@imtbl/passport 2.4.15-alpha.1 → 2.5.0-alpha.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/browser/index.js +96 -40
- package/dist/node/index.cjs +105 -49
- package/dist/node/index.js +97 -41
- package/dist/types/Passport.d.ts +3 -1
- package/dist/types/authManager.d.ts +3 -1
- package/dist/types/confirmation/embeddedLoginPrompt.d.ts +10 -0
- package/dist/types/confirmation/index.d.ts +1 -0
- package/dist/types/confirmation/types.d.ts +19 -3
- package/dist/types/overlay/{index.d.ts → confirmationOverlay.d.ts} +1 -1
- package/dist/types/overlay/confirmationOverlay.test.d.ts +1 -0
- package/dist/types/overlay/constants.d.ts +1 -0
- package/dist/types/overlay/elements.d.ts +2 -0
- package/dist/types/overlay/embeddedLoginPromptOverlay.d.ts +7 -0
- package/dist/types/overlay/embeddedLoginPromptOverlay.test.d.ts +1 -0
- package/dist/types/types.d.ts +1 -1
- package/package.json +7 -7
- /package/dist/types/{overlay/overlay.test.d.ts → confirmation/embeddedLoginPrompt.test.d.ts} +0 -0
package/dist/browser/index.js
CHANGED
|
@@ -1,12 +1,12 @@
|
|
|
1
|
-
import
|
|
2
|
-
import * as
|
|
1
|
+
import Ft, { isAxiosError } from 'axios';
|
|
2
|
+
import * as He from '@imtbl/generated-clients';
|
|
3
3
|
import { MultiRollupApiClients, createConfig, multiRollupConfig, ImxApiClients, imxApiConfig } from '@imtbl/generated-clients';
|
|
4
4
|
import { IMXClient, generateLegacyStarkPrivateKey, createStarkSigner } from '@imtbl/x-client';
|
|
5
5
|
import { Environment } from '@imtbl/config';
|
|
6
6
|
import { utils, setPassportClientId, track, identify, trackFlow, trackError, getDetail, Detail, trackDuration } from '@imtbl/metrics';
|
|
7
7
|
import { UserManager, User, ErrorTimeout, ErrorResponse, InMemoryWebStorage, WebStorageStateStore } from 'oidc-client-ts';
|
|
8
|
-
import
|
|
9
|
-
import
|
|
8
|
+
import ot from 'jwt-decode';
|
|
9
|
+
import bn from 'localforage';
|
|
10
10
|
import { Magic } from 'magic-sdk';
|
|
11
11
|
import { OpenIdExtension } from '@magic-ext/oidc';
|
|
12
12
|
import { JsonRpcProvider, toBeHex, Contract, isError, ZeroAddress, BrowserProvider, TypedDataEncoder, keccak256, getBytes, hashMessage, stripZerosLeft, toUtf8String, solidityPacked, Interface, AbiCoder } from 'ethers';
|
|
@@ -16,7 +16,7 @@ import { walletContracts } from '@0xsequence/abi';
|
|
|
16
16
|
import { v1 } from '@0xsequence/core';
|
|
17
17
|
import { v4 } from 'uuid';
|
|
18
18
|
|
|
19
|
-
function
|
|
19
|
+
function _e(n){throw new Error("Node.js process "+n+" is not supported by JSPM core outside of Node.js")}var A=[],G=!1,M,z=-1;function cr(){!G||!M||(G=!1,M.length?A=M.concat(A):z=-1,A.length&&Ke());}function Ke(){if(!G){var n=setTimeout(cr,0);G=!0;for(var e=A.length;e;){for(M=A,A=[];++z<e;)M&&M[z].run();z=-1,e=A.length;}M=null,G=!1,clearTimeout(n);}}function dr(n){var e=new Array(arguments.length-1);if(arguments.length>1)for(var t=1;t<arguments.length;t++)e[t-1]=arguments[t];A.push(new Xe(n,e)),A.length===1&&!G&&setTimeout(Ke,0);}function Xe(n,e){this.fun=n,this.array=e;}Xe.prototype.run=function(){this.fun.apply(null,this.array);};var lr="browser",pr="x64",mr="browser",ur={PATH:"/usr/bin",LANG:navigator.language+".UTF-8",PWD:"/",HOME:"/home",TMP:"/tmp"},gr=["/usr/bin/node"],hr=[],fr="v16.8.0",Er={},yr=function(n,e){console.warn((e?e+": ":"")+n);},vr=function(n){_e("binding");},Cr=function(n){return 0},Rr=function(){return "/"},Tr=function(n){},_r={name:"node",sourceUrl:"",headersUrl:"",libUrl:""};function C(){}var wr=C,Pr=[];function Ar(n){_e("_linkedBinding");}var Ir={},Sr=!1,Or={};function br(n){_e("dlopen");}function kr(){return []}function xr(){return []}var Mr=C,Nr=C,we=function(){return {}},Lr=we,Dr=we,Ur=C,Gr=C,Fr=C,Br={};function Hr(n,e){if(!n)throw new Error(e||"assertion error")}var Vr={inspector:!1,debug:!1,uv:!1,ipv6:!1,tls_alpn:!1,tls_sni:!1,tls_ocsp:!1,tls:!1,cached_builtins:!0},Wr=C,qr=C;function $r(){return !1}var Zr=C,Kr=C,Xr=C,Jr=C,zr=C,jr=void 0,Yr=void 0,Qr=void 0,en=C,tn=2,rn=1,nn="/bin/usr/node",an=9229,sn="node",on=[],cn=C,S={now:typeof performance<"u"?performance.now.bind(performance):void 0,timing:typeof performance<"u"?performance.timing:void 0};S.now===void 0&&(Ce=Date.now(),S.timing&&S.timing.navigationStart&&(Ce=S.timing.navigationStart),S.now=()=>Date.now()-Ce);var Ce;function dn(){return S.now()/1e3}var Re=1e9;function Te(n){var e=Math.floor((Date.now()-S.now())*.001),t=S.now()*.001,r=Math.floor(t)+e,i=Math.floor(t%1*1e9);return n&&(r=r-n[0],i=i-n[1],i<0&&(r--,i+=Re)),[r,i]}Te.bigint=function(n){var e=Te(n);return typeof BigInt>"u"?e[0]*Re+e[1]:BigInt(e[0]*Re)+BigInt(e[1])};var ln=10,pn={},mn=0;function O(){return l}var un=O,gn=O,hn=O,fn=O,En=O,yn=C,vn=O,Cn=O;function Rn(n){return []}var l={version:fr,versions:Er,arch:pr,platform:mr,release:_r,_rawDebug:wr,moduleLoadList:Pr,binding:vr,_linkedBinding:Ar,_events:pn,_eventsCount:mn,_maxListeners:ln,on:O,addListener:un,once:gn,off:hn,removeListener:fn,removeAllListeners:En,emit:yn,prependListener:vn,prependOnceListener:Cn,listeners:Rn,domain:Ir,_exiting:Sr,config:Or,dlopen:br,uptime:dn,_getActiveRequests:kr,_getActiveHandles:xr,reallyExit:Mr,_kill:Nr,cpuUsage:we,resourceUsage:Lr,memoryUsage:Dr,kill:Ur,exit:Gr,openStdin:Fr,allowedNodeEnvironmentFlags:Br,assert:Hr,features:Vr,_fatalExceptions:Wr,setUncaughtExceptionCaptureCallback:qr,hasUncaughtExceptionCaptureCallback:$r,emitWarning:yr,nextTick:dr,_tickCallback:Zr,_debugProcess:Kr,_debugEnd:Xr,_startProfilerIdleNotifier:Jr,_stopProfilerIdleNotifier:zr,stdout:jr,stdin:Qr,stderr:Yr,abort:en,umask:Cr,chdir:Tr,cwd:Rr,env:ur,title:lr,argv:gr,execArgv:hr,pid:tn,ppid:rn,execPath:nn,debugPort:an,hrtime:Te,argv0:sn,_preload_modules:on,setSourceMapsEnabled:cn};function Pe(n){return "code"in n&&"message"in n}var f=class extends Error{type;constructor(e,t){super(e),this.type=t;}},y=async(n,e)=>{try{return await n()}catch(t){let r;throw t instanceof f&&t.type==="SERVICE_UNAVAILABLE_ERROR"?new f(t.message,t.type):(isAxiosError(t)&&t.response?.data&&Pe(t.response.data)?r=t.response.data.message:r=t.message,new f(r,e))}};var Je="pkce_state",ze="pkce_verifier",wn=3600,V=class{isTokenValid(e){try{let r=ot(e).exp??0,i=Date.now()/1e3+wn;return r>i}catch{return !1}}savePKCEData(e){localStorage.setItem(Je,e.state),localStorage.setItem(ze,e.verifier);}getPKCEData(){let e=localStorage.getItem(Je),t=localStorage.getItem(ze);return e&&t?{state:e,verifier:t}:null}};var Pn=(...n)=>{if(typeof l>"u")return;l?.env?.JEST_WORKER_ID===void 0&&console.warn(...n);},N={warn:Pn};function je(n){try{let e=ot(n),t=Math.floor(Date.now()/1e3);return e.exp?e.exp<=t+30:!0}catch{return !0}}function Ye(n){let{id_token:e,access_token:t}=n;return !t||!e?!0:je(t)||je(e)}var j=n=>!!n.zkEvm,L=n=>!!n.imx,Qe=(t=>(t.OptedIn="opted_in",t.Unsubscribed="unsubscribed",t))(Qe||{});var F="passport-overlay",W="passport-overlay-contents",Y=`${F}-close`,Q=`${F}-try-again`,et=`
|
|
20
20
|
<svg
|
|
21
21
|
viewBox="0 0 20 20"
|
|
22
22
|
fill="none"
|
|
@@ -28,7 +28,7 @@ function Re(n){throw new Error("Node.js process "+n+" is not supported by JSPM c
|
|
|
28
28
|
fill="#F3F3F3"
|
|
29
29
|
/>
|
|
30
30
|
</svg>
|
|
31
|
-
`,
|
|
31
|
+
`,tt=`
|
|
32
32
|
<svg
|
|
33
33
|
viewBox="0 0 17 16"
|
|
34
34
|
fill="none"
|
|
@@ -42,7 +42,7 @@ function Re(n){throw new Error("Node.js process "+n+" is not supported by JSPM c
|
|
|
42
42
|
fill="#E01A3D"
|
|
43
43
|
/>
|
|
44
44
|
</svg>
|
|
45
|
-
`,
|
|
45
|
+
`,Ae=`
|
|
46
46
|
<svg
|
|
47
47
|
style="
|
|
48
48
|
max-width: 123px !important;
|
|
@@ -225,9 +225,9 @@ function Re(n){throw new Error("Node.js process "+n+" is not supported by JSPM c
|
|
|
225
225
|
</clipPath>
|
|
226
226
|
</defs>
|
|
227
227
|
</svg>
|
|
228
|
-
`;var
|
|
228
|
+
`;var In=()=>`
|
|
229
229
|
<button
|
|
230
|
-
id="${
|
|
230
|
+
id="${Y}"
|
|
231
231
|
style="
|
|
232
232
|
background: #f3f3f326 !important;
|
|
233
233
|
border: none !important;
|
|
@@ -243,9 +243,27 @@ function Re(n){throw new Error("Node.js process "+n+" is not supported by JSPM c
|
|
|
243
243
|
justify-content: center !important;
|
|
244
244
|
"
|
|
245
245
|
>
|
|
246
|
-
${
|
|
246
|
+
${et}
|
|
247
247
|
</button>
|
|
248
|
-
`,
|
|
248
|
+
`,rt=()=>`
|
|
249
|
+
<button
|
|
250
|
+
id="${Q}"
|
|
251
|
+
style="
|
|
252
|
+
margin-top: 27px !important;
|
|
253
|
+
color: #f3f3f3 !important;
|
|
254
|
+
background: transparent !important;
|
|
255
|
+
padding: 12px 24px !important;
|
|
256
|
+
border-radius: 30px !important;
|
|
257
|
+
border: 2px solid #f3f3f3 !important;
|
|
258
|
+
font-size: 1em !important;
|
|
259
|
+
font-weight: 500 !important;
|
|
260
|
+
cursor: pointer !important;
|
|
261
|
+
"
|
|
262
|
+
>
|
|
263
|
+
Try again
|
|
264
|
+
</button>
|
|
265
|
+
`,Sn=()=>`
|
|
266
|
+
${Ae}
|
|
249
267
|
<div
|
|
250
268
|
style="
|
|
251
269
|
color: #e01a3d !important;
|
|
@@ -255,7 +273,7 @@ function Re(n){throw new Error("Node.js process "+n+" is not supported by JSPM c
|
|
|
255
273
|
margin-bottom: 10px !important;
|
|
256
274
|
"
|
|
257
275
|
>
|
|
258
|
-
${
|
|
276
|
+
${tt}
|
|
259
277
|
Pop-up blocked
|
|
260
278
|
</div>
|
|
261
279
|
<p style="
|
|
@@ -268,7 +286,9 @@ function Re(n){throw new Error("Node.js process "+n+" is not supported by JSPM c
|
|
|
268
286
|
If the problem continues, adjust your<br />
|
|
269
287
|
browser settings.
|
|
270
288
|
</p>
|
|
271
|
-
|
|
289
|
+
${rt()}
|
|
290
|
+
`,On=()=>`
|
|
291
|
+
${Ae}
|
|
272
292
|
<p style="
|
|
273
293
|
color: #b6b6b6 !important;
|
|
274
294
|
text-align: center !important;
|
|
@@ -277,26 +297,10 @@ function Re(n){throw new Error("Node.js process "+n+" is not supported by JSPM c
|
|
|
277
297
|
>
|
|
278
298
|
Secure pop-up not showing?<br />We'll help you re-launch
|
|
279
299
|
</p>
|
|
280
|
-
|
|
281
|
-
|
|
282
|
-
id="${z}"
|
|
283
|
-
style="
|
|
284
|
-
margin-top: 27px !important;
|
|
285
|
-
color: #f3f3f3 !important;
|
|
286
|
-
background: transparent !important;
|
|
287
|
-
padding: 12px 24px !important;
|
|
288
|
-
border-radius: 30px !important;
|
|
289
|
-
border: 2px solid #f3f3f3 !important;
|
|
290
|
-
font-size: 1em !important;
|
|
291
|
-
font-weight: 500 !important;
|
|
292
|
-
cursor: pointer !important;
|
|
293
|
-
"
|
|
294
|
-
>
|
|
295
|
-
Try again
|
|
296
|
-
</button>
|
|
297
|
-
`,Qe=n=>`
|
|
300
|
+
${rt()}
|
|
301
|
+
`,nt=n=>`
|
|
298
302
|
<div
|
|
299
|
-
id="${
|
|
303
|
+
id="${F}"
|
|
300
304
|
style="
|
|
301
305
|
position: fixed !important;
|
|
302
306
|
top: 0 !important;
|
|
@@ -319,8 +323,9 @@ function Re(n){throw new Error("Node.js process "+n+" is not supported by JSPM c
|
|
|
319
323
|
z-index: 2147483647 !important;
|
|
320
324
|
"
|
|
321
325
|
>
|
|
322
|
-
${
|
|
326
|
+
${In()}
|
|
323
327
|
<div
|
|
328
|
+
id="${W}"
|
|
324
329
|
style="
|
|
325
330
|
display: flex !important;
|
|
326
331
|
flex-direction: column !important;
|
|
@@ -328,24 +333,75 @@ function Re(n){throw new Error("Node.js process "+n+" is not supported by JSPM c
|
|
|
328
333
|
max-width: 400px !important;
|
|
329
334
|
"
|
|
330
335
|
>
|
|
331
|
-
${
|
|
332
|
-
${n}
|
|
333
|
-
${Tn()}
|
|
336
|
+
${n??""}
|
|
334
337
|
</div>
|
|
335
338
|
</div>
|
|
336
|
-
`;function j({id:n,href:e,rel:t,crossOrigin:r}){let i=`${B}-${n}`;if(!document.getElementById(i)){let a=document.createElement("link");a.id=i,a.href=e,t&&(a.rel=t),r&&(a.crossOrigin=r),document.head.appendChild(a);}}var et=()=>Qe(Rn()),tt=()=>Qe(vn());var O=class{disableGenericPopupOverlay;disableBlockedPopupOverlay;overlay;isBlockedOverlay;tryAgainListener;onCloseListener;constructor(e,t=!1){this.disableBlockedPopupOverlay=e.disableBlockedPopupOverlay||!1,this.disableGenericPopupOverlay=e.disableGenericPopupOverlay||!1,this.isBlockedOverlay=t;}append(e,t){this.shouldAppendOverlay()&&(this.appendOverlay(),this.updateTryAgainButton(e),this.updateCloseButton(t));}update(e){this.updateTryAgainButton(e);}remove(){this.overlay&&this.overlay.remove();}shouldAppendOverlay(){return !(this.disableGenericPopupOverlay&&this.disableBlockedPopupOverlay||this.disableGenericPopupOverlay&&!this.isBlockedOverlay||this.disableBlockedPopupOverlay&&this.isBlockedOverlay)}appendOverlay(){if(!this.overlay){j({id:"link-googleapis",href:"https://fonts.googleapis.com"}),j({id:"link-gstatic",href:"https://fonts.gstatic.com",crossOrigin:"anonymous"}),j({id:"link-roboto",href:"https://fonts.googleapis.com/css2?family=Roboto:ital,wght@0,400;0,500;0,700;1,400;1,500;1,700&display=swap",rel:"stylesheet"});let e=document.createElement("div");e.innerHTML=this.isBlockedOverlay?et():tt(),document.body.insertAdjacentElement("beforeend",e),this.overlay=e;}}updateTryAgainButton(e){let t=document.getElementById(z);t&&(this.tryAgainListener&&t.removeEventListener("click",this.tryAgainListener),this.tryAgainListener=e,t.addEventListener("click",e));}updateCloseButton(e){let t=document.getElementById(J);t&&(this.onCloseListener&&t.removeEventListener("click",this.onCloseListener),this.onCloseListener=e,t.addEventListener("click",e));}};var Y=class{storage;constructor(e,t){this.storage=wn.createInstance({name:e,driver:t});}get length(){return this.storage.length()}clear(){return this.storage.clear()}getItem(e){return this.storage.getItem(e)}key(e){return this.storage.key(e)}async removeItem(e){await this.storage.removeItem(e);}async setItem(e,t){await this.storage.setItem(e,t);}};var Nn=500,Un={headers:{"Content-Type":"application/x-www-form-urlencoded"}},Dn="/v2/logout",Ln="/im-logged-out",Gn="/authorize",Fn=n=>n?Ln:Dn,Bn=n=>{let{authenticationDomain:e,oidcConfiguration:t}=n,r;n.crossSdkBridgeEnabled?r=new Y("ImmutableSDKPassport",wn.INDEXEDDB):typeof window<"u"?r=window.localStorage:r=new InMemoryWebStorage;let i=new WebStorageStateStore({store:r}),a=new URL(Fn(n.crossSdkBridgeEnabled),e.replace(/^(?:https?:\/\/)?(.*)/,"https://$1"));return a.searchParams.set("client_id",t.clientId),t.logoutRedirectUri&&a.searchParams.set("returnTo",t.logoutRedirectUri),{authority:e,redirect_uri:t.redirectUri,popup_redirect_uri:t.popupRedirectUri||t.redirectUri,client_id:t.clientId,metadata:{authorization_endpoint:`${e}/authorize`,token_endpoint:`${e}/oauth/token`,userinfo_endpoint:`${e}/userinfo`,end_session_endpoint:a.toString(),revocation_endpoint:`${e}/oauth/revoke`},mergeClaimsStrategy:{array:"merge"},automaticSilentRenew:!1,scope:t.scope,userStore:i,revokeTokenTypes:["refresh_token"],extraQueryParams:{...t.audience?{audience:t.audience}:{}}}};function we(n){return btoa(String.fromCharCode(...new Uint8Array(n))).replace(/\+/g,"-").replace(/\//g,"_").replace(/=/g,"")}async function Vn(n){let t=new TextEncoder().encode(n);return await window.crypto.subtle.digest("SHA-256",t)}var V=class n{userManager;deviceCredentialsManager;config;logoutMode;refreshingPromise=null;constructor(e){this.config=e,this.userManager=new UserManager(Bn(e)),this.deviceCredentialsManager=new F,this.logoutMode=e.oidcConfiguration.logoutMode||"redirect";}static mapOidcUserToDomainModel=e=>{let t;e.id_token&&(t=rt(e.id_token)?.passport);let r={expired:e.expired,idToken:e.id_token,accessToken:e.access_token,refreshToken:e.refresh_token,profile:{sub:e.profile.sub,email:e.profile.email,nickname:e.profile.nickname}};return t?.imx_eth_address&&(r.imx={ethAddress:t.imx_eth_address,starkAddress:t.imx_stark_address,userAdminAddress:t.imx_user_admin_address}),t?.zkevm_eth_address&&(r.zkEvm={ethAddress:t?.zkevm_eth_address,userAdminAddress:t?.zkevm_user_admin_address}),r};static mapDeviceTokenResponseToOidcUser=e=>{let t=rt(e.id_token);return new User({id_token:e.id_token,access_token:e.access_token,refresh_token:e.refresh_token,token_type:e.token_type,profile:{sub:t.sub,iss:t.iss,aud:t.aud,exp:t.exp,iat:t.iat,email:t.email,nickname:t.nickname,passport:t.passport}})};buildExtraQueryParams(e,t){let r={...this.userManager.settings?.extraQueryParams??{},rid:getDetail(Detail.RUNTIME_ID)||"",third_party_a_id:e||""};if(t){if(t.directLoginMethod==="email"){let i=t.email;i&&(r.direct=t.directLoginMethod,r.email=i);}else r.direct=t.directLoginMethod;t.marketingConsentStatus&&(r.marketingConsent=t.marketingConsentStatus);}return r}async loginWithRedirect(e,t){return await this.userManager.clearStaleState(),y(async()=>{let r=this.buildExtraQueryParams(e,t);await this.userManager.signinRedirect({extraQueryParams:r});},"AUTHENTICATION_ERROR")}async login(e,t){return y(async()=>{let r=window.crypto.randomUUID(),i=async()=>{let a=this.buildExtraQueryParams(e,t),s=this.userManager.signinPopup({extraQueryParams:a,popupWindowFeatures:{width:410,height:450},popupWindowTarget:r}),o=window.open("",r);if(o){let c=new Promise((d,l)=>{let u=setInterval(()=>{o.closed&&(clearInterval(u),l(new Error("Popup closed by user")));},Nn);s.finally(()=>{clearInterval(u),o.close();});});return Promise.race([s,c])}return s};return new Promise((a,s)=>{i().then(o=>{a(n.mapOidcUserToDomainModel(o));}).catch(o=>{if(!(o instanceof Error)||o.message!=="Attempted to navigate on a disposed window"){s(o);return}let c=!1,d=new O(this.config.popupOverlayOptions,!0);d.append(async()=>{try{if(c)window.open("",r);else {c=!0;let l=await i();d.remove(),a(n.mapOidcUserToDomainModel(l));}}catch(l){d.remove(),s(l);}},()=>{d.remove(),s(new Error("Popup closed by user"));});});})},"AUTHENTICATION_ERROR")}async getUserOrLogin(){let e=null;try{e=await this.getUser();}catch(t){M.warn("Failed to retrieve a cached user session",t);}return e||this.login()}static shouldUseSigninPopupCallback(){try{let r=`oidc.${new URLSearchParams(window.location.search).get("state")}`,i=localStorage.getItem(r);return JSON.parse(i||"{}")?.request_type==="si:p"}catch{return !1}}async loginCallback(){return y(async()=>{if(n.shouldUseSigninPopupCallback()){await this.userManager.signinPopupCallback(void 0,!0);return}let e=await this.userManager.signinCallback();if(e)return n.mapOidcUserToDomainModel(e)},"AUTHENTICATION_ERROR")}async getPKCEAuthorizationUrl(e){let t=we(window.crypto.getRandomValues(new Uint8Array(32))),r=we(await Vn(t)),i=we(window.crypto.getRandomValues(new Uint8Array(32))),{redirectUri:a,scope:s,audience:o,clientId:c}=this.config.oidcConfiguration;this.deviceCredentialsManager.savePKCEData({state:i,verifier:t});let d=new URL(Gn,this.config.authenticationDomain);if(d.searchParams.set("response_type","code"),d.searchParams.set("code_challenge",r),d.searchParams.set("code_challenge_method","S256"),d.searchParams.set("client_id",c),d.searchParams.set("redirect_uri",a),d.searchParams.set("state",i),s&&d.searchParams.set("scope",s),o&&d.searchParams.set("audience",o),e){if(e.directLoginMethod==="email"){let l=e.email;l&&(d.searchParams.set("direct",e.directLoginMethod),d.searchParams.set("email",l));}else d.searchParams.set("direct",e.directLoginMethod);e.marketingConsentStatus&&d.searchParams.set("marketingConsent",e.marketingConsentStatus);}return d.toString()}async loginWithPKCEFlowCallback(e,t){return y(async()=>{let r=this.deviceCredentialsManager.getPKCEData();if(!r)throw new Error("No code verifier or state for PKCE");if(t!