@imtbl/passport 2.10.7-alpha.3 → 2.10.7-alpha.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/browser/index.js +8 -7
- package/dist/node/index.cjs +7 -5
- package/dist/node/index.js +8 -7
- package/dist/types/Passport.d.ts +52 -55
- package/dist/types/config/config.d.ts +3 -1
- package/dist/types/errors/passportError.d.ts +2 -1
- package/dist/types/starkEx/imxGuardianClient.d.ts +18 -0
- package/dist/types/starkEx/passportImxProvider.d.ts +7 -5
- package/dist/types/starkEx/passportImxProviderFactory.d.ts +7 -5
- package/dist/types/starkEx/workflows/order.d.ts +3 -3
- package/dist/types/starkEx/workflows/registerOffchain.d.ts +1 -2
- package/dist/types/starkEx/workflows/trades.d.ts +2 -2
- package/dist/types/starkEx/workflows/transfer.d.ts +3 -3
- package/dist/types/types.d.ts +21 -80
- package/dist/types/utils/imxUser.d.ts +9 -0
- package/dist/types/utils/metrics.d.ts +2 -1
- package/package.json +11 -10
package/dist/browser/index.js
CHANGED
|
@@ -1,13 +1,14 @@
|
|
|
1
|
-
import
|
|
2
|
-
import {
|
|
1
|
+
import ae, { isAxiosError } from 'axios';
|
|
2
|
+
import { MultiRollupApiClients, MagicTeeApiClients, createConfig, multiRollupConfig, mr, ImxApiClients, imxApiConfig } from '@imtbl/generated-clients';
|
|
3
3
|
import { IMXClient, generateLegacyStarkPrivateKey, createStarkSigner } from '@imtbl/x-client';
|
|
4
4
|
import { Environment } from '@imtbl/config';
|
|
5
|
-
import { setPassportClientId,
|
|
6
|
-
import {
|
|
7
|
-
import {
|
|
5
|
+
import { setPassportClientId, trackFlow, trackError } from '@imtbl/metrics';
|
|
6
|
+
import { isUserZkEvm, Auth, AuthEvents } from '@imtbl/auth';
|
|
7
|
+
import { ConfirmationScreen, WalletConfiguration, GuardianClient, MagicTEESigner, connectWallet, retryWithDelay } from '@imtbl/wallet';
|
|
8
8
|
export { JsonRpcError, ProviderErrorCode, ProviderEvent, RpcErrorCode } from '@imtbl/wallet';
|
|
9
|
+
import Y from 'jwt-decode';
|
|
9
10
|
import { convertToSignableToken, signRaw } from '@imtbl/toolkit';
|
|
10
11
|
|
|
11
|
-
function N(t){throw new Error("Node.js process "+t+" is not supported by JSPM core outside of Node.js")}var y=[],A=!1,x,b=-1;function ue(){!A||!x||(A=!1,x.length?y=x.concat(y):b=-1,y.length&&q());}function q(){if(!A){var t=setTimeout(ue,0);A=!0;for(var e=y.length;e;){for(x=y,y=[];++b<e;)x&&x[b].run();b=-1,e=y.length;}x=null,A=!1,clearTimeout(t);}}function ce(t){var e=new Array(arguments.length-1);if(arguments.length>1)for(var r=1;r<arguments.length;r++)e[r-1]=arguments[r];y.push(new V(t,e)),y.length===1&&!A&&setTimeout(q,0);}function V(t,e){this.fun=t,this.array=e;}V.prototype.run=function(){this.fun.apply(null,this.array);};var pe="browser",ge="x64",fe="browser",Ee={PATH:"/usr/bin",LANG:navigator.language+".UTF-8",PWD:"/",HOME:"/home",TMP:"/tmp"},Re=["/usr/bin/node"],he=[],_e="v16.8.0",ve={},ye=function(t,e){console.warn((e?e+": ":"")+t);},Te=function(t){N("binding");},Pe=function(t){return 0},xe=function(){return "/"},Ae=function(t){},Ce={name:"node",sourceUrl:"",headersUrl:"",libUrl:""};function h(){}var Oe=h,be=[];function ke(t){N("_linkedBinding");}var Se={},Ie=!1,we={};function Le(t){N("dlopen");}function Ue(){return []}function Ne(){return []}var Me=h,De=h,M=function(){return {}},Ge=M,We=M,Ke=h,Be=h,Xe=h,qe={};function Ve(t,e){if(!t)throw new Error(e||"assertion error")}var Fe={inspector:!1,debug:!1,uv:!1,ipv6:!1,tls_alpn:!1,tls_sni:!1,tls_ocsp:!1,tls:!1,cached_builtins:!0},He=h,ze=h;function $e(){return !1}var Ze=h,je=h,Qe=h,Ye=h,Je=h,er=void 0,rr=void 0,tr=void 0,ir=h,ar=2,nr=1,sr="/bin/usr/node",or=9229,lr="node",mr=[],dr=h,T={now:typeof performance<"u"?performance.now.bind(performance):void 0,timing:typeof performance<"u"?performance.timing:void 0};T.now===void 0&&(w=Date.now(),T.timing&&T.timing.navigationStart&&(w=T.timing.navigationStart),T.now=()=>Date.now()-w);var w;function ur(){return T.now()/1e3}var L=1e9;function U(t){var e=Math.floor((Date.now()-T.now())*.001),r=T.now()*.001,i=Math.floor(r)+e,a=Math.floor(r%1*1e9);return t&&(i=i-t[0],a=a-t[1],a<0&&(i--,a+=L)),[i,a]}U.bigint=function(t){var e=U(t);return typeof BigInt>"u"?e[0]*L+e[1]:BigInt(e[0]*L)+BigInt(e[1])};var cr=10,pr={},gr=0;function P(){return g}var fr=P,Er=P,Rr=P,hr=P,_r=P,vr=h,yr=P,Tr=P;function Pr(t){return []}var g={version:_e,versions:ve,arch:ge,platform:fe,release:Ce,_rawDebug:Oe,moduleLoadList:be,binding:Te,_linkedBinding:ke,_events:pr,_eventsCount:gr,_maxListeners:cr,on:P,addListener:fr,once:Er,off:Rr,removeListener:hr,removeAllListeners:_r,emit:vr,prependListener:yr,prependOnceListener:Tr,listeners:Pr,domain:Se,_exiting:Ie,config:we,dlopen:Le,uptime:ur,_getActiveRequests:Ue,_getActiveHandles:Ne,reallyExit:Me,_kill:De,cpuUsage:M,resourceUsage:Ge,memoryUsage:We,kill:Ke,exit:Be,openStdin:Xe,allowedNodeEnvironmentFlags:qe,assert:Ve,features:Fe,_fatalExceptions:He,setUncaughtExceptionCaptureCallback:ze,hasUncaughtExceptionCaptureCallback:$e,emitWarning:ye,nextTick:ce,_tickCallback:Ze,_debugProcess:je,_debugEnd:Qe,_startProfilerIdleNotifier:Ye,_stopProfilerIdleNotifier:Je,stdout:er,stdin:tr,stderr:rr,abort:ir,umask:Pe,chdir:Ae,cwd:xe,env:Ee,title:pe,argv:Re,execArgv:he,pid:ar,ppid:nr,execPath:sr,debugPort:or,hrtime:U,argv0:lr,_preload_modules:mr,setSourceMapsEnabled:dr};function D(t){return "code"in t&&"message"in t}var l=class extends Error{type;constructor(e,r){super(e),this.type=r;}},_=async(t,e)=>{try{return await t()}catch(r){let i;throw r instanceof l&&r.type==="SERVICE_UNAVAILABLE_ERROR"?new l(r.message,r.type):(isAxiosError(r)&&r.response?.data&&D(r.response.data)?i=r.response.data.message:i=r.message,new l(i,e))}};var G=t=>!!t.imx,F=(r=>(r.OptedIn="opted_in",r.Unsubscribed="unsubscribed",r))(F||{});var H=async t=>_(async()=>{let e=await generateLegacyStarkPrivateKey(t);return createStarkSigner(e)},"WALLET_CONNECTION_ERROR");async function z({user:t,starkSigner:e,request:r,exchangesApi:i}){return _(async()=>{let{ethAddress:a}=t.imx,n=r.amount,o=await i.getExchangeSignableTransfer({id:r.transactionID,getSignableTransferRequest:{sender:a,token:convertToSignableToken(r),amount:n,receiver:r.receiver}}),p=await e.getAddress(),{payload_hash:s}=o.data,m=await e.signMessage(s),f={sender_stark_key:o.data.sender_stark_key||p,sender_vault_id:o.data.sender_vault_id,receiver_stark_key:o.data.receiver_stark_key,receiver_vault_id:o.data.receiver_vault_id,asset_id:o.data.asset_id,amount:o.data.amount,nonce:o.data.nonce,expiration_timestamp:o.data.expiration_timestamp,stark_signature:m},d={Authorization:`Bearer ${t.accessToken}`},u=await i.createExchangeTransfer({id:r.transactionID,createTransferRequest:f},{headers:d});return {sent_signature:u?.data.sent_signature,status:u?.data.status?.toString(),time:u?.data.time,transfer_id:u?.data.transfer_id}},"EXCHANGE_TRANSFER_ERROR")}var Z="ERC721";async function j({starkSigner:t,user:e,request:r,ordersApi:i,guardianClient:a}){return _(async()=>{let{ethAddress:n}=e.imx,o=r.sell.type===Z?"1":r.sell.amount,p=r.buy.type===Z?"1":r.buy.amount,s={Authorization:`Bearer ${e.accessToken}`},m={user:n,amount_buy:p,token_buy:convertToSignableToken(r.buy),amount_sell:o,token_sell:convertToSignableToken(r.sell),fees:r.fees,split_fees:!0,expiration_timestamp:r.expiration_timestamp},f=await i.getSignableOrder({getSignableOrderRequestV3:m},{headers:s});await a.evaluateImxTransaction({payloadHash:f.data.payload_hash});let{payload_hash:d}=f.data,u=await t.signMessage(d),R=f.data,C={createOrderRequest:{include_fees:!0,fees:r.fees,stark_signature:u,amount_buy:R.amount_buy,amount_sell:R.amount_sell,asset_id_buy:R.asset_id_buy,asset_id_sell:R.asset_id_sell,expiration_timestamp:R.expiration_timestamp,nonce:R.nonce,stark_key:R.stark_key,vault_id_buy:R.vault_id_buy,vault_id_sell:R.vault_id_sell}};return {...(await i.createOrderV3(C,{headers:s})).data}},"CREATE_ORDER_ERROR")}async function Q({user:t,starkSigner:e,request:r,ordersApi:i,guardianClient:a}){return _(async()=>{let n={order_id:r.order_id},o={Authorization:`Bearer ${t.accessToken}`},p=await i.getSignableCancelOrderV3({getSignableCancelOrderRequest:n},{headers:o});await a.evaluateImxTransaction({payloadHash:p.data.payload_hash});let{payload_hash:s}=p.data,m=await e.signMessage(s),f=await i.cancelOrderV3({id:r.order_id.toString(),cancelOrderRequest:{order_id:r.order_id,stark_signature:m}},{headers:o});return {order_id:f.data.order_id,status:f.data.status}},"CANCEL_ORDER_ERROR")}async function W({ethSigner:t,starkSigner:e,imxApiClients:r},i){return _(async()=>{let[a,n]=await Promise.all([t.getAddress(),e.getAddress()]),o=await r.usersApi.getSignableRegistrationOffchain({getSignableRegistrationRequest:{ether_key:a,stark_key:n}}),{signable_message:p,payload_hash:s}=o.data,[m,f]=await Promise.all([signRaw(p,t),e.signMessage(s)]);return (await r.usersApi.registerPassportUserV2({authorization:`Bearer ${i}`,registerPassportUserRequest:{eth_signature:m,ether_key:a,stark_signature:f,stark_key:n}})).data},"USER_REGISTRATION_ERROR")}async function Y({request:t,tradesApi:e,user:r,starkSigner:i,guardianClient:a}){return _(async()=>{let{ethAddress:n}=r.imx,o={expiration_timestamp:t.expiration_timestamp,fees:t.fees,order_id:t.order_id,user:n},p={Authorization:`Bearer ${r.accessToken}`},s=await e.getSignableTrade({getSignableTradeRequest:o},{headers:p});await a.evaluateImxTransaction({payloadHash:s.data.payload_hash});let{payload_hash:m}=s.data,f=await i.signMessage(m),{data:d}=s,u={createTradeRequest:{include_fees:!0,fees:t?.fees,stark_signature:f,order_id:t?.order_id,fee_info:d.fee_info,amount_buy:d.amount_buy,amount_sell:d.amount_sell,asset_id_buy:d.asset_id_buy,asset_id_sell:d.asset_id_sell,expiration_timestamp:d.expiration_timestamp,nonce:d.nonce,stark_key:d.stark_key,vault_id_buy:d.vault_id_buy,vault_id_sell:d.vault_id_sell}},{data:R}=await e.createTradeV3(u,{headers:p});return R},"CREATE_TRADE_ERROR")}var ee="ERC721";async function re({request:t,transfersApi:e,starkSigner:r,user:i,guardianClient:a}){return _(async()=>{let n=t.type===ee?"1":t.amount,o={sender:i.imx.ethAddress,token:convertToSignableToken(t),amount:n,receiver:t.receiver},p={Authorization:`Bearer ${i.accessToken}`},s=await e.getSignableTransferV1({getSignableTransferRequest:o},{headers:p});await a.evaluateImxTransaction({payloadHash:s.data.payload_hash});let m=s.data,{payload_hash:f}=m,d=await r.signMessage(f),u=await r.getAddress(),C={createTransferRequest:{sender_stark_key:m.sender_stark_key||u,sender_vault_id:m.sender_vault_id,receiver_stark_key:m.receiver_stark_key,receiver_vault_id:m.receiver_vault_id,asset_id:m.asset_id,amount:m.amount,nonce:m.nonce,expiration_timestamp:m.expiration_timestamp,stark_signature:d}},{data:O}=await e.createTransferV1(C,{headers:p});return {sent_signature:O.sent_signature,status:O.status?.toString(),time:O.time,transfer_id:O.transfer_id}},"TRANSFER_ERROR")}async function te({user:t,starkSigner:e,request:r,transfersApi:i,guardianClient:a}){return _(async()=>{let{ethAddress:n}=t.imx,o=r.map(u=>({amount:"1",token:convertToSignableToken({type:ee,tokenId:u.tokenId,tokenAddress:u.tokenAddress}),receiver:u.receiver})),p={Authorization:`Bearer ${t.accessToken}`},s=await i.getSignableTransfer({getSignableTransferRequestV2:{sender_ether_key:n,signable_requests:o}},{headers:p});await a.evaluateImxTransaction({payloadHash:s.data.signable_responses[0]?.payload_hash});let m=await Promise.all(s.data.signable_responses.map(async u=>{let R=await e.signMessage(u.payload_hash);return {sender_vault_id:u.sender_vault_id,receiver_stark_key:u.receiver_stark_key,receiver_vault_id:u.receiver_vault_id,asset_id:u.asset_id,amount:u.amount,nonce:u.nonce,expiration_timestamp:u.expiration_timestamp,stark_signature:R}})),f={sender_stark_key:s.data.sender_stark_key,requests:m};return {transfer_ids:(await i.createTransfer({createTransferRequestV2:f},{headers:p}))?.data.transfer_ids}},"TRANSFER_ERROR")}async function ie(t){await retryWithDelay(async()=>{let e=await t.forceUserRefresh();return e?.imx?e:Promise.reject(new Error("user wallet addresses not exist"))});}async function K(t,e,r,i,a){return _(async()=>{try{let n=await W({ethSigner:t,starkSigner:e,imxApiClients:a},r.accessToken);return await ie(i),n}catch(n){if(Sr.isAxiosError(n)&&n.response?.status===409)return await ie(i),{tx_hash:""};throw n}},"USER_REGISTRATION_ERROR")}var c=async(t,e,r=!0,i)=>t();var k=class{authManager;immutableXClient;guardianClient;imxApiClients;magicTEESigner;starkSigner;signerInitialisationError;constructor({authManager:e,immutableXClient:r,passportEventEmitter:i,magicTEESigner:a,imxApiClients:n,guardianClient:o}){this.authManager=e,this.immutableXClient=r,this.magicTEESigner=a,this.imxApiClients=n,this.guardianClient=o,this.#i(),i.on("loggedOut",this.handleLogout);}handleLogout=()=>{this.starkSigner=void 0;};#i(){this.starkSigner=new Promise(async e=>{try{e(await H(this.magicTEESigner));}catch(r){this.signerInitialisationError=r,e(void 0);}});}async#r(){let e=await this.authManager.getUser();if(!e||!this.starkSigner)throw new l("User has been logged out","NOT_LOGGED_IN_ERROR");return e}async#t(){let e=await this.starkSigner;if(typeof e>"u")throw typeof this.signerInitialisationError<"u"?this.signerInitialisationError:new Error("Signers failed to initialise");return e}async#e(){let[e,r]=await Promise.all([this.#r(),this.#t()]);if(!G(e))throw new l("User has not been registered with StarkEx","USER_NOT_REGISTERED_ERROR");return {user:e,starkSigner:r}}async transfer(e){return c(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:i}=await this.#e();return re({request:e,user:r,starkSigner:i,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.guardianClient})})())}async registerOffchain(){return c(async()=>{let[e,r]=await Promise.all([this.#r(),this.#t()]);return await K(this.magicTEESigner,r,e,this.authManager,this.imxApiClients)})}async isRegisteredOffchain(){return c(async()=>!!(await this.#r()).imx)}isRegisteredOnchain(){throw new l("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async createOrder(e){return c(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:i}=await this.#e();return j({request:e,user:r,starkSigner:i,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.guardianClient})})())}async cancelOrder(e){return c(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:i}=await this.#e();return Q({request:e,user:r,starkSigner:i,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.guardianClient})})())}async createTrade(e){return c(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:i}=await this.#e();return Y({request:e,user:r,starkSigner:i,tradesApi:this.immutableXClient.tradesApi,guardianClient:this.guardianClient})})())}async batchNftTransfer(e){return c(()=>this.guardianClient.withConfirmationScreenTask({width:480,height:784})(async()=>{let{user:r,starkSigner:i}=await this.#e();return te({request:e,user:r,starkSigner:i,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.guardianClient})})())}async exchangeTransfer(e){return c(async()=>{let{user:r,starkSigner:i}=await this.#e();return z({request:e,user:r,starkSigner:i,exchangesApi:this.immutableXClient.exchangeApi})})}deposit(e){throw new l("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}prepareWithdrawal(e){throw new l("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}completeWithdrawal(e,r){throw new l("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async getAddress(){return c(async()=>{let e=await this.#r();if(!G(e))throw new l("User has not been registered with StarkEx","USER_NOT_REGISTERED_ERROR");return Promise.resolve(e.imx.ethAddress)})}};var S=class{authManager;immutableXClient;magicTEESigner;passportEventEmitter;imxApiClients;guardianClient;constructor({authManager:e,immutableXClient:r,magicTEESigner:i,passportEventEmitter:a,imxApiClients:n,guardianClient:o}){this.authManager=e,this.immutableXClient=r,this.magicTEESigner=i,this.passportEventEmitter=a,this.imxApiClients=n,this.guardianClient=o;}async getProvider(){let e=await this.authManager.getUserOrLogin();return this.createProviderInstance(e)}async getProviderSilent(){let e=await this.authManager.getUser();return e?this.createProviderInstance(e):null}async createProviderInstance(e){if(!e.idToken)throw new l("Failed to initialise","WALLET_CONNECTION_ERROR");return new k({authManager:this.authManager,immutableXClient:this.immutableXClient,passportEventEmitter:this.passportEventEmitter,magicTEESigner:this.magicTEESigner,imxApiClients:this.imxApiClients,guardianClient:this.guardianClient})}};var se=(t,e,r)=>{let i=e.map(a=>!t[a]&&a).filter(a=>a).join(", ");if(i!==""){let a=r?`${r} - ${i} cannot be null`:`${i} cannot be null`;throw new l(a,"INVALID_CONFIGURATION")}},I=class{authenticationDomain;passportDomain;imxPublicApiDomain;magicPublishableApiKey;magicProviderId;magicTeeBasePath="https://tee.express.magiclabs.com";magicTeeTimeout=1e4;oidcConfiguration;baseConfig;zkEvmRpcUrl;relayerUrl;multiRollupConfig;crossSdkBridgeEnabled;forceScwDeployBeforeMessageSignature;popupOverlayOptions;constructor({baseConfig:e,overrides:r,crossSdkBridgeEnabled:i,jsonRpcReferrer:a,forceScwDeployBeforeMessageSignature:n,popupOverlayOptions:o,...p}){if(se(p,["clientId","redirectUri"]),this.oidcConfiguration=p,this.baseConfig=e,this.crossSdkBridgeEnabled=i||!1,this.forceScwDeployBeforeMessageSignature=n||!1,this.popupOverlayOptions=o||{disableGenericPopupOverlay:!1,disableBlockedPopupOverlay:!1,disableHeadlessLoginPromptOverlay:!1},r)se(r,["authenticationDomain","passportDomain","magicPublishableApiKey","magicProviderId","zkEvmRpcUrl","relayerUrl","imxPublicApiDomain","indexerMrBasePath","orderBookMrBasePath","passportMrBasePath"],"overrides"),this.authenticationDomain=r.authenticationDomain,this.passportDomain=r.passportDomain,this.imxPublicApiDomain=r.imxPublicApiDomain,this.magicPublishableApiKey=r.magicPublishableApiKey,this.magicProviderId=r.magicProviderId,this.zkEvmRpcUrl=r.zkEvmRpcUrl,this.relayerUrl=r.relayerUrl,this.multiRollupConfig={indexer:createConfig({basePath:r.indexerMrBasePath}),orderBook:createConfig({basePath:r.orderBookMrBasePath}),passport:createConfig({basePath:r.passportMrBasePath})};else switch(e.environment){case Environment.PRODUCTION:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="aa80b860-8869-4f13-9000-6a6ad3d20017",this.passportDomain="https://passport.immutable.com",this.imxPublicApiDomain="https://api.immutable.com",this.zkEvmRpcUrl="https://rpc.immutable.com",this.relayerUrl="https://api.immutable.com/relayer-mr",this.multiRollupConfig=multiRollupConfig.getProduction();break}case Environment.SANDBOX:default:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="aa80b860-8869-4f13-9000-6a6ad3d20017",this.passportDomain="https://passport.sandbox.immutable.com",this.imxPublicApiDomain="https://api.sandbox.immutable.com",this.zkEvmRpcUrl="https://rpc.testnet.immutable.com",this.relayerUrl="https://api.sandbox.immutable.com/relayer-mr",this.multiRollupConfig=multiRollupConfig.getSandbox();break}}}};var Lr=(...t)=>{if(typeof g>"u")return;g?.env?.JEST_WORKER_ID===void 0&&console.warn(...t);},oe={warn:Lr};var it=t=>t.overrides?createConfig({basePath:t.overrides.imxPublicApiDomain}):t.baseConfig.environment===Environment.SANDBOX?imxApiConfig.getSandbox():imxApiConfig.getProduction(),at=t=>{if(t.overrides?.imxApiClients)return t.overrides.imxApiClients;let e=it(t);return new ImxApiClients(e)},nt=t=>{let e=new I(t),r=new AuthConfiguration({...t,authenticationDomain:e.authenticationDomain,crossSdkBridgeEnabled:t.crossSdkBridgeEnabled,popupOverlayOptions:t.popupOverlayOptions,passportDomain:e.passportDomain}),i=new EmbeddedLoginPrompt(r),a=new AuthManager(r,i),n=new ConfirmationScreen(r),o=new MagicTeeApiClients({basePath:e.magicTeeBasePath,timeout:e.magicTeeTimeout,magicPublishableApiKey:e.magicPublishableApiKey,magicProviderId:e.magicProviderId}),p=new MagicTEESigner(a,o),s=new MultiRollupApiClients(e.multiRollupConfig),m=new WalletConfiguration({baseConfig:t.baseConfig,overrides:t.overrides,jsonRpcReferrer:t.jsonRpcReferrer,forceScwDeployBeforeMessageSignature:t.forceScwDeployBeforeMessageSignature,crossSdkBridgeEnabled:t.crossSdkBridgeEnabled}),f=new TypedEventEmitter,d=t.overrides?t.overrides.immutableXClient:new IMXClient({baseConfig:t.baseConfig}),u=new GuardianClient({confirmationScreen:n,config:m,authManager:a,guardianApi:s.guardianApi}),R=at(t),C=new S({authManager:a,immutableXClient:d,magicTEESigner:p,passportEventEmitter:f,imxApiClients:R,guardianClient:u});return {config:e,authManager:a,authConfig:r,walletConfig:m,magicTEESigner:p,confirmationScreen:n,embeddedLoginPrompt:i,immutableXClient:d,multiRollupApiClients:s,passportEventEmitter:f,passportImxProviderFactory:C,guardianClient:u}},X=class{authManager;walletConfig;confirmationScreen;embeddedLoginPrompt;immutableXClient;magicTEESigner;multiRollupApiClients;passportImxProviderFactory;passportEventEmitter;guardianClient;constructor(e){let r=nt(e);this.walletConfig=r.walletConfig,this.authManager=r.authManager,this.magicTEESigner=r.magicTEESigner,this.confirmationScreen=r.confirmationScreen,this.embeddedLoginPrompt=r.embeddedLoginPrompt,this.immutableXClient=r.immutableXClient,this.multiRollupApiClients=r.multiRollupApiClients,this.passportEventEmitter=r.passportEventEmitter,this.passportImxProviderFactory=r.passportImxProviderFactory,this.guardianClient=r.guardianClient,setPassportClientId(e.clientId),track("passport","initialise");}async connectImxSilent(){return c(()=>this.passportImxProviderFactory.getProviderSilent(),"connectImxSilent",!1)}async connectImx(){return c(()=>this.passportImxProviderFactory.getProvider(),"connectImx",!1)}async connectEvm(e={announceProvider:!0}){return c(async()=>{let r=null;try{r=await this.authManager.getUser();}catch{}let i=new ZkEvmProvider({passportEventEmitter:this.passportEventEmitter,authManager:this.authManager,config:this.walletConfig,multiRollupApiClients:this.multiRollupApiClients,guardianClient:this.guardianClient,ethSigner:this.magicTEESigner,user:r});return e?.announceProvider&&announceProvider({info:passportProviderInfo,provider:i}),i},"connectEvm",!1)}async login(e){return c(async()=>{let{useCachedSession:r=!1,useSilentLogin:i}=e||{},a=null;try{a=await this.authManager.getUser();}catch(n){if(n instanceof Error&&!n.message.includes("Unknown or invalid refresh token")&&trackError("passport","login",n),r)throw n;oe.warn("Failed to retrieve a cached user session",n);}if(!a&&i)a=await this.authManager.forceUserRefresh();else if(!a&&!r){let n=e?.directLoginOptions?