@imtbl/passport 2.4.10-alpha.2 → 2.4.10-alpha.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/browser/index.js +33 -31
- package/dist/node/index.cjs +30 -28
- package/dist/node/index.js +24 -22
- package/dist/types/Passport.d.ts +4 -4
- package/dist/types/authManager.d.ts +1 -0
- package/dist/types/config/config.d.ts +0 -2
- package/dist/types/magic/index.d.ts +5 -1
- package/dist/types/magic/magicAdapter.d.ts +12 -0
- package/dist/types/magic/magicProviderProxyFactory.d.ts +15 -0
- package/dist/types/magic/magicProviderProxyFactory.test.d.ts +1 -0
- package/dist/types/mocks/zkEvm/msw.d.ts +0 -10
- package/dist/types/starkEx/passportImxProvider.d.ts +6 -6
- package/dist/types/starkEx/passportImxProviderFactory.d.ts +5 -5
- package/dist/types/types.d.ts +9 -9
- package/dist/types/zkEvm/zkEvmProvider.d.ts +4 -5
- package/package.json +7 -7
- package/dist/types/magic/magicTEESigner.d.ts +0 -24
- /package/dist/types/magic/{magicTEESigner.test.d.ts → magicAdapter.test.d.ts} +0 -0
package/dist/node/index.js
CHANGED
|
@@ -1,20 +1,22 @@
|
|
|
1
|
-
import
|
|
2
|
-
import * as
|
|
3
|
-
import {
|
|
1
|
+
import ht, { isAxiosError } from 'axios';
|
|
2
|
+
import * as we from '@imtbl/generated-clients';
|
|
3
|
+
import { MultiRollupApiClients, createConfig, multiRollupConfig, ImxApiClients, imxApiConfig } from '@imtbl/generated-clients';
|
|
4
4
|
import { IMXClient, generateLegacyStarkPrivateKey, createStarkSigner } from '@imtbl/x-client';
|
|
5
5
|
import { Environment } from '@imtbl/config';
|
|
6
6
|
import { utils, setPassportClientId, track, identify, trackFlow, trackError, getDetail, Detail, trackDuration } from '@imtbl/metrics';
|
|
7
7
|
import { UserManager, User, ErrorTimeout, ErrorResponse, InMemoryWebStorage, WebStorageStateStore } from 'oidc-client-ts';
|
|
8
|
-
import
|
|
9
|
-
import
|
|
10
|
-
import {
|
|
8
|
+
import Be from 'jwt-decode';
|
|
9
|
+
import Kt from 'localforage';
|
|
10
|
+
import { Magic } from 'magic-sdk';
|
|
11
|
+
import { OpenIdExtension } from '@magic-ext/oidc';
|
|
12
|
+
import { JsonRpcProvider, toBeHex, Contract, isError, ZeroAddress, BrowserProvider, TypedDataEncoder, keccak256, getBytes, hashMessage, stripZerosLeft, toUtf8String, solidityPacked, Interface, AbiCoder } from 'ethers';
|
|
11
13
|
import { signRaw, convertToSignableToken } from '@imtbl/toolkit';
|
|
12
14
|
import { EventEmitter } from 'events';
|
|
13
15
|
import { walletContracts } from '@0xsequence/abi';
|
|
14
16
|
import { v1 } from '@0xsequence/core';
|
|
15
17
|
import { v4 } from 'uuid';
|
|
16
18
|
|
|
17
|
-
function
|
|
19
|
+
function ce(n){return "code"in n&&"message"in n}var g=class extends Error{type;constructor(e,t){super(e),this.type=t;}},f=async(n,e)=>{try{return await n()}catch(t){let r;throw t instanceof g&&t.type==="SERVICE_UNAVAILABLE_ERROR"?new g(t.message,t.type):(isAxiosError(t)&&t.response?.data&&ce(t.response.data)?r=t.response.data.message:r=t.message,new g(r,e))}};var Oe="pkce_state",ke="pkce_verifier",Bt=3600,b=class{isTokenValid(e){try{let r=Be(e).exp??0,i=Date.now()/1e3+Bt;return r>i}catch{return !1}}savePKCEData(e){localStorage.setItem(Oe,e.state),localStorage.setItem(ke,e.verifier);}getPKCEData(){let e=localStorage.getItem(Oe),t=localStorage.getItem(ke);return e&&t?{state:e,verifier:t}:null}};var Vt=(...n)=>{if(typeof process>"u")return;process?.env?.JEST_WORKER_ID===void 0&&console.warn(...n);},A={warn:Vt};function be(n){try{let e=Be(n),t=Math.floor(Date.now()/1e3);return e.exp?e.exp<=t+30:!0}catch{return !0}}function xe(n){let{id_token:e,access_token:t}=n;return !t||!e?!0:be(t)||be(e)}var F=n=>!!n.zkEvm,I=n=>!!n.imx,Me=(t=>(t.OptedIn="opted_in",t.Unsubscribed="unsubscribed",t))(Me||{});var x="passport-overlay",B=`${x}-close`,V=`${x}-try-again`,Ne=`
|
|
18
20
|
<svg
|
|
19
21
|
viewBox="0 0 20 20"
|
|
20
22
|
fill="none"
|
|
@@ -26,7 +28,7 @@ function oe(n){return "code"in n&&"message"in n}var g=class extends Error{type;c
|
|
|
26
28
|
fill="#F3F3F3"
|
|
27
29
|
/>
|
|
28
30
|
</svg>
|
|
29
|
-
`,
|
|
31
|
+
`,De=`
|
|
30
32
|
<svg
|
|
31
33
|
viewBox="0 0 17 16"
|
|
32
34
|
fill="none"
|
|
@@ -223,7 +225,7 @@ function oe(n){return "code"in n&&"message"in n}var g=class extends Error{type;c
|
|
|
223
225
|
</clipPath>
|
|
224
226
|
</defs>
|
|
225
227
|
</svg>
|
|
226
|
-
`;var
|
|
228
|
+
`;var Wt=()=>`
|
|
227
229
|
<button
|
|
228
230
|
id="${B}"
|
|
229
231
|
style="
|
|
@@ -241,9 +243,9 @@ function oe(n){return "code"in n&&"message"in n}var g=class extends Error{type;c
|
|
|
241
243
|
justify-content: center !important;
|
|
242
244
|
"
|
|
243
245
|
>
|
|
244
|
-
${
|
|
246
|
+
${Ne}
|
|
245
247
|
</button>
|
|
246
|
-
`,
|
|
248
|
+
`,qt=()=>`
|
|
247
249
|
<div
|
|
248
250
|
style="
|
|
249
251
|
color: #e01a3d !important;
|
|
@@ -253,7 +255,7 @@ function oe(n){return "code"in n&&"message"in n}var g=class extends Error{type;c
|
|
|
253
255
|
margin-bottom: 10px !important;
|
|
254
256
|
"
|
|
255
257
|
>
|
|
256
|
-
${
|
|
258
|
+
${De}
|
|
257
259
|
Pop-up blocked
|
|
258
260
|
</div>
|
|
259
261
|
<p style="
|
|
@@ -266,7 +268,7 @@ function oe(n){return "code"in n&&"message"in n}var g=class extends Error{type;c
|
|
|
266
268
|
If the problem continues, adjust your<br />
|
|
267
269
|
browser settings.
|
|
268
270
|
</p>
|
|
269
|
-
|
|
271
|
+
`,$t=()=>`
|
|
270
272
|
<p style="
|
|
271
273
|
color: #b6b6b6 !important;
|
|
272
274
|
text-align: center !important;
|
|
@@ -275,7 +277,7 @@ function oe(n){return "code"in n&&"message"in n}var g=class extends Error{type;c
|
|
|
275
277
|
>
|
|
276
278
|
Secure pop-up not showing?<br />We'll help you re-launch
|
|
277
279
|
</p>
|
|
278
|
-
`,
|
|
280
|
+
`,Zt=()=>`
|
|
279
281
|
<button
|
|
280
282
|
id="${V}"
|
|
281
283
|
style="
|
|
@@ -292,9 +294,9 @@ function oe(n){return "code"in n&&"message"in n}var g=class extends Error{type;c
|
|
|
292
294
|
>
|
|
293
295
|
Try again
|
|
294
296
|
</button>
|
|
295
|
-
`,
|
|
297
|
+
`,Le=n=>`
|
|
296
298
|
<div
|
|
297
|
-
id="${
|
|
299
|
+
id="${x}"
|
|
298
300
|
style="
|
|
299
301
|
position: fixed !important;
|
|
300
302
|
top: 0 !important;
|
|
@@ -317,7 +319,7 @@ function oe(n){return "code"in n&&"message"in n}var g=class extends Error{type;c
|
|
|
317
319
|
z-index: 2147483647 !important;
|
|
318
320
|
"
|
|
319
321
|
>
|
|
320
|
-
${
|
|
322
|
+
${Wt()}
|
|
321
323
|
<div
|
|
322
324
|
style="
|
|
323
325
|
display: flex !important;
|
|
@@ -328,22 +330,22 @@ function oe(n){return "code"in n&&"message"in n}var g=class extends Error{type;c
|
|
|
328
330
|
>
|
|
329
331
|
${Ue}
|
|
330
332
|
${n}
|
|
331
|
-
${
|
|
333
|
+
${Zt()}
|
|
332
334
|
</div>
|
|
333
335
|
</div>
|
|
334
|
-
`;function H({id:n,href:e,rel:t,crossOrigin:r}){let i=`${M}-${n}`;if(!document.getElementById(i)){let a=document.createElement("link");a.id=i,a.href=e,t&&(a.rel=t),r&&(a.crossOrigin=r),document.head.appendChild(a);}}var Le=()=>De(Zt()),Ge=()=>De(Kt());var _=class{disableGenericPopupOverlay;disableBlockedPopupOverlay;overlay;isBlockedOverlay;tryAgainListener;onCloseListener;constructor(e,t=!1){this.disableBlockedPopupOverlay=e.disableBlockedPopupOverlay||!1,this.disableGenericPopupOverlay=e.disableGenericPopupOverlay||!1,this.isBlockedOverlay=t;}append(e,t){this.shouldAppendOverlay()&&(this.appendOverlay(),this.updateTryAgainButton(e),this.updateCloseButton(t));}update(e){this.updateTryAgainButton(e);}remove(){this.overlay&&this.overlay.remove();}shouldAppendOverlay(){return !(this.disableGenericPopupOverlay&&this.disableBlockedPopupOverlay||this.disableGenericPopupOverlay&&!this.isBlockedOverlay||this.disableBlockedPopupOverlay&&this.isBlockedOverlay)}appendOverlay(){if(!this.overlay){H({id:"link-googleapis",href:"https://fonts.googleapis.com"}),H({id:"link-gstatic",href:"https://fonts.gstatic.com",crossOrigin:"anonymous"}),H({id:"link-roboto",href:"https://fonts.googleapis.com/css2?family=Roboto:ital,wght@0,400;0,500;0,700;1,400;1,500;1,700&display=swap",rel:"stylesheet"});let e=document.createElement("div");e.innerHTML=this.isBlockedOverlay?Le():Ge(),document.body.insertAdjacentElement("beforeend",e),this.overlay=e;}}updateTryAgainButton(e){let t=document.getElementById(V);t&&(this.tryAgainListener&&t.removeEventListener("click",this.tryAgainListener),this.tryAgainListener=e,t.addEventListener("click",e));}updateCloseButton(e){let t=document.getElementById(B);t&&(this.onCloseListener&&t.removeEventListener("click",this.onCloseListener),this.onCloseListener=e,t.addEventListener("click",e));}};var W=class{storage;constructor(e,t){this.storage=Jt.createInstance({name:e,driver:t});}get length(){return this.storage.length()}clear(){return this.storage.clear()}getItem(e){return this.storage.getItem(e)}key(e){return this.storage.key(e)}async removeItem(e){await this.storage.removeItem(e);}async setItem(e,t){await this.storage.setItem(e,t);}};var sr={headers:{"Content-Type":"application/x-www-form-urlencoded"}},or="/v2/logout",cr="/im-logged-out",dr="/authorize",lr=n=>n?cr:or,pr=n=>{let{authenticationDomain:e,oidcConfiguration:t}=n,r;n.crossSdkBridgeEnabled&&typeof window<"u"?r=new W("ImmutableSDKPassport",Jt.INDEXEDDB):typeof window<"u"?r=window.localStorage:r=new InMemoryWebStorage;let i=new WebStorageStateStore({store:r}),a=new URL(lr(n.crossSdkBridgeEnabled),e.replace(/^(?:https?:\/\/)?(.*)/,"https://$1"));return a.searchParams.set("client_id",t.clientId),t.logoutRedirectUri&&a.searchParams.set("returnTo",t.logoutRedirectUri),{authority:e,redirect_uri:t.redirectUri,popup_redirect_uri:t.popupRedirectUri||t.redirectUri,client_id:t.clientId,metadata:{authorization_endpoint:`${e}/authorize`,token_endpoint:`${e}/oauth/token`,userinfo_endpoint:`${e}/userinfo`,end_session_endpoint:a.toString(),revocation_endpoint:`${e}/oauth/revoke`},mergeClaimsStrategy:{array:"merge"},automaticSilentRenew:!1,scope:t.scope,userStore:i,revokeTokenTypes:["refresh_token"],extraQueryParams:{...t.audience?{audience:t.audience}:{}}}};function ce(n){return btoa(String.fromCharCode(...new Uint8Array(n))).replace(/\+/g,"-").replace(/\//g,"_").replace(/=/g,"")}async function mr(n){let t=new TextEncoder().encode(n);return await window.crypto.subtle.digest("SHA-256",t)}var N=class n{userManager;deviceCredentialsManager;config;logoutMode;refreshingPromise=null;constructor(e){this.config=e,this.userManager=new UserManager(pr(e)),this.deviceCredentialsManager=new x,this.logoutMode=e.oidcConfiguration.logoutMode||"redirect";}static mapOidcUserToDomainModel=e=>{let t;e.id_token&&(t=Fe(e.id_token)?.passport);let r={expired:e.expired,idToken:e.id_token,accessToken:e.access_token,refreshToken:e.refresh_token,profile:{sub:e.profile.sub,email:e.profile.email,nickname:e.profile.nickname}};return t?.imx_eth_address&&(r.imx={ethAddress:t.imx_eth_address,starkAddress:t.imx_stark_address,userAdminAddress:t.imx_user_admin_address}),t?.zkevm_eth_address&&(r.zkEvm={ethAddress:t?.zkevm_eth_address,userAdminAddress:t?.zkevm_user_admin_address}),r};static mapDeviceTokenResponseToOidcUser=e=>{let t=Fe(e.id_token);return new User({id_token:e.id_token,access_token:e.access_token,refresh_token:e.refresh_token,token_type:e.token_type,profile:{sub:t.sub,iss:t.iss,aud:t.aud,exp:t.exp,iat:t.iat,email:t.email,nickname:t.nickname,passport:t.passport}})};buildExtraQueryParams(e,t){let r={...this.userManager.settings?.extraQueryParams??{},rid:getDetail(Detail.RUNTIME_ID)||"",third_party_a_id:e||""};if(t){if(t.directLoginMethod==="email"){let i=t.email;i&&(r.direct=t.directLoginMethod,r.email=i);}else r.direct=t.directLoginMethod;t.marketingConsentStatus&&(r.marketingConsent=t.marketingConsentStatus);}return r}async loginWithRedirect(e,t){return await this.userManager.clearStaleState(),f(async()=>{let r=this.buildExtraQueryParams(e,t);await this.userManager.signinRedirect({extraQueryParams:r});},"AUTHENTICATION_ERROR")}async login(e,t){return f(async()=>{let r="passportLoginPrompt",i=async()=>{let a=this.buildExtraQueryParams(e,t);return this.userManager.signinPopup({extraQueryParams:a,popupWindowFeatures:{width:410,height:450},popupWindowTarget:r})};return new Promise((a,s)=>{i().then(o=>{a(n.mapOidcUserToDomainModel(o));}).catch(o=>{if(!(o instanceof Error)||o.message!=="Attempted to navigate on a disposed window"){s(o);return}let c=!1,d=new _(this.config.popupOverlayOptions,!0);d.append(async()=>{try{if(c)window.open("",r);else {c=!0;let l=await i();d.remove(),a(n.mapOidcUserToDomainModel(l));}}catch(l){d.remove(),s(l);}},()=>{d.remove(),s(new Error("Popup closed by user"));});});})},"AUTHENTICATION_ERROR")}async getUserOrLogin(){let e=null;try{e=await this.getUser();}catch(t){I.warn("Failed to retrieve a cached user session",t);}return e||this.login()}async loginCallback(){return f(async()=>{let e=await this.userManager.signinCallback();if(e)return n.mapOidcUserToDomainModel(e)},"AUTHENTICATION_ERROR")}async getPKCEAuthorizationUrl(e){let t=ce(window.crypto.getRandomValues(new Uint8Array(32))),r=ce(await mr(t)),i=ce(window.crypto.getRandomValues(new Uint8Array(32))),{redirectUri:a,scope:s,audience:o,clientId:c}=this.config.oidcConfiguration;this.deviceCredentialsManager.savePKCEData({state:i,verifier:t});let d=new URL(dr,this.config.authenticationDomain);if(d.searchParams.set("response_type","code"),d.searchParams.set("code_challenge",r),d.searchParams.set("code_challenge_method","S256"),d.searchParams.set("client_id",c),d.searchParams.set("redirect_uri",a),d.searchParams.set("state",i),s&&d.searchParams.set("scope",s),o&&d.searchParams.set("audience",o),e){if(e.directLoginMethod==="email"){let l=e.email;l&&(d.searchParams.set("direct",e.directLoginMethod),d.searchParams.set("email",l));}else d.searchParams.set("direct",e.directLoginMethod);e.marketingConsentStatus&&d.searchParams.set("marketingConsent",e.marketingConsentStatus);}return d.toString()}async loginWithPKCEFlowCallback(e,t){return f(async()=>{let r=this.deviceCredentialsManager.getPKCEData();if(!r)throw new Error("No code verifier or state for PKCE");if(t!==r.state)throw new Error("Provided state does not match stored state");let i=await this.getPKCEToken(e,r.verifier),a=n.mapDeviceTokenResponseToOidcUser(i),s=n.mapOidcUserToDomainModel(a);return await this.userManager.storeUser(a),s},"AUTHENTICATION_ERROR")}async getPKCEToken(e,t){return (await Et.post(`${this.config.authenticationDomain}/oauth/token`,{client_id:this.config.oidcConfiguration.clientId,grant_type:"authorization_code",code_verifier:t,code:e,redirect_uri:this.config.oidcConfiguration.redirectUri},sr)).data}async storeTokens(e){return f(async()=>{let t=n.mapDeviceTokenResponseToOidcUser(e),r=n.mapOidcUserToDomainModel(t);return await this.userManager.storeUser(t),r},"AUTHENTICATION_ERROR")}async logout(){return f(async()=>{await this.userManager.revokeTokens(["refresh_token"]),this.logoutMode==="silent"?await this.userManager.signoutSilent():await this.userManager.signoutRedirect();},"LOGOUT_ERROR")}async logoutSilentCallback(e){return this.userManager.signoutSilentCallback(e)}async removeUser(){return this.userManager.removeUser()}async getLogoutUrl(){let e=this.userManager.settings?.metadata?.end_session_endpoint;return e||(I.warn("Failed to get logout URL"),null)}forceUserRefreshInBackground(){this.refreshTokenAndUpdatePromise().catch(e=>{I.warn("Failed to refresh user token",e);});}async forceUserRefresh(){return this.refreshTokenAndUpdatePromise().catch(e=>(I.warn("Failed to refresh user token",e),null))}async refreshTokenAndUpdatePromise(){return this.refreshingPromise?this.refreshingPromise:(this.refreshingPromise=new Promise(async(e,t)=>{try{let r=await this.userManager.signinSilent();if(r){e(n.mapOidcUserToDomainModel(r));return}e(null);}catch(r){let i="AUTHENTICATION_ERROR",a="Failed to refresh token",s=!0;if(r instanceof ErrorTimeout?(i="SILENT_LOGIN_ERROR",a=`${a}: ${r.message}`,s=!1):r instanceof ErrorResponse?(i="NOT_LOGGED_IN_ERROR",a=`${a}: ${r.message||r.error_description}`):r instanceof Error?a=`${a}: ${r.message}`:typeof r=="string"&&(a=`${a}: ${r}`),s)try{await this.userManager.removeUser();}catch(o){o instanceof Error&&(a=`${a}: Failed to remove user: ${o.message}`);}t(new g(a,i));}finally{this.refreshingPromise=null;}}),this.refreshingPromise)}async getUser(e=t=>!0){if(this.refreshingPromise){let r=await this.refreshingPromise;return r&&e(r)?r:null}let t=await this.userManager.getUser();if(!t)return null;if(!be(t)){let r=n.mapOidcUserToDomainModel(t);if(r&&e(r))return r}if(t.refresh_token){let r=await this.refreshTokenAndUpdatePromise();if(r&&e(r))return r}return null}async getUserZkEvm(){let e=await this.getUser(k);if(!e)throw new Error("Failed to obtain a User with the required ZkEvm attributes");return e}async getUserImx(){let e=await this.getUser(v);if(!e)throw new Error("Failed to obtain a User with the required IMX attributes");return e}};var h=async(n,e,t=!0,r=!0)=>{let i=trackFlow("passport",e,t);try{return await n(i)}catch(a){throw a instanceof Error?trackError("passport",e,a,{flowId:i.details.flowId}):i.addEvent("errored"),a}finally{r&&i.addEvent("End");}};var He="ETH",U=class n extends AbstractSigner{authManager;magicTeeApiClient;userWallet=null;createWalletPromise=null;constructor(e,t){super(),this.authManager=e,this.magicTeeApiClient=t;}async getUserWallet(){let{userWallet:e}=this;e||(e=await this.createWallet());let t=await this.getUserOrThrow();if(t.profile.sub!==e.userIdentifier&&(e=await this.createWallet()),v(t)&&t.imx.userAdminAddress!==e.walletAddress)throw new g(`Wallet address mismatch.Rollup: IMX, TEE address: ${e.walletAddress}, profile address: ${t.imx.userAdminAddress}`,"WALLET_CONNECTION_ERROR");if(k(t)&&t.zkEvm.userAdminAddress!