==r.state)throw new Error("Provided state does not match stored state");let i=await this.getPKCEToken(e,r.verifier),a=n.mapDeviceTokenResponseToOidcUser(i),s=n.mapOidcUserToDomainModel(a);return await this.userManager.storeUser(a),s},"AUTHENTICATION_ERROR")}async getPKCEToken(e,t){return (await kt.post(`${this.config.authenticationDomain}/oauth/token`,{client_id:this.config.oidcConfiguration.clientId,grant_type:"authorization_code",code_verifier:t,code:e,redirect_uri:this.config.oidcConfiguration.redirectUri},Un)).data}async storeTokens(e){return y(async()=>{let t=n.mapDeviceTokenResponseToOidcUser(e),r=n.mapOidcUserToDomainModel(t);return await this.userManager.storeUser(t),r},"AUTHENTICATION_ERROR")}async logout(){return y(async()=>{await this.userManager.revokeTokens(["refresh_token"]),this.logoutMode==="silent"?await this.userManager.signoutSilent():await this.userManager.signoutRedirect();},"LOGOUT_ERROR")}async logoutSilentCallback(e){return this.userManager.signoutSilentCallback(e)}async removeUser(){return this.userManager.removeUser()}async getLogoutUrl(){let e=this.userManager.settings?.metadata?.end_session_endpoint;return e||(M.warn("Failed to get logout URL"),null)}forceUserRefreshInBackground(){this.refreshTokenAndUpdatePromise().catch(e=>{M.warn("Failed to refresh user token",e);});}async forceUserRefresh(){return this.refreshTokenAndUpdatePromise().catch(e=>(M.warn("Failed to refresh user token",e),null))}async refreshTokenAndUpdatePromise(){return this.refreshingPromise?this.refreshingPromise:(this.refreshingPromise=new Promise(async(e,t)=>{try{let r=await this.userManager.signinSilent();if(r){e(n.mapOidcUserToDomainModel(r));return}e(null);}catch(r){let i="AUTHENTICATION_ERROR",a="Failed to refresh token",s=!0;if(r instanceof ErrorTimeout?(i="SILENT_LOGIN_ERROR",a=`${a}: ${r.message}`,s=!1):r instanceof ErrorResponse?(i="NOT_LOGGED_IN_ERROR",a=`${a}: ${r.message||r.error_description}`):r instanceof Error?a=`${a}: ${r.message}`:typeof r=="string"&&(a=`${a}: ${r}`),s)try{await this.userManager.removeUser();}catch(o){o instanceof Error&&(a=`${a}: Failed to remove user: ${o.message}`);}t(new f(a,i));}finally{this.refreshingPromise=null;}}),this.refreshingPromise)}async getUser(e=t=>!0){if(this.refreshingPromise){let r=await this.refreshingPromise;return r&&e(r)?r:null}let t=await this.userManager.getUser();if(!t)return null;if(!Xe(t)){let r=n.mapOidcUserToDomainModel(t);if(r&&e(r))return r}if(t.refresh_token){let r=await this.refreshTokenAndUpdatePromise();if(r&&e(r))return r}return null}async getUserZkEvm(){let e=await this.getUser(X);if(!e)throw new Error("Failed to obtain a User with the required ZkEvm attributes");return e}async getUserImx(){let e=await this.getUser(N);if(!e)throw new Error("Failed to obtain a User with the required IMX attributes");return e}};var E=async(n,e,t=!0,r=!0)=>{let i=trackFlow("passport",e,t);try{return await n(i)}catch(a){throw a instanceof Error?trackError("passport",e,a,{flowId:i.details.flowId}):i.addEvent("errored"),a}finally{r&&i.addEvent("End");}};var Kn="mainnet",H=class{config;magicProviderProxyFactory;magicClient;constructor(e,t){this.config=e,this.magicProviderProxyFactory=t,typeof window<"u"&&(this.magicClient=new Magic(this.config.magicPublishableApiKey,{extensions:[new OpenIdExtension],network:Kn}));}getMagicClient(){if(!this.magicClient)throw new Error("Cannot perform this action outside of the browser");return this.magicClient}async login(e){return y(async()=>E(async t=>{let r=performance.now(),i=this.getMagicClient();return t.addEvent("endMagicClientInit"),await i.openid.loginWithOIDC({jwt:e,providerId:this.config.magicProviderId}),t.addEvent("endLoginWithOIDC"),trackDuration("passport",t.details.flowName,Math.round(performance.now()-r)),this.magicProviderProxyFactory.createProxy(i)},"magicLogin"),"WALLET_CONNECTION_ERROR")}async logout(){let e=this.getMagicClient();e.user&&await e.user.logout();}};var nt=async n=>y(async()=>{let e=await generateLegacyStarkPrivateKey(n);return createStarkSigner(e)},"WALLET_CONNECTION_ERROR");async function it({user:n,starkSigner:e,request:t,exchangesApi:r}){return y(async()=>{let{ethAddress:i}=n.imx,a=t.amount,s=await r.getExchangeSignableTransfer({id:t.transactionID,getSignableTransferRequest:{sender:i,token:convertToSignableToken(t),amount:a,receiver:t.receiver}}),o=await e.getAddress(),{payload_hash:c}=s.data,d=await e.signMessage(c),l={sender_stark_key:s.data.sender_stark_key||o,sender_vault_id:s.data.sender_vault_id,receiver_stark_key:s.data.receiver_stark_key,receiver_vault_id:s.data.receiver_vault_id,asset_id:s.data.asset_id,amount:s.data.amount,nonce:s.data.nonce,expiration_timestamp:s.data.expiration_timestamp,stark_signature:d},u={Authorization:`Bearer ${n.accessToken}`},h=await r.createExchangeTransfer({id:t.transactionID,createTransferRequest:l},{headers:u});return {sent_signature:h?.data.sent_signature,status:h?.data.status?.toString(),time:h?.data.time,transfer_id:h?.data.transfer_id}},"EXCHANGE_TRANSFER_ERROR")}var st="ERC721";async function ot({starkSigner:n,user:e,request:t,ordersApi:r,guardianClient:i}){return y(async()=>{let{ethAddress:a}=e.imx,s=t.sell.type===st?"1":t.sell.amount,o=t.buy.type===st?"1":t.buy.amount,c={Authorization:`Bearer ${e.accessToken}`},d={user:a,amount_buy:o,token_buy:convertToSignableToken(t.buy),amount_sell:s,token_sell:convertToSignableToken(t.sell),fees:t.fees,split_fees:!0,expiration_timestamp:t.expiration_timestamp},l=await r.getSignableOrder({getSignableOrderRequestV3:d},{headers:c});await i.evaluateImxTransaction({payloadHash:l.data.payload_hash});let{payload_hash:u}=l.data,h=await n.signMessage(u),C=l.data,w={createOrderRequest:{include_fees:!0,fees:t.fees,stark_signature:h,amount_buy:C.amount_buy,amount_sell:C.amount_sell,asset_id_buy:C.asset_id_buy,asset_id_sell:C.asset_id_sell,expiration_timestamp:C.expiration_timestamp,nonce:C.nonce,stark_key:C.stark_key,vault_id_buy:C.vault_id_buy,vault_id_sell:C.vault_id_sell}};return {...(await r.createOrderV3(w,{headers:c})).data}},"CREATE_ORDER_ERROR")}async function ct({user:n,starkSigner:e,request:t,ordersApi:r,guardianClient:i}){return y(async()=>{let a={order_id:t.order_id},s={Authorization:`Bearer ${n.accessToken}`},o=await r.getSignableCancelOrderV3({getSignableCancelOrderRequest:a},{headers:s});await i.evaluateImxTransaction({payloadHash:o.data.payload_hash});let{payload_hash:c}=o.data,d=await e.signMessage(c),l=await r.cancelOrderV3({id:t.order_id.toString(),cancelOrderRequest:{order_id:t.order_id,stark_signature:d}},{headers:s});return {order_id:l.data.order_id,status:l.data.status}},"CANCEL_ORDER_ERROR")}async function _e({ethSigner:n,starkSigner:e,imxApiClients:t},r){return y(async()=>{let[i,a]=await Promise.all([n.getAddress(),e.getAddress()]),s=await t.usersApi.getSignableRegistrationOffchain({getSignableRegistrationRequest:{ether_key:i,stark_key:a}}),{signable_message:o,payload_hash:c}=s.data,[d,l]=await Promise.all([signRaw(o,n),e.signMessage(c)]);return (await t.usersApi.registerPassportUserV2({authorization:`Bearer ${r}`,registerPassportUserRequest:{eth_signature:d,ether_key:i,stark_signature:l,stark_key:a}})).data},"USER_REGISTRATION_ERROR")}async function dt({request:n,tradesApi:e,user:t,starkSigner:r,guardianClient:i}){return y(async()=>{let{ethAddress:a}=t.imx,s={expiration_timestamp:n.expiration_timestamp,fees:n.fees,order_id:n.order_id,user:a},o={Authorization:`Bearer ${t.accessToken}`},c=await e.getSignableTrade({getSignableTradeRequest:s},{headers:o});await i.evaluateImxTransaction({payloadHash:c.data.payload_hash});let{payload_hash:d}=c.data,l=await r.signMessage(d),{data:u}=c,h={createTradeRequest:{include_fees:!0,fees:n?.fees,stark_signature:l,order_id:n?.order_id,fee_info:u.fee_info,amount_buy:u.amount_buy,amount_sell:u.amount_sell,asset_id_buy:u.asset_id_buy,asset_id_sell:u.asset_id_sell,expiration_timestamp:u.expiration_timestamp,nonce:u.nonce,stark_key:u.stark_key,vault_id_buy:u.vault_id_buy,vault_id_sell:u.vault_id_sell}},{data:C}=await e.createTradeV3(h,{headers:o});return C},"CREATE_TRADE_ERROR")}var pt="ERC721";async function mt({request:n,transfersApi:e,starkSigner:t,user:r,guardianClient:i}){return y(async()=>{let a=n.type===pt?"1":n.amount,s={sender:r.imx.ethAddress,token:convertToSignableToken(n),amount:a,receiver:n.receiver},o={Authorization:`Bearer ${r.accessToken}`},c=await e.getSignableTransferV1({getSignableTransferRequest:s},{headers:o});await i.evaluateImxTransaction({payloadHash:c.data.payload_hash});let d=c.data,{payload_hash:l}=d,u=await t.signMessage(l),h=await t.getAddress(),w={createTransferRequest:{sender_stark_key:d.sender_stark_key||h,sender_vault_id:d.sender_vault_id,receiver_stark_key:d.receiver_stark_key,receiver_vault_id:d.receiver_vault_id,asset_id:d.asset_id,amount:d.amount,nonce:d.nonce,expiration_timestamp:d.expiration_timestamp,stark_signature:u}},{data:v}=await e.createTransferV1(w,{headers:o});return {sent_signature:v.sent_signature,status:v.status?.toString(),time:v.time,transfer_id:v.transfer_id}},"TRANSFER_ERROR")}async function ut({user:n,starkSigner:e,request:t,transfersApi:r,guardianClient:i}){return y(async()=>{let{ethAddress:a}=n.imx,s=t.map(h=>({amount:"1",token:convertToSignableToken({type:pt,tokenId:h.tokenId,tokenAddress:h.tokenAddress}),receiver:h.receiver})),o={Authorization:`Bearer ${n.accessToken}`},c=await r.getSignableTransfer({getSignableTransferRequestV2:{sender_ether_key:a,signable_requests:s}},{headers:o});await i.evaluateImxTransaction({payloadHash:c.data.signable_responses[0]?.payload_hash});let d=await Promise.all(c.data.signable_responses.map(async h=>{let C=await e.signMessage(h.payload_hash);return {sender_vault_id:h.sender_vault_id,receiver_stark_key:h.receiver_stark_key,receiver_vault_id:h.receiver_vault_id,asset_id:h.asset_id,amount:h.amount,nonce:h.nonce,expiration_timestamp:h.expiration_timestamp,stark_signature:C}})),l={sender_stark_key:c.data.sender_stark_key,requests:d};return {transfer_ids:(await r.createTransfer({createTransferRequestV2:l},{headers:o}))?.data.transfer_ids}},"TRANSFER_ERROR")}var Qn=n=>new Promise(e=>{setTimeout(()=>e(),n);}),U=async(n,e)=>{let{retries:t=3,interval:r=1e3,finalErr:i=Error("Retry failed"),finallyFn:a=()=>{}}=e||{};try{return await n()}catch{return t<=0?Promise.reject(i):(await Qn(r),U(n,{retries:t-1,finalErr:i,finallyFn:a}))}finally{t<=0&&a();}};async function gt(n){await U(async()=>{let e=await n.forceUserRefresh();return e?.imx?e:Promise.reject(new Error("user wallet addresses not exist"))});}async function Pe(n,e,t,r,i){return y(async()=>{try{let a=await _e({ethSigner:n,starkSigner:e,imxApiClients:i},t.accessToken);return await gt(r),a}catch(a){if(kt.isAxiosError(a)&&a.response?.status===409)return await gt(r),{tx_hash:""};throw a}},"USER_REGISTRATION_ERROR")}var Q=class{authManager;immutableXClient;guardianClient;imxApiClients;magicAdapter;signers;signerInitialisationError;constructor({authManager:e,immutableXClient:t,passportEventEmitter:r,magicAdapter:i,imxApiClients:a,guardianClient:s}){this.authManager=e,this.immutableXClient=t,this.magicAdapter=i,this.imxApiClients=a,this.guardianClient=s,this.#i(),r.on("loggedOut",this.handleLogout);}handleLogout=()=>{this.signers=void 0;};#i(){let e=async()=>{let t=await this.authManager.getUser(),r=await this.magicAdapter.login(t.idToken),a=await new BrowserProvider(r).getSigner(),s=await nt(a);return {ethSigner:a,starkSigner:s}};this.signers=new Promise(async t=>{try{t(await e());}catch(r){this.signerInitialisationError=r,t(void 0);}});}async#t(){let e=await this.authManager.getUser();if(!e||!this.signers)throw new f("User has been logged out","NOT_LOGGED_IN_ERROR");return e}async#a(){let e=await this.signers;if(typeof e>"u")throw typeof this.signerInitialisationError<"u"?this.signerInitialisationError:new Error("Signers failed to initialise");return e}async#r(){let[e,t]=await Promise.all([this.#t(),this.#a()]);if(!N(e))throw new f("User has not been registered with StarkEx","USER_NOT_REGISTERED_ERROR");return {user:e,starkSigner:t.starkSigner,ethSigner:t.ethSigner}}async transfer(e){return E(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#r();return mt({request:e,user:t,starkSigner:r,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.guardianClient})})(),"imxTransfer")}async registerOffchain(){return E(async()=>{let[e,t]=await Promise.all([this.#t(),this.#a()]);return await Pe(t.ethSigner,t.starkSigner,e,this.authManager,this.imxApiClients)},"imxRegisterOffchain")}async isRegisteredOffchain(){return E(async()=>!!(await this.#t()).imx,"imxIsRegisteredOffchain")}isRegisteredOnchain(){throw new f("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async createOrder(e){return E(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#r();return ot({request:e,user:t,starkSigner:r,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.guardianClient})})(),"imxCreateOrder")}async cancelOrder(e){return E(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#r();return ct({request:e,user:t,starkSigner:r,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.guardianClient})})(),"imxCancelOrder")}async createTrade(e){return E(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#r();return dt({request:e,user:t,starkSigner:r,tradesApi:this.immutableXClient.tradesApi,guardianClient:this.guardianClient})})(),"imxCreateTrade")}async batchNftTransfer(e){return E(()=>this.guardianClient.withConfirmationScreenTask({width:480,height:784})(async()=>{let{user:t,starkSigner:r}=await this.#r();return ut({request:e,user:t,starkSigner:r,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.guardianClient})})(),"imxBatchNftTransfer")}async exchangeTransfer(e){return E(async()=>{let{user:t,starkSigner:r}=await this.#r();return it({request:e,user:t,starkSigner:r,exchangesApi:this.immutableXClient.exchangeApi})},"imxExchangeTransfer")}deposit(e){throw new f("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}prepareWithdrawal(e){throw new f("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}completeWithdrawal(e,t){throw new f("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async getAddress(){return E(async()=>{let e=await this.#t();if(!N(e))throw new f("User has not been registered with StarkEx","USER_NOT_REGISTERED_ERROR");return Promise.resolve(e.imx.ethAddress)},"imxGetAddress")}};var ee=class{authManager;immutableXClient;magicAdapter;passportEventEmitter;imxApiClients;guardianClient;constructor({authManager:e,immutableXClient:t,magicAdapter:r,passportEventEmitter:i,imxApiClients:a,guardianClient:s}){this.authManager=e,this.immutableXClient=t,this.magicAdapter=r,this.passportEventEmitter=i,this.imxApiClients=a,this.guardianClient=s;}async getProvider(){let e=await this.authManager.getUserOrLogin();return this.createProviderInstance(e)}async getProviderSilent(){let e=await this.authManager.getUser();return e?this.createProviderInstance(e):null}async createProviderInstance(e){if(!e.idToken)throw new f("Failed to initialise","WALLET_CONNECTION_ERROR");return new Q({authManager:this.authManager,immutableXClient:this.immutableXClient,passportEventEmitter:this.passportEventEmitter,magicAdapter:this.magicAdapter,imxApiClients:this.imxApiClients,guardianClient:this.guardianClient})}};var yt=(n,e,t)=>{let r=e.map(i=>!n[i]&&i).filter(i=>i).join(", ");if(r!==""){let i=t?`${t} - ${r} cannot be null`:`${r} cannot be null`;throw new f(i,"INVALID_CONFIGURATION")}},te=class{authenticationDomain;passportDomain;imxPublicApiDomain;magicPublishableApiKey;magicProviderId;oidcConfiguration;baseConfig;zkEvmRpcUrl;relayerUrl;multiRollupConfig;crossSdkBridgeEnabled;forceScwDeployBeforeMessageSignature;popupOverlayOptions;constructor({baseConfig:e,overrides:t,crossSdkBridgeEnabled:r,jsonRpcReferrer:i,forceScwDeployBeforeMessageSignature:a,popupOverlayOptions:s,...o}){if(yt(o,["clientId","redirectUri"]),this.oidcConfiguration=o,this.baseConfig=e,this.crossSdkBridgeEnabled=r||!1,this.forceScwDeployBeforeMessageSignature=a||!1,this.popupOverlayOptions=s||{disableGenericPopupOverlay:!1,disableBlockedPopupOverlay:!1},t)yt(t,["authenticationDomain","passportDomain","magicPublishableApiKey","magicProviderId","zkEvmRpcUrl","relayerUrl","imxPublicApiDomain","indexerMrBasePath","orderBookMrBasePath","passportMrBasePath"],"overrides"),this.authenticationDomain=t.authenticationDomain,this.passportDomain=t.passportDomain,this.imxPublicApiDomain=t.imxPublicApiDomain,this.magicPublishableApiKey=t.magicPublishableApiKey,this.magicProviderId=t.magicProviderId,this.zkEvmRpcUrl=t.zkEvmRpcUrl,this.relayerUrl=t.relayerUrl,this.multiRollupConfig={indexer:createConfig({basePath:t.indexerMrBasePath}),orderBook:createConfig({basePath:t.orderBookMrBasePath}),passport:createConfig({basePath:t.passportMrBasePath})};else switch(e.environment){case Environment.PRODUCTION:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="fSMzaRQ4O7p4fttl7pCyGVtJS_G70P8SNsLXtPPGHo0=",this.passportDomain="https://passport.immutable.com",this.imxPublicApiDomain="https://api.immutable.com",this.zkEvmRpcUrl="https://rpc.immutable.com",this.relayerUrl="https://api.immutable.com/relayer-mr",this.multiRollupConfig=multiRollupConfig.getProduction();break}case Environment.SANDBOX:default:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="fSMzaRQ4O7p4fttl7pCyGVtJS_G70P8SNsLXtPPGHo0=",this.passportDomain="https://passport.sandbox.immutable.com",this.imxPublicApiDomain="https://api.sandbox.immutable.com",this.zkEvmRpcUrl="https://rpc.testnet.immutable.com",this.relayerUrl="https://api.sandbox.immutable.com/relayer-mr",this.multiRollupConfig=multiRollupConfig.getSandbox();break}}}};var W="imx_passport_confirmation";var re=({url:n,title:e,width:t,height:r})=>{let i=Math.max(0,Math.round(window.screenX+(window.outerWidth-t)/2)),a=Math.max(0,Math.round(window.screenY+(window.outerHeight-r)/2)),s=window.open(n,e,`