{directLoginMethod:e.directLoginOptions.directLoginMethod,email:e.directLoginOptions.email,marketingConsentStatus:e.directLoginOptions.marketingConsentStatus}:void 0;e?.useRedirectFlow?await this.authManager.loginWithRedirect(e?.anonymousId,n):a=await this.authManager.login(e?.anonymousId,n);}return a&&(identify({passportId:a.profile.sub}),this.passportEventEmitter.emit("loggedIn",a)),a?a.profile:null},"login",!1)}async loginCallback(){await c(()=>this.authManager.loginCallback(),"loginCallback",!1).then(e=>{e&&(identify({passportId:e.profile.sub}),this.passportEventEmitter.emit("loggedIn",e));});}async loginWithPKCEFlow(e,r){return c(async()=>await this.authManager.getPKCEAuthorizationUrl(e,r),"loginWithPKCEFlow",!1)}async loginWithPKCEFlowCallback(e,r){return c(async()=>{let i=await this.authManager.loginWithPKCEFlowCallback(e,r);return this.passportEventEmitter.emit("loggedIn",i),i.profile},"loginWithPKCEFlowCallback",!1)}async storeTokens(e){return c(async()=>{let r=await this.authManager.storeTokens(e);return this.passportEventEmitter.emit("loggedIn",r),r.profile},"storeTokens",!1)}async logout(){return c(async()=>{await this.authManager.logout(),this.passportEventEmitter.emit("loggedOut");},"logout",!1)}async getLogoutUrl(){return c(async()=>(await this.authManager.removeUser(),this.passportEventEmitter.emit("loggedOut"),await this.authManager.getLogoutUrl()||void 0),"getLogoutUrl",!1)}async logoutSilentCallback(e){return c(()=>this.authManager.logoutSilentCallback(e),"logoutSilentCallback",!1)}async getUserInfo(){return c(async()=>(await this.authManager.getUser())?.profile,"getUserInfo",!1)}async getIdToken(){return c(async()=>(await this.authManager.getUser())?.idToken,"getIdToken",!1)}async getAccessToken(){return c(async()=>(await this.authManager.getUser())?.accessToken,"getAccessToken",!1)}async getLinkedAddresses(){return c(async()=>{let e=await this.authManager.getUser();if(!e?.profile.sub)return [];let r={Authorization:`Bearer ${e.accessToken}`},{data:i}=await this.multiRollupApiClients.passportProfileApi.getUserInfo({headers:r});return i.linked_addresses},"getLinkedAddresses",!1)}async linkExternalWallet(e){let r=trackFlow("passport","linkExternalWallet"),i=await this.authManager.getUser();if(!i)throw new l("User is not logged in","NOT_LOGGED_IN_ERROR");let a=isUserImx(i),n=isUserZkEvm(i);if(!a&&!n)throw new l("User has not been registered","USER_NOT_REGISTERED_ERROR");let o={Authorization:`Bearer ${i.accessToken}`},p={type:e.type,wallet_address:e.walletAddress,signature:e.signature,nonce:e.nonce};try{return {...(await this.multiRollupApiClients.passportProfileApi.linkWalletV2({linkWalletV2Request:p},{headers:o})).data}}catch(s){if(s instanceof Error?trackError("passport","linkExternalWallet",s):r.addEvent("errored"),isAxiosError(s)&&s.response){if(s.response.data&&D(s.response.data)){let{code:f,message:d}=s.response.data;switch(f){case"ALREADY_LINKED":throw new l(d,"LINK_WALLET_ALREADY_LINKED_ERROR");case"MAX_WALLETS_LINKED":throw new l(d,"LINK_WALLET_MAX_WALLETS_LINKED_ERROR");case"DUPLICATE_NONCE":throw new l(d,"LINK_WALLET_DUPLICATE_NONCE_ERROR");case"VALIDATION_ERROR":throw new l(d,"LINK_WALLET_VALIDATION_ERROR");default:throw new l(d,"LINK_WALLET_GENERIC_ERROR")}}else if(s.response.status)throw new l(`Link wallet request failed with status code ${s.response.status}`,"LINK_WALLET_GENERIC_ERROR")}let m="Link wallet request failed";throw s instanceof Error&&(m+=`: ${s.message}`),new l(m,"LINK_WALLET_GENERIC_ERROR")}finally{r.addEvent("End");}}};
|
|
12
|
+
function J(i){return "code"in i&&"message"in i}var o=class extends Error{type;constructor(e,r){super(e),this.type=r;}},f=async(i,e)=>{try{return await i()}catch(r){let t;throw r instanceof o&&r.type==="SERVICE_UNAVAILABLE_ERROR"?new o(r.message,r.type):(isAxiosError(r)&&r.response?.data&&J(r.response.data)?t=r.response.data.message:t=r.message,new o(t,e))}};var C=i=>{if(!i.idToken)throw new o("User has been logged out","NOT_LOGGED_IN_ERROR");let r=Y(i.idToken).passport;if(!r?.imx_eth_address||!r?.imx_stark_address||!r?.imx_user_admin_address)throw new o("User has not been registered with StarkEx","USER_NOT_REGISTERED_ERROR");return {...i,imx:{ethAddress:r.imx_eth_address,starkAddress:r.imx_stark_address,userAdminAddress:r.imx_user_admin_address}}};var v=async i=>f(async()=>{let e=await generateLegacyStarkPrivateKey(i);return createStarkSigner(e)},"WALLET_CONNECTION_ERROR");async function w({user:i,starkSigner:e,request:r,exchangesApi:t}){return f(async()=>{let{ethAddress:a}=i.imx,s=r.amount,l=await t.getExchangeSignableTransfer({id:r.transactionID,getSignableTransferRequest:{sender:a,token:convertToSignableToken(r),amount:s,receiver:r.receiver}}),n=await e.getAddress(),{payload_hash:m}=l.data,p=await e.signMessage(m),c={sender_stark_key:l.data.sender_stark_key||n,sender_vault_id:l.data.sender_vault_id,receiver_stark_key:l.data.receiver_stark_key,receiver_vault_id:l.data.receiver_vault_id,asset_id:l.data.asset_id,amount:l.data.amount,nonce:l.data.nonce,expiration_timestamp:l.data.expiration_timestamp,stark_signature:p},u={Authorization:`Bearer ${i.accessToken}`},d=await t.createExchangeTransfer({id:r.transactionID,createTransferRequest:c},{headers:u});return {sent_signature:d?.data.sent_signature,status:d?.data.status?.toString(),time:d?.data.time,transfer_id:d?.data.transfer_id}},"EXCHANGE_TRANSFER_ERROR")}var L="ERC721";async function N({starkSigner:i,user:e,request:r,ordersApi:t,guardianClient:a}){return f(async()=>{let{ethAddress:s}=e.imx,l=r.sell.type===L?"1":r.sell.amount,n=r.buy.type===L?"1":r.buy.amount,m={Authorization:`Bearer ${e.accessToken}`},p={user:s,amount_buy:n,token_buy:convertToSignableToken(r.buy),amount_sell:l,token_sell:convertToSignableToken(r.sell),fees:r.fees,split_fees:!0,expiration_timestamp:r.expiration_timestamp},c=await t.getSignableOrder({getSignableOrderRequestV3:p},{headers:m});await a.evaluateTransaction(c.data.payload_hash);let{payload_hash:u}=c.data,d=await i.signMessage(u),h=c.data,y={createOrderRequest:{include_fees:!0,fees:r.fees,stark_signature:d,amount_buy:h.amount_buy,amount_sell:h.amount_sell,asset_id_buy:h.asset_id_buy,asset_id_sell:h.asset_id_sell,expiration_timestamp:h.expiration_timestamp,nonce:h.nonce,stark_key:h.stark_key,vault_id_buy:h.vault_id_buy,vault_id_sell:h.vault_id_sell}};return {...(await t.createOrderV3(y,{headers:m})).data}},"CREATE_ORDER_ERROR")}async function D({user:i,starkSigner:e,request:r,ordersApi:t,guardianClient:a}){return f(async()=>{let s={order_id:r.order_id},l={Authorization:`Bearer ${i.accessToken}`},n=await t.getSignableCancelOrderV3({getSignableCancelOrderRequest:s},{headers:l});await a.evaluateTransaction(n.data.payload_hash);let{payload_hash:m}=n.data,p=await e.signMessage(m),c=await t.cancelOrderV3({id:r.order_id.toString(),cancelOrderRequest:{order_id:r.order_id,stark_signature:p}},{headers:l});return {order_id:c.data.order_id,status:c.data.status}},"CANCEL_ORDER_ERROR")}async function I({ethSigner:i,starkSigner:e,imxApiClients:r},t){return f(async()=>{let[a,s]=await Promise.all([i.getAddress(),e.getAddress()]),l=await r.usersApi.getSignableRegistrationOffchain({getSignableRegistrationRequest:{ether_key:a,stark_key:s}}),{signable_message:n,payload_hash:m}=l.data,[p,c]=await Promise.all([signRaw(n,i),e.signMessage(m)]);return (await r.usersApi.registerPassportUserV2({authorization:`Bearer ${t}`,registerPassportUserRequest:{eth_signature:p,ether_key:a,stark_signature:c,stark_key:s}})).data},"USER_REGISTRATION_ERROR")}async function M({request:i,tradesApi:e,user:r,starkSigner:t,guardianClient:a}){return f(async()=>{let{ethAddress:s}=r.imx,l={expiration_timestamp:i.expiration_timestamp,fees:i.fees,order_id:i.order_id,user:s},n={Authorization:`Bearer ${r.accessToken}`},m=await e.getSignableTrade({getSignableTradeRequest:l},{headers:n});await a.evaluateTransaction(m.data.payload_hash);let{payload_hash:p}=m.data,c=await t.signMessage(p),{data:u}=m,d={createTradeRequest:{include_fees:!0,fees:i?.fees,stark_signature:c,order_id:i?.order_id,fee_info:u.fee_info,amount_buy:u.amount_buy,amount_sell:u.amount_sell,asset_id_buy:u.asset_id_buy,asset_id_sell:u.asset_id_sell,expiration_timestamp:u.expiration_timestamp,nonce:u.nonce,stark_key:u.stark_key,vault_id_buy:u.vault_id_buy,vault_id_sell:u.vault_id_sell}},{data:h}=await e.createTradeV3(d,{headers:n});return h},"CREATE_TRADE_ERROR")}var B="ERC721";async function W({request:i,transfersApi:e,starkSigner:r,user:t,guardianClient:a}){return f(async()=>{let s=i.type===B?"1":i.amount,l={sender:t.imx.ethAddress,token:convertToSignableToken(i),amount:s,receiver:i.receiver},n={Authorization:`Bearer ${t.accessToken}`},m=await e.getSignableTransferV1({getSignableTransferRequest:l},{headers:n});await a.evaluateTransaction(m.data.payload_hash);let p=m.data,{payload_hash:c}=p,u=await r.signMessage(c),d=await r.getAddress(),y={createTransferRequest:{sender_stark_key:p.sender_stark_key||d,sender_vault_id:p.sender_vault_id,receiver_stark_key:p.receiver_stark_key,receiver_vault_id:p.receiver_vault_id,asset_id:p.asset_id,amount:p.amount,nonce:p.nonce,expiration_timestamp:p.expiration_timestamp,stark_signature:u}},{data:A}=await e.createTransferV1(y,{headers:n});return {sent_signature:A.sent_signature,status:A.status?.toString(),time:A.time,transfer_id:A.transfer_id}},"TRANSFER_ERROR")}async function K({user:i,starkSigner:e,request:r,transfersApi:t,guardianClient:a}){return f(async()=>{let{ethAddress:s}=i.imx,l=r.map(d=>({amount:"1",token:convertToSignableToken({type:B,tokenId:d.tokenId,tokenAddress:d.tokenAddress}),receiver:d.receiver})),n={Authorization:`Bearer ${i.accessToken}`},m=await t.getSignableTransfer({getSignableTransferRequestV2:{sender_ether_key:s,signable_requests:l}},{headers:n});await a.evaluateTransaction(m.data.signable_responses[0]?.payload_hash);let p=await Promise.all(m.data.signable_responses.map(async d=>{let h=await e.signMessage(d.payload_hash);return {sender_vault_id:d.sender_vault_id,receiver_stark_key:d.receiver_stark_key,receiver_vault_id:d.receiver_vault_id,asset_id:d.asset_id,amount:d.amount,nonce:d.nonce,expiration_timestamp:d.expiration_timestamp,stark_signature:h}})),c={sender_stark_key:m.data.sender_stark_key,requests:p};return {transfer_ids:(await t.createTransfer({createTransferRequestV2:c},{headers:n}))?.data.transfer_ids}},"TRANSFER_ERROR")}async function X(i){await retryWithDelay(async()=>{let e=await i.forceUserRefresh();if(!e)return Promise.reject(new Error("user wallet addresses not exist"));try{return C(e),e}catch{return Promise.reject(new Error("user wallet addresses not exist"))}});}async function S(i,e,r,t,a){return f(async()=>{try{let s=await I({ethSigner:i,starkSigner:e,imxApiClients:a},r.accessToken);return await X(t),s}catch(s){if(ae.isAxiosError(s)&&s.response?.status===409)return await X(t),{tx_hash:""};throw s}},"USER_REGISTRATION_ERROR")}var E=async(i,e,r=!0,t=!0)=>{let a=trackFlow("passport",e,r);try{return await i(a)}catch(s){throw s instanceof Error?trackError("passport",e,s,{flowId:a.details.flowId}):a.addEvent("errored"),s}finally{t&&a.addEvent("End");}};var x=class{authManager;immutableXClient;guardianClient;imxApiClients;magicTEESigner;imxGuardianClient;starkSigner;signerInitialisationError;constructor({authManager:e,immutableXClient:r,passportEventEmitter:t,magicTEESigner:a,imxApiClients:s,guardianClient:l,imxGuardianClient:n}){this.authManager=e,this.immutableXClient=r,this.magicTEESigner=a,this.imxApiClients=s,this.guardianClient=l,this.imxGuardianClient=n,this.#i(),t.on(AuthEvents.LOGGED_OUT,this.handleLogout);}handleLogout=()=>{this.starkSigner=void 0;};#i(){this.starkSigner=new Promise(async e=>{try{e(await v(this.magicTEESigner));}catch(r){this.signerInitialisationError=r,e(void 0);}});}async#r(){let e=await this.authManager.getUser();if(!e||!this.starkSigner)throw new o("User has been logged out","NOT_LOGGED_IN_ERROR");return e}async#t(){let e=await this.starkSigner;if(typeof e>"u")throw typeof this.signerInitialisationError<"u"?this.signerInitialisationError:new Error("Signers failed to initialise");return e}async#e(){let[e,r]=await Promise.all([this.#r(),this.#t()]);return {user:C(e),starkSigner:r}}async transfer(e){return E(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:t}=await this.#e();return W({request:e,user:r,starkSigner:t,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.imxGuardianClient})})(),"imxTransfer")}async registerOffchain(){return E(async()=>{let[e,r]=await Promise.all([this.#r(),this.#t()]);return await S(this.magicTEESigner,r,C(e),this.authManager,this.imxApiClients)},"imxRegisterOffchain")}async isRegisteredOffchain(){return E(async()=>{try{let e=await this.#r();return !!C(e).imx}catch(e){if(e instanceof o&&e.type==="USER_NOT_REGISTERED_ERROR")return !1;throw e}},"imxIsRegisteredOffchain")}isRegisteredOnchain(){throw new o("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async createOrder(e){return E(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:t}=await this.#e();return N({request:e,user:r,starkSigner:t,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.imxGuardianClient})})(),"imxCreateOrder")}async cancelOrder(e){return E(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:t}=await this.#e();return D({request:e,user:r,starkSigner:t,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.imxGuardianClient})})(),"imxCancelOrder")}async createTrade(e){return E(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:t}=await this.#e();return M({request:e,user:r,starkSigner:t,tradesApi:this.immutableXClient.tradesApi,guardianClient:this.imxGuardianClient})})(),"imxCreateTrade")}async batchNftTransfer(e){return E(()=>this.guardianClient.withConfirmationScreenTask({width:480,height:784})(async()=>{let{user:r,starkSigner:t}=await this.#e();return K({request:e,user:r,starkSigner:t,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.imxGuardianClient})})(),"imxBatchNftTransfer")}async exchangeTransfer(e){return E(async()=>{let{user:r,starkSigner:t}=await this.#e();return w({request:e,user:r,starkSigner:t,exchangesApi:this.immutableXClient.exchangeApi})},"imxExchangeTransfer")}deposit(e){throw new o("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}prepareWithdrawal(e){throw new o("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}completeWithdrawal(e,r){throw new o("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async getAddress(){return E(async()=>{let e=await this.#r(),r=C(e);return Promise.resolve(r.imx.ethAddress)},"imxGetAddress")}};var T=class{authManager;immutableXClient;magicTEESigner;passportEventEmitter;imxApiClients;guardianClient;imxGuardianClient;constructor({authManager:e,immutableXClient:r,magicTEESigner:t,passportEventEmitter:a,imxApiClients:s,guardianClient:l,imxGuardianClient:n}){this.authManager=e,this.immutableXClient=r,this.magicTEESigner=t,this.passportEventEmitter=a,this.imxApiClients=s,this.guardianClient=l,this.imxGuardianClient=n;}async getProvider(){let e=await this.authManager.getUserOrLogin();return this.createProviderInstance(e)}async getProviderSilent(){let e=await this.authManager.getUser();return e?this.createProviderInstance(e):null}async createProviderInstance(e){if(!e.idToken)throw new o("Failed to initialise","WALLET_CONNECTION_ERROR");return new x({authManager:this.authManager,immutableXClient:this.immutableXClient,passportEventEmitter:this.passportEventEmitter,magicTEESigner:this.magicTEESigner,imxApiClients:this.imxApiClients,guardianClient:this.guardianClient,imxGuardianClient:this.imxGuardianClient})}};var q=(i,e,r)=>{let t=e.map(a=>!i[a]&&a).filter(a=>a).join(", ");if(t!==""){let a=r?`${r} - ${t} cannot be null`:`${t} cannot be null`;throw new o(a,"INVALID_CONFIGURATION")}},P=class{authenticationDomain;passportDomain;imxPublicApiDomain;magicPublishableApiKey;magicProviderId;magicTeeBasePath="https://tee.express.magiclabs.com";magicTeeTimeout=1e4;oidcConfiguration;baseConfig;zkEvmRpcUrl;relayerUrl;multiRollupConfig;crossSdkBridgeEnabled;forceScwDeployBeforeMessageSignature;jsonRpcReferrer;popupOverlayOptions;overrides;constructor({baseConfig:e,overrides:r,crossSdkBridgeEnabled:t,jsonRpcReferrer:a,forceScwDeployBeforeMessageSignature:s,popupOverlayOptions:l,...n}){if(q(n,["clientId","redirectUri"]),this.oidcConfiguration=n,this.baseConfig=e,this.overrides=r,this.crossSdkBridgeEnabled=t||!1,this.forceScwDeployBeforeMessageSignature=s||!1,this.jsonRpcReferrer=a,this.popupOverlayOptions=l||{disableGenericPopupOverlay:!1,disableBlockedPopupOverlay:!1,disableHeadlessLoginPromptOverlay:!1},r)q(r,["authenticationDomain","passportDomain","magicPublishableApiKey","magicProviderId","zkEvmRpcUrl","relayerUrl","imxPublicApiDomain","indexerMrBasePath","orderBookMrBasePath","passportMrBasePath"],"overrides"),this.authenticationDomain=r.authenticationDomain,this.passportDomain=r.passportDomain,this.imxPublicApiDomain=r.imxPublicApiDomain,this.magicPublishableApiKey=r.magicPublishableApiKey,this.magicProviderId=r.magicProviderId,this.zkEvmRpcUrl=r.zkEvmRpcUrl,this.relayerUrl=r.relayerUrl,this.multiRollupConfig={indexer:createConfig({basePath:r.indexerMrBasePath}),orderBook:createConfig({basePath:r.orderBookMrBasePath}),passport:createConfig({basePath:r.passportMrBasePath})};else switch(e.environment){case Environment.PRODUCTION:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="aa80b860-8869-4f13-9000-6a6ad3d20017",this.passportDomain="https://passport.immutable.com",this.imxPublicApiDomain="https://api.immutable.com",this.zkEvmRpcUrl="https://rpc.immutable.com",this.relayerUrl="https://api.immutable.com/relayer-mr",this.multiRollupConfig=multiRollupConfig.getProduction();break}case Environment.SANDBOX:default:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="aa80b860-8869-4f13-9000-6a6ad3d20017",this.passportDomain="https://passport.sandbox.immutable.com",this.imxPublicApiDomain="https://api.sandbox.immutable.com",this.zkEvmRpcUrl="https://rpc.testnet.immutable.com",this.relayerUrl="https://api.sandbox.immutable.com/relayer-mr",this.multiRollupConfig=multiRollupConfig.getSandbox();break}}}};var ce="Transaction requires confirmation but this functionality is not supported in this environment. Please contact Immutable support if you need to enable this feature.",O=class{authManager;guardianApi;confirmationScreen;crossSdkBridgeEnabled;constructor({authManager:e,guardianApi:r,confirmationScreen:t,crossSdkBridgeEnabled:a=!1}){this.authManager=e,this.guardianApi=r,this.confirmationScreen=t,this.crossSdkBridgeEnabled=a;}async evaluateTransaction(e){let r=await this.authManager.getUser();if(!r)throw new o("User has been logged out","NOT_LOGGED_IN_ERROR");let t=C(r),a={Authorization:`Bearer ${t.accessToken}`};try{if(!(await retryWithDelay(async()=>this.guardianApi.getTransactionByID({transactionID:e,chainType:"starkex"},{headers:a}),{finallyFn:()=>{this.confirmationScreen.closeWindow();}})).data.id)throw new o("Transaction does not exist","TRANSFER_ERROR");let n=await this.guardianApi.evaluateTransaction({id:e,transactionEvaluationRequest:{chainType:"starkex"}},{headers:a}),{confirmationRequired:m}=n.data;if(m){if(this.crossSdkBridgeEnabled)throw new o(ce,"TRANSACTION_REJECTED");if(!