==e.walletAddress)throw new g(`Wallet address mismatch.Rollup: zkEVM, TEE address: ${e.walletAddress}, profile address: ${t.zkEvm.userAdminAddress}`,"WALLET_CONNECTION_ERROR");return e}async createWallet(){return this.createWalletPromise?this.createWalletPromise:(this.createWalletPromise=new Promise(async(e,t)=>{try{this.userWallet=null;let r=await this.getUserOrThrow(),i=n.getHeaders(r);await h(async a=>{try{let s=performance.now(),o=await this.magicTeeApiClient.walletApi.createWalletV1WalletPost({createWalletRequestModel:{chain:He}},{headers:i});return trackDuration("passport",a.details.flowName,Math.round(performance.now()-s)),this.userWallet={userIdentifier:r.profile.sub,walletAddress:o.data.public_address},e(this.userWallet)}catch(s){let o="Failed to create wallet";return isAxiosError(s)?s.response?o+=` with status ${s.response.status}: ${JSON.stringify(s.response.data)}`:o+=`: ${s.message}`:o+=`: ${s.message}`,t(new Error(o))}},"magicCreateWallet");}catch(r){t(r);}finally{this.createWalletPromise=null;}}),this.createWalletPromise)}async getUserOrThrow(){let e=await this.authManager.getUser();if(!e)throw new g("User has been logged out","NOT_LOGGED_IN_ERROR");return e}static getHeaders(e){if(!e)throw new g("User has been logged out","NOT_LOGGED_IN_ERROR");return {Authorization:`Bearer ${e.idToken}`}}async getAddress(){return (await this.getUserWallet()).walletAddress}async signMessage(e){await this.getUserWallet();let t=e instanceof Uint8Array?`0x${Buffer.from(e).toString("hex")}`:e,r=await this.getUserOrThrow(),i=await n.getHeaders(r);return h(async a=>{try{let s=performance.now(),o=await this.magicTeeApiClient.signOperationsApi.signMessageV1WalletPersonalSignPost({signMessageRequest:{message_base64:Buffer.from(t,"utf-8").toString("base64"),chain:He}},{headers:i});return trackDuration("passport",a.details.flowName,Math.round(performance.now()-s)),o.data.signature}catch(s){let o="Failed to create signature using EOA";throw isAxiosError(s)?s.response?o+=` with status ${s.response.status}: ${JSON.stringify(s.response.data)}`:o+=`: ${s.message}`:o+=`: ${s.message}`,new Error(o)}},"magicPersonalSign")}connect(){throw new Error("Method not implemented.")}signTransaction(){throw new Error("Method not implemented.")}signTypedData(){throw new Error("Method not implemented.")}};var We=async n=>f(async()=>{let e=await generateLegacyStarkPrivateKey(n);return createStarkSigner(e)},"WALLET_CONNECTION_ERROR");async function $e({user:n,starkSigner:e,request:t,exchangesApi:r}){return f(async()=>{let{ethAddress:i}=n.imx,a=t.amount,s=await r.getExchangeSignableTransfer({id:t.transactionID,getSignableTransferRequest:{sender:i,token:convertToSignableToken(t),amount:a,receiver:t.receiver}}),o=await e.getAddress(),{payload_hash:c}=s.data,d=await e.signMessage(c),l={sender_stark_key:s.data.sender_stark_key||o,sender_vault_id:s.data.sender_vault_id,receiver_stark_key:s.data.receiver_stark_key,receiver_vault_id:s.data.receiver_vault_id,asset_id:s.data.asset_id,amount:s.data.amount,nonce:s.data.nonce,expiration_timestamp:s.data.expiration_timestamp,stark_signature:d},m={Authorization:`Bearer ${n.accessToken}`},u=await r.createExchangeTransfer({id:t.transactionID,createTransferRequest:l},{headers:m});return {sent_signature:u?.data.sent_signature,status:u?.data.status?.toString(),time:u?.data.time,transfer_id:u?.data.transfer_id}},"EXCHANGE_TRANSFER_ERROR")}var Ze="ERC721";async function Ke({starkSigner:n,user:e,request:t,ordersApi:r,guardianClient:i}){return f(async()=>{let{ethAddress:a}=e.imx,s=t.sell.type===Ze?"1":t.sell.amount,o=t.buy.type===Ze?"1":t.buy.amount,c={Authorization:`Bearer ${e.accessToken}`},d={user:a,amount_buy:o,token_buy:convertToSignableToken(t.buy),amount_sell:s,token_sell:convertToSignableToken(t.sell),fees:t.fees,split_fees:!0,expiration_timestamp:t.expiration_timestamp},l=await r.getSignableOrder({getSignableOrderRequestV3:d},{headers:c});await i.evaluateImxTransaction({payloadHash:l.data.payload_hash});let{payload_hash:m}=l.data,u=await n.signMessage(m),E=l.data,C={createOrderRequest:{include_fees:!0,fees:t.fees,stark_signature:u,amount_buy:E.amount_buy,amount_sell:E.amount_sell,asset_id_buy:E.asset_id_buy,asset_id_sell:E.asset_id_sell,expiration_timestamp:E.expiration_timestamp,nonce:E.nonce,stark_key:E.stark_key,vault_id_buy:E.vault_id_buy,vault_id_sell:E.vault_id_sell}};return {...(await r.createOrderV3(C,{headers:c})).data}},"CREATE_ORDER_ERROR")}async function Xe({user:n,starkSigner:e,request:t,ordersApi:r,guardianClient:i}){return f(async()=>{let a={order_id:t.order_id},s={Authorization:`Bearer ${n.accessToken}`},o=await r.getSignableCancelOrderV3({getSignableCancelOrderRequest:a},{headers:s});await i.evaluateImxTransaction({payloadHash:o.data.payload_hash});let{payload_hash:c}=o.data,d=await e.signMessage(c),l=await r.cancelOrderV3({id:t.order_id.toString(),cancelOrderRequest:{order_id:t.order_id,stark_signature:d}},{headers:s});return {order_id:l.data.order_id,status:l.data.status}},"CANCEL_ORDER_ERROR")}async function de({ethSigner:n,starkSigner:e,imxApiClients:t},r){return f(async()=>{let[i,a]=await Promise.all([n.getAddress(),e.getAddress()]),s=await t.usersApi.getSignableRegistrationOffchain({getSignableRegistrationRequest:{ether_key:i,stark_key:a}}),{signable_message:o,payload_hash:c}=s.data,[d,l]=await Promise.all([signRaw(o,n),e.signMessage(c)]);return (await t.usersApi.registerPassportUserV2({authorization:`Bearer ${r}`,registerPassportUserRequest:{eth_signature:d,ether_key:i,stark_signature:l,stark_key:a}})).data},"USER_REGISTRATION_ERROR")}async function Je({request:n,tradesApi:e,user:t,starkSigner:r,guardianClient:i}){return f(async()=>{let{ethAddress:a}=t.imx,s={expiration_timestamp:n.expiration_timestamp,fees:n.fees,order_id:n.order_id,user:a},o={Authorization:`Bearer ${t.accessToken}`},c=await e.getSignableTrade({getSignableTradeRequest:s},{headers:o});await i.evaluateImxTransaction({payloadHash:c.data.payload_hash});let{payload_hash:d}=c.data,l=await r.signMessage(d),{data:m}=c,u={createTradeRequest:{include_fees:!0,fees:n?.fees,stark_signature:l,order_id:n?.order_id,fee_info:m.fee_info,amount_buy:m.amount_buy,amount_sell:m.amount_sell,asset_id_buy:m.asset_id_buy,asset_id_sell:m.asset_id_sell,expiration_timestamp:m.expiration_timestamp,nonce:m.nonce,stark_key:m.stark_key,vault_id_buy:m.vault_id_buy,vault_id_sell:m.vault_id_sell}},{data:E}=await e.createTradeV3(u,{headers:o});return E},"CREATE_TRADE_ERROR")}var je="ERC721";async function Ye({request:n,transfersApi:e,starkSigner:t,user:r,guardianClient:i}){return f(async()=>{let a=n.type===je?"1":n.amount,s={sender:r.imx.ethAddress,token:convertToSignableToken(n),amount:a,receiver:n.receiver},o={Authorization:`Bearer ${r.accessToken}`},c=await e.getSignableTransferV1({getSignableTransferRequest:s},{headers:o});await i.evaluateImxTransaction({payloadHash:c.data.payload_hash});let d=c.data,{payload_hash:l}=d,m=await t.signMessage(l),u=await t.getAddress(),C={createTransferRequest:{sender_stark_key:d.sender_stark_key||u,sender_vault_id:d.sender_vault_id,receiver_stark_key:d.receiver_stark_key,receiver_vault_id:d.receiver_vault_id,asset_id:d.asset_id,amount:d.amount,nonce:d.nonce,expiration_timestamp:d.expiration_timestamp,stark_signature:m}},{data:R}=await e.createTransferV1(C,{headers:o});return {sent_signature:R.sent_signature,status:R.status?.toString(),time:R.time,transfer_id:R.transfer_id}},"TRANSFER_ERROR")}async function Qe({user:n,starkSigner:e,request:t,transfersApi:r,guardianClient:i}){return f(async()=>{let{ethAddress:a}=n.imx,s=t.map(u=>({amount:"1",token:convertToSignableToken({type:je,tokenId:u.tokenId,tokenAddress:u.tokenAddress}),receiver:u.receiver})),o={Authorization:`Bearer ${n.accessToken}`},c=await r.getSignableTransfer({getSignableTransferRequestV2:{sender_ether_key:a,signable_requests:s}},{headers:o});await i.evaluateImxTransaction({payloadHash:c.data.signable_responses[0]?.payload_hash});let d=await Promise.all(c.data.signable_responses.map(async u=>{let E=await e.signMessage(u.payload_hash);return {sender_vault_id:u.sender_vault_id,receiver_stark_key:u.receiver_stark_key,receiver_vault_id:u.receiver_vault_id,asset_id:u.asset_id,amount:u.amount,nonce:u.nonce,expiration_timestamp:u.expiration_timestamp,stark_signature:E}})),l={sender_stark_key:c.data.sender_stark_key,requests:d};return {transfer_ids:(await r.createTransfer({createTransferRequestV2:l},{headers:o}))?.data.transfer_ids}},"TRANSFER_ERROR")}var Tr=n=>new Promise(e=>{setTimeout(()=>e(),n);}),S=async(n,e)=>{let{retries:t=3,interval:r=1e3,finalErr:i=Error("Retry failed"),finallyFn:a=()=>{}}=e||{};try{return await n()}catch{return t<=0?Promise.reject(i):(await Tr(r),S(n,{retries:t-1,finalErr:i,finallyFn:a}))}finally{t<=0&&a();}};async function et(n){await S(async()=>{let e=await n.forceUserRefresh();return e?.imx?e:Promise.reject(new Error("user wallet addresses not exist"))});}async function le(n,e,t,r,i){return f(async()=>{try{let a=await de({ethSigner:n,starkSigner:e,imxApiClients:i},t.accessToken);return await et(r),a}catch(a){if(Et.isAxiosError(a)&&a.response?.status===409)return await et(r),{tx_hash:""};throw a}},"USER_REGISTRATION_ERROR")}var $=class{authManager;immutableXClient;guardianClient;imxApiClients;magicTEESigner;starkSigner;signerInitialisationError;constructor({authManager:e,immutableXClient:t,passportEventEmitter:r,magicTEESigner:i,imxApiClients:a,guardianClient:s}){this.authManager=e,this.immutableXClient=t,this.magicTEESigner=i,this.imxApiClients=a,this.guardianClient=s,this.#t(),r.on("loggedOut",this.handleLogout);}handleLogout=()=>{this.starkSigner=void 0;};#t(){this.starkSigner=new Promise(async e=>{try{e(await We(this.magicTEESigner));}catch(t){this.signerInitialisationError=t,e(void 0);}});}async#r(){let e=await this.authManager.getUser();if(!e||!this.starkSigner)throw new g("User has been logged out","NOT_LOGGED_IN_ERROR");return e}async#a(){let e=await this.starkSigner;if(typeof e>"u")throw typeof this.signerInitialisationError<"u"?this.signerInitialisationError:new Error("Signers failed to initialise");return e}async#n(){let[e,t]=await Promise.all([this.#r(),this.#a()]);if(!v(e))throw new g("User has not been registered with StarkEx","USER_NOT_REGISTERED_ERROR");return {user:e,starkSigner:t}}async transfer(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#n();return Ye({request:e,user:t,starkSigner:r,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.guardianClient})})(),"imxTransfer")}async registerOffchain(){return h(async()=>{let[e,t]=await Promise.all([this.#r(),this.#a()]);return await le(this.magicTEESigner,t,e,this.authManager,this.imxApiClients)},"imxRegisterOffchain")}async isRegisteredOffchain(){return h(async()=>!!(await this.#r()).imx,"imxIsRegisteredOffchain")}isRegisteredOnchain(){throw new g("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async createOrder(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#n();return Ke({request:e,user:t,starkSigner:r,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.guardianClient})})(),"imxCreateOrder")}async cancelOrder(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#n();return Xe({request:e,user:t,starkSigner:r,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.guardianClient})})(),"imxCancelOrder")}async createTrade(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#n();return Je({request:e,user:t,starkSigner:r,tradesApi:this.immutableXClient.tradesApi,guardianClient:this.guardianClient})})(),"imxCreateTrade")}async batchNftTransfer(e){return h(()=>this.guardianClient.withConfirmationScreenTask({width:480,height:784})(async()=>{let{user:t,starkSigner:r}=await this.#n();return Qe({request:e,user:t,starkSigner:r,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.guardianClient})})(),"imxBatchNftTransfer")}async exchangeTransfer(e){return h(async()=>{let{user:t,starkSigner:r}=await this.#n();return $e({request:e,user:t,starkSigner:r,exchangesApi:this.immutableXClient.exchangeApi})},"imxExchangeTransfer")}deposit(e){throw new g("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}prepareWithdrawal(e){throw new g("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}completeWithdrawal(e,t){throw new g("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async getAddress(){return h(async()=>{let e=await this.#r();if(!v(e))throw new g("User has not been registered with StarkEx","USER_NOT_REGISTERED_ERROR");return Promise.resolve(e.imx.ethAddress)},"imxGetAddress")}};var q=class{authManager;immutableXClient;magicTEESigner;passportEventEmitter;imxApiClients;guardianClient;constructor({authManager:e,immutableXClient:t,magicTEESigner:r,passportEventEmitter:i,imxApiClients:a,guardianClient:s}){this.authManager=e,this.immutableXClient=t,this.magicTEESigner=r,this.passportEventEmitter=i,this.imxApiClients=a,this.guardianClient=s;}async getProvider(){let e=await this.authManager.getUserOrLogin();return this.createProviderInstance(e)}async getProviderSilent(){let e=await this.authManager.getUser();return e?this.createProviderInstance(e):null}async createProviderInstance(e){if(!e.idToken)throw new g("Failed to initialise","WALLET_CONNECTION_ERROR");return new $({authManager:this.authManager,immutableXClient:this.immutableXClient,passportEventEmitter:this.passportEventEmitter,magicTEESigner:this.magicTEESigner,imxApiClients:this.imxApiClients,guardianClient:this.guardianClient})}};var it=(n,e,t)=>{let r=e.map(i=>!n[i]&&i).filter(i=>i).join(", ");if(r!==""){let i=t?`${t} - ${r} cannot be null`:`${r} cannot be null`;throw new g(i,"INVALID_CONFIGURATION")}},Z=class{authenticationDomain;passportDomain;imxPublicApiDomain;magicPublishableApiKey;magicProviderId;magicTeeBasePath="https://tee.express.magiclabs.com";magicTeeTimeout=6e3;oidcConfiguration;baseConfig;zkEvmRpcUrl;relayerUrl;multiRollupConfig;crossSdkBridgeEnabled;forceScwDeployBeforeMessageSignature;popupOverlayOptions;constructor({baseConfig:e,overrides:t,crossSdkBridgeEnabled:r,jsonRpcReferrer:i,forceScwDeployBeforeMessageSignature:a,popupOverlayOptions:s,...o}){if(it(o,["clientId","redirectUri"]),this.oidcConfiguration=o,this.baseConfig=e,this.crossSdkBridgeEnabled=r||!1,this.forceScwDeployBeforeMessageSignature=a||!1,this.popupOverlayOptions=s||{disableGenericPopupOverlay:!1,disableBlockedPopupOverlay:!1},t)it(t,["authenticationDomain","passportDomain","magicPublishableApiKey","magicProviderId","zkEvmRpcUrl","relayerUrl","imxPublicApiDomain","indexerMrBasePath","orderBookMrBasePath","passportMrBasePath"],"overrides"),this.authenticationDomain=t.authenticationDomain,this.passportDomain=t.passportDomain,this.imxPublicApiDomain=t.imxPublicApiDomain,this.magicPublishableApiKey=t.magicPublishableApiKey,this.magicProviderId=t.magicProviderId,this.zkEvmRpcUrl=t.zkEvmRpcUrl,this.relayerUrl=t.relayerUrl,this.multiRollupConfig={indexer:createConfig({basePath:t.indexerMrBasePath}),orderBook:createConfig({basePath:t.orderBookMrBasePath}),passport:createConfig({basePath:t.passportMrBasePath})};else switch(e.environment){case Environment.PRODUCTION:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="fSMzaRQ4O7p4fttl7pCyGVtJS_G70P8SNsLXtPPGHo0=",this.passportDomain="https://passport.immutable.com",this.imxPublicApiDomain="https://api.immutable.com",this.zkEvmRpcUrl="https://rpc.immutable.com",this.relayerUrl="https://api.immutable.com/relayer-mr",this.multiRollupConfig=multiRollupConfig.getProduction();break}case Environment.SANDBOX:default:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="fSMzaRQ4O7p4fttl7pCyGVtJS_G70P8SNsLXtPPGHo0=",this.passportDomain="https://passport.sandbox.immutable.com",this.imxPublicApiDomain="https://api.sandbox.immutable.com",this.zkEvmRpcUrl="https://rpc.testnet.immutable.com",this.relayerUrl="https://api.sandbox.immutable.com/relayer-mr",this.multiRollupConfig=multiRollupConfig.getSandbox();break}}}};var D="imx_passport_confirmation";var K=({url:n,title:e,width:t,height:r})=>{let i=Math.max(0,Math.round(window.screenX+(window.outerWidth-t)/2)),a=Math.max(0,Math.round(window.screenY+(window.outerHeight-r)/2)),s=window.open(n,e,`
|
|
336
|
+
