAM,OAAO,MAAM;EAAO;AAEzE,QAAO;EAAE,SAAS,OAAO,MAAM;EAAE,MAAM;EAAgB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AA2EzD,MAAa,sBAAiE,EAC5E,IACA,cACA,oBACA,gBACoC;CACpC,MAAM,WAAW,GAAG,SAAoB;EACtC,MAAM,OAAOC,WAAS;AAEtB,MAAI,CAAC,KACH,QAAO,GAAG,GAAG,KAAK;AAGpB,MAAI,CAAC,KAAK,gBAAgB,OAAO,QAC/B,QAAO,GAAG,GAAG,KAAK;EAGpB,MAAM,kBAAkB,KAAK;EAC7B,MAAM,QAAQ,KAAK,MAAM,KAAK;EAE9B,MAAMC,YACJ;GACE,eAAe,KAAK;GACpB;GACA,YAAY,gBAAgB;IAC1B,WAAW,gBAAgB,OAAO;IAClC;IACA,OAAO,cAAc,KAAK;IAC3B,CAAC;GACF,cAAc,KAAK;GACnB,YAAY,KAAK;GAGjB,QAAQ;GACR,gBAAgB,MAAM,QAAQ,iBAAiB,MAAM,MAAM,GAAG;GAC9D,WAAW,cAAc;GACzB,QAAQ,MAAM,MAAM,MAAM;GAC3B;AAEH,kBAAgB,YAAY;GAC1B,GAAG;GACH,OAAO;GACP,4BAAW,IAAI,MAAM,EAAC,aAAa;GACpC,CAAC;AAEF,MAAI;GACF,MAAM,SAAS,GAAG,GAAG,KAAK;AAE1B,OAAI,kBAAkB,QACpB,QAAO,OACJ,MAAM,UAAU;AACf,oBAAgB,YAAY;KAC1B,GAAG;KACH,OAAO;KACP,eAAe,mBAAmB;MAChC,WAAW,gBAAgB,OAAO;MAClC;MACA;MACD,CAAC;KACF,4BAAW,IAAI,MAAM,EAAC,aAAa;KACpC,CAAC;AAEF,WAAO;KACP,CACD,OAAO,UAAU;AAChB,oBAAgB,YAAY;KAC1B,GAAG;KACH,OAAO;KACP,eAAe,eAAe,MAAM;KACpC,4BAAW,IAAI,MAAM,EAAC,aAAa;KACpC,CAAC;AACF,UAAM;KACN;AAGN,mBAAgB,YAAY;IAC1B,GAAG;IACH,OAAO;IACP,eAAe,mBAAmB;KAChC,WAAW,gBAAgB,OAAO;KAClC;KACA,OAAO;KACR,CAAC;IACF,4BAAW,IAAI,MAAM,EAAC,aAAa;IACpC,CAAC;AAEF,UAAO;WACA,OAAO;AACd,mBAAgB,YAAY;IAC1B,GAAG;IACH,OAAO;IACP,eAAe,eAAe,MAAM;IACpC,4BAAW,IAAI,MAAM,EAAC,aAAa;IACpC,CAAC;AAEF,SAAM;;;AAIV,QAAO;;;;;;ACvLT,MAAE,kBAAsB,WAAwB;CAG9C,MAAE,4BAAgB,MAAA,KAAA,CAAA;gBAGlB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AC6BF,MAAG,0BACD,EAAA,UAAY,MAAC,yCAES;CACtB,MAAM,OAAA,QAAA,OAAsB;CAE5B,MAAG,sBAAO,IAAI,MAAQ;CACtB,MAAM,uBAAc,KAAA,MAAoB,KAAC,CAAA,wBAAM,EAAA;kDAI5C,YAAO,CAAA,QAAQ,aAAY,QAAS,YAAS,IAChD;AAGA,KAAI,YAAA,WAAA,qBAAA,OACJ,MAAA,MAAA,IAAA,qCAEA,CAAA;CAGA,MAAE,QAAO,YAAS,MAAA,YAAA,QAAA,OAAA,SAAA,MAAA,CAAA;YAGhB;AAIF,KAAI,WAAA,MAAA,WAAsB;EACxB,MAAE,gBAAA,YAAA,QAAA,MAAA,MAAA,MAAA;AACJ,OAAA,MAAA,IAAA,uCAEA,CAAA;;;;;;;;;;;;;;;;;;;ACzEF,IAAa,WAAb,MAAa,iBAAiB,UAAU;CACtC;CAGA,YAAY,SAAiB,MAAc,QAAgB;AACzD,QAAM;GACJ,OAAO;GACP;GACA,SAAS;GACT,MAAM;GACN,cAAc;GACf,CAAC;AAEF,OAAK,SAAS;;CAGhB,aAAa,aAAa,UAAoB;AAC5C,MAAI;GACF,MAAM,YAAY,MAAM,SAAS,OAAO,CAAC,MAAM;AAE/C,OACE,aACA,WAAW,aACX,OAAO,UAAU,UAAU,UAC3B;IACA,MAAM,YACJ,UAAU,aAAa,OAAO,UAAU,SAAS,WAC7C,UAAU,OACV;AAEN,WAAO,IAAI,SAAS,UAAU,OAAO,WAAW,SAAS,OAAO;;AAGlE,UAAO;UACD;AACN,UAAO;;;;;;;ACnCb,IAAa,2BAAb,cAA8C,UAAU;CACtD,YAAY,EAAE,SAA6C;AACzD,QAAM;GACJ;GACA,MAAM;GACN,SACE;GACF,MAAM;GACN,cAAc;GACf,CAAC;;;;;;ACTN,IAAa,sBAAb,cAAyC,UAAU;CACjD,YAAY,EAAE,SAA6C;AACzD,QAAM;GACJ;GACA,MAAM;GACN,SAAS;GACT,MAAM;GACN,cACE;GACH,CAAC;;;;;;ACTN,IAAa,qBAAb,cAAwC,UAAU;CAChD,YAAY,EAAE,SAA6C;AACzD,QAAM;GACJ;GACA,MAAM;GACN,SAAS;GACT,MAAM;GACN,cAAc;GACf,CAAC;;;;;;ACRN,IAAa,sBAAb,cAAyC,UAAU;CACjD,YAAY,EAAE,SAA6C;AACzD,QAAM;GACJ;GACA,MAAM;GACN,SAAS;GACT,MAAM;GACN,cAAc;GACf,CAAC;;;;;;ACRN,IAAa,sCAAb,cAAyD,UAAU;CACjE,YAAY,EAAE,SAA6C;AACzD,QAAM;GACJ;GACA,MAAM;GACN,SACE;GACF,MAAM;GACN,cACE;GACH,CAAC;;;;;;;;;;;;;;;;;;;;;;;;;;ACgBN,MAAaC,qBAAkC,UAAU;AACvD,KAAI,iBAAiB,UAAU;AAC7B,MAAI,MAAM,SAAS,mBACjB,QAAO,IAAI,mBAAmB,EAAE,OAAO,OAAO,CAAC;AAGjD,MAAI,MAAM,SAAS,mBACjB,QAAO,IAAI,oBAAoB,EAAE,OAAO,OAAO,CAAC;AAGlD,MAAI,MAAM,SAAS,wBACjB,QAAO,IAAI,yBAAyB,EAAE,OAAO,OAAO,CAAC;AAGvD,MAAI,MAAM,SAAS,oCACjB,QAAO,IAAI,oCAAoC,EAAE,OAAO,OAAO,CAAC;AAGlE,MACE,MAAM,SAAS,4BACf,MAAM,SAAS,wBAEf,QAAO,IAAI,oBAAoB,EAAE,OAAO,OAAO,CAAC;;AAIpD,QAAO;;;;;;;;;;;;;ACpCT,MAAa,qCAAqC,EAChD,eAAe,EAAE,QAC0C,EAC3D,MAAM,OAAO,YAA6B;AACxC,KAAI,QAAQ,SAAS,UAAU,KAAK;EAClC,MAAM,WAAW,MAAM,SAAS,aAAa,QAAQ,SAAS;AAE9D,MAAI,UAAU;GACZ,IAAIC,eAAsB;AAE1B,QAAK,MAAM,UAAU,cAAc;IACjC,MAAM,WAAW,OAAO,SAAS;AAEjC,QAAI,UAAU;AACZ,oBAAe;AACf;;;AAIJ,SAAM;;;AAIV,QAAO,QAAQ;GAElB;