(await this.confirmationScreen.requestConfirmation(e,t.imx.ethAddress,mr.TransactionApprovalRequestChainTypeEnum.Starkex)).confirmed)throw new o("Transaction rejected by user","TRANSACTION_REJECTED")}else this.confirmationScreen.closeWindow();}catch(s){throw ae.isAxiosError(s)&&s.response?.status===403?new o("Service unavailable","SERVICE_UNAVAILABLE_ERROR"):s}}};var Se=i=>i.overrides?createConfig({basePath:i.overrides.imxPublicApiDomain}):i.baseConfig.environment===Environment.SANDBOX?imxApiConfig.getSandbox():imxApiConfig.getProduction(),be=i=>{if(i.overrides?.imxApiClients)return i.overrides.imxApiClients;let e=Se(i);return new ImxApiClients(e)},ke=i=>{let e=new P(i),r=new Auth({...i,authenticationDomain:e.authenticationDomain,crossSdkBridgeEnabled:i.crossSdkBridgeEnabled,popupOverlayOptions:i.popupOverlayOptions,passportDomain:e.passportDomain}),t=r.getAuthManager(),a=r.getConfig(),s=new ConfirmationScreen(a),l=new WalletConfiguration({passportDomain:e.passportDomain,zkEvmRpcUrl:e.zkEvmRpcUrl,relayerUrl:e.relayerUrl,indexerMrBasePath:e.multiRollupConfig.indexer.basePath||e.passportDomain,jsonRpcReferrer:i.jsonRpcReferrer,forceScwDeployBeforeMessageSignature:i.forceScwDeployBeforeMessageSignature,crossSdkBridgeEnabled:i.crossSdkBridgeEnabled}),n=new MultiRollupApiClients(e.multiRollupConfig),m=i.overrides?i.overrides.immutableXClient:new IMXClient({baseConfig:i.baseConfig}),p=new GuardianClient({config:l,authManager:t,guardianApi:n.guardianApi,authConfig:a}),c=new O({authManager:t,guardianApi:n.guardianApi,confirmationScreen:s,crossSdkBridgeEnabled:i.crossSdkBridgeEnabled||!1}),u=new MagicTeeApiClients({basePath:e.magicTeeBasePath,timeout:e.magicTeeTimeout,magicPublishableApiKey:e.magicPublishableApiKey,magicProviderId:e.magicProviderId}),d=new MagicTEESigner(t,u),h=be(i),y=new T({authManager:t,immutableXClient:m,magicTEESigner:d,passportEventEmitter:r.eventEmitter,imxApiClients:h,guardianClient:p,imxGuardianClient:c});return {passportConfig:e,auth:r,passportImxProviderFactory:y,environment:i.baseConfig.environment,walletConfig:l}},k=class{auth;passportImxProviderFactory;multiRollupApiClients;environment;passportConfig;constructor(e){let r=ke(e);this.auth=r.auth,this.passportImxProviderFactory=r.passportImxProviderFactory,this.passportConfig=r.passportConfig,this.multiRollupApiClients=new MultiRollupApiClients(this.passportConfig.multiRollupConfig),this.environment=r.environment,setPassportClientId(e.clientId);}async connectImxSilent(){return E(()=>this.passportImxProviderFactory.getProviderSilent(),"connectImxSilent",!1)}async connectImx(){return E(()=>this.passportImxProviderFactory.getProvider(),"connectImx",!1)}async connectEvm(e={announceProvider:!0}){return E(async()=>{let r=this.passportConfig.overrides,t;return r?.zkEvmChainId?t={chainId:r.zkEvmChainId,name:r.zkEvmChainName||"Dev Chain",rpcUrl:this.passportConfig.zkEvmRpcUrl,relayerUrl:this.passportConfig.relayerUrl,apiUrl:this.passportConfig.multiRollupConfig.indexer.basePath||this.passportConfig.passportDomain,passportDomain:this.passportConfig.passportDomain,magicPublishableApiKey:this.passportConfig.magicPublishableApiKey,magicProviderId:this.passportConfig.magicProviderId,magicTeeBasePath:r.magicTeeBasePath||this.passportConfig.magicTeeBasePath}:this.environment===Environment.PRODUCTION?t={chainId:13371,name:"Immutable zkEVM",rpcUrl:this.passportConfig.zkEvmRpcUrl,relayerUrl:this.passportConfig.relayerUrl,apiUrl:this.passportConfig.multiRollupConfig.indexer.basePath||this.passportConfig.passportDomain,passportDomain:this.passportConfig.passportDomain,magicPublishableApiKey:this.passportConfig.magicPublishableApiKey,magicProviderId:this.passportConfig.magicProviderId,magicTeeBasePath:this.passportConfig.magicTeeBasePath}:t={chainId:13473,name:"Immutable zkEVM Testnet",rpcUrl:this.passportConfig.zkEvmRpcUrl,relayerUrl:this.passportConfig.relayerUrl,apiUrl:this.passportConfig.multiRollupConfig.indexer.basePath||this.passportConfig.passportDomain,passportDomain:this.passportConfig.passportDomain,magicPublishableApiKey:this.passportConfig.magicPublishableApiKey,magicProviderId:this.passportConfig.magicProviderId,magicTeeBasePath:this.passportConfig.magicTeeBasePath},await connectWallet({auth:this.auth,chains:[t],crossSdkBridgeEnabled:this.passportConfig.crossSdkBridgeEnabled,jsonRpcReferrer:this.passportConfig.jsonRpcReferrer,forceScwDeployBeforeMessageSignature:this.passportConfig.forceScwDeployBeforeMessageSignature,passportEventEmitter:this.auth.eventEmitter,announceProvider:e?.announceProvider??!0})},"connectEvm",!1)}async login(e){let r=e?{useCachedSession:e.useCachedSession,useSilentLogin:e.useSilentLogin,useRedirectFlow:e.useRedirectFlow,directLoginOptions:e.directLoginOptions}:void 0,t=await this.auth.login(r);return t?t.profile:null}async loginCallback(){await this.auth.loginCallback();}async logout(){await this.auth.logout();}async getUserInfo(){return (await this.auth.getUser())?.profile}async getIdToken(){return (await this.auth.getUser())?.idToken}async getAccessToken(){return (await this.auth.getUser())?.accessToken}async loginWithPKCEFlow(e,r){return this.auth.loginWithPKCEFlow(e,r)}async loginWithPKCEFlowCallback(e,r){return (await this.auth.loginWithPKCEFlowCallback(e,r)).profile}async storeTokens(e){return (await this.auth.storeTokens(e)).profile}async getLogoutUrl(){return await this.auth.getLogoutUrl()}async logoutSilentCallback(e){return this.auth.logoutSilentCallback(e)}async getLinkedAddresses(){return E(async()=>{let e=await this.auth.getUser();if(!e?.profile.sub)return [];let r={Authorization:`Bearer ${e.accessToken}`};return (await this.multiRollupApiClients.passportProfileApi.getUserInfo({headers:r})).data.linked_addresses},"getLinkedAddresses",!1)}async linkExternalWallet(e){let r=a=>typeof a=="object"&&a!==null&&"code"in a&&"message"in a,t=trackFlow("passport","linkExternalWallet",!1);try{let a=await this.auth.getUser();if(!a)throw new o("User is not logged in","NOT_LOGGED_IN_ERROR");let s=isUserZkEvm(a);if(!(()=>{try{return C(a),!0}catch(c){if(c instanceof o&&c.type==="USER_NOT_REGISTERED_ERROR")return !1;throw c}})()&&!s)throw new o("User has not been registered","USER_NOT_REGISTERED_ERROR");let n={Authorization:`Bearer ${a.accessToken}`},m={type:e.type,wallet_address:e.walletAddress,signature:e.signature,nonce:e.nonce};return {...(await this.multiRollupApiClients.passportProfileApi.linkWalletV2({linkWalletV2Request:m},{headers:n})).data}}catch(a){if(a instanceof Error?trackError("passport","linkExternalWallet",a):t.addEvent("errored"),isAxiosError(a)&&a.response){if(a.response.data&&r(a.response.data)){let{code:l,message:n}=a.response.data;switch(l){case"ALREADY_LINKED":throw new o(n,"LINK_WALLET_ALREADY_LINKED_ERROR");case"MAX_WALLETS_LINKED":throw new o(n,"LINK_WALLET_MAX_WALLETS_LINKED_ERROR");case"DUPLICATE_NONCE":throw new o(n,"LINK_WALLET_DUPLICATE_NONCE_ERROR");case"VALIDATION_ERROR":throw new o(n,"LINK_WALLET_VALIDATION_ERROR");default:throw new o(n,"LINK_WALLET_GENERIC_ERROR")}}else if(a.response.status)throw new o(`Link wallet request failed with status code ${a.response.status}`,"LINK_WALLET_GENERIC_ERROR")}let s="Link wallet request failed";throw a instanceof Error&&(s+=`: ${a.message}`),new o(s,"LINK_WALLET_GENERIC_ERROR")}finally{t.addEvent("End");}}};var H=(r=>(r.OptedIn="opted_in",r.Unsubscribed="unsubscribed",r))(H||{});
|
|
12
13
|
|
|
13
|
-
export {
|
|
14
|
+
export { H as MarketingConsentStatus, k as Passport, o as PassportError };
|
package/dist/node/index.cjs
CHANGED
|
@@ -1,19 +1,21 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
|
|
3
|
-
var
|
|
3
|
+
var te = require('axios');
|
|
4
4
|
var generatedClients = require('@imtbl/generated-clients');
|
|
5
5
|
var xClient = require('@imtbl/x-client');
|
|
6
6
|
var config = require('@imtbl/config');
|
|
7
7
|
var metrics = require('@imtbl/metrics');
|
|
8
8
|
var auth = require('@imtbl/auth');
|
|
9
9
|
var wallet = require('@imtbl/wallet');
|
|
10
|
+
var Z = require('jwt-decode');
|
|
10
11
|
var toolkit = require('@imtbl/toolkit');
|
|
11
12
|
|
|
12
13
|
function _interopDefault (e) { return e && e.__esModule ? e : { default: e }; }
|
|
13
14
|
|
|
14
|
-
var
|
|
15
|
+
var te__default = /*#__PURE__*/_interopDefault(te);
|
|
16
|
+
var Z__default = /*#__PURE__*/_interopDefault(Z);
|
|
15
17
|
|
|
16
|
-
function A(t){return "code"in t&&"message"in t}var l=class extends Error{type;constructor(e,r){super(e),this.type=r;}},E=async(t,e)=>{try{return await t()}catch(r){let i;throw r instanceof l&&r.type==="SERVICE_UNAVAILABLE_ERROR"?new l(r.message,r.type):(re.isAxiosError(r)&&r.response?.data&&A(r.response.data)?i=r.response.data.message:i=r.message,new l(i,e))}};var C=t=>!!t.imx,b=(r=>(r.OptedIn="opted_in",r.Unsubscribed="unsubscribed",r))(b||{});var I=async t=>E(async()=>{let e=await xClient.generateLegacyStarkPrivateKey(t);return xClient.createStarkSigner(e)},"WALLET_CONNECTION_ERROR");async function v({user:t,starkSigner:e,request:r,exchangesApi:i}){return E(async()=>{let{ethAddress:a}=t.imx,s=r.amount,o=await i.getExchangeSignableTransfer({id:r.transactionID,getSignableTransferRequest:{sender:a,token:toolkit.convertToSignableToken(r),amount:s,receiver:r.receiver}}),u=await e.getAddress(),{payload_hash:n}=o.data,m=await e.signMessage(n),g={sender_stark_key:o.data.sender_stark_key||u,sender_vault_id:o.data.sender_vault_id,receiver_stark_key:o.data.receiver_stark_key,receiver_vault_id:o.data.receiver_vault_id,asset_id:o.data.asset_id,amount:o.data.amount,nonce:o.data.nonce,expiration_timestamp:o.data.expiration_timestamp,stark_signature:m},d={Authorization:`Bearer ${t.accessToken}`},p=await i.createExchangeTransfer({id:r.transactionID,createTransferRequest:g},{headers:d});return {sent_signature:p?.data.sent_signature,status:p?.data.status?.toString(),time:p?.data.time,transfer_id:p?.data.transfer_id}},"EXCHANGE_TRANSFER_ERROR")}var L="ERC721";async function U({starkSigner:t,user:e,request:r,ordersApi:i,guardianClient:a}){return E(async()=>{let{ethAddress:s}=e.imx,o=r.sell.type===L?"1":r.sell.amount,u=r.buy.type===L?"1":r.buy.amount,n={Authorization:`Bearer ${e.accessToken}`},m={user:s,amount_buy:u,token_buy:toolkit.convertToSignableToken(r.buy),amount_sell:o,token_sell:toolkit.convertToSignableToken(r.sell),fees:r.fees,split_fees:!0,expiration_timestamp:r.expiration_timestamp},g=await i.getSignableOrder({getSignableOrderRequestV3:m},{headers:n});await a.evaluateImxTransaction({payloadHash:g.data.payload_hash});let{payload_hash:d}=g.data,p=await t.signMessage(d),R=g.data,f={createOrderRequest:{include_fees:!0,fees:r.fees,stark_signature:p,amount_buy:R.amount_buy,amount_sell:R.amount_sell,asset_id_buy:R.asset_id_buy,asset_id_sell:R.asset_id_sell,expiration_timestamp:R.expiration_timestamp,nonce:R.nonce,stark_key:R.stark_key,vault_id_buy:R.vault_id_buy,vault_id_sell:R.vault_id_sell}};return {...(await i.createOrderV3(f,{headers:n})).data}},"CREATE_ORDER_ERROR")}async function N({user:t,starkSigner:e,request:r,ordersApi:i,guardianClient:a}){return E(async()=>{let s={order_id:r.order_id},o={Authorization:`Bearer ${t.accessToken}`},u=await i.getSignableCancelOrderV3({getSignableCancelOrderRequest:s},{headers:o});await a.evaluateImxTransaction({payloadHash:u.data.payload_hash});let{payload_hash:n}=u.data,m=await e.signMessage(n),g=await i.cancelOrderV3({id:r.order_id.toString(),cancelOrderRequest:{order_id:r.order_id,stark_signature:m}},{headers:o});return {order_id:g.data.order_id,status:g.data.status}},"CANCEL_ORDER_ERROR")}async function O({ethSigner:t,starkSigner:e,imxApiClients:r},i){return E(async()=>{let[a,s]=await Promise.all([t.getAddress(),e.getAddress()]),o=await r.usersApi.getSignableRegistrationOffchain({getSignableRegistrationRequest:{ether_key:a,stark_key:s}}),{signable_message:u,payload_hash:n}=o.data,[m,g]=await Promise.all([toolkit.signRaw(u,t),e.signMessage(n)]);return (await r.usersApi.registerPassportUserV2({authorization:`Bearer ${i}`,registerPassportUserRequest:{eth_signature:m,ether_key:a,stark_signature:g,stark_key:s}})).data},"USER_REGISTRATION_ERROR")}async function M({request:t,tradesApi:e,user:r,starkSigner:i,guardianClient:a}){return E(async()=>{let{ethAddress:s}=r.imx,o={expiration_timestamp:t.expiration_timestamp,fees:t.fees,order_id:t.order_id,user:s},u={Authorization:`Bearer ${r.accessToken}`},n=await e.getSignableTrade({getSignableTradeRequest:o},{headers:u});await a.evaluateImxTransaction({payloadHash:n.data.payload_hash});let{payload_hash:m}=n.data,g=await i.signMessage(m),{data:d}=n,p={createTradeRequest:{include_fees:!0,fees:t?.fees,stark_signature:g,order_id:t?.order_id,fee_info:d.fee_info,amount_buy:d.amount_buy,amount_sell:d.amount_sell,asset_id_buy:d.asset_id_buy,asset_id_sell:d.asset_id_sell,expiration_timestamp:d.expiration_timestamp,nonce:d.nonce,stark_key:d.stark_key,vault_id_buy:d.vault_id_buy,vault_id_sell:d.vault_id_sell}},{data:R}=await e.createTradeV3(p,{headers:u});return R},"CREATE_TRADE_ERROR")}var G="ERC721";async function W({request:t,transfersApi:e,starkSigner:r,user:i,guardianClient:a}){return E(async()=>{let s=t.type===G?"1":t.amount,o={sender:i.imx.ethAddress,token:toolkit.convertToSignableToken(t),amount:s,receiver:t.receiver},u={Authorization:`Bearer ${i.accessToken}`},n=await e.getSignableTransferV1({getSignableTransferRequest:o},{headers:u});await a.evaluateImxTransaction({payloadHash:n.data.payload_hash});let m=n.data,{payload_hash:g}=m,d=await r.signMessage(g),p=await r.getAddress(),f={createTransferRequest:{sender_stark_key:m.sender_stark_key||p,sender_vault_id:m.sender_vault_id,receiver_stark_key:m.receiver_stark_key,receiver_vault_id:m.receiver_vault_id,asset_id:m.asset_id,amount:m.amount,nonce:m.nonce,expiration_timestamp:m.expiration_timestamp,stark_signature:d}},{data:_}=await e.createTransferV1(f,{headers:u});return {sent_signature:_.sent_signature,status:_.status?.toString(),time:_.time,transfer_id:_.transfer_id}},"TRANSFER_ERROR")}async function K({user:t,starkSigner:e,request:r,transfersApi:i,guardianClient:a}){return E(async()=>{let{ethAddress:s}=t.imx,o=r.map(p=>({amount:"1",token:toolkit.convertToSignableToken({type:G,tokenId:p.tokenId,tokenAddress:p.tokenAddress}),receiver:p.receiver})),u={Authorization:`Bearer ${t.accessToken}`},n=await i.getSignableTransfer({getSignableTransferRequestV2:{sender_ether_key:s,signable_requests:o}},{headers:u});await a.evaluateImxTransaction({payloadHash:n.data.signable_responses[0]?.payload_hash});let m=await Promise.all(n.data.signable_responses.map(async p=>{let R=await e.signMessage(p.payload_hash);return {sender_vault_id:p.sender_vault_id,receiver_stark_key:p.receiver_stark_key,receiver_vault_id:p.receiver_vault_id,asset_id:p.asset_id,amount:p.amount,nonce:p.nonce,expiration_timestamp:p.expiration_timestamp,stark_signature:R}})),g={sender_stark_key:n.data.sender_stark_key,requests:m};return {transfer_ids:(await i.createTransfer({createTransferRequestV2:g},{headers:u}))?.data.transfer_ids}},"TRANSFER_ERROR")}async function X(t){await wallet.retryWithDelay(async()=>{let e=await t.forceUserRefresh();return e?.imx?e:Promise.reject(new Error("user wallet addresses not exist"))});}async function x(t,e,r,i,a){return E(async()=>{try{let s=await O({ethSigner:t,starkSigner:e,imxApiClients:a},r.accessToken);return await X(i),s}catch(s){if(re__default.default.isAxiosError(s)&&s.response?.status===409)return await X(i),{tx_hash:""};throw s}},"USER_REGISTRATION_ERROR")}var c=async(t,e,r=!0,i)=>t();var y=class{authManager;immutableXClient;guardianClient;imxApiClients;magicTEESigner;starkSigner;signerInitialisationError;constructor({authManager:e,immutableXClient:r,passportEventEmitter:i,magicTEESigner:a,imxApiClients:s,guardianClient:o}){this.authManager=e,this.immutableXClient=r,this.magicTEESigner=a,this.imxApiClients=s,this.guardianClient=o,this.#i(),i.on("loggedOut",this.handleLogout);}handleLogout=()=>{this.starkSigner=void 0;};#i(){this.starkSigner=new Promise(async e=>{try{e(await I(this.magicTEESigner));}catch(r){this.signerInitialisationError=r,e(void 0);}});}async#r(){let e=await this.authManager.getUser();if(!e||!this.starkSigner)throw new l("User has been logged out","NOT_LOGGED_IN_ERROR");return e}async#t(){let e=await this.starkSigner;if(typeof e>"u")throw typeof this.signerInitialisationError<"u"?this.signerInitialisationError:new Error("Signers failed to initialise");return e}async#e(){let[e,r]=await Promise.all([this.#r(),this.#t()]);if(!C(e))throw new l("User has not been registered with StarkEx","USER_NOT_REGISTERED_ERROR");return {user:e,starkSigner:r}}async transfer(e){return c(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:i}=await this.#e();return W({request:e,user:r,starkSigner:i,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.guardianClient})})())}async registerOffchain(){return c(async()=>{let[e,r]=await Promise.all([this.#r(),this.#t()]);return await x(this.magicTEESigner,r,e,this.authManager,this.imxApiClients)})}async isRegisteredOffchain(){return c(async()=>!!(await this.#r()).imx)}isRegisteredOnchain(){throw new l("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async createOrder(e){return c(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:i}=await this.#e();return U({request:e,user:r,starkSigner:i,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.guardianClient})})())}async cancelOrder(e){return c(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:i}=await this.#e();return N({request:e,user:r,starkSigner:i,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.guardianClient})})())}async createTrade(e){return c(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:i}=await this.#e();return M({request:e,user:r,starkSigner:i,tradesApi:this.immutableXClient.tradesApi,guardianClient:this.guardianClient})})())}async batchNftTransfer(e){return c(()=>this.guardianClient.withConfirmationScreenTask({width:480,height:784})(async()=>{let{user:r,starkSigner:i}=await this.#e();return K({request:e,user:r,starkSigner:i,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.guardianClient})})())}async exchangeTransfer(e){return c(async()=>{let{user:r,starkSigner:i}=await this.#e();return v({request:e,user:r,starkSigner:i,exchangesApi:this.immutableXClient.exchangeApi})})}deposit(e){throw new l("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}prepareWithdrawal(e){throw new l("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}completeWithdrawal(e,r){throw new l("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async getAddress(){return c(async()=>{let e=await this.#r();if(!C(e))throw new l("User has not been registered with StarkEx","USER_NOT_REGISTERED_ERROR");return Promise.resolve(e.imx.ethAddress)})}};var T=class{authManager;immutableXClient;magicTEESigner;passportEventEmitter;imxApiClients;guardianClient;constructor({authManager:e,immutableXClient:r,magicTEESigner:i,passportEventEmitter:a,imxApiClients:s,guardianClient:o}){this.authManager=e,this.immutableXClient=r,this.magicTEESigner=i,this.passportEventEmitter=a,this.imxApiClients=s,this.guardianClient=o;}async getProvider(){let e=await this.authManager.getUserOrLogin();return this.createProviderInstance(e)}async getProviderSilent(){let e=await this.authManager.getUser();return e?this.createProviderInstance(e):null}async createProviderInstance(e){if(!e.idToken)throw new l("Failed to initialise","WALLET_CONNECTION_ERROR");return new y({authManager:this.authManager,immutableXClient:this.immutableXClient,passportEventEmitter:this.passportEventEmitter,magicTEESigner:this.magicTEESigner,imxApiClients:this.imxApiClients,guardianClient:this.guardianClient})}};var q=(t,e,r)=>{let i=e.map(a=>!t[a]&&a).filter(a=>a).join(", ");if(i!==""){let a=r?