@dynamic-labs-sdk/client 0.7.0 → 0.9.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{constants-DL47U-Dx.cjs.js → InvalidParamError-D1yNl3r1.cjs.js} +25 -4
- package/dist/InvalidParamError-D1yNl3r1.cjs.js.map +1 -0
- package/dist/{constants-bfXJY5_7.esm.js → InvalidParamError-DMz6QY8e.esm.js} +19 -4
- package/dist/InvalidParamError-DMz6QY8e.esm.js.map +1 -0
- package/dist/{NotWaasWalletAccountError-DwwtYtDl.esm.js → NotWaasWalletAccountError-Cp3qfAxw.esm.js} +3 -3
- package/dist/{NotWaasWalletAccountError-DwwtYtDl.esm.js.map → NotWaasWalletAccountError-Cp3qfAxw.esm.js.map} +1 -1
- package/dist/{NotWaasWalletAccountError-Dsl53Rdk.cjs.js → NotWaasWalletAccountError-s2J7fQHr.cjs.js} +7 -7
- package/dist/{NotWaasWalletAccountError-Dsl53Rdk.cjs.js.map → NotWaasWalletAccountError-s2J7fQHr.cjs.js.map} +1 -1
- package/dist/client/core/createCore/createCore.d.ts.map +1 -1
- package/dist/client/core/createCore/getInitialState.d.ts.map +1 -1
- package/dist/client/core/types/DynamicCore.d.ts +15 -0
- package/dist/client/core/types/DynamicCore.d.ts.map +1 -1
- package/dist/client/core/types/DynamicCoreConfig.d.ts +1 -1
- package/dist/client/core/types/DynamicCoreConfig.d.ts.map +1 -1
- package/dist/client/types/DynamicClientConfig.d.ts +46 -0
- package/dist/client/types/DynamicClientConfig.d.ts.map +1 -1
- package/dist/core.cjs.js +43 -34
- package/dist/core.cjs.js.map +1 -1
- package/dist/core.esm.js +16 -9
- package/dist/core.esm.js.map +1 -1
- package/dist/errors/base/BaseError.d.ts.map +1 -1
- package/dist/exports/core.d.ts +6 -0
- package/dist/exports/core.d.ts.map +1 -1
- package/dist/exports/index.d.ts +4 -1
- package/dist/exports/index.d.ts.map +1 -1
- package/dist/exports/waas.d.ts +6 -0
- package/dist/exports/waas.d.ts.map +1 -1
- package/dist/{getNetworkProviderFromNetworkId-CdU8ydLW.cjs.js → getNetworkProviderFromNetworkId-BXGwNlcZ.cjs.js} +129 -45
- package/dist/getNetworkProviderFromNetworkId-BXGwNlcZ.cjs.js.map +1 -0
- package/dist/{getNetworkProviderFromNetworkId-B76p2y0m.esm.js → getNetworkProviderFromNetworkId-CmLsKY7E.esm.js} +88 -24
- package/dist/getNetworkProviderFromNetworkId-CmLsKY7E.esm.js.map +1 -0
- package/dist/{getSignedSessionId-DPA3pcv4.cjs.js → getSignedSessionId-BO9omMlI.cjs.js} +8 -8
- package/dist/{getSignedSessionId-DPA3pcv4.cjs.js.map → getSignedSessionId-BO9omMlI.cjs.js.map} +1 -1
- package/dist/{getSignedSessionId-CLTjlTqR.esm.js → getSignedSessionId-BvQ4i928.esm.js} +3 -3
- package/dist/{getSignedSessionId-CLTjlTqR.esm.js.map → getSignedSessionId-BvQ4i928.esm.js.map} +1 -1
- package/dist/{getVerifiedCredentialForWalletAccount-C2Qm59Tk.esm.js → getVerifiedCredentialForWalletAccount-54lCppnJ.esm.js} +113 -3
- package/dist/getVerifiedCredentialForWalletAccount-54lCppnJ.esm.js.map +1 -0
- package/dist/{getVerifiedCredentialForWalletAccount-eZh6gV0A.cjs.js → getVerifiedCredentialForWalletAccount-BW8iluei.cjs.js} +140 -30
- package/dist/getVerifiedCredentialForWalletAccount-BW8iluei.cjs.js.map +1 -0
- package/dist/index.cjs.js +326 -267
- package/dist/index.cjs.js.map +1 -1
- package/dist/index.esm.js +85 -28
- package/dist/index.esm.js.map +1 -1
- package/dist/{isMfaRequiredForAction-DAKEY8s9.esm.js → isMfaRequiredForAction-DIvUT6_k.esm.js} +2 -2
- package/dist/{isMfaRequiredForAction-DAKEY8s9.esm.js.map → isMfaRequiredForAction-DIvUT6_k.esm.js.map} +1 -1
- package/dist/{isMfaRequiredForAction-D2oHITVq.cjs.js → isMfaRequiredForAction-DmYvEIJH.cjs.js} +9 -9
- package/dist/{isMfaRequiredForAction-D2oHITVq.cjs.js.map → isMfaRequiredForAction-DmYvEIJH.cjs.js.map} +1 -1
- package/dist/modules/auth/decodeJwt/decodeJwt.d.ts +26 -0
- package/dist/modules/auth/decodeJwt/decodeJwt.d.ts.map +1 -0
- package/dist/modules/auth/decodeJwt/index.d.ts +2 -0
- package/dist/modules/auth/decodeJwt/index.d.ts.map +1 -0
- package/dist/modules/auth/getElevatedAccessToken/getElevatedAccessToken.d.ts +30 -0
- package/dist/modules/auth/getElevatedAccessToken/getElevatedAccessToken.d.ts.map +1 -0
- package/dist/modules/auth/getElevatedAccessToken/index.d.ts +2 -0
- package/dist/modules/auth/getElevatedAccessToken/index.d.ts.map +1 -0
- package/dist/modules/auth/state.d.ts +13 -0
- package/dist/modules/auth/state.d.ts.map +1 -1
- package/dist/modules/auth/updateAuthFromVerifyResponse/elevatedAccessTokens/elevatedAccessTokens.types.d.ts +10 -0
- package/dist/modules/auth/updateAuthFromVerifyResponse/elevatedAccessTokens/elevatedAccessTokens.types.d.ts.map +1 -0
- package/dist/modules/auth/updateAuthFromVerifyResponse/elevatedAccessTokens/normalizeScopes/index.d.ts +2 -0
- package/dist/modules/auth/updateAuthFromVerifyResponse/elevatedAccessTokens/normalizeScopes/index.d.ts.map +1 -0
- package/dist/modules/auth/updateAuthFromVerifyResponse/elevatedAccessTokens/normalizeScopes/normalizeScopes.d.ts +9 -0
- package/dist/modules/auth/updateAuthFromVerifyResponse/elevatedAccessTokens/normalizeScopes/normalizeScopes.d.ts.map +1 -0
- package/dist/modules/auth/updateAuthFromVerifyResponse/elevatedAccessTokens/parseElevatedAccessToken/index.d.ts +2 -0
- package/dist/modules/auth/updateAuthFromVerifyResponse/elevatedAccessTokens/parseElevatedAccessToken/index.d.ts.map +1 -0
- package/dist/modules/auth/updateAuthFromVerifyResponse/elevatedAccessTokens/parseElevatedAccessToken/parseElevatedAccessToken.d.ts +17 -0
- package/dist/modules/auth/updateAuthFromVerifyResponse/elevatedAccessTokens/parseElevatedAccessToken/parseElevatedAccessToken.d.ts.map +1 -0
- package/dist/modules/auth/updateAuthFromVerifyResponse/elevatedAccessTokens/upsertElevatedAccessToken/index.d.ts +2 -0
- package/dist/modules/auth/updateAuthFromVerifyResponse/elevatedAccessTokens/upsertElevatedAccessToken/index.d.ts.map +1 -0
- package/dist/modules/auth/updateAuthFromVerifyResponse/elevatedAccessTokens/upsertElevatedAccessToken/upsertElevatedAccessToken.d.ts +17 -0
- package/dist/modules/auth/updateAuthFromVerifyResponse/elevatedAccessTokens/upsertElevatedAccessToken/upsertElevatedAccessToken.d.ts.map +1 -0
- package/dist/modules/auth/updateAuthFromVerifyResponse/updateAuthFromVerifyResponse.d.ts.map +1 -1
- package/dist/modules/deviceRegistration/detectDeviceRegistrationRedirect/detectDeviceRegistrationRedirect.d.ts +1 -1
- package/dist/modules/deviceRegistration/{getDeviceTokenFromUrl/getDeviceTokenFromUrl.d.ts → getDeviceRegistrationTokenFromUrl/getDeviceRegistrationTokenFromUrl.d.ts} +3 -3
- package/dist/modules/deviceRegistration/getDeviceRegistrationTokenFromUrl/getDeviceRegistrationTokenFromUrl.d.ts.map +1 -0
- package/dist/modules/deviceRegistration/getDeviceRegistrationTokenFromUrl/index.d.ts +2 -0
- package/dist/modules/deviceRegistration/getDeviceRegistrationTokenFromUrl/index.d.ts.map +1 -0
- package/dist/modules/user/isUserOnboardingComplete/index.d.ts +2 -0
- package/dist/modules/user/isUserOnboardingComplete/index.d.ts.map +1 -0
- package/dist/modules/user/isUserOnboardingComplete/isUserOnboardingComplete.d.ts +12 -0
- package/dist/modules/user/isUserOnboardingComplete/isUserOnboardingComplete.d.ts.map +1 -0
- package/dist/modules/waas/createWaasProvider/createWaasProvider.d.ts.map +1 -1
- package/dist/modules/waas/createWaasWalletAccounts/createWaasWalletAccounts.d.ts +26 -3
- package/dist/modules/waas/createWaasWalletAccounts/createWaasWalletAccounts.d.ts.map +1 -1
- package/dist/modules/waas/getWalletRecoveryState/getWalletRecoveryState.d.ts +16 -0
- package/dist/modules/waas/getWalletRecoveryState/getWalletRecoveryState.d.ts.map +1 -0
- package/dist/modules/waas/getWalletRecoveryState/index.d.ts +2 -0
- package/dist/modules/waas/getWalletRecoveryState/index.d.ts.map +1 -0
- package/dist/modules/waas/isWalletCreationRequirement/isWalletCreationRequirement.d.ts +11 -0
- package/dist/modules/waas/isWalletCreationRequirement/isWalletCreationRequirement.d.ts.map +1 -0
- package/dist/modules/waas/normalizeWalletRequirements/normalizeWalletRequirements.d.ts +19 -0
- package/dist/modules/waas/normalizeWalletRequirements/normalizeWalletRequirements.d.ts.map +1 -0
- package/dist/modules/waas/unlockWallet/index.d.ts +2 -0
- package/dist/modules/waas/unlockWallet/index.d.ts.map +1 -0
- package/dist/modules/waas/unlockWallet/unlockWallet.d.ts +17 -0
- package/dist/modules/waas/unlockWallet/unlockWallet.d.ts.map +1 -0
- package/dist/modules/waas/waas.types.d.ts +23 -1
- package/dist/modules/waas/waas.types.d.ts.map +1 -1
- package/dist/modules/wallets/networks/getNetworksData/getNetworksData.d.ts +4 -0
- package/dist/modules/wallets/networks/getNetworksData/getNetworksData.d.ts.map +1 -1
- package/dist/services/crossTabBroadcast/createCrossTabBroadcast/createCrossTabBroadcast.d.ts +19 -0
- package/dist/services/crossTabBroadcast/createCrossTabBroadcast/createCrossTabBroadcast.d.ts.map +1 -0
- package/dist/services/crossTabBroadcast/createCrossTabBroadcast/index.d.ts +2 -0
- package/dist/services/crossTabBroadcast/createCrossTabBroadcast/index.d.ts.map +1 -0
- package/dist/services/crossTabBroadcast/crossTabBroadcast.schema.d.ts +8 -0
- package/dist/services/crossTabBroadcast/crossTabBroadcast.schema.d.ts.map +1 -0
- package/dist/services/crossTabBroadcast/crossTabBroadcast.types.d.ts +35 -0
- package/dist/services/crossTabBroadcast/crossTabBroadcast.types.d.ts.map +1 -0
- package/dist/services/crossTabBroadcast/index.d.ts +3 -0
- package/dist/services/crossTabBroadcast/index.d.ts.map +1 -0
- package/dist/services/deviceSigner/deviceSigner.types.d.ts +21 -0
- package/dist/services/deviceSigner/deviceSigner.types.d.ts.map +1 -0
- package/dist/services/deviceSigner/index.d.ts +2 -0
- package/dist/services/deviceSigner/index.d.ts.map +1 -0
- package/dist/tsconfig.lib.tsbuildinfo +1 -1
- package/dist/waas.cjs.js +150 -47
- package/dist/waas.cjs.js.map +1 -1
- package/dist/waas.esm.js +123 -24
- package/dist/waas.esm.js.map +1 -1
- package/dist/waasCore.cjs.js +39 -20
- package/dist/waasCore.cjs.js.map +1 -1
- package/dist/waasCore.esm.js +28 -9
- package/dist/waasCore.esm.js.map +1 -1
- package/package.json +3 -3
- package/dist/InvalidParamError-BRozID7g.esm.js +0 -18
- package/dist/InvalidParamError-BRozID7g.esm.js.map +0 -1
- package/dist/InvalidParamError-BpTA89Mf.cjs.js +0 -23
- package/dist/InvalidParamError-BpTA89Mf.cjs.js.map +0 -1
- package/dist/constants-DL47U-Dx.cjs.js.map +0 -1
- package/dist/constants-bfXJY5_7.esm.js.map +0 -1
- package/dist/filterDuplicates-C1MD6p_l.esm.js +0 -10
- package/dist/filterDuplicates-C1MD6p_l.esm.js.map +0 -1
- package/dist/filterDuplicates-DPNky3ug.cjs.js +0 -16
- package/dist/filterDuplicates-DPNky3ug.cjs.js.map +0 -1
- package/dist/getNetworkProviderFromNetworkId-B76p2y0m.esm.js.map +0 -1
- package/dist/getNetworkProviderFromNetworkId-CdU8ydLW.cjs.js.map +0 -1
- package/dist/getVerifiedCredentialForWalletAccount-C2Qm59Tk.esm.js.map +0 -1
- package/dist/getVerifiedCredentialForWalletAccount-eZh6gV0A.cjs.js.map +0 -1
- package/dist/modules/deviceRegistration/getDeviceTokenFromUrl/getDeviceTokenFromUrl.d.ts.map +0 -1
- package/dist/modules/deviceRegistration/getDeviceTokenFromUrl/index.d.ts +0 -2
- package/dist/modules/deviceRegistration/getDeviceTokenFromUrl/index.d.ts.map +0 -1
package/dist/waas.cjs.js
CHANGED
|
@@ -1,13 +1,12 @@
|
|
|
1
|
-
const require_getNetworkProviderFromNetworkId = require('./getNetworkProviderFromNetworkId-
|
|
2
|
-
const
|
|
3
|
-
const require_getVerifiedCredentialForWalletAccount = require('./getVerifiedCredentialForWalletAccount-
|
|
4
|
-
const require_NotWaasWalletAccountError = require('./NotWaasWalletAccountError-
|
|
5
|
-
const require_filterDuplicates = require('./filterDuplicates-DPNky3ug.cjs.js');
|
|
1
|
+
const require_getNetworkProviderFromNetworkId = require('./getNetworkProviderFromNetworkId-BXGwNlcZ.cjs.js');
|
|
2
|
+
const require_InvalidParamError = require('./InvalidParamError-D1yNl3r1.cjs.js');
|
|
3
|
+
const require_getVerifiedCredentialForWalletAccount = require('./getVerifiedCredentialForWalletAccount-BW8iluei.cjs.js');
|
|
4
|
+
const require_NotWaasWalletAccountError = require('./NotWaasWalletAccountError-s2J7fQHr.cjs.js');
|
|
6
5
|
let _dynamic_labs_sdk_assert_package_version = require("@dynamic-labs-sdk/assert-package-version");
|
|
7
6
|
let _dynamic_labs_sdk_api_core = require("@dynamic-labs/sdk-api-core");
|
|
8
7
|
|
|
9
8
|
//#region src/errors/NotWaasWalletProviderError.ts
|
|
10
|
-
var NotWaasWalletProviderError = class extends
|
|
9
|
+
var NotWaasWalletProviderError = class extends require_InvalidParamError.BaseError {
|
|
11
10
|
constructor({ walletProviderKey }) {
|
|
12
11
|
super({
|
|
13
12
|
cause: null,
|
|
@@ -40,13 +39,54 @@ const getWaasWalletProviderFromWalletAccount = ({ walletAccount }, client) => {
|
|
|
40
39
|
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
41
40
|
* @returns A promise that resolves when the backup process is complete.
