@dynamic-labs-wallet/browser-wallet-client 0.0.319 → 0.0.321
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/index.cjs.js +38 -18
- package/index.esm.js +38 -18
- package/package.json +3 -4
- package/src/client/client.d.ts +0 -86
- package/src/client/client.d.ts.map +0 -1
- package/src/client/iframeManager/IframeManager.d.ts +0 -121
- package/src/client/iframeManager/IframeManager.d.ts.map +0 -1
- package/src/client/iframeManager/index.d.ts +0 -2
- package/src/client/iframeManager/index.d.ts.map +0 -1
- package/src/client/index.d.ts +0 -3
- package/src/client/index.d.ts.map +0 -1
- package/src/index.d.ts +0 -4
- package/src/index.d.ts.map +0 -1
- package/src/services/iframeMessageHandler.d.ts +0 -39
- package/src/services/iframeMessageHandler.d.ts.map +0 -1
- package/src/services/logger.d.ts +0 -3
- package/src/services/logger.d.ts.map +0 -1
- package/src/services/messageTransportBridge.d.ts +0 -3
- package/src/services/messageTransportBridge.d.ts.map +0 -1
package/index.cjs.js
CHANGED
|
@@ -2,7 +2,6 @@
|
|
|
2
2
|
|
|
3
3
|
var core = require('@dynamic-labs-wallet/core');
|
|
4
4
|
var messageTransport = require('@dynamic-labs/message-transport');
|
|
5
|
-
var uuid = require('uuid');
|
|
6
5
|
var logger$1 = require('@dynamic-labs/logger');
|
|
7
6
|
|
|
8
7
|
function _extends() {
|
|
@@ -262,23 +261,29 @@ class IframeManager {
|
|
|
262
261
|
}
|
|
263
262
|
setupMessageTransportBridge(this.messageTransport, this.iframe, this.iframeDomain);
|
|
264
263
|
this.iframeMessageHandler = new iframeMessageHandler(this.messageTransport);
|
|
265
|
-
// Set up request channel to handle messages from iframe (for secureStorage)
|
|
266
|
-
if (this.secureStorage) {
|
|
267
|
-
this.iframeRequestChannel = this.
|
|
264
|
+
// Set up request channel to handle messages from iframe (for secureStorage and getSignedSessionId)
|
|
265
|
+
if (this.secureStorage || this.getSignedSessionIdCallback) {
|
|
266
|
+
this.iframeRequestChannel = this.setupIframeRequestHandlers(this.messageTransport);
|
|
268
267
|
}
|
|
269
268
|
await this.initAuthToken();
|
|
270
269
|
}
|
|
271
270
|
/**
|
|
272
|
-
* Sets up message handlers for secureStorage
|
|
273
|
-
*/
|
|
271
|
+
* Sets up message handlers for iframe → host requests (secureStorage and getSignedSessionId)
|
|
272
|
+
*/ setupIframeRequestHandlers(transport) {
|
|
274
273
|
// Create a request channel to handle requests FROM iframe
|
|
275
274
|
const requestChannel = messageTransport.createRequestChannel(transport);
|
|
276
|
-
|
|
277
|
-
|
|
278
|
-
|
|
279
|
-
|
|
280
|
-
|
|
281
|
-
|
|
275
|
+
if (this.secureStorage) {
|
|
276
|
+
// Handle getClientKeyShare requests from iframe
|
|
277
|
+
requestChannel.handle('getClientKeyShare', this.handleGetClientKeyShare.bind(this));
|
|
278
|
+
// Handle setClientKeyShare requests from iframe
|
|
279
|
+
requestChannel.handle('setClientKeyShare', this.handleSetClientKeyShare.bind(this));
|
|
280
|
+
// Handle removeClientKeyShare requests from iframe
|
|
281
|
+
requestChannel.handle('removeClientKeyShare', this.handleRemoveClientKeyShare.bind(this));
|
|
282
|
+
}
|
|
283
|
+
if (this.getSignedSessionIdCallback) {
|
|
284
|
+
// Handle getSignedSessionId requests from iframe
|
|
285
|
+
requestChannel.handle('getSignedSessionId', this.handleGetSignedSessionId.bind(this));
|
|
286
|
+
}
|
|
282
287
|
return requestChannel;
|
|
283
288
|
}
|
|
284
289
|
/**
|
|
@@ -309,6 +314,17 @@ class IframeManager {
|
|
|
309
314
|
await this.secureStorage.removeClientKeyShare(request.accountAddress);
|
|
310
315
|
}
|
|
311
316
|
/**
|
|
317
|
+
* Handler for getSignedSessionId requests from iframe
|
|
318
|
+
*/ async handleGetSignedSessionId(_request) {
|
|
319
|
+
if (!this.getSignedSessionIdCallback) {
|
|
320
|
+
throw new Error('Signed session ID callback not available');
|
|
321
|
+
}
|
|
322
|
+
const signedSessionId = await this.getSignedSessionIdCallback();
|
|
323
|
+
return {
|
|
324
|
+
signedSessionId
|
|
325
|
+
};
|
|
326
|
+
}
|
|
327
|
+
/**
|
|
312
328
|
* securely exchange the auth token with iframe securely
|
|
313
329
|
*/ async initAuthToken() {
|
|
314
330
|
if (!this.iframeMessageHandler) {
|
|
@@ -591,10 +607,10 @@ class IframeManager {
|
|
|
591
607
|
});
|
|
592
608
|
setupMessageTransportBridge(transport, iframe, this.iframeDomain);
|
|
593
609
|
const iframeDisplay = new iframeMessageHandler(transport);
|
|
594
|
-
// Set up
|
|
595
|
-
// can access key shares (e.g. for exportPrivateKey)
|
|
596
|
-
if (this.secureStorage) {
|
|
597
|
-
this.
|
|
610
|
+
// Set up iframe request handlers on this transport so the display iframe
|
|
611
|
+
// can access key shares (e.g. for exportPrivateKey) and signed session ID
|
|
612
|
+
if (this.secureStorage || this.getSignedSessionIdCallback) {
|
|
613
|
+
this.setupIframeRequestHandlers(transport);
|
|
598
614
|
}
|
|
599
615
|
var _this_authMode;
|
|
600
616
|
// if authMode is header: inform iframe the authMode with auth token
|
|
@@ -647,13 +663,17 @@ class IframeManager {
|
|
|
647
663
|
if (internalOptions == null ? void 0 : internalOptions.secureStorage) {
|
|
648
664
|
this.secureStorage = internalOptions.secureStorage;
|
|
649
665
|
}
|
|
666
|
+
// Set signed session ID callback if provided (internal use only)
|
|
667
|
+
if (internalOptions == null ? void 0 : internalOptions.getSignedSessionId) {
|
|
668
|
+
this.getSignedSessionIdCallback = internalOptions.getSignedSessionId;
|
|
669
|
+
}
|
|
650
670
|
const environment = core.getEnvironmentFromUrl(baseApiUrl);
|
|
651
671
|
this.iframeDomain = core.IFRAME_DOMAIN_MAP[environment];
|
|
652
672
|
if (this.authMode === core.AuthMode.COOKIE) {
|
|
653
673
|
this.iframeDomain = this.baseApiUrl;
|
|
654
674
|
}
|
|
655
675
|
// Generate unique instanceId when client is created
|
|
656
|
-
this.instanceId =
|
|
676
|
+
this.instanceId = crypto.randomUUID();
|
|
657
677
|
this.debug = Boolean(debug);
|
|
658
678
|
this.logger.setLogLevel(this.debug ? 'DEBUG' : 'INFO');
|
|
659
679
|
}
|
|
@@ -1006,7 +1026,7 @@ class DynamicWalletClient extends IframeManager {
|
|
|
1006
1026
|
debug,
|
|
1007
1027
|
authMode
|
|
1008
1028
|
}, internalOptions);
|
|
1009
|
-
// Note: secureStorage
|
|
1029
|
+
// Note: secureStorage and getSignedSessionId are already set by IframeManager constructor
|
|
1010
1030
|
}
|
|
1011
1031
|
}
|
|
1012
1032
|
|
package/index.esm.js
CHANGED
|
@@ -1,7 +1,6 @@
|
|
|
1
1
|
import { AuthMode, getEnvironmentFromUrl, IFRAME_DOMAIN_MAP, WalletOperation } from '@dynamic-labs-wallet/core';
|
|
2
2
|
export { AuthMode, MPC_RELAY_PREPROD_API_URL, MPC_RELAY_PROD_API_URL, ThresholdSignatureScheme, WalletOperation } from '@dynamic-labs-wallet/core';
|
|
3
3
|
import { createRequestChannel, parseMessageTransportData, applyDefaultMessageOrigin, createMessageTransport } from '@dynamic-labs/message-transport';
|
|
4
|
-
import { v4 } from 'uuid';
|
|
5
4
|
import { Logger } from '@dynamic-labs/logger';
|
|
6
5
|
|
|
7
6
|
function _extends() {
|
|
@@ -261,23 +260,29 @@ class IframeManager {
|
|
|
261
260
|
}
|
|
262
261
|
setupMessageTransportBridge(this.messageTransport, this.iframe, this.iframeDomain);
|
|
263
262
|
this.iframeMessageHandler = new iframeMessageHandler(this.messageTransport);
|
|
264
|
-
// Set up request channel to handle messages from iframe (for secureStorage)
|
|
265
|
-
if (this.secureStorage) {
|
|
266
|
-
this.iframeRequestChannel = this.
