@imtbl/passport 2.4.15-alpha.2 → 2.6.0-alpha.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/browser/index.js +106 -40
- package/dist/node/index.cjs +115 -49
- package/dist/node/index.js +107 -41
- package/dist/types/Passport.d.ts +3 -1
- package/dist/types/authManager.d.ts +3 -1
- package/dist/types/confirmation/embeddedLoginPrompt.d.ts +10 -0
- package/dist/types/confirmation/index.d.ts +1 -0
- package/dist/types/confirmation/types.d.ts +19 -3
- package/dist/types/overlay/{index.d.ts → confirmationOverlay.d.ts} +1 -1
- package/dist/types/overlay/confirmationOverlay.test.d.ts +1 -0
- package/dist/types/overlay/constants.d.ts +1 -0
- package/dist/types/overlay/elements.d.ts +2 -0
- package/dist/types/overlay/embeddedLoginPromptOverlay.d.ts +7 -0
- package/dist/types/overlay/embeddedLoginPromptOverlay.test.d.ts +1 -0
- package/dist/types/types.d.ts +1 -1
- package/package.json +7 -7
- /package/dist/types/{overlay/overlay.test.d.ts → confirmation/embeddedLoginPrompt.test.d.ts} +0 -0
package/dist/node/index.cjs
CHANGED
|
@@ -1,13 +1,13 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
|
|
3
|
-
var
|
|
4
|
-
var
|
|
3
|
+
var Pt = require('axios');
|
|
4
|
+
var Ie = require('@imtbl/generated-clients');
|
|
5
5
|
var xClient = require('@imtbl/x-client');
|
|
6
6
|
var config = require('@imtbl/config');
|
|
7
7
|
var metrics = require('@imtbl/metrics');
|
|
8
8
|
var oidcClientTs = require('oidc-client-ts');
|
|
9
|
-
var
|
|
10
|
-
var
|
|
9
|
+
var qe = require('jwt-decode');
|
|
10
|
+
var er = require('localforage');
|
|
11
11
|
var magicSdk = require('magic-sdk');
|
|
12
12
|
var oidc = require('@magic-ext/oidc');
|
|
13
13
|
var ethers = require('ethers');
|
|
@@ -37,12 +37,12 @@ function _interopNamespace(e) {
|
|
|
37
37
|
return Object.freeze(n);
|
|
38
38
|
}
|
|
39
39
|
|
|
40
|
-
var
|
|
41
|
-
var
|
|
42
|
-
var
|
|
43
|
-
var
|
|
40
|
+
var Pt__default = /*#__PURE__*/_interopDefault(Pt);
|
|
41
|
+
var Ie__namespace = /*#__PURE__*/_interopNamespace(Ie);
|
|
42
|
+
var qe__default = /*#__PURE__*/_interopDefault(qe);
|
|
43
|
+
var er__default = /*#__PURE__*/_interopDefault(er);
|
|
44
44
|
|
|
45
|
-
function
|
|
45
|
+
function pe(i){return "code"in i&&"message"in i}var g=class extends Error{type;constructor(e,t){super(e),this.type=t;}},f=async(i,e)=>{try{return await i()}catch(t){let r;throw t instanceof g&&t.type==="SERVICE_UNAVAILABLE_ERROR"?new g(t.message,t.type):(Pt.isAxiosError(t)&&t.response?.data&&pe(t.response.data)?r=t.response.data.message:r=t.message,new g(r,e))}};var Me="pkce_state",Ne="pkce_verifier",Xt=3600,N=class{isTokenValid(e){try{let r=qe__default.default(e).exp??0,n=Date.now()/1e3+Xt;return r>n}catch{return !1}}savePKCEData(e){localStorage.setItem(Me,e.state),localStorage.setItem(Ne,e.verifier);}getPKCEData(){let e=localStorage.getItem(Me),t=localStorage.getItem(Ne);return e&&t?{state:e,verifier:t}:null}};var Jt=(...i)=>{if(typeof process>"u")return;process?.env?.JEST_WORKER_ID===void 0&&console.warn(...i);},I={warn:Jt};function Le(i){try{let e=qe__default.default(i),t=Math.floor(Date.now()/1e3);return e.exp?e.exp<=t+30:!0}catch{return !0}}function De(i){let{id_token:e,access_token:t}=i;return !t||!e?!0:Le(t)||Le(e)}var V=i=>!!i.zkEvm,S=i=>!!i.imx,Ue=(t=>(t.OptedIn="opted_in",t.Unsubscribed="unsubscribed",t))(Ue||{});var k="passport-overlay",L="passport-overlay-contents",W=`${k}-close`,$=`${k}-try-again`,Ge=`
|
|
46
46
|
<svg
|
|
47
47
|
viewBox="0 0 20 20"
|
|
48
48
|
fill="none"
|
|
@@ -54,7 +54,7 @@ function ce(n){return "code"in n&&"message"in n}var g=class extends Error{type;c
|
|
|
54
54
|
fill="#F3F3F3"
|
|
55
55
|
/>
|
|
56
56
|
</svg>
|
|
57
|
-
`,
|
|
57
|
+
`,Fe=`
|
|
58
58
|
<svg
|
|
59
59
|
viewBox="0 0 17 16"
|
|
60
60
|
fill="none"
|
|
@@ -68,7 +68,7 @@ function ce(n){return "code"in n&&"message"in n}var g=class extends Error{type;c
|
|
|
68
68
|
fill="#E01A3D"
|
|
69
69
|
/>
|
|
70
70
|
</svg>
|
|
71
|
-
`,
|
|
71
|
+
`,me=`
|
|
72
72
|
<svg
|
|
73
73
|
style="
|
|
74
74
|
max-width: 123px !important;
|
|
@@ -251,9 +251,9 @@ function ce(n){return "code"in n&&"message"in n}var g=class extends Error{type;c
|
|
|
251
251
|
</clipPath>
|
|
252
252
|
</defs>
|
|
253
253
|
</svg>
|
|
254
|
-
`;var
|
|
254
|
+
`;var jt=()=>`
|
|
255
255
|
<button
|
|
256
|
-
id="${
|
|
256
|
+
id="${W}"
|
|
257
257
|
style="
|
|
258
258
|
background: #f3f3f326 !important;
|
|
259
259
|
border: none !important;
|
|
@@ -269,9 +269,27 @@ function ce(n){return "code"in n&&"message"in n}var g=class extends Error{type;c
|
|
|
269
269
|
justify-content: center !important;
|
|
270
270
|
"
|
|
271
271
|
>
|
|
272
|
-
${
|
|
272
|
+
${Ge}
|
|
273
273
|
</button>
|
|
274
|
-
`,
|
|
274
|
+
`,Be=()=>`
|
|
275
|
+
<button
|
|
276
|
+
id="${$}"
|
|
277
|
+
style="
|
|
278
|
+
margin-top: 27px !important;
|
|
279
|
+
color: #f3f3f3 !important;
|
|
280
|
+
background: transparent !important;
|
|
281
|
+
padding: 12px 24px !important;
|
|
282
|
+
border-radius: 30px !important;
|
|
283
|
+
border: 2px solid #f3f3f3 !important;
|
|
284
|
+
font-size: 1em !important;
|
|
285
|
+
font-weight: 500 !important;
|
|
286
|
+
cursor: pointer !important;
|
|
287
|
+
"
|
|
288
|
+
>
|
|
289
|
+
Try again
|
|
290
|
+
</button>
|
|
291
|
+
`,Yt=()=>`
|
|
292
|
+
${me}
|
|
275
293
|
<div
|
|
276
294
|
style="
|
|
277
295
|
color: #e01a3d !important;
|
|
@@ -281,7 +299,7 @@ function ce(n){return "code"in n&&"message"in n}var g=class extends Error{type;c
|
|
|
281
299
|
margin-bottom: 10px !important;
|
|
282
300
|
"
|
|
283
301
|
>
|
|
284
|
-
${
|
|
302
|
+
${Fe}
|
|
285
303
|
Pop-up blocked
|
|
286
304
|
</div>
|
|
287
305
|
<p style="
|
|
@@ -294,7 +312,9 @@ function ce(n){return "code"in n&&"message"in n}var g=class extends Error{type;c
|
|
|
294
312
|
If the problem continues, adjust your<br />
|
|
295
313
|
browser settings.
|
|
296
314
|
</p>
|
|
297
|
-
|
|
315
|
+
${Be()}
|
|
316
|
+
`,Qt=()=>`
|
|
317
|
+
${me}
|
|
298
318
|
<p style="
|
|
299
319
|
color: #b6b6b6 !important;
|
|
300
320
|
text-align: center !important;
|
|
@@ -303,26 +323,10 @@ function ce(n){return "code"in n&&"message"in n}var g=class extends Error{type;c
|
|
|
303
323
|
>
|
|
304
324
|
Secure pop-up not showing?<br />We'll help you re-launch
|
|
305
325
|
</p>
|
|
306
|
-
|
|
307
|
-
|
|
308
|
-
id="${V}"
|
|
309
|
-
style="
|
|
310
|
-
margin-top: 27px !important;
|
|
311
|
-
color: #f3f3f3 !important;
|
|
312
|
-
background: transparent !important;
|
|
313
|
-
padding: 12px 24px !important;
|
|
314
|
-
border-radius: 30px !important;
|
|
315
|
-
border: 2px solid #f3f3f3 !important;
|
|
316
|
-
font-size: 1em !important;
|
|
317
|
-
font-weight: 500 !important;
|
|
318
|
-
cursor: pointer !important;
|
|
319
|
-
"
|
|
320
|
-
>
|
|
321
|
-
Try again
|
|
322
|
-
</button>
|
|
323
|
-
`,Le=n=>`
|
|
326
|
+
${Be()}
|
|
327
|
+
`,He=i=>`
|
|
324
328
|
<div
|
|
325
|
-
id="${
|
|
329
|
+
id="${k}"
|
|
326
330
|
style="
|
|
327
331
|
position: fixed !important;
|
|
328
332
|
top: 0 !important;
|
|
@@ -345,8 +349,9 @@ function ce(n){return "code"in n&&"message"in n}var g=class extends Error{type;c
|
|
|
345
349
|
z-index: 2147483647 !important;
|
|
346
350
|
"
|
|
347
351
|
>
|
|
348
|
-
${
|
|
352
|
+
${jt()}
|
|
349
353
|
<div
|
|
354
|
+
id="${L}"
|
|
350
355
|
style="
|
|
351
356
|
display: flex !important;
|
|
352
357
|
flex-direction: column !important;
|
|
@@ -354,30 +359,91 @@ function ce(n){return "code"in n&&"message"in n}var g=class extends Error{type;c
|
|
|
354
359
|
max-width: 400px !important;
|
|
355
360
|
"
|
|
356
361
|
>
|
|
357
|
-
${
|
|
358
|
-
${n}
|
|
359
|
-
${Zt()}
|
|
362
|
+
${i??""}
|
|
360
363
|
</div>
|
|
361
364
|
</div>
|
|
362
|
-
`;function H({id:n,href:e,rel:t,crossOrigin:r}){let i=`${x}-${n}`;if(!document.getElementById(i)){let a=document.createElement("link");a.id=i,a.href=e,t&&(a.rel=t),r&&(a.crossOrigin=r),document.head.appendChild(a);}}var Ge=()=>Le(qt()),Fe=()=>Le($t());var w=class{disableGenericPopupOverlay;disableBlockedPopupOverlay;overlay;isBlockedOverlay;tryAgainListener;onCloseListener;constructor(e,t=!1){this.disableBlockedPopupOverlay=e.disableBlockedPopupOverlay||!1,this.disableGenericPopupOverlay=e.disableGenericPopupOverlay||!1,this.isBlockedOverlay=t;}append(e,t){this.shouldAppendOverlay()&&(this.appendOverlay(),this.updateTryAgainButton(e),this.updateCloseButton(t));}update(e){this.updateTryAgainButton(e);}remove(){this.overlay&&this.overlay.remove();}shouldAppendOverlay(){return !(this.disableGenericPopupOverlay&&this.disableBlockedPopupOverlay||this.disableGenericPopupOverlay&&!this.isBlockedOverlay||this.disableBlockedPopupOverlay&&this.isBlockedOverlay)}appendOverlay(){if(!this.overlay){H({id:"link-googleapis",href:"https://fonts.googleapis.com"}),H({id:"link-gstatic",href:"https://fonts.gstatic.com",crossOrigin:"anonymous"}),H({id:"link-roboto",href:"https://fonts.googleapis.com/css2?family=Roboto:ital,wght@0,400;0,500;0,700;1,400;1,500;1,700&display=swap",rel:"stylesheet"});let e=document.createElement("div");e.innerHTML=this.isBlockedOverlay?Ge():Fe(),document.body.insertAdjacentElement("beforeend",e),this.overlay=e;}}updateTryAgainButton(e){let t=document.getElementById(V);t&&(this.tryAgainListener&&t.removeEventListener("click",this.tryAgainListener),this.tryAgainListener=e,t.addEventListener("click",e));}updateCloseButton(e){let t=document.getElementById(B);t&&(this.onCloseListener&&t.removeEventListener("click",this.onCloseListener),this.onCloseListener=e,t.addEventListener("click",e));}};var W=class{storage;constructor(e,t){this.storage=Kt__default.default.createInstance({name:e,driver:t});}get length(){return this.storage.length()}clear(){return this.storage.clear()}getItem(e){return this.storage.getItem(e)}key(e){return this.storage.key(e)}async removeItem(e){await this.storage.removeItem(e);}async setItem(e,t){await this.storage.setItem(e,t);}};var ir=500,ar={headers:{"Content-Type":"application/x-www-form-urlencoded"}},sr="/v2/logout",or="/im-logged-out",cr="/authorize",dr=n=>n?or:sr,lr=n=>{let{authenticationDomain:e,oidcConfiguration:t}=n,r;n.crossSdkBridgeEnabled?r=new W("ImmutableSDKPassport",Kt__default.default.INDEXEDDB):typeof window<"u"?r=window.localStorage:r=new oidcClientTs.InMemoryWebStorage;let i=new oidcClientTs.WebStorageStateStore({store:r}),a=new URL(dr(n.crossSdkBridgeEnabled),e.replace(/^(?:https?:\/\/)?(.*)/,"https://$1"));return a.searchParams.set("client_id",t.clientId),t.logoutRedirectUri&&a.searchParams.set("returnTo",t.logoutRedirectUri),{authority:e,redirect_uri:t.redirectUri,popup_redirect_uri:t.popupRedirectUri||t.redirectUri,client_id:t.clientId,metadata:{authorization_endpoint:`${e}/authorize`,token_endpoint:`${e}/oauth/token`,userinfo_endpoint:`${e}/userinfo`,end_session_endpoint:a.toString(),revocation_endpoint:`${e}/oauth/revoke`},mergeClaimsStrategy:{array:"merge"},automaticSilentRenew:!1,scope:t.scope,userStore:i,revokeTokenTypes:["refresh_token"],extraQueryParams:{...t.audience?{audience:t.audience}:{}}}};function de(n){return btoa(String.fromCharCode(...new Uint8Array(n))).replace(/\+/g,"-").replace(/\//g,"_").replace(/=/g,"")}async function pr(n){let t=new TextEncoder().encode(n);return await window.crypto.subtle.digest("SHA-256",t)}var M=class n{userManager;deviceCredentialsManager;config;logoutMode;refreshingPromise=null;constructor(e){this.config=e,this.userManager=new oidcClientTs.UserManager(lr(e)),this.deviceCredentialsManager=new b,this.logoutMode=e.oidcConfiguration.logoutMode||"redirect";}static mapOidcUserToDomainModel=e=>{let t;e.id_token&&(t=Be__default.default(e.id_token)?.passport);let r={expired:e.expired,idToken:e.id_token,accessToken:e.access_token,refreshToken:e.refresh_token,profile:{sub:e.profile.sub,email:e.profile.email,nickname:e.profile.nickname}};return t?.imx_eth_address&&(r.imx={ethAddress:t.imx_eth_address,starkAddress:t.imx_stark_address,userAdminAddress:t.imx_user_admin_address}),t?.zkevm_eth_address&&(r.zkEvm={ethAddress:t?.zkevm_eth_address,userAdminAddress:t?.zkevm_user_admin_address}),r};static mapDeviceTokenResponseToOidcUser=e=>{let t=Be__default.default(e.id_token);return new oidcClientTs.User({id_token:e.id_token,access_token:e.access_token,refresh_token:e.refresh_token,token_type:e.token_type,profile:{sub:t.sub,iss:t.iss,aud:t.aud,exp:t.exp,iat:t.iat,email:t.email,nickname:t.nickname,passport:t.passport}})};buildExtraQueryParams(e,t){let r={...this.userManager.settings?.extraQueryParams??{},rid:metrics.getDetail(metrics.Detail.RUNTIME_ID)||"",third_party_a_id:e||""};if(t){if(t.directLoginMethod==="email"){let i=t.email;i&&(r.direct=t.directLoginMethod,r.email=i);}else r.direct=t.directLoginMethod;t.marketingConsentStatus&&(r.marketingConsent=t.marketingConsentStatus);}return r}async loginWithRedirect(e,t){return await this.userManager.clearStaleState(),f(async()=>{let r=this.buildExtraQueryParams(e,t);await this.userManager.signinRedirect({extraQueryParams:r});},"AUTHENTICATION_ERROR")}async login(e,t){return f(async()=>{let r=window.crypto.randomUUID(),i=async()=>{let a=this.buildExtraQueryParams(e,t),s=this.userManager.signinPopup({extraQueryParams:a,popupWindowFeatures:{width:410,height:450},popupWindowTarget:r}),o=window.open("",r);if(o){let c=new Promise((d,l)=>{let p=setInterval(()=>{o.closed&&(clearInterval(p),l(new Error("Popup closed by user")));},ir);s.finally(()=>{clearInterval(p),o.close();});});return Promise.race([s,c])}return s};return new Promise((a,s)=>{i().then(o=>{a(n.mapOidcUserToDomainModel(o));}).catch(o=>{if(!(o instanceof Error)||o.message!=="Attempted to navigate on a disposed window"){s(o);return}let c=!1,d=new w(this.config.popupOverlayOptions,!0);d.append(async()=>{try{if(c)window.open("",r);else {c=!0;let l=await i();d.remove(),a(n.mapOidcUserToDomainModel(l));}}catch(l){d.remove(),s(l);}},()=>{d.remove(),s(new Error("Popup closed by user"));});});})},"AUTHENTICATION_ERROR")}async getUserOrLogin(){let e=null;try{e=await this.getUser();}catch(t){A.warn("Failed to retrieve a cached user session",t);}return e||this.login()}static shouldUseSigninPopupCallback(){try{let r=`oidc.${new URLSearchParams(window.location.search).get("state")}`,i=localStorage.getItem(r);return JSON.parse(i||"{}")?.request_type==="si:p"}catch{return !1}}async loginCallback(){return f(async()=>{if(n.shouldUseSigninPopupCallback()){await this.userManager.signinPopupCallback(void 0,!0);return}let e=await this.userManager.signinCallback();if(e)return n.mapOidcUserToDomainModel(e)},"AUTHENTICATION_ERROR")}async getPKCEAuthorizationUrl(e){let t=de(window.crypto.getRandomValues(new Uint8Array(32))),r=de(await pr(t)),i=de(window.crypto.getRandomValues(new Uint8Array(32))),{redirectUri:a,scope:s,audience:o,clientId:c}=this.config.oidcConfiguration;this.deviceCredentialsManager.savePKCEData({state:i,verifier:t});let d=new URL(cr,this.config.authenticationDomain);if(d.searchParams.set("response_type","code"),d.searchParams.set("code_challenge",r),d.searchParams.set("code_challenge_method","S256"),d.searchParams.set("client_id",c),d.searchParams.set("redirect_uri",a),d.searchParams.set("state",i),s&&d.searchParams.set("scope",s),o&&d.searchParams.set("audience",o),e){if(e.directLoginMethod==="email"){let l=e.email;l&&(d.searchParams.set("direct",e.directLoginMethod),d.searchParams.set("email",l));}else d.searchParams.set("direct",e.directLoginMethod);e.marketingConsentStatus&&d.searchParams.set("marketingConsent",e.marketingConsentStatus);}return d.toString()}async loginWithPKCEFlowCallback(e,t){return f(async()=>{let r=this.deviceCredentialsManager.getPKCEData();if(!r)throw new Error("No code verifier or state for PKCE");if(t!==r.state)throw new Error("Provided state does not match stored state");let i=await this.getPKCEToken(e,r.verifier),a=n.mapDeviceTokenResponseToOidcUser(i),s=n.mapOidcUserToDomainModel(a);return await this.userManager.storeUser(a),s},"AUTHENTICATION_ERROR")}async getPKCEToken(e,t){return (await ht__default.default.post(`${this.config.authenticationDomain}/oauth/token`,{client_id:this.config.oidcConfiguration.clientId,grant_type:"authorization_code",code_verifier:t,code:e,redirect_uri:this.config.oidcConfiguration.redirectUri},ar)).data}async storeTokens(e){return f(async()=>{let t=n.mapDeviceTokenResponseToOidcUser(e),r=n.mapOidcUserToDomainModel(t);return await this.userManager.storeUser(t),r},"AUTHENTICATION_ERROR")}async logout(){return f(async()=>{await this.userManager.revokeTokens(["refresh_token"]),this.logoutMode==="silent"?await this.userManager.signoutSilent():await this.userManager.signoutRedirect();},"LOGOUT_ERROR")}async logoutSilentCallback(e){return this.userManager.signoutSilentCallback(e)}async removeUser(){return this.userManager.removeUser()}async getLogoutUrl(){let e=this.userManager.settings?.metadata?.end_session_endpoint;return e||(A.warn("Failed to get logout URL"),null)}forceUserRefreshInBackground(){this.refreshTokenAndUpdatePromise().catch(e=>{A.warn("Failed to refresh user token",e);});}async forceUserRefresh(){return this.refreshTokenAndUpdatePromise().catch(e=>(A.warn("Failed to refresh user token",e),null))}async refreshTokenAndUpdatePromise(){return this.refreshingPromise?this.refreshingPromise:(this.refreshingPromise=new Promise(async(e,t)=>{try{let r=await this.userManager.signinSilent();if(r){e(n.mapOidcUserToDomainModel(r));return}e(null);}catch(r){let i="AUTHENTICATION_ERROR",a="Failed to refresh token",s=!0;if(r instanceof oidcClientTs.ErrorTimeout?(i="SILENT_LOGIN_ERROR",a=`${a}: ${r.message}`,s=!1):r instanceof oidcClientTs.ErrorResponse?