`${r} - ${i} cannot be null`:`${i} cannot be null`;throw new l(a,"INVALID_CONFIGURATION")}},P=class{authenticationDomain;passportDomain;imxPublicApiDomain;magicPublishableApiKey;magicProviderId;magicTeeBasePath="https://tee.express.magiclabs.com";magicTeeTimeout=1e4;oidcConfiguration;baseConfig;zkEvmRpcUrl;relayerUrl;multiRollupConfig;crossSdkBridgeEnabled;forceScwDeployBeforeMessageSignature;popupOverlayOptions;constructor({baseConfig:e,overrides:r,crossSdkBridgeEnabled:i,jsonRpcReferrer:a,forceScwDeployBeforeMessageSignature:s,popupOverlayOptions:o,...u}){if(q(u,["clientId","redirectUri"]),this.oidcConfiguration=u,this.baseConfig=e,this.crossSdkBridgeEnabled=i||!1,this.forceScwDeployBeforeMessageSignature=s||!1,this.popupOverlayOptions=o||{disableGenericPopupOverlay:!1,disableBlockedPopupOverlay:!1,disableHeadlessLoginPromptOverlay:!1},r)q(r,["authenticationDomain","passportDomain","magicPublishableApiKey","magicProviderId","zkEvmRpcUrl","relayerUrl","imxPublicApiDomain","indexerMrBasePath","orderBookMrBasePath","passportMrBasePath"],"overrides"),this.authenticationDomain=r.authenticationDomain,this.passportDomain=r.passportDomain,this.imxPublicApiDomain=r.imxPublicApiDomain,this.magicPublishableApiKey=r.magicPublishableApiKey,this.magicProviderId=r.magicProviderId,this.zkEvmRpcUrl=r.zkEvmRpcUrl,this.relayerUrl=r.relayerUrl,this.multiRollupConfig={indexer:generatedClients.createConfig({basePath:r.indexerMrBasePath}),orderBook:generatedClients.createConfig({basePath:r.orderBookMrBasePath}),passport:generatedClients.createConfig({basePath:r.passportMrBasePath})};else switch(e.environment){case config.Environment.PRODUCTION:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="aa80b860-8869-4f13-9000-6a6ad3d20017",this.passportDomain="https://passport.immutable.com",this.imxPublicApiDomain="https://api.immutable.com",this.zkEvmRpcUrl="https://rpc.immutable.com",this.relayerUrl="https://api.immutable.com/relayer-mr",this.multiRollupConfig=generatedClients.multiRollupConfig.getProduction();break}case config.Environment.SANDBOX:default:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="aa80b860-8869-4f13-9000-6a6ad3d20017",this.passportDomain="https://passport.sandbox.immutable.com",this.imxPublicApiDomain="https://api.sandbox.immutable.com",this.zkEvmRpcUrl="https://rpc.testnet.immutable.com",this.relayerUrl="https://api.sandbox.immutable.com/relayer-mr",this.multiRollupConfig=generatedClients.multiRollupConfig.getSandbox();break}}}};var ae=(...t)=>{if(typeof process>"u")return;process?.env?.JEST_WORKER_ID===void 0&&console.warn(...t);},F={warn:ae};var Se=t=>t.overrides?generatedClients.createConfig({basePath:t.overrides.imxPublicApiDomain}):t.baseConfig.environment===config.Environment.SANDBOX?generatedClients.imxApiConfig.getSandbox():generatedClients.imxApiConfig.getProduction(),be=t=>{if(t.overrides?.imxApiClients)return t.overrides.imxApiClients;let e=Se(t);return new generatedClients.ImxApiClients(e)},Ie=t=>{let e=new P(t),r=new auth.AuthConfiguration({...t,authenticationDomain:e.authenticationDomain,crossSdkBridgeEnabled:t.crossSdkBridgeEnabled,popupOverlayOptions:t.popupOverlayOptions,passportDomain:e.passportDomain}),i=new auth.EmbeddedLoginPrompt(r),a=new auth.AuthManager(r,i),s=new auth.ConfirmationScreen(r),o=new generatedClients.MagicTeeApiClients({basePath:e.magicTeeBasePath,timeout:e.magicTeeTimeout,magicPublishableApiKey:e.magicPublishableApiKey,magicProviderId:e.magicProviderId}),u=new wallet.MagicTEESigner(a,o),n=new generatedClients.MultiRollupApiClients(e.multiRollupConfig),m=new wallet.WalletConfiguration({baseConfig:t.baseConfig,overrides:t.overrides,jsonRpcReferrer:t.jsonRpcReferrer,forceScwDeployBeforeMessageSignature:t.forceScwDeployBeforeMessageSignature,crossSdkBridgeEnabled:t.crossSdkBridgeEnabled}),g=new wallet.TypedEventEmitter,d=t.overrides?t.overrides.immutableXClient:new xClient.IMXClient({baseConfig:t.baseConfig}),p=new wallet.GuardianClient({confirmationScreen:s,config:m,authManager:a,guardianApi:n.guardianApi}),R=be(t),f=new T({authManager:a,immutableXClient:d,magicTEESigner:u,passportEventEmitter:g,imxApiClients:R,guardianClient:p});return {config:e,authManager:a,authConfig:r,walletConfig:m,magicTEESigner:u,confirmationScreen:s,embeddedLoginPrompt:i,immutableXClient:d,multiRollupApiClients:n,passportEventEmitter:g,passportImxProviderFactory:f,guardianClient:p}},S=class{authManager;walletConfig;confirmationScreen;embeddedLoginPrompt;immutableXClient;magicTEESigner;multiRollupApiClients;passportImxProviderFactory;passportEventEmitter;guardianClient;constructor(e){let r=Ie(e);this.walletConfig=r.walletConfig,this.authManager=r.authManager,this.magicTEESigner=r.magicTEESigner,this.confirmationScreen=r.confirmationScreen,this.embeddedLoginPrompt=r.embeddedLoginPrompt,this.immutableXClient=r.immutableXClient,this.multiRollupApiClients=r.multiRollupApiClients,this.passportEventEmitter=r.passportEventEmitter,this.passportImxProviderFactory=r.passportImxProviderFactory,this.guardianClient=r.guardianClient,metrics.setPassportClientId(e.clientId),metrics.track("passport","initialise");}async connectImxSilent(){return c(()=>this.passportImxProviderFactory.getProviderSilent(),"connectImxSilent",!1)}async connectImx(){return c(()=>this.passportImxProviderFactory.getProvider(),"connectImx",!1)}async connectEvm(e={announceProvider:!0}){return c(async()=>{let r=null;try{r=await this.authManager.getUser();}catch{}let i=new wallet.ZkEvmProvider({passportEventEmitter:this.passportEventEmitter,authManager:this.authManager,config:this.walletConfig,multiRollupApiClients:this.multiRollupApiClients,guardianClient:this.guardianClient,ethSigner:this.magicTEESigner,user:r});return e?.announceProvider&&wallet.announceProvider({info:wallet.passportProviderInfo,provider:i}),i},"connectEvm",!1)}async login(e){return c(async()=>{let{useCachedSession:r=!1,useSilentLogin:i}=e||{},a=null;try{a=await this.authManager.getUser();}catch(s){if(s instanceof Error&&!s.message.includes("Unknown or invalid refresh token")&&metrics.trackError("passport","login",s),r)throw s;F.warn("Failed to retrieve a cached user session",s);}if(!a&&i)a=await this.authManager.forceUserRefresh();else if(!a&&!r){let s=e?.directLoginOptions?{directLoginMethod:e.directLoginOptions.directLoginMethod,email:e.directLoginOptions.email,marketingConsentStatus:e.directLoginOptions.marketingConsentStatus}:void 0;e?.useRedirectFlow?await this.authManager.loginWithRedirect(e?.anonymousId,s):a=await this.authManager.login(e?.anonymousId,s);}return a&&(metrics.identify({passportId:a.profile.sub}),this.passportEventEmitter.emit("loggedIn",a)),a?a.profile:null},"login",!1)}async loginCallback(){await c(()=>this.authManager.loginCallback(),"loginCallback",!1).then(e=>{e&&(metrics.identify({passportId:e.profile.sub}),this.passportEventEmitter.emit("loggedIn",e));});}async loginWithPKCEFlow(e,r){return c(async()=>await this.authManager.getPKCEAuthorizationUrl(e,r),"loginWithPKCEFlow",!1)}async loginWithPKCEFlowCallback(e,r){return c(async()=>{let i=await this.authManager.loginWithPKCEFlowCallback(e,r);return this.passportEventEmitter.emit("loggedIn",i),i.profile},"loginWithPKCEFlowCallback",!1)}async storeTokens(e){return c(async()=>{let r=await this.authManager.storeTokens(e);return this.passportEventEmitter.emit("loggedIn",r),r.profile},"storeTokens",!1)}async logout(){return c(async()=>{await this.authManager.logout(),this.passportEventEmitter.emit("loggedOut");},"logout",!1)}async getLogoutUrl(){return c(async()=>(await this.authManager.removeUser(),this.passportEventEmitter.emit("loggedOut"),await this.authManager.getLogoutUrl()||void 0),"getLogoutUrl",!1)}async logoutSilentCallback(e){return c(()=>this.authManager.logoutSilentCallback(e),"logoutSilentCallback",!1)}async getUserInfo(){return c(async()=>(await this.authManager.getUser())?.profile,"getUserInfo",!1)}async getIdToken(){return c(async()=>(await this.authManager.getUser())?.idToken,"getIdToken",!1)}async getAccessToken(){return c(async()=>(await this.authManager.getUser())?.accessToken,"getAccessToken",!1)}async getLinkedAddresses(){return c(async()=>{let e=await this.authManager.getUser();if(!e?.profile.sub)return [];let r={Authorization:`Bearer ${e.accessToken}`},{data:i}=await this.multiRollupApiClients.passportProfileApi.getUserInfo({headers:r});return i.linked_addresses},"getLinkedAddresses",!1)}async linkExternalWallet(e){let r=metrics.trackFlow("passport","linkExternalWallet"),i=await this.authManager.getUser();if(!i)throw new l("User is not logged in","NOT_LOGGED_IN_ERROR");let a=auth.isUserImx(i),s=auth.isUserZkEvm(i);if(!a&&!s)throw new l("User has not been registered","USER_NOT_REGISTERED_ERROR");let o={Authorization:`Bearer ${i.accessToken}`},u={type:e.type,wallet_address:e.walletAddress,signature:e.signature,nonce:e.nonce};try{return {...(await this.multiRollupApiClients.passportProfileApi.linkWalletV2({linkWalletV2Request:u},{headers:o})).data}}catch(n){if(n instanceof Error?metrics.trackError("passport","linkExternalWallet",n):r.addEvent("errored"),re.isAxiosError(n)&&n.response){if(n.response.data&&A(n.response.data)){let{code:g,message:d}=n.response.data;switch(g){case"ALREADY_LINKED":throw new l(d,"LINK_WALLET_ALREADY_LINKED_ERROR");case"MAX_WALLETS_LINKED":throw new l(d,"LINK_WALLET_MAX_WALLETS_LINKED_ERROR");case"DUPLICATE_NONCE":throw new l(d,"LINK_WALLET_DUPLICATE_NONCE_ERROR");case"VALIDATION_ERROR":throw new l(d,"LINK_WALLET_VALIDATION_ERROR");default:throw new l(d,"LINK_WALLET_GENERIC_ERROR")}}else if(n.response.status)throw new l(`Link wallet request failed with status code ${n.response.status}`,"LINK_WALLET_GENERIC_ERROR")}let m="Link wallet request failed";throw n instanceof Error&&(m+=`: ${n.message}`),new l(m,"LINK_WALLET_GENERIC_ERROR")}finally{r.addEvent("End");}}};
|
|
18
|
+
function H(i){return "code"in i&&"message"in i}var o=class extends Error{type;constructor(e,r){super(e),this.type=r;}},R=async(i,e)=>{try{return await i()}catch(r){let t;throw r instanceof o&&r.type==="SERVICE_UNAVAILABLE_ERROR"?new o(r.message,r.type):(te.isAxiosError(r)&&r.response?.data&&H(r.response.data)?t=r.response.data.message:t=r.message,new o(t,e))}};var E=i=>{if(!i.idToken)throw new o("User has been logged out","NOT_LOGGED_IN_ERROR");let r=Z__default.default(i.idToken).passport;if(!r?.imx_eth_address||!r?.imx_stark_address||!r?.imx_user_admin_address)throw new o("User has not been registered with StarkEx","USER_NOT_REGISTERED_ERROR");return {...i,imx:{ethAddress:r.imx_eth_address,starkAddress:r.imx_stark_address,userAdminAddress:r.imx_user_admin_address}}};var b=async i=>R(async()=>{let e=await xClient.generateLegacyStarkPrivateKey(i);return xClient.createStarkSigner(e)},"WALLET_CONNECTION_ERROR");async function k({user:i,starkSigner:e,request:r,exchangesApi:t}){return R(async()=>{let{ethAddress:a}=i.imx,s=r.amount,l=await t.getExchangeSignableTransfer({id:r.transactionID,getSignableTransferRequest:{sender:a,token:toolkit.convertToSignableToken(r),amount:s,receiver:r.receiver}}),n=await e.getAddress(),{payload_hash:m}=l.data,p=await e.signMessage(m),c={sender_stark_key:l.data.sender_stark_key||n,sender_vault_id:l.data.sender_vault_id,receiver_stark_key:l.data.receiver_stark_key,receiver_vault_id:l.data.receiver_vault_id,asset_id:l.data.asset_id,amount:l.data.amount,nonce:l.data.nonce,expiration_timestamp:l.data.expiration_timestamp,stark_signature:p},u={Authorization:`Bearer ${i.accessToken}`},d=await t.createExchangeTransfer({id:r.transactionID,createTransferRequest:c},{headers:u});return {sent_signature:d?.data.sent_signature,status:d?.data.status?.toString(),time:d?.data.time,transfer_id:d?.data.transfer_id}},"EXCHANGE_TRANSFER_ERROR")}var w="ERC721";async function U({starkSigner:i,user:e,request:r,ordersApi:t,guardianClient:a}){return R(async()=>{let{ethAddress:s}=e.imx,l=r.sell.type===w?"1":r.sell.amount,n=r.buy.type===w?"1":r.buy.amount,m={Authorization:`Bearer ${e.accessToken}`},p={user:s,amount_buy:n,token_buy:toolkit.convertToSignableToken(r.buy),amount_sell:l,token_sell:toolkit.convertToSignableToken(r.sell),fees:r.fees,split_fees:!0,expiration_timestamp:r.expiration_timestamp},c=await t.getSignableOrder({getSignableOrderRequestV3:p},{headers:m});await a.evaluateTransaction(c.data.payload_hash);let{payload_hash:u}=c.data,d=await i.signMessage(u),g=c.data,_={createOrderRequest:{include_fees:!0,fees:r.fees,stark_signature:d,amount_buy:g.amount_buy,amount_sell:g.amount_sell,asset_id_buy:g.asset_id_buy,asset_id_sell:g.asset_id_sell,expiration_timestamp:g.expiration_timestamp,nonce:g.nonce,stark_key:g.stark_key,vault_id_buy:g.vault_id_buy,vault_id_sell:g.vault_id_sell}};return {...(await t.createOrderV3(_,{headers:m})).data}},"CREATE_ORDER_ERROR")}async function L({user:i,starkSigner:e,request:r,ordersApi:t,guardianClient:a}){return R(async()=>{let s={order_id:r.order_id},l={Authorization:`Bearer ${i.accessToken}`},n=await t.getSignableCancelOrderV3({getSignableCancelOrderRequest:s},{headers:l});await a.evaluateTransaction(n.data.payload_hash);let{payload_hash:m}=n.data,p=await e.signMessage(m),c=await t.cancelOrderV3({id:r.order_id.toString(),cancelOrderRequest:{order_id:r.order_id,stark_signature:p}},{headers:l});return {order_id:c.data.order_id,status:c.data.status}},"CANCEL_ORDER_ERROR")}async function P({ethSigner:i,starkSigner:e,imxApiClients:r},t){return R(async()=>{let[a,s]=await Promise.all([i.getAddress(),e.getAddress()]),l=await r.usersApi.getSignableRegistrationOffchain({getSignableRegistrationRequest:{ether_key:a,stark_key:s}}),{signable_message:n,payload_hash:m}=l.data,[p,c]=await Promise.all([toolkit.signRaw(n,i),e.signMessage(m)]);return (await r.usersApi.registerPassportUserV2({authorization:`Bearer ${t}`,registerPassportUserRequest:{eth_signature:p,ether_key:a,stark_signature:c,stark_key:s}})).data},"USER_REGISTRATION_ERROR")}async function N({request:i,tradesApi:e,user:r,starkSigner:t,guardianClient:a}){return R(async()=>{let{ethAddress:s}=r.imx,l={expiration_timestamp:i.expiration_timestamp,fees:i.fees,order_id:i.order_id,user:s},n={Authorization:`Bearer ${r.accessToken}`},m=await e.getSignableTrade({getSignableTradeRequest:l},{headers:n});await a.evaluateTransaction(m.data.payload_hash);let{payload_hash:p}=m.data,c=await t.signMessage(p),{data:u}=m,d={createTradeRequest:{include_fees:!0,fees:i?.fees,stark_signature:c,order_id:i?.order_id,fee_info:u.fee_info,amount_buy:u.amount_buy,amount_sell:u.amount_sell,asset_id_buy:u.asset_id_buy,asset_id_sell:u.asset_id_sell,expiration_timestamp:u.expiration_timestamp,nonce:u.nonce,stark_key:u.stark_key,vault_id_buy:u.vault_id_buy,vault_id_sell:u.vault_id_sell}},{data:g}=await e.createTradeV3(d,{headers:n});return g},"CREATE_TRADE_ERROR")}var M="ERC721";async function G({request:i,transfersApi:e,starkSigner:r,user:t,guardianClient:a}){return R(async()=>{let s=i.type===M?"1":i.amount,l={sender:t.imx.ethAddress,token:toolkit.convertToSignableToken(i),amount:s,receiver:i.receiver},n={Authorization:`Bearer ${t.accessToken}`},m=await e.getSignableTransferV1({getSignableTransferRequest:l},{headers:n});await a.evaluateTransaction(m.data.payload_hash);let p=m.data,{payload_hash:c}=p,u=await r.signMessage(c),d=await r.getAddress(),_={createTransferRequest:{sender_stark_key:p.sender_stark_key||d,sender_vault_id:p.sender_vault_id,receiver_stark_key:p.receiver_stark_key,receiver_vault_id:p.receiver_vault_id,asset_id:p.asset_id,amount:p.amount,nonce:p.nonce,expiration_timestamp:p.expiration_timestamp,stark_signature:u}},{data:C}=await e.createTransferV1(_,{headers:n});return {sent_signature:C.sent_signature,status:C.status?.toString(),time:C.time,transfer_id:C.transfer_id}},"TRANSFER_ERROR")}async function B({user:i,starkSigner:e,request:r,transfersApi:t,guardianClient:a}){return R(async()=>{let{ethAddress:s}=i.imx,l=r.map(d=>({amount:"1",token:toolkit.convertToSignableToken({type:M,tokenId:d.tokenId,tokenAddress:d.tokenAddress}),receiver:d.receiver})),n={Authorization:`Bearer ${i.accessToken}`},m=await t.getSignableTransfer({getSignableTransferRequestV2:{sender_ether_key:s,signable_requests:l}},{headers:n});await a.evaluateTransaction(m.data.signable_responses[0]?.payload_hash);let p=await Promise.all(m.data.signable_responses.map(async d=>{let g=await e.signMessage(d.payload_hash);return {sender_vault_id:d.sender_vault_id,receiver_stark_key:d.receiver_stark_key,receiver_vault_id:d.receiver_vault_id,asset_id:d.asset_id,amount:d.amount,nonce:d.nonce,expiration_timestamp:d.expiration_timestamp,stark_signature:g}})),c={sender_stark_key:m.data.sender_stark_key,requests:p};return {transfer_ids:(await t.createTransfer({createTransferRequestV2:c},{headers:n}))?.data.transfer_ids}},"TRANSFER_ERROR")}async function W(i){await wallet.retryWithDelay(async()=>{let e=await i.forceUserRefresh();if(!e)return Promise.reject(new Error("user wallet addresses not exist"));try{return E(e),e}catch{return Promise.reject(new Error("user wallet addresses not exist"))}});}async function O(i,e,r,t,a){return R(async()=>{try{let s=await P({ethSigner:i,starkSigner:e,imxApiClients:a},r.accessToken);return await W(t),s}catch(s){if(te__default.default.isAxiosError(s)&&s.response?.status===409)return await W(t),{tx_hash:""};throw s}},"USER_REGISTRATION_ERROR")}var h=async(i,e,r=!0,t=!0)=>{let a=metrics.trackFlow("passport",e,r);try{return await i(a)}catch(s){throw s instanceof Error?metrics.trackError("passport",e,s,{flowId:a.details.flowId}):a.addEvent("errored"),s}finally{t&&a.addEvent("End");}};var y=class{authManager;immutableXClient;guardianClient;imxApiClients;magicTEESigner;imxGuardianClient;starkSigner;signerInitialisationError;constructor({authManager:e,immutableXClient:r,passportEventEmitter:t,magicTEESigner:a,imxApiClients:s,guardianClient:l,imxGuardianClient:n}){this.authManager=e,this.immutableXClient=r,this.magicTEESigner=a,this.imxApiClients=s,this.guardianClient=l,this.imxGuardianClient=n,this.#i(),t.on(auth.AuthEvents.LOGGED_OUT,this.handleLogout);}handleLogout=()=>{this.starkSigner=void 0;};#i(){this.starkSigner=new Promise(async e=>{try{e(await b(this.magicTEESigner));}catch(r){this.signerInitialisationError=r,e(void 0);}});}async#r(){let e=await this.authManager.getUser();if(!e||!this.starkSigner)throw new o("User has been logged out","NOT_LOGGED_IN_ERROR");return e}async#t(){let e=await this.starkSigner;if(typeof e>"u")throw typeof this.signerInitialisationError<"u"?this.signerInitialisationError:new Error("Signers failed to initialise");return e}async#e(){let[e,r]=await Promise.all([this.#r(),this.#t()]);return {user:E(e),starkSigner:r}}async transfer(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:t}=await this.#e();return G({request:e,user:r,starkSigner:t,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.imxGuardianClient})})(),"imxTransfer")}async registerOffchain(){return h(async()=>{let[e,r]=await Promise.all([this.#r(),this.#t()]);return await O(this.magicTEESigner,r,E(e),this.authManager,this.imxApiClients)},"imxRegisterOffchain")}async isRegisteredOffchain(){return h(async()=>{try{let e=await this.#r();return !!E(e).imx}catch(e){if(e instanceof o&&e.type==="USER_NOT_REGISTERED_ERROR")return !1;throw e}},"imxIsRegisteredOffchain")}isRegisteredOnchain(){throw new o("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async createOrder(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:t}=await this.#e();return U({request:e,user:r,starkSigner:t,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.imxGuardianClient})})(),"imxCreateOrder")}async cancelOrder(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:t}=await this.#e();return L({request:e,user:r,starkSigner:t,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.imxGuardianClient})})(),"imxCancelOrder")}async createTrade(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:t}=await this.#e();return N({request:e,user:r,starkSigner:t,tradesApi:this.immutableXClient.tradesApi,guardianClient:this.imxGuardianClient})})(),"imxCreateTrade")}async batchNftTransfer(e){return h(()=>this.guardianClient.withConfirmationScreenTask({width:480,height:784})(async()=>{let{user:r,starkSigner:t}=await this.#e();return B({request:e,user:r,starkSigner:t,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.imxGuardianClient})})(),"imxBatchNftTransfer")}async exchangeTransfer(e){return h(async()=>{let{user:r,starkSigner:t}=await this.#e();return k({request:e,user:r,starkSigner:t,exchangesApi:this.immutableXClient.exchangeApi})},"imxExchangeTransfer")}deposit(e){throw new o("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}prepareWithdrawal(e){throw new o("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}completeWithdrawal(e,r){throw new o("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async getAddress(){return h(async()=>{let e=await this.#r(),r=E(e);return Promise.resolve(r.imx.ethAddress)},"imxGetAddress")}};var A=class{authManager;immutableXClient;magicTEESigner;passportEventEmitter;imxApiClients;guardianClient;imxGuardianClient;constructor({authManager:e,immutableXClient:r,magicTEESigner:t,passportEventEmitter:a,imxApiClients:s,guardianClient:l,imxGuardianClient:n}){this.authManager=e,this.immutableXClient=r,this.magicTEESigner=t,this.passportEventEmitter=a,this.imxApiClients=s,this.guardianClient=l,this.imxGuardianClient=n;}async getProvider(){let e=await this.authManager.getUserOrLogin();return this.createProviderInstance(e)}async getProviderSilent(){let e=await this.authManager.getUser();return e?this.createProviderInstance(e):null}async createProviderInstance(e){if(!e.idToken)throw new o("Failed to initialise","WALLET_CONNECTION_ERROR");return new y({authManager:this.authManager,immutableXClient:this.immutableXClient,passportEventEmitter:this.passportEventEmitter,magicTEESigner:this.magicTEESigner,imxApiClients:this.imxApiClients,guardianClient:this.guardianClient,imxGuardianClient:this.imxGuardianClient})}};var F=(i,e,r)=>{let t=e.map(a=>!i[a]&&a).filter(a=>a).join(", ");if(t!==""){let a=r?