|
|
263
|
+
// Set up request channel to handle messages from iframe (for secureStorage and getSignedSessionId)
|
|
264
|
+
if (this.secureStorage || this.getSignedSessionIdCallback) {
|
|
265
|
+
this.iframeRequestChannel = this.setupIframeRequestHandlers(this.messageTransport);
|
|
267
266
|
}
|
|
268
267
|
await this.initAuthToken();
|
|
269
268
|
}
|
|
270
269
|
/**
|
|
271
|
-
* Sets up message handlers for secureStorage
|
|
272
|
-
*/
|
|
270
|
+
* Sets up message handlers for iframe → host requests (secureStorage and getSignedSessionId)
|
|
271
|
+
*/ setupIframeRequestHandlers(transport) {
|
|
273
272
|
// Create a request channel to handle requests FROM iframe
|
|
274
273
|
const requestChannel = createRequestChannel(transport);
|
|
275
|
-
|
|
276
|
-
|
|
277
|
-
|
|
278
|
-
|
|
279
|
-
|
|
280
|
-
|
|
274
|
+
if (this.secureStorage) {
|
|
275
|
+
// Handle getClientKeyShare requests from iframe
|
|
276
|
+
requestChannel.handle('getClientKeyShare', this.handleGetClientKeyShare.bind(this));
|
|
277
|
+
// Handle setClientKeyShare requests from iframe
|
|
278
|
+
requestChannel.handle('setClientKeyShare', this.handleSetClientKeyShare.bind(this));
|
|
279
|
+
// Handle removeClientKeyShare requests from iframe
|
|
280
|
+
requestChannel.handle('removeClientKeyShare', this.handleRemoveClientKeyShare.bind(this));
|
|
281
|
+
}
|
|
282
|
+
if (this.getSignedSessionIdCallback) {
|
|
283
|
+
// Handle getSignedSessionId requests from iframe
|
|
284
|
+
requestChannel.handle('getSignedSessionId', this.handleGetSignedSessionId.bind(this));
|
|
285
|
+
}
|
|
281
286
|
return requestChannel;
|
|
282
287
|
}
|
|
283
288
|
/**
|
|
@@ -308,6 +313,17 @@ class IframeManager {
|
|
|
308
313
|
await this.secureStorage.removeClientKeyShare(request.accountAddress);
|
|
309
314
|
}
|
|
310
315
|
/**
|
|
316
|
+
* Handler for getSignedSessionId requests from iframe
|
|
317
|
+
*/ async handleGetSignedSessionId(_request) {
|
|
318
|
+
if (!this.getSignedSessionIdCallback) {
|
|
319
|
+
throw new Error('Signed session ID callback not available');
|
|
320
|
+
}
|
|
321
|
+
const signedSessionId = await this.getSignedSessionIdCallback();
|
|
322
|
+
return {
|
|
323
|
+
signedSessionId
|
|
324
|
+
};
|
|
325
|
+
}
|
|
326
|
+
/**
|
|
311
327
|
* securely exchange the auth token with iframe securely
|
|
312
328
|
*/ async initAuthToken() {
|
|
313
329
|
if (!this.iframeMessageHandler) {
|
|
@@ -590,10 +606,10 @@ class IframeManager {
|
|
|
590
606
|
});
|
|
591
607
|
setupMessageTransportBridge(transport, iframe, this.iframeDomain);
|
|
592
608
|
const iframeDisplay = new iframeMessageHandler(transport);
|
|
593
|
-
// Set up
|
|
594
|
-
// can access key shares (e.g. for exportPrivateKey)
|
|
595
|
-
if (this.secureStorage) {
|
|
596
|
-
this.
|
|
609
|
+
// Set up iframe request handlers on this transport so the display iframe
|
|
610
|
+
// can access key shares (e.g. for exportPrivateKey) and signed session ID
|
|
611
|
+
if (this.secureStorage || this.getSignedSessionIdCallback) {
|
|
612
|
+
this.setupIframeRequestHandlers(transport);
|
|
597
613
|
}
|
|
598
614
|
var _this_authMode;
|
|
599
615
|
// if authMode is header: inform iframe the authMode with auth token
|
|
@@ -646,13 +662,17 @@ class IframeManager {
|
|
|
646
662
|
if (internalOptions == null ? void 0 : internalOptions.secureStorage) {
|
|
647
663
|
this.secureStorage = internalOptions.secureStorage;
|
|
648
664
|
}
|
|
665
|
+
// Set signed session ID callback if provided (internal use only)
|
|
666
|
+
if (internalOptions == null ? void 0 : internalOptions.getSignedSessionId) {
|
|
667
|
+
this.getSignedSessionIdCallback = internalOptions.getSignedSessionId;
|
|
668
|
+
}
|
|
649
669
|
const environment = getEnvironmentFromUrl(baseApiUrl);
|
|
650
670
|
this.iframeDomain = IFRAME_DOMAIN_MAP[environment];
|
|
651
671
|
if (this.authMode === AuthMode.COOKIE) {
|
|
652
672
|
this.iframeDomain = this.baseApiUrl;
|
|
653
673
|
}
|
|
654
674
|
// Generate unique instanceId when client is created
|
|
655
|
-
this.instanceId =
|
|
675
|
+
this.instanceId = crypto.randomUUID();
|
|
656
676
|
this.debug = Boolean(debug);
|
|
657
677
|
this.logger.setLogLevel(this.debug ? 'DEBUG' : 'INFO');
|
|
658
678
|
}
|
|
@@ -1005,7 +1025,7 @@ class DynamicWalletClient extends IframeManager {
|
|
|
1005
1025
|
debug,
|
|
1006
1026
|
authMode
|
|
1007
1027
|
}, internalOptions);
|
|
1008
|
-
// Note: secureStorage
|
|
1028
|
+
// Note: secureStorage and getSignedSessionId are already set by IframeManager constructor
|
|
1009
1029
|
}
|
|
1010
1030
|
}
|
|
1011
1031
|
|
package/package.json
CHANGED
|
@@ -1,13 +1,12 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@dynamic-labs-wallet/browser-wallet-client",
|
|
3
|
-
"version": "0.0.
|
|
3
|
+
"version": "0.0.321",
|
|
4
4
|
"license": "MIT",
|
|
5
5
|
"type": "module",
|
|
6
6
|
"dependencies": {
|
|
7
|
-
"@dynamic-labs-wallet/core": "0.0.