(i="NOT_LOGGED_IN_ERROR",a=`${a}: ${r.message||r.error_description}`):r instanceof Error?a=`${a}: ${r.message}`:typeof r=="string"&&(a=`${a}: ${r}`),s)try{await this.userManager.removeUser();}catch(o){o instanceof Error&&(a=`${a}: Failed to remove user: ${o.message}`);}t(new g(a,i));}finally{this.refreshingPromise=null;}}),this.refreshingPromise)}async getUser(e=t=>!0){if(this.refreshingPromise){let r=await this.refreshingPromise;return r&&e(r)?r:null}let t=await this.userManager.getUser();if(!t)return null;if(!xe(t)){let r=n.mapOidcUserToDomainModel(t);if(r&&e(r))return r}if(t.refresh_token){let r=await this.refreshTokenAndUpdatePromise();if(r&&e(r))return r}return null}async getUserZkEvm(){let e=await this.getUser(F);if(!e)throw new Error("Failed to obtain a User with the required ZkEvm attributes");return e}async getUserImx(){let e=await this.getUser(I);if(!e)throw new Error("Failed to obtain a User with the required IMX attributes");return e}};var h=async(n,e,t=!0,r=!0)=>{let i=metrics.trackFlow("passport",e,t);try{return await n(i)}catch(a){throw a instanceof Error?metrics.trackError("passport",e,a,{flowId:i.details.flowId}):i.addEvent("errored"),a}finally{r&&i.addEvent("End");}};var Er="mainnet",N=class{config;magicProviderProxyFactory;magicClient;constructor(e,t){this.config=e,this.magicProviderProxyFactory=t,typeof window<"u"&&(this.magicClient=new magicSdk.Magic(this.config.magicPublishableApiKey,{extensions:[new oidc.OpenIdExtension],network:Er}));}getMagicClient(){if(!this.magicClient)throw new Error("Cannot perform this action outside of the browser");return this.magicClient}async login(e){return f(async()=>h(async t=>{let r=performance.now(),i=this.getMagicClient();return t.addEvent("endMagicClientInit"),await i.openid.loginWithOIDC({jwt:e,providerId:this.config.magicProviderId}),t.addEvent("endLoginWithOIDC"),metrics.trackDuration("passport",t.details.flowName,Math.round(performance.now()-r)),this.magicProviderProxyFactory.createProxy(i)},"magicLogin"),"WALLET_CONNECTION_ERROR")}async logout(){let e=this.getMagicClient();e.user&&await e.user.logout();}};var Ve=async n=>f(async()=>{let e=await xClient.generateLegacyStarkPrivateKey(n);return xClient.createStarkSigner(e)},"WALLET_CONNECTION_ERROR");async function He({user:n,starkSigner:e,request:t,exchangesApi:r}){return f(async()=>{let{ethAddress:i}=n.imx,a=t.amount,s=await r.getExchangeSignableTransfer({id:t.transactionID,getSignableTransferRequest:{sender:i,token:toolkit.convertToSignableToken(t),amount:a,receiver:t.receiver}}),o=await e.getAddress(),{payload_hash:c}=s.data,d=await e.signMessage(c),l={sender_stark_key:s.data.sender_stark_key||o,sender_vault_id:s.data.sender_vault_id,receiver_stark_key:s.data.receiver_stark_key,receiver_vault_id:s.data.receiver_vault_id,asset_id:s.data.asset_id,amount:s.data.amount,nonce:s.data.nonce,expiration_timestamp:s.data.expiration_timestamp,stark_signature:d},p={Authorization:`Bearer ${n.accessToken}`},u=await r.createExchangeTransfer({id:t.transactionID,createTransferRequest:l},{headers:p});return {sent_signature:u?.data.sent_signature,status:u?.data.status?.toString(),time:u?.data.time,transfer_id:u?.data.transfer_id}},"EXCHANGE_TRANSFER_ERROR")}var qe="ERC721";async function $e({starkSigner:n,user:e,request:t,ordersApi:r,guardianClient:i}){return f(async()=>{let{ethAddress:a}=e.imx,s=t.sell.type===qe?"1":t.sell.amount,o=t.buy.type===qe?"1":t.buy.amount,c={Authorization:`Bearer ${e.accessToken}`},d={user:a,amount_buy:o,token_buy:toolkit.convertToSignableToken(t.buy),amount_sell:s,token_sell:toolkit.convertToSignableToken(t.sell),fees:t.fees,split_fees:!0,expiration_timestamp:t.expiration_timestamp},l=await r.getSignableOrder({getSignableOrderRequestV3:d},{headers:c});await i.evaluateImxTransaction({payloadHash:l.data.payload_hash});let{payload_hash:p}=l.data,u=await n.signMessage(p),E=l.data,R={createOrderRequest:{include_fees:!0,fees:t.fees,stark_signature:u,amount_buy:E.amount_buy,amount_sell:E.amount_sell,asset_id_buy:E.asset_id_buy,asset_id_sell:E.asset_id_sell,expiration_timestamp:E.expiration_timestamp,nonce:E.nonce,stark_key:E.stark_key,vault_id_buy:E.vault_id_buy,vault_id_sell:E.vault_id_sell}};return {...(await r.createOrderV3(R,{headers:c})).data}},"CREATE_ORDER_ERROR")}async function Ze({user:n,starkSigner:e,request:t,ordersApi:r,guardianClient:i}){return f(async()=>{let a={order_id:t.order_id},s={Authorization:`Bearer ${n.accessToken}`},o=await r.getSignableCancelOrderV3({getSignableCancelOrderRequest:a},{headers:s});await i.evaluateImxTransaction({payloadHash:o.data.payload_hash});let{payload_hash:c}=o.data,d=await e.signMessage(c),l=await r.cancelOrderV3({id:t.order_id.toString(),cancelOrderRequest:{order_id:t.order_id,stark_signature:d}},{headers:s});return {order_id:l.data.order_id,status:l.data.status}},"CANCEL_ORDER_ERROR")}async function le({ethSigner:n,starkSigner:e,imxApiClients:t},r){return f(async()=>{let[i,a]=await Promise.all([n.getAddress(),e.getAddress()]),s=await t.usersApi.getSignableRegistrationOffchain({getSignableRegistrationRequest:{ether_key:i,stark_key:a}}),{signable_message:o,payload_hash:c}=s.data,[d,l]=await Promise.all([toolkit.signRaw(o,n),e.signMessage(c)]);return (await t.usersApi.registerPassportUserV2({authorization:`Bearer ${r}`,registerPassportUserRequest:{eth_signature:d,ether_key:i,stark_signature:l,stark_key:a}})).data},"USER_REGISTRATION_ERROR")}async function Ke({request:n,tradesApi:e,user:t,starkSigner:r,guardianClient:i}){return f(async()=>{let{ethAddress:a}=t.imx,s={expiration_timestamp:n.expiration_timestamp,fees:n.fees,order_id:n.order_id,user:a},o={Authorization:`Bearer ${t.accessToken}`},c=await e.getSignableTrade({getSignableTradeRequest:s},{headers:o});await i.evaluateImxTransaction({payloadHash:c.data.payload_hash});let{payload_hash:d}=c.data,l=await r.signMessage(d),{data:p}=c,u={createTradeRequest:{include_fees:!0,fees:n?.fees,stark_signature:l,order_id:n?.order_id,fee_info:p.fee_info,amount_buy:p.amount_buy,amount_sell:p.amount_sell,asset_id_buy:p.asset_id_buy,asset_id_sell:p.asset_id_sell,expiration_timestamp:p.expiration_timestamp,nonce:p.nonce,stark_key:p.stark_key,vault_id_buy:p.vault_id_buy,vault_id_sell:p.vault_id_sell}},{data:E}=await e.createTradeV3(u,{headers:o});return E},"CREATE_TRADE_ERROR")}var Je="ERC721";async function ze({request:n,transfersApi:e,starkSigner:t,user:r,guardianClient:i}){return f(async()=>{let a=n.type===Je?"1":n.amount,s={sender:r.imx.ethAddress,token:toolkit.convertToSignableToken(n),amount:a,receiver:n.receiver},o={Authorization:`Bearer ${r.accessToken}`},c=await e.getSignableTransferV1({getSignableTransferRequest:s},{headers:o});await i.evaluateImxTransaction({payloadHash:c.data.payload_hash});let d=c.data,{payload_hash:l}=d,p=await t.signMessage(l),u=await t.getAddress(),R={createTransferRequest:{sender_stark_key:d.sender_stark_key||u,sender_vault_id:d.sender_vault_id,receiver_stark_key:d.receiver_stark_key,receiver_vault_id:d.receiver_vault_id,asset_id:d.asset_id,amount:d.amount,nonce:d.nonce,expiration_timestamp:d.expiration_timestamp,stark_signature:p}},{data:y}=await e.createTransferV1(R,{headers:o});return {sent_signature:y.sent_signature,status:y.status?.toString(),time:y.time,transfer_id:y.transfer_id}},"TRANSFER_ERROR")}async function je({user:n,starkSigner:e,request:t,transfersApi:r,guardianClient:i}){return f(async()=>{let{ethAddress:a}=n.imx,s=t.map(u=>({amount:"1",token:toolkit.convertToSignableToken({type:Je,tokenId:u.tokenId,tokenAddress:u.tokenAddress}),receiver:u.receiver})),o={Authorization:`Bearer ${n.accessToken}`},c=await r.getSignableTransfer({getSignableTransferRequestV2:{sender_ether_key:a,signable_requests:s}},{headers:o});await i.evaluateImxTransaction({payloadHash:c.data.signable_responses[0]?.payload_hash});let d=await Promise.all(c.data.signable_responses.map(async u=>{let E=await e.signMessage(u.payload_hash);return {sender_vault_id:u.sender_vault_id,receiver_stark_key:u.receiver_stark_key,receiver_vault_id:u.receiver_vault_id,asset_id:u.asset_id,amount:u.amount,nonce:u.nonce,expiration_timestamp:u.expiration_timestamp,stark_signature:E}})),l={sender_stark_key:c.data.sender_stark_key,requests:d};return {transfer_ids:(await r.createTransfer({createTransferRequestV2:l},{headers:o}))?.data.transfer_ids}},"TRANSFER_ERROR")}var wr=n=>new Promise(e=>{setTimeout(()=>e(),n);}),S=async(n,e)=>{let{retries:t=3,interval:r=1e3,finalErr:i=Error("Retry failed"),finallyFn:a=()=>{}}=e||{};try{return await n()}catch{return t<=0?Promise.reject(i):(await wr(r),S(n,{retries:t-1,finalErr:i,finallyFn:a}))}finally{t<=0&&a();}};async function Ye(n){await S(async()=>{let e=await n.forceUserRefresh();return e?.imx?e:Promise.reject(new Error("user wallet addresses not exist"))});}async function pe(n,e,t,r,i){return f(async()=>{try{let a=await le({ethSigner:n,starkSigner:e,imxApiClients:i},t.accessToken);return await Ye(r),a}catch(a){if(ht__default.default.isAxiosError(a)&&a.response?.status===409)return await Ye(r),{tx_hash:""};throw a}},"USER_REGISTRATION_ERROR")}var q=class{authManager;immutableXClient;guardianClient;imxApiClients;magicAdapter;signers;signerInitialisationError;constructor({authManager:e,immutableXClient:t,passportEventEmitter:r,magicAdapter:i,imxApiClients:a,guardianClient:s}){this.authManager=e,this.immutableXClient=t,this.magicAdapter=i,this.imxApiClients=a,this.guardianClient=s,this.#i(),r.on("loggedOut",this.handleLogout);}handleLogout=()=>{this.signers=void 0;};#i(){let e=async()=>{let t=await this.authManager.getUser(),r=await this.magicAdapter.login(t.idToken),a=await new ethers.BrowserProvider(r).getSigner(),s=await Ve(a);return {ethSigner:a,starkSigner:s}};this.signers=new Promise(async t=>{try{t(await e());}catch(r){this.signerInitialisationError=r,t(void 0);}});}async#t(){let e=await this.authManager.getUser();if(!e||!this.signers)throw new g("User has been logged out","NOT_LOGGED_IN_ERROR");return e}async#a(){let e=await this.signers;if(typeof e>"u")throw typeof this.signerInitialisationError<"u"?this.signerInitialisationError:new Error("Signers failed to initialise");return e}async#r(){let[e,t]=await Promise.all([this.#t(),this.#a()]);if(!I(e))throw new g("User has not been registered with StarkEx","USER_NOT_REGISTERED_ERROR");return {user:e,starkSigner:t.starkSigner,ethSigner:t.ethSigner}}async transfer(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#r();return ze({request:e,user:t,starkSigner:r,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.guardianClient})})(),"imxTransfer")}async registerOffchain(){return h(async()=>{let[e,t]=await Promise.all([this.#t(),this.#a()]);return await pe(t.ethSigner,t.starkSigner,e,this.authManager,this.imxApiClients)},"imxRegisterOffchain")}async isRegisteredOffchain(){return h(async()=>!!(await this.#t()).imx,"imxIsRegisteredOffchain")}isRegisteredOnchain(){throw new g("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async createOrder(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#r();return $e({request:e,user:t,starkSigner:r,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.guardianClient})})(),"imxCreateOrder")}async cancelOrder(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#r();return Ze({request:e,user:t,starkSigner:r,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.guardianClient})})(),"imxCancelOrder")}async createTrade(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#r();return Ke({request:e,user:t,starkSigner:r,tradesApi:this.immutableXClient.tradesApi,guardianClient:this.guardianClient})})(),"imxCreateTrade")}async batchNftTransfer(e){return h(()=>this.guardianClient.withConfirmationScreenTask({width:480,height:784})(async()=>{let{user:t,starkSigner:r}=await this.#r();return je({request:e,user:t,starkSigner:r,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.guardianClient})})(),"imxBatchNftTransfer")}async exchangeTransfer(e){return h(async()=>{let{user:t,starkSigner:r}=await this.#r();return He({request:e,user:t,starkSigner:r,exchangesApi:this.immutableXClient.exchangeApi})},"imxExchangeTransfer")}deposit(e){throw new g("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}prepareWithdrawal(e){throw new g("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}completeWithdrawal(e,t){throw new g("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async getAddress(){return h(async()=>{let e=await this.#t();if(!I(e))throw new g("User has not been registered with StarkEx","USER_NOT_REGISTERED_ERROR");return Promise.resolve(e.imx.ethAddress)},"imxGetAddress")}};var $=class{authManager;immutableXClient;magicAdapter;passportEventEmitter;imxApiClients;guardianClient;constructor({authManager:e,immutableXClient:t,magicAdapter:r,passportEventEmitter:i,imxApiClients:a,guardianClient:s}){this.authManager=e,this.immutableXClient=t,this.magicAdapter=r,this.passportEventEmitter=i,this.imxApiClients=a,this.guardianClient=s;}async getProvider(){let e=await this.authManager.getUserOrLogin();return this.createProviderInstance(e)}async getProviderSilent(){let e=await this.authManager.getUser();return e?this.createProviderInstance(e):null}async createProviderInstance(e){if(!e.idToken)throw new g("Failed to initialise","WALLET_CONNECTION_ERROR");return new q({authManager:this.authManager,immutableXClient:this.immutableXClient,passportEventEmitter:this.passportEventEmitter,magicAdapter:this.magicAdapter,imxApiClients:this.imxApiClients,guardianClient:this.guardianClient})}};var rt=(n,e,t)=>{let r=e.map(i=>!n[i]&&i).filter(i=>i).join(", ");if(r!==""){let i=t?`${t} - ${r} cannot be null`:`${r} cannot be null`;throw new g(i,"INVALID_CONFIGURATION")}},Z=class{authenticationDomain;passportDomain;imxPublicApiDomain;magicPublishableApiKey;magicProviderId;oidcConfiguration;baseConfig;zkEvmRpcUrl;relayerUrl;multiRollupConfig;crossSdkBridgeEnabled;forceScwDeployBeforeMessageSignature;popupOverlayOptions;constructor({baseConfig:e,overrides:t,crossSdkBridgeEnabled:r,jsonRpcReferrer:i,forceScwDeployBeforeMessageSignature:a,popupOverlayOptions:s,...o}){if(rt(o,["clientId","redirectUri"]),this.oidcConfiguration=o,this.baseConfig=e,this.crossSdkBridgeEnabled=r||!1,this.forceScwDeployBeforeMessageSignature=a||!1,this.popupOverlayOptions=s||{disableGenericPopupOverlay:!1,disableBlockedPopupOverlay:!1},t)rt(t,["authenticationDomain","passportDomain","magicPublishableApiKey","magicProviderId","zkEvmRpcUrl","relayerUrl","imxPublicApiDomain","indexerMrBasePath","orderBookMrBasePath","passportMrBasePath"],"overrides"),this.authenticationDomain=t.authenticationDomain,this.passportDomain=t.passportDomain,this.imxPublicApiDomain=t.imxPublicApiDomain,this.magicPublishableApiKey=t.magicPublishableApiKey,this.magicProviderId=t.magicProviderId,this.zkEvmRpcUrl=t.zkEvmRpcUrl,this.relayerUrl=t.relayerUrl,this.multiRollupConfig={indexer:we.createConfig({basePath:t.indexerMrBasePath}),orderBook:we.createConfig({basePath:t.orderBookMrBasePath}),passport:we.createConfig({basePath:t.passportMrBasePath})};else switch(e.environment){case config.Environment.PRODUCTION:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="fSMzaRQ4O7p4fttl7pCyGVtJS_G70P8SNsLXtPPGHo0=",this.passportDomain="https://passport.immutable.com",this.imxPublicApiDomain="https://api.immutable.com",this.zkEvmRpcUrl="https://rpc.immutable.com",this.relayerUrl="https://api.immutable.com/relayer-mr",this.multiRollupConfig=we.multiRollupConfig.getProduction();break}case config.Environment.SANDBOX:default:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="fSMzaRQ4O7p4fttl7pCyGVtJS_G70P8SNsLXtPPGHo0=",this.passportDomain="https://passport.sandbox.immutable.com",this.imxPublicApiDomain="https://api.sandbox.immutable.com",this.zkEvmRpcUrl="https://rpc.testnet.immutable.com",this.relayerUrl="https://api.sandbox.immutable.com/relayer-mr",this.multiRollupConfig=we.multiRollupConfig.getSandbox();break}}}};var D="imx_passport_confirmation";var K=({url:n,title:e,width:t,height:r})=>{let i=Math.max(0,Math.round(window.screenX+(window.outerWidth-t)/2)),a=Math.max(0,Math.round(window.screenY+(window.outerHeight-r)/2)),s=window.open(n,e,`
|
|
365
|
+
`,Ve=()=>`
|
|
366
|
+
<div
|
|
367
|
+
id="${k}"
|
|
368
|
+
style="
|
|
369
|
+
position: fixed !important;
|
|
370
|
+
top: 0 !important;
|
|
371
|
+
left: 0 !important;
|
|
372
|
+
width: 100% !important;
|
|
373
|
+
height: 100% !important;
|
|
374
|
+
display: flex !important;
|
|
375
|
+
flex-direction: column !important;
|
|
376
|
+
justify-content: center !important;
|
|
377
|
+
align-items: center !important;
|
|
378
|
+
z-index: 2147483647 !important;
|
|
379
|
+
background: rgba(247, 247, 247, 0.24) !important;
|
|
380
|
+
animation-name: passportEmbeddedLoginPromptOverlayFadeIn;
|
|
381
|
+
animation-duration: 0.8s;
|
|
382
|
+
"
|
|
383
|
+
>
|
|
384
|
+
<div
|
|
385
|
+
id="${L}"
|
|
386
|
+
style="
|
|
387
|
+
display: flex !important;
|
|
388
|
+
flex-direction: column !important;
|
|
389
|
+
align-items: center !important;
|
|
390
|
+
width: 100% !important;
|
|
391
|
+
"
|
|
392
|
+
/>
|
|
393
|
+
</div>
|
|
394
|
+