`;function H({id:n,href:e,rel:t,crossOrigin:r}){let i=`${x}-${n}`;if(!document.getElementById(i)){let a=document.createElement("link");a.id=i,a.href=e,t&&(a.rel=t),r&&(a.crossOrigin=r),document.head.appendChild(a);}}var Ge=()=>Le(qt()),Fe=()=>Le($t());var w=class{disableGenericPopupOverlay;disableBlockedPopupOverlay;overlay;isBlockedOverlay;tryAgainListener;onCloseListener;constructor(e,t=!1){this.disableBlockedPopupOverlay=e.disableBlockedPopupOverlay||!1,this.disableGenericPopupOverlay=e.disableGenericPopupOverlay||!1,this.isBlockedOverlay=t;}append(e,t){this.shouldAppendOverlay()&&(this.appendOverlay(),this.updateTryAgainButton(e),this.updateCloseButton(t));}update(e){this.updateTryAgainButton(e);}remove(){this.overlay&&this.overlay.remove();}shouldAppendOverlay(){return !(this.disableGenericPopupOverlay&&this.disableBlockedPopupOverlay||this.disableGenericPopupOverlay&&!this.isBlockedOverlay||this.disableBlockedPopupOverlay&&this.isBlockedOverlay)}appendOverlay(){if(!this.overlay){H({id:"link-googleapis",href:"https://fonts.googleapis.com"}),H({id:"link-gstatic",href:"https://fonts.gstatic.com",crossOrigin:"anonymous"}),H({id:"link-roboto",href:"https://fonts.googleapis.com/css2?family=Roboto:ital,wght@0,400;0,500;0,700;1,400;1,500;1,700&display=swap",rel:"stylesheet"});let e=document.createElement("div");e.innerHTML=this.isBlockedOverlay?Ge():Fe(),document.body.insertAdjacentElement("beforeend",e),this.overlay=e;}}updateTryAgainButton(e){let t=document.getElementById(V);t&&(this.tryAgainListener&&t.removeEventListener("click",this.tryAgainListener),this.tryAgainListener=e,t.addEventListener("click",e));}updateCloseButton(e){let t=document.getElementById(B);t&&(this.onCloseListener&&t.removeEventListener("click",this.onCloseListener),this.onCloseListener=e,t.addEventListener("click",e));}};var W=class{storage;constructor(e,t){this.storage=Kt.createInstance({name:e,driver:t});}get length(){return this.storage.length()}clear(){return this.storage.clear()}getItem(e){return this.storage.getItem(e)}key(e){return this.storage.key(e)}async removeItem(e){await this.storage.removeItem(e);}async setItem(e,t){await this.storage.setItem(e,t);}};var ir=500,ar={headers:{"Content-Type":"application/x-www-form-urlencoded"}},sr="/v2/logout",or="/im-logged-out",cr="/authorize",dr=n=>n?or:sr,lr=n=>{let{authenticationDomain:e,oidcConfiguration:t}=n,r;n.crossSdkBridgeEnabled?r=new W("ImmutableSDKPassport",Kt.INDEXEDDB):typeof window<"u"?r=window.localStorage:r=new InMemoryWebStorage;let i=new WebStorageStateStore({store:r}),a=new URL(dr(n.crossSdkBridgeEnabled),e.replace(/^(?:https?:\/\/)?(.*)/,"https://$1"));return a.searchParams.set("client_id",t.clientId),t.logoutRedirectUri&&a.searchParams.set("returnTo",t.logoutRedirectUri),{authority:e,redirect_uri:t.redirectUri,popup_redirect_uri:t.popupRedirectUri||t.redirectUri,client_id:t.clientId,metadata:{authorization_endpoint:`${e}/authorize`,token_endpoint:`${e}/oauth/token`,userinfo_endpoint:`${e}/userinfo`,end_session_endpoint:a.toString(),revocation_endpoint:`${e}/oauth/revoke`},mergeClaimsStrategy:{array:"merge"},automaticSilentRenew:!1,scope:t.scope,userStore:i,revokeTokenTypes:["refresh_token"],extraQueryParams:{...t.audience?{audience:t.audience}:{}}}};function de(n){return btoa(String.fromCharCode(...new Uint8Array(n))).replace(/\+/g,"-").replace(/\//g,"_").replace(/=/g,"")}async function pr(n){let t=new TextEncoder().encode(n);return await window.crypto.subtle.digest("SHA-256",t)}var M=class n{userManager;deviceCredentialsManager;config;logoutMode;refreshingPromise=null;constructor(e){this.config=e,this.userManager=new UserManager(lr(e)),this.deviceCredentialsManager=new b,this.logoutMode=e.oidcConfiguration.logoutMode||"redirect";}static mapOidcUserToDomainModel=e=>{let t;e.id_token&&(t=Be(e.id_token)?.passport);let r={expired:e.expired,idToken:e.id_token,accessToken:e.access_token,refreshToken:e.refresh_token,profile:{sub:e.profile.sub,email:e.profile.email,nickname:e.profile.nickname}};return t?.imx_eth_address&&(r.imx={ethAddress:t.imx_eth_address,starkAddress:t.imx_stark_address,userAdminAddress:t.imx_user_admin_address}),t?.zkevm_eth_address&&(r.zkEvm={ethAddress:t?.zkevm_eth_address,userAdminAddress:t?.zkevm_user_admin_address}),r};static mapDeviceTokenResponseToOidcUser=e=>{let t=Be(e.id_token);return new User({id_token:e.id_token,access_token:e.access_token,refresh_token:e.refresh_token,token_type:e.token_type,profile:{sub:t.sub,iss:t.iss,aud:t.aud,exp:t.exp,iat:t.iat,email:t.email,nickname:t.nickname,passport:t.passport}})};buildExtraQueryParams(e,t){let r={...this.userManager.settings?.extraQueryParams??{},rid:getDetail(Detail.RUNTIME_ID)||"",third_party_a_id:e||""};if(t){if(t.directLoginMethod==="email"){let i=t.email;i&&(r.direct=t.directLoginMethod,r.email=i);}else r.direct=t.directLoginMethod;t.marketingConsentStatus&&(r.marketingConsent=t.marketingConsentStatus);}return r}async loginWithRedirect(e,t){return await this.userManager.clearStaleState(),f(async()=>{let r=this.buildExtraQueryParams(e,t);await this.userManager.signinRedirect({extraQueryParams:r});},"AUTHENTICATION_ERROR")}async login(e,t){return f(async()=>{let r="passportLoginPrompt",i=async()=>{let a=this.buildExtraQueryParams(e,t),s=this.userManager.signinPopup({extraQueryParams:a,popupWindowFeatures:{width:410,height:450},popupWindowTarget:r}),o=window.open("",r);if(o){let c=new Promise((d,l)=>{let p=setInterval(()=>{o.closed&&(clearInterval(p),l(new Error("Popup closed by user")));},ir);s.finally(()=>{clearInterval(p),o.close();});});return Promise.race([s,c])}return s};return new Promise((a,s)=>{i().then(o=>{a(n.mapOidcUserToDomainModel(o));}).catch(o=>{if(!(o instanceof Error)||o.message!=="Attempted to navigate on a disposed window"){s(o);return}let c=!1,d=new w(this.config.popupOverlayOptions,!0);d.append(async()=>{try{if(c)window.open("",r);else {c=!0;let l=await i();d.remove(),a(n.mapOidcUserToDomainModel(l));}}catch(l){d.remove(),s(l);}},()=>{d.remove(),s(new Error("Popup closed by user"));});});})},"AUTHENTICATION_ERROR")}async getUserOrLogin(){let e=null;try{e=await this.getUser();}catch(t){A.warn("Failed to retrieve a cached user session",t);}return e||this.login()}static shouldUseSigninPopupCallback(){try{let r=`oidc.${new URLSearchParams(window.location.search).get("state")}`,i=localStorage.getItem(r);return JSON.parse(i||"{}")?.request_type==="si:p"}catch{return !1}}async loginCallback(){return f(async()=>{if(n.shouldUseSigninPopupCallback()){await this.userManager.signinPopupCallback(void 0,!0);return}let e=await this.userManager.signinCallback();if(e)return n.mapOidcUserToDomainModel(e)},"AUTHENTICATION_ERROR")}async getPKCEAuthorizationUrl(e){let t=de(window.crypto.getRandomValues(new Uint8Array(32))),r=de(await pr(t)),i=de(window.crypto.getRandomValues(new Uint8Array(32))),{redirectUri:a,scope:s,audience:o,clientId:c}=this.config.oidcConfiguration;this.deviceCredentialsManager.savePKCEData({state:i,verifier:t});let d=new URL(cr,this.config.authenticationDomain);if(d.searchParams.set("response_type","code"),d.searchParams.set("code_challenge",r),d.searchParams.set("code_challenge_method","S256"),d.searchParams.set("client_id",c),d.searchParams.set("redirect_uri",a),d.searchParams.set("state",i),s&&d.searchParams.set("scope",s),o&&d.searchParams.set("audience",o),e){if(e.directLoginMethod==="email"){let l=e.email;l&&(d.searchParams.set("direct",e.directLoginMethod),d.searchParams.set("email",l));}else d.searchParams.set("direct",e.directLoginMethod);e.marketingConsentStatus&&d.searchParams.set("marketingConsent",e.marketingConsentStatus);}return d.toString()}async loginWithPKCEFlowCallback(e,t){return f(async()=>{let r=this.deviceCredentialsManager.getPKCEData();if(!r)throw new Error("No code verifier or state for PKCE");if(t!==r.state)throw new Error("Provided state does not match stored state");let i=await this.getPKCEToken(e,r.verifier),a=n.mapDeviceTokenResponseToOidcUser(i),s=n.mapOidcUserToDomainModel(a);return await this.userManager.storeUser(a),s},"AUTHENTICATION_ERROR")}async getPKCEToken(e,t){return (await ht.post(`${this.config.authenticationDomain}/oauth/token`,{client_id:this.config.oidcConfiguration.clientId,grant_type:"authorization_code",code_verifier:t,code:e,redirect_uri:this.config.oidcConfiguration.redirectUri},ar)).data}async storeTokens(e){return f(async()=>{let t=n.mapDeviceTokenResponseToOidcUser(e),r=n.mapOidcUserToDomainModel(t);return await this.userManager.storeUser(t),r},"AUTHENTICATION_ERROR")}async logout(){return f(async()=>{await this.userManager.revokeTokens(["refresh_token"]),this.logoutMode==="silent"?await this.userManager.signoutSilent():await this.userManager.signoutRedirect();},"LOGOUT_ERROR")}async logoutSilentCallback(e){return this.userManager.signoutSilentCallback(e)}async removeUser(){return this.userManager.removeUser()}async getLogoutUrl(){let e=this.userManager.settings?.metadata?.end_session_endpoint;return e||(A.warn("Failed to get logout URL"),null)}forceUserRefreshInBackground(){this.refreshTokenAndUpdatePromise().catch(e=>{A.warn("Failed to refresh user token",e);});}async forceUserRefresh(){return this.refreshTokenAndUpdatePromise().catch(e=>(A.warn("Failed to refresh user token",e),null))}async refreshTokenAndUpdatePromise(){return this.refreshingPromise?this.refreshingPromise:(this.refreshingPromise=new Promise(async(e,t)=>{try{let r=await this.userManager.signinSilent();if(r){e(n.mapOidcUserToDomainModel(r));return}e(null);}catch(r){let i="AUTHENTICATION_ERROR",a="Failed to refresh token",s=!0;if(r instanceof ErrorTimeout?(i="SILENT_LOGIN_ERROR",a=`${a}: ${r.message}`,s=!1):r instanceof ErrorResponse?(i="NOT_LOGGED_IN_ERROR",a=`${a}: ${r.message||r.error_description}`):r instanceof Error?a=`${a}: ${r.message}`:typeof r=="string"&&(a=`${a}: ${r}`),s)try{await this.userManager.removeUser();}catch(o){o instanceof Error&&(a=`${a}: Failed to remove user: ${o.message}`);}t(new g(a,i));}finally{this.refreshingPromise=null;}}),this.refreshingPromise)}async getUser(e=t=>!0){if(this.refreshingPromise){let r=await this.refreshingPromise;return r&&e(r)?r:null}let t=await this.userManager.getUser();if(!t)return null;if(!xe(t)){let r=n.mapOidcUserToDomainModel(t);if(r&&e(r))return r}if(t.refresh_token){let r=await this.refreshTokenAndUpdatePromise();if(r&&e(r))return r}return null}async getUserZkEvm(){let e=await this.getUser(F);if(!e)throw new Error("Failed to obtain a User with the required ZkEvm attributes");return e}async getUserImx(){let e=await this.getUser(I);if(!e)throw new Error("Failed to obtain a User with the required IMX attributes");return e}};var h=async(n,e,t=!0,r=!0)=>{let i=trackFlow("passport",e,t);try{return await n(i)}catch(a){throw a instanceof Error?trackError("passport",e,a,{flowId:i.details.flowId}):i.addEvent("errored"),a}finally{r&&i.addEvent("End");}};var Er="mainnet",N=class{config;magicProviderProxyFactory;magicClient;constructor(e,t){this.config=e,this.magicProviderProxyFactory=t,typeof window<"u"&&(this.magicClient=new Magic(this.config.magicPublishableApiKey,{extensions:[new OpenIdExtension],network:Er}));}getMagicClient(){if(!this.magicClient)throw new Error("Cannot perform this action outside of the browser");return this.magicClient}async login(e){return f(async()=>h(async t=>{let r=performance.now(),i=this.getMagicClient();return t.addEvent("endMagicClientInit"),await i.openid.loginWithOIDC({jwt:e,providerId:this.config.magicProviderId}),t.addEvent("endLoginWithOIDC"),trackDuration("passport",t.details.flowName,Math.round(performance.now()-r)),this.magicProviderProxyFactory.createProxy(i)},"magicLogin"),"WALLET_CONNECTION_ERROR")}async logout(){let e=this.getMagicClient();e.user&&await e.user.logout();}};var Ve=async n=>f(async()=>{let e=await generateLegacyStarkPrivateKey(n);return createStarkSigner(e)},"WALLET_CONNECTION_ERROR");async function He({user:n,starkSigner:e,request:t,exchangesApi:r}){return f(async()=>{let{ethAddress:i}=n.imx,a=t.amount,s=await r.getExchangeSignableTransfer({id:t.transactionID,getSignableTransferRequest:{sender:i,token:convertToSignableToken(t),amount:a,receiver:t.receiver}}),o=await e.getAddress(),{payload_hash:c}=s.data,d=await e.signMessage(c),l={sender_stark_key:s.data.sender_stark_key||o,sender_vault_id:s.data.sender_vault_id,receiver_stark_key:s.data.receiver_stark_key,receiver_vault_id:s.data.receiver_vault_id,asset_id:s.data.asset_id,amount:s.data.amount,nonce:s.data.nonce,expiration_timestamp:s.data.expiration_timestamp,stark_signature:d},p={Authorization:`Bearer ${n.accessToken}`},u=await r.createExchangeTransfer({id:t.transactionID,createTransferRequest:l},{headers:p});return {sent_signature:u?.data.sent_signature,status:u?.data.status?.toString(),time:u?.data.time,transfer_id:u?.data.transfer_id}},"EXCHANGE_TRANSFER_ERROR")}var qe="ERC721";async function $e({starkSigner:n,user:e,request:t,ordersApi:r,guardianClient:i}){return f(async()=>{let{ethAddress:a}=e.imx,s=t.sell.type===qe?"1":t.sell.amount,o=t.buy.type===qe?"1":t.buy.amount,c={Authorization:`Bearer ${e.accessToken}`},d={user:a,amount_buy:o,token_buy:convertToSignableToken(t.buy),amount_sell:s,token_sell:convertToSignableToken(t.sell),fees:t.fees,split_fees:!0,expiration_timestamp:t.expiration_timestamp},l=await r.getSignableOrder({getSignableOrderRequestV3:d},{headers:c});await i.evaluateImxTransaction({payloadHash:l.data.payload_hash});let{payload_hash:p}=l.data,u=await n.signMessage(p),E=l.data,R={createOrderRequest:{include_fees:!0,fees:t.fees,stark_signature:u,amount_buy:E.amount_buy,amount_sell:E.amount_sell,asset_id_buy:E.asset_id_buy,asset_id_sell:E.asset_id_sell,expiration_timestamp:E.expiration_timestamp,nonce:E.nonce,stark_key:E.stark_key,vault_id_buy:E.vault_id_buy,vault_id_sell:E.vault_id_sell}};return {...(await r.createOrderV3(R,{headers:c})).data}},"CREATE_ORDER_ERROR")}async function Ze({user:n,starkSigner:e,request:t,ordersApi:r,guardianClient:i}){return f(async()=>{let a={order_id:t.order_id},s={Authorization:`Bearer ${n.accessToken}`},o=await r.getSignableCancelOrderV3({getSignableCancelOrderRequest:a},{headers:s});await i.evaluateImxTransaction({payloadHash:o.data.payload_hash});let{payload_hash:c}=o.data,d=await e.signMessage(c),l=await r.cancelOrderV3({id:t.order_id.toString(),cancelOrderRequest:{order_id:t.order_id,stark_signature:d}},{headers:s});return {order_id:l.data.order_id,status:l.data.status}},"CANCEL_ORDER_ERROR")}async function le({ethSigner:n,starkSigner:e,imxApiClients:t},r){return f(async()=>{let[i,a]=await Promise.all([n.getAddress(),e.getAddress()]),s=await t.usersApi.getSignableRegistrationOffchain({getSignableRegistrationRequest:{ether_key:i,stark_key:a}}),{signable_message:o,payload_hash:c}=s.data,[d,l]=await Promise.all([signRaw(o,n),e.signMessage(c)]);return (await t.usersApi.registerPassportUserV2({authorization:`Bearer ${r}`,registerPassportUserRequest:{eth_signature:d,ether_key:i,stark_signature:l,stark_key:a}})).data},"USER_REGISTRATION_ERROR")}async function Ke({request:n,tradesApi:e,user:t,starkSigner:r,guardianClient:i}){return f(async()=>{let{ethAddress:a}=t.imx,s={expiration_timestamp:n.expiration_timestamp,fees:n.fees,order_id:n.order_id,user:a},o={Authorization:`Bearer ${t.accessToken}`},c=await e.getSignableTrade({getSignableTradeRequest:s},{headers:o});await i.evaluateImxTransaction({payloadHash:c.data.payload_hash});let{payload_hash:d}=c.data,l=await r.signMessage(d),{data:p}=c,u={createTradeRequest:{include_fees:!0,fees:n?.fees,stark_signature:l,order_id:n?.order_id,fee_info:p.fee_info,amount_buy:p.amount_buy,amount_sell:p.amount_sell,asset_id_buy:p.asset_id_buy,asset_id_sell:p.asset_id_sell,expiration_timestamp:p.expiration_timestamp,nonce:p.nonce,stark_key:p.stark_key,vault_id_buy:p.vault_id_buy,vault_id_sell:p.vault_id_sell}},{data:E}=await e.createTradeV3(u,{headers:o});return E},"CREATE_TRADE_ERROR")}var Je="ERC721";async function ze({request:n,transfersApi:e,starkSigner:t,user:r,guardianClient:i}){return f(async()=>{let a=n.type===Je?"1":n.amount,s={sender:r.imx.ethAddress,token:convertToSignableToken(n),amount:a,receiver:n.receiver},o={Authorization:`Bearer ${r.accessToken}`},c=await e.getSignableTransferV1({getSignableTransferRequest:s},{headers:o});await i.evaluateImxTransaction({payloadHash:c.data.payload_hash});let d=c.data,{payload_hash:l}=d,p=await t.signMessage(l),u=await t.getAddress(),R={createTransferRequest:{sender_stark_key:d.sender_stark_key||u,sender_vault_id:d.sender_vault_id,receiver_stark_key:d.receiver_stark_key,receiver_vault_id:d.receiver_vault_id,asset_id:d.asset_id,amount:d.amount,nonce:d.nonce,expiration_timestamp:d.expiration_timestamp,stark_signature:p}},{data:y}=await e.createTransferV1(R,{headers:o});return {sent_signature:y.sent_signature,status:y.status?.toString(),time:y.time,transfer_id:y.transfer_id}},"TRANSFER_ERROR")}async function je({user:n,starkSigner:e,request:t,transfersApi:r,guardianClient:i}){return f(async()=>{let{ethAddress:a}=n.imx,s=t.map(u=>({amount:"1",token:convertToSignableToken({type:Je,tokenId:u.tokenId,tokenAddress:u.tokenAddress}),receiver:u.receiver})),o={Authorization:`Bearer ${n.accessToken}`},c=await r.getSignableTransfer({getSignableTransferRequestV2:{sender_ether_key:a,signable_requests:s}},{headers:o});await i.evaluateImxTransaction({payloadHash:c.data.signable_responses[0]?.payload_hash});let d=await Promise.all(c.data.signable_responses.map(async u=>{let E=await e.signMessage(u.payload_hash);return {sender_vault_id:u.sender_vault_id,receiver_stark_key:u.receiver_stark_key,receiver_vault_id:u.receiver_vault_id,asset_id:u.asset_id,amount:u.amount,nonce:u.nonce,expiration_timestamp:u.expiration_timestamp,stark_signature:E}})),l={sender_stark_key:c.data.sender_stark_key,requests:d};return {transfer_ids:(await r.createTransfer({createTransferRequestV2:l},{headers:o}))?.data.transfer_ids}},"TRANSFER_ERROR")}var wr=n=>new Promise(e=>{setTimeout(()=>e(),n);}),S=async(n,e)=>{let{retries:t=3,interval:r=1e3,finalErr:i=Error("Retry failed"),finallyFn:a=()=>{}}=e||{};try{return await n()}catch{return t<=0?Promise.reject(i):(await wr(r),S(n,{retries:t-1,finalErr:i,finallyFn:a}))}finally{t<=0&&a();}};async function Ye(n){await S(async()=>{let e=await n.forceUserRefresh();return e?.imx?e:Promise.reject(new Error("user wallet addresses not exist"))});}async function pe(n,e,t,r,i){return f(async()=>{try{let a=await le({ethSigner:n,starkSigner:e,imxApiClients:i},t.accessToken);return await Ye(r),a}catch(a){if(ht.isAxiosError(a)&&a.response?.status===409)return await Ye(r),{tx_hash:""};throw a}},"USER_REGISTRATION_ERROR")}var q=class{authManager;immutableXClient;guardianClient;imxApiClients;magicAdapter;signers;signerInitialisationError;constructor({authManager:e,immutableXClient:t,passportEventEmitter:r,magicAdapter:i,imxApiClients:a,guardianClient:s}){this.authManager=e,this.immutableXClient=t,this.magicAdapter=i,this.imxApiClients=a,this.guardianClient=s,this.#e(),r.on("loggedOut",this.handleLogout);}handleLogout=()=>{this.signers=void 0;};#e(){let e=async()=>{let t=await this.authManager.getUser(),r=await this.magicAdapter.login(t.idToken),a=await new BrowserProvider(r).getSigner(),s=await Ve(a);return {ethSigner:a,starkSigner:s}};this.signers=new Promise(async t=>{try{t(await e());}catch(r){this.signerInitialisationError=r,t(void 0);}});}async#r(){let e=await this.authManager.getUser();if(!e||!this.signers)throw new g("User has been logged out","NOT_LOGGED_IN_ERROR");return e}async#a(){let e=await this.signers;if(typeof e>"u")throw typeof this.signerInitialisationError<"u"?this.signerInitialisationError:new Error("Signers failed to initialise");return e}async#n(){let[e,t]=await Promise.all([this.#r(),this.#a()]);if(!I(e))throw new g("User has not been registered with StarkEx","USER_NOT_REGISTERED_ERROR");return {user:e,starkSigner:t.starkSigner,ethSigner:t.ethSigner}}async transfer(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#n();return ze({request:e,user:t,starkSigner:r,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.guardianClient})})(),"imxTransfer")}async registerOffchain(){return h(async()=>{let[e,t]=await Promise.all([this.#r(),this.