|
|
7
|
+
"@dynamic-labs-wallet/core": "0.0.321",
|
|
8
8
|
"@dynamic-labs/logger": "^4.45.2",
|
|
9
|
-
"@dynamic-labs/message-transport": "^4.45.2"
|
|
10
|
-
"uuid": "11.1.0"
|
|
9
|
+
"@dynamic-labs/message-transport": "^4.45.2"
|
|
11
10
|
},
|
|
12
11
|
"publishConfig": {
|
|
13
12
|
"access": "public"
|
package/src/client/client.d.ts
DELETED
|
@@ -1,86 +0,0 @@
|
|
|
1
|
-
import type { BackupKeySharesToGoogleDriveRequest, BackupKeySharesToICloudRequest, BitcoinConfig, CreateWalletAccountRequest, CreateWalletAccountResponse, DelegateKeySharesRequest, ExportClientKeysharesRequest, GetWalletRecoveryStateRequest, GetWalletResponse, ImportPrivateKeyRequest, IsPasswordEncryptedRequest, OfflineExportPrivateKeyResponse, RefreshWalletAccountSharesRequest, RequestWithElevatedAccessToken, RequestWithTraceContext, RequiresPasswordForOperationRequest, ReshareRequest, RevokeDelegationRequest, SecureStorageAdapter, SetPasswordRequest, SignMessageRequestBrowser, SignRawMessageRequest, SignTransactionRequest, SignTypedDataRequest, UnlockWalletRequest, UpdatePasswordRequest, VerifyPasswordRequest, WalletRecoveryState } from '@dynamic-labs-wallet/core';
|
|
2
|
-
import { AuthMode, WalletOperation } from '@dynamic-labs-wallet/core';
|
|
3
|
-
import { IframeManager } from './iframeManager/index.js';
|
|
4
|
-
export declare class DynamicWalletClient extends IframeManager {
|
|
5
|
-
constructor({ environmentId, authToken, baseApiUrl, baseMPCRelayApiUrl, baseClientKeysharesRelayApiUrl, chainName, sdkVersion, debug, authMode, }: {
|
|
6
|
-
environmentId: string;
|
|
7
|
-
authToken: string;
|
|
8
|
-
baseApiUrl: string;
|
|
9
|
-
baseMPCRelayApiUrl: string;
|
|
10
|
-
chainName: string;
|
|
11
|
-
sdkVersion?: string;
|
|
12
|
-
debug?: boolean;
|
|
13
|
-
authMode?: AuthMode;
|
|
14
|
-
baseClientKeysharesRelayApiUrl?: string;
|
|
15
|
-
}, internalOptions?: {
|
|
16
|
-
secureStorage?: SecureStorageAdapter;
|
|
17
|
-
});
|
|
18
|
-
private withHandler;
|
|
19
|
-
getWallets(): Promise<GetWalletResponse[]>;
|
|
20
|
-
getAllWallets(): Promise<GetWalletResponse[]>;
|
|
21
|
-
getWallet({ accountAddress, walletOperation, signedSessionId, authToken, }: {
|
|
22
|
-
accountAddress: string;
|
|
23
|
-
walletOperation?: WalletOperation;
|
|
24
|
-
signedSessionId: string;
|
|
25
|
-
authToken?: string;
|
|
26
|
-
}): Promise<GetWalletResponse>;
|
|
27
|
-
getWalletRecoveryState({ accountAddress, authToken, signedSessionId, password, traceContext, }: RequestWithTraceContext<Omit<GetWalletRecoveryStateRequest, 'chainName'>>): Promise<WalletRecoveryState>;
|
|
28
|
-
unlockWallet({ accountAddress, password, signedSessionId, authToken, traceContext, }: RequestWithTraceContext<Omit<UnlockWalletRequest, 'chainName'>>): Promise<GetWalletResponse>;
|
|
29
|
-
createWalletAccount({ thresholdSignatureScheme, password, signedSessionId, authToken, traceContext, bitcoinConfig, }: RequestWithTraceContext<Omit<CreateWalletAccountRequest, 'chainName'>>): Promise<CreateWalletAccountResponse>;
|
|
30
|
-
requiresPasswordForOperation({ accountAddress, walletOperation, authToken, }: Omit<RequiresPasswordForOperationRequest, 'chainName'>): Promise<boolean>;
|
|
31
|
-
isPasswordEncrypted({ accountAddress, authToken, }: Omit<IsPasswordEncryptedRequest, 'chainName'>): Promise<boolean>;
|
|
32
|
-
signMessage({ message, accountAddress, password, signedSessionId, authToken, mfaToken, elevatedAccessToken, context, traceContext, bitcoinConfig, }: RequestWithTraceContext<RequestWithElevatedAccessToken<Omit<SignMessageRequestBrowser, 'chainName'>>>): Promise<string>;
|
|
33
|
-
signRawMessage({ message, accountAddress, password, signedSessionId, authToken, mfaToken, elevatedAccessToken, context, traceContext, bitcoinConfig, }: RequestWithTraceContext<RequestWithElevatedAccessToken<Omit<SignRawMessageRequest, 'chainName'>>>): Promise<string>;
|
|
34
|
-
/**
|
|
35
|
-
* Signs a transaction and returns the signature, @transaction is a string of the serialized transaction
|
|
36
|
-
* EVM:
|
|
37
|
-
* transaction = serializeTransaction()
|
|
38
|
-
* SOL:
|
|
39
|
-
* const messageBytes = transaction.serializeMessage();
|
|
40
|
-
* const messageToSign = Buffer.from(messageBytes).toString("hex");
|
|
41
|
-
* SUI:
|
|
42
|
-
* const txBytes = await txb.build({ client });
|
|
43
|
-
* const txString = Buffer.from(txBytes).toString("hex");
|
|
44
|
-
*/
|
|
45
|
-
signTransaction({ senderAddress, transaction, password, signedSessionId, authToken, mfaToken, elevatedAccessToken, chainId, traceContext, bitcoinConfig, }: RequestWithTraceContext<RequestWithElevatedAccessToken<Omit<SignTransactionRequest, 'chainName'>>>): Promise<string>;
|
|
46
|
-
signTypedData({ accountAddress, typedData, password, signedSessionId, authToken, mfaToken, elevatedAccessToken, traceContext, }: RequestWithTraceContext<RequestWithElevatedAccessToken<Omit<SignTypedDataRequest, 'chainName'>>>): Promise<string>;
|
|
47
|
-
backupKeySharesToGoogleDrive({ accountAddress, password, signedSessionId, authToken, traceContext, }: RequestWithTraceContext<Omit<BackupKeySharesToGoogleDriveRequest, 'chainName'>>): Promise<void>;
|
|
48
|
-
backupKeySharesToICloud({ accountAddress, password, signedSessionId, authToken, traceContext, }: RequestWithTraceContext<Omit<BackupKeySharesToICloudRequest, 'chainName'>>): Promise<void>;
|
|
49
|
-
displayICloudSignIn({ displayContainer }: {
|
|
50
|
-
displayContainer: HTMLElement;
|
|
51
|
-
}): Promise<void>;
|
|
52
|
-
hideICloudSignIn(): Promise<void>;
|
|
53
|
-