|
|
339
|
+
`,it=()=>`
|
|
340
|
+
<div
|
|
341
|
+
id="${F}"
|
|
342
|
+
style="
|
|
343
|
+
position: fixed !important;
|
|
344
|
+
top: 0 !important;
|
|
345
|
+
left: 0 !important;
|
|
346
|
+
width: 100% !important;
|
|
347
|
+
height: 100% !important;
|
|
348
|
+
display: flex !important;
|
|
349
|
+
flex-direction: column !important;
|
|
350
|
+
justify-content: center !important;
|
|
351
|
+
align-items: center !important;
|
|
352
|
+
z-index: 2147483647 !important;
|
|
353
|
+
background: rgba(247, 247, 247, 0.24) !important;
|
|
354
|
+
opacity: 1 !important;
|
|
355
|
+
"
|
|
356
|
+
>
|
|
357
|
+
<div
|
|
358
|
+
id="${W}"
|
|
359
|
+
style="
|
|
360
|
+
display: flex !important;
|
|
361
|
+
flex-direction: column !important;
|
|
362
|
+
align-items: center !important;
|
|
363
|
+
width: 100% !important;
|
|
364
|
+
"
|
|
365
|
+
/>
|
|
366
|
+
</div>
|
|
367
|
+
`;function ee({id:n,href:e,rel:t,crossOrigin:r}){let i=`${F}-${n}`;if(!document.getElementById(i)){let a=document.createElement("link");a.id=i,a.href=e,t&&(a.rel=t),r&&(a.crossOrigin=r),document.head.appendChild(a);}}var at=()=>nt(Sn()),st=()=>nt(On());var b=class{disableGenericPopupOverlay;disableBlockedPopupOverlay;overlay;isBlockedOverlay;tryAgainListener;onCloseListener;constructor(e,t=!1){this.disableBlockedPopupOverlay=e.disableBlockedPopupOverlay||!1,this.disableGenericPopupOverlay=e.disableGenericPopupOverlay||!1,this.isBlockedOverlay=t;}append(e,t){this.shouldAppendOverlay()&&(this.appendOverlay(),this.updateTryAgainButton(e),this.updateCloseButton(t));}update(e){this.updateTryAgainButton(e);}remove(){this.overlay&&this.overlay.remove();}shouldAppendOverlay(){return !(this.disableGenericPopupOverlay&&this.disableBlockedPopupOverlay||this.disableGenericPopupOverlay&&!this.isBlockedOverlay||this.disableBlockedPopupOverlay&&this.isBlockedOverlay)}appendOverlay(){if(!this.overlay){ee({id:"link-googleapis",href:"https://fonts.googleapis.com"}),ee({id:"link-gstatic",href:"https://fonts.gstatic.com",crossOrigin:"anonymous"}),ee({id:"link-roboto",href:"https://fonts.googleapis.com/css2?family=Roboto:ital,wght@0,400;0,500;0,700;1,400;1,500;1,700&display=swap",rel:"stylesheet"});let e=document.createElement("div");e.innerHTML=this.isBlockedOverlay?at():st(),document.body.insertAdjacentElement("beforeend",e),this.overlay=e;}}updateTryAgainButton(e){let t=document.getElementById(Q);t&&(this.tryAgainListener&&t.removeEventListener("click",this.tryAgainListener),this.tryAgainListener=e,t.addEventListener("click",e));}updateCloseButton(e){let t=document.getElementById(Y);t&&(this.onCloseListener&&t.removeEventListener("click",this.onCloseListener),this.onCloseListener=e,t.addEventListener("click",e));}};var te=class{storage;constructor(e,t){this.storage=bn.createInstance({name:e,driver:t});}get length(){return this.storage.length()}clear(){return this.storage.clear()}getItem(e){return this.storage.getItem(e)}key(e){return this.storage.key(e)}async removeItem(e){await this.storage.removeItem(e);}async setItem(e,t){await this.storage.setItem(e,t);}};var Hn=500,Vn={headers:{"Content-Type":"application/x-www-form-urlencoded"}},Wn="/v2/logout",qn="/im-logged-out",$n="/authorize",Zn=n=>n?qn:Wn,Kn=n=>{let{authenticationDomain:e,oidcConfiguration:t}=n,r;n.crossSdkBridgeEnabled?r=new te("ImmutableSDKPassport",bn.INDEXEDDB):typeof window<"u"?r=window.localStorage:r=new InMemoryWebStorage;let i=new WebStorageStateStore({store:r}),a=new URL(Zn(n.crossSdkBridgeEnabled),e.replace(/^(?:https?:\/\/)?(.*)/,"https://$1"));return a.searchParams.set("client_id",t.clientId),t.logoutRedirectUri&&a.searchParams.set("returnTo",t.logoutRedirectUri),{authority:e,redirect_uri:t.redirectUri,popup_redirect_uri:t.popupRedirectUri||t.redirectUri,client_id:t.clientId,metadata:{authorization_endpoint:`${e}/authorize`,token_endpoint:`${e}/oauth/token`,userinfo_endpoint:`${e}/userinfo`,end_session_endpoint:a.toString(),revocation_endpoint:`${e}/oauth/revoke`},mergeClaimsStrategy:{array:"merge"},automaticSilentRenew:!1,scope:t.scope,userStore:i,revokeTokenTypes:["refresh_token"],extraQueryParams:{...t.audience?{audience:t.audience}:{}}}};function Ie(n){return btoa(String.fromCharCode(...new Uint8Array(n))).replace(/\+/g,"-").replace(/\//g,"_").replace(/=/g,"")}async function Xn(n){let t=new TextEncoder().encode(n);return await window.crypto.subtle.digest("SHA-256",t)}var q=class n{userManager;deviceCredentialsManager;config;embeddedLoginPrompt;logoutMode;refreshingPromise=null;constructor(e,t){this.config=e,this.userManager=new UserManager(Kn(e)),this.deviceCredentialsManager=new V,this.embeddedLoginPrompt=t,this.logoutMode=e.oidcConfiguration.logoutMode||"redirect";}static mapOidcUserToDomainModel=e=>{let t;e.id_token&&(t=ot(e.id_token)?.passport);let r={expired:e.expired,idToken:e.id_token,accessToken:e.access_token,refreshToken:e.refresh_token,profile:{sub:e.profile.sub,email:e.profile.email,nickname:e.profile.nickname}};return t?.imx_eth_address&&(r.imx={ethAddress:t.imx_eth_address,starkAddress:t.imx_stark_address,userAdminAddress:t.imx_user_admin_address}),t?.zkevm_eth_address&&(r.zkEvm={ethAddress:t?.zkevm_eth_address,userAdminAddress:t?.zkevm_user_admin_address}),r};static mapDeviceTokenResponseToOidcUser=e=>{let t=ot(e.id_token);return new User({id_token:e.id_token,access_token:e.access_token,refresh_token:e.refresh_token,token_type:e.token_type,profile:{sub:t.sub,iss:t.iss,aud:t.aud,exp:t.exp,iat:t.iat,email:t.email,nickname:t.nickname,passport:t.passport}})};buildExtraQueryParams(e,t){let r={...this.userManager.settings?.extraQueryParams??{},rid:getDetail(Detail.RUNTIME_ID)||"",third_party_a_id:e||""};if(t){if(t.directLoginMethod==="email"){let i=t.email;i&&(r.direct=t.directLoginMethod,r.email=i);}else r.direct=t.directLoginMethod;t.marketingConsentStatus&&(r.marketingConsent=t.marketingConsentStatus);}return r}async loginWithRedirect(e,t){return await this.userManager.clearStaleState(),y(async()=>{let r=this.buildExtraQueryParams(e,t);await this.userManager.signinRedirect({extraQueryParams:r});},"AUTHENTICATION_ERROR")}async login(e,t){return y(async()=>{let r;t?r=t:this.config.popupOverlayOptions.disableHeadlessLoginPromptOverlay||(r=await this.embeddedLoginPrompt.displayEmbeddedLoginPrompt());let i=window.crypto.randomUUID(),a=async()=>{let s=this.buildExtraQueryParams(e,r),o=this.userManager.signinPopup({extraQueryParams:s,popupWindowFeatures:{width:410,height:450},popupWindowTarget:i}),c=window.open("",i);if(c){let d=new Promise((p,u)=>{let h=setInterval(()=>{c.closed&&(clearInterval(h),u(new Error("Popup closed by user")));},Hn);o.finally(()=>{clearInterval(h),c.close();});});return Promise.race([o,d])}return o};return new Promise((s,o)=>{a().then(c=>{s(n.mapOidcUserToDomainModel(c));}).catch(c=>{if(!(c instanceof Error)||c.message!=="Attempted to navigate on a disposed window"){o(c);return}let d=!1,p=new b(this.config.popupOverlayOptions,!0);p.append(async()=>{try{if(d)window.open("",i);else {d=!0;let u=await a();p.remove(),s(n.mapOidcUserToDomainModel(u));}}catch(u){p.remove(),o(u);}},()=>{p.remove(),o(new Error("Popup closed by user"));});});})},"AUTHENTICATION_ERROR")}async getUserOrLogin(){let e=null;try{e=await this.getUser();}catch(t){N.warn("Failed to retrieve a cached user session",t);}return e||this.login()}static shouldUseSigninPopupCallback(){try{let r=`oidc.${new URLSearchParams(window.location.search).get("state")}`,i=localStorage.getItem(r);return JSON.parse(i||"{}")?.request_type==="si:p"}catch{return !1}}async loginCallback(){return y(async()=>{if(n.shouldUseSigninPopupCallback()){await this.userManager.signinPopupCallback(void 0,!0);return}let e=await this.userManager.signinCallback();if(e)return n.mapOidcUserToDomainModel(e)},"AUTHENTICATION_ERROR")}async getPKCEAuthorizationUrl(e){let t=Ie(window.crypto.getRandomValues(new Uint8Array(32))),r=Ie(await Xn(t)),i=Ie(window.crypto.getRandomValues(new Uint8Array(32))),{redirectUri:a,scope:s,audience:o,clientId:c}=this.config.oidcConfiguration;this.deviceCredentialsManager.savePKCEData({state:i,verifier:t});let d=new URL($n,this.config.authenticationDomain);if(d.searchParams.set("response_type","code"),d.searchParams.set("code_challenge",r),d.searchParams.set("code_challenge_method","S256"),d.searchParams.set("client_id",c),d.searchParams.set("redirect_uri",a),d.searchParams.set("state",i),s&&d.searchParams.set("scope",s),o&&d.searchParams.set("audience",o),e){if(e.directLoginMethod==="email"){let p=e.email;p&&(d.searchParams.set("direct",e.directLoginMethod),d.searchParams.set("email",p));}else d.searchParams.set("direct",e.directLoginMethod);e.marketingConsentStatus&&d.searchParams.set("marketingConsent",e.marketingConsentStatus);}return d.toString()}async loginWithPKCEFlowCallback(e,t){return y(async()=>{let r=this.deviceCredentialsManager.getPKCEData();if(!r)throw new Error("No code verifier or state for PKCE");if(t!==r.state)throw new Error("Provided state does not match stored state");let i=await this.getPKCEToken(e,r.verifier),a=n.mapDeviceTokenResponseToOidcUser(i),s=n.mapOidcUserToDomainModel(a);return await this.userManager.storeUser(a),s},"AUTHENTICATION_ERROR")}async getPKCEToken(e,t){return (await Ft.post(`${this.config.authenticationDomain}/oauth/token`,{client_id:this.config.oidcConfiguration.clientId,grant_type:"authorization_code",code_verifier:t,code:e,redirect_uri:this.config.oidcConfiguration.redirectUri},Vn)).data}async storeTokens(e){return y(async()=>{let t=n.mapDeviceTokenResponseToOidcUser(e),r=n.mapOidcUserToDomainModel(t);return await this.userManager.storeUser(t),r},"AUTHENTICATION_ERROR")}async logout(){return y(async()=>{await this.userManager.revokeTokens(["refresh_token"]),this.logoutMode==="silent"?await this.userManager.signoutSilent():await this.userManager.signoutRedirect();},"LOGOUT_ERROR")}async logoutSilentCallback(e){return this.userManager.signoutSilentCallback(e)}async removeUser(){return this.userManager.removeUser()}async getLogoutUrl(){let e=this.userManager.settings?.metadata?.end_session_endpoint;return e||(N.warn("Failed to get logout URL"),null)}forceUserRefreshInBackground(){this.refreshTokenAndUpdatePromise().catch(e=>{N.warn("Failed to refresh user token",e);});}async forceUserRefresh(){return this.refreshTokenAndUpdatePromise().catch(e=>(N.warn("Failed to refresh user token",e),null))}async refreshTokenAndUpdatePromise(){return this.refreshingPromise?this.refreshingPromise:(this.refreshingPromise=new Promise(async(e,t)=>{try{let r=await this.userManager.signinSilent();if(r){e(n.mapOidcUserToDomainModel(r));return}e(null);}catch(r){let i="AUTHENTICATION_ERROR",a="Failed to refresh token",s=!0;if(r instanceof ErrorTimeout?(i="SILENT_LOGIN_ERROR",a=`${a}: ${r.message}`,s=!1):r instanceof ErrorResponse?(i="NOT_LOGGED_IN_ERROR",a=`${a}: ${r.message||r.error_description}`):r instanceof Error?a=`${a}: ${r.message}`:typeof r=="string"&&(a=`${a}: ${r}`),s)try{await this.userManager.removeUser();}catch(o){o instanceof Error&&(a=`${a}: Failed to remove user: ${o.message}`);}t(new f(a,i));}finally{this.refreshingPromise=null;}}),this.refreshingPromise)}async getUser(e=t=>!0){if(this.refreshingPromise){let r=await this.refreshingPromise;return r&&e(r)?r:null}let t=await this.userManager.getUser();if(!t)return null;if(!Ye(t)){let r=n.mapOidcUserToDomainModel(t);if(r&&e(r))return r}if(t.refresh_token){let r=await this.refreshTokenAndUpdatePromise();if(r&&e(r))return r}return null}async getUserZkEvm(){let e=await this.getUser(j);if(!e)throw new Error("Failed to obtain a User with the required ZkEvm attributes");return e}async getUserImx(){let e=await this.getUser(L);if(!e)throw new Error("Failed to obtain a User with the required IMX attributes");return e}};var E=async(n,e,t=!0,r=!0)=>{let i=trackFlow("passport",e,t);try{return await n(i)}catch(a){throw a instanceof Error?trackError("passport",e,a,{flowId:i.details.flowId}):i.addEvent("errored"),a}finally{r&&i.addEvent("End");}};var ei="mainnet",$=class{config;magicProviderProxyFactory;magicClient;constructor(e,t){this.config=e,this.magicProviderProxyFactory=t,typeof window<"u"&&(this.magicClient=new Magic(this.config.magicPublishableApiKey,{extensions:[new OpenIdExtension],network:ei}));}getMagicClient(){if(!this.magicClient)throw new Error("Cannot perform this action outside of the browser");return this.magicClient}async login(e){return y(async()=>E(async t=>{let r=performance.now(),i=this.getMagicClient();return t.addEvent("endMagicClientInit"),await i.openid.loginWithOIDC({jwt:e,providerId:this.config.magicProviderId}),t.addEvent("endLoginWithOIDC"),trackDuration("passport",t.details.flowName,Math.round(performance.now()-r)),this.magicProviderProxyFactory.createProxy(i)},"magicLogin"),"WALLET_CONNECTION_ERROR")}async logout(){let e=this.getMagicClient();e.user&&await e.user.logout();}};var ct=async n=>y(async()=>{let e=await generateLegacyStarkPrivateKey(n);return createStarkSigner(e)},"WALLET_CONNECTION_ERROR");async function dt({user:n,starkSigner:e,request:t,exchangesApi:r}){return y(async()=>{let{ethAddress:i}=n.imx,a=t.amount,s=await r.getExchangeSignableTransfer({id:t.transactionID,getSignableTransferRequest:{sender:i,token:convertToSignableToken(t),amount:a,receiver:t.receiver}}),o=await e.getAddress(),{payload_hash:c}=s.data,d=await e.signMessage(c),p={sender_stark_key:s.data.sender_stark_key||o,sender_vault_id:s.data.sender_vault_id,receiver_stark_key:s.data.receiver_stark_key,receiver_vault_id:s.data.receiver_vault_id,asset_id:s.data.asset_id,amount:s.data.amount,nonce:s.data.nonce,expiration_timestamp:s.data.expiration_timestamp,stark_signature:d},u={Authorization:`Bearer ${n.accessToken}`},h=await r.createExchangeTransfer({id:t.transactionID,createTransferRequest:p},{headers:u});return {sent_signature:h?.data.sent_signature,status:h?.data.status?.toString(),time:h?.data.time,transfer_id:h?.data.transfer_id}},"EXCHANGE_TRANSFER_ERROR")}var pt="ERC721";async function mt({starkSigner:n,user:e,request:t,ordersApi:r,guardianClient:i}){return y(async()=>{let{ethAddress:a}=e.imx,s=t.sell.type===pt?"1":t.sell.amount,o=t.buy.type===pt?"1":t.buy.amount,c={Authorization:`Bearer ${e.accessToken}`},d={user:a,amount_buy:o,token_buy:convertToSignableToken(t.buy),amount_sell:s,token_sell:convertToSignableToken(t.sell),fees:t.fees,split_fees:!0,expiration_timestamp:t.expiration_timestamp},p=await r.getSignableOrder({getSignableOrderRequestV3:d},{headers:c});await i.evaluateImxTransaction({payloadHash:p.data.payload_hash});let{payload_hash:u}=p.data,h=await n.signMessage(u),v=p.data,_={createOrderRequest:{include_fees:!0,fees:t.fees,stark_signature:h,amount_buy:v.amount_buy,amount_sell:v.amount_sell,asset_id_buy:v.asset_id_buy,asset_id_sell:v.asset_id_sell,expiration_timestamp:v.expiration_timestamp,nonce:v.nonce,stark_key:v.stark_key,vault_id_buy:v.vault_id_buy,vault_id_sell:v.vault_id_sell}};return {...(await r.createOrderV3(_,{headers:c})).data}},"CREATE_ORDER_ERROR")}async function ut({user:n,starkSigner:e,request:t,ordersApi:r,guardianClient:i}){return y(async()=>{let a={order_id:t.order_id},s={Authorization:`Bearer ${n.accessToken}`},o=await r.getSignableCancelOrderV3({getSignableCancelOrderRequest:a},{headers:s});await i.evaluateImxTransaction({payloadHash:o.data.payload_hash});let{payload_hash:c}=o.data,d=await e.signMessage(c),p=await r.cancelOrderV3({id:t.order_id.toString(),cancelOrderRequest:{order_id:t.order_id,stark_signature:d}},{headers:s});return {order_id:p.data.order_id,status:p.data.status}},"CANCEL_ORDER_ERROR")}async function Se({ethSigner:n,starkSigner:e,imxApiClients:t},r){return y(async()=>{let[i,a]=await Promise.all([n.getAddress(),e.getAddress()]),s=await t.usersApi.getSignableRegistrationOffchain({getSignableRegistrationRequest:{ether_key:i,stark_key:a}}),{signable_message:o,payload_hash:c}=s.data,[d,p]=await Promise.all([signRaw(o,n),e.signMessage(c)]);return (await t.usersApi.registerPassportUserV2({authorization:`Bearer ${r}`,registerPassportUserRequest:{eth_signature:d,ether_key:i,stark_signature:p,stark_key:a}})).data},"USER_REGISTRATION_ERROR")}async function gt({request:n,tradesApi:e,user:t,starkSigner:r,guardianClient:i}){return y(async()=>{let{ethAddress:a}=t.imx,s={expiration_timestamp:n.expiration_timestamp,fees:n.fees,order_id:n.order_id,user:a},o={Authorization:`Bearer ${t.accessToken}`},c=await e.getSignableTrade({getSignableTradeRequest:s},{headers:o});await i.evaluateImxTransaction({payloadHash:c.data.payload_hash});let{payload_hash:d}=c.data,p=await r.signMessage(d),{data:u}=c,h={createTradeRequest:{include_fees:!0,fees:n?.fees,stark_signature:p,order_id:n?.order_id,fee_info:u.fee_info,amount_buy:u.amount_buy,amount_sell:u.amount_sell,asset_id_buy:u.asset_id_buy,asset_id_sell:u.asset_id_sell,expiration_timestamp:u.expiration_timestamp,nonce:u.nonce,stark_key:u.stark_key,vault_id_buy:u.vault_id_buy,vault_id_sell:u.vault_id_sell}},{data:v}=await e.createTradeV3(h,{headers:o});return v},"CREATE_TRADE_ERROR")}var ft="ERC721";async function Et({request:n,transfersApi:e,starkSigner:t,user:r,guardianClient:i}){return y(async()=>{let a=n.type===ft?"1":n.amount,s={sender:r.imx.ethAddress,token:convertToSignableToken(n),amount:a,receiver:n.receiver},o={Authorization:`Bearer ${r.accessToken}`},c=await e.getSignableTransferV1({getSignableTransferRequest:s},{headers:o});await i.evaluateImxTransaction({payloadHash:c.data.payload_hash});let d=c.data,{payload_hash:p}=d,u=await t.signMessage(p),h=await t.getAddress(),_={createTransferRequest:{sender_stark_key:d.sender_stark_key||h,sender_vault_id:d.sender_vault_id,receiver_stark_key:d.receiver_stark_key,receiver_vault_id:d.receiver_vault_id,asset_id:d.asset_id,amount:d.amount,nonce:d.nonce,expiration_timestamp:d.expiration_timestamp,stark_signature:u}},{data:R}=await e.createTransferV1(_,{headers:o});return {sent_signature:R.sent_signature,status:R.status?.toString(),time:R.time,transfer_id:R.transfer_id}},"TRANSFER_ERROR")}async function yt({user:n,starkSigner:e,request:t,transfersApi:r,guardianClient:i}){return y(async()=>{let{ethAddress:a}=n.imx,s=t.map(h=>({amount:"1",token:convertToSignableToken({type:ft,tokenId:h.tokenId,tokenAddress:h.tokenAddress}),receiver:h.receiver})),o={Authorization:`Bearer ${n.accessToken}`},c=await r.getSignableTransfer({getSignableTransferRequestV2:{sender_ether_key:a,signable_requests:s}},{headers:o});await i.evaluateImxTransaction({payloadHash:c.data.signable_responses[0]?.payload_hash});let d=await Promise.all(c.data.signable_responses.map(async h=>{let v=await e.signMessage(h.payload_hash);return {sender_vault_id:h.sender_vault_id,receiver_stark_key:h.receiver_stark_key,receiver_vault_id:h.receiver_vault_id,asset_id:h.asset_id,amount:h.amount,nonce:h.nonce,expiration_timestamp:h.expiration_timestamp,stark_signature:v}})),p={sender_stark_key:c.data.sender_stark_key,requests:d};return {transfer_ids:(await r.createTransfer({createTransferRequestV2:p},{headers:o}))?.data.transfer_ids}},"TRANSFER_ERROR")}var si=n=>new Promise(e=>{setTimeout(()=>e(),n);}),D=async(n,e)=>{let{retries:t=3,interval:r=1e3,finalErr:i=Error("Retry failed"),finallyFn:a=()=>{}}=e||{};try{return await n()}catch{return t<=0?Promise.reject(i):(await si(r),D(n,{retries:t-1,finalErr:i,finallyFn:a}))}finally{t<=0&&a();}};async function vt(n){await D(async()=>{let e=await n.forceUserRefresh();return e?.imx?e:Promise.reject(new Error("user wallet addresses not exist"))});}async function Oe(n,e,t,r,i){return y(async()=>{try{let a=await Se({ethSigner:n,starkSigner:e,imxApiClients:i},t.accessToken);return await vt(r),a}catch(a){if(Ft.isAxiosError(a)&&a.response?.status===409)return await vt(r),{tx_hash:""};throw a}},"USER_REGISTRATION_ERROR")}var re=class{authManager;immutableXClient;guardianClient;imxApiClients;magicAdapter;signers;signerInitialisationError;constructor({authManager:e,immutableXClient:t,passportEventEmitter:r,magicAdapter:i,imxApiClients:a,guardianClient:s}){this.authManager=e,this.immutableXClient=t,this.magicAdapter=i,this.imxApiClients=a,this.guardianClient=s,this.