`;function q({id:i,href:e,rel:t,crossOrigin:r}){let n=`${k}-${i}`;if(!document.getElementById(n)){let a=document.createElement("link");a.id=n,a.href=e,t&&(a.rel=t),r&&(a.crossOrigin=r),document.head.appendChild(a);}}var We=()=>He(Yt()),$e=()=>He(Qt());var _=class{disableGenericPopupOverlay;disableBlockedPopupOverlay;overlay;isBlockedOverlay;tryAgainListener;onCloseListener;constructor(e,t=!1){this.disableBlockedPopupOverlay=e.disableBlockedPopupOverlay||!1,this.disableGenericPopupOverlay=e.disableGenericPopupOverlay||!1,this.isBlockedOverlay=t;}append(e,t){this.shouldAppendOverlay()&&(this.appendOverlay(),this.updateTryAgainButton(e),this.updateCloseButton(t));}update(e){this.updateTryAgainButton(e);}remove(){this.overlay&&this.overlay.remove();}shouldAppendOverlay(){return !(this.disableGenericPopupOverlay&&this.disableBlockedPopupOverlay||this.disableGenericPopupOverlay&&!this.isBlockedOverlay||this.disableBlockedPopupOverlay&&this.isBlockedOverlay)}appendOverlay(){if(!this.overlay){q({id:"link-googleapis",href:"https://fonts.googleapis.com"}),q({id:"link-gstatic",href:"https://fonts.gstatic.com",crossOrigin:"anonymous"}),q({id:"link-roboto",href:"https://fonts.googleapis.com/css2?family=Roboto:ital,wght@0,400;0,500;0,700;1,400;1,500;1,700&display=swap",rel:"stylesheet"});let e=document.createElement("div");e.innerHTML=this.isBlockedOverlay?We():$e(),document.body.insertAdjacentElement("beforeend",e),this.overlay=e;}}updateTryAgainButton(e){let t=document.getElementById($);t&&(this.tryAgainListener&&t.removeEventListener("click",this.tryAgainListener),this.tryAgainListener=e,t.addEventListener("click",e));}updateCloseButton(e){let t=document.getElementById(W);t&&(this.onCloseListener&&t.removeEventListener("click",this.onCloseListener),this.onCloseListener=e,t.addEventListener("click",e));}};var Z=class{storage;constructor(e,t){this.storage=er__default.default.createInstance({name:e,driver:t});}get length(){return this.storage.length()}clear(){return this.storage.clear()}getItem(e){return this.storage.getItem(e)}key(e){return this.storage.key(e)}async removeItem(e){await this.storage.removeItem(e);}async setItem(e,t){await this.storage.setItem(e,t);}};var pr=500,mr={headers:{"Content-Type":"application/x-www-form-urlencoded"}},ur="/v2/logout",gr="/im-logged-out",hr="/authorize",fr=i=>i?gr:ur,Er=i=>{let{authenticationDomain:e,oidcConfiguration:t}=i,r;i.crossSdkBridgeEnabled?r=new Z("ImmutableSDKPassport",er__default.default.INDEXEDDB):typeof window<"u"?r=window.localStorage:r=new oidcClientTs.InMemoryWebStorage;let n=new oidcClientTs.WebStorageStateStore({store:r}),a=new URL(fr(i.crossSdkBridgeEnabled),e.replace(/^(?:https?:\/\/)?(.*)/,"https://$1"));return a.searchParams.set("client_id",t.clientId),t.logoutRedirectUri&&a.searchParams.set("returnTo",t.logoutRedirectUri),{authority:e,redirect_uri:t.redirectUri,popup_redirect_uri:t.popupRedirectUri||t.redirectUri,client_id:t.clientId,metadata:{authorization_endpoint:`${e}/authorize`,token_endpoint:`${e}/oauth/token`,userinfo_endpoint:`${e}/userinfo`,end_session_endpoint:a.toString(),revocation_endpoint:`${e}/oauth/revoke`},mergeClaimsStrategy:{array:"merge"},automaticSilentRenew:!1,scope:t.scope,userStore:n,revokeTokenTypes:["refresh_token"],extraQueryParams:{...t.audience?{audience:t.audience}:{}}}};function ue(i){return btoa(String.fromCharCode(...new Uint8Array(i))).replace(/\+/g,"-").replace(/\//g,"_").replace(/=/g,"")}async function yr(i){let t=new TextEncoder().encode(i);return await window.crypto.subtle.digest("SHA-256",t)}var D=class i{userManager;deviceCredentialsManager;config;embeddedLoginPrompt;logoutMode;refreshingPromise=null;constructor(e,t){this.config=e,this.userManager=new oidcClientTs.UserManager(Er(e)),this.deviceCredentialsManager=new N,this.embeddedLoginPrompt=t,this.logoutMode=e.oidcConfiguration.logoutMode||"redirect";}static mapOidcUserToDomainModel=e=>{let t;e.id_token&&(t=qe__default.default(e.id_token)?.passport);let r={expired:e.expired,idToken:e.id_token,accessToken:e.access_token,refreshToken:e.refresh_token,profile:{sub:e.profile.sub,email:e.profile.email,nickname:e.profile.nickname}};return t?.imx_eth_address&&(r.imx={ethAddress:t.imx_eth_address,starkAddress:t.imx_stark_address,userAdminAddress:t.imx_user_admin_address}),t?.zkevm_eth_address&&(r.zkEvm={ethAddress:t?.zkevm_eth_address,userAdminAddress:t?.zkevm_user_admin_address}),r};static mapDeviceTokenResponseToOidcUser=e=>{let t=qe__default.default(e.id_token);return new oidcClientTs.User({id_token:e.id_token,access_token:e.access_token,refresh_token:e.refresh_token,token_type:e.token_type,profile:{sub:t.sub,iss:t.iss,aud:t.aud,exp:t.exp,iat:t.iat,email:t.email,nickname:t.nickname,passport:t.passport}})};buildExtraQueryParams(e,t){let r={...this.userManager.settings?.extraQueryParams??{},rid:metrics.getDetail(metrics.Detail.RUNTIME_ID)||"",third_party_a_id:e||""};if(t){if(t.directLoginMethod==="email"){let n=t.email;n&&(r.direct=t.directLoginMethod,r.email=n);}else r.direct=t.directLoginMethod;t.marketingConsentStatus&&(r.marketingConsent=t.marketingConsentStatus);}return r}async loginWithRedirect(e,t){return await this.userManager.clearStaleState(),f(async()=>{let r=this.buildExtraQueryParams(e,t);await this.userManager.signinRedirect({extraQueryParams:r});},"AUTHENTICATION_ERROR")}async login(e,t){return f(async()=>{let r;t?r=t:this.config.popupOverlayOptions.disableHeadlessLoginPromptOverlay||(r=await this.embeddedLoginPrompt.displayEmbeddedLoginPrompt());let n=window.crypto.randomUUID(),a=async()=>{let s=this.buildExtraQueryParams(e,r),o=this.userManager.signinPopup({extraQueryParams:s,popupWindowFeatures:{width:410,height:450},popupWindowTarget:n}),c=window.open("",n);if(c){let d=new Promise((l,p)=>{let u=setInterval(()=>{c.closed&&(clearInterval(u),p(new Error("Popup closed by user")));},pr);o.finally(()=>{clearInterval(u),c.close();});});return Promise.race([o,d])}return o};return new Promise((s,o)=>{a().then(c=>{s(i.mapOidcUserToDomainModel(c));}).catch(c=>{if(!(c instanceof Error)||c.message!=="Attempted to navigate on a disposed window"){o(c);return}let d=!1,l=new _(this.config.popupOverlayOptions,!0);l.append(async()=>{try{if(d)window.open("",n);else {d=!0;let p=await a();l.remove(),s(i.mapOidcUserToDomainModel(p));}}catch(p){l.remove(),o(p);}},()=>{l.remove(),o(new Error("Popup closed by user"));});});})},"AUTHENTICATION_ERROR")}async getUserOrLogin(){let e=null;try{e=await this.getUser();}catch(t){I.warn("Failed to retrieve a cached user session",t);}return e||this.login()}static shouldUseSigninPopupCallback(){try{let r=`oidc.${new URLSearchParams(window.location.search).get("state")}`,n=localStorage.getItem(r);return JSON.parse(n||"{}")?.request_type==="si:p"}catch{return !1}}async loginCallback(){return f(async()=>{if(i.shouldUseSigninPopupCallback()){await this.userManager.signinPopupCallback(void 0,!0);return}let e=await this.userManager.signinCallback();if(e)return i.mapOidcUserToDomainModel(e)},"AUTHENTICATION_ERROR")}async getPKCEAuthorizationUrl(e){let t=ue(window.crypto.getRandomValues(new Uint8Array(32))),r=ue(await yr(t)),n=ue(window.crypto.getRandomValues(new Uint8Array(32))),{redirectUri:a,scope:s,audience:o,clientId:c}=this.config.oidcConfiguration;this.deviceCredentialsManager.savePKCEData({state:n,verifier:t});let d=new URL(hr,this.config.authenticationDomain);if(d.searchParams.set("response_type","code"),d.searchParams.set("code_challenge",r),d.searchParams.set("code_challenge_method","S256"),d.searchParams.set("client_id",c),d.searchParams.set("redirect_uri",a),d.searchParams.set("state",n),s&&d.searchParams.set("scope",s),o&&d.searchParams.set("audience",o),e){if(e.directLoginMethod==="email"){let l=e.email;l&&(d.searchParams.set("direct",e.directLoginMethod),d.searchParams.set("email",l));}else d.searchParams.set("direct",e.directLoginMethod);e.marketingConsentStatus&&d.searchParams.set("marketingConsent",e.marketingConsentStatus);}return d.toString()}async loginWithPKCEFlowCallback(e,t){return f(async()=>{let r=this.deviceCredentialsManager.getPKCEData();if(!r)throw new Error("No code verifier or state for PKCE");if(t!==r.state)throw new Error("Provided state does not match stored state");let n=await this.getPKCEToken(e,r.verifier),a=i.mapDeviceTokenResponseToOidcUser(n),s=i.mapOidcUserToDomainModel(a);return await this.userManager.storeUser(a),s},"AUTHENTICATION_ERROR")}async getPKCEToken(e,t){return (await Pt__default.default.post(`${this.config.authenticationDomain}/oauth/token`,{client_id:this.config.oidcConfiguration.clientId,grant_type:"authorization_code",code_verifier:t,code:e,redirect_uri:this.config.oidcConfiguration.redirectUri},mr)).data}async storeTokens(e){return f(async()=>{let t=i.mapDeviceTokenResponseToOidcUser(e),r=i.mapOidcUserToDomainModel(t);return await this.userManager.storeUser(t),r},"AUTHENTICATION_ERROR")}async logout(){return f(async()=>{await this.userManager.revokeTokens(["refresh_token"]),this.logoutMode==="silent"?await this.userManager.signoutSilent():await this.userManager.signoutRedirect();},"LOGOUT_ERROR")}async logoutSilentCallback(e){return this.userManager.signoutSilentCallback(e)}async removeUser(){return this.userManager.removeUser()}async getLogoutUrl(){let e=this.userManager.settings?.metadata?.end_session_endpoint;return e||(I.warn("Failed to get logout URL"),null)}forceUserRefreshInBackground(){this.refreshTokenAndUpdatePromise().catch(e=>{I.warn("Failed to refresh user token",e);});}async forceUserRefresh(){return this.refreshTokenAndUpdatePromise().catch(e=>(I.warn("Failed to refresh user token",e),null))}async refreshTokenAndUpdatePromise(){return this.refreshingPromise?this.refreshingPromise:(this.refreshingPromise=new Promise(async(e,t)=>{try{let r=await this.userManager.signinSilent();if(r){e(i.mapOidcUserToDomainModel(r));return}e(null);}catch(r){let n="AUTHENTICATION_ERROR",a="Failed to refresh token",s=!0;if(r instanceof oidcClientTs.ErrorTimeout?(n="SILENT_LOGIN_ERROR",a=`${a}: ${r.message}`,s=!1):r instanceof oidcClientTs.ErrorResponse?(n="NOT_LOGGED_IN_ERROR",a=`${a}: ${r.message||r.error_description}`):r instanceof Error?a=`${a}: ${r.message}`:typeof r=="string"&&(a=`${a}: ${r}`),s)try{await this.userManager.removeUser();}catch(o){o instanceof Error&&(a=`${a}: Failed to remove user: ${o.message}`);}t(new g(a,n));}finally{this.refreshingPromise=null;}}),this.refreshingPromise)}async getUser(e=t=>!0){if(this.refreshingPromise){let r=await this.refreshingPromise;return r&&e(r)?r:null}let t=await this.userManager.getUser();if(!t)return null;if(!De(t)){let r=i.mapOidcUserToDomainModel(t);if(r&&e(r))return r}if(t.refresh_token){let r=await this.refreshTokenAndUpdatePromise();if(r&&e(r))return r}return null}async getUserZkEvm(){let e=await this.getUser(V);if(!e)throw new Error("Failed to obtain a User with the required ZkEvm attributes");return e}async getUserImx(){let e=await this.getUser(S);if(!e)throw new Error("Failed to obtain a User with the required IMX attributes");return e}};var h=async(i,e,t=!0,r=!0)=>{let n=metrics.trackFlow("passport",e,t);try{return await i(n)}catch(a){throw a instanceof Error?metrics.trackError("passport",e,a,{flowId:n.details.flowId}):n.addEvent("errored"),a}finally{r&&n.addEvent("End");}};var _r="mainnet",U=class{config;magicProviderProxyFactory;magicClient;constructor(e,t){this.config=e,this.magicProviderProxyFactory=t,typeof window<"u"&&(this.magicClient=new magicSdk.Magic(this.config.magicPublishableApiKey,{extensions:[new oidc.OpenIdExtension],network:_r}));}getMagicClient(){if(!this.magicClient)throw new Error("Cannot perform this action outside of the browser");return this.magicClient}async login(e){return f(async()=>h(async t=>{let r=performance.now(),n=this.getMagicClient();return t.addEvent("endMagicClientInit"),await n.openid.loginWithOIDC({jwt:e,providerId:this.config.magicProviderId}),t.addEvent("endLoginWithOIDC"),metrics.trackDuration("passport",t.details.flowName,Math.round(performance.now()-r)),this.magicProviderProxyFactory.createProxy(n)},"magicLogin"),"WALLET_CONNECTION_ERROR")}async logout(){let e=this.getMagicClient();e.user&&await e.user.logout();}};var Ze=async i=>f(async()=>{let e=await xClient.generateLegacyStarkPrivateKey(i);return xClient.createStarkSigner(e)},"WALLET_CONNECTION_ERROR");async function Ke({user:i,starkSigner:e,request:t,exchangesApi:r}){return f(async()=>{let{ethAddress:n}=i.imx,a=t.amount,s=await r.getExchangeSignableTransfer({id:t.transactionID,getSignableTransferRequest:{sender:n,token:toolkit.convertToSignableToken(t),amount:a,receiver:t.receiver}}),o=await e.getAddress(),{payload_hash:c}=s.data,d=await e.signMessage(c),l={sender_stark_key:s.data.sender_stark_key||o,sender_vault_id:s.data.sender_vault_id,receiver_stark_key:s.data.receiver_stark_key,receiver_vault_id:s.data.receiver_vault_id,asset_id:s.data.asset_id,amount:s.data.amount,nonce:s.data.nonce,expiration_timestamp:s.data.expiration_timestamp,stark_signature:d},p={Authorization:`Bearer ${i.accessToken}`},u=await r.createExchangeTransfer({id:t.transactionID,createTransferRequest:l},{headers:p});return {sent_signature:u?.data.sent_signature,status:u?.data.status?.toString(),time:u?.data.time,transfer_id:u?.data.transfer_id}},"EXCHANGE_TRANSFER_ERROR")}var Je="ERC721";async function ze({starkSigner:i,user:e,request:t,ordersApi:r,guardianClient:n}){return f(async()=>{let{ethAddress:a}=e.imx,s=t.sell.type===Je?"1":t.sell.amount,o=t.buy.type===Je?"1":t.buy.amount,c={Authorization:`Bearer ${e.accessToken}`},d={user:a,amount_buy:o,token_buy:toolkit.convertToSignableToken(t.buy),amount_sell:s,token_sell:toolkit.convertToSignableToken(t.sell),fees:t.fees,split_fees:!0,expiration_timestamp:t.expiration_timestamp},l=await r.getSignableOrder({getSignableOrderRequestV3:d},{headers:c});await n.evaluateImxTransaction({payloadHash:l.data.payload_hash});let{payload_hash:p}=l.data,u=await i.signMessage(p),E=l.data,C={createOrderRequest:{include_fees:!0,fees:t.fees,stark_signature:u,amount_buy:E.amount_buy,amount_sell:E.amount_sell,asset_id_buy:E.asset_id_buy,asset_id_sell:E.asset_id_sell,expiration_timestamp:E.expiration_timestamp,nonce:E.nonce,stark_key:E.stark_key,vault_id_buy:E.vault_id_buy,vault_id_sell:E.vault_id_sell}};return {...(await r.createOrderV3(C,{headers:c})).data}},"CREATE_ORDER_ERROR")}async function je({user:i,starkSigner:e,request:t,ordersApi:r,guardianClient:n}){return f(async()=>{let a={order_id:t.order_id},s={Authorization:`Bearer ${i.accessToken}`},o=await r.getSignableCancelOrderV3({getSignableCancelOrderRequest:a},{headers:s});await n.evaluateImxTransaction({payloadHash:o.data.payload_hash});let{payload_hash:c}=o.data,d=await e.signMessage(c),l=await r.cancelOrderV3({id:t.order_id.toString(),cancelOrderRequest:{order_id:t.order_id,stark_signature:d}},{headers:s});return {order_id:l.data.order_id,status:l.data.status}},"CANCEL_ORDER_ERROR")}async function ge({ethSigner:i,starkSigner:e,imxApiClients:t},r){return f(async()=>{let[n,a]=await Promise.all([i.getAddress(),e.getAddress()]),s=await t.usersApi.getSignableRegistrationOffchain({getSignableRegistrationRequest:{ether_key:n,stark_key:a}}),{signable_message:o,payload_hash:c}=s.data,[d,l]=await Promise.all([toolkit.signRaw(o,i),e.signMessage(c)]);return (await t.usersApi.registerPassportUserV2({authorization:`Bearer ${r}`,registerPassportUserRequest:{eth_signature:d,ether_key:n,stark_signature:l,stark_key:a}})).data},"USER_REGISTRATION_ERROR")}async function Ye({request:i,tradesApi:e,user:t,starkSigner:r,guardianClient:n}){return f(async()=>{let{ethAddress:a}=t.imx,s={expiration_timestamp:i.expiration_timestamp,fees:i.fees,order_id:i.order_id,user:a},o={Authorization:`Bearer ${t.accessToken}`},c=await e.getSignableTrade({getSignableTradeRequest:s},{headers:o});await n.evaluateImxTransaction({payloadHash:c.data.payload_hash});let{payload_hash:d}=c.data,l=await r.signMessage(d),{data:p}=c,u={createTradeRequest:{include_fees:!0,fees:i?.fees,stark_signature:l,order_id:i?.order_id,fee_info:p.fee_info,amount_buy:p.amount_buy,amount_sell:p.amount_sell,asset_id_buy:p.asset_id_buy,asset_id_sell:p.asset_id_sell,expiration_timestamp:p.expiration_timestamp,nonce:p.nonce,stark_key:p.stark_key,vault_id_buy:p.vault_id_buy,vault_id_sell:p.vault_id_sell}},{data:E}=await e.createTradeV3(u,{headers:o});return E},"CREATE_TRADE_ERROR")}var et="ERC721";async function tt({request:i,transfersApi:e,starkSigner:t,user:r,guardianClient:n}){return f(async()=>{let a=i.type===et?"1":i.amount,s={sender:r.imx.ethAddress,token:toolkit.convertToSignableToken(i),amount:a,receiver:i.receiver},o={Authorization:`Bearer ${r.accessToken}`},c=await e.getSignableTransferV1({getSignableTransferRequest:s},{headers:o});await n.evaluateImxTransaction({payloadHash:c.data.payload_hash});let d=c.data,{payload_hash:l}=d,p=await t.signMessage(l),u=await t.getAddress(),C={createTransferRequest:{sender_stark_key:d.sender_stark_key||u,sender_vault_id:d.sender_vault_id,receiver_stark_key:d.receiver_stark_key,receiver_vault_id:d.receiver_vault_id,asset_id:d.asset_id,amount:d.amount,nonce:d.nonce,expiration_timestamp:d.expiration_timestamp,stark_signature:p}},{data:y}=await e.createTransferV1(C,{headers:o});return {sent_signature:y.sent_signature,status:y.status?.toString(),time:y.time,transfer_id:y.transfer_id}},"TRANSFER_ERROR")}async function rt({user:i,starkSigner:e,request:t,transfersApi:r,guardianClient:n}){return f(async()=>{let{ethAddress:a}=i.imx,s=t.map(u=>({amount:"1",token:toolkit.convertToSignableToken({type:et,tokenId:u.tokenId,tokenAddress:u.tokenAddress}),receiver:u.receiver})),o={Authorization:`Bearer ${i.accessToken}`},c=await r.getSignableTransfer({getSignableTransferRequestV2:{sender_ether_key:a,signable_requests:s}},{headers:o});await n.evaluateImxTransaction({payloadHash:c.data.signable_responses[0]?.payload_hash});let d=await Promise.all(c.data.signable_responses.map(async u=>{let E=await e.signMessage(u.payload_hash);return {sender_vault_id:u.sender_vault_id,receiver_stark_key:u.receiver_stark_key,receiver_vault_id:u.receiver_vault_id,asset_id:u.asset_id,amount:u.amount,nonce:u.nonce,expiration_timestamp:u.expiration_timestamp,stark_signature:E}})),l={sender_stark_key:c.data.sender_stark_key,requests:d};return {transfer_ids:(await r.createTransfer({createTransferRequestV2:l},{headers:o}))?.data.transfer_ids}},"TRANSFER_ERROR")}var br=i=>new Promise(e=>{setTimeout(()=>e(),i);}),O=async(i,e)=>{let{retries:t=3,interval:r=1e3,finalErr:n=Error("Retry failed"),finallyFn:a=()=>{}}=e||{};try{return await i()}catch{return t<=0?Promise.reject(n):(await br(r),O(i,{retries:t-1,finalErr:n,finallyFn:a}))}finally{t<=0&&a();}};async function nt(i){await O(async()=>{let e=await i.forceUserRefresh();return e?.imx?e:Promise.reject(new Error("user wallet addresses not exist"))});}async function he(i,e,t,r,n){return f(async()=>{try{let a=await ge({ethSigner:i,starkSigner:e,imxApiClients:n},t.accessToken);return await nt(r),a}catch(a){if(Pt__default.default.isAxiosError(a)&&a.response?.status===409)return await nt(r),{tx_hash:""};throw a}},"USER_REGISTRATION_ERROR")}var K=class{authManager;immutableXClient;guardianClient;imxApiClients;magicAdapter;signers;signerInitialisationError;constructor({authManager:e,immutableXClient:t,passportEventEmitter:r,magicAdapter:n,imxApiClients:a,guardianClient:s}){this.authManager=e,this.immutableXClient=t,this.magicAdapter=n,this.imxApiClients=a,this.guardianClient=s,this.#i(),r.on("loggedOut",this.handleLogout);}handleLogout=()=>{this.signers=void 0;};#i(){let e=async()=>{let t=await this.authManager.getUser(),r=await this.magicAdapter.login(t.idToken),a=await new ethers.BrowserProvider(r).getSigner(),s=await Ze(a);return {ethSigner:a,starkSigner:s}};this.signers=new Promise(async t=>{try{t(await e());}catch(r){this.signerInitialisationError=r,t(void 0);}});}async#t(){let e=await this.authManager.getUser();if(!e||!this.signers)throw new g("User has been logged out","NOT_LOGGED_IN_ERROR");return e}async#a(){let e=await this.signers;if(typeof e>"u")throw typeof this.signerInitialisationError<"u"?this.signerInitialisationError:new Error("Signers failed to initialise");return e}async#r(){let[e,t]=await Promise.all([this.