@magic-ext/webauthn 27.6.0 → 27.6.1-canary.b65c8d0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../src/index.ts", "../../../../@magic-sdk/types/src/core/exception-types.ts", "../../../../@magic-sdk/types/src/core/json-rpc-types.ts", "../../../../@magic-sdk/types/src/core/message-types.ts", "../../../../@magic-sdk/types/src/core/deep-link-pages.ts", "../../../../@magic-sdk/types/src/modules/auth-types.ts", "../../../../@magic-sdk/types/src/modules/rpc-provider-types.ts", "../../../../@magic-sdk/types/src/modules/user-types.ts", "../../../../@magic-sdk/types/src/modules/nft-types.ts", "../../../../@magic-sdk/types/src/modules/wallet-types.ts", "../../../../@magic-sdk/types/src/modules/common-types.ts", "../../../../@magic-sdk/types/src/modules/oauth-types.ts", "../../../../@magic-sdk/types/src/modules/webauthn-types.ts", "../../src/utils/base64.ts", "../../src/utils/polyfills.ts"],
4
- "sourcesContent": ["import { Extension } from '@magic-sdk/provider';\nimport {\n RegisterNewUserConfiguration,\n LoginWithWebAuthnConfiguration,\n MagicWebAuthnPayloadMethod,\n WebAuthnSDKErrorCode,\n UpdateWebAuthnInfoConfiguration,\n} from './types';\nimport { PasskeyResult, PasskeyEventHandlers, PasskeyMFAEventEmit, PasskeyMFAEventOnReceived } from '@magic-sdk/types';\nimport { toJSON } from './utils/polyfills';\n\nexport class WebAuthnExtension extends Extension.Internal<'webauthn', any> {\n name = 'webauthn' as const;\n config: any = {};\n\n private createWebAuthnNotSupportError() {\n this.createError(WebAuthnSDKErrorCode.WebAuthnNotSupported, 'WebAuthn is not supported in this device.', {});\n }\n\n private createWebAuthCreateCredentialError(message: string) {\n this.createError(WebAuthnSDKErrorCode.WebAuthnCreateCredentialError, `Error creating credential: ${message}`, {});\n }\n\n public async registerNewUser(configuration?: RegisterNewUserConfiguration) {\n if (!window.PublicKeyCredential) {\n throw this.createWebAuthnNotSupportError();\n }\n const { username, nickname = '', skipDIDToken, lifespan } = configuration ?? {};\n\n const { registrationOptions, registrationToken } = await this.request<any>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterPasskeyStart, [{ username }]),\n );\n\n let credential;\n try {\n credential = (await navigator.credentials.create({\n publicKey: registrationOptions,\n })) as any;\n } catch (err: any) {\n throw this.createWebAuthCreateCredentialError(err);\n }\n\n return this.request<string | null>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterPasskeyVerify, [\n {\n registrationToken,\n registrationResponse: toJSON(credential),\n nickname,\n transport: credential.response.getTransports(),\n userAgent: navigator.userAgent,\n skipDIDToken,\n lifespan,\n },\n ]),\n );\n }\n\n public login(configuration?: LoginWithWebAuthnConfiguration) {\n const { username, showMfaModal, skipDIDToken, lifespan } = configuration ?? {};\n\n let verifyPayloadId: string;\n\n const promiEvent = this.utils.createPromiEvent<PasskeyResult, PasskeyEventHandlers>(async (resolve, reject) => {\n if (!window.PublicKeyCredential) {\n return reject(this.createWebAuthnNotSupportError());\n }\n\n const { authenticationToken, authenticationOptions } = await this.request<any>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.LoginWithPasskeyStart, [{ username }]),\n );\n\n let assertion;\n try {\n assertion = (await navigator.credentials.get({\n publicKey: authenticationOptions,\n })) as any;\n } catch (err: any) {\n return reject(this.createWebAuthCreateCredentialError(err));\n }\n\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.LoginWithPasskeyVerify, [\n {\n authenticationToken,\n assertionResponse: toJSON(assertion),\n showUI: showMfaModal,\n skipDIDToken,\n lifespan,\n },\n ]);\n\n verifyPayloadId = requestPayload.id as string;\n\n const loginRequest = this.request<PasskeyResult, PasskeyEventHandlers>(requestPayload);\n\n if (!showMfaModal) {\n loginRequest.on(PasskeyMFAEventOnReceived.MfaSentHandle, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.MfaSentHandle);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.InvalidMfaOtp, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.InvalidMfaOtp);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.RecoveryCodeSentHandle, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.RecoveryCodeSentHandle);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.InvalidRecoveryCode, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.InvalidRecoveryCode);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.RecoveryCodeSuccess, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.RecoveryCodeSuccess);\n });\n }\n\n try {\n const result = await loginRequest;\n resolve(result);\n } catch (error) {\n reject(error);\n }\n });\n\n if (!showMfaModal && promiEvent) {\n promiEvent.on(PasskeyMFAEventEmit.VerifyMFACode, (mfa: string) => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.VerifyMFACode, verifyPayloadId)(mfa);\n });\n promiEvent.on(PasskeyMFAEventEmit.LostDevice, () => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.LostDevice, verifyPayloadId)();\n });\n promiEvent.on(PasskeyMFAEventEmit.VerifyRecoveryCode, (recoveryCode: string) => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.VerifyRecoveryCode, verifyPayloadId)(recoveryCode);\n });\n promiEvent.on(PasskeyMFAEventEmit.Cancel, () => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.Cancel, verifyPayloadId)();\n });\n }\n\n return promiEvent;\n }\n\n public updateInfo(configuration: UpdateWebAuthnInfoConfiguration) {\n const { id, nickname } = configuration;\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.UpdateWebAuthnInfo, [\n {\n webAuthnCredentialsId: id,\n nickname,\n },\n ]);\n return this.request<any[]>(requestPayload);\n }\n\n public unregisterDevice(id: string) {\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.UnregisterWebAuthDevice, [\n {\n webAuthnCredentialsId: id,\n },\n ]);\n\n return this.request<any>(requestPayload);\n }\n\n public async registerNewDevice(nickname = '') {\n if (!window.PublicKeyCredential) {\n throw this.createWebAuthnNotSupportError();\n }\n const options = await this.request<any>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterWebAuthDeviceStart, []),\n );\n\n let credential;\n try {\n credential = (await navigator.credentials.create({\n publicKey: options.credential_options,\n })) as any;\n } catch (err: any) {\n throw this.createWebAuthCreateCredentialError(err);\n }\n\n return this.request<string | null>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterWebAuthDevice, [\n {\n nickname,\n transport: credential.response.getTransports(),\n user_agent: navigator.userAgent,\n registration_response: toJSON(credential),\n },\n ]),\n );\n }\n\n public getMetadata() {\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.GetWebAuthnInfo, []);\n return this.request<any[]>(requestPayload);\n }\n}\n", "export enum SDKErrorCode {\n MissingApiKey = 'MISSING_API_KEY',\n ModalNotReady = 'MODAL_NOT_READY',\n ConnectionLost = 'CONNECTION_WAS_LOST',\n MalformedResponse = 'MALFORMED_RESPONSE',\n InvalidArgument = 'INVALID_ARGUMENT',\n ExtensionNotInitialized = 'EXTENSION_NOT_INITIALIZED',\n IncompatibleExtensions = 'INCOMPATIBLE_EXTENSIONS',\n}\n\nexport enum SDKWarningCode {\n SyncWeb3Method = 'SYNC_WEB3_METHOD',\n DuplicateIframe = 'DUPLICATE_IFRAME',\n ReactNativeEndpointConfiguration = 'REACT_NATIVE_ENDPOINT_CONFIGURATION',\n DeprecationNotice = 'DEPRECATION_NOTICE',\n ProductAnnouncement = 'ANNOUNCEMENT',\n}\n\nexport enum RPCErrorCode {\n // Standard JSON RPC 2.0 Error Codes\n ParseError = -32700,\n InvalidRequest = -32600,\n MethodNotFound = -32601,\n InvalidParams = -32602,\n InternalError = -32603,\n\n // Custom RPC Error Codes\n MagicLinkFailedVerification = -10000,\n MagicLinkExpired = -10001,\n MagicLinkRateLimited = -10002,\n UserAlreadyLoggedIn = -10003,\n UpdateEmailFailed = -10004,\n UserRequestEditEmail = -10005,\n MagicLinkInvalidRedirectURL = -10006,\n InactiveRecipient = -10010,\n AccessDeniedToUser = -10011,\n UserRejectedAction = -10012,\n RequestCancelled = -10014,\n RedirectLoginComplete = -10015,\n SessionTerminated = -10016,\n PopupRequestOverriden = -10017,\n SanEmail = -10018,\n DpopInvalidated = -10019,\n MaxAttemptsReached = -10031,\n UserRequiredMfa = -10033,\n}\n\nexport type ErrorCode = SDKErrorCode | RPCErrorCode;\nexport type WarningCode = SDKWarningCode;\n", "import { RPCErrorCode } from './exception-types';\n\n// --- Request interfaces\n\nexport interface JsonRpcRequestPayload<TParams = any> {\n jsonrpc: string;\n id: string | number | null;\n method: string;\n params?: TParams;\n}\n\nexport interface JsonRpcRequestCallback {\n /** Callback executed upon JSON RPC response. */\n (err: JsonRpcError | null, result?: JsonRpcResponsePayload | null): void;\n}\n\nexport interface JsonRpcBatchRequestCallback {\n /** Callback executed upon JSON RPC response. */\n (err: JsonRpcError | null, result?: (JsonRpcResponsePayload | null)[] | null): void;\n}\n\n// --- Response interfaces\n\nexport interface JsonRpcError {\n message: string;\n code: RPCErrorCode;\n data?: any;\n}\n\nexport interface JsonRpcResponsePayload<ResultType = any> {\n jsonrpc: string;\n id: string | number | null;\n result?: ResultType | null;\n error?: JsonRpcError | null;\n}\n\nexport interface UserInfo {\n email?: string;\n}\n\nexport type ShowUIPromiEvents = {\n disconnect: () => void;\n};\n\nexport interface RequestUserInfoScope {\n scope?: {\n email?: 'required' | 'optional';\n };\n}\n\nexport enum LocalStorageKeys {\n PROVIDER = 'magic_3pw_provider',\n ADDRESS = 'magic_3pw_address',\n CHAIN_ID = 'magic_3pw_chainId',\n}\n\nexport enum ThirdPartyWalletEvents {\n WalletConnected = 'wallet_connected',\n WalletRejected = 'wallet_rejected',\n Web3ModalSelected = 'web3modal_selected',\n}\n\nexport interface ConnectWithUIOptions {\n autoPromptThirdPartyWallets?: boolean;\n}\n\nexport type ConnectWithUiEvents = {\n 'id-token-created': (params: { idToken: string }) => void;\n} & { [key in ThirdPartyWalletEvents]: () => void };\n\n// --- Payload methods\n\n/**\n * Enum of JSON RPC methods for interacting with the Magic SDK authentication\n * relayer.\n */\nexport enum MagicPayloadMethod {\n LoginWithSms = 'magic_auth_login_with_sms',\n LoginWithEmailOTP = 'magic_auth_login_with_email_otp',\n LoginWithMagicLink = 'magic_auth_login_with_magic_link',\n LoginWithCredential = 'magic_auth_login_with_credential',\n SetAuthorizationToken = 'magic_auth_set_authorization_token',\n GetIdToken = 'magic_auth_get_id_token',\n GenerateIdToken = 'magic_auth_generate_id_token',\n GetMetadata = 'magic_auth_get_metadata',\n IsLoggedIn = 'magic_is_logged_in',\n Logout = 'magic_auth_logout',\n UpdateEmail = 'magic_auth_update_email',\n UserSettings = 'magic_auth_settings',\n UserSettingsTestMode = 'magic_auth_settings_testing_mode',\n LoginWithSmsTestMode = 'magic_auth_login_with_sms_testing_mode',\n LoginWithEmailOTPTestMode = 'magic_auth_login_with_email_otp_testing_mode',\n LoginWithMagicLinkTestMode = 'magic_login_with_magic_link_testing_mode',\n LoginWithCredentialTestMode = 'magic_auth_login_with_credential_testing_mode',\n GetIdTokenTestMode = 'magic_auth_get_id_token_testing_mode',\n GenerateIdTokenTestMode = 'magic_auth_generate_id_token_testing_mode',\n GetMetadataTestMode = 'magic_auth_get_metadata_testing_mode',\n IsLoggedInTestMode = 'magic_auth_is_logged_in_testing_mode',\n LogoutTestMode = 'magic_auth_logout_testing_mode',\n UpdateEmailTestMode = 'magic_auth_update_email_testing_mode',\n IntermediaryEvent = 'magic_intermediary_event',\n RequestAccounts = 'eth_requestAccounts',\n GetInfo = 'magic_get_info',\n ShowUI = 'magic_wallet',\n NFTPurchase = 'magic_nft_purchase',\n NFTCheckout = 'magic_nft_checkout',\n NFTTransfer = 'magic_nft_transfer',\n RequestUserInfoWithUI = 'mc_request_user_info',\n Disconnect = 'mc_disconnect',\n // UpdatePhoneNumber = 'magic_auth_update_phone_number',\n // UpdatePhoneNumberTestMode = 'magic_auth_update_phone_number_testing_mode',\n RecoverAccount = 'magic_auth_recover_account',\n RecoverAccountTestMode = 'magic_auth_recover_account_testing_mode',\n MagicBoxHeartBeat = 'magic_box_heart_beat',\n AutoConnect = 'mc_auto_connect',\n Login = 'mc_login',\n EncryptV1 = 'magic_auth_encrypt_v1',\n DecryptV1 = 'magic_auth_decrypt_v1',\n ShowNFTs = 'magic_show_nfts',\n ShowOnRamp = 'magic_show_fiat_onramp',\n ShowSendTokensUI = 'magic_show_send_tokens_ui',\n ShowAddress = 'magic_show_address',\n ShowBalances = 'magic_show_balances',\n RevealPK = 'magic_reveal_key',\n EnableMFA = 'magic_auth_enable_mfa_flow',\n DisableMFA = 'magic_auth_disable_mfa_flow',\n GetMultichainPublicAddress = 'magic_get_multichain_public_address',\n Sign7702Authorization = 'magic_wallet_sign_7702_authorization',\n Send7702Transaction = 'eth_send7702Transaction',\n}\n\n// Methods to not route if connected to third party wallet\nexport const routeToMagicMethods = [\n MagicPayloadMethod.IntermediaryEvent,\n MagicPayloadMethod.NFTCheckout,\n MagicPayloadMethod.Login,\n];\n", "import { JsonRpcResponsePayload, JsonRpcError, JsonRpcRequestPayload } from './json-rpc-types';\n\nexport enum MagicIncomingWindowMessage {\n MAGIC_HANDLE_RESPONSE = 'MAGIC_HANDLE_RESPONSE',\n MAGIC_OVERLAY_READY = 'MAGIC_OVERLAY_READY',\n MAGIC_SHOW_OVERLAY = 'MAGIC_SHOW_OVERLAY',\n MAGIC_HIDE_OVERLAY = 'MAGIC_HIDE_OVERLAY',\n MAGIC_HANDLE_EVENT = 'MAGIC_HANDLE_EVENT',\n MAGIC_MG_BOX_SEND_RECEIPT = 'MAGIC_MG_BOX_SEND_RECEIPT',\n MAGIC_SEND_PRODUCT_ANNOUNCEMENT = 'MAGIC_SEND_PRODUCT_ANNOUNCEMENT',\n MAGIC_PONG = 'MAGIC_PONG',\n MAGIC_POPUP_RESPONSE = 'MAGIC_POPUP_RESPONSE',\n MAGIC_POPUP_OAUTH_VERIFY_RESPONSE = 'MAGIC_POPUP_OAUTH_VERIFY_RESPONSE',\n MAGIC_THIRD_PARTY_WALLET_REQUEST = 'MAGIC_THIRD_PARTY_WALLET_REQUEST',\n MAGIC_OPEN_MOBILE_URL = 'MAGIC_OPEN_MOBILE_URL',\n}\n\nexport enum MagicOutgoingWindowMessage {\n MAGIC_HANDLE_REQUEST = 'MAGIC_HANDLE_REQUEST',\n MAGIC_THIRD_PARTY_WALLET_RESPONSE = 'MAGIC_THIRD_PARTY_WALLET_RESPONSE',\n MAGIC_THIRD_PARTY_WALLET_UPDATE = 'MAGIC_THIRD_PARTY_WALLET_EVENT',\n MAGIC_PING = 'MAGIC_PING',\n}\n\n/** The shape of responding window message data from the Magic iframe context. */\nexport interface MagicMessageRequest {\n msgType: string;\n payload: JsonRpcRequestPayload | JsonRpcRequestPayload[];\n rt?: string;\n jwt?: string;\n deviceShare?: string;\n}\n\n/** The shape of responding window message data from the Magic iframe context. */\nexport interface MagicMessageResponse<ResultType = any> {\n msgType: string;\n response: Partial<JsonRpcError> & Partial<JsonRpcResponsePayload<ResultType>>;\n rt?: string;\n deviceShare?: string;\n}\n\n/** The expected message event returned by the Magic iframe context. */\nexport interface MagicMessageEvent extends Partial<MessageEvent> {\n data: MagicMessageResponse;\n}\n\nexport interface MagicThirdPartyWalletRequest {\n msgType: MagicIncomingWindowMessage.MAGIC_THIRD_PARTY_WALLET_REQUEST;\n payload: JsonRpcRequestPayload;\n}\n\nexport interface MagicThirdPartyWalletResponse {\n msgType: `${MagicOutgoingWindowMessage.MAGIC_THIRD_PARTY_WALLET_RESPONSE}-${string}`;\n response: JsonRpcResponsePayload;\n}\n\nexport interface MagicThirdPartyWalletUpdate {\n msgType: `${MagicOutgoingWindowMessage.MAGIC_THIRD_PARTY_WALLET_UPDATE}-${string}`;\n details: {\n address: `0x${string}` | undefined;\n addresses: readonly `0x${string}`[] | undefined;\n chain: { id: number; name: string; [key: string]: unknown } | undefined;\n updatedField: 'chain' | 'address';\n };\n}\n\nexport type MagicThirdPartyWalletEventPayload = MagicThirdPartyWalletResponse | MagicThirdPartyWalletUpdate;\n", "export enum DeepLinkPage {\n UpdateEmail = 'update-email',\n MFA = 'mfa',\n Recovery = 'recovery',\n}\n", "import { WalletEventOnReceived } from './wallet-types';\n\nexport interface LoginWithMagicLinkConfiguration {\n /**\n * The email address of the user attempting to login.\n */\n email: string;\n\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to check their email for the \"magic link\" to complete their\n * authentication.\n */\n showUI?: boolean;\n\n /**\n * You can optionally provide a redirect URI that will be followed at the end\n * of the magic link flow. Don't forget to invoke\n * `magic.auth.loginWithCredential()` to complete the login from the route you\n * configure here.\n */\n redirectURI?: string;\n\n /**\n * Enterprise users with a custom SMTP can create custom email templates\n * from their dashboard. The default Magic loginWithMagicLink email will be\n * overridden when a variation is passed here.\n */\n overrides?: {\n variation?: string;\n };\n\n /**\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface LoginWithSmsConfiguration {\n /**\n * Specify the phone number of the user attempting to login.\n */\n phoneNumber: string;\n\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to check their SMS for the one time passcode (OTP) to complete their\n * authentication.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the SMS OTP flow.\n */\n showUI?: boolean;\n\n /*\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\nexport interface LoginWithEmailOTPConfiguration {\n /**\n * Specify the email address of the user attempting to login.\n */\n email: string;\n\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to check their email for the one time passcode (OTP) to complete their\n * authentication.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the email OTP flow.\n */\n showUI?: boolean;\n\n /**\n * Device Unrecognized UI will enforce showing up to secure user's login\n *\n * When set to true (default), an improved device recognition UI will be displayed to the user,\n * prompting them to verify their login by checking their email for device approval. This feature\n * enhances authentication security.\n *\n * This param will only be affected if showUI is false. When set to false,\n * developers have the flexibility to implement their own customized UI to\n * handle device check events, providing a more tailored user experience.\n */\n deviceCheckUI?: boolean;\n\n /**\n * Enterprise users with a custom SMTP can create custom email templates\n * from their dashboard. The default Magic loginWithOTP email will be\n * overridden when a variation is passed here.\n */\n overrides?: {\n variation?: string;\n appName?: string;\n assetUrl?: string;\n };\n\n /**\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface LoginWithCredentialConfiguration {\n /**\n * A credential token or a valid query string (prefixed with ? or #)\n */\n credentialOrQueryString?: string;\n\n /**\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface EnableMFAConfiguration {\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to enable MFA using Google Authenticator app.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the enable MFA flow.\n */\n showUI?: boolean;\n}\n\nexport interface DisableMFAConfiguration {\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to disable MFA.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the disable MFA flow.\n */\n showUI?: boolean;\n}\n\n/**\n * Auth Events Enum\n */\nexport enum LoginWithMagicLinkEventEmit {\n Retry = 'retry',\n}\n\nexport enum LoginWithMagicLinkEventOnReceived {\n EmailSent = 'email-sent',\n EmailNotDeliverable = 'email-not-deliverable',\n}\n\nexport enum LoginWithEmailOTPEventEmit {\n VerifyEmailOtp = 'verify-email-otp',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n Cancel = 'cancel',\n}\n\nexport enum LoginWithSmsOTPEventEmit {\n VerifySmsOtp = 'verify-sms-otp',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n Cancel = 'cancel',\n Retry = 'retry',\n}\n\nexport enum LoginWithSmsOTPEventOnReceived {\n SmsOTPSent = 'sms-otp-sent',\n InvalidSmsOtp = 'invalid-sms-otp',\n ExpiredSmsOtp = 'expired-sms-otp',\n MfaSentHandle = 'mfa-sent-handle',\n InvalidMfaOtp = 'invalid-mfa-otp',\n LoginThrottled = 'login-throttled',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n}\n\nexport enum LoginWithEmailOTPEventOnReceived {\n EmailOTPSent = 'email-otp-sent',\n InvalidEmailOtp = 'invalid-email-otp',\n InvalidMfaOtp = 'invalid-mfa-otp',\n ExpiredEmailOtp = 'expired-email-otp',\n MfaSentHandle = 'mfa-sent-handle',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n LoginThrottled = 'login-throttled',\n MaxAttemptsReached = 'max-attempts-reached',\n}\n\nexport enum DeviceVerificationEventEmit {\n Retry = 'device-retry',\n}\n\nexport enum DeviceVerificationEventOnReceived {\n DeviceApproved = 'device-approved',\n DeviceNeedsApproval = 'device-needs-approval',\n DeviceVerificationLinkExpired = 'device-verification-link-expired',\n DeviceVerificationEmailSent = 'device-verification-email-sent',\n}\n\nexport enum RecencyCheckEventEmit {\n Retry = 'Recency/auth-factor-retry',\n Cancel = 'Recency/auth-factor-verification-cancel',\n VerifyEmailOtp = 'Recency/auth-factor-verify-email-otp',\n VerifyMFACode = 'Recency/verify-mfa-code',\n}\n\nexport enum RecencyCheckEventOnReceived {\n PrimaryAuthFactorNeedsVerification = 'Recency/auth-factor-needs-verification',\n PrimaryAuthFactorVerified = 'Recency/auth-factor-verified',\n InvalidEmailOtp = 'Recency/auth-factor-invalid-email-otp',\n EmailExpired = 'Recency/auth-factor-verification-email-expired',\n EmailSent = 'Recency/auth-factor-verification-email-sent',\n EmailNotDeliverable = 'Recency/auth-factor-verification-email-not-deliverable',\n}\n\nexport enum UpdateEmailEventEmit {\n RetryWithNewEmail = 'UpdateEmail/retry-with-new-email',\n Cancel = 'UpdateEmail/new-email-verification-cancel',\n VerifyEmailOtp = 'UpdateEmail/new-email-verify-otp',\n}\n\nexport enum UpdateEmailEventOnReceived {\n NewAuthFactorNeedsVerification = 'UpdateEmail/new-email-needs-verification',\n EmailUpdated = 'UpdateEmail/email-updated',\n InvalidEmailOtp = 'UpdateEmail/new-email-invalid-email-otp',\n EmailExpired = 'UpdateEmail/new-email-verification-email-expired',\n EmailSent = 'UpdateEmail/new-email-verification-email-sent',\n EmailNotDeliverable = 'UpdateEmail/new-email-verification-email-not-deliverable',\n InvalidEmail = 'UpdateEmail/new-email-invalid',\n EmailAlreadyExists = 'UpdateEmail/new-email-already-exists',\n}\n\nexport enum AuthEventOnReceived {\n IDTokenCreated = 'Auth/id-token-created',\n}\n\nexport enum FarcasterLoginEventEmit {\n Cancel = 'Farcaster/cancel',\n}\n\nexport enum EnableMFAEventOnReceived {\n MFASecretGenerated = 'mfa-secret-generated',\n InvalidMFAOtp = 'invalid-mfa-otp',\n MFARecoveryCodes = 'mfa-recovery-codes',\n}\nexport enum EnableMFAEventEmit {\n VerifyMFACode = 'verify-mfa-code',\n Cancel = 'cancel-mfa-setup',\n}\n\nexport enum DisableMFAEventOnReceived {\n MFACodeRequested = 'mfa-code-requested',\n InvalidMFAOtp = 'invalid-mfa-otp',\n InvalidRecoveryCode = 'invalid-recovery-code',\n}\n\nexport enum DisableMFAEventEmit {\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n Cancel = 'cancel-mfa-disable',\n}\n\n/**\n * EventHandlers\n */\nexport type LoginWithMagicLinkEventHandlers = {\n // Event Received\n [LoginWithMagicLinkEventOnReceived.EmailSent]: () => void;\n [LoginWithMagicLinkEventOnReceived.EmailNotDeliverable]: () => void;\n\n // Event sent\n [LoginWithMagicLinkEventEmit.Retry]: () => void;\n} & DeviceVerificationEventHandlers;\n\nexport type LoginWithSmsOTPEventHandlers = {\n // Event sent\n [LoginWithSmsOTPEventEmit.VerifySmsOtp]: (otp: string) => void;\n [LoginWithSmsOTPEventEmit.VerifyMFACode]: (mfa: string) => void;\n [LoginWithSmsOTPEventEmit.LostDevice]: () => void;\n [LoginWithSmsOTPEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n [LoginWithSmsOTPEventEmit.Cancel]: () => void;\n [LoginWithSmsOTPEventEmit.Retry]: () => void;\n\n // Event received\n [LoginWithSmsOTPEventOnReceived.SmsOTPSent]: () => void;\n [LoginWithSmsOTPEventOnReceived.InvalidSmsOtp]: () => void;\n [LoginWithSmsOTPEventOnReceived.ExpiredSmsOtp]: () => void;\n [LoginWithSmsOTPEventOnReceived.MfaSentHandle]: () => void;\n [LoginWithSmsOTPEventOnReceived.InvalidMfaOtp]: () => void;\n [LoginWithSmsOTPEventOnReceived.LoginThrottled]: () => void;\n [LoginWithSmsOTPEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [LoginWithSmsOTPEventOnReceived.InvalidRecoveryCode]: () => void;\n [LoginWithSmsOTPEventOnReceived.RecoveryCodeSuccess]: () => void;\n} & DeviceVerificationEventHandlers;\n\nexport type LoginWithEmailOTPEventHandlers = {\n // Event Received\n [LoginWithEmailOTPEventOnReceived.EmailOTPSent]: () => void;\n [LoginWithEmailOTPEventOnReceived.LoginThrottled]: () => void;\n [LoginWithEmailOTPEventOnReceived.InvalidEmailOtp]: () => void;\n [LoginWithEmailOTPEventOnReceived.InvalidMfaOtp]: () => void;\n [LoginWithEmailOTPEventOnReceived.ExpiredEmailOtp]: () => void;\n [LoginWithEmailOTPEventOnReceived.MfaSentHandle]: () => void;\n [LoginWithEmailOTPEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [LoginWithEmailOTPEventOnReceived.InvalidRecoveryCode]: () => void;\n [LoginWithEmailOTPEventOnReceived.RecoveryCodeSuccess]: () => void;\n [LoginWithEmailOTPEventOnReceived.MaxAttemptsReached]: () => void;\n [AuthEventOnReceived.IDTokenCreated]: (idToken: string) => void;\n [WalletEventOnReceived.WalletInfoFetched]: () => void;\n\n // Event sent\n [LoginWithEmailOTPEventEmit.VerifyEmailOtp]: (otp: string) => void;\n [LoginWithEmailOTPEventEmit.VerifyMFACode]: (mfa: string) => void;\n [LoginWithEmailOTPEventEmit.LostDevice]: () => void;\n [LoginWithEmailOTPEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n [LoginWithEmailOTPEventEmit.Cancel]: () => void;\n} & DeviceVerificationEventHandlers;\n\ntype DeviceVerificationEventHandlers = {\n // Event Received\n [DeviceVerificationEventOnReceived.DeviceNeedsApproval]: () => void;\n [DeviceVerificationEventOnReceived.DeviceVerificationEmailSent]: () => void;\n [DeviceVerificationEventOnReceived.DeviceVerificationLinkExpired]: () => void;\n [DeviceVerificationEventOnReceived.DeviceApproved]: () => void;\n\n // Event sent\n [DeviceVerificationEventEmit.Retry]: () => void;\n};\n\n/**\n * Update Email\n */\n\nexport type RecencyCheckEventHandlers = {\n [RecencyCheckEventOnReceived.PrimaryAuthFactorNeedsVerification]: () => void;\n [RecencyCheckEventOnReceived.PrimaryAuthFactorVerified]: () => void;\n [RecencyCheckEventOnReceived.InvalidEmailOtp]: () => void;\n [RecencyCheckEventOnReceived.EmailNotDeliverable]: () => void;\n [RecencyCheckEventOnReceived.EmailExpired]: () => void;\n [RecencyCheckEventOnReceived.EmailSent]: () => void;\n\n [RecencyCheckEventEmit.Cancel]: () => void;\n [RecencyCheckEventEmit.Retry]: () => void;\n [RecencyCheckEventEmit.VerifyEmailOtp]: (otp: string) => void;\n [RecencyCheckEventEmit.VerifyMFACode]: (mfa: string) => void;\n};\n\nexport type UpdateEmailEventHandlers = {\n [UpdateEmailEventOnReceived.NewAuthFactorNeedsVerification]: () => void;\n [UpdateEmailEventOnReceived.EmailUpdated]: () => void;\n [UpdateEmailEventOnReceived.InvalidEmailOtp]: () => void;\n [UpdateEmailEventOnReceived.EmailNotDeliverable]: () => void;\n [UpdateEmailEventOnReceived.EmailExpired]: () => void;\n [UpdateEmailEventOnReceived.EmailSent]: () => void;\n [UpdateEmailEventOnReceived.InvalidEmail]: () => void;\n [UpdateEmailEventOnReceived.EmailAlreadyExists]: () => void;\n\n [UpdateEmailEventEmit.Cancel]: () => void;\n [UpdateEmailEventEmit.RetryWithNewEmail]: (email?: string) => void;\n [UpdateEmailEventEmit.VerifyEmailOtp]: (otp: string) => void;\n} & RecencyCheckEventHandlers;\n\n/**\n * Enable MFA\n */\n\nexport type EnableMFAEventHandlers = {\n // Event Received\n [EnableMFAEventOnReceived.MFASecretGenerated]: ({ QRCode, key }: { QRCode: string; key: string }) => void;\n [EnableMFAEventOnReceived.InvalidMFAOtp]: ({ errorCode }: { errorCode: string }) => void;\n [EnableMFAEventOnReceived.MFARecoveryCodes]: ({ recoveryCode }: { recoveryCode: string }) => void;\n\n // Event sent\n [EnableMFAEventEmit.VerifyMFACode]: (totp: string) => void;\n [EnableMFAEventEmit.Cancel]: () => void;\n};\n\n/**\n * Disable MFA\n */\n\nexport type DisableMFAEventHandlers = {\n // Event Received\n [DisableMFAEventOnReceived.MFACodeRequested]: () => void;\n [DisableMFAEventOnReceived.InvalidMFAOtp]: ({ errorCode }: { errorCode: string }) => void;\n [DisableMFAEventOnReceived.InvalidRecoveryCode]: () => void;\n\n // Event sent\n [DisableMFAEventEmit.VerifyMFACode]: (totp: string) => void;\n [DisableMFAEventEmit.LostDevice]: (recoveryCode: string) => void;\n [DisableMFAEventEmit.Cancel]: () => void;\n};\n", "export type EthNetworkName = 'mainnet' | 'goerli' | 'sepolia';\n\nexport enum EthChainType {\n Harmony = 'HARMONY',\n}\n\nexport interface CustomNodeConfiguration {\n rpcUrl: string;\n chainId?: number;\n chainType?: EthChainType;\n}\n\nexport type EthNetworkConfiguration = EthNetworkName | CustomNodeConfiguration;\n\nexport type ProviderEnableEvents = {\n 'id-token-created': (params: { idToken: string }) => void;\n};\n", "import { RecencyCheckEventHandlers } from './auth-types';\nimport { DeepLinkPage } from '../core/deep-link-pages';\n\nexport interface GetIdTokenConfiguration {\n /**\n * The number of seconds until the generated ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface GenerateIdTokenConfiguration extends GetIdTokenConfiguration {\n /**\n * An optional piece of data to sign with the token. Note, however, that the\n * unsigned data _will not_ be encoded in the token, only an encrypted\n * signature of the data.\n */\n attachment?: string;\n}\n\nexport enum UserEventsEmit {\n ClosedByUser = 'closed-by-user',\n}\n\nexport enum UserEventsOnReceived {\n ClosedByUser = 'closed-by-user-on-received',\n}\n\nexport interface ChainWalletInfo {\n publicAddress: string | null;\n subAccounts: Array<{ name: string; publicAddress: string }>;\n}\n\nexport interface MagicUserMetadata {\n issuer: string | null;\n email: string | null;\n phoneNumber: string | null;\n isMfaEnabled: boolean;\n recoveryFactors: [RecoveryFactor] | [];\n firstLoginAt: string | null;\n wallets: {\n ethereum?: ChainWalletInfo;\n algorand?: ChainWalletInfo;\n aptos?: ChainWalletInfo;\n avalancheX?: ChainWalletInfo;\n bitcoin?: ChainWalletInfo;\n conflux?: ChainWalletInfo;\n cosmos?: ChainWalletInfo;\n flow?: ChainWalletInfo;\n harmony?: ChainWalletInfo;\n hedera?: ChainWalletInfo;\n icon?: ChainWalletInfo;\n kadena?: ChainWalletInfo;\n near?: ChainWalletInfo;\n polkadot?: ChainWalletInfo;\n solana?: ChainWalletInfo;\n sui?: ChainWalletInfo;\n taquito?: ChainWalletInfo;\n terra?: ChainWalletInfo;\n tezos?: ChainWalletInfo;\n zilliqa?: ChainWalletInfo;\n [chain: string]: ChainWalletInfo | undefined;\n };\n}\n\nexport enum RecoveryFactorEventOnReceived {\n EnterNewPhoneNumber = 'enter-new-phone-number',\n EnterOtpCode = 'enter-otp-code',\n RecoveryFactorAlreadyExists = 'recovery-factor-already-exists',\n MalformedPhoneNumber = 'malformed-phone-number',\n InvalidOtpCode = 'invalid-otp-code',\n RecoveryFactorUpdated = 'recovery-factor-updated',\n RecoveryFactorDeleted = 'recovery-factor-deleted',\n}\n\nexport enum RecoveryFactorEventEmit {\n SendNewPhoneNumber = 'send-new-phone-number',\n SendOtpCode = 'send-otp-code',\n Cancel = 'cancel',\n StartEditPhoneNumber = 'start-edit-phone-number',\n}\n\ntype RecoveryFactor = {\n type: RecoveryMethodType;\n value: string;\n};\n\nexport type RecoveryFactorEventHandlers = {\n // Event Received\n [RecoveryFactorEventEmit.SendNewPhoneNumber]: (phone_number: string) => void;\n [RecoveryFactorEventEmit.SendOtpCode]: (otp: string) => void;\n [RecoveryFactorEventEmit.StartEditPhoneNumber]: () => void;\n [RecoveryFactorEventEmit.Cancel]: () => void;\n\n // Event sent\n [RecoveryFactorEventOnReceived.EnterNewPhoneNumber]: () => void;\n [RecoveryFactorEventOnReceived.EnterOtpCode]: () => void;\n [RecoveryFactorEventOnReceived.RecoveryFactorAlreadyExists]: () => void;\n [RecoveryFactorEventOnReceived.MalformedPhoneNumber]: () => void;\n [RecoveryFactorEventOnReceived.InvalidOtpCode]: () => void;\n [RecoveryFactorEventOnReceived.RecoveryFactorUpdated]: (updatedFactor: { type: string; value: string }) => void;\n [RecoveryFactorEventOnReceived.RecoveryFactorDeleted]: () => void;\n} & RecencyCheckEventHandlers;\n\nexport enum RecoveryMethodType {\n PhoneNumber = 'phone_number',\n}\n\nexport interface UpdateEmailConfiguration {\n /**\n * The new email address to update to\n */\n email: string;\n\n /**\n * When `true`, a pre-built pending modal interface will\n * guide the user to check their new, followed by old emails\n * for confirmation emails.