|
|
42
41
|
*/
|
|
43
|
-
const backupWaasKeySharesToGoogleDrive = async ({ password, walletAccount }, client =
|
|
42
|
+
const backupWaasKeySharesToGoogleDrive = async ({ password, walletAccount }, client = require_InvalidParamError.getDefaultClient()) => {
|
|
44
43
|
return getWaasWalletProviderFromWalletAccount({ walletAccount }, client).backupKeySharesToGoogleDrive({
|
|
45
44
|
password,
|
|
46
45
|
walletAccount
|
|
47
46
|
});
|
|
48
47
|
};
|
|
49
48
|
|
|
49
|
+
//#endregion
|
|
50
|
+
//#region src/modules/waas/isWalletCreationRequirement/isWalletCreationRequirement.ts
|
|
51
|
+
/**
|
|
52
|
+
* Type guard to check if an item is a WalletCreationRequirement object.
|
|
53
|
+
* Chain values are strings, so we can distinguish by checking if it's an object with a 'chain' property.
|
|
54
|
+
*
|
|
55
|
+
* @param item - The item to check, either a WalletCreationRequirement or Chain string
|
|
56
|
+
* @returns True if the item is a WalletCreationRequirement object
|
|
57
|
+
*/
|
|
58
|
+
const isWalletCreationRequirement = (item) => typeof item === "object" && item !== null && "chain" in item;
|
|
59
|
+
|
|
60
|
+
//#endregion
|
|
61
|
+
//#region src/modules/waas/normalizeWalletRequirements/normalizeWalletRequirements.ts
|
|
62
|
+
const DEFAULT_BITCOIN_ADDRESS_TYPE = "native_segwit";
|
|
63
|
+
/**
|
|
64
|
+
* Normalizes wallet creation input from either legacy Chain[] format
|
|
65
|
+
* or new WalletCreationRequirement[] format to WalletCreationRequirement[].
|
|
66
|
+
*
|
|
67
|
+
* For BTC chains without explicit bitcoinConfig, defaults to native_segwit.
|
|
68
|
+
*
|
|
69
|
+
* @param params.input - Either an array of Chain strings or WalletCreationRequirement objects
|
|
70
|
+
* @param params.defaultBitcoinConfig - Optional default bitcoin config to use for BTC chains when converting from legacy format
|
|
71
|
+
* @returns Array of WalletCreationRequirement objects
|
|
72
|
+
*/
|
|
73
|
+
const normalizeWalletRequirements = ({ defaultBitcoinConfig, input }) => {
|
|
74
|
+
if (input.length === 0) return [];
|
|
75
|
+
const [firstItem] = input;
|
|
76
|
+
if (isWalletCreationRequirement(firstItem)) return input.map((requirement) => {
|
|
77
|
+
if (requirement.chain === "BTC" && !requirement.bitcoinConfig) return {
|
|
78
|
+
...requirement,
|
|
79
|
+
bitcoinConfig: { addressType: DEFAULT_BITCOIN_ADDRESS_TYPE }
|
|
80
|
+
};
|
|
81
|
+
return requirement;
|
|
82
|
+
});
|
|
83
|
+
return input.map((chain) => {
|
|
84
|
+
const requirement = { chain };
|
|
85
|
+
if (chain === "BTC") requirement.bitcoinConfig = defaultBitcoinConfig ?? { addressType: DEFAULT_BITCOIN_ADDRESS_TYPE };
|
|
86
|
+
return requirement;
|
|
87
|
+
});
|
|
88
|
+
};
|
|
89
|
+
|
|
50
90
|
//#endregion
|
|
51
91
|
//#region src/modules/waas/createWaasWalletAccounts/createWaasWalletAccounts.ts
|
|
52
92
|
/**
|
|
@@ -58,8 +98,24 @@ const backupWaasKeySharesToGoogleDrive = async ({ password, walletAccount }, cli
|
|
|
58
98
|
*
|
|
59
99
|
* @example
|
|
60
100
|
* ```ts
|
|
61
|
-
* //
|
|
62
|
-
* await createWaasWalletAccounts({ chains: ['EVM', '
|
|
101
|
+
* // Legacy format - will create wallet accounts for EVM and SOL, BTC defaults to native_segwit
|
|
102
|
+
* await createWaasWalletAccounts({ chains: ['EVM', 'SOL', 'BTC'] });
|
|
103
|
+
*
|
|
104
|
+
* // New format with chain-specific config
|
|
105
|
+
* await createWaasWalletAccounts({
|
|
106
|
+
* chains: [
|
|
107
|
+
* { chain: 'BTC', bitcoinConfig: { addressType: 'taproot' } },
|
|
108
|
+
* { chain: 'EVM' },
|
|
109
|
+
* ]
|
|
110
|
+
* });
|
|
111
|
+
*
|
|
112
|
+
* // Create both BTC address types
|
|
113
|
+
* await createWaasWalletAccounts({
|
|
114
|
+
* chains: [
|
|
115
|
+
* { chain: 'BTC', bitcoinConfig: { addressType: 'native_segwit' } },
|
|
116
|
+
* { chain: 'BTC', bitcoinConfig: { addressType: 'taproot' } },
|
|
117
|
+
* ]
|
|
118
|
+
* });
|
|
63
119
|
* ```
|
|
64
120
|
*
|
|
65
121
|
* @param params.chains - The chains to create wallet accounts for.
|
|
@@ -68,31 +124,44 @@ const backupWaasKeySharesToGoogleDrive = async ({ password, walletAccount }, cli
|
|
|
68
124
|
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
69
125
|
* @returns A promise that resolves when all wallet accounts are created.
|
|
70
126
|
*/
|
|
71
|
-
const createWaasWalletAccounts = async ({ chains, password, thresholdSignatureScheme }, client =
|
|
127
|
+
const createWaasWalletAccounts = async ({ chains, password, thresholdSignatureScheme }, client = require_InvalidParamError.getDefaultClient()) => {
|
|
128
|
+
const normalizedRequirements = normalizeWalletRequirements({ input: chains });
|
|
72
129
|
const supportedChains = [
|
|
73
130
|
"BTC",
|
|
74
131
|
"EVM",
|
|
75
132
|
"SOL",
|
|
76
133
|
"SUI"
|
|
77
134
|
];
|
|
78
|
-
const
|
|
79
|
-
if (
|
|
80
|
-
const
|
|
81
|
-
|
|
82
|
-
|
|
83
|
-
|
|
135
|
+
const filteredRequirements = normalizedRequirements.filter((requirement) => supportedChains.includes(requirement.chain));
|
|
136
|
+
if (filteredRequirements.length === 0) return;
|
|
137
|
+
const walletProviderMap = /* @__PURE__ */ new Map();
|
|
138
|
+
for (const requirement of filteredRequirements) {
|
|
139
|
+
const walletProviderKey = require_getVerifiedCredentialForWalletAccount.formatWalletProviderKey({
|
|
140
|
+
chain: requirement.chain,
|
|
141
|
+
displayName: require_InvalidParamError.DYNAMIC_WAAS_METADATA.displayName,
|
|
142
|
+
walletProviderType: _dynamic_labs_sdk_api_core.WalletProviderEnum.EmbeddedWallet
|
|
143
|
+
});
|
|
144
|
+
if (!walletProviderMap.has(walletProviderKey)) {
|
|
145
|
+
const walletProvider = require_getVerifiedCredentialForWalletAccount.getWalletProviderByKey({ walletProviderKey }, client);
|
|
146
|
+
if (!walletProvider) throw new require_getVerifiedCredentialForWalletAccount.NoWalletProviderFoundError({ walletProviderKey });
|
|
147
|
+
if (!require_getVerifiedCredentialForWalletAccount.isWaasWalletProvider(walletProvider)) throw new NotWaasWalletProviderError({ walletProviderKey });
|
|
148
|
+
walletProviderMap.set(walletProviderKey, walletProvider);
|
|
149
|
+
}
|
|
150
|
+
}
|
|
151
|
+
await Promise.all(filteredRequirements.map((requirement) => {
|
|
152
|
+
const walletProviderKey = require_getVerifiedCredentialForWalletAccount.formatWalletProviderKey({
|
|
153
|
+
chain: requirement.chain,
|
|
154
|
+
displayName: require_InvalidParamError.DYNAMIC_WAAS_METADATA.displayName,
|
|
155
|
+
walletProviderType: _dynamic_labs_sdk_api_core.WalletProviderEnum.EmbeddedWallet
|
|
156
|
+
});
|
|
157
|
+
const walletProvider = walletProviderMap.get(walletProviderKey);
|
|
158
|
+
if (!walletProvider || !require_getVerifiedCredentialForWalletAccount.isWaasWalletProvider(walletProvider)) return Promise.resolve();
|
|
159
|
+
return walletProvider.createWalletAccount({
|
|
160
|
+
bitcoinConfig: requirement.bitcoinConfig,
|
|
161
|
+
password,
|
|
162
|
+
thresholdSignatureScheme
|
|
163
|
+
});
|
|
84
164
|
}));
|
|
85
|
-
const walletProviderEntries = require_filterDuplicates.filterDuplicates(walletProviderKeys).map((walletProviderKey) => {
|
|
86
|
-
const walletProvider = require_getVerifiedCredentialForWalletAccount.getWalletProviderByKey({ walletProviderKey }, client);
|
|
87
|
-
if (!walletProvider) throw new require_getVerifiedCredentialForWalletAccount.NoWalletProviderFoundError({ walletProviderKey });
|
|
88
|
-
if (!require_getVerifiedCredentialForWalletAccount.isWaasWalletProvider(walletProvider)) throw new NotWaasWalletProviderError({ walletProviderKey });
|
|
89
|
-
return [walletProviderKey, walletProvider];
|
|
90
|
-
});
|
|
91
|
-
const walletProviderMap = Object.fromEntries(walletProviderEntries);
|
|
92
|
-
await Promise.all(walletProviderKeys.map((walletProviderKey) => walletProviderMap[walletProviderKey].createWalletAccount({
|
|
93
|
-
password,
|
|
94
|
-
thresholdSignatureScheme
|
|
95
|
-
})));
|
|
96
165
|
await require_NotWaasWalletAccountError.refreshAuth(client);
|
|
97
166
|
};
|
|
98
167
|
|
|
@@ -109,7 +178,7 @@ const createWaasWalletAccounts = async ({ chains, password, thresholdSignatureSc
|
|
|
109
178
|
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
110
179
|
* @returns A promise that resolves when the key delegation is complete.
|
|
111
180
|
*/
|
|
112
|
-
const delegateWaasKeyShares = async ({ password, walletAccount }, client =
|
|
181
|
+
const delegateWaasKeyShares = async ({ password, walletAccount }, client = require_InvalidParamError.getDefaultClient()) => {
|
|
113
182
|
await getWaasWalletProviderFromWalletAccount({ walletAccount }, client).delegateKeyShares({
|
|
114
183
|
password,
|
|
115
184
|
walletAccount
|
|
@@ -130,7 +199,7 @@ const delegateWaasKeyShares = async ({ password, walletAccount }, client = requi
|
|
|
130
199
|
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
131
200
|
* @returns A promise that resolves to the exported key shares.
|
|
132
201
|
*/
|
|
133
|
-
const exportWaasClientKeyshares = async ({ password, walletAccount }, client =
|
|
202
|
+
const exportWaasClientKeyshares = async ({ password, walletAccount }, client = require_InvalidParamError.getDefaultClient()) => {
|
|
134
203
|
return getWaasWalletProviderFromWalletAccount({ walletAccount }, client).exportClientKeyshares({
|
|
135
204
|
password,
|
|
136
205
|
walletAccount
|
|
@@ -151,7 +220,7 @@ const exportWaasClientKeyshares = async ({ password, walletAccount }, client = r
|
|
|
151
220
|
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
152
221
|
* @returns A promise that resolves when the private key export is complete.
|
|
153
222
|
*/
|
|
154
|
-
const exportWaasPrivateKey = async ({ displayContainer, password, walletAccount }, client =
|
|
223
|
+
const exportWaasPrivateKey = async ({ displayContainer, password, walletAccount }, client = require_InvalidParamError.getDefaultClient()) => {
|
|
155
224
|
return getWaasWalletProviderFromWalletAccount({ walletAccount }, client).exportPrivateKey({
|
|
156
225
|
displayContainer,
|
|
157
226
|
password,
|
|
@@ -162,7 +231,7 @@ const exportWaasPrivateKey = async ({ displayContainer, password, walletAccount
|
|
|
162
231
|
//#endregion
|
|
163
232
|
//#region src/modules/wallets/userHasEmbeddedWalletForChain/userHasEmbeddedWalletForChain.ts
|
|
164
233
|
const userHasEmbeddedWalletForChain = ({ user, chain }) => {
|
|
165
|
-
return user.verifiedCredentials.some((vc) => vc.walletProvider === _dynamic_labs_sdk_api_core.WalletProviderEnum.EmbeddedWallet && vc.chain &&
|
|
234
|
+
return user.verifiedCredentials.some((vc) => vc.walletProvider === _dynamic_labs_sdk_api_core.WalletProviderEnum.EmbeddedWallet && vc.chain && require_InvalidParamError.getChainFromVerifiedCredentialChain(vc.chain) === chain);
|
|
166
235
|
};
|
|
167
236
|
|
|
168
237
|
//#endregion
|
|
@@ -176,9 +245,9 @@ const userHasEmbeddedWalletForChain = ({ user, chain }) => {
|
|
|
176
245
|
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
177
246
|
* @returns True if Dynamic WaaS is enabled, false otherwise.