isICloudAuthenticated(): Promise<boolean>;
|
|
54
|
-
delegateKeyShares({ accountAddress, password, signedSessionId, authToken, mfaToken, traceContext, }: RequestWithTraceContext<Omit<DelegateKeySharesRequest, 'chainName'>>): Promise<void>;
|
|
55
|
-
revokeDelegation({ accountAddress, password, signedSessionId, authToken, mfaToken, traceContext, }: RequestWithTraceContext<Omit<RevokeDelegationRequest, 'chainName'>>): Promise<void>;
|
|
56
|
-
exportClientKeysharesFromGoogleDrive({ accountAddress, password, signedSessionId, authToken, traceContext, }: RequestWithTraceContext<{
|
|
57
|
-
accountAddress: string;
|
|
58
|
-
password?: string;
|
|
59
|
-
signedSessionId: string;
|
|
60
|
-
authToken?: string;
|
|
61
|
-
}>): Promise<void>;
|
|
62
|
-
refreshWalletAccountShares({ accountAddress, password, signedSessionId, authToken, mfaToken, elevatedAccessToken, traceContext, }: RequestWithTraceContext<RequestWithElevatedAccessToken<Omit<RefreshWalletAccountSharesRequest, 'chainName'>>>): Promise<void>;
|
|
63
|
-
reshare({ accountAddress, oldThresholdSignatureScheme, newThresholdSignatureScheme, password, signedSessionId, authToken, mfaToken, elevatedAccessToken, traceContext, }: RequestWithTraceContext<RequestWithElevatedAccessToken<Omit<ReshareRequest, 'chainName'>>>): Promise<void>;
|
|
64
|
-
exportPrivateKey({ accountAddress, elevatedAccessToken, displayContainer, password, signedSessionId, authToken, mfaToken, traceContext, bitcoinConfig, }: RequestWithTraceContext<RequestWithElevatedAccessToken<{
|
|
65
|
-
accountAddress: string;
|
|
66
|
-
displayContainer: HTMLElement;
|
|
67
|
-
password?: string;
|
|
68
|
-
signedSessionId: string;
|
|
69
|
-
authToken?: string;
|
|
70
|
-
mfaToken?: string;
|
|
71
|
-
bitcoinConfig?: BitcoinConfig;
|
|
72
|
-
}>>): Promise<void>;
|
|
73
|
-
verifyPassword({ accountAddress, password, walletOperation, signedSessionId, authToken, traceContext, }: RequestWithTraceContext<Omit<VerifyPasswordRequest, 'chainName'>>): Promise<void>;
|
|
74
|
-
updatePassword({ accountAddress, existingPassword, newPassword, signedSessionId, authToken, passwordUpdateBatchId, traceContext, }: RequestWithTraceContext<Omit<UpdatePasswordRequest, 'chainName'>>): Promise<void>;
|
|
75
|
-
setPassword({ accountAddress, newPassword, signedSessionId, authToken, passwordUpdateBatchId, traceContext, }: RequestWithTraceContext<Omit<SetPasswordRequest, 'chainName'>>): Promise<void>;
|
|
76
|
-
importPrivateKey({ privateKey, thresholdSignatureScheme, password, signedSessionId, authToken, publicAddressCheck, addressType, traceContext, legacyWalletId, }: RequestWithTraceContext<Omit<ImportPrivateKeyRequest, 'chainName'>>): Promise<CreateWalletAccountResponse>;
|
|
77
|
-
exportClientKeyshares({ accountAddress, password, signedSessionId, authToken, traceContext, }: RequestWithTraceContext<Omit<ExportClientKeysharesRequest, 'chainName'>>): Promise<void>;
|
|
78
|
-
/**
|
|
79
|
-
* keyShares is stringified list of EcdsaKeygenResult[] and Ed25519KeygenResult[]
|
|
80
|
-
*/
|
|
81
|
-
offlineExportPrivateKey({ keyShares, derivationPath, traceContext, }: RequestWithTraceContext<{
|
|
82
|
-
keyShares: string[];
|
|
83
|
-
derivationPath?: string;
|
|
84
|
-
}>): Promise<OfflineExportPrivateKeyResponse>;
|
|
85
|
-
}
|
|
86
|
-
//# sourceMappingURL=client.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"client.d.ts","sourceRoot":"","sources":["../../src/client/client.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EACV,mCAAmC,EACnC,8BAA8B,EAC9B,aAAa,EACb,0BAA0B,EAC1B,2BAA2B,EAC3B,wBAAwB,EACxB,4BAA4B,EAC5B,6BAA6B,EAC7B,iBAAiB,EACjB,uBAAuB,EACvB,0BAA0B,EAC1B,+BAA+B,EAC/B,iCAAiC,EACjC,8BAA8B,EAC9B,uBAAuB,EACvB,mCAAmC,EACnC,cAAc,EACd,uBAAuB,EACvB,oBAAoB,EACpB,kBAAkB,EAClB,yBAAyB,EACzB,qBAAqB,EACrB,sBAAsB,EACtB,oBAAoB,EACpB,mBAAmB,EACnB,qBAAqB,EACrB,qBAAqB,EACrB,mBAAmB,EACpB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,QAAQ,EAAE,eAAe,EAAE,MAAM,2BAA2B,CAAC;AACtE,OAAO,EAAE,aAAa,EAAE,MAAM,0BAA0B,CAAC;AAEzD,qBAAa,mBAAoB,SAAQ,aAAa;gBAElD,EACE,aAAa,EACb,SAAS,EACT,UAAU,EACV,kBAAkB,EAClB,8BAA8B,EAC9B,SAAS,EACT,UAAU,EACV,KAAK,EACL,QAA0B,GAC3B,EAAE;QACD,aAAa,EAAE,MAAM,CAAC;QACtB,SAAS,EAAE,MAAM,CAAC;QAClB,UAAU,EAAE,MAAM,CAAC;QACnB,kBAAkB,EAAE,MAAM,CAAC;QAC3B,SAAS,EAAE,MAAM,CAAC;QAClB,UAAU,CAAC,EAAE,MAAM,CAAC;QACpB,KAAK,CAAC,EAAE,OAAO,CAAC;QAChB,QAAQ,CAAC,EAAE,QAAQ,CAAC;QACpB,8BAA8B,CAAC,EAAE,MAAM,CAAC;KACzC,EACD,eAAe,CAAC,EAAE;QAAE,aAAa,CAAC,EAAE,oBAAoB,CAAA;KAAE;YAmB9C,WAAW;IAUnB,UAAU,IAAI,OAAO,CAAC,iBAAiB,EAAE,CAAC;IAQ1C,aAAa,IAAI,OAAO,CAAC,iBAAiB,EAAE,CAAC;IAQ7C,SAAS,CAAC,EACd,cAAc,EACd,eAA8C,EAC9C,eAAe,EACf,SAAS,GACV,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,eAAe,CAAC;QAClC,eAAe,EAAE,MAAM,CAAC;QACxB,SAAS,CAAC,EAAE,MAAM,CAAC;KACpB;IAYK,sBAAsB,CAAC,EAC3B,cAAc,EACd,SAAS,EACT,eAAe,EACf,QAAQ,EACR,YAAY,GACb,EAAE,uBAAuB,CAAC,IAAI,CAAC,6BAA6B,EAAE,WAAW,CAAC,CAAC,GAAG,OAAO,CAAC,mBAAmB,CAAC;IAarG,YAAY,CAAC,EACjB,cAAc,EACd,QAAQ,EACR,eAAe,EACf,SAAS,EACT,YAAY,GACb,EAAE,uBAAuB,CAAC,IAAI,CAAC,mBAAmB,EAAE,WAAW,CAAC,CAAC,GAAG,OAAO,CAAC,iBAAiB,CAAC;IAazF,mBAAmB,CAAC,EACxB,wBAAwB,EACxB,QAAoB,EACpB,eAAe,EACf,SAAS,EACT,YAAY,EACZ,aAAa,GACd,EAAE,uBAAuB,CAAC,IAAI,CAAC,0BAA0B,EAAE,WAAW,CAAC,CAAC,GAAG,OAAO,CAAC,2BAA2B,CAAC;IAc1G,4BAA4B,CAAC,EACjC,cAAc,EACd,eAAiD,EACjD,SAAS,GACV,EAAE,IAAI,CAAC,mCAAmC,EAAE,WAAW,CAAC,GAAG,OAAO,CAAC,OAAO,CAAC;IAWtE,mBAAmB,CAAC,EACxB,cAAc,EACd,SAAS,GACV,EAAE,IAAI,CAAC,0BAA0B,EAAE,WAAW,CAAC,GAAG,OAAO,CAAC,OAAO,CAAC;IAU7D,WAAW,CAAC,EAChB,OAAO,EACP,cAAc,EACd,QAAoB,EACpB,eAAe,EACf,SAAS,EACT,QAAQ,EACR,mBAAmB,EACnB,OAAO,EACP,YAAY,EACZ,aAAa,GACd,EAAE,uBAAuB,CACxB,8BAA8B,CAAC,IAAI,CAAC,yBAAyB,EAAE,WAAW,CAAC,CAAC,CAC7E,GAAG,OAAO,CAAC,MAAM,CAAC;IAsBb,cAAc,CAAC,EACnB,OAAO,EACP,cAAc,EACd,QAAoB,EACpB,eAAe,EACf,SAAS,EACT,QAAQ,EACR,mBAAmB,EACnB,OAAO,EACP,YAAY,EACZ,aAAa,GACd,EAAE,uBAAuB,CACxB,8BAA8B,CAAC,IAAI,CAAC,qBAAqB,EAAE,WAAW,CAAC,CAAC,CACzE,GAAG,OAAO,CAAC,MAAM,CAAC;IAkBnB;;;;;;;;;;OAUG;IACG,eAAe,CAAC,EACpB,aAAa,EACb,WAAW,EACX,QAAoB,EACpB,eAAe,EACf,SAAS,EACT,QAAQ,EACR,mBAAmB,EACnB,OAAO,EACP,YAAY,EACZ,aAAa,GACd,EAAE,uBAAuB,CACxB,8BAA8B,CAAC,IAAI,CAAC,sBAAsB,EAAE,WAAW,CAAC,CAAC,CAC1E,GAAG,OAAO,CAAC,MAAM,CAAC;IAkBb,aAAa,CAAC,EAClB,cAAc,EACd,SAAS,EACT,QAAoB,EACpB,eAAe,EACf,SAAS,EACT,QAAQ,EACR,mBAAmB,EACnB,YAAY,GACb,EAAE,uBAAuB,CACxB,8BAA8B,CAAC,IAAI,CAAC,oBAAoB,EAAE,WAAW,CAAC,CAAC,CACxE,GAAG,OAAO,CAAC,MAAM,CAAC;IAgBb,4BAA4B,CAAC,EACjC,cAAc,EACd,QAAoB,EACpB,eAAe,EACf,SAAS,EACT,YAAY,GACb,EAAE,uBAAuB,CAAC,IAAI,CAAC,mCAAmC,EAAE,WAAW,CAAC,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAa5F,uBAAuB,CAAC,EAC5B,cAAc,EACd,QAAoB,EACpB,eAAe,EACf,SAAS,EACT,YAAY,GACb,EAAE,uBAAuB,CAAC,IAAI,CAAC,8BAA8B,EAAE,WAAW,CAAC,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAavF,mBAAmB,CAAC,EAAE,gBAAgB,EAAE,EAAE;QAAE,gBAAgB,EAAE,WAAW,CAAA;KAAE,GAAG,OAAO,CAAC,IAAI,CAAC;IAW3F,gBAAgB,IAAI,OAAO,CAAC,IAAI,CAAC;IAIjC,qBAAqB,IAAI,OAAO,CAAC,OAAO,CAAC;IAIzC,iBAAiB,CAAC,EACtB,cAAc,EACd,QAAQ,EACR,eAAe,EACf,SAAS,EACT,QAAQ,EACR,YAAY,GACb,EAAE,uBAAuB,CAAC,IAAI,CAAC,wBAAwB,EAAE,WAAW,CAAC,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAcjF,gBAAgB,CAAC,EACrB,cAAc,EACd,QAAQ,EACR,eAAe,EACf,SAAS,EACT,QAAQ,EACR,YAAY,GACb,EAAE,uBAAuB,CAAC,IAAI,CAAC,uBAAuB,EAAE,WAAW,CAAC,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAchF,oCAAoC,CAAC,EACzC,cAAc,EACd,QAAQ,EACR,eAAe,EACf,SAAS,EACT,YAAY,GACb,EAAE,uBAAuB,CAAC;QACzB,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;QACxB,SAAS,CAAC,EAAE,MAAM,CAAC;KACpB,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAaZ,0BAA0B,CAAC,EAC/B,cAAc,EACd,QAAQ,EACR,eAAe,EACf,SAAS,EACT,QAAQ,EACR,mBAAmB,EACnB,YAAY,GACb,EAAE,uBAAuB,CACxB,8BAA8B,CAAC,IAAI,CAAC,iCAAiC,EAAE,WAAW,CAAC,CAAC,CACrF,GAAG,OAAO,CAAC,IAAI,CAAC;IAeX,OAAO,CAAC,EACZ,cAAc,EACd,2BAA2B,EAC3B,2BAA2B,EAC3B,QAAQ,EACR,eAAe,EACf,SAAS,EACT,QAAQ,EACR,mBAAmB,EACnB,YAAY,GACb,EAAE,uBAAuB,CAAC,8BAA8B,CAAC,IAAI,CAAC,cAAc,EAAE,WAAW,CAAC,CAAC,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAiBvG,gBAAgB,CAAC,EACrB,cAAc,EACd,mBAAmB,EACnB,gBAAgB,EAChB,QAAQ,EACR,eAAe,EACf,SAAS,EACT,QAAQ,EACR,YAAY,EACZ,aAAa,GACd,EAAE,uBAAuB,CACxB,8BAA8B,CAAC;QAC7B,cAAc,EAAE,MAAM,CAAC;QACvB,gBAAgB,EAAE,WAAW,CAAC;QAC9B,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;QACxB,SAAS,CAAC,EAAE,MAAM,CAAC;QACnB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,CAAC,CACH,GAAG,OAAO,CAAC,IAAI,CAAC;IAqBX,cAAc,CAAC,EACnB,cAAc,EACd,QAAQ,EACR,eAA8C,EAC9C,eAAe,EACf,SAAS,EACT,YAAY,GACb,EAAE,uBAAuB,CAAC,IAAI,CAAC,qBAAqB,EAAE,WAAW,CAAC,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAc9E,cAAc,CAAC,EACnB,cAAc,EACd,gBAAgB,EAChB,WAAW,EACX,eAAe,EACf,SAAS,EACT,qBAAqB,EACrB,YAAY,GACb,EAAE,uBAAuB,CAAC,IAAI,CAAC,qBAAqB,EAAE,WAAW,CAAC,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAe9E,WAAW,CAAC,EAChB,cAAc,EACd,WAAW,EACX,eAAe,EACf,SAAS,EACT,qBAAqB,EACrB,YAAY,GACb,EAAE,uBAAuB,CAAC,IAAI,CAAC,kBAAkB,EAAE,WAAW,CAAC,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAc3E,gBAAgB,CAAC,EACrB,UAAU,EACV,wBAAwB,EACxB,QAAQ,EACR,eAAe,EACf,SAAS,EACT,kBAAkB,EAClB,WAAW,EACX,YAAY,EACZ,cAAc,GACf,EAAE,uBAAuB,CAAC,IAAI,CAAC,uBAAuB,EAAE,WAAW,CAAC,CAAC,GAAG,OAAO,CAAC,2BAA2B,CAAC;IAiBvG,qBAAqB,CAAC,EAC1B,cAAc,EACd,QAAQ,EACR,eAAe,EACf,SAAS,EACT,YAAY,GACb,EAAE,uBAAuB,CAAC,IAAI,CAAC,4BAA4B,EAAE,WAAW,CAAC,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAa3F;;OAEG;IACG,uBAAuB,CAAC,EAC5B,SAAS,EACT,cAAc,EACd,YAAY,GACb,EAAE,uBAAuB,CAAC;QACzB,SAAS,EAAE,MAAM,EAAE,CAAC;QACpB,cAAc,CAAC,EAAE,MAAM,CAAC;KACzB,CAAC,GAAG,OAAO,CAAC,+BAA+B,CAAC;CAmB9C"}
|
|
@@ -1,121 +0,0 @@
|
|
|
1
|
-
import { AuthMode, type IframeRequestMessages, type SecureStorageAdapter } from '@dynamic-labs-wallet/core';
|
|
2
|
-
import { type MessageTransportWithDefaultOrigin, type RequestChannel } from '@dynamic-labs/message-transport';
|
|
3
|
-
import { iframeMessageHandler } from '../../services/iframeMessageHandler.js';
|
|
4
|
-
export declare class IframeManager {
|
|
5
|
-
protected chainName: string;
|
|
6
|
-
protected logger: import("@dynamic-labs/logger").Logger;
|
|
7
|
-
instanceId: string | null;
|
|
8
|
-
iframeDomain: string | null;
|
|
9
|
-
environmentId: string;
|
|
10
|
-
private readonly authToken;
|
|
11
|
-
private readonly authMode;
|
|
12
|
-
baseApiUrl: string;
|
|
13
|
-
baseMPCRelayApiUrl: string;
|
|
14
|
-
protected messageTransport: MessageTransportWithDefaultOrigin | null;
|
|
15
|
-
protected iframeMessageHandler: iframeMessageHandler | null;
|
|
16
|
-
private static iframeLoadPromise;
|
|
17
|
-
protected iframe: HTMLIFrameElement | null;
|
|
18
|
-
private readonly debug;
|
|
19
|
-
static iframeLoadTimeout: number;
|
|
20
|
-
private static iframeLoadAttempts;
|
|
21
|
-
private static readonly maxRetryAttempts;
|
|
22
|
-
baseClientKeysharesRelayApiUrl: string | undefined;
|
|
23
|
-
private static sharedIframe;
|
|
24
|
-
private static iframeInstanceCount;
|
|
25
|
-
sdkVersion: string | undefined;
|
|
26
|
-
/**
|
|
27
|
-
* Internal secure storage adapter for mobile TEE-backed storage.
|
|
28
|
-
* When set, key shares are stored in secure storage instead of localStorage.
|
|
29
|
-
* This is NOT part of the public API.