\n */\n showUI?: boolean;\n}\n\nexport interface UpdateWebAuthnInfoConfiguration {\n /**\n * WebAuthn info id\n */\n id: string;\n\n /**\n * nickname that user attempts to update to the webauth device associate to the id.\n */\n nickname: string;\n}\n\nexport interface RecoverAccountConfiguration {\n /**\n * The email to recover\n */\n email: string;\n showUI: boolean;\n}\n\nexport interface ShowSettingsConfiguration {\n /**\n * deep linking destination\n */\n page: DeepLinkPage;\n showUI?: boolean;\n}\n\nexport enum RecoverAccountEventOnReceived {\n SmsOtpSent = 'sms-otp-sent',\n LoginThrottled = 'login-throttled',\n InvalidSmsOtp = 'invalid-sms-otp',\n SmsVerified = 'sms-verified',\n AccountRecovered = 'account-recovered',\n UpdateEmailRequired = 'update-email-required',\n}\n\nexport enum RecoverAccountEventEmit {\n Cancel = 'cancel',\n VerifyOtp = 'verify-otp-code',\n ResendSms = 'resend-sms-otp',\n UpdateEmail = 'update-email',\n}\n\nexport type RecoverAccountEventHandlers = {\n // Event Received\n [RecoverAccountEventEmit.Cancel]: () => void;\n [RecoverAccountEventEmit.VerifyOtp]: (otp: string) => void;\n [RecoverAccountEventEmit.ResendSms]: () => void;\n [RecoverAccountEventEmit.UpdateEmail]: (email: string) => void;\n\n // Event sent\n [RecoverAccountEventOnReceived.SmsOtpSent]: ({ phoneNumber }: { phoneNumber: string }) => void;\n [RecoverAccountEventOnReceived.LoginThrottled]: (error: string) => void;\n [RecoverAccountEventOnReceived.InvalidSmsOtp]: ({\n errorMessage,\n errorCode,\n }: {\n errorMessage: string;\n errorCode: string;\n }) => void;\n [RecoverAccountEventOnReceived.SmsVerified]: () => void;\n [RecoverAccountEventOnReceived.AccountRecovered]: () => void;\n [RecoverAccountEventOnReceived.UpdateEmailRequired]: () => void;\n};\n", "export type NFTResponseStatus = 'cancelled' | 'pending' | 'processed' | 'declined' | 'expired';\n\nexport type NFTResponse = {\n status: NFTResponseStatus;\n};\n\nexport interface NFTPurchaseRequest {\n nft: {\n name: string;\n imageUrl: string;\n blockchainNftId: string;\n contractAddress: string;\n network: string;\n platform: string;\n type: string;\n };\n identityPrefill: {\n firstName: string;\n lastName: string;\n dateOfBirth: string; // YYYY-MM-DD\n emailAddress: string;\n phone: string;\n address: {\n street1: string;\n street2: string;\n city: string;\n regionCode: string;\n postalCode: string;\n countryCode: string;\n };\n };\n}\n\nexport type NFTPurchaseResponse = NFTResponse & {\n errorMessage?: string;\n};\n\nexport interface NFTCheckoutRequest {\n // given by magic / found in the developer dashboard in future\n contractId: string;\n // in contract, if ERC1155\u2026 for ERC721, use token ID = 0\n tokenId: string;\n name: string;\n imageUrl: string;\n quantity?: number; // default is 1\n walletAddress?: string; // default is user's wallet address\n // If enabled, the user will be able to pay with crypto. the default is false\n isCryptoCheckoutEnabled?: boolean;\n walletProvider?: 'magic' | 'web3modal';\n}\n\nexport type NFTCheckoutResponse = NFTResponse;\n\nexport type NFTCheckoutEvents = {\n disconnect: () => void;\n 'nft-checkout-initiated': (rawTransaction: string) => void;\n};\n\nexport interface NFTTransferRequest {\n tokenId: string;\n contractAddress: string;\n quantity?: number;\n recipient?: string;\n}\n\nexport type NFTTransferResponse = NFTResponse;\n\nexport enum NftCheckoutIntermediaryEvents {\n Success = 'nft-checkout-success',\n Failure = 'nft-checkout-failure',\n Initiated = 'nft-checkout-initiated',\n Disconnect = 'disconnect',\n}\n\nexport type NftCheckoutEventHandler = {\n [NftCheckoutIntermediaryEvents.Initiated]: (rawTransaction: string) => void;\n [NftCheckoutIntermediaryEvents.Success]: (signedTransaction: string) => void;\n [NftCheckoutIntermediaryEvents.Failure]: () => void;\n};\n", "export type AccessListEntry = { address: string; storageKeys: Array<string> };\n\n/**\n * An ordered collection of [[AccessList]] entries.\n */\nexport type AccessList = Array<AccessListEntry>;\n\nexport enum WalletEventOnReceived {\n WalletInfoFetched = 'Wallet/wallet-info-fetched',\n}\n\n/**\n * Request parameters for EIP-7702 authorization signing\n */\nexport interface Sign7702AuthorizationRequest {\n /**\n * The smart contract implementation address the EOA delegates to\n */\n contractAddress: string;\n\n /**\n * The chain ID for the network (use 0 for universal cross-chain authorization)\n */\n chainId: number;\n\n /**\n * The nonce for the EOA account (transaction count)\n */\n nonce?: number;\n}\n\n/**\n * Response from EIP-7702 authorization signing\n */\nexport interface Sign7702AuthorizationResponse {\n /**\n * The contract address that was authorized\n */\n contractAddress: string;\n\n /**\n * The chain ID for the authorization\n */\n chainId: number;\n\n /**\n * The nonce used in the authorization\n */\n nonce: number;\n\n /**\n * The v component of the signature (recovery id)\n */\n v: number;\n\n /**\n * The r component of the signature\n */\n r: string;\n\n /**\n * The s component of the signature\n */\n s: string;\n\n /**\n * Optional: Full signature as hex string\n */\n signature?: string;\n}\n\n/**\n * Request parameters for sending an EIP-7702 transaction with authorization list\n */\nexport interface Send7702TransactionRequest {\n /**\n * The recipient address\n */\n to: string;\n\n /**\n * The value to send in wei (as hex string)\n */\n value?: string;\n\n /**\n * The transaction data (calldata)\n */\n data?: string;\n\n /**\n * Gas limit for the transaction (as hex string)\n */\n gas?: string;\n\n /**\n * Gas limit for the transaction (alias for gas)\n */\n gasLimit?: string;\n\n /**\n * Maximum fee per gas for EIP-1559 transactions (as hex string)\n */\n maxFeePerGas?: string;\n\n /**\n * Maximum priority fee per gas for EIP-1559 transactions (as hex string)\n */\n maxPriorityFeePerGas?: string;\n\n /**\n * Transaction nonce (if not provided, will be fetched from network)\n */\n nonce?: number;\n\n /**\n * The list of signed EIP-7702 authorizations to include in the transaction\n */\n authorizationList: Sign7702AuthorizationResponse[];\n}\n\n/**\n * Response from sending an EIP-7702 transaction\n */\nexport interface Send7702TransactionResponse {\n /**\n * The transaction hash\n */\n transactionHash: string;\n}", "export enum UiEventsEmit {\n CloseMagicWindow = 'close-magic-window',\n}\n", "// Shared MFA events reused by both popup and redirect flows\nexport enum OAuthMFAEventEmit {\n Cancel = 'cancel',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n}\n\nexport enum OAuthMFAEventOnReceived {\n MfaSentHandle = 'mfa-sent-handle',\n InvalidMfaOtp = 'invalid-mfa-otp',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n}\n\ntype OAuthMFAEventHandlers = {\n // Event sent\n [OAuthMFAEventEmit.Cancel]: () => void;\n [OAuthMFAEventEmit.VerifyMFACode]: (mfa: string) => void;\n [OAuthMFAEventEmit.LostDevice]: () => void;\n [OAuthMFAEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n // Event Received\n [OAuthMFAEventOnReceived.MfaSentHandle]: () => void;\n [OAuthMFAEventOnReceived.InvalidMfaOtp]: () => void;\n [OAuthMFAEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [OAuthMFAEventOnReceived.InvalidRecoveryCode]: () => void;\n [OAuthMFAEventOnReceived.RecoveryCodeSuccess]: () => void;\n};\n\n// Popup-specific events\nexport enum OAuthPopupEventOnReceived {\n PopupUrl = 'popup-url',\n}\n\nexport enum OAuthPopupEventEmit {\n PopupEvent = 'popup-event',\n}\n\nexport type OAuthPopupEventHandlers = {\n [OAuthPopupEventEmit.PopupEvent]: (eventData: unknown) => void;\n [OAuthPopupEventOnReceived.PopupUrl]: (event: { popupUrl: string; provider: string }) => void;\n} & OAuthMFAEventHandlers;\n\n// Redirect-specific handler type\nexport type OAuthGetResultEventHandlers = OAuthMFAEventHandlers;\n", "export interface PasskeyResult {\n // null if skipDIDToken is true\n idToken: string | null;\n\n // Info of the device used to authenticate\n deviceInfo: {\n id: string;\n nickname: string;\n transport: string;\n userAgent: string;\n };\n}\n\nexport enum PasskeyMFAEventEmit {\n Cancel = 'cancel',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n}\nexport enum PasskeyMFAEventOnReceived {\n MfaSentHandle = 'mfa-sent-handle',\n InvalidMfaOtp = 'invalid-mfa-otp',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n}\n\nexport type PasskeyEventHandlers = {\n // Event sent\n [PasskeyMFAEventEmit.Cancel]: () => void;\n [PasskeyMFAEventEmit.VerifyMFACode]: (mfa: string) => void;\n [PasskeyMFAEventEmit.LostDevice]: () => void;\n [PasskeyMFAEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n // Event Received\n [PasskeyMFAEventOnReceived.MfaSentHandle]: () => void;\n [PasskeyMFAEventOnReceived.InvalidMfaOtp]: () => void;\n [PasskeyMFAEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [PasskeyMFAEventOnReceived.InvalidRecoveryCode]: () => void;\n [PasskeyMFAEventOnReceived.RecoveryCodeSuccess]: () => void;\n};\n", "/**\n * Encode given buffer or decode given string with Base64URL.\n */\nexport class Base64URL {\n /**\n * Convert bytes into a base64url-encoded string\n */\n static encode(buffer: ArrayBuffer): string {\n const base64 = globalThis.btoa(String.fromCharCode(...new Uint8Array(buffer)));\n\n return base64.replace(/=/g, '').replace(/\\+/g, '-').replace(/\\//g, '_');\n }\n\n /**\n * Convert a base64url-encoded string into bytes\n */\n static decode(base64url: string): ArrayBuffer {\n const base64 = base64url.replace(/-/g, '+').replace(/_/g, '/');\n const binStr = globalThis.atob(base64);\n const bin = new Uint8Array(binStr.length);\n\n for (let i = 0; i < binStr.length; i++) {\n bin[i] = binStr.charCodeAt(i);\n }\n\n return bin.buffer;\n }\n}\n", "import { Base64URL } from './base64';\n\nfunction isAuthenticatorAssertionResponse(value: AuthenticatorResponse): value is AuthenticatorAssertionResponse {\n if (typeof value !== 'object') {\n return false;\n }\n if (\n (value as AuthenticatorAssertionResponse)?.authenticatorData === undefined ||\n typeof (value as AuthenticatorAssertionResponse)?.authenticatorData !== 'object'\n ) {\n return false;\n }\n return true;\n}\n\nfunction isAuthenticatorAttestationResponse(value: AuthenticatorResponse): value is AuthenticatorAttestationResponse {\n if (typeof value !== 'object') {\n return false;\n }\n if (\n (value as AuthenticatorAttestationResponse)?.attestationObject === undefined ||\n typeof (value as AuthenticatorAttestationResponse)?.attestationObject !== 'object'\n ) {\n return false;\n }\n return true;\n}\n\n/**\n * Polyfill `PublicKeyCredential.prototype.toJSON`\n *\n * See https://w3c.github.io/webauthn/#dom-publickeycredential-tojson\n */\nexport function toJSON(cred: PublicKeyCredential): PublicKeyCredentialJSON {\n // Prefer native implementation if available\n if (typeof cred.toJSON === 'function') {\n return cred.toJSON();\n }\n\n try {\n const id = cred.id;\n const rawId = Base64URL.encode(cred.rawId);\n const authenticatorAttachment = cred.authenticatorAttachment;\n const clientExtensionResults = {};\n const type = cred.type;\n\n // This is authentication.\n if (isAuthenticatorAssertionResponse(cred.response)) {\n return {\n id,\n rawId,\n response: {\n authenticatorData: Base64URL.encode(cred.response.authenticatorData),\n clientDataJSON: Base64URL.encode(cred.response.clientDataJSON),\n signature: Base64URL.encode(cred.response.signature),\n userHandle: cred.response.userHandle ? Base64URL.encode(cred.response.userHandle) : undefined,\n },\n authenticatorAttachment,\n clientExtensionResults,\n type,\n };\n }\n\n if (isAuthenticatorAttestationResponse(cred.response)) {\n // This is registration.\n return {\n id,\n rawId,\n response: {\n clientDataJSON: Base64URL.encode(cred.response.clientDataJSON),\n attestationObject: Base64URL.encode(cred.response.attestationObject),\n transports: cred.response?.getTransports() || [],\n },\n authenticatorAttachment,\n clientExtensionResults,\n type,\n };\n }\n\n throw new Error('Unexpected object.');\n } catch (error) {\n console.error(error);\n throw error;\n }\n}\n"],
5
- "mappings": "yaAAA,IAAAA,GAAA,GAAAC,EAAAD,GAAA,uBAAAE,IAAA,eAAAC,EAAAH,IAAA,IAAAI,EAA0B,+BCAnB,IAAKC,GAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,eAAiB,sBACjBA,EAAA,kBAAoB,qBACpBA,EAAA,gBAAkB,mBAClBA,EAAA,wBAA0B,4BAC1BA,EAAA,uBAAyB,0BAPfA,IAAAA,GAAA,CAAA,CAAA,EAUAC,GAAAA,IACVA,EAAA,eAAiB,mBACjBA,EAAA,gBAAkB,mBAClBA,EAAA,iCAAmC,sCACnCA,EAAA,kBAAoB,qBACpBA,EAAA,oBAAsB,eALZA,IAAAA,GAAA,CAAA,CAAA,EAQAC,GAAAA,IAEVA,EAAAA,EAAA,WAAa,MAAA,EAAb,aACAA,EAAAA,EAAA,eAAiB,MAAA,EAAjB,iBACAA,EAAAA,EAAA,eAAiB,MAAA,EAAjB,iBACAA,EAAAA,EAAA,cAAgB,MAAA,EAAhB,gBACAA,EAAAA,EAAA,cAAgB,MAAA,EAAhB,gBAGAA,EAAAA,EAAA,4BAA8B,IAAA,EAA9B,8BACAA,EAAAA,EAAA,iBAAmB,MAAA,EAAnB,mBACAA,EAAAA,EAAA,qBAAuB,MAAA,EAAvB,uBACAA,EAAAA,EAAA,oBAAsB,MAAA,EAAtB,sBACAA,EAAAA,EAAA,kBAAoB,MAAA,EAApB,oBACAA,EAAAA,EAAA,qBAAuB,MAAA,EAAvB,uBACAA,EAAAA,EAAA,4BAA8B,MAAA,EAA9B,8BACAA,EAAAA,EAAA,kBAAoB,MAAA,EAApB,oBACAA,EAAAA,EAAA,mBAAqB,MAAA,EAArB,qBACAA,EAAAA,EAAA,mBAAqB,MAAA,EAArB,qBACAA,EAAAA,EAAA,iBAAmB,MAAA,EAAnB,mBACAA,EAAAA,EAAA,sBAAwB,MAAA,EAAxB,wBACAA,EAAAA,EAAA,kBAAoB,MAAA,EAApB,oBACAA,EAAAA,EAAA,sBAAwB,MAAA,EAAxB,wBACAA,EAAAA,EAAA,SAAW,MAAA,EAAX,WACAA,EAAAA,EAAA,gBAAkB,MAAA,EAAlB,kBACAA,EAAAA,EAAA,mBAAqB,MAAA,EAArB,qBACAA,EAAAA,EAAA,gBAAkB,MAAA,EAAlB,kBA1BUA,IAAAA,GAAA,CAAA,CAAA,ECgCAC,GAAAA,IACVA,EAAA,SAAW,qBACXA,EAAA,QAAU,oBACVA,EAAA,SAAW,oBAHDA,IAAAA,GAAA,CAAA,CAAA,EAMAC,GAAAA,IACVA,EAAA,gBAAkB,mBAClBA,EAAA,eAAiB,kBACjBA,EAAA,kBAAoB,qBAHVA,IAAAA,GAAA,CAAA,CAAA,EAoBAC,GAAAA,IACVA,EAAA,aAAe,4BACfA,EAAA,kBAAoB,kCACpBA,EAAA,mBAAqB,mCACrBA,EAAA,oBAAsB,mCACtBA,EAAA,sBAAwB,qCACxBA,EAAA,WAAa,0BACbA,EAAA,gBAAkB,+BAClBA,EAAA,YAAc,0BACdA,EAAA,WAAa,qBACbA,EAAA,OAAS,oBACTA,EAAA,YAAc,0BACdA,EAAA,aAAe,sBACfA,EAAA,qBAAuB,mCACvBA,EAAA,qBAAuB,yCACvBA,EAAA,0BAA4B,+CAC5BA,EAAA,2BAA6B,2CAC7BA,EAAA,4BAA8B,gDAC9BA,EAAA,mBAAqB,uCACrBA,EAAA,wBAA0B,4CAC1BA,EAAA,oBAAsB,uCACtBA,EAAA,mBAAqB,uCACrBA,EAAA,eAAiB,iCACjBA,EAAA,oBAAsB,uCACtBA,EAAA,kBAAoB,2BACpBA,EAAA,gBAAkB,sBAClBA,EAAA,QAAU,iBACVA,EAAA,OAAS,eACTA,EAAA,YAAc,qBACdA,EAAA,YAAc,qBACdA,EAAA,YAAc,qBACdA,EAAA,sBAAwB,uBACxBA,EAAA,WAAa,gBAGbA,EAAA,eAAiB,6BACjBA,EAAA,uBAAyB,0CACzBA,EAAA,kBAAoB,uBACpBA,EAAA,YAAc,kBACdA,EAAA,MAAQ,WACRA,EAAA,UAAY,wBACZA,EAAA,UAAY,wBACZA,EAAA,SAAW,kBACXA,EAAA,WAAa,yBACbA,EAAA,iBAAmB,4BACnBA,EAAA,YAAc,qBACdA,EAAA,aAAe,sBACfA,EAAA,SAAW,mBACXA,EAAA,UAAY,6BACZA,EAAA,WAAa,8BACbA,EAAA,2BAA6B,sCAC7BA,EAAA,sBAAwB,uCACxBA,EAAA,oBAAsB,0BApDZA,IAAAA,GAAA,CAAA,CAAA,EC1EL,IAAKC,GAAAA,IACVA,EAAA,sBAAwB,wBACxBA,EAAA,oBAAsB,sBACtBA,EAAA,mBAAqB,qBACrBA,EAAA,mBAAqB,qBACrBA,EAAA,mBAAqB,qBACrBA,EAAA,0BAA4B,4BAC5BA,EAAA,gCAAkC,kCAClCA,EAAA,WAAa,aACbA,EAAA,qBAAuB,uBACvBA,EAAA,kCAAoC,oCACpCA,EAAA,iCAAmC,mCACnCA,EAAA,sBAAwB,wBAZdA,IAAAA,GAAA,CAAA,CAAA,EAeAC,GAAAA,IACVA,EAAA,qBAAuB,uBACvBA,EAAA,kCAAoC,oCACpCA,EAAA,gCAAkC,iCAClCA,EAAA,WAAa,aAJHA,IAAAA,GAAA,CAAA,CAAA,ECjBAC,GAAAA,IACVA,EAAA,YAAc,eACdA,EAAA,IAAM,MACNA,EAAA,SAAW,WAHDA,IAAAA,GAAA,CAAA,CAAA,EC8IAC,GAAAA,IACVA,EAAA,MAAQ,QADEA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,UAAY,aACZA,EAAA,oBAAsB,wBAFZA,IAAAA,GAAA,CAAA,CAAA,EAKAC,GAAAA,IACVA,EAAA,eAAiB,mBACjBA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBACrBA,EAAA,OAAS,SALCA,IAAAA,GAAA,CAAA,CAAA,EAQAC,GAAAA,IACVA,EAAA,aAAe,iBACfA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBACrBA,EAAA,OAAS,SACTA,EAAA,MAAQ,QANEA,IAAAA,GAAA,CAAA,CAAA,EASAC,GAAAA,IACVA,EAAA,WAAa,eACbA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,eAAiB,kBACjBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBATZA,IAAAA,GAAA,CAAA,CAAA,EAYAC,GAAAA,IACVA,EAAA,aAAe,iBACfA,EAAA,gBAAkB,oBAClBA,EAAA,cAAgB,kBAChBA,EAAA,gBAAkB,oBAClBA,EAAA,cAAgB,kBAChBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBACtBA,EAAA,eAAiB,kBACjBA,EAAA,mBAAqB,uBAVXA,IAAAA,GAAA,CAAA,CAAA,EAaAC,GAAAA,IACVA,EAAA,MAAQ,eADEA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,eAAiB,kBACjBA,EAAA,oBAAsB,wBACtBA,EAAA,8BAAgC,mCAChCA,EAAA,4BAA8B,iCAJpBA,IAAAA,GAAA,CAAA,CAAA,EAOAC,GAAAA,IACVA,EAAA,MAAQ,4BACRA,EAAA,OAAS,0CACTA,EAAA,eAAiB,uCACjBA,EAAA,cAAgB,0BAJNA,IAAAA,GAAA,CAAA,CAAA,EAOAC,GAAAA,IACVA,EAAA,mCAAqC,yCACrCA,EAAA,0BAA4B,+BAC5BA,EAAA,gBAAkB,wCAClBA,EAAA,aAAe,iDACfA,EAAA,UAAY,8CACZA,EAAA,oBAAsB,yDANZA,IAAAA,GAAA,CAAA,CAAA,EASAC,GAAAA,IACVA,EAAA,kBAAoB,mCACpBA,EAAA,OAAS,4CACTA,EAAA,eAAiB,mCAHPA,IAAAA,GAAA,CAAA,CAAA,EAMAC,GAAAA,IACVA,EAAA,+BAAiC,2CACjCA,EAAA,aAAe,4BACfA,EAAA,gBAAkB,0CAClBA,EAAA,aAAe,mDACfA,EAAA,UAAY,gDACZA,EAAA,oBAAsB,2DACtBA,EAAA,aAAe,gCACfA,EAAA,mBAAqB,uCARXA,IAAAA,GAAA,CAAA,CAAA,EAWAC,GAAAA,IACVA,EAAA,eAAiB,wBADPA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,OAAS,mBADCA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,mBAAqB,uBACrBA,EAAA,cAAgB,kBAChBA,EAAA,iBAAmB,qBAHTA,IAAAA,GAAA,CAAA,CAAA,EAKAC,GAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,OAAS,mBAFCA,IAAAA,GAAA,CAAA,CAAA,EAKAC,IAAAA,IACVA,EAAA,iBAAmB,qBACnBA,EAAA,cAAgB,kBAChBA,EAAA,oBAAsB,wBAHZA,IAAAA,IAAA,CAAA,CAAA,EAMAC,IAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,OAAS,qBAHCA,IAAAA,IAAA,CAAA,CAAA,ECnQAC,IAAAA,IACVA,EAAA,QAAU,UADAA,IAAAA,IAAA,CAAA,CAAA,ECiBAC,IAAAA,IACVA,EAAA,aAAe,iBADLA,IAAAA,IAAA,CAAA,CAAA,EAIAC,IAAAA,IACVA,EAAA,aAAe,6BADLA,IAAAA,IAAA,CAAA,CAAA,EAyCAC,IAAAA,IACVA,EAAA,oBAAsB,yBACtBA,EAAA,aAAe,iBACfA,EAAA,4BAA8B,iCAC9BA,EAAA,qBAAuB,yBACvBA,EAAA,eAAiB,mBACjBA,EAAA,sBAAwB,0BACxBA,EAAA,sBAAwB,0BAPdA,IAAAA,IAAA,CAAA,CAAA,EAUAC,IAAAA,IACVA,EAAA,mBAAqB,wBACrBA,EAAA,YAAc,gBACdA,EAAA,OAAS,SACTA,EAAA,qBAAuB,0BAJbA,IAAAA,IAAA,CAAA,CAAA,EA6BAC,IAAAA,IACVA,EAAA,YAAc,eADJA,IAAAA,IAAA,CAAA,CAAA,EA8CAC,IAAAA,IACVA,EAAA,WAAa,eACbA,EAAA,eAAiB,kBACjBA,EAAA,cAAgB,kBAChBA,EAAA,YAAc,eACdA,EAAA,iBAAmB,oBACnBA,EAAA,oBAAsB,wBANZA,IAAAA,IAAA,CAAA,CAAA,EASAC,IAAAA,IACVA,EAAA,OAAS,SACTA,EAAA,UAAY,kBACZA,EAAA,UAAY,iBACZA,EAAA,YAAc,eAJJA,IAAAA,IAAA,CAAA,CAAA,EC3FAC,IAAAA,IACVA,EAAA,QAAU,uBACVA,EAAA,QAAU,uBACVA,EAAA,UAAY,yBACZA,EAAA,WAAa,aAJHA,IAAAA,IAAA,CAAA,CAAA,EC5DAC,IAAAA,IACVA,EAAA,kBAAoB,6BADVA,IAAAA,IAAA,CAAA,CAAA,ECPAC,IAAAA,IACVA,EAAA,iBAAmB,qBADTA,IAAAA,IAAA,CAAA,CAAA,ECCAC,IAAAA,IACVA,EAAA,OAAS,SACTA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBAJXA,IAAAA,IAAA,CAAA,CAAA,EAOAC,IAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBALZA,IAAAA,IAAA,CAAA,CAAA,EAuBAC,IAAAA,IACVA,EAAA,SAAW,YADDA,IAAAA,IAAA,CAAA,CAAA,EAIAC,IAAAA,IACVA,EAAA,WAAa,cADHA,IAAAA,IAAA,CAAA,CAAA,ECtBAC,GAAAA,IACVA,EAAA,OAAS,SACTA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBAJXA,IAAAA,GAAA,CAAA,CAAA,EAMAC,GAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBALZA,IAAAA,GAAA,CAAA,CAAA,EChBL,IAAMC,EAAN,KAAgB,CAIrB,OAAO,OAAOC,EAA6B,CAGzC,OAFe,WAAW,KAAK,OAAO,aAAa,GAAG,IAAI,WAAWA,CAAM,CAAC,CAAC,EAE/D,QAAQ,KAAM,EAAE,EAAE,QAAQ,MAAO,GAAG,EAAE,QAAQ,MAAO,GAAG,CACxE,CAKA,OAAO,OAAOC,EAAgC,CAC5C,IAAMC,EAASD,EAAU,QAAQ,KAAM,GAAG,EAAE,QAAQ,KAAM,GAAG,EACvDE,EAAS,WAAW,KAAKD,CAAM,EAC/BE,EAAM,IAAI,WAAWD,EAAO,MAAM,EAExC,QAASE,EAAI,EAAGA,EAAIF,EAAO,OAAQE,IACjCD,EAAIC,CAAC,EAAIF,EAAO,WAAWE,CAAC,EAG9B,OAAOD,EAAI,MACb,CACF,ECzBA,SAASE,GAAiCC,EAAuE,CAI/G,MAHI,SAAOA,GAAU,UAIlBA,GAA0C,oBAAsB,QACjE,OAAQA,GAA0C,mBAAsB,SAK5E,CAEA,SAASC,GAAmCD,EAAyE,CAInH,MAHI,SAAOA,GAAU,UAIlBA,GAA4C,oBAAsB,QACnE,OAAQA,GAA4C,mBAAsB,SAK9E,CAOO,SAASE,EAAOC,EAAoD,CAEzE,GAAI,OAAOA,EAAK,QAAW,WACzB,OAAOA,EAAK,OAAO,EAGrB,GAAI,CACF,IAAMC,EAAKD,EAAK,GACVE,EAAQC,EAAU,OAAOH,EAAK,KAAK,EACnCI,EAA0BJ,EAAK,wBAC/BK,EAAyB,CAAC,EAC1BC,EAAON,EAAK,KAGlB,GAAIJ,GAAiCI,EAAK,QAAQ,EAChD,MAAO,CACL,GAAAC,EACA,MAAAC,EACA,SAAU,CACR,kBAAmBC,EAAU,OAAOH,EAAK,SAAS,iBAAiB,EACnE,eAAgBG,EAAU,OAAOH,EAAK,SAAS,cAAc,EAC7D,UAAWG,EAAU,OAAOH,EAAK,SAAS,SAAS,EACnD,WAAYA,EAAK,SAAS,WAAaG,EAAU,OAAOH,EAAK,SAAS,UAAU,EAAI,MACtF,EACA,wBAAAI,EACA,uBAAAC,EACA,KAAAC,CACF,EAGF,GAAIR,GAAmCE,EAAK,QAAQ,EAElD,MAAO,CACL,GAAAC,EACA,MAAAC,EACA,SAAU,CACR,eAAgBC,EAAU,OAAOH,EAAK,SAAS,cAAc,EAC7D,kBAAmBG,EAAU,OAAOH,EAAK,SAAS,iBAAiB,EACnE,WAAYA,EAAK,UAAU,cAAc,GAAK,CAAC,CACjD,EACA,wBAAAI,EACA,uBAAAC,EACA,KAAAC,CACF,EAGF,MAAM,IAAI,MAAM,oBAAoB,CACtC,OAASC,EAAO,CACd,cAAQ,MAAMA,CAAK,EACbA,CACR,CACF,CdzEO,IAAMC,EAAN,cAAgC,YAAU,QAA0B,CACzE,KAAO,WACP,OAAc,CAAC,EAEP,+BAAgC,CACtC,KAAK,qCAAuD,4CAA6C,CAAC,CAAC,CAC7G,CAEQ,mCAAmCC,EAAiB,CAC1D,KAAK,+CAAgE,8BAA8BA,CAAO,GAAI,CAAC,CAAC,CAClH,CAEA,MAAa,gBAAgBC,EAA8C,CACzE,GAAI,CAAC,OAAO,oBACV,MAAM,KAAK,8BAA8B,EAE3C,GAAM,CAAE,SAAAC,EAAU,SAAAC,EAAW,GAAI,aAAAC,EAAc,SAAAC,CAAS,EAAIJ,GAAiB,CAAC,EAExE,CAAE,oBAAAK,EAAqB,kBAAAC,CAAkB,EAAI,MAAM,KAAK,QAC5D,KAAK,MAAM,gEAA6E,CAAC,CAAE,SAAAL,CAAS,CAAC,CAAC,CACxG,EAEIM,EACJ,GAAI,CACFA,EAAc,MAAM,UAAU,YAAY,OAAO,CAC/C,UAAWF,CACb,CAAC,CACH,OAASG,EAAU,CACjB,MAAM,KAAK,mCAAmCA,CAAG,CACnD,CAEA,OAAO,KAAK,QACV,KAAK,MAAM,iEAA8E,CACvF,CACE,kBAAAF,EACA,qBAAsBG,EAAOF,CAAU,EACvC,SAAAL,EACA,UAAWK,EAAW,SAAS,cAAc,EAC7C,UAAW,UAAU,UACrB,aAAAJ,EACA,SAAAC,CACF,CACF,CAAC,CACH,CACF,CAEO,MAAMJ,EAAgD,CAC3D,GAAM,CAAE,SAAAC,EAAU,aAAAS,EAAc,aAAAP,EAAc,SAAAC,CAAS,EAAIJ,GAAiB,CAAC,EAEzEW,EAEEC,EAAa,KAAK,MAAM,iBAAsD,MAAOC,EAASC,IAAW,CAC7G,GAAI,CAAC,OAAO,oBACV,OAAOA,EAAO,KAAK,8BAA8B,CAAC,EAGpD,GAAM,CAAE,oBAAAC,EAAqB,sBAAAC,CAAsB,EAAI,MAAM,KAAK,QAChE,KAAK,MAAM,kEAA8E,CAAC,CAAE,SAAAf,CAAS,CAAC,CAAC,CACzG,EAEIgB,EACJ,GAAI,CACFA,EAAa,MAAM,UAAU,YAAY,IAAI,CAC3C,UAAWD,CACb,CAAC,CACH,OAASR,EAAU,CACjB,OAAOM,EAAO,KAAK,mCAAmCN,CAAG,CAAC,CAC5D,CAEA,IAAMU,EAAiB,KAAK,MAAM,mEAA+E,CAC/G,CACE,oBAAAH,EACA,kBAAmBN,EAAOQ,CAAS,EACnC,OAAQP,EACR,aAAAP,EACA,SAAAC,CACF,CACF,CAAC,EAEDO,EAAkBO,EAAe,GAEjC,IAAMC,EAAe,KAAK,QAA6CD,CAAc,EAEhFR,IACHS,EAAa,GAAGC,EAA0B,cAAe,IAAM,CAC7DR,EAAW,KAAKQ,EAA0B,aAAa,CACzD,CAAC,EACDD,EAAa,GAAGC,EAA0B,cAAe,IAAM,CAC7DR,EAAW,KAAKQ,EAA0B,aAAa,CACzD,CAAC,EACDD,EAAa,GAAGC,EAA0B,uBAAwB,IAAM,CACtER,EAAW,KAAKQ,EAA0B,sBAAsB,CAClE,CAAC,EACDD,EAAa,GAAGC,EAA0B,oBAAqB,IAAM,CACnER,EAAW,KAAKQ,EAA0B,mBAAmB,CAC/D,CAAC,EACDD,EAAa,GAAGC,EAA0B,oBAAqB,IAAM,CACnER,EAAW,KAAKQ,EAA0B,mBAAmB,CAC/D,CAAC,GAGH,GAAI,CACF,IAAMC,EAAS,MAAMF,EACrBN,EAAQQ,CAAM,CAChB,OAASC,EAAO,CACdR,EAAOQ,CAAK,CACd,CACF,CAAC,EAED,MAAI,CAACZ,GAAgBE,IACnBA,EAAW,GAAGW,EAAoB,cAAgBC,GAAgB,CAChE,KAAK,wBAAwBD,EAAoB,cAAeZ,CAAe,EAAEa,CAAG,CACtF,CAAC,EACDZ,EAAW,GAAGW,EAAoB,WAAY,IAAM,CAClD,KAAK,wBAAwBA,EAAoB,WAAYZ,CAAe,EAAE,CAChF,CAAC,EACDC,EAAW,GAAGW,EAAoB,mBAAqBE,GAAyB,CAC9E,KAAK,wBAAwBF,EAAoB,mBAAoBZ,CAAe,EAAEc,CAAY,CACpG,CAAC,EACDb,EAAW,GAAGW,EAAoB,OAAQ,IAAM,CAC9C,KAAK,wBAAwBA,EAAoB,OAAQZ,CAAe,EAAE,CAC5E,CAAC,GAGIC,CACT,CAEO,WAAWZ,EAAgD,CAChE,GAAM,CAAE,GAAA0B,EAAI,SAAAxB,CAAS,EAAIF,EACnBkB,EAAiB,KAAK,MAAM,yDAA2E,CAC3G,CACE,sBAAuBQ,EACvB,SAAAxB,CACF,CACF,CAAC,EACD,OAAO,KAAK,QAAegB,CAAc,CAC3C,CAEO,iBAAiBQ,EAAY,CAClC,IAAMR,EAAiB,KAAK,MAAM,6DAAgF,CAChH,CACE,sBAAuBQ,CACzB,CACF,CAAC,EAED,OAAO,KAAK,QAAaR,CAAc,CACzC,CAEA,MAAa,kBAAkBhB,EAAW,GAAI,CAC5C,GAAI,CAAC,OAAO,oBACV,MAAM,KAAK,8BAA8B,EAE3C,IAAMyB,EAAU,MAAM,KAAK,QACzB,KAAK,MAAM,wEAAmF,CAAC,CAAC,CAClG,EAEIpB,EACJ,GAAI,CACFA,EAAc,MAAM,UAAU,YAAY,OAAO,CAC/C,UAAWoB,EAAQ,kBACrB,CAAC,CACH,OAASnB,EAAU,CACjB,MAAM,KAAK,mCAAmCA,CAAG,CACnD,CAEA,OAAO,KAAK,QACV,KAAK,MAAM,kEAA8E,CACvF,CACE,SAAAN,EACA,UAAWK,EAAW,SAAS,cAAc,EAC7C,WAAY,UAAU,UACtB,sBAAuBE,EAAOF,CAAU,CAC1C,CACF,CAAC,CACH,CACF,CAEO,aAAc,CACnB,IAAMW,EAAiB,KAAK,MAAM,kEAAwE,CAAC,CAAC,EAC5G,OAAO,KAAK,QAAeA,CAAc,CAC3C,CACF",
4
+ "sourcesContent": ["import { Extension } from '@magic-sdk/provider';\nimport {\n RegisterNewUserConfiguration,\n LoginWithWebAuthnConfiguration,\n MagicWebAuthnPayloadMethod,\n WebAuthnSDKErrorCode,\n UpdateWebAuthnInfoConfiguration,\n} from './types';\nimport { PasskeyResult, PasskeyEventHandlers, PasskeyMFAEventEmit, PasskeyMFAEventOnReceived } from '@magic-sdk/types';\nimport { toJSON } from './utils/polyfills';\n\nexport class WebAuthnExtension extends Extension.Internal<'webauthn', any> {\n name = 'webauthn' as const;\n config: any = {};\n\n private createWebAuthnNotSupportError() {\n this.createError(WebAuthnSDKErrorCode.WebAuthnNotSupported, 'WebAuthn is not supported in this device.', {});\n }\n\n private createWebAuthCreateCredentialError(message: string) {\n this.createError(WebAuthnSDKErrorCode.WebAuthnCreateCredentialError, `Error creating credential: ${message}`, {});\n }\n\n public async registerNewUser(configuration?: RegisterNewUserConfiguration) {\n if (!window.PublicKeyCredential) {\n throw this.createWebAuthnNotSupportError();\n }\n const { username, nickname = '', skipDIDToken, lifespan } = configuration ?? {};\n\n const { registrationOptions, registrationToken } = await this.request<any>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterPasskeyStart, [{ username }]),\n );\n\n let credential;\n try {\n credential = (await navigator.credentials.create({\n publicKey: registrationOptions,\n })) as any;\n } catch (err: any) {\n throw this.createWebAuthCreateCredentialError(err);\n }\n\n return this.request<string | null>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterPasskeyVerify, [\n {\n registrationToken,\n registrationResponse: toJSON(credential),\n nickname,\n transport: credential.response.getTransports(),\n userAgent: navigator.userAgent,\n skipDIDToken,\n lifespan,\n },\n ]),\n );\n }\n\n public login(configuration?: LoginWithWebAuthnConfiguration) {\n const { username, showMfaModal, skipDIDToken, lifespan } = configuration ?? {};\n\n let verifyPayloadId: string;\n\n const promiEvent = this.utils.createPromiEvent<PasskeyResult, PasskeyEventHandlers>(async (resolve, reject) => {\n if (!window.PublicKeyCredential) {\n return reject(this.createWebAuthnNotSupportError());\n }\n\n const { authenticationToken, authenticationOptions } = await this.request<any>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.LoginWithPasskeyStart, [{ username }]),\n );\n\n let assertion;\n try {\n assertion = (await navigator.credentials.get({\n publicKey: authenticationOptions,\n })) as any;\n } catch (err: any) {\n return reject(this.createWebAuthCreateCredentialError(err));\n }\n\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.LoginWithPasskeyVerify, [\n {\n authenticationToken,\n assertionResponse: toJSON(assertion),\n showUI: showMfaModal,\n skipDIDToken,\n lifespan,\n },\n ]);\n\n verifyPayloadId = requestPayload.id as string;\n\n const loginRequest = this.request<PasskeyResult, PasskeyEventHandlers>(requestPayload);\n\n if (!showMfaModal) {\n loginRequest.on(PasskeyMFAEventOnReceived.MfaSentHandle, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.MfaSentHandle);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.InvalidMfaOtp, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.InvalidMfaOtp);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.RecoveryCodeSentHandle, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.RecoveryCodeSentHandle);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.InvalidRecoveryCode, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.InvalidRecoveryCode);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.RecoveryCodeSuccess, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.RecoveryCodeSuccess);\n });\n }\n\n try {\n const result = await loginRequest;\n resolve(result);\n } catch (error) {\n reject(error);\n }\n });\n\n if (!showMfaModal && promiEvent) {\n promiEvent.on(PasskeyMFAEventEmit.VerifyMFACode, (mfa: string) => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.VerifyMFACode, verifyPayloadId)(mfa);\n });\n promiEvent.on(PasskeyMFAEventEmit.LostDevice, () => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.LostDevice, verifyPayloadId)();\n });\n promiEvent.on(PasskeyMFAEventEmit.VerifyRecoveryCode, (recoveryCode: string) => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.VerifyRecoveryCode, verifyPayloadId)(recoveryCode);\n });\n promiEvent.on(PasskeyMFAEventEmit.Cancel, () => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.Cancel, verifyPayloadId)();\n });\n }\n\n return promiEvent;\n }\n\n public updateInfo(configuration: UpdateWebAuthnInfoConfiguration) {\n const { id, nickname } = configuration;\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.UpdateWebAuthnInfo, [\n {\n webAuthnCredentialsId: id,\n nickname,\n },\n ]);\n return this.request<any[]>(requestPayload);\n }\n\n public unregisterDevice(id: string) {\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.UnregisterWebAuthDevice, [\n {\n webAuthnCredentialsId: id,\n },\n ]);\n\n return this.request<any>(requestPayload);\n }\n\n public async registerNewDevice(nickname = '') {\n if (!window.PublicKeyCredential) {\n throw this.createWebAuthnNotSupportError();\n }\n const options = await this.request<any>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterWebAuthDeviceStart, []),\n );\n\n let credential;\n try {\n credential = (await navigator.credentials.create({\n publicKey: options.credential_options,\n })) as any;\n } catch (err: any) {\n throw this.createWebAuthCreateCredentialError(err);\n }\n\n return this.request<string | null>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterWebAuthDevice, [\n {\n nickname,\n transport: credential.response.getTransports(),\n user_agent: navigator.userAgent,\n registration_response: toJSON(credential),\n },\n ]),\n );\n }\n\n public getMetadata() {\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.GetWebAuthnInfo, []);\n return this.request<any[]>(requestPayload);\n }\n}\n", "export enum SDKErrorCode {\n MissingApiKey = 'MISSING_API_KEY',\n ModalNotReady = 'MODAL_NOT_READY',\n ConnectionLost = 'CONNECTION_WAS_LOST',\n MalformedResponse = 'MALFORMED_RESPONSE',\n InvalidArgument = 'INVALID_ARGUMENT',\n ExtensionNotInitialized = 'EXTENSION_NOT_INITIALIZED',\n IncompatibleExtensions = 'INCOMPATIBLE_EXTENSIONS',\n}\n\nexport enum SDKWarningCode {\n SyncWeb3Method = 'SYNC_WEB3_METHOD',\n DuplicateIframe = 'DUPLICATE_IFRAME',\n ReactNativeEndpointConfiguration = 'REACT_NATIVE_ENDPOINT_CONFIGURATION',\n DeprecationNotice = 'DEPRECATION_NOTICE',\n ProductAnnouncement = 'ANNOUNCEMENT',\n}\n\nexport enum RPCErrorCode {\n // Standard JSON RPC 2.0 Error Codes\n ParseError = -32700,\n InvalidRequest = -32600,\n MethodNotFound = -32601,\n InvalidParams = -32602,\n InternalError = -32603,\n\n // Custom RPC Error Codes\n MagicLinkFailedVerification = -10000,\n MagicLinkExpired = -10001,\n MagicLinkRateLimited = -10002,\n UserAlreadyLoggedIn = -10003,\n UpdateEmailFailed = -10004,\n UserRequestEditEmail = -10005,\n MagicLinkInvalidRedirectURL = -10006,\n InactiveRecipient = -10010,\n AccessDeniedToUser = -10011,\n UserRejectedAction = -10012,\n RequestCancelled = -10014,\n RedirectLoginComplete = -10015,\n SessionTerminated = -10016,\n PopupRequestOverriden = -10017,\n SanEmail = -10018,\n DpopInvalidated = -10019,\n MaxAttemptsReached = -10031,\n UserRequiredMfa = -10033,\n}\n\nexport type ErrorCode = SDKErrorCode | RPCErrorCode;\nexport type WarningCode = SDKWarningCode;\n", "import { RPCErrorCode } from './exception-types';\n\n// --- Request interfaces\n\nexport interface JsonRpcRequestPayload<TParams = any> {\n jsonrpc: string;\n id: string | number | null;\n method: string;\n params?: TParams;\n}\n\nexport interface JsonRpcRequestCallback {\n /** Callback executed upon JSON RPC response. */\n (err: JsonRpcError | null, result?: JsonRpcResponsePayload | null): void;\n}\n\nexport interface JsonRpcBatchRequestCallback {\n /** Callback executed upon JSON RPC response. */\n (err: JsonRpcError | null, result?: (JsonRpcResponsePayload | null)[] | null): void;\n}\n\n// --- Response interfaces\n\nexport interface JsonRpcError {\n message: string;\n code: RPCErrorCode;\n data?: any;\n}\n\nexport interface JsonRpcResponsePayload<ResultType = any> {\n jsonrpc: string;\n id: string | number | null;\n result?: ResultType | null;\n error?: JsonRpcError | null;\n}\n\nexport interface UserInfo {\n email?: string;\n}\n\nexport type ShowUIPromiEvents = {\n disconnect: () => void;\n};\n\nexport interface RequestUserInfoScope {\n scope?: {\n email?: 'required' | 'optional';\n };\n}\n\nexport enum LocalStorageKeys {\n PROVIDER = 'magic_3pw_provider',\n ADDRESS = 'magic_3pw_address',\n CHAIN_ID = 'magic_3pw_chainId',\n}\n\nexport enum ThirdPartyWalletEvents {\n WalletConnected = 'wallet_connected',\n WalletRejected = 'wallet_rejected',\n Web3ModalSelected = 'web3modal_selected',\n}\n\nexport interface ConnectWithUIOptions {\n autoPromptThirdPartyWallets?: boolean;\n}\n\nexport type ConnectWithUiEvents = {\n 'id-token-created': (params: { idToken: string }) => void;\n} & { [key in ThirdPartyWalletEvents]: () => void };\n\n// --- Payload methods\n\n/**\n * Enum of JSON RPC methods for interacting with the Magic SDK authentication\n * relayer.