|
|
178
247
|
*/
|
|
179
|
-
const isDynamicWaasEnabled = (client =
|
|
248
|
+
const isDynamicWaasEnabled = (client = require_InvalidParamError.getDefaultClient()) => {
|
|
180
249
|
const projectSettings = client.projectSettings;
|
|
181
|
-
|
|
250
|
+
require_InvalidParamError.assertDefined(projectSettings, "Project settings are not available");
|
|
182
251
|
return projectSettings.sdk.embeddedWallets?.defaultWalletVersion === _dynamic_labs_sdk_api_core.EmbeddedWalletVersionEnum.V3;
|
|
183
252
|
};
|
|
184
253
|
|
|
@@ -191,9 +260,9 @@ const isDynamicWaasEnabled = (client = require_constants.getDefaultClient()) =>
|
|
|
191
260
|
* @returns An array of all chains that have waas wallet accounts enabled
|
|
192
261
|
* but for which the current user does not yet have an embedded wallet account.
|
|
193
262
|
*/
|
|
194
|
-
const getChainsMissingWaasWalletAccounts = (client =
|
|
263
|
+
const getChainsMissingWaasWalletAccounts = (client = require_InvalidParamError.getDefaultClient()) => {
|
|
195
264
|
const projectSettings = client.projectSettings;
|
|
196
|
-
|
|
265
|
+
require_InvalidParamError.assertDefined(projectSettings, "Project settings are not available");
|
|
197
266
|
const embeddedWalletSettings = projectSettings.sdk.embeddedWallets;
|
|
198
267
|
const isWaasEnabled = isDynamicWaasEnabled(client);
|
|
199
268
|
const user = client.user;
|
|
@@ -204,6 +273,19 @@ const getChainsMissingWaasWalletAccounts = (client = require_constants.getDefaul
|
|
|
204
273
|
}));
|
|
205
274
|
};
|
|
206
275
|
|
|
276
|
+
//#endregion
|
|
277
|
+
//#region src/modules/waas/getWalletRecoveryState/getWalletRecoveryState.ts
|
|
278
|
+
/**
|
|
279
|
+
* Retrieves the recovery state of a WaaS wallet account.
|
|
280
|
+
*
|
|
281
|
+
* @param params.walletAccount - The WaaS wallet account to get the recovery state for.
|
|
282
|
+
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
283
|
+
* @returns A promise that resolves with the wallet recovery state.
|
|
284
|
+
*/
|
|
285
|
+
const getWalletRecoveryState = async ({ walletAccount }, client = require_InvalidParamError.getDefaultClient()) => {
|
|
286
|
+
return getWaasWalletProviderFromWalletAccount({ walletAccount }, client).getWalletRecoveryState({ walletAccount });
|
|
287
|
+
};
|
|
288
|
+
|
|
207
289
|
//#endregion
|
|
208
290
|
//#region src/modules/waas/hasDelegatedAccess/hasDelegatedAccess.ts
|
|
209
291
|
/**
|
|
@@ -213,9 +295,9 @@ const getChainsMissingWaasWalletAccounts = (client = require_constants.getDefaul
|
|
|
213
295
|
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
214
296
|
* @returns True if the wallet account has delegated access, false otherwise.
|
|
215
297
|
*/
|
|
216
|
-
const hasDelegatedAccess = ({ walletAccount }, client =
|
|
298
|
+
const hasDelegatedAccess = ({ walletAccount }, client = require_InvalidParamError.getDefaultClient()) => {
|
|
217
299
|
const verifiedCredential = require_getVerifiedCredentialForWalletAccount.getVerifiedCredentialForWalletAccount({ walletAccount }, client);
|
|
218
|
-
|
|
300
|
+
require_InvalidParamError.assertDefined(verifiedCredential, "Verified credential not found for Waas wallet account");
|
|
219
301
|
return !!verifiedCredential.walletProperties?.keyShares?.some((keyShare) => keyShare.backupLocation === "delegated");
|
|
220
302
|
};
|
|
221
303
|
|
|
@@ -225,7 +307,7 @@ const getWaasWalletProviderByChain = ({ chain }, client) => {
|
|
|
225
307
|
const waasProvider = require_getVerifiedCredentialForWalletAccount.findWaasWalletProviderByChain({ chain }, client);
|
|
226
308
|
if (!waasProvider) throw new require_getVerifiedCredentialForWalletAccount.NoWalletProviderFoundError({ walletProviderKey: require_getVerifiedCredentialForWalletAccount.formatWalletProviderKey({
|
|
227
309
|
chain,
|
|
228
|
-
displayName:
|
|
310
|
+
displayName: require_InvalidParamError.DYNAMIC_WAAS_METADATA.displayName,
|
|
229
311
|
walletProviderType: _dynamic_labs_sdk_api_core.WalletProviderEnum.EmbeddedWallet
|
|
230
312
|
}) });
|
|
231
313
|
return waasProvider;
|
|
@@ -245,7 +327,7 @@ const getWaasWalletProviderByChain = ({ chain }, client) => {
|
|
|
245
327
|
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
246
328
|
* @returns A promise that resolves when the private key is successfully imported.
|
|
247
329
|
*/
|
|
248
|
-
const importWaasPrivateKey = async ({ chain, privateKey, thresholdSignatureScheme }, client =
|
|
330
|
+
const importWaasPrivateKey = async ({ chain, privateKey, thresholdSignatureScheme }, client = require_InvalidParamError.getDefaultClient()) => {
|
|
249
331
|
return getWaasWalletProviderByChain({ chain }, client).importPrivateKey({
|
|
250
332
|
privateKey,
|
|
251
333
|
thresholdSignatureScheme
|
|
@@ -264,9 +346,9 @@ const importWaasPrivateKey = async ({ chain, privateKey, thresholdSignatureSchem
|
|
|
264
346
|
* @param client - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
265
347
|
* @returns True if the user has any password protected Waas wallets, false otherwise
|
|
266
348
|
*/
|
|
267
|
-
const isPasswordRequiredForWaasWallets = (client =
|
|
349
|
+
const isPasswordRequiredForWaasWallets = (client = require_InvalidParamError.getDefaultClient()) => {
|
|
268
350
|
const { user } = client;
|
|
269
|
-
|
|
351
|
+
require_InvalidParamError.assertDefined(user, "User is not authenticated");
|
|
270
352
|
return user.verifiedCredentials.some((credential) => credential.walletProperties?.keyShares?.some((keyShare) => keyShare.passwordEncrypted));
|
|
271
353
|
};
|
|
272
354
|
|
|
@@ -283,7 +365,7 @@ const isPasswordRequiredForWaasWallets = (client = require_constants.getDefaultC
|
|
|
283
365
|
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
284
366
|
* @returns A promise that resolves when the key shares are refreshed.
|
|
285
367
|
*/
|
|
286
|
-
const refreshWaasWalletAccountShares = async ({ walletAccount, password }, client =
|
|
368
|
+
const refreshWaasWalletAccountShares = async ({ walletAccount, password }, client = require_InvalidParamError.getDefaultClient()) => {
|
|
287
369
|
return getWaasWalletProviderFromWalletAccount({ walletAccount }, client).refreshWalletAccountShares({
|
|
288
370
|
password,
|
|
289
371
|
walletAccount
|
|
@@ -300,7 +382,7 @@ const refreshWaasWalletAccountShares = async ({ walletAccount, password }, clien
|
|
|
300
382
|
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
301
383
|
* @returns A promise that resolves when the delegation is revoked.
|
|
302
384
|
*/
|
|
303
|
-
const revokeWaasDelegation = async ({ password, walletAccount }, client =
|
|
385
|
+
const revokeWaasDelegation = async ({ password, walletAccount }, client = require_InvalidParamError.getDefaultClient()) => {
|
|
304
386
|
await getWaasWalletProviderFromWalletAccount({ walletAccount }, client).revokeDelegation({
|
|
305
387
|
password,
|
|
306
388
|
walletAccount
|
|
@@ -327,8 +409,8 @@ const userHasExternalWallet = (user) => {
|
|
|
327
409
|
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
328
410
|
* @returns True if a wallet should be auto-created for the chain, false otherwise.
|
|
329
411
|
*/
|
|
330
|
-
const shouldAutoCreateWalletForChain = ({ chain }, client =
|
|
331
|
-
|
|
412
|
+
const shouldAutoCreateWalletForChain = ({ chain }, client = require_InvalidParamError.getDefaultClient()) => {
|
|
413
|
+
require_InvalidParamError.assertDefined(client.projectSettings, "Project settings are not available");
|
|
332
414
|
const embeddedWalletSettings = client.projectSettings.sdk.embeddedWallets;
|
|
333
415
|
if (!embeddedWalletSettings?.automaticEmbeddedWalletCreation || !client.user) return false;
|
|
334
416
|
const automaticEmbeddedWalletCreationForExternalEnabled = embeddedWalletSettings?.automaticEmbeddedWalletCreationForExternal;
|
|
@@ -336,6 +418,23 @@ const shouldAutoCreateWalletForChain = ({ chain }, client = require_constants.ge
|
|
|
336
418
|
return getChainsMissingWaasWalletAccounts(client).includes(chain);
|
|
337
419
|
};
|
|
338
420
|
|
|
421
|
+
//#endregion
|
|
422
|
+
//#region src/modules/waas/unlockWallet/unlockWallet.ts
|
|
423
|
+
/**
|
|
424
|
+
* Unlocks a WaaS wallet account.
|
|
425
|
+
*
|
|
426
|
+
* @param params.walletAccount - The WaaS wallet account to unlock.
|
|
427
|
+
* @param params.password - The password to unlock the wallet.
|
|
428
|
+
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
429
|
+
* @returns A promise that resolves with the wallet information.
|
|
430
|
+
*/
|
|
431
|
+
const unlockWallet = async ({ password, walletAccount }, client = require_InvalidParamError.getDefaultClient()) => {
|
|
432
|
+
return getWaasWalletProviderFromWalletAccount({ walletAccount }, client).unlockWallet({
|
|
433
|
+
password,
|
|
434
|
+
walletAccount
|
|
435
|
+
});
|
|
436
|
+
};
|
|
437
|
+
|
|
339
438
|
//#endregion
|
|
340
439
|
//#region src/modules/waas/updateWaasPassword/updateWaasPassword.ts
|
|
341
440
|
/**
|
|
@@ -350,7 +449,7 @@ const shouldAutoCreateWalletForChain = ({ chain }, client = require_constants.ge
|
|
|
350
449
|
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
351
450
|
* @returns A promise that resolves when the password is successfully updated.
|
|
352
451
|
*/
|
|
353
|
-
const updateWaasPassword = async ({ currentPassword, newPassword, walletAccount }, client =
|
|
452
|
+
const updateWaasPassword = async ({ currentPassword, newPassword, walletAccount }, client = require_InvalidParamError.getDefaultClient()) => {
|
|
354
453
|
return getWaasWalletProviderFromWalletAccount({ walletAccount }, client).updatePassword({
|
|
355
454
|
currentPassword,
|
|
356
455
|
newPassword,
|
|
@@ -360,7 +459,7 @@ const updateWaasPassword = async ({ currentPassword, newPassword, walletAccount
|
|
|
360
459
|
|
|
361
460
|
//#endregion
|
|
362
461
|
//#region src/exports/waas.ts
|
|
363
|
-
(0, _dynamic_labs_sdk_assert_package_version.assertPackageVersion)(
|
|
462
|
+
(0, _dynamic_labs_sdk_assert_package_version.assertPackageVersion)(require_InvalidParamError.name, require_InvalidParamError.version);
|
|
364
463
|
|
|
365
464
|
//#endregion
|
|
366
465
|
exports.NotWaasWalletProviderError = NotWaasWalletProviderError;
|
|
@@ -370,13 +469,17 @@ exports.delegateWaasKeyShares = delegateWaasKeyShares;
|
|
|
370
469
|
exports.exportWaasClientKeyshares = exportWaasClientKeyshares;
|
|
371
470
|
exports.exportWaasPrivateKey = exportWaasPrivateKey;
|
|
372
471
|
exports.getChainsMissingWaasWalletAccounts = getChainsMissingWaasWalletAccounts;
|
|
472
|
+
exports.getWalletRecoveryState = getWalletRecoveryState;
|
|
373
473
|
exports.hasDelegatedAccess = hasDelegatedAccess;
|
|
374
474
|
exports.importWaasPrivateKey = importWaasPrivateKey;
|
|
375
475
|
exports.isDynamicWaasEnabled = isDynamicWaasEnabled;
|
|
376
476
|
exports.isPasswordRequiredForWaasWallets = isPasswordRequiredForWaasWallets;
|
|
377
477
|
exports.isWaasWalletAccount = require_getVerifiedCredentialForWalletAccount.isWaasWalletAccount;
|
|
478
|
+
exports.isWalletCreationRequirement = isWalletCreationRequirement;
|
|
479
|
+
exports.normalizeWalletRequirements = normalizeWalletRequirements;
|
|
378
480
|
exports.refreshWaasWalletAccountShares = refreshWaasWalletAccountShares;
|
|
379
481
|
exports.revokeWaasDelegation = revokeWaasDelegation;
|
|
380
482
|
exports.shouldAutoCreateWalletForChain = shouldAutoCreateWalletForChain;
|
|
483
|
+
exports.unlockWallet = unlockWallet;
|
|
381
484
|
exports.updateWaasPassword = updateWaasPassword;
|
|
382
485
|
//# sourceMappingURL=waas.cjs.js.map
|