#i(),r.on("loggedOut",this.handleLogout);}handleLogout=()=>{this.signers=void 0;};#i(){let e=async()=>{let t=await this.authManager.getUser(),r=await this.magicAdapter.login(t.idToken),a=await new BrowserProvider(r).getSigner(),s=await ct(a);return {ethSigner:a,starkSigner:s}};this.signers=new Promise(async t=>{try{t(await e());}catch(r){this.signerInitialisationError=r,t(void 0);}});}async#t(){let e=await this.authManager.getUser();if(!e||!this.signers)throw new f("User has been logged out","NOT_LOGGED_IN_ERROR");return e}async#a(){let e=await this.signers;if(typeof e>"u")throw typeof this.signerInitialisationError<"u"?this.signerInitialisationError:new Error("Signers failed to initialise");return e}async#r(){let[e,t]=await Promise.all([this.#t(),this.#a()]);if(!L(e))throw new f("User has not been registered with StarkEx","USER_NOT_REGISTERED_ERROR");return {user:e,starkSigner:t.starkSigner,ethSigner:t.ethSigner}}async transfer(e){return E(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#r();return Et({request:e,user:t,starkSigner:r,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.guardianClient})})(),"imxTransfer")}async registerOffchain(){return E(async()=>{let[e,t]=await Promise.all([this.#t(),this.#a()]);return await Oe(t.ethSigner,t.starkSigner,e,this.authManager,this.imxApiClients)},"imxRegisterOffchain")}async isRegisteredOffchain(){return E(async()=>!!(await this.#t()).imx,"imxIsRegisteredOffchain")}isRegisteredOnchain(){throw new f("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async createOrder(e){return E(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#r();return mt({request:e,user:t,starkSigner:r,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.guardianClient})})(),"imxCreateOrder")}async cancelOrder(e){return E(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#r();return ut({request:e,user:t,starkSigner:r,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.guardianClient})})(),"imxCancelOrder")}async createTrade(e){return E(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#r();return gt({request:e,user:t,starkSigner:r,tradesApi:this.immutableXClient.tradesApi,guardianClient:this.guardianClient})})(),"imxCreateTrade")}async batchNftTransfer(e){return E(()=>this.guardianClient.withConfirmationScreenTask({width:480,height:784})(async()=>{let{user:t,starkSigner:r}=await this.#r();return yt({request:e,user:t,starkSigner:r,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.guardianClient})})(),"imxBatchNftTransfer")}async exchangeTransfer(e){return E(async()=>{let{user:t,starkSigner:r}=await this.#r();return dt({request:e,user:t,starkSigner:r,exchangesApi:this.immutableXClient.exchangeApi})},"imxExchangeTransfer")}deposit(e){throw new f("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}prepareWithdrawal(e){throw new f("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}completeWithdrawal(e,t){throw new f("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async getAddress(){return E(async()=>{let e=await this.#t();if(!L(e))throw new f("User has not been registered with StarkEx","USER_NOT_REGISTERED_ERROR");return Promise.resolve(e.imx.ethAddress)},"imxGetAddress")}};var ne=class{authManager;immutableXClient;magicAdapter;passportEventEmitter;imxApiClients;guardianClient;constructor({authManager:e,immutableXClient:t,magicAdapter:r,passportEventEmitter:i,imxApiClients:a,guardianClient:s}){this.authManager=e,this.immutableXClient=t,this.magicAdapter=r,this.passportEventEmitter=i,this.imxApiClients=a,this.guardianClient=s;}async getProvider(){let e=await this.authManager.getUserOrLogin();return this.createProviderInstance(e)}async getProviderSilent(){let e=await this.authManager.getUser();return e?this.createProviderInstance(e):null}async createProviderInstance(e){if(!e.idToken)throw new f("Failed to initialise","WALLET_CONNECTION_ERROR");return new re({authManager:this.authManager,immutableXClient:this.immutableXClient,passportEventEmitter:this.passportEventEmitter,magicAdapter:this.magicAdapter,imxApiClients:this.imxApiClients,guardianClient:this.guardianClient})}};var _t=(n,e,t)=>{let r=e.map(i=>!n[i]&&i).filter(i=>i).join(", ");if(r!==""){let i=t?`${t} - ${r} cannot be null`:`${r} cannot be null`;throw new f(i,"INVALID_CONFIGURATION")}},ie=class{authenticationDomain;passportDomain;imxPublicApiDomain;magicPublishableApiKey;magicProviderId;oidcConfiguration;baseConfig;zkEvmRpcUrl;relayerUrl;multiRollupConfig;crossSdkBridgeEnabled;forceScwDeployBeforeMessageSignature;popupOverlayOptions;constructor({baseConfig:e,overrides:t,crossSdkBridgeEnabled:r,jsonRpcReferrer:i,forceScwDeployBeforeMessageSignature:a,popupOverlayOptions:s,...o}){if(_t(o,["clientId","redirectUri"]),this.oidcConfiguration=o,this.baseConfig=e,this.crossSdkBridgeEnabled=r||!1,this.forceScwDeployBeforeMessageSignature=a||!1,this.popupOverlayOptions=s||{disableGenericPopupOverlay:!1,disableBlockedPopupOverlay:!1,disableHeadlessLoginPromptOverlay:!1},t)_t(t,["authenticationDomain","passportDomain","magicPublishableApiKey","magicProviderId","zkEvmRpcUrl","relayerUrl","imxPublicApiDomain","indexerMrBasePath","orderBookMrBasePath","passportMrBasePath"],"overrides"),this.authenticationDomain=t.authenticationDomain,this.passportDomain=t.passportDomain,this.imxPublicApiDomain=t.imxPublicApiDomain,this.magicPublishableApiKey=t.magicPublishableApiKey,this.magicProviderId=t.magicProviderId,this.zkEvmRpcUrl=t.zkEvmRpcUrl,this.relayerUrl=t.relayerUrl,this.multiRollupConfig={indexer:createConfig({basePath:t.indexerMrBasePath}),orderBook:createConfig({basePath:t.orderBookMrBasePath}),passport:createConfig({basePath:t.passportMrBasePath})};else switch(e.environment){case Environment.PRODUCTION:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="fSMzaRQ4O7p4fttl7pCyGVtJS_G70P8SNsLXtPPGHo0=",this.passportDomain="https://passport.immutable.com",this.imxPublicApiDomain="https://api.immutable.com",this.zkEvmRpcUrl="https://rpc.immutable.com",this.relayerUrl="https://api.immutable.com/relayer-mr",this.multiRollupConfig=multiRollupConfig.getProduction();break}case Environment.SANDBOX:default:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="fSMzaRQ4O7p4fttl7pCyGVtJS_G70P8SNsLXtPPGHo0=",this.passportDomain="https://passport.sandbox.immutable.com",this.imxPublicApiDomain="https://api.sandbox.immutable.com",this.zkEvmRpcUrl="https://rpc.testnet.immutable.com",this.relayerUrl="https://api.sandbox.immutable.com/relayer-mr",this.multiRollupConfig=multiRollupConfig.getSandbox();break}}}};var Z="imx_passport_confirmation",wt="im_passport_embedded_login_prompt";var ae=({url:n,title:e,width:t,height:r})=>{let i=Math.max(0,Math.round(window.screenX+(window.outerWidth-t)/2)),a=Math.max(0,Math.round(window.screenY+(window.outerHeight-r)/2)),s=window.open(n,e,`
|
|
337
368
|
scrollbars=yes,
|
|
338
369
|
width=${t},
|
|
339
370
|
height=${r},
|
|
340
371
|
top=${a},
|
|
341
372
|
left=${i}
|
|
342
|
-
`);if(!s)throw new Error("Failed to open confirmation screen");return s.focus(),s};var
|
|
373
|
+
`);if(!s)throw new Error("Failed to open confirmation screen");return s.focus(),s};var ke="Confirm this transaction",xe=720,Me=480,Pt=1e3;var B=class{config;confirmationWindow;popupOptions;overlay;overlayClosed;timer;constructor(e){this.config=e,this.overlayClosed=!1;}getHref(e,t){let r=`${this.config.passportDomain}/transaction-confirmation/${e}`;if(t){let i=t?Object.keys(t).map(a=>`${a}=${t[a]}`).join("&"):"";r=`${r}?${i}`;}return r}requestConfirmation(e,t,r,i){return new Promise((a,s)=>{let o=({data:d,origin:p})=>{if(!(p!==this.config.passportDomain||d.eventType!==Z))switch(d.messageType){case"confirmation_window_ready":{this.confirmationWindow?.postMessage({eventType:Z,messageType:"confirmation_start"},this.config.passportDomain);break}case"transaction_confirmed":{this.closeWindow(),a({confirmed:!0});break}case"transaction_rejected":{this.closeWindow(),a({confirmed:!1});break}case"transaction_error":{this.closeWindow(),s(new Error("Error during transaction confirmation"));break}default:this.closeWindow(),s(new Error("Unsupported message type"));}},c="";r===He.mr.TransactionApprovalRequestChainTypeEnum.Starkex?c=this.getHref("transaction",{transactionId:e,etherAddress:t,chainType:r}):c=this.getHref("zkevm/transaction",{transactionID:e,etherAddress:t,chainType:r,chainID:i}),window.addEventListener("message",o),this.showConfirmationScreen(c,o,a);})}requestMessageConfirmation(e,t,r){return new Promise((i,a)=>{let s=({data:c,origin:d})=>{if(!(d!==this.config.passportDomain||c.eventType!==Z))switch(c.messageType){case"confirmation_window_ready":{this.confirmationWindow?.postMessage({eventType:Z,messageType:"confirmation_start"},this.config.passportDomain);break}case"message_confirmed":{this.closeWindow(),i({confirmed:!0});break}case"message_rejected":{this.closeWindow(),i({confirmed:!1});break}case"message_error":{this.closeWindow(),a(new Error("Error during message confirmation"));break}default:this.closeWindow(),a(new Error("Unsupported message type"));}};window.addEventListener("message",s);let o=this.getHref("zkevm/message",{messageID:e,etherAddress:t,...r?{messageType:r}:{}});this.showConfirmationScreen(o,s,i);})}showServiceUnavailable(){return new Promise((e,t)=>{this.showConfirmationScreen(this.getHref("unavailable"),()=>{},()=>{this.closeWindow(),t(new Error("Service unavailable"));});})}loading(e){if(!this.config.crossSdkBridgeEnabled){this.popupOptions=e;try{this.confirmationWindow=ae({url:this.getHref("loading"),title:ke,width:e?.width||Me,height:e?.height||xe}),this.overlay=new b(this.config.popupOverlayOptions);}catch(t){let r=t instanceof Error?t.message:String(t);trackError("passport","confirmationPopupDenied",new Error(r)),this.overlay=new b(this.config.popupOverlayOptions,!0);}this.overlay.append(()=>{try{this.confirmationWindow?.close(),this.confirmationWindow=ae({url:this.getHref("loading"),title:ke,width:this.popupOptions?.width||Me,height:this.popupOptions?.height||xe});}catch{}},()=>{this.overlayClosed=!0,this.closeWindow();});}}closeWindow(){this.confirmationWindow?.close(),this.overlay?.remove(),this.overlay=void 0;}showConfirmationScreen(e,t,r){if(this.confirmationWindow&&(this.confirmationWindow.location.href=e),!this.overlay){this.overlayClosed=!1,r({confirmed:!1});return}let i=()=>{(this.confirmationWindow?.closed||this.overlayClosed)&&(clearInterval(this.timer),window.removeEventListener("message",t),r({confirmed:!1}),this.overlayClosed=!1,this.confirmationWindow=void 0);};this.timer=setInterval(i,Pt),this.overlay.update(()=>this.recreateConfirmationWindow(e,i));}recreateConfirmationWindow(e,t){try{clearInterval(this.timer),this.confirmationWindow?.close(),this.confirmationWindow=ae({url:e,title:ke,width:this.popupOptions?.width||Me,height:this.popupOptions?.height||xe}),this.timer=setInterval(t,Pt);}catch{}}};var P=class{static overlay;static onCloseListener;static closeButton;static remove(){this.onCloseListener&&this.closeButton?.removeEventListener?.("click",this.onCloseListener),this.overlay?.remove(),this.closeButton=void 0,this.onCloseListener=void 0,this.overlay=void 0;}static appendOverlay(e,t){if(!this.overlay){let r=document.createElement("div");r.innerHTML=it(),document.body.insertAdjacentElement("beforeend",r);let i=document.querySelector(`#${W}`);i&&i.appendChild(e),r.addEventListener("click",t),this.overlay=r;}}};var li=560,pi=440,mi="16px",It="passport-embedded-login-keyframes",St="passport-embedded-login-iframe",H=class n{config;constructor(e){this.config=e;}getHref=()=>`${this.config.authenticationDomain}/im-embedded-login-prompt?client_id=${this.config.oidcConfiguration.clientId}`;static appendIFrameStylesIfNeeded=()=>{if(document.getElementById(It))return;let e=document.createElement("style");e.id=It,e.textContent=`
|
|
374
|
+
@keyframes passportEmbeddedLoginPromptPopBounceIn {
|
|
375
|
+
0% {
|
|
376
|
+
opacity: 0;
|
|
377
|
+
transform: scale(0.9);
|
|
378
|
+
}
|
|
379
|
+
50% {
|
|
380
|
+
opacity: 1;
|
|
381
|
+
transform: scale(1.05);
|
|
382
|
+
}
|
|
383
|
+
70% {
|
|
384
|
+
transform: scale(0.98);
|
|
385
|
+
}
|
|
386
|
+
100% {
|
|
387
|
+
opacity: 1;
|
|
388
|
+
transform: scale(1);
|
|
389
|
+
}
|
|
390
|
+
}
|
|
391
|
+
|
|
392
|
+
@media (max-height: 400px) {
|
|
393
|
+
#${St} {
|
|
394
|
+
width: 100% !important;
|
|
395
|
+
max-width: none !important;
|
|
396
|
+
}
|
|
397
|
+
}
|
|
398
|
+
`,document.head.appendChild(e);};getEmbeddedLoginIFrame=()=>{let e=document.createElement("iframe");return e.id=St,e.src=this.getHref(),e.style.height="100vh",e.style.width="100vw",e.style.maxHeight=`${li}px`,e.style.maxWidth=`${pi}px`,e.style.borderRadius=mi,e.style.opacity="0",e.style.transform="scale(0.9)",e.style.animation="passportEmbeddedLoginPromptPopBounceIn 0.6s ease-out 0.2s forwards",n.appendIFrameStylesIfNeeded(),e};displayEmbeddedLoginPrompt(){return new Promise((e,t)=>{let r=this.getEmbeddedLoginIFrame(),i=({data:a,origin:s})=>{if(!(s!==this.config.authenticationDomain||a.eventType!==wt))switch(a.messageType){case"login_method_selected":{let o=a.payload,c;o.directLoginMethod==="email"?c={directLoginMethod:"email",marketingConsentStatus:o.marketingConsentStatus,email:o.email}:c={directLoginMethod:o.directLoginMethod,marketingConsentStatus:o.marketingConsentStatus},window.removeEventListener("message",i),P.remove(),e(c);break}case"login_prompt_error":{window.removeEventListener("message",i),P.remove(),t(new Error("Error during embedded login prompt",{cause:a.payload}));break}case"login_prompt_closed":{window.removeEventListener("message",i),P.remove(),t(new Error("Popup closed by user"));break}default:window.removeEventListener("message",i),P.remove(),t(new Error("Unsupported message type"));break}};window.addEventListener("message",i),P.appendOverlay(r,()=>{window.removeEventListener("message",i),P.remove(),t(new Error("Popup closed by user"));});})}};var Ne=(e=>(e.ACCOUNTS_CHANGED="accountsChanged",e))(Ne||{});var U=class{emitter=new EventEmitter;emit(e,...t){this.emitter.emit(e,...t);}on(e,t){this.emitter.on(e,t);}removeListener(e,t){this.emitter.removeListener(e,t);}};var xt=1,Ri=1,Ti=2,Mt="02",_i="",Nt=`tuple(
|
|
343
399
|
bool delegateCall,
|
|
344
400
|
bool revertOnError,
|
|
345
401
|
uint256 gasLimit,
|
|
346
402
|
address target,
|
|
347
403
|
uint256 value,
|
|
348
404
|
bytes data
|
|
349
|
-