|
|
30
|
-
*/
|
|
31
|
-
protected secureStorage?: SecureStorageAdapter;
|
|
32
|
-
/**
|
|
33
|
-
* Request channel for handling messages from iframe (iframe → host)
|
|
34
|
-
* Used for secureStorage operations
|
|
35
|
-
*/
|
|
36
|
-
protected iframeRequestChannel?: RequestChannel<Pick<IframeRequestMessages, 'getClientKeyShare' | 'setClientKeyShare'>>;
|
|
37
|
-
constructor({ environmentId, baseApiUrl, baseMPCRelayApiUrl, chainName, sdkVersion, authMode, authToken, debug, baseClientKeysharesRelayApiUrl, }: {
|
|
38
|
-
environmentId: string;
|
|
39
|
-
authMode: AuthMode;
|
|
40
|
-
authToken?: string;
|
|
41
|
-
baseApiUrl: string;
|
|
42
|
-
baseMPCRelayApiUrl: string;
|
|
43
|
-
chainName: string;
|
|
44
|
-
sdkVersion?: string;
|
|
45
|
-
debug?: boolean;
|
|
46
|
-
baseClientKeysharesRelayApiUrl?: string;
|
|
47
|
-
}, internalOptions?: {
|
|
48
|
-
secureStorage?: SecureStorageAdapter;
|
|
49
|
-
});
|
|
50
|
-
initialize(): Promise<void>;
|
|
51
|
-
/**
|
|
52
|
-
* this is called on class construction time
|
|
53
|
-
* @returns {Promise<void>} that resolves when the iframe is loaded and the message transport and iframe storage are initialized
|
|
54
|
-
*/
|
|
55
|
-
initializeIframeCommunication(): Promise<void>;
|
|
56
|
-
/**
|
|
57
|
-
* initialize the iframe communication by awaiting the iframe load promise
|
|
58
|
-
* and initializing the message transport and iframe storage after iframe is successfully loaded
|
|
59
|
-
*/
|
|
60
|
-
private doInitializeIframeCommunication;
|
|
61
|
-
/**
|
|
62
|
-
* initialize the message transport after iframe is successfully loaded
|
|
63
|
-
*/
|
|
64
|
-
protected initializeMessageTransport(): Promise<void>;
|
|
65
|
-
/**
|
|
66
|
-
* Sets up message handlers for secureStorage operations from iframe
|
|
67
|
-
*/
|
|
68
|
-
private setupSecureStorageHandlers;
|
|
69
|
-
/**
|
|
70
|
-
* Handler for getClientKeyShare requests from iframe
|
|
71
|
-
*/
|
|
72
|
-
private handleGetClientKeyShare;
|
|
73
|
-
/**
|
|
74
|
-
* Handler for setClientKeyShare requests from iframe
|
|
75
|
-
*/
|
|
76
|
-
private handleSetClientKeyShare;
|
|
77
|
-
/**
|
|
78
|
-
* Handler for removeClientKeyShare requests from iframe
|
|
79
|
-
*/
|
|
80
|
-
private handleRemoveClientKeyShare;
|
|
81
|
-
/**
|
|
82
|
-
* securely exchange the auth token with iframe securely
|
|
83
|
-
*/
|
|
84
|
-
private initAuthToken;
|
|
85
|
-
/**
|
|
86
|
-
* Reset the shared iframe and iframe load promise, and iframe instance count
|
|
87
|
-
*/
|
|
88
|
-
private resetSharedIframe;
|
|
89
|
-
private loadIframe;
|
|
90
|
-
private assignExistingIframe;
|
|
91
|
-
private createIframeLoadPromise;
|
|
92
|
-
private setupIframeEventHandlersWithRetry;
|
|
93
|
-
private getIframeContext;
|
|
94
|
-
private createMessageListener;
|
|
95
|
-
private configureIframe;
|
|
96
|
-
private setIframeSource;
|
|
97
|
-
/**
|
|
98
|
-
* Load an iframe for a specific container
|
|
99
|
-
* @param {HTMLElement} container - The container to which the iframe will be attached
|
|
100
|
-
* @returns {Promise<HTMLIFrameElement>} that resolves when the iframe is loaded
|
|
101
|
-
*/
|
|
102
|
-
private loadIframeForContainer;
|
|
103
|
-
/**
|
|
104
|
-
* Initializes the iframe display for a specific container.
|
|
105
|
-
*
|
|
106
|
-
* @param {HTMLElement} container - The container to which the iframe will be attached.
|
|
107
|
-
* @returns:
|
|
108
|
-
* iframe: HTMLIFrameElement;
|
|
109
|
-
* iframeDisplay: IframeDisplayChannelAdapter;
|
|
110
|
-
* cleanup: () => void;
|
|
111
|
-
*/
|
|
112
|
-
initializeIframeDisplayForContainer({ container }: {
|
|
113
|
-
container: HTMLElement;
|
|
114
|
-
}): Promise<{
|
|
115
|
-
iframe: HTMLIFrameElement;
|
|
116
|
-
iframeDisplay: iframeMessageHandler;
|
|
117
|
-
cleanup: () => void;
|
|
118
|
-
}>;
|
|
119
|
-
cleanup(): Promise<void>;
|
|
120
|
-
}
|
|
121
|
-
//# sourceMappingURL=IframeManager.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"IframeManager.d.ts","sourceRoot":"","sources":["../../../src/client/iframeManager/IframeManager.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,QAAQ,EAKR,KAAK,qBAAqB,EAE1B,KAAK,oBAAoB,EAE1B,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAIL,KAAK,iCAAiC,EACtC,KAAK,cAAc,EACpB,MAAM,iCAAiC,CAAC;AAEzC,OAAO,EAAE,oBAAoB,EAAE,MAAM,wCAAwC,CAAC;AAI9E,qBAAa,aAAa;IACxB,SAAS,CAAC,SAAS,EAAE,MAAM,CAAC;IAC5B,SAAS,CAAC,MAAM,wCAAU;IACnB,UAAU,EAAE,MAAM,GAAG,IAAI,CAAQ;IACjC,YAAY,EAAE,MAAM,GAAG,IAAI,CAAQ;IACnC,aAAa,EAAE,MAAM,CAAC;IAC7B,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAqB;IAC/C,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAuB;IACzC,UAAU,EAAE,MAAM,CAAC;IACnB,kBAAkB,EAAE,MAAM,CAAC;IAClC,SAAS,CAAC,gBAAgB,EAAE,iCAAiC,GAAG,IAAI,CAAQ;IAC5E,SAAS,CAAC,oBAAoB,EAAE,oBAAoB,GAAG,IAAI,CAAQ;IACnE,OAAO,CAAC,MAAM,CAAC,iBAAiB,CAA8B;IAC9D,SAAS,CAAC,MAAM,EAAE,iBAAiB,GAAG,IAAI,CAAQ;IAClD,OAAO,CAAC,QAAQ,CAAC,KAAK,CAAU;IAChC,OAAc,iBAAiB,SAAS;IACxC,OAAO,CAAC,MAAM,CAAC,kBAAkB,CAAK;IACtC,OAAO,CAAC,MAAM,CAAC,QAAQ,CAAC,gBAAgB,CAAK;IACtC,8BAA8B,EAAE,MAAM,GAAG,SAAS,CAAC;IAE1D,OAAO,CAAC,MAAM,CAAC,YAAY,CAAkC;IAC7D,OAAO,CAAC,MAAM,CAAC,mBAAmB,CAAK;IAChC,UAAU,EAAE,MAAM,GAAG,SAAS,CAAC;IACtC;;;;OAIG;IACH,SAAS,CAAC,aAAa,CAAC,EAAE,oBAAoB,CAAC;IAC/C;;;OAGG;IACH,SAAS,CAAC,oBAAoB,CAAC,EAAE,cAAc,CAC7C,IAAI,CAAC,qBAAqB,EAAE,mBAAmB,GAAG,mBAAmB,CAAC,CACvE,CAAC;gBAGA,EACE,aAAa,EACb,UAAU,EACV,kBAAkB,EAClB,SAAS,EACT,UAAU,EACV,QAA0B,EAC1B,SAAS,EACT,KAAK,EACL,8BAA8B,GAC/B,EAAE;QACD,aAAa,EAAE,MAAM,CAAC;QACtB,QAAQ,EAAE,QAAQ,CAAC;QACnB,SAAS,CAAC,EAAE,MAAM,CAAC;QACnB,UAAU,EAAE,MAAM,CAAC;QACnB,kBAAkB,EAAE,MAAM,CAAC;QAC3B,SAAS,EAAE,MAAM,CAAC;QAClB,UAAU,CAAC,EAAE,MAAM,CAAC