package/dist/waas.cjs.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"waas.cjs.js","names":["BaseError","getWalletProviderFromWalletAccount","isWaasWalletProvider","NotWaasWalletAccountError","getDefaultClient","getDefaultClient","formatWalletProviderKey","DYNAMIC_WAAS_METADATA","WalletProviderEnum","filterDuplicates","getWalletProviderByKey","NoWalletProviderFoundError","isWaasWalletProvider","refreshAuth","getDefaultClient","refreshAuth","getDefaultClient","getDefaultClient","WalletProviderEnum","getChainFromVerifiedCredentialChain","getDefaultClient","EmbeddedWalletVersionEnum","getDefaultClient","getDefaultClient","getVerifiedCredentialForWalletAccount","findWaasWalletProviderByChain","NoWalletProviderFoundError","formatWalletProviderKey","DYNAMIC_WAAS_METADATA","WalletProviderEnum","getDefaultClient","getDefaultClient","getDefaultClient","getDefaultClient","refreshAuth","JwtVerifiedCredentialFormatEnum","WalletProviderEnum","getDefaultClient","getDefaultClient","packageName","packageVersion"],"sources":["../src/errors/NotWaasWalletProviderError.ts","../src/modules/waas/getWaasWalletProviderFromWalletAccount/getWaasWalletProviderFromWalletAccount.ts","../src/modules/waas/backupWaasKeySharesToGoogleDrive/backupWaasKeySharesToGoogleDrive.ts","../src/modules/waas/createWaasWalletAccounts/createWaasWalletAccounts.ts","../src/modules/waas/delegateWaasKeyShares/delegateWaasKeyShares.ts","../src/modules/waas/exportWaasClientKeyshares/exportWaasClientKeyshares.ts","../src/modules/waas/exportWaasPrivateKey/exportWaasPrivateKey.ts","../src/modules/wallets/userHasEmbeddedWalletForChain/userHasEmbeddedWalletForChain.ts","../src/modules/waas/isDynamicWaasEnabled/isDynamicWaasEnabled.ts","../src/modules/waas/getChainsMissingWaasWalletAccounts/getChainsMissingWaasWalletAccounts.ts","../src/modules/waas/hasDelegatedAccess/hasDelegatedAccess.ts","../src/modules/waas/getWaasWalletProviderByChain/getWaasWalletProviderByChain.ts","../src/modules/waas/importWaasPrivateKey/importWaasPrivateKey.ts","../src/modules/waas/isPasswordRequiredForWaasWallets/isPasswordRequiredForWaasWallets.ts","../src/modules/waas/refreshWaasWalletAccountShares/refreshWaasWalletAccountShares.ts","../src/modules/waas/revokeWaasDelegation/revokeWaasDelegation.ts","../src/modules/wallets/userHasExternalWallet/userHasExternalWallet.ts","../src/modules/waas/shouldAutoCreateWalletForChain/shouldAutoCreateWalletForChain.ts","../src/modules/waas/updateWaasPassword/updateWaasPassword.ts","../src/exports/waas.ts"],"sourcesContent":["import { BaseError } from './base';\n\ntype NotWaasWalletProviderErrorParams = {\n walletProviderKey: string;\n};\n\nexport class NotWaasWalletProviderError extends BaseError {\n constructor({ walletProviderKey }: NotWaasWalletProviderErrorParams) {\n super({\n cause: null,\n code: 'not_waas_wallet_provider_error',\n docsUrl: null,\n name: 'NotWaasWalletProviderError',\n shortMessage: `Wallet provider ${walletProviderKey} is not a Dynamic WaaS wallet provider`,\n });\n }\n}\n","import type { DynamicClient } from '../../../client/types/DynamicClient';\nimport { NotWaasWalletAccountError } from '../../../errors/NotWaasWalletAccountError';\nimport { getWalletProviderFromWalletAccount } from '../../wallets/utils/getWalletProviderFromWalletAccount';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { isWaasWalletProvider } from '../isWaasWalletProvider';\nimport type { WaasWalletProvider } from '../waas.types';\n\ntype GetWalletProviderFromWalletAccountParams = {\n walletAccount: WalletAccount;\n};\n\nexport const getWaasWalletProviderFromWalletAccount = (\n { walletAccount }: GetWalletProviderFromWalletAccountParams,\n client: DynamicClient\n): WaasWalletProvider => {\n const walletProvider = getWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n if (!isWaasWalletProvider(walletProvider)) {\n throw new NotWaasWalletAccountError({\n walletAddress: walletAccount.address,\n });\n }\n\n return walletProvider;\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype BackupWaasKeySharesToGoogleDriveParams = {\n password?: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Backs up WaaS wallet key shares to Google Drive for secure recovery.\n *\n * This function creates a backup of the wallet's cryptographic key shares\n * to Google Drive, allowing users to recover their wallet later.\n *\n * @param params.walletAccount - The WaaS wallet account to backup.\n * @param [params.password] - Optional password to encrypt the backup.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when the backup process is complete.\n */\nexport const backupWaasKeySharesToGoogleDrive = async (\n { password, walletAccount }: BackupWaasKeySharesToGoogleDriveParams,\n client = getDefaultClient()\n) => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n return provider.backupKeySharesToGoogleDrive({\n password,\n walletAccount,\n });\n};\n","import type { ThresholdSignatureScheme } from '@dynamic-labs-wallet/browser-wallet-client';\nimport { WalletProviderEnum } from '@dynamic-labs/sdk-api-core';\n\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport { NotWaasWalletProviderError } from '../../../errors/NotWaasWalletProviderError';\nimport { NoWalletProviderFoundError } from '../../../errors/NoWalletProviderFoundError';\nimport { filterDuplicates } from '../../../utils/filterDuplicates';\nimport type { Chain } from '../../chain';\nimport { refreshAuth } from '../../user/refreshAuth';\nimport { getWalletProviderByKey } from '../../wallets/getWalletProviderByKey';\nimport { formatWalletProviderKey } from '../../wallets/utils/formatWalletProviderKey';\nimport { DYNAMIC_WAAS_METADATA } from '../constants';\nimport { isWaasWalletProvider } from '../isWaasWalletProvider';\n\ntype CreateWaasWalletAccountsParams = {\n /**\n * For which chains to create wallet accounts.\n * If a chain is passed multiple times, just as many wallet accounts will be created\n * for that chain.\n */\n chains: Chain[];\n /**\n * The optional password to use for the wallet accounts.\n * It's used to encrypt the user shares.\n * The same password must be used for all waas wallet accounts created for the same user.\n */\n password?: string;\n /**\n * The threshold signature scheme to use for the wallet accounts.\n * If not provided, TWO_OF_TWO will be used.\n */\n thresholdSignatureScheme?: ThresholdSignatureScheme;\n};\n\n/**\n * Creates wallet accounts for the specified chains.\n *\n * This function creates wallet accounts for the specified chains.\n * If the same chain is passed multiple times, just as many wallet accounts will be created\n * for that chain.\n *\n * @example\n * ```ts\n * // Will create 2 wallet accounts for EVM and 1 for SOL\n * await createWaasWalletAccounts({ chains: ['EVM', 'EVM', 'SOL'] });\n * ```\n *\n * @param params.chains - The chains to create wallet accounts for.\n * @param params.password - The optional password to use for the wallet accounts.\n * @param params.thresholdSignatureScheme - The threshold signature scheme to use for the wallet accounts. (Default: TWO_OF_TWO)\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when all wallet accounts are created.\n */\nexport const createWaasWalletAccounts = async (\n {\n chains,\n password,\n thresholdSignatureScheme,\n }: CreateWaasWalletAccountsParams,\n client = getDefaultClient()\n): Promise<void> => {\n // we need this right now so we don't try to create wallet accounts for chains\n // that we don't support Dynamic Waas yet in the JS SDK, like TRON\n const supportedChains = ['BTC', 'EVM', 'SOL', 'SUI'];\n const filteredSupportedChains = chains.filter((chain) =>\n supportedChains.includes(chain)\n );\n\n if (filteredSupportedChains.length === 0) {\n return;\n }\n\n const walletProviderKeys = filteredSupportedChains.map((chain) =>\n formatWalletProviderKey({\n chain,\n displayName: DYNAMIC_WAAS_METADATA.displayName,\n walletProviderType: WalletProviderEnum.EmbeddedWallet,\n })\n );\n\n const walletProviderEntries = filterDuplicates(walletProviderKeys).map(\n (walletProviderKey) => {\n const walletProvider = getWalletProviderByKey(\n { walletProviderKey },\n client\n );\n\n if (!walletProvider) {\n throw new NoWalletProviderFoundError({\n walletProviderKey,\n });\n }\n\n if (!isWaasWalletProvider(walletProvider)) {\n throw new NotWaasWalletProviderError({\n walletProviderKey,\n });\n }\n\n return [walletProviderKey, walletProvider] as const;\n }\n );\n\n const walletProviderMap = Object.fromEntries(walletProviderEntries);\n\n await Promise.all(\n walletProviderKeys.map((walletProviderKey) =>\n walletProviderMap[walletProviderKey].createWalletAccount({\n password,\n thresholdSignatureScheme,\n })\n )\n );\n\n await refreshAuth(client);\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport { refreshAuth } from '../../user/refreshAuth';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype DelegateWaasKeySharesParams = {\n password?: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Delegates cryptographic key shares for a WaaS wallet account.\n *\n * This function allows the delegation of key management responsibilities,\n * enabling distributed key management for enhanced security.\n *\n * @param params.walletAccount - The WaaS wallet account to delegate shares for.\n * @param [params.password] - Optional password for key share operations.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when the key delegation is complete.\n */\nexport const delegateWaasKeyShares = async (\n { password, walletAccount }: DelegateWaasKeySharesParams,\n client = getDefaultClient()\n): Promise<void> => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n await provider.delegateKeyShares({\n password,\n walletAccount,\n });\n\n await refreshAuth(client);\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype ExportWaasClientKeysharesParams = {\n password?: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Exports the client-side key shares for a WaaS wallet account.\n *\n * This function retrieves the cryptographic key shares that are stored\n * on the client side for backup or migration purposes.\n *\n * @param params.walletAccount - The WaaS wallet account to export shares from.\n * @param [params.password] - Optional password to encrypt the exported shares.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves to the exported key shares.\n */\nexport const exportWaasClientKeyshares = async (\n { password, walletAccount }: ExportWaasClientKeysharesParams,\n client = getDefaultClient()\n) => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n return provider.exportClientKeyshares({\n password,\n walletAccount,\n });\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype ExportWaasPrivateKeyParams = {\n displayContainer: HTMLElement;\n password?: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Exports the private key for a WaaS wallet account with secure display.\n *\n * This function reveals the private key for a WaaS wallet and displays it\n * securely within an iframe dynamically inserted into the specified HTML container element.\n *\n * @param params.walletAccount - The WaaS wallet account to export the private key from.\n * @param params.displayContainer - The HTML element where the iframe will be injected.\n * @param [params.password] - Optional password to decrypt the private key.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when the private key export is complete.\n */\nexport const exportWaasPrivateKey = async (\n { displayContainer, password, walletAccount }: ExportWaasPrivateKeyParams,\n client = getDefaultClient()\n) => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n return provider.exportPrivateKey({\n displayContainer,\n password,\n walletAccount,\n });\n};\n","import { type SdkUser, WalletProviderEnum } from '@dynamic-labs/sdk-api-core';\n\nimport { getChainFromVerifiedCredentialChain } from '../../../utils/getChainFromVerifiedCredentialChain';\nimport type { Chain } from '../../chain/chain.types';\n\ntype UserHasEmbeddedWalletForChainProps = {\n chain: Chain;\n user: SdkUser;\n};\n\nexport const userHasEmbeddedWalletForChain = ({\n user,\n chain,\n}: UserHasEmbeddedWalletForChainProps): boolean => {\n const hasEmbeddedWalletForChain = user.verifiedCredentials.some(\n (vc) =>\n vc.walletProvider === WalletProviderEnum.EmbeddedWallet &&\n vc.chain &&\n getChainFromVerifiedCredentialChain(vc.chain) === chain\n );\n\n return hasEmbeddedWalletForChain;\n};\n","import { EmbeddedWalletVersionEnum } from '@dynamic-labs/sdk-api-core';\n\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport { assertDefined } from '../../../utils/assertDefined';\n\n/**\n * Checks if Dynamic WaaS (Wallet as a Service) is enabled for the current project.\n *\n * This function examines the project settings to determine if Dynamic WaaS is\n * enabled in the Dynamic Dashboard or not.\n *\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns True if Dynamic WaaS is enabled, false otherwise.\n */\nexport const isDynamicWaasEnabled = (client = getDefaultClient()) => {\n const projectSettings = client.projectSettings;\n\n assertDefined(projectSettings, 'Project settings are not available');\n\n const embeddedWalletSettings = projectSettings.sdk.embeddedWallets;\n\n const dynamicWaasIsEnabled =\n embeddedWalletSettings?.defaultWalletVersion ===\n EmbeddedWalletVersionEnum.V3;\n\n return dynamicWaasIsEnabled;\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport { assertDefined } from '../../../utils/assertDefined';\nimport type { Chain } from '../../chain/chain.types';\nimport { userHasEmbeddedWalletForChain } from '../../wallets/userHasEmbeddedWalletForChain';\nimport { isDynamicWaasEnabled } from '../isDynamicWaasEnabled';\n\n/**\n * Gets all chains missing a waas wallet account for the current user.\n *\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns An array of all chains that have waas wallet accounts enabled\n * but for which the current user does not yet have an embedded wallet account.\n */\nexport const getChainsMissingWaasWalletAccounts = (\n client = getDefaultClient()\n): Chain[] => {\n const projectSettings = client.projectSettings;\n\n assertDefined(projectSettings, 'Project settings are not available');\n\n const embeddedWalletSettings = projectSettings.sdk.embeddedWallets;\n\n const isWaasEnabled = isDynamicWaasEnabled(client);\n\n const user = client.user;\n\n if (!user || !isWaasEnabled) {\n return [];\n }\n\n const enabledChainForWaas: Chain[] = (\n embeddedWalletSettings?.chainConfigurations?.filter(\n (chain) => chain.enabled\n ) ?? []\n ).map((chain) => chain.name as Chain);\n\n // For each enabled chain, if user does NOT have an embedded wallet, add to missing\n return enabledChainForWaas.filter(\n (chain) => !userHasEmbeddedWalletForChain({ chain, user })\n );\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport { assertDefined } from '../../../utils/assertDefined';\nimport { getVerifiedCredentialForWalletAccount } from '../../wallets/utils/getVerifiedCredentialForWalletAccount';\nimport type { WalletAccount } from '../../wallets/walletAccount';\n\ntype HasDelegatedAccessParams = {\n walletAccount: WalletAccount;\n};\n\n/**\n * Checks if a WaaS wallet account has delegated access.