#t(),this.#a()]);if(!S(e))throw new g("User has not been registered with StarkEx","USER_NOT_REGISTERED_ERROR");return {user:e,starkSigner:t.starkSigner,ethSigner:t.ethSigner}}async transfer(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#r();return tt({request:e,user:t,starkSigner:r,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.guardianClient})})(),"imxTransfer")}async registerOffchain(){return h(async()=>{let[e,t]=await Promise.all([this.#t(),this.#a()]);return await he(t.ethSigner,t.starkSigner,e,this.authManager,this.imxApiClients)},"imxRegisterOffchain")}async isRegisteredOffchain(){return h(async()=>!!(await this.#t()).imx,"imxIsRegisteredOffchain")}isRegisteredOnchain(){throw new g("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async createOrder(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#r();return ze({request:e,user:t,starkSigner:r,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.guardianClient})})(),"imxCreateOrder")}async cancelOrder(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#r();return je({request:e,user:t,starkSigner:r,ordersApi:this.immutableXClient.ordersApi,guardianClient:this.guardianClient})})(),"imxCancelOrder")}async createTrade(e){return h(()=>this.guardianClient.withDefaultConfirmationScreenTask(async()=>{let{user:t,starkSigner:r}=await this.#r();return Ye({request:e,user:t,starkSigner:r,tradesApi:this.immutableXClient.tradesApi,guardianClient:this.guardianClient})})(),"imxCreateTrade")}async batchNftTransfer(e){return h(()=>this.guardianClient.withConfirmationScreenTask({width:480,height:784})(async()=>{let{user:t,starkSigner:r}=await this.#r();return rt({request:e,user:t,starkSigner:r,transfersApi:this.immutableXClient.transfersApi,guardianClient:this.guardianClient})})(),"imxBatchNftTransfer")}async exchangeTransfer(e){return h(async()=>{let{user:t,starkSigner:r}=await this.#r();return Ke({request:e,user:t,starkSigner:r,exchangesApi:this.immutableXClient.exchangeApi})},"imxExchangeTransfer")}deposit(e){throw new g("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}prepareWithdrawal(e){throw new g("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}completeWithdrawal(e,t){throw new g("Operation not supported","OPERATION_NOT_SUPPORTED_ERROR")}async getAddress(){return h(async()=>{let e=await this.#t();if(!S(e))throw new g("User has not been registered with StarkEx","USER_NOT_REGISTERED_ERROR");return Promise.resolve(e.imx.ethAddress)},"imxGetAddress")}};var X=class{authManager;immutableXClient;magicAdapter;passportEventEmitter;imxApiClients;guardianClient;constructor({authManager:e,immutableXClient:t,magicAdapter:r,passportEventEmitter:n,imxApiClients:a,guardianClient:s}){this.authManager=e,this.immutableXClient=t,this.magicAdapter=r,this.passportEventEmitter=n,this.imxApiClients=a,this.guardianClient=s;}async getProvider(){let e=await this.authManager.getUserOrLogin();return this.createProviderInstance(e)}async getProviderSilent(){let e=await this.authManager.getUser();return e?this.createProviderInstance(e):null}async createProviderInstance(e){if(!e.idToken)throw new g("Failed to initialise","WALLET_CONNECTION_ERROR");return new K({authManager:this.authManager,immutableXClient:this.immutableXClient,passportEventEmitter:this.passportEventEmitter,magicAdapter:this.magicAdapter,imxApiClients:this.imxApiClients,guardianClient:this.guardianClient})}};var ot=(i,e,t)=>{let r=e.map(n=>!i[n]&&n).filter(n=>n).join(", ");if(r!==""){let n=t?`${t} - ${r} cannot be null`:`${r} cannot be null`;throw new g(n,"INVALID_CONFIGURATION")}},J=class{authenticationDomain;passportDomain;imxPublicApiDomain;magicPublishableApiKey;magicProviderId;oidcConfiguration;baseConfig;zkEvmRpcUrl;relayerUrl;multiRollupConfig;crossSdkBridgeEnabled;forceScwDeployBeforeMessageSignature;popupOverlayOptions;constructor({baseConfig:e,overrides:t,crossSdkBridgeEnabled:r,jsonRpcReferrer:n,forceScwDeployBeforeMessageSignature:a,popupOverlayOptions:s,...o}){if(ot(o,["clientId","redirectUri"]),this.oidcConfiguration=o,this.baseConfig=e,this.crossSdkBridgeEnabled=r||!1,this.forceScwDeployBeforeMessageSignature=a||!1,this.popupOverlayOptions=s||{disableGenericPopupOverlay:!1,disableBlockedPopupOverlay:!1,disableHeadlessLoginPromptOverlay:!1},t)ot(t,["authenticationDomain","passportDomain","magicPublishableApiKey","magicProviderId","zkEvmRpcUrl","relayerUrl","imxPublicApiDomain","indexerMrBasePath","orderBookMrBasePath","passportMrBasePath"],"overrides"),this.authenticationDomain=t.authenticationDomain,this.passportDomain=t.passportDomain,this.imxPublicApiDomain=t.imxPublicApiDomain,this.magicPublishableApiKey=t.magicPublishableApiKey,this.magicProviderId=t.magicProviderId,this.zkEvmRpcUrl=t.zkEvmRpcUrl,this.relayerUrl=t.relayerUrl,this.multiRollupConfig={indexer:Ie.createConfig({basePath:t.indexerMrBasePath}),orderBook:Ie.createConfig({basePath:t.orderBookMrBasePath}),passport:Ie.createConfig({basePath:t.passportMrBasePath})};else switch(e.environment){case config.Environment.PRODUCTION:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="fSMzaRQ4O7p4fttl7pCyGVtJS_G70P8SNsLXtPPGHo0=",this.passportDomain="https://passport.immutable.com",this.imxPublicApiDomain="https://api.immutable.com",this.zkEvmRpcUrl="https://rpc.immutable.com",this.relayerUrl="https://api.immutable.com/relayer-mr",this.multiRollupConfig=Ie.multiRollupConfig.getProduction();break}case config.Environment.SANDBOX:default:{this.authenticationDomain="https://auth.immutable.com",this.magicPublishableApiKey="pk_live_10F423798A540ED7",this.magicProviderId="fSMzaRQ4O7p4fttl7pCyGVtJS_G70P8SNsLXtPPGHo0=",this.passportDomain="https://passport.sandbox.immutable.com",this.imxPublicApiDomain="https://api.sandbox.immutable.com",this.zkEvmRpcUrl="https://rpc.testnet.immutable.com",this.relayerUrl="https://api.sandbox.immutable.com/relayer-mr",this.multiRollupConfig=Ie.multiRollupConfig.getSandbox();break}}}};var G="imx_passport_confirmation",ct="im_passport_embedded_login_prompt";var z=({url:i,title:e,width:t,height:r})=>{let n=Math.max(0,Math.round(window.screenX+(window.outerWidth-t)/2)),a=Math.max(0,Math.round(window.screenY+(window.outerHeight-r)/2)),s=window.open(i,e,`
|
|
363
395
|
scrollbars=yes,
|
|
364
396
|
width=${t},
|
|
365
397
|
height=${r},
|
|
366
398
|
top=${a},
|
|
367
|
-
left=${
|
|
368
|
-
`);if(!s)throw new Error("Failed to open confirmation screen");return s.focus(),s};var
|
|
399
|
+
left=${n}
|
|
400
|
+
`);if(!s)throw new Error("Failed to open confirmation screen");return s.focus(),s};var Ee="Confirm this transaction",ye=720,Re=480,dt=1e3;var x=class{config;confirmationWindow;popupOptions;overlay;overlayClosed;timer;constructor(e){this.config=e,this.overlayClosed=!1;}getHref(e,t){let r=`${this.config.passportDomain}/transaction-confirmation/${e}`;if(t){let n=t?Object.keys(t).map(a=>`${a}=${t[a]}`).join("&"):"";r=`${r}?${n}`;}return r}requestConfirmation(e,t,r,n){return new Promise((a,s)=>{let o=({data:d,origin:l})=>{if(!(l!==this.config.passportDomain||d.eventType!==G))switch(d.messageType){case"confirmation_window_ready":{this.confirmationWindow?.postMessage({eventType:G,messageType:"confirmation_start"},this.config.passportDomain);break}case"transaction_confirmed":{this.closeWindow(),a({confirmed:!0});break}case"transaction_rejected":{this.closeWindow(),a({confirmed:!1});break}case"transaction_error":{this.closeWindow(),s(new Error("Error during transaction confirmation"));break}default:this.closeWindow(),s(new Error("Unsupported message type"));}},c="";r===Ie__namespace.mr.TransactionApprovalRequestChainTypeEnum.Starkex?c=this.getHref("transaction",{transactionId:e,etherAddress:t,chainType:r}):c=this.getHref("zkevm/transaction",{transactionID:e,etherAddress:t,chainType:r,chainID:n}),window.addEventListener("message",o),this.showConfirmationScreen(c,o,a);})}requestMessageConfirmation(e,t,r){return new Promise((n,a)=>{let s=({data:c,origin:d})=>{if(!(d!==this.config.passportDomain||c.eventType!==G))switch(c.messageType){case"confirmation_window_ready":{this.confirmationWindow?.postMessage({eventType:G,messageType:"confirmation_start"},this.config.passportDomain);break}case"message_confirmed":{this.closeWindow(),n({confirmed:!0});break}case"message_rejected":{this.closeWindow(),n({confirmed:!1});break}case"message_error":{this.closeWindow(),a(new Error("Error during message confirmation"));break}default:this.closeWindow(),a(new Error("Unsupported message type"));}};window.addEventListener("message",s);let o=this.getHref("zkevm/message",{messageID:e,etherAddress:t,...r?{messageType:r}:{}});this.showConfirmationScreen(o,s,n);})}showServiceUnavailable(){return new Promise((e,t)=>{this.showConfirmationScreen(this.getHref("unavailable"),()=>{},()=>{this.closeWindow(),t(new Error("Service unavailable"));});})}loading(e){if(!this.config.crossSdkBridgeEnabled){this.popupOptions=e;try{this.confirmationWindow=z({url:this.getHref("loading"),title:Ee,width:e?.width||Re,height:e?.height||ye}),this.overlay=new _(this.config.popupOverlayOptions);}catch(t){let r=t instanceof Error?t.message:String(t);metrics.trackError("passport","confirmationPopupDenied",new Error(r)),this.overlay=new _(this.config.popupOverlayOptions,!0);}this.overlay.append(()=>{try{this.confirmationWindow?.close(),this.confirmationWindow=z({url:this.getHref("loading"),title:Ee,width:this.popupOptions?.width||Re,height:this.popupOptions?.height||ye});}catch{}},()=>{this.overlayClosed=!0,this.closeWindow();});}}closeWindow(){this.confirmationWindow?.close(),this.overlay?.remove(),this.overlay=void 0;}showConfirmationScreen(e,t,r){if(this.confirmationWindow&&(this.confirmationWindow.location.href=e),!this.overlay){this.overlayClosed=!1,r({confirmed:!1});return}let n=()=>{(this.confirmationWindow?.closed||this.overlayClosed)&&(clearInterval(this.timer),window.removeEventListener("message",t),r({confirmed:!1}),this.overlayClosed=!1,this.confirmationWindow=void 0);};this.timer=setInterval(n,dt),this.overlay.update(()=>this.recreateConfirmationWindow(e,n));}recreateConfirmationWindow(e,t){try{clearInterval(this.timer),this.confirmationWindow?.close(),this.confirmationWindow=z({url:e,title:Ee,width:this.popupOptions?.width||Re,height:this.popupOptions?.height||ye}),this.timer=setInterval(t,dt);}catch{}}};var T=class{static overlay;static onCloseListener;static closeButton;static remove(){this.onCloseListener&&this.closeButton?.removeEventListener?.("click",this.onCloseListener),this.overlay?.remove(),this.closeButton=void 0,this.onCloseListener=void 0,this.overlay=void 0;}static appendOverlay(e,t){if(!this.overlay){let r=document.createElement("div");r.innerHTML=Ve(),document.body.insertAdjacentElement("beforeend",r);let n=document.querySelector(`#${L}`);n&&n.appendChild(e),r.addEventListener("click",t),this.overlay=r;}}};var Nr=560,Lr=440,Dr="16px",pt="passport-embedded-login-keyframes",mt="passport-embedded-login-iframe",M=class i{config;constructor(e){this.config=e;}getHref=()=>`${this.config.authenticationDomain}/im-embedded-login-prompt?client_id=${this.config.oidcConfiguration.clientId}`;static appendIFrameStylesIfNeeded=()=>{if(document.getElementById(pt))return;let e=document.createElement("style");e.id=pt,e.textContent=`
|
|
401
|
+
@keyframes passportEmbeddedLoginPromptPopBounceIn {
|
|
402
|
+
0% {
|
|
403
|
+
opacity: 0.5;
|
|
404
|
+
transform: scale(0.9);
|
|
405
|
+
}
|
|
406
|
+
50% {
|
|
407
|
+
opacity: 1;
|
|
408
|
+
transform: scale(1.05);
|
|
409
|
+
}
|
|
410
|
+
75% {
|
|
411
|
+
transform: scale(0.98);
|
|
412
|
+
}
|
|
413
|
+
100% {
|
|
414
|
+
opacity: 1;
|
|
415
|
+
transform: scale(1);
|
|
416
|
+
}
|
|
417
|
+
}
|
|
418
|
+
|
|
419
|
+
@media (max-height: 400px) {
|
|
420
|
+
#${mt} {
|
|
421
|
+
width: 100% !important;
|
|
422
|
+
max-width: none !important;
|
|
423
|
+
}
|
|
424
|
+
}
|
|
425
|
+
|
|
426
|
+
@keyframes passportEmbeddedLoginPromptOverlayFadeIn {
|
|
427
|
+
from {
|
|
428
|
+
opacity: 0;
|
|
429
|
+
}
|
|
430
|
+
to {
|
|
431
|
+
opacity: 1;
|
|
432
|
+
}
|
|
433
|
+
}
|
|
434
|
+
`,document.head.appendChild(e);};getEmbeddedLoginIFrame=()=>{let e=document.createElement("iframe");return e.id=mt,e.src=this.getHref(),e.style.height="100vh",e.style.width="100vw",e.style.maxHeight=`${Nr}px`,e.style.maxWidth=`${Lr}px`,e.style.borderRadius=Dr,e.style.opacity="0",e.style.transform="scale(0.9)",e.style.animation="passportEmbeddedLoginPromptPopBounceIn 0.8s ease 0.2s forwards",i.appendIFrameStylesIfNeeded(),e};displayEmbeddedLoginPrompt(){return new Promise((e,t)=>{let r=this.getEmbeddedLoginIFrame(),n=({data:a,origin:s})=>{if(!(s!==this.config.authenticationDomain||a.eventType!==ct))switch(a.messageType){case"login_method_selected":{let o=a.payload,c;o.directLoginMethod==="email"?c={directLoginMethod:"email",marketingConsentStatus:o.marketingConsentStatus,email:o.email}:c={directLoginMethod:o.directLoginMethod,marketingConsentStatus:o.marketingConsentStatus},window.removeEventListener("message",n),T.remove(),e(c);break}case"login_prompt_error":{window.removeEventListener("message",n),T.remove(),t(new Error("Error during embedded login prompt",{cause:a.payload}));break}case"login_prompt_closed":{window.removeEventListener("message",n),T.remove(),t(new Error("Popup closed by user"));break}default:window.removeEventListener("message",n),T.remove(),t(new Error("Unsupported message type"));break}};window.addEventListener("message",n),T.appendOverlay(r,()=>{window.removeEventListener("message",n),T.remove(),t(new Error("Popup closed by user"));});})}};var Ce=(e=>(e.ACCOUNTS_CHANGED="accountsChanged",e))(Ce||{});var b=class{emitter=new events.EventEmitter;emit(e,...t){this.emitter.emit(e,...t);}on(e,t){this.emitter.on(e,t);}removeListener(e,t){this.emitter.removeListener(e,t);}};var ft=1,qr=1,Zr=2,Et="02",Kr="",yt=`tuple(
|
|
369
435
|
bool delegateCall,
|
|
370
436
|
bool revertOnError,
|
|
371
437
|
uint256 gasLimit,
|
|
372
438
|
address target,
|
|
373
439
|
uint256 value,
|
|
374
440
|
bytes data
|
|
375
|
-
)[]`,Ce=n=>n.map(e=>({delegateCall:e.delegateCall===!0,revertOnError:e.revertOnError===!0,gasLimit:e.gasLimit??BigInt(0),target:e.to??ethers.ZeroAddress,value:e.value??BigInt(0),data:e.data??"0x"})),Gr=(n,e)=>{let t=ethers.AbiCoder.defaultAbiCoder().encode(["uint256",lt],[n,e]);return ethers.keccak256(t)},pt=n=>ethers.AbiCoder.defaultAbiCoder().encode([lt],[n]),Fr=n=>n||0n,Br=(n,e)=>{let t=BigInt(n)*2n**96n;return BigInt(e)+t},J=async(n,e,t)=>{try{let r=new ethers.Contract(e,abi.walletContracts.mainModule.abi,n),i=Fr(t),a=await r.readNonce(i);if(typeof a=="bigint")return Br(i,a);throw new Error("Unexpected result from contract.nonce() call.")}catch(r){if(ethers.isError(r,"BAD_DATA"))return BigInt(0);throw r}},Re=(n,e,t)=>ethers.solidityPacked(["string","uint256","address","bytes32"],[Lr,n,e,t]),Te=async(n,e,t,r,i)=>{let a=Ce(n),s=Gr(e,a),o=Re(t,r,s),c=ethers.keccak256(o),d=ethers.getBytes(c),l=performance.now(),p=await i.signMessage(d);metrics.trackDuration("passport","magicSignMessageGetSignedMetaTransactions",Math.round(performance.now()-l));let u=`${p}${dt}`,E=core.v1.signature.encodeSignature({version:1,threshold:Dr,signers:[{isDynamic:!1,unrecovered:!0,weight:ct,signature:u}]}),R=new ethers.Interface(abi.walletContracts.mainModule.abi);return R.encodeFunctionData(R.getFunction("execute")??"",[a,e,E])},Vr=n=>{let e=`0x0000${n}`;return core.v1.signature.decodeSignature(e)},ve=(n,e,t)=>{let r=`${n}${dt}`,{signers:i}=Vr(t),s=[...i,{isDynamic:!1,unrecovered:!0,weight:ct,signature:r,address:e}].sort((o,c)=>{let d=BigInt(o.address??0),l=BigInt(c.address??0);return d<=l?-1:d===l?0:1});return core.v1.signature.encodeSignature({version:1,threshold:Ur,signers:s})},mt=async(n,e,t,r,i)=>{let a={...n.types};delete a.EIP712Domain;let s=ethers.TypedDataEncoder.hash(n.domain,a,n.message),o=Re(t,r,s),c=ethers.keccak256(o),d=ethers.getBytes(c),l=performance.now(),p=await i.signMessage(d);metrics.trackDuration("passport","magicSignMessageTypedData",Math.round(performance.now()-l));let u=await i.getAddress();return ve(p,u,e)},ut=async(n,e,t,r)=>{let i=ethers.hashMessage(e),a=Re(n,r,i),s=ethers.keccak256(a),o=ethers.getBytes(s);return t.signMessage(o)},T=n=>`eip155:${n}`;var z=class n{config;rpcProvider;authManager;constructor({config:e,rpcProvider:t,authManager:r}){this.config=e,this.rpcProvider=t,this.authManager=r;}static getResponsePreview(e){return e.length>100?`${e.substring(0,50)}...