#a()]);return await pe(t.ethSigner,t.starkSigner,e,this.authManager,this.imxApiClients)},"imxRegisterOffchain")}async isRegisteredOffchain(){return h(async()=>!!(await this.#r()).imx,"imxIsRegisteredOffchain")}isRegisteredOnchain(){throw new g("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async createOrder(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#n();return $e({request:e,user:t,starkSigner:r,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.guardianClient})})(),"imxCreateOrder")}async cancelOrder(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#n();return Ze({request:e,user:t,starkSigner:r,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.guardianClient})})(),"imxCancelOrder")}async createTrade(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#n();return Ke({request:e,user:t,starkSigner:r,tradesApi:this.immutableXClient.tradesApi,guardianClient:this.guardianClient})})(),"imxCreateTrade")}async batchNftTransfer(e){return h(()=>this.guardianClient.withConfirmationScreenTask({width:480,height:784})(async()=>{let{user:t,starkSigner:r}=await this.#n();return je({request:e,user:t,starkSigner:r,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.guardianClient})})(),"imxBatchNftTransfer")}async exchangeTransfer(e){return h(async()=>{let{user:t,starkSigner:r}=await this.#n();return He({request:e,user:t,starkSigner:r,exchangesApi:this.immutableXClient.exchangeApi})},"imxExchangeTransfer")}deposit(e){throw new g("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}prepareWithdrawal(e){throw new g("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}completeWithdrawal(e,t){throw new g("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async getAddress(){return h(async()=>{let e=await this.#r();if(!I(e))throw new g("User has not been registered with StarkEx","USER_NOT_REGISTERED_ERROR");return Promise.resolve(e.imx.ethAddress)},"imxGetAddress")}};var $=class{authManager;immutableXClient;magicAdapter;passportEventEmitter;imxApiClients;guardianClient;constructor({authManager:e,immutableXClient:t,magicAdapter:r,passportEventEmitter:i,imxApiClients:a,guardianClient:s}){this.authManager=e,this.immutableXClient=t,this.magicAdapter=r,this.passportEventEmitter=i,this.imxApiClients=a,this.guardianClient=s;}async getProvider(){let e=await this.authManager.getUserOrLogin();return this.createProviderInstance(e)}async getProviderSilent(){let e=await this.authManager.getUser();return e?this.createProviderInstance(e):null}async createProviderInstance(e){if(!e.idToken)throw new g("Failed to initialise","WALLET_CONNECTION_ERROR");return new q({authManager:this.authManager,immutableXClient:this.immutableXClient,passportEventEmitter:this.passportEventEmitter,magicAdapter:this.magicAdapter,imxApiClients:this.imxApiClients,guardianClient:this.guardianClient})}};var rt=(n,e,t)=>{let r=e.map(i=>!n[i]&&i).filter(i=>i).join(", ");if(r!==""){let i=t?`${t} - ${r} cannot be null`:`${r} cannot be null`;throw new g(i,"INVALID_CONFIGURATION")}},Z=class{authenticationDomain;passportDomain;imxPublicApiDomain;magicPublishableApiKey;magicProviderId;oidcConfiguration;baseConfig;zkEvmRpcUrl;relayerUrl;multiRollupConfig;crossSdkBridgeEnabled;forceScwDeployBeforeMessageSignature;popupOverlayOptions;constructor({baseConfig:e,overrides:t,crossSdkBridgeEnabled:r,jsonRpcReferrer:i,forceScwDeployBeforeMessageSignature:a,popupOverlayOptions:s,...o}){if(rt(o,["clientId","redirectUri"]),this.oidcConfiguration=o,this.baseConfig=e,this.crossSdkBridgeEnabled=r||!1,this.forceScwDeployBeforeMessageSignature=a||!1,this.popupOverlayOptions=s||{disableGenericPopupOverlay:!1,disableBlockedPopupOverlay:!1},t)rt(t,["authenticationDomain","passportDomain","magicPublishableApiKey","magicProviderId","zkEvmRpcUrl","relayerUrl","imxPublicApiDomain","indexerMrBasePath","orderBookMrBasePath","passportMrBasePath"],"overrides"),this.authenticationDomain=t.authenticationDomain,this.passportDomain=t.passportDomain,this.imxPublicApiDomain=t.imxPublicApiDomain,this.magicPublishableApiKey=t.magicPublishableApiKey,this.magicProviderId=t.magicProviderId,this.zkEvmRpcUrl=t.zkEvmRpcUrl,this.relayerUrl=t.relayerUrl,this.multiRollupConfig={indexer:createConfig({basePath:t.indexerMrBasePath}),orderBook:createConfig({basePath:t.orderBookMrBasePath}),passport:createConfig({basePath:t.passportMrBasePath})};else switch(e.environment){case Environment.PRODUCTION:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="fSMzaRQ4O7p4fttl7pCyGVtJS_G70P8SNsLXtPPGHo0=",this.passportDomain="https://passport.immutable.com",this.imxPublicApiDomain="https://api.immutable.com",this.zkEvmRpcUrl="https://rpc.immutable.com",this.relayerUrl="https://api.immutable.com/relayer-mr",this.multiRollupConfig=multiRollupConfig.getProduction();break}case Environment.SANDBOX:default:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="fSMzaRQ4O7p4fttl7pCyGVtJS_G70P8SNsLXtPPGHo0=",this.passportDomain="https://passport.sandbox.immutable.com",this.imxPublicApiDomain="https://api.sandbox.immutable.com",this.zkEvmRpcUrl="https://rpc.testnet.immutable.com",this.relayerUrl="https://api.sandbox.immutable.com/relayer-mr",this.multiRollupConfig=multiRollupConfig.getSandbox();break}}}};var D="imx_passport_confirmation";var K=({url:n,title:e,width:t,height:r})=>{let i=Math.max(0,Math.round(window.screenX+(window.outerWidth-t)/2)),a=Math.max(0,Math.round(window.screenY+(window.outerHeight-r)/2)),s=window.open(n,e,`
|
|
335
337
|
scrollbars=yes,
|
|
336
338
|
width=${t},
|
|
337
339
|
height=${r},
|
|
338
340
|
top=${a},
|
|
339
341
|
left=${i}
|
|
340
|
-
`);if(!s)throw new Error("Failed to open confirmation screen");return s.focus(),s};var
|
|
342
|
+
`);if(!s)throw new Error("Failed to open confirmation screen");return s.focus(),s};var ue="Confirm this transaction",ge=720,he=480,nt=1e3;var k=class{config;confirmationWindow;popupOptions;overlay;overlayClosed;timer;constructor(e){this.config=e,this.overlayClosed=!1;}getHref(e,t){let r=`${this.config.passportDomain}/transaction-confirmation/${e}`;if(t){let i=t?Object.keys(t).map(a=>`${a}=${t[a]}`).join("&"):"";r=`${r}?${i}`;}return r}requestConfirmation(e,t,r,i){return new Promise((a,s)=>{let o=({data:d,origin:l})=>{if(!(l!==this.config.passportDomain||d.eventType!==D))switch(d.messageType){case"confirmation_window_ready":{this.confirmationWindow?.postMessage({eventType:D,messageType:"confirmation_start"},this.config.passportDomain);break}case"transaction_confirmed":{this.closeWindow(),a({confirmed:!0});break}case"transaction_rejected":{this.closeWindow(),a({confirmed:!1});break}case"transaction_error":{this.closeWindow(),s(new Error("Error during transaction confirmation"));break}default:this.closeWindow(),s(new Error("Unsupported message type"));}},c="";r===we.mr.TransactionApprovalRequestChainTypeEnum.Starkex?c=this.getHref("transaction",{transactionId:e,etherAddress:t,chainType:r}):c=this.getHref("zkevm/transaction",{transactionID:e,etherAddress:t,chainType:r,chainID:i}),window.addEventListener("message",o),this.showConfirmationScreen(c,o,a);})}requestMessageConfirmation(e,t,r){return new Promise((i,a)=>{let s=({data:c,origin:d})=>{if(!(d!==this.config.passportDomain||c.eventType!==D))switch(c.messageType){case"confirmation_window_ready":{this.confirmationWindow?.postMessage({eventType:D,messageType:"confirmation_start"},this.config.passportDomain);break}case"message_confirmed":{this.closeWindow(),i({confirmed:!0});break}case"message_rejected":{this.closeWindow(),i({confirmed:!1});break}case"message_error":{this.closeWindow(),a(new Error("Error during message confirmation"));break}default:this.closeWindow(),a(new Error("Unsupported message type"));}};window.addEventListener("message",s);let o=this.getHref("zkevm/message",{messageID:e,etherAddress:t,...r?{messageType:r}:{}});this.showConfirmationScreen(o,s,i);})}showServiceUnavailable(){return new Promise((e,t)=>{this.showConfirmationScreen(this.getHref("unavailable"),()=>{},()=>{this.closeWindow(),t(new Error("Service unavailable"));});})}loading(e){if(!this.config.crossSdkBridgeEnabled){this.popupOptions=e;try{this.confirmationWindow=K({url:this.getHref("loading"),title:ue,width:e?.width||he,height:e?.height||ge}),this.overlay=new w(this.config.popupOverlayOptions);}catch(t){let r=t instanceof Error?t.message:String(t);trackError("passport","confirmationPopupDenied",new Error(r)),this.overlay=new w(this.config.popupOverlayOptions,!0);}this.overlay.append(()=>{try{this.confirmationWindow?.close(),this.confirmationWindow=K({url:this.getHref("loading"),title:ue,width:this.popupOptions?.width||he,height:this.popupOptions?.height||ge});}catch{}},()=>{this.overlayClosed=!0,this.closeWindow();});}}closeWindow(){this.confirmationWindow?.close(),this.overlay?.remove(),this.overlay=void 0;}showConfirmationScreen(e,t,r){if(this.confirmationWindow&&(this.confirmationWindow.location.href=e),!this.overlay){this.overlayClosed=!1,r({confirmed:!1});return}let i=()=>{(this.confirmationWindow?.closed||this.overlayClosed)&&(clearInterval(this.timer),window.removeEventListener("message",t),r({confirmed:!1}),this.overlayClosed=!1,this.confirmationWindow=void 0);};this.timer=setInterval(i,nt),this.overlay.update(()=>this.recreateConfirmationWindow(e,i));}recreateConfirmationWindow(e,t){try{clearInterval(this.timer),this.confirmationWindow?.close(),this.confirmationWindow=K({url:e,title:ue,width:this.popupOptions?.width||he,height:this.popupOptions?.height||ge}),this.timer=setInterval(t,nt);}catch{}}};var fe=(e=>(e.ACCOUNTS_CHANGED="accountsChanged",e))(fe||{});var O=class{emitter=new EventEmitter;emit(e,...t){this.emitter.emit(e,...t);}on(e,t){this.emitter.on(e,t);}removeListener(e,t){this.emitter.removeListener(e,t);}};var ct=1,Dr=1,Ur=2,dt="02",Lr="",lt=`tuple(
|
|
341
343
|
bool delegateCall,
|
|
342
344
|
bool revertOnError,
|
|
343
345
|
uint256 gasLimit,
|
|
344
346
|
address target,
|
|
345
347
|
uint256 value,
|
|
346
348
|
bytes data
|
|
347
|
-
)[]`,Re=n=>n.map(e=>({delegateCall:e.delegateCall===!0,revertOnError:e.revertOnError===!0,gasLimit:e.gasLimit??BigInt(0),target:e.to??ZeroAddress,value:e.value??BigInt(0),data:e.data??"0x"})),Ur=(n,e)=>{let t=AbiCoder.defaultAbiCoder().encode(["uint256",mt],[n,e]);return keccak256(t)},ut=n=>AbiCoder.defaultAbiCoder().encode([mt],[n]),Dr=n=>n||0n,Lr=(n,e)=>{let t=BigInt(n)*2n**96n;return BigInt(e)+t},J=async(n,e,t)=>{try{let r=new Contract(e,walletContracts.mainModule.abi,n),i=Dr(t),a=await r.readNonce(i);if(typeof a=="bigint")return Lr(i,a);throw new Error("Unexpected result from contract.nonce() call.")}catch(r){if(isError(r,"BAD_DATA"))return BigInt(0);throw r}},ye=(n,e,t)=>solidityPacked(["string","uint256","address","bytes32"],[Nr,n,e,t]),Ce=async(n,e,t,r,i)=>{let a=Re(n),s=Ur(e,a),o=ye(t,r,s),c=keccak256(o),d=getBytes(c),l=performance.now(),m=await i.signMessage(d);trackDuration("passport","magicSignMessageGetSignedMetaTransactions",Math.round(performance.now()-l));let u=`${m}${pt}`,E=v1.signature.encodeSignature({version:1,threshold:xr,signers:[{isDynamic:!1,unrecovered:!0,weight:lt,signature:u}]}),C=new Interface(walletContracts.mainModule.abi);return C.encodeFunctionData(C.getFunction("execute")??"",[a,e,E])},Gr=n=>{let e=`0x0000${n}`;return v1.signature.decodeSignature(e)},Te=(n,e,t)=>{let r=`${n}${pt}`,{signers:i}=Gr(t),s=[...i,{isDynamic:!1,unrecovered:!0,weight:lt,signature:r,address:e}].sort((o,c)=>{let d=BigInt(o.address??0),l=BigInt(c.address??0);return d<=l?-1:d===l?0:1});return v1.signature.encodeSignature({version:1,threshold:Mr,signers:s})},gt=async(n,e,t,r,i)=>{let a={...n.types};delete a.EIP712Domain;let s=TypedDataEncoder.hash(n.domain,a,n.message),o=ye(t,r,s),c=keccak256(o),d=getBytes(c),l=performance.now(),m=await i.signMessage(d);trackDuration("passport","magicSignMessageTypedData",Math.round(performance.now()-l));let u=await i.getAddress();return Te(m,u,e)},ht=async(n,e,t,r)=>{let i=hashMessage(e),a=ye(n,r,i),s=keccak256(a),o=getBytes(s);return t.signMessage(o)},T=n=>`eip155:${n}`;var z=class n{config;rpcProvider;authManager;constructor({config:e,rpcProvider:t,authManager:r}){this.config=e,this.rpcProvider=t,this.authManager=r;}static getResponsePreview(e){return e.length>100?`${e.substring(0,50)}...${e.substring(e.length-50)}`:e}async postToRelayer(e){let t={id:1,jsonrpc:"2.0",...e},r=await this.authManager.getUserZkEvm(),i=await fetch(`${this.config.relayerUrl}/v1/transactions`,{method:"POST",headers:{Authorization:`Bearer ${r.accessToken}`,"Content-Type":"application/json"},body:JSON.stringify(t)}),a=await i.text();if(!i.ok){let o=n.getResponsePreview(a);throw new Error(`Relayer HTTP error: ${i.status}. Content: "${o}"`)}let s;try{s=JSON.parse(a);}catch(o){let c=n.getResponsePreview(a);throw new Error(`Relayer JSON parse error: ${o instanceof Error?o.message:"Unknown error"}. Content: "${c}"`)}if(s.error)throw new Error(s.error);return s}async ethSendTransaction(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),i={method:"eth_sendTransaction",params:[{to:e,data:t,chainId:T(Number(r))}]},{result:a}=await this.postToRelayer(i);return a}async imGetTransactionByHash(e){let t={method:"im_getTransactionByHash",params:[e]},{result:r}=await this.postToRelayer(t);return r}async imGetFeeOptions(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),i={method:"im_getFeeOptions",params:[{userAddress:e,data:t,chainId:T(Number(r))}]},{result:a}=await this.postToRelayer(i);return a}async imSignTypedData(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),i={method:"im_signTypedData",params:[{address:e,eip712Payload:t,chainId:T(Number(r))}]},{result:a}=await this.postToRelayer(i);return a}async imSign(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),i={method:"im_sign",params:[{address:e,message:t,chainId:T(Number(r))}]},{result:a}=await this.postToRelayer(i);return a}};var j=(i=>(i[i.USER_REJECTED_REQUEST=4001]="USER_REJECTED_REQUEST",i[i.UNAUTHORIZED=4100]="UNAUTHORIZED",i[i.UNSUPPORTED_METHOD=4200]="UNSUPPORTED_METHOD",i[i.DISCONNECTED=4900]="DISCONNECTED",i))(j||{}),w=(o=>(o[o.RPC_SERVER_ERROR=-32e3]="RPC_SERVER_ERROR",o[o.INVALID_REQUEST=-32600]="INVALID_REQUEST",o[o.METHOD_NOT_FOUND=-32601]="METHOD_NOT_FOUND",o[o.INVALID_PARAMS=-32602]="INVALID_PARAMS",o[o.INTERNAL_ERROR=-32603]="INTERNAL_ERROR",o[o.PARSE_ERROR=-32700]="PARSE_ERROR",o[o.TRANSACTION_REJECTED=-32003]="TRANSACTION_REJECTED",o))(w||{}),p=class extends Error{message;code;constructor(e,t){super(t),this.message=t,this.code=e;}};var Br="Only sign this message from Immutable Passport";async function ft({authManager:n,ethSigner:e,multiRollupApiClients:t,accessToken:r,rpcProvider:i,flow:a}){let s=e.getAddress();s.then(()=>a.addEvent("endGetAddress"));let o=signRaw(Br,e);o.then(()=>a.addEvent("endSignRaw"));let c=i.getNetwork();c.then(()=>a.addEvent("endDetectNetwork"));let d=t.chainsApi.listChains();d.then(()=>a.addEvent("endListChains"));let[l,m,u,E]=await Promise.all([s,o,c,d]),C=T(Number(u.chainId)),R=E.data?.result?.find(A=>A.id===C)?.name;if(!R)throw new p(-32603,`Chain name does not exist on for chain id ${u.chainId}`);try{let A=await t.passportApi.createCounterfactualAddressV2({chainName:R,createCounterfactualAddressRequest:{ethereum_address:l,ethereum_signature:m}},{headers:{Authorization:`Bearer ${r}`}});return a.addEvent("endCreateCounterfactualAddress"),n.forceUserRefreshInBackground(),A.data.counterfactual_address}catch(A){throw new p(-32603,`Failed to create counterfactual address: ${A}`)}}var Y="Transaction requires confirmation but this functionality is not supported in this environment. Please contact Immutable support if you need to enable this feature.",Q=n=>BigInt(n).toString(),Hr=n=>{try{return n.map(e=>({delegateCall:e.delegateCall===!0,revertOnError:e.revertOnError===!0,gasLimit:e.gasLimit?Q(e.gasLimit):"0",target:e.to??ZeroAddress,value:e.value?Q(e.value):"0",data:e.data?e.data.toString():"0x"}))}catch(e){let t=e instanceof Error?e.message:String(e);throw new p(-32602,`Transaction failed to parsing: ${t}`)}},L=class{guardianApi;confirmationScreen;crossSdkBridgeEnabled;authManager;constructor({confirmationScreen:e,config:t,authManager:r,guardianApi:i}){this.confirmationScreen=e,this.crossSdkBridgeEnabled=t.crossSdkBridgeEnabled,this.guardianApi=i,this.authManager=r;}withConfirmationScreen(e){return t=>this.withConfirmationScreenTask(e)(t)()}withConfirmationScreenTask(e){return t=>async()=>{this.confirmationScreen.loading(e);try{return await t()}catch(r){throw r instanceof g&&r.type==="SERVICE_UNAVAILABLE_ERROR"?(await this.confirmationScreen.showServiceUnavailable(),r):(this.confirmationScreen.closeWindow(),r)}}}withDefaultConfirmationScreenTask(e){return this.withConfirmationScreenTask()(e)}async evaluateImxTransaction({payloadHash:e}){try{let t=()=>{this.confirmationScreen.closeWindow();},r=await this.authManager.getUserImx(),i={Authorization:`Bearer ${r.accessToken}`};if(!(await S(async()=>this.guardianApi.getTransactionByID({transactionID:e,chainType:"starkex"},{headers:i}),{finallyFn:t})).data.id)throw new Error("Transaction doesn't exists");let s=await this.guardianApi.evaluateTransaction({id:e,transactionEvaluationRequest:{chainType:"starkex"}},{headers:i}),{confirmationRequired:o}=s.data;if(o){if(this.crossSdkBridgeEnabled)throw new Error(Y);if(!(await this.confirmationScreen.requestConfirmation(e,r.imx.ethAddress,ve.mr.TransactionApprovalRequestChainTypeEnum.Starkex)).confirmed)throw new Error("Transaction rejected by user")}else this.confirmationScreen.closeWindow();}catch(t){throw Et.isAxiosError(t)&&t.response?.status===403?new g("Service unavailable","SERVICE_UNAVAILABLE_ERROR"):t}}async evaluateEVMTransaction({chainId:e,nonce:t,metaTransactions:r}){let i=await this.authManager.getUserZkEvm(),a={Authorization:`Bearer ${i.accessToken}`},s=Hr(r);try{return (await this.guardianApi.evaluateTransaction({id:"evm",transactionEvaluationRequest:{chainType:"evm",chainId:e,transactionData:{nonce:t,userAddress:i.zkEvm.ethAddress,metaTransactions:s}}},{headers:a})).data}catch(o){if(Et.isAxiosError(o)&&o.response?.status===403)throw new g("Service unavailable","SERVICE_UNAVAILABLE_ERROR");let c=o instanceof Error?o.message:String(o);throw new p(-32603,`Transaction failed to validate with error: ${c}`)}}async validateEVMTransaction({chainId:e,nonce:t,metaTransactions:r,isBackgroundTransaction:i}){let a=await this.evaluateEVMTransaction({chainId:e,nonce:t,metaTransactions:r}),{confirmationRequired:s,transactionId:o}=a;if(s&&this.crossSdkBridgeEnabled)throw new p(-32003,Y);if(s&&o){let c=await this.authManager.getUserZkEvm();if(!