\n *\n * @param params.walletAccount - The WaaS wallet account to check for delegated access.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns True if the wallet account has delegated access, false otherwise.\n */\nexport const hasDelegatedAccess = (\n { walletAccount }: HasDelegatedAccessParams,\n client = getDefaultClient()\n): boolean => {\n const verifiedCredential = getVerifiedCredentialForWalletAccount(\n { walletAccount },\n client\n );\n\n assertDefined(\n verifiedCredential,\n 'Verified credential not found for Waas wallet account'\n );\n\n const hasDelegatedKeyShare =\n verifiedCredential.walletProperties?.keyShares?.some(\n (keyShare) => keyShare.backupLocation === 'delegated'\n );\n\n return !!hasDelegatedKeyShare;\n};\n","import { WalletProviderEnum } from '@dynamic-labs/sdk-api-core';\n\nimport type { DynamicClient } from '../../../client/types/DynamicClient';\nimport { NoWalletProviderFoundError } from '../../../errors/NoWalletProviderFoundError';\nimport type { Chain } from '../../chain';\nimport { formatWalletProviderKey } from '../../wallets/utils/formatWalletProviderKey';\nimport { DYNAMIC_WAAS_METADATA } from '../constants';\nimport type { WaasWalletProvider } from '../waas.types';\nimport { findWaasWalletProviderByChain } from '../findWaasWalletProviderByChain/findWaasWalletProviderByChain';\n\ntype GetWaasWalletProviderByChainParams = {\n chain: Chain;\n};\n\nexport const getWaasWalletProviderByChain = (\n { chain }: GetWaasWalletProviderByChainParams,\n client: DynamicClient\n): WaasWalletProvider => {\n const waasProvider = findWaasWalletProviderByChain({ chain }, client);\n\n if (!waasProvider) {\n const waasProviderKey = formatWalletProviderKey({\n chain,\n displayName: DYNAMIC_WAAS_METADATA.displayName,\n walletProviderType: WalletProviderEnum.EmbeddedWallet,\n });\n\n throw new NoWalletProviderFoundError({\n walletProviderKey: waasProviderKey,\n });\n }\n\n return waasProvider;\n};\n","import type { ThresholdSignatureScheme } from '@dynamic-labs-wallet/browser-wallet-client';\n\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport type { Chain } from '../../chain';\nimport { getWaasWalletProviderByChain } from '../getWaasWalletProviderByChain';\n\ntype ImportWaasPrivateKeyParams = {\n chain: Chain;\n privateKey: string;\n thresholdSignatureScheme?: ThresholdSignatureScheme;\n};\n\n/**\n * Imports an existing private key to create a new WaaS wallet account.\n *\n * This function allows users to import their existing private key into\n * Dynamic's WaaS infrastructure for secure management.\n *\n * @param params.chain - The chain for the imported wallet.\n * @param params.privateKey - The private key to import.\n * @param [params.thresholdSignatureScheme] - Optional threshold signature scheme configuration. Default is TWO_OF_TWO.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when the private key is successfully imported.\n */\nexport const importWaasPrivateKey = async (\n { chain, privateKey, thresholdSignatureScheme }: ImportWaasPrivateKeyParams,\n client = getDefaultClient()\n) => {\n const provider = getWaasWalletProviderByChain({ chain }, client);\n\n return provider.importPrivateKey({\n privateKey,\n thresholdSignatureScheme,\n });\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport { assertDefined } from '../../../utils/assertDefined';\n\n/**\n * Checks if the user Waas wallets are password protected.\n *\n * If the user's Waas wallets are password protected, it means that user's will have to be prompted for a\n * password for the first wallet action that happens on each session.\n * The password is also required for creating any new Waas wallets.\n *\n * @param client - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns True if the user has any password protected Waas wallets, false otherwise\n */\nexport const isPasswordRequiredForWaasWallets = (\n client = getDefaultClient()\n): boolean => {\n const { user } = client;\n\n assertDefined(user, 'User is not authenticated');\n\n return user.verifiedCredentials.some((credential) =>\n credential.walletProperties?.keyShares?.some(\n (keyShare) => keyShare.passwordEncrypted\n )\n );\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype RefreshWaasWalletAccountSharesParams = {\n password?: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Refreshes the cryptographic key shares for a WaaS wallet account.\n *\n * This function generates new key shares for the wallet while maintaining\n * the same threshold signature scheme.\n *\n * @param params.walletAccount - The WaaS wallet account to refresh shares for.\n * @param [params.password] - Optional password for key share operations.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when the key shares are refreshed.\n */\nexport const refreshWaasWalletAccountShares = async (\n { walletAccount, password }: RefreshWaasWalletAccountSharesParams,\n client = getDefaultClient()\n) => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n return provider.refreshWalletAccountShares({\n password,\n walletAccount,\n });\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport { refreshAuth } from '../../user/refreshAuth';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype RevokeWaasDelegationParams = {\n password?: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Revokes the delegation of a WaaS wallet account.\n *\n * @param params.walletAccount - The WaaS wallet account to revoke delegation for.\n * @param [params.password] - Optional password for delegation operations.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when the delegation is revoked.\n */\nexport const revokeWaasDelegation = async (\n { password, walletAccount }: RevokeWaasDelegationParams,\n client = getDefaultClient()\n): Promise<void> => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n await provider.revokeDelegation({\n password,\n walletAccount,\n });\n\n await refreshAuth(client);\n};\n","import {\n JwtVerifiedCredentialFormatEnum,\n type SdkUser,\n WalletProviderEnum,\n} from '@dynamic-labs/sdk-api-core';\n\nexport const userHasExternalWallet = (user: SdkUser) => {\n const hasExternalWallet = user?.verifiedCredentials.some(\n (vc) =>\n vc.format === JwtVerifiedCredentialFormatEnum.Blockchain &&\n vc.walletProvider !== WalletProviderEnum.EmbeddedWallet\n );\n\n return hasExternalWallet;\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport { assertDefined } from '../../../utils/assertDefined';\nimport type { Chain } from '../../chain';\nimport { userHasExternalWallet } from '../../wallets/userHasExternalWallet';\nimport { getChainsMissingWaasWalletAccounts } from '../getChainsMissingWaasWalletAccounts';\n\ntype ShouldAutoCreateWalletForChainParams = {\n chain: Chain;\n};\n\n/**\n * Checks if a WaaS wallet should be automatically created for the specified blockchain.\n *\n * This function determines whether the current user configuration and project\n * settings require automatic wallet creation for the given chain, considering\n * whether the user already has an embedded wallet for the enabled chains or an external wallet.\n *\n * @param params.chain - The blockchain network to check.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns True if a wallet should be auto-created for the chain, false otherwise.\n */\nexport const shouldAutoCreateWalletForChain = (\n { chain }: ShouldAutoCreateWalletForChainParams,\n client = getDefaultClient()\n) => {\n assertDefined(client.projectSettings, 'Project settings are not available');\n\n const embeddedWalletSettings = client.projectSettings.sdk.embeddedWallets;\n\n const automaticEmbeddedWalletCreationEnabled =\n embeddedWalletSettings?.automaticEmbeddedWalletCreation;\n\n if (!automaticEmbeddedWalletCreationEnabled || !client.user) {\n return false;\n }\n\n const automaticEmbeddedWalletCreationForExternalEnabled =\n embeddedWalletSettings?.automaticEmbeddedWalletCreationForExternal;\n\n // If user has an external wallet (e.g metamask, phantom, etc), should only\n // create if automaticEmbeddedWalletCreationForExternalEnabled is true\n const shouldCreateDynamicWaasWallet =\n !userHasExternalWallet(client.user) ||\n automaticEmbeddedWalletCreationForExternalEnabled;\n\n if (!shouldCreateDynamicWaasWallet) {\n return false;\n }\n\n const chainsMissingAutoCreatedWallet =\n getChainsMissingWaasWalletAccounts(client);\n\n return chainsMissingAutoCreatedWallet.includes(chain);\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype UpdateWaasPasswordParams = {\n currentPassword: string;\n newPassword: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Updates the password for a WaaS wallet account.\n *\n * This function changes the password used to encrypt and protect the\n * cryptographic key shares for the specified wallet account.\n *\n * @param params.walletAccount - The WaaS wallet account to update the password for.\n * @param params.currentPassword - The current password for the wallet.\n * @param params.newPassword - The new password to set for the wallet.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when the password is successfully updated.\n */\nexport const updateWaasPassword = async (\n { currentPassword, newPassword, walletAccount }: UpdateWaasPasswordParams,\n client = getDefaultClient()\n) => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n return provider.updatePassword({\n currentPassword,\n newPassword,\n walletAccount,\n });\n};\n","import { assertPackageVersion } from '@dynamic-labs-sdk/assert-package-version';\n\nimport {\n name as packageName,\n version as packageVersion,\n} from '../../package.json';\nassertPackageVersion(packageName, packageVersion);\n\nexport { NotWaasWalletProviderError } from '../errors/NotWaasWalletProviderError';\nexport { backupWaasKeySharesToGoogleDrive } from '../modules/waas/backupWaasKeySharesToGoogleDrive';\nexport { createWaasWalletAccounts } from '../modules/waas/createWaasWalletAccounts';\nexport { delegateWaasKeyShares } from '../modules/waas/delegateWaasKeyShares';\nexport { exportWaasClientKeyshares } from '../modules/waas/exportWaasClientKeyshares';\nexport { exportWaasPrivateKey } from '../modules/waas/exportWaasPrivateKey';\nexport { getChainsMissingWaasWalletAccounts } from '../modules/waas/getChainsMissingWaasWalletAccounts';\nexport { hasDelegatedAccess } from '../modules/waas/hasDelegatedAccess';\nexport { importWaasPrivateKey } from '../modules/waas/importWaasPrivateKey';\nexport { isDynamicWaasEnabled } from '../modules/waas/isDynamicWaasEnabled';\nexport { isPasswordRequiredForWaasWallets } from '../modules/waas/isPasswordRequiredForWaasWallets';\nexport { isWaasWalletAccount } from '../modules/waas/isWaasWalletAccount';\nexport { refreshWaasWalletAccountShares } from '../modules/waas/refreshWaasWalletAccountShares';\nexport { revokeWaasDelegation } from '../modules/waas/revokeWaasDelegation';\nexport { shouldAutoCreateWalletForChain } from '../modules/waas/shouldAutoCreateWalletForChain';\nexport { updateWaasPassword } from '../modules/waas/updateWaasPassword';\n"],"mappings":";;;;;;;;;AAMA,IAAa,6BAAb,cAAgDA,4BAAU;CACxD,YAAY,EAAE,qBAAuD;AACnE,QAAM;GACJ,OAAO;GACP,MAAM;GACN,SAAS;GACT,MAAM;GACN,cAAc,mBAAmB,kBAAkB;GACpD,CAAC;;;;;;ACHN,MAAa,0CACX,EAAE,iBACF,WACuB;CACvB,MAAM,iBAAiBC,iFACrB,EAAE,eAAe,EACjB,OACD;AAED,KAAI,CAACC,mEAAqB,eAAe,CACvC,OAAM,IAAIC,4DAA0B,EAClC,eAAe,cAAc,SAC9B,CAAC;AAGJ,QAAO;;;;;;;;;;;;;;;;ACNT,MAAa,mCAAmC,OAC9C,EAAE,UAAU,iBACZ,SAASC,oCAAkB,KACxB;AAMH,QALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEe,6BAA6B;EAC3C;EACA;EACD,CAAC;;;;;;;;;;;;;;;;;;;;;;;;ACqBJ,MAAa,2BAA2B,OACtC,EACE,QACA,UACA,4BAEF,SAASC,oCAAkB,KACT;CAGlB,MAAM,kBAAkB;EAAC;EAAO;EAAO;EAAO;EAAM;CACpD,MAAM,0BAA0B,OAAO,QAAQ,UAC7C,gBAAgB,SAAS,MAAM,CAChC;AAED,KAAI,wBAAwB,WAAW,EACrC;CAGF,MAAM,qBAAqB,wBAAwB,KAAK,UACtDC,sEAAwB;EACtB;EACA,aAAaC,wCAAsB;EACnC,oBAAoBC,8CAAmB;EACxC,CAAC,CACH;CAED,MAAM,wBAAwBC,0CAAiB,mBAAmB,CAAC,KAChE,sBAAsB;EACrB,MAAM,iBAAiBC,qEACrB,EAAE,mBAAmB,EACrB,OACD;AAED,MAAI,CAAC,eACH,OAAM,IAAIC,yEAA2B,EACnC,mBACD,CAAC;AAGJ,MAAI,CAACC,mEAAqB,eAAe,CACvC,OAAM,IAAI,2BAA2B,EACnC,mBACD,CAAC;AAGJ,SAAO,CAAC,mBAAmB,eAAe;GAE7C;CAED,MAAM,oBAAoB,OAAO,YAAY,sBAAsB;AAEnE,OAAM,QAAQ,IACZ,mBAAmB,KAAK,sBACtB,kBAAkB,mBAAmB,oBAAoB;EACvD;EACA;EACD,CAAC,CACH,CACF;AAED,OAAMC,8CAAY,OAAO;;;;;;;;;;;;;;;;AC7F3B,MAAa,wBAAwB,OACnC,EAAE,UAAU,iBACZ,SAASC,oCAAkB,KACT;AAMlB,OALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEc,kBAAkB;EAC/B;EACA;EACD,CAAC;AAEF,OAAMC,8CAAY,OAAO;;;;;;;;;;;;;;;;ACf3B,MAAa,4BAA4B,OACvC,EAAE,UAAU,iBACZ,SAASC,oCAAkB,KACxB;AAMH,QALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEe,sBAAsB;EACpC;EACA;EACD,CAAC;;;;;;;;;;;;;;;;;ACVJ,MAAa,uBAAuB,OAClC,EAAE,kBAAkB,UAAU,iBAC9B,SAASC,oCAAkB,KACxB;AAMH,QALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEe,iBAAiB;EAC/B;EACA;EACA;EACD,CAAC;;;;;ACzBJ,MAAa,iCAAiC,EAC5C,MACA,YACiD;AAQjD,QAPkC,KAAK,oBAAoB,MACxD,OACC,GAAG,mBAAmBC,8CAAmB,kBACzC,GAAG,SACHC,sDAAoC,GAAG,MAAM,KAAK,MACrD;;;;;;;;;;;;;;ACLH,MAAa,wBAAwB,SAASC,oCAAkB,KAAK;CACnE,MAAM,kBAAkB,OAAO;AAE/B,iCAAc,iBAAiB,qCAAqC;AAQpE,QAN+B,gBAAgB,IAAI,iBAGzB,yBACxBC,qDAA0B;;;;;;;;;;;;ACV9B,MAAa,sCACX,SAASC,oCAAkB,KACf;CACZ,MAAM,kBAAkB,OAAO;AAE/B,iCAAc,iBAAiB,qCAAqC;CAEpE,MAAM,yBAAyB,gBAAgB,IAAI;CAEnD,MAAM,gBAAgB,qBAAqB,OAAO;CAElD,MAAM,OAAO,OAAO;AAEpB,KAAI,CAAC,QAAQ,CAAC,cACZ,QAAO,EAAE;AAUX,SANE,wBAAwB,qBAAqB,QAC1C,UAAU,MAAM,QAClB,IAAI,EAAE,EACP,KAAK,UAAU,MAAM,KAAc,CAGV,QACxB,UAAU,CAAC,8BAA8B;EAAE;EAAO;EAAM,CAAC,CAC3D;;;;;;;;;;;;ACvBH,MAAa,sBACX,EAAE,iBACF,SAASC,oCAAkB,KACf;CACZ,MAAM,qBAAqBC,oFACzB,EAAE,eAAe,EACjB,OACD;AAED,iCACE,oBACA,wDACD;AAOD,QAAO,CAAC,CAJN,mBAAmB,kBAAkB,WAAW,MAC7C,aAAa,SAAS,mBAAmB,YAC3C;;;;;ACnBL,MAAa,gCACX,EAAE,SACF,WACuB;CACvB,MAAM,eAAeC,4EAA8B,EAAE,OAAO,EAAE,OAAO;AAErE,KAAI,CAAC,aAOH,OAAM,IAAIC,yEAA2B,EACnC,mBAPsBC,sEAAwB;EAC9C;EACA,aAAaC,wCAAsB;EACnC,oBAAoBC,8CAAmB;EACxC,CAAC,EAID,CAAC;AAGJ,QAAO;;;;;;;;;;;;;;;;;ACRT,MAAa,uBAAuB,OAClC,EAAE,OAAO,YAAY,4BACrB,SAASC,oCAAkB,KACxB;AAGH,QAFiB,6BAA6B,EAAE,OAAO,EAAE,OAAO,CAEhD,iBAAiB;EAC/B;EACA;EACD,CAAC;;;;;;;;;;;;;;;ACpBJ,MAAa,oCACX,SAASC,oCAAkB,KACf;CACZ,MAAM,EAAE,SAAS;AAEjB,iCAAc,MAAM,4BAA4B;AAEhD,QAAO,KAAK,oBAAoB,MAAM,eACpC,WAAW,kBAAkB,WAAW,MACrC,aAAa,SAAS,kBACxB,CACF;;;;;;;;;;;;;;;;ACJH,MAAa,iCAAiC,OAC5C,EAAE,eAAe,YACjB,SAASC,oCAAkB,KACxB;AAMH,QALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEe,2BAA2B;EACzC;EACA;EACD,CAAC;;;;;;;;;;;;;ACdJ,MAAa,uBAAuB,OAClC,EAAE,UAAU,iBACZ,SAASC,oCAAkB,KACT;AAMlB,OALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEc,iBAAiB;EAC9B;EACA;EACD,CAAC;AAEF,OAAMC,8CAAY,OAAO;;;;;AC1B3B,MAAa,yBAAyB,SAAkB;AAOtD,QAN0B,MAAM,oBAAoB,MACjD,OACC,GAAG,WAAWC,2DAAgC,cAC9C,GAAG,mBAAmBC,8CAAmB,eAC5C;;;;;;;;;;;;;;;;ACUH,MAAa,kCACX,EAAE,SACF,SAASC,oCAAkB,KACxB;AACH,iCAAc,OAAO,iBAAiB,qCAAqC;CAE3E,MAAM,yBAAyB,OAAO,gBAAgB,IAAI;AAK1D,KAAI,CAFF,wBAAwB,mCAEqB,CAAC,OAAO,KACrD,QAAO;CAGT,MAAM,oDACJ,wBAAwB;AAQ1B,KAAI,EAHF,CAAC,sBAAsB,OAAO,KAAK,IACnC,mDAGA,QAAO;AAMT,QAFE,mCAAmC,OAAO,CAEN,SAAS,MAAM;;;;;;;;;;;;;;;;;AC9BvD,MAAa,qBAAqB,OAChC,EAAE,iBAAiB,aAAa,iBAChC,SAASC,oCAAkB,KACxB;AAMH,QALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEe,eAAe;EAC7B;EACA;EACA;EACD,CAAC;;;;;mEC7BiBC,wBAAaC,0BAAe"}