\n */\nexport enum MagicPayloadMethod {\n LoginWithSms = 'magic_auth_login_with_sms',\n LoginWithEmailOTP = 'magic_auth_login_with_email_otp',\n LoginWithMagicLink = 'magic_auth_login_with_magic_link',\n LoginWithCredential = 'magic_auth_login_with_credential',\n SetAuthorizationToken = 'magic_auth_set_authorization_token',\n GetIdToken = 'magic_auth_get_id_token',\n GenerateIdToken = 'magic_auth_generate_id_token',\n GetMetadata = 'magic_auth_get_metadata',\n IsLoggedIn = 'magic_is_logged_in',\n Logout = 'magic_auth_logout',\n UpdateEmail = 'magic_auth_update_email',\n UserSettings = 'magic_auth_settings',\n UserSettingsTestMode = 'magic_auth_settings_testing_mode',\n LoginWithSmsTestMode = 'magic_auth_login_with_sms_testing_mode',\n LoginWithEmailOTPTestMode = 'magic_auth_login_with_email_otp_testing_mode',\n LoginWithMagicLinkTestMode = 'magic_login_with_magic_link_testing_mode',\n LoginWithCredentialTestMode = 'magic_auth_login_with_credential_testing_mode',\n GetIdTokenTestMode = 'magic_auth_get_id_token_testing_mode',\n GenerateIdTokenTestMode = 'magic_auth_generate_id_token_testing_mode',\n GetMetadataTestMode = 'magic_auth_get_metadata_testing_mode',\n IsLoggedInTestMode = 'magic_auth_is_logged_in_testing_mode',\n LogoutTestMode = 'magic_auth_logout_testing_mode',\n UpdateEmailTestMode = 'magic_auth_update_email_testing_mode',\n IntermediaryEvent = 'magic_intermediary_event',\n RequestAccounts = 'eth_requestAccounts',\n GetInfo = 'magic_get_info',\n ShowUI = 'magic_wallet',\n NFTPurchase = 'magic_nft_purchase',\n NFTCheckout = 'magic_nft_checkout',\n NFTTransfer = 'magic_nft_transfer',\n RequestUserInfoWithUI = 'mc_request_user_info',\n Disconnect = 'mc_disconnect',\n // UpdatePhoneNumber = 'magic_auth_update_phone_number',\n // UpdatePhoneNumberTestMode = 'magic_auth_update_phone_number_testing_mode',\n RecoverAccount = 'magic_auth_recover_account',\n RecoverAccountTestMode = 'magic_auth_recover_account_testing_mode',\n MagicBoxHeartBeat = 'magic_box_heart_beat',\n AutoConnect = 'mc_auto_connect',\n Login = 'mc_login',\n EncryptV1 = 'magic_auth_encrypt_v1',\n DecryptV1 = 'magic_auth_decrypt_v1',\n ShowNFTs = 'magic_show_nfts',\n ShowOnRamp = 'magic_show_fiat_onramp',\n ShowSendTokensUI = 'magic_show_send_tokens_ui',\n ShowAddress = 'magic_show_address',\n ShowBalances = 'magic_show_balances',\n RevealPK = 'magic_reveal_key',\n EnableMFA = 'magic_auth_enable_mfa_flow',\n DisableMFA = 'magic_auth_disable_mfa_flow',\n GetMultichainPublicAddress = 'magic_get_multichain_public_address',\n Sign7702Authorization = 'magic_wallet_sign_7702_authorization',\n Send7702Transaction = 'eth_send7702Transaction',\n}\n\n// Methods to not route if connected to third party wallet\nexport const routeToMagicMethods = [\n MagicPayloadMethod.IntermediaryEvent,\n MagicPayloadMethod.NFTCheckout,\n MagicPayloadMethod.Login,\n];\n", "import { JsonRpcResponsePayload, JsonRpcError, JsonRpcRequestPayload } from './json-rpc-types';\n\nexport enum MagicIncomingWindowMessage {\n MAGIC_HANDLE_RESPONSE = 'MAGIC_HANDLE_RESPONSE',\n MAGIC_OVERLAY_READY = 'MAGIC_OVERLAY_READY',\n MAGIC_SHOW_OVERLAY = 'MAGIC_SHOW_OVERLAY',\n MAGIC_HIDE_OVERLAY = 'MAGIC_HIDE_OVERLAY',\n MAGIC_HANDLE_EVENT = 'MAGIC_HANDLE_EVENT',\n MAGIC_MG_BOX_SEND_RECEIPT = 'MAGIC_MG_BOX_SEND_RECEIPT',\n MAGIC_SEND_PRODUCT_ANNOUNCEMENT = 'MAGIC_SEND_PRODUCT_ANNOUNCEMENT',\n MAGIC_PONG = 'MAGIC_PONG',\n MAGIC_POPUP_RESPONSE = 'MAGIC_POPUP_RESPONSE',\n MAGIC_POPUP_OAUTH_VERIFY_RESPONSE = 'MAGIC_POPUP_OAUTH_VERIFY_RESPONSE',\n MAGIC_THIRD_PARTY_WALLET_REQUEST = 'MAGIC_THIRD_PARTY_WALLET_REQUEST',\n MAGIC_OPEN_MOBILE_URL = 'MAGIC_OPEN_MOBILE_URL',\n}\n\nexport enum MagicOutgoingWindowMessage {\n MAGIC_HANDLE_REQUEST = 'MAGIC_HANDLE_REQUEST',\n MAGIC_THIRD_PARTY_WALLET_RESPONSE = 'MAGIC_THIRD_PARTY_WALLET_RESPONSE',\n MAGIC_THIRD_PARTY_WALLET_UPDATE = 'MAGIC_THIRD_PARTY_WALLET_EVENT',\n MAGIC_PING = 'MAGIC_PING',\n}\n\n/** The shape of responding window message data from the Magic iframe context. */\nexport interface MagicMessageRequest {\n msgType: string;\n payload: JsonRpcRequestPayload | JsonRpcRequestPayload[];\n rt?: string;\n jwt?: string;\n deviceShare?: string;\n}\n\n/** The shape of responding window message data from the Magic iframe context. */\nexport interface MagicMessageResponse<ResultType = any> {\n msgType: string;\n response: Partial<JsonRpcError> & Partial<JsonRpcResponsePayload<ResultType>>;\n rt?: string;\n deviceShare?: string;\n}\n\n/** The expected message event returned by the Magic iframe context. */\nexport interface MagicMessageEvent extends Partial<MessageEvent> {\n data: MagicMessageResponse;\n}\n\nexport interface MagicThirdPartyWalletRequest {\n msgType: MagicIncomingWindowMessage.MAGIC_THIRD_PARTY_WALLET_REQUEST;\n payload: JsonRpcRequestPayload;\n}\n\nexport interface MagicThirdPartyWalletResponse {\n msgType: `${MagicOutgoingWindowMessage.MAGIC_THIRD_PARTY_WALLET_RESPONSE}-${string}`;\n response: JsonRpcResponsePayload;\n}\n\nexport interface MagicThirdPartyWalletUpdate {\n msgType: `${MagicOutgoingWindowMessage.MAGIC_THIRD_PARTY_WALLET_UPDATE}-${string}`;\n details: {\n address: `0x${string}` | undefined;\n addresses: readonly `0x${string}`[] | undefined;\n chain: { id: number; name: string; [key: string]: unknown } | undefined;\n updatedField: 'chain' | 'address';\n };\n}\n\nexport type MagicThirdPartyWalletEventPayload = MagicThirdPartyWalletResponse | MagicThirdPartyWalletUpdate;\n", "export enum DeepLinkPage {\n UpdateEmail = 'update-email',\n MFA = 'mfa',\n Recovery = 'recovery',\n}\n", "import { WalletEventOnReceived } from './wallet-types';\n\nexport interface LoginWithMagicLinkConfiguration {\n /**\n * The email address of the user attempting to login.\n */\n email: string;\n\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to check their email for the \"magic link\" to complete their\n * authentication.\n */\n showUI?: boolean;\n\n /**\n * You can optionally provide a redirect URI that will be followed at the end\n * of the magic link flow. Don't forget to invoke\n * `magic.auth.loginWithCredential()` to complete the login from the route you\n * configure here.\n */\n redirectURI?: string;\n\n /**\n * Enterprise users with a custom SMTP can create custom email templates\n * from their dashboard. The default Magic loginWithMagicLink email will be\n * overridden when a variation is passed here.\n */\n overrides?: {\n variation?: string;\n };\n\n /**\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface LoginWithSmsConfiguration {\n /**\n * Specify the phone number of the user attempting to login.\n */\n phoneNumber: string;\n\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to check their SMS for the one time passcode (OTP) to complete their\n * authentication.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the SMS OTP flow.\n */\n showUI?: boolean;\n\n /*\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\nexport interface LoginWithEmailOTPConfiguration {\n /**\n * Specify the email address of the user attempting to login.\n */\n email: string;\n\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to check their email for the one time passcode (OTP) to complete their\n * authentication.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the email OTP flow.\n */\n showUI?: boolean;\n\n /**\n * Device Unrecognized UI will enforce showing up to secure user's login\n *\n * When set to true (default), an improved device recognition UI will be displayed to the user,\n * prompting them to verify their login by checking their email for device approval. This feature\n * enhances authentication security.\n *\n * This param will only be affected if showUI is false. When set to false,\n * developers have the flexibility to implement their own customized UI to\n * handle device check events, providing a more tailored user experience.\n */\n deviceCheckUI?: boolean;\n\n /**\n * Enterprise users with a custom SMTP can create custom email templates\n * from their dashboard. The default Magic loginWithOTP email will be\n * overridden when a variation is passed here.\n */\n overrides?: {\n variation?: string;\n appName?: string;\n assetUrl?: string;\n };\n\n /**\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface LoginWithCredentialConfiguration {\n /**\n * A credential token or a valid query string (prefixed with ? or #)\n */\n credentialOrQueryString?: string;\n\n /**\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface EnableMFAConfiguration {\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to enable MFA using Google Authenticator app.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the enable MFA flow.\n */\n showUI?: boolean;\n}\n\nexport interface DisableMFAConfiguration {\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to disable MFA.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the disable MFA flow.\n */\n showUI?: boolean;\n}\n\n/**\n * Auth Events Enum\n */\nexport enum LoginWithMagicLinkEventEmit {\n Retry = 'retry',\n}\n\nexport enum LoginWithMagicLinkEventOnReceived {\n EmailSent = 'email-sent',\n EmailNotDeliverable = 'email-not-deliverable',\n}\n\nexport enum LoginWithEmailOTPEventEmit {\n VerifyEmailOtp = 'verify-email-otp',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n Cancel = 'cancel',\n}\n\nexport enum LoginWithSmsOTPEventEmit {\n VerifySmsOtp = 'verify-sms-otp',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n Cancel = 'cancel',\n Retry = 'retry',\n}\n\nexport enum LoginWithSmsOTPEventOnReceived {\n SmsOTPSent = 'sms-otp-sent',\n InvalidSmsOtp = 'invalid-sms-otp',\n ExpiredSmsOtp = 'expired-sms-otp',\n MfaSentHandle = 'mfa-sent-handle',\n InvalidMfaOtp = 'invalid-mfa-otp',\n LoginThrottled = 'login-throttled',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n}\n\nexport enum LoginWithEmailOTPEventOnReceived {\n EmailOTPSent = 'email-otp-sent',\n InvalidEmailOtp = 'invalid-email-otp',\n InvalidMfaOtp = 'invalid-mfa-otp',\n ExpiredEmailOtp = 'expired-email-otp',\n MfaSentHandle = 'mfa-sent-handle',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n LoginThrottled = 'login-throttled',\n MaxAttemptsReached = 'max-attempts-reached',\n}\n\nexport enum DeviceVerificationEventEmit {\n Retry = 'device-retry',\n}\n\nexport enum DeviceVerificationEventOnReceived {\n DeviceApproved = 'device-approved',\n DeviceNeedsApproval = 'device-needs-approval',\n DeviceVerificationLinkExpired = 'device-verification-link-expired',\n DeviceVerificationEmailSent = 'device-verification-email-sent',\n}\n\nexport enum RecencyCheckEventEmit {\n Retry = 'Recency/auth-factor-retry',\n Cancel = 'Recency/auth-factor-verification-cancel',\n VerifyEmailOtp = 'Recency/auth-factor-verify-email-otp',\n VerifyMFACode = 'Recency/verify-mfa-code',\n}\n\nexport enum RecencyCheckEventOnReceived {\n PrimaryAuthFactorNeedsVerification = 'Recency/auth-factor-needs-verification',\n PrimaryAuthFactorVerified = 'Recency/auth-factor-verified',\n InvalidEmailOtp = 'Recency/auth-factor-invalid-email-otp',\n EmailExpired = 'Recency/auth-factor-verification-email-expired',\n EmailSent = 'Recency/auth-factor-verification-email-sent',\n EmailNotDeliverable = 'Recency/auth-factor-verification-email-not-deliverable',\n}\n\nexport enum UpdateEmailEventEmit {\n RetryWithNewEmail = 'UpdateEmail/retry-with-new-email',\n Cancel = 'UpdateEmail/new-email-verification-cancel',\n VerifyEmailOtp = 'UpdateEmail/new-email-verify-otp',\n}\n\nexport enum UpdateEmailEventOnReceived {\n NewAuthFactorNeedsVerification = 'UpdateEmail/new-email-needs-verification',\n EmailUpdated = 'UpdateEmail/email-updated',\n InvalidEmailOtp = 'UpdateEmail/new-email-invalid-email-otp',\n EmailExpired = 'UpdateEmail/new-email-verification-email-expired',\n EmailSent = 'UpdateEmail/new-email-verification-email-sent',\n EmailNotDeliverable = 'UpdateEmail/new-email-verification-email-not-deliverable',\n InvalidEmail = 'UpdateEmail/new-email-invalid',\n EmailAlreadyExists = 'UpdateEmail/new-email-already-exists',\n}\n\nexport enum AuthEventOnReceived {\n IDTokenCreated = 'Auth/id-token-created',\n}\n\nexport enum FarcasterLoginEventEmit {\n Cancel = 'Farcaster/cancel',\n}\n\nexport enum EnableMFAEventOnReceived {\n MFASecretGenerated = 'mfa-secret-generated',\n InvalidMFAOtp = 'invalid-mfa-otp',\n MFARecoveryCodes = 'mfa-recovery-codes',\n}\nexport enum EnableMFAEventEmit {\n VerifyMFACode = 'verify-mfa-code',\n Cancel = 'cancel-mfa-setup',\n}\n\nexport enum DisableMFAEventOnReceived {\n MFACodeRequested = 'mfa-code-requested',\n InvalidMFAOtp = 'invalid-mfa-otp',\n InvalidRecoveryCode = 'invalid-recovery-code',\n}\n\nexport enum DisableMFAEventEmit {\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n Cancel = 'cancel-mfa-disable',\n}\n\n/**\n * EventHandlers\n */\nexport type LoginWithMagicLinkEventHandlers = {\n // Event Received\n [LoginWithMagicLinkEventOnReceived.EmailSent]: () => void;\n [LoginWithMagicLinkEventOnReceived.EmailNotDeliverable]: () => void;\n\n // Event sent\n [LoginWithMagicLinkEventEmit.Retry]: () => void;\n} & DeviceVerificationEventHandlers;\n\nexport type LoginWithSmsOTPEventHandlers = {\n // Event sent\n [LoginWithSmsOTPEventEmit.VerifySmsOtp]: (otp: string) => void;\n [LoginWithSmsOTPEventEmit.VerifyMFACode]: (mfa: string) => void;\n [LoginWithSmsOTPEventEmit.LostDevice]: () => void;\n [LoginWithSmsOTPEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n [LoginWithSmsOTPEventEmit.Cancel]: () => void;\n [LoginWithSmsOTPEventEmit.Retry]: () => void;\n\n // Event received\n [LoginWithSmsOTPEventOnReceived.SmsOTPSent]: () => void;\n [LoginWithSmsOTPEventOnReceived.InvalidSmsOtp]: () => void;\n [LoginWithSmsOTPEventOnReceived.ExpiredSmsOtp]: () => void;\n [LoginWithSmsOTPEventOnReceived.MfaSentHandle]: () => void;\n [LoginWithSmsOTPEventOnReceived.InvalidMfaOtp]: () => void;\n [LoginWithSmsOTPEventOnReceived.LoginThrottled]: () => void;\n [LoginWithSmsOTPEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [LoginWithSmsOTPEventOnReceived.InvalidRecoveryCode]: () => void;\n [LoginWithSmsOTPEventOnReceived.RecoveryCodeSuccess]: () => void;\n} & DeviceVerificationEventHandlers;\n\nexport type LoginWithEmailOTPEventHandlers = {\n // Event Received\n [LoginWithEmailOTPEventOnReceived.EmailOTPSent]: () => void;\n [LoginWithEmailOTPEventOnReceived.LoginThrottled]: () => void;\n [LoginWithEmailOTPEventOnReceived.InvalidEmailOtp]: () => void;\n [LoginWithEmailOTPEventOnReceived.InvalidMfaOtp]: () => void;\n [LoginWithEmailOTPEventOnReceived.ExpiredEmailOtp]: () => void;\n [LoginWithEmailOTPEventOnReceived.MfaSentHandle]: () => void;\n [LoginWithEmailOTPEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [LoginWithEmailOTPEventOnReceived.InvalidRecoveryCode]: () => void;\n [LoginWithEmailOTPEventOnReceived.RecoveryCodeSuccess]: () => void;\n [LoginWithEmailOTPEventOnReceived.MaxAttemptsReached]: () => void;\n [AuthEventOnReceived.IDTokenCreated]: (idToken: string) => void;\n [WalletEventOnReceived.WalletInfoFetched]: () => void;\n\n // Event sent\n [LoginWithEmailOTPEventEmit.VerifyEmailOtp]: (otp: string) => void;\n [LoginWithEmailOTPEventEmit.VerifyMFACode]: (mfa: string) => void;\n [LoginWithEmailOTPEventEmit.LostDevice]: () => void;\n [LoginWithEmailOTPEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n [LoginWithEmailOTPEventEmit.Cancel]: () => void;\n} & DeviceVerificationEventHandlers;\n\ntype DeviceVerificationEventHandlers = {\n // Event Received\n [DeviceVerificationEventOnReceived.DeviceNeedsApproval]: () => void;\n [DeviceVerificationEventOnReceived.DeviceVerificationEmailSent]: () => void;\n [DeviceVerificationEventOnReceived.DeviceVerificationLinkExpired]: () => void;\n [DeviceVerificationEventOnReceived.DeviceApproved]: () => void;\n\n // Event sent\n [DeviceVerificationEventEmit.Retry]: () => void;\n};\n\n/**\n * Update Email\n */\n\nexport type RecencyCheckEventHandlers = {\n [RecencyCheckEventOnReceived.PrimaryAuthFactorNeedsVerification]: () => void;\n [RecencyCheckEventOnReceived.PrimaryAuthFactorVerified]: () => void;\n [RecencyCheckEventOnReceived.InvalidEmailOtp]: () => void;\n [RecencyCheckEventOnReceived.EmailNotDeliverable]: () => void;\n [RecencyCheckEventOnReceived.EmailExpired]: () => void;\n [RecencyCheckEventOnReceived.EmailSent]: () => void;\n\n [RecencyCheckEventEmit.Cancel]: () => void;\n [RecencyCheckEventEmit.Retry]: () => void;\n [RecencyCheckEventEmit.VerifyEmailOtp]: (otp: string) => void;\n [RecencyCheckEventEmit.VerifyMFACode]: (mfa: string) => void;\n};\n\nexport type UpdateEmailEventHandlers = {\n [UpdateEmailEventOnReceived.NewAuthFactorNeedsVerification]: () => void;\n [UpdateEmailEventOnReceived.EmailUpdated]: () => void;\n [UpdateEmailEventOnReceived.InvalidEmailOtp]: () => void;\n [UpdateEmailEventOnReceived.EmailNotDeliverable]: () => void;\n [UpdateEmailEventOnReceived.EmailExpired]: () => void;\n [UpdateEmailEventOnReceived.EmailSent]: () => void;\n [UpdateEmailEventOnReceived.InvalidEmail]: () => void;\n [UpdateEmailEventOnReceived.EmailAlreadyExists]: () => void;\n\n [UpdateEmailEventEmit.Cancel]: () => void;\n [UpdateEmailEventEmit.RetryWithNewEmail]: (email?: string) => void;\n [UpdateEmailEventEmit.VerifyEmailOtp]: (otp: string) => void;\n} & RecencyCheckEventHandlers;\n\n/**\n * Enable MFA\n */\n\nexport type EnableMFAEventHandlers = {\n // Event Received\n [EnableMFAEventOnReceived.MFASecretGenerated]: ({ QRCode, key }: { QRCode: string; key: string }) => void;\n [EnableMFAEventOnReceived.InvalidMFAOtp]: ({ errorCode }: { errorCode: string }) => void;\n [EnableMFAEventOnReceived.MFARecoveryCodes]: ({ recoveryCode }: { recoveryCode: string }) => void;\n\n // Event sent\n [EnableMFAEventEmit.VerifyMFACode]: (totp: string) => void;\n [EnableMFAEventEmit.Cancel]: () => void;\n};\n\n/**\n * Disable MFA\n */\n\nexport type DisableMFAEventHandlers = {\n // Event Received\n [DisableMFAEventOnReceived.MFACodeRequested]: () => void;\n [DisableMFAEventOnReceived.InvalidMFAOtp]: ({ errorCode }: { errorCode: string }) => void;\n [DisableMFAEventOnReceived.InvalidRecoveryCode]: () => void;\n\n // Event sent\n [DisableMFAEventEmit.VerifyMFACode]: (totp: string) => void;\n [DisableMFAEventEmit.LostDevice]: (recoveryCode: string) => void;\n [DisableMFAEventEmit.Cancel]: () => void;\n};\n", "export type EthNetworkName = 'mainnet' | 'goerli' | 'sepolia';\n\nexport enum EthChainType {\n Harmony = 'HARMONY',\n}\n\nexport interface CustomNodeConfiguration {\n rpcUrl: string;\n chainId?: number;\n chainType?: EthChainType;\n}\n\nexport type EthNetworkConfiguration = EthNetworkName | CustomNodeConfiguration;\n\nexport type ProviderEnableEvents = {\n 'id-token-created': (params: { idToken: string }) => void;\n};\n", "import { RecencyCheckEventHandlers } from './auth-types';\nimport { DeepLinkPage } from '../core/deep-link-pages';\n\nexport interface GetIdTokenConfiguration {\n /**\n * The number of seconds until the generated ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface GenerateIdTokenConfiguration extends GetIdTokenConfiguration {\n /**\n * An optional piece of data to sign with the token. Note, however, that the\n * unsigned data _will not_ be encoded in the token, only an encrypted\n * signature of the data.\n */\n attachment?: string;\n}\n\nexport enum UserEventsEmit {\n ClosedByUser = 'closed-by-user',\n}\n\nexport enum UserEventsOnReceived {\n ClosedByUser = 'closed-by-user-on-received',\n}\n\nexport interface ChainWalletInfo {\n publicAddress: string | null;\n subAccounts: Array<{ name: string; publicAddress: string }>;\n}\n\nexport interface MagicUserMetadata {\n issuer: string | null;\n email: string | null;\n phoneNumber: string | null;\n isMfaEnabled: boolean;\n recoveryFactors: [RecoveryFactor] | [];\n firstLoginAt: string | null;\n wallets: {\n ethereum?: ChainWalletInfo;\n algorand?: ChainWalletInfo;\n aptos?: ChainWalletInfo;\n avalancheX?: ChainWalletInfo;\n bitcoin?: ChainWalletInfo;\n conflux?: ChainWalletInfo;\n cosmos?: ChainWalletInfo;\n flow?: ChainWalletInfo;\n harmony?: ChainWalletInfo;\n hedera?: ChainWalletInfo;\n icon?: ChainWalletInfo;\n kadena?: ChainWalletInfo;\n near?: ChainWalletInfo;\n polkadot?: ChainWalletInfo;\n solana?: ChainWalletInfo;\n sui?: ChainWalletInfo;\n taquito?: ChainWalletInfo;\n terra?: ChainWalletInfo;\n tezos?: ChainWalletInfo;\n zilliqa?: ChainWalletInfo;\n [chain: string]: ChainWalletInfo | undefined;\n };\n}\n\nexport enum RecoveryFactorEventOnReceived {\n EnterNewPhoneNumber = 'enter-new-phone-number',\n EnterOtpCode = 'enter-otp-code',\n RecoveryFactorAlreadyExists = 'recovery-factor-already-exists',\n MalformedPhoneNumber = 'malformed-phone-number',\n InvalidOtpCode = 'invalid-otp-code',\n RecoveryFactorUpdated = 'recovery-factor-updated',\n RecoveryFactorDeleted = 'recovery-factor-deleted',\n}\n\nexport enum RecoveryFactorEventEmit {\n SendNewPhoneNumber = 'send-new-phone-number',\n SendOtpCode = 'send-otp-code',\n Cancel = 'cancel',\n StartEditPhoneNumber = 'start-edit-phone-number',\n}\n\ntype RecoveryFactor = {\n type: RecoveryMethodType;\n value: string;\n};\n\nexport type RecoveryFactorEventHandlers = {\n // Event Received\n [RecoveryFactorEventEmit.SendNewPhoneNumber]: (phone_number: string) => void;\n [RecoveryFactorEventEmit.SendOtpCode]: (otp: string) => void;\n [RecoveryFactorEventEmit.StartEditPhoneNumber]: () => void;\n [RecoveryFactorEventEmit.Cancel]: () => void;\n\n // Event sent\n [RecoveryFactorEventOnReceived.EnterNewPhoneNumber]: () => void;\n [RecoveryFactorEventOnReceived.EnterOtpCode]: () => void;\n [RecoveryFactorEventOnReceived.RecoveryFactorAlreadyExists]: () => void;\n [RecoveryFactorEventOnReceived.MalformedPhoneNumber]: () => void;\n [RecoveryFactorEventOnReceived.InvalidOtpCode]: () => void;\n [RecoveryFactorEventOnReceived.RecoveryFactorUpdated]: (updatedFactor: { type: string; value: string }) => void;\n [RecoveryFactorEventOnReceived.RecoveryFactorDeleted]: () => void;\n} & RecencyCheckEventHandlers;\n\nexport enum RecoveryMethodType {\n PhoneNumber = 'phone_number',\n}\n\nexport interface UpdateEmailConfiguration {\n /**\n * The new email address to update to\n */\n email: string;\n\n /**\n * When `true`, a pre-built pending modal interface will\n * guide the user to check their new, followed by old emails\n * for confirmation emails.\n */\n showUI?: boolean;\n}\n\nexport interface UpdateWebAuthnInfoConfiguration {\n /**\n * WebAuthn info id\n */\n id: string;\n\n /**\n * nickname that user attempts to update to the webauth device associate to the id.\n */\n nickname: string;\n}\n\nexport interface RecoverAccountConfiguration {\n /**\n * The email to recover\n */\n email: string;\n showUI: boolean;\n}\n\nexport interface ShowSettingsConfiguration {\n /**\n * deep linking destination\n */\n page: DeepLinkPage;\n showUI?: boolean;\n}\n\nexport enum RecoverAccountEventOnReceived {\n SmsOtpSent = 'sms-otp-sent',\n LoginThrottled = 'login-throttled',\n InvalidSmsOtp = 'invalid-sms-otp',\n SmsVerified = 'sms-verified',\n AccountRecovered = 'account-recovered',\n UpdateEmailRequired = 'update-email-required',\n}\n\nexport enum RecoverAccountEventEmit {\n Cancel = 'cancel',\n VerifyOtp = 'verify-otp-code',\n ResendSms = 'resend-sms-otp',\n UpdateEmail = 'update-email',\n}\n\nexport type RecoverAccountEventHandlers = {\n // Event Received\n [RecoverAccountEventEmit.Cancel]: () => void;\n [RecoverAccountEventEmit.VerifyOtp]: (otp: string) => void;\n [RecoverAccountEventEmit.ResendSms]: () => void;\n [RecoverAccountEventEmit.UpdateEmail]: (email: string) => void;\n\n // Event sent\n [RecoverAccountEventOnReceived.SmsOtpSent]: ({ phoneNumber }: { phoneNumber: string }) => void;\n [RecoverAccountEventOnReceived.LoginThrottled]: (error: string) => void;\n [RecoverAccountEventOnReceived.InvalidSmsOtp]: ({\n errorMessage,\n errorCode,\n }: {\n errorMessage: string;\n errorCode: string;\n }) => void;\n [RecoverAccountEventOnReceived.SmsVerified]: () => void;\n [RecoverAccountEventOnReceived.AccountRecovered]: () => void;\n [RecoverAccountEventOnReceived.UpdateEmailRequired]: () => void;\n};\n", "export type NFTResponseStatus = 'cancelled' | 'pending' | 'processed' | 'declined' | 'expired';\n\nexport type NFTResponse = {\n status: NFTResponseStatus;\n};\n\nexport interface NFTPurchaseRequest {\n nft: {\n name: string;\n imageUrl: string;\n blockchainNftId: string;\n contractAddress: string;\n network: string;\n platform: string;\n type: string;\n };\n identityPrefill: {\n firstName: string;\n lastName: string;\n dateOfBirth: string; // YYYY-MM-DD\n emailAddress: string;\n phone: string;\n address: {\n street1: string;\n street2: string;\n city: string;\n regionCode: string;\n postalCode: string;\n countryCode: string;\n };\n };\n}\n\nexport type NFTPurchaseResponse = NFTResponse & {\n errorMessage?: string;\n};\n\nexport interface NFTCheckoutRequest {\n // given by magic / found in the developer dashboard in future\n contractId: string;\n // in contract, if ERC1155\u2026 for ERC721, use token ID = 0\n tokenId: string;\n name: string;\n imageUrl: string;\n quantity?: number; // default is 1\n walletAddress?: string; // default is user's wallet address\n // If enabled, the user will be able to pay with crypto. the default is false\n isCryptoCheckoutEnabled?: boolean;\n walletProvider?: 'magic' | 'web3modal';\n}\n\nexport type NFTCheckoutResponse = NFTResponse;\n\nexport type NFTCheckoutEvents = {\n disconnect: () => void;\n 'nft-checkout-initiated': (rawTransaction: string) => void;\n};\n\nexport interface NFTTransferRequest {\n tokenId: string;\n contractAddress: string;\n quantity?: number;\n recipient?: string;\n}\n\nexport type NFTTransferResponse = NFTResponse;\n\nexport enum NftCheckoutIntermediaryEvents {\n Success = 'nft-checkout-success',\n Failure = 'nft-checkout-failure',\n Initiated = 'nft-checkout-initiated',\n Disconnect = 'disconnect',\n}\n\nexport type NftCheckoutEventHandler = {\n [NftCheckoutIntermediaryEvents.Initiated]: (rawTransaction: string) => void;\n [NftCheckoutIntermediaryEvents.Success]: (signedTransaction: string) => void;\n [NftCheckoutIntermediaryEvents.Failure]: () => void;\n};\n", "export type AccessListEntry = { address: string; storageKeys: Array<string> };\n\n/**\n * An ordered collection of [[AccessList]] entries.\n */\nexport type AccessList = Array<AccessListEntry>;\n\nexport enum WalletEventOnReceived {\n WalletInfoFetched = 'Wallet/wallet-info-fetched',\n}\n\n/**\n * Request parameters for EIP-7702 authorization signing\n */\nexport interface Sign7702AuthorizationRequest {\n /**\n * The smart contract implementation address the EOA delegates to\n */\n contractAddress: string;\n\n /**\n * The chain ID for the network (use 0 for universal cross-chain authorization)\n */\n chainId: number;\n\n /**\n * The nonce for the EOA account (transaction count)\n */\n nonce?: number;\n}\n\n/**\n * Response from EIP-7702 authorization signing\n */\nexport interface Sign7702AuthorizationResponse {\n /**\n * The contract address that was authorized\n */\n contractAddress: string;\n\n /**\n * The chain ID for the authorization\n */\n chainId: number;\n\n /**\n * The nonce used in the authorization\n */\n nonce: number;\n\n /**\n * The v component of the signature (recovery id)\n */\n v: number;\n\n /**\n * The r component of the signature\n */\n r: string;\n\n /**\n * The s component of the signature\n */\n s: string;\n\n /**\n * Optional: Full signature as hex string\n */\n signature?: string;\n}\n\n/**\n * Request parameters for sending an EIP-7702 transaction with authorization list\n */\nexport interface Send7702TransactionRequest {\n /**\n * The recipient address\n */\n to: string;\n\n /**\n * The value to send in wei (as hex string)\n */\n value?: string;\n\n /**\n * The transaction data (calldata)\n */\n data?: string;\n\n /**\n * Gas limit for the transaction (as hex string)\n */\n gas?: string;\n\n /**\n * Gas limit for the transaction (alias for gas)\n */\n gasLimit?: string;\n\n /**\n * Maximum fee per gas for EIP-1559 transactions (as hex string)\n */\n maxFeePerGas?: string;\n\n /**\n * Maximum priority fee per gas for EIP-1559 transactions (as hex string)\n */\n maxPriorityFeePerGas?: string;\n\n /**\n * Transaction nonce (if not provided, will be fetched from network)\n */\n nonce?: number;\n\n /**\n * The list of signed EIP-7702 authorizations to include in the transaction\n */\n authorizationList: Sign7702AuthorizationResponse[];\n}\n\n/**\n * Response from sending an EIP-7702 transaction\n */\nexport interface Send7702TransactionResponse {\n /**\n * The transaction hash\n */\n transactionHash: string;\n}", "export enum UiEventsEmit {\n CloseMagicWindow = 'close-magic-window',\n}\n", "// Shared MFA events reused by both popup and redirect flows\nexport enum OAuthMFAEventEmit {\n Cancel = 'cancel',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n}\n\nexport enum OAuthMFAEventOnReceived {\n MfaSentHandle = 'mfa-sent-handle',\n InvalidMfaOtp = 'invalid-mfa-otp',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n}\n\ntype OAuthMFAEventHandlers = {\n // Event sent\n [OAuthMFAEventEmit.Cancel]: () => void;\n [OAuthMFAEventEmit.VerifyMFACode]: (mfa: string) => void;\n [OAuthMFAEventEmit.LostDevice]: () => void;\n [OAuthMFAEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n // Event Received\n [OAuthMFAEventOnReceived.MfaSentHandle]: () => void;\n [OAuthMFAEventOnReceived.InvalidMfaOtp]: () => void;\n [OAuthMFAEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [OAuthMFAEventOnReceived.InvalidRecoveryCode]: () => void;\n [OAuthMFAEventOnReceived.RecoveryCodeSuccess]: () => void;\n};\n\n// Popup-specific events\nexport enum OAuthPopupEventOnReceived {\n PopupUrl = 'popup-url',\n}\n\nexport enum OAuthPopupEventEmit {\n PopupEvent = 'popup-event',\n}\n\nexport type OAuthPopupEventHandlers = {\n [OAuthPopupEventEmit.PopupEvent]: (eventData: unknown) => void;\n [OAuthPopupEventOnReceived.PopupUrl]: (event: { popupUrl: string; provider: string }) => void;\n} & OAuthMFAEventHandlers;\n\n// Redirect-specific handler type\nexport type OAuthGetResultEventHandlers = OAuthMFAEventHandlers;\n", "export interface PasskeyResult {\n // null if skipDIDToken is true\n idToken: string | null;\n\n // Info of the device used to authenticate\n deviceInfo: DeviceInfo;\n}\n\nexport interface DeviceInfo {\n id: string;\n nickname: string;\n transport: string;\n userAgent: string;\n}\n\nexport interface PasskeyMetadata {\n devicesInfo: DeviceInfo[];\n}\n\nexport enum PasskeyMFAEventEmit {\n Cancel = 'cancel',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n}\nexport enum PasskeyMFAEventOnReceived {\n MfaSentHandle = 'mfa-sent-handle',\n InvalidMfaOtp = 'invalid-mfa-otp',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n}\n\nexport type PasskeyEventHandlers = {\n // Event sent\n [PasskeyMFAEventEmit.Cancel]: () => void;\n [PasskeyMFAEventEmit.VerifyMFACode]: (mfa: string) => void;\n [PasskeyMFAEventEmit.LostDevice]: () => void;\n [PasskeyMFAEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n // Event Received\n [PasskeyMFAEventOnReceived.MfaSentHandle]: () => void;\n [PasskeyMFAEventOnReceived.InvalidMfaOtp]: () => void;\n [PasskeyMFAEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [PasskeyMFAEventOnReceived.InvalidRecoveryCode]: () => void;\n [PasskeyMFAEventOnReceived.RecoveryCodeSuccess]: () => void;\n};\n", "/**\n * Encode given buffer or decode given string with Base64URL.\n */\nexport class Base64URL {\n /**\n * Convert bytes into a base64url-encoded string\n */\n static encode(buffer: ArrayBuffer): string {\n const base64 = globalThis.btoa(String.fromCharCode(...new Uint8Array(buffer)));\n\n return base64.replace(/=/g, '').replace(/\\+/g, '-').replace(/\\//g, '_');\n }\n\n /**\n * Convert a base64url-encoded string into bytes\n */\n static decode(base64url: string): ArrayBuffer {\n const base64 = base64url.replace(/-/g, '+').replace(/_/g, '/');\n const binStr = globalThis.atob(base64);\n const bin = new Uint8Array(binStr.length);\n\n for (let i = 0; i < binStr.length; i++) {\n bin[i] = binStr.charCodeAt(i);\n }\n\n return bin.buffer;\n }\n}\n", "import { Base64URL } from './base64';\n\nfunction isAuthenticatorAssertionResponse(value: AuthenticatorResponse): value is AuthenticatorAssertionResponse {\n if (typeof value !== 'object') {\n return false;\n }\n if (\n (value as AuthenticatorAssertionResponse)?.authenticatorData === undefined ||\n typeof (value as AuthenticatorAssertionResponse)?.authenticatorData !== 'object'\n ) {\n return false;\n }\n return true;\n}\n\nfunction isAuthenticatorAttestationResponse(value: AuthenticatorResponse): value is AuthenticatorAttestationResponse {\n if (typeof value !== 'object') {\n return false;\n }\n if (\n (value as AuthenticatorAttestationResponse)?.attestationObject === undefined ||\n typeof (value as AuthenticatorAttestationResponse)?.attestationObject !== 'object'\n ) {\n return false;\n }\n return true;\n}\n\n/**\n * Polyfill `PublicKeyCredential.prototype.toJSON`\n *\n * See https://w3c.github.io/webauthn/#dom-publickeycredential-tojson\n */\nexport function toJSON(cred: PublicKeyCredential): PublicKeyCredentialJSON {\n // Prefer native implementation if available\n if (typeof cred.toJSON === 'function') {\n return cred.toJSON();\n }\n\n try {\n const id = cred.id;\n const rawId = Base64URL.encode(cred.rawId);\n const authenticatorAttachment = cred.authenticatorAttachment;\n const clientExtensionResults = {};\n const type = cred.type;\n\n // This is authentication.\n if (isAuthenticatorAssertionResponse(cred.response)) {\n return {\n id,\n rawId,\n response: {\n authenticatorData: Base64URL.encode(cred.response.authenticatorData),\n clientDataJSON: Base64URL.encode(cred.response.clientDataJSON),\n signature: Base64URL.encode(cred.response.signature),\n userHandle: cred.response.userHandle ? Base64URL.encode(cred.response.userHandle) : undefined,\n },\n authenticatorAttachment,\n clientExtensionResults,\n type,\n };\n }\n\n if (isAuthenticatorAttestationResponse(cred.response)) {\n // This is registration.\n return {\n id,\n rawId,\n response: {\n clientDataJSON: Base64URL.encode(cred.response.clientDataJSON),\n attestationObject: Base64URL.encode(cred.response.attestationObject),\n transports: cred.response?.getTransports() || [],\n },\n authenticatorAttachment,\n clientExtensionResults,\n type,\n };\n }\n\n throw new Error('Unexpected object.');\n } catch (error) {\n console.error(error);\n throw error;\n }\n}\n"],