(await this.confirmationScreen.requestConfirmation(o,c.zkEvm.ethAddress,ve.mr.TransactionApprovalRequestChainTypeEnum.Evm,e)).confirmed)throw new p(-32003,"Transaction rejected by user")}else i||this.confirmationScreen.closeWindow();}async handleEIP712MessageEvaluation({chainID:e,payload:t}){try{let r=await this.authManager.getUserZkEvm();if(r===null)throw new p(4100,"User not logged in. Please log in first.");return (await this.guardianApi.evaluateMessage({messageEvaluationRequest:{chainID:e,payload:t}},{headers:{Authorization:`Bearer ${r.accessToken}`}})).data}catch(r){let i=r instanceof Error?r.message:String(r);throw new p(-32603,`Message failed to validate with error: ${i}`)}}async evaluateEIP712Message({chainID:e,payload:t}){let{messageId:r,confirmationRequired:i}=await this.handleEIP712MessageEvaluation({chainID:e,payload:t});if(i&&this.crossSdkBridgeEnabled)throw new p(-32003,Y);if(i&&r){let a=await this.authManager.getUserZkEvm();if(!(await this.confirmationScreen.requestMessageConfirmation(r,a.zkEvm.ethAddress,"eip712")).confirmed)throw new p(-32003,"Signature rejected by user")}else this.confirmationScreen.closeWindow();}async handleERC191MessageEvaluation({chainID:e,payload:t}){try{let r=await this.authManager.getUserZkEvm();if(r===null)throw new p(4100,"User not logged in. Please log in first.");return (await this.guardianApi.evaluateErc191Message({eRC191MessageEvaluationRequest:{chainID:T(Number(e)),payload:t}},{headers:{Authorization:`Bearer ${r.accessToken}`}})).data}catch(r){let i=r instanceof Error?r.message:String(r);throw new p(-32603,`Message failed to validate with error: ${i}`)}}async evaluateERC191Message({chainID:e,payload:t}){let{messageId:r,confirmationRequired:i}=await this.handleERC191MessageEvaluation({chainID:e,payload:t});if(i&&this.crossSdkBridgeEnabled)throw new p(-32003,Y);if(i&&r){let a=await this.authManager.getUserZkEvm();if(!(await this.confirmationScreen.requestMessageConfirmation(r,a.zkEvm.ethAddress,"erc191")).confirmed)throw new p(-32003,"Signature rejected by user")}else this.confirmationScreen.closeWindow();}};var Wr=30,$r=1e3,qr=async(n,e,t)=>{let r=Re([n]),i=ut(r),a=await t.imGetFeeOptions(e,i);if(!a||!Array.isArray(a))throw new Error("Invalid fee options received from relayer");let s=a.find(o=>o.tokenSymbol==="IMX");if(!s)throw new Error("Failed to retrieve fees for IMX token");return s},Zr=async(n,e,t,r,i)=>{if(!n.to)throw new p(-32602,'eth_sendTransaction requires a "to" field');let a={to:n.to.toString(),data:n.data,nonce:BigInt(0),value:n.value,revertOnError:!0},[s,o]=await Promise.all([J(e,r,i),qr(a,r,t)]),c=[{...a,nonce:s}],d=BigInt(o.tokenPrice);return d!==BigInt(0)&&c.push({nonce:s,to:o.recipientAddress,value:d,revertOnError:!0}),c},ee=async(n,e,t)=>{let i=await S(async()=>{let a=await n.imGetTransactionByHash(e);if(a.status==="PENDING")throw new Error;return a},{retries:Wr,interval:$r,finalErr:new p(-32e3,"transaction hash not generated in time")});if(t.addEvent("endRetrieveRelayerTransaction"),!["SUBMITTED","SUCCESSFUL"].includes(i.status)){let a=`Transaction failed to submit with status ${i.status}.`;throw i.statusMessage&&(a+=` Error message: ${i.statusMessage}`),new p(-32e3,a)}return i},te=async({transactionRequest:n,ethSigner:e,rpcProvider:t,guardianClient:r,relayerClient:i,zkEvmAddress:a,flow:s,nonceSpace:o,isBackgroundTransaction:c})=>{let{chainId:d}=await t.getNetwork(),l=BigInt(d);s.addEvent("endDetectNetwork");let m=await Zr(n,t,i,a,o);s.addEvent("endBuildMetaTransactions");let{nonce:u}=m[0];if(typeof u>"u")throw new Error("Failed to retrieve nonce from the smart wallet");let E=async()=>{await r.validateEVMTransaction({chainId:T(Number(d)),nonce:Q(u),metaTransactions:m,isBackgroundTransaction:c}),s.addEvent("endValidateEVMTransaction");},C=async()=>{let Ft=await Ce(m,u,l,a,e);return s.addEvent("endGetSignedMetaTransactions"),Ft},[,R]=await Promise.all([E(),C()]),A=await i.ethSendTransaction(a,R);return s.addEvent("endRelayerSendTransaction"),{signedTransactions:R,relayerId:A,nonce:u}},Kr=async n=>{if(!n.to)throw new p(-32602,'im_signEjectionTransaction requires a "to" field');if(typeof n.nonce>"u")throw new p(-32602,'im_signEjectionTransaction requires a "nonce" field');if(!n.chainId)throw new p(-32602,'im_signEjectionTransaction requires a "chainId" field');return [{to:n.to.toString(),data:n.data,nonce:n.nonce??void 0,value:n.value,revertOnError:!0}]},Rt=async({transactionRequest:n,ethSigner:e,zkEvmAddress:t,flow:r})=>{let i=await Kr(n);r.addEvent("endBuildMetaTransactions");let a=await Ce(i,n.nonce,BigInt(n.chainId??0),t,e);return r.addEvent("endGetSignedMetaTransactions"),{to:t,data:a,chainId:T(Number(n.chainId??0))}};var we=async({params:n,ethSigner:e,rpcProvider:t,relayerClient:r,guardianClient:i,zkEvmAddress:a,flow:s,nonceSpace:o,isBackgroundTransaction:c=!1})=>{let d=n[0],{relayerId:l}=await te({transactionRequest:d,ethSigner:e,rpcProvider:t,guardianClient:i,relayerClient:r,zkEvmAddress:a,flow:s,nonceSpace:o,isBackgroundTransaction:c}),{hash:m}=await ee(r,l,s);return m};var yt=["types","domain","primaryType","message"],Xr=n=>yt.every(e=>e in n),Jr=(n,e)=>{let t;if(typeof n=="string")try{t=JSON.parse(n);}catch(i){throw new p(-32602,`Failed to parse typed data JSON: ${i}`)}else if(typeof n=="object")t=n;else throw new p(-32602,`Invalid typed data argument: ${n}`);if(!Xr(t))throw new p(-32602,`Invalid typed data argument. The following properties are required: ${yt.join(", ")}`);let r=t.domain?.chainId;if(r&&(typeof r=="string"&&(r.startsWith("0x")?t.domain.chainId=parseInt(r,16).toString():t.domain.chainId=parseInt(r,10).toString()),BigInt(t.domain.chainId??0)!==e))throw new p(-32602,`Invalid chainId, expected ${e}`);return t},Ct=async({params:n,method:e,ethSigner:t,rpcProvider:r,relayerClient:i,guardianClient:a,flow:s})=>{let o=n[0],c=n[1];if(!o||!c)throw new p(-32602,`${e} requires an address and a typed data JSON`);let{chainId:d}=await r.getNetwork(),l=Jr(c,d);s.addEvent("endDetectNetwork"),await a.evaluateEIP712Message({chainID:String(d),payload:l}),s.addEvent("endValidateMessage");let m=await i.imSignTypedData(o,l);s.addEvent("endRelayerSignTypedData");let u=await gt(l,m,BigInt(d),o,t);return s.addEvent("getSignedTypedData"),u};var Tt=n=>{if(!n)return n;try{let e=stripZerosLeft(getBytes(n));return toUtf8String(e)}catch{return n}};var re=async({params:n,ethSigner:e,zkEvmAddress:t,rpcProvider:r,guardianClient:i,relayerClient:a,flow:s})=>{let o=n[0],c=n[1];if(!c||!o)throw new p(-32602,"personal_sign requires an address and a message");if(c.toLowerCase()!==t.toLowerCase())throw new p(-32602,"personal_sign requires the signer to be the from address");let d=Tt(o),{chainId:l}=await r.getNetwork();s.addEvent("endDetectNetwork");let m=BigInt(l),u=ht(m,d,e,c);u.then(()=>s.addEvent("endEOASignature")),await i.evaluateERC191Message({chainID:l,payload:d}),s.addEvent("endEvaluateERC191Message");let[E,C]=await Promise.all([u,a.imSign(c,d)]);s.addEvent("endRelayerSign");let R=await e.getAddress();return s.addEvent("endGetEOAAddress"),Te(E,R,C)};var en="https://api.immutable.com",tn="https://api.sandbox.immutable.com",rn="/v1/sdk/session-activity/check",nn=n=>{switch(n){case Environment.SANDBOX:return tn;case Environment.PRODUCTION:return en;default:throw new Error("Environment not supported")}},ne,wt=n=>{ne||(ne=Et.create({baseURL:nn(n)}));};async function _t(n){if(!ne)throw new Error("Client not initialised");return ne.get(rn,{params:n}).then(e=>e.data).catch(e=>{if(e.response.status!==404)throw e})}function At(n,e){return (...t)=>{try{let r=n(...t);return r instanceof Promise?r.catch(i=>(i instanceof Error&&trackError("passport","sessionActivityError",i),e)):r}catch(r){return r instanceof Error&&trackError("passport","sessionActivityError",r),e}}}var{getItem:It,setItem:_e}=utils.localStorage,Pe="sessionActivitySendCount",St="sessionActivityDate",Ae={},P={},ie={},Ot=()=>{P=It(Pe)||{};let n=It(St),e=new Date,t=e.getFullYear(),r=`${e.getMonth()+1}`.padStart(2,"0"),i=`${e.getDate()}`.padStart(2,"0"),a=`${t}-${r}-${i}`;(!n||n!==a)&&(P={}),_e(St,a),_e(Pe,P);};Ot();var dn=n=>{Ot(),P[n]||(P[n]=0),P[n]++,_e(Pe,P),Ae[n]=0;},ln=async n=>new Promise(e=>{setTimeout(e,n*1e3);}),pn=async n=>{let e=n.flow||trackFlow("passport","sendSessionActivity"),t=n.passportClient;if(!t)throw e.addEvent("No Passport Client ID"),new Error("No Passport Client ID provided");if(ie[t])return;ie[t]=!0;let{sendTransaction:r,environment:i}=n;if(!r)throw new Error("No sendTransaction function provided");if(!i)throw new Error("No environment provided");wt(i);let a=n.walletAddress;if(!a)throw e.addEvent("No Passport Wallet Address"),new Error("No wallet address");let s;try{if(s=await _t({clientId:t,wallet:a,checkCount:Ae[t]||0,sendCount:P[t]||0}),Ae[t]++,!s)return}catch(o){throw e.addEvent("Failed to fetch details"),new Error("Failed to get details",{cause:o})}if(s&&s.contractAddress&&s.functionName){let c=new Interface([`function ${s.functionName}()`]).encodeFunctionData(s.functionName),d=s.contractAddress;try{e.addEvent("Start Sending Transaction");let l=await n.sendTransaction([{to:d,from:a,data:c}],e);dn(t),e.addEvent("Transaction Sent",{tx:l});}catch(l){e.addEvent("Failed to send Transaction");let m=new Error("Failed to send transaction",{cause:l});trackError("passport","sessionActivityError",m,{flowId:e.details.flowId});}}s&&s.delay&&s.delay>0&&(e.addEvent("Delaying Transaction",{delay:s.delay}),await ln(s.delay),setTimeout(()=>{e.addEvent("Retrying after Delay"),ie[t]=!1,kt({...n,flow:e});},0));},kt=n=>At(pn)(n).then(()=>{ie[n.passportClient]=!1;}),bt=kt;var xt=async({params:n,ethSigner:e,rpcProvider:t,relayerClient:r,guardianClient:i,zkEvmAddress:a,flow:s})=>{let o={to:a,value:0},{relayerId:c}=await te({transactionRequest:o,ethSigner:e,rpcProvider:t,guardianClient:i,relayerClient:r,zkEvmAddress:a,flow:s});return i.withConfirmationScreen()(async()=>{let d=await re({params:n,ethSigner:e,zkEvmAddress:a,rpcProvider:t,guardianClient:i,relayerClient:r,flow:s});return await ee(r,c,s),d})};var Mt=async({params:n,ethSigner:e,zkEvmAddress:t,flow:r})=>{if(!n||n.length!==1)throw new p(-32602,"im_signEjectionTransaction requires a singular param (hash)");let i=n[0];return await Rt({transactionRequest:i,ethSigner:e,zkEvmAddress:t,flow:r})};var ae=n=>"zkEvm"in n,se=class{#t;#r;#a;#n;#i;#e;#l;#c;#s;isPassport=!0;constructor({authManager:e,config:t,multiRollupApiClients:r,passportEventEmitter:i,guardianClient:a,ethSigner:s,user:o}){this.#t=e,this.#r=t,this.#i=a,this.#n=i,this.#s=s,this.#e=new JsonRpcProvider(this.#r.zkEvmRpcUrl,void 0,{staticNetwork:!0}),this.#c=new z({config:this.#r,rpcProvider:this.#e,authManager:this.#t}),this.#l=r,this.#a=new O,o&&ae(o)&&this.#d(o.zkEvm.ethAddress),i.on("loggedIn",c=>{ae(c)&&this.#d(c.zkEvm.ethAddress);}),i.on("loggedOut",this.#p),i.on("accountsRequested",bt);}#p=()=>{this.#a.emit("accountsChanged",[]);};async#d(e,t){let r=BigInt(1),i=async(a,s)=>await we({params:a,ethSigner:this.#s,guardianClient:this.#i,rpcProvider:this.#e,relayerClient:this.#c,zkEvmAddress:e,flow:s,nonceSpace:r,isBackgroundTransaction:!0});this.#n.emit("accountsRequested",{environment:this.#r.baseConfig.environment,sendTransaction:i,walletAddress:e,passportClient:t||this.#r.oidcConfiguration.clientId});}async#o(){try{let e=await this.#t.getUser();return e&&ae(e)?e.zkEvm.ethAddress:void 0}catch{return}}async#m(e){switch(e.method){case"eth_requestAccounts":{let t=await this.#o();if(t)return [t];let r=trackFlow("passport","ethRequestAccounts");try{let i=await this.#t.getUserOrLogin();r.addEvent("endGetUserOrLogin");let a;return ae(i)?a=i.zkEvm.ethAddress:(r.addEvent("startUserRegistration"),a=await ft({ethSigner:this.#s,authManager:this.#t,multiRollupApiClients:this.#l,accessToken:i.accessToken,rpcProvider:this.#e,flow:r}),r.addEvent("endUserRegistration")),this.#a.emit("accountsChanged",[a]),identify({passportId:i.profile.sub}),this.#d(a),[a]}catch(i){throw i instanceof Error?trackError("passport","ethRequestAccounts",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"eth_sendTransaction":{let t=await this.#o();if(!t)throw new p(4100,"Unauthorised - call eth_requestAccounts first");let r=trackFlow("passport","ethSendTransaction");try{return await this.#i.withConfirmationScreen({width:480,height:720})(async()=>await we({params:e.params||[],ethSigner:this.#s,guardianClient:this.#i,rpcProvider:this.#e,relayerClient:this.#c,zkEvmAddress:t,flow:r}))}catch(i){throw i instanceof Error?trackError("passport","eth_sendTransaction",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"eth_accounts":{let t=await this.#o();return t?[t]:[]}case"personal_sign":{let t=await this.#o();if(!t)throw new p(4100,"Unauthorised - call eth_requestAccounts first");let r=trackFlow("passport","personalSign");try{return await this.#i.withConfirmationScreen({width:480,height:720})(async()=>this.#r.forceScwDeployBeforeMessageSignature&&!(await J(this.#e,t)>BigInt(0))?await xt({params:e.params||[],zkEvmAddress:t,ethSigner:this.#s,rpcProvider:this.#e,guardianClient:this.#i,relayerClient:this.#c,flow:r}):await re({params:e.params||[],zkEvmAddress:t,ethSigner:this.#s,rpcProvider:this.#e,guardianClient:this.#i,relayerClient:this.#c,flow:r}))}catch(i){throw i instanceof Error?trackError("passport","personal_sign",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"eth_signTypedData":case"eth_signTypedData_v4":{if(!await this.#o())throw new p(4100,"Unauthorised - call eth_requestAccounts first");let r=trackFlow("passport","ethSignTypedDataV4");try{return await this.#i.withConfirmationScreen({width:480,height:720})(async()=>await Ct({method:e.method,params:e.params||[],ethSigner:this.#s,rpcProvider:this.#e,relayerClient:this.#c,guardianClient:this.#i,flow:r}))}catch(i){throw i instanceof Error?trackError("passport","eth_signTypedData",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"eth_chainId":{let{chainId:t}=await this.#e.getNetwork();return toBeHex(t)}case"eth_getBalance":case"eth_getCode":case"eth_getTransactionCount":{let[t,r]=e.params||[];return this.#e.send(e.method,[t,r||"latest"])}case"eth_getStorageAt":{let[t,r,i]=e.params||[];return this.#e.send(e.method,[t,r,i||"latest"])}case"eth_call":case"eth_estimateGas":{let[t,r]=e.params||[];return this.#e.send(e.method,[t,r||"latest"])}case"eth_gasPrice":case"eth_blockNumber":case"eth_getBlockByHash":case"eth_getBlockByNumber":case"eth_getTransactionByHash":case"eth_getTransactionReceipt":return this.#e.send(e.method,e.params||[]);case"im_signEjectionTransaction":{let t=await this.#o();if(!t)throw new p(4100,"Unauthorised - call eth_requestAccounts first");let r=trackFlow("passport","imSignEjectionTransaction");try{return await Mt({params:e.params||[],ethSigner:this.#s,zkEvmAddress:t,flow:r})}catch(i){throw i instanceof Error?trackError("passport","imSignEjectionTransaction",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"im_addSessionActivity":{let[t]=e.params||[],r=await this.#o();return r&&this.#d(r,t),null}default:throw new p(4200,"Method not supported")}}async request(e){try{return this.#m(e)}catch(t){throw t instanceof p?t:t instanceof Error?new p(-32603,t.message):new p(-32603,"Internal error")}}on(e,t){this.#a.on(e,t);}removeListener(e,t){this.