|
|
1
|
+
{"version":3,"file":"waas.cjs.js","names":["BaseError","getWalletProviderFromWalletAccount","isWaasWalletProvider","NotWaasWalletAccountError","getDefaultClient","requirement: WalletCreationRequirement","getDefaultClient","formatWalletProviderKey","DYNAMIC_WAAS_METADATA","WalletProviderEnum","getWalletProviderByKey","NoWalletProviderFoundError","isWaasWalletProvider","refreshAuth","getDefaultClient","refreshAuth","getDefaultClient","getDefaultClient","WalletProviderEnum","getChainFromVerifiedCredentialChain","getDefaultClient","EmbeddedWalletVersionEnum","getDefaultClient","getDefaultClient","getDefaultClient","getVerifiedCredentialForWalletAccount","findWaasWalletProviderByChain","NoWalletProviderFoundError","formatWalletProviderKey","DYNAMIC_WAAS_METADATA","WalletProviderEnum","getDefaultClient","getDefaultClient","getDefaultClient","getDefaultClient","refreshAuth","JwtVerifiedCredentialFormatEnum","WalletProviderEnum","getDefaultClient","getDefaultClient","getDefaultClient","packageName","packageVersion"],"sources":["../src/errors/NotWaasWalletProviderError.ts","../src/modules/waas/getWaasWalletProviderFromWalletAccount/getWaasWalletProviderFromWalletAccount.ts","../src/modules/waas/backupWaasKeySharesToGoogleDrive/backupWaasKeySharesToGoogleDrive.ts","../src/modules/waas/isWalletCreationRequirement/isWalletCreationRequirement.ts","../src/modules/waas/normalizeWalletRequirements/normalizeWalletRequirements.ts","../src/modules/waas/createWaasWalletAccounts/createWaasWalletAccounts.ts","../src/modules/waas/delegateWaasKeyShares/delegateWaasKeyShares.ts","../src/modules/waas/exportWaasClientKeyshares/exportWaasClientKeyshares.ts","../src/modules/waas/exportWaasPrivateKey/exportWaasPrivateKey.ts","../src/modules/wallets/userHasEmbeddedWalletForChain/userHasEmbeddedWalletForChain.ts","../src/modules/waas/isDynamicWaasEnabled/isDynamicWaasEnabled.ts","../src/modules/waas/getChainsMissingWaasWalletAccounts/getChainsMissingWaasWalletAccounts.ts","../src/modules/waas/getWalletRecoveryState/getWalletRecoveryState.ts","../src/modules/waas/hasDelegatedAccess/hasDelegatedAccess.ts","../src/modules/waas/getWaasWalletProviderByChain/getWaasWalletProviderByChain.ts","../src/modules/waas/importWaasPrivateKey/importWaasPrivateKey.ts","../src/modules/waas/isPasswordRequiredForWaasWallets/isPasswordRequiredForWaasWallets.ts","../src/modules/waas/refreshWaasWalletAccountShares/refreshWaasWalletAccountShares.ts","../src/modules/waas/revokeWaasDelegation/revokeWaasDelegation.ts","../src/modules/wallets/userHasExternalWallet/userHasExternalWallet.ts","../src/modules/waas/shouldAutoCreateWalletForChain/shouldAutoCreateWalletForChain.ts","../src/modules/waas/unlockWallet/unlockWallet.ts","../src/modules/waas/updateWaasPassword/updateWaasPassword.ts","../src/exports/waas.ts"],"sourcesContent":["import { BaseError } from './base';\n\ntype NotWaasWalletProviderErrorParams = {\n walletProviderKey: string;\n};\n\nexport class NotWaasWalletProviderError extends BaseError {\n constructor({ walletProviderKey }: NotWaasWalletProviderErrorParams) {\n super({\n cause: null,\n code: 'not_waas_wallet_provider_error',\n docsUrl: null,\n name: 'NotWaasWalletProviderError',\n shortMessage: `Wallet provider ${walletProviderKey} is not a Dynamic WaaS wallet provider`,\n });\n }\n}\n","import type { DynamicClient } from '../../../client/types/DynamicClient';\nimport { NotWaasWalletAccountError } from '../../../errors/NotWaasWalletAccountError';\nimport { getWalletProviderFromWalletAccount } from '../../wallets/utils/getWalletProviderFromWalletAccount';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { isWaasWalletProvider } from '../isWaasWalletProvider';\nimport type { WaasWalletProvider } from '../waas.types';\n\ntype GetWalletProviderFromWalletAccountParams = {\n walletAccount: WalletAccount;\n};\n\nexport const getWaasWalletProviderFromWalletAccount = (\n { walletAccount }: GetWalletProviderFromWalletAccountParams,\n client: DynamicClient\n): WaasWalletProvider => {\n const walletProvider = getWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n if (!isWaasWalletProvider(walletProvider)) {\n throw new NotWaasWalletAccountError({\n walletAddress: walletAccount.address,\n });\n }\n\n return walletProvider;\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype BackupWaasKeySharesToGoogleDriveParams = {\n password?: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Backs up WaaS wallet key shares to Google Drive for secure recovery.\n *\n * This function creates a backup of the wallet's cryptographic key shares\n * to Google Drive, allowing users to recover their wallet later.\n *\n * @param params.walletAccount - The WaaS wallet account to backup.\n * @param [params.password] - Optional password to encrypt the backup.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when the backup process is complete.\n */\nexport const backupWaasKeySharesToGoogleDrive = async (\n { password, walletAccount }: BackupWaasKeySharesToGoogleDriveParams,\n client = getDefaultClient()\n) => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n return provider.backupKeySharesToGoogleDrive({\n password,\n walletAccount,\n });\n};\n","import type { Chain } from '../../chain';\nimport type { WalletCreationRequirement } from '../waas.types';\n\n/**\n * Type guard to check if an item is a WalletCreationRequirement object.\n * Chain values are strings, so we can distinguish by checking if it's an object with a 'chain' property.\n *\n * @param item - The item to check, either a WalletCreationRequirement or Chain string\n * @returns True if the item is a WalletCreationRequirement object\n */\nexport const isWalletCreationRequirement = (\n item: WalletCreationRequirement | Chain\n): item is WalletCreationRequirement =>\n typeof item === 'object' && item !== null && 'chain' in item;\n","import type { Chain } from '../../chain';\nimport { isWalletCreationRequirement } from '../isWalletCreationRequirement/isWalletCreationRequirement';\nimport type {\n WalletCreationBitcoinConfig,\n WalletCreationRequirement,\n} from '../waas.types';\n\nconst DEFAULT_BITCOIN_ADDRESS_TYPE = 'native_segwit' as const;\n\ntype NormalizeWalletRequirementsParams = {\n defaultBitcoinConfig?: WalletCreationBitcoinConfig;\n input: WalletCreationRequirement[] | Chain[];\n};\n\n/**\n * Normalizes wallet creation input from either legacy Chain[] format\n * or new WalletCreationRequirement[] format to WalletCreationRequirement[].\n *\n * For BTC chains without explicit bitcoinConfig, defaults to native_segwit.\n *\n * @param params.input - Either an array of Chain strings or WalletCreationRequirement objects\n * @param params.defaultBitcoinConfig - Optional default bitcoin config to use for BTC chains when converting from legacy format\n * @returns Array of WalletCreationRequirement objects\n */\nexport const normalizeWalletRequirements = ({\n defaultBitcoinConfig,\n input,\n}: NormalizeWalletRequirementsParams): WalletCreationRequirement[] => {\n if (input.length === 0) {\n return [];\n }\n\n const [firstItem] = input;\n\n if (isWalletCreationRequirement(firstItem)) {\n return (input as WalletCreationRequirement[]).map((requirement) => {\n if (requirement.chain === 'BTC' && !requirement.bitcoinConfig) {\n return {\n ...requirement,\n bitcoinConfig: { addressType: DEFAULT_BITCOIN_ADDRESS_TYPE },\n };\n }\n\n return requirement;\n });\n }\n\n return (input as Chain[]).map((chain) => {\n const requirement: WalletCreationRequirement = { chain };\n\n if (chain === 'BTC') {\n requirement.bitcoinConfig = defaultBitcoinConfig ?? {\n addressType: DEFAULT_BITCOIN_ADDRESS_TYPE,\n };\n }\n\n return requirement;\n });\n};\n","import type { ThresholdSignatureScheme } from '@dynamic-labs-wallet/browser-wallet-client';\nimport { WalletProviderEnum } from '@dynamic-labs/sdk-api-core';\n\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport { NotWaasWalletProviderError } from '../../../errors/NotWaasWalletProviderError';\nimport { NoWalletProviderFoundError } from '../../../errors/NoWalletProviderFoundError';\nimport type { Chain } from '../../chain';\nimport { refreshAuth } from '../../user/refreshAuth';\nimport { getWalletProviderByKey } from '../../wallets/getWalletProviderByKey';\nimport { formatWalletProviderKey } from '../../wallets/utils/formatWalletProviderKey';\nimport { DYNAMIC_WAAS_METADATA } from '../constants';\nimport { isWaasWalletProvider } from '../isWaasWalletProvider';\nimport { normalizeWalletRequirements } from '../normalizeWalletRequirements/normalizeWalletRequirements';\nimport type { WalletCreationRequirement } from '../waas.types';\n\ntype CreateWaasWalletAccountsParams = {\n /**\n * For which chains to create wallet accounts.\n * Accepts either an array of chain strings (legacy format) or an array of\n * WalletCreationRequirement objects for chain-specific configuration.\n *\n * For Bitcoin, you can specify the address type ('native_segwit' or 'taproot').\n * If not specified, defaults to 'native_segwit'.\n *\n * If a chain is passed multiple times, just as many wallet accounts will be created\n * for that chain.\n */\n chains: Chain[] | WalletCreationRequirement[];\n /**\n * The optional password to use for the wallet accounts.\n * It's used to encrypt the user shares.\n * The same password must be used for all waas wallet accounts created for the same user.\n */\n password?: string;\n /**\n * The threshold signature scheme to use for the wallet accounts.\n * If not provided, TWO_OF_TWO will be used.\n */\n thresholdSignatureScheme?: ThresholdSignatureScheme;\n};\n\n/**\n * Creates wallet accounts for the specified chains.\n *\n * This function creates wallet accounts for the specified chains.\n * If the same chain is passed multiple times, just as many wallet accounts will be created\n * for that chain.\n *\n * @example\n * ```ts\n * // Legacy format - will create wallet accounts for EVM and SOL, BTC defaults to native_segwit\n * await createWaasWalletAccounts({ chains: ['EVM', 'SOL', 'BTC'] });\n *\n * // New format with chain-specific config\n * await createWaasWalletAccounts({\n * chains: [\n * { chain: 'BTC', bitcoinConfig: { addressType: 'taproot' } },\n * { chain: 'EVM' },\n * ]\n * });\n *\n * // Create both BTC address types\n * await createWaasWalletAccounts({\n * chains: [\n * { chain: 'BTC', bitcoinConfig: { addressType: 'native_segwit' } },\n * { chain: 'BTC', bitcoinConfig: { addressType: 'taproot' } },\n * ]\n * });\n * ```\n *\n * @param params.chains - The chains to create wallet accounts for.\n * @param params.password - The optional password to use for the wallet accounts.\n * @param params.thresholdSignatureScheme - The threshold signature scheme to use for the wallet accounts. (Default: TWO_OF_TWO)\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when all wallet accounts are created.