;;;;;;;;;;;AC5BD,MAAE,WAAa,OACb;CAEA,MAAI,OAAK,QAAY,OAAA;CACrB,MAAE,OAAO,KAAS,MAAC,KAAU,CAAC;AAE9B,KAAE,KAAK,SAAW,GAAC;;AAGjB,OAAE,MAAK,IAAA,EAAA,kBAA2B,WAAA,CAAA;4BAGlC,CAAO,oBAAK,OAAA;AAGd,SAAM;;AAGP,OAAA,oBAAA,OAAA;;;;;;;;;;;;;;;;;;;ACzBD,MAAE,kBAAsB,kBAEpB;CACF,MAAM,EAAA,cAAW,aAAU,QAAc,OAAO;;;;;kBAOhD,QAAM;;MAKW,MAAY,SAAQ,aAAA,QAAA,CAGrC,OAAO,SAAA,YAAA,QAAA;AAGP,QAAC;EACF,oBAAA,SAAA,aAAA,QAAA;;;;;;;;;;;;;;;;;;;;ACpBD,MAAE,0CAAkC,kBAEF;;AAGhC,eAAc,iBAAM,6BAAwC;;;;;;6BAQ5D,QAAM,EAAA;;CAKN,MAAM,QAAA,MAAY,mBAAM,OAAY;CAEpC,MAAM,cAAC,MAAA,aAAA,KAAA,MAAA;CACP,MAAK,YAAQ,MAAO,aAAa,cAAA;AAEjC,QAAK;EACJ,0BAAA;EACF,8BAAA;;;;;;;;;;;;;;;;;;;;ACxBD,MAAE,0CACA,WACM;AACN,QAAO,EACL,KAAI,OAAA,YAAA;;;;AAIF,MACE,qCAAkC,QAAA,IAAA,IAClC,CAAC,gBAAC,OAAA,EACF;uFAEA,OACC;AAED,UAAI;IACF,MAAM;KACJ,GAAG,QAAE;KACL,SAAC;MACF,GAAA,QAAA,KAAA;MACG,GAAC;MACN;KACH;;IAEA;;;;;;;;;;;;;;;;;;;AClCN,IAAa,oBAAb,cAAuC,UAAU;CAC/C,YAAY,EAAE,SAA6C;AACzD,QAAM;GACJ;GACA,MAAM;GACN,SAAS;GACT,MAAM;GACN,cAAc;GACf,CAAC;;;;;;;ACLN,MAAa,sCAAkD,EAC7D,MAAM,OAAO,YAA6B;AACxC,KAAI,QAAQ,SAAS,WAAW,KAAK;EACnC,IAAIC,QAAsB;AAE1B,MAAI;GACF,MAAM,YAAY,MAAM,QAAQ,SAAS,OAAO,CAAC,MAAM;AAEvD,OACE,aACA,WAAW,aACX,OAAO,UAAU,UAAU,SAG3B,SAAQ,IAAI,MAAM,UAAU,MAAM;UAE9B;AAIR,QAAM,IAAI,kBAAkB,EAAE,OAAO,CAAC;;AAGxC,QAAO,QAAQ;GAElB;;;;;;;;;;ACqBD,MAAK,mBACH,UAA4B,EAAA,EAC5B;CAEA,MAAM,OAAA,QAAU,OAAY;CAC5B,MAAE,YAAe,KAAA,MAAU,KAAA;CAE3B,MAAK,WAAgB;EACnB,UAAG,KAAA;EACH,SAAG;GACD,gBAAC;IACA,6BAA6B,OAAG;IAChC,4BAAsB,aAAA,EAAA,QAAA,IAAA,CAAA;IACtB,gCAAiB,KAAA;IACnB,6BAAA,GAAA,gBAAA,GAAA;GACF,GAAA,KAAA,eAAA;;GAEE;EACF;kBAGC,UAAS,QAAA,gBAAmB,UAAe,OAAO;uDAIlD,UAAS,cAAC;mDAIV,UAAS,QAAC,oBAA0B,UAAA;AAGtC,KAAI,QAAA,0BAAA;EACF,MAAC,gBAAA,iCACC,EAAE,OAAA,QAAe,0BAAA,EACjB,OACF;AACF,MAAA;;CAKA,MAAG,mBAAsB,yBAAe,OAAM,EAAG;CAIjD,MAAI,kCACF,SAAS,QAAQ,+BAA6B;0DAGhD,UAAW,QAAM,6BAAA;AAGjB,QAAI,IAAA,OACF,IAAE,cAAY;EACZ,GAAE;EACF,UAAE,KAAA;EACF,YAAI;GACF,iDAAE,OAAA;GACF,kCAA8B,EAC/B,cAAA,CAAA,GAAA,QAAA,gBAAA,EAAA,EAAA,kBAAA,EACF,CAAA;GACF,8BAAA;GACF;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AC/FD,MAAa,sBAAsB,OACjC,WACkB;CAClB,MAAM,OAAO,QAAQ,OAAO;CAE5B,MAAM,EAAE,kBAAkB;CAI1B,MAAM,EAAE,WAAW,MAFDC,0BAAgB,EAAE,EAAE,OAAO,CAEV,UAAU;EAC3C,OAAO;EACP;EACD,CAAC;CAEF,MAAM,WAAW,KAAK,MAAM,KAAK,CAAC;AAElC,MAAK,MAAM,IAAI;EACb,kBAAkB,CAAC,GAAG,UAAU,GAAG,OAAO;EAC1C,4BAA4B,KAAK,KAAK,GAAG;EAC1C,CAAC;;;;;AC7BJ,MAAaC,kBAA4C;CACvD,MAAM;EACJ,cAAc;EACd,gBAAgB;EAChB,6BAA6B;EAC9B;CACD,MAAM;EACJ,cAAc;EACd,gBAAgB;EAChB,6BAA6B;EAC9B;CACD,OAAO;EACL,cAAc;EACd,gBAAgB;EAChB,6BAA6B;EAC9B;CACD,KAAK;EACH,cAAc;EACd,gBAAgB;EAChB,6BAA6B;EAC9B;CACD,QAAQ;EACN,cAAc;EACd,gBAAgB;EAChB,6BAA6B;EAC9B;CACD,SAAS;EACP,cAAc;EACd,gBAAgB;EAChB,6BAA6B;EAC9B;CACD,KAAK;EACH,cAAc;EAEd,gBAAgB;EAChB,6BAA6B;EAC9B;CACD,MAAM;EACJ,cAAc;EACd,gBAAgB;EAChB,6BAA6B;EAC9B;CACD,UAAU;EACR,cAAc;EACd,gBAAgB;EAChB,6BAA6B;EAC9B;CACD,KAAK;EACH,cAAc;EACd,gBAAgB;EAChB,6BAA6B;EAC7B,uBAAuB;EACxB;CACD,OAAO;EACL,cAAc;EACd,gBAAgB;EAChB,6BAA6B;EAC9B;CACD,OAAO;EACL,cAAc;EACd,gBAAgB;EAChB,6BAA6B;EAC9B;CACD,SAAS;EACP,cAAc;EACd,gBAAgB;EAChB,6BAA6B;EAC9B;CACD,KAAK;EACH,cAAc;EACd,gBAAgB;EAChB,6BAA6B;EAC9B;CACD,OAAO;EACL,cAAc;EACd,gBAAgB;EAChB,6BAA6B;EAC9B;CACD,KAAK;EACH,cAAc;EACd,gBAAgB;EAChB,6BAA6B;EAC9B;CACD,MAAM;EACJ,cAAc;EACd,gBAAgB;EAChB,6BAA6B;EAC9B;CACF;;;;;ACxFD,MAAE,mEAEM;CAGN,MAAI,QAFO,OAAA,KAAA,gBAAA,CAEP,MACH,qEAED;AAGD,eAAA,OAAA,kBAAA,0BAAA;;;;;;;;;;;;;;;;;;AClBD,MAAa,uBAAuB,aAAa;AAEjD,MAAa,4BACX;;;;ACHF,MAAa,4BAA4B;AACzC,MAAa,sCACX;AAEF,MAAa,wBAAwB;CACnC,aAAa;CACb,MAAM,GAAG,0BAA0B;CACnC,sBAAsB;CACvB;;;;ACRD,IAAa,oBAAb,cAAuC,UAAU;CAE/C,YAAY,SAAiB;AAC3B,QAAM;GACJ,OAAO;GACP,MAAM;GACN,SAAS;GACT,MAAM;GACN,cAAc;GACf,CAAC"}
|