)[]`,Me=n=>n.map(e=>({delegateCall:e.delegateCall===!0,revertOnError:e.revertOnError===!0,gasLimit:e.gasLimit??BigInt(0),target:e.to??ZeroAddress,value:e.value??BigInt(0),data:e.data??"0x"})),gi=(n,e)=>{let t=AbiCoder.defaultAbiCoder().encode(["uint256",At],[n,e]);return keccak256(t)},It=n=>AbiCoder.defaultAbiCoder().encode([At],[n]),hi=n=>n||0n,fi=(n,e)=>{let t=BigInt(n)*2n**96n;return BigInt(e)+t},ie=async(n,e,t)=>{try{let r=new Contract(e,walletContracts.mainModule.abi,n),i=hi(t),a=await r.readNonce(i);if(typeof a=="bigint")return fi(i,a);throw new Error("Unexpected result from contract.nonce() call.")}catch(r){if(isError(r,"BAD_DATA"))return BigInt(0);throw r}},Ne=(n,e,t)=>solidityPacked(["string","uint256","address","bytes32"],[ui,n,e,t]),Ue=async(n,e,t,r,i)=>{let a=Me(n),s=gi(e,a),o=Ne(t,r,s),c=keccak256(o),d=getBytes(c),l=performance.now(),u=await i.signMessage(d);trackDuration("passport","magicSignMessageGetSignedMetaTransactions",Math.round(performance.now()-l));let h=`${u}${Pt}`,C=v1.signature.encodeSignature({version:1,threshold:pi,signers:[{isDynamic:!1,unrecovered:!0,weight:_t,signature:h}]}),w=new Interface(walletContracts.mainModule.abi);return w.encodeFunctionData(w.getFunction("execute")??"",[a,e,C])},Ei=n=>{let e=`0x0000${n}`;return v1.signature.decodeSignature(e)},De=(n,e,t)=>{let r=`${n}${Pt}`,{signers:i}=Ei(t),s=[...i,{isDynamic:!1,unrecovered:!0,weight:_t,signature:r,address:e}].sort((o,c)=>{let d=BigInt(o.address??0),l=BigInt(c.address??0);return d<=l?-1:d===l?0:1});return v1.signature.encodeSignature({version:1,threshold:mi,signers:s})},St=async(n,e,t,r,i)=>{let a={...n.types};delete a.EIP712Domain;let s=TypedDataEncoder.hash(n.domain,a,n.message),o=Ne(t,r,s),c=keccak256(o),d=getBytes(c),l=performance.now(),u=await i.signMessage(d);trackDuration("passport","magicSignMessageTypedData",Math.round(performance.now()-l));let h=await i.getAddress();return De(u,h,e)},Ot=async(n,e,t,r)=>{let i=hashMessage(e),a=Ne(n,r,i),s=keccak256(a),o=getBytes(s);return t.signMessage(o)},_=n=>`eip155:${n}`;var ae=class n{config;rpcProvider;authManager;constructor({config:e,rpcProvider:t,authManager:r}){this.config=e,this.rpcProvider=t,this.authManager=r;}static getResponsePreview(e){return e.length>100?`${e.substring(0,50)}...${e.substring(e.length-50)}`:e}async postToRelayer(e){let t={id:1,jsonrpc:"2.0",...e},r=await this.authManager.getUserZkEvm(),i=await fetch(`${this.config.relayerUrl}/v1/transactions`,{method:"POST",headers:{Authorization:`Bearer ${r.accessToken}`,"Content-Type":"application/json"},body:JSON.stringify(t)}),a=await i.text();if(!i.ok){let o=n.getResponsePreview(a);throw new Error(`Relayer HTTP error: ${i.status}. Content: "${o}"`)}let s;try{s=JSON.parse(a);}catch(o){let c=n.getResponsePreview(a);throw new Error(`Relayer JSON parse error: ${o instanceof Error?o.message:"Unknown error"}. Content: "${c}"`)}if(s.error)throw new Error(s.error);return s}async ethSendTransaction(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),i={method:"eth_sendTransaction",params:[{to:e,data:t,chainId:_(Number(r))}]},{result:a}=await this.postToRelayer(i);return a}async imGetTransactionByHash(e){let t={method:"im_getTransactionByHash",params:[e]},{result:r}=await this.postToRelayer(t);return r}async imGetFeeOptions(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),i={method:"im_getFeeOptions",params:[{userAddress:e,data:t,chainId:_(Number(r))}]},{result:a}=await this.postToRelayer(i);return a}async imSignTypedData(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),i={method:"im_signTypedData",params:[{address:e,eip712Payload:t,chainId:_(Number(r))}]},{result:a}=await this.postToRelayer(i);return a}async imSign(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),i={method:"im_sign",params:[{address:e,message:t,chainId:_(Number(r))}]},{result:a}=await this.postToRelayer(i);return a}};var se=(i=>(i[i.USER_REJECTED_REQUEST=4001]="USER_REJECTED_REQUEST",i[i.UNAUTHORIZED=4100]="UNAUTHORIZED",i[i.UNSUPPORTED_METHOD=4200]="UNSUPPORTED_METHOD",i[i.DISCONNECTED=4900]="DISCONNECTED",i))(se||{}),A=(o=>(o[o.RPC_SERVER_ERROR=-32e3]="RPC_SERVER_ERROR",o[o.INVALID_REQUEST=-32600]="INVALID_REQUEST",o[o.METHOD_NOT_FOUND=-32601]="METHOD_NOT_FOUND",o[o.INVALID_PARAMS=-32602]="INVALID_PARAMS",o[o.INTERNAL_ERROR=-32603]="INTERNAL_ERROR",o[o.PARSE_ERROR=-32700]="PARSE_ERROR",o[o.TRANSACTION_REJECTED=-32003]="TRANSACTION_REJECTED",o))(A||{}),g=class extends Error{message;code;constructor(e,t){super(t),this.message=t,this.code=e;}};var Ci="Only sign this message from Immutable Passport";async function bt({authManager:n,ethSigner:e,multiRollupApiClients:t,accessToken:r,rpcProvider:i,flow:a}){let s=e.getAddress();s.then(()=>a.addEvent("endGetAddress"));let o=signRaw(Ci,e);o.then(()=>a.addEvent("endSignRaw"));let c=i.getNetwork();c.then(()=>a.addEvent("endDetectNetwork"));let d=t.chainsApi.listChains();d.then(()=>a.addEvent("endListChains"));let[l,u,h,C]=await Promise.all([s,o,c,d]),w=_(Number(h.chainId)),v=C.data?.result?.find(k=>k.id===w)?.name;if(!v)throw new g(-32603,`Chain name does not exist on for chain id ${h.chainId}`);try{let k=await t.passportApi.createCounterfactualAddressV2({chainName:v,createCounterfactualAddressRequest:{ethereum_address:l,ethereum_signature:u}},{headers:{Authorization:`Bearer ${r}`}});return a.addEvent("endCreateCounterfactualAddress"),n.forceUserRefreshInBackground(),k.data.counterfactual_address}catch(k){throw new g(-32603,`Failed to create counterfactual address: ${k}`)}}var oe="Transaction requires confirmation but this functionality is not supported in this environment. Please contact Immutable support if you need to enable this feature.",ce=n=>BigInt(n).toString(),vi=n=>{try{return n.map(e=>({delegateCall:e.delegateCall===!0,revertOnError:e.revertOnError===!0,gasLimit:e.gasLimit?ce(e.gasLimit):"0",target:e.to??ZeroAddress,value:e.value?ce(e.value):"0",data:e.data?e.data.toString():"0x"}))}catch(e){let t=e instanceof Error?e.message:String(e);throw new g(-32602,`Transaction failed to parsing: ${t}`)}},q=class{guardianApi;confirmationScreen;crossSdkBridgeEnabled;authManager;constructor({confirmationScreen:e,config:t,authManager:r,guardianApi:i}){this.confirmationScreen=e,this.crossSdkBridgeEnabled=t.crossSdkBridgeEnabled,this.guardianApi=i,this.authManager=r;}withConfirmationScreen(e){return t=>this.withConfirmationScreenTask(e)(t)()}withConfirmationScreenTask(e){return t=>async()=>{this.confirmationScreen.loading(e);try{return await t()}catch(r){throw r instanceof f&&r.type==="SERVICE_UNAVAILABLE_ERROR"?(await this.confirmationScreen.showServiceUnavailable(),r):(this.confirmationScreen.closeWindow(),r)}}}withDefaultConfirmationScreenTask(e){return this.withConfirmationScreenTask()(e)}async evaluateImxTransaction({payloadHash:e}){try{let t=()=>{this.confirmationScreen.closeWindow();},r=await this.authManager.getUserImx(),i={Authorization:`Bearer ${r.accessToken}`};if(!(await U(async()=>this.guardianApi.getTransactionByID({transactionID:e,chainType:"starkex"},{headers:i}),{finallyFn:t})).data.id)throw new Error("Transaction doesn't exists");let s=await this.guardianApi.evaluateTransaction({id:e,transactionEvaluationRequest:{chainType:"starkex"}},{headers:i}),{confirmationRequired:o}=s.data;if(o){if(this.crossSdkBridgeEnabled)throw new Error(oe);if(!(await this.confirmationScreen.requestConfirmation(e,r.imx.ethAddress,Le.mr.TransactionApprovalRequestChainTypeEnum.Starkex)).confirmed)throw new Error("Transaction rejected by user")}else this.confirmationScreen.closeWindow();}catch(t){throw kt.isAxiosError(t)&&t.response?.status===403?new f("Service unavailable","SERVICE_UNAVAILABLE_ERROR"):t}}async evaluateEVMTransaction({chainId:e,nonce:t,metaTransactions:r}){let i=await this.authManager.getUserZkEvm(),a={Authorization:`Bearer ${i.accessToken}`},s=vi(r);try{return (await this.guardianApi.evaluateTransaction({id:"evm",transactionEvaluationRequest:{chainType:"evm",chainId:e,transactionData:{nonce:t,userAddress:i.zkEvm.ethAddress,metaTransactions:s}}},{headers:a})).data}catch(o){if(kt.isAxiosError(o)&&o.response?.status===403)throw new f("Service unavailable","SERVICE_UNAVAILABLE_ERROR");let c=o instanceof Error?o.message:String(o);throw new g(-32603,`Transaction failed to validate with error: ${c}`)}}async validateEVMTransaction({chainId:e,nonce:t,metaTransactions:r,isBackgroundTransaction:i}){let a=await this.evaluateEVMTransaction({chainId:e,nonce:t,metaTransactions:r}),{confirmationRequired:s,transactionId:o}=a;if(s&&this.crossSdkBridgeEnabled)throw new g(-32003,oe);if(s&&o){let c=await this.authManager.getUserZkEvm();if(!(await this.confirmationScreen.requestConfirmation(o,c.zkEvm.ethAddress,Le.mr.TransactionApprovalRequestChainTypeEnum.Evm,e)).confirmed)throw new g(-32003,"Transaction rejected by user")}else i||this.confirmationScreen.closeWindow();}async handleEIP712MessageEvaluation({chainID:e,payload:t}){try{let r=await this.authManager.getUserZkEvm();if(r===null)throw new g(4100,"User not logged in. Please log in first.");return (await this.guardianApi.evaluateMessage({messageEvaluationRequest:{chainID:e,payload:t}},{headers:{Authorization:`Bearer ${r.accessToken}`}})).data}catch(r){let i=r instanceof Error?r.message:String(r);throw new g(-32603,`Message failed to validate with error: ${i}`)}}async evaluateEIP712Message({chainID:e,payload:t}){let{messageId:r,confirmationRequired:i}=await this.handleEIP712MessageEvaluation({chainID:e,payload:t});if(i&&this.crossSdkBridgeEnabled)throw new g(-32003,oe);if(i&&r){let a=await this.authManager.getUserZkEvm();if(!(await this.confirmationScreen.requestMessageConfirmation(r,a.zkEvm.ethAddress,"eip712")).confirmed)throw new g(-32003,"Signature rejected by user")}else this.confirmationScreen.closeWindow();}async handleERC191MessageEvaluation({chainID:e,payload:t}){try{let r=await this.authManager.getUserZkEvm();if(r===null)throw new g(4100,"User not logged in. Please log in first.");return (await this.guardianApi.evaluateErc191Message({eRC191MessageEvaluationRequest:{chainID:_(Number(e)),payload:t}},{headers:{Authorization:`Bearer ${r.accessToken}`}})).data}catch(r){let i=r instanceof Error?r.message:String(r);throw new g(-32603,`Message failed to validate with error: ${i}`)}}async evaluateERC191Message({chainID:e,payload:t}){let{messageId:r,confirmationRequired:i}=await this.handleERC191MessageEvaluation({chainID:e,payload:t});if(i&&this.crossSdkBridgeEnabled)throw new g(-32003,oe);if(i&&r){let a=await this.authManager.getUserZkEvm();if(!(await this.confirmationScreen.requestMessageConfirmation(r,a.zkEvm.ethAddress,"erc191")).confirmed)throw new g(-32003,"Signature rejected by user")}else this.confirmationScreen.closeWindow();}};var Ti=30,wi=1e3,_i=async(n,e,t)=>{let r=Me([n]),i=It(r),a=await t.imGetFeeOptions(e,i);if(!a||!Array.isArray(a))throw new Error("Invalid fee options received from relayer");let s=a.find(o=>o.tokenSymbol==="IMX");if(!s)throw new Error("Failed to retrieve fees for IMX token");return s},Pi=async(n,e,t,r,i)=>{if(!n.to)throw new g(-32602,'eth_sendTransaction requires a "to" field');let a={to:n.to.toString(),data:n.data,nonce:BigInt(0),value:n.value,revertOnError:!0},[s,o]=await Promise.all([ie(e,r,i),_i(a,r,t)]),c=[{...a,nonce:s}],d=BigInt(o.tokenPrice);return d!==BigInt(0)&&c.push({nonce:s,to:o.recipientAddress,value:d,revertOnError:!0}),c},de=async(n,e,t)=>{let i=await U(async()=>{let a=await n.imGetTransactionByHash(e);if(a.status==="PENDING")throw new Error;return a},{retries:Ti,interval:wi,finalErr:new g(-32e3,"transaction hash not generated in time")});if(t.addEvent("endRetrieveRelayerTransaction"),!["SUBMITTED","SUCCESSFUL"].includes(i.status)){let a=`Transaction failed to submit with status ${i.status}.`;throw i.statusMessage&&(a+=` Error message: ${i.statusMessage}`),new g(-32e3,a)}return i},le=async({transactionRequest:n,ethSigner:e,rpcProvider:t,guardianClient:r,relayerClient:i,zkEvmAddress:a,flow:s,nonceSpace:o,isBackgroundTransaction:c})=>{let{chainId:d}=await t.getNetwork(),l=BigInt(d);s.addEvent("endDetectNetwork");let u=await Pi(n,t,i,a,o);s.addEvent("endBuildMetaTransactions");let{nonce:h}=u[0];if(typeof h>"u")throw new Error("Failed to retrieve nonce from the smart wallet");let C=async()=>{await r.validateEVMTransaction({chainId:_(Number(d)),nonce:ce(h),metaTransactions:u,isBackgroundTransaction:c}),s.addEvent("endValidateEVMTransaction");},w=async()=>{let Qt=await Ue(u,h,l,a,e);return s.addEvent("endGetSignedMetaTransactions"),Qt},[,v]=await Promise.all([C(),w()]),k=await i.ethSendTransaction(a,v);return s.addEvent("endRelayerSendTransaction"),{signedTransactions:v,relayerId:k,nonce:h}},Ai=async n=>{if(!n.to)throw new g(-32602,'im_signEjectionTransaction requires a "to" field');if(typeof n.nonce>"u")throw new g(-32602,'im_signEjectionTransaction requires a "nonce" field');if(!n.chainId)throw new g(-32602,'im_signEjectionTransaction requires a "chainId" field');return [{to:n.to.toString(),data:n.data,nonce:n.nonce??void 0,value:n.value,revertOnError:!0}]},xt=async({transactionRequest:n,ethSigner:e,zkEvmAddress:t,flow:r})=>{let i=await Ai(n);r.addEvent("endBuildMetaTransactions");let a=await Ue(i,n.nonce,BigInt(n.chainId??0),t,e);return r.addEvent("endGetSignedMetaTransactions"),{to:t,data:a,chainId:_(Number(n.chainId??0))}};var Ge=async({params:n,ethSigner:e,rpcProvider:t,relayerClient:r,guardianClient:i,zkEvmAddress:a,flow:s,nonceSpace:o,isBackgroundTransaction:c=!1})=>{let d=n[0],{relayerId:l}=await le({transactionRequest:d,ethSigner:e,rpcProvider:t,guardianClient:i,relayerClient:r,zkEvmAddress:a,flow:s,nonceSpace:o,isBackgroundTransaction:c}),{hash:u}=await de(r,l,s);return u};var Mt=["types","domain","primaryType","message"],Ii=n=>Mt.every(e=>e in n),Si=(n,e)=>{let t;if(typeof n=="string")try{t=JSON.parse(n);}catch(i){throw new g(-32602,`Failed to parse typed data JSON: ${i}`)}else if(typeof n=="object")t=n;else throw new g(-32602,`Invalid typed data argument: ${n}`);if(!Ii(t))throw new g(-32602,`Invalid typed data argument. The following properties are required: ${Mt.join(", ")}`);let r=t.domain?.chainId;if(r&&(typeof r=="string"&&(r.startsWith("0x")?t.domain.chainId=parseInt(r,16).toString():t.domain.chainId=parseInt(r,10).toString()),BigInt(t.domain.chainId??0)!==e))throw new g(-32602,`Invalid chainId, expected ${e}`);return t},Nt=async({params:n,method:e,ethSigner:t,rpcProvider:r,relayerClient:i,guardianClient:a,flow:s})=>{let o=n[0],c=n[1];if(!o||!c)throw new g(-32602,`${e} requires an address and a typed data JSON`);let{chainId:d}=await r.getNetwork(),l=Si(c,d);s.addEvent("endDetectNetwork"),await a.evaluateEIP712Message({chainID:String(d),payload:l}),s.addEvent("endValidateMessage");let u=await i.imSignTypedData(o,l);s.addEvent("endRelayerSignTypedData");let h=await St(l,u,BigInt(d),o,t);return s.addEvent("getSignedTypedData"),h};var Ut=n=>{if(!n)return n;try{let e=stripZerosLeft(getBytes(n));return toUtf8String(e)}catch{return n}};var pe=async({params:n,ethSigner:e,zkEvmAddress:t,rpcProvider:r,guardianClient:i,relayerClient:a,flow:s})=>{let o=n[0],c=n[1];if(!c||!o)throw new g(-32602,"personal_sign requires an address and a message");if(c.toLowerCase()!==t.toLowerCase())throw new g(-32602,"personal_sign requires the signer to be the from address");let d=Ut(o),{chainId:l}=await r.getNetwork();s.addEvent("endDetectNetwork");let u=BigInt(l),h=Ot(u,d,e,c);h.then(()=>s.addEvent("endEOASignature")),await i.evaluateERC191Message({chainID:l,payload:d}),s.addEvent("endEvaluateERC191Message");let[C,w]=await Promise.all([h,a.imSign(c,d)]);s.addEvent("endRelayerSign");let v=await e.getAddress();return s.addEvent("endGetEOAAddress"),De(C,v,w)};var Mi="https://api.immutable.com",Ni="https://api.sandbox.immutable.com",Ui="/v1/sdk/session-activity/check",Di=n=>{switch(n){case Environment.SANDBOX:return Ni;case Environment.PRODUCTION:return Mi;default:throw new Error("Environment not supported")}},me,Lt=n=>{me||(me=kt.create({baseURL:Di(n)}));};async function Gt(n){if(!me)throw new Error("Client not initialised");return me.get(Ui,{params:n}).then(e=>e.data).catch(e=>{if(e.response.status!==404)throw e})}function Bt(n,e){return (...t)=>{try{let r=n(...t);return r instanceof Promise?r.catch(i=>(i instanceof Error&&trackError("passport","sessionActivityError",i),e)):r}catch(r){return r instanceof Error&&trackError("passport","sessionActivityError",r),e}}}var{getItem:Vt,setItem:Fe}=utils.localStorage,Be="sessionActivitySendCount",Ht="sessionActivityDate",Ve={},b={},ue={},Wt=()=>{b=Vt(Be)||{};let n=Vt(Ht),e=new Date,t=e.getFullYear(),r=`${e.getMonth()+1}`.padStart(2,"0"),i=`${e.getDate()}`.padStart(2,"0"),a=`${t}-${r}-${i}`;(!n||n!==a)&&(b={}),Fe(Ht,a),Fe(Be,b);};Wt();var Vi=n=>{Wt(),b[n]||(b[n]=0),b[n]++,Fe(Be,b),Ve[n]=0;},Hi=async n=>new Promise(e=>{setTimeout(e,n*1e3);}),Wi=async n=>{let e=n.flow||trackFlow("passport","sendSessionActivity"),t=n.passportClient;if(!t)throw e.addEvent("No Passport Client ID"),new Error("No Passport Client ID provided");if(ue[t])return;ue[t]=!0;let{sendTransaction:r,environment:i}=n;if(!r)throw new Error("No sendTransaction function provided");if(!i)throw new Error("No environment provided");Lt(i);let a=n.walletAddress;if(!a)throw e.addEvent("No Passport Wallet Address"),new Error("No wallet address");let s;try{if(s=await Gt({clientId:t,wallet:a,checkCount:Ve[t]||0,sendCount:b[t]||0}),Ve[t]++,!s)return}catch(o){throw e.addEvent("Failed to fetch details"),new Error("Failed to get details",{cause:o})}if(s&&s.contractAddress&&s.functionName){let c=new Interface([`function ${s.functionName}()`]).encodeFunctionData(s.functionName),d=s.contractAddress;try{e.addEvent("Start Sending Transaction");let l=await n.sendTransaction([{to:d,from:a,data:c}],e);Vi(t),e.addEvent("Transaction Sent",{tx:l});}catch(l){e.addEvent("Failed to send Transaction");let u=new Error("Failed to send transaction",{cause:l});trackError("passport","sessionActivityError",u,{flowId:e.details.flowId});}}s&&s.delay&&s.delay>0&&(e.addEvent("Delaying Transaction",{delay:s.delay}),await Hi(s.delay),setTimeout(()=>{e.addEvent("Retrying after Delay"),ue[t]=!1,qt({...n,flow:e});},0));},qt=n=>Bt(Wi)(n).then(()=>{ue[n.passportClient]=!1;}),$t=qt;var Zt=async({params:n,ethSigner:e,rpcProvider:t,relayerClient:r,guardianClient:i,zkEvmAddress:a,flow:s})=>{let o={to:a,value:0},{relayerId:c}=await le({transactionRequest:o,ethSigner:e,rpcProvider:t,guardianClient:i,relayerClient:r,zkEvmAddress:a,flow:s});return i.withConfirmationScreen()(async()=>{let d=await pe({params:n,ethSigner:e,zkEvmAddress:a,rpcProvider:t,guardianClient:i,relayerClient:r,flow:s});return await de(r,c,s),d})};var Kt=async({params:n,ethSigner:e,zkEvmAddress:t,flow:r})=>{if(!n||n.length!==1)throw new g(-32602,"im_signEjectionTransaction requires a singular param (hash)");let i=n[0];return await xt({transactionRequest:i,ethSigner:e,zkEvmAddress:t,flow:r})};var ge=n=>"zkEvm"in n,he=class{#i;#t;#a;#r;#n;#e;#u;#g;#o;#d;#l;isPassport=!0;constructor({authManager:e,magicAdapter:t,config:r,multiRollupApiClients:i,passportEventEmitter:a,guardianClient:s}){this.#i=e,this.#u=t,this.#t=r,this.#n=s,this.#r=a,this.#e=new JsonRpcProvider(this.#t.zkEvmRpcUrl,void 0,{staticNetwork:!0}),this.#o=new ae({config:this.#t,rpcProvider:this.#e,authManager:this.#i}),this.#g=i,this.#a=new D,this.#i.getUser().then(o=>{o&&(this.#m(o),ge(o)&&this.#p(o.zkEvm.ethAddress));}).catch(()=>{}),a.on("loggedIn",o=>{this.#m(o),ge(o)&&this.#p(o.zkEvm.ethAddress);}),a.on("loggedOut",this.#h),a.on("accountsRequested",$t);}#h=()=>{this.#d=void 0,this.#a.emit("accountsChanged",[]);};#m(e){let t=async()=>{let r=await this.#u.login(e.idToken);return new BrowserProvider(r).getSigner()};this.#l=void 0,this.#d=new Promise(async r=>{try{r(await t());}catch(i){this.#l=i,r(void 0);}});}async#c(){let e=await this.#d;if(typeof e>"u")throw typeof this.#l<"u"?this.#l:new Error("Signer failed to initialise");return e}async#p(e,t){let r=BigInt(1),i=async(a,s)=>{let o=await this.#c();return await Ge({params:a,ethSigner:o,guardianClient:this.#n,rpcProvider:this.#e,relayerClient:this.#o,zkEvmAddress:e,flow:s,nonceSpace:r,isBackgroundTransaction:!0})};this.#r.emit("accountsRequested",{environment:this.#t.baseConfig.environment,sendTransaction:i,walletAddress:e,passportClient:t||this.#t.oidcConfiguration.clientId});}async#s(){try{let e=await this.#i.getUser();return e&&ge(e)?e.zkEvm.ethAddress:void 0}catch{return}}async#f(e){switch(e.method){case"eth_requestAccounts":{let t=await this.#s();if(t)return [t];let r=trackFlow("passport","ethRequestAccounts");try{let i=await this.#i.getUserOrLogin();r.addEvent("endGetUserOrLogin"),this.#d||this.#m(i);let a;if(ge(i))a=i.zkEvm.ethAddress;else {r.addEvent("startUserRegistration");let s=await this.