\n */\nexport const createWaasWalletAccounts = async (\n {\n chains,\n password,\n thresholdSignatureScheme,\n }: CreateWaasWalletAccountsParams,\n client = getDefaultClient()\n): Promise<void> => {\n const normalizedRequirements = normalizeWalletRequirements({ input: chains });\n\n // we need this right now so we don't try to create wallet accounts for chains\n // that we don't support Dynamic Waas yet in the JS SDK, like TRON\n const supportedChains = ['BTC', 'EVM', 'SOL', 'SUI'];\n\n const filteredRequirements = normalizedRequirements.filter((requirement) =>\n supportedChains.includes(requirement.chain)\n );\n\n if (filteredRequirements.length === 0) {\n return;\n }\n\n const walletProviderMap = new Map<\n string,\n ReturnType<typeof getWalletProviderByKey>\n >();\n\n for (const requirement of filteredRequirements) {\n const walletProviderKey = formatWalletProviderKey({\n chain: requirement.chain,\n displayName: DYNAMIC_WAAS_METADATA.displayName,\n walletProviderType: WalletProviderEnum.EmbeddedWallet,\n });\n\n if (!walletProviderMap.has(walletProviderKey)) {\n const walletProvider = getWalletProviderByKey(\n { walletProviderKey },\n client\n );\n\n if (!walletProvider) {\n throw new NoWalletProviderFoundError({\n walletProviderKey,\n });\n }\n\n if (!isWaasWalletProvider(walletProvider)) {\n throw new NotWaasWalletProviderError({\n walletProviderKey,\n });\n }\n\n walletProviderMap.set(walletProviderKey, walletProvider);\n }\n }\n\n await Promise.all(\n filteredRequirements.map((requirement) => {\n const walletProviderKey = formatWalletProviderKey({\n chain: requirement.chain,\n displayName: DYNAMIC_WAAS_METADATA.displayName,\n walletProviderType: WalletProviderEnum.EmbeddedWallet,\n });\n\n const walletProvider = walletProviderMap.get(walletProviderKey);\n\n if (!walletProvider || !isWaasWalletProvider(walletProvider)) {\n return Promise.resolve();\n }\n\n return walletProvider.createWalletAccount({\n bitcoinConfig: requirement.bitcoinConfig,\n password,\n thresholdSignatureScheme,\n });\n })\n );\n\n await refreshAuth(client);\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport { refreshAuth } from '../../user/refreshAuth';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype DelegateWaasKeySharesParams = {\n password?: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Delegates cryptographic key shares for a WaaS wallet account.\n *\n * This function allows the delegation of key management responsibilities,\n * enabling distributed key management for enhanced security.\n *\n * @param params.walletAccount - The WaaS wallet account to delegate shares for.\n * @param [params.password] - Optional password for key share operations.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when the key delegation is complete.\n */\nexport const delegateWaasKeyShares = async (\n { password, walletAccount }: DelegateWaasKeySharesParams,\n client = getDefaultClient()\n): Promise<void> => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n await provider.delegateKeyShares({\n password,\n walletAccount,\n });\n\n await refreshAuth(client);\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype ExportWaasClientKeysharesParams = {\n password?: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Exports the client-side key shares for a WaaS wallet account.\n *\n * This function retrieves the cryptographic key shares that are stored\n * on the client side for backup or migration purposes.\n *\n * @param params.walletAccount - The WaaS wallet account to export shares from.\n * @param [params.password] - Optional password to encrypt the exported shares.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves to the exported key shares.\n */\nexport const exportWaasClientKeyshares = async (\n { password, walletAccount }: ExportWaasClientKeysharesParams,\n client = getDefaultClient()\n) => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n return provider.exportClientKeyshares({\n password,\n walletAccount,\n });\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype ExportWaasPrivateKeyParams = {\n displayContainer: HTMLElement;\n password?: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Exports the private key for a WaaS wallet account with secure display.\n *\n * This function reveals the private key for a WaaS wallet and displays it\n * securely within an iframe dynamically inserted into the specified HTML container element.\n *\n * @param params.walletAccount - The WaaS wallet account to export the private key from.\n * @param params.displayContainer - The HTML element where the iframe will be injected.\n * @param [params.password] - Optional password to decrypt the private key.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when the private key export is complete.\n */\nexport const exportWaasPrivateKey = async (\n { displayContainer, password, walletAccount }: ExportWaasPrivateKeyParams,\n client = getDefaultClient()\n) => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n return provider.exportPrivateKey({\n displayContainer,\n password,\n walletAccount,\n });\n};\n","import { type SdkUser, WalletProviderEnum } from '@dynamic-labs/sdk-api-core';\n\nimport { getChainFromVerifiedCredentialChain } from '../../../utils/getChainFromVerifiedCredentialChain';\nimport type { Chain } from '../../chain/chain.types';\n\ntype UserHasEmbeddedWalletForChainProps = {\n chain: Chain;\n user: SdkUser;\n};\n\nexport const userHasEmbeddedWalletForChain = ({\n user,\n chain,\n}: UserHasEmbeddedWalletForChainProps): boolean => {\n const hasEmbeddedWalletForChain = user.verifiedCredentials.some(\n (vc) =>\n vc.walletProvider === WalletProviderEnum.EmbeddedWallet &&\n vc.chain &&\n getChainFromVerifiedCredentialChain(vc.chain) === chain\n );\n\n return hasEmbeddedWalletForChain;\n};\n","import { EmbeddedWalletVersionEnum } from '@dynamic-labs/sdk-api-core';\n\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport { assertDefined } from '../../../utils/assertDefined';\n\n/**\n * Checks if Dynamic WaaS (Wallet as a Service) is enabled for the current project.\n *\n * This function examines the project settings to determine if Dynamic WaaS is\n * enabled in the Dynamic Dashboard or not.\n *\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns True if Dynamic WaaS is enabled, false otherwise.\n */\nexport const isDynamicWaasEnabled = (client = getDefaultClient()) => {\n const projectSettings = client.projectSettings;\n\n assertDefined(projectSettings, 'Project settings are not available');\n\n const embeddedWalletSettings = projectSettings.sdk.embeddedWallets;\n\n const dynamicWaasIsEnabled =\n embeddedWalletSettings?.defaultWalletVersion ===\n EmbeddedWalletVersionEnum.V3;\n\n return dynamicWaasIsEnabled;\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport { assertDefined } from '../../../utils/assertDefined';\nimport type { Chain } from '../../chain/chain.types';\nimport { userHasEmbeddedWalletForChain } from '../../wallets/userHasEmbeddedWalletForChain';\nimport { isDynamicWaasEnabled } from '../isDynamicWaasEnabled';\n\n/**\n * Gets all chains missing a waas wallet account for the current user.\n *\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns An array of all chains that have waas wallet accounts enabled\n * but for which the current user does not yet have an embedded wallet account.\n */\nexport const getChainsMissingWaasWalletAccounts = (\n client = getDefaultClient()\n): Chain[] => {\n const projectSettings = client.projectSettings;\n\n assertDefined(projectSettings, 'Project settings are not available');\n\n const embeddedWalletSettings = projectSettings.sdk.embeddedWallets;\n\n const isWaasEnabled = isDynamicWaasEnabled(client);\n\n const user = client.user;\n\n if (!user || !isWaasEnabled) {\n return [];\n }\n\n const enabledChainForWaas: Chain[] = (\n embeddedWalletSettings?.chainConfigurations?.filter(\n (chain) => chain.enabled\n ) ?? []\n ).map((chain) => chain.name as Chain);\n\n // For each enabled chain, if user does NOT have an embedded wallet, add to missing\n return enabledChainForWaas.filter(\n (chain) => !userHasEmbeddedWalletForChain({ chain, user })\n );\n};\n","import type { WalletRecoveryState } from '@dynamic-labs-wallet/browser-wallet-client';\n\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport type { DynamicClient } from '../../../client/types/DynamicClient';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype GetWalletRecoveryStateParams = {\n walletAccount: WalletAccount;\n};\n\n/**\n * Retrieves the recovery state of a WaaS wallet account.\n *\n * @param params.walletAccount - The WaaS wallet account to get the recovery state for.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves with the wallet recovery state.\n */\nexport const getWalletRecoveryState = async (\n { walletAccount }: GetWalletRecoveryStateParams,\n client: DynamicClient = getDefaultClient()\n): Promise<WalletRecoveryState> => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n return provider.getWalletRecoveryState({\n walletAccount,\n });\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport { assertDefined } from '../../../utils/assertDefined';\nimport { getVerifiedCredentialForWalletAccount } from '../../wallets/utils/getVerifiedCredentialForWalletAccount';\nimport type { WalletAccount } from '../../wallets/walletAccount';\n\ntype HasDelegatedAccessParams = {\n walletAccount: WalletAccount;\n};\n\n/**\n * Checks if a WaaS wallet account has delegated access.\n *\n * @param params.walletAccount - The WaaS wallet account to check for delegated access.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns True if the wallet account has delegated access, false otherwise.\n */\nexport const hasDelegatedAccess = (\n { walletAccount }: HasDelegatedAccessParams,\n client = getDefaultClient()\n): boolean => {\n const verifiedCredential = getVerifiedCredentialForWalletAccount(\n { walletAccount },\n client\n );\n\n assertDefined(\n verifiedCredential,\n 'Verified credential not found for Waas wallet account'\n );\n\n const hasDelegatedKeyShare =\n verifiedCredential.walletProperties?.keyShares?.some(\n (keyShare) => keyShare.backupLocation === 'delegated'\n );\n\n return !!hasDelegatedKeyShare;\n};\n","import { WalletProviderEnum } from '@dynamic-labs/sdk-api-core';\n\nimport type { DynamicClient } from '../../../client/types/DynamicClient';\nimport { NoWalletProviderFoundError } from '../../../errors/NoWalletProviderFoundError';\nimport type { Chain } from '../../chain';\nimport { formatWalletProviderKey } from '../../wallets/utils/formatWalletProviderKey';\nimport { DYNAMIC_WAAS_METADATA } from '../constants';\nimport type { WaasWalletProvider } from '../waas.types';\nimport { findWaasWalletProviderByChain } from '../findWaasWalletProviderByChain/findWaasWalletProviderByChain';\n\ntype GetWaasWalletProviderByChainParams = {\n chain: Chain;\n};\n\nexport const getWaasWalletProviderByChain = (\n { chain }: GetWaasWalletProviderByChainParams,\n client: DynamicClient\n): WaasWalletProvider => {\n const waasProvider = findWaasWalletProviderByChain({ chain }, client);\n\n if (!waasProvider) {\n const waasProviderKey = formatWalletProviderKey({\n chain,\n displayName: DYNAMIC_WAAS_METADATA.displayName,\n walletProviderType: WalletProviderEnum.EmbeddedWallet,\n });\n\n throw new NoWalletProviderFoundError({\n walletProviderKey: waasProviderKey,\n });\n }\n\n return waasProvider;\n};\n","import type { ThresholdSignatureScheme } from '@dynamic-labs-wallet/browser-wallet-client';\n\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport type { Chain } from '../../chain';\nimport { getWaasWalletProviderByChain } from '../getWaasWalletProviderByChain';\n\ntype ImportWaasPrivateKeyParams = {\n chain: Chain;\n privateKey: string;\n thresholdSignatureScheme?: ThresholdSignatureScheme;\n};\n\n/**\n * Imports an existing private key to create a new WaaS wallet account.\n *\n * This function allows users to import their existing private key into\n * Dynamic's WaaS infrastructure for secure management.\n *\n * @param params.chain - The chain for the imported wallet.\n * @param params.privateKey - The private key to import.\n * @param [params.thresholdSignatureScheme] - Optional threshold signature scheme configuration. Default is TWO_OF_TWO.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when the private key is successfully imported.\n */\nexport const importWaasPrivateKey = async (\n { chain, privateKey, thresholdSignatureScheme }: ImportWaasPrivateKeyParams,\n client = getDefaultClient()\n) => {\n const provider = getWaasWalletProviderByChain({ chain }, client);\n\n return provider.importPrivateKey({\n privateKey,\n thresholdSignatureScheme,\n });\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport { assertDefined } from '../../../utils/assertDefined';\n\n/**\n * Checks if the user Waas wallets are password protected.\n *\n * If the user's Waas wallets are password protected, it means that user's will have to be prompted for a\n * password for the first wallet action that happens on each session.\n * The password is also required for creating any new Waas wallets.\n *\n * @param client - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns True if the user has any password protected Waas wallets, false otherwise\n */\nexport const isPasswordRequiredForWaasWallets = (\n client = getDefaultClient()\n): boolean => {\n const { user } = client;\n\n assertDefined(user, 'User is not authenticated');\n\n return user.verifiedCredentials.some((credential) =>\n credential.walletProperties?.keyShares?.some(\n (keyShare) => keyShare.passwordEncrypted\n )\n );\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype RefreshWaasWalletAccountSharesParams = {\n password?: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Refreshes the cryptographic key shares for a WaaS wallet account.\n *\n * This function generates new key shares for the wallet while maintaining\n * the same threshold signature scheme.