5
+ "mappings": "yaAAA,IAAAA,GAAA,GAAAC,EAAAD,GAAA,uBAAAE,IAAA,eAAAC,EAAAH,IAAA,IAAAI,EAA0B,+BCAnB,IAAKC,GAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,eAAiB,sBACjBA,EAAA,kBAAoB,qBACpBA,EAAA,gBAAkB,mBAClBA,EAAA,wBAA0B,4BAC1BA,EAAA,uBAAyB,0BAPfA,IAAAA,GAAA,CAAA,CAAA,EAUAC,GAAAA,IACVA,EAAA,eAAiB,mBACjBA,EAAA,gBAAkB,mBAClBA,EAAA,iCAAmC,sCACnCA,EAAA,kBAAoB,qBACpBA,EAAA,oBAAsB,eALZA,IAAAA,GAAA,CAAA,CAAA,EAQAC,GAAAA,IAEVA,EAAAA,EAAA,WAAa,MAAA,EAAb,aACAA,EAAAA,EAAA,eAAiB,MAAA,EAAjB,iBACAA,EAAAA,EAAA,eAAiB,MAAA,EAAjB,iBACAA,EAAAA,EAAA,cAAgB,MAAA,EAAhB,gBACAA,EAAAA,EAAA,cAAgB,MAAA,EAAhB,gBAGAA,EAAAA,EAAA,4BAA8B,IAAA,EAA9B,8BACAA,EAAAA,EAAA,iBAAmB,MAAA,EAAnB,mBACAA,EAAAA,EAAA,qBAAuB,MAAA,EAAvB,uBACAA,EAAAA,EAAA,oBAAsB,MAAA,EAAtB,sBACAA,EAAAA,EAAA,kBAAoB,MAAA,EAApB,oBACAA,EAAAA,EAAA,qBAAuB,MAAA,EAAvB,uBACAA,EAAAA,EAAA,4BAA8B,MAAA,EAA9B,8BACAA,EAAAA,EAAA,kBAAoB,MAAA,EAApB,oBACAA,EAAAA,EAAA,mBAAqB,MAAA,EAArB,qBACAA,EAAAA,EAAA,mBAAqB,MAAA,EAArB,qBACAA,EAAAA,EAAA,iBAAmB,MAAA,EAAnB,mBACAA,EAAAA,EAAA,sBAAwB,MAAA,EAAxB,wBACAA,EAAAA,EAAA,kBAAoB,MAAA,EAApB,oBACAA,EAAAA,EAAA,sBAAwB,MAAA,EAAxB,wBACAA,EAAAA,EAAA,SAAW,MAAA,EAAX,WACAA,EAAAA,EAAA,gBAAkB,MAAA,EAAlB,kBACAA,EAAAA,EAAA,mBAAqB,MAAA,EAArB,qBACAA,EAAAA,EAAA,gBAAkB,MAAA,EAAlB,kBA1BUA,IAAAA,GAAA,CAAA,CAAA,ECgCAC,GAAAA,IACVA,EAAA,SAAW,qBACXA,EAAA,QAAU,oBACVA,EAAA,SAAW,oBAHDA,IAAAA,GAAA,CAAA,CAAA,EAMAC,GAAAA,IACVA,EAAA,gBAAkB,mBAClBA,EAAA,eAAiB,kBACjBA,EAAA,kBAAoB,qBAHVA,IAAAA,GAAA,CAAA,CAAA,EAoBAC,GAAAA,IACVA,EAAA,aAAe,4BACfA,EAAA,kBAAoB,kCACpBA,EAAA,mBAAqB,mCACrBA,EAAA,oBAAsB,mCACtBA,EAAA,sBAAwB,qCACxBA,EAAA,WAAa,0BACbA,EAAA,gBAAkB,+BAClBA,EAAA,YAAc,0BACdA,EAAA,WAAa,qBACbA,EAAA,OAAS,oBACTA,EAAA,YAAc,0BACdA,EAAA,aAAe,sBACfA,EAAA,qBAAuB,mCACvBA,EAAA,qBAAuB,yCACvBA,EAAA,0BAA4B,+CAC5BA,EAAA,2BAA6B,2CAC7BA,EAAA,4BAA8B,gDAC9BA,EAAA,mBAAqB,uCACrBA,EAAA,wBAA0B,4CAC1BA,EAAA,oBAAsB,uCACtBA,EAAA,mBAAqB,uCACrBA,EAAA,eAAiB,iCACjBA,EAAA,oBAAsB,uCACtBA,EAAA,kBAAoB,2BACpBA,EAAA,gBAAkB,sBAClBA,EAAA,QAAU,iBACVA,EAAA,OAAS,eACTA,EAAA,YAAc,qBACdA,EAAA,YAAc,qBACdA,EAAA,YAAc,qBACdA,EAAA,sBAAwB,uBACxBA,EAAA,WAAa,gBAGbA,EAAA,eAAiB,6BACjBA,EAAA,uBAAyB,0CACzBA,EAAA,kBAAoB,uBACpBA,EAAA,YAAc,kBACdA,EAAA,MAAQ,WACRA,EAAA,UAAY,wBACZA,EAAA,UAAY,wBACZA,EAAA,SAAW,kBACXA,EAAA,WAAa,yBACbA,EAAA,iBAAmB,4BACnBA,EAAA,YAAc,qBACdA,EAAA,aAAe,sBACfA,EAAA,SAAW,mBACXA,EAAA,UAAY,6BACZA,EAAA,WAAa,8BACbA,EAAA,2BAA6B,sCAC7BA,EAAA,sBAAwB,uCACxBA,EAAA,oBAAsB,0BApDZA,IAAAA,GAAA,CAAA,CAAA,EC1EL,IAAKC,GAAAA,IACVA,EAAA,sBAAwB,wBACxBA,EAAA,oBAAsB,sBACtBA,EAAA,mBAAqB,qBACrBA,EAAA,mBAAqB,qBACrBA,EAAA,mBAAqB,qBACrBA,EAAA,0BAA4B,4BAC5BA,EAAA,gCAAkC,kCAClCA,EAAA,WAAa,aACbA,EAAA,qBAAuB,uBACvBA,EAAA,kCAAoC,oCACpCA,EAAA,iCAAmC,mCACnCA,EAAA,sBAAwB,wBAZdA,IAAAA,GAAA,CAAA,CAAA,EAeAC,GAAAA,IACVA,EAAA,qBAAuB,uBACvBA,EAAA,kCAAoC,oCACpCA,EAAA,gCAAkC,iCAClCA,EAAA,WAAa,aAJHA,IAAAA,GAAA,CAAA,CAAA,ECjBAC,GAAAA,IACVA,EAAA,YAAc,eACdA,EAAA,IAAM,MACNA,EAAA,SAAW,WAHDA,IAAAA,GAAA,CAAA,CAAA,EC8IAC,GAAAA,IACVA,EAAA,MAAQ,QADEA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,UAAY,aACZA,EAAA,oBAAsB,wBAFZA,IAAAA,GAAA,CAAA,CAAA,EAKAC,GAAAA,IACVA,EAAA,eAAiB,mBACjBA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBACrBA,EAAA,OAAS,SALCA,IAAAA,GAAA,CAAA,CAAA,EAQAC,GAAAA,IACVA,EAAA,aAAe,iBACfA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBACrBA,EAAA,OAAS,SACTA,EAAA,MAAQ,QANEA,IAAAA,GAAA,CAAA,CAAA,EASAC,GAAAA,IACVA,EAAA,WAAa,eACbA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,eAAiB,kBACjBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBATZA,IAAAA,GAAA,CAAA,CAAA,EAYAC,GAAAA,IACVA,EAAA,aAAe,iBACfA,EAAA,gBAAkB,oBAClBA,EAAA,cAAgB,kBAChBA,EAAA,gBAAkB,oBAClBA,EAAA,cAAgB,kBAChBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBACtBA,EAAA,eAAiB,kBACjBA,EAAA,mBAAqB,uBAVXA,IAAAA,GAAA,CAAA,CAAA,EAaAC,GAAAA,IACVA,EAAA,MAAQ,eADEA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,eAAiB,kBACjBA,EAAA,oBAAsB,wBACtBA,EAAA,8BAAgC,mCAChCA,EAAA,4BAA8B,iCAJpBA,IAAAA,GAAA,CAAA,CAAA,EAOAC,GAAAA,IACVA,EAAA,MAAQ,4BACRA,EAAA,OAAS,0CACTA,EAAA,eAAiB,uCACjBA,EAAA,cAAgB,0BAJNA,IAAAA,GAAA,CAAA,CAAA,EAOAC,GAAAA,IACVA,EAAA,mCAAqC,yCACrCA,EAAA,0BAA4B,+BAC5BA,EAAA,gBAAkB,wCAClBA,EAAA,aAAe,iDACfA,EAAA,UAAY,8CACZA,EAAA,oBAAsB,yDANZA,IAAAA,GAAA,CAAA,CAAA,EASAC,GAAAA,IACVA,EAAA,kBAAoB,mCACpBA,EAAA,OAAS,4CACTA,EAAA,eAAiB,mCAHPA,IAAAA,GAAA,CAAA,CAAA,EAMAC,GAAAA,IACVA,EAAA,+BAAiC,2CACjCA,EAAA,aAAe,4BACfA,EAAA,gBAAkB,0CAClBA,EAAA,aAAe,mDACfA,EAAA,UAAY,gDACZA,EAAA,oBAAsB,2DACtBA,EAAA,aAAe,gCACfA,EAAA,mBAAqB,uCARXA,IAAAA,GAAA,CAAA,CAAA,EAWAC,GAAAA,IACVA,EAAA,eAAiB,wBADPA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,OAAS,mBADCA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,mBAAqB,uBACrBA,EAAA,cAAgB,kBAChBA,EAAA,iBAAmB,qBAHTA,IAAAA,GAAA,CAAA,CAAA,EAKAC,GAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,OAAS,mBAFCA,IAAAA,GAAA,CAAA,CAAA,EAKAC,IAAAA,IACVA,EAAA,iBAAmB,qBACnBA,EAAA,cAAgB,kBAChBA,EAAA,oBAAsB,wBAHZA,IAAAA,IAAA,CAAA,CAAA,EAMAC,IAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,OAAS,qBAHCA,IAAAA,IAAA,CAAA,CAAA,ECnQAC,IAAAA,IACVA,EAAA,QAAU,UADAA,IAAAA,IAAA,CAAA,CAAA,ECiBAC,IAAAA,IACVA,EAAA,aAAe,iBADLA,IAAAA,IAAA,CAAA,CAAA,EAIAC,IAAAA,IACVA,EAAA,aAAe,6BADLA,IAAAA,IAAA,CAAA,CAAA,EAyCAC,IAAAA,IACVA,EAAA,oBAAsB,yBACtBA,EAAA,aAAe,iBACfA,EAAA,4BAA8B,iCAC9BA,EAAA,qBAAuB,yBACvBA,EAAA,eAAiB,mBACjBA,EAAA,sBAAwB,0BACxBA,EAAA,sBAAwB,0BAPdA,IAAAA,IAAA,CAAA,CAAA,EAUAC,IAAAA,IACVA,EAAA,mBAAqB,wBACrBA,EAAA,YAAc,gBACdA,EAAA,OAAS,SACTA,EAAA,qBAAuB,0BAJbA,IAAAA,IAAA,CAAA,CAAA,EA6BAC,IAAAA,IACVA,EAAA,YAAc,eADJA,IAAAA,IAAA,CAAA,CAAA,EA8CAC,IAAAA,IACVA,EAAA,WAAa,eACbA,EAAA,eAAiB,kBACjBA,EAAA,cAAgB,kBAChBA,EAAA,YAAc,eACdA,EAAA,iBAAmB,oBACnBA,EAAA,oBAAsB,wBANZA,IAAAA,IAAA,CAAA,CAAA,EASAC,IAAAA,IACVA,EAAA,OAAS,SACTA,EAAA,UAAY,kBACZA,EAAA,UAAY,iBACZA,EAAA,YAAc,eAJJA,IAAAA,IAAA,CAAA,CAAA,EC3FAC,IAAAA,IACVA,EAAA,QAAU,uBACVA,EAAA,QAAU,uBACVA,EAAA,UAAY,yBACZA,EAAA,WAAa,aAJHA,IAAAA,IAAA,CAAA,CAAA,EC5DAC,IAAAA,IACVA,EAAA,kBAAoB,6BADVA,IAAAA,IAAA,CAAA,CAAA,ECPAC,IAAAA,IACVA,EAAA,iBAAmB,qBADTA,IAAAA,IAAA,CAAA,CAAA,ECCAC,IAAAA,IACVA,EAAA,OAAS,SACTA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBAJXA,IAAAA,IAAA,CAAA,CAAA,EAOAC,IAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBALZA,IAAAA,IAAA,CAAA,CAAA,EAuBAC,IAAAA,IACVA,EAAA,SAAW,YADDA,IAAAA,IAAA,CAAA,CAAA,EAIAC,IAAAA,IACVA,EAAA,WAAa,cADHA,IAAAA,IAAA,CAAA,CAAA,EChBAC,GAAAA,IACVA,EAAA,OAAS,SACTA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBAJXA,IAAAA,GAAA,CAAA,CAAA,EAMAC,GAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBALZA,IAAAA,GAAA,CAAA,CAAA,ECtBL,IAAMC,EAAN,KAAgB,CAIrB,OAAO,OAAOC,EAA6B,CAGzC,OAFe,WAAW,KAAK,OAAO,aAAa,GAAG,IAAI,WAAWA,CAAM,CAAC,CAAC,EAE/D,QAAQ,KAAM,EAAE,EAAE,QAAQ,MAAO,GAAG,EAAE,QAAQ,MAAO,GAAG,CACxE,CAKA,OAAO,OAAOC,EAAgC,CAC5C,IAAMC,EAASD,EAAU,QAAQ,KAAM,GAAG,EAAE,QAAQ,KAAM,GAAG,EACvDE,EAAS,WAAW,KAAKD,CAAM,EAC/BE,EAAM,IAAI,WAAWD,EAAO,MAAM,EAExC,QAASE,EAAI,EAAGA,EAAIF,EAAO,OAAQE,IACjCD,EAAIC,CAAC,EAAIF,EAAO,WAAWE,CAAC,EAG9B,OAAOD,EAAI,MACb,CACF,ECzBA,SAASE,GAAiCC,EAAuE,CAI/G,MAHI,SAAOA,GAAU,UAIlBA,GAA0C,oBAAsB,QACjE,OAAQA,GAA0C,mBAAsB,SAK5E,CAEA,SAASC,GAAmCD,EAAyE,CAInH,MAHI,SAAOA,GAAU,UAIlBA,GAA4C,oBAAsB,QACnE,OAAQA,GAA4C,mBAAsB,SAK9E,CAOO,SAASE,EAAOC,EAAoD,CAEzE,GAAI,OAAOA,EAAK,QAAW,WACzB,OAAOA,EAAK,OAAO,EAGrB,GAAI,CACF,IAAMC,EAAKD,EAAK,GACVE,EAAQC,EAAU,OAAOH,EAAK,KAAK,EACnCI,EAA0BJ,EAAK,wBAC/BK,EAAyB,CAAC,EAC1BC,EAAON,EAAK,KAGlB,GAAIJ,GAAiCI,EAAK,QAAQ,EAChD,MAAO,CACL,GAAAC,EACA,MAAAC,EACA,SAAU,CACR,kBAAmBC,EAAU,OAAOH,EAAK,SAAS,iBAAiB,EACnE,eAAgBG,EAAU,OAAOH,EAAK,SAAS,cAAc,EAC7D,UAAWG,EAAU,OAAOH,EAAK,SAAS,SAAS,EACnD,WAAYA,EAAK,SAAS,WAAaG,EAAU,OAAOH,EAAK,SAAS,UAAU,EAAI,MACtF,EACA,wBAAAI,EACA,uBAAAC,EACA,KAAAC,CACF,EAGF,GAAIR,GAAmCE,EAAK,QAAQ,EAElD,MAAO,CACL,GAAAC,EACA,MAAAC,EACA,SAAU,CACR,eAAgBC,EAAU,OAAOH,EAAK,SAAS,cAAc,EAC7D,kBAAmBG,EAAU,OAAOH,EAAK,SAAS,iBAAiB,EACnE,WAAYA,EAAK,UAAU,cAAc,GAAK,CAAC,CACjD,EACA,wBAAAI,EACA,uBAAAC,EACA,KAAAC,CACF,EAGF,MAAM,IAAI,MAAM,oBAAoB,CACtC,OAASC,EAAO,CACd,cAAQ,MAAMA,CAAK,EACbA,CACR,CACF,CdzEO,IAAMC,EAAN,cAAgC,YAAU,QAA0B,CACzE,KAAO,WACP,OAAc,CAAC,EAEP,+BAAgC,CACtC,KAAK,qCAAuD,4CAA6C,CAAC,CAAC,CAC7G,CAEQ,mCAAmCC,EAAiB,CAC1D,KAAK,+CAAgE,8BAA8BA,CAAO,GAAI,CAAC,CAAC,CAClH,CAEA,MAAa,gBAAgBC,EAA8C,CACzE,GAAI,CAAC,OAAO,oBACV,MAAM,KAAK,8BAA8B,EAE3C,GAAM,CAAE,SAAAC,EAAU,SAAAC,EAAW,GAAI,aAAAC,EAAc,SAAAC,CAAS,EAAIJ,GAAiB,CAAC,EAExE,CAAE,oBAAAK,EAAqB,kBAAAC,CAAkB,EAAI,MAAM,KAAK,QAC5D,KAAK,MAAM,gEAA6E,CAAC,CAAE,SAAAL,CAAS,CAAC,CAAC,CACxG,EAEIM,EACJ,GAAI,CACFA,EAAc,MAAM,UAAU,YAAY,OAAO,CAC/C,UAAWF,CACb,CAAC,CACH,OAASG,EAAU,CACjB,MAAM,KAAK,mCAAmCA,CAAG,CACnD,CAEA,OAAO,KAAK,QACV,KAAK,MAAM,iEAA8E,CACvF,CACE,kBAAAF,EACA,qBAAsBG,EAAOF,CAAU,EACvC,SAAAL,EACA,UAAWK,EAAW,SAAS,cAAc,EAC7C,UAAW,UAAU,UACrB,aAAAJ,EACA,SAAAC,CACF,CACF,CAAC,CACH,CACF,CAEO,MAAMJ,EAAgD,CAC3D,GAAM,CAAE,SAAAC,EAAU,aAAAS,EAAc,aAAAP,EAAc,SAAAC,CAAS,EAAIJ,GAAiB,CAAC,EAEzEW,EAEEC,EAAa,KAAK,MAAM,iBAAsD,MAAOC,EAASC,IAAW,CAC7G,GAAI,CAAC,OAAO,oBACV,OAAOA,EAAO,KAAK,8BAA8B,CAAC,EAGpD,GAAM,CAAE,oBAAAC,EAAqB,sBAAAC,CAAsB,EAAI,MAAM,KAAK,QAChE,KAAK,MAAM,kEAA8E,CAAC,CAAE,SAAAf,CAAS,CAAC,CAAC,CACzG,EAEIgB,EACJ,GAAI,CACFA,EAAa,MAAM,UAAU,YAAY,IAAI,CAC3C,UAAWD,CACb,CAAC,CACH,OAASR,EAAU,CACjB,OAAOM,EAAO,KAAK,mCAAmCN,CAAG,CAAC,CAC5D,CAEA,IAAMU,EAAiB,KAAK,MAAM,mEAA+E,CAC/G,CACE,oBAAAH,EACA,kBAAmBN,EAAOQ,CAAS,EACnC,OAAQP,EACR,aAAAP,EACA,SAAAC,CACF,CACF,CAAC,EAEDO,EAAkBO,EAAe,GAEjC,IAAMC,EAAe,KAAK,QAA6CD,CAAc,EAEhFR,IACHS,EAAa,GAAGC,EAA0B,cAAe,IAAM,CAC7DR,EAAW,KAAKQ,EAA0B,aAAa,CACzD,CAAC,EACDD,EAAa,GAAGC,EAA0B,cAAe,IAAM,CAC7DR,EAAW,KAAKQ,EAA0B,aAAa,CACzD,CAAC,EACDD,EAAa,GAAGC,EAA0B,uBAAwB,IAAM,CACtER,EAAW,KAAKQ,EAA0B,sBAAsB,CAClE,CAAC,EACDD,EAAa,GAAGC,EAA0B,oBAAqB,IAAM,CACnER,EAAW,KAAKQ,EAA0B,mBAAmB,CAC/D,CAAC,EACDD,EAAa,GAAGC,EAA0B,oBAAqB,IAAM,CACnER,EAAW,KAAKQ,EAA0B,mBAAmB,CAC/D,CAAC,GAGH,GAAI,CACF,IAAMC,EAAS,MAAMF,EACrBN,EAAQQ,CAAM,CAChB,OAASC,EAAO,CACdR,EAAOQ,CAAK,CACd,CACF,CAAC,EAED,MAAI,CAACZ,GAAgBE,IACnBA,EAAW,GAAGW,EAAoB,cAAgBC,GAAgB,CAChE,KAAK,wBAAwBD,EAAoB,cAAeZ,CAAe,EAAEa,CAAG,CACtF,CAAC,EACDZ,EAAW,GAAGW,EAAoB,WAAY,IAAM,CAClD,KAAK,wBAAwBA,EAAoB,WAAYZ,CAAe,EAAE,CAChF,CAAC,EACDC,EAAW,GAAGW,EAAoB,mBAAqBE,GAAyB,CAC9E,KAAK,wBAAwBF,EAAoB,mBAAoBZ,CAAe,EAAEc,CAAY,CACpG,CAAC,EACDb,EAAW,GAAGW,EAAoB,OAAQ,IAAM,CAC9C,KAAK,wBAAwBA,EAAoB,OAAQZ,CAAe,EAAE,CAC5E,CAAC,GAGIC,CACT,CAEO,WAAWZ,EAAgD,CAChE,GAAM,CAAE,GAAA0B,EAAI,SAAAxB,CAAS,EAAIF,EACnBkB,EAAiB,KAAK,MAAM,yDAA2E,CAC3G,CACE,sBAAuBQ,EACvB,SAAAxB,CACF,CACF,CAAC,EACD,OAAO,KAAK,QAAegB,CAAc,CAC3C,CAEO,iBAAiBQ,EAAY,CAClC,IAAMR,EAAiB,KAAK,MAAM,6DAAgF,CAChH,CACE,sBAAuBQ,CACzB,CACF,CAAC,EAED,OAAO,KAAK,QAAaR,CAAc,CACzC,CAEA,MAAa,kBAAkBhB,EAAW,GAAI,CAC5C,GAAI,CAAC,OAAO,oBACV,MAAM,KAAK,8BAA8B,EAE3C,IAAMyB,EAAU,MAAM,KAAK,QACzB,KAAK,MAAM,wEAAmF,CAAC,CAAC,CAClG,EAEIpB,EACJ,GAAI,CACFA,EAAc,MAAM,UAAU,YAAY,OAAO,CAC/C,UAAWoB,EAAQ,kBACrB,CAAC,CACH,OAASnB,EAAU,CACjB,MAAM,KAAK,mCAAmCA,CAAG,CACnD,CAEA,OAAO,KAAK,QACV,KAAK,MAAM,kEAA8E,CACvF,CACE,SAAAN,EACA,UAAWK,EAAW,SAAS,cAAc,EAC7C,WAAY,UAAU,UACtB,sBAAuBE,EAAOF,CAAU,CAC1C,CACF,CAAC,CACH,CACF,CAEO,aAAc,CACnB,IAAMW,EAAiB,KAAK,MAAM,kEAAwE,CAAC,CAAC,EAC5G,OAAO,KAAK,QAAeA,CAAc,CAC3C,CACF",
6
6
  "names": ["index_exports", "__export", "WebAuthnExtension", "__toCommonJS", "import_provider", "SDKErrorCode", "SDKWarningCode", "RPCErrorCode", "LocalStorageKeys", "ThirdPartyWalletEvents", "MagicPayloadMethod", "MagicIncomingWindowMessage", "MagicOutgoingWindowMessage", "DeepLinkPage", "LoginWithMagicLinkEventEmit", "LoginWithMagicLinkEventOnReceived", "LoginWithEmailOTPEventEmit", "LoginWithSmsOTPEventEmit", "LoginWithSmsOTPEventOnReceived", "LoginWithEmailOTPEventOnReceived", "DeviceVerificationEventEmit", "DeviceVerificationEventOnReceived", "RecencyCheckEventEmit", "RecencyCheckEventOnReceived", "UpdateEmailEventEmit", "UpdateEmailEventOnReceived", "AuthEventOnReceived", "FarcasterLoginEventEmit", "EnableMFAEventOnReceived", "EnableMFAEventEmit", "DisableMFAEventOnReceived", "DisableMFAEventEmit", "EthChainType", "UserEventsEmit", "UserEventsOnReceived", "RecoveryFactorEventOnReceived", "RecoveryFactorEventEmit", "RecoveryMethodType", "RecoverAccountEventOnReceived", "RecoverAccountEventEmit", "NftCheckoutIntermediaryEvents", "WalletEventOnReceived", "UiEventsEmit", "OAuthMFAEventEmit", "OAuthMFAEventOnReceived", "OAuthPopupEventOnReceived", "OAuthPopupEventEmit", "PasskeyMFAEventEmit", "PasskeyMFAEventOnReceived", "Base64URL", "buffer", "base64url", "base64", "binStr", "bin", "i", "isAuthenticatorAssertionResponse", "value", "isAuthenticatorAttestationResponse", "toJSON", "cred", "id", "rawId", "Base64URL", "authenticatorAttachment", "clientExtensionResults", "type", "error", "WebAuthnExtension", "message", "configuration", "username", "nickname", "skipDIDToken", "lifespan", "registrationOptions", "registrationToken", "credential", "err", "toJSON", "showMfaModal", "verifyPayloadId", "promiEvent", "resolve", "reject", "authenticationToken", "authenticationOptions", "assertion", "requestPayload", "loginRequest", "ie", "result", "error", "te", "mfa", "recoveryCode", "id", "options"]
7
7
  }
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../src/index.ts", "../../../../@magic-sdk/types/src/core/exception-types.ts", "../../../../@magic-sdk/types/src/core/json-rpc-types.ts", "../../../../@magic-sdk/types/src/core/message-types.ts", "../../../../@magic-sdk/types/src/core/deep-link-pages.ts", "../../../../@magic-sdk/types/src/modules/auth-types.ts", "../../../../@magic-sdk/types/src/modules/rpc-provider-types.ts", "../../../../@magic-sdk/types/src/modules/user-types.ts", "../../../../@magic-sdk/types/src/modules/nft-types.ts", "../../../../@magic-sdk/types/src/modules/wallet-types.ts", "../../../../@magic-sdk/types/src/modules/common-types.ts", "../../../../@magic-sdk/types/src/modules/oauth-types.ts", "../../../../@magic-sdk/types/src/modules/webauthn-types.ts", "../../src/utils/base64.ts", "../../src/utils/polyfills.ts"],
4
- "sourcesContent": ["import { Extension } from '@magic-sdk/provider';\nimport {\n RegisterNewUserConfiguration,\n LoginWithWebAuthnConfiguration,\n MagicWebAuthnPayloadMethod,\n WebAuthnSDKErrorCode,\n UpdateWebAuthnInfoConfiguration,\n} from './types';\nimport { PasskeyResult, PasskeyEventHandlers, PasskeyMFAEventEmit, PasskeyMFAEventOnReceived } from '@magic-sdk/types';\nimport { toJSON } from './utils/polyfills';\n\nexport class WebAuthnExtension extends Extension.Internal<'webauthn', any> {\n name = 'webauthn' as const;\n config: any = {};\n\n private createWebAuthnNotSupportError() {\n this.createError(WebAuthnSDKErrorCode.WebAuthnNotSupported, 'WebAuthn is not supported in this device.', {});\n }\n\n private createWebAuthCreateCredentialError(message: string) {\n this.createError(WebAuthnSDKErrorCode.WebAuthnCreateCredentialError, `Error creating credential: ${message}`, {});\n }\n\n public async registerNewUser(configuration?: RegisterNewUserConfiguration) {\n if (!window.PublicKeyCredential) {\n throw this.createWebAuthnNotSupportError();\n }\n const { username, nickname = '', skipDIDToken, lifespan } = configuration ?? {};\n\n const { registrationOptions, registrationToken } = await this.request<any>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterPasskeyStart, [{ username }]),\n );\n\n let credential;\n try {\n credential = (await navigator.credentials.create({\n publicKey: registrationOptions,\n })) as any;\n } catch (err: any) {\n throw this.createWebAuthCreateCredentialError(err);\n }\n\n return this.request<string | null>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterPasskeyVerify, [\n {\n registrationToken,\n registrationResponse: toJSON(credential),\n nickname,\n transport: credential.response.getTransports(),\n userAgent: navigator.userAgent,\n skipDIDToken,\n lifespan,\n },\n ]),\n );\n }\n\n public login(configuration?: LoginWithWebAuthnConfiguration) {\n const { username, showMfaModal, skipDIDToken, lifespan } = configuration ?? {};\n\n let verifyPayloadId: string;\n\n const promiEvent = this.utils.createPromiEvent<PasskeyResult, PasskeyEventHandlers>(async (resolve, reject) => {\n if (!window.PublicKeyCredential) {\n return reject(this.createWebAuthnNotSupportError());\n }\n\n const { authenticationToken, authenticationOptions } = await this.request<any>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.LoginWithPasskeyStart, [{ username }]),\n );\n\n let assertion;\n try {\n assertion = (await navigator.credentials.get({\n publicKey: authenticationOptions,\n })) as any;\n } catch (err: any) {\n return reject(this.createWebAuthCreateCredentialError(err));\n }\n\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.LoginWithPasskeyVerify, [\n {\n authenticationToken,\n assertionResponse: toJSON(assertion),\n showUI: showMfaModal,\n skipDIDToken,\n lifespan,\n },\n ]);\n\n verifyPayloadId = requestPayload.id as string;\n\n const loginRequest = this.request<PasskeyResult, PasskeyEventHandlers>(requestPayload);\n\n if (!showMfaModal) {\n loginRequest.on(PasskeyMFAEventOnReceived.MfaSentHandle, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.MfaSentHandle);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.InvalidMfaOtp, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.InvalidMfaOtp);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.RecoveryCodeSentHandle, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.RecoveryCodeSentHandle);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.InvalidRecoveryCode, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.InvalidRecoveryCode);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.RecoveryCodeSuccess, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.RecoveryCodeSuccess);\n });\n }\n\n try {\n const result = await loginRequest;\n resolve(result);\n } catch (error) {\n reject(error);\n }\n });\n\n if (!showMfaModal && promiEvent) {\n promiEvent.on(PasskeyMFAEventEmit.VerifyMFACode, (mfa: string) => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.VerifyMFACode, verifyPayloadId)(mfa);\n });\n promiEvent.on(PasskeyMFAEventEmit.LostDevice, () => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.LostDevice, verifyPayloadId)();\n });\n promiEvent.on(PasskeyMFAEventEmit.VerifyRecoveryCode, (recoveryCode: string) => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.VerifyRecoveryCode, verifyPayloadId)(recoveryCode);\n });\n promiEvent.on(PasskeyMFAEventEmit.Cancel, () => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.Cancel, verifyPayloadId)();\n });\n }\n\n return promiEvent;\n }\n\n public updateInfo(configuration: UpdateWebAuthnInfoConfiguration) {\n const { id, nickname } = configuration;\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.UpdateWebAuthnInfo, [\n {\n webAuthnCredentialsId: id,\n nickname,\n },\n ]);\n return this.request<any[]>(requestPayload);\n }\n\n public unregisterDevice(id: string) {\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.UnregisterWebAuthDevice, [\n {\n webAuthnCredentialsId: id,\n },\n ]);\n\n return this.request<any>(requestPayload);\n }\n\n public async registerNewDevice(nickname = '') {\n if (!window.PublicKeyCredential) {\n throw this.createWebAuthnNotSupportError();\n }\n const options = await this.request<any>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterWebAuthDeviceStart, []),\n );\n\n let credential;\n try {\n credential = (await navigator.credentials.create({\n publicKey: options.credential_options,\n })) as any;\n } catch (err: any) {\n throw this.createWebAuthCreateCredentialError(err);\n }\n\n return this.request<string | null>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterWebAuthDevice, [\n {\n nickname,\n transport: credential.response.getTransports(),\n user_agent: navigator.userAgent,\n registration_response: toJSON(credential),\n },\n ]),\n );\n }\n\n public getMetadata() {\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.GetWebAuthnInfo, []);\n return this.request<any[]>(requestPayload);\n }\n}\n", "export enum SDKErrorCode {\n MissingApiKey = 'MISSING_API_KEY',\n ModalNotReady = 'MODAL_NOT_READY',\n ConnectionLost = 'CONNECTION_WAS_LOST',\n MalformedResponse = 'MALFORMED_RESPONSE',\n InvalidArgument = 'INVALID_ARGUMENT',\n ExtensionNotInitialized = 'EXTENSION_NOT_INITIALIZED',\n IncompatibleExtensions = 'INCOMPATIBLE_EXTENSIONS',\n}\n\nexport enum SDKWarningCode {\n SyncWeb3Method = 'SYNC_WEB3_METHOD',\n DuplicateIframe = 'DUPLICATE_IFRAME',\n ReactNativeEndpointConfiguration = 'REACT_NATIVE_ENDPOINT_CONFIGURATION',\n DeprecationNotice = 'DEPRECATION_NOTICE',\n ProductAnnouncement = 'ANNOUNCEMENT',\n}\n\nexport enum RPCErrorCode {\n // Standard JSON RPC 2.0 Error Codes\n ParseError = -32700,\n InvalidRequest = -32600,\n MethodNotFound = -32601,\n InvalidParams = -32602,\n InternalError = -32603,\n\n // Custom RPC Error Codes\n MagicLinkFailedVerification = -10000,\n MagicLinkExpired = -10001,\n MagicLinkRateLimited = -10002,\n UserAlreadyLoggedIn = -10003,\n UpdateEmailFailed = -10004,\n UserRequestEditEmail = -10005,\n MagicLinkInvalidRedirectURL = -10006,\n InactiveRecipient = -10010,\n AccessDeniedToUser = -10011,\n UserRejectedAction = -10012,\n RequestCancelled = -10014,\n RedirectLoginComplete = -10015,\n SessionTerminated = -10016,\n PopupRequestOverriden = -10017,\n SanEmail = -10018,\n DpopInvalidated = -10019,\n MaxAttemptsReached = -10031,\n UserRequiredMfa = -10033,\n}\n\nexport type ErrorCode = SDKErrorCode | RPCErrorCode;\nexport type WarningCode = SDKWarningCode;\n", "import { RPCErrorCode } from './exception-types';\n\n// --- Request interfaces\n\nexport interface JsonRpcRequestPayload<TParams = any> {\n jsonrpc: string;\n id: string | number | null;\n method: string;\n params?: TParams;\n}\n\nexport interface JsonRpcRequestCallback {\n /** Callback executed upon JSON RPC response. */\n (err: JsonRpcError | null, result?: JsonRpcResponsePayload | null): void;\n}\n\nexport interface JsonRpcBatchRequestCallback {\n /** Callback executed upon JSON RPC response. */\n (err: JsonRpcError | null, result?: (JsonRpcResponsePayload | null)[] | null): void;\n}\n\n// --- Response interfaces\n\nexport interface JsonRpcError {\n message: string;\n code: RPCErrorCode;\n data?: any;\n}\n\nexport interface JsonRpcResponsePayload<ResultType = any> {\n jsonrpc: string;\n id: string | number | null;\n result?: ResultType | null;\n error?: JsonRpcError | null;\n}\n\nexport interface UserInfo {\n email?: string;\n}\n\nexport type ShowUIPromiEvents = {\n disconnect: () => void;\n};\n\nexport interface RequestUserInfoScope {\n scope?: {\n email?: 'required' | 'optional';\n };\n}\n\nexport enum LocalStorageKeys {\n PROVIDER = 'magic_3pw_provider',\n ADDRESS = 'magic_3pw_address',\n CHAIN_ID = 'magic_3pw_chainId',\n}\n\nexport enum ThirdPartyWalletEvents {\n WalletConnected = 'wallet_connected',\n WalletRejected = 'wallet_rejected',\n Web3ModalSelected = 'web3modal_selected',\n}\n\nexport interface ConnectWithUIOptions {\n autoPromptThirdPartyWallets?: boolean;\n}\n\nexport type ConnectWithUiEvents = {\n 'id-token-created': (params: { idToken: string }) => void;\n} & { [key in ThirdPartyWalletEvents]: () => void };\n\n// --- Payload methods\n\n/**\n * Enum of JSON RPC methods for interacting with the Magic SDK authentication\n * relayer.\n */\nexport enum MagicPayloadMethod {\n LoginWithSms = 'magic_auth_login_with_sms',\n LoginWithEmailOTP = 'magic_auth_login_with_email_otp',\n LoginWithMagicLink = 'magic_auth_login_with_magic_link',\n LoginWithCredential = 'magic_auth_login_with_credential',\n SetAuthorizationToken = 'magic_auth_set_authorization_token',\n GetIdToken = 'magic_auth_get_id_token',\n GenerateIdToken = 'magic_auth_generate_id_token',\n GetMetadata = 'magic_auth_get_metadata',\n IsLoggedIn = 'magic_is_logged_in',\n Logout = 'magic_auth_logout',\n UpdateEmail = 'magic_auth_update_email',\n UserSettings = 'magic_auth_settings',\n UserSettingsTestMode = 'magic_auth_settings_testing_mode',\n LoginWithSmsTestMode = 'magic_auth_login_with_sms_testing_mode',\n LoginWithEmailOTPTestMode = 'magic_auth_login_with_email_otp_testing_mode',\n LoginWithMagicLinkTestMode = 'magic_login_with_magic_link_testing_mode',\n LoginWithCredentialTestMode = 'magic_auth_login_with_credential_testing_mode',\n GetIdTokenTestMode = 'magic_auth_get_id_token_testing_mode',\n GenerateIdTokenTestMode = 'magic_auth_generate_id_token_testing_mode',\n GetMetadataTestMode = 'magic_auth_get_metadata_testing_mode',\n IsLoggedInTestMode = 'magic_auth_is_logged_in_testing_mode',\n LogoutTestMode = 'magic_auth_logout_testing_mode',\n UpdateEmailTestMode = 'magic_auth_update_email_testing_mode',\n IntermediaryEvent = 'magic_intermediary_event',\n RequestAccounts = 'eth_requestAccounts',\n GetInfo = 'magic_get_info',\n ShowUI = 'magic_wallet',\n NFTPurchase = 'magic_nft_purchase',\n NFTCheckout = 'magic_nft_checkout',\n NFTTransfer = 'magic_nft_transfer',\n RequestUserInfoWithUI = 'mc_request_user_info',\n Disconnect = 'mc_disconnect',\n // UpdatePhoneNumber = 'magic_auth_update_phone_number',\n // UpdatePhoneNumberTestMode = 'magic_auth_update_phone_number_testing_mode',\n RecoverAccount = 'magic_auth_recover_account',\n RecoverAccountTestMode = 'magic_auth_recover_account_testing_mode',\n MagicBoxHeartBeat = 'magic_box_heart_beat',\n AutoConnect = 'mc_auto_connect',\n Login = 'mc_login',\n EncryptV1 = 'magic_auth_encrypt_v1',\n DecryptV1 = 'magic_auth_decrypt_v1',\n ShowNFTs = 'magic_show_nfts',\n ShowOnRamp = 'magic_show_fiat_onramp',\n ShowSendTokensUI = 'magic_show_send_tokens_ui',\n ShowAddress = 'magic_show_address',\n ShowBalances = 'magic_show_balances',\n RevealPK = 'magic_reveal_key',\n EnableMFA = 'magic_auth_enable_mfa_flow',\n DisableMFA = 'magic_auth_disable_mfa_flow',\n GetMultichainPublicAddress = 'magic_get_multichain_public_address',\n Sign7702Authorization = 'magic_wallet_sign_7702_authorization',\n Send7702Transaction = 'eth_send7702Transaction',\n}\n\n// Methods to not route if connected to third party wallet\nexport const routeToMagicMethods = [\n MagicPayloadMethod.IntermediaryEvent,\n MagicPayloadMethod.NFTCheckout,\n MagicPayloadMethod.Login,\n];\n", "import { JsonRpcResponsePayload, JsonRpcError, JsonRpcRequestPayload } from './json-rpc-types';\n\nexport enum MagicIncomingWindowMessage {\n MAGIC_HANDLE_RESPONSE = 'MAGIC_HANDLE_RESPONSE',\n MAGIC_OVERLAY_READY = 'MAGIC_OVERLAY_READY',\n MAGIC_SHOW_OVERLAY = 'MAGIC_SHOW_OVERLAY',\n MAGIC_HIDE_OVERLAY = 'MAGIC_HIDE_OVERLAY',\n MAGIC_HANDLE_EVENT = 'MAGIC_HANDLE_EVENT',\n MAGIC_MG_BOX_SEND_RECEIPT = 'MAGIC_MG_BOX_SEND_RECEIPT',\n MAGIC_SEND_PRODUCT_ANNOUNCEMENT = 'MAGIC_SEND_PRODUCT_ANNOUNCEMENT',\n MAGIC_PONG = 'MAGIC_PONG',\n MAGIC_POPUP_RESPONSE = 'MAGIC_POPUP_RESPONSE',\n MAGIC_POPUP_OAUTH_VERIFY_RESPONSE = 'MAGIC_POPUP_OAUTH_VERIFY_RESPONSE',\n MAGIC_THIRD_PARTY_WALLET_REQUEST = 'MAGIC_THIRD_PARTY_WALLET_REQUEST',\n MAGIC_OPEN_MOBILE_URL = 'MAGIC_OPEN_MOBILE_URL',\n}\n\nexport enum MagicOutgoingWindowMessage {\n MAGIC_HANDLE_REQUEST = 'MAGIC_HANDLE_REQUEST',\n MAGIC_THIRD_PARTY_WALLET_RESPONSE = 'MAGIC_THIRD_PARTY_WALLET_RESPONSE',\n MAGIC_THIRD_PARTY_WALLET_UPDATE = 'MAGIC_THIRD_PARTY_WALLET_EVENT',\n MAGIC_PING = 'MAGIC_PING',\n}\n\n/** The shape of responding window message data from the Magic iframe context. */\nexport interface MagicMessageRequest {\n msgType: string;\n payload: JsonRpcRequestPayload | JsonRpcRequestPayload[];\n rt?: string;\n jwt?: string;\n deviceShare?: string;\n}\n\n/** The shape of responding window message data from the Magic iframe context. */\nexport interface MagicMessageResponse<ResultType = any> {\n msgType: string;\n response: Partial<JsonRpcError> & Partial<JsonRpcResponsePayload<ResultType>>;\n rt?: string;\n deviceShare?: string;\n}\n\n/** The expected message event returned by the Magic iframe context. */\nexport interface MagicMessageEvent extends Partial<MessageEvent> {\n data: MagicMessageResponse;\n}\n\nexport interface MagicThirdPartyWalletRequest {\n msgType: MagicIncomingWindowMessage.MAGIC_THIRD_PARTY_WALLET_REQUEST;\n payload: JsonRpcRequestPayload;\n}\n\nexport interface MagicThirdPartyWalletResponse {\n msgType: `${MagicOutgoingWindowMessage.MAGIC_THIRD_PARTY_WALLET_RESPONSE}-${string}`;\n response: JsonRpcResponsePayload;\n}\n\nexport interface MagicThirdPartyWalletUpdate {\n msgType: `${MagicOutgoingWindowMessage.MAGIC_THIRD_PARTY_WALLET_UPDATE}-${string}`;\n details: {\n address: `0x${string}` | undefined;\n addresses: readonly `0x${string}`[] | undefined;\n chain: { id: number; name: string; [key: string]: unknown } | undefined;\n updatedField: 'chain' | 'address';\n };\n}\n\nexport type MagicThirdPartyWalletEventPayload = MagicThirdPartyWalletResponse | MagicThirdPartyWalletUpdate;\n", "export enum DeepLinkPage {\n UpdateEmail = 'update-email',\n MFA = 'mfa',\n Recovery = 'recovery',\n}\n", "import { WalletEventOnReceived } from './wallet-types';\n\nexport interface LoginWithMagicLinkConfiguration {\n /**\n * The email address of the user attempting to login.