`${r} - ${t} cannot be null`:`${t} cannot be null`;throw new o(a,"INVALID_CONFIGURATION")}},x=class{authenticationDomain;passportDomain;imxPublicApiDomain;magicPublishableApiKey;magicProviderId;magicTeeBasePath="https://tee.express.magiclabs.com";magicTeeTimeout=1e4;oidcConfiguration;baseConfig;zkEvmRpcUrl;relayerUrl;multiRollupConfig;crossSdkBridgeEnabled;forceScwDeployBeforeMessageSignature;jsonRpcReferrer;popupOverlayOptions;overrides;constructor({baseConfig:e,overrides:r,crossSdkBridgeEnabled:t,jsonRpcReferrer:a,forceScwDeployBeforeMessageSignature:s,popupOverlayOptions:l,...n}){if(F(n,["clientId","redirectUri"]),this.oidcConfiguration=n,this.baseConfig=e,this.overrides=r,this.crossSdkBridgeEnabled=t||!1,this.forceScwDeployBeforeMessageSignature=s||!1,this.jsonRpcReferrer=a,this.popupOverlayOptions=l||{disableGenericPopupOverlay:!1,disableBlockedPopupOverlay:!1,disableHeadlessLoginPromptOverlay:!1},r)F(r,["authenticationDomain","passportDomain","magicPublishableApiKey","magicProviderId","zkEvmRpcUrl","relayerUrl","imxPublicApiDomain","indexerMrBasePath","orderBookMrBasePath","passportMrBasePath"],"overrides"),this.authenticationDomain=r.authenticationDomain,this.passportDomain=r.passportDomain,this.imxPublicApiDomain=r.imxPublicApiDomain,this.magicPublishableApiKey=r.magicPublishableApiKey,this.magicProviderId=r.magicProviderId,this.zkEvmRpcUrl=r.zkEvmRpcUrl,this.relayerUrl=r.relayerUrl,this.multiRollupConfig={indexer:generatedClients.createConfig({basePath:r.indexerMrBasePath}),orderBook:generatedClients.createConfig({basePath:r.orderBookMrBasePath}),passport:generatedClients.createConfig({basePath:r.passportMrBasePath})};else switch(e.environment){case config.Environment.PRODUCTION:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="aa80b860-8869-4f13-9000-6a6ad3d20017",this.passportDomain="https://passport.immutable.com",this.imxPublicApiDomain="https://api.immutable.com",this.zkEvmRpcUrl="https://rpc.immutable.com",this.relayerUrl="https://api.immutable.com/relayer-mr",this.multiRollupConfig=generatedClients.multiRollupConfig.getProduction();break}case config.Environment.SANDBOX:default:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="aa80b860-8869-4f13-9000-6a6ad3d20017",this.passportDomain="https://passport.sandbox.immutable.com",this.imxPublicApiDomain="https://api.sandbox.immutable.com",this.zkEvmRpcUrl="https://rpc.testnet.immutable.com",this.relayerUrl="https://api.sandbox.immutable.com/relayer-mr",this.multiRollupConfig=generatedClients.multiRollupConfig.getSandbox();break}}}};var pe="Transaction requires confirmation but this functionality is not supported in this environment. Please contact Immutable support if you need to enable this feature.",T=class{authManager;guardianApi;confirmationScreen;crossSdkBridgeEnabled;constructor({authManager:e,guardianApi:r,confirmationScreen:t,crossSdkBridgeEnabled:a=!1}){this.authManager=e,this.guardianApi=r,this.confirmationScreen=t,this.crossSdkBridgeEnabled=a;}async evaluateTransaction(e){let r=await this.authManager.getUser();if(!r)throw new o("User has been logged out","NOT_LOGGED_IN_ERROR");let t=E(r),a={Authorization:`Bearer ${t.accessToken}`};try{if(!(await wallet.retryWithDelay(async()=>this.guardianApi.getTransactionByID({transactionID:e,chainType:"starkex"},{headers:a}),{finallyFn:()=>{this.confirmationScreen.closeWindow();}})).data.id)throw new o("Transaction does not exist","TRANSFER_ERROR");let n=await this.guardianApi.evaluateTransaction({id:e,transactionEvaluationRequest:{chainType:"starkex"}},{headers:a}),{confirmationRequired:m}=n.data;if(m){if(this.crossSdkBridgeEnabled)throw new o(pe,"TRANSACTION_REJECTED");if(!(await this.confirmationScreen.requestConfirmation(e,t.imx.ethAddress,generatedClients.mr.TransactionApprovalRequestChainTypeEnum.Starkex)).confirmed)throw new o("Transaction rejected by user","TRANSACTION_REJECTED")}else this.confirmationScreen.closeWindow();}catch(s){throw te__default.default.isAxiosError(s)&&s.response?.status===403?new o("Service unavailable","SERVICE_UNAVAILABLE_ERROR"):s}}};var Oe=i=>i.overrides?generatedClients.createConfig({basePath:i.overrides.imxPublicApiDomain}):i.baseConfig.environment===config.Environment.SANDBOX?generatedClients.imxApiConfig.getSandbox():generatedClients.imxApiConfig.getProduction(),Ie=i=>{if(i.overrides?.imxApiClients)return i.overrides.imxApiClients;let e=Oe(i);return new generatedClients.ImxApiClients(e)},Se=i=>{let e=new x(i),r=new auth.Auth({...i,authenticationDomain:e.authenticationDomain,crossSdkBridgeEnabled:i.crossSdkBridgeEnabled,popupOverlayOptions:i.popupOverlayOptions,passportDomain:e.passportDomain}),t=r.getAuthManager(),a=r.getConfig(),s=new wallet.ConfirmationScreen(a),l=new wallet.WalletConfiguration({passportDomain:e.passportDomain,zkEvmRpcUrl:e.zkEvmRpcUrl,relayerUrl:e.relayerUrl,indexerMrBasePath:e.multiRollupConfig.indexer.basePath||e.passportDomain,jsonRpcReferrer:i.jsonRpcReferrer,forceScwDeployBeforeMessageSignature:i.forceScwDeployBeforeMessageSignature,crossSdkBridgeEnabled:i.crossSdkBridgeEnabled}),n=new generatedClients.MultiRollupApiClients(e.multiRollupConfig),m=i.overrides?i.overrides.immutableXClient:new xClient.IMXClient({baseConfig:i.baseConfig}),p=new wallet.GuardianClient({config:l,authManager:t,guardianApi:n.guardianApi,authConfig:a}),c=new T({authManager:t,guardianApi:n.guardianApi,confirmationScreen:s,crossSdkBridgeEnabled:i.crossSdkBridgeEnabled||!1}),u=new generatedClients.MagicTeeApiClients({basePath:e.magicTeeBasePath,timeout:e.magicTeeTimeout,magicPublishableApiKey:e.magicPublishableApiKey,magicProviderId:e.magicProviderId}),d=new wallet.MagicTEESigner(t,u),g=Ie(i),_=new A({authManager:t,immutableXClient:m,magicTEESigner:d,passportEventEmitter:r.eventEmitter,imxApiClients:g,guardianClient:p,imxGuardianClient:c});return {passportConfig:e,auth:r,passportImxProviderFactory:_,environment:i.baseConfig.environment,walletConfig:l}},S=class{auth;passportImxProviderFactory;multiRollupApiClients;environment;passportConfig;constructor(e){let r=Se(e);this.auth=r.auth,this.passportImxProviderFactory=r.passportImxProviderFactory,this.passportConfig=r.passportConfig,this.multiRollupApiClients=new generatedClients.MultiRollupApiClients(this.passportConfig.multiRollupConfig),this.environment=r.environment,metrics.setPassportClientId(e.clientId);}async connectImxSilent(){return h(()=>this.passportImxProviderFactory.getProviderSilent(),"connectImxSilent",!1)}async connectImx(){return h(()=>this.passportImxProviderFactory.getProvider(),"connectImx",!1)}async connectEvm(e={announceProvider:!0}){return h(async()=>{let r=this.passportConfig.overrides,t;return r?.zkEvmChainId?t={chainId:r.zkEvmChainId,name:r.zkEvmChainName||"Dev Chain",rpcUrl:this.passportConfig.zkEvmRpcUrl,relayerUrl:this.passportConfig.relayerUrl,apiUrl:this.passportConfig.multiRollupConfig.indexer.basePath||this.passportConfig.passportDomain,passportDomain:this.passportConfig.passportDomain,magicPublishableApiKey:this.passportConfig.magicPublishableApiKey,magicProviderId:this.passportConfig.magicProviderId,magicTeeBasePath:r.magicTeeBasePath||this.passportConfig.magicTeeBasePath}:this.environment===config.Environment.PRODUCTION?t={chainId:13371,name:"Immutable zkEVM",rpcUrl:this.passportConfig.zkEvmRpcUrl,relayerUrl:this.passportConfig.relayerUrl,apiUrl:this.passportConfig.multiRollupConfig.indexer.basePath||this.passportConfig.passportDomain,passportDomain:this.passportConfig.passportDomain,magicPublishableApiKey:this.passportConfig.magicPublishableApiKey,magicProviderId:this.passportConfig.magicProviderId,magicTeeBasePath:this.passportConfig.magicTeeBasePath}:t={chainId:13473,name:"Immutable zkEVM Testnet",rpcUrl:this.passportConfig.zkEvmRpcUrl,relayerUrl:this.passportConfig.relayerUrl,apiUrl:this.passportConfig.multiRollupConfig.indexer.basePath||this.passportConfig.passportDomain,passportDomain:this.passportConfig.passportDomain,magicPublishableApiKey:this.passportConfig.magicPublishableApiKey,magicProviderId:this.passportConfig.magicProviderId,magicTeeBasePath:this.passportConfig.magicTeeBasePath},await wallet.connectWallet({auth:this.auth,chains:[t],crossSdkBridgeEnabled:this.passportConfig.crossSdkBridgeEnabled,jsonRpcReferrer:this.passportConfig.jsonRpcReferrer,forceScwDeployBeforeMessageSignature:this.passportConfig.forceScwDeployBeforeMessageSignature,passportEventEmitter:this.auth.eventEmitter,announceProvider:e?.announceProvider??!0})},"connectEvm",!1)}async login(e){let r=e?{useCachedSession:e.useCachedSession,useSilentLogin:e.useSilentLogin,useRedirectFlow:e.useRedirectFlow,directLoginOptions:e.directLoginOptions}:void 0,t=await this.auth.login(r);return t?t.profile:null}async loginCallback(){await this.auth.loginCallback();}async logout(){await this.auth.logout();}async getUserInfo(){return (await this.auth.getUser())?.profile}async getIdToken(){return (await this.auth.getUser())?.idToken}async getAccessToken(){return (await this.auth.getUser())?.accessToken}async loginWithPKCEFlow(e,r){return this.auth.loginWithPKCEFlow(e,r)}async loginWithPKCEFlowCallback(e,r){return (await this.auth.loginWithPKCEFlowCallback(e,r)).profile}async storeTokens(e){return (await this.auth.storeTokens(e)).profile}async getLogoutUrl(){return await this.auth.getLogoutUrl()}async logoutSilentCallback(e){return this.auth.logoutSilentCallback(e)}async getLinkedAddresses(){return h(async()=>{let e=await this.auth.getUser();if(!e?.profile.sub)return [];let r={Authorization:`Bearer ${e.accessToken}`};return (await this.multiRollupApiClients.passportProfileApi.getUserInfo({headers:r})).data.linked_addresses},"getLinkedAddresses",!1)}async linkExternalWallet(e){let r=a=>typeof a=="object"&&a!==null&&"code"in a&&"message"in a,t=metrics.trackFlow("passport","linkExternalWallet",!1);try{let a=await this.auth.getUser();if(!a)throw new o("User is not logged in","NOT_LOGGED_IN_ERROR");let s=auth.isUserZkEvm(a);if(!(()=>{try{return E(a),!0}catch(c){if(c instanceof o&&c.type==="USER_NOT_REGISTERED_ERROR")return !1;throw c}})()&&!s)throw new o("User has not been registered","USER_NOT_REGISTERED_ERROR");let n={Authorization:`Bearer ${a.accessToken}`},m={type:e.type,wallet_address:e.walletAddress,signature:e.signature,nonce:e.nonce};return {...(await this.multiRollupApiClients.passportProfileApi.linkWalletV2({linkWalletV2Request:m},{headers:n})).data}}catch(a){if(a instanceof Error?metrics.trackError("passport","linkExternalWallet",a):t.addEvent("errored"),te.isAxiosError(a)&&a.response){if(a.response.data&&r(a.response.data)){let{code:l,message:n}=a.response.data;switch(l){case"ALREADY_LINKED":throw new o(n,"LINK_WALLET_ALREADY_LINKED_ERROR");case"MAX_WALLETS_LINKED":throw new o(n,"LINK_WALLET_MAX_WALLETS_LINKED_ERROR");case"DUPLICATE_NONCE":throw new o(n,"LINK_WALLET_DUPLICATE_NONCE_ERROR");case"VALIDATION_ERROR":throw new o(n,"LINK_WALLET_VALIDATION_ERROR");default:throw new o(n,"LINK_WALLET_GENERIC_ERROR")}}else if(a.response.status)throw new o(`Link wallet request failed with status code ${a.response.status}`,"LINK_WALLET_GENERIC_ERROR")}let s="Link wallet request failed";throw a instanceof Error&&(s+=`: ${a.message}`),new o(s,"LINK_WALLET_GENERIC_ERROR")}finally{t.addEvent("End");}}};var $=(r=>(r.OptedIn="opted_in",r.Unsubscribed="unsubscribed",r))($||{});
|
|
17
19
|
|
|
18
20
|
Object.defineProperty(exports, "JsonRpcError", {
|
|
19
21
|
enumerable: true,
|
|
@@ -31,6 +33,6 @@ Object.defineProperty(exports, "RpcErrorCode", {
|
|
|
31
33
|
enumerable: true,
|
|
32
34
|
get: function () { return wallet.RpcErrorCode; }
|
|
33
35
|
});
|
|
34
|
-
exports.MarketingConsentStatus =
|
|
36
|
+
exports.MarketingConsentStatus = $;
|
|
35
37
|
exports.Passport = S;
|
|
36
|
-
exports.PassportError =
|
|
38
|
+
exports.PassportError = o;
|
package/dist/node/index.js
CHANGED
|
@@ -1,13 +1,14 @@
|
|
|
1
|
-
import
|
|
2
|
-
import {
|
|
1
|
+
import te, { isAxiosError } from 'axios';
|
|
2
|
+
import { MultiRollupApiClients, MagicTeeApiClients, createConfig, multiRollupConfig, mr, ImxApiClients, imxApiConfig } from '@imtbl/generated-clients';
|
|
3
3
|
import { IMXClient, generateLegacyStarkPrivateKey, createStarkSigner } from '@imtbl/x-client';
|
|
4
4
|
import { Environment } from '@imtbl/config';
|
|
5
|
-
import { setPassportClientId,
|
|
6
|
-
import {
|
|
7
|
-
import {
|
|
5
|
+
import { setPassportClientId, trackFlow, trackError } from '@imtbl/metrics';
|
|
6
|
+
import { isUserZkEvm, Auth, AuthEvents } from '@imtbl/auth';
|
|
7
|
+
import { ConfirmationScreen, WalletConfiguration, GuardianClient, MagicTEESigner, connectWallet, retryWithDelay } from '@imtbl/wallet';
|
|
8
8
|
export { JsonRpcError, ProviderErrorCode, ProviderEvent, RpcErrorCode } from '@imtbl/wallet';
|
|
9
|
+
import Z from 'jwt-decode';
|
|
9
10
|
import { convertToSignableToken, signRaw } from '@imtbl/toolkit';
|
|
10
11
|
|
|
11
|
-
function A(t){return "code"in t&&"message"in t}var l=class extends Error{type;constructor(e,r){super(e),this.type=r;}},E=async(t,e)=>{try{return await t()}catch(r){let i;throw r instanceof l&&r.type==="SERVICE_UNAVAILABLE_ERROR"?new l(r.message,r.type):(isAxiosError(r)&&r.response?.data&&A(r.response.data)?i=r.response.data.message:i=r.message,new l(i,e))}};var C=t=>!!t.imx,b=(r=>(r.OptedIn="opted_in",r.Unsubscribed="unsubscribed",r))(b||{});var I=async t=>E(async()=>{let e=await generateLegacyStarkPrivateKey(t);return createStarkSigner(e)},"WALLET_CONNECTION_ERROR");async function v({user:t,starkSigner:e,request:r,exchangesApi:i}){return E(async()=>{let{ethAddress:a}=t.imx,s=r.amount,o=await i.getExchangeSignableTransfer({id:r.transactionID,getSignableTransferRequest:{sender:a,token:convertToSignableToken(r),amount:s,receiver:r.receiver}}),u=await e.getAddress(),{payload_hash:n}=o.data,m=await e.signMessage(n),g={sender_stark_key:o.data.sender_stark_key||u,sender_vault_id:o.data.sender_vault_id,receiver_stark_key:o.data.receiver_stark_key,receiver_vault_id:o.data.receiver_vault_id,asset_id:o.data.asset_id,amount:o.data.amount,nonce:o.data.nonce,expiration_timestamp:o.data.expiration_timestamp,stark_signature:m},d={Authorization:`Bearer ${t.accessToken}`},p=await i.createExchangeTransfer({id:r.transactionID,createTransferRequest:g},{headers:d});return {sent_signature:p?.data.sent_signature,status:p?.data.status?.toString(),time:p?.data.time,transfer_id:p?.data.transfer_id}},"EXCHANGE_TRANSFER_ERROR")}var L="ERC721";async function U({starkSigner:t,user:e,request:r,ordersApi:i,guardianClient:a}){return E(async()=>{let{ethAddress:s}=e.imx,o=r.sell.type===L?"1":r.sell.amount,u=r.buy.type===L?"1":r.buy.amount,n={Authorization:`Bearer ${e.accessToken}`},m={user:s,amount_buy:u,token_buy:convertToSignableToken(r.buy),amount_sell:o,token_sell:convertToSignableToken(r.sell),fees:r.fees,split_fees:!0,expiration_timestamp:r.expiration_timestamp},g=await i.getSignableOrder({getSignableOrderRequestV3:m},{headers:n});await a.evaluateImxTransaction({payloadHash:g.data.payload_hash});let{payload_hash:d}=g.data,p=await t.signMessage(d),R=g.data,f={createOrderRequest:{include_fees:!0,fees:r.fees,stark_signature:p,amount_buy:R.amount_buy,amount_sell:R.amount_sell,asset_id_buy:R.asset_id_buy,asset_id_sell:R.asset_id_sell,expiration_timestamp:R.expiration_timestamp,nonce:R.nonce,stark_key:R.stark_key,vault_id_buy:R.vault_id_buy,vault_id_sell:R.vault_id_sell}};return {...(await i.createOrderV3(f,{headers:n})).data}},"CREATE_ORDER_ERROR")}async function N({user:t,starkSigner:e,request:r,ordersApi:i,guardianClient:a}){return E(async()=>{let s={order_id:r.order_id},o={Authorization:`Bearer ${t.accessToken}`},u=await i.getSignableCancelOrderV3({getSignableCancelOrderRequest:s},{headers:o});await a.evaluateImxTransaction({payloadHash:u.data.payload_hash});let{payload_hash:n}=u.data,m=await e.signMessage(n),g=await i.cancelOrderV3({id:r.order_id.toString(),cancelOrderRequest:{order_id:r.order_id,stark_signature:m}},{headers:o});return {order_id:g.data.order_id,status:g.data.status}},"CANCEL_ORDER_ERROR")}async function O({ethSigner:t,starkSigner:e,imxApiClients:r},i){return E(async()=>{let[a,s]=await Promise.all([t.getAddress(),e.getAddress()]),o=await r.usersApi.getSignableRegistrationOffchain({getSignableRegistrationRequest:{ether_key:a,stark_key:s}}),{signable_message:u,payload_hash:n}=o.data,[m,g]=await Promise.all([signRaw(u,t),e.signMessage(n)]);return (await r.usersApi.registerPassportUserV2({authorization:`Bearer ${i}`,registerPassportUserRequest:{eth_signature:m,ether_key:a,stark_signature:g,stark_key:s}})).data},"USER_REGISTRATION_ERROR")}async function M({request:t,tradesApi:e,user:r,starkSigner:i,guardianClient:a}){return E(async()=>{let{ethAddress:s}=r.imx,o={expiration_timestamp:t.expiration_timestamp,fees:t.fees,order_id:t.order_id,user:s},u={Authorization:`Bearer ${r.accessToken}`},n=await e.getSignableTrade({getSignableTradeRequest:o},{headers:u});await a.evaluateImxTransaction({payloadHash:n.data.payload_hash});let{payload_hash:m}=n.data,g=await i.signMessage(m),{data:d}=n,p={createTradeRequest:{include_fees:!0,fees:t?.fees,stark_signature:g,order_id:t?.order_id,fee_info:d.fee_info,amount_buy:d.amount_buy,amount_sell:d.amount_sell,asset_id_buy:d.asset_id_buy,asset_id_sell:d.asset_id_sell,expiration_timestamp:d.expiration_timestamp,nonce:d.nonce,stark_key:d.stark_key,vault_id_buy:d.vault_id_buy,vault_id_sell:d.vault_id_sell}},{data:R}=await e.createTradeV3(p,{headers:u});return R},"CREATE_TRADE_ERROR")}var G="ERC721";async function W({request:t,transfersApi:e,starkSigner:r,user:i,guardianClient:a}){return E(async()=>{let s=t.type===G?"1":t.amount,o={sender:i.imx.ethAddress,token:convertToSignableToken(t),amount:s,receiver:t.receiver},u={Authorization:`Bearer ${i.accessToken}`},n=await e.getSignableTransferV1({getSignableTransferRequest:o},{headers:u});await a.evaluateImxTransaction({payloadHash:n.data.payload_hash});let m=n.data,{payload_hash:g}=m,d=await r.signMessage(g),p=await r.getAddress(),f={createTransferRequest:{sender_stark_key:m.sender_stark_key||p,sender_vault_id:m.sender_vault_id,receiver_stark_key:m.receiver_stark_key,receiver_vault_id:m.receiver_vault_id,asset_id:m.asset_id,amount:m.amount,nonce:m.nonce,expiration_timestamp:m.expiration_timestamp,stark_signature:d}},{data:_}=await e.createTransferV1(f,{headers:u});return {sent_signature:_.sent_signature,status:_.status?.toString(),time:_.time,transfer_id:_.transfer_id}},"TRANSFER_ERROR")}async function K({user:t,starkSigner:e,request:r,transfersApi:i,guardianClient:a}){return E(async()=>{let{ethAddress:s}=t.imx,o=r.map(p=>({amount:"1",token:convertToSignableToken({type:G,tokenId:p.tokenId,tokenAddress:p.tokenAddress}),receiver:p.receiver})),u={Authorization:`Bearer ${t.accessToken}`},n=await i.getSignableTransfer({getSignableTransferRequestV2:{sender_ether_key:s,signable_requests:o}},{headers:u});await a.evaluateImxTransaction({payloadHash:n.data.signable_responses[0]?.payload_hash});let m=await Promise.all(n.data.signable_responses.map(async p=>{let R=await e.signMessage(p.payload_hash);return {sender_vault_id:p.sender_vault_id,receiver_stark_key:p.receiver_stark_key,receiver_vault_id:p.receiver_vault_id,asset_id:p.asset_id,amount:p.amount,nonce:p.nonce,expiration_timestamp:p.expiration_timestamp,stark_signature:R}})),g={sender_stark_key:n.data.sender_stark_key,requests:m};return {transfer_ids:(await i.createTransfer({createTransferRequestV2:g},{headers:u}))?.data.transfer_ids}},"TRANSFER_ERROR")}async function X(t){await retryWithDelay(async()=>{let e=await t.forceUserRefresh();return e?.imx?e:Promise.reject(new Error("user wallet addresses not exist"))});}async function x(t,e,r,i,a){return E(async()=>{try{let s=await O({ethSigner:t,starkSigner:e,imxApiClients:a},r.accessToken);return await X(i),s}catch(s){if(re.isAxiosError(s)&&s.response?.status===409)return await X(i),{tx_hash:""};throw s}},"USER_REGISTRATION_ERROR")}var c=async(t,e,r=!0,i)=>t();var y=class{authManager;immutableXClient;guardianClient;imxApiClients;magicTEESigner;starkSigner;signerInitialisationError;constructor({authManager:e,immutableXClient:r,passportEventEmitter:i,magicTEESigner:a,imxApiClients:s,guardianClient:o}){this.authManager=e,this.immutableXClient=r,this.magicTEESigner=a,this.imxApiClients=s,this.guardianClient=o,this.#i(),i.on("loggedOut",this.handleLogout);}handleLogout=()=>{this.starkSigner=void 0;};#i(){this.starkSigner=new Promise(async e=>{try{e(await I(this.magicTEESigner));}catch(r){this.signerInitialisationError=r,e(void 0);}});}async#r(){let e=await this.authManager.getUser();if(!e||!this.starkSigner)throw new l("User has been logged out","NOT_LOGGED_IN_ERROR");return e}async#t(){let e=await this.starkSigner;if(typeof e>"u")throw typeof this.signerInitialisationError<"u"?this.signerInitialisationError:new Error("Signers failed to initialise");return e}async#e(){let[e,r]=await Promise.all([this.#r(),this.#t()]);if(!C(e))throw new l("User has not been registered with StarkEx","USER_NOT_REGISTERED_ERROR");return {user:e,starkSigner:r}}async transfer(e){return c(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:i}=await this.#e();return W({request:e,user:r,starkSigner:i,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.guardianClient})})())}async registerOffchain(){return c(async()=>{let[e,r]=await Promise.all([this.#r(),this.#t()]);return await x(this.magicTEESigner,r,e,this.authManager,this.imxApiClients)})}async isRegisteredOffchain(){return c(async()=>!!(await this.#r()).imx)}isRegisteredOnchain(){throw new l("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async createOrder(e){return c(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:i}=await this.#e();return U({request:e,user:r,starkSigner:i,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.guardianClient})})())}async cancelOrder(e){return c(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:i}=await this.