#c();r.addEvent("ethSignerResolved"),a=await bt({ethSigner:s,authManager:this.#i,multiRollupApiClients:this.#g,accessToken:i.accessToken,rpcProvider:this.#e,flow:r}),r.addEvent("endUserRegistration");}return this.#a.emit("accountsChanged",[a]),identify({passportId:i.profile.sub}),this.#p(a),[a]}catch(i){throw i instanceof Error?trackError("passport","ethRequestAccounts",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"eth_sendTransaction":{let t=await this.#s();if(!t)throw new g(4100,"Unauthorised - call eth_requestAccounts first");let r=trackFlow("passport","ethSendTransaction");try{return await this.#n.withConfirmationScreen({width:480,height:720})(async()=>{let i=await this.#c();return r.addEvent("endGetSigner"),await Ge({params:e.params||[],ethSigner:i,guardianClient:this.#n,rpcProvider:this.#e,relayerClient:this.#o,zkEvmAddress:t,flow:r})})}catch(i){throw i instanceof Error?trackError("passport","eth_sendTransaction",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"eth_accounts":{let t=await this.#s();return t?[t]:[]}case"personal_sign":{let t=await this.#s();if(!t)throw new g(4100,"Unauthorised - call eth_requestAccounts first");let r=trackFlow("passport","personalSign");try{return await this.#n.withConfirmationScreen({width:480,height:720})(async()=>{let i=await this.#c();return r.addEvent("endGetSigner"),this.#t.forceScwDeployBeforeMessageSignature&&!(await ie(this.#e,t)>BigInt(0))?await Zt({params:e.params||[],ethSigner:i,zkEvmAddress:t,rpcProvider:this.#e,guardianClient:this.#n,relayerClient:this.#o,flow:r}):await pe({params:e.params||[],ethSigner:i,zkEvmAddress:t,rpcProvider:this.#e,guardianClient:this.#n,relayerClient:this.#o,flow:r})})}catch(i){throw i instanceof Error?trackError("passport","personal_sign",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"eth_signTypedData":case"eth_signTypedData_v4":{if(!await this.#s())throw new g(4100,"Unauthorised - call eth_requestAccounts first");let r=trackFlow("passport","ethSignTypedDataV4");try{return await this.#n.withConfirmationScreen({width:480,height:720})(async()=>{let i=await this.#c();return r.addEvent("endGetSigner"),await Nt({method:e.method,params:e.params||[],ethSigner:i,rpcProvider:this.#e,relayerClient:this.#o,guardianClient:this.#n,flow:r})})}catch(i){throw i instanceof Error?trackError("passport","eth_signTypedData",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"eth_chainId":{let{chainId:t}=await this.#e.getNetwork();return toBeHex(t)}case"eth_getBalance":case"eth_getCode":case"eth_getTransactionCount":{let[t,r]=e.params||[];return this.#e.send(e.method,[t,r||"latest"])}case"eth_getStorageAt":{let[t,r,i]=e.params||[];return this.#e.send(e.method,[t,r,i||"latest"])}case"eth_call":case"eth_estimateGas":{let[t,r]=e.params||[];return this.#e.send(e.method,[t,r||"latest"])}case"eth_gasPrice":case"eth_blockNumber":case"eth_getBlockByHash":case"eth_getBlockByNumber":case"eth_getTransactionByHash":case"eth_getTransactionReceipt":return this.#e.send(e.method,e.params||[]);case"im_signEjectionTransaction":{let t=await this.#s();if(!t)throw new g(4100,"Unauthorised - call eth_requestAccounts first");let r=trackFlow("passport","imSignEjectionTransaction");try{let i=await this.#c();return r.addEvent("endGetSigner"),await Kt({params:e.params||[],ethSigner:i,zkEvmAddress:t,flow:r})}catch(i){throw i instanceof Error?trackError("passport","imSignEjectionTransaction",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"im_addSessionActivity":{let[t]=e.params||[],r=await this.#s();return r&&this.#p(r,t),null}default:throw new g(4200,"Method not supported")}}async request(e){try{return this.#f(e)}catch(t){throw t instanceof g?t:t instanceof Error?new g(-32603,t.message):new g(-32603,"Internal error")}}on(e,t){this.#a.on(e,t);}removeListener(e,t){this.#a.removeListener(e,t);}};var Xt={icon:'data:image/svg+xml,<svg viewBox="0 0 48 48" class="SvgIcon undefined Logo Logo--PassportSymbolOutlined css-1dn9atd" xmlns="http://www.w3.org/2000/svg"><g data-testid="undefined__g"><circle cx="24" cy="24" r="22.5" fill="url(%23paint0_radial_6324_83922)"></circle><circle cx="24" cy="24" r="22.5" fill="url(%23paint1_radial_6324_83922)"></circle><path d="M24 0C10.7452 0 0 10.7452 0 24C0 37.2548 10.7452 48 24 48C37.2548 48 48 37.2548 48 24C48 10.7452 37.2548 0 24 0ZM23.0718 9.16608C23.7383 8.83951 24.4406 8.86188 25.087 9.2287C27.3282 10.5059 29.5627 11.7942 31.786 13.096C32.5018 13.5165 32.8686 14.1897 32.8708 15.0173C32.8843 17.9184 32.8798 20.8171 32.8708 23.7182C32.8708 23.8255 32.8015 23.9821 32.7143 24.0335C31.8531 24.548 30.9808 25.0423 30.0347 25.5881V25.1318C30.0347 22.148 30.0257 19.1664 30.0414 16.1827C30.0436 15.6101 29.8468 15.241 29.339 14.9525C26.7377 13.474 24.1499 11.9687 21.5575 10.4723C21.4457 10.4075 21.3361 10.3381 21.1661 10.2352C21.8326 9.85722 22.4321 9.47698 23.0673 9.16608H23.0718ZM22.5953 38.8451C22.45 38.7713 22.3426 38.7198 22.2375 38.6595C18.8041 36.68 15.3752 34.687 11.9307 32.7232C10.9644 32.173 10.5238 31.3879 10.5349 30.2852C10.5551 27.9411 10.5484 25.597 10.5372 23.2507C10.5327 22.1927 10.9622 21.4255 11.8926 20.8977C14.3105 19.5221 16.715 18.1264 19.1195 16.7284C19.3275 16.6076 19.4796 16.5875 19.6965 16.7172C20.5264 17.216 21.3719 17.6924 22.2554 18.2024C22.0876 18.3031 21.9601 18.3791 21.8304 18.4552C19.2268 19.9582 16.6278 21.4658 14.0175 22.9599C13.5903 23.2037 13.3912 23.5213 13.3957 24.0179C13.4091 25.8654 13.4114 27.713 13.3957 29.5605C13.3912 30.0705 13.5948 30.3948 14.0332 30.6453C16.7866 32.2199 19.5288 33.8125 22.28 35.3916C22.5126 35.5258 22.611 35.6645 22.6065 35.9418C22.5864 36.888 22.5998 37.8363 22.5998 38.8473L22.5953 38.8451ZM22.5953 33.553C22.356 33.4166 22.1838 33.3204 22.0116 33.2198C19.8285 31.9605 17.6477 30.6967 15.4602 29.4464C15.2231 29.3122 15.1359 29.1668 15.1381 28.8917C15.1538 27.4714 15.1471 26.0511 15.1426 24.6308C15.1426 24.4384 15.1717 24.3064 15.3618 24.1991C16.167 23.7495 16.9633 23.2798 17.7618 22.8212C17.8199 22.7877 17.8826 22.7631 17.9877 22.7116V24.3064C17.9877 25.1698 18.0011 26.0354 17.9832 26.8988C17.972 27.3909 18.1622 27.7241 18.5916 27.9657C19.8285 28.6636 21.0498 29.3883 22.2867 30.0839C22.5305 30.2203 22.6043 30.3724 22.5998 30.6408C22.5842 31.5847 22.5931 32.5308 22.5931 33.5508L22.5953 33.553ZM20.0746 14.91C19.6116 14.6371 19.2157 14.6393 18.7527 14.91C16.1581 16.4265 13.5523 17.9228 10.9487 19.4259C10.8391 19.4908 10.7251 19.5489 10.5305 19.6541C10.5998 18.6654 10.3873 17.7327 10.7251 16.8291C10.9085 16.3348 11.2529 15.9635 11.7092 15.6995C13.8811 14.4447 16.0507 13.1877 18.227 11.9396C19.0211 11.4833 19.8308 11.4945 20.6248 11.953C23.0964 13.3756 25.5657 14.8026 28.0306 16.2341C28.1357 16.2945 28.2677 16.4309 28.2677 16.5338C28.2856 17.5493 28.2788 18.567 28.2788 19.6563C27.3819 19.1396 26.5543 18.6609 25.7267 18.1823C23.8412 17.093 21.9512 16.0149 20.0746 14.91ZM37.4427 30.8779C37.3778 31.6764 36.9103 32.2423 36.2192 32.6404C33.5732 34.1614 30.9294 35.6913 28.2856 37.2168C27.4557 37.6954 26.6259 38.1741 25.7938 38.6527C25.6932 38.7109 25.5903 38.7601 25.4539 38.8317C25.4449 38.693 25.4337 38.5924 25.4337 38.4917C25.4337 37.6149 25.4382 36.7404 25.4293 35.8636C25.4293 35.6645 25.4762 35.5437 25.6596 35.4386C29.5157 33.2198 33.3696 30.9942 37.2212 28.7709C37.2794 28.7374 37.3443 28.7105 37.4539 28.6591C37.4539 29.4375 37.4986 30.1622 37.4427 30.8779ZM37.4628 25.3577C37.4561 26.2658 36.9663 26.9033 36.1901 27.3506C33.175 29.0841 30.1622 30.8265 27.1493 32.5666C26.5991 32.8842 26.0466 33.1996 25.4561 33.5396C25.4472 33.3897 25.436 33.2913 25.436 33.1907C25.436 32.3273 25.4449 31.4617 25.4293 30.5983C25.4248 30.3523 25.5075 30.2226 25.72 30.0995C28.46 28.5271 31.1911 26.9368 33.9355 25.3733C34.4231 25.096 34.6378 24.7538 34.6334 24.1812C34.6132 21.1974 34.6244 18.2136 34.6244 15.2298V14.7087C35.3402 15.1404 36.0112 15.496 36.624 15.9299C37.1832 16.3258 37.465 16.9253 37.4673 17.6164C37.4762 20.1976 37.4829 22.7788 37.465 25.3599L37.4628 25.3577Z" fill="%230D0D0D"></path><path fill-rule="evenodd" d="M24 0C10.7452 0 0 10.7452 0 24C0 37.2548 10.7452 48 24 48C37.2548 48 48 37.2548 48 24C48 10.7452 37.2548 0 24 0ZM24 2C11.8497 2 2 11.8497 2 24C2 36.1503 11.8497 46 24 46C36.1503 46 46 36.1503 46 24C46 11.8497 36.1503 2 24 2Z" fill="url(%23paint2_radial_6324_83922)"></path><path fill-rule="evenodd" d="M24 0C10.7452 0 0 10.7452 0 24C0 37.2548 10.7452 48 24 48C37.2548 48 48 37.2548 48 24C48 10.7452 37.2548 0 24 0ZM24 2C11.8497 2 2 11.8497 2 24C2 36.1503 11.8497 46 24 46C36.1503 46 46 36.1503 46 24C46 11.8497 36.1503 2 24 2Z" fill="url(%23paint3_radial_6324_83922)"></path><defs><radialGradient id="paint0_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(13.4442 13.3899) rotate(44.9817) scale(46.7487 99.1435)"><stop stop-color="%23A3EEF8"></stop><stop offset="0.177083" stop-color="%23A4DCF5"></stop><stop offset="0.380208" stop-color="%23A6AEEC"></stop><stop offset="1" stop-color="%23ECBEE1"></stop></radialGradient><radialGradient id="paint1_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(25.9515 43.7068) rotate(84.265) scale(24.2138 46.3215)"><stop stop-color="%23FCF5EE"></stop><stop offset="0.715135" stop-color="%23ECBEE1" stop-opacity="0"></stop></radialGradient><radialGradient id="paint2_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(12.7405 12.6825) rotate(44.9817) scale(49.8653 105.753)"><stop stop-color="%23A3EEF8"></stop><stop offset="0.177083" stop-color="%23A4DCF5"></stop><stop offset="0.380208" stop-color="%23A6AEEC"></stop><stop offset="1" stop-color="%23ECBEE1"></stop></radialGradient><radialGradient id="paint3_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(26.0816 45.0206) rotate(84.265) scale(25.828 49.4096)"><stop stop-color="%23FCF5EE"></stop><stop offset="0.715135" stop-color="%23ECBEE1" stop-opacity="0"></stop></radialGradient></defs></g></svg>',name:"Immutable Passport",rdns:"com.immutable.passport",uuid:v4()};function Jt(n){if(typeof window>"u")return;let e=new CustomEvent("eip6963:announceProvider",{detail:Object.freeze(n)});window.dispatchEvent(e);let t=()=>window.dispatchEvent(e);window.addEventListener("eip6963:requestProvider",t);}var Ji=n=>n?.length>0&&typeof n[0]=="object"&&"method"in n[0]&&typeof n[0].method=="string"&&["personal_sign","eth_accounts","eth_requestAccounts"].includes(n[0].method),zi=n=>n?.length>0&&typeof n[0]=="object"&&"method"in n[0]&&typeof n[0].method=="string"&&n[0].method==="eth_requestAccounts",fe=class{authManager;config;constructor(e,t){this.authManager=e,this.config=t;}createProxy(e){let t=e.rpcProvider,r={get:(i,a,s)=>a==="request"?async(...o)=>{try{if(Ji(o)){if(!await e.user.isLoggedIn()){let l=(await this.authManager.getUser())?.idToken;if(!l)throw new Error("failed to obtain ID token");await e.openid.loginWithOIDC({jwt:l,providerId:this.config.magicProviderId});}if(zi(o))return i.request({method:"eth_accounts"})}return i.request(...o)}catch(c){throw c instanceof Error?new Error(`ProviderProxy: ${c.message}`):new Error(`ProviderProxy: ${c}`)}}:Reflect.get(i,a,s)};return new Proxy(t,r)}};var sa=n=>n.overrides?createConfig({basePath:n.overrides.imxPublicApiDomain}):n.baseConfig.environment===Environment.SANDBOX?imxApiConfig.getSandbox():imxApiConfig.getProduction(),oa=n=>{if(n.overrides?.imxApiClients)return n.overrides.imxApiClients;let e=sa(n);return new ImxApiClients(e)},ca=n=>{let e=new te(n),t=new V(e),r=new fe(t,e),i=new H(e,r),a=new G(e),s=new MultiRollupApiClients(e.multiRollupConfig),o=new D,c=n.overrides?n.overrides.immutableXClient:new IMXClient({baseConfig:n.baseConfig}),d=new q({confirmationScreen:a,config:e,authManager:t,guardianApi:s.guardianApi}),l=oa(n),u=new ee({authManager:t,immutableXClient:c,magicAdapter:i,passportEventEmitter:o,imxApiClients:l,guardianClient:d});return {config:e,authManager:t,magicAdapter:i,confirmationScreen:a,immutableXClient:c,multiRollupApiClients:s,passportEventEmitter:o,passportImxProviderFactory:u,guardianClient:d}},He=class{authManager;config;confirmationScreen;immutableXClient;magicAdapter;multiRollupApiClients;passportImxProviderFactory;passportEventEmitter;guardianClient;constructor(e){let t=ca(e);this.config=t.config,this.authManager=t.authManager,this.magicAdapter=t.magicAdapter,this.confirmationScreen=t.confirmationScreen,this.immutableXClient=t.immutableXClient,this.multiRollupApiClients=t.multiRollupApiClients,this.passportEventEmitter=t.passportEventEmitter,this.passportImxProviderFactory=t.passportImxProviderFactory,this.guardianClient=t.guardianClient,setPassportClientId(e.clientId),track("passport","initialise");}async connectImxSilent(){return E(()=>this.passportImxProviderFactory.getProviderSilent(),"connectImxSilent",!1)}async connectImx(){return E(()=>this.passportImxProviderFactory.getProvider(),"connectImx",!1)}connectEvm(e={announceProvider:!0}){return E(async()=>{let t=new he({passportEventEmitter:this.passportEventEmitter,authManager:this.authManager,magicAdapter:this.magicAdapter,config:this.config,multiRollupApiClients:this.multiRollupApiClients,guardianClient:this.guardianClient});return e?.announceProvider&&Jt({info:Xt,provider:t}),t},"connectEvm",!1)}async login(e){return E(async()=>{let{useCachedSession:t=!1,useSilentLogin:r}=e||{},i=null;try{i=await this.authManager.getUser();}catch(a){if(a instanceof Error&&!a.message.includes("Unknown or invalid refresh token")&&trackError("passport","login",a),t)throw a;M.warn("Failed to retrieve a cached user session",a);}return !i&&r?i=await this.authManager.forceUserRefresh():!i&&!t&&(e?.useRedirectFlow?await this.authManager.loginWithRedirect(e?.anonymousId,e?.directLoginOptions):i=await this.authManager.login(e?.anonymousId,e?.directLoginOptions)),i&&(identify({passportId:i.profile.sub}),this.passportEventEmitter.emit("loggedIn",i)),i?i.profile:null},"login")}async loginCallback(){await E(()=>this.authManager.loginCallback(),"loginCallback").then(e=>{e&&(identify({passportId:e.profile.sub}),this.passportEventEmitter.emit("loggedIn",e));});}loginWithPKCEFlow(e){return E(async()=>await this.authManager.getPKCEAuthorizationUrl(e),"loginWithPKCEFlow")}async loginWithPKCEFlowCallback(e,t){return E(async()=>{let r=await this.authManager.loginWithPKCEFlowCallback(e,t);return this.passportEventEmitter.emit("loggedIn",r),r.profile},"loginWithPKCEFlowCallback")}async storeTokens(e){return E(async()=>{let t=await this.authManager.storeTokens(e);return this.passportEventEmitter.emit("loggedIn",t),t.profile},"storeTokens")}async logout(){return E(async()=>{this.config.oidcConfiguration.logoutMode==="silent"?await Promise.allSettled([this.authManager.logout(),this.magicAdapter.logout()]):(await this.magicAdapter.logout(),await this.authManager.logout()),this.passportEventEmitter.emit("loggedOut");},"logout")}async getLogoutUrl(){return E(async()=>(await this.authManager.removeUser(),await this.magicAdapter.logout(),this.passportEventEmitter.emit("loggedOut"),await this.authManager.getLogoutUrl()),"getLogoutUrl")}async logoutSilentCallback(e){return E(()=>this.authManager.logoutSilentCallback(e),"logoutSilentCallback")}async getUserInfo(){return E(async()=>(await this.authManager.getUser())?.profile,"getUserInfo",!1)}async getIdToken(){return E(async()=>(await this.authManager.getUser())?.idToken,"getIdToken",!1)}async getAccessToken(){return E(async()=>(await this.authManager.getUser())?.accessToken,"getAccessToken",!1,!1)}async getLinkedAddresses(){return E(async()=>{let e=await this.authManager.getUser();if(!e?.profile.sub)return [];let t={Authorization:`Bearer ${e.accessToken}`};return (await this.multiRollupApiClients.passportProfileApi.getUserInfo({headers:t})).data.linked_addresses},"getLinkedAddresses",!1)}async linkExternalWallet(e){let t=trackFlow("passport","linkExternalWallet",!1),r=await this.authManager.getUser();if(!r)throw new f("User is not logged in","NOT_LOGGED_IN_ERROR");let i=N(r),a=X(r);if(!i&&!a)throw new f("User has not been registered","USER_NOT_REGISTERED_ERROR");let s={Authorization:`Bearer ${r.accessToken}`},o={type:e.type,wallet_address:e.walletAddress,signature:e.signature,nonce:e.nonce};try{return {...(await this.multiRollupApiClients.passportProfileApi.linkWalletV2({linkWalletV2Request:o},{headers:s})).data}}catch(c){if(c instanceof Error?trackError("passport","linkExternalWallet",c):t.addEvent("errored"),isAxiosError(c)&&c.response){if(c.response.data&&Te(c.response.data)){let{code:l,message:u}=c.response.data;switch(l){case"ALREADY_LINKED":throw new f(u,"LINK_WALLET_ALREADY_LINKED_ERROR");case"MAX_WALLETS_LINKED":throw new f(u,"LINK_WALLET_MAX_WALLETS_LINKED_ERROR");case"DUPLICATE_NONCE":throw new f(u,"LINK_WALLET_DUPLICATE_NONCE_ERROR");case"VALIDATION_ERROR":throw new f(u,"LINK_WALLET_VALIDATION_ERROR");default:throw new f(u,"LINK_WALLET_GENERIC_ERROR")}}else if(c.response.status)throw new f(`Link wallet request failed with status code ${c.response.status}`,"LINK_WALLET_GENERIC_ERROR")}let d="Link wallet request failed";throw c instanceof Error&&(d+=`: ${c.message}`),new f(d,"LINK_WALLET_GENERIC_ERROR")}finally{t.addEvent("End");}}};
|
|
405
|
+