\n */\n email: string;\n\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to check their email for the \"magic link\" to complete their\n * authentication.\n */\n showUI?: boolean;\n\n /**\n * You can optionally provide a redirect URI that will be followed at the end\n * of the magic link flow. Don't forget to invoke\n * `magic.auth.loginWithCredential()` to complete the login from the route you\n * configure here.\n */\n redirectURI?: string;\n\n /**\n * Enterprise users with a custom SMTP can create custom email templates\n * from their dashboard. The default Magic loginWithMagicLink email will be\n * overridden when a variation is passed here.\n */\n overrides?: {\n variation?: string;\n };\n\n /**\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface LoginWithSmsConfiguration {\n /**\n * Specify the phone number of the user attempting to login.\n */\n phoneNumber: string;\n\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to check their SMS for the one time passcode (OTP) to complete their\n * authentication.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the SMS OTP flow.\n */\n showUI?: boolean;\n\n /*\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\nexport interface LoginWithEmailOTPConfiguration {\n /**\n * Specify the email address of the user attempting to login.\n */\n email: string;\n\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to check their email for the one time passcode (OTP) to complete their\n * authentication.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the email OTP flow.\n */\n showUI?: boolean;\n\n /**\n * Device Unrecognized UI will enforce showing up to secure user's login\n *\n * When set to true (default), an improved device recognition UI will be displayed to the user,\n * prompting them to verify their login by checking their email for device approval. This feature\n * enhances authentication security.\n *\n * This param will only be affected if showUI is false. When set to false,\n * developers have the flexibility to implement their own customized UI to\n * handle device check events, providing a more tailored user experience.\n */\n deviceCheckUI?: boolean;\n\n /**\n * Enterprise users with a custom SMTP can create custom email templates\n * from their dashboard. The default Magic loginWithOTP email will be\n * overridden when a variation is passed here.\n */\n overrides?: {\n variation?: string;\n appName?: string;\n assetUrl?: string;\n };\n\n /**\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface LoginWithCredentialConfiguration {\n /**\n * A credential token or a valid query string (prefixed with ? or #)\n */\n credentialOrQueryString?: string;\n\n /**\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface EnableMFAConfiguration {\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to enable MFA using Google Authenticator app.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the enable MFA flow.\n */\n showUI?: boolean;\n}\n\nexport interface DisableMFAConfiguration {\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to disable MFA.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the disable MFA flow.\n */\n showUI?: boolean;\n}\n\n/**\n * Auth Events Enum\n */\nexport enum LoginWithMagicLinkEventEmit {\n Retry = 'retry',\n}\n\nexport enum LoginWithMagicLinkEventOnReceived {\n EmailSent = 'email-sent',\n EmailNotDeliverable = 'email-not-deliverable',\n}\n\nexport enum LoginWithEmailOTPEventEmit {\n VerifyEmailOtp = 'verify-email-otp',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n Cancel = 'cancel',\n}\n\nexport enum LoginWithSmsOTPEventEmit {\n VerifySmsOtp = 'verify-sms-otp',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n Cancel = 'cancel',\n Retry = 'retry',\n}\n\nexport enum LoginWithSmsOTPEventOnReceived {\n SmsOTPSent = 'sms-otp-sent',\n InvalidSmsOtp = 'invalid-sms-otp',\n ExpiredSmsOtp = 'expired-sms-otp',\n MfaSentHandle = 'mfa-sent-handle',\n InvalidMfaOtp = 'invalid-mfa-otp',\n LoginThrottled = 'login-throttled',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n}\n\nexport enum LoginWithEmailOTPEventOnReceived {\n EmailOTPSent = 'email-otp-sent',\n InvalidEmailOtp = 'invalid-email-otp',\n InvalidMfaOtp = 'invalid-mfa-otp',\n ExpiredEmailOtp = 'expired-email-otp',\n MfaSentHandle = 'mfa-sent-handle',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n LoginThrottled = 'login-throttled',\n MaxAttemptsReached = 'max-attempts-reached',\n}\n\nexport enum DeviceVerificationEventEmit {\n Retry = 'device-retry',\n}\n\nexport enum DeviceVerificationEventOnReceived {\n DeviceApproved = 'device-approved',\n DeviceNeedsApproval = 'device-needs-approval',\n DeviceVerificationLinkExpired = 'device-verification-link-expired',\n DeviceVerificationEmailSent = 'device-verification-email-sent',\n}\n\nexport enum RecencyCheckEventEmit {\n Retry = 'Recency/auth-factor-retry',\n Cancel = 'Recency/auth-factor-verification-cancel',\n VerifyEmailOtp = 'Recency/auth-factor-verify-email-otp',\n VerifyMFACode = 'Recency/verify-mfa-code',\n}\n\nexport enum RecencyCheckEventOnReceived {\n PrimaryAuthFactorNeedsVerification = 'Recency/auth-factor-needs-verification',\n PrimaryAuthFactorVerified = 'Recency/auth-factor-verified',\n InvalidEmailOtp = 'Recency/auth-factor-invalid-email-otp',\n EmailExpired = 'Recency/auth-factor-verification-email-expired',\n EmailSent = 'Recency/auth-factor-verification-email-sent',\n EmailNotDeliverable = 'Recency/auth-factor-verification-email-not-deliverable',\n}\n\nexport enum UpdateEmailEventEmit {\n RetryWithNewEmail = 'UpdateEmail/retry-with-new-email',\n Cancel = 'UpdateEmail/new-email-verification-cancel',\n VerifyEmailOtp = 'UpdateEmail/new-email-verify-otp',\n}\n\nexport enum UpdateEmailEventOnReceived {\n NewAuthFactorNeedsVerification = 'UpdateEmail/new-email-needs-verification',\n EmailUpdated = 'UpdateEmail/email-updated',\n InvalidEmailOtp = 'UpdateEmail/new-email-invalid-email-otp',\n EmailExpired = 'UpdateEmail/new-email-verification-email-expired',\n EmailSent = 'UpdateEmail/new-email-verification-email-sent',\n EmailNotDeliverable = 'UpdateEmail/new-email-verification-email-not-deliverable',\n InvalidEmail = 'UpdateEmail/new-email-invalid',\n EmailAlreadyExists = 'UpdateEmail/new-email-already-exists',\n}\n\nexport enum AuthEventOnReceived {\n IDTokenCreated = 'Auth/id-token-created',\n}\n\nexport enum FarcasterLoginEventEmit {\n Cancel = 'Farcaster/cancel',\n}\n\nexport enum EnableMFAEventOnReceived {\n MFASecretGenerated = 'mfa-secret-generated',\n InvalidMFAOtp = 'invalid-mfa-otp',\n MFARecoveryCodes = 'mfa-recovery-codes',\n}\nexport enum EnableMFAEventEmit {\n VerifyMFACode = 'verify-mfa-code',\n Cancel = 'cancel-mfa-setup',\n}\n\nexport enum DisableMFAEventOnReceived {\n MFACodeRequested = 'mfa-code-requested',\n InvalidMFAOtp = 'invalid-mfa-otp',\n InvalidRecoveryCode = 'invalid-recovery-code',\n}\n\nexport enum DisableMFAEventEmit {\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n Cancel = 'cancel-mfa-disable',\n}\n\n/**\n * EventHandlers\n */\nexport type LoginWithMagicLinkEventHandlers = {\n // Event Received\n [LoginWithMagicLinkEventOnReceived.EmailSent]: () => void;\n [LoginWithMagicLinkEventOnReceived.EmailNotDeliverable]: () => void;\n\n // Event sent\n [LoginWithMagicLinkEventEmit.Retry]: () => void;\n} & DeviceVerificationEventHandlers;\n\nexport type LoginWithSmsOTPEventHandlers = {\n // Event sent\n [LoginWithSmsOTPEventEmit.VerifySmsOtp]: (otp: string) => void;\n [LoginWithSmsOTPEventEmit.VerifyMFACode]: (mfa: string) => void;\n [LoginWithSmsOTPEventEmit.LostDevice]: () => void;\n [LoginWithSmsOTPEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n [LoginWithSmsOTPEventEmit.Cancel]: () => void;\n [LoginWithSmsOTPEventEmit.Retry]: () => void;\n\n // Event received\n [LoginWithSmsOTPEventOnReceived.SmsOTPSent]: () => void;\n [LoginWithSmsOTPEventOnReceived.InvalidSmsOtp]: () => void;\n [LoginWithSmsOTPEventOnReceived.ExpiredSmsOtp]: () => void;\n [LoginWithSmsOTPEventOnReceived.MfaSentHandle]: () => void;\n [LoginWithSmsOTPEventOnReceived.InvalidMfaOtp]: () => void;\n [LoginWithSmsOTPEventOnReceived.LoginThrottled]: () => void;\n [LoginWithSmsOTPEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [LoginWithSmsOTPEventOnReceived.InvalidRecoveryCode]: () => void;\n [LoginWithSmsOTPEventOnReceived.RecoveryCodeSuccess]: () => void;\n} & DeviceVerificationEventHandlers;\n\nexport type LoginWithEmailOTPEventHandlers = {\n // Event Received\n [LoginWithEmailOTPEventOnReceived.EmailOTPSent]: () => void;\n [LoginWithEmailOTPEventOnReceived.LoginThrottled]: () => void;\n [LoginWithEmailOTPEventOnReceived.InvalidEmailOtp]: () => void;\n [LoginWithEmailOTPEventOnReceived.InvalidMfaOtp]: () => void;\n [LoginWithEmailOTPEventOnReceived.ExpiredEmailOtp]: () => void;\n [LoginWithEmailOTPEventOnReceived.MfaSentHandle]: () => void;\n [LoginWithEmailOTPEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [LoginWithEmailOTPEventOnReceived.InvalidRecoveryCode]: () => void;\n [LoginWithEmailOTPEventOnReceived.RecoveryCodeSuccess]: () => void;\n [LoginWithEmailOTPEventOnReceived.MaxAttemptsReached]: () => void;\n [AuthEventOnReceived.IDTokenCreated]: (idToken: string) => void;\n [WalletEventOnReceived.WalletInfoFetched]: () => void;\n\n // Event sent\n [LoginWithEmailOTPEventEmit.VerifyEmailOtp]: (otp: string) => void;\n [LoginWithEmailOTPEventEmit.VerifyMFACode]: (mfa: string) => void;\n [LoginWithEmailOTPEventEmit.LostDevice]: () => void;\n [LoginWithEmailOTPEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n [LoginWithEmailOTPEventEmit.Cancel]: () => void;\n} & DeviceVerificationEventHandlers;\n\ntype DeviceVerificationEventHandlers = {\n // Event Received\n [DeviceVerificationEventOnReceived.DeviceNeedsApproval]: () => void;\n [DeviceVerificationEventOnReceived.DeviceVerificationEmailSent]: () => void;\n [DeviceVerificationEventOnReceived.DeviceVerificationLinkExpired]: () => void;\n [DeviceVerificationEventOnReceived.DeviceApproved]: () => void;\n\n // Event sent\n [DeviceVerificationEventEmit.Retry]: () => void;\n};\n\n/**\n * Update Email\n */\n\nexport type RecencyCheckEventHandlers = {\n [RecencyCheckEventOnReceived.PrimaryAuthFactorNeedsVerification]: () => void;\n [RecencyCheckEventOnReceived.PrimaryAuthFactorVerified]: () => void;\n [RecencyCheckEventOnReceived.InvalidEmailOtp]: () => void;\n [RecencyCheckEventOnReceived.EmailNotDeliverable]: () => void;\n [RecencyCheckEventOnReceived.EmailExpired]: () => void;\n [RecencyCheckEventOnReceived.EmailSent]: () => void;\n\n [RecencyCheckEventEmit.Cancel]: () => void;\n [RecencyCheckEventEmit.Retry]: () => void;\n [RecencyCheckEventEmit.VerifyEmailOtp]: (otp: string) => void;\n [RecencyCheckEventEmit.VerifyMFACode]: (mfa: string) => void;\n};\n\nexport type UpdateEmailEventHandlers = {\n [UpdateEmailEventOnReceived.NewAuthFactorNeedsVerification]: () => void;\n [UpdateEmailEventOnReceived.EmailUpdated]: () => void;\n [UpdateEmailEventOnReceived.InvalidEmailOtp]: () => void;\n [UpdateEmailEventOnReceived.EmailNotDeliverable]: () => void;\n [UpdateEmailEventOnReceived.EmailExpired]: () => void;\n [UpdateEmailEventOnReceived.EmailSent]: () => void;\n [UpdateEmailEventOnReceived.InvalidEmail]: () => void;\n [UpdateEmailEventOnReceived.EmailAlreadyExists]: () => void;\n\n [UpdateEmailEventEmit.Cancel]: () => void;\n [UpdateEmailEventEmit.RetryWithNewEmail]: (email?: string) => void;\n [UpdateEmailEventEmit.VerifyEmailOtp]: (otp: string) => void;\n} & RecencyCheckEventHandlers;\n\n/**\n * Enable MFA\n */\n\nexport type EnableMFAEventHandlers = {\n // Event Received\n [EnableMFAEventOnReceived.MFASecretGenerated]: ({ QRCode, key }: { QRCode: string; key: string }) => void;\n [EnableMFAEventOnReceived.InvalidMFAOtp]: ({ errorCode }: { errorCode: string }) => void;\n [EnableMFAEventOnReceived.MFARecoveryCodes]: ({ recoveryCode }: { recoveryCode: string }) => void;\n\n // Event sent\n [EnableMFAEventEmit.VerifyMFACode]: (totp: string) => void;\n [EnableMFAEventEmit.Cancel]: () => void;\n};\n\n/**\n * Disable MFA\n */\n\nexport type DisableMFAEventHandlers = {\n // Event Received\n [DisableMFAEventOnReceived.MFACodeRequested]: () => void;\n [DisableMFAEventOnReceived.InvalidMFAOtp]: ({ errorCode }: { errorCode: string }) => void;\n [DisableMFAEventOnReceived.InvalidRecoveryCode]: () => void;\n\n // Event sent\n [DisableMFAEventEmit.VerifyMFACode]: (totp: string) => void;\n [DisableMFAEventEmit.LostDevice]: (recoveryCode: string) => void;\n [DisableMFAEventEmit.Cancel]: () => void;\n};\n", "export type EthNetworkName = 'mainnet' | 'goerli' | 'sepolia';\n\nexport enum EthChainType {\n Harmony = 'HARMONY',\n}\n\nexport interface CustomNodeConfiguration {\n rpcUrl: string;\n chainId?: number;\n chainType?: EthChainType;\n}\n\nexport type EthNetworkConfiguration = EthNetworkName | CustomNodeConfiguration;\n\nexport type ProviderEnableEvents = {\n 'id-token-created': (params: { idToken: string }) => void;\n};\n", "import { RecencyCheckEventHandlers } from './auth-types';\nimport { DeepLinkPage } from '../core/deep-link-pages';\n\nexport interface GetIdTokenConfiguration {\n /**\n * The number of seconds until the generated ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface GenerateIdTokenConfiguration extends GetIdTokenConfiguration {\n /**\n * An optional piece of data to sign with the token. Note, however, that the\n * unsigned data _will not_ be encoded in the token, only an encrypted\n * signature of the data.\n */\n attachment?: string;\n}\n\nexport enum UserEventsEmit {\n ClosedByUser = 'closed-by-user',\n}\n\nexport enum UserEventsOnReceived {\n ClosedByUser = 'closed-by-user-on-received',\n}\n\nexport interface ChainWalletInfo {\n publicAddress: string | null;\n subAccounts: Array<{ name: string; publicAddress: string }>;\n}\n\nexport interface MagicUserMetadata {\n issuer: string | null;\n email: string | null;\n phoneNumber: string | null;\n isMfaEnabled: boolean;\n recoveryFactors: [RecoveryFactor] | [];\n firstLoginAt: string | null;\n wallets: {\n ethereum?: ChainWalletInfo;\n algorand?: ChainWalletInfo;\n aptos?: ChainWalletInfo;\n avalancheX?: ChainWalletInfo;\n bitcoin?: ChainWalletInfo;\n conflux?: ChainWalletInfo;\n cosmos?: ChainWalletInfo;\n flow?: ChainWalletInfo;\n harmony?: ChainWalletInfo;\n hedera?: ChainWalletInfo;\n icon?: ChainWalletInfo;\n kadena?: ChainWalletInfo;\n near?: ChainWalletInfo;\n polkadot?: ChainWalletInfo;\n solana?: ChainWalletInfo;\n sui?: ChainWalletInfo;\n taquito?: ChainWalletInfo;\n terra?: ChainWalletInfo;\n tezos?: ChainWalletInfo;\n zilliqa?: ChainWalletInfo;\n [chain: string]: ChainWalletInfo | undefined;\n };\n}\n\nexport enum RecoveryFactorEventOnReceived {\n EnterNewPhoneNumber = 'enter-new-phone-number',\n EnterOtpCode = 'enter-otp-code',\n RecoveryFactorAlreadyExists = 'recovery-factor-already-exists',\n MalformedPhoneNumber = 'malformed-phone-number',\n InvalidOtpCode = 'invalid-otp-code',\n RecoveryFactorUpdated = 'recovery-factor-updated',\n RecoveryFactorDeleted = 'recovery-factor-deleted',\n}\n\nexport enum RecoveryFactorEventEmit {\n SendNewPhoneNumber = 'send-new-phone-number',\n SendOtpCode = 'send-otp-code',\n Cancel = 'cancel',\n StartEditPhoneNumber = 'start-edit-phone-number',\n}\n\ntype RecoveryFactor = {\n type: RecoveryMethodType;\n value: string;\n};\n\nexport type RecoveryFactorEventHandlers = {\n // Event Received\n [RecoveryFactorEventEmit.SendNewPhoneNumber]: (phone_number: string) => void;\n [RecoveryFactorEventEmit.SendOtpCode]: (otp: string) => void;\n [RecoveryFactorEventEmit.StartEditPhoneNumber]: () => void;\n [RecoveryFactorEventEmit.Cancel]: () => void;\n\n // Event sent\n [RecoveryFactorEventOnReceived.EnterNewPhoneNumber]: () => void;\n [RecoveryFactorEventOnReceived.EnterOtpCode]: () => void;\n [RecoveryFactorEventOnReceived.RecoveryFactorAlreadyExists]: () => void;\n [RecoveryFactorEventOnReceived.MalformedPhoneNumber]: () => void;\n [RecoveryFactorEventOnReceived.InvalidOtpCode]: () => void;\n [RecoveryFactorEventOnReceived.RecoveryFactorUpdated]: (updatedFactor: { type: string; value: string }) => void;\n [RecoveryFactorEventOnReceived.RecoveryFactorDeleted]: () => void;\n} & RecencyCheckEventHandlers;\n\nexport enum RecoveryMethodType {\n PhoneNumber = 'phone_number',\n}\n\nexport interface UpdateEmailConfiguration {\n /**\n * The new email address to update to\n */\n email: string;\n\n /**\n * When `true`, a pre-built pending modal interface will\n * guide the user to check their new, followed by old emails\n * for confirmation emails.\n */\n showUI?: boolean;\n}\n\nexport interface UpdateWebAuthnInfoConfiguration {\n /**\n * WebAuthn info id\n */\n id: string;\n\n /**\n * nickname that user attempts to update to the webauth device associate to the id.\n */\n nickname: string;\n}\n\nexport interface RecoverAccountConfiguration {\n /**\n * The email to recover\n */\n email: string;\n showUI: boolean;\n}\n\nexport interface ShowSettingsConfiguration {\n /**\n * deep linking destination\n */\n page: DeepLinkPage;\n showUI?: boolean;\n}\n\nexport enum RecoverAccountEventOnReceived {\n SmsOtpSent = 'sms-otp-sent',\n LoginThrottled = 'login-throttled',\n InvalidSmsOtp = 'invalid-sms-otp',\n SmsVerified = 'sms-verified',\n AccountRecovered = 'account-recovered',\n UpdateEmailRequired = 'update-email-required',\n}\n\nexport enum RecoverAccountEventEmit {\n Cancel = 'cancel',\n VerifyOtp = 'verify-otp-code',\n ResendSms = 'resend-sms-otp',\n UpdateEmail = 'update-email',\n}\n\nexport type RecoverAccountEventHandlers = {\n // Event Received\n [RecoverAccountEventEmit.Cancel]: () => void;\n [RecoverAccountEventEmit.VerifyOtp]: (otp: string) => void;\n [RecoverAccountEventEmit.ResendSms]: () => void;\n [RecoverAccountEventEmit.UpdateEmail]: (email: string) => void;\n\n // Event sent\n [RecoverAccountEventOnReceived.SmsOtpSent]: ({ phoneNumber }: { phoneNumber: string }) => void;\n [RecoverAccountEventOnReceived.LoginThrottled]: (error: string) => void;\n [RecoverAccountEventOnReceived.InvalidSmsOtp]: ({\n errorMessage,\n errorCode,\n }: {\n errorMessage: string;\n errorCode: string;\n }) => void;\n [RecoverAccountEventOnReceived.SmsVerified]: () => void;\n [RecoverAccountEventOnReceived.AccountRecovered]: () => void;\n [RecoverAccountEventOnReceived.UpdateEmailRequired]: () => void;\n};\n", "export type NFTResponseStatus = 'cancelled' | 'pending' | 'processed' | 'declined' | 'expired';\n\nexport type NFTResponse = {\n status: NFTResponseStatus;\n};\n\nexport interface NFTPurchaseRequest {\n nft: {\n name: string;\n imageUrl: string;\n blockchainNftId: string;\n contractAddress: string;\n network: string;\n platform: string;\n type: string;\n };\n identityPrefill: {\n firstName: string;\n lastName: string;\n dateOfBirth: string; // YYYY-MM-DD\n emailAddress: string;\n phone: string;\n address: {\n street1: string;\n street2: string;\n city: string;\n regionCode: string;\n postalCode: string;\n countryCode: string;\n };\n };\n}\n\nexport type NFTPurchaseResponse = NFTResponse & {\n errorMessage?: string;\n};\n\nexport interface NFTCheckoutRequest {\n // given by magic / found in the developer dashboard in future\n contractId: string;\n // in contract, if ERC1155\u2026 for ERC721, use token ID = 0\n tokenId: string;\n name: string;\n imageUrl: string;\n quantity?: number; // default is 1\n walletAddress?: string; // default is user's wallet address\n // If enabled, the user will be able to pay with crypto. the default is false\n isCryptoCheckoutEnabled?: boolean;\n walletProvider?: 'magic' | 'web3modal';\n}\n\nexport type NFTCheckoutResponse = NFTResponse;\n\nexport type NFTCheckoutEvents = {\n disconnect: () => void;\n 'nft-checkout-initiated': (rawTransaction: string) => void;\n};\n\nexport interface NFTTransferRequest {\n tokenId: string;\n contractAddress: string;\n quantity?: number;\n recipient?: string;\n}\n\nexport type NFTTransferResponse = NFTResponse;\n\nexport enum NftCheckoutIntermediaryEvents {\n Success = 'nft-checkout-success',\n Failure = 'nft-checkout-failure',\n Initiated = 'nft-checkout-initiated',\n Disconnect = 'disconnect',\n}\n\nexport type NftCheckoutEventHandler = {\n [NftCheckoutIntermediaryEvents.Initiated]: (rawTransaction: string) => void;\n [NftCheckoutIntermediaryEvents.Success]: (signedTransaction: string) => void;\n [NftCheckoutIntermediaryEvents.Failure]: () => void;\n};\n", "export type AccessListEntry = { address: string; storageKeys: Array<string> };\n\n/**\n * An ordered collection of [[AccessList]] entries.\n */\nexport type AccessList = Array<AccessListEntry>;\n\nexport enum WalletEventOnReceived {\n WalletInfoFetched = 'Wallet/wallet-info-fetched',\n}\n\n/**\n * Request parameters for EIP-7702 authorization signing\n */\nexport interface Sign7702AuthorizationRequest {\n /**\n * The smart contract implementation address the EOA delegates to\n */\n contractAddress: string;\n\n /**\n * The chain ID for the network (use 0 for universal cross-chain authorization)\n */\n chainId: number;\n\n /**\n * The nonce for the EOA account (transaction count)\n */\n nonce?: number;\n}\n\n/**\n * Response from EIP-7702 authorization signing\n */\nexport interface Sign7702AuthorizationResponse {\n /**\n * The contract address that was authorized\n */\n contractAddress: string;\n\n /**\n * The chain ID for the authorization\n */\n chainId: number;\n\n /**\n * The nonce used in the authorization\n */\n nonce: number;\n\n /**\n * The v component of the signature (recovery id)\n */\n v: number;\n\n /**\n * The r component of the signature\n */\n r: string;\n\n /**\n * The s component of the signature\n */\n s: string;\n\n /**\n * Optional: Full signature as hex string\n */\n signature?: string;\n}\n\n/**\n * Request parameters for sending an EIP-7702 transaction with authorization list\n */\nexport interface Send7702TransactionRequest {\n /**\n * The recipient address\n */\n to: string;\n\n /**\n * The value to send in wei (as hex string)\n */\n value?: string;\n\n /**\n * The transaction data (calldata)\n */\n data?: string;\n\n /**\n * Gas limit for the transaction (as hex string)\n */\n gas?: string;\n\n /**\n * Gas limit for the transaction (alias for gas)\n */\n gasLimit?: string;\n\n /**\n * Maximum fee per gas for EIP-1559 transactions (as hex string)\n */\n maxFeePerGas?: string;\n\n /**\n * Maximum priority fee per gas for EIP-1559 transactions (as hex string)\n */\n maxPriorityFeePerGas?: string;\n\n /**\n * Transaction nonce (if not provided, will be fetched from network)\n */\n nonce?: number;\n\n /**\n * The list of signed EIP-7702 authorizations to include in the transaction\n */\n authorizationList: Sign7702AuthorizationResponse[];\n}\n\n/**\n * Response from sending an EIP-7702 transaction\n */\nexport interface Send7702TransactionResponse {\n /**\n * The transaction hash\n */\n transactionHash: string;\n}", "export enum UiEventsEmit {\n CloseMagicWindow = 'close-magic-window',\n}\n", "// Shared MFA events reused by both popup and redirect flows\nexport enum OAuthMFAEventEmit {\n Cancel = 'cancel',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n}\n\nexport enum OAuthMFAEventOnReceived {\n MfaSentHandle = 'mfa-sent-handle',\n InvalidMfaOtp = 'invalid-mfa-otp',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n}\n\ntype OAuthMFAEventHandlers = {\n // Event sent\n [OAuthMFAEventEmit.Cancel]: () => void;\n [OAuthMFAEventEmit.VerifyMFACode]: (mfa: string) => void;\n [OAuthMFAEventEmit.LostDevice]: () => void;\n [OAuthMFAEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n // Event Received\n [OAuthMFAEventOnReceived.MfaSentHandle]: () => void;\n [OAuthMFAEventOnReceived.InvalidMfaOtp]: () => void;\n [OAuthMFAEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [OAuthMFAEventOnReceived.InvalidRecoveryCode]: () => void;\n [OAuthMFAEventOnReceived.RecoveryCodeSuccess]: () => void;\n};\n\n// Popup-specific events\nexport enum OAuthPopupEventOnReceived {\n PopupUrl = 'popup-url',\n}\n\nexport enum OAuthPopupEventEmit {\n PopupEvent = 'popup-event',\n}\n\nexport type OAuthPopupEventHandlers = {\n [OAuthPopupEventEmit.PopupEvent]: (eventData: unknown) => void;\n [OAuthPopupEventOnReceived.PopupUrl]: (event: { popupUrl: string; provider: string }) => void;\n} & OAuthMFAEventHandlers;\n\n// Redirect-specific handler type\nexport type OAuthGetResultEventHandlers = OAuthMFAEventHandlers;\n", "export interface PasskeyResult {\n // null if skipDIDToken is true\n idToken: string | null;\n\n // Info of the device used to authenticate\n deviceInfo: {\n id: string;\n nickname: string;\n transport: string;\n userAgent: string;\n };\n}\n\nexport enum PasskeyMFAEventEmit {\n Cancel = 'cancel',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n}\nexport enum PasskeyMFAEventOnReceived {\n MfaSentHandle = 'mfa-sent-handle',\n InvalidMfaOtp = 'invalid-mfa-otp',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n}\n\nexport type PasskeyEventHandlers = {\n // Event sent\n [PasskeyMFAEventEmit.Cancel]: () => void;\n [PasskeyMFAEventEmit.VerifyMFACode]: (mfa: string) => void;\n [PasskeyMFAEventEmit.LostDevice]: () => void;\n [PasskeyMFAEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n // Event Received\n [PasskeyMFAEventOnReceived.MfaSentHandle]: () => void;\n [PasskeyMFAEventOnReceived.InvalidMfaOtp]: () => void;\n [PasskeyMFAEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [PasskeyMFAEventOnReceived.InvalidRecoveryCode]: () => void;\n [PasskeyMFAEventOnReceived.RecoveryCodeSuccess]: () => void;\n};\n", "/**\n * Encode given buffer or decode given string with Base64URL.\n */\nexport class Base64URL {\n /**\n * Convert bytes into a base64url-encoded string\n */\n static encode(buffer: ArrayBuffer): string {\n const base64 = globalThis.btoa(String.fromCharCode(...new Uint8Array(buffer)));\n\n return base64.replace(/=/g, '').replace(/\\+/g, '-').replace(/\\//g, '_');\n }\n\n /**\n * Convert a base64url-encoded string into bytes\n */\n static decode(base64url: string): ArrayBuffer {\n const base64 = base64url.replace(/-/g, '+').replace(/_/g, '/');\n const binStr = globalThis.atob(base64);\n const bin = new Uint8Array(binStr.length);\n\n for (let i = 0; i < binStr.length; i++) {\n bin[i] = binStr.charCodeAt(i);\n }\n\n return bin.buffer;\n }\n}\n", "import { Base64URL } from './base64';\n\nfunction isAuthenticatorAssertionResponse(value: AuthenticatorResponse): value is AuthenticatorAssertionResponse {\n if (typeof value !== 'object') {\n return false;\n }\n if (\n (value as AuthenticatorAssertionResponse)?.authenticatorData === undefined ||\n typeof (value as AuthenticatorAssertionResponse)?.authenticatorData !== 'object'\n ) {\n return false;\n }\n return true;\n}\n\nfunction isAuthenticatorAttestationResponse(value: AuthenticatorResponse): value is AuthenticatorAttestationResponse {\n if (typeof value !== 'object') {\n return false;\n }\n if (\n (value as AuthenticatorAttestationResponse)?.attestationObject === undefined ||\n typeof (value as AuthenticatorAttestationResponse)?.attestationObject !== 'object'\n ) {\n return false;\n }\n return true;\n}\n\n/**\n * Polyfill `PublicKeyCredential.prototype.toJSON`\n *\n * See https://w3c.github.io/webauthn/#dom-publickeycredential-tojson\n */\nexport function toJSON(cred: PublicKeyCredential): PublicKeyCredentialJSON {\n // Prefer native implementation if available\n if (typeof cred.toJSON === 'function') {\n return cred.toJSON();\n }\n\n try {\n const id = cred.id;\n const rawId = Base64URL.encode(cred.rawId);\n const authenticatorAttachment = cred.authenticatorAttachment;\n const clientExtensionResults = {};\n const type = cred.type;\n\n // This is authentication.\n if (isAuthenticatorAssertionResponse(cred.response)) {\n return {\n id,\n rawId,\n response: {\n authenticatorData: Base64URL.encode(cred.response.authenticatorData),\n clientDataJSON: Base64URL.encode(cred.response.clientDataJSON),\n signature: Base64URL.encode(cred.response.signature),\n userHandle: cred.response.userHandle ? Base64URL.encode(cred.response.userHandle) : undefined,\n },\n authenticatorAttachment,\n clientExtensionResults,\n type,\n };\n }\n\n if (isAuthenticatorAttestationResponse(cred.response)) {\n // This is registration.\n return {\n id,\n rawId,\n response: {\n clientDataJSON: Base64URL.encode(cred.response.clientDataJSON),\n attestationObject: Base64URL.encode(cred.response.attestationObject),\n transports: cred.response?.getTransports() || [],\n },\n authenticatorAttachment,\n clientExtensionResults,\n type,\n };\n }\n\n throw new Error('Unexpected object.');\n } catch (error) {\n console.error(error);\n throw error;\n }\n}\n"],
5