${e.substring(e.length-50)}`:e}async postToRelayer(e){let t={id:1,jsonrpc:"2.0",...e},r=await this.authManager.getUserZkEvm(),i=await fetch(`${this.config.relayerUrl}/v1/transactions`,{method:"POST",headers:{Authorization:`Bearer ${r.accessToken}`,"Content-Type":"application/json"},body:JSON.stringify(t)}),a=await i.text();if(!i.ok){let o=n.getResponsePreview(a);throw new Error(`Relayer HTTP error: ${i.status}. Content: "${o}"`)}let s;try{s=JSON.parse(a);}catch(o){let c=n.getResponsePreview(a);throw new Error(`Relayer JSON parse error: ${o instanceof Error?o.message:"Unknown error"}. Content: "${c}"`)}if(s.error)throw new Error(s.error);return s}async ethSendTransaction(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),i={method:"eth_sendTransaction",params:[{to:e,data:t,chainId:T(Number(r))}]},{result:a}=await this.postToRelayer(i);return a}async imGetTransactionByHash(e){let t={method:"im_getTransactionByHash",params:[e]},{result:r}=await this.postToRelayer(t);return r}async imGetFeeOptions(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),i={method:"im_getFeeOptions",params:[{userAddress:e,data:t,chainId:T(Number(r))}]},{result:a}=await this.postToRelayer(i);return a}async imSignTypedData(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),i={method:"im_signTypedData",params:[{address:e,eip712Payload:t,chainId:T(Number(r))}]},{result:a}=await this.postToRelayer(i);return a}async imSign(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),i={method:"im_sign",params:[{address:e,message:t,chainId:T(Number(r))}]},{result:a}=await this.postToRelayer(i);return a}};var j=(i=>(i[i.USER_REJECTED_REQUEST=4001]="USER_REJECTED_REQUEST",i[i.UNAUTHORIZED=4100]="UNAUTHORIZED",i[i.UNSUPPORTED_METHOD=4200]="UNSUPPORTED_METHOD",i[i.DISCONNECTED=4900]="DISCONNECTED",i))(j||{}),v=(o=>(o[o.RPC_SERVER_ERROR=-32e3]="RPC_SERVER_ERROR",o[o.INVALID_REQUEST=-32600]="INVALID_REQUEST",o[o.METHOD_NOT_FOUND=-32601]="METHOD_NOT_FOUND",o[o.INVALID_PARAMS=-32602]="INVALID_PARAMS",o[o.INTERNAL_ERROR=-32603]="INTERNAL_ERROR",o[o.PARSE_ERROR=-32700]="PARSE_ERROR",o[o.TRANSACTION_REJECTED=-32003]="TRANSACTION_REJECTED",o))(v||{}),m=class extends Error{message;code;constructor(e,t){super(t),this.message=t,this.code=e;}};var Wr="Only sign this message from Immutable Passport";async function gt({authManager:n,ethSigner:e,multiRollupApiClients:t,accessToken:r,rpcProvider:i,flow:a}){let s=e.getAddress();s.then(()=>a.addEvent("endGetAddress"));let o=toolkit.signRaw(Wr,e);o.then(()=>a.addEvent("endSignRaw"));let c=i.getNetwork();c.then(()=>a.addEvent("endDetectNetwork"));let d=t.chainsApi.listChains();d.then(()=>a.addEvent("endListChains"));let[l,p,u,E]=await Promise.all([s,o,c,d]),R=T(Number(u.chainId)),y=E.data?.result?.find(P=>P.id===R)?.name;if(!y)throw new m(-32603,`Chain name does not exist on for chain id ${u.chainId}`);try{let P=await t.passportApi.createCounterfactualAddressV2({chainName:y,createCounterfactualAddressRequest:{ethereum_address:l,ethereum_signature:p}},{headers:{Authorization:`Bearer ${r}`}});return a.addEvent("endCreateCounterfactualAddress"),n.forceUserRefreshInBackground(),P.data.counterfactual_address}catch(P){throw new m(-32603,`Failed to create counterfactual address: ${P}`)}}var Y="Transaction requires confirmation but this functionality is not supported in this environment. Please contact Immutable support if you need to enable this feature.",Q=n=>BigInt(n).toString(),$r=n=>{try{return n.map(e=>({delegateCall:e.delegateCall===!0,revertOnError:e.revertOnError===!0,gasLimit:e.gasLimit?Q(e.gasLimit):"0",target:e.to??ethers.ZeroAddress,value:e.value?Q(e.value):"0",data:e.data?e.data.toString():"0x"}))}catch(e){let t=e instanceof Error?e.message:String(e);throw new m(-32602,`Transaction failed to parsing: ${t}`)}},U=class{guardianApi;confirmationScreen;crossSdkBridgeEnabled;authManager;constructor({confirmationScreen:e,config:t,authManager:r,guardianApi:i}){this.confirmationScreen=e,this.crossSdkBridgeEnabled=t.crossSdkBridgeEnabled,this.guardianApi=i,this.authManager=r;}withConfirmationScreen(e){return t=>this.withConfirmationScreenTask(e)(t)()}withConfirmationScreenTask(e){return t=>async()=>{this.confirmationScreen.loading(e);try{return await t()}catch(r){throw r instanceof g&&r.type==="SERVICE_UNAVAILABLE_ERROR"?(await this.confirmationScreen.showServiceUnavailable(),r):(this.confirmationScreen.closeWindow(),r)}}}withDefaultConfirmationScreenTask(e){return this.withConfirmationScreenTask()(e)}async evaluateImxTransaction({payloadHash:e}){try{let t=()=>{this.confirmationScreen.closeWindow();},r=await this.authManager.getUserImx(),i={Authorization:`Bearer ${r.accessToken}`};if(!(await S(async()=>this.guardianApi.getTransactionByID({transactionID:e,chainType:"starkex"},{headers:i}),{finallyFn:t})).data.id)throw new Error("Transaction doesn't exists");let s=await this.guardianApi.evaluateTransaction({id:e,transactionEvaluationRequest:{chainType:"starkex"}},{headers:i}),{confirmationRequired:o}=s.data;if(o){if(this.crossSdkBridgeEnabled)throw new Error(Y);if(!(await this.confirmationScreen.requestConfirmation(e,r.imx.ethAddress,we__namespace.mr.TransactionApprovalRequestChainTypeEnum.Starkex)).confirmed)throw new Error("Transaction rejected by user")}else this.confirmationScreen.closeWindow();}catch(t){throw ht__default.default.isAxiosError(t)&&t.response?.status===403?new g("Service unavailable","SERVICE_UNAVAILABLE_ERROR"):t}}async evaluateEVMTransaction({chainId:e,nonce:t,metaTransactions:r}){let i=await this.authManager.getUserZkEvm(),a={Authorization:`Bearer ${i.accessToken}`},s=$r(r);try{return (await this.guardianApi.evaluateTransaction({id:"evm",transactionEvaluationRequest:{chainType:"evm",chainId:e,transactionData:{nonce:t,userAddress:i.zkEvm.ethAddress,metaTransactions:s}}},{headers:a})).data}catch(o){if(ht__default.default.isAxiosError(o)&&o.response?.status===403)throw new g("Service unavailable","SERVICE_UNAVAILABLE_ERROR");let c=o instanceof Error?o.message:String(o);throw new m(-32603,`Transaction failed to validate with error: ${c}`)}}async validateEVMTransaction({chainId:e,nonce:t,metaTransactions:r,isBackgroundTransaction:i}){let a=await this.evaluateEVMTransaction({chainId:e,nonce:t,metaTransactions:r}),{confirmationRequired:s,transactionId:o}=a;if(s&&this.crossSdkBridgeEnabled)throw new m(-32003,Y);if(s&&o){let c=await this.authManager.getUserZkEvm();if(!(await this.confirmationScreen.requestConfirmation(o,c.zkEvm.ethAddress,we__namespace.mr.TransactionApprovalRequestChainTypeEnum.Evm,e)).confirmed)throw new m(-32003,"Transaction rejected by user")}else i||this.confirmationScreen.closeWindow();}async handleEIP712MessageEvaluation({chainID:e,payload:t}){try{let r=await this.authManager.getUserZkEvm();if(r===null)throw new m(4100,"User not logged in. Please log in first.");return (await this.guardianApi.evaluateMessage({messageEvaluationRequest:{chainID:e,payload:t}},{headers:{Authorization:`Bearer ${r.accessToken}`}})).data}catch(r){let i=r instanceof Error?r.message:String(r);throw new m(-32603,`Message failed to validate with error: ${i}`)}}async evaluateEIP712Message({chainID:e,payload:t}){let{messageId:r,confirmationRequired:i}=await this.handleEIP712MessageEvaluation({chainID:e,payload:t});if(i&&this.crossSdkBridgeEnabled)throw new m(-32003,Y);if(i&&r){let a=await this.authManager.getUserZkEvm();if(!(await this.confirmationScreen.requestMessageConfirmation(r,a.zkEvm.ethAddress,"eip712")).confirmed)throw new m(-32003,"Signature rejected by user")}else this.confirmationScreen.closeWindow();}async handleERC191MessageEvaluation({chainID:e,payload:t}){try{let r=await this.authManager.getUserZkEvm();if(r===null)throw new m(4100,"User not logged in. Please log in first.");return (await this.guardianApi.evaluateErc191Message({eRC191MessageEvaluationRequest:{chainID:T(Number(e)),payload:t}},{headers:{Authorization:`Bearer ${r.accessToken}`}})).data}catch(r){let i=r instanceof Error?r.message:String(r);throw new m(-32603,`Message failed to validate with error: ${i}`)}}async evaluateERC191Message({chainID:e,payload:t}){let{messageId:r,confirmationRequired:i}=await this.handleERC191MessageEvaluation({chainID:e,payload:t});if(i&&this.crossSdkBridgeEnabled)throw new m(-32003,Y);if(i&&r){let a=await this.authManager.getUserZkEvm();if(!(await this.confirmationScreen.requestMessageConfirmation(r,a.zkEvm.ethAddress,"erc191")).confirmed)throw new m(-32003,"Signature rejected by user")}else this.confirmationScreen.closeWindow();}};var Zr=30,Kr=1e3,Xr=async(n,e,t)=>{let r=Ce([n]),i=pt(r),a=await t.imGetFeeOptions(e,i);if(!a||!Array.isArray(a))throw new Error("Invalid fee options received from relayer");let s=a.find(o=>o.tokenSymbol==="IMX");if(!s)throw new Error("Failed to retrieve fees for IMX token");return s},Jr=async(n,e,t,r,i)=>{if(!n.to)throw new m(-32602,'eth_sendTransaction requires a "to" field');let a={to:n.to.toString(),data:n.data,nonce:BigInt(0),value:n.value,revertOnError:!0},[s,o]=await Promise.all([J(e,r,i),Xr(a,r,t)]),c=[{...a,nonce:s}],d=BigInt(o.tokenPrice);return d!==BigInt(0)&&c.push({nonce:s,to:o.recipientAddress,value:d,revertOnError:!0}),c},ee=async(n,e,t)=>{let i=await S(async()=>{let a=await n.imGetTransactionByHash(e);if(a.status==="PENDING")throw new Error;return a},{retries:Zr,interval:Kr,finalErr:new m(-32e3,"transaction hash not generated in time")});if(t.addEvent("endRetrieveRelayerTransaction"),!["SUBMITTED","SUCCESSFUL"].includes(i.status)){let a=`Transaction failed to submit with status ${i.status}.`;throw i.statusMessage&&(a+=` Error message: ${i.statusMessage}`),new m(-32e3,a)}return i},te=async({transactionRequest:n,ethSigner:e,rpcProvider:t,guardianClient:r,relayerClient:i,zkEvmAddress:a,flow:s,nonceSpace:o,isBackgroundTransaction:c})=>{let{chainId:d}=await t.getNetwork(),l=BigInt(d);s.addEvent("endDetectNetwork");let p=await Jr(n,t,i,a,o);s.addEvent("endBuildMetaTransactions");let{nonce:u}=p[0];if(typeof u>"u")throw new Error("Failed to retrieve nonce from the smart wallet");let E=async()=>{await r.validateEVMTransaction({chainId:T(Number(d)),nonce:Q(u),metaTransactions:p,isBackgroundTransaction:c}),s.addEvent("endValidateEVMTransaction");},R=async()=>{let Lt=await Te(p,u,l,a,e);return s.addEvent("endGetSignedMetaTransactions"),Lt},[,y]=await Promise.all([E(),R()]),P=await i.ethSendTransaction(a,y);return s.addEvent("endRelayerSendTransaction"),{signedTransactions:y,relayerId:P,nonce:u}},zr=async n=>{if(!n.to)throw new m(-32602,'im_signEjectionTransaction requires a "to" field');if(typeof n.nonce>"u")throw new m(-32602,'im_signEjectionTransaction requires a "nonce" field');if(!n.chainId)throw new m(-32602,'im_signEjectionTransaction requires a "chainId" field');return [{to:n.to.toString(),data:n.data,nonce:n.nonce??void 0,value:n.value,revertOnError:!0}]},ft=async({transactionRequest:n,ethSigner:e,zkEvmAddress:t,flow:r})=>{let i=await zr(n);r.addEvent("endBuildMetaTransactions");let a=await Te(i,n.nonce,BigInt(n.chainId??0),t,e);return r.addEvent("endGetSignedMetaTransactions"),{to:t,data:a,chainId:T(Number(n.chainId??0))}};var _e=async({params:n,ethSigner:e,rpcProvider:t,relayerClient:r,guardianClient:i,zkEvmAddress:a,flow:s,nonceSpace:o,isBackgroundTransaction:c=!1})=>{let d=n[0],{relayerId:l}=await te({transactionRequest:d,ethSigner:e,rpcProvider:t,guardianClient:i,relayerClient:r,zkEvmAddress:a,flow:s,nonceSpace:o,isBackgroundTransaction:c}),{hash:p}=await ee(r,l,s);return p};var Et=["types","domain","primaryType","message"],jr=n=>Et.every(e=>e in n),Yr=(n,e)=>{let t;if(typeof n=="string")try{t=JSON.parse(n);}catch(i){throw new m(-32602,`Failed to parse typed data JSON: ${i}`)}else if(typeof n=="object")t=n;else throw new m(-32602,`Invalid typed data argument: ${n}`);if(!jr(t))throw new m(-32602,`Invalid typed data argument. The following properties are required: ${Et.join(", ")}`);let r=t.domain?.chainId;if(r&&(typeof r=="string"&&(r.startsWith("0x")?t.domain.chainId=parseInt(r,16).toString():t.domain.chainId=parseInt(r,10).toString()),BigInt(t.domain.chainId??0)!==e))throw new m(-32602,`Invalid chainId, expected ${e}`);return t},yt=async({params:n,method:e,ethSigner:t,rpcProvider:r,relayerClient:i,guardianClient:a,flow:s})=>{let o=n[0],c=n[1];if(!o||!c)throw new m(-32602,`${e} requires an address and a typed data JSON`);let{chainId:d}=await r.getNetwork(),l=Yr(c,d);s.addEvent("endDetectNetwork"),await a.evaluateEIP712Message({chainID:String(d),payload:l}),s.addEvent("endValidateMessage");let p=await i.imSignTypedData(o,l);s.addEvent("endRelayerSignTypedData");let u=await mt(l,p,BigInt(d),o,t);return s.addEvent("getSignedTypedData"),u};var Ct=n=>{if(!n)return n;try{let e=ethers.stripZerosLeft(ethers.getBytes(n));return ethers.toUtf8String(e)}catch{return n}};var re=async({params:n,ethSigner:e,zkEvmAddress:t,rpcProvider:r,guardianClient:i,relayerClient:a,flow:s})=>{let o=n[0],c=n[1];if(!c||!o)throw new m(-32602,"personal_sign requires an address and a message");if(c.toLowerCase()!==t.toLowerCase())throw new m(-32602,"personal_sign requires the signer to be the from address");let d=Ct(o),{chainId:l}=await r.getNetwork();s.addEvent("endDetectNetwork");let p=BigInt(l),u=ut(p,d,e,c);u.then(()=>s.addEvent("endEOASignature")),await i.evaluateERC191Message({chainID:l,payload:d}),s.addEvent("endEvaluateERC191Message");let[E,R]=await Promise.all([u,a.imSign(c,d)]);s.addEvent("endRelayerSign");let y=await e.getAddress();return s.addEvent("endGetEOAAddress"),ve(E,y,R)};var nn="https://api.immutable.com",an="https://api.sandbox.immutable.com",sn="/v1/sdk/session-activity/check",on=n=>{switch(n){case config.Environment.SANDBOX:return an;case config.Environment.PRODUCTION:return nn;default:throw new Error("Environment not supported")}},ne,Tt=n=>{ne||(ne=ht__default.default.create({baseURL:on(n)}));};async function vt(n){if(!ne)throw new Error("Client not initialised");return ne.get(sn,{params:n}).then(e=>e.data).catch(e=>{if(e.response.status!==404)throw e})}function _t(n,e){return (...t)=>{try{let r=n(...t);return r instanceof Promise?r.catch(i=>(i instanceof Error&&metrics.trackError("passport","sessionActivityError",i),e)):r}catch(r){return r instanceof Error&&metrics.trackError("passport","sessionActivityError",r),e}}}var{getItem:Pt,setItem:Pe}=metrics.utils.localStorage,Ae="sessionActivitySendCount",At="sessionActivityDate",Ie={},_={},ie={},It=()=>{_=Pt(Ae)||{};let n=Pt(At),e=new Date,t=e.getFullYear(),r=`${e.getMonth()+1}`.padStart(2,"0"),i=`${e.getDate()}`.padStart(2,"0"),a=`${t}-${r}-${i}`;(!n||n!==a)&&(_={}),Pe(At,a),Pe(Ae,_);};It();var mn=n=>{It(),_[n]||(_[n]=0),_[n]++,Pe(Ae,_),Ie[n]=0;},un=async n=>new Promise(e=>{setTimeout(e,n*1e3);}),gn=async n=>{let e=n.flow||metrics.trackFlow("passport","sendSessionActivity"),t=n.passportClient;if(!t)throw e.addEvent("No Passport Client ID"),new Error("No Passport Client ID provided");if(ie[t])return;ie[t]=!0;let{sendTransaction:r,environment:i}=n;if(!r)throw new Error("No sendTransaction function provided");if(!i)throw new Error("No environment provided");Tt(i);let a=n.walletAddress;if(!a)throw e.addEvent("No Passport Wallet Address"),new Error("No wallet address");let s;try{if(s=await vt({clientId:t,wallet:a,checkCount:Ie[t]||0,sendCount:_[t]||0}),Ie[t]++,!s)return}catch(o){throw e.addEvent("Failed to fetch details"),new Error("Failed to get details",{cause:o})}if(s&&s.contractAddress&&s.functionName){let c=new ethers.Interface([`function ${s.functionName}()`]).encodeFunctionData(s.functionName),d=s.contractAddress;try{e.addEvent("Start Sending Transaction");let l=await n.sendTransaction([{to:d,from:a,data:c}],e);mn(t),e.addEvent("Transaction Sent",{tx:l});}catch(l){e.addEvent("Failed to send Transaction");let p=new Error("Failed to send transaction",{cause:l});metrics.trackError("passport","sessionActivityError",p,{flowId:e.details.flowId});}}s&&s.delay&&s.delay>0&&(e.addEvent("Delaying Transaction",{delay:s.delay}),await un(s.delay),setTimeout(()=>{e.addEvent("Retrying after Delay"),ie[t]=!1,St({...n,flow:e});},0));},St=n=>_t(gn)(n).then(()=>{ie[n.passportClient]=!1;}),Ot=St;var kt=async({params:n,ethSigner:e,rpcProvider:t,relayerClient:r,guardianClient:i,zkEvmAddress:a,flow:s})=>{let o={to:a,value:0},{relayerId:c}=await te({transactionRequest:o,ethSigner:e,rpcProvider:t,guardianClient:i,relayerClient:r,zkEvmAddress:a,flow:s});return i.withConfirmationScreen()(async()=>{let d=await re({params:n,ethSigner:e,zkEvmAddress:a,rpcProvider:t,guardianClient:i,relayerClient:r,flow:s});return await ee(r,c,s),d})};var bt=async({params:n,ethSigner:e,zkEvmAddress:t,flow:r})=>{if(!n||n.length!==1)throw new m(-32602,"im_signEjectionTransaction requires a singular param (hash)");let i=n[0];return await ft({transactionRequest:i,ethSigner:e,zkEvmAddress:t,flow:r})};var ae=n=>"zkEvm"in n,se=class{#i;#t;#a;#r;#n;#e;#u;#g;#o;#d;#l;isPassport=!0;constructor({authManager:e,magicAdapter:t,config:r,multiRollupApiClients:i,passportEventEmitter:a,guardianClient:s}){this.#i=e,this.#u=t,this.#t=r,this.#n=s,this.#r=a,this.#e=new ethers.JsonRpcProvider(this.#t.zkEvmRpcUrl,void 0,{staticNetwork:!0}),this.#o=new z({config:this.#t,rpcProvider:this.#e,authManager:this.#i}),this.#g=i,this.#a=new O,this.#i.getUser().then(o=>{o&&(this.#m(o),ae(o)&&this.#p(o.zkEvm.ethAddress));}).catch(()=>{}),a.on("loggedIn",o=>{this.#m(o),ae(o)&&this.#p(o.zkEvm.ethAddress);}),a.on("loggedOut",this.#h),a.on("accountsRequested",Ot);}#h=()=>{this.#d=void 0,this.#a.emit("accountsChanged",[]);};#m(e){let t=async()=>{let r=await this.#u.login(e.idToken);return new ethers.BrowserProvider(r).getSigner()};this.#l=void 0,this.#d=new Promise(async r=>{try{r(await t());}catch(i){this.#l=i,r(void 0);}});}async#c(){let e=await this.#d;if(typeof e>"u")throw typeof this.#l<"u"?this.#l:new Error("Signer failed to initialise");return e}async#p(e,t){let r=BigInt(1),i=async(a,s)=>{let o=await this.#c();return await _e({params:a,ethSigner:o,guardianClient:this.#n,rpcProvider:this.#e,relayerClient:this.#o,zkEvmAddress:e,flow:s,nonceSpace:r,isBackgroundTransaction:!0})};this.#r.emit("accountsRequested",{environment:this.#t.baseConfig.environment,sendTransaction:i,walletAddress:e,passportClient:t||this.#t.oidcConfiguration.clientId});}async#s(){try{let e=await this.#i.getUser();return e&&ae(e)?e.zkEvm.ethAddress:void 0}catch{return}}async#f(e){switch(e.method){case"eth_requestAccounts":{let t=await this.#s();if(t)return [t];let r=metrics.trackFlow("passport","ethRequestAccounts");try{let i=await this.#i.getUserOrLogin();r.addEvent("endGetUserOrLogin"),this.#d||this.#m(i);let a;if(ae(i))a=i.zkEvm.ethAddress;else {r.addEvent("startUserRegistration");let s=await this.#c();r.addEvent("ethSignerResolved"),a=await gt({ethSigner:s,authManager:this.#i,multiRollupApiClients:this.#g,accessToken:i.accessToken,rpcProvider:this.#e,flow:r}),r.addEvent("endUserRegistration");}return this.#a.emit("accountsChanged",[a]),metrics.identify({passportId:i.profile.sub}),this.#p(a),[a]}catch(i){throw i instanceof Error?metrics.trackError("passport","ethRequestAccounts",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"eth_sendTransaction":{let t=await this.#s();if(!t)throw new m(4100,"Unauthorised - call eth_requestAccounts first");let r=metrics.trackFlow("passport","ethSendTransaction");try{return await this.#n.withConfirmationScreen({width:480,height:720})(async()=>{let i=await this.#c();return r.addEvent("endGetSigner"),await _e({params:e.params||[],ethSigner:i,guardianClient:this.#n,rpcProvider:this.#e,relayerClient:this.#o,zkEvmAddress:t,flow:r})})}catch(i){throw i instanceof Error?metrics.trackError("passport","eth_sendTransaction",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"eth_accounts":{let t=await this.#s();return t?[t]:[]}case"personal_sign":{let t=await this.#s();if(!t)throw new m(4100,"Unauthorised - call eth_requestAccounts first");let r=metrics.trackFlow("passport","personalSign");try{return await this.#n.withConfirmationScreen({width:480,height:720})(async()=>{let i=await this.#c();return r.addEvent("endGetSigner"),this.#t.forceScwDeployBeforeMessageSignature&&!(await J(this.