#e();return N({request:e,user:r,starkSigner:i,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.guardianClient})})())}async createTrade(e){return c(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:i}=await this.#e();return M({request:e,user:r,starkSigner:i,tradesApi:this.immutableXClient.tradesApi,guardianClient:this.guardianClient})})())}async batchNftTransfer(e){return c(()=>this.guardianClient.withConfirmationScreenTask({width:480,height:784})(async()=>{let{user:r,starkSigner:i}=await this.#e();return K({request:e,user:r,starkSigner:i,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.guardianClient})})())}async exchangeTransfer(e){return c(async()=>{let{user:r,starkSigner:i}=await this.#e();return v({request:e,user:r,starkSigner:i,exchangesApi:this.immutableXClient.exchangeApi})})}deposit(e){throw new l("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}prepareWithdrawal(e){throw new l("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}completeWithdrawal(e,r){throw new l("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async getAddress(){return c(async()=>{let e=await this.#r();if(!C(e))throw new l("User has not been registered with StarkEx","USER_NOT_REGISTERED_ERROR");return Promise.resolve(e.imx.ethAddress)})}};var T=class{authManager;immutableXClient;magicTEESigner;passportEventEmitter;imxApiClients;guardianClient;constructor({authManager:e,immutableXClient:r,magicTEESigner:i,passportEventEmitter:a,imxApiClients:s,guardianClient:o}){this.authManager=e,this.immutableXClient=r,this.magicTEESigner=i,this.passportEventEmitter=a,this.imxApiClients=s,this.guardianClient=o;}async getProvider(){let e=await this.authManager.getUserOrLogin();return this.createProviderInstance(e)}async getProviderSilent(){let e=await this.authManager.getUser();return e?this.createProviderInstance(e):null}async createProviderInstance(e){if(!e.idToken)throw new l("Failed to initialise","WALLET_CONNECTION_ERROR");return new y({authManager:this.authManager,immutableXClient:this.immutableXClient,passportEventEmitter:this.passportEventEmitter,magicTEESigner:this.magicTEESigner,imxApiClients:this.imxApiClients,guardianClient:this.guardianClient})}};var q=(t,e,r)=>{let i=e.map(a=>!t[a]&&a).filter(a=>a).join(", ");if(i!==""){let a=r?`${r} - ${i} cannot be null`:`${i} cannot be null`;throw new l(a,"INVALID_CONFIGURATION")}},P=class{authenticationDomain;passportDomain;imxPublicApiDomain;magicPublishableApiKey;magicProviderId;magicTeeBasePath="https://tee.express.magiclabs.com";magicTeeTimeout=1e4;oidcConfiguration;baseConfig;zkEvmRpcUrl;relayerUrl;multiRollupConfig;crossSdkBridgeEnabled;forceScwDeployBeforeMessageSignature;popupOverlayOptions;constructor({baseConfig:e,overrides:r,crossSdkBridgeEnabled:i,jsonRpcReferrer:a,forceScwDeployBeforeMessageSignature:s,popupOverlayOptions:o,...u}){if(q(u,["clientId","redirectUri"]),this.oidcConfiguration=u,this.baseConfig=e,this.crossSdkBridgeEnabled=i||!1,this.forceScwDeployBeforeMessageSignature=s||!1,this.popupOverlayOptions=o||{disableGenericPopupOverlay:!1,disableBlockedPopupOverlay:!1,disableHeadlessLoginPromptOverlay:!1},r)q(r,["authenticationDomain","passportDomain","magicPublishableApiKey","magicProviderId","zkEvmRpcUrl","relayerUrl","imxPublicApiDomain","indexerMrBasePath","orderBookMrBasePath","passportMrBasePath"],"overrides"),this.authenticationDomain=r.authenticationDomain,this.passportDomain=r.passportDomain,this.imxPublicApiDomain=r.imxPublicApiDomain,this.magicPublishableApiKey=r.magicPublishableApiKey,this.magicProviderId=r.magicProviderId,this.zkEvmRpcUrl=r.zkEvmRpcUrl,this.relayerUrl=r.relayerUrl,this.multiRollupConfig={indexer:createConfig({basePath:r.indexerMrBasePath}),orderBook:createConfig({basePath:r.orderBookMrBasePath}),passport:createConfig({basePath:r.passportMrBasePath})};else switch(e.environment){case Environment.PRODUCTION:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="aa80b860-8869-4f13-9000-6a6ad3d20017",this.passportDomain="https://passport.immutable.com",this.imxPublicApiDomain="https://api.immutable.com",this.zkEvmRpcUrl="https://rpc.immutable.com",this.relayerUrl="https://api.immutable.com/relayer-mr",this.multiRollupConfig=multiRollupConfig.getProduction();break}case Environment.SANDBOX:default:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="aa80b860-8869-4f13-9000-6a6ad3d20017",this.passportDomain="https://passport.sandbox.immutable.com",this.imxPublicApiDomain="https://api.sandbox.immutable.com",this.zkEvmRpcUrl="https://rpc.testnet.immutable.com",this.relayerUrl="https://api.sandbox.immutable.com/relayer-mr",this.multiRollupConfig=multiRollupConfig.getSandbox();break}}}};var ae=(...t)=>{if(typeof process>"u")return;process?.env?.JEST_WORKER_ID===void 0&&console.warn(...t);},F={warn:ae};var Se=t=>t.overrides?createConfig({basePath:t.overrides.imxPublicApiDomain}):t.baseConfig.environment===Environment.SANDBOX?imxApiConfig.getSandbox():imxApiConfig.getProduction(),be=t=>{if(t.overrides?.imxApiClients)return t.overrides.imxApiClients;let e=Se(t);return new ImxApiClients(e)},Ie=t=>{let e=new P(t),r=new AuthConfiguration({...t,authenticationDomain:e.authenticationDomain,crossSdkBridgeEnabled:t.crossSdkBridgeEnabled,popupOverlayOptions:t.popupOverlayOptions,passportDomain:e.passportDomain}),i=new EmbeddedLoginPrompt(r),a=new AuthManager(r,i),s=new ConfirmationScreen(r),o=new MagicTeeApiClients({basePath:e.magicTeeBasePath,timeout:e.magicTeeTimeout,magicPublishableApiKey:e.magicPublishableApiKey,magicProviderId:e.magicProviderId}),u=new MagicTEESigner(a,o),n=new MultiRollupApiClients(e.multiRollupConfig),m=new WalletConfiguration({baseConfig:t.baseConfig,overrides:t.overrides,jsonRpcReferrer:t.jsonRpcReferrer,forceScwDeployBeforeMessageSignature:t.forceScwDeployBeforeMessageSignature,crossSdkBridgeEnabled:t.crossSdkBridgeEnabled}),g=new TypedEventEmitter,d=t.overrides?t.overrides.immutableXClient:new IMXClient({baseConfig:t.baseConfig}),p=new GuardianClient({confirmationScreen:s,config:m,authManager:a,guardianApi:n.guardianApi}),R=be(t),f=new T({authManager:a,immutableXClient:d,magicTEESigner:u,passportEventEmitter:g,imxApiClients:R,guardianClient:p});return {config:e,authManager:a,authConfig:r,walletConfig:m,magicTEESigner:u,confirmationScreen:s,embeddedLoginPrompt:i,immutableXClient:d,multiRollupApiClients:n,passportEventEmitter:g,passportImxProviderFactory:f,guardianClient:p}},S=class{authManager;walletConfig;confirmationScreen;embeddedLoginPrompt;immutableXClient;magicTEESigner;multiRollupApiClients;passportImxProviderFactory;passportEventEmitter;guardianClient;constructor(e){let r=Ie(e);this.walletConfig=r.walletConfig,this.authManager=r.authManager,this.magicTEESigner=r.magicTEESigner,this.confirmationScreen=r.confirmationScreen,this.embeddedLoginPrompt=r.embeddedLoginPrompt,this.immutableXClient=r.immutableXClient,this.multiRollupApiClients=r.multiRollupApiClients,this.passportEventEmitter=r.passportEventEmitter,this.passportImxProviderFactory=r.passportImxProviderFactory,this.guardianClient=r.guardianClient,setPassportClientId(e.clientId),track("passport","initialise");}async connectImxSilent(){return c(()=>this.passportImxProviderFactory.getProviderSilent(),"connectImxSilent",!1)}async connectImx(){return c(()=>this.passportImxProviderFactory.getProvider(),"connectImx",!1)}async connectEvm(e={announceProvider:!0}){return c(async()=>{let r=null;try{r=await this.authManager.getUser();}catch{}let i=new ZkEvmProvider({passportEventEmitter:this.passportEventEmitter,authManager:this.authManager,config:this.walletConfig,multiRollupApiClients:this.multiRollupApiClients,guardianClient:this.guardianClient,ethSigner:this.magicTEESigner,user:r});return e?.announceProvider&&announceProvider({info:passportProviderInfo,provider:i}),i},"connectEvm",!1)}async login(e){return c(async()=>{let{useCachedSession:r=!1,useSilentLogin:i}=e||{},a=null;try{a=await this.authManager.getUser();}catch(s){if(s instanceof Error&&!s.message.includes("Unknown or invalid refresh token")&&trackError("passport","login",s),r)throw s;F.warn("Failed to retrieve a cached user session",s);}if(!a&&i)a=await this.authManager.forceUserRefresh();else if(!a&&!r){let s=e?.directLoginOptions?{directLoginMethod:e.directLoginOptions.directLoginMethod,email:e.directLoginOptions.email,marketingConsentStatus:e.directLoginOptions.marketingConsentStatus}:void 0;e?.useRedirectFlow?await this.authManager.loginWithRedirect(e?.anonymousId,s):a=await this.authManager.login(e?.anonymousId,s);}return a&&(identify({passportId:a.profile.sub}),this.passportEventEmitter.emit("loggedIn",a)),a?a.profile:null},"login",!1)}async loginCallback(){await c(()=>this.authManager.loginCallback(),"loginCallback",!1).then(e=>{e&&(identify({passportId:e.profile.sub}),this.passportEventEmitter.emit("loggedIn",e));});}async loginWithPKCEFlow(e,r){return c(async()=>await this.authManager.getPKCEAuthorizationUrl(e,r),"loginWithPKCEFlow",!1)}async loginWithPKCEFlowCallback(e,r){return c(async()=>{let i=await this.authManager.loginWithPKCEFlowCallback(e,r);return this.passportEventEmitter.emit("loggedIn",i),i.profile},"loginWithPKCEFlowCallback",!1)}async storeTokens(e){return c(async()=>{let r=await this.authManager.storeTokens(e);return this.passportEventEmitter.emit("loggedIn",r),r.profile},"storeTokens",!1)}async logout(){return c(async()=>{await this.authManager.logout(),this.passportEventEmitter.emit("loggedOut");},"logout",!1)}async getLogoutUrl(){return c(async()=>(await this.authManager.removeUser(),this.passportEventEmitter.emit("loggedOut"),await this.authManager.getLogoutUrl()||void 0),"getLogoutUrl",!1)}async logoutSilentCallback(e){return c(()=>this.authManager.logoutSilentCallback(e),"logoutSilentCallback",!1)}async getUserInfo(){return c(async()=>(await this.authManager.getUser())?.profile,"getUserInfo",!1)}async getIdToken(){return c(async()=>(await this.authManager.getUser())?.idToken,"getIdToken",!1)}async getAccessToken(){return c(async()=>(await this.authManager.getUser())?.accessToken,"getAccessToken",!1)}async getLinkedAddresses(){return c(async()=>{let e=await this.authManager.getUser();if(!e?.profile.sub)return [];let r={Authorization:`Bearer ${e.accessToken}`},{data:i}=await this.multiRollupApiClients.passportProfileApi.getUserInfo({headers:r});return i.linked_addresses},"getLinkedAddresses",!1)}async linkExternalWallet(e){let r=trackFlow("passport","linkExternalWallet"),i=await this.authManager.getUser();if(!i)throw new l("User is not logged in","NOT_LOGGED_IN_ERROR");let a=isUserImx(i),s=isUserZkEvm(i);if(!a&&!s)throw new l("User has not been registered","USER_NOT_REGISTERED_ERROR");let o={Authorization:`Bearer ${i.accessToken}`},u={type:e.type,wallet_address:e.walletAddress,signature:e.signature,nonce:e.nonce};try{return {...(await this.multiRollupApiClients.passportProfileApi.linkWalletV2({linkWalletV2Request:u},{headers:o})).data}}catch(n){if(n instanceof Error?trackError("passport","linkExternalWallet",n):r.addEvent("errored"),isAxiosError(n)&&n.response){if(n.response.data&&A(n.response.data)){let{code:g,message:d}=n.response.data;switch(g){case"ALREADY_LINKED":throw new l(d,"LINK_WALLET_ALREADY_LINKED_ERROR");case"MAX_WALLETS_LINKED":throw new l(d,"LINK_WALLET_MAX_WALLETS_LINKED_ERROR");case"DUPLICATE_NONCE":throw new l(d,"LINK_WALLET_DUPLICATE_NONCE_ERROR");case"VALIDATION_ERROR":throw new l(d,"LINK_WALLET_VALIDATION_ERROR");default:throw new l(d,"LINK_WALLET_GENERIC_ERROR")}}else if(n.response.status)throw new l(`Link wallet request failed with status code ${n.response.status}`,"LINK_WALLET_GENERIC_ERROR")}let m="Link wallet request failed";throw n instanceof Error&&(m+=`: ${n.message}`),new l(m,"LINK_WALLET_GENERIC_ERROR")}finally{r.addEvent("End");}}};
|
|
12
|
+
function H(i){return "code"in i&&"message"in i}var o=class extends Error{type;constructor(e,r){super(e),this.type=r;}},R=async(i,e)=>{try{return await i()}catch(r){let t;throw r instanceof o&&r.type==="SERVICE_UNAVAILABLE_ERROR"?new o(r.message,r.type):(isAxiosError(r)&&r.response?.data&&H(r.response.data)?t=r.response.data.message:t=r.message,new o(t,e))}};var E=i=>{if(!i.idToken)throw new o("User has been logged out","NOT_LOGGED_IN_ERROR");let r=Z(i.idToken).passport;if(!r?.imx_eth_address||!r?.imx_stark_address||!r?.imx_user_admin_address)throw new o("User has not been registered with StarkEx","USER_NOT_REGISTERED_ERROR");return {...i,imx:{ethAddress:r.imx_eth_address,starkAddress:r.imx_stark_address,userAdminAddress:r.imx_user_admin_address}}};var b=async i=>R(async()=>{let e=await generateLegacyStarkPrivateKey(i);return createStarkSigner(e)},"WALLET_CONNECTION_ERROR");async function k({user:i,starkSigner:e,request:r,exchangesApi:t}){return R(async()=>{let{ethAddress:a}=i.imx,s=r.amount,l=await t.getExchangeSignableTransfer({id:r.transactionID,getSignableTransferRequest:{sender:a,token:convertToSignableToken(r),amount:s,receiver:r.receiver}}),n=await e.getAddress(),{payload_hash:m}=l.data,p=await e.signMessage(m),c={sender_stark_key:l.data.sender_stark_key||n,sender_vault_id:l.data.sender_vault_id,receiver_stark_key:l.data.receiver_stark_key,receiver_vault_id:l.data.receiver_vault_id,asset_id:l.data.asset_id,amount:l.data.amount,nonce:l.data.nonce,expiration_timestamp:l.data.expiration_timestamp,stark_signature:p},u={Authorization:`Bearer ${i.accessToken}`},d=await t.createExchangeTransfer({id:r.transactionID,createTransferRequest:c},{headers:u});return {sent_signature:d?.data.sent_signature,status:d?.data.status?.toString(),time:d?.data.time,transfer_id:d?.data.transfer_id}},"EXCHANGE_TRANSFER_ERROR")}var w="ERC721";async function U({starkSigner:i,user:e,request:r,ordersApi:t,guardianClient:a}){return R(async()=>{let{ethAddress:s}=e.imx,l=r.sell.type===w?"1":r.sell.amount,n=r.buy.type===w?"1":r.buy.amount,m={Authorization:`Bearer ${e.accessToken}`},p={user:s,amount_buy:n,token_buy:convertToSignableToken(r.buy),amount_sell:l,token_sell:convertToSignableToken(r.sell),fees:r.fees,split_fees:!0,expiration_timestamp:r.expiration_timestamp},c=await t.getSignableOrder({getSignableOrderRequestV3:p},{headers:m});await a.evaluateTransaction(c.data.payload_hash);let{payload_hash:u}=c.data,d=await i.signMessage(u),g=c.data,_={createOrderRequest:{include_fees:!0,fees:r.fees,stark_signature:d,amount_buy:g.amount_buy,amount_sell:g.amount_sell,asset_id_buy:g.asset_id_buy,asset_id_sell:g.asset_id_sell,expiration_timestamp:g.expiration_timestamp,nonce:g.nonce,stark_key:g.stark_key,vault_id_buy:g.vault_id_buy,vault_id_sell:g.vault_id_sell}};return {...(await t.createOrderV3(_,{headers:m})).data}},"CREATE_ORDER_ERROR")}async function L({user:i,starkSigner:e,request:r,ordersApi:t,guardianClient:a}){return R(async()=>{let s={order_id:r.order_id},l={Authorization:`Bearer ${i.accessToken}`},n=await t.getSignableCancelOrderV3({getSignableCancelOrderRequest:s},{headers:l});await a.evaluateTransaction(n.data.payload_hash);let{payload_hash:m}=n.data,p=await e.signMessage(m),c=await t.cancelOrderV3({id:r.order_id.toString(),cancelOrderRequest:{order_id:r.order_id,stark_signature:p}},{headers:l});return {order_id:c.data.order_id,status:c.data.status}},"CANCEL_ORDER_ERROR")}async function P({ethSigner:i,starkSigner:e,imxApiClients:r},t){return R(async()=>{let[a,s]=await Promise.all([i.getAddress(),e.getAddress()]),l=await r.usersApi.getSignableRegistrationOffchain({getSignableRegistrationRequest:{ether_key:a,stark_key:s}}),{signable_message:n,payload_hash:m}=l.data,[p,c]=await Promise.all([signRaw(n,i),e.signMessage(m)]);return (await r.usersApi.registerPassportUserV2({authorization:`Bearer ${t}`,registerPassportUserRequest:{eth_signature:p,ether_key:a,stark_signature:c,stark_key:s}})).data},"USER_REGISTRATION_ERROR")}async function N({request:i,tradesApi:e,user:r,starkSigner:t,guardianClient:a}){return R(async()=>{let{ethAddress:s}=r.imx,l={expiration_timestamp:i.expiration_timestamp,fees:i.fees,order_id:i.order_id,user:s},n={Authorization:`Bearer ${r.accessToken}`},m=await e.getSignableTrade({getSignableTradeRequest:l},{headers:n});await a.evaluateTransaction(m.data.payload_hash);let{payload_hash:p}=m.data,c=await t.signMessage(p),{data:u}=m,d={createTradeRequest:{include_fees:!0,fees:i?.fees,stark_signature:c,order_id:i?.order_id,fee_info:u.fee_info,amount_buy:u.amount_buy,amount_sell:u.amount_sell,asset_id_buy:u.asset_id_buy,asset_id_sell:u.asset_id_sell,expiration_timestamp:u.expiration_timestamp,nonce:u.nonce,stark_key:u.stark_key,vault_id_buy:u.vault_id_buy,vault_id_sell:u.vault_id_sell}},{data:g}=await e.createTradeV3(d,{headers:n});return g},"CREATE_TRADE_ERROR")}var M="ERC721";async function G({request:i,transfersApi:e,starkSigner:r,user:t,guardianClient:a}){return R(async()=>{let s=i.type===M?"1":i.amount,l={sender:t.imx.ethAddress,token:convertToSignableToken(i),amount:s,receiver:i.receiver},n={Authorization:`Bearer ${t.accessToken}`},m=await e.getSignableTransferV1({getSignableTransferRequest:l},{headers:n});await a.evaluateTransaction(m.data.payload_hash);let p=m.data,{payload_hash:c}=p,u=await r.signMessage(c),d=await r.getAddress(),_={createTransferRequest:{sender_stark_key:p.sender_stark_key||d,sender_vault_id:p.sender_vault_id,receiver_stark_key:p.receiver_stark_key,receiver_vault_id:p.receiver_vault_id,asset_id:p.asset_id,amount:p.amount,nonce:p.nonce,expiration_timestamp:p.expiration_timestamp,stark_signature:u}},{data:C}=await e.createTransferV1(_,{headers:n});return {sent_signature:C.sent_signature,status:C.status?.toString(),time:C.time,transfer_id:C.transfer_id}},"TRANSFER_ERROR")}async function B({user:i,starkSigner:e,request:r,transfersApi:t,guardianClient:a}){return R(async()=>{let{ethAddress:s}=i.imx,l=r.map(d=>({amount:"1",token:convertToSignableToken({type:M,tokenId:d.tokenId,tokenAddress:d.tokenAddress}),receiver:d.receiver})),n={Authorization:`Bearer ${i.accessToken}`},m=await t.getSignableTransfer({getSignableTransferRequestV2:{sender_ether_key:s,signable_requests:l}},{headers:n});await a.evaluateTransaction(m.data.signable_responses[0]?.payload_hash);let p=await Promise.all(m.data.signable_responses.map(async d=>{let g=await e.signMessage(d.payload_hash);return {sender_vault_id:d.sender_vault_id,receiver_stark_key:d.receiver_stark_key,receiver_vault_id:d.receiver_vault_id,asset_id:d.asset_id,amount:d.amount,nonce:d.nonce,expiration_timestamp:d.expiration_timestamp,stark_signature:g}})),c={sender_stark_key:m.data.sender_stark_key,requests:p};return {transfer_ids:(await t.createTransfer({createTransferRequestV2:c},{headers:n}))?.data.transfer_ids}},"TRANSFER_ERROR")}async function W(i){await retryWithDelay(async()=>{let e=await i.forceUserRefresh();if(!e)return Promise.reject(new Error("user wallet addresses not exist"));try{return E(e),e}catch{return Promise.reject(new Error("user wallet addresses not exist"))}});}async function O(i,e,r,t,a){return R(async()=>{try{let s=await P({ethSigner:i,starkSigner:e,imxApiClients:a},r.accessToken);return await W(t),s}catch(s){if(te.isAxiosError(s)&&s.response?.status===409)return await W(t),{tx_hash:""};throw s}},"USER_REGISTRATION_ERROR")}var h=async(i,e,r=!0,t=!0)=>{let a=trackFlow("passport",e,r);try{return await i(a)}catch(s){throw s instanceof Error?trackError("passport",e,s,{flowId:a.details.flowId}):a.addEvent("errored"),s}finally{t&&a.addEvent("End");}};var y=class{authManager;immutableXClient;guardianClient;imxApiClients;magicTEESigner;imxGuardianClient;starkSigner;signerInitialisationError;constructor({authManager:e,immutableXClient:r,passportEventEmitter:t,magicTEESigner:a,imxApiClients:s,guardianClient:l,imxGuardianClient:n}){this.authManager=e,this.immutableXClient=r,this.magicTEESigner=a,this.imxApiClients=s,this.guardianClient=l,this.imxGuardianClient=n,this.#i(),t.on(AuthEvents.LOGGED_OUT,this.handleLogout);}handleLogout=()=>{this.starkSigner=void 0;};#i(){this.starkSigner=new Promise(async e=>{try{e(await b(this.magicTEESigner));}catch(r){this.signerInitialisationError=r,e(void 0);}});}async#r(){let e=await this.authManager.getUser();if(!e||!this.starkSigner)throw new o("User has been logged out","NOT_LOGGED_IN_ERROR");return e}async#t(){let e=await this.starkSigner;if(typeof e>"u")throw typeof this.signerInitialisationError<"u"?this.signerInitialisationError:new Error("Signers failed to initialise");return e}async#e(){let[e,r]=await Promise.all([this.#r(),this.#t()]);return {user:E(e),starkSigner:r}}async transfer(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:t}=await this.#e();return G({request:e,user:r,starkSigner:t,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.imxGuardianClient})})(),"imxTransfer")}async registerOffchain(){return h(async()=>{let[e,r]=await Promise.all([this.#r(),this.#t()]);return await O(this.magicTEESigner,r,E(e),this.authManager,this.imxApiClients)},"imxRegisterOffchain")}async isRegisteredOffchain(){return h(async()=>{try{let e=await this.