- "mappings": "AAAA,OAAS,aAAAA,OAAiB,sBCAnB,IAAKC,GAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,eAAiB,sBACjBA,EAAA,kBAAoB,qBACpBA,EAAA,gBAAkB,mBAClBA,EAAA,wBAA0B,4BAC1BA,EAAA,uBAAyB,0BAPfA,IAAAA,GAAA,CAAA,CAAA,EAUAC,GAAAA,IACVA,EAAA,eAAiB,mBACjBA,EAAA,gBAAkB,mBAClBA,EAAA,iCAAmC,sCACnCA,EAAA,kBAAoB,qBACpBA,EAAA,oBAAsB,eALZA,IAAAA,GAAA,CAAA,CAAA,EAQAC,GAAAA,IAEVA,EAAAA,EAAA,WAAa,MAAA,EAAb,aACAA,EAAAA,EAAA,eAAiB,MAAA,EAAjB,iBACAA,EAAAA,EAAA,eAAiB,MAAA,EAAjB,iBACAA,EAAAA,EAAA,cAAgB,MAAA,EAAhB,gBACAA,EAAAA,EAAA,cAAgB,MAAA,EAAhB,gBAGAA,EAAAA,EAAA,4BAA8B,IAAA,EAA9B,8BACAA,EAAAA,EAAA,iBAAmB,MAAA,EAAnB,mBACAA,EAAAA,EAAA,qBAAuB,MAAA,EAAvB,uBACAA,EAAAA,EAAA,oBAAsB,MAAA,EAAtB,sBACAA,EAAAA,EAAA,kBAAoB,MAAA,EAApB,oBACAA,EAAAA,EAAA,qBAAuB,MAAA,EAAvB,uBACAA,EAAAA,EAAA,4BAA8B,MAAA,EAA9B,8BACAA,EAAAA,EAAA,kBAAoB,MAAA,EAApB,oBACAA,EAAAA,EAAA,mBAAqB,MAAA,EAArB,qBACAA,EAAAA,EAAA,mBAAqB,MAAA,EAArB,qBACAA,EAAAA,EAAA,iBAAmB,MAAA,EAAnB,mBACAA,EAAAA,EAAA,sBAAwB,MAAA,EAAxB,wBACAA,EAAAA,EAAA,kBAAoB,MAAA,EAApB,oBACAA,EAAAA,EAAA,sBAAwB,MAAA,EAAxB,wBACAA,EAAAA,EAAA,SAAW,MAAA,EAAX,WACAA,EAAAA,EAAA,gBAAkB,MAAA,EAAlB,kBACAA,EAAAA,EAAA,mBAAqB,MAAA,EAArB,qBACAA,EAAAA,EAAA,gBAAkB,MAAA,EAAlB,kBA1BUA,IAAAA,GAAA,CAAA,CAAA,ECgCAC,GAAAA,IACVA,EAAA,SAAW,qBACXA,EAAA,QAAU,oBACVA,EAAA,SAAW,oBAHDA,IAAAA,GAAA,CAAA,CAAA,EAMAC,GAAAA,IACVA,EAAA,gBAAkB,mBAClBA,EAAA,eAAiB,kBACjBA,EAAA,kBAAoB,qBAHVA,IAAAA,GAAA,CAAA,CAAA,EAoBAC,GAAAA,IACVA,EAAA,aAAe,4BACfA,EAAA,kBAAoB,kCACpBA,EAAA,mBAAqB,mCACrBA,EAAA,oBAAsB,mCACtBA,EAAA,sBAAwB,qCACxBA,EAAA,WAAa,0BACbA,EAAA,gBAAkB,+BAClBA,EAAA,YAAc,0BACdA,EAAA,WAAa,qBACbA,EAAA,OAAS,oBACTA,EAAA,YAAc,0BACdA,EAAA,aAAe,sBACfA,EAAA,qBAAuB,mCACvBA,EAAA,qBAAuB,yCACvBA,EAAA,0BAA4B,+CAC5BA,EAAA,2BAA6B,2CAC7BA,EAAA,4BAA8B,gDAC9BA,EAAA,mBAAqB,uCACrBA,EAAA,wBAA0B,4CAC1BA,EAAA,oBAAsB,uCACtBA,EAAA,mBAAqB,uCACrBA,EAAA,eAAiB,iCACjBA,EAAA,oBAAsB,uCACtBA,EAAA,kBAAoB,2BACpBA,EAAA,gBAAkB,sBAClBA,EAAA,QAAU,iBACVA,EAAA,OAAS,eACTA,EAAA,YAAc,qBACdA,EAAA,YAAc,qBACdA,EAAA,YAAc,qBACdA,EAAA,sBAAwB,uBACxBA,EAAA,WAAa,gBAGbA,EAAA,eAAiB,6BACjBA,EAAA,uBAAyB,0CACzBA,EAAA,kBAAoB,uBACpBA,EAAA,YAAc,kBACdA,EAAA,MAAQ,WACRA,EAAA,UAAY,wBACZA,EAAA,UAAY,wBACZA,EAAA,SAAW,kBACXA,EAAA,WAAa,yBACbA,EAAA,iBAAmB,4BACnBA,EAAA,YAAc,qBACdA,EAAA,aAAe,sBACfA,EAAA,SAAW,mBACXA,EAAA,UAAY,6BACZA,EAAA,WAAa,8BACbA,EAAA,2BAA6B,sCAC7BA,EAAA,sBAAwB,uCACxBA,EAAA,oBAAsB,0BApDZA,IAAAA,GAAA,CAAA,CAAA,EC1EL,IAAKC,GAAAA,IACVA,EAAA,sBAAwB,wBACxBA,EAAA,oBAAsB,sBACtBA,EAAA,mBAAqB,qBACrBA,EAAA,mBAAqB,qBACrBA,EAAA,mBAAqB,qBACrBA,EAAA,0BAA4B,4BAC5BA,EAAA,gCAAkC,kCAClCA,EAAA,WAAa,aACbA,EAAA,qBAAuB,uBACvBA,EAAA,kCAAoC,oCACpCA,EAAA,iCAAmC,mCACnCA,EAAA,sBAAwB,wBAZdA,IAAAA,GAAA,CAAA,CAAA,EAeAC,GAAAA,IACVA,EAAA,qBAAuB,uBACvBA,EAAA,kCAAoC,oCACpCA,EAAA,gCAAkC,iCAClCA,EAAA,WAAa,aAJHA,IAAAA,GAAA,CAAA,CAAA,ECjBAC,GAAAA,IACVA,EAAA,YAAc,eACdA,EAAA,IAAM,MACNA,EAAA,SAAW,WAHDA,IAAAA,GAAA,CAAA,CAAA,EC8IAC,GAAAA,IACVA,EAAA,MAAQ,QADEA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,UAAY,aACZA,EAAA,oBAAsB,wBAFZA,IAAAA,GAAA,CAAA,CAAA,EAKAC,GAAAA,IACVA,EAAA,eAAiB,mBACjBA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBACrBA,EAAA,OAAS,SALCA,IAAAA,GAAA,CAAA,CAAA,EAQAC,GAAAA,IACVA,EAAA,aAAe,iBACfA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBACrBA,EAAA,OAAS,SACTA,EAAA,MAAQ,QANEA,IAAAA,GAAA,CAAA,CAAA,EASAC,GAAAA,IACVA,EAAA,WAAa,eACbA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,eAAiB,kBACjBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBATZA,IAAAA,GAAA,CAAA,CAAA,EAYAC,GAAAA,IACVA,EAAA,aAAe,iBACfA,EAAA,gBAAkB,oBAClBA,EAAA,cAAgB,kBAChBA,EAAA,gBAAkB,oBAClBA,EAAA,cAAgB,kBAChBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBACtBA,EAAA,eAAiB,kBACjBA,EAAA,mBAAqB,uBAVXA,IAAAA,GAAA,CAAA,CAAA,EAaAC,GAAAA,IACVA,EAAA,MAAQ,eADEA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,eAAiB,kBACjBA,EAAA,oBAAsB,wBACtBA,EAAA,8BAAgC,mCAChCA,EAAA,4BAA8B,iCAJpBA,IAAAA,GAAA,CAAA,CAAA,EAOAC,GAAAA,IACVA,EAAA,MAAQ,4BACRA,EAAA,OAAS,0CACTA,EAAA,eAAiB,uCACjBA,EAAA,cAAgB,0BAJNA,IAAAA,GAAA,CAAA,CAAA,EAOAC,GAAAA,IACVA,EAAA,mCAAqC,yCACrCA,EAAA,0BAA4B,+BAC5BA,EAAA,gBAAkB,wCAClBA,EAAA,aAAe,iDACfA,EAAA,UAAY,8CACZA,EAAA,oBAAsB,yDANZA,IAAAA,GAAA,CAAA,CAAA,EASAC,GAAAA,IACVA,EAAA,kBAAoB,mCACpBA,EAAA,OAAS,4CACTA,EAAA,eAAiB,mCAHPA,IAAAA,GAAA,CAAA,CAAA,EAMAC,GAAAA,IACVA,EAAA,+BAAiC,2CACjCA,EAAA,aAAe,4BACfA,EAAA,gBAAkB,0CAClBA,EAAA,aAAe,mDACfA,EAAA,UAAY,gDACZA,EAAA,oBAAsB,2DACtBA,EAAA,aAAe,gCACfA,EAAA,mBAAqB,uCARXA,IAAAA,GAAA,CAAA,CAAA,EAWAC,GAAAA,IACVA,EAAA,eAAiB,wBADPA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,OAAS,mBADCA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,mBAAqB,uBACrBA,EAAA,cAAgB,kBAChBA,EAAA,iBAAmB,qBAHTA,IAAAA,GAAA,CAAA,CAAA,EAKAC,GAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,OAAS,mBAFCA,IAAAA,GAAA,CAAA,CAAA,EAKAC,GAAAA,IACVA,EAAA,iBAAmB,qBACnBA,EAAA,cAAgB,kBAChBA,EAAA,oBAAsB,wBAHZA,IAAAA,GAAA,CAAA,CAAA,EAMAC,GAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,OAAS,qBAHCA,IAAAA,GAAA,CAAA,CAAA,ECnQAC,GAAAA,IACVA,EAAA,QAAU,UADAA,IAAAA,GAAA,CAAA,CAAA,ECiBAC,GAAAA,IACVA,EAAA,aAAe,iBADLA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,aAAe,6BADLA,IAAAA,GAAA,CAAA,CAAA,EAyCAC,GAAAA,IACVA,EAAA,oBAAsB,yBACtBA,EAAA,aAAe,iBACfA,EAAA,4BAA8B,iCAC9BA,EAAA,qBAAuB,yBACvBA,EAAA,eAAiB,mBACjBA,EAAA,sBAAwB,0BACxBA,EAAA,sBAAwB,0BAPdA,IAAAA,GAAA,CAAA,CAAA,EAUAC,GAAAA,IACVA,EAAA,mBAAqB,wBACrBA,EAAA,YAAc,gBACdA,EAAA,OAAS,SACTA,EAAA,qBAAuB,0BAJbA,IAAAA,GAAA,CAAA,CAAA,EA6BAC,GAAAA,IACVA,EAAA,YAAc,eADJA,IAAAA,GAAA,CAAA,CAAA,EA8CAC,IAAAA,IACVA,EAAA,WAAa,eACbA,EAAA,eAAiB,kBACjBA,EAAA,cAAgB,kBAChBA,EAAA,YAAc,eACdA,EAAA,iBAAmB,oBACnBA,EAAA,oBAAsB,wBANZA,IAAAA,IAAA,CAAA,CAAA,EASAC,IAAAA,IACVA,EAAA,OAAS,SACTA,EAAA,UAAY,kBACZA,EAAA,UAAY,iBACZA,EAAA,YAAc,eAJJA,IAAAA,IAAA,CAAA,CAAA,EC3FAC,IAAAA,IACVA,EAAA,QAAU,uBACVA,EAAA,QAAU,uBACVA,EAAA,UAAY,yBACZA,EAAA,WAAa,aAJHA,IAAAA,IAAA,CAAA,CAAA,EC5DAC,IAAAA,IACVA,EAAA,kBAAoB,6BADVA,IAAAA,IAAA,CAAA,CAAA,ECPAC,IAAAA,IACVA,EAAA,iBAAmB,qBADTA,IAAAA,IAAA,CAAA,CAAA,ECCAC,IAAAA,IACVA,EAAA,OAAS,SACTA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBAJXA,IAAAA,IAAA,CAAA,CAAA,EAOAC,IAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBALZA,IAAAA,IAAA,CAAA,CAAA,EAuBAC,IAAAA,IACVA,EAAA,SAAW,YADDA,IAAAA,IAAA,CAAA,CAAA,EAIAC,IAAAA,IACVA,EAAA,WAAa,cADHA,IAAAA,IAAA,CAAA,CAAA,ECtBAC,GAAAA,IACVA,EAAA,OAAS,SACTA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBAJXA,IAAAA,GAAA,CAAA,CAAA,EAMAC,GAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBALZA,IAAAA,GAAA,CAAA,CAAA,EChBL,IAAMC,EAAN,KAAgB,CAIrB,OAAO,OAAOC,EAA6B,CAGzC,OAFe,WAAW,KAAK,OAAO,aAAa,GAAG,IAAI,WAAWA,CAAM,CAAC,CAAC,EAE/D,QAAQ,KAAM,EAAE,EAAE,QAAQ,MAAO,GAAG,EAAE,QAAQ,MAAO,GAAG,CACxE,CAKA,OAAO,OAAOC,EAAgC,CAC5C,IAAMC,EAASD,EAAU,QAAQ,KAAM,GAAG,EAAE,QAAQ,KAAM,GAAG,EACvDE,EAAS,WAAW,KAAKD,CAAM,EAC/BE,EAAM,IAAI,WAAWD,EAAO,MAAM,EAExC,QAASE,EAAI,EAAGA,EAAIF,EAAO,OAAQE,IACjCD,EAAIC,CAAC,EAAIF,EAAO,WAAWE,CAAC,EAG9B,OAAOD,EAAI,MACb,CACF,ECzBA,SAASE,GAAiCC,EAAuE,CAI/G,MAHI,SAAOA,GAAU,UAIlBA,GAA0C,oBAAsB,QACjE,OAAQA,GAA0C,mBAAsB,SAK5E,CAEA,SAASC,GAAmCD,EAAyE,CAInH,MAHI,SAAOA,GAAU,UAIlBA,GAA4C,oBAAsB,QACnE,OAAQA,GAA4C,mBAAsB,SAK9E,CAOO,SAASE,EAAOC,EAAoD,CAEzE,GAAI,OAAOA,EAAK,QAAW,WACzB,OAAOA,EAAK,OAAO,EAGrB,GAAI,CACF,IAAMC,EAAKD,EAAK,GACVE,EAAQC,EAAU,OAAOH,EAAK,KAAK,EACnCI,EAA0BJ,EAAK,wBAC/BK,EAAyB,CAAC,EAC1BC,EAAON,EAAK,KAGlB,GAAIJ,GAAiCI,EAAK,QAAQ,EAChD,MAAO,CACL,GAAAC,EACA,MAAAC,EACA,SAAU,CACR,kBAAmBC,EAAU,OAAOH,EAAK,SAAS,iBAAiB,EACnE,eAAgBG,EAAU,OAAOH,EAAK,SAAS,cAAc,EAC7D,UAAWG,EAAU,OAAOH,EAAK,SAAS,SAAS,EACnD,WAAYA,EAAK,SAAS,WAAaG,EAAU,OAAOH,EAAK,SAAS,UAAU,EAAI,MACtF,EACA,wBAAAI,EACA,uBAAAC,EACA,KAAAC,CACF,EAGF,GAAIR,GAAmCE,EAAK,QAAQ,EAElD,MAAO,CACL,GAAAC,EACA,MAAAC,EACA,SAAU,CACR,eAAgBC,EAAU,OAAOH,EAAK,SAAS,cAAc,EAC7D,kBAAmBG,EAAU,OAAOH,EAAK,SAAS,iBAAiB,EACnE,WAAYA,EAAK,UAAU,cAAc,GAAK,CAAC,CACjD,EACA,wBAAAI,EACA,uBAAAC,EACA,KAAAC,CACF,EAGF,MAAM,IAAI,MAAM,oBAAoB,CACtC,OAASC,EAAO,CACd,cAAQ,MAAMA,CAAK,EACbA,CACR,CACF,CdzEO,IAAMC,EAAN,cAAgCC,GAAU,QAA0B,CACzE,KAAO,WACP,OAAc,CAAC,EAEP,+BAAgC,CACtC,KAAK,qCAAuD,4CAA6C,CAAC,CAAC,CAC7G,CAEQ,mCAAmCC,EAAiB,CAC1D,KAAK,+CAAgE,8BAA8BA,CAAO,GAAI,CAAC,CAAC,CAClH,CAEA,MAAa,gBAAgBC,EAA8C,CACzE,GAAI,CAAC,OAAO,oBACV,MAAM,KAAK,8BAA8B,EAE3C,GAAM,CAAE,SAAAC,EAAU,SAAAC,EAAW,GAAI,aAAAC,EAAc,SAAAC,CAAS,EAAIJ,GAAiB,CAAC,EAExE,CAAE,oBAAAK,EAAqB,kBAAAC,CAAkB,EAAI,MAAM,KAAK,QAC5D,KAAK,MAAM,gEAA6E,CAAC,CAAE,SAAAL,CAAS,CAAC,CAAC,CACxG,EAEIM,EACJ,GAAI,CACFA,EAAc,MAAM,UAAU,YAAY,OAAO,CAC/C,UAAWF,CACb,CAAC,CACH,OAASG,EAAU,CACjB,MAAM,KAAK,mCAAmCA,CAAG,CACnD,CAEA,OAAO,KAAK,QACV,KAAK,MAAM,iEAA8E,CACvF,CACE,kBAAAF,EACA,qBAAsBG,EAAOF,CAAU,EACvC,SAAAL,EACA,UAAWK,EAAW,SAAS,cAAc,EAC7C,UAAW,UAAU,UACrB,aAAAJ,EACA,SAAAC,CACF,CACF,CAAC,CACH,CACF,CAEO,MAAMJ,EAAgD,CAC3D,GAAM,CAAE,SAAAC,EAAU,aAAAS,EAAc,aAAAP,EAAc,SAAAC,CAAS,EAAIJ,GAAiB,CAAC,EAEzEW,EAEEC,EAAa,KAAK,MAAM,iBAAsD,MAAOC,EAASC,IAAW,CAC7G,GAAI,CAAC,OAAO,oBACV,OAAOA,EAAO,KAAK,8BAA8B,CAAC,EAGpD,GAAM,CAAE,oBAAAC,EAAqB,sBAAAC,CAAsB,EAAI,MAAM,KAAK,QAChE,KAAK,MAAM,kEAA8E,CAAC,CAAE,SAAAf,CAAS,CAAC,CAAC,CACzG,EAEIgB,EACJ,GAAI,CACFA,EAAa,MAAM,UAAU,YAAY,IAAI,CAC3C,UAAWD,CACb,CAAC,CACH,OAASR,EAAU,CACjB,OAAOM,EAAO,KAAK,mCAAmCN,CAAG,CAAC,CAC5D,CAEA,IAAMU,EAAiB,KAAK,MAAM,mEAA+E,CAC/G,CACE,oBAAAH,EACA,kBAAmBN,EAAOQ,CAAS,EACnC,OAAQP,EACR,aAAAP,EACA,SAAAC,CACF,CACF,CAAC,EAEDO,EAAkBO,EAAe,GAEjC,IAAMC,EAAe,KAAK,QAA6CD,CAAc,EAEhFR,IACHS,EAAa,GAAGC,EAA0B,cAAe,IAAM,CAC7DR,EAAW,KAAKQ,EAA0B,aAAa,CACzD,CAAC,EACDD,EAAa,GAAGC,EAA0B,cAAe,IAAM,CAC7DR,EAAW,KAAKQ,EAA0B,aAAa,CACzD,CAAC,EACDD,EAAa,GAAGC,EAA0B,uBAAwB,IAAM,CACtER,EAAW,KAAKQ,EAA0B,sBAAsB,CAClE,CAAC,EACDD,EAAa,GAAGC,EAA0B,oBAAqB,IAAM,CACnER,EAAW,KAAKQ,EAA0B,mBAAmB,CAC/D,CAAC,EACDD,EAAa,GAAGC,EAA0B,oBAAqB,IAAM,CACnER,EAAW,KAAKQ,EAA0B,mBAAmB,CAC/D,CAAC,GAGH,GAAI,CACF,IAAMC,EAAS,MAAMF,EACrBN,EAAQQ,CAAM,CAChB,OAASC,EAAO,CACdR,EAAOQ,CAAK,CACd,CACF,CAAC,EAED,MAAI,CAACZ,GAAgBE,IACnBA,EAAW,GAAGW,EAAoB,cAAgBC,GAAgB,CAChE,KAAK,wBAAwBD,EAAoB,cAAeZ,CAAe,EAAEa,CAAG,CACtF,CAAC,EACDZ,EAAW,GAAGW,EAAoB,WAAY,IAAM,CAClD,KAAK,wBAAwBA,EAAoB,WAAYZ,CAAe,EAAE,CAChF,CAAC,EACDC,EAAW,GAAGW,EAAoB,mBAAqBE,GAAyB,CAC9E,KAAK,wBAAwBF,EAAoB,mBAAoBZ,CAAe,EAAEc,CAAY,CACpG,CAAC,EACDb,EAAW,GAAGW,EAAoB,OAAQ,IAAM,CAC9C,KAAK,wBAAwBA,EAAoB,OAAQZ,CAAe,EAAE,CAC5E,CAAC,GAGIC,CACT,CAEO,WAAWZ,EAAgD,CAChE,GAAM,CAAE,GAAA0B,EAAI,SAAAxB,CAAS,EAAIF,EACnBkB,EAAiB,KAAK,MAAM,yDAA2E,CAC3G,CACE,sBAAuBQ,EACvB,SAAAxB,CACF,CACF,CAAC,EACD,OAAO,KAAK,QAAegB,CAAc,CAC3C,CAEO,iBAAiBQ,EAAY,CAClC,IAAMR,EAAiB,KAAK,MAAM,6DAAgF,CAChH,CACE,sBAAuBQ,CACzB,CACF,CAAC,EAED,OAAO,KAAK,QAAaR,CAAc,CACzC,CAEA,MAAa,kBAAkBhB,EAAW,GAAI,CAC5C,GAAI,CAAC,OAAO,oBACV,MAAM,KAAK,8BAA8B,EAE3C,IAAMyB,EAAU,MAAM,KAAK,QACzB,KAAK,MAAM,wEAAmF,CAAC,CAAC,CAClG,EAEIpB,EACJ,GAAI,CACFA,EAAc,MAAM,UAAU,YAAY,OAAO,CAC/C,UAAWoB,EAAQ,kBACrB,CAAC,CACH,OAASnB,EAAU,CACjB,MAAM,KAAK,mCAAmCA,CAAG,CACnD,CAEA,OAAO,KAAK,QACV,KAAK,MAAM,kEAA8E,CACvF,CACE,SAAAN,EACA,UAAWK,EAAW,SAAS,cAAc,EAC7C,WAAY,UAAU,UACtB,sBAAuBE,EAAOF,CAAU,CAC1C,CACF,CAAC,CACH,CACF,CAEO,aAAc,CACnB,IAAMW,EAAiB,KAAK,MAAM,kEAAwE,CAAC,CAAC,EAC5G,OAAO,KAAK,QAAeA,CAAc,CAC3C,CACF",
4
+ "sourcesContent": ["import { Extension } from '@magic-sdk/provider';\nimport {\n RegisterNewUserConfiguration,\n LoginWithWebAuthnConfiguration,\n MagicWebAuthnPayloadMethod,\n WebAuthnSDKErrorCode,\n UpdateWebAuthnInfoConfiguration,\n} from './types';\nimport { PasskeyResult, PasskeyEventHandlers, PasskeyMFAEventEmit, PasskeyMFAEventOnReceived } from '@magic-sdk/types';\nimport { toJSON } from './utils/polyfills';\n\nexport class WebAuthnExtension extends Extension.Internal<'webauthn', any> {\n name = 'webauthn' as const;\n config: any = {};\n\n private createWebAuthnNotSupportError() {\n this.createError(WebAuthnSDKErrorCode.WebAuthnNotSupported, 'WebAuthn is not supported in this device.', {});\n }\n\n private createWebAuthCreateCredentialError(message: string) {\n this.createError(WebAuthnSDKErrorCode.WebAuthnCreateCredentialError, `Error creating credential: ${message}`, {});\n }\n\n public async registerNewUser(configuration?: RegisterNewUserConfiguration) {\n if (!window.PublicKeyCredential) {\n throw this.createWebAuthnNotSupportError();\n }\n const { username, nickname = '', skipDIDToken, lifespan } = configuration ?? {};\n\n const { registrationOptions, registrationToken } = await this.request<any>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterPasskeyStart, [{ username }]),\n );\n\n let credential;\n try {\n credential = (await navigator.credentials.create({\n publicKey: registrationOptions,\n })) as any;\n } catch (err: any) {\n throw this.createWebAuthCreateCredentialError(err);\n }\n\n return this.request<string | null>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterPasskeyVerify, [\n {\n registrationToken,\n registrationResponse: toJSON(credential),\n nickname,\n transport: credential.response.getTransports(),\n userAgent: navigator.userAgent,\n skipDIDToken,\n lifespan,\n },\n ]),\n );\n }\n\n public login(configuration?: LoginWithWebAuthnConfiguration) {\n const { username, showMfaModal, skipDIDToken, lifespan } = configuration ?? {};\n\n let verifyPayloadId: string;\n\n const promiEvent = this.utils.createPromiEvent<PasskeyResult, PasskeyEventHandlers>(async (resolve, reject) => {\n if (!window.PublicKeyCredential) {\n return reject(this.createWebAuthnNotSupportError());\n }\n\n const { authenticationToken, authenticationOptions } = await this.request<any>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.LoginWithPasskeyStart, [{ username }]),\n );\n\n let assertion;\n try {\n assertion = (await navigator.credentials.get({\n publicKey: authenticationOptions,\n })) as any;\n } catch (err: any) {\n return reject(this.createWebAuthCreateCredentialError(err));\n }\n\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.LoginWithPasskeyVerify, [\n {\n authenticationToken,\n assertionResponse: toJSON(assertion),\n showUI: showMfaModal,\n skipDIDToken,\n lifespan,\n },\n ]);\n\n verifyPayloadId = requestPayload.id as string;\n\n const loginRequest = this.request<PasskeyResult, PasskeyEventHandlers>(requestPayload);\n\n if (!showMfaModal) {\n loginRequest.on(PasskeyMFAEventOnReceived.MfaSentHandle, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.MfaSentHandle);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.InvalidMfaOtp, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.InvalidMfaOtp);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.RecoveryCodeSentHandle, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.RecoveryCodeSentHandle);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.InvalidRecoveryCode, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.InvalidRecoveryCode);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.RecoveryCodeSuccess, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.RecoveryCodeSuccess);\n });\n }\n\n try {\n const result = await loginRequest;\n resolve(result);\n } catch (error) {\n reject(error);\n }\n });\n\n if (!showMfaModal && promiEvent) {\n promiEvent.on(PasskeyMFAEventEmit.VerifyMFACode, (mfa: string) => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.VerifyMFACode, verifyPayloadId)(mfa);\n });\n promiEvent.on(PasskeyMFAEventEmit.LostDevice, () => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.LostDevice, verifyPayloadId)();\n });\n promiEvent.on(PasskeyMFAEventEmit.VerifyRecoveryCode, (recoveryCode: string) => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.VerifyRecoveryCode, verifyPayloadId)(recoveryCode);\n });\n promiEvent.on(PasskeyMFAEventEmit.Cancel, () => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.Cancel, verifyPayloadId)();\n });\n }\n\n return promiEvent;\n }\n\n public updateInfo(configuration: UpdateWebAuthnInfoConfiguration) {\n const { id, nickname } = configuration;\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.UpdateWebAuthnInfo, [\n {\n webAuthnCredentialsId: id,\n nickname,\n },\n ]);\n return this.request<any[]>(requestPayload);\n }\n\n public unregisterDevice(id: string) {\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.UnregisterWebAuthDevice, [\n {\n webAuthnCredentialsId: id,\n },\n ]);\n\n return this.request<any>(requestPayload);\n }\n\n public async registerNewDevice(nickname = '') {\n if (!window.PublicKeyCredential) {\n throw this.createWebAuthnNotSupportError();\n }\n const options = await this.request<any>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterWebAuthDeviceStart, []),\n );\n\n let credential;\n try {\n credential = (await navigator.credentials.create({\n publicKey: options.credential_options,\n })) as any;\n } catch (err: any) {\n throw this.createWebAuthCreateCredentialError(err);\n }\n\n return this.request<string | null>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterWebAuthDevice, [\n {\n nickname,\n transport: credential.response.getTransports(),\n user_agent: navigator.userAgent,\n registration_response: toJSON(credential),\n },\n ]),\n );\n }\n\n public getMetadata() {\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.GetWebAuthnInfo, []);\n return this.request<any[]>(requestPayload);\n }\n}\n", "export enum SDKErrorCode {\n MissingApiKey = 'MISSING_API_KEY',\n ModalNotReady = 'MODAL_NOT_READY',\n ConnectionLost = 'CONNECTION_WAS_LOST',\n MalformedResponse = 'MALFORMED_RESPONSE',\n InvalidArgument = 'INVALID_ARGUMENT',\n ExtensionNotInitialized = 'EXTENSION_NOT_INITIALIZED',\n IncompatibleExtensions = 'INCOMPATIBLE_EXTENSIONS',\n}\n\nexport enum SDKWarningCode {\n SyncWeb3Method = 'SYNC_WEB3_METHOD',\n DuplicateIframe = 'DUPLICATE_IFRAME',\n ReactNativeEndpointConfiguration = 'REACT_NATIVE_ENDPOINT_CONFIGURATION',\n DeprecationNotice = 'DEPRECATION_NOTICE',\n ProductAnnouncement = 'ANNOUNCEMENT',\n}\n\nexport enum RPCErrorCode {\n // Standard JSON RPC 2.0 Error Codes\n ParseError = -32700,\n InvalidRequest = -32600,\n MethodNotFound = -32601,\n InvalidParams = -32602,\n InternalError = -32603,\n\n // Custom RPC Error Codes\n MagicLinkFailedVerification = -10000,\n MagicLinkExpired = -10001,\n MagicLinkRateLimited = -10002,\n UserAlreadyLoggedIn = -10003,\n UpdateEmailFailed = -10004,\n UserRequestEditEmail = -10005,\n MagicLinkInvalidRedirectURL = -10006,\n InactiveRecipient = -10010,\n AccessDeniedToUser = -10011,\n UserRejectedAction = -10012,\n RequestCancelled = -10014,\n RedirectLoginComplete = -10015,\n SessionTerminated = -10016,\n PopupRequestOverriden = -10017,\n SanEmail = -10018,\n DpopInvalidated = -10019,\n MaxAttemptsReached = -10031,\n UserRequiredMfa = -10033,\n}\n\nexport type ErrorCode = SDKErrorCode | RPCErrorCode;\nexport type WarningCode = SDKWarningCode;\n", "import { RPCErrorCode } from './exception-types';\n\n// --- Request interfaces\n\nexport interface JsonRpcRequestPayload<TParams = any> {\n jsonrpc: string;\n id: string | number | null;\n method: string;\n params?: TParams;\n}\n\nexport interface JsonRpcRequestCallback {\n /** Callback executed upon JSON RPC response. */\n (err: JsonRpcError | null, result?: JsonRpcResponsePayload | null): void;\n}\n\nexport interface JsonRpcBatchRequestCallback {\n /** Callback executed upon JSON RPC response. */\n (err: JsonRpcError | null, result?: (JsonRpcResponsePayload | null)[] | null): void;\n}\n\n// --- Response interfaces\n\nexport interface JsonRpcError {\n message: string;\n code: RPCErrorCode;\n data?: any;\n}\n\nexport interface JsonRpcResponsePayload<ResultType = any> {\n jsonrpc: string;\n id: string | number | null;\n result?: ResultType | null;\n error?: JsonRpcError | null;\n}\n\nexport interface UserInfo {\n email?: string;\n}\n\nexport type ShowUIPromiEvents = {\n disconnect: () => void;\n};\n\nexport interface RequestUserInfoScope {\n scope?: {\n email?: 'required' | 'optional';\n };\n}\n\nexport enum LocalStorageKeys {\n PROVIDER = 'magic_3pw_provider',\n ADDRESS = 'magic_3pw_address',\n CHAIN_ID = 'magic_3pw_chainId',\n}\n\nexport enum ThirdPartyWalletEvents {\n WalletConnected = 'wallet_connected',\n WalletRejected = 'wallet_rejected',\n Web3ModalSelected = 'web3modal_selected',\n}\n\nexport interface ConnectWithUIOptions {\n autoPromptThirdPartyWallets?: boolean;\n}\n\nexport type ConnectWithUiEvents = {\n 'id-token-created': (params: { idToken: string }) => void;\n} & { [key in ThirdPartyWalletEvents]: () => void };\n\n// --- Payload methods\n\n/**\n * Enum of JSON RPC methods for interacting with the Magic SDK authentication\n * relayer.\n */\nexport enum MagicPayloadMethod {\n LoginWithSms = 'magic_auth_login_with_sms',\n LoginWithEmailOTP = 'magic_auth_login_with_email_otp',\n LoginWithMagicLink = 'magic_auth_login_with_magic_link',\n LoginWithCredential = 'magic_auth_login_with_credential',\n SetAuthorizationToken = 'magic_auth_set_authorization_token',\n GetIdToken = 'magic_auth_get_id_token',\n GenerateIdToken = 'magic_auth_generate_id_token',\n GetMetadata = 'magic_auth_get_metadata',\n IsLoggedIn = 'magic_is_logged_in',\n Logout = 'magic_auth_logout',\n UpdateEmail = 'magic_auth_update_email',\n UserSettings = 'magic_auth_settings',\n UserSettingsTestMode = 'magic_auth_settings_testing_mode',\n LoginWithSmsTestMode = 'magic_auth_login_with_sms_testing_mode',\n LoginWithEmailOTPTestMode = 'magic_auth_login_with_email_otp_testing_mode',\n LoginWithMagicLinkTestMode = 'magic_login_with_magic_link_testing_mode',\n LoginWithCredentialTestMode = 'magic_auth_login_with_credential_testing_mode',\n GetIdTokenTestMode = 'magic_auth_get_id_token_testing_mode',\n GenerateIdTokenTestMode = 'magic_auth_generate_id_token_testing_mode',\n GetMetadataTestMode = 'magic_auth_get_metadata_testing_mode',\n IsLoggedInTestMode = 'magic_auth_is_logged_in_testing_mode',\n LogoutTestMode = 'magic_auth_logout_testing_mode',\n UpdateEmailTestMode = 'magic_auth_update_email_testing_mode',\n IntermediaryEvent = 'magic_intermediary_event',\n RequestAccounts = 'eth_requestAccounts',\n GetInfo = 'magic_get_info',\n ShowUI = 'magic_wallet',\n NFTPurchase = 'magic_nft_purchase',\n NFTCheckout = 'magic_nft_checkout',\n NFTTransfer = 'magic_nft_transfer',\n RequestUserInfoWithUI = 'mc_request_user_info',\n Disconnect = 'mc_disconnect',\n // UpdatePhoneNumber = 'magic_auth_update_phone_number',\n // UpdatePhoneNumberTestMode = 'magic_auth_update_phone_number_testing_mode',\n RecoverAccount = 'magic_auth_recover_account',\n RecoverAccountTestMode = 'magic_auth_recover_account_testing_mode',\n MagicBoxHeartBeat = 'magic_box_heart_beat',\n AutoConnect = 'mc_auto_connect',\n Login = 'mc_login',\n EncryptV1 = 'magic_auth_encrypt_v1',\n DecryptV1 = 'magic_auth_decrypt_v1',\n ShowNFTs = 'magic_show_nfts',\n ShowOnRamp = 'magic_show_fiat_onramp',\n ShowSendTokensUI = 'magic_show_send_tokens_ui',\n ShowAddress = 'magic_show_address',\n ShowBalances = 'magic_show_balances',\n RevealPK = 'magic_reveal_key',\n EnableMFA = 'magic_auth_enable_mfa_flow',\n DisableMFA = 'magic_auth_disable_mfa_flow',\n GetMultichainPublicAddress = 'magic_get_multichain_public_address',\n Sign7702Authorization = 'magic_wallet_sign_7702_authorization',\n Send7702Transaction = 'eth_send7702Transaction',\n}\n\n// Methods to not route if connected to third party wallet\nexport const routeToMagicMethods = [\n MagicPayloadMethod.IntermediaryEvent,\n MagicPayloadMethod.NFTCheckout,\n MagicPayloadMethod.Login,\n];\n", "import { JsonRpcResponsePayload, JsonRpcError, JsonRpcRequestPayload } from './json-rpc-types';\n\nexport enum MagicIncomingWindowMessage {\n MAGIC_HANDLE_RESPONSE = 'MAGIC_HANDLE_RESPONSE',\n MAGIC_OVERLAY_READY = 'MAGIC_OVERLAY_READY',\n MAGIC_SHOW_OVERLAY = 'MAGIC_SHOW_OVERLAY',\n MAGIC_HIDE_OVERLAY = 'MAGIC_HIDE_OVERLAY',\n MAGIC_HANDLE_EVENT = 'MAGIC_HANDLE_EVENT',\n MAGIC_MG_BOX_SEND_RECEIPT = 'MAGIC_MG_BOX_SEND_RECEIPT',\n MAGIC_SEND_PRODUCT_ANNOUNCEMENT = 'MAGIC_SEND_PRODUCT_ANNOUNCEMENT',\n MAGIC_PONG = 'MAGIC_PONG',\n MAGIC_POPUP_RESPONSE = 'MAGIC_POPUP_RESPONSE',\n MAGIC_POPUP_OAUTH_VERIFY_RESPONSE = 'MAGIC_POPUP_OAUTH_VERIFY_RESPONSE',\n MAGIC_THIRD_PARTY_WALLET_REQUEST = 'MAGIC_THIRD_PARTY_WALLET_REQUEST',\n MAGIC_OPEN_MOBILE_URL = 'MAGIC_OPEN_MOBILE_URL',\n}\n\nexport enum MagicOutgoingWindowMessage {\n MAGIC_HANDLE_REQUEST = 'MAGIC_HANDLE_REQUEST',\n MAGIC_THIRD_PARTY_WALLET_RESPONSE = 'MAGIC_THIRD_PARTY_WALLET_RESPONSE',\n MAGIC_THIRD_PARTY_WALLET_UPDATE = 'MAGIC_THIRD_PARTY_WALLET_EVENT',\n MAGIC_PING = 'MAGIC_PING',\n}\n\n/** The shape of responding window message data from the Magic iframe context. */\nexport interface MagicMessageRequest {\n msgType: string;\n payload: JsonRpcRequestPayload | JsonRpcRequestPayload[];\n rt?: string;\n jwt?: string;\n deviceShare?: string;\n}\n\n/** The shape of responding window message data from the Magic iframe context. */\nexport interface MagicMessageResponse<ResultType = any> {\n msgType: string;\n response: Partial<JsonRpcError> & Partial<JsonRpcResponsePayload<ResultType>>;\n rt?: string;\n deviceShare?: string;\n}\n\n/** The expected message event returned by the Magic iframe context. */\nexport interface MagicMessageEvent extends Partial<MessageEvent> {\n data: MagicMessageResponse;\n}\n\nexport interface MagicThirdPartyWalletRequest {\n msgType: MagicIncomingWindowMessage.MAGIC_THIRD_PARTY_WALLET_REQUEST;\n payload: JsonRpcRequestPayload;\n}\n\nexport interface MagicThirdPartyWalletResponse {\n msgType: `${MagicOutgoingWindowMessage.MAGIC_THIRD_PARTY_WALLET_RESPONSE}-${string}`;\n response: JsonRpcResponsePayload;\n}\n\nexport interface MagicThirdPartyWalletUpdate {\n msgType: `${MagicOutgoingWindowMessage.MAGIC_THIRD_PARTY_WALLET_UPDATE}-${string}`;\n details: {\n address: `0x${string}` | undefined;\n addresses: readonly `0x${string}`[] | undefined;\n chain: { id: number; name: string; [key: string]: unknown } | undefined;\n updatedField: 'chain' | 'address';\n };\n}\n\nexport type MagicThirdPartyWalletEventPayload = MagicThirdPartyWalletResponse | MagicThirdPartyWalletUpdate;\n", "export enum DeepLinkPage {\n UpdateEmail = 'update-email',\n MFA = 'mfa',\n Recovery = 'recovery',\n}\n", "import { WalletEventOnReceived } from './wallet-types';\n\nexport interface LoginWithMagicLinkConfiguration {\n /**\n * The email address of the user attempting to login.\n */\n email: string;\n\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to check their email for the \"magic link\" to complete their\n * authentication.\n */\n showUI?: boolean;\n\n /**\n * You can optionally provide a redirect URI that will be followed at the end\n * of the magic link flow. Don't forget to invoke\n * `magic.auth.loginWithCredential()` to complete the login from the route you\n * configure here.\n */\n redirectURI?: string;\n\n /**\n * Enterprise users with a custom SMTP can create custom email templates\n * from their dashboard. The default Magic loginWithMagicLink email will be\n * overridden when a variation is passed here.\n */\n overrides?: {\n variation?: string;\n };\n\n /**\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface LoginWithSmsConfiguration {\n /**\n * Specify the phone number of the user attempting to login.\n */\n phoneNumber: string;\n\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to check their SMS for the one time passcode (OTP) to complete their\n * authentication.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the SMS OTP flow.\n */\n showUI?: boolean;\n\n /*\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\nexport interface LoginWithEmailOTPConfiguration {\n /**\n * Specify the email address of the user attempting to login.\n */\n email: string;\n\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to check their email for the one time passcode (OTP) to complete their\n * authentication.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the email OTP flow.\n */\n showUI?: boolean;\n\n /**\n * Device Unrecognized UI will enforce showing up to secure user's login\n *\n * When set to true (default), an improved device recognition UI will be displayed to the user,\n * prompting them to verify their login by checking their email for device approval. This feature\n * enhances authentication security.\n *\n * This param will only be affected if showUI is false. When set to false,\n * developers have the flexibility to implement their own customized UI to\n * handle device check events, providing a more tailored user experience.\n */\n deviceCheckUI?: boolean;\n\n /**\n * Enterprise users with a custom SMTP can create custom email templates\n * from their dashboard. The default Magic loginWithOTP email will be\n * overridden when a variation is passed here.\n */\n overrides?: {\n variation?: string;\n appName?: string;\n assetUrl?: string;\n };\n\n /**\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface LoginWithCredentialConfiguration {\n /**\n * A credential token or a valid query string (prefixed with ? or #)\n */\n credentialOrQueryString?: string;\n\n /**\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface EnableMFAConfiguration {\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to enable MFA using Google Authenticator app.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the enable MFA flow.\n */\n showUI?: boolean;\n}\n\nexport interface DisableMFAConfiguration {\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to disable MFA.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the disable MFA flow.\n */\n showUI?: boolean;\n}\n\n/**\n * Auth Events Enum\n */\nexport enum LoginWithMagicLinkEventEmit {\n Retry = 'retry',\n}\n\nexport enum LoginWithMagicLinkEventOnReceived {\n EmailSent = 'email-sent',\n EmailNotDeliverable = 'email-not-deliverable',\n}\n\nexport enum LoginWithEmailOTPEventEmit {\n VerifyEmailOtp = 'verify-email-otp',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n Cancel = 'cancel',\n}\n\nexport enum LoginWithSmsOTPEventEmit {\n VerifySmsOtp = 'verify-sms-otp',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n Cancel = 'cancel',\n Retry = 'retry',\n}\n\nexport enum LoginWithSmsOTPEventOnReceived {\n SmsOTPSent = 'sms-otp-sent',\n InvalidSmsOtp = 'invalid-sms-otp',\n ExpiredSmsOtp = 'expired-sms-otp',\n MfaSentHandle = 'mfa-sent-handle',\n InvalidMfaOtp = 'invalid-mfa-otp',\n LoginThrottled = 'login-throttled',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n}\n\nexport enum LoginWithEmailOTPEventOnReceived {\n EmailOTPSent = 'email-otp-sent',\n InvalidEmailOtp = 'invalid-email-otp',\n InvalidMfaOtp = 'invalid-mfa-otp',\n ExpiredEmailOtp = 'expired-email-otp',\n MfaSentHandle = 'mfa-sent-handle',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n LoginThrottled = 'login-throttled',\n MaxAttemptsReached = 'max-attempts-reached',\n}\n\nexport enum DeviceVerificationEventEmit {\n Retry = 'device-retry',\n}\n\nexport enum DeviceVerificationEventOnReceived {\n DeviceApproved = 'device-approved',\n DeviceNeedsApproval = 'device-needs-approval',\n DeviceVerificationLinkExpired = 'device-verification-link-expired',\n DeviceVerificationEmailSent = 'device-verification-email-sent',\n}\n\nexport enum RecencyCheckEventEmit {\n Retry = 'Recency/auth-factor-retry',\n Cancel = 'Recency/auth-factor-verification-cancel',\n VerifyEmailOtp = 'Recency/auth-factor-verify-email-otp',\n VerifyMFACode = 'Recency/verify-mfa-code',\n}\n\nexport enum RecencyCheckEventOnReceived {\n PrimaryAuthFactorNeedsVerification = 'Recency/auth-factor-needs-verification',\n PrimaryAuthFactorVerified = 'Recency/auth-factor-verified',\n InvalidEmailOtp = 'Recency/auth-factor-invalid-email-otp',\n EmailExpired = 'Recency/auth-factor-verification-email-expired',\n EmailSent = 'Recency/auth-factor-verification-email-sent',\n EmailNotDeliverable = 'Recency/auth-factor-verification-email-not-deliverable',\n}\n\nexport enum UpdateEmailEventEmit {\n RetryWithNewEmail = 'UpdateEmail/retry-with-new-email',\n Cancel = 'UpdateEmail/new-email-verification-cancel',\n VerifyEmailOtp = 'UpdateEmail/new-email-verify-otp',\n}\n\nexport enum UpdateEmailEventOnReceived {\n NewAuthFactorNeedsVerification = 'UpdateEmail/new-email-needs-verification',\n EmailUpdated = 'UpdateEmail/email-updated',\n InvalidEmailOtp = 'UpdateEmail/new-email-invalid-email-otp',\n EmailExpired = 'UpdateEmail/new-email-verification-email-expired',\n EmailSent = 'UpdateEmail/new-email-verification-email-sent',\n EmailNotDeliverable = 'UpdateEmail/new-email-verification-email-not-deliverable',\n InvalidEmail = 'UpdateEmail/new-email-invalid',\n EmailAlreadyExists = 'UpdateEmail/new-email-already-exists',\n}\n\nexport enum AuthEventOnReceived {\n IDTokenCreated = 'Auth/id-token-created',\n}\n\nexport enum FarcasterLoginEventEmit {\n Cancel = 'Farcaster/cancel',\n}\n\nexport enum EnableMFAEventOnReceived {\n MFASecretGenerated = 'mfa-secret-generated',\n InvalidMFAOtp = 'invalid-mfa-otp',\n MFARecoveryCodes = 'mfa-recovery-codes',\n}\nexport enum EnableMFAEventEmit {\n VerifyMFACode = 'verify-mfa-code',\n Cancel = 'cancel-mfa-setup',\n}\n\nexport enum DisableMFAEventOnReceived {\n MFACodeRequested = 'mfa-code-requested',\n InvalidMFAOtp = 'invalid-mfa-otp',\n InvalidRecoveryCode = 'invalid-recovery-code',\n}\n\nexport enum DisableMFAEventEmit {\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n Cancel = 'cancel-mfa-disable',\n}\n\n/**\n * EventHandlers\n */\nexport type LoginWithMagicLinkEventHandlers = {\n // Event Received\n [LoginWithMagicLinkEventOnReceived.EmailSent]: () => void;\n [LoginWithMagicLinkEventOnReceived.EmailNotDeliverable]: () => void;\n\n // Event sent\n [LoginWithMagicLinkEventEmit.Retry]: () => void;\n} & DeviceVerificationEventHandlers;\n\nexport type LoginWithSmsOTPEventHandlers = {\n // Event sent\n [LoginWithSmsOTPEventEmit.VerifySmsOtp]: (otp: string) => void;\n [LoginWithSmsOTPEventEmit.VerifyMFACode]: (mfa: string) => void;\n [LoginWithSmsOTPEventEmit.LostDevice]: () => void;\n [LoginWithSmsOTPEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n [LoginWithSmsOTPEventEmit.Cancel]: () => void;\n [LoginWithSmsOTPEventEmit.Retry]: () => void;\n\n // Event received\n [LoginWithSmsOTPEventOnReceived.SmsOTPSent]: () => void;\n [LoginWithSmsOTPEventOnReceived.InvalidSmsOtp]: () => void;\n [LoginWithSmsOTPEventOnReceived.ExpiredSmsOtp]: () => void;\n [LoginWithSmsOTPEventOnReceived.MfaSentHandle]: () => void;\n [LoginWithSmsOTPEventOnReceived.InvalidMfaOtp]: () => void;\n [LoginWithSmsOTPEventOnReceived.LoginThrottled]: () => void;\n [LoginWithSmsOTPEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [LoginWithSmsOTPEventOnReceived.InvalidRecoveryCode]: () => void;\n [LoginWithSmsOTPEventOnReceived.RecoveryCodeSuccess]: () => void;\n} & DeviceVerificationEventHandlers;\n\nexport type LoginWithEmailOTPEventHandlers = {\n // Event Received\n [LoginWithEmailOTPEventOnReceived.EmailOTPSent]: () => void;\n [LoginWithEmailOTPEventOnReceived.LoginThrottled]: () => void;\n [LoginWithEmailOTPEventOnReceived.InvalidEmailOtp]: () => void;\n [LoginWithEmailOTPEventOnReceived.InvalidMfaOtp]: () => void;\n [LoginWithEmailOTPEventOnReceived.ExpiredEmailOtp]: () => void;\n [LoginWithEmailOTPEventOnReceived.MfaSentHandle]: () => void;\n [LoginWithEmailOTPEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [LoginWithEmailOTPEventOnReceived.InvalidRecoveryCode]: () => void;\n [LoginWithEmailOTPEventOnReceived.RecoveryCodeSuccess]: () => void;\n [LoginWithEmailOTPEventOnReceived.MaxAttemptsReached]: () => void;\n [AuthEventOnReceived.IDTokenCreated]: (idToken: string) => void;\n [WalletEventOnReceived.WalletInfoFetched]: () => void;\n\n // Event sent\n [LoginWithEmailOTPEventEmit.VerifyEmailOtp]: (otp: string) => void;\n [LoginWithEmailOTPEventEmit.VerifyMFACode]: (mfa: string) => void;\n [LoginWithEmailOTPEventEmit.LostDevice]: () => void;\n [LoginWithEmailOTPEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n [LoginWithEmailOTPEventEmit.Cancel]: () => void;\n} & DeviceVerificationEventHandlers;\n\ntype DeviceVerificationEventHandlers = {\n // Event Received\n [DeviceVerificationEventOnReceived.DeviceNeedsApproval]: () => void;\n [DeviceVerificationEventOnReceived.DeviceVerificationEmailSent]: () => void;\n [DeviceVerificationEventOnReceived.DeviceVerificationLinkExpired]: () => void;\n [DeviceVerificationEventOnReceived.DeviceApproved]: () => void;\n\n // Event sent\n [DeviceVerificationEventEmit.Retry]: () => void;\n};\n\n/**\n * Update Email\n */\n\nexport type RecencyCheckEventHandlers = {\n [RecencyCheckEventOnReceived.PrimaryAuthFactorNeedsVerification]: () => void;\n [RecencyCheckEventOnReceived.PrimaryAuthFactorVerified]: () => void;\n [RecencyCheckEventOnReceived.InvalidEmailOtp]: () => void;\n [RecencyCheckEventOnReceived.EmailNotDeliverable]: () => void;\n [RecencyCheckEventOnReceived.EmailExpired]: () => void;\n [RecencyCheckEventOnReceived.EmailSent]: () => void;\n\n [RecencyCheckEventEmit.Cancel]: () => void;\n [RecencyCheckEventEmit.Retry]: () => void;\n [RecencyCheckEventEmit.VerifyEmailOtp]: (otp: string) => void;\n [RecencyCheckEventEmit.VerifyMFACode]: (mfa: string) => void;\n};\n\nexport type UpdateEmailEventHandlers = {\n [UpdateEmailEventOnReceived.NewAuthFactorNeedsVerification]: () => void;\n [UpdateEmailEventOnReceived.EmailUpdated]: () => void;\n [UpdateEmailEventOnReceived.InvalidEmailOtp]: () => void;\n [UpdateEmailEventOnReceived.EmailNotDeliverable]: () => void;\n [UpdateEmailEventOnReceived.EmailExpired]: () => void;\n [UpdateEmailEventOnReceived.EmailSent]: () => void;\n [UpdateEmailEventOnReceived.InvalidEmail]: () => void;\n [UpdateEmailEventOnReceived.EmailAlreadyExists]: () => void;\n\n [UpdateEmailEventEmit.Cancel]: () => void;\n [UpdateEmailEventEmit.RetryWithNewEmail]: (email?: string) => void;\n [UpdateEmailEventEmit.VerifyEmailOtp]: (otp: string) => void;\n} & RecencyCheckEventHandlers;\n\n/**\n * Enable MFA\n */\n\nexport type EnableMFAEventHandlers = {\n // Event Received\n [EnableMFAEventOnReceived.MFASecretGenerated]: ({ QRCode, key }: { QRCode: string; key: string }) => void;\n [EnableMFAEventOnReceived.InvalidMFAOtp]: ({ errorCode }: { errorCode: string }) => void;\n [EnableMFAEventOnReceived.MFARecoveryCodes]: ({ recoveryCode }: { recoveryCode: string }) => void;\n\n // Event sent\n [EnableMFAEventEmit.VerifyMFACode]: (totp: string) => void;\n [EnableMFAEventEmit.Cancel]: () => void;\n};\n\n/**\n * Disable MFA\n */\n\nexport type DisableMFAEventHandlers = {\n // Event Received\n [DisableMFAEventOnReceived.MFACodeRequested]: () => void;\n [DisableMFAEventOnReceived.InvalidMFAOtp]: ({ errorCode }: { errorCode: string }) => void;\n [DisableMFAEventOnReceived.InvalidRecoveryCode]: () => void;\n\n // Event sent\n [DisableMFAEventEmit.VerifyMFACode]: (totp: string) => void;\n [DisableMFAEventEmit.LostDevice]: (recoveryCode: string) => void;\n [DisableMFAEventEmit.Cancel]: () => void;\n};\n", "export type EthNetworkName = 'mainnet' | 'goerli' | 'sepolia';\n\nexport enum EthChainType {\n Harmony = 'HARMONY',\n}\n\nexport interface CustomNodeConfiguration {\n rpcUrl: string;\n chainId?: number;\n chainType?: EthChainType;\n}\n\nexport type EthNetworkConfiguration = EthNetworkName | CustomNodeConfiguration;\n\nexport type ProviderEnableEvents = {\n 'id-token-created': (params: { idToken: string }) => void;\n};\n", "import { RecencyCheckEventHandlers } from './auth-types';\nimport { DeepLinkPage } from '../core/deep-link-pages';\n\nexport interface GetIdTokenConfiguration {\n /**\n * The number of seconds until the generated ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface GenerateIdTokenConfiguration extends GetIdTokenConfiguration {\n /**\n * An optional piece of data to sign with the token. Note, however, that the\n * unsigned data _will not_ be encoded in the token, only an encrypted\n * signature of the data.