#e,t)>BigInt(0))?await kt({params:e.params||[],ethSigner:i,zkEvmAddress:t,rpcProvider:this.#e,guardianClient:this.#n,relayerClient:this.#o,flow:r}):await re({params:e.params||[],ethSigner:i,zkEvmAddress:t,rpcProvider:this.#e,guardianClient:this.#n,relayerClient:this.#o,flow:r})})}catch(i){throw i instanceof Error?metrics.trackError("passport","personal_sign",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"eth_signTypedData":case"eth_signTypedData_v4":{if(!await this.#s())throw new m(4100,"Unauthorised - call eth_requestAccounts first");let r=metrics.trackFlow("passport","ethSignTypedDataV4");try{return await this.#n.withConfirmationScreen({width:480,height:720})(async()=>{let i=await this.#c();return r.addEvent("endGetSigner"),await yt({method:e.method,params:e.params||[],ethSigner:i,rpcProvider:this.#e,relayerClient:this.#o,guardianClient:this.#n,flow:r})})}catch(i){throw i instanceof Error?metrics.trackError("passport","eth_signTypedData",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"eth_chainId":{let{chainId:t}=await this.#e.getNetwork();return ethers.toBeHex(t)}case"eth_getBalance":case"eth_getCode":case"eth_getTransactionCount":{let[t,r]=e.params||[];return this.#e.send(e.method,[t,r||"latest"])}case"eth_getStorageAt":{let[t,r,i]=e.params||[];return this.#e.send(e.method,[t,r,i||"latest"])}case"eth_call":case"eth_estimateGas":{let[t,r]=e.params||[];return this.#e.send(e.method,[t,r||"latest"])}case"eth_gasPrice":case"eth_blockNumber":case"eth_getBlockByHash":case"eth_getBlockByNumber":case"eth_getTransactionByHash":case"eth_getTransactionReceipt":return this.#e.send(e.method,e.params||[]);case"im_signEjectionTransaction":{let t=await this.#s();if(!t)throw new m(4100,"Unauthorised - call eth_requestAccounts first");let r=metrics.trackFlow("passport","imSignEjectionTransaction");try{let i=await this.#c();return r.addEvent("endGetSigner"),await bt({params:e.params||[],ethSigner:i,zkEvmAddress:t,flow:r})}catch(i){throw i instanceof Error?metrics.trackError("passport","imSignEjectionTransaction",i,{flowId:r.details.flowId}):r.addEvent("errored"),i}finally{r.addEvent("End");}}case"im_addSessionActivity":{let[t]=e.params||[],r=await this.#s();return r&&this.#p(r,t),null}default:throw new m(4200,"Method not supported")}}async request(e){try{return this.#f(e)}catch(t){throw t instanceof m?t:t instanceof Error?new m(-32603,t.message):new m(-32603,"Internal error")}}on(e,t){this.#a.on(e,t);}removeListener(e,t){this.#a.removeListener(e,t);}};var xt={icon:'data:image/svg+xml,<svg viewBox="0 0 48 48" class="SvgIcon undefined Logo Logo--PassportSymbolOutlined css-1dn9atd" xmlns="http://www.w3.org/2000/svg"><g data-testid="undefined__g"><circle cx="24" cy="24" r="22.5" fill="url(%23paint0_radial_6324_83922)"></circle><circle cx="24" cy="24" r="22.5" fill="url(%23paint1_radial_6324_83922)"></circle><path d="M24 0C10.7452 0 0 10.7452 0 24C0 37.2548 10.7452 48 24 48C37.2548 48 48 37.2548 48 24C48 10.7452 37.2548 0 24 0ZM23.0718 9.16608C23.7383 8.83951 24.4406 8.86188 25.087 9.2287C27.3282 10.5059 29.5627 11.7942 31.786 13.096C32.5018 13.5165 32.8686 14.1897 32.8708 15.0173C32.8843 17.9184 32.8798 20.8171 32.8708 23.7182C32.8708 23.8255 32.8015 23.9821 32.7143 24.0335C31.8531 24.548 30.9808 25.0423 30.0347 25.5881V25.1318C30.0347 22.148 30.0257 19.1664 30.0414 16.1827C30.0436 15.6101 29.8468 15.241 29.339 14.9525C26.7377 13.474 24.1499 11.9687 21.5575 10.4723C21.4457 10.4075 21.3361 10.3381 21.1661 10.2352C21.8326 9.85722 22.4321 9.47698 23.0673 9.16608H23.0718ZM22.5953 38.8451C22.45 38.7713 22.3426 38.7198 22.2375 38.6595C18.8041 36.68 15.3752 34.687 11.9307 32.7232C10.9644 32.173 10.5238 31.3879 10.5349 30.2852C10.5551 27.9411 10.5484 25.597 10.5372 23.2507C10.5327 22.1927 10.9622 21.4255 11.8926 20.8977C14.3105 19.5221 16.715 18.1264 19.1195 16.7284C19.3275 16.6076 19.4796 16.5875 19.6965 16.7172C20.5264 17.216 21.3719 17.6924 22.2554 18.2024C22.0876 18.3031 21.9601 18.3791 21.8304 18.4552C19.2268 19.9582 16.6278 21.4658 14.0175 22.9599C13.5903 23.2037 13.3912 23.5213 13.3957 24.0179C13.4091 25.8654 13.4114 27.713 13.3957 29.5605C13.3912 30.0705 13.5948 30.3948 14.0332 30.6453C16.7866 32.2199 19.5288 33.8125 22.28 35.3916C22.5126 35.5258 22.611 35.6645 22.6065 35.9418C22.5864 36.888 22.5998 37.8363 22.5998 38.8473L22.5953 38.8451ZM22.5953 33.553C22.356 33.4166 22.1838 33.3204 22.0116 33.2198C19.8285 31.9605 17.6477 30.6967 15.4602 29.4464C15.2231 29.3122 15.1359 29.1668 15.1381 28.8917C15.1538 27.4714 15.1471 26.0511 15.1426 24.6308C15.1426 24.4384 15.1717 24.3064 15.3618 24.1991C16.167 23.7495 16.9633 23.2798 17.7618 22.8212C17.8199 22.7877 17.8826 22.7631 17.9877 22.7116V24.3064C17.9877 25.1698 18.0011 26.0354 17.9832 26.8988C17.972 27.3909 18.1622 27.7241 18.5916 27.9657C19.8285 28.6636 21.0498 29.3883 22.2867 30.0839C22.5305 30.2203 22.6043 30.3724 22.5998 30.6408C22.5842 31.5847 22.5931 32.5308 22.5931 33.5508L22.5953 33.553ZM20.0746 14.91C19.6116 14.6371 19.2157 14.6393 18.7527 14.91C16.1581 16.4265 13.5523 17.9228 10.9487 19.4259C10.8391 19.4908 10.7251 19.5489 10.5305 19.6541C10.5998 18.6654 10.3873 17.7327 10.7251 16.8291C10.9085 16.3348 11.2529 15.9635 11.7092 15.6995C13.8811 14.4447 16.0507 13.1877 18.227 11.9396C19.0211 11.4833 19.8308 11.4945 20.6248 11.953C23.0964 13.3756 25.5657 14.8026 28.0306 16.2341C28.1357 16.2945 28.2677 16.4309 28.2677 16.5338C28.2856 17.5493 28.2788 18.567 28.2788 19.6563C27.3819 19.1396 26.5543 18.6609 25.7267 18.1823C23.8412 17.093 21.9512 16.0149 20.0746 14.91ZM37.4427 30.8779C37.3778 31.6764 36.9103 32.2423 36.2192 32.6404C33.5732 34.1614 30.9294 35.6913 28.2856 37.2168C27.4557 37.6954 26.6259 38.1741 25.7938 38.6527C25.6932 38.7109 25.5903 38.7601 25.4539 38.8317C25.4449 38.693 25.4337 38.5924 25.4337 38.4917C25.4337 37.6149 25.4382 36.7404 25.4293 35.8636C25.4293 35.6645 25.4762 35.5437 25.6596 35.4386C29.5157 33.2198 33.3696 30.9942 37.2212 28.7709C37.2794 28.7374 37.3443 28.7105 37.4539 28.6591C37.4539 29.4375 37.4986 30.1622 37.4427 30.8779ZM37.4628 25.3577C37.4561 26.2658 36.9663 26.9033 36.1901 27.3506C33.175 29.0841 30.1622 30.8265 27.1493 32.5666C26.5991 32.8842 26.0466 33.1996 25.4561 33.5396C25.4472 33.3897 25.436 33.2913 25.436 33.1907C25.436 32.3273 25.4449 31.4617 25.4293 30.5983C25.4248 30.3523 25.5075 30.2226 25.72 30.0995C28.46 28.5271 31.1911 26.9368 33.9355 25.3733C34.4231 25.096 34.6378 24.7538 34.6334 24.1812C34.6132 21.1974 34.6244 18.2136 34.6244 15.2298V14.7087C35.3402 15.1404 36.0112 15.496 36.624 15.9299C37.1832 16.3258 37.465 16.9253 37.4673 17.6164C37.4762 20.1976 37.4829 22.7788 37.465 25.3599L37.4628 25.3577Z" fill="%230D0D0D"></path><path fill-rule="evenodd" d="M24 0C10.7452 0 0 10.7452 0 24C0 37.2548 10.7452 48 24 48C37.2548 48 48 37.2548 48 24C48 10.7452 37.2548 0 24 0ZM24 2C11.8497 2 2 11.8497 2 24C2 36.1503 11.8497 46 24 46C36.1503 46 46 36.1503 46 24C46 11.8497 36.1503 2 24 2Z" fill="url(%23paint2_radial_6324_83922)"></path><path fill-rule="evenodd" d="M24 0C10.7452 0 0 10.7452 0 24C0 37.2548 10.7452 48 24 48C37.2548 48 48 37.2548 48 24C48 10.7452 37.2548 0 24 0ZM24 2C11.8497 2 2 11.8497 2 24C2 36.1503 11.8497 46 24 46C36.1503 46 46 36.1503 46 24C46 11.8497 36.1503 2 24 2Z" fill="url(%23paint3_radial_6324_83922)"></path><defs><radialGradient id="paint0_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(13.4442 13.3899) rotate(44.9817) scale(46.7487 99.1435)"><stop stop-color="%23A3EEF8"></stop><stop offset="0.177083" stop-color="%23A4DCF5"></stop><stop offset="0.380208" stop-color="%23A6AEEC"></stop><stop offset="1" stop-color="%23ECBEE1"></stop></radialGradient><radialGradient id="paint1_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(25.9515 43.7068) rotate(84.265) scale(24.2138 46.3215)"><stop stop-color="%23FCF5EE"></stop><stop offset="0.715135" stop-color="%23ECBEE1" stop-opacity="0"></stop></radialGradient><radialGradient id="paint2_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(12.7405 12.6825) rotate(44.9817) scale(49.8653 105.753)"><stop stop-color="%23A3EEF8"></stop><stop offset="0.177083" stop-color="%23A4DCF5"></stop><stop offset="0.380208" stop-color="%23A6AEEC"></stop><stop offset="1" stop-color="%23ECBEE1"></stop></radialGradient><radialGradient id="paint3_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(26.0816 45.0206) rotate(84.265) scale(25.828 49.4096)"><stop stop-color="%23FCF5EE"></stop><stop offset="0.715135" stop-color="%23ECBEE1" stop-opacity="0"></stop></radialGradient></defs></g></svg>',name:"Immutable Passport",rdns:"com.immutable.passport",uuid:uuid.v4()};function Mt(n){if(typeof window>"u")return;let e=new CustomEvent("eip6963:announceProvider",{detail:Object.freeze(n)});window.dispatchEvent(e);let t=()=>window.dispatchEvent(e);window.addEventListener("eip6963:requestProvider",t);}var Rn=n=>n?.length>0&&typeof n[0]=="object"&&"method"in n[0]&&typeof n[0].method=="string"&&["personal_sign","eth_accounts","eth_requestAccounts"].includes(n[0].method),Tn=n=>n?.length>0&&typeof n[0]=="object"&&"method"in n[0]&&typeof n[0].method=="string"&&n[0].method==="eth_requestAccounts",oe=class{authManager;config;constructor(e,t){this.authManager=e,this.config=t;}createProxy(e){let t=e.rpcProvider,r={get:(i,a,s)=>a==="request"?async(...o)=>{try{if(Rn(o)){if(!await e.user.isLoggedIn()){let l=(await this.authManager.getUser())?.idToken;if(!l)throw new Error("failed to obtain ID token");await e.openid.loginWithOIDC({jwt:l,providerId:this.config.magicProviderId});}if(Tn(o))return i.request({method:"eth_accounts"})}return i.request(...o)}catch(c){throw c instanceof Error?new Error(`ProviderProxy: ${c.message}`):new Error(`ProviderProxy: ${c}`)}}:Reflect.get(i,a,s)};return new Proxy(t,r)}};var bn=n=>n.overrides?we.createConfig({basePath:n.overrides.imxPublicApiDomain}):n.baseConfig.environment===config.Environment.SANDBOX?we.imxApiConfig.getSandbox():we.imxApiConfig.getProduction(),xn=n=>{if(n.overrides?.imxApiClients)return n.overrides.imxApiClients;let e=bn(n);return new we.ImxApiClients(e)},Mn=n=>{let e=new Z(n),t=new M(e),r=new oe(t,e),i=new N(e,r),a=new k(e),s=new we.MultiRollupApiClients(e.multiRollupConfig),o=new O,c=n.overrides?n.overrides.immutableXClient:new xClient.IMXClient({baseConfig:n.baseConfig}),d=new U({confirmationScreen:a,config:e,authManager:t,guardianApi:s.guardianApi}),l=xn(n),p=new $({authManager:t,immutableXClient:c,magicAdapter:i,passportEventEmitter:o,imxApiClients:l,guardianClient:d});return {config:e,authManager:t,magicAdapter:i,confirmationScreen:a,immutableXClient:c,multiRollupApiClients:s,passportEventEmitter:o,passportImxProviderFactory:p,guardianClient:d}},Se=class{authManager;config;confirmationScreen;immutableXClient;magicAdapter;multiRollupApiClients;passportImxProviderFactory;passportEventEmitter;guardianClient;constructor(e){let t=Mn(e);this.config=t.config,this.authManager=t.authManager,this.magicAdapter=t.magicAdapter,this.confirmationScreen=t.confirmationScreen,this.immutableXClient=t.immutableXClient,this.multiRollupApiClients=t.multiRollupApiClients,this.passportEventEmitter=t.passportEventEmitter,this.passportImxProviderFactory=t.passportImxProviderFactory,this.guardianClient=t.guardianClient,metrics.setPassportClientId(e.clientId),metrics.track("passport","initialise");}async connectImxSilent(){return h(()=>this.passportImxProviderFactory.getProviderSilent(),"connectImxSilent",!1)}async connectImx(){return h(()=>this.passportImxProviderFactory.getProvider(),"connectImx",!1)}connectEvm(e={announceProvider:!0}){return h(async()=>{let t=new se({passportEventEmitter:this.passportEventEmitter,authManager:this.authManager,magicAdapter:this.magicAdapter,config:this.config,multiRollupApiClients:this.multiRollupApiClients,guardianClient:this.guardianClient});return e?.announceProvider&&Mt({info:xt,provider:t}),t},"connectEvm",!1)}async login(e){return h(async()=>{let{useCachedSession:t=!1,useSilentLogin:r}=e||{},i=null;try{i=await this.authManager.getUser();}catch(a){if(a instanceof Error&&!a.message.includes("Unknown or invalid refresh token")&&metrics.trackError("passport","login",a),t)throw a;A.warn("Failed to retrieve a cached user session",a);}return !i&&r?i=await this.authManager.forceUserRefresh():!i&&!t&&(e?.useRedirectFlow?await this.authManager.loginWithRedirect(e?.anonymousId,e?.directLoginOptions):i=await this.authManager.login(e?.anonymousId,e?.directLoginOptions)),i&&(metrics.identify({passportId:i.profile.sub}),this.passportEventEmitter.emit("loggedIn",i)),i?i.profile:null},"login")}async loginCallback(){await h(()=>this.authManager.loginCallback(),"loginCallback").then(e=>{e&&(metrics.identify({passportId:e.profile.sub}),this.passportEventEmitter.emit("loggedIn",e));});}loginWithPKCEFlow(e){return h(async()=>await this.authManager.getPKCEAuthorizationUrl(e),"loginWithPKCEFlow")}async loginWithPKCEFlowCallback(e,t){return h(async()=>{let r=await this.authManager.loginWithPKCEFlowCallback(e,t);return this.passportEventEmitter.emit("loggedIn",r),r.profile},"loginWithPKCEFlowCallback")}async storeTokens(e){return h(async()=>{let t=await this.authManager.storeTokens(e);return this.passportEventEmitter.emit("loggedIn",t),t.profile},"storeTokens")}async logout(){return h(async()=>{this.config.oidcConfiguration.logoutMode==="silent"?await Promise.allSettled([this.authManager.logout(),this.magicAdapter.logout()]):(await this.magicAdapter.logout(),await this.authManager.logout()),this.passportEventEmitter.emit("loggedOut");},"logout")}async getLogoutUrl(){return h(async()=>(await this.authManager.removeUser(),await this.magicAdapter.logout(),this.passportEventEmitter.emit("loggedOut"),await this.authManager.getLogoutUrl()),"getLogoutUrl")}async logoutSilentCallback(e){return h(()=>this.authManager.logoutSilentCallback(e),"logoutSilentCallback")}async getUserInfo(){return h(async()=>(await this.authManager.getUser())?.profile,"getUserInfo",!1)}async getIdToken(){return h(async()=>(await this.authManager.getUser())?.idToken,"getIdToken",!1)}async getAccessToken(){return h(async()=>(await this.authManager.getUser())?.accessToken,"getAccessToken",!1,!1)}async getLinkedAddresses(){return h(async()=>{let e=await this.authManager.getUser();if(!e?.profile.sub)return [];let t={Authorization:`Bearer ${e.accessToken}`};return (await this.multiRollupApiClients.passportProfileApi.getUserInfo({headers:t})).data.linked_addresses},"getLinkedAddresses",!1)}async linkExternalWallet(e){let t=metrics.trackFlow("passport","linkExternalWallet",!1),r=await this.authManager.getUser();if(!r)throw new g("User is not logged in","NOT_LOGGED_IN_ERROR");let i=I(r),a=F(r);if(!i&&!a)throw new g("User has not been registered","USER_NOT_REGISTERED_ERROR");let s={Authorization:`Bearer ${r.accessToken}`},o={type:e.type,wallet_address:e.walletAddress,signature:e.signature,nonce:e.nonce};try{return {...(await this.multiRollupApiClients.passportProfileApi.linkWalletV2({linkWalletV2Request:o},{headers:s})).data}}catch(c){if(c instanceof Error?metrics.trackError("passport","linkExternalWallet",c):t.addEvent("errored"),ht.isAxiosError(c)&&c.response){if(c.response.data&&ce(c.response.data)){let{code:l,message:p}=c.response.data;switch(l){case"ALREADY_LINKED":throw new g(p,"LINK_WALLET_ALREADY_LINKED_ERROR");case"MAX_WALLETS_LINKED":throw new g(p,"LINK_WALLET_MAX_WALLETS_LINKED_ERROR");case"DUPLICATE_NONCE":throw new g(p,"LINK_WALLET_DUPLICATE_NONCE_ERROR");case"VALIDATION_ERROR":throw new g(p,"LINK_WALLET_VALIDATION_ERROR");default:throw new g(p,"LINK_WALLET_GENERIC_ERROR")}}else if(c.response.status)throw new g(`Link wallet request failed with status code ${c.response.status}`,"LINK_WALLET_GENERIC_ERROR")}let d="Link wallet request failed";throw c instanceof Error&&(d+=`: ${c.message}`),new g(d,"LINK_WALLET_GENERIC_ERROR")}finally{t.addEvent("End");}}};
|
|
441
|
+