#a.removeListener(e,t);}};var Nt={icon:'data:image/svg+xml,<svg viewBox="0 0 48 48" class="SvgIcon undefined Logo Logo--PassportSymbolOutlined css-1dn9atd" xmlns="http://www.w3.org/2000/svg"><g data-testid="undefined__g"><circle cx="24" cy="24" r="22.5" fill="url(%23paint0_radial_6324_83922)"></circle><circle cx="24" cy="24" r="22.5" fill="url(%23paint1_radial_6324_83922)"></circle><path d="M24 0C10.7452 0 0 10.7452 0 24C0 37.2548 10.7452 48 24 48C37.2548 48 48 37.2548 48 24C48 10.7452 37.2548 0 24 0ZM23.0718 9.16608C23.7383 8.83951 24.4406 8.86188 25.087 9.2287C27.3282 10.5059 29.5627 11.7942 31.786 13.096C32.5018 13.5165 32.8686 14.1897 32.8708 15.0173C32.8843 17.9184 32.8798 20.8171 32.8708 23.7182C32.8708 23.8255 32.8015 23.9821 32.7143 24.0335C31.8531 24.548 30.9808 25.0423 30.0347 25.5881V25.1318C30.0347 22.148 30.0257 19.1664 30.0414 16.1827C30.0436 15.6101 29.8468 15.241 29.339 14.9525C26.7377 13.474 24.1499 11.9687 21.5575 10.4723C21.4457 10.4075 21.3361 10.3381 21.1661 10.2352C21.8326 9.85722 22.4321 9.47698 23.0673 9.16608H23.0718ZM22.5953 38.8451C22.45 38.7713 22.3426 38.7198 22.2375 38.6595C18.8041 36.68 15.3752 34.687 11.9307 32.7232C10.9644 32.173 10.5238 31.3879 10.5349 30.2852C10.5551 27.9411 10.5484 25.597 10.5372 23.2507C10.5327 22.1927 10.9622 21.4255 11.8926 20.8977C14.3105 19.5221 16.715 18.1264 19.1195 16.7284C19.3275 16.6076 19.4796 16.5875 19.6965 16.7172C20.5264 17.216 21.3719 17.6924 22.2554 18.2024C22.0876 18.3031 21.9601 18.3791 21.8304 18.4552C19.2268 19.9582 16.6278 21.4658 14.0175 22.9599C13.5903 23.2037 13.3912 23.5213 13.3957 24.0179C13.4091 25.8654 13.4114 27.713 13.3957 29.5605C13.3912 30.0705 13.5948 30.3948 14.0332 30.6453C16.7866 32.2199 19.5288 33.8125 22.28 35.3916C22.5126 35.5258 22.611 35.6645 22.6065 35.9418C22.5864 36.888 22.5998 37.8363 22.5998 38.8473L22.5953 38.8451ZM22.5953 33.553C22.356 33.4166 22.1838 33.3204 22.0116 33.2198C19.8285 31.9605 17.6477 30.6967 15.4602 29.4464C15.2231 29.3122 15.1359 29.1668 15.1381 28.8917C15.1538 27.4714 15.1471 26.0511 15.1426 24.6308C15.1426 24.4384 15.1717 24.3064 15.3618 24.1991C16.167 23.7495 16.9633 23.2798 17.7618 22.8212C17.8199 22.7877 17.8826 22.7631 17.9877 22.7116V24.3064C17.9877 25.1698 18.0011 26.0354 17.9832 26.8988C17.972 27.3909 18.1622 27.7241 18.5916 27.9657C19.8285 28.6636 21.0498 29.3883 22.2867 30.0839C22.5305 30.2203 22.6043 30.3724 22.5998 30.6408C22.5842 31.5847 22.5931 32.5308 22.5931 33.5508L22.5953 33.553ZM20.0746 14.91C19.6116 14.6371 19.2157 14.6393 18.7527 14.91C16.1581 16.4265 13.5523 17.9228 10.9487 19.4259C10.8391 19.4908 10.7251 19.5489 10.5305 19.6541C10.5998 18.6654 10.3873 17.7327 10.7251 16.8291C10.9085 16.3348 11.2529 15.9635 11.7092 15.6995C13.8811 14.4447 16.0507 13.1877 18.227 11.9396C19.0211 11.4833 19.8308 11.4945 20.6248 11.953C23.0964 13.3756 25.5657 14.8026 28.0306 16.2341C28.1357 16.2945 28.2677 16.4309 28.2677 16.5338C28.2856 17.5493 28.2788 18.567 28.2788 19.6563C27.3819 19.1396 26.5543 18.6609 25.7267 18.1823C23.8412 17.093 21.9512 16.0149 20.0746 14.91ZM37.4427 30.8779C37.3778 31.6764 36.9103 32.2423 36.2192 32.6404C33.5732 34.1614 30.9294 35.6913 28.2856 37.2168C27.4557 37.6954 26.6259 38.1741 25.7938 38.6527C25.6932 38.7109 25.5903 38.7601 25.4539 38.8317C25.4449 38.693 25.4337 38.5924 25.4337 38.4917C25.4337 37.6149 25.4382 36.7404 25.4293 35.8636C25.4293 35.6645 25.4762 35.5437 25.6596 35.4386C29.5157 33.2198 33.3696 30.9942 37.2212 28.7709C37.2794 28.7374 37.3443 28.7105 37.4539 28.6591C37.4539 29.4375 37.4986 30.1622 37.4427 30.8779ZM37.4628 25.3577C37.4561 26.2658 36.9663 26.9033 36.1901 27.3506C33.175 29.0841 30.1622 30.8265 27.1493 32.5666C26.5991 32.8842 26.0466 33.1996 25.4561 33.5396C25.4472 33.3897 25.436 33.2913 25.436 33.1907C25.436 32.3273 25.4449 31.4617 25.4293 30.5983C25.4248 30.3523 25.5075 30.2226 25.72 30.0995C28.46 28.5271 31.1911 26.9368 33.9355 25.3733C34.4231 25.096 34.6378 24.7538 34.6334 24.1812C34.6132 21.1974 34.6244 18.2136 34.6244 15.2298V14.7087C35.3402 15.1404 36.0112 15.496 36.624 15.9299C37.1832 16.3258 37.465 16.9253 37.4673 17.6164C37.4762 20.1976 37.4829 22.7788 37.465 25.3599L37.4628 25.3577Z" fill="%230D0D0D"></path><path fill-rule="evenodd" d="M24 0C10.7452 0 0 10.7452 0 24C0 37.2548 10.7452 48 24 48C37.2548 48 48 37.2548 48 24C48 10.7452 37.2548 0 24 0ZM24 2C11.8497 2 2 11.8497 2 24C2 36.1503 11.8497 46 24 46C36.1503 46 46 36.1503 46 24C46 11.8497 36.1503 2 24 2Z" fill="url(%23paint2_radial_6324_83922)"></path><path fill-rule="evenodd" d="M24 0C10.7452 0 0 10.7452 0 24C0 37.2548 10.7452 48 24 48C37.2548 48 48 37.2548 48 24C48 10.7452 37.2548 0 24 0ZM24 2C11.8497 2 2 11.8497 2 24C2 36.1503 11.8497 46 24 46C36.1503 46 46 36.1503 46 24C46 11.8497 36.1503 2 24 2Z" fill="url(%23paint3_radial_6324_83922)"></path><defs><radialGradient id="paint0_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(13.4442 13.3899) rotate(44.9817) scale(46.7487 99.1435)"><stop stop-color="%23A3EEF8"></stop><stop offset="0.177083" stop-color="%23A4DCF5"></stop><stop offset="0.380208" stop-color="%23A6AEEC"></stop><stop offset="1" stop-color="%23ECBEE1"></stop></radialGradient><radialGradient id="paint1_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(25.9515 43.7068) rotate(84.265) scale(24.2138 46.3215)"><stop stop-color="%23FCF5EE"></stop><stop offset="0.715135" stop-color="%23ECBEE1" stop-opacity="0"></stop></radialGradient><radialGradient id="paint2_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(12.7405 12.6825) rotate(44.9817) scale(49.8653 105.753)"><stop stop-color="%23A3EEF8"></stop><stop offset="0.177083" stop-color="%23A4DCF5"></stop><stop offset="0.380208" stop-color="%23A6AEEC"></stop><stop offset="1" stop-color="%23ECBEE1"></stop></radialGradient><radialGradient id="paint3_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(26.0816 45.0206) rotate(84.265) scale(25.828 49.4096)"><stop stop-color="%23FCF5EE"></stop><stop offset="0.715135" stop-color="%23ECBEE1" stop-opacity="0"></stop></radialGradient></defs></g></svg>',name:"Immutable Passport",rdns:"com.immutable.passport",uuid:v4()};function Ut(n){if(typeof window>"u")return;let e=new CustomEvent("eip6963:announceProvider",{detail:Object.freeze(n)});window.dispatchEvent(e);let t=()=>window.dispatchEvent(e);window.addEventListener("eip6963:requestProvider",t);}var An=n=>n.overrides?createConfig({basePath:n.overrides.imxPublicApiDomain}):n.baseConfig.environment===Environment.SANDBOX?imxApiConfig.getSandbox():imxApiConfig.getProduction(),In=n=>{if(n.overrides?.imxApiClients)return n.overrides.imxApiClients;let e=An(n);return new ImxApiClients(e)},Sn=n=>{let e=new Z(n),t=new N(e),r=new b(e),i=new MagicTeeApiClients({basePath:e.magicTeeBasePath,timeout:e.magicTeeTimeout,magicPublishableApiKey:e.magicPublishableApiKey,magicProviderId:e.magicProviderId}),a=new U(t,i),s=new MultiRollupApiClients(e.multiRollupConfig),o=new O,c=n.overrides?n.overrides.immutableXClient:new IMXClient({baseConfig:n.baseConfig}),d=new L({confirmationScreen:r,config:e,authManager:t,guardianApi:s.guardianApi}),l=In(n),m=new q({authManager:t,immutableXClient:c,magicTEESigner:a,passportEventEmitter:o,imxApiClients:l,guardianClient:d});return {config:e,authManager:t,magicTEESigner:a,confirmationScreen:r,immutableXClient:c,multiRollupApiClients:s,passportEventEmitter:o,passportImxProviderFactory:m,guardianClient:d}},Ie=class{authManager;config;confirmationScreen;immutableXClient;magicTEESigner;multiRollupApiClients;passportImxProviderFactory;passportEventEmitter;guardianClient;constructor(e){let t=Sn(e);this.config=t.config,this.authManager=t.authManager,this.magicTEESigner=t.magicTEESigner,this.confirmationScreen=t.confirmationScreen,this.immutableXClient=t.immutableXClient,this.multiRollupApiClients=t.multiRollupApiClients,this.passportEventEmitter=t.passportEventEmitter,this.passportImxProviderFactory=t.passportImxProviderFactory,this.guardianClient=t.guardianClient,setPassportClientId(e.clientId),track("passport","initialise");}async connectImxSilent(){return h(()=>this.passportImxProviderFactory.getProviderSilent(),"connectImxSilent",!1)}async connectImx(){return h(()=>this.passportImxProviderFactory.getProvider(),"connectImx",!1)}async connectEvm(e={announceProvider:!0}){return h(async()=>{let t=null;try{t=await this.authManager.getUser();}catch{}let r=new se({passportEventEmitter:this.passportEventEmitter,authManager:this.authManager,config:this.config,multiRollupApiClients:this.multiRollupApiClients,guardianClient:this.guardianClient,ethSigner:this.magicTEESigner,user:t});return e?.announceProvider&&Ut({info:Nt,provider:r}),r},"connectEvm",!1)}#t=null;async login(e){if(this.#t)return this.#t;this.#t=h(async()=>{let{useCachedSession:t=!1,useSilentLogin:r}=e||{},i=null;try{i=await this.authManager.getUser();}catch(a){if(a instanceof Error&&!a.message.includes("Unknown or invalid refresh token")&&trackError("passport","login",a),t)throw a;I.warn("Failed to retrieve a cached user session",a);}return !i&&r?i=await this.authManager.forceUserRefresh():!i&&!t&&(e?.useRedirectFlow?await this.authManager.loginWithRedirect(e?.anonymousId,e?.directLoginOptions):i=await this.authManager.login(e?.anonymousId,e?.directLoginOptions)),i&&(identify({passportId:i.profile.sub}),this.passportEventEmitter.emit("loggedIn",i)),i?i.profile:null},"login");try{return await this.#t}finally{this.#t=null;}}async loginCallback(){await h(()=>this.authManager.loginCallback(),"loginCallback").then(e=>{e&&(identify({passportId:e.profile.sub}),this.passportEventEmitter.emit("loggedIn",e));});}loginWithPKCEFlow(e){return h(async()=>await this.authManager.getPKCEAuthorizationUrl(e),"loginWithPKCEFlow")}async loginWithPKCEFlowCallback(e,t){return h(async()=>{let r=await this.authManager.loginWithPKCEFlowCallback(e,t);return this.passportEventEmitter.emit("loggedIn",r),r.profile},"loginWithPKCEFlowCallback")}async storeTokens(e){return h(async()=>{let t=await this.authManager.storeTokens(e);return this.passportEventEmitter.emit("loggedIn",t),t.profile},"storeTokens")}async logout(){return h(async()=>{await this.authManager.logout(),this.passportEventEmitter.emit("loggedOut");},"logout")}async getLogoutUrl(){return h(async()=>(await this.authManager.removeUser(),this.passportEventEmitter.emit("loggedOut"),await this.authManager.getLogoutUrl()),"getLogoutUrl")}async logoutSilentCallback(e){return h(()=>this.authManager.logoutSilentCallback(e),"logoutSilentCallback")}async getUserInfo(){return h(async()=>(await this.authManager.getUser())?.profile,"getUserInfo",!1)}async getIdToken(){return h(async()=>(await this.authManager.getUser())?.idToken,"getIdToken",!1)}async getAccessToken(){return h(async()=>(await this.authManager.getUser())?.accessToken,"getAccessToken",!1,!1)}async getLinkedAddresses(){return h(async()=>{let e=await this.authManager.getUser();if(!e?.profile.sub)return [];let t={Authorization:`Bearer ${e.accessToken}`};return (await this.multiRollupApiClients.passportProfileApi.getUserInfo({headers:t})).data.linked_addresses},"getLinkedAddresses",!1)}async linkExternalWallet(e){let t=trackFlow("passport","linkExternalWallet",!1),r=await this.authManager.getUser();if(!r)throw new g("User is not logged in","NOT_LOGGED_IN_ERROR");let i=v(r),a=k(r);if(!i&&!a)throw new g("User has not been registered","USER_NOT_REGISTERED_ERROR");let s={Authorization:`Bearer ${r.accessToken}`},o={type:e.type,wallet_address:e.walletAddress,signature:e.signature,nonce:e.nonce};try{return {...(await this.multiRollupApiClients.passportProfileApi.linkWalletV2({linkWalletV2Request:o},{headers:s})).data}}catch(c){if(c instanceof Error?trackError("passport","linkExternalWallet",c):t.addEvent("errored"),isAxiosError(c)&&c.response){if(c.response.data&&oe(c.response.data)){let{code:l,message:m}=c.response.data;switch(l){case"ALREADY_LINKED":throw new g(m,"LINK_WALLET_ALREADY_LINKED_ERROR");case"MAX_WALLETS_LINKED":throw new g(m,"LINK_WALLET_MAX_WALLETS_LINKED_ERROR");case"DUPLICATE_NONCE":throw new g(m,"LINK_WALLET_DUPLICATE_NONCE_ERROR");case"VALIDATION_ERROR":throw new g(m,"LINK_WALLET_VALIDATION_ERROR");default:throw new g(m,"LINK_WALLET_GENERIC_ERROR")}}else if(c.response.status)throw new g(`Link wallet request failed with status code ${c.response.status}`,"LINK_WALLET_GENERIC_ERROR")}let d="Link wallet request failed";throw c instanceof Error&&(d+=`: ${c.message}`),new g(d,"LINK_WALLET_GENERIC_ERROR")}finally{t.addEvent("End");}}};
|
|
349
|
+
)[]`,Ce=n=>n.map(e=>({delegateCall:e.delegateCall===!0,revertOnError:e.revertOnError===!0,gasLimit:e.gasLimit??BigInt(0),target:e.to??ZeroAddress,value:e.value??BigInt(0),data:e.data??"0x"})),Gr=(n,e)=>{let t=AbiCoder.defaultAbiCoder().encode(["uint256",lt],[n,e]);return keccak256(t)},pt=n=>AbiCoder.defaultAbiCoder().encode([lt],[n]),Fr=n=>n||0n,Br=(n,e)=>{let t=BigInt(n)*2n**96n;return BigInt(e)+t},J=async(n,e,t)=>{try{let r=new Contract(e,walletContracts.mainModule.abi,n),i=Fr(t),a=await r.readNonce(i);if(typeof a=="bigint")return Br(i,a);throw new Error("Unexpected result from contract.nonce() call.")}catch(r){if(isError(r,"BAD_DATA"))return BigInt(0);throw r}},Re=(n,e,t)=>solidityPacked(["string","uint256","address","bytes32"],[Lr,n,e,t]),Te=async(n,e,t,r,i)=>{let a=Ce(n),s=Gr(e,a),o=Re(t,r,s),c=keccak256(o),d=getBytes(c),l=performance.now(),p=await i.signMessage(d);trackDuration("passport","magicSignMessageGetSignedMetaTransactions",Math.round(performance.now()-l));let u=`${p}${dt}`,E=v1.signature.encodeSignature({version:1,threshold:Dr,signers:[{isDynamic:!1,unrecovered:!0,weight:ct,signature:u}]}),R=new Interface(walletContracts.mainModule.abi);return R.encodeFunctionData(R.getFunction("execute")??"",[a,e,E])},Vr=n=>{let e=`0x0000${n}`;return v1.signature.decodeSignature(e)},ve=(n,e,t)=>{let r=`${n}${dt}`,{signers:i}=Vr(t),s=[...i,{isDynamic:!1,unrecovered:!0,weight:ct,signature:r,address:e}].sort((o,c)=>{let d=BigInt(o.address??0),l=BigInt(c.address??0);return d<=l?-1:d===l?0:1});return v1.signature.encodeSignature({version:1,threshold:Ur,signers:s})},mt=async(n,e,t,r,i)=>{let a={...n.types};delete a.EIP712Domain;let s=TypedDataEncoder.hash(n.domain,a,n.message),o=Re(t,r,s),c=keccak256(o),d=getBytes(c),l=performance.now(),p=await i.signMessage(d);trackDuration("passport","magicSignMessageTypedData",Math.round(performance.now()-l));let u=await i.getAddress();return ve(p,u,e)},ut=async(n,e,t,r)=>{let i=hashMessage(e),a=Re(n,r,i),s=keccak256(a),o=getBytes(s);return t.signMessage(o)},T=n=>`eip155:${n}`;var z=class n{config;rpcProvider;authManager;constructor({config:e,rpcProvider:t,authManager:r}){this.config=e,this.rpcProvider=t,this.authManager=r;}static getResponsePreview(e){return e.length>100?`${e.substring(0,50)}...${e.substring(e.length-50)}`:e}async postToRelayer(e){let t={id:1,jsonrpc:"2.0",...e},r=await this.authManager.getUserZkEvm(),i=await fetch(`${this.config.relayerUrl}/v1/transactions`,{method:"POST",headers:{Authorization:`Bearer ${r.accessToken}`,"Content-Type":"application/json"},body:JSON.stringify(t)}),a=await i.text();if(!i.ok){let o=n.getResponsePreview(a);throw new Error(`Relayer HTTP error: ${i.status}. Content: "${o}"`)}let s;try{s=JSON.parse(a);}catch(o){let c=n.getResponsePreview(a);throw new Error(`Relayer JSON parse error: ${o instanceof Error?o.message:"Unknown error"}. Content: "${c}"`)}if(s.error)throw new Error(s.error);return s}async ethSendTransaction(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),i={method:"eth_sendTransaction",params:[{to:e,data:t,chainId:T(Number(r))}]},{result:a}=await this.postToRelayer(i);return a}async imGetTransactionByHash(e){let t={method:"im_getTransactionByHash",params:[e]},{result:r}=await this.postToRelayer(t);return r}async imGetFeeOptions(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),i={method:"im_getFeeOptions",params:[{userAddress:e,data:t,chainId:T(Number(r))}]},{result:a}=await this.postToRelayer(i);return a}async imSignTypedData(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),i={method:"im_signTypedData",params:[{address:e,eip712Payload:t,chainId:T(Number(r))}]},{result:a}=await this.postToRelayer(i);return a}async imSign(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),i={method:"im_sign",params:[{address:e,message:t,chainId:T(Number(r))}]},{result:a}=await this.postToRelayer(i);return a}};var j=(i=>(i[i.USER_REJECTED_REQUEST=4001]="USER_REJECTED_REQUEST",i[i.UNAUTHORIZED=4100]="UNAUTHORIZED",i[i.UNSUPPORTED_METHOD=4200]="UNSUPPORTED_METHOD",i[i.DISCONNECTED=4900]="DISCONNECTED",i))(j||{}),v=(o=>(o[o.RPC_SERVER_ERROR=-32e3]="RPC_SERVER_ERROR",o[o.INVALID_REQUEST=-32600]="INVALID_REQUEST",o[o.METHOD_NOT_FOUND=-32601]="METHOD_NOT_FOUND",o[o.INVALID_PARAMS=-32602]="INVALID_PARAMS",o[o.INTERNAL_ERROR=-32603]="INTERNAL_ERROR",o[o.PARSE_ERROR=-32700]="PARSE_ERROR",o[o.TRANSACTION_REJECTED=-32003]="TRANSACTION_REJECTED",o))(v||{}),m=class extends Error{message;code;constructor(e,t){super(t),this.message=t,this.code=e;}};var Wr="Only sign this message from Immutable Passport";async function gt({authManager:n,ethSigner:e,multiRollupApiClients:t,accessToken:r,rpcProvider:i,flow:a}){let s=e.getAddress();s.then(()=>a.addEvent("endGetAddress"));let o=signRaw(Wr,e);o.then(()=>a.addEvent("endSignRaw"));let c=i.getNetwork();c.then(()=>a.addEvent("endDetectNetwork"));let d=t.chainsApi.listChains();d.then(()=>a.addEvent("endListChains"));let[l,p,u,E]=await Promise.all([s,o,c,d]),R=T(Number(u.chainId)),y=E.data?.result?.find(P=>P.id===R)?.name;if(!y)throw new m(-32603,`Chain name does not exist on for chain id ${u.chainId}`);try{let P=await t.passportApi.createCounterfactualAddressV2({chainName:y,createCounterfactualAddressRequest:{ethereum_address:l,ethereum_signature:p}},{headers:{Authorization:`Bearer ${r}`}});return a.addEvent("endCreateCounterfactualAddress"),n.forceUserRefreshInBackground(),P.data.counterfactual_address}catch(P){throw new m(-32603,`Failed to create counterfactual address: ${P}`)}}var Y="Transaction requires confirmation but this functionality is not supported in this environment. Please contact Immutable support if you need to enable this feature.",Q=n=>BigInt(n).toString(),$r=n=>{try{return n.map(e=>({delegateCall:e.delegateCall===!0,revertOnError:e.revertOnError===!0,gasLimit:e.gasLimit?Q(e.gasLimit):"0",target:e.to??ZeroAddress,value:e.value?Q(e.value):"0",data:e.data?e.data.toString():"0x"}))}catch(e){let t=e instanceof Error?e.message:String(e);throw new m(-32602,`Transaction failed to parsing: ${t}`)}},U=class{guardianApi;confirmationScreen;crossSdkBridgeEnabled;authManager;constructor({confirmationScreen:e,config:t,authManager:r,guardianApi:i}){this.confirmationScreen=e,this.crossSdkBridgeEnabled=t.crossSdkBridgeEnabled,this.guardianApi=i,this.authManager=r;}withConfirmationScreen(e){return t=>this.withConfirmationScreenTask(e)(t)()}withConfirmationScreenTask(e){return t=>async()=>{this.confirmationScreen.loading(e);try{return await t()}catch(r){throw r instanceof g&&r.type==="SERVICE_UNAVAILABLE_ERROR"?(await this.confirmationScreen.showServiceUnavailable(),r):(this.confirmationScreen.closeWindow(),r)}}}withDefaultConfirmationScreenTask(e){return this.withConfirmationScreenTask()(e)}async evaluateImxTransaction({payloadHash:e}){try{let t=()=>{this.confirmationScreen.closeWindow();},r=await this.authManager.getUserImx(),i={Authorization:`Bearer ${r.accessToken}`};if(!(await S(async()=>this.guardianApi.getTransactionByID({transactionID:e,chainType:"starkex"},{headers:i}),{finallyFn:t})).data.id)throw new Error("Transaction doesn't exists");let s=await this.guardianApi.evaluateTransaction({id:e,transactionEvaluationRequest:{chainType:"starkex"}},{headers:i}),{confirmationRequired:o}=s.data;if(o){if(this.crossSdkBridgeEnabled)throw new Error(Y);if(!