#r();return !!E(e).imx}catch(e){if(e instanceof o&&e.type==="USER_NOT_REGISTERED_ERROR")return !1;throw e}},"imxIsRegisteredOffchain")}isRegisteredOnchain(){throw new o("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async createOrder(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:t}=await this.#e();return U({request:e,user:r,starkSigner:t,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.imxGuardianClient})})(),"imxCreateOrder")}async cancelOrder(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:t}=await this.#e();return L({request:e,user:r,starkSigner:t,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.imxGuardianClient})})(),"imxCancelOrder")}async createTrade(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:r,starkSigner:t}=await this.#e();return N({request:e,user:r,starkSigner:t,tradesApi:this.immutableXClient.tradesApi,guardianClient:this.imxGuardianClient})})(),"imxCreateTrade")}async batchNftTransfer(e){return h(()=>this.guardianClient.withConfirmationScreenTask({width:480,height:784})(async()=>{let{user:r,starkSigner:t}=await this.#e();return B({request:e,user:r,starkSigner:t,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.imxGuardianClient})})(),"imxBatchNftTransfer")}async exchangeTransfer(e){return h(async()=>{let{user:r,starkSigner:t}=await this.#e();return k({request:e,user:r,starkSigner:t,exchangesApi:this.immutableXClient.exchangeApi})},"imxExchangeTransfer")}deposit(e){throw new o("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}prepareWithdrawal(e){throw new o("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}completeWithdrawal(e,r){throw new o("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async getAddress(){return h(async()=>{let e=await this.#r(),r=E(e);return Promise.resolve(r.imx.ethAddress)},"imxGetAddress")}};var A=class{authManager;immutableXClient;magicTEESigner;passportEventEmitter;imxApiClients;guardianClient;imxGuardianClient;constructor({authManager:e,immutableXClient:r,magicTEESigner:t,passportEventEmitter:a,imxApiClients:s,guardianClient:l,imxGuardianClient:n}){this.authManager=e,this.immutableXClient=r,this.magicTEESigner=t,this.passportEventEmitter=a,this.imxApiClients=s,this.guardianClient=l,this.imxGuardianClient=n;}async getProvider(){let e=await this.authManager.getUserOrLogin();return this.createProviderInstance(e)}async getProviderSilent(){let e=await this.authManager.getUser();return e?this.createProviderInstance(e):null}async createProviderInstance(e){if(!e.idToken)throw new o("Failed to initialise","WALLET_CONNECTION_ERROR");return new y({authManager:this.authManager,immutableXClient:this.immutableXClient,passportEventEmitter:this.passportEventEmitter,magicTEESigner:this.magicTEESigner,imxApiClients:this.imxApiClients,guardianClient:this.guardianClient,imxGuardianClient:this.imxGuardianClient})}};var F=(i,e,r)=>{let t=e.map(a=>!i[a]&&a).filter(a=>a).join(", ");if(t!==""){let a=r?`${r} - ${t} cannot be null`:`${t} cannot be null`;throw new o(a,"INVALID_CONFIGURATION")}},x=class{authenticationDomain;passportDomain;imxPublicApiDomain;magicPublishableApiKey;magicProviderId;magicTeeBasePath="https://tee.express.magiclabs.com";magicTeeTimeout=1e4;oidcConfiguration;baseConfig;zkEvmRpcUrl;relayerUrl;multiRollupConfig;crossSdkBridgeEnabled;forceScwDeployBeforeMessageSignature;jsonRpcReferrer;popupOverlayOptions;overrides;constructor({baseConfig:e,overrides:r,crossSdkBridgeEnabled:t,jsonRpcReferrer:a,forceScwDeployBeforeMessageSignature:s,popupOverlayOptions:l,...n}){if(F(n,["clientId","redirectUri"]),this.oidcConfiguration=n,this.baseConfig=e,this.overrides=r,this.crossSdkBridgeEnabled=t||!1,this.forceScwDeployBeforeMessageSignature=s||!1,this.jsonRpcReferrer=a,this.popupOverlayOptions=l||{disableGenericPopupOverlay:!1,disableBlockedPopupOverlay:!1,disableHeadlessLoginPromptOverlay:!1},r)F(r,["authenticationDomain","passportDomain","magicPublishableApiKey","magicProviderId","zkEvmRpcUrl","relayerUrl","imxPublicApiDomain","indexerMrBasePath","orderBookMrBasePath","passportMrBasePath"],"overrides"),this.authenticationDomain=r.authenticationDomain,this.passportDomain=r.passportDomain,this.imxPublicApiDomain=r.imxPublicApiDomain,this.magicPublishableApiKey=r.magicPublishableApiKey,this.magicProviderId=r.magicProviderId,this.zkEvmRpcUrl=r.zkEvmRpcUrl,this.relayerUrl=r.relayerUrl,this.multiRollupConfig={indexer:createConfig({basePath:r.indexerMrBasePath}),orderBook:createConfig({basePath:r.orderBookMrBasePath}),passport:createConfig({basePath:r.passportMrBasePath})};else switch(e.environment){case Environment.PRODUCTION:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="aa80b860-8869-4f13-9000-6a6ad3d20017",this.passportDomain="https://passport.immutable.com",this.imxPublicApiDomain="https://api.immutable.com",this.zkEvmRpcUrl="https://rpc.immutable.com",this.relayerUrl="https://api.immutable.com/relayer-mr",this.multiRollupConfig=multiRollupConfig.getProduction();break}case Environment.SANDBOX:default:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="aa80b860-8869-4f13-9000-6a6ad3d20017",this.passportDomain="https://passport.sandbox.immutable.com",this.imxPublicApiDomain="https://api.sandbox.immutable.com",this.zkEvmRpcUrl="https://rpc.testnet.immutable.com",this.relayerUrl="https://api.sandbox.immutable.com/relayer-mr",this.multiRollupConfig=multiRollupConfig.getSandbox();break}}}};var pe="Transaction requires confirmation but this functionality is not supported in this environment. Please contact Immutable support if you need to enable this feature.",T=class{authManager;guardianApi;confirmationScreen;crossSdkBridgeEnabled;constructor({authManager:e,guardianApi:r,confirmationScreen:t,crossSdkBridgeEnabled:a=!1}){this.authManager=e,this.guardianApi=r,this.confirmationScreen=t,this.crossSdkBridgeEnabled=a;}async evaluateTransaction(e){let r=await this.authManager.getUser();if(!r)throw new o("User has been logged out","NOT_LOGGED_IN_ERROR");let t=E(r),a={Authorization:`Bearer ${t.accessToken}`};try{if(!(await retryWithDelay(async()=>this.guardianApi.getTransactionByID({transactionID:e,chainType:"starkex"},{headers:a}),{finallyFn:()=>{this.confirmationScreen.closeWindow();}})).data.id)throw new o("Transaction does not exist","TRANSFER_ERROR");let n=await this.guardianApi.evaluateTransaction({id:e,transactionEvaluationRequest:{chainType:"starkex"}},{headers:a}),{confirmationRequired:m}=n.data;if(m){if(this.crossSdkBridgeEnabled)throw new o(pe,"TRANSACTION_REJECTED");if(!(await this.confirmationScreen.requestConfirmation(e,t.imx.ethAddress,mr.TransactionApprovalRequestChainTypeEnum.Starkex)).confirmed)throw new o("Transaction rejected by user","TRANSACTION_REJECTED")}else this.confirmationScreen.closeWindow();}catch(s){throw te.isAxiosError(s)&&s.response?.status===403?new o("Service unavailable","SERVICE_UNAVAILABLE_ERROR"):s}}};var Oe=i=>i.overrides?createConfig({basePath:i.overrides.imxPublicApiDomain}):i.baseConfig.environment===Environment.SANDBOX?imxApiConfig.getSandbox():imxApiConfig.getProduction(),Ie=i=>{if(i.overrides?.imxApiClients)return i.overrides.imxApiClients;let e=Oe(i);return new ImxApiClients(e)},Se=i=>{let e=new x(i),r=new Auth({...i,authenticationDomain:e.authenticationDomain,crossSdkBridgeEnabled:i.crossSdkBridgeEnabled,popupOverlayOptions:i.popupOverlayOptions,passportDomain:e.passportDomain}),t=r.getAuthManager(),a=r.getConfig(),s=new ConfirmationScreen(a),l=new WalletConfiguration({passportDomain:e.passportDomain,zkEvmRpcUrl:e.zkEvmRpcUrl,relayerUrl:e.relayerUrl,indexerMrBasePath:e.multiRollupConfig.indexer.basePath||e.passportDomain,jsonRpcReferrer:i.jsonRpcReferrer,forceScwDeployBeforeMessageSignature:i.forceScwDeployBeforeMessageSignature,crossSdkBridgeEnabled:i.crossSdkBridgeEnabled}),n=new MultiRollupApiClients(e.multiRollupConfig),m=i.overrides?i.overrides.immutableXClient:new IMXClient({baseConfig:i.baseConfig}),p=new GuardianClient({config:l,authManager:t,guardianApi:n.guardianApi,authConfig:a}),c=new T({authManager:t,guardianApi:n.guardianApi,confirmationScreen:s,crossSdkBridgeEnabled:i.crossSdkBridgeEnabled||!1}),u=new MagicTeeApiClients({basePath:e.magicTeeBasePath,timeout:e.magicTeeTimeout,magicPublishableApiKey:e.magicPublishableApiKey,magicProviderId:e.magicProviderId}),d=new MagicTEESigner(t,u),g=Ie(i),_=new A({authManager:t,immutableXClient:m,magicTEESigner:d,passportEventEmitter:r.eventEmitter,imxApiClients:g,guardianClient:p,imxGuardianClient:c});return {passportConfig:e,auth:r,passportImxProviderFactory:_,environment:i.baseConfig.environment,walletConfig:l}},S=class{auth;passportImxProviderFactory;multiRollupApiClients;environment;passportConfig;constructor(e){let r=Se(e);this.auth=r.auth,this.passportImxProviderFactory=r.passportImxProviderFactory,this.passportConfig=r.passportConfig,this.multiRollupApiClients=new MultiRollupApiClients(this.passportConfig.multiRollupConfig),this.environment=r.environment,setPassportClientId(e.clientId);}async connectImxSilent(){return h(()=>this.passportImxProviderFactory.getProviderSilent(),"connectImxSilent",!1)}async connectImx(){return h(()=>this.passportImxProviderFactory.getProvider(),"connectImx",!1)}async connectEvm(e={announceProvider:!0}){return h(async()=>{let r=this.passportConfig.overrides,t;return r?.zkEvmChainId?t={chainId:r.zkEvmChainId,name:r.zkEvmChainName||"Dev Chain",rpcUrl:this.passportConfig.zkEvmRpcUrl,relayerUrl:this.passportConfig.relayerUrl,apiUrl:this.passportConfig.multiRollupConfig.indexer.basePath||this.passportConfig.passportDomain,passportDomain:this.passportConfig.passportDomain,magicPublishableApiKey:this.passportConfig.magicPublishableApiKey,magicProviderId:this.passportConfig.magicProviderId,magicTeeBasePath:r.magicTeeBasePath||this.passportConfig.magicTeeBasePath}:this.environment===Environment.PRODUCTION?t={chainId:13371,name:"Immutable zkEVM",rpcUrl:this.passportConfig.zkEvmRpcUrl,relayerUrl:this.passportConfig.relayerUrl,apiUrl:this.passportConfig.multiRollupConfig.indexer.basePath||this.passportConfig.passportDomain,passportDomain:this.passportConfig.passportDomain,magicPublishableApiKey:this.passportConfig.magicPublishableApiKey,magicProviderId:this.passportConfig.magicProviderId,magicTeeBasePath:this.passportConfig.magicTeeBasePath}:t={chainId:13473,name:"Immutable zkEVM Testnet",rpcUrl:this.passportConfig.zkEvmRpcUrl,relayerUrl:this.passportConfig.relayerUrl,apiUrl:this.passportConfig.multiRollupConfig.indexer.basePath||this.passportConfig.passportDomain,passportDomain:this.passportConfig.passportDomain,magicPublishableApiKey:this.passportConfig.magicPublishableApiKey,magicProviderId:this.passportConfig.magicProviderId,magicTeeBasePath:this.passportConfig.magicTeeBasePath},await connectWallet({auth:this.auth,chains:[t],crossSdkBridgeEnabled:this.passportConfig.crossSdkBridgeEnabled,jsonRpcReferrer:this.passportConfig.jsonRpcReferrer,forceScwDeployBeforeMessageSignature:this.passportConfig.forceScwDeployBeforeMessageSignature,passportEventEmitter:this.auth.eventEmitter,announceProvider:e?.announceProvider??!0})},"connectEvm",!1)}async login(e){let r=e?{useCachedSession:e.useCachedSession,useSilentLogin:e.useSilentLogin,useRedirectFlow:e.useRedirectFlow,directLoginOptions:e.directLoginOptions}:void 0,t=await this.auth.login(r);return t?t.profile:null}async loginCallback(){await this.auth.loginCallback();}async logout(){await this.auth.logout();}async getUserInfo(){return (await this.auth.getUser())?.profile}async getIdToken(){return (await this.auth.getUser())?.idToken}async getAccessToken(){return (await this.auth.getUser())?.accessToken}async loginWithPKCEFlow(e,r){return this.auth.loginWithPKCEFlow(e,r)}async loginWithPKCEFlowCallback(e,r){return (await this.auth.loginWithPKCEFlowCallback(e,r)).profile}async storeTokens(e){return (await this.auth.storeTokens(e)).profile}async getLogoutUrl(){return await this.auth.getLogoutUrl()}async logoutSilentCallback(e){return this.auth.logoutSilentCallback(e)}async getLinkedAddresses(){return h(async()=>{let e=await this.auth.getUser();if(!e?.profile.sub)return [];let r={Authorization:`Bearer ${e.accessToken}`};return (await this.multiRollupApiClients.passportProfileApi.getUserInfo({headers:r})).data.linked_addresses},"getLinkedAddresses",!1)}async linkExternalWallet(e){let r=a=>typeof a=="object"&&a!==null&&"code"in a&&"message"in a,t=trackFlow("passport","linkExternalWallet",!1);try{let a=await this.auth.getUser();if(!a)throw new o("User is not logged in","NOT_LOGGED_IN_ERROR");let s=isUserZkEvm(a);if(!(()=>{try{return E(a),!0}catch(c){if(c instanceof o&&c.type==="USER_NOT_REGISTERED_ERROR")return !1;throw c}})()&&!s)throw new o("User has not been registered","USER_NOT_REGISTERED_ERROR");let n={Authorization:`Bearer ${a.accessToken}`},m={type:e.type,wallet_address:e.walletAddress,signature:e.signature,nonce:e.nonce};return {...(await this.multiRollupApiClients.passportProfileApi.linkWalletV2({linkWalletV2Request:m},{headers:n})).data}}catch(a){if(a instanceof Error?trackError("passport","linkExternalWallet",a):t.addEvent("errored"),isAxiosError(a)&&a.response){if(a.response.data&&r(a.response.data)){let{code:l,message:n}=a.response.data;switch(l){case"ALREADY_LINKED":throw new o(n,"LINK_WALLET_ALREADY_LINKED_ERROR");case"MAX_WALLETS_LINKED":throw new o(n,"LINK_WALLET_MAX_WALLETS_LINKED_ERROR");case"DUPLICATE_NONCE":throw new o(n,"LINK_WALLET_DUPLICATE_NONCE_ERROR");case"VALIDATION_ERROR":throw new o(n,"LINK_WALLET_VALIDATION_ERROR");default:throw new o(n,"LINK_WALLET_GENERIC_ERROR")}}else if(a.response.status)throw new o(`Link wallet request failed with status code ${a.response.status}`,"LINK_WALLET_GENERIC_ERROR")}let s="Link wallet request failed";throw a instanceof Error&&(s+=`: ${a.message}`),new o(s,"LINK_WALLET_GENERIC_ERROR")}finally{t.addEvent("End");}}};var $=(r=>(r.OptedIn="opted_in",r.Unsubscribed="unsubscribed",r))($||{});
|
|
12
13
|
|
|
13
|
-
export {
|
|
14
|
+
export { $ as MarketingConsentStatus, S as Passport, o as PassportError };
|
package/dist/types/Passport.d.ts
CHANGED
|
@@ -1,36 +1,25 @@
|
|
|
1
1
|
import { IMXProvider } from '@imtbl/x-provider';
|
|
2
|
-
import {
|
|
3
|
-
import {
|
|
4
|
-
import {
|
|
5
|
-
import { ZkEvmProvider, WalletConfiguration
|
|
6
|
-
import {
|
|
2
|
+
import { Environment } from '@imtbl/config';
|
|
3
|
+
import { Auth, UserProfile, DeviceTokenResponse } from '@imtbl/auth';
|
|
4
|
+
import type { DirectLoginOptions } from '@imtbl/auth';
|
|
5
|
+
import { ZkEvmProvider, WalletConfiguration } from '@imtbl/wallet';
|
|
6
|
+
import type { LinkWalletParams, LinkedWallet } from '@imtbl/wallet';
|
|
7
|
+
import { PassportModuleConfiguration, ConnectEvmArguments, LoginArguments } from './types';
|
|
7
8
|
import { PassportImxProviderFactory } from './starkEx';
|
|
8
9
|
import { PassportConfiguration } from './config';
|
|
9
10
|
export declare const buildPrivateVars: (passportModuleConfiguration: PassportModuleConfiguration) => {
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
authConfig: AuthConfiguration;
|
|
13
|
-
walletConfig: WalletConfiguration;
|
|
14
|
-
magicTEESigner: MagicTEESigner;
|
|
15
|
-
confirmationScreen: ConfirmationScreen;
|
|
16
|
-
embeddedLoginPrompt: EmbeddedLoginPrompt;
|
|
17
|
-
immutableXClient: IMXClient;
|
|
18
|
-
multiRollupApiClients: MultiRollupApiClients;
|
|
19
|
-
passportEventEmitter: TypedEventEmitter<PassportEventMap>;
|
|
11
|
+
passportConfig: PassportConfiguration;
|
|
12
|
+
auth: Auth;
|
|
20
13
|
passportImxProviderFactory: PassportImxProviderFactory;
|
|
21
|
-
|
|
14
|
+
environment: Environment;
|
|
15
|
+
walletConfig: WalletConfiguration;
|
|
22
16
|
};
|
|
23
17
|
export declare class Passport {
|
|
24
|
-
private readonly
|
|
25
|
-
private readonly walletConfig;
|
|
26
|
-
private readonly confirmationScreen;
|
|
27
|
-
private readonly embeddedLoginPrompt;
|
|
28
|
-
private readonly immutableXClient;
|
|
29
|
-
private readonly magicTEESigner;
|
|
30
|
-
private readonly multiRollupApiClients;
|
|
18
|
+
private readonly auth;
|
|
31
19
|
private readonly passportImxProviderFactory;
|
|
32
|
-
private readonly
|
|
33
|
-
private readonly
|
|
20
|
+
private readonly multiRollupApiClients;
|
|
21
|
+
private readonly environment;
|
|
22
|
+
private readonly passportConfig;
|
|
34
23
|
constructor(passportModuleConfiguration: PassportModuleConfiguration);
|
|
35
24
|
/**
|
|
36
25
|
* Attempts to connect to IMX silently without user interaction.
|
|
@@ -45,13 +34,15 @@ export declare class Passport {
|
|
|
45
34
|
connectImx(): Promise<IMXProvider>;
|
|
46
35
|
/**
|
|
47
36
|
* Connects to EVM and optionally announces the provider.
|
|
37
|
+
* Uses: Auth + Wallet packages
|
|
48
38
|
* @param {Object} options - Configuration options
|
|
49
39
|
* @param {boolean} options.announceProvider - Whether to announce the provider via EIP-6963 for wallet discovery (defaults to true)
|
|
50
40
|
* @returns {Promise<Provider>} The EVM provider instance
|
|
51
41
|
*/
|
|
52
42
|
connectEvm(options?: ConnectEvmArguments): Promise<ZkEvmProvider>;
|
|
53
43
|
/**
|
|
54
|
-
* Logs in the user.
|
|
44
|
+
* Logs in the user (works for both zkEVM and IMX).
|
|
45
|
+
* Uses: Auth class
|
|
55
46
|
* @param {Object} [options] - Login options
|
|
56
47
|
* @param {boolean} [options.useCachedSession] - If true, attempts to use a cached session without user interaction.
|
|
57
48
|
* @param {boolean} [options.useSilentLogin] - If true, attempts silent authentication without user interaction.
|
|
@@ -68,34 +59,55 @@ export declare class Passport {
|
|
|
68
59
|
login(options?: LoginArguments): Promise<UserProfile | null>;
|
|
69
60
|
/**
|
|
70
61
|
* Handles the login callback from the authentication service.
|
|
62
|
+
* Uses: Auth class
|
|
71
63
|
* @returns {Promise<void>} A promise that resolves when the login callback is handled
|
|
72
64
|
*/
|
|
73
65
|
loginCallback(): Promise<void>;
|
|
66
|
+
/**
|
|
67
|
+
* Logs out the user (works for both zkEVM and IMX).
|
|
68
|
+
* Uses: Auth class
|
|
69
|
+
* @returns {Promise<void>} A promise that resolves when the user is logged out
|
|
70
|
+
*/
|
|
71
|
+
logout(): Promise<void>;
|
|
72
|
+
/**
|
|
73
|
+
* Retrieves the current user's information.
|
|
74
|
+
* Uses: Auth class
|
|
75
|
+
* @returns {Promise<UserProfile | undefined>} A promise that resolves to the user profile if logged in, undefined otherwise
|
|
76
|
+
*/
|
|
77
|
+
getUserInfo(): Promise<UserProfile | undefined>;
|
|
78
|
+
/**
|
|
79
|
+
* Retrieves the ID token.
|
|
80
|
+
* @returns {Promise<string | undefined>} A promise that resolves to the ID token if available, undefined otherwise
|
|
81
|
+
*/
|
|
82
|
+
getIdToken(): Promise<string | undefined>;
|
|
83
|
+
/**
|
|
84
|
+
* Retrieves the access token.
|
|
85
|
+
* @returns {Promise<string | undefined>} A promise that resolves to the access token if available, undefined otherwise
|
|
86
|
+
*/
|
|
87
|
+
getAccessToken(): Promise<string | undefined>;
|
|
74
88
|
/**
|
|
75
89
|
* Retrieves the PKCE authorization URL for the login flow.
|
|
90
|
+
* Uses: Auth class
|
|
76
91
|
* @param {DirectLoginOptions} [directLoginOptions] - Optional direct login options
|
|
77
92
|
* @param {string} [imPassportTraceId] - Optional trace ID
|
|
78
93
|
* @returns {Promise<string>} A promise that resolves to the authorization URL
|
|
79
94
|
*/
|
|
80
95
|
loginWithPKCEFlow(directLoginOptions?: DirectLoginOptions, imPassportTraceId?: string): Promise<string>;
|
|
81
96
|
/**
|
|
82
|
-
|
|
83
|
-
|
|
84
|
-
|
|
85
|
-
|
|
86
|
-
|
|
97
|
+
* Handles the PKCE login callback.
|
|
98
|
+
* Uses: Auth class
|
|
99
|
+
* @param {string} authorizationCode - The authorization code from the OAuth provider
|
|
100
|
+
* @param {string} state - The state parameter for CSRF protection
|
|
101
|
+
* @returns {Promise<UserProfile>} A promise that resolves to the user profile
|
|
102
|
+
*/
|
|
87
103
|
loginWithPKCEFlowCallback(authorizationCode: string, state: string): Promise<UserProfile>;
|
|
88
104
|
/**
|
|
89
|
-
|
|
90
|
-
|
|
91
|
-
|
|
92
|
-
|
|
105
|
+
* Stores the provided tokens and retrieves the user profile.
|
|
106
|
+
* Uses: Auth class
|
|
107
|
+
* @param {DeviceTokenResponse} tokenResponse - The token response from device flow
|
|
108
|
+
* @returns {Promise<UserProfile>} A promise that resolves to the user profile
|
|
109
|
+
*/
|
|
93
110
|
storeTokens(tokenResponse: DeviceTokenResponse): Promise<UserProfile>;
|
|
94
|
-
/**
|
|
95
|
-
* Logs out the user.
|
|
96
|
-
* @returns {Promise<void>} A promise that resolves when the user is logged out
|
|
97
|
-
*/
|
|
98
|
-
logout(): Promise<void>;
|
|
99
111
|
/**
|
|
100
112
|
* Retrieves the logout URL.
|
|
101
113
|
* @returns {Promise<string | undefined>} A promise that resolves to the logout URL, or undefined if not available
|
|
@@ -107,21 +119,6 @@ export declare class Passport {
|
|
|
107
119
|
* @returns {Promise<void>} A promise that resolves when the silent logout callback is handled
|
|
108
120
|
*/
|
|
109
121
|
logoutSilentCallback(url: string): Promise<void>;
|
|
110
|
-
/**
|
|
111
|
-
* Retrieves the current user's information.