)[]`,Pe=i=>i.map(e=>({delegateCall:e.delegateCall===!0,revertOnError:e.revertOnError===!0,gasLimit:e.gasLimit??BigInt(0),target:e.to??ethers.ZeroAddress,value:e.value??BigInt(0),data:e.data??"0x"})),Xr=(i,e)=>{let t=ethers.AbiCoder.defaultAbiCoder().encode(["uint256",yt],[i,e]);return ethers.keccak256(t)},Rt=i=>ethers.AbiCoder.defaultAbiCoder().encode([yt],[i]),Jr=i=>i||0n,zr=(i,e)=>{let t=BigInt(i)*2n**96n;return BigInt(e)+t},Y=async(i,e,t)=>{try{let r=new ethers.Contract(e,abi.walletContracts.mainModule.abi,i),n=Jr(t),a=await r.readNonce(n);if(typeof a=="bigint")return zr(n,a);throw new Error("Unexpected result from contract.nonce() call.")}catch(r){if(ethers.isError(r,"BAD_DATA"))return BigInt(0);throw r}},_e=(i,e,t)=>ethers.solidityPacked(["string","uint256","address","bytes32"],[Kr,i,e,t]),we=async(i,e,t,r,n)=>{let a=Pe(i),s=Xr(e,a),o=_e(t,r,s),c=ethers.keccak256(o),d=ethers.getBytes(c),l=performance.now(),p=await n.signMessage(d);metrics.trackDuration("passport","magicSignMessageGetSignedMetaTransactions",Math.round(performance.now()-l));let u=`${p}${Et}`,E=core.v1.signature.encodeSignature({version:1,threshold:qr,signers:[{isDynamic:!1,unrecovered:!0,weight:ft,signature:u}]}),C=new ethers.Interface(abi.walletContracts.mainModule.abi);return C.encodeFunctionData(C.getFunction("execute")??"",[a,e,E])},jr=i=>{let e=`0x0000${i}`;return core.v1.signature.decodeSignature(e)},Ae=(i,e,t)=>{let r=`${i}${Et}`,{signers:n}=jr(t),s=[...n,{isDynamic:!1,unrecovered:!0,weight:ft,signature:r,address:e}].sort((o,c)=>{let d=BigInt(o.address??0),l=BigInt(c.address??0);return d<=l?-1:d===l?0:1});return core.v1.signature.encodeSignature({version:1,threshold:Zr,signers:s})},Ct=async(i,e,t,r,n)=>{let a={...i.types};delete a.EIP712Domain;let s=ethers.TypedDataEncoder.hash(i.domain,a,i.message),o=_e(t,r,s),c=ethers.keccak256(o),d=ethers.getBytes(c),l=performance.now(),p=await n.signMessage(d);metrics.trackDuration("passport","magicSignMessageTypedData",Math.round(performance.now()-l));let u=await n.getAddress();return Ae(p,u,e)},vt=async(i,e,t,r)=>{let n=ethers.hashMessage(e),a=_e(i,r,n),s=ethers.keccak256(a),o=ethers.getBytes(s);return t.signMessage(o)},v=i=>`eip155:${i}`;var Q=class i{config;rpcProvider;authManager;constructor({config:e,rpcProvider:t,authManager:r}){this.config=e,this.rpcProvider=t,this.authManager=r;}static getResponsePreview(e){return e.length>100?`${e.substring(0,50)}...${e.substring(e.length-50)}`:e}async postToRelayer(e){let t={id:1,jsonrpc:"2.0",...e},r=await this.authManager.getUserZkEvm(),n=await fetch(`${this.config.relayerUrl}/v1/transactions`,{method:"POST",headers:{Authorization:`Bearer ${r.accessToken}`,"Content-Type":"application/json"},body:JSON.stringify(t)}),a=await n.text();if(!n.ok){let o=i.getResponsePreview(a);throw new Error(`Relayer HTTP error: ${n.status}. Content: "${o}"`)}let s;try{s=JSON.parse(a);}catch(o){let c=i.getResponsePreview(a);throw new Error(`Relayer JSON parse error: ${o instanceof Error?o.message:"Unknown error"}. Content: "${c}"`)}if(s.error)throw new Error(s.error);return s}async ethSendTransaction(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),n={method:"eth_sendTransaction",params:[{to:e,data:t,chainId:v(Number(r))}]},{result:a}=await this.postToRelayer(n);return a}async imGetTransactionByHash(e){let t={method:"im_getTransactionByHash",params:[e]},{result:r}=await this.postToRelayer(t);return r}async imGetFeeOptions(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),n={method:"im_getFeeOptions",params:[{userAddress:e,data:t,chainId:v(Number(r))}]},{result:a}=await this.postToRelayer(n);return a}async imSignTypedData(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),n={method:"im_signTypedData",params:[{address:e,eip712Payload:t,chainId:v(Number(r))}]},{result:a}=await this.postToRelayer(n);return a}async imSign(e,t){let{chainId:r}=await this.rpcProvider.getNetwork(),n={method:"im_sign",params:[{address:e,message:t,chainId:v(Number(r))}]},{result:a}=await this.postToRelayer(n);return a}};var ee=(n=>(n[n.USER_REJECTED_REQUEST=4001]="USER_REJECTED_REQUEST",n[n.UNAUTHORIZED=4100]="UNAUTHORIZED",n[n.UNSUPPORTED_METHOD=4200]="UNSUPPORTED_METHOD",n[n.DISCONNECTED=4900]="DISCONNECTED",n))(ee||{}),P=(o=>(o[o.RPC_SERVER_ERROR=-32e3]="RPC_SERVER_ERROR",o[o.INVALID_REQUEST=-32600]="INVALID_REQUEST",o[o.METHOD_NOT_FOUND=-32601]="METHOD_NOT_FOUND",o[o.INVALID_PARAMS=-32602]="INVALID_PARAMS",o[o.INTERNAL_ERROR=-32603]="INTERNAL_ERROR",o[o.PARSE_ERROR=-32700]="PARSE_ERROR",o[o.TRANSACTION_REJECTED=-32003]="TRANSACTION_REJECTED",o))(P||{}),m=class extends Error{message;code;constructor(e,t){super(t),this.message=t,this.code=e;}};var Qr="Only sign this message from Immutable Passport";async function Tt({authManager:i,ethSigner:e,multiRollupApiClients:t,accessToken:r,rpcProvider:n,flow:a}){let s=e.getAddress();s.then(()=>a.addEvent("endGetAddress"));let o=toolkit.signRaw(Qr,e);o.then(()=>a.addEvent("endSignRaw"));let c=n.getNetwork();c.then(()=>a.addEvent("endDetectNetwork"));let d=t.chainsApi.listChains();d.then(()=>a.addEvent("endListChains"));let[l,p,u,E]=await Promise.all([s,o,c,d]),C=v(Number(u.chainId)),y=E.data?.result?.find(A=>A.id===C)?.name;if(!y)throw new m(-32603,`Chain name does not exist on for chain id ${u.chainId}`);try{let A=await t.passportApi.createCounterfactualAddressV2({chainName:y,createCounterfactualAddressRequest:{ethereum_address:l,ethereum_signature:p}},{headers:{Authorization:`Bearer ${r}`}});return a.addEvent("endCreateCounterfactualAddress"),i.forceUserRefreshInBackground(),A.data.counterfactual_address}catch(A){throw new m(-32603,`Failed to create counterfactual address: ${A}`)}}var te="Transaction requires confirmation but this functionality is not supported in this environment. Please contact Immutable support if you need to enable this feature.",re=i=>BigInt(i).toString(),tn=i=>{try{return i.map(e=>({delegateCall:e.delegateCall===!0,revertOnError:e.revertOnError===!0,gasLimit:e.gasLimit?re(e.gasLimit):"0",target:e.to??ethers.ZeroAddress,value:e.value?re(e.value):"0",data:e.data?e.data.toString():"0x"}))}catch(e){let t=e instanceof Error?e.message:String(e);throw new m(-32602,`Transaction failed to parsing: ${t}`)}},F=class{guardianApi;confirmationScreen;crossSdkBridgeEnabled;authManager;constructor({confirmationScreen:e,config:t,authManager:r,guardianApi:n}){this.confirmationScreen=e,this.crossSdkBridgeEnabled=t.crossSdkBridgeEnabled,this.guardianApi=n,this.authManager=r;}withConfirmationScreen(e){return t=>this.withConfirmationScreenTask(e)(t)()}withConfirmationScreenTask(e){return t=>async()=>{this.confirmationScreen.loading(e);try{return await t()}catch(r){throw r instanceof g&&r.type==="SERVICE_UNAVAILABLE_ERROR"?(await this.confirmationScreen.showServiceUnavailable(),r):(this.confirmationScreen.closeWindow(),r)}}}withDefaultConfirmationScreenTask(e){return this.withConfirmationScreenTask()(e)}async evaluateImxTransaction({payloadHash:e}){try{let t=()=>{this.confirmationScreen.closeWindow();},r=await this.authManager.getUserImx(),n={Authorization:`Bearer ${r.accessToken}`};if(!(await O(async()=>this.guardianApi.getTransactionByID({transactionID:e,chainType:"starkex"},{headers:n}),{finallyFn:t})).data.id)throw new Error("Transaction doesn't exists");let s=await this.guardianApi.evaluateTransaction({id:e,transactionEvaluationRequest:{chainType:"starkex"}},{headers:n}),{confirmationRequired:o}=s.data;if(o){if(this.crossSdkBridgeEnabled)throw new Error(te);if(!(await this.confirmationScreen.requestConfirmation(e,r.imx.ethAddress,Ie__namespace.mr.TransactionApprovalRequestChainTypeEnum.Starkex)).confirmed)throw new Error("Transaction rejected by user")}else this.confirmationScreen.closeWindow();}catch(t){throw Pt__default.default.isAxiosError(t)&&t.response?.status===403?new g("Service unavailable","SERVICE_UNAVAILABLE_ERROR"):t}}async evaluateEVMTransaction({chainId:e,nonce:t,metaTransactions:r}){let n=await this.authManager.getUserZkEvm(),a={Authorization:`Bearer ${n.accessToken}`},s=tn(r);try{return (await this.guardianApi.evaluateTransaction({id:"evm",transactionEvaluationRequest:{chainType:"evm",chainId:e,transactionData:{nonce:t,userAddress:n.zkEvm.ethAddress,metaTransactions:s}}},{headers:a})).data}catch(o){if(Pt__default.default.isAxiosError(o)&&o.response?.status===403)throw new g("Service unavailable","SERVICE_UNAVAILABLE_ERROR");let c=o instanceof Error?o.message:String(o);throw new m(-32603,`Transaction failed to validate with error: ${c}`)}}async validateEVMTransaction({chainId:e,nonce:t,metaTransactions:r,isBackgroundTransaction:n}){let a=await this.evaluateEVMTransaction({chainId:e,nonce:t,metaTransactions:r}),{confirmationRequired:s,transactionId:o}=a;if(s&&this.crossSdkBridgeEnabled)throw new m(-32003,te);if(s&&o){let c=await this.authManager.getUserZkEvm();if(!(await this.confirmationScreen.requestConfirmation(o,c.zkEvm.ethAddress,Ie__namespace.mr.TransactionApprovalRequestChainTypeEnum.Evm,e)).confirmed)throw new m(-32003,"Transaction rejected by user")}else n||this.confirmationScreen.closeWindow();}async handleEIP712MessageEvaluation({chainID:e,payload:t}){try{let r=await this.authManager.getUserZkEvm();if(r===null)throw new m(4100,"User not logged in. Please log in first.");return (await this.guardianApi.evaluateMessage({messageEvaluationRequest:{chainID:e,payload:t}},{headers:{Authorization:`Bearer ${r.accessToken}`}})).data}catch(r){let n=r instanceof Error?r.message:String(r);throw new m(-32603,`Message failed to validate with error: ${n}`)}}async evaluateEIP712Message({chainID:e,payload:t}){let{messageId:r,confirmationRequired:n}=await this.handleEIP712MessageEvaluation({chainID:e,payload:t});if(n&&this.crossSdkBridgeEnabled)throw new m(-32003,te);if(n&&r){let a=await this.authManager.getUserZkEvm();if(!(await this.confirmationScreen.requestMessageConfirmation(r,a.zkEvm.ethAddress,"eip712")).confirmed)throw new m(-32003,"Signature rejected by user")}else this.confirmationScreen.closeWindow();}async handleERC191MessageEvaluation({chainID:e,payload:t}){try{let r=await this.authManager.getUserZkEvm();if(r===null)throw new m(4100,"User not logged in. Please log in first.");return (await this.guardianApi.evaluateErc191Message({eRC191MessageEvaluationRequest:{chainID:v(Number(e)),payload:t}},{headers:{Authorization:`Bearer ${r.accessToken}`}})).data}catch(r){let n=r instanceof Error?r.message:String(r);throw new m(-32603,`Message failed to validate with error: ${n}`)}}async evaluateERC191Message({chainID:e,payload:t}){let{messageId:r,confirmationRequired:n}=await this.handleERC191MessageEvaluation({chainID:e,payload:t});if(n&&this.crossSdkBridgeEnabled)throw new m(-32003,te);if(n&&r){let a=await this.authManager.getUserZkEvm();if(!(await this.confirmationScreen.requestMessageConfirmation(r,a.zkEvm.ethAddress,"erc191")).confirmed)throw new m(-32003,"Signature rejected by user")}else this.confirmationScreen.closeWindow();}};var rn=30,nn=1e3,an=async(i,e,t)=>{let r=Pe([i]),n=Rt(r),a=await t.imGetFeeOptions(e,n);if(!a||!Array.isArray(a))throw new Error("Invalid fee options received from relayer");let s=a.find(o=>o.tokenSymbol==="IMX");if(!s)throw new Error("Failed to retrieve fees for IMX token");return s},sn=async(i,e,t,r,n)=>{if(!i.to)throw new m(-32602,'eth_sendTransaction requires a "to" field');let a={to:i.to.toString(),data:i.data,nonce:BigInt(0),value:i.value,revertOnError:!0},[s,o]=await Promise.all([Y(e,r,n),an(a,r,t)]),c=[{...a,nonce:s}],d=BigInt(o.tokenPrice);return d!==BigInt(0)&&c.push({nonce:s,to:o.recipientAddress,value:d,revertOnError:!0}),c},ne=async(i,e,t)=>{let n=await O(async()=>{let a=await i.imGetTransactionByHash(e);if(a.status==="PENDING")throw new Error;return a},{retries:rn,interval:nn,finalErr:new m(-32e3,"transaction hash not generated in time")});if(t.addEvent("endRetrieveRelayerTransaction"),!["SUBMITTED","SUCCESSFUL"].includes(n.status)){let a=`Transaction failed to submit with status ${n.status}.`;throw n.statusMessage&&(a+=` Error message: ${n.statusMessage}`),new m(-32e3,a)}return n},ie=async({transactionRequest:i,ethSigner:e,rpcProvider:t,guardianClient:r,relayerClient:n,zkEvmAddress:a,flow:s,nonceSpace:o,isBackgroundTransaction:c})=>{let{chainId:d}=await t.getNetwork(),l=BigInt(d);s.addEvent("endDetectNetwork");let p=await sn(i,t,n,a,o);s.addEvent("endBuildMetaTransactions");let{nonce:u}=p[0];if(typeof u>"u")throw new Error("Failed to retrieve nonce from the smart wallet");let E=async()=>{await r.validateEVMTransaction({chainId:v(Number(d)),nonce:re(u),metaTransactions:p,isBackgroundTransaction:c}),s.addEvent("endValidateEVMTransaction");},C=async()=>{let qt=await we(p,u,l,a,e);return s.addEvent("endGetSignedMetaTransactions"),qt},[,y]=await Promise.all([E(),C()]),A=await n.ethSendTransaction(a,y);return s.addEvent("endRelayerSendTransaction"),{signedTransactions:y,relayerId:A,nonce:u}},on=async i=>{if(!i.to)throw new m(-32602,'im_signEjectionTransaction requires a "to" field');if(typeof i.nonce>"u")throw new m(-32602,'im_signEjectionTransaction requires a "nonce" field');if(!i.chainId)throw new m(-32602,'im_signEjectionTransaction requires a "chainId" field');return [{to:i.to.toString(),data:i.data,nonce:i.nonce??void 0,value:i.value,revertOnError:!0}]},_t=async({transactionRequest:i,ethSigner:e,zkEvmAddress:t,flow:r})=>{let n=await on(i);r.addEvent("endBuildMetaTransactions");let a=await we(n,i.nonce,BigInt(i.chainId??0),t,e);return r.addEvent("endGetSignedMetaTransactions"),{to:t,data:a,chainId:v(Number(i.chainId??0))}};var Se=async({params:i,ethSigner:e,rpcProvider:t,relayerClient:r,guardianClient:n,zkEvmAddress:a,flow:s,nonceSpace:o,isBackgroundTransaction:c=!1})=>{let d=i[0],{relayerId:l}=await ie({transactionRequest:d,ethSigner:e,rpcProvider:t,guardianClient:n,relayerClient:r,zkEvmAddress:a,flow:s,nonceSpace:o,isBackgroundTransaction:c}),{hash:p}=await ne(r,l,s);return p};var wt=["types","domain","primaryType","message"],cn=i=>wt.every(e=>e in i),dn=(i,e)=>{let t;if(typeof i=="string")try{t=JSON.parse(i);}catch(n){throw new m(-32602,`Failed to parse typed data JSON: ${n}`)}else if(typeof i=="object")t=i;else throw new m(-32602,`Invalid typed data argument: ${i}`);if(!cn(t))throw new m(-32602,`Invalid typed data argument. The following properties are required: ${wt.join(", ")}`);let r=t.domain?.chainId;if(r&&(typeof r=="string"&&(r.startsWith("0x")?t.domain.chainId=parseInt(r,16).toString():t.domain.chainId=parseInt(r,10).toString()),BigInt(t.domain.chainId??0)!==e))throw new m(-32602,`Invalid chainId, expected ${e}`);return t},At=async({params:i,method:e,ethSigner:t,rpcProvider:r,relayerClient:n,guardianClient:a,flow:s})=>{let o=i[0],c=i[1];if(!o||!c)throw new m(-32602,`${e} requires an address and a typed data JSON`);let{chainId:d}=await r.getNetwork(),l=dn(c,d);s.addEvent("endDetectNetwork"),await a.evaluateEIP712Message({chainID:String(d),payload:l}),s.addEvent("endValidateMessage");let p=await n.imSignTypedData(o,l);s.addEvent("endRelayerSignTypedData");let u=await Ct(l,p,BigInt(d),o,t);return s.addEvent("getSignedTypedData"),u};var It=i=>{if(!i)return i;try{let e=ethers.stripZerosLeft(ethers.getBytes(i));return ethers.toUtf8String(e)}catch{return i}};var ae=async({params:i,ethSigner:e,zkEvmAddress:t,rpcProvider:r,guardianClient:n,relayerClient:a,flow:s})=>{let o=i[0],c=i[1];if(!c||!o)throw new m(-32602,"personal_sign requires an address and a message");if(c.toLowerCase()!==t.toLowerCase())throw new m(-32602,"personal_sign requires the signer to be the from address");let d=It(o),{chainId:l}=await r.getNetwork();s.addEvent("endDetectNetwork");let p=BigInt(l),u=vt(p,d,e,c);u.then(()=>s.addEvent("endEOASignature")),await n.evaluateERC191Message({chainID:l,payload:d}),s.addEvent("endEvaluateERC191Message");let[E,C]=await Promise.all([u,a.imSign(c,d)]);s.addEvent("endRelayerSign");let y=await e.getAddress();return s.addEvent("endGetEOAAddress"),Ae(E,y,C)};var gn="https://api.immutable.com",hn="https://api.sandbox.immutable.com",fn="/v1/sdk/session-activity/check",En=i=>{switch(i){case config.Environment.SANDBOX:return hn;case config.Environment.PRODUCTION:return gn;default:throw new Error("Environment not supported")}},se,Ot=i=>{se||(se=Pt__default.default.create({baseURL:En(i)}));};async function bt(i){if(!se)throw new Error("Client not initialised");return se.get(fn,{params:i}).then(e=>e.data).catch(e=>{if(e.response.status!==404)throw e})}function xt(i,e){return (...t)=>{try{let r=i(...t);return r instanceof Promise?r.catch(n=>(n instanceof Error&&metrics.trackError("passport","sessionActivityError",n),e)):r}catch(r){return r instanceof Error&&metrics.trackError("passport","sessionActivityError",r),e}}}var{getItem:Mt,setItem:Oe}=metrics.utils.localStorage,be="sessionActivitySendCount",Nt="sessionActivityDate",ke={},w={},oe={},Lt=()=>{w=Mt(be)||{};let i=Mt(Nt),e=new Date,t=e.getFullYear(),r=`${e.getMonth()+1}`.padStart(2,"0"),n=`${e.getDate()}`.padStart(2,"0"),a=`${t}-${r}-${n}`;(!i||i!==a)&&(w={}),Oe(Nt,a),Oe(be,w);};Lt();var Tn=i=>{Lt(),w[i]||(w[i]=0),w[i]++,Oe(be,w),ke[i]=0;},Pn=async i=>new Promise(e=>{setTimeout(e,i*1e3);}),_n=async i=>{let e=i.flow||metrics.trackFlow("passport","sendSessionActivity"),t=i.passportClient;if(!t)throw e.addEvent("No Passport Client ID"),new Error("No Passport Client ID provided");if(oe[t])return;oe[t]=!0;let{sendTransaction:r,environment:n}=i;if(!r)throw new Error("No sendTransaction function provided");if(!n)throw new Error("No environment provided");Ot(n);let a=i.walletAddress;if(!a)throw e.addEvent("No Passport Wallet Address"),new Error("No wallet address");let s;try{if(s=await bt({clientId:t,wallet:a,checkCount:ke[t]||0,sendCount:w[t]||0}),ke[t]++,!s)return}catch(o){throw e.addEvent("Failed to fetch details"),new Error("Failed to get details",{cause:o})}if(s&&s.contractAddress&&s.functionName){let c=new ethers.Interface([`function ${s.functionName}()`]).encodeFunctionData(s.functionName),d=s.contractAddress;try{e.addEvent("Start Sending Transaction");let l=await i.sendTransaction([{to:d,from:a,data:c}],e);Tn(t),e.addEvent("Transaction Sent",{tx:l});}catch(l){e.addEvent("Failed to send Transaction");let p=new Error("Failed to send transaction",{cause:l});metrics.trackError("passport","sessionActivityError",p,{flowId:e.details.flowId});}}s&&s.delay&&s.delay>0&&(e.addEvent("Delaying Transaction",{delay:s.delay}),await Pn(s.delay),setTimeout(()=>{e.addEvent("Retrying after Delay"),oe[t]=!1,Dt({...i,flow:e});},0));},Dt=i=>xt(_n)(i).then(()=>{oe[i.passportClient]=!1;}),Ut=Dt;var Gt=async({params:i,ethSigner:e,rpcProvider:t,relayerClient:r,guardianClient:n,zkEvmAddress:a,flow:s})=>{let o={to:a,value:0},{relayerId:c}=await ie({transactionRequest:o,ethSigner:e,rpcProvider:t,guardianClient:n,relayerClient:r,zkEvmAddress:a,flow:s});return n.withConfirmationScreen()(async()=>{let d=await ae({params:i,ethSigner:e,zkEvmAddress:a,rpcProvider:t,guardianClient:n,relayerClient:r,flow:s});return await ne(r,c,s),d})};var Ft=async({params:i,ethSigner:e,zkEvmAddress:t,flow:r})=>{if(!i||i.length!==1)throw new m(-32602,"im_signEjectionTransaction requires a singular param (hash)");let n=i[0];return await _t({transactionRequest:n,ethSigner:e,zkEvmAddress:t,flow:r})};var ce=i=>"zkEvm"in i,de=class{#i;#t;#a;#r;#n;#e;#u;#g;#o;#d;#l;isPassport=!0;constructor({authManager:e,magicAdapter:t,config:r,multiRollupApiClients:n,passportEventEmitter:a,guardianClient:s}){this.#i=e,this.#u=t,this.#t=r,this.#n=s,this.#r=a,this.#e=new ethers.JsonRpcProvider(this.#t.zkEvmRpcUrl,void 0,{staticNetwork:!0}),this.#o=new Q({config:this.#t,rpcProvider:this.#e,authManager:this.#i}),this.#g=n,this.#a=new b,this.#i.getUser().then(o=>{o&&(this.#m(o),ce(o)&&this.#p(o.zkEvm.ethAddress));}).catch(()=>{}),a.on("loggedIn",o=>{this.#m(o),ce(o)&&this.#p(o.zkEvm.ethAddress);}),a.on("loggedOut",this.#h),a.on("accountsRequested",Ut);}#h=()=>{this.#d=void 0,this.#a.emit("accountsChanged",[]);};#m(e){let t=async()=>{let r=await this.#u.login(e.idToken);return new ethers.BrowserProvider(r).getSigner()};this.#l=void 0,this.#d=new Promise(async r=>{try{r(await t());}catch(n){this.#l=n,r(void 0);}});}async#c(){let e=await this.#d;if(typeof e>"u")throw typeof this.#l<"u"?this.#l:new Error("Signer failed to initialise");return e}async#p(e,t){let r=BigInt(1),n=async(a,s)=>{let o=await this.#c();return await Se({params:a,ethSigner:o,guardianClient:this.#n,rpcProvider:this.#e,relayerClient:this.#o,zkEvmAddress:e,flow:s,nonceSpace:r,isBackgroundTransaction:!0})};this.#r.emit("accountsRequested",{environment:this.#t.baseConfig.environment,sendTransaction:n,walletAddress:e,passportClient:t||this.#t.oidcConfiguration.clientId});}async#s(){try{let e=await this.#i.getUser();return e&&ce(e)?e.zkEvm.ethAddress:void 0}catch{return}}async#f(e){switch(e.method){case"eth_requestAccounts":{let t=await this.