(await this.confirmationScreen.requestConfirmation(e,r.imx.ethAddress,we.mr.TransactionApprovalRequestChainTypeEnum.Starkex)).confirmed)throw new Error("Transaction rejected by user")}else this.confirmationScreen.closeWindow();}catch(t){throw ht.isAxiosError(t)&&t.response?.status===403?new g("Service unavailable","SERVICE_UNAVAILABLE_ERROR"):t}}async evaluateEVMTransaction({chainId:e,nonce:t,metaTransactions:r}){let i=await this.authManager.getUserZkEvm(),a={Authorization:`Bearer ${i.accessToken}`},s=$r(r);try{return (await this.guardianApi.evaluateTransaction({id:"evm",transactionEvaluationRequest:{chainType:"evm",chainId:e,transactionData:{nonce:t,userAddress:i.zkEvm.ethAddress,metaTransactions:s}}},{headers:a})).data}catch(o){if(ht.isAxiosError(o)&&o.response?.status===403)throw new g("Service unavailable","SERVICE_UNAVAILABLE_ERROR");let c=o instanceof Error?o.message:String(o);throw new m(-32603,`Transaction failed to validate with error: ${c}`)}}async validateEVMTransaction({chainId:e,nonce:t,metaTransactions:r,isBackgroundTransaction:i}){let a=await this.evaluateEVMTransaction({chainId:e,nonce:t,metaTransactions:r}),{confirmationRequired:s,transactionId:o}=a;if(s&&this.crossSdkBridgeEnabled)throw new m(-32003,Y);if(s&&o){let c=await this.authManager.getUserZkEvm();if(!(await this.confirmationScreen.requestConfirmation(o,c.zkEvm.ethAddress,we.mr.TransactionApprovalRequestChainTypeEnum.Evm,e)).confirmed)throw new m(-32003,"Transaction rejected by user")}else i||this.confirmationScreen.closeWindow();}async handleEIP712MessageEvaluation({chainID:e,payload:t}){try{let r=await this.authManager.getUserZkEvm();if(r===null)throw new m(4100,"User not logged in. Please log in first.");return (await this.guardianApi.evaluateMessage({messageEvaluationRequest:{chainID:e,payload:t}},{headers:{Authorization:`Bearer ${r.accessToken}`}})).data}catch(r){let i=r instanceof Error?r.message:String(r);throw new m(-32603,`Message failed to validate with error: ${i}`)}}async evaluateEIP712Message({chainID:e,payload:t}){let{messageId:r,confirmationRequired:i}=await this.handleEIP712MessageEvaluation({chainID:e,payload:t});if(i&&this.crossSdkBridgeEnabled)throw new m(-32003,Y);if(i&&r){let a=await this.authManager.getUserZkEvm();if(!(await this.confirmationScreen.requestMessageConfirmation(r,a.zkEvm.ethAddress,"eip712")).confirmed)throw new m(-32003,"Signature rejected by user")}else this.confirmationScreen.closeWindow();}async handleERC191MessageEvaluation({chainID:e,payload:t}){try{let r=await this.authManager.getUserZkEvm();if(r===null)throw new m(4100,"User not logged in. Please log in first.");return (await this.guardianApi.evaluateErc191Message({eRC191MessageEvaluationRequest:{chainID:T(Number(e)),payload:t}},{headers:{Authorization:`Bearer ${r.accessToken}`}})).data}catch(r){let i=r instanceof Error?r.message:String(r);throw new m(-32603,`Message failed to validate with error: ${i}`)}}async evaluateERC191Message({chainID:e,payload:t}){let{messageId:r,confirmationRequired:i}=await this.handleERC191MessageEvaluation({chainID:e,payload:t});if(i&&this.crossSdkBridgeEnabled)throw new m(-32003,Y);if(i&&r){let a=await this.authManager.getUserZkEvm();if(!(await this.confirmationScreen.requestMessageConfirmation(r,a.zkEvm.ethAddress,"erc191")).confirmed)throw new m(-32003,"Signature rejected by user")}else this.confirmationScreen.closeWindow();}};var Zr=30,Kr=1e3,Xr=async(n,e,t)=>{let r=Ce([n]),i=pt(r),a=await t.imGetFeeOptions(e,i);if(!a||!Array.isArray(a))throw new Error("Invalid fee options received from relayer");let s=a.find(o=>o.tokenSymbol==="IMX");if(!s)throw new Error("Failed to retrieve fees for IMX token");return s},Jr=async(n,e,t,r,i)=>{if(!n.to)throw new m(-32602,'eth_sendTransaction requires a "to" field');let a={to:n.to.toString(),data:n.data,nonce:BigInt(0),value:n.value,revertOnError:!0},[s,o]=await Promise.all([J(e,r,i),Xr(a,r,t)]),c=[{...a,nonce:s}],d=BigInt(o.tokenPrice);return d!==BigInt(0)&&c.push({nonce:s,to:o.recipientAddress,value:d,revertOnError:!0}),c},ee=async(n,e,t)=>{let i=await S(async()=>{let a=await n.imGetTransactionByHash(e);if(a.status==="PENDING")throw new Error;return a},{retries:Zr,interval:Kr,finalErr:new m(-32e3,"transaction hash not generated in time")});if(t.addEvent("endRetrieveRelayerTransaction"),!["SUBMITTED","SUCCESSFUL"].includes(i.status)){let a=`Transaction failed to submit with status ${i.status}.`;throw i.statusMessage&&(a+=` Error message: ${i.statusMessage}`),new m(-32e3,a)}return i},te=async({transactionRequest:n,ethSigner:e,rpcProvider:t,guardianClient:r,relayerClient:i,zkEvmAddress:a,flow:s,nonceSpace:o,isBackgroundTransaction:c})=>{let{chainId:d}=await t.getNetwork(),l=BigInt(d);s.addEvent("endDetectNetwork");let p=await Jr(n,t,i,a,o);s.addEvent("endBuildMetaTransactions");let{nonce:u}=p[0];if(typeof u>"u")throw new Error("Failed to retrieve nonce from the smart wallet");let E=async()=>{await r.validateEVMTransaction({chainId:T(Number(d)),nonce:Q(u),metaTransactions:p,isBackgroundTransaction:c}),s.addEvent("endValidateEVMTransaction");},R=async()=>{let Lt=await Te(p,u,l,a,e);return s.addEvent("endGetSignedMetaTransactions"),Lt},[,y]=await Promise.all([E(),R()]),P=await i.ethSendTransaction(a,y);return s.addEvent("endRelayerSendTransaction"),{signedTransactions:y,relayerId:P,nonce:u}},zr=async n=>{if(!n.to)throw new m(-32602,'im_signEjectionTransaction requires a "to" field');if(typeof n.nonce>"u")throw new m(-32602,'im_signEjectionTransaction requires a "nonce" field');if(!n.chainId)throw new m(-32602,'im_signEjectionTransaction requires a "chainId" field');return [{to:n.to.toString(),data:n.data,nonce:n.nonce??void 0,value:n.value,revertOnError:!0}]},ft=async({transactionRequest:n,ethSigner:e,zkEvmAddress:t,flow:r})=>{let i=await zr(n);r.addEvent("endBuildMetaTransactions");let a=await Te(i,n.nonce,BigInt(n.chainId??0),t,e);return r.addEvent("endGetSignedMetaTransactions"),{to:t,data:a,chainId:T(Number(n.chainId??0))}};var _e=async({params:n,ethSigner:e,rpcProvider:t,relayerClient:r,guardianClient:i,zkEvmAddress:a,flow:s,nonceSpace:o,isBackgroundTransaction:c=!1})=>{let d=n[0],{relayerId:l}=await te({transactionRequest:d,ethSigner:e,rpcProvider:t,guardianClient:i,relayerClient:r,zkEvmAddress:a,flow:s,nonceSpace:o,isBackgroundTransaction:c}),{hash:p}=await ee(r,l,s);return p};var Et=["types","domain","primaryType","message"],jr=n=>Et.every(e=>e in n),Yr=(n,e)=>{let t;if(typeof n=="string")try{t=JSON.parse(n);}catch(i){throw new m(-32602,`Failed to parse typed data JSON: ${i}`)}else if(typeof n=="object")t=n;else throw new m(-32602,`Invalid typed data argument: ${n}`);if(!jr(t))throw new m(-32602,`Invalid typed data argument. The following properties are required: ${Et.join(", ")}`);let r=t.domain?.chainId;if(r&&(typeof r=="string"&&(r.startsWith("0x")?t.domain.chainId=parseInt(r,16).toString():t.domain.chainId=parseInt(r,10).toString()),BigInt(t.domain.chainId??0)!==e))throw new m(-32602,`Invalid chainId, expected ${e}`);return t},yt=async({params:n,method:e,ethSigner:t,rpcProvider:r,relayerClient:i,guardianClient:a,flow:s})=>{let o=n[0],c=n[1];if(!o||!c)throw new m(-32602,`${e} requires an address and a typed data JSON`);let{chainId:d}=await r.getNetwork(),l=Yr(c,d);s.addEvent("endDetectNetwork"),await a.evaluateEIP712Message({chainID:String(d),payload:l}),s.addEvent("endValidateMessage");let p=await i.imSignTypedData(o,l);s.addEvent("endRelayerSignTypedData");let u=await mt(l,p,BigInt(d),o,t);return s.addEvent("getSignedTypedData"),u};var Ct=n=>{if(!n)return n;try{let e=stripZerosLeft(getBytes(n));return toUtf8String(e)}catch{return n}};var re=async({params:n,ethSigner:e,zkEvmAddress:t,rpcProvider:r,guardianClient:i,relayerClient:a,flow:s})=>{let o=n[0],c=n[1];if(!c||!o)throw new m(-32602,"personal_sign requires an address and a message");if(c.toLowerCase()!==t.toLowerCase())throw new m(-32602,"personal_sign requires the signer to be the from address");let d=Ct(o),{chainId:l}=await r.getNetwork();s.addEvent("endDetectNetwork");let p=BigInt(l),u=ut(p,d,e,c);u.then(()=>s.addEvent("endEOASignature")),await i.evaluateERC191Message({chainID:l,payload:d}),s.addEvent("endEvaluateERC191Message");let[E,R]=await Promise.all([u,a.imSign(c,d)]);s.addEvent("endRelayerSign");let y=await e.getAddress();return s.addEvent("endGetEOAAddress"),ve(E,y,R)};var nn="https://api.immutable.com",an="https://api.sandbox.immutable.com",sn="/v1/sdk/session-activity/check",on=n=>{switch(n){case Environment.SANDBOX:return an;case Environment.PRODUCTION:return nn;default:throw new Error("Environment not supported")}},ne,Tt=n=>{ne||(ne=ht.create({baseURL:on(n)}));};async function vt(n){if(!ne)throw new Error("Client not initialised");return ne.get(sn,{params:n}).then(e=>e.data).catch(e=>{if(e.response.status!==404)throw e})}function _t(n,e){return (...t)=>{try{let r=n(...t);return r instanceof Promise?r.catch(i=>(i instanceof Error&&trackError("passport","sessionActivityError",i),e)):r}catch(r){return r instanceof Error&&trackError("passport","sessionActivityError",r),e}}}var{getItem:Pt,setItem:Pe}=utils.localStorage,Ae="sessionActivitySendCount",At="sessionActivityDate",Ie={},_={},ie={},It=()=>{_=Pt(Ae)||{};let n=Pt(At),e=new Date,t=e.getFullYear(),r=`${e.getMonth()+1}`.padStart(2,"0"),i=`${e.getDate()}`.padStart(2,"0"),a=`${t}-${r}-${i}`;(!n||n!==a)&&(_={}),Pe(At,a),Pe(Ae,_);};It();var mn=n=>{It(),_[n]||(_[n]=0),_[n]++,Pe(Ae,_),Ie[n]=0;},un=async n=>new Promise(e=>{setTimeout(e,n*1e3);}),gn=async n=>{let e=n.flow||trackFlow("passport","sendSessionActivity"),t=n.passportClient;if(!t)throw e.addEvent("No Passport Client ID"),new Error("No Passport Client ID provided");if(ie[t])return;ie[t]=!0;let{sendTransaction:r,environment:i}=n;if(!r)throw new Error("No sendTransaction function provided");if(!i)throw new Error("No environment provided");Tt(i);let a=n.walletAddress;if(!a)throw e.addEvent("No Passport Wallet Address"),new Error("No wallet address");let s;try{if(s=await vt({clientId:t,wallet:a,checkCount:Ie[t]||0,sendCount:_[t]||0}),Ie[t]++,!s)return}catch(o){throw e.addEvent("Failed to fetch details"),new Error("Failed to get details",{cause:o})}if(s&&s.contractAddress&&s.functionName){let c=new Interface([`function ${s.functionName}()`]).encodeFunctionData(s.functionName),d=s.contractAddress;try{e.addEvent("Start Sending Transaction");let l=await n.sendTransaction([{to:d,from:a,data:c}],e);mn(t),e.addEvent("Transaction Sent",{tx:l});}catch(l){e.addEvent("Failed to send Transaction");let p=new Error("Failed to send transaction",{cause:l});trackError("passport","sessionActivityError",p,{flowId:e.details.flowId});}}s&&s.delay&&s.delay>0&&(e.addEvent("Delaying Transaction",{delay:s.delay}),await un(s.delay),setTimeout(()=>{e.addEvent("Retrying after Delay"),ie[t]=!1,St({...n,flow:e});},0));},St=n=>_t(gn)(n).then(()=>{ie[n.passportClient]=!1;}),Ot=St;var kt=async({params:n,ethSigner:e,rpcProvider:t,relayerClient:r,guardianClient:i,zkEvmAddress:a,flow:s})=>{let o={to:a,value:0},{relayerId:c}=await te({transactionRequest:o,ethSigner:e,rpcProvider:t,guardianClient:i,relayerClient:r,zkEvmAddress:a,flow:s});return i.withConfirmationScreen()(async()=>{let d=await re({params:n,ethSigner:e,zkEvmAddress:a,rpcProvider:t,guardianClient:i,relayerClient:r,flow:s});return await ee(r,c,s),d})};var bt=async({params:n,ethSigner:e,zkEvmAddress:t,flow:r})=>{if(!n||n.length!==1)throw new m(-32602,"im_signEjectionTransaction requires a singular param (hash)");let i=n[0];return await ft({transactionRequest:i,ethSigner:e,zkEvmAddress:t,flow:r})};var ae=n=>"zkEvm"in n,se=class{#e;#r;#a;#n;#i;#t;#u;#g;#o;#d;#l;isPassport=!0;constructor({authManager:e,magicAdapter:t,config:r,multiRollupApiClients:i,passportEventEmitter:a,guardianClient:s}){this.#e=e,this.#u=t,this.#r=r,this.#i=s,this.#n=a,this.#t=new JsonRpcProvider(this.#r.zkEvmRpcUrl,void 0,{staticNetwork:!0}),this.#o=new z({config:this.#r,rpcProvider:this.#t,authManager:this.#e}),this.#g=i,this.#a=new O,this.#e.getUser().then(o=>{o&&(this.#m(o),ae(o)&&this.#p(o.zkEvm.ethAddress));}).catch(()=>{}),a.on("loggedIn",o=>{this.#m(o),ae(o)&&this.#p(o.zkEvm.ethAddress);}),a.on("loggedOut",this.#h),a.on("accountsRequested",Ot);}#h=()=>{this.#d=void 0,this.#a.emit("accountsChanged",[]);};#m(e){let t=async()=>{let r=await this.#u.login(e.idToken);return new BrowserProvider(r).getSigner()};this.#l=void 0,this.#d=new Promise(async r=>{try{r(await t());}catch(i){this.#l=i,r(void 0);}});}async#c(){let e=await this.#d;if(typeof e>"u")throw typeof this.#l<"u"?this.#l:new Error("Signer failed to initialise");return e}async#p(e,t){let r=BigInt(1),i=async(a,s)=>{let o=await this.#c();return await _e({params:a,ethSigner:o,guardianClient:this.#i,rpcProvider:this.#t,relayerClient:this.#o,zkEvmAddress:e,flow:s,nonceSpace:r,isBackgroundTransaction:!0})};this.#n.emit("accountsRequested",{environment:this.#r.baseConfig.environment,sendTransaction:i,walletAddress:e,passportClient:t||this.#r.oidcConfiguration.clientId});}async#s(){try{let e=await this.#e.getUser();return e&&ae(e)?e.zkEvm.ethAddress:void 0}catch{return}}async#f(e){switch(e.method){case"eth_requestAccounts":{let t=await this.#s();if(t)return [t];let r=trackFlow("passport","ethRequestAccounts");try{let i=await this.#e.getUserOrLogin();r.addEvent("endGetUserOrLogin"),this.#d||this.#m(i);let a;if(ae(i))a=i.zkEvm.ethAddress;else {r.addEvent("startUserRegistration");let s=await this.#c();r.addEvent("ethSignerResolved"),a=await gt({ethSigner:s,authManager:this.#e,multiRollupApiClients:this.#g,accessToken:i.accessToken,rpcProvider:this.#t,flow:r}),r.addEvent("endUserRegistration");}return this.#a.emit("accountsChanged",[a]),identify({passportId:i.profile.sub}),this.#p(a),[a]}catch(i){throw i instanceof Error?trackError("passport","ethRequestAccounts",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"eth_sendTransaction":{let t=await this.#s();if(!t)throw new m(4100,"Unauthorised - call eth_requestAccounts first");let r=trackFlow("passport","ethSendTransaction");try{return await this.#i.withConfirmationScreen({width:480,height:720})(async()=>{let i=await this.#c();return r.addEvent("endGetSigner"),await _e({params:e.params||[],ethSigner:i,guardianClient:this.#i,rpcProvider:this.#t,relayerClient:this.#o,zkEvmAddress:t,flow:r})})}catch(i){throw i instanceof Error?trackError("passport","eth_sendTransaction",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"eth_accounts":{let t=await this.#s();return t?[t]:[]}case"personal_sign":{let t=await this.#s();if(!t)throw new m(4100,"Unauthorised - call eth_requestAccounts first");let r=trackFlow("passport","personalSign");try{return await this.#i.withConfirmationScreen({width:480,height:720})(async()=>{let i=await this.#c();return r.addEvent("endGetSigner"),this.#r.forceScwDeployBeforeMessageSignature&&!(await J(this.#t,t)>BigInt(0))?await kt({params:e.params||[],ethSigner:i,zkEvmAddress:t,rpcProvider:this.#t,guardianClient:this.#i,relayerClient:this.#o,flow:r}):await re({params:e.params||[],ethSigner:i,zkEvmAddress:t,rpcProvider:this.#t,guardianClient:this.#i,relayerClient:this.#o,flow:r})})}catch(i){throw i instanceof Error?trackError("passport","personal_sign",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"eth_signTypedData":case"eth_signTypedData_v4":{if(!await this.#s())throw new m(4100,"Unauthorised - call eth_requestAccounts first");let r=trackFlow("passport","ethSignTypedDataV4");try{return await this.#i.withConfirmationScreen({width:480,height:720})(async()=>{let i=await this.#c();return r.addEvent("endGetSigner"),await yt({method:e.method,params:e.params||[],ethSigner:i,rpcProvider:this.#t,relayerClient:this.#o,guardianClient:this.#i,flow:r})})}catch(i){throw i instanceof Error?trackError("passport","eth_signTypedData",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"eth_chainId":{let{chainId:t}=await this.#t.getNetwork();return toBeHex(t)}case"eth_getBalance":case"eth_getCode":case"eth_getTransactionCount":{let[t,r]=e.params||[];return this.#t.send(e.method,[t,r||"latest"])}case"eth_getStorageAt":{let[t,r,i]=e.params||[];return this.#t.send(e.method,[t,r,i||"latest"])}case"eth_call":case"eth_estimateGas":{let[t,r]=e.params||[];return this.#t.send(e.method,[t,r||"latest"])}case"eth_gasPrice":case"eth_blockNumber":case"eth_getBlockByHash":case"eth_getBlockByNumber":case"eth_getTransactionByHash":case"eth_getTransactionReceipt":return this.#t.send(e.method,e.params||[]);case"im_signEjectionTransaction":{let t=await this.#s();if(!t)throw new m(4100,"Unauthorised - call eth_requestAccounts first");let r=trackFlow("passport","imSignEjectionTransaction");try{let i=await this.#c();return r.addEvent("endGetSigner"),await bt({params:e.params||[],ethSigner:i,zkEvmAddress:t,flow:r})}catch(i){throw i instanceof Error?trackError("passport","imSignEjectionTransaction",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"im_addSessionActivity":{let[t]=e.params||[],r=await this.#s();return r&&this.#p(r,t),null}default:throw new m(4200,"Method not supported")}}async request(e){try{return this.#f(e)}catch(t){throw t instanceof m?t:t instanceof Error?new m(-32603,t.message):new m(-32603,"Internal error")}}on(e,t){this.#a.on(e,t);}removeListener(e,t){this.