\n *\n * @param params.walletAccount - The WaaS wallet account to refresh shares for.\n * @param [params.password] - Optional password for key share operations.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when the key shares are refreshed.\n */\nexport const refreshWaasWalletAccountShares = async (\n { walletAccount, password }: RefreshWaasWalletAccountSharesParams,\n client = getDefaultClient()\n) => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n return provider.refreshWalletAccountShares({\n password,\n walletAccount,\n });\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport { refreshAuth } from '../../user/refreshAuth';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype RevokeWaasDelegationParams = {\n password?: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Revokes the delegation of a WaaS wallet account.\n *\n * @param params.walletAccount - The WaaS wallet account to revoke delegation for.\n * @param [params.password] - Optional password for delegation operations.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when the delegation is revoked.\n */\nexport const revokeWaasDelegation = async (\n { password, walletAccount }: RevokeWaasDelegationParams,\n client = getDefaultClient()\n): Promise<void> => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n await provider.revokeDelegation({\n password,\n walletAccount,\n });\n\n await refreshAuth(client);\n};\n","import {\n JwtVerifiedCredentialFormatEnum,\n type SdkUser,\n WalletProviderEnum,\n} from '@dynamic-labs/sdk-api-core';\n\nexport const userHasExternalWallet = (user: SdkUser) => {\n const hasExternalWallet = user?.verifiedCredentials.some(\n (vc) =>\n vc.format === JwtVerifiedCredentialFormatEnum.Blockchain &&\n vc.walletProvider !== WalletProviderEnum.EmbeddedWallet\n );\n\n return hasExternalWallet;\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport { assertDefined } from '../../../utils/assertDefined';\nimport type { Chain } from '../../chain';\nimport { userHasExternalWallet } from '../../wallets/userHasExternalWallet';\nimport { getChainsMissingWaasWalletAccounts } from '../getChainsMissingWaasWalletAccounts';\n\ntype ShouldAutoCreateWalletForChainParams = {\n chain: Chain;\n};\n\n/**\n * Checks if a WaaS wallet should be automatically created for the specified blockchain.\n *\n * This function determines whether the current user configuration and project\n * settings require automatic wallet creation for the given chain, considering\n * whether the user already has an embedded wallet for the enabled chains or an external wallet.\n *\n * @param params.chain - The blockchain network to check.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns True if a wallet should be auto-created for the chain, false otherwise.\n */\nexport const shouldAutoCreateWalletForChain = (\n { chain }: ShouldAutoCreateWalletForChainParams,\n client = getDefaultClient()\n) => {\n assertDefined(client.projectSettings, 'Project settings are not available');\n\n const embeddedWalletSettings = client.projectSettings.sdk.embeddedWallets;\n\n const automaticEmbeddedWalletCreationEnabled =\n embeddedWalletSettings?.automaticEmbeddedWalletCreation;\n\n if (!automaticEmbeddedWalletCreationEnabled || !client.user) {\n return false;\n }\n\n const automaticEmbeddedWalletCreationForExternalEnabled =\n embeddedWalletSettings?.automaticEmbeddedWalletCreationForExternal;\n\n // If user has an external wallet (e.g metamask, phantom, etc), should only\n // create if automaticEmbeddedWalletCreationForExternalEnabled is true\n const shouldCreateDynamicWaasWallet =\n !userHasExternalWallet(client.user) ||\n automaticEmbeddedWalletCreationForExternalEnabled;\n\n if (!shouldCreateDynamicWaasWallet) {\n return false;\n }\n\n const chainsMissingAutoCreatedWallet =\n getChainsMissingWaasWalletAccounts(client);\n\n return chainsMissingAutoCreatedWallet.includes(chain);\n};\n","import type { GetWalletResponse } from '@dynamic-labs-wallet/browser-wallet-client';\n\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype UnlockWalletParams = {\n password: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Unlocks a WaaS wallet account.\n *\n * @param params.walletAccount - The WaaS wallet account to unlock.\n * @param params.password - The password to unlock the wallet.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves with the wallet information.\n */\nexport const unlockWallet = async (\n { password, walletAccount }: UnlockWalletParams,\n client = getDefaultClient()\n): Promise<GetWalletResponse> => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n return provider.unlockWallet({\n password,\n walletAccount,\n });\n};\n","import { getDefaultClient } from '../../../client/defaultClient';\nimport type { WalletAccount } from '../../wallets/walletAccount';\nimport { getWaasWalletProviderFromWalletAccount } from '../getWaasWalletProviderFromWalletAccount';\n\ntype UpdateWaasPasswordParams = {\n currentPassword: string;\n newPassword: string;\n walletAccount: WalletAccount;\n};\n\n/**\n * Updates the password for a WaaS wallet account.\n *\n * This function changes the password used to encrypt and protect the\n * cryptographic key shares for the specified wallet account.\n *\n * @param params.walletAccount - The WaaS wallet account to update the password for.\n * @param params.currentPassword - The current password for the wallet.\n * @param params.newPassword - The new password to set for the wallet.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves when the password is successfully updated.\n */\nexport const updateWaasPassword = async (\n { currentPassword, newPassword, walletAccount }: UpdateWaasPasswordParams,\n client = getDefaultClient()\n) => {\n const provider = getWaasWalletProviderFromWalletAccount(\n { walletAccount },\n client\n );\n\n return provider.updatePassword({\n currentPassword,\n newPassword,\n walletAccount,\n });\n};\n","import { assertPackageVersion } from '@dynamic-labs-sdk/assert-package-version';\n\nimport {\n name as packageName,\n version as packageVersion,\n} from '../../package.json';\nassertPackageVersion(packageName, packageVersion);\n\nexport type {\n GetWalletResponse,\n WalletRecoveryState,\n} from '@dynamic-labs-wallet/browser-wallet-client';\nexport { NotWaasWalletProviderError } from '../errors/NotWaasWalletProviderError';\nexport { backupWaasKeySharesToGoogleDrive } from '../modules/waas/backupWaasKeySharesToGoogleDrive';\nexport { createWaasWalletAccounts } from '../modules/waas/createWaasWalletAccounts';\nexport { delegateWaasKeyShares } from '../modules/waas/delegateWaasKeyShares';\nexport { exportWaasClientKeyshares } from '../modules/waas/exportWaasClientKeyshares';\nexport { exportWaasPrivateKey } from '../modules/waas/exportWaasPrivateKey';\nexport { getChainsMissingWaasWalletAccounts } from '../modules/waas/getChainsMissingWaasWalletAccounts';\nexport { getWalletRecoveryState } from '../modules/waas/getWalletRecoveryState';\nexport { hasDelegatedAccess } from '../modules/waas/hasDelegatedAccess';\nexport { importWaasPrivateKey } from '../modules/waas/importWaasPrivateKey';\nexport { isDynamicWaasEnabled } from '../modules/waas/isDynamicWaasEnabled';\nexport { isPasswordRequiredForWaasWallets } from '../modules/waas/isPasswordRequiredForWaasWallets';\nexport { isWaasWalletAccount } from '../modules/waas/isWaasWalletAccount';\nexport { isWalletCreationRequirement } from '../modules/waas/isWalletCreationRequirement/isWalletCreationRequirement';\nexport { normalizeWalletRequirements } from '../modules/waas/normalizeWalletRequirements/normalizeWalletRequirements';\nexport { refreshWaasWalletAccountShares } from '../modules/waas/refreshWaasWalletAccountShares';\nexport { revokeWaasDelegation } from '../modules/waas/revokeWaasDelegation';\nexport { shouldAutoCreateWalletForChain } from '../modules/waas/shouldAutoCreateWalletForChain';\nexport { unlockWallet } from '../modules/waas/unlockWallet';\nexport { updateWaasPassword } from '../modules/waas/updateWaasPassword';\nexport type {\n WalletCreationBitcoinConfig,\n WalletCreationRequirement,\n} from '../modules/waas/waas.types';\n"],"mappings":";;;;;;;;AAMA,IAAa,6BAAb,cAAgDA,oCAAU;CACxD,YAAY,EAAE,qBAAuD;AACnE,QAAM;GACJ,OAAO;GACP,MAAM;GACN,SAAS;GACT,MAAM;GACN,cAAc,mBAAmB,kBAAkB;GACpD,CAAC;;;;;;ACHN,MAAa,0CACX,EAAE,iBACF,WACuB;CACvB,MAAM,iBAAiBC,iFACrB,EAAE,eAAe,EACjB,OACD;AAED,KAAI,CAACC,mEAAqB,eAAe,CACvC,OAAM,IAAIC,4DAA0B,EAClC,eAAe,cAAc,SAC9B,CAAC;AAGJ,QAAO;;;;;;;;;;;;;;;;ACNT,MAAa,mCAAmC,OAC9C,EAAE,UAAU,iBACZ,SAASC,4CAAkB,KACxB;AAMH,QALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEe,6BAA6B;EAC3C;EACA;EACD,CAAC;;;;;;;;;;;;ACtBJ,MAAa,+BACX,SAEA,OAAO,SAAS,YAAY,SAAS,QAAQ,WAAW;;;;ACN1D,MAAM,+BAA+B;;;;;;;;;;;AAiBrC,MAAa,+BAA+B,EAC1C,sBACA,YACoE;AACpE,KAAI,MAAM,WAAW,EACnB,QAAO,EAAE;CAGX,MAAM,CAAC,aAAa;AAEpB,KAAI,4BAA4B,UAAU,CACxC,QAAQ,MAAsC,KAAK,gBAAgB;AACjE,MAAI,YAAY,UAAU,SAAS,CAAC,YAAY,cAC9C,QAAO;GACL,GAAG;GACH,eAAe,EAAE,aAAa,8BAA8B;GAC7D;AAGH,SAAO;GACP;AAGJ,QAAQ,MAAkB,KAAK,UAAU;EACvC,MAAMC,cAAyC,EAAE,OAAO;AAExD,MAAI,UAAU,MACZ,aAAY,gBAAgB,wBAAwB,EAClD,aAAa,8BACd;AAGH,SAAO;GACP;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;ACmBJ,MAAa,2BAA2B,OACtC,EACE,QACA,UACA,4BAEF,SAASC,4CAAkB,KACT;CAClB,MAAM,yBAAyB,4BAA4B,EAAE,OAAO,QAAQ,CAAC;CAI7E,MAAM,kBAAkB;EAAC;EAAO;EAAO;EAAO;EAAM;CAEpD,MAAM,uBAAuB,uBAAuB,QAAQ,gBAC1D,gBAAgB,SAAS,YAAY,MAAM,CAC5C;AAED,KAAI,qBAAqB,WAAW,EAClC;CAGF,MAAM,oCAAoB,IAAI,KAG3B;AAEH,MAAK,MAAM,eAAe,sBAAsB;EAC9C,MAAM,oBAAoBC,sEAAwB;GAChD,OAAO,YAAY;GACnB,aAAaC,gDAAsB;GACnC,oBAAoBC,8CAAmB;GACxC,CAAC;AAEF,MAAI,CAAC,kBAAkB,IAAI,kBAAkB,EAAE;GAC7C,MAAM,iBAAiBC,qEACrB,EAAE,mBAAmB,EACrB,OACD;AAED,OAAI,CAAC,eACH,OAAM,IAAIC,yEAA2B,EACnC,mBACD,CAAC;AAGJ,OAAI,CAACC,mEAAqB,eAAe,CACvC,OAAM,IAAI,2BAA2B,EACnC,mBACD,CAAC;AAGJ,qBAAkB,IAAI,mBAAmB,eAAe;;;AAI5D,OAAM,QAAQ,IACZ,qBAAqB,KAAK,gBAAgB;EACxC,MAAM,oBAAoBL,sEAAwB;GAChD,OAAO,YAAY;GACnB,aAAaC,gDAAsB;GACnC,oBAAoBC,8CAAmB;GACxC,CAAC;EAEF,MAAM,iBAAiB,kBAAkB,IAAI,kBAAkB;AAE/D,MAAI,CAAC,kBAAkB,CAACG,mEAAqB,eAAe,CAC1D,QAAO,QAAQ,SAAS;AAG1B,SAAO,eAAe,oBAAoB;GACxC,eAAe,YAAY;GAC3B;GACA;GACD,CAAC;GACF,CACH;AAED,OAAMC,8CAAY,OAAO;;;;;;;;;;;;;;;;ACrI3B,MAAa,wBAAwB,OACnC,EAAE,UAAU,iBACZ,SAASC,4CAAkB,KACT;AAMlB,OALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEc,kBAAkB;EAC/B;EACA;EACD,CAAC;AAEF,OAAMC,8CAAY,OAAO;;;;;;;;;;;;;;;;ACf3B,MAAa,4BAA4B,OACvC,EAAE,UAAU,iBACZ,SAASC,4CAAkB,KACxB;AAMH,QALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEe,sBAAsB;EACpC;EACA;EACD,CAAC;;;;;;;;;;;;;;;;;ACVJ,MAAa,uBAAuB,OAClC,EAAE,kBAAkB,UAAU,iBAC9B,SAASC,4CAAkB,KACxB;AAMH,QALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEe,iBAAiB;EAC/B;EACA;EACA;EACD,CAAC;;;;;ACzBJ,MAAa,iCAAiC,EAC5C,MACA,YACiD;AAQjD,QAPkC,KAAK,oBAAoB,MACxD,OACC,GAAG,mBAAmBC,8CAAmB,kBACzC,GAAG,SACHC,8DAAoC,GAAG,MAAM,KAAK,MACrD;;;;;;;;;;;;;;ACLH,MAAa,wBAAwB,SAASC,4CAAkB,KAAK;CACnE,MAAM,kBAAkB,OAAO;AAE/B,yCAAc,iBAAiB,qCAAqC;AAQpE,QAN+B,gBAAgB,IAAI,iBAGzB,yBACxBC,qDAA0B;;;;;;;;;;;;ACV9B,MAAa,sCACX,SAASC,4CAAkB,KACf;CACZ,MAAM,kBAAkB,OAAO;AAE/B,yCAAc,iBAAiB,qCAAqC;CAEpE,MAAM,yBAAyB,gBAAgB,IAAI;CAEnD,MAAM,gBAAgB,qBAAqB,OAAO;CAElD,MAAM,OAAO,OAAO;AAEpB,KAAI,CAAC,QAAQ,CAAC,cACZ,QAAO,EAAE;AAUX,SANE,wBAAwB,qBAAqB,QAC1C,UAAU,MAAM,QAClB,IAAI,EAAE,EACP,KAAK,UAAU,MAAM,KAAc,CAGV,QACxB,UAAU,CAAC,8BAA8B;EAAE;EAAO;EAAM,CAAC,CAC3D;;;;;;;;;;;;ACrBH,MAAa,yBAAyB,OACpC,EAAE,iBACF,SAAwBC,4CAAkB,KACT;AAMjC,QALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEe,uBAAuB,EACrC,eACD,CAAC;;;;;;;;;;;;ACbJ,MAAa,sBACX,EAAE,iBACF,SAASC,4CAAkB,KACf;CACZ,MAAM,qBAAqBC,oFACzB,EAAE,eAAe,EACjB,OACD;AAED,yCACE,oBACA,wDACD;AAOD,QAAO,CAAC,CAJN,mBAAmB,kBAAkB,WAAW,MAC7C,aAAa,SAAS,mBAAmB,YAC3C;;;;;ACnBL,MAAa,gCACX,EAAE,SACF,WACuB;CACvB,MAAM,eAAeC,4EAA8B,EAAE,OAAO,EAAE,OAAO;AAErE,KAAI,CAAC,aAOH,OAAM,IAAIC,yEAA2B,EACnC,mBAPsBC,sEAAwB;EAC9C;EACA,aAAaC,gDAAsB;EACnC,oBAAoBC,8CAAmB;EACxC,CAAC,EAID,CAAC;AAGJ,QAAO;;;;;;;;;;;;;;;;;ACRT,MAAa,uBAAuB,OAClC,EAAE,OAAO,YAAY,4BACrB,SAASC,4CAAkB,KACxB;AAGH,QAFiB,6BAA6B,EAAE,OAAO,EAAE,OAAO,CAEhD,iBAAiB;EAC/B;EACA;EACD,CAAC;;;;;;;;;;;;;;;ACpBJ,MAAa,oCACX,SAASC,4CAAkB,KACf;CACZ,MAAM,EAAE,SAAS;AAEjB,yCAAc,MAAM,4BAA4B;AAEhD,QAAO,KAAK,oBAAoB,MAAM,eACpC,WAAW,kBAAkB,WAAW,MACrC,aAAa,SAAS,kBACxB,CACF;;;;;;;;;;;;;;;;ACJH,MAAa,iCAAiC,OAC5C,EAAE,eAAe,YACjB,SAASC,4CAAkB,KACxB;AAMH,QALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEe,2BAA2B;EACzC;EACA;EACD,CAAC;;;;;;;;;;;;;ACdJ,MAAa,uBAAuB,OAClC,EAAE,UAAU,iBACZ,SAASC,4CAAkB,KACT;AAMlB,OALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEc,iBAAiB;EAC9B;EACA;EACD,CAAC;AAEF,OAAMC,8CAAY,OAAO;;;;;AC1B3B,MAAa,yBAAyB,SAAkB;AAOtD,QAN0B,MAAM,oBAAoB,MACjD,OACC,GAAG,WAAWC,2DAAgC,cAC9C,GAAG,mBAAmBC,8CAAmB,eAC5C;;;;;;;;;;;;;;;;ACUH,MAAa,kCACX,EAAE,SACF,SAASC,4CAAkB,KACxB;AACH,yCAAc,OAAO,iBAAiB,qCAAqC;CAE3E,MAAM,yBAAyB,OAAO,gBAAgB,IAAI;AAK1D,KAAI,CAFF,wBAAwB,mCAEqB,CAAC,OAAO,KACrD,QAAO;CAGT,MAAM,oDACJ,wBAAwB;AAQ1B,KAAI,EAHF,CAAC,sBAAsB,OAAO,KAAK,IACnC,mDAGA,QAAO;AAMT,QAFE,mCAAmC,OAAO,CAEN,SAAS,MAAM;;;;;;;;;;;;;ACjCvD,MAAa,eAAe,OAC1B,EAAE,UAAU,iBACZ,SAASC,4CAAkB,KACI;AAM/B,QALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEe,aAAa;EAC3B;EACA;EACD,CAAC;;;;;;;;;;;;;;;;;ACTJ,MAAa,qBAAqB,OAChC,EAAE,iBAAiB,aAAa,iBAChC,SAASC,4CAAkB,KACxB;AAMH,QALiB,uCACf,EAAE,eAAe,EACjB,OACD,CAEe,eAAe;EAC7B;EACA;EACA;EACD,CAAC;;;;;mEC7BiBC,gCAAaC,kCAAe"}
|