\n */\n attachment?: string;\n}\n\nexport enum UserEventsEmit {\n ClosedByUser = 'closed-by-user',\n}\n\nexport enum UserEventsOnReceived {\n ClosedByUser = 'closed-by-user-on-received',\n}\n\nexport interface ChainWalletInfo {\n publicAddress: string | null;\n subAccounts: Array<{ name: string; publicAddress: string }>;\n}\n\nexport interface MagicUserMetadata {\n issuer: string | null;\n email: string | null;\n phoneNumber: string | null;\n isMfaEnabled: boolean;\n recoveryFactors: [RecoveryFactor] | [];\n firstLoginAt: string | null;\n wallets: {\n ethereum?: ChainWalletInfo;\n algorand?: ChainWalletInfo;\n aptos?: ChainWalletInfo;\n avalancheX?: ChainWalletInfo;\n bitcoin?: ChainWalletInfo;\n conflux?: ChainWalletInfo;\n cosmos?: ChainWalletInfo;\n flow?: ChainWalletInfo;\n harmony?: ChainWalletInfo;\n hedera?: ChainWalletInfo;\n icon?: ChainWalletInfo;\n kadena?: ChainWalletInfo;\n near?: ChainWalletInfo;\n polkadot?: ChainWalletInfo;\n solana?: ChainWalletInfo;\n sui?: ChainWalletInfo;\n taquito?: ChainWalletInfo;\n terra?: ChainWalletInfo;\n tezos?: ChainWalletInfo;\n zilliqa?: ChainWalletInfo;\n [chain: string]: ChainWalletInfo | undefined;\n };\n}\n\nexport enum RecoveryFactorEventOnReceived {\n EnterNewPhoneNumber = 'enter-new-phone-number',\n EnterOtpCode = 'enter-otp-code',\n RecoveryFactorAlreadyExists = 'recovery-factor-already-exists',\n MalformedPhoneNumber = 'malformed-phone-number',\n InvalidOtpCode = 'invalid-otp-code',\n RecoveryFactorUpdated = 'recovery-factor-updated',\n RecoveryFactorDeleted = 'recovery-factor-deleted',\n}\n\nexport enum RecoveryFactorEventEmit {\n SendNewPhoneNumber = 'send-new-phone-number',\n SendOtpCode = 'send-otp-code',\n Cancel = 'cancel',\n StartEditPhoneNumber = 'start-edit-phone-number',\n}\n\ntype RecoveryFactor = {\n type: RecoveryMethodType;\n value: string;\n};\n\nexport type RecoveryFactorEventHandlers = {\n // Event Received\n [RecoveryFactorEventEmit.SendNewPhoneNumber]: (phone_number: string) => void;\n [RecoveryFactorEventEmit.SendOtpCode]: (otp: string) => void;\n [RecoveryFactorEventEmit.StartEditPhoneNumber]: () => void;\n [RecoveryFactorEventEmit.Cancel]: () => void;\n\n // Event sent\n [RecoveryFactorEventOnReceived.EnterNewPhoneNumber]: () => void;\n [RecoveryFactorEventOnReceived.EnterOtpCode]: () => void;\n [RecoveryFactorEventOnReceived.RecoveryFactorAlreadyExists]: () => void;\n [RecoveryFactorEventOnReceived.MalformedPhoneNumber]: () => void;\n [RecoveryFactorEventOnReceived.InvalidOtpCode]: () => void;\n [RecoveryFactorEventOnReceived.RecoveryFactorUpdated]: (updatedFactor: { type: string; value: string }) => void;\n [RecoveryFactorEventOnReceived.RecoveryFactorDeleted]: () => void;\n} & RecencyCheckEventHandlers;\n\nexport enum RecoveryMethodType {\n PhoneNumber = 'phone_number',\n}\n\nexport interface UpdateEmailConfiguration {\n /**\n * The new email address to update to\n */\n email: string;\n\n /**\n * When `true`, a pre-built pending modal interface will\n * guide the user to check their new, followed by old emails\n * for confirmation emails.\n */\n showUI?: boolean;\n}\n\nexport interface UpdateWebAuthnInfoConfiguration {\n /**\n * WebAuthn info id\n */\n id: string;\n\n /**\n * nickname that user attempts to update to the webauth device associate to the id.\n */\n nickname: string;\n}\n\nexport interface RecoverAccountConfiguration {\n /**\n * The email to recover\n */\n email: string;\n showUI: boolean;\n}\n\nexport interface ShowSettingsConfiguration {\n /**\n * deep linking destination\n */\n page: DeepLinkPage;\n showUI?: boolean;\n}\n\nexport enum RecoverAccountEventOnReceived {\n SmsOtpSent = 'sms-otp-sent',\n LoginThrottled = 'login-throttled',\n InvalidSmsOtp = 'invalid-sms-otp',\n SmsVerified = 'sms-verified',\n AccountRecovered = 'account-recovered',\n UpdateEmailRequired = 'update-email-required',\n}\n\nexport enum RecoverAccountEventEmit {\n Cancel = 'cancel',\n VerifyOtp = 'verify-otp-code',\n ResendSms = 'resend-sms-otp',\n UpdateEmail = 'update-email',\n}\n\nexport type RecoverAccountEventHandlers = {\n // Event Received\n [RecoverAccountEventEmit.Cancel]: () => void;\n [RecoverAccountEventEmit.VerifyOtp]: (otp: string) => void;\n [RecoverAccountEventEmit.ResendSms]: () => void;\n [RecoverAccountEventEmit.UpdateEmail]: (email: string) => void;\n\n // Event sent\n [RecoverAccountEventOnReceived.SmsOtpSent]: ({ phoneNumber }: { phoneNumber: string }) => void;\n [RecoverAccountEventOnReceived.LoginThrottled]: (error: string) => void;\n [RecoverAccountEventOnReceived.InvalidSmsOtp]: ({\n errorMessage,\n errorCode,\n }: {\n errorMessage: string;\n errorCode: string;\n }) => void;\n [RecoverAccountEventOnReceived.SmsVerified]: () => void;\n [RecoverAccountEventOnReceived.AccountRecovered]: () => void;\n [RecoverAccountEventOnReceived.UpdateEmailRequired]: () => void;\n};\n", "export type NFTResponseStatus = 'cancelled' | 'pending' | 'processed' | 'declined' | 'expired';\n\nexport type NFTResponse = {\n status: NFTResponseStatus;\n};\n\nexport interface NFTPurchaseRequest {\n nft: {\n name: string;\n imageUrl: string;\n blockchainNftId: string;\n contractAddress: string;\n network: string;\n platform: string;\n type: string;\n };\n identityPrefill: {\n firstName: string;\n lastName: string;\n dateOfBirth: string; // YYYY-MM-DD\n emailAddress: string;\n phone: string;\n address: {\n street1: string;\n street2: string;\n city: string;\n regionCode: string;\n postalCode: string;\n countryCode: string;\n };\n };\n}\n\nexport type NFTPurchaseResponse = NFTResponse & {\n errorMessage?: string;\n};\n\nexport interface NFTCheckoutRequest {\n // given by magic / found in the developer dashboard in future\n contractId: string;\n // in contract, if ERC1155\u2026 for ERC721, use token ID = 0\n tokenId: string;\n name: string;\n imageUrl: string;\n quantity?: number; // default is 1\n walletAddress?: string; // default is user's wallet address\n // If enabled, the user will be able to pay with crypto. the default is false\n isCryptoCheckoutEnabled?: boolean;\n walletProvider?: 'magic' | 'web3modal';\n}\n\nexport type NFTCheckoutResponse = NFTResponse;\n\nexport type NFTCheckoutEvents = {\n disconnect: () => void;\n 'nft-checkout-initiated': (rawTransaction: string) => void;\n};\n\nexport interface NFTTransferRequest {\n tokenId: string;\n contractAddress: string;\n quantity?: number;\n recipient?: string;\n}\n\nexport type NFTTransferResponse = NFTResponse;\n\nexport enum NftCheckoutIntermediaryEvents {\n Success = 'nft-checkout-success',\n Failure = 'nft-checkout-failure',\n Initiated = 'nft-checkout-initiated',\n Disconnect = 'disconnect',\n}\n\nexport type NftCheckoutEventHandler = {\n [NftCheckoutIntermediaryEvents.Initiated]: (rawTransaction: string) => void;\n [NftCheckoutIntermediaryEvents.Success]: (signedTransaction: string) => void;\n [NftCheckoutIntermediaryEvents.Failure]: () => void;\n};\n", "export type AccessListEntry = { address: string; storageKeys: Array<string> };\n\n/**\n * An ordered collection of [[AccessList]] entries.\n */\nexport type AccessList = Array<AccessListEntry>;\n\nexport enum WalletEventOnReceived {\n WalletInfoFetched = 'Wallet/wallet-info-fetched',\n}\n\n/**\n * Request parameters for EIP-7702 authorization signing\n */\nexport interface Sign7702AuthorizationRequest {\n /**\n * The smart contract implementation address the EOA delegates to\n */\n contractAddress: string;\n\n /**\n * The chain ID for the network (use 0 for universal cross-chain authorization)\n */\n chainId: number;\n\n /**\n * The nonce for the EOA account (transaction count)\n */\n nonce?: number;\n}\n\n/**\n * Response from EIP-7702 authorization signing\n */\nexport interface Sign7702AuthorizationResponse {\n /**\n * The contract address that was authorized\n */\n contractAddress: string;\n\n /**\n * The chain ID for the authorization\n */\n chainId: number;\n\n /**\n * The nonce used in the authorization\n */\n nonce: number;\n\n /**\n * The v component of the signature (recovery id)\n */\n v: number;\n\n /**\n * The r component of the signature\n */\n r: string;\n\n /**\n * The s component of the signature\n */\n s: string;\n\n /**\n * Optional: Full signature as hex string\n */\n signature?: string;\n}\n\n/**\n * Request parameters for sending an EIP-7702 transaction with authorization list\n */\nexport interface Send7702TransactionRequest {\n /**\n * The recipient address\n */\n to: string;\n\n /**\n * The value to send in wei (as hex string)\n */\n value?: string;\n\n /**\n * The transaction data (calldata)\n */\n data?: string;\n\n /**\n * Gas limit for the transaction (as hex string)\n */\n gas?: string;\n\n /**\n * Gas limit for the transaction (alias for gas)\n */\n gasLimit?: string;\n\n /**\n * Maximum fee per gas for EIP-1559 transactions (as hex string)\n */\n maxFeePerGas?: string;\n\n /**\n * Maximum priority fee per gas for EIP-1559 transactions (as hex string)\n */\n maxPriorityFeePerGas?: string;\n\n /**\n * Transaction nonce (if not provided, will be fetched from network)\n */\n nonce?: number;\n\n /**\n * The list of signed EIP-7702 authorizations to include in the transaction\n */\n authorizationList: Sign7702AuthorizationResponse[];\n}\n\n/**\n * Response from sending an EIP-7702 transaction\n */\nexport interface Send7702TransactionResponse {\n /**\n * The transaction hash\n */\n transactionHash: string;\n}", "export enum UiEventsEmit {\n CloseMagicWindow = 'close-magic-window',\n}\n", "// Shared MFA events reused by both popup and redirect flows\nexport enum OAuthMFAEventEmit {\n Cancel = 'cancel',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n}\n\nexport enum OAuthMFAEventOnReceived {\n MfaSentHandle = 'mfa-sent-handle',\n InvalidMfaOtp = 'invalid-mfa-otp',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n}\n\ntype OAuthMFAEventHandlers = {\n // Event sent\n [OAuthMFAEventEmit.Cancel]: () => void;\n [OAuthMFAEventEmit.VerifyMFACode]: (mfa: string) => void;\n [OAuthMFAEventEmit.LostDevice]: () => void;\n [OAuthMFAEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n // Event Received\n [OAuthMFAEventOnReceived.MfaSentHandle]: () => void;\n [OAuthMFAEventOnReceived.InvalidMfaOtp]: () => void;\n [OAuthMFAEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [OAuthMFAEventOnReceived.InvalidRecoveryCode]: () => void;\n [OAuthMFAEventOnReceived.RecoveryCodeSuccess]: () => void;\n};\n\n// Popup-specific events\nexport enum OAuthPopupEventOnReceived {\n PopupUrl = 'popup-url',\n}\n\nexport enum OAuthPopupEventEmit {\n PopupEvent = 'popup-event',\n}\n\nexport type OAuthPopupEventHandlers = {\n [OAuthPopupEventEmit.PopupEvent]: (eventData: unknown) => void;\n [OAuthPopupEventOnReceived.PopupUrl]: (event: { popupUrl: string; provider: string }) => void;\n} & OAuthMFAEventHandlers;\n\n// Redirect-specific handler type\nexport type OAuthGetResultEventHandlers = OAuthMFAEventHandlers;\n", "export interface PasskeyResult {\n // null if skipDIDToken is true\n idToken: string | null;\n\n // Info of the device used to authenticate\n deviceInfo: DeviceInfo;\n}\n\nexport interface DeviceInfo {\n id: string;\n nickname: string;\n transport: string;\n userAgent: string;\n}\n\nexport interface PasskeyMetadata {\n devicesInfo: DeviceInfo[];\n}\n\nexport enum PasskeyMFAEventEmit {\n Cancel = 'cancel',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n}\nexport enum PasskeyMFAEventOnReceived {\n MfaSentHandle = 'mfa-sent-handle',\n InvalidMfaOtp = 'invalid-mfa-otp',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n}\n\nexport type PasskeyEventHandlers = {\n // Event sent\n [PasskeyMFAEventEmit.Cancel]: () => void;\n [PasskeyMFAEventEmit.VerifyMFACode]: (mfa: string) => void;\n [PasskeyMFAEventEmit.LostDevice]: () => void;\n [PasskeyMFAEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n // Event Received\n [PasskeyMFAEventOnReceived.MfaSentHandle]: () => void;\n [PasskeyMFAEventOnReceived.InvalidMfaOtp]: () => void;\n [PasskeyMFAEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [PasskeyMFAEventOnReceived.InvalidRecoveryCode]: () => void;\n [PasskeyMFAEventOnReceived.RecoveryCodeSuccess]: () => void;\n};\n", "/**\n * Encode given buffer or decode given string with Base64URL.\n */\nexport class Base64URL {\n /**\n * Convert bytes into a base64url-encoded string\n */\n static encode(buffer: ArrayBuffer): string {\n const base64 = globalThis.btoa(String.fromCharCode(...new Uint8Array(buffer)));\n\n return base64.replace(/=/g, '').replace(/\\+/g, '-').replace(/\\//g, '_');\n }\n\n /**\n * Convert a base64url-encoded string into bytes\n */\n static decode(base64url: string): ArrayBuffer {\n const base64 = base64url.replace(/-/g, '+').replace(/_/g, '/');\n const binStr = globalThis.atob(base64);\n const bin = new Uint8Array(binStr.length);\n\n for (let i = 0; i < binStr.length; i++) {\n bin[i] = binStr.charCodeAt(i);\n }\n\n return bin.buffer;\n }\n}\n", "import { Base64URL } from './base64';\n\nfunction isAuthenticatorAssertionResponse(value: AuthenticatorResponse): value is AuthenticatorAssertionResponse {\n if (typeof value !== 'object') {\n return false;\n }\n if (\n (value as AuthenticatorAssertionResponse)?.authenticatorData === undefined ||\n typeof (value as AuthenticatorAssertionResponse)?.authenticatorData !== 'object'\n ) {\n return false;\n }\n return true;\n}\n\nfunction isAuthenticatorAttestationResponse(value: AuthenticatorResponse): value is AuthenticatorAttestationResponse {\n if (typeof value !== 'object') {\n return false;\n }\n if (\n (value as AuthenticatorAttestationResponse)?.attestationObject === undefined ||\n typeof (value as AuthenticatorAttestationResponse)?.attestationObject !== 'object'\n ) {\n return false;\n }\n return true;\n}\n\n/**\n * Polyfill `PublicKeyCredential.prototype.toJSON`\n *\n * See https://w3c.github.io/webauthn/#dom-publickeycredential-tojson\n */\nexport function toJSON(cred: PublicKeyCredential): PublicKeyCredentialJSON {\n // Prefer native implementation if available\n if (typeof cred.toJSON === 'function') {\n return cred.toJSON();\n }\n\n try {\n const id = cred.id;\n const rawId = Base64URL.encode(cred.rawId);\n const authenticatorAttachment = cred.authenticatorAttachment;\n const clientExtensionResults = {};\n const type = cred.type;\n\n // This is authentication.\n if (isAuthenticatorAssertionResponse(cred.response)) {\n return {\n id,\n rawId,\n response: {\n authenticatorData: Base64URL.encode(cred.response.authenticatorData),\n clientDataJSON: Base64URL.encode(cred.response.clientDataJSON),\n signature: Base64URL.encode(cred.response.signature),\n userHandle: cred.response.userHandle ? Base64URL.encode(cred.response.userHandle) : undefined,\n },\n authenticatorAttachment,\n clientExtensionResults,\n type,\n };\n }\n\n if (isAuthenticatorAttestationResponse(cred.response)) {\n // This is registration.\n return {\n id,\n rawId,\n response: {\n clientDataJSON: Base64URL.encode(cred.response.clientDataJSON),\n attestationObject: Base64URL.encode(cred.response.attestationObject),\n transports: cred.response?.getTransports() || [],\n },\n authenticatorAttachment,\n clientExtensionResults,\n type,\n };\n }\n\n throw new Error('Unexpected object.');\n } catch (error) {\n console.error(error);\n throw error;\n }\n}\n"],
5
+ "mappings": "AAAA,OAAS,aAAAA,OAAiB,sBCAnB,IAAKC,GAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,eAAiB,sBACjBA,EAAA,kBAAoB,qBACpBA,EAAA,gBAAkB,mBAClBA,EAAA,wBAA0B,4BAC1BA,EAAA,uBAAyB,0BAPfA,IAAAA,GAAA,CAAA,CAAA,EAUAC,GAAAA,IACVA,EAAA,eAAiB,mBACjBA,EAAA,gBAAkB,mBAClBA,EAAA,iCAAmC,sCACnCA,EAAA,kBAAoB,qBACpBA,EAAA,oBAAsB,eALZA,IAAAA,GAAA,CAAA,CAAA,EAQAC,GAAAA,IAEVA,EAAAA,EAAA,WAAa,MAAA,EAAb,aACAA,EAAAA,EAAA,eAAiB,MAAA,EAAjB,iBACAA,EAAAA,EAAA,eAAiB,MAAA,EAAjB,iBACAA,EAAAA,EAAA,cAAgB,MAAA,EAAhB,gBACAA,EAAAA,EAAA,cAAgB,MAAA,EAAhB,gBAGAA,EAAAA,EAAA,4BAA8B,IAAA,EAA9B,8BACAA,EAAAA,EAAA,iBAAmB,MAAA,EAAnB,mBACAA,EAAAA,EAAA,qBAAuB,MAAA,EAAvB,uBACAA,EAAAA,EAAA,oBAAsB,MAAA,EAAtB,sBACAA,EAAAA,EAAA,kBAAoB,MAAA,EAApB,oBACAA,EAAAA,EAAA,qBAAuB,MAAA,EAAvB,uBACAA,EAAAA,EAAA,4BAA8B,MAAA,EAA9B,8BACAA,EAAAA,EAAA,kBAAoB,MAAA,EAApB,oBACAA,EAAAA,EAAA,mBAAqB,MAAA,EAArB,qBACAA,EAAAA,EAAA,mBAAqB,MAAA,EAArB,qBACAA,EAAAA,EAAA,iBAAmB,MAAA,EAAnB,mBACAA,EAAAA,EAAA,sBAAwB,MAAA,EAAxB,wBACAA,EAAAA,EAAA,kBAAoB,MAAA,EAApB,oBACAA,EAAAA,EAAA,sBAAwB,MAAA,EAAxB,wBACAA,EAAAA,EAAA,SAAW,MAAA,EAAX,WACAA,EAAAA,EAAA,gBAAkB,MAAA,EAAlB,kBACAA,EAAAA,EAAA,mBAAqB,MAAA,EAArB,qBACAA,EAAAA,EAAA,gBAAkB,MAAA,EAAlB,kBA1BUA,IAAAA,GAAA,CAAA,CAAA,ECgCAC,GAAAA,IACVA,EAAA,SAAW,qBACXA,EAAA,QAAU,oBACVA,EAAA,SAAW,oBAHDA,IAAAA,GAAA,CAAA,CAAA,EAMAC,GAAAA,IACVA,EAAA,gBAAkB,mBAClBA,EAAA,eAAiB,kBACjBA,EAAA,kBAAoB,qBAHVA,IAAAA,GAAA,CAAA,CAAA,EAoBAC,GAAAA,IACVA,EAAA,aAAe,4BACfA,EAAA,kBAAoB,kCACpBA,EAAA,mBAAqB,mCACrBA,EAAA,oBAAsB,mCACtBA,EAAA,sBAAwB,qCACxBA,EAAA,WAAa,0BACbA,EAAA,gBAAkB,+BAClBA,EAAA,YAAc,0BACdA,EAAA,WAAa,qBACbA,EAAA,OAAS,oBACTA,EAAA,YAAc,0BACdA,EAAA,aAAe,sBACfA,EAAA,qBAAuB,mCACvBA,EAAA,qBAAuB,yCACvBA,EAAA,0BAA4B,+CAC5BA,EAAA,2BAA6B,2CAC7BA,EAAA,4BAA8B,gDAC9BA,EAAA,mBAAqB,uCACrBA,EAAA,wBAA0B,4CAC1BA,EAAA,oBAAsB,uCACtBA,EAAA,mBAAqB,uCACrBA,EAAA,eAAiB,iCACjBA,EAAA,oBAAsB,uCACtBA,EAAA,kBAAoB,2BACpBA,EAAA,gBAAkB,sBAClBA,EAAA,QAAU,iBACVA,EAAA,OAAS,eACTA,EAAA,YAAc,qBACdA,EAAA,YAAc,qBACdA,EAAA,YAAc,qBACdA,EAAA,sBAAwB,uBACxBA,EAAA,WAAa,gBAGbA,EAAA,eAAiB,6BACjBA,EAAA,uBAAyB,0CACzBA,EAAA,kBAAoB,uBACpBA,EAAA,YAAc,kBACdA,EAAA,MAAQ,WACRA,EAAA,UAAY,wBACZA,EAAA,UAAY,wBACZA,EAAA,SAAW,kBACXA,EAAA,WAAa,yBACbA,EAAA,iBAAmB,4BACnBA,EAAA,YAAc,qBACdA,EAAA,aAAe,sBACfA,EAAA,SAAW,mBACXA,EAAA,UAAY,6BACZA,EAAA,WAAa,8BACbA,EAAA,2BAA6B,sCAC7BA,EAAA,sBAAwB,uCACxBA,EAAA,oBAAsB,0BApDZA,IAAAA,GAAA,CAAA,CAAA,EC1EL,IAAKC,GAAAA,IACVA,EAAA,sBAAwB,wBACxBA,EAAA,oBAAsB,sBACtBA,EAAA,mBAAqB,qBACrBA,EAAA,mBAAqB,qBACrBA,EAAA,mBAAqB,qBACrBA,EAAA,0BAA4B,4BAC5BA,EAAA,gCAAkC,kCAClCA,EAAA,WAAa,aACbA,EAAA,qBAAuB,uBACvBA,EAAA,kCAAoC,oCACpCA,EAAA,iCAAmC,mCACnCA,EAAA,sBAAwB,wBAZdA,IAAAA,GAAA,CAAA,CAAA,EAeAC,GAAAA,IACVA,EAAA,qBAAuB,uBACvBA,EAAA,kCAAoC,oCACpCA,EAAA,gCAAkC,iCAClCA,EAAA,WAAa,aAJHA,IAAAA,GAAA,CAAA,CAAA,ECjBAC,GAAAA,IACVA,EAAA,YAAc,eACdA,EAAA,IAAM,MACNA,EAAA,SAAW,WAHDA,IAAAA,GAAA,CAAA,CAAA,EC8IAC,GAAAA,IACVA,EAAA,MAAQ,QADEA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,UAAY,aACZA,EAAA,oBAAsB,wBAFZA,IAAAA,GAAA,CAAA,CAAA,EAKAC,GAAAA,IACVA,EAAA,eAAiB,mBACjBA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBACrBA,EAAA,OAAS,SALCA,IAAAA,GAAA,CAAA,CAAA,EAQAC,GAAAA,IACVA,EAAA,aAAe,iBACfA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBACrBA,EAAA,OAAS,SACTA,EAAA,MAAQ,QANEA,IAAAA,GAAA,CAAA,CAAA,EASAC,GAAAA,IACVA,EAAA,WAAa,eACbA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,eAAiB,kBACjBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBATZA,IAAAA,GAAA,CAAA,CAAA,EAYAC,GAAAA,IACVA,EAAA,aAAe,iBACfA,EAAA,gBAAkB,oBAClBA,EAAA,cAAgB,kBAChBA,EAAA,gBAAkB,oBAClBA,EAAA,cAAgB,kBAChBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBACtBA,EAAA,eAAiB,kBACjBA,EAAA,mBAAqB,uBAVXA,IAAAA,GAAA,CAAA,CAAA,EAaAC,GAAAA,IACVA,EAAA,MAAQ,eADEA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,eAAiB,kBACjBA,EAAA,oBAAsB,wBACtBA,EAAA,8BAAgC,mCAChCA,EAAA,4BAA8B,iCAJpBA,IAAAA,GAAA,CAAA,CAAA,EAOAC,GAAAA,IACVA,EAAA,MAAQ,4BACRA,EAAA,OAAS,0CACTA,EAAA,eAAiB,uCACjBA,EAAA,cAAgB,0BAJNA,IAAAA,GAAA,CAAA,CAAA,EAOAC,GAAAA,IACVA,EAAA,mCAAqC,yCACrCA,EAAA,0BAA4B,+BAC5BA,EAAA,gBAAkB,wCAClBA,EAAA,aAAe,iDACfA,EAAA,UAAY,8CACZA,EAAA,oBAAsB,yDANZA,IAAAA,GAAA,CAAA,CAAA,EASAC,GAAAA,IACVA,EAAA,kBAAoB,mCACpBA,EAAA,OAAS,4CACTA,EAAA,eAAiB,mCAHPA,IAAAA,GAAA,CAAA,CAAA,EAMAC,GAAAA,IACVA,EAAA,+BAAiC,2CACjCA,EAAA,aAAe,4BACfA,EAAA,gBAAkB,0CAClBA,EAAA,aAAe,mDACfA,EAAA,UAAY,gDACZA,EAAA,oBAAsB,2DACtBA,EAAA,aAAe,gCACfA,EAAA,mBAAqB,uCARXA,IAAAA,GAAA,CAAA,CAAA,EAWAC,GAAAA,IACVA,EAAA,eAAiB,wBADPA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,OAAS,mBADCA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,mBAAqB,uBACrBA,EAAA,cAAgB,kBAChBA,EAAA,iBAAmB,qBAHTA,IAAAA,GAAA,CAAA,CAAA,EAKAC,GAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,OAAS,mBAFCA,IAAAA,GAAA,CAAA,CAAA,EAKAC,GAAAA,IACVA,EAAA,iBAAmB,qBACnBA,EAAA,cAAgB,kBAChBA,EAAA,oBAAsB,wBAHZA,IAAAA,GAAA,CAAA,CAAA,EAMAC,GAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,OAAS,qBAHCA,IAAAA,GAAA,CAAA,CAAA,ECnQAC,GAAAA,IACVA,EAAA,QAAU,UADAA,IAAAA,GAAA,CAAA,CAAA,ECiBAC,GAAAA,IACVA,EAAA,aAAe,iBADLA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,aAAe,6BADLA,IAAAA,GAAA,CAAA,CAAA,EAyCAC,GAAAA,IACVA,EAAA,oBAAsB,yBACtBA,EAAA,aAAe,iBACfA,EAAA,4BAA8B,iCAC9BA,EAAA,qBAAuB,yBACvBA,EAAA,eAAiB,mBACjBA,EAAA,sBAAwB,0BACxBA,EAAA,sBAAwB,0BAPdA,IAAAA,GAAA,CAAA,CAAA,EAUAC,GAAAA,IACVA,EAAA,mBAAqB,wBACrBA,EAAA,YAAc,gBACdA,EAAA,OAAS,SACTA,EAAA,qBAAuB,0BAJbA,IAAAA,GAAA,CAAA,CAAA,EA6BAC,GAAAA,IACVA,EAAA,YAAc,eADJA,IAAAA,GAAA,CAAA,CAAA,EA8CAC,IAAAA,IACVA,EAAA,WAAa,eACbA,EAAA,eAAiB,kBACjBA,EAAA,cAAgB,kBAChBA,EAAA,YAAc,eACdA,EAAA,iBAAmB,oBACnBA,EAAA,oBAAsB,wBANZA,IAAAA,IAAA,CAAA,CAAA,EASAC,IAAAA,IACVA,EAAA,OAAS,SACTA,EAAA,UAAY,kBACZA,EAAA,UAAY,iBACZA,EAAA,YAAc,eAJJA,IAAAA,IAAA,CAAA,CAAA,EC3FAC,IAAAA,IACVA,EAAA,QAAU,uBACVA,EAAA,QAAU,uBACVA,EAAA,UAAY,yBACZA,EAAA,WAAa,aAJHA,IAAAA,IAAA,CAAA,CAAA,EC5DAC,IAAAA,IACVA,EAAA,kBAAoB,6BADVA,IAAAA,IAAA,CAAA,CAAA,ECPAC,IAAAA,IACVA,EAAA,iBAAmB,qBADTA,IAAAA,IAAA,CAAA,CAAA,ECCAC,IAAAA,IACVA,EAAA,OAAS,SACTA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBAJXA,IAAAA,IAAA,CAAA,CAAA,EAOAC,IAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBALZA,IAAAA,IAAA,CAAA,CAAA,EAuBAC,IAAAA,IACVA,EAAA,SAAW,YADDA,IAAAA,IAAA,CAAA,CAAA,EAIAC,IAAAA,IACVA,EAAA,WAAa,cADHA,IAAAA,IAAA,CAAA,CAAA,EChBAC,GAAAA,IACVA,EAAA,OAAS,SACTA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBAJXA,IAAAA,GAAA,CAAA,CAAA,EAMAC,GAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBALZA,IAAAA,GAAA,CAAA,CAAA,ECtBL,IAAMC,EAAN,KAAgB,CAIrB,OAAO,OAAOC,EAA6B,CAGzC,OAFe,WAAW,KAAK,OAAO,aAAa,GAAG,IAAI,WAAWA,CAAM,CAAC,CAAC,EAE/D,QAAQ,KAAM,EAAE,EAAE,QAAQ,MAAO,GAAG,EAAE,QAAQ,MAAO,GAAG,CACxE,CAKA,OAAO,OAAOC,EAAgC,CAC5C,IAAMC,EAASD,EAAU,QAAQ,KAAM,GAAG,EAAE,QAAQ,KAAM,GAAG,EACvDE,EAAS,WAAW,KAAKD,CAAM,EAC/BE,EAAM,IAAI,WAAWD,EAAO,MAAM,EAExC,QAASE,EAAI,EAAGA,EAAIF,EAAO,OAAQE,IACjCD,EAAIC,CAAC,EAAIF,EAAO,WAAWE,CAAC,EAG9B,OAAOD,EAAI,MACb,CACF,ECzBA,SAASE,GAAiCC,EAAuE,CAI/G,MAHI,SAAOA,GAAU,UAIlBA,GAA0C,oBAAsB,QACjE,OAAQA,GAA0C,mBAAsB,SAK5E,CAEA,SAASC,GAAmCD,EAAyE,CAInH,MAHI,SAAOA,GAAU,UAIlBA,GAA4C,oBAAsB,QACnE,OAAQA,GAA4C,mBAAsB,SAK9E,CAOO,SAASE,EAAOC,EAAoD,CAEzE,GAAI,OAAOA,EAAK,QAAW,WACzB,OAAOA,EAAK,OAAO,EAGrB,GAAI,CACF,IAAMC,EAAKD,EAAK,GACVE,EAAQC,EAAU,OAAOH,EAAK,KAAK,EACnCI,EAA0BJ,EAAK,wBAC/BK,EAAyB,CAAC,EAC1BC,EAAON,EAAK,KAGlB,GAAIJ,GAAiCI,EAAK,QAAQ,EAChD,MAAO,CACL,GAAAC,EACA,MAAAC,EACA,SAAU,CACR,kBAAmBC,EAAU,OAAOH,EAAK,SAAS,iBAAiB,EACnE,eAAgBG,EAAU,OAAOH,EAAK,SAAS,cAAc,EAC7D,UAAWG,EAAU,OAAOH,EAAK,SAAS,SAAS,EACnD,WAAYA,EAAK,SAAS,WAAaG,EAAU,OAAOH,EAAK,SAAS,UAAU,EAAI,MACtF,EACA,wBAAAI,EACA,uBAAAC,EACA,KAAAC,CACF,EAGF,GAAIR,GAAmCE,EAAK,QAAQ,EAElD,MAAO,CACL,GAAAC,EACA,MAAAC,EACA,SAAU,CACR,eAAgBC,EAAU,OAAOH,EAAK,SAAS,cAAc,EAC7D,kBAAmBG,EAAU,OAAOH,EAAK,SAAS,iBAAiB,EACnE,WAAYA,EAAK,UAAU,cAAc,GAAK,CAAC,CACjD,EACA,wBAAAI,EACA,uBAAAC,EACA,KAAAC,CACF,EAGF,MAAM,IAAI,MAAM,oBAAoB,CACtC,OAASC,EAAO,CACd,cAAQ,MAAMA,CAAK,EACbA,CACR,CACF,CdzEO,IAAMC,EAAN,cAAgCC,GAAU,QAA0B,CACzE,KAAO,WACP,OAAc,CAAC,EAEP,+BAAgC,CACtC,KAAK,qCAAuD,4CAA6C,CAAC,CAAC,CAC7G,CAEQ,mCAAmCC,EAAiB,CAC1D,KAAK,+CAAgE,8BAA8BA,CAAO,GAAI,CAAC,CAAC,CAClH,CAEA,MAAa,gBAAgBC,EAA8C,CACzE,GAAI,CAAC,OAAO,oBACV,MAAM,KAAK,8BAA8B,EAE3C,GAAM,CAAE,SAAAC,EAAU,SAAAC,EAAW,GAAI,aAAAC,EAAc,SAAAC,CAAS,EAAIJ,GAAiB,CAAC,EAExE,CAAE,oBAAAK,EAAqB,kBAAAC,CAAkB,EAAI,MAAM,KAAK,QAC5D,KAAK,MAAM,gEAA6E,CAAC,CAAE,SAAAL,CAAS,CAAC,CAAC,CACxG,EAEIM,EACJ,GAAI,CACFA,EAAc,MAAM,UAAU,YAAY,OAAO,CAC/C,UAAWF,CACb,CAAC,CACH,OAASG,EAAU,CACjB,MAAM,KAAK,mCAAmCA,CAAG,CACnD,CAEA,OAAO,KAAK,QACV,KAAK,MAAM,iEAA8E,CACvF,CACE,kBAAAF,EACA,qBAAsBG,EAAOF,CAAU,EACvC,SAAAL,EACA,UAAWK,EAAW,SAAS,cAAc,EAC7C,UAAW,UAAU,UACrB,aAAAJ,EACA,SAAAC,CACF,CACF,CAAC,CACH,CACF,CAEO,MAAMJ,EAAgD,CAC3D,GAAM,CAAE,SAAAC,EAAU,aAAAS,EAAc,aAAAP,EAAc,SAAAC,CAAS,EAAIJ,GAAiB,CAAC,EAEzEW,EAEEC,EAAa,KAAK,MAAM,iBAAsD,MAAOC,EAASC,IAAW,CAC7G,GAAI,CAAC,OAAO,oBACV,OAAOA,EAAO,KAAK,8BAA8B,CAAC,EAGpD,GAAM,CAAE,oBAAAC,EAAqB,sBAAAC,CAAsB,EAAI,MAAM,KAAK,QAChE,KAAK,MAAM,kEAA8E,CAAC,CAAE,SAAAf,CAAS,CAAC,CAAC,CACzG,EAEIgB,EACJ,GAAI,CACFA,EAAa,MAAM,UAAU,YAAY,IAAI,CAC3C,UAAWD,CACb,CAAC,CACH,OAASR,EAAU,CACjB,OAAOM,EAAO,KAAK,mCAAmCN,CAAG,CAAC,CAC5D,CAEA,IAAMU,EAAiB,KAAK,MAAM,mEAA+E,CAC/G,CACE,oBAAAH,EACA,kBAAmBN,EAAOQ,CAAS,EACnC,OAAQP,EACR,aAAAP,EACA,SAAAC,CACF,CACF,CAAC,EAEDO,EAAkBO,EAAe,GAEjC,IAAMC,EAAe,KAAK,QAA6CD,CAAc,EAEhFR,IACHS,EAAa,GAAGC,EAA0B,cAAe,IAAM,CAC7DR,EAAW,KAAKQ,EAA0B,aAAa,CACzD,CAAC,EACDD,EAAa,GAAGC,EAA0B,cAAe,IAAM,CAC7DR,EAAW,KAAKQ,EAA0B,aAAa,CACzD,CAAC,EACDD,EAAa,GAAGC,EAA0B,uBAAwB,IAAM,CACtER,EAAW,KAAKQ,EAA0B,sBAAsB,CAClE,CAAC,EACDD,EAAa,GAAGC,EAA0B,oBAAqB,IAAM,CACnER,EAAW,KAAKQ,EAA0B,mBAAmB,CAC/D,CAAC,EACDD,EAAa,GAAGC,EAA0B,oBAAqB,IAAM,CACnER,EAAW,KAAKQ,EAA0B,mBAAmB,CAC/D,CAAC,GAGH,GAAI,CACF,IAAMC,EAAS,MAAMF,EACrBN,EAAQQ,CAAM,CAChB,OAASC,EAAO,CACdR,EAAOQ,CAAK,CACd,CACF,CAAC,EAED,MAAI,CAACZ,GAAgBE,IACnBA,EAAW,GAAGW,EAAoB,cAAgBC,GAAgB,CAChE,KAAK,wBAAwBD,EAAoB,cAAeZ,CAAe,EAAEa,CAAG,CACtF,CAAC,EACDZ,EAAW,GAAGW,EAAoB,WAAY,IAAM,CAClD,KAAK,wBAAwBA,EAAoB,WAAYZ,CAAe,EAAE,CAChF,CAAC,EACDC,EAAW,GAAGW,EAAoB,mBAAqBE,GAAyB,CAC9E,KAAK,wBAAwBF,EAAoB,mBAAoBZ,CAAe,EAAEc,CAAY,CACpG,CAAC,EACDb,EAAW,GAAGW,EAAoB,OAAQ,IAAM,CAC9C,KAAK,wBAAwBA,EAAoB,OAAQZ,CAAe,EAAE,CAC5E,CAAC,GAGIC,CACT,CAEO,WAAWZ,EAAgD,CAChE,GAAM,CAAE,GAAA0B,EAAI,SAAAxB,CAAS,EAAIF,EACnBkB,EAAiB,KAAK,MAAM,yDAA2E,CAC3G,CACE,sBAAuBQ,EACvB,SAAAxB,CACF,CACF,CAAC,EACD,OAAO,KAAK,QAAegB,CAAc,CAC3C,CAEO,iBAAiBQ,EAAY,CAClC,IAAMR,EAAiB,KAAK,MAAM,6DAAgF,CAChH,CACE,sBAAuBQ,CACzB,CACF,CAAC,EAED,OAAO,KAAK,QAAaR,CAAc,CACzC,CAEA,MAAa,kBAAkBhB,EAAW,GAAI,CAC5C,GAAI,CAAC,OAAO,oBACV,MAAM,KAAK,8BAA8B,EAE3C,IAAMyB,EAAU,MAAM,KAAK,QACzB,KAAK,MAAM,wEAAmF,CAAC,CAAC,CAClG,EAEIpB,EACJ,GAAI,CACFA,EAAc,MAAM,UAAU,YAAY,OAAO,CAC/C,UAAWoB,EAAQ,kBACrB,CAAC,CACH,OAASnB,EAAU,CACjB,MAAM,KAAK,mCAAmCA,CAAG,CACnD,CAEA,OAAO,KAAK,QACV,KAAK,MAAM,kEAA8E,CACvF,CACE,SAAAN,EACA,UAAWK,EAAW,SAAS,cAAc,EAC7C,WAAY,UAAU,UACtB,sBAAuBE,EAAOF,CAAU,CAC1C,CACF,CAAC,CACH,CACF,CAEO,aAAc,CACnB,IAAMW,EAAiB,KAAK,MAAM,kEAAwE,CAAC,CAAC,EAC5G,OAAO,KAAK,QAAeA,CAAc,CAC3C,CACF",
6
6
  "names": ["Extension", "SDKErrorCode", "SDKWarningCode", "RPCErrorCode", "LocalStorageKeys", "ThirdPartyWalletEvents", "MagicPayloadMethod", "MagicIncomingWindowMessage", "MagicOutgoingWindowMessage", "DeepLinkPage", "LoginWithMagicLinkEventEmit", "LoginWithMagicLinkEventOnReceived", "LoginWithEmailOTPEventEmit", "LoginWithSmsOTPEventEmit", "LoginWithSmsOTPEventOnReceived", "LoginWithEmailOTPEventOnReceived", "DeviceVerificationEventEmit", "DeviceVerificationEventOnReceived", "RecencyCheckEventEmit", "RecencyCheckEventOnReceived", "UpdateEmailEventEmit", "UpdateEmailEventOnReceived", "AuthEventOnReceived", "FarcasterLoginEventEmit", "EnableMFAEventOnReceived", "EnableMFAEventEmit", "DisableMFAEventOnReceived", "DisableMFAEventEmit", "EthChainType", "UserEventsEmit", "UserEventsOnReceived", "RecoveryFactorEventOnReceived", "RecoveryFactorEventEmit", "RecoveryMethodType", "RecoverAccountEventOnReceived", "RecoverAccountEventEmit", "NftCheckoutIntermediaryEvents", "WalletEventOnReceived", "UiEventsEmit", "OAuthMFAEventEmit", "OAuthMFAEventOnReceived", "OAuthPopupEventOnReceived", "OAuthPopupEventEmit", "PasskeyMFAEventEmit", "PasskeyMFAEventOnReceived", "Base64URL", "buffer", "base64url", "base64", "binStr", "bin", "i", "isAuthenticatorAssertionResponse", "value", "isAuthenticatorAttestationResponse", "toJSON", "cred", "id", "rawId", "Base64URL", "authenticatorAttachment", "clientExtensionResults", "type", "error", "WebAuthnExtension", "Extension", "message", "configuration", "username", "nickname", "skipDIDToken", "lifespan", "registrationOptions", "registrationToken", "credential", "err", "toJSON", "showMfaModal", "verifyPayloadId", "promiEvent", "resolve", "reject", "authenticationToken", "authenticationOptions", "assertion", "requestPayload", "loginRequest", "ie", "result", "error", "te", "mfa", "recoveryCode", "id", "options"]