)[]`,Ue=n=>n.map(e=>({delegateCall:e.delegateCall===!0,revertOnError:e.revertOnError===!0,gasLimit:e.gasLimit??BigInt(0),target:e.to??ZeroAddress,value:e.value??BigInt(0),data:e.data??"0x"})),wi=(n,e)=>{let t=AbiCoder.defaultAbiCoder().encode(["uint256",Nt],[n,e]);return keccak256(t)},Lt=n=>AbiCoder.defaultAbiCoder().encode([Nt],[n]),Pi=n=>n||0n,Ai=(n,e)=>{let t=BigInt(n)*2n**96n;return BigInt(e)+t},oe=async(n,e,t)=>{try{let r=new Contract(e,walletContracts.mainModule.abi,n),i=Pi(t),a=await r.readNonce(i);if(typeof a=="bigint")return Ai(i,a);throw new Error("Unexpected result from contract.nonce() call.")}catch(r){if(isError(r,"BAD_DATA"))return BigInt(0);throw r}},Ge=(n,e,t)=>solidityPacked(["string","uint256","address","bytes32"],[_i,n,e,t]),Fe=async(n,e,t,r,i)=>{let a=Ue(n),s=wi(e,a),o=Ge(t,r,s),c=keccak256(o),d=getBytes(c),p=performance.now(),u=await i.signMessage(d);trackDuration("passport","magicSignMessageGetSignedMetaTransactions",Math.round(performance.now()-p));let h=`${u}${Mt}`,v=v1.signature.encodeSignature({version:1,threshold:Ri,signers:[{isDynamic:!1,unrecovered:!0,weight:xt,signature:h}]}),_=new Interface(walletContracts.mainModule.abi);return _.encodeFunctionData(_.getFunction("execute")??"",[a,e,v])},Ii=n=>{let e=`0x0000${n}`;return v1.signature.decodeSignature(e)},Be=(n,e,t)=>{let r=`${n}${Mt}`,{signers:i}=Ii(t),s=[...i,{isDynamic:!1,unrecovered:!0,weight:xt,signature:r,address:e}].sort((o,c)=>{let d=BigInt(o.address??0),p=BigInt(c.address??0);return d<=p?-1:d===p?0:1});return v1.signature.encodeSignature({version:1,threshold:Ti,signers:s})},Dt=async(n,e,t,r,i)=>{let a={...n.types};delete a.EIP712Domain;let s=TypedDataEncoder.hash(n.domain,a,n.message),o=Ge(t,r,s),c=keccak256(o),d=getBytes(c),p=performance.now(),u=await i.signMessage(d);trackDuration("passport","magicSignMessageTypedData",Math.round(performance.now()-p));let h=await i.getAddress();return Be(u,h,e)},Ut=async(n,e,t,r)=>{let i=hashMessage(e),a=Ge(n,r,i),s=keccak256(a),o=getBytes(s);return t.signMessage(o)},w=n=>`eip155:${n}`;var ce=class n{config;rpcProvider;authManager;constructor({config:e,rpcProvider:t,authManager:r}){this.config=e,this.rpcProvider=t,this.authManager=r;}static getResponsePreview(e){return e.length>100?`${e.substring(0,50)}...${e.substring(e.length-50)}`:e}async postToRelayer(e){let t={id:1,jsonrpc:"2.0",...e},r=await this.authManager.getUserZkEvm(),i=await fetch(`${this.config.relayerUrl}/v1/transactions`,{method:"POST",headers:{Authorization:`Bearer ${r.accessToken}`,"Content-Type":"application/json"},body:JSON.stringify(t)}),a=await i.text();if(!i.ok){let o=n.getResponsePreview(a);throw new Error(`Relayer HTTP error: ${i.status}. Content: "${o}"`)}let s;try{s=JSON.parse(a);}catch(o){let c=n.getResponsePreview(a);throw new Error(`Relayer JSON parse error: ${o instanceof Error?o.message:"Unknown error"}. Content: "${c}"`)}if(s.error)throw new Error(s.error);return s}async ethSendTransaction(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),i={method:"eth_sendTransaction",params:[{to:e,data:t,chainId:w(Number(r))}]},{result:a}=await this.postToRelayer(i);return a}async imGetTransactionByHash(e){let t={method:"im_getTransactionByHash",params:[e]},{result:r}=await this.postToRelayer(t);return r}async imGetFeeOptions(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),i={method:"im_getFeeOptions",params:[{userAddress:e,data:t,chainId:w(Number(r))}]},{result:a}=await this.postToRelayer(i);return a}async imSignTypedData(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),i={method:"im_signTypedData",params:[{address:e,eip712Payload:t,chainId:w(Number(r))}]},{result:a}=await this.postToRelayer(i);return a}async imSign(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),i={method:"im_sign",params:[{address:e,message:t,chainId:w(Number(r))}]},{result:a}=await this.postToRelayer(i);return a}};var de=(i=>(i[i.USER_REJECTED_REQUEST=4001]="USER_REJECTED_REQUEST",i[i.UNAUTHORIZED=4100]="UNAUTHORIZED",i[i.UNSUPPORTED_METHOD=4200]="UNSUPPORTED_METHOD",i[i.DISCONNECTED=4900]="DISCONNECTED",i))(de||{}),I=(o=>(o[o.RPC_SERVER_ERROR=-32e3]="RPC_SERVER_ERROR",o[o.INVALID_REQUEST=-32600]="INVALID_REQUEST",o[o.METHOD_NOT_FOUND=-32601]="METHOD_NOT_FOUND",o[o.INVALID_PARAMS=-32602]="INVALID_PARAMS",o[o.INTERNAL_ERROR=-32603]="INTERNAL_ERROR",o[o.PARSE_ERROR=-32700]="PARSE_ERROR",o[o.TRANSACTION_REJECTED=-32003]="TRANSACTION_REJECTED",o))(I||{}),g=class extends Error{message;code;constructor(e,t){super(t),this.message=t,this.code=e;}};var Oi="Only sign this message from Immutable Passport";async function Gt({authManager:n,ethSigner:e,multiRollupApiClients:t,accessToken:r,rpcProvider:i,flow:a}){let s=e.getAddress();s.then(()=>a.addEvent("endGetAddress"));let o=signRaw(Oi,e);o.then(()=>a.addEvent("endSignRaw"));let c=i.getNetwork();c.then(()=>a.addEvent("endDetectNetwork"));let d=t.chainsApi.listChains();d.then(()=>a.addEvent("endListChains"));let[p,u,h,v]=await Promise.all([s,o,c,d]),_=w(Number(h.chainId)),R=v.data?.result?.find(x=>x.id===_)?.name;if(!R)throw new g(-32603,`Chain name does not exist on for chain id ${h.chainId}`);try{let x=await t.passportApi.createCounterfactualAddressV2({chainName:R,createCounterfactualAddressRequest:{ethereum_address:p,ethereum_signature:u}},{headers:{Authorization:`Bearer ${r}`}});return a.addEvent("endCreateCounterfactualAddress"),n.forceUserRefreshInBackground(),x.data.counterfactual_address}catch(x){throw new g(-32603,`Failed to create counterfactual address: ${x}`)}}var le="Transaction requires confirmation but this functionality is not supported in this environment. Please contact Immutable support if you need to enable this feature.",pe=n=>BigInt(n).toString(),ki=n=>{try{return n.map(e=>({delegateCall:e.delegateCall===!0,revertOnError:e.revertOnError===!0,gasLimit:e.gasLimit?pe(e.gasLimit):"0",target:e.to??ZeroAddress,value:e.value?pe(e.value):"0",data:e.data?e.data.toString():"0x"}))}catch(e){let t=e instanceof Error?e.message:String(e);throw new g(-32602,`Transaction failed to parsing: ${t}`)}},K=class{guardianApi;confirmationScreen;crossSdkBridgeEnabled;authManager;constructor({confirmationScreen:e,config:t,authManager:r,guardianApi:i}){this.confirmationScreen=e,this.crossSdkBridgeEnabled=t.crossSdkBridgeEnabled,this.guardianApi=i,this.authManager=r;}withConfirmationScreen(e){return t=>this.withConfirmationScreenTask(e)(t)()}withConfirmationScreenTask(e){return t=>async()=>{this.confirmationScreen.loading(e);try{return await t()}catch(r){throw r instanceof f&&r.type==="SERVICE_UNAVAILABLE_ERROR"?(await this.confirmationScreen.showServiceUnavailable(),r):(this.confirmationScreen.closeWindow(),r)}}}withDefaultConfirmationScreenTask(e){return this.withConfirmationScreenTask()(e)}async evaluateImxTransaction({payloadHash:e}){try{let t=()=>{this.confirmationScreen.closeWindow();},r=await this.authManager.getUserImx(),i={Authorization:`Bearer ${r.accessToken}`};if(!(await D(async()=>this.guardianApi.getTransactionByID({transactionID:e,chainType:"starkex"},{headers:i}),{finallyFn:t})).data.id)throw new Error("Transaction doesn't exists");let s=await this.guardianApi.evaluateTransaction({id:e,transactionEvaluationRequest:{chainType:"starkex"}},{headers:i}),{confirmationRequired:o}=s.data;if(o){if(this.crossSdkBridgeEnabled)throw new Error(le);if(!(await this.confirmationScreen.requestConfirmation(e,r.imx.ethAddress,He.mr.TransactionApprovalRequestChainTypeEnum.Starkex)).confirmed)throw new Error("Transaction rejected by user")}else this.confirmationScreen.closeWindow();}catch(t){throw Ft.isAxiosError(t)&&t.response?.status===403?new f("Service unavailable","SERVICE_UNAVAILABLE_ERROR"):t}}async evaluateEVMTransaction({chainId:e,nonce:t,metaTransactions:r}){let i=await this.authManager.getUserZkEvm(),a={Authorization:`Bearer ${i.accessToken}`},s=ki(r);try{return (await this.guardianApi.evaluateTransaction({id:"evm",transactionEvaluationRequest:{chainType:"evm",chainId:e,transactionData:{nonce:t,userAddress:i.zkEvm.ethAddress,metaTransactions:s}}},{headers:a})).data}catch(o){if(Ft.isAxiosError(o)&&o.response?.status===403)throw new f("Service unavailable","SERVICE_UNAVAILABLE_ERROR");let c=o instanceof Error?o.message:String(o);throw new g(-32603,`Transaction failed to validate with error: ${c}`)}}async validateEVMTransaction({chainId:e,nonce:t,metaTransactions:r,isBackgroundTransaction:i}){let a=await this.evaluateEVMTransaction({chainId:e,nonce:t,metaTransactions:r}),{confirmationRequired:s,transactionId:o}=a;if(s&&this.crossSdkBridgeEnabled)throw new g(-32003,le);if(s&&o){let c=await this.authManager.getUserZkEvm();if(!(await this.confirmationScreen.requestConfirmation(o,c.zkEvm.ethAddress,He.mr.TransactionApprovalRequestChainTypeEnum.Evm,e)).confirmed)throw new g(-32003,"Transaction rejected by user")}else i||this.confirmationScreen.closeWindow();}async handleEIP712MessageEvaluation({chainID:e,payload:t}){try{let r=await this.authManager.getUserZkEvm();if(r===null)throw new g(4100,"User not logged in. Please log in first.");return (await this.guardianApi.evaluateMessage({messageEvaluationRequest:{chainID:e,payload:t}},{headers:{Authorization:`Bearer ${r.accessToken}`}})).data}catch(r){let i=r instanceof Error?r.message:String(r);throw new g(-32603,`Message failed to validate with error: ${i}`)}}async evaluateEIP712Message({chainID:e,payload:t}){let{messageId:r,confirmationRequired:i}=await this.handleEIP712MessageEvaluation({chainID:e,payload:t});if(i&&this.crossSdkBridgeEnabled)throw new g(-32003,le);if(i&&r){let a=await this.authManager.getUserZkEvm();if(!(await this.confirmationScreen.requestMessageConfirmation(r,a.zkEvm.ethAddress,"eip712")).confirmed)throw new g(-32003,"Signature rejected by user")}else this.confirmationScreen.closeWindow();}async handleERC191MessageEvaluation({chainID:e,payload:t}){try{let r=await this.authManager.getUserZkEvm();if(r===null)throw new g(4100,"User not logged in. Please log in first.");return (await this.guardianApi.evaluateErc191Message({eRC191MessageEvaluationRequest:{chainID:w(Number(e)),payload:t}},{headers:{Authorization:`Bearer ${r.accessToken}`}})).data}catch(r){let i=r instanceof Error?r.message:String(r);throw new g(-32603,`Message failed to validate with error: ${i}`)}}async evaluateERC191Message({chainID:e,payload:t}){let{messageId:r,confirmationRequired:i}=await this.handleERC191MessageEvaluation({chainID:e,payload:t});if(i&&this.crossSdkBridgeEnabled)throw new g(-32003,le);if(i&&r){let a=await this.authManager.getUserZkEvm();if(!(await this.confirmationScreen.requestMessageConfirmation(r,a.zkEvm.ethAddress,"erc191")).confirmed)throw new g(-32003,"Signature rejected by user")}else this.confirmationScreen.closeWindow();}};var xi=30,Mi=1e3,Ni=async(n,e,t)=>{let r=Ue([n]),i=Lt(r),a=await t.imGetFeeOptions(e,i);if(!a||!Array.isArray(a))throw new Error("Invalid fee options received from relayer");let s=a.find(o=>o.tokenSymbol==="IMX");if(!s)throw new Error("Failed to retrieve fees for IMX token");return s},Li=async(n,e,t,r,i)=>{if(!n.to)throw new g(-32602,'eth_sendTransaction requires a "to" field');let a={to:n.to.toString(),data:n.data,nonce:BigInt(0),value:n.value,revertOnError:!0},[s,o]=await Promise.all([oe(e,r,i),Ni(a,r,t)]),c=[{...a,nonce:s}],d=BigInt(o.tokenPrice);return d!==BigInt(0)&&c.push({nonce:s,to:o.recipientAddress,value:d,revertOnError:!0}),c},me=async(n,e,t)=>{let i=await D(async()=>{let a=await n.imGetTransactionByHash(e);if(a.status==="PENDING")throw new Error;return a},{retries:xi,interval:Mi,finalErr:new g(-32e3,"transaction hash not generated in time")});if(t.addEvent("endRetrieveRelayerTransaction"),!["SUBMITTED","SUCCESSFUL"].includes(i.status)){let a=`Transaction failed to submit with status ${i.status}.`;throw i.statusMessage&&(a+=` Error message: ${i.statusMessage}`),new g(-32e3,a)}return i},ue=async({transactionRequest:n,ethSigner:e,rpcProvider:t,guardianClient:r,relayerClient:i,zkEvmAddress:a,flow:s,nonceSpace:o,isBackgroundTransaction:c})=>{let{chainId:d}=await t.getNetwork(),p=BigInt(d);s.addEvent("endDetectNetwork");let u=await Li(n,t,i,a,o);s.addEvent("endBuildMetaTransactions");let{nonce:h}=u[0];if(typeof h>"u")throw new Error("Failed to retrieve nonce from the smart wallet");let v=async()=>{await r.validateEVMTransaction({chainId:w(Number(d)),nonce:pe(h),metaTransactions:u,isBackgroundTransaction:c}),s.addEvent("endValidateEVMTransaction");},_=async()=>{let or=await Fe(u,h,p,a,e);return s.addEvent("endGetSignedMetaTransactions"),or},[,R]=await Promise.all([v(),_()]),x=await i.ethSendTransaction(a,R);return s.addEvent("endRelayerSendTransaction"),{signedTransactions:R,relayerId:x,nonce:h}},Di=async n=>{if(!n.to)throw new g(-32602,'im_signEjectionTransaction requires a "to" field');if(typeof n.nonce>"u")throw new g(-32602,'im_signEjectionTransaction requires a "nonce" field');if(!n.chainId)throw new g(-32602,'im_signEjectionTransaction requires a "chainId" field');return [{to:n.to.toString(),data:n.data,nonce:n.nonce??void 0,value:n.value,revertOnError:!0}]},Bt=async({transactionRequest:n,ethSigner:e,zkEvmAddress:t,flow:r})=>{let i=await Di(n);r.addEvent("endBuildMetaTransactions");let a=await Fe(i,n.nonce,BigInt(n.chainId??0),t,e);return r.addEvent("endGetSignedMetaTransactions"),{to:t,data:a,chainId:w(Number(n.chainId??0))}};var Ve=async({params:n,ethSigner:e,rpcProvider:t,relayerClient:r,guardianClient:i,zkEvmAddress:a,flow:s,nonceSpace:o,isBackgroundTransaction:c=!1})=>{let d=n[0],{relayerId:p}=await ue({transactionRequest:d,ethSigner:e,rpcProvider:t,guardianClient:i,relayerClient:r,zkEvmAddress:a,flow:s,nonceSpace:o,isBackgroundTransaction:c}),{hash:u}=await me(r,p,s);return u};var Ht=["types","domain","primaryType","message"],Ui=n=>Ht.every(e=>e in n),Gi=(n,e)=>{let t;if(typeof n=="string")try{t=JSON.parse(n);}catch(i){throw new g(-32602,`Failed to parse typed data JSON: ${i}`)}else if(typeof n=="object")t=n;else throw new g(-32602,`Invalid typed data argument: ${n}`);if(!Ui(t))throw new g(-32602,`Invalid typed data argument. The following properties are required: ${Ht.join(", ")}`);let r=t.domain?.chainId;if(r&&(typeof r=="string"&&(r.startsWith("0x")?t.domain.chainId=parseInt(r,16).toString():t.domain.chainId=parseInt(r,10).toString()),BigInt(t.domain.chainId??0)!==e))throw new g(-32602,`Invalid chainId, expected ${e}`);return t},Vt=async({params:n,method:e,ethSigner:t,rpcProvider:r,relayerClient:i,guardianClient:a,flow:s})=>{let o=n[0],c=n[1];if(!o||!c)throw new g(-32602,`${e} requires an address and a typed data JSON`);let{chainId:d}=await r.getNetwork(),p=Gi(c,d);s.addEvent("endDetectNetwork"),await a.evaluateEIP712Message({chainID:String(d),payload:p}),s.addEvent("endValidateMessage");let u=await i.imSignTypedData(o,p);s.addEvent("endRelayerSignTypedData");let h=await Dt(p,u,BigInt(d),o,t);return s.addEvent("getSignedTypedData"),h};var Wt=n=>{if(!n)return n;try{let e=stripZerosLeft(getBytes(n));return toUtf8String(e)}catch{return n}};var ge=async({params:n,ethSigner:e,zkEvmAddress:t,rpcProvider:r,guardianClient:i,relayerClient:a,flow:s})=>{let o=n[0],c=n[1];if(!c||!o)throw new g(-32602,"personal_sign requires an address and a message");if(c.toLowerCase()!==t.toLowerCase())throw new g(-32602,"personal_sign requires the signer to be the from address");let d=Wt(o),{chainId:p}=await r.getNetwork();s.addEvent("endDetectNetwork");let u=BigInt(p),h=Ut(u,d,e,c);h.then(()=>s.addEvent("endEOASignature")),await i.evaluateERC191Message({chainID:p,payload:d}),s.addEvent("endEvaluateERC191Message");let[v,_]=await Promise.all([h,a.imSign(c,d)]);s.addEvent("endRelayerSign");let R=await e.getAddress();return s.addEvent("endGetEOAAddress"),Be(v,R,_)};var Wi="https://api.immutable.com",qi="https://api.sandbox.immutable.com",$i="/v1/sdk/session-activity/check",Zi=n=>{switch(n){case Environment.SANDBOX:return qi;case Environment.PRODUCTION:return Wi;default:throw new Error("Environment not supported")}},he,$t=n=>{he||(he=Ft.create({baseURL:Zi(n)}));};async function Zt(n){if(!he)throw new Error("Client not initialised");return he.get($i,{params:n}).then(e=>e.data).catch(e=>{if(e.response.status!==404)throw e})}function Xt(n,e){return (...t)=>{try{let r=n(...t);return r instanceof Promise?r.catch(i=>(i instanceof Error&&trackError("passport","sessionActivityError",i),e)):r}catch(r){return r instanceof Error&&trackError("passport","sessionActivityError",r),e}}}var{getItem:Jt,setItem:We}=utils.localStorage,qe="sessionActivitySendCount",zt="sessionActivityDate",$e={},k={},fe={},jt=()=>{k=Jt(qe)||{};let n=Jt(zt),e=new Date,t=e.getFullYear(),r=`${e.getMonth()+1}`.padStart(2,"0"),i=`${e.getDate()}`.padStart(2,"0"),a=`${t}-${r}-${i}`;(!n||n!==a)&&(k={}),We(zt,a),We(qe,k);};jt();var ji=n=>{jt(),k[n]||(k[n]=0),k[n]++,We(qe,k),$e[n]=0;},Yi=async n=>new Promise(e=>{setTimeout(e,n*1e3);}),Qi=async n=>{let e=n.flow||trackFlow("passport","sendSessionActivity"),t=n.passportClient;if(!t)throw e.addEvent("No Passport Client ID"),new Error("No Passport Client ID provided");if(fe[t])return;fe[t]=!0;let{sendTransaction:r,environment:i}=n;if(!r)throw new Error("No sendTransaction function provided");if(!i)throw new Error("No environment provided");$t(i);let a=n.walletAddress;if(!a)throw e.addEvent("No Passport Wallet Address"),new Error("No wallet address");let s;try{if(s=await Zt({clientId:t,wallet:a,checkCount:$e[t]||0,sendCount:k[t]||0}),$e[t]++,!s)return}catch(o){throw e.addEvent("Failed to fetch details"),new Error("Failed to get details",{cause:o})}if(s&&s.contractAddress&&s.functionName){let c=new Interface([`function ${s.functionName}()`]).encodeFunctionData(s.functionName),d=s.contractAddress;try{e.addEvent("Start Sending Transaction");let p=await n.sendTransaction([{to:d,from:a,data:c}],e);ji(t),e.addEvent("Transaction Sent",{tx:p});}catch(p){e.addEvent("Failed to send Transaction");let u=new Error("Failed to send transaction",{cause:p});trackError("passport","sessionActivityError",u,{flowId:e.details.flowId});}}s&&s.delay&&s.delay>0&&(e.addEvent("Delaying Transaction",{delay:s.delay}),await Yi(s.delay),setTimeout(()=>{e.addEvent("Retrying after Delay"),fe[t]=!1,Yt({...n,flow:e});},0));},Yt=n=>Xt(Qi)(n).then(()=>{fe[n.passportClient]=!1;}),Qt=Yt;var er=async({params:n,ethSigner:e,rpcProvider:t,relayerClient:r,guardianClient:i,zkEvmAddress:a,flow:s})=>{let o={to:a,value:0},{relayerId:c}=await ue({transactionRequest:o,ethSigner:e,rpcProvider:t,guardianClient:i,relayerClient:r,zkEvmAddress:a,flow:s});return i.withConfirmationScreen()(async()=>{let d=await ge({params:n,ethSigner:e,zkEvmAddress:a,rpcProvider:t,guardianClient:i,relayerClient:r,flow:s});return await me(r,c,s),d})};var tr=async({params:n,ethSigner:e,zkEvmAddress:t,flow:r})=>{if(!n||n.length!==1)throw new g(-32602,"im_signEjectionTransaction requires a singular param (hash)");let i=n[0];return await Bt({transactionRequest:i,ethSigner:e,zkEvmAddress:t,flow:r})};var Ee=n=>"zkEvm"in n,ye=class{#i;#t;#a;#r;#n;#e;#u;#g;#o;#d;#l;isPassport=!0;constructor({authManager:e,magicAdapter:t,config:r,multiRollupApiClients:i,passportEventEmitter:a,guardianClient:s}){this.#i=e,this.#u=t,this.#t=r,this.#n=s,this.#r=a,this.#e=new JsonRpcProvider(this.#t.zkEvmRpcUrl,void 0,{staticNetwork:!0}),this.#o=new ce({config:this.#t,rpcProvider:this.#e,authManager:this.#i}),this.#g=i,this.#a=new U,this.#i.getUser().then(o=>{o&&(this.#m(o),Ee(o)&&this.#p(o.zkEvm.ethAddress));}).catch(()=>{}),a.on("loggedIn",o=>{this.#m(o),Ee(o)&&this.#p(o.zkEvm.ethAddress);}),a.on("loggedOut",this.#h),a.on("accountsRequested",Qt);}#h=()=>{this.#d=void 0,this.#a.emit("accountsChanged",[]);};#m(e){let t=async()=>{let r=await this.#u.login(e.idToken);return new BrowserProvider(r).getSigner()};this.#l=void 0,this.