;QACpB,KAAK,CAAC,EAAE,OAAO,CAAC;QAChB,8BAA8B,CAAC,EAAE,MAAM,CAAC;KACzC,EACD,eAAe,CAAC,EAAE;QAAE,aAAa,CAAC,EAAE,oBAAoB,CAAA;KAAE;IA8BtD,UAAU;IAIhB;;;OAGG;IACH,6BAA6B,IAAI,OAAO,CAAC,IAAI,CAAC;IAK9C;;;OAGG;YACW,+BAA+B;IAS7C;;OAEG;cACa,0BAA0B;IA+B1C;;OAEG;IACH,OAAO,CAAC,0BAA0B;IAmBlC;;OAEG;YACW,uBAAuB;IAQrC;;OAEG;YACW,uBAAuB;IAOrC;;OAEG;YACW,0BAA0B;IAOxC;;OAEG;YACW,aAAa;IAY3B;;OAEG;YACW,iBAAiB;YAWjB,UAAU;IAkBxB,OAAO,CAAC,oBAAoB;IAK5B,OAAO,CAAC,uBAAuB;IAqF/B,OAAO,CAAC,iCAAiC;IA8CzC,OAAO,CAAC,gBAAgB;IAWxB,OAAO,CAAC,qBAAqB;IAqB7B,OAAO,CAAC,eAAe;IAevB,OAAO,CAAC,eAAe;IAevB;;;;OAIG;IACH,OAAO,CAAC,sBAAsB;IAmG9B;;;;;;;;OAQG;IACG,mCAAmC,CAAC,EAAE,SAAS,EAAE,EAAE;QAAE,SAAS,EAAE,WAAW,CAAA;KAAE,GAAG,OAAO,CAAC;QAC5F,MAAM,EAAE,iBAAiB,CAAC;QAC1B,aAAa,EAAE,oBAAoB,CAAC;QACpC,OAAO,EAAE,MAAM,IAAI,CAAC;KACrB,CAAC;IAoCW,OAAO;CAkBrB"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/client/iframeManager/index.ts"],"names":[],"mappings":"AAAA,cAAc,oBAAoB,CAAC"}
|
package/src/client/index.d.ts
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/client/index.ts"],"names":[],"mappings":"AAAA,cAAc,aAAa,CAAC;AAC5B,OAAO,EAAE,QAAQ,EAAE,MAAM,2BAA2B,CAAC"}
|
package/src/index.d.ts
DELETED
|
@@ -1,4 +0,0 @@
|
|
|
1
|
-
export { MPC_RELAY_PREPROD_API_URL, MPC_RELAY_PROD_API_URL, ThresholdSignatureScheme, WalletOperation, } from '@dynamic-labs-wallet/core';
|
|
2
|
-
export type { BitcoinAddressType, BitcoinConfig, BitcoinNetwork, GetWalletResponse, WalletRecoveryState, } from '@dynamic-labs-wallet/core';
|
|
3
|
-
export * from './client/index.js';
|
|
4
|
-
//# sourceMappingURL=index.d.ts.map
|
package/src/index.d.ts.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../packages/src/index.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,yBAAyB,EACzB,sBAAsB,EACtB,wBAAwB,EACxB,eAAe,GAChB,MAAM,2BAA2B,CAAC;AACnC,YAAY,EACV,kBAAkB,EAClB,aAAa,EACb,cAAc,EACd,iBAAiB,EACjB,mBAAmB,GACpB,MAAM,2BAA2B,CAAC;AACnC,cAAc,mBAAmB,CAAC"}
|
|
@@ -1,39 +0,0 @@
|
|
|
1
|
-
import type { AuthMode, BackupKeySharesToGoogleDriveRequest, BackupKeySharesToICloudRequest, CreateWalletAccountRequest, CreateWalletAccountResponse, DelegateKeySharesRequest, ExportClientKeysharesFromGoogleDriveRequest, ExportClientKeysharesRequest, ExportPrivateKeyRequest, GetWalletRecoveryStateRequest, GetWalletRequest, GetAllWalletsRequest, GetWalletResponse, GetWalletsRequest, IframeRequestMessages, ImportPrivateKeyRequest, IsPasswordEncryptedRequest, MessageTransportErrorResponse, OfflineExportPrivateKeyRequest, OfflineExportPrivateKeyResponse, RefreshWalletAccountSharesRequest, RequestWithElevatedAccessToken, RequestWithTraceContext, RequiresPasswordForOperationRequest, ReshareRequest, RevokeDelegationRequest, SetPasswordRequest, SignMessageRequest, SignRawMessageRequest, SignTransactionRequest, SignTypedDataRequest, TraceContext, UnlockWalletRequest, UpdatePasswordRequest, VerifyPasswordRequest, WalletRecoveryState } from '@dynamic-labs-wallet/core';
|
|
2
|
-
import { type MessageTransportWithDefaultOrigin, type RequestChannel } from '@dynamic-labs/message-transport';
|
|
3
|
-
export declare class iframeMessageHandler {
|
|
4
|
-
requestChannel: RequestChannel<IframeRequestMessages>;
|
|
5
|
-
constructor(messageTransport: MessageTransportWithDefaultOrigin);
|
|
6
|
-
private handleIframeMessageResponseError;
|
|
7
|
-
getWallets(request: RequestWithTraceContext<GetWalletsRequest>): Promise<GetWalletResponse[]>;
|
|
8
|
-
getAllWallets(request: RequestWithTraceContext<GetAllWalletsRequest>): Promise<GetWalletResponse[]>;
|
|
9
|
-
getWallet(request: RequestWithTraceContext<GetWalletRequest>): Promise<GetWalletResponse>;
|
|
10
|
-
createWalletAccount(request: RequestWithTraceContext<CreateWalletAccountRequest>): Promise<CreateWalletAccountResponse>;
|
|
11
|
-
requiresPasswordForOperation(request: RequestWithTraceContext<RequiresPasswordForOperationRequest>): Promise<boolean>;
|
|
12
|
-
signMessage(request: RequestWithTraceContext<RequestWithElevatedAccessToken<SignMessageRequest>>): Promise<string>;
|
|
13
|
-
signRawMessage(request: RequestWithTraceContext<RequestWithElevatedAccessToken<SignRawMessageRequest>>): Promise<string>;
|
|
14
|
-
signTransaction(request: RequestWithTraceContext<RequestWithElevatedAccessToken<SignTransactionRequest>>): Promise<string>;
|
|
15
|
-
isPasswordEncrypted(request: RequestWithTraceContext<IsPasswordEncryptedRequest>): Promise<boolean>;
|
|
16
|
-
backupKeySharesToGoogleDrive(request: RequestWithTraceContext<BackupKeySharesToGoogleDriveRequest>): Promise<void>;
|
|
17
|
-
backupKeySharesToICloud(request: RequestWithTraceContext<BackupKeySharesToICloudRequest>): Promise<void>;
|
|
18
|
-
displayICloudSignIn(chainName: string): Promise<void>;
|
|
19
|
-
hideICloudSignIn(): Promise<void>;
|
|
20
|
-
isICloudAuthenticated(chainName: string): Promise<boolean>;
|
|
21
|
-
delegateKeyShares(request: RequestWithTraceContext<DelegateKeySharesRequest>): Promise<void>;
|
|
22
|
-
revokeDelegation(request: RequestWithTraceContext<RevokeDelegationRequest>): Promise<void>;
|
|
23
|
-
exportClientKeysharesFromGoogleDrive(request: RequestWithTraceContext<ExportClientKeysharesFromGoogleDriveRequest>): Promise<void>;
|
|
24
|
-
refreshWalletAccountShares(request: RequestWithTraceContext<RequestWithElevatedAccessToken<RefreshWalletAccountSharesRequest>>): Promise<void>;
|
|
25
|
-
reshare(request: RequestWithTraceContext<RequestWithElevatedAccessToken<ReshareRequest>>): Promise<void>;
|
|
26
|
-
exportPrivateKey(request: RequestWithTraceContext<RequestWithElevatedAccessToken<ExportPrivateKeyRequest>>): Promise<void>;
|
|
27
|
-
verifyPassword(request: RequestWithTraceContext<VerifyPasswordRequest>): Promise<void>;