|
|
112
|
-
* @returns {Promise<UserProfile | undefined>} A promise that resolves to the user profile if logged in, undefined otherwise
|
|
113
|
-
*/
|
|
114
|
-
getUserInfo(): Promise<UserProfile | undefined>;
|
|
115
|
-
/**
|
|
116
|
-
* Retrieves the ID token.
|
|
117
|
-
* @returns {Promise<string | undefined>} A promise that resolves to the ID token if available, undefined otherwise
|
|
118
|
-
*/
|
|
119
|
-
getIdToken(): Promise<string | undefined>;
|
|
120
|
-
/**
|
|
121
|
-
* Retrieves the access token.
|
|
122
|
-
* @returns {Promise<string | undefined>} A promise that resolves to the access token if available, undefined otherwise
|
|
123
|
-
*/
|
|
124
|
-
getAccessToken(): Promise<string | undefined>;
|
|
125
122
|
/**
|
|
126
123
|
* Retrieves the addresses linked to the current user's account.
|
|
127
124
|
* @returns {Promise<string[]>} A promise that resolves to an array of linked addresses
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import { ImmutableConfiguration } from '@imtbl/config';
|
|
2
2
|
import { MultiRollupAPIConfiguration } from '@imtbl/generated-clients';
|
|
3
|
-
import { OidcConfiguration, PassportModuleConfiguration, PopupOverlayOptions } from '../types';
|
|
3
|
+
import { OidcConfiguration, PassportModuleConfiguration, PopupOverlayOptions, PassportOverrides } from '../types';
|
|
4
4
|
export declare class PassportConfiguration {
|
|
5
5
|
readonly authenticationDomain: string;
|
|
6
6
|
readonly passportDomain: string;
|
|
@@ -16,6 +16,8 @@ export declare class PassportConfiguration {
|
|
|
16
16
|
readonly multiRollupConfig: MultiRollupAPIConfiguration;
|
|
17
17
|
readonly crossSdkBridgeEnabled: boolean;
|
|
18
18
|
readonly forceScwDeployBeforeMessageSignature: boolean;
|
|
19
|
+
readonly jsonRpcReferrer?: string;
|
|
19
20
|
readonly popupOverlayOptions: PopupOverlayOptions;
|
|
21
|
+
readonly overrides?: PassportOverrides;
|
|
20
22
|
constructor({ baseConfig, overrides, crossSdkBridgeEnabled, jsonRpcReferrer, forceScwDeployBeforeMessageSignature, popupOverlayOptions, ...oidcConfiguration }: PassportModuleConfiguration);
|
|
21
23
|
}
|
|
@@ -20,7 +20,8 @@ export declare enum PassportErrorType {
|
|
|
20
20
|
LINK_WALLET_VALIDATION_ERROR = "LINK_WALLET_VALIDATION_ERROR",
|
|
21
21
|
LINK_WALLET_DUPLICATE_NONCE_ERROR = "LINK_WALLET_DUPLICATE_NONCE_ERROR",
|
|
22
22
|
LINK_WALLET_GENERIC_ERROR = "LINK_WALLET_GENERIC_ERROR",
|
|
23
|
-
SERVICE_UNAVAILABLE_ERROR = "SERVICE_UNAVAILABLE_ERROR"
|
|
23
|
+
SERVICE_UNAVAILABLE_ERROR = "SERVICE_UNAVAILABLE_ERROR",
|
|
24
|
+
TRANSACTION_REJECTED = "TRANSACTION_REJECTED"
|
|
24
25
|
}
|
|
25
26
|
export declare function isAPIError(error: any): error is imx.APIError;
|
|
26
27
|
export declare class PassportError extends Error {
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
import { AuthManager } from '@imtbl/auth';
|
|
2
|
+
import { mr as MultiRollup } from '@imtbl/generated-clients';
|
|
3
|
+
import { ConfirmationScreen } from '@imtbl/wallet';
|
|
4
|
+
type ImxGuardianClientParams = {
|
|
5
|
+
authManager: AuthManager;
|
|
6
|
+
guardianApi: MultiRollup.GuardianApi;
|
|
7
|
+
confirmationScreen: ConfirmationScreen;
|
|
8
|
+
crossSdkBridgeEnabled?: boolean;
|
|
9
|
+
};
|
|
10
|
+
export declare class ImxGuardianClient {
|
|
11
|
+
private readonly authManager;
|
|
12
|
+
private readonly guardianApi;
|
|
13
|
+
private readonly confirmationScreen;
|
|
14
|
+
private readonly crossSdkBridgeEnabled;
|
|
15
|
+
constructor({ authManager, guardianApi, confirmationScreen, crossSdkBridgeEnabled, }: ImxGuardianClientParams);
|
|
16
|
+
evaluateTransaction(payloadHash: string): Promise<void>;
|
|
17
|
+
}
|
|
18
|
+
export {};
|
|
@@ -2,16 +2,17 @@ import { AnyToken, IMXClient, NftTransferDetails, TokenAmount, UnsignedExchangeT
|
|
|
2
2
|
import { IMXProvider } from '@imtbl/x-provider';
|
|
3
3
|
import { imx, ImxApiClients } from '@imtbl/generated-clients';
|
|
4
4
|
import { TransactionResponse } from 'ethers';
|
|
5
|
-
import { AuthManager } from '@imtbl/auth';
|
|
6
|
-
import { GuardianClient, MagicTEESigner
|
|
7
|
-
import {
|
|
5
|
+
import { AuthManager, AuthEventMap, TypedEventEmitter } from '@imtbl/auth';
|
|
6
|
+
import { GuardianClient, MagicTEESigner } from '@imtbl/wallet';
|
|
7
|
+
import { ImxGuardianClient } from './imxGuardianClient';
|
|
8
8
|
export interface PassportImxProviderOptions {
|
|
9
9
|
authManager: AuthManager;
|
|
10
10
|
immutableXClient: IMXClient;
|
|
11
|
-
passportEventEmitter: TypedEventEmitter<
|
|
11
|
+
passportEventEmitter: TypedEventEmitter<AuthEventMap>;
|
|
12
12
|
magicTEESigner: MagicTEESigner;
|
|
13
13
|
imxApiClients: ImxApiClients;
|
|
14
14
|
guardianClient: GuardianClient;
|
|
15
|
+
imxGuardianClient: ImxGuardianClient;
|
|
15
16
|
}
|
|
16
17
|
export declare class PassportImxProvider implements IMXProvider {
|
|
17
18
|
#private;
|
|
@@ -20,6 +21,7 @@ export declare class PassportImxProvider implements IMXProvider {
|
|
|
20
21
|
protected readonly guardianClient: GuardianClient;
|
|
21
22
|
protected readonly imxApiClients: ImxApiClients;
|
|
22
23
|
protected magicTEESigner: MagicTEESigner;
|
|
24
|
+
private readonly imxGuardianClient;
|
|
23
25
|
/**
|
|
24
26
|
* This property is set during initialisation and stores the signers in a promise.
|
|
25
27
|
* This property is not meant to be accessed directly, but through the
|
|
@@ -28,7 +30,7 @@ export declare class PassportImxProvider implements IMXProvider {
|
|
|
28
30
|
*/
|
|
29
31
|
private starkSigner;
|
|
30
32
|
private signerInitialisationError;
|
|
31
|
-
constructor({ authManager, immutableXClient, passportEventEmitter, magicTEESigner, imxApiClients, guardianClient, }: PassportImxProviderOptions);
|
|
33
|
+
constructor({ authManager, immutableXClient, passportEventEmitter, magicTEESigner, imxApiClients, guardianClient, imxGuardianClient, }: PassportImxProviderOptions);
|
|
32
34
|
private handleLogout;
|
|
33
35
|
transfer(request: UnsignedTransferRequest): Promise<imx.CreateTransferResponseV1>;
|
|
34
36
|
registerOffchain(): Promise<imx.RegisterUserResponse>;
|
|
@@ -1,16 +1,17 @@
|
|
|
1
1
|
import { IMXClient } from '@imtbl/x-client';
|
|
2
2
|
import { IMXProvider } from '@imtbl/x-provider';
|
|
3
3
|
import { ImxApiClients } from '@imtbl/generated-clients';
|
|
4
|
-
import { AuthManager } from '@imtbl/auth';
|
|
5
|
-
import { GuardianClient, MagicTEESigner
|
|
6
|
-
import {
|
|
4
|
+
import { AuthManager, AuthEventMap, TypedEventEmitter } from '@imtbl/auth';
|
|
5
|
+
import { GuardianClient, MagicTEESigner } from '@imtbl/wallet';
|
|
6
|
+
import { ImxGuardianClient } from './imxGuardianClient';
|
|
7
7
|
export type PassportImxProviderFactoryInput = {
|
|
8
8
|
authManager: AuthManager;
|
|
9
9
|
immutableXClient: IMXClient;
|
|
10
10
|
magicTEESigner: MagicTEESigner;
|
|
11
|
-
passportEventEmitter: TypedEventEmitter<
|
|
11
|
+
passportEventEmitter: TypedEventEmitter<AuthEventMap>;
|
|
12
12
|
imxApiClients: ImxApiClients;
|
|
13
13
|
guardianClient: GuardianClient;
|
|
14
|
+
imxGuardianClient: ImxGuardianClient;
|
|
14
15
|
};
|
|
15
16
|
export declare class PassportImxProviderFactory {
|
|
16
17
|
private readonly authManager;
|
|
@@ -19,7 +20,8 @@ export declare class PassportImxProviderFactory {
|
|
|
19
20
|
private readonly passportEventEmitter;
|
|
20
21
|
readonly imxApiClients: ImxApiClients;
|
|
21
22
|
private readonly guardianClient;
|
|
22
|
-
|
|
23
|
+
private readonly imxGuardianClient;
|
|
24
|
+
constructor({ authManager, immutableXClient, magicTEESigner, passportEventEmitter, imxApiClients, guardianClient, imxGuardianClient, }: PassportImxProviderFactoryInput);
|
|
23
25
|
getProvider(): Promise<IMXProvider>;
|
|
24
26
|
getProviderSilent(): Promise<IMXProvider | null>;
|
|
25
27
|
private createProviderInstance;
|
|
@@ -1,20 +1,20 @@
|
|
|
1
1
|
import { imx } from '@imtbl/generated-clients';
|
|
2
2
|
import { StarkSigner, UnsignedOrderRequest } from '@imtbl/x-client';
|
|
3
|
-
import {
|
|
3
|
+
import { ImxGuardianClient } from '../imxGuardianClient';
|
|
4
4
|
import { UserImx } from '../../types';
|
|
5
5
|
type CancelOrderParams = {
|
|
6
6
|
request: imx.GetSignableCancelOrderRequest;
|
|
7
7
|
ordersApi: imx.OrdersApi;
|
|
8
8
|
user: UserImx;
|
|
9
9
|
starkSigner: StarkSigner;
|
|
10
|
-
guardianClient:
|
|
10
|
+
guardianClient: ImxGuardianClient;
|
|
11
11
|
};
|
|
12
12
|
type CreateOrderParams = {
|
|
13
13
|
request: UnsignedOrderRequest;
|
|
14
14
|
ordersApi: imx.OrdersApi;
|
|
15
15
|
user: UserImx;
|
|
16
16
|
starkSigner: StarkSigner;
|
|
17
|
-
guardianClient:
|
|
17
|
+
guardianClient: ImxGuardianClient;
|
|
18
18
|
};
|
|
19
19
|
export declare function createOrder({ starkSigner, user, request, ordersApi, guardianClient, }: CreateOrderParams): Promise<imx.CreateOrderResponse>;
|
|
20
20
|
export declare function cancelOrder({ user, starkSigner, request, ordersApi, guardianClient, }: CancelOrderParams): Promise<imx.CancelOrderResponse>;
|
|
@@ -1,5 +1,4 @@
|
|
|
1
1
|
import { ImxApiClients, imx } from '@imtbl/generated-clients';
|
|
2
2
|
import { EthSigner, StarkSigner } from '@imtbl/x-client';
|
|
3
|
-
import { AuthManager } from '@imtbl/auth';
|
|
4
|
-
import { User } from '../../types';
|
|
3
|
+
import { AuthManager, User } from '@imtbl/auth';
|
|
5
4
|
export default function registerOffchain(userAdminKeySigner: EthSigner, starkSigner: StarkSigner, unregisteredUser: User, authManager: AuthManager, imxApiClients: ImxApiClients): Promise<imx.RegisterUserResponse>;
|
|
@@ -1,13 +1,13 @@
|
|
|
1
1
|
import { imx } from '@imtbl/generated-clients';
|
|
2
2
|
import { StarkSigner } from '@imtbl/x-client';
|
|
3
|
-
import {
|
|
3
|
+
import { ImxGuardianClient } from '../imxGuardianClient';
|
|
4
4
|
import { UserImx } from '../../types';
|
|
5
5
|
type CreateTradeParams = {
|
|
6
6
|
request: imx.GetSignableTradeRequest;
|
|
7
7
|
tradesApi: imx.TradesApi;
|
|
8
8
|
user: UserImx;
|
|
9
9
|
starkSigner: StarkSigner;
|
|
10
|
-
guardianClient:
|
|
10
|
+
guardianClient: ImxGuardianClient;
|
|
11
11
|
};
|
|
12
12
|
export declare function createTrade({ request, tradesApi, user, starkSigner, guardianClient, }: CreateTradeParams): Promise<imx.CreateTradeResponse>;
|
|
13
13
|
export {};
|
|
@@ -1,20 +1,20 @@
|
|
|
1
1
|
import { imx } from '@imtbl/generated-clients';
|
|
2
2
|
import { StarkSigner, NftTransferDetails, UnsignedTransferRequest } from '@imtbl/x-client';
|
|
3
|
-
import {
|
|
3
|
+
import { ImxGuardianClient } from '../imxGuardianClient';
|
|
4
4
|
import { UserImx } from '../../types';
|
|
5
5
|
type TransferRequest = {
|
|
6
6
|
request: UnsignedTransferRequest;
|
|
7
7
|
user: UserImx;
|
|
8
8
|
starkSigner: StarkSigner;
|
|
9
9
|
transfersApi: imx.TransfersApi;
|
|
10
|
-
guardianClient:
|
|
10
|
+
guardianClient: ImxGuardianClient;
|
|
11
11
|
};
|
|
12
12
|
type BatchTransfersParams = {
|
|
13
13
|
request: Array<NftTransferDetails>;
|
|
14
14
|
user: UserImx;
|
|
15
15
|
starkSigner: StarkSigner;
|
|
16
16
|
transfersApi: imx.TransfersApi;
|
|
17
|
-
guardianClient:
|
|
17
|
+
guardianClient: ImxGuardianClient;
|
|
18
18
|
};
|
|
19
19
|
export declare function transfer({ request, transfersApi, starkSigner, user, guardianClient, }: TransferRequest): Promise<imx.CreateTransferResponseV1>;
|
|
20
20
|
export declare function batchNftTransfer({ user, starkSigner, request, transfersApi, guardianClient, }: BatchTransfersParams): Promise<imx.CreateTransferResponse>;
|
package/dist/types/types.d.ts
CHANGED
|
@@ -8,11 +8,8 @@ import { Flow } from '@imtbl/metrics';
|
|
|
8
8
|
* Additional providers may be supported server-side
|
|
9
9
|
*/
|
|
10
10
|
export type DirectLoginMethod = string;
|
|
11
|
-
export
|
|
12
|
-
|
|
13
|
-
LOGGED_IN = "loggedIn",
|
|
14
|
-
ACCOUNTS_REQUESTED = "accountsRequested"
|
|
15
|
-
}
|
|
11
|
+
export { AuthEvents } from '@imtbl/auth';
|
|
12
|
+
export { WalletEvents } from '@imtbl/wallet';
|
|
16
13
|
export type AccountsRequestedEvent = {
|
|
17
14
|
environment: Environment;
|
|
18
15
|
sendTransaction: (params: Array<any>, flow: Flow) => Promise<string>;
|
|
@@ -20,43 +17,9 @@ export type AccountsRequestedEvent = {
|
|
|
20
17
|
passportClient: string;
|
|
21
18
|
flow?: Flow;
|
|
22
19
|
};
|
|
23
|
-
export
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
[PassportEvents.ACCOUNTS_REQUESTED]: [AccountsRequestedEvent];
|
|
27
|
-
}
|
|
28
|
-
export type UserProfile = {
|
|
29
|
-
email?: string;
|
|
30
|
-
nickname?: string;
|
|
31
|
-
sub: string;
|
|
32
|
-
};
|
|
33
|
-
export declare enum RollupType {
|
|
34
|
-
IMX = "imx",
|
|
35
|
-
ZKEVM = "zkEvm"
|
|
36
|
-
}
|
|
37
|
-
export type User = {
|
|
38
|
-
idToken?: string;
|
|
39
|
-
accessToken: string;
|
|
40
|
-
refreshToken?: string;
|
|
41
|
-
profile: UserProfile;
|
|
42
|
-
expired?: boolean;
|
|
43
|
-
[RollupType.IMX]?: {
|
|
44
|
-
ethAddress: string;
|
|
45
|
-
starkAddress: string;
|
|
46
|
-
userAdminAddress: string;
|
|
47
|
-
};
|
|
48
|
-
[RollupType.ZKEVM]?: {
|
|
49
|
-
ethAddress: string;
|
|
50
|
-
userAdminAddress: string;
|
|
51
|
-
};
|
|
52
|
-
};
|
|
53
|
-
export type PassportMetadata = {
|
|
54
|
-
imx_eth_address: string;
|
|
55
|
-
imx_stark_address: string;
|
|
56
|
-
imx_user_admin_address: string;
|
|
57
|
-
zkevm_eth_address: string;
|
|
58
|
-
zkevm_user_admin_address: string;
|
|
59
|
-
};
|
|
20
|
+
export type { User, UserProfile, DeviceTokenResponse, IdTokenPayload, } from '@imtbl/auth';
|
|
21
|
+
export { isUserZkEvm } from '@imtbl/auth';
|
|
22
|
+
export type { UserImx } from './utils/imxUser';
|
|
60
23
|
export interface OidcConfiguration {
|
|
61
24
|
clientId: string;
|
|
62
25
|
logoutRedirectUri?: string;
|
|
@@ -79,6 +42,21 @@ export interface PassportOverrides {
|
|
|
79
42
|
orderBookMrBasePath: string;
|
|
80
43
|
passportMrBasePath: string;
|
|
81
44
|
imxApiClients?: ImxApiClients;
|
|
45
|
+
/**
|
|
46
|
+
* Custom chain ID for dev environments (optional)
|
|
47
|
+
* If provided, overrides the default chainId based on environment
|
|
48
|
+
*/
|
|
49
|
+
zkEvmChainId?: number;
|
|
50
|
+
/**
|
|
51
|
+
* Custom chain name for dev environments (optional)
|
|
52
|
+
* Used when zkEvmChainId is provided
|
|
53
|
+
*/
|
|
54
|
+
zkEvmChainName?: string;
|
|
55
|
+
/**
|
|
56
|
+
* Magic TEE base path (optional, for dev/custom environments)
|
|
57
|
+
* Defaults to 'https://tee.express.magiclabs.com'
|
|
58
|
+
*/
|
|
59
|
+
magicTeeBasePath?: string;
|
|
82
60
|
}
|
|
83
61
|
export interface PopupOverlayOptions {
|
|
84
62
|
disableGenericPopupOverlay?: boolean;
|
|
@@ -108,51 +86,14 @@ export interface PassportModuleConfiguration extends ModuleConfiguration<Passpor
|
|
|
108
86
|
*/
|
|
109
87
|
forceScwDeployBeforeMessageSignature?: boolean;
|
|
110
88
|
}
|
|
111
|
-
type WithRequired<T, K extends keyof T> = T & {
|
|
112
|
-
[P in K]-?: T[P];
|
|
113
|
-
};
|
|
114
|
-
export type UserImx = WithRequired<User, RollupType.IMX>;
|
|
115
|
-
export type UserZkEvm = WithRequired<User, RollupType.ZKEVM>;
|
|
116
|
-
export declare const isUserZkEvm: (user: User) => user is UserZkEvm;
|
|
117
|
-
export declare const isUserImx: (user: User) => user is UserImx;
|
|
118
|
-
export type DeviceTokenResponse = {
|
|
119
|
-
access_token: string;
|
|
120
|
-
refresh_token?: string;
|
|
121
|
-
id_token: string;
|
|
122
|
-
token_type: string;
|
|
123
|
-
expires_in: number;
|
|
124
|
-
};
|
|
125
89
|
export type TokenPayload = {
|
|
126
90
|
exp?: number;
|
|
127
91
|
};
|
|
128
|
-
export type IdTokenPayload = {
|
|
129
|
-
passport?: PassportMetadata;
|
|
130
|
-
email: string;
|
|
131
|
-
nickname: string;
|
|
132
|
-
aud: string;
|
|
133
|
-
sub: string;
|
|
134
|
-
exp: number;
|
|
135
|
-
iss: string;
|
|
136
|
-
iat: number;
|
|
137
|
-
};
|
|
138
92
|
export type PKCEData = {
|
|
139
93
|
state: string;
|
|
140
94
|
verifier: string;
|
|
141
95
|
};
|
|
142
|
-
export type LinkWalletParams
|
|
143
|
-
type: string;
|
|
144
|
-
walletAddress: string;
|
|
145
|
-
signature: string;
|
|
146
|
-
nonce: string;
|
|
147
|
-
};
|
|
148
|
-
export type LinkedWallet = {
|
|
149
|
-
address: string;
|
|
150
|
-
type: string;
|
|
151
|
-
created_at: string;
|
|
152
|
-
updated_at: string;
|
|
153
|
-
name?: string;
|
|
154
|
-
clientName: string;
|
|
155
|
-
};
|
|
96
|
+
export type { LinkWalletParams, LinkedWallet } from '@imtbl/wallet';
|
|
156
97
|
export type ConnectEvmArguments = {
|
|
157
98
|
announceProvider: boolean;
|
|
158
99
|
};
|
|
@@ -1 +1,2 @@
|
|
|
1
|
-
|
|
1
|
+
import { Flow } from '@imtbl/metrics';
|
|
2
|
+
export declare const withMetricsAsync: <T>(fn: (flow: Flow) => Promise<T>, flowName: string, trackStartEvent?: boolean, trackEndEvent?: boolean) => Promise<T>;
|
package/package.json
CHANGED
|
@@ -1,22 +1,23 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@imtbl/passport",
|
|
3
3
|
"description": "Passport module for Immutable SDK",
|
|
4
|
-
"version": "2.10.7-alpha.
|
|
4
|
+
"version": "2.10.7-alpha.5",
|
|
5
5
|
"author": "Immutable",
|
|
6
6
|
"bugs": "https://github.com/immutable/ts-immutable-sdk/issues",
|
|
7
7
|
"dependencies": {
|
|
8
8
|
"@0xsequence/abi": "^2.0.25",
|
|
9
9
|
"@0xsequence/core": "^2.0.25",
|
|
10
|
-
"@imtbl/auth": "2.10.7-alpha.
|
|
11
|
-
"@imtbl/wallet": "2.10.7-alpha.
|
|
12
|
-
"@imtbl/config": "2.10.7-alpha.
|
|
13
|
-
"@imtbl/generated-clients": "2.10.7-alpha.
|
|
14
|
-
"@imtbl/metrics": "2.10.7-alpha.
|
|
15
|
-
"@imtbl/toolkit": "2.10.7-alpha.
|
|
16
|
-
"@imtbl/x-client": "2.10.7-alpha.
|
|
17
|
-
"@imtbl/x-provider": "2.10.7-alpha.
|
|
10
|
+
"@imtbl/auth": "2.10.7-alpha.5",
|
|
11
|
+
"@imtbl/wallet": "2.10.7-alpha.5",
|
|
12
|
+
"@imtbl/config": "2.10.7-alpha.5",
|
|
13
|
+
"@imtbl/generated-clients": "2.10.7-alpha.5",
|
|
14
|
+
"@imtbl/metrics": "2.10.7-alpha.5",
|
|
15
|
+
"@imtbl/toolkit": "2.10.7-alpha.5",
|
|
16
|
+
"@imtbl/x-client": "2.10.7-alpha.5",
|
|
17
|
+
"@imtbl/x-provider": "2.10.7-alpha.5",
|
|
18
18
|
"axios": "^1.6.5",
|
|
19
|
-
"ethers": "^6.13.4"
|
|
19
|
+
"ethers": "^6.13.4",
|
|
20
|
+
"jwt-decode": "^3.1.2"
|
|
20
21
|
},
|
|
21
22
|
"devDependencies": {
|
|
22
23
|
"@swc/core": "^1.3.36",
|