#d=new Promise(async r=>{try{r(await t());}catch(i){this.#l=i,r(void 0);}});}async#c(){let e=await this.#d;if(typeof e>"u")throw typeof this.#l<"u"?this.#l:new Error("Signer failed to initialise");return e}async#p(e,t){let r=BigInt(1),i=async(a,s)=>{let o=await this.#c();return await Ve({params:a,ethSigner:o,guardianClient:this.#n,rpcProvider:this.#e,relayerClient:this.#o,zkEvmAddress:e,flow:s,nonceSpace:r,isBackgroundTransaction:!0})};this.#r.emit("accountsRequested",{environment:this.#t.baseConfig.environment,sendTransaction:i,walletAddress:e,passportClient:t||this.#t.oidcConfiguration.clientId});}async#s(){try{let e=await this.#i.getUser();return e&&Ee(e)?e.zkEvm.ethAddress:void 0}catch{return}}async#f(e){switch(e.method){case"eth_requestAccounts":{let t=await this.#s();if(t)return [t];let r=trackFlow("passport","ethRequestAccounts");try{let i=await this.#i.getUserOrLogin();r.addEvent("endGetUserOrLogin"),this.#d||this.#m(i);let a;if(Ee(i))a=i.zkEvm.ethAddress;else {r.addEvent("startUserRegistration");let s=await this.#c();r.addEvent("ethSignerResolved"),a=await Gt({ethSigner:s,authManager:this.#i,multiRollupApiClients:this.#g,accessToken:i.accessToken,rpcProvider:this.#e,flow:r}),r.addEvent("endUserRegistration");}return this.#a.emit("accountsChanged",[a]),identify({passportId:i.profile.sub}),this.#p(a),[a]}catch(i){throw i instanceof Error?trackError("passport","ethRequestAccounts",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"eth_sendTransaction":{let t=await this.#s();if(!t)throw new g(4100,"Unauthorised - call eth_requestAccounts first");let r=trackFlow("passport","ethSendTransaction");try{return await this.#n.withConfirmationScreen({width:480,height:720})(async()=>{let i=await this.#c();return r.addEvent("endGetSigner"),await Ve({params:e.params||[],ethSigner:i,guardianClient:this.#n,rpcProvider:this.#e,relayerClient:this.#o,zkEvmAddress:t,flow:r})})}catch(i){throw i instanceof Error?trackError("passport","eth_sendTransaction",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"eth_accounts":{let t=await this.#s();return t?[t]:[]}case"personal_sign":{let t=await this.#s();if(!t)throw new g(4100,"Unauthorised - call eth_requestAccounts first");let r=trackFlow("passport","personalSign");try{return await this.#n.withConfirmationScreen({width:480,height:720})(async()=>{let i=await this.#c();return r.addEvent("endGetSigner"),this.#t.forceScwDeployBeforeMessageSignature&&!(await oe(this.#e,t)>BigInt(0))?await er({params:e.params||[],ethSigner:i,zkEvmAddress:t,rpcProvider:this.#e,guardianClient:this.#n,relayerClient:this.#o,flow:r}):await ge({params:e.params||[],ethSigner:i,zkEvmAddress:t,rpcProvider:this.#e,guardianClient:this.#n,relayerClient:this.#o,flow:r})})}catch(i){throw i instanceof Error?trackError("passport","personal_sign",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"eth_signTypedData":case"eth_signTypedData_v4":{if(!await this.#s())throw new g(4100,"Unauthorised - call eth_requestAccounts first");let r=trackFlow("passport","ethSignTypedDataV4");try{return await this.#n.withConfirmationScreen({width:480,height:720})(async()=>{let i=await this.#c();return r.addEvent("endGetSigner"),await Vt({method:e.method,params:e.params||[],ethSigner:i,rpcProvider:this.#e,relayerClient:this.#o,guardianClient:this.#n,flow:r})})}catch(i){throw i instanceof Error?trackError("passport","eth_signTypedData",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"eth_chainId":{let{chainId:t}=await this.#e.getNetwork();return toBeHex(t)}case"eth_getBalance":case"eth_getCode":case"eth_getTransactionCount":{let[t,r]=e.params||[];return this.#e.send(e.method,[t,r||"latest"])}case"eth_getStorageAt":{let[t,r,i]=e.params||[];return this.#e.send(e.method,[t,r,i||"latest"])}case"eth_call":case"eth_estimateGas":{let[t,r]=e.params||[];return this.#e.send(e.method,[t,r||"latest"])}case"eth_gasPrice":case"eth_blockNumber":case"eth_getBlockByHash":case"eth_getBlockByNumber":case"eth_getTransactionByHash":case"eth_getTransactionReceipt":return this.#e.send(e.method,e.params||[]);case"im_signEjectionTransaction":{let t=await this.#s();if(!t)throw new g(4100,"Unauthorised - call eth_requestAccounts first");let r=trackFlow("passport","imSignEjectionTransaction");try{let i=await this.#c();return r.addEvent("endGetSigner"),await tr({params:e.params||[],ethSigner:i,zkEvmAddress:t,flow:r})}catch(i){throw i instanceof Error?trackError("passport","imSignEjectionTransaction",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"im_addSessionActivity":{let[t]=e.params||[],r=await this.#s();return r&&this.#p(r,t),null}default:throw new g(4200,"Method not supported")}}async request(e){try{return this.#f(e)}catch(t){throw t instanceof g?t:t instanceof Error?new g(-32603,t.message):new g(-32603,"Internal error")}}on(e,t){this.#a.on(e,t);}removeListener(e,t){this.#a.removeListener(e,t);}};var rr={icon:'data:image/svg+xml,<svg viewBox="0 0 48 48" class="SvgIcon undefined Logo Logo--PassportSymbolOutlined css-1dn9atd" xmlns="http://www.w3.org/2000/svg"><g data-testid="undefined__g"><circle cx="24" cy="24" r="22.5" fill="url(%23paint0_radial_6324_83922)"></circle><circle cx="24" cy="24" r="22.5" fill="url(%23paint1_radial_6324_83922)"></circle><path d="M24 0C10.7452 0 0 10.7452 0 24C0 37.2548 10.7452 48 24 48C37.2548 48 48 37.2548 48 24C48 10.7452 37.2548 0 24 0ZM23.0718 9.16608C23.7383 8.83951 24.4406 8.86188 25.087 9.2287C27.3282 10.5059 29.5627 11.7942 31.786 13.096C32.5018 13.5165 32.8686 14.1897 32.8708 15.0173C32.8843 17.9184 32.8798 20.8171 32.8708 23.7182C32.8708 23.8255 32.8015 23.9821 32.7143 24.0335C31.8531 24.548 30.9808 25.0423 30.0347 25.5881V25.1318C30.0347 22.148 30.0257 19.1664 30.0414 16.1827C30.0436 15.6101 29.8468 15.241 29.339 14.9525C26.7377 13.474 24.1499 11.9687 21.5575 10.4723C21.4457 10.4075 21.3361 10.3381 21.1661 10.2352C21.8326 9.85722 22.4321 9.47698 23.0673 9.16608H23.0718ZM22.5953 38.8451C22.45 38.7713 22.3426 38.7198 22.2375 38.6595C18.8041 36.68 15.3752 34.687 11.9307 32.7232C10.9644 32.173 10.5238 31.3879 10.5349 30.2852C10.5551 27.9411 10.5484 25.597 10.5372 23.2507C10.5327 22.1927 10.9622 21.4255 11.8926 20.8977C14.3105 19.5221 16.715 18.1264 19.1195 16.7284C19.3275 16.6076 19.4796 16.5875 19.6965 16.7172C20.5264 17.216 21.3719 17.6924 22.2554 18.2024C22.0876 18.3031 21.9601 18.3791 21.8304 18.4552C19.2268 19.9582 16.6278 21.4658 14.0175 22.9599C13.5903 23.2037 13.3912 23.5213 13.3957 24.0179C13.4091 25.8654 13.4114 27.713 13.3957 29.5605C13.3912 30.0705 13.5948 30.3948 14.0332 30.6453C16.7866 32.2199 19.5288 33.8125 22.28 35.3916C22.5126 35.5258 22.611 35.6645 22.6065 35.9418C22.5864 36.888 22.5998 37.8363 22.5998 38.8473L22.5953 38.8451ZM22.5953 33.553C22.356 33.4166 22.1838 33.3204 22.0116 33.2198C19.8285 31.9605 17.6477 30.6967 15.4602 29.4464C15.2231 29.3122 15.1359 29.1668 15.1381 28.8917C15.1538 27.4714 15.1471 26.0511 15.1426 24.6308C15.1426 24.4384 15.1717 24.3064 15.3618 24.1991C16.167 23.7495 16.9633 23.2798 17.7618 22.8212C17.8199 22.7877 17.8826 22.7631 17.9877 22.7116V24.3064C17.9877 25.1698 18.0011 26.0354 17.9832 26.8988C17.972 27.3909 18.1622 27.7241 18.5916 27.9657C19.8285 28.6636 21.0498 29.3883 22.2867 30.0839C22.5305 30.2203 22.6043 30.3724 22.5998 30.6408C22.5842 31.5847 22.5931 32.5308 22.5931 33.5508L22.5953 33.553ZM20.0746 14.91C19.6116 14.6371 19.2157 14.6393 18.7527 14.91C16.1581 16.4265 13.5523 17.9228 10.9487 19.4259C10.8391 19.4908 10.7251 19.5489 10.5305 19.6541C10.5998 18.6654 10.3873 17.7327 10.7251 16.8291C10.9085 16.3348 11.2529 15.9635 11.7092 15.6995C13.8811 14.4447 16.0507 13.1877 18.227 11.9396C19.0211 11.4833 19.8308 11.4945 20.6248 11.953C23.0964 13.3756 25.5657 14.8026 28.0306 16.2341C28.1357 16.2945 28.2677 16.4309 28.2677 16.5338C28.2856 17.5493 28.2788 18.567 28.2788 19.6563C27.3819 19.1396 26.5543 18.6609 25.7267 18.1823C23.8412 17.093 21.9512 16.0149 20.0746 14.91ZM37.4427 30.8779C37.3778 31.6764 36.9103 32.2423 36.2192 32.6404C33.5732 34.1614 30.9294 35.6913 28.2856 37.2168C27.4557 37.6954 26.6259 38.1741 25.7938 38.6527C25.6932 38.7109 25.5903 38.7601 25.4539 38.8317C25.4449 38.693 25.4337 38.5924 25.4337 38.4917C25.4337 37.6149 25.4382 36.7404 25.4293 35.8636C25.4293 35.6645 25.4762 35.5437 25.6596 35.4386C29.5157 33.2198 33.3696 30.9942 37.2212 28.7709C37.2794 28.7374 37.3443 28.7105 37.4539 28.6591C37.4539 29.4375 37.4986 30.1622 37.4427 30.8779ZM37.4628 25.3577C37.4561 26.2658 36.9663 26.9033 36.1901 27.3506C33.175 29.0841 30.1622 30.8265 27.1493 32.5666C26.5991 32.8842 26.0466 33.1996 25.4561 33.5396C25.4472 33.3897 25.436 33.2913 25.436 33.1907C25.436 32.3273 25.4449 31.4617 25.4293 30.5983C25.4248 30.3523 25.5075 30.2226 25.72 30.0995C28.46 28.5271 31.1911 26.9368 33.9355 25.3733C34.4231 25.096 34.6378 24.7538 34.6334 24.1812C34.6132 21.1974 34.6244 18.2136 34.6244 15.2298V14.7087C35.3402 15.1404 36.0112 15.496 36.624 15.9299C37.1832 16.3258 37.465 16.9253 37.4673 17.6164C37.4762 20.1976 37.4829 22.7788 37.465 25.3599L37.4628 25.3577Z" fill="%230D0D0D"></path><path fill-rule="evenodd" d="M24 0C10.7452 0 0 10.7452 0 24C0 37.2548 10.7452 48 24 48C37.2548 48 48 37.2548 48 24C48 10.7452 37.2548 0 24 0ZM24 2C11.8497 2 2 11.8497 2 24C2 36.1503 11.8497 46 24 46C36.1503 46 46 36.1503 46 24C46 11.8497 36.1503 2 24 2Z" fill="url(%23paint2_radial_6324_83922)"></path><path fill-rule="evenodd" d="M24 0C10.7452 0 0 10.7452 0 24C0 37.2548 10.7452 48 24 48C37.2548 48 48 37.2548 48 24C48 10.7452 37.2548 0 24 0ZM24 2C11.8497 2 2 11.8497 2 24C2 36.1503 11.8497 46 24 46C36.1503 46 46 36.1503 46 24C46 11.8497 36.1503 2 24 2Z" fill="url(%23paint3_radial_6324_83922)"></path><defs><radialGradient id="paint0_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(13.4442 13.3899) rotate(44.9817) scale(46.7487 99.1435)"><stop stop-color="%23A3EEF8"></stop><stop offset="0.177083" stop-color="%23A4DCF5"></stop><stop offset="0.380208" stop-color="%23A6AEEC"></stop><stop offset="1" stop-color="%23ECBEE1"></stop></radialGradient><radialGradient id="paint1_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(25.9515 43.7068) rotate(84.265) scale(24.2138 46.3215)"><stop stop-color="%23FCF5EE"></stop><stop offset="0.715135" stop-color="%23ECBEE1" stop-opacity="0"></stop></radialGradient><radialGradient id="paint2_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(12.7405 12.6825) rotate(44.9817) scale(49.8653 105.753)"><stop stop-color="%23A3EEF8"></stop><stop offset="0.177083" stop-color="%23A4DCF5"></stop><stop offset="0.380208" stop-color="%23A6AEEC"></stop><stop offset="1" stop-color="%23ECBEE1"></stop></radialGradient><radialGradient id="paint3_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(26.0816 45.0206) rotate(84.265) scale(25.828 49.4096)"><stop stop-color="%23FCF5EE"></stop><stop offset="0.715135" stop-color="%23ECBEE1" stop-opacity="0"></stop></radialGradient></defs></g></svg>',name:"Immutable Passport",rdns:"com.immutable.passport",uuid:v4()};function nr(n){if(typeof window>"u")return;let e=new CustomEvent("eip6963:announceProvider",{detail:Object.freeze(n)});window.dispatchEvent(e);let t=()=>window.dispatchEvent(e);window.addEventListener("eip6963:requestProvider",t);}var aa=n=>n?.length>0&&typeof n[0]=="object"&&"method"in n[0]&&typeof n[0].method=="string"&&["personal_sign","eth_accounts","eth_requestAccounts"].includes(n[0].method),sa=n=>n?.length>0&&typeof n[0]=="object"&&"method"in n[0]&&typeof n[0].method=="string"&&n[0].method==="eth_requestAccounts",ve=class{authManager;config;constructor(e,t){this.authManager=e,this.config=t;}createProxy(e){let t=e.rpcProvider,r={get:(i,a,s)=>a==="request"?async(...o)=>{try{if(aa(o)){if(!await e.user.isLoggedIn()){let p=(await this.authManager.getUser())?.idToken;if(!p)throw new Error("failed to obtain ID token");await e.openid.loginWithOIDC({jwt:p,providerId:this.config.magicProviderId});}if(sa(o))return i.request({method:"eth_accounts"})}return i.request(...o)}catch(c){throw c instanceof Error?new Error(`ProviderProxy: ${c.message}`):new Error(`ProviderProxy: ${c}`)}}:Reflect.get(i,a,s)};return new Proxy(t,r)}};var fa=n=>n.overrides?createConfig({basePath:n.overrides.imxPublicApiDomain}):n.baseConfig.environment===Environment.SANDBOX?imxApiConfig.getSandbox():imxApiConfig.getProduction(),Ea=n=>{if(n.overrides?.imxApiClients)return n.overrides.imxApiClients;let e=fa(n);return new ImxApiClients(e)},ya=n=>{let e=new ie(n),t=new H(e),r=new q(e,t),i=new ve(r,e),a=new $(e,i),s=new B(e),o=new MultiRollupApiClients(e.multiRollupConfig),c=new U,d=n.overrides?n.overrides.immutableXClient:new IMXClient({baseConfig:n.baseConfig}),p=new K({confirmationScreen:s,config:e,authManager:r,guardianApi:o.guardianApi}),u=Ea(n),h=new ne({authManager:r,immutableXClient:d,magicAdapter:a,passportEventEmitter:c,imxApiClients:u,guardianClient:p});return {config:e,authManager:r,magicAdapter:a,confirmationScreen:s,embeddedLoginPrompt:t,immutableXClient:d,multiRollupApiClients:o,passportEventEmitter:c,passportImxProviderFactory:h,guardianClient:p}},Ze=class{authManager;config;confirmationScreen;embeddedLoginPrompt;immutableXClient;magicAdapter;multiRollupApiClients;passportImxProviderFactory;passportEventEmitter;guardianClient;constructor(e){let t=ya(e);this.config=t.config,this.authManager=t.authManager,this.magicAdapter=t.magicAdapter,this.confirmationScreen=t.confirmationScreen,this.embeddedLoginPrompt=t.embeddedLoginPrompt,this.immutableXClient=t.immutableXClient,this.multiRollupApiClients=t.multiRollupApiClients,this.passportEventEmitter=t.passportEventEmitter,this.passportImxProviderFactory=t.passportImxProviderFactory,this.guardianClient=t.guardianClient,setPassportClientId(e.clientId),track("passport","initialise");}async connectImxSilent(){return E(()=>this.passportImxProviderFactory.getProviderSilent(),"connectImxSilent",!1)}async connectImx(){return E(()=>this.passportImxProviderFactory.getProvider(),"connectImx",!1)}connectEvm(e={announceProvider:!0}){return E(async()=>{let t=new ye({passportEventEmitter:this.passportEventEmitter,authManager:this.authManager,magicAdapter:this.magicAdapter,config:this.config,multiRollupApiClients:this.multiRollupApiClients,guardianClient:this.guardianClient});return e?.announceProvider&&nr({info:rr,provider:t}),t},"connectEvm",!1)}async login(e){return E(async()=>{let{useCachedSession:t=!1,useSilentLogin:r}=e||{},i=null;try{i=await this.authManager.getUser();}catch(a){if(a instanceof Error&&!a.message.includes("Unknown or invalid refresh token")&&trackError("passport","login",a),t)throw a;N.warn("Failed to retrieve a cached user session",a);}return !i&&r?i=await this.authManager.forceUserRefresh():!i&&!t&&(e?.useRedirectFlow?await this.authManager.loginWithRedirect(e?.anonymousId,e?.directLoginOptions):i=await this.authManager.login(e?.anonymousId,e?.directLoginOptions)),i&&(identify({passportId:i.profile.sub}),this.passportEventEmitter.emit("loggedIn",i)),i?i.profile:null},"login")}async loginCallback(){await E(()=>this.authManager.loginCallback(),"loginCallback").then(e=>{e&&(identify({passportId:e.profile.sub}),this.passportEventEmitter.emit("loggedIn",e));});}loginWithPKCEFlow(e){return E(async()=>await this.authManager.getPKCEAuthorizationUrl(e),"loginWithPKCEFlow")}async loginWithPKCEFlowCallback(e,t){return E(async()=>{let r=await this.authManager.loginWithPKCEFlowCallback(e,t);return this.passportEventEmitter.emit("loggedIn",r),r.profile},"loginWithPKCEFlowCallback")}async storeTokens(e){return E(async()=>{let t=await this.authManager.storeTokens(e);return this.passportEventEmitter.emit("loggedIn",t),t.profile},"storeTokens")}async logout(){return E(async()=>{this.config.oidcConfiguration.logoutMode==="silent"?await Promise.allSettled([this.authManager.logout(),this.magicAdapter.logout()]):(await this.magicAdapter.logout(),await this.authManager.logout()),this.passportEventEmitter.emit("loggedOut");},"logout")}async getLogoutUrl(){return E(async()=>(await this.authManager.removeUser(),await this.magicAdapter.logout(),this.passportEventEmitter.emit("loggedOut"),await this.authManager.getLogoutUrl()),"getLogoutUrl")}async logoutSilentCallback(e){return E(()=>this.authManager.logoutSilentCallback(e),"logoutSilentCallback")}async getUserInfo(){return E(async()=>(await this.authManager.getUser())?.profile,"getUserInfo",!1)}async getIdToken(){return E(async()=>(await this.authManager.getUser())?.idToken,"getIdToken",!1)}async getAccessToken(){return E(async()=>(await this.authManager.getUser())?.accessToken,"getAccessToken",!1,!1)}async getLinkedAddresses(){return E(async()=>{let e=await this.authManager.getUser();if(!e?.profile.sub)return [];let t={Authorization:`Bearer ${e.accessToken}`};return (await this.multiRollupApiClients.passportProfileApi.getUserInfo({headers:t})).data.linked_addresses},"getLinkedAddresses",!1)}async linkExternalWallet(e){let t=trackFlow("passport","linkExternalWallet",!1),r=await this.authManager.getUser();if(!r)throw new f("User is not logged in","NOT_LOGGED_IN_ERROR");let i=L(r),a=j(r);if(!i&&!a)throw new f("User has not been registered","USER_NOT_REGISTERED_ERROR");let s={Authorization:`Bearer ${r.accessToken}`},o={type:e.type,wallet_address:e.walletAddress,signature:e.signature,nonce:e.nonce};try{return {...(await this.multiRollupApiClients.passportProfileApi.linkWalletV2({linkWalletV2Request:o},{headers:s})).data}}catch(c){if(c instanceof Error?trackError("passport","linkExternalWallet",c):t.addEvent("errored"),isAxiosError(c)&&c.response){if(c.response.data&&Pe(c.response.data)){let{code:p,message:u}=c.response.data;switch(p){case"ALREADY_LINKED":throw new f(u,"LINK_WALLET_ALREADY_LINKED_ERROR");case"MAX_WALLETS_LINKED":throw new f(u,"LINK_WALLET_MAX_WALLETS_LINKED_ERROR");case"DUPLICATE_NONCE":throw new f(u,"LINK_WALLET_DUPLICATE_NONCE_ERROR");case"VALIDATION_ERROR":throw new f(u,"LINK_WALLET_VALIDATION_ERROR");default:throw new f(u,"LINK_WALLET_GENERIC_ERROR")}}else if(c.response.status)throw new f(`Link wallet request failed with status code ${c.response.status}`,"LINK_WALLET_GENERIC_ERROR")}let d="Link wallet request failed";throw c instanceof Error&&(d+=`: ${c.message}`),new f(d,"LINK_WALLET_GENERIC_ERROR")}finally{t.addEvent("End");}}};
|
|
350
406
|
|
|
351
|
-
export { g as JsonRpcError,
|
|
407
|
+
export { g as JsonRpcError, Qe as MarketingConsentStatus, Ze as Passport, f as PassportError, de as ProviderErrorCode, Ne as ProviderEvent, I as RpcErrorCode };
|