|
|
28
|
-
updatePassword(request: RequestWithTraceContext<UpdatePasswordRequest>): Promise<void>;
|
|
29
|
-
setPassword(request: RequestWithTraceContext<SetPasswordRequest>): Promise<void>;
|
|
30
|
-
importPrivateKey(request: RequestWithTraceContext<ImportPrivateKeyRequest>): Promise<CreateWalletAccountResponse>;
|
|
31
|
-
sendAuthToken(token?: string, authMode?: AuthMode, traceContext?: TraceContext): Promise<void>;
|
|
32
|
-
exportClientKeyshares(request: RequestWithTraceContext<ExportClientKeysharesRequest>): Promise<void>;
|
|
33
|
-
offlineExportPrivateKey(request: RequestWithTraceContext<OfflineExportPrivateKeyRequest>): Promise<OfflineExportPrivateKeyResponse>;
|
|
34
|
-
signTypedData(request: RequestWithTraceContext<RequestWithElevatedAccessToken<SignTypedDataRequest>>): Promise<string>;
|
|
35
|
-
cleanup(): Promise<void | MessageTransportErrorResponse>;
|
|
36
|
-
getWalletRecoveryState(request: RequestWithTraceContext<GetWalletRecoveryStateRequest>): Promise<WalletRecoveryState>;
|
|
37
|
-
unlockWallet(request: RequestWithTraceContext<UnlockWalletRequest>): Promise<GetWalletResponse>;
|
|
38
|
-
}
|
|
39
|
-
//# sourceMappingURL=iframeMessageHandler.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"iframeMessageHandler.d.ts","sourceRoot":"","sources":["../../src/services/iframeMessageHandler.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EACV,QAAQ,EACR,mCAAmC,EACnC,8BAA8B,EAC9B,0BAA0B,EAC1B,2BAA2B,EAC3B,wBAAwB,EACxB,2CAA2C,EAC3C,4BAA4B,EAC5B,uBAAuB,EACvB,6BAA6B,EAC7B,gBAAgB,EAChB,oBAAoB,EACpB,iBAAiB,EACjB,iBAAiB,EACjB,qBAAqB,EACrB,uBAAuB,EACvB,0BAA0B,EAC1B,6BAA6B,EAC7B,8BAA8B,EAC9B,+BAA+B,EAC/B,iCAAiC,EACjC,8BAA8B,EAC9B,uBAAuB,EACvB,mCAAmC,EACnC,cAAc,EACd,uBAAuB,EACvB,kBAAkB,EAClB,kBAAkB,EAClB,qBAAqB,EACrB,sBAAsB,EACtB,oBAAoB,EACpB,YAAY,EACZ,mBAAmB,EACnB,qBAAqB,EACrB,qBAAqB,EACrB,mBAAmB,EACpB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAEL,KAAK,iCAAiC,EACtC,KAAK,cAAc,EACpB,MAAM,iCAAiC,CAAC;AAEzC,qBAAa,oBAAoB;IAC/B,cAAc,EAAE,cAAc,CAAC,qBAAqB,CAAC,CAAC;gBAE1C,gBAAgB,EAAE,iCAAiC;IAK/D,OAAO,CAAC,gCAAgC;IAMlC,UAAU,CAAC,OAAO,EAAE,uBAAuB,CAAC,iBAAiB,CAAC,GAAG,OAAO,CAAC,iBAAiB,EAAE,CAAC;IAM7F,aAAa,CAAC,OAAO,EAAE,uBAAuB,CAAC,oBAAoB,CAAC,GAAG,OAAO,CAAC,iBAAiB,EAAE,CAAC;IAMnG,SAAS,CAAC,OAAO,EAAE,uBAAuB,CAAC,gBAAgB,CAAC,GAAG,OAAO,CAAC,iBAAiB,CAAC;IAMzF,mBAAmB,CACvB,OAAO,EAAE,uBAAuB,CAAC,0BAA0B,CAAC,GAC3D,OAAO,CAAC,2BAA2B,CAAC;IAMjC,4BAA4B,CAChC,OAAO,EAAE,uBAAuB,CAAC,mCAAmC,CAAC,GACpE,OAAO,CAAC,OAAO,CAAC;IAMb,WAAW,CACf,OAAO,EAAE,uBAAuB,CAAC,8BAA8B,CAAC,kBAAkB,CAAC,CAAC,GACnF,OAAO,CAAC,MAAM,CAAC;IAMZ,cAAc,CAClB,OAAO,EAAE,uBAAuB,CAAC,8BAA8B,CAAC,qBAAqB,CAAC,CAAC,GACtF,OAAO,CAAC,MAAM,CAAC;IAMZ,eAAe,CACnB,OAAO,EAAE,uBAAuB,CAAC,8BAA8B,CAAC,sBAAsB,CAAC,CAAC,GACvF,OAAO,CAAC,MAAM,CAAC;IAMZ,mBAAmB,CAAC,OAAO,EAAE,uBAAuB,CAAC,0BAA0B,CAAC,GAAG,OAAO,CAAC,OAAO,CAAC;IAMnG,4BAA4B,CAChC,OAAO,EAAE,uBAAuB,CAAC,mCAAmC,CAAC,GACpE,OAAO,CAAC,IAAI,CAAC;IAKV,uBAAuB,CAAC,OAAO,EAAE,uBAAuB,CAAC,8BAA8B,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAKxG,mBAAmB,CAAC,SAAS,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;IAIrD,gBAAgB,IAAI,OAAO,CAAC,IAAI,CAAC;IAIjC,qBAAqB,CAAC,SAAS,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC;IAI1D,iBAAiB,CAAC,OAAO,EAAE,uBAAuB,CAAC,wBAAwB,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAK5F,gBAAgB,CAAC,OAAO,EAAE,uBAAuB,CAAC,uBAAuB,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAK1F,oCAAoC,CACxC,OAAO,EAAE,uBAAuB,CAAC,2CAA2C,CAAC,GAC5E,OAAO,CAAC,IAAI,CAAC;IAKV,0BAA0B,CAC9B,OAAO,EAAE,uBAAuB,CAAC,8BAA8B,CAAC,iCAAiC,CAAC,CAAC,GAClG,OAAO,CAAC,IAAI,CAAC;IAKV,OAAO,CAAC,OAAO,EAAE,uBAAuB,CAAC,8BAA8B,CAAC,cAAc,CAAC,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAKxG,gBAAgB,CACpB,OAAO,EAAE,uBAAuB,CAAC,8BAA8B,CAAC,uBAAuB,CAAC,CAAC,GACxF,OAAO,CAAC,IAAI,CAAC;IAKV,cAAc,CAAC,OAAO,EAAE,uBAAuB,CAAC,qBAAqB,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAKtF,cAAc,CAAC,OAAO,EAAE,uBAAuB,CAAC,qBAAqB,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAKtF,WAAW,CAAC,OAAO,EAAE,uBAAuB,CAAC,kBAAkB,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAKhF,gBAAgB,CACpB,OAAO,EAAE,uBAAuB,CAAC,uBAAuB,CAAC,GACxD,OAAO,CAAC,2BAA2B,CAAC;IAMjC,aAAa,CAAC,KAAK,CAAC,EAAE,MAAM,EAAE,QAAQ,CAAC,EAAE,QAAQ,EAAE,YAAY,CAAC,EAAE,YAAY,GAAG,OAAO,CAAC,IAAI,CAAC;IAI9F,qBAAqB,CAAC,OAAO,EAAE,uBAAuB,CAAC,4BAA4B,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAKpG,uBAAuB,CAC3B,OAAO,EAAE,uBAAuB,CAAC,8BAA8B,CAAC,GAC/D,OAAO,CAAC,+BAA+B,CAAC;IAMrC,aAAa,CACjB,OAAO,EAAE,uBAAuB,CAAC,8BAA8B,CAAC,oBAAoB,CAAC,CAAC,GACrF,OAAO,CAAC,MAAM,CAAC;IAMZ,OAAO;IAIP,sBAAsB,CAC1B,OAAO,EAAE,uBAAuB,CAAC,6BAA6B,CAAC,GAC9D,OAAO,CAAC,mBAAmB,CAAC;IAMzB,YAAY,CAAC,OAAO,EAAE,uBAAuB,CAAC,mBAAmB,CAAC,GAAG,OAAO,CAAC,iBAAiB,CAAC;CAKtG"}
|
package/src/services/logger.d.ts
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"logger.d.ts","sourceRoot":"","sources":["../../src/services/logger.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,sBAAsB,CAAC;AAE9C,eAAO,MAAM,MAAM,QAAwC,CAAC"}
|
|
@@ -1,3 +0,0 @@
|
|
|
1
|
-
import { type MessageTransportWithDefaultOrigin } from '@dynamic-labs/message-transport';
|
|
2
|
-
export declare const setupMessageTransportBridge: (messageTransport: MessageTransportWithDefaultOrigin, iframe: HTMLIFrameElement, iframeOrigin: string) => void;
|
|
3
|
-
//# sourceMappingURL=messageTransportBridge.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"messageTransportBridge.d.ts","sourceRoot":"","sources":["../../src/services/messageTransportBridge.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,iCAAiC,EAGvC,MAAM,iCAAiC,CAAC;AAGzC,eAAO,MAAM,2BAA2B,qBACpB,iCAAiC,UAC3C,iBAAiB,gBACX,MAAM,SA4DrB,CAAC"}
|