#a.removeListener(e,t);}};var xt={icon:'data:image/svg+xml,<svg viewBox="0 0 48 48" class="SvgIcon undefined Logo Logo--PassportSymbolOutlined css-1dn9atd" xmlns="http://www.w3.org/2000/svg"><g data-testid="undefined__g"><circle cx="24" cy="24" r="22.5" fill="url(%23paint0_radial_6324_83922)"></circle><circle cx="24" cy="24" r="22.5" fill="url(%23paint1_radial_6324_83922)"></circle><path d="M24 0C10.7452 0 0 10.7452 0 24C0 37.2548 10.7452 48 24 48C37.2548 48 48 37.2548 48 24C48 10.7452 37.2548 0 24 0ZM23.0718 9.16608C23.7383 8.83951 24.4406 8.86188 25.087 9.2287C27.3282 10.5059 29.5627 11.7942 31.786 13.096C32.5018 13.5165 32.8686 14.1897 32.8708 15.0173C32.8843 17.9184 32.8798 20.8171 32.8708 23.7182C32.8708 23.8255 32.8015 23.9821 32.7143 24.0335C31.8531 24.548 30.9808 25.0423 30.0347 25.5881V25.1318C30.0347 22.148 30.0257 19.1664 30.0414 16.1827C30.0436 15.6101 29.8468 15.241 29.339 14.9525C26.7377 13.474 24.1499 11.9687 21.5575 10.4723C21.4457 10.4075 21.3361 10.3381 21.1661 10.2352C21.8326 9.85722 22.4321 9.47698 23.0673 9.16608H23.0718ZM22.5953 38.8451C22.45 38.7713 22.3426 38.7198 22.2375 38.6595C18.8041 36.68 15.3752 34.687 11.9307 32.7232C10.9644 32.173 10.5238 31.3879 10.5349 30.2852C10.5551 27.9411 10.5484 25.597 10.5372 23.2507C10.5327 22.1927 10.9622 21.4255 11.8926 20.8977C14.3105 19.5221 16.715 18.1264 19.1195 16.7284C19.3275 16.6076 19.4796 16.5875 19.6965 16.7172C20.5264 17.216 21.3719 17.6924 22.2554 18.2024C22.0876 18.3031 21.9601 18.3791 21.8304 18.4552C19.2268 19.9582 16.6278 21.4658 14.0175 22.9599C13.5903 23.2037 13.3912 23.5213 13.3957 24.0179C13.4091 25.8654 13.4114 27.713 13.3957 29.5605C13.3912 30.0705 13.5948 30.3948 14.0332 30.6453C16.7866 32.2199 19.5288 33.8125 22.28 35.3916C22.5126 35.5258 22.611 35.6645 22.6065 35.9418C22.5864 36.888 22.5998 37.8363 22.5998 38.8473L22.5953 38.8451ZM22.5953 33.553C22.356 33.4166 22.1838 33.3204 22.0116 33.2198C19.8285 31.9605 17.6477 30.6967 15.4602 29.4464C15.2231 29.3122 15.1359 29.1668 15.1381 28.8917C15.1538 27.4714 15.1471 26.0511 15.1426 24.6308C15.1426 24.4384 15.1717 24.3064 15.3618 24.1991C16.167 23.7495 16.9633 23.2798 17.7618 22.8212C17.8199 22.7877 17.8826 22.7631 17.9877 22.7116V24.3064C17.9877 25.1698 18.0011 26.0354 17.9832 26.8988C17.972 27.3909 18.1622 27.7241 18.5916 27.9657C19.8285 28.6636 21.0498 29.3883 22.2867 30.0839C22.5305 30.2203 22.6043 30.3724 22.5998 30.6408C22.5842 31.5847 22.5931 32.5308 22.5931 33.5508L22.5953 33.553ZM20.0746 14.91C19.6116 14.6371 19.2157 14.6393 18.7527 14.91C16.1581 16.4265 13.5523 17.9228 10.9487 19.4259C10.8391 19.4908 10.7251 19.5489 10.5305 19.6541C10.5998 18.6654 10.3873 17.7327 10.7251 16.8291C10.9085 16.3348 11.2529 15.9635 11.7092 15.6995C13.8811 14.4447 16.0507 13.1877 18.227 11.9396C19.0211 11.4833 19.8308 11.4945 20.6248 11.953C23.0964 13.3756 25.5657 14.8026 28.0306 16.2341C28.1357 16.2945 28.2677 16.4309 28.2677 16.5338C28.2856 17.5493 28.2788 18.567 28.2788 19.6563C27.3819 19.1396 26.5543 18.6609 25.7267 18.1823C23.8412 17.093 21.9512 16.0149 20.0746 14.91ZM37.4427 30.8779C37.3778 31.6764 36.9103 32.2423 36.2192 32.6404C33.5732 34.1614 30.9294 35.6913 28.2856 37.2168C27.4557 37.6954 26.6259 38.1741 25.7938 38.6527C25.6932 38.7109 25.5903 38.7601 25.4539 38.8317C25.4449 38.693 25.4337 38.5924 25.4337 38.4917C25.4337 37.6149 25.4382 36.7404 25.4293 35.8636C25.4293 35.6645 25.4762 35.5437 25.6596 35.4386C29.5157 33.2198 33.3696 30.9942 37.2212 28.7709C37.2794 28.7374 37.3443 28.7105 37.4539 28.6591C37.4539 29.4375 37.4986 30.1622 37.4427 30.8779ZM37.4628 25.3577C37.4561 26.2658 36.9663 26.9033 36.1901 27.3506C33.175 29.0841 30.1622 30.8265 27.1493 32.5666C26.5991 32.8842 26.0466 33.1996 25.4561 33.5396C25.4472 33.3897 25.436 33.2913 25.436 33.1907C25.436 32.3273 25.4449 31.4617 25.4293 30.5983C25.4248 30.3523 25.5075 30.2226 25.72 30.0995C28.46 28.5271 31.1911 26.9368 33.9355 25.3733C34.4231 25.096 34.6378 24.7538 34.6334 24.1812C34.6132 21.1974 34.6244 18.2136 34.6244 15.2298V14.7087C35.3402 15.1404 36.0112 15.496 36.624 15.9299C37.1832 16.3258 37.465 16.9253 37.4673 17.6164C37.4762 20.1976 37.4829 22.7788 37.465 25.3599L37.4628 25.3577Z" fill="%230D0D0D"></path><path fill-rule="evenodd" d="M24 0C10.7452 0 0 10.7452 0 24C0 37.2548 10.7452 48 24 48C37.2548 48 48 37.2548 48 24C48 10.7452 37.2548 0 24 0ZM24 2C11.8497 2 2 11.8497 2 24C2 36.1503 11.8497 46 24 46C36.1503 46 46 36.1503 46 24C46 11.8497 36.1503 2 24 2Z" fill="url(%23paint2_radial_6324_83922)"></path><path fill-rule="evenodd" d="M24 0C10.7452 0 0 10.7452 0 24C0 37.2548 10.7452 48 24 48C37.2548 48 48 37.2548 48 24C48 10.7452 37.2548 0 24 0ZM24 2C11.8497 2 2 11.8497 2 24C2 36.1503 11.8497 46 24 46C36.1503 46 46 36.1503 46 24C46 11.8497 36.1503 2 24 2Z" fill="url(%23paint3_radial_6324_83922)"></path><defs><radialGradient id="paint0_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(13.4442 13.3899) rotate(44.9817) scale(46.7487 99.1435)"><stop stop-color="%23A3EEF8"></stop><stop offset="0.177083" stop-color="%23A4DCF5"></stop><stop offset="0.380208" stop-color="%23A6AEEC"></stop><stop offset="1" stop-color="%23ECBEE1"></stop></radialGradient><radialGradient id="paint1_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(25.9515 43.7068) rotate(84.265) scale(24.2138 46.3215)"><stop stop-color="%23FCF5EE"></stop><stop offset="0.715135" stop-color="%23ECBEE1" stop-opacity="0"></stop></radialGradient><radialGradient id="paint2_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(12.7405 12.6825) rotate(44.9817) scale(49.8653 105.753)"><stop stop-color="%23A3EEF8"></stop><stop offset="0.177083" stop-color="%23A4DCF5"></stop><stop offset="0.380208" stop-color="%23A6AEEC"></stop><stop offset="1" stop-color="%23ECBEE1"></stop></radialGradient><radialGradient id="paint3_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(26.0816 45.0206) rotate(84.265) scale(25.828 49.4096)"><stop stop-color="%23FCF5EE"></stop><stop offset="0.715135" stop-color="%23ECBEE1" stop-opacity="0"></stop></radialGradient></defs></g></svg>',name:"Immutable Passport",rdns:"com.immutable.passport",uuid:v4()};function Mt(n){if(typeof window>"u")return;let e=new CustomEvent("eip6963:announceProvider",{detail:Object.freeze(n)});window.dispatchEvent(e);let t=()=>window.dispatchEvent(e);window.addEventListener("eip6963:requestProvider",t);}var Rn=n=>n?.length>0&&typeof n[0]=="object"&&"method"in n[0]&&typeof n[0].method=="string"&&["personal_sign","eth_accounts","eth_requestAccounts"].includes(n[0].method),Tn=n=>n?.length>0&&typeof n[0]=="object"&&"method"in n[0]&&typeof n[0].method=="string"&&n[0].method==="eth_requestAccounts",oe=class{authManager;config;constructor(e,t){this.authManager=e,this.config=t;}createProxy(e){let t=e.rpcProvider,r={get:(i,a,s)=>a==="request"?async(...o)=>{try{if(Rn(o)){if(!await e.user.isLoggedIn()){let l=(await this.authManager.getUser())?.idToken;if(!l)throw new Error("failed to obtain ID token");await e.openid.loginWithOIDC({jwt:l,providerId:this.config.magicProviderId});}if(Tn(o))return i.request({method:"eth_accounts"})}return i.request(...o)}catch(c){throw c instanceof Error?new Error(`ProviderProxy: ${c.message}`):new Error(`ProviderProxy: ${c}`)}}:Reflect.get(i,a,s)};return new Proxy(t,r)}};var bn=n=>n.overrides?createConfig({basePath:n.overrides.imxPublicApiDomain}):n.baseConfig.environment===Environment.SANDBOX?imxApiConfig.getSandbox():imxApiConfig.getProduction(),xn=n=>{if(n.overrides?.imxApiClients)return n.overrides.imxApiClients;let e=bn(n);return new ImxApiClients(e)},Mn=n=>{let e=new Z(n),t=new M(e),r=new oe(t,e),i=new N(e,r),a=new k(e),s=new MultiRollupApiClients(e.multiRollupConfig),o=new O,c=n.overrides?n.overrides.immutableXClient:new IMXClient({baseConfig:n.baseConfig}),d=new U({confirmationScreen:a,config:e,authManager:t,guardianApi:s.guardianApi}),l=xn(n),p=new $({authManager:t,immutableXClient:c,magicAdapter:i,passportEventEmitter:o,imxApiClients:l,guardianClient:d});return {config:e,authManager:t,magicAdapter:i,confirmationScreen:a,immutableXClient:c,multiRollupApiClients:s,passportEventEmitter:o,passportImxProviderFactory:p,guardianClient:d}},Se=class{authManager;config;confirmationScreen;immutableXClient;magicAdapter;multiRollupApiClients;passportImxProviderFactory;passportEventEmitter;guardianClient;constructor(e){let t=Mn(e);this.config=t.config,this.authManager=t.authManager,this.magicAdapter=t.magicAdapter,this.confirmationScreen=t.confirmationScreen,this.immutableXClient=t.immutableXClient,this.multiRollupApiClients=t.multiRollupApiClients,this.passportEventEmitter=t.passportEventEmitter,this.passportImxProviderFactory=t.passportImxProviderFactory,this.guardianClient=t.guardianClient,setPassportClientId(e.clientId),track("passport","initialise");}async connectImxSilent(){return h(()=>this.passportImxProviderFactory.getProviderSilent(),"connectImxSilent",!1)}async connectImx(){return h(()=>this.passportImxProviderFactory.getProvider(),"connectImx",!1)}connectEvm(e={announceProvider:!0}){return h(async()=>{let t=new se({passportEventEmitter:this.passportEventEmitter,authManager:this.authManager,magicAdapter:this.magicAdapter,config:this.config,multiRollupApiClients:this.multiRollupApiClients,guardianClient:this.guardianClient});return e?.announceProvider&&Mt({info:xt,provider:t}),t},"connectEvm",!1)}#e=null;async login(e){if(this.#e)return this.#e;this.#e=h(async()=>{let{useCachedSession:t=!1,useSilentLogin:r}=e||{},i=null;try{i=await this.authManager.getUser();}catch(a){if(a instanceof Error&&!a.message.includes("Unknown or invalid refresh token")&&trackError("passport","login",a),t)throw a;A.warn("Failed to retrieve a cached user session",a);}return !i&&r?i=await this.authManager.forceUserRefresh():!i&&!t&&(e?.useRedirectFlow?await this.authManager.loginWithRedirect(e?.anonymousId,e?.directLoginOptions):i=await this.authManager.login(e?.anonymousId,e?.directLoginOptions)),i&&(identify({passportId:i.profile.sub}),this.passportEventEmitter.emit("loggedIn",i)),i?i.profile:null},"login");try{return await this.#e}finally{this.#e=null;}}async loginCallback(){await h(()=>this.authManager.loginCallback(),"loginCallback").then(e=>{e&&(identify({passportId:e.profile.sub}),this.passportEventEmitter.emit("loggedIn",e));});}loginWithPKCEFlow(e){return h(async()=>await this.authManager.getPKCEAuthorizationUrl(e),"loginWithPKCEFlow")}async loginWithPKCEFlowCallback(e,t){return h(async()=>{let r=await this.authManager.loginWithPKCEFlowCallback(e,t);return this.passportEventEmitter.emit("loggedIn",r),r.profile},"loginWithPKCEFlowCallback")}async storeTokens(e){return h(async()=>{let t=await this.authManager.storeTokens(e);return this.passportEventEmitter.emit("loggedIn",t),t.profile},"storeTokens")}async logout(){return h(async()=>{this.config.oidcConfiguration.logoutMode==="silent"?await Promise.allSettled([this.authManager.logout(),this.magicAdapter.logout()]):(await this.magicAdapter.logout(),await this.authManager.logout()),this.passportEventEmitter.emit("loggedOut");},"logout")}async getLogoutUrl(){return h(async()=>(await this.authManager.removeUser(),await this.magicAdapter.logout(),this.passportEventEmitter.emit("loggedOut"),await this.authManager.getLogoutUrl()),"getLogoutUrl")}async logoutSilentCallback(e){return h(()=>this.authManager.logoutSilentCallback(e),"logoutSilentCallback")}async getUserInfo(){return h(async()=>(await this.authManager.getUser())?.profile,"getUserInfo",!1)}async getIdToken(){return h(async()=>(await this.authManager.getUser())?.idToken,"getIdToken",!1)}async getAccessToken(){return h(async()=>(await this.authManager.getUser())?.accessToken,"getAccessToken",!1,!1)}async getLinkedAddresses(){return h(async()=>{let e=await this.authManager.getUser();if(!e?.profile.sub)return [];let t={Authorization:`Bearer ${e.accessToken}`};return (await this.multiRollupApiClients.passportProfileApi.getUserInfo({headers:t})).data.linked_addresses},"getLinkedAddresses",!1)}async linkExternalWallet(e){let t=trackFlow("passport","linkExternalWallet",!1),r=await this.authManager.getUser();if(!r)throw new g("User is not logged in","NOT_LOGGED_IN_ERROR");let i=I(r),a=F(r);if(!i&&!a)throw new g("User has not been registered","USER_NOT_REGISTERED_ERROR");let s={Authorization:`Bearer ${r.accessToken}`},o={type:e.type,wallet_address:e.walletAddress,signature:e.signature,nonce:e.nonce};try{return {...(await this.multiRollupApiClients.passportProfileApi.linkWalletV2({linkWalletV2Request:o},{headers:s})).data}}catch(c){if(c instanceof Error?trackError("passport","linkExternalWallet",c):t.addEvent("errored"),isAxiosError(c)&&c.response){if(c.response.data&&ce(c.response.data)){let{code:l,message:p}=c.response.data;switch(l){case"ALREADY_LINKED":throw new g(p,"LINK_WALLET_ALREADY_LINKED_ERROR");case"MAX_WALLETS_LINKED":throw new g(p,"LINK_WALLET_MAX_WALLETS_LINKED_ERROR");case"DUPLICATE_NONCE":throw new g(p,"LINK_WALLET_DUPLICATE_NONCE_ERROR");case"VALIDATION_ERROR":throw new g(p,"LINK_WALLET_VALIDATION_ERROR");default:throw new g(p,"LINK_WALLET_GENERIC_ERROR")}}else if(c.response.status)throw new g(`Link wallet request failed with status code ${c.response.status}`,"LINK_WALLET_GENERIC_ERROR")}let d="Link wallet request failed";throw c instanceof Error&&(d+=`: ${c.message}`),new g(d,"LINK_WALLET_GENERIC_ERROR")}finally{t.addEvent("End");}}};
|
|
348
350
|
|
|
349
|
-
export {
|
|
351
|
+
export { m as JsonRpcError, Me as MarketingConsentStatus, Se as Passport, g as PassportError, j as ProviderErrorCode, fe as ProviderEvent, v as RpcErrorCode };
|
package/dist/types/Passport.d.ts
CHANGED
|
@@ -2,7 +2,7 @@ import { IMXProvider } from '@imtbl/x-provider';
|
|
|
2
2
|
import { MultiRollupApiClients } from '@imtbl/generated-clients';
|
|
3
3
|
import { IMXClient } from '@imtbl/x-client';
|
|
4
4
|
import AuthManager from './authManager';
|
|
5
|
-
import
|
|
5
|
+
import MagicAdapter from './magic/magicAdapter';
|
|
6
6
|
import { PassportImxProviderFactory } from './starkEx';
|
|
7
7
|
import { PassportConfiguration } from './config';
|
|
8
8
|
import { DirectLoginOptions, DeviceTokenResponse, LinkedWallet, LinkWalletParams, PassportEventMap, PassportModuleConfiguration, UserProfile } from './types';
|
|
@@ -13,7 +13,7 @@ import GuardianClient from './guardian';
|
|
|
13
13
|
export declare const buildPrivateVars: (passportModuleConfiguration: PassportModuleConfiguration) => {
|
|
14
14
|
config: PassportConfiguration;
|
|
15
15
|
authManager: AuthManager;
|
|
16
|
-
|
|
16
|
+
magicAdapter: MagicAdapter;
|
|
17
17
|
confirmationScreen: ConfirmationScreen;
|
|
18
18
|
immutableXClient: IMXClient;
|
|
19
19
|
multiRollupApiClients: MultiRollupApiClients;
|
|
@@ -27,7 +27,7 @@ export declare class Passport {
|
|
|
27
27
|
private readonly config;
|
|
28
28
|
private readonly confirmationScreen;
|
|
29
29
|
private readonly immutableXClient;
|
|
30
|
-
private readonly
|
|
30
|
+
private readonly magicAdapter;
|
|
31
31
|
private readonly multiRollupApiClients;
|
|
32
32
|
private readonly passportImxProviderFactory;
|
|
33
33
|
private readonly passportEventEmitter;
|
|
@@ -48,7 +48,7 @@ export declare class Passport {
|
|
|
48
48
|
* Connects to EVM and optionally announces the provider.
|
|
49
49
|
* @param {Object} options - Configuration options
|
|
50
50
|
* @param {boolean} options.announceProvider - Whether to announce the provider via EIP-6963 for wallet discovery (defaults to true)
|
|
51
|
-
* @returns {
|
|
51
|
+
* @returns {Provider} The EVM provider instance
|
|
52
52
|
*/
|
|
53
53
|
connectEvm(options?: {
|
|
54
54
|
announceProvider: boolean;
|
|
@@ -24,6 +24,7 @@ export default class AuthManager {
|
|
|
24
24
|
*/
|
|
25
25
|
login(anonymousId?: string, directLoginOptions?: DirectLoginOptions): Promise<User>;
|
|
26
26
|
getUserOrLogin(): Promise<User>;
|
|
27
|
+
private static shouldUseSigninPopupCallback;
|
|
27
28
|
loginCallback(): Promise<undefined | User>;
|
|
28
29
|
getPKCEAuthorizationUrl(directLoginOptions?: DirectLoginOptions): Promise<string>;
|
|
29
30
|
loginWithPKCEFlowCallback(authorizationCode: string, state: string): Promise<User>;
|
|
@@ -7,8 +7,6 @@ export declare class PassportConfiguration {
|
|
|
7
7
|
readonly imxPublicApiDomain: string;
|
|
8
8
|
readonly magicPublishableApiKey: string;
|
|
9
9
|
readonly magicProviderId: string;
|
|
10
|
-
readonly magicTeeBasePath: string;
|
|
11
|
-
readonly magicTeeTimeout: number;
|
|
12
10
|
readonly oidcConfiguration: OidcConfiguration;
|
|
13
11
|
readonly baseConfig: ImmutableConfiguration;
|
|
14
12
|
readonly zkEvmRpcUrl: string;
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
import { Eip1193Provider } from 'ethers';
|
|
2
|
+
import { PassportConfiguration } from '../config';
|
|
3
|
+
import { MagicProviderProxyFactory } from './magicProviderProxyFactory';
|
|
4
|
+
export default class MagicAdapter {
|
|
5
|
+
private readonly config;
|
|
6
|
+
private readonly magicProviderProxyFactory;
|
|
7
|
+
private readonly magicClient?;
|
|
8
|
+
constructor(config: PassportConfiguration, magicProviderProxyFactory: MagicProviderProxyFactory);
|
|
9
|
+
private getMagicClient;
|
|
10
|
+
login(idToken: string): Promise<Eip1193Provider>;
|
|
11
|
+
logout(): Promise<void>;
|
|
12
|
+
}
|
|
@@ -0,0 +1,15 @@
|
|
|
1
|
+
import { Eip1193Provider } from 'ethers';
|
|
2
|
+
import AuthManager from '../authManager';
|
|
3
|
+
import { PassportConfiguration } from '../config';
|
|
4
|
+
import { MagicClient } from './types';
|
|
5
|
+
/**
|
|
6
|
+
* Factory class for creating a Magic provider that automatically handles re-authentication.
|
|
7
|
+
* This proxy wraps the Magic RPC provider to intercept certain RPC methods (`personal_sign`, `eth_accounts`)
|
|
8
|
+
* and ensures the user is properly authenticated before executing them.
|
|
9
|
+
*/
|
|
10
|
+
export declare class MagicProviderProxyFactory {
|
|
11
|
+
private authManager;
|
|
12
|
+
private config;
|
|
13
|
+
constructor(authManager: AuthManager, config: PassportConfiguration);
|
|
14
|
+
createProxy(magicClient: MagicClient): Eip1193Provider;
|
|
15
|
+
}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export {};
|
|
@@ -3,16 +3,6 @@ import { MockedRequest, RequestHandler } from 'msw';
|
|
|
3
3
|
export declare const relayerId = "0x745";
|
|
4
4
|
export declare const transactionHash = "0x867";
|
|
5
5
|
export declare const mswHandlers: {
|
|
6
|
-
magicTEE: {
|
|
7
|
-
createWallet: {
|
|
8
|
-
success: import("msw").RestHandler<MockedRequest<import("msw").DefaultBodyType>>;
|
|
9
|
-
internalServerError: import("msw").RestHandler<MockedRequest<import("msw").DefaultBodyType>>;
|
|
10
|
-
};
|
|
11
|
-
personalSign: {
|
|
12
|
-
success: import("msw").RestHandler<MockedRequest<import("msw").DefaultBodyType>>;
|
|
13
|
-
internalServerError: import("msw").RestHandler<MockedRequest<import("msw").DefaultBodyType>>;
|
|
14
|
-
};
|
|
15
|
-
};
|
|
16
6
|
counterfactualAddress: {
|
|
17
7
|
success: import("msw").RestHandler<MockedRequest<import("msw").DefaultBodyType>>;
|
|
18
8
|
internalServerError: import("msw").RestHandler<MockedRequest<import("msw").DefaultBodyType>>;
|