#s();if(t)return [t];let r=metrics.trackFlow("passport","ethRequestAccounts");try{let n=await this.#i.getUserOrLogin();r.addEvent("endGetUserOrLogin"),this.#d||this.#m(n);let a;if(ce(n))a=n.zkEvm.ethAddress;else {r.addEvent("startUserRegistration");let s=await this.#c();r.addEvent("ethSignerResolved"),a=await Tt({ethSigner:s,authManager:this.#i,multiRollupApiClients:this.#g,accessToken:n.accessToken,rpcProvider:this.#e,flow:r}),r.addEvent("endUserRegistration");}return this.#a.emit("accountsChanged",[a]),metrics.identify({passportId:n.profile.sub}),this.#p(a),[a]}catch(n){throw n instanceof Error?metrics.trackError("passport","ethRequestAccounts",n,{flowId:r.details.flowId}):r.addEvent("errored"),n}finally{r.addEvent("End");}}case"eth_sendTransaction":{let t=await this.#s();if(!t)throw new m(4100,"Unauthorised - call eth_requestAccounts first");let r=metrics.trackFlow("passport","ethSendTransaction");try{return await this.#n.withConfirmationScreen({width:480,height:720})(async()=>{let n=await this.#c();return r.addEvent("endGetSigner"),await Se({params:e.params||[],ethSigner:n,guardianClient:this.#n,rpcProvider:this.#e,relayerClient:this.#o,zkEvmAddress:t,flow:r})})}catch(n){throw n instanceof Error?metrics.trackError("passport","eth_sendTransaction",n,{flowId:r.details.flowId}):r.addEvent("errored"),n}finally{r.addEvent("End");}}case"eth_accounts":{let t=await this.#s();return t?[t]:[]}case"personal_sign":{let t=await this.#s();if(!t)throw new m(4100,"Unauthorised - call eth_requestAccounts first");let r=metrics.trackFlow("passport","personalSign");try{return await this.#n.withConfirmationScreen({width:480,height:720})(async()=>{let n=await this.#c();return r.addEvent("endGetSigner"),this.#t.forceScwDeployBeforeMessageSignature&&!(await Y(this.#e,t)>BigInt(0))?await Gt({params:e.params||[],ethSigner:n,zkEvmAddress:t,rpcProvider:this.#e,guardianClient:this.#n,relayerClient:this.#o,flow:r}):await ae({params:e.params||[],ethSigner:n,zkEvmAddress:t,rpcProvider:this.#e,guardianClient:this.#n,relayerClient:this.#o,flow:r})})}catch(n){throw n instanceof Error?metrics.trackError("passport","personal_sign",n,{flowId:r.details.flowId}):r.addEvent("errored"),n}finally{r.addEvent("End");}}case"eth_signTypedData":case"eth_signTypedData_v4":{if(!await this.#s())throw new m(4100,"Unauthorised - call eth_requestAccounts first");let r=metrics.trackFlow("passport","ethSignTypedDataV4");try{return await this.#n.withConfirmationScreen({width:480,height:720})(async()=>{let n=await this.#c();return r.addEvent("endGetSigner"),await At({method:e.method,params:e.params||[],ethSigner:n,rpcProvider:this.#e,relayerClient:this.#o,guardianClient:this.#n,flow:r})})}catch(n){throw n instanceof Error?metrics.trackError("passport","eth_signTypedData",n,{flowId:r.details.flowId}):r.addEvent("errored"),n}finally{r.addEvent("End");}}case"eth_chainId":{let{chainId:t}=await this.#e.getNetwork();return ethers.toBeHex(t)}case"eth_getBalance":case"eth_getCode":case"eth_getTransactionCount":{let[t,r]=e.params||[];return this.#e.send(e.method,[t,r||"latest"])}case"eth_getStorageAt":{let[t,r,n]=e.params||[];return this.#e.send(e.method,[t,r,n||"latest"])}case"eth_call":case"eth_estimateGas":{let[t,r]=e.params||[];return this.#e.send(e.method,[t,r||"latest"])}case"eth_gasPrice":case"eth_blockNumber":case"eth_getBlockByHash":case"eth_getBlockByNumber":case"eth_getTransactionByHash":case"eth_getTransactionReceipt":return this.#e.send(e.method,e.params||[]);case"im_signEjectionTransaction":{let t=await this.#s();if(!t)throw new m(4100,"Unauthorised - call eth_requestAccounts first");let r=metrics.trackFlow("passport","imSignEjectionTransaction");try{let n=await this.#c();return r.addEvent("endGetSigner"),await Ft({params:e.params||[],ethSigner:n,zkEvmAddress:t,flow:r})}catch(n){throw n instanceof Error?metrics.trackError("passport","imSignEjectionTransaction",n,{flowId:r.details.flowId}):r.addEvent("errored"),n}finally{r.addEvent("End");}}case"im_addSessionActivity":{let[t]=e.params||[],r=await this.#s();return r&&this.#p(r,t),null}default:throw new m(4200,"Method not supported")}}async request(e){try{return this.#f(e)}catch(t){throw t instanceof m?t:t instanceof Error?new m(-32603,t.message):new m(-32603,"Internal error")}}on(e,t){this.#a.on(e,t);}removeListener(e,t){this.#a.removeListener(e,t);}};var Bt={icon:'data:image/svg+xml,<svg viewBox="0 0 48 48" class="SvgIcon undefined Logo Logo--PassportSymbolOutlined css-1dn9atd" xmlns="http://www.w3.org/2000/svg"><g data-testid="undefined__g"><circle cx="24" cy="24" r="22.5" fill="url(%23paint0_radial_6324_83922)"></circle><circle cx="24" cy="24" r="22.5" fill="url(%23paint1_radial_6324_83922)"></circle><path d="M24 0C10.7452 0 0 10.7452 0 24C0 37.2548 10.7452 48 24 48C37.2548 48 48 37.2548 48 24C48 10.7452 37.2548 0 24 0ZM23.0718 9.16608C23.7383 8.83951 24.4406 8.86188 25.087 9.2287C27.3282 10.5059 29.5627 11.7942 31.786 13.096C32.5018 13.5165 32.8686 14.1897 32.8708 15.0173C32.8843 17.9184 32.8798 20.8171 32.8708 23.7182C32.8708 23.8255 32.8015 23.9821 32.7143 24.0335C31.8531 24.548 30.9808 25.0423 30.0347 25.5881V25.1318C30.0347 22.148 30.0257 19.1664 30.0414 16.1827C30.0436 15.6101 29.8468 15.241 29.339 14.9525C26.7377 13.474 24.1499 11.9687 21.5575 10.4723C21.4457 10.4075 21.3361 10.3381 21.1661 10.2352C21.8326 9.85722 22.4321 9.47698 23.0673 9.16608H23.0718ZM22.5953 38.8451C22.45 38.7713 22.3426 38.7198 22.2375 38.6595C18.8041 36.68 15.3752 34.687 11.9307 32.7232C10.9644 32.173 10.5238 31.3879 10.5349 30.2852C10.5551 27.9411 10.5484 25.597 10.5372 23.2507C10.5327 22.1927 10.9622 21.4255 11.8926 20.8977C14.3105 19.5221 16.715 18.1264 19.1195 16.7284C19.3275 16.6076 19.4796 16.5875 19.6965 16.7172C20.5264 17.216 21.3719 17.6924 22.2554 18.2024C22.0876 18.3031 21.9601 18.3791 21.8304 18.4552C19.2268 19.9582 16.6278 21.4658 14.0175 22.9599C13.5903 23.2037 13.3912 23.5213 13.3957 24.0179C13.4091 25.8654 13.4114 27.713 13.3957 29.5605C13.3912 30.0705 13.5948 30.3948 14.0332 30.6453C16.7866 32.2199 19.5288 33.8125 22.28 35.3916C22.5126 35.5258 22.611 35.6645 22.6065 35.9418C22.5864 36.888 22.5998 37.8363 22.5998 38.8473L22.5953 38.8451ZM22.5953 33.553C22.356 33.4166 22.1838 33.3204 22.0116 33.2198C19.8285 31.9605 17.6477 30.6967 15.4602 29.4464C15.2231 29.3122 15.1359 29.1668 15.1381 28.8917C15.1538 27.4714 15.1471 26.0511 15.1426 24.6308C15.1426 24.4384 15.1717 24.3064 15.3618 24.1991C16.167 23.7495 16.9633 23.2798 17.7618 22.8212C17.8199 22.7877 17.8826 22.7631 17.9877 22.7116V24.3064C17.9877 25.1698 18.0011 26.0354 17.9832 26.8988C17.972 27.3909 18.1622 27.7241 18.5916 27.9657C19.8285 28.6636 21.0498 29.3883 22.2867 30.0839C22.5305 30.2203 22.6043 30.3724 22.5998 30.6408C22.5842 31.5847 22.5931 32.5308 22.5931 33.5508L22.5953 33.553ZM20.0746 14.91C19.6116 14.6371 19.2157 14.6393 18.7527 14.91C16.1581 16.4265 13.5523 17.9228 10.9487 19.4259C10.8391 19.4908 10.7251 19.5489 10.5305 19.6541C10.5998 18.6654 10.3873 17.7327 10.7251 16.8291C10.9085 16.3348 11.2529 15.9635 11.7092 15.6995C13.8811 14.4447 16.0507 13.1877 18.227 11.9396C19.0211 11.4833 19.8308 11.4945 20.6248 11.953C23.0964 13.3756 25.5657 14.8026 28.0306 16.2341C28.1357 16.2945 28.2677 16.4309 28.2677 16.5338C28.2856 17.5493 28.2788 18.567 28.2788 19.6563C27.3819 19.1396 26.5543 18.6609 25.7267 18.1823C23.8412 17.093 21.9512 16.0149 20.0746 14.91ZM37.4427 30.8779C37.3778 31.6764 36.9103 32.2423 36.2192 32.6404C33.5732 34.1614 30.9294 35.6913 28.2856 37.2168C27.4557 37.6954 26.6259 38.1741 25.7938 38.6527C25.6932 38.7109 25.5903 38.7601 25.4539 38.8317C25.4449 38.693 25.4337 38.5924 25.4337 38.4917C25.4337 37.6149 25.4382 36.7404 25.4293 35.8636C25.4293 35.6645 25.4762 35.5437 25.6596 35.4386C29.5157 33.2198 33.3696 30.9942 37.2212 28.7709C37.2794 28.7374 37.3443 28.7105 37.4539 28.6591C37.4539 29.4375 37.4986 30.1622 37.4427 30.8779ZM37.4628 25.3577C37.4561 26.2658 36.9663 26.9033 36.1901 27.3506C33.175 29.0841 30.1622 30.8265 27.1493 32.5666C26.5991 32.8842 26.0466 33.1996 25.4561 33.5396C25.4472 33.3897 25.436 33.2913 25.436 33.1907C25.436 32.3273 25.4449 31.4617 25.4293 30.5983C25.4248 30.3523 25.5075 30.2226 25.72 30.0995C28.46 28.5271 31.1911 26.9368 33.9355 25.3733C34.4231 25.096 34.6378 24.7538 34.6334 24.1812C34.6132 21.1974 34.6244 18.2136 34.6244 15.2298V14.7087C35.3402 15.1404 36.0112 15.496 36.624 15.9299C37.1832 16.3258 37.465 16.9253 37.4673 17.6164C37.4762 20.1976 37.4829 22.7788 37.465 25.3599L37.4628 25.3577Z" fill="%230D0D0D"></path><path fill-rule="evenodd" d="M24 0C10.7452 0 0 10.7452 0 24C0 37.2548 10.7452 48 24 48C37.2548 48 48 37.2548 48 24C48 10.7452 37.2548 0 24 0ZM24 2C11.8497 2 2 11.8497 2 24C2 36.1503 11.8497 46 24 46C36.1503 46 46 36.1503 46 24C46 11.8497 36.1503 2 24 2Z" fill="url(%23paint2_radial_6324_83922)"></path><path fill-rule="evenodd" d="M24 0C10.7452 0 0 10.7452 0 24C0 37.2548 10.7452 48 24 48C37.2548 48 48 37.2548 48 24C48 10.7452 37.2548 0 24 0ZM24 2C11.8497 2 2 11.8497 2 24C2 36.1503 11.8497 46 24 46C36.1503 46 46 36.1503 46 24C46 11.8497 36.1503 2 24 2Z" fill="url(%23paint3_radial_6324_83922)"></path><defs><radialGradient id="paint0_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(13.4442 13.3899) rotate(44.9817) scale(46.7487 99.1435)"><stop stop-color="%23A3EEF8"></stop><stop offset="0.177083" stop-color="%23A4DCF5"></stop><stop offset="0.380208" stop-color="%23A6AEEC"></stop><stop offset="1" stop-color="%23ECBEE1"></stop></radialGradient><radialGradient id="paint1_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(25.9515 43.7068) rotate(84.265) scale(24.2138 46.3215)"><stop stop-color="%23FCF5EE"></stop><stop offset="0.715135" stop-color="%23ECBEE1" stop-opacity="0"></stop></radialGradient><radialGradient id="paint2_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(12.7405 12.6825) rotate(44.9817) scale(49.8653 105.753)"><stop stop-color="%23A3EEF8"></stop><stop offset="0.177083" stop-color="%23A4DCF5"></stop><stop offset="0.380208" stop-color="%23A6AEEC"></stop><stop offset="1" stop-color="%23ECBEE1"></stop></radialGradient><radialGradient id="paint3_radial_6324_83922" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(26.0816 45.0206) rotate(84.265) scale(25.828 49.4096)"><stop stop-color="%23FCF5EE"></stop><stop offset="0.715135" stop-color="%23ECBEE1" stop-opacity="0"></stop></radialGradient></defs></g></svg>',name:"Immutable Passport",rdns:"com.immutable.passport",uuid:uuid.v4()};function Ht(i){if(typeof window>"u")return;let e=new CustomEvent("eip6963:announceProvider",{detail:Object.freeze(i)});window.dispatchEvent(e);let t=()=>window.dispatchEvent(e);window.addEventListener("eip6963:requestProvider",t);}var bn=i=>i?.length>0&&typeof i[0]=="object"&&"method"in i[0]&&typeof i[0].method=="string"&&["personal_sign","eth_accounts","eth_requestAccounts"].includes(i[0].method),kn=i=>i?.length>0&&typeof i[0]=="object"&&"method"in i[0]&&typeof i[0].method=="string"&&i[0].method==="eth_requestAccounts",le=class{authManager;config;constructor(e,t){this.authManager=e,this.config=t;}createProxy(e){let t=e.rpcProvider,r={get:(n,a,s)=>a==="request"?async(...o)=>{try{if(bn(o)){if(!await e.user.isLoggedIn()){let l=(await this.authManager.getUser())?.idToken;if(!l)throw new Error("failed to obtain ID token");await e.openid.loginWithOIDC({jwt:l,providerId:this.config.magicProviderId});}if(kn(o))return n.request({method:"eth_accounts"})}return n.request(...o)}catch(c){throw c instanceof Error?new Error(`ProviderProxy: ${c.message}`):new Error(`ProviderProxy: ${c}`)}}:Reflect.get(n,a,s)};return new Proxy(t,r)}};var Hn=i=>i.overrides?Ie.createConfig({basePath:i.overrides.imxPublicApiDomain}):i.baseConfig.environment===config.Environment.SANDBOX?Ie.imxApiConfig.getSandbox():Ie.imxApiConfig.getProduction(),Vn=i=>{if(i.overrides?.imxApiClients)return i.overrides.imxApiClients;let e=Hn(i);return new Ie.ImxApiClients(e)},Wn=i=>{let e=new J(i),t=new M(e),r=new D(e,t),n=new le(r,e),a=new U(e,n),s=new x(e),o=new Ie.MultiRollupApiClients(e.multiRollupConfig),c=new b,d=i.overrides?i.overrides.immutableXClient:new xClient.IMXClient({baseConfig:i.baseConfig}),l=new F({confirmationScreen:s,config:e,authManager:r,guardianApi:o.guardianApi}),p=Vn(i),u=new X({authManager:r,immutableXClient:d,magicAdapter:a,passportEventEmitter:c,imxApiClients:p,guardianClient:l});return {config:e,authManager:r,magicAdapter:a,confirmationScreen:s,embeddedLoginPrompt:t,immutableXClient:d,multiRollupApiClients:o,passportEventEmitter:c,passportImxProviderFactory:u,guardianClient:l}},xe=class{authManager;config;confirmationScreen;embeddedLoginPrompt;immutableXClient;magicAdapter;multiRollupApiClients;passportImxProviderFactory;passportEventEmitter;guardianClient;constructor(e){let t=Wn(e);this.config=t.config,this.authManager=t.authManager,this.magicAdapter=t.magicAdapter,this.confirmationScreen=t.confirmationScreen,this.embeddedLoginPrompt=t.embeddedLoginPrompt,this.immutableXClient=t.immutableXClient,this.multiRollupApiClients=t.multiRollupApiClients,this.passportEventEmitter=t.passportEventEmitter,this.passportImxProviderFactory=t.passportImxProviderFactory,this.guardianClient=t.guardianClient,metrics.setPassportClientId(e.clientId),metrics.track("passport","initialise");}async connectImxSilent(){return h(()=>this.passportImxProviderFactory.getProviderSilent(),"connectImxSilent",!1)}async connectImx(){return h(()=>this.passportImxProviderFactory.getProvider(),"connectImx",!1)}connectEvm(e={announceProvider:!0}){return h(async()=>{let t=new de({passportEventEmitter:this.passportEventEmitter,authManager:this.authManager,magicAdapter:this.magicAdapter,config:this.config,multiRollupApiClients:this.multiRollupApiClients,guardianClient:this.guardianClient});return e?.announceProvider&&Ht({info:Bt,provider:t}),t},"connectEvm",!1)}async login(e){return h(async()=>{let{useCachedSession:t=!1,useSilentLogin:r}=e||{},n=null;try{n=await this.authManager.getUser();}catch(a){if(a instanceof Error&&!a.message.includes("Unknown or invalid refresh token")&&metrics.trackError("passport","login",a),t)throw a;I.warn("Failed to retrieve a cached user session",a);}return !n&&r?n=await this.authManager.forceUserRefresh():!n&&!t&&(e?.useRedirectFlow?await this.authManager.loginWithRedirect(e?.anonymousId,e?.directLoginOptions):n=await this.authManager.login(e?.anonymousId,e?.directLoginOptions)),n&&(metrics.identify({passportId:n.profile.sub}),this.passportEventEmitter.emit("loggedIn",n)),n?n.profile:null},"login")}async loginCallback(){await h(()=>this.authManager.loginCallback(),"loginCallback").then(e=>{e&&(metrics.identify({passportId:e.profile.sub}),this.passportEventEmitter.emit("loggedIn",e));});}loginWithPKCEFlow(e){return h(async()=>await this.authManager.getPKCEAuthorizationUrl(e),"loginWithPKCEFlow")}async loginWithPKCEFlowCallback(e,t){return h(async()=>{let r=await this.authManager.loginWithPKCEFlowCallback(e,t);return this.passportEventEmitter.emit("loggedIn",r),r.profile},"loginWithPKCEFlowCallback")}async storeTokens(e){return h(async()=>{let t=await this.authManager.storeTokens(e);return this.passportEventEmitter.emit("loggedIn",t),t.profile},"storeTokens")}async logout(){return h(async()=>{this.config.oidcConfiguration.logoutMode==="silent"?await Promise.allSettled([this.authManager.logout(),this.magicAdapter.logout()]):(await this.magicAdapter.logout(),await this.authManager.logout()),this.passportEventEmitter.emit("loggedOut");},"logout")}async getLogoutUrl(){return h(async()=>(await this.authManager.removeUser(),await this.magicAdapter.logout(),this.passportEventEmitter.emit("loggedOut"),await this.authManager.getLogoutUrl()),"getLogoutUrl")}async logoutSilentCallback(e){return h(()=>this.authManager.logoutSilentCallback(e),"logoutSilentCallback")}async getUserInfo(){return h(async()=>(await this.authManager.getUser())?.profile,"getUserInfo",!1)}async getIdToken(){return h(async()=>(await this.authManager.getUser())?.idToken,"getIdToken",!1)}async getAccessToken(){return h(async()=>(await this.authManager.getUser())?.accessToken,"getAccessToken",!1,!1)}async getLinkedAddresses(){return h(async()=>{let e=await this.authManager.getUser();if(!e?.profile.sub)return [];let t={Authorization:`Bearer ${e.accessToken}`};return (await this.multiRollupApiClients.passportProfileApi.getUserInfo({headers:t})).data.linked_addresses},"getLinkedAddresses",!1)}async linkExternalWallet(e){let t=metrics.trackFlow("passport","linkExternalWallet",!1),r=await this.authManager.getUser();if(!r)throw new g("User is not logged in","NOT_LOGGED_IN_ERROR");let n=S(r),a=V(r);if(!n&&!a)throw new g("User has not been registered","USER_NOT_REGISTERED_ERROR");let s={Authorization:`Bearer ${r.accessToken}`},o={type:e.type,wallet_address:e.walletAddress,signature:e.signature,nonce:e.nonce};try{return {...(await this.multiRollupApiClients.passportProfileApi.linkWalletV2({linkWalletV2Request:o},{headers:s})).data}}catch(c){if(c instanceof Error?metrics.trackError("passport","linkExternalWallet",c):t.addEvent("errored"),Pt.isAxiosError(c)&&c.response){if(c.response.data&&pe(c.response.data)){let{code:l,message:p}=c.response.data;switch(l){case"ALREADY_LINKED":throw new g(p,"LINK_WALLET_ALREADY_LINKED_ERROR");case"MAX_WALLETS_LINKED":throw new g(p,"LINK_WALLET_MAX_WALLETS_LINKED_ERROR");case"DUPLICATE_NONCE":throw new g(p,"LINK_WALLET_DUPLICATE_NONCE_ERROR");case"VALIDATION_ERROR":throw new g(p,"LINK_WALLET_VALIDATION_ERROR");default:throw new g(p,"LINK_WALLET_GENERIC_ERROR")}}else if(c.response.status)throw new g(`Link wallet request failed with status code ${c.response.status}`,"LINK_WALLET_GENERIC_ERROR")}let d="Link wallet request failed";throw c instanceof Error&&(d+=`: ${c.message}`),new g(d,"LINK_WALLET_GENERIC_ERROR")}finally{t.addEvent("End");}}};
|
|
376
442
|
|
|
377
443
|
exports.JsonRpcError = m;
|
|
378
|
-
exports.MarketingConsentStatus =
|
|
379
|
-
exports.Passport =
|
|
444
|
+
exports.MarketingConsentStatus = Ue;
|
|
445
|
+
exports.Passport = xe;
|
|
380
446
|
exports.PassportError = g;
|
|
381
|
-
exports.ProviderErrorCode =
|
|
382
|
-
exports.ProviderEvent =
|
|
383
|
-
exports.RpcErrorCode =
|
|
447
|
+
exports.ProviderErrorCode = ee;
|
|
448
|
+
exports.ProviderEvent = Ce;
|
|
449
|
+
exports.RpcErrorCode = P;
|