7
7
  }
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../src/index.ts", "../../../../@magic-sdk/types/src/core/exception-types.ts", "../../../../@magic-sdk/types/src/core/json-rpc-types.ts", "../../../../@magic-sdk/types/src/core/message-types.ts", "../../../../@magic-sdk/types/src/core/deep-link-pages.ts", "../../../../@magic-sdk/types/src/modules/auth-types.ts", "../../../../@magic-sdk/types/src/modules/rpc-provider-types.ts", "../../../../@magic-sdk/types/src/modules/user-types.ts", "../../../../@magic-sdk/types/src/modules/nft-types.ts", "../../../../@magic-sdk/types/src/modules/wallet-types.ts", "../../../../@magic-sdk/types/src/modules/common-types.ts", "../../../../@magic-sdk/types/src/modules/oauth-types.ts", "../../../../@magic-sdk/types/src/modules/webauthn-types.ts", "../../src/utils/base64.ts", "../../src/utils/polyfills.ts"],
4
- "sourcesContent": ["import { Extension } from '@magic-sdk/provider';\nimport {\n RegisterNewUserConfiguration,\n LoginWithWebAuthnConfiguration,\n MagicWebAuthnPayloadMethod,\n WebAuthnSDKErrorCode,\n UpdateWebAuthnInfoConfiguration,\n} from './types';\nimport { PasskeyResult, PasskeyEventHandlers, PasskeyMFAEventEmit, PasskeyMFAEventOnReceived } from '@magic-sdk/types';\nimport { toJSON } from './utils/polyfills';\n\nexport class WebAuthnExtension extends Extension.Internal<'webauthn', any> {\n name = 'webauthn' as const;\n config: any = {};\n\n private createWebAuthnNotSupportError() {\n this.createError(WebAuthnSDKErrorCode.WebAuthnNotSupported, 'WebAuthn is not supported in this device.', {});\n }\n\n private createWebAuthCreateCredentialError(message: string) {\n this.createError(WebAuthnSDKErrorCode.WebAuthnCreateCredentialError, `Error creating credential: ${message}`, {});\n }\n\n public async registerNewUser(configuration?: RegisterNewUserConfiguration) {\n if (!window.PublicKeyCredential) {\n throw this.createWebAuthnNotSupportError();\n }\n const { username, nickname = '', skipDIDToken, lifespan } = configuration ?? {};\n\n const { registrationOptions, registrationToken } = await this.request<any>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterPasskeyStart, [{ username }]),\n );\n\n let credential;\n try {\n credential = (await navigator.credentials.create({\n publicKey: registrationOptions,\n })) as any;\n } catch (err: any) {\n throw this.createWebAuthCreateCredentialError(err);\n }\n\n return this.request<string | null>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterPasskeyVerify, [\n {\n registrationToken,\n registrationResponse: toJSON(credential),\n nickname,\n transport: credential.response.getTransports(),\n userAgent: navigator.userAgent,\n skipDIDToken,\n lifespan,\n },\n ]),\n );\n }\n\n public login(configuration?: LoginWithWebAuthnConfiguration) {\n const { username, showMfaModal, skipDIDToken, lifespan } = configuration ?? {};\n\n let verifyPayloadId: string;\n\n const promiEvent = this.utils.createPromiEvent<PasskeyResult, PasskeyEventHandlers>(async (resolve, reject) => {\n if (!window.PublicKeyCredential) {\n return reject(this.createWebAuthnNotSupportError());\n }\n\n const { authenticationToken, authenticationOptions } = await this.request<any>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.LoginWithPasskeyStart, [{ username }]),\n );\n\n let assertion;\n try {\n assertion = (await navigator.credentials.get({\n publicKey: authenticationOptions,\n })) as any;\n } catch (err: any) {\n return reject(this.createWebAuthCreateCredentialError(err));\n }\n\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.LoginWithPasskeyVerify, [\n {\n authenticationToken,\n assertionResponse: toJSON(assertion),\n showUI: showMfaModal,\n skipDIDToken,\n lifespan,\n },\n ]);\n\n verifyPayloadId = requestPayload.id as string;\n\n const loginRequest = this.request<PasskeyResult, PasskeyEventHandlers>(requestPayload);\n\n if (!showMfaModal) {\n loginRequest.on(PasskeyMFAEventOnReceived.MfaSentHandle, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.MfaSentHandle);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.InvalidMfaOtp, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.InvalidMfaOtp);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.RecoveryCodeSentHandle, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.RecoveryCodeSentHandle);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.InvalidRecoveryCode, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.InvalidRecoveryCode);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.RecoveryCodeSuccess, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.RecoveryCodeSuccess);\n });\n }\n\n try {\n const result = await loginRequest;\n resolve(result);\n } catch (error) {\n reject(error);\n }\n });\n\n if (!showMfaModal && promiEvent) {\n promiEvent.on(PasskeyMFAEventEmit.VerifyMFACode, (mfa: string) => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.VerifyMFACode, verifyPayloadId)(mfa);\n });\n promiEvent.on(PasskeyMFAEventEmit.LostDevice, () => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.LostDevice, verifyPayloadId)();\n });\n promiEvent.on(PasskeyMFAEventEmit.VerifyRecoveryCode, (recoveryCode: string) => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.VerifyRecoveryCode, verifyPayloadId)(recoveryCode);\n });\n promiEvent.on(PasskeyMFAEventEmit.Cancel, () => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.Cancel, verifyPayloadId)();\n });\n }\n\n return promiEvent;\n }\n\n public updateInfo(configuration: UpdateWebAuthnInfoConfiguration) {\n const { id, nickname } = configuration;\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.UpdateWebAuthnInfo, [\n {\n webAuthnCredentialsId: id,\n nickname,\n },\n ]);\n return this.request<any[]>(requestPayload);\n }\n\n public unregisterDevice(id: string) {\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.UnregisterWebAuthDevice, [\n {\n webAuthnCredentialsId: id,\n },\n ]);\n\n return this.request<any>(requestPayload);\n }\n\n public async registerNewDevice(nickname = '') {\n if (!window.PublicKeyCredential) {\n throw this.createWebAuthnNotSupportError();\n }\n const options = await this.request<any>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterWebAuthDeviceStart, []),\n );\n\n let credential;\n try {\n credential = (await navigator.credentials.create({\n publicKey: options.credential_options,\n })) as any;\n } catch (err: any) {\n throw this.createWebAuthCreateCredentialError(err);\n }\n\n return this.request<string | null>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterWebAuthDevice, [\n {\n nickname,\n transport: credential.response.getTransports(),\n user_agent: navigator.userAgent,\n registration_response: toJSON(credential),\n },\n ]),\n );\n }\n\n public getMetadata() {\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.GetWebAuthnInfo, []);\n return this.request<any[]>(requestPayload);\n }\n}\n", "export enum SDKErrorCode {\n MissingApiKey = 'MISSING_API_KEY',\n ModalNotReady = 'MODAL_NOT_READY',\n ConnectionLost = 'CONNECTION_WAS_LOST',\n MalformedResponse = 'MALFORMED_RESPONSE',\n InvalidArgument = 'INVALID_ARGUMENT',\n ExtensionNotInitialized = 'EXTENSION_NOT_INITIALIZED',\n IncompatibleExtensions = 'INCOMPATIBLE_EXTENSIONS',\n}\n\nexport enum SDKWarningCode {\n SyncWeb3Method = 'SYNC_WEB3_METHOD',\n DuplicateIframe = 'DUPLICATE_IFRAME',\n ReactNativeEndpointConfiguration = 'REACT_NATIVE_ENDPOINT_CONFIGURATION',\n DeprecationNotice = 'DEPRECATION_NOTICE',\n ProductAnnouncement = 'ANNOUNCEMENT',\n}\n\nexport enum RPCErrorCode {\n // Standard JSON RPC 2.0 Error Codes\n ParseError = -32700,\n InvalidRequest = -32600,\n MethodNotFound = -32601,\n InvalidParams = -32602,\n InternalError = -32603,\n\n // Custom RPC Error Codes\n MagicLinkFailedVerification = -10000,\n MagicLinkExpired = -10001,\n MagicLinkRateLimited = -10002,\n UserAlreadyLoggedIn = -10003,\n UpdateEmailFailed = -10004,\n UserRequestEditEmail = -10005,\n MagicLinkInvalidRedirectURL = -10006,\n InactiveRecipient = -10010,\n AccessDeniedToUser = -10011,\n UserRejectedAction = -10012,\n RequestCancelled = -10014,\n RedirectLoginComplete = -10015,\n SessionTerminated = -10016,\n PopupRequestOverriden = -10017,\n SanEmail = -10018,\n DpopInvalidated = -10019,\n MaxAttemptsReached = -10031,\n UserRequiredMfa = -10033,\n}\n\nexport type ErrorCode = SDKErrorCode | RPCErrorCode;\nexport type WarningCode = SDKWarningCode;\n", "import { RPCErrorCode } from './exception-types';\n\n// --- Request interfaces\n\nexport interface JsonRpcRequestPayload<TParams = any> {\n jsonrpc: string;\n id: string | number | null;\n method: string;\n params?: TParams;\n}\n\nexport interface JsonRpcRequestCallback {\n /** Callback executed upon JSON RPC response. */\n (err: JsonRpcError | null, result?: JsonRpcResponsePayload | null): void;\n}\n\nexport interface JsonRpcBatchRequestCallback {\n /** Callback executed upon JSON RPC response. */\n (err: JsonRpcError | null, result?: (JsonRpcResponsePayload | null)[] | null): void;\n}\n\n// --- Response interfaces\n\nexport interface JsonRpcError {\n message: string;\n code: RPCErrorCode;\n data?: any;\n}\n\nexport interface JsonRpcResponsePayload<ResultType = any> {\n jsonrpc: string;\n id: string | number | null;\n result?: ResultType | null;\n error?: JsonRpcError | null;\n}\n\nexport interface UserInfo {\n email?: string;\n}\n\nexport type ShowUIPromiEvents = {\n disconnect: () => void;\n};\n\nexport interface RequestUserInfoScope {\n scope?: {\n email?: 'required' | 'optional';\n };\n}\n\nexport enum LocalStorageKeys {\n PROVIDER = 'magic_3pw_provider',\n ADDRESS = 'magic_3pw_address',\n CHAIN_ID = 'magic_3pw_chainId',\n}\n\nexport enum ThirdPartyWalletEvents {\n WalletConnected = 'wallet_connected',\n WalletRejected = 'wallet_rejected',\n Web3ModalSelected = 'web3modal_selected',\n}\n\nexport interface ConnectWithUIOptions {\n autoPromptThirdPartyWallets?: boolean;\n}\n\nexport type ConnectWithUiEvents = {\n 'id-token-created': (params: { idToken: string }) => void;\n} & { [key in ThirdPartyWalletEvents]: () => void };\n\n// --- Payload methods\n\n/**\n * Enum of JSON RPC methods for interacting with the Magic SDK authentication\n * relayer.\n */\nexport enum MagicPayloadMethod {\n LoginWithSms = 'magic_auth_login_with_sms',\n LoginWithEmailOTP = 'magic_auth_login_with_email_otp',\n LoginWithMagicLink = 'magic_auth_login_with_magic_link',\n LoginWithCredential = 'magic_auth_login_with_credential',\n SetAuthorizationToken = 'magic_auth_set_authorization_token',\n GetIdToken = 'magic_auth_get_id_token',\n GenerateIdToken = 'magic_auth_generate_id_token',\n GetMetadata = 'magic_auth_get_metadata',\n IsLoggedIn = 'magic_is_logged_in',\n Logout = 'magic_auth_logout',\n UpdateEmail = 'magic_auth_update_email',\n UserSettings = 'magic_auth_settings',\n UserSettingsTestMode = 'magic_auth_settings_testing_mode',\n LoginWithSmsTestMode = 'magic_auth_login_with_sms_testing_mode',\n LoginWithEmailOTPTestMode = 'magic_auth_login_with_email_otp_testing_mode',\n LoginWithMagicLinkTestMode = 'magic_login_with_magic_link_testing_mode',\n LoginWithCredentialTestMode = 'magic_auth_login_with_credential_testing_mode',\n GetIdTokenTestMode = 'magic_auth_get_id_token_testing_mode',\n GenerateIdTokenTestMode = 'magic_auth_generate_id_token_testing_mode',\n GetMetadataTestMode = 'magic_auth_get_metadata_testing_mode',\n IsLoggedInTestMode = 'magic_auth_is_logged_in_testing_mode',\n LogoutTestMode = 'magic_auth_logout_testing_mode',\n UpdateEmailTestMode = 'magic_auth_update_email_testing_mode',\n IntermediaryEvent = 'magic_intermediary_event',\n RequestAccounts = 'eth_requestAccounts',\n GetInfo = 'magic_get_info',\n ShowUI = 'magic_wallet',\n NFTPurchase = 'magic_nft_purchase',\n NFTCheckout = 'magic_nft_checkout',\n NFTTransfer = 'magic_nft_transfer',\n RequestUserInfoWithUI = 'mc_request_user_info',\n Disconnect = 'mc_disconnect',\n // UpdatePhoneNumber = 'magic_auth_update_phone_number',\n // UpdatePhoneNumberTestMode = 'magic_auth_update_phone_number_testing_mode',\n RecoverAccount = 'magic_auth_recover_account',\n RecoverAccountTestMode = 'magic_auth_recover_account_testing_mode',\n MagicBoxHeartBeat = 'magic_box_heart_beat',\n AutoConnect = 'mc_auto_connect',\n Login = 'mc_login',\n EncryptV1 = 'magic_auth_encrypt_v1',\n DecryptV1 = 'magic_auth_decrypt_v1',\n ShowNFTs = 'magic_show_nfts',\n ShowOnRamp = 'magic_show_fiat_onramp',\n ShowSendTokensUI = 'magic_show_send_tokens_ui',\n ShowAddress = 'magic_show_address',\n ShowBalances = 'magic_show_balances',\n RevealPK = 'magic_reveal_key',\n EnableMFA = 'magic_auth_enable_mfa_flow',\n DisableMFA = 'magic_auth_disable_mfa_flow',\n GetMultichainPublicAddress = 'magic_get_multichain_public_address',\n Sign7702Authorization = 'magic_wallet_sign_7702_authorization',\n Send7702Transaction = 'eth_send7702Transaction',\n}\n\n// Methods to not route if connected to third party wallet\nexport const routeToMagicMethods = [\n MagicPayloadMethod.IntermediaryEvent,\n MagicPayloadMethod.NFTCheckout,\n MagicPayloadMethod.Login,\n];\n", "import { JsonRpcResponsePayload, JsonRpcError, JsonRpcRequestPayload } from './json-rpc-types';\n\nexport enum MagicIncomingWindowMessage {\n MAGIC_HANDLE_RESPONSE = 'MAGIC_HANDLE_RESPONSE',\n MAGIC_OVERLAY_READY = 'MAGIC_OVERLAY_READY',\n MAGIC_SHOW_OVERLAY = 'MAGIC_SHOW_OVERLAY',\n MAGIC_HIDE_OVERLAY = 'MAGIC_HIDE_OVERLAY',\n MAGIC_HANDLE_EVENT = 'MAGIC_HANDLE_EVENT',\n MAGIC_MG_BOX_SEND_RECEIPT = 'MAGIC_MG_BOX_SEND_RECEIPT',\n MAGIC_SEND_PRODUCT_ANNOUNCEMENT = 'MAGIC_SEND_PRODUCT_ANNOUNCEMENT',\n MAGIC_PONG = 'MAGIC_PONG',\n MAGIC_POPUP_RESPONSE = 'MAGIC_POPUP_RESPONSE',\n MAGIC_POPUP_OAUTH_VERIFY_RESPONSE = 'MAGIC_POPUP_OAUTH_VERIFY_RESPONSE',\n MAGIC_THIRD_PARTY_WALLET_REQUEST = 'MAGIC_THIRD_PARTY_WALLET_REQUEST',\n MAGIC_OPEN_MOBILE_URL = 'MAGIC_OPEN_MOBILE_URL',\n}\n\nexport enum MagicOutgoingWindowMessage {\n MAGIC_HANDLE_REQUEST = 'MAGIC_HANDLE_REQUEST',\n MAGIC_THIRD_PARTY_WALLET_RESPONSE = 'MAGIC_THIRD_PARTY_WALLET_RESPONSE',\n MAGIC_THIRD_PARTY_WALLET_UPDATE = 'MAGIC_THIRD_PARTY_WALLET_EVENT',\n MAGIC_PING = 'MAGIC_PING',\n}\n\n/** The shape of responding window message data from the Magic iframe context. */\nexport interface MagicMessageRequest {\n msgType: string;\n payload: JsonRpcRequestPayload | JsonRpcRequestPayload[];\n rt?: string;\n jwt?: string;\n deviceShare?: string;\n}\n\n/** The shape of responding window message data from the Magic iframe context. */\nexport interface MagicMessageResponse<ResultType = any> {\n msgType: string;\n response: Partial<JsonRpcError> & Partial<JsonRpcResponsePayload<ResultType>>;\n rt?: string;\n deviceShare?: string;\n}\n\n/** The expected message event returned by the Magic iframe context. */\nexport interface MagicMessageEvent extends Partial<MessageEvent> {\n data: MagicMessageResponse;\n}\n\nexport interface MagicThirdPartyWalletRequest {\n msgType: MagicIncomingWindowMessage.MAGIC_THIRD_PARTY_WALLET_REQUEST;\n payload: JsonRpcRequestPayload;\n}\n\nexport interface MagicThirdPartyWalletResponse {\n msgType: `${MagicOutgoingWindowMessage.MAGIC_THIRD_PARTY_WALLET_RESPONSE}-${string}`;\n response: JsonRpcResponsePayload;\n}\n\nexport interface MagicThirdPartyWalletUpdate {\n msgType: `${MagicOutgoingWindowMessage.MAGIC_THIRD_PARTY_WALLET_UPDATE}-${string}`;\n details: {\n address: `0x${string}` | undefined;\n addresses: readonly `0x${string}`[] | undefined;\n chain: { id: number; name: string; [key: string]: unknown } | undefined;\n updatedField: 'chain' | 'address';\n };\n}\n\nexport type MagicThirdPartyWalletEventPayload = MagicThirdPartyWalletResponse | MagicThirdPartyWalletUpdate;\n", "export enum DeepLinkPage {\n UpdateEmail = 'update-email',\n MFA = 'mfa',\n Recovery = 'recovery',\n}\n", "import { WalletEventOnReceived } from './wallet-types';\n\nexport interface LoginWithMagicLinkConfiguration {\n /**\n * The email address of the user attempting to login.\n */\n email: string;\n\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to check their email for the \"magic link\" to complete their\n * authentication.\n */\n showUI?: boolean;\n\n /**\n * You can optionally provide a redirect URI that will be followed at the end\n * of the magic link flow. Don't forget to invoke\n * `magic.auth.loginWithCredential()` to complete the login from the route you\n * configure here.\n */\n redirectURI?: string;\n\n /**\n * Enterprise users with a custom SMTP can create custom email templates\n * from their dashboard. The default Magic loginWithMagicLink email will be\n * overridden when a variation is passed here.\n */\n overrides?: {\n variation?: string;\n };\n\n /**\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface LoginWithSmsConfiguration {\n /**\n * Specify the phone number of the user attempting to login.\n */\n phoneNumber: string;\n\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to check their SMS for the one time passcode (OTP) to complete their\n * authentication.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the SMS OTP flow.\n */\n showUI?: boolean;\n\n /*\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\nexport interface LoginWithEmailOTPConfiguration {\n /**\n * Specify the email address of the user attempting to login.\n */\n email: string;\n\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to check their email for the one time passcode (OTP) to complete their\n * authentication.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the email OTP flow.\n */\n showUI?: boolean;\n\n /**\n * Device Unrecognized UI will enforce showing up to secure user's login\n *\n * When set to true (default), an improved device recognition UI will be displayed to the user,\n * prompting them to verify their login by checking their email for device approval. This feature\n * enhances authentication security.\n *\n * This param will only be affected if showUI is false. When set to false,\n * developers have the flexibility to implement their own customized UI to\n * handle device check events, providing a more tailored user experience.\n */\n deviceCheckUI?: boolean;\n\n /**\n * Enterprise users with a custom SMTP can create custom email templates\n * from their dashboard. The default Magic loginWithOTP email will be\n * overridden when a variation is passed here.\n */\n overrides?: {\n variation?: string;\n appName?: string;\n assetUrl?: string;\n };\n\n /**\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface LoginWithCredentialConfiguration {\n /**\n * A credential token or a valid query string (prefixed with ? or #)\n */\n credentialOrQueryString?: string;\n\n /**\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface EnableMFAConfiguration {\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to enable MFA using Google Authenticator app.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the enable MFA flow.\n */\n showUI?: boolean;\n}\n\nexport interface DisableMFAConfiguration {\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to disable MFA.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the disable MFA flow.\n */\n showUI?: boolean;\n}\n\n/**\n * Auth Events Enum\n */\nexport enum LoginWithMagicLinkEventEmit {\n Retry = 'retry',\n}\n\nexport enum LoginWithMagicLinkEventOnReceived {\n EmailSent = 'email-sent',\n EmailNotDeliverable = 'email-not-deliverable',\n}\n\nexport enum LoginWithEmailOTPEventEmit {\n VerifyEmailOtp = 'verify-email-otp',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n Cancel = 'cancel',\n}\n\nexport enum LoginWithSmsOTPEventEmit {\n VerifySmsOtp = 'verify-sms-otp',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n Cancel = 'cancel',\n Retry = 'retry',\n}\n\nexport enum LoginWithSmsOTPEventOnReceived {\n SmsOTPSent = 'sms-otp-sent',\n InvalidSmsOtp = 'invalid-sms-otp',\n ExpiredSmsOtp = 'expired-sms-otp',\n MfaSentHandle = 'mfa-sent-handle',\n InvalidMfaOtp = 'invalid-mfa-otp',\n LoginThrottled = 'login-throttled',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n}\n\nexport enum LoginWithEmailOTPEventOnReceived {\n EmailOTPSent = 'email-otp-sent',\n InvalidEmailOtp = 'invalid-email-otp',\n InvalidMfaOtp = 'invalid-mfa-otp',\n ExpiredEmailOtp = 'expired-email-otp',\n MfaSentHandle = 'mfa-sent-handle',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n LoginThrottled = 'login-throttled',\n MaxAttemptsReached = 'max-attempts-reached',\n}\n\nexport enum DeviceVerificationEventEmit {\n Retry = 'device-retry',\n}\n\nexport enum DeviceVerificationEventOnReceived {\n DeviceApproved = 'device-approved',\n DeviceNeedsApproval = 'device-needs-approval',\n DeviceVerificationLinkExpired = 'device-verification-link-expired',\n DeviceVerificationEmailSent = 'device-verification-email-sent',\n}\n\nexport enum RecencyCheckEventEmit {\n Retry = 'Recency/auth-factor-retry',\n Cancel = 'Recency/auth-factor-verification-cancel',\n VerifyEmailOtp = 'Recency/auth-factor-verify-email-otp',\n VerifyMFACode = 'Recency/verify-mfa-code',\n}\n\nexport enum RecencyCheckEventOnReceived {\n PrimaryAuthFactorNeedsVerification = 'Recency/auth-factor-needs-verification',\n PrimaryAuthFactorVerified = 'Recency/auth-factor-verified',\n InvalidEmailOtp = 'Recency/auth-factor-invalid-email-otp',\n EmailExpired = 'Recency/auth-factor-verification-email-expired',\n EmailSent = 'Recency/auth-factor-verification-email-sent',\n EmailNotDeliverable = 'Recency/auth-factor-verification-email-not-deliverable',\n}\n\nexport enum UpdateEmailEventEmit {\n RetryWithNewEmail = 'UpdateEmail/retry-with-new-email',\n Cancel = 'UpdateEmail/new-email-verification-cancel',\n VerifyEmailOtp = 'UpdateEmail/new-email-verify-otp',\n}\n\nexport enum UpdateEmailEventOnReceived {\n NewAuthFactorNeedsVerification = 'UpdateEmail/new-email-needs-verification',\n EmailUpdated = 'UpdateEmail/email-updated',\n InvalidEmailOtp = 'UpdateEmail/new-email-invalid-email-otp',\n EmailExpired = 'UpdateEmail/new-email-verification-email-expired',\n EmailSent = 'UpdateEmail/new-email-verification-email-sent',\n EmailNotDeliverable = 'UpdateEmail/new-email-verification-email-not-deliverable',\n InvalidEmail = 'UpdateEmail/new-email-invalid',\n EmailAlreadyExists = 'UpdateEmail/new-email-already-exists',\n}\n\nexport enum AuthEventOnReceived {\n IDTokenCreated = 'Auth/id-token-created',\n}\n\nexport enum FarcasterLoginEventEmit {\n Cancel = 'Farcaster/cancel',\n}\n\nexport enum EnableMFAEventOnReceived {\n MFASecretGenerated = 'mfa-secret-generated',\n InvalidMFAOtp = 'invalid-mfa-otp',\n MFARecoveryCodes = 'mfa-recovery-codes',\n}\nexport enum EnableMFAEventEmit {\n VerifyMFACode = 'verify-mfa-code',\n Cancel = 'cancel-mfa-setup',\n}\n\nexport enum DisableMFAEventOnReceived {\n MFACodeRequested = 'mfa-code-requested',\n InvalidMFAOtp = 'invalid-mfa-otp',\n InvalidRecoveryCode = 'invalid-recovery-code',\n}\n\nexport enum DisableMFAEventEmit {\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n Cancel = 'cancel-mfa-disable',\n}\n\n/**\n * EventHandlers\n */\nexport type LoginWithMagicLinkEventHandlers = {\n // Event Received\n [LoginWithMagicLinkEventOnReceived.EmailSent]: () => void;\n [LoginWithMagicLinkEventOnReceived.EmailNotDeliverable]: () => void;\n\n // Event sent\n [LoginWithMagicLinkEventEmit.Retry]: () => void;\n} & DeviceVerificationEventHandlers;\n\nexport type LoginWithSmsOTPEventHandlers = {\n // Event sent\n [LoginWithSmsOTPEventEmit.VerifySmsOtp]: (otp: string) => void;\n [LoginWithSmsOTPEventEmit.VerifyMFACode]: (mfa: string) => void;\n [LoginWithSmsOTPEventEmit.LostDevice]: () => void;\n [LoginWithSmsOTPEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n [LoginWithSmsOTPEventEmit.Cancel]: () => void;\n [LoginWithSmsOTPEventEmit.Retry]: () => void;\n\n // Event received\n [LoginWithSmsOTPEventOnReceived.SmsOTPSent]: () => void;\n [LoginWithSmsOTPEventOnReceived.InvalidSmsOtp]: () => void;\n [LoginWithSmsOTPEventOnReceived.ExpiredSmsOtp]: () => void;\n [LoginWithSmsOTPEventOnReceived.MfaSentHandle]: () => void;\n [LoginWithSmsOTPEventOnReceived.InvalidMfaOtp]: () => void;\n [LoginWithSmsOTPEventOnReceived.LoginThrottled]: () => void;\n [LoginWithSmsOTPEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [LoginWithSmsOTPEventOnReceived.InvalidRecoveryCode]: () => void;\n [LoginWithSmsOTPEventOnReceived.RecoveryCodeSuccess]: () => void;\n} & DeviceVerificationEventHandlers;\n\nexport type LoginWithEmailOTPEventHandlers = {\n // Event Received\n [LoginWithEmailOTPEventOnReceived.EmailOTPSent]: () => void;\n [LoginWithEmailOTPEventOnReceived.LoginThrottled]: () => void;\n [LoginWithEmailOTPEventOnReceived.InvalidEmailOtp]: () => void;\n [LoginWithEmailOTPEventOnReceived.InvalidMfaOtp]: () => void;\n [LoginWithEmailOTPEventOnReceived.ExpiredEmailOtp]: () => void;\n [LoginWithEmailOTPEventOnReceived.MfaSentHandle]: () => void;\n [LoginWithEmailOTPEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [LoginWithEmailOTPEventOnReceived.InvalidRecoveryCode]: () => void;\n [LoginWithEmailOTPEventOnReceived.RecoveryCodeSuccess]: () => void;\n [LoginWithEmailOTPEventOnReceived.MaxAttemptsReached]: () => void;\n [AuthEventOnReceived.IDTokenCreated]: (idToken: string) => void;\n [WalletEventOnReceived.WalletInfoFetched]: () => void;\n\n // Event sent\n [LoginWithEmailOTPEventEmit.VerifyEmailOtp]: (otp: string) => void;\n [LoginWithEmailOTPEventEmit.VerifyMFACode]: (mfa: string) => void;\n [LoginWithEmailOTPEventEmit.LostDevice]: () => void;\n [LoginWithEmailOTPEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n [LoginWithEmailOTPEventEmit.Cancel]: () => void;\n} & DeviceVerificationEventHandlers;\n\ntype DeviceVerificationEventHandlers = {\n // Event Received\n [DeviceVerificationEventOnReceived.DeviceNeedsApproval]: () => void;\n [DeviceVerificationEventOnReceived.DeviceVerificationEmailSent]: () => void;\n [DeviceVerificationEventOnReceived.DeviceVerificationLinkExpired]: () => void;\n [DeviceVerificationEventOnReceived.DeviceApproved]: () => void;\n\n // Event sent\n [DeviceVerificationEventEmit.Retry]: () => void;\n};\n\n/**\n * Update Email\n */\n\nexport type RecencyCheckEventHandlers = {\n [RecencyCheckEventOnReceived.PrimaryAuthFactorNeedsVerification]: () => void;\n [RecencyCheckEventOnReceived.PrimaryAuthFactorVerified]: () => void;\n [RecencyCheckEventOnReceived.InvalidEmailOtp]: () => void;\n [RecencyCheckEventOnReceived.EmailNotDeliverable]: () => void;\n [RecencyCheckEventOnReceived.EmailExpired]: () => void;\n [RecencyCheckEventOnReceived.EmailSent]: () => void;\n\n [RecencyCheckEventEmit.Cancel]: () => void;\n [RecencyCheckEventEmit.Retry]: () => void;\n [RecencyCheckEventEmit.VerifyEmailOtp]: (otp: string) => void;\n [RecencyCheckEventEmit.VerifyMFACode]: (mfa: string) => void;\n};\n\nexport type UpdateEmailEventHandlers = {\n [UpdateEmailEventOnReceived.NewAuthFactorNeedsVerification]: () => void;\n [UpdateEmailEventOnReceived.EmailUpdated]: () => void;\n [UpdateEmailEventOnReceived.InvalidEmailOtp]: () => void;\n [UpdateEmailEventOnReceived.EmailNotDeliverable]: () => void;\n [UpdateEmailEventOnReceived.EmailExpired]: () => void;\n [UpdateEmailEventOnReceived.EmailSent]: () => void;\n [UpdateEmailEventOnReceived.InvalidEmail]: () => void;\n [UpdateEmailEventOnReceived.EmailAlreadyExists]: () => void;\n\n [UpdateEmailEventEmit.Cancel]: () => void;\n [UpdateEmailEventEmit.RetryWithNewEmail]: (email?: string) => void;\n [UpdateEmailEventEmit.VerifyEmailOtp]: (otp: string) => void;\n} & RecencyCheckEventHandlers;\n\n/**\n * Enable MFA\n */\n\nexport type EnableMFAEventHandlers = {\n // Event Received\n [EnableMFAEventOnReceived.MFASecretGenerated]: ({ QRCode, key }: { QRCode: string; key: string }) => void;\n [EnableMFAEventOnReceived.InvalidMFAOtp]: ({ errorCode }: { errorCode: string }) => void;\n [EnableMFAEventOnReceived.MFARecoveryCodes]: ({ recoveryCode }: { recoveryCode: string }) => void;\n\n // Event sent\n [EnableMFAEventEmit.VerifyMFACode]: (totp: string) => void;\n [EnableMFAEventEmit.Cancel]: () => void;\n};\n\n/**\n * Disable MFA\n */\n\nexport type DisableMFAEventHandlers = {\n // Event Received\n [DisableMFAEventOnReceived.MFACodeRequested]: () => void;\n [DisableMFAEventOnReceived.InvalidMFAOtp]: ({ errorCode }: { errorCode: string }) => void;\n [DisableMFAEventOnReceived.InvalidRecoveryCode]: () => void;\n\n // Event sent\n [DisableMFAEventEmit.VerifyMFACode]: (totp: string) => void;\n [DisableMFAEventEmit.LostDevice]: (recoveryCode: string) => void;\n [DisableMFAEventEmit.Cancel]: () => void;\n};\n", "export type EthNetworkName = 'mainnet' | 'goerli' | 'sepolia';\n\nexport enum EthChainType {\n Harmony = 'HARMONY',\n}\n\nexport interface CustomNodeConfiguration {\n rpcUrl: string;\n chainId?: number;\n chainType?: EthChainType;\n}\n\nexport type EthNetworkConfiguration = EthNetworkName | CustomNodeConfiguration;\n\nexport type ProviderEnableEvents = {\n 'id-token-created': (params: { idToken: string }) => void;\n};\n", "import { RecencyCheckEventHandlers } from './auth-types';\nimport { DeepLinkPage } from '../core/deep-link-pages';\n\nexport interface GetIdTokenConfiguration {\n /**\n * The number of seconds until the generated ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface GenerateIdTokenConfiguration extends GetIdTokenConfiguration {\n /**\n * An optional piece of data to sign with the token. Note, however, that the\n * unsigned data _will not_ be encoded in the token, only an encrypted\n * signature of the data.\n */\n attachment?: string;\n}\n\nexport enum UserEventsEmit {\n ClosedByUser = 'closed-by-user',\n}\n\nexport enum UserEventsOnReceived {\n ClosedByUser = 'closed-by-user-on-received',\n}\n\nexport interface ChainWalletInfo {\n publicAddress: string | null;\n subAccounts: Array<{ name: string; publicAddress: string }>;\n}\n\nexport interface MagicUserMetadata {\n issuer: string | null;\n email: string | null;\n phoneNumber: string | null;\n isMfaEnabled: boolean;\n recoveryFactors: [RecoveryFactor] | [];\n firstLoginAt: string | null;\n wallets: {\n ethereum?: ChainWalletInfo;\n algorand?: ChainWalletInfo;\n aptos?: ChainWalletInfo;\n avalancheX?: ChainWalletInfo;\n bitcoin?: ChainWalletInfo;\n conflux?: ChainWalletInfo;\n cosmos?: ChainWalletInfo;\n flow?: ChainWalletInfo;\n harmony?: ChainWalletInfo;\n hedera?: ChainWalletInfo;\n icon?: ChainWalletInfo;\n kadena?: ChainWalletInfo;\n near?: ChainWalletInfo;\n polkadot?: ChainWalletInfo;\n solana?: ChainWalletInfo;\n sui?: ChainWalletInfo;\n taquito?: ChainWalletInfo;\n terra?: ChainWalletInfo;\n tezos?: ChainWalletInfo;\n zilliqa?: ChainWalletInfo;\n [chain: string]: ChainWalletInfo | undefined;\n };\n}\n\nexport enum RecoveryFactorEventOnReceived {\n EnterNewPhoneNumber = 'enter-new-phone-number',\n EnterOtpCode = 'enter-otp-code',\n RecoveryFactorAlreadyExists = 'recovery-factor-already-exists',\n MalformedPhoneNumber = 'malformed-phone-number',\n InvalidOtpCode = 'invalid-otp-code',\n RecoveryFactorUpdated = 'recovery-factor-updated',\n RecoveryFactorDeleted = 'recovery-factor-deleted',\n}\n\nexport enum RecoveryFactorEventEmit {\n SendNewPhoneNumber = 'send-new-phone-number',\n SendOtpCode = 'send-otp-code',\n Cancel = 'cancel',\n StartEditPhoneNumber = 'start-edit-phone-number',\n}\n\ntype RecoveryFactor = {\n type: RecoveryMethodType;\n value: string;\n};\n\nexport type RecoveryFactorEventHandlers = {\n // Event Received\n [RecoveryFactorEventEmit.SendNewPhoneNumber]: (phone_number: string) => void;\n [RecoveryFactorEventEmit.SendOtpCode]: (otp: string) => void;\n [RecoveryFactorEventEmit.StartEditPhoneNumber]: () => void;\n [RecoveryFactorEventEmit.Cancel]: () => void;\n\n // Event sent\n [RecoveryFactorEventOnReceived.EnterNewPhoneNumber]: () => void;\n [RecoveryFactorEventOnReceived.EnterOtpCode]: () => void;\n [RecoveryFactorEventOnReceived.RecoveryFactorAlreadyExists]: () => void;\n [RecoveryFactorEventOnReceived.MalformedPhoneNumber]: () => void;\n [RecoveryFactorEventOnReceived.InvalidOtpCode]: () => void;\n [RecoveryFactorEventOnReceived.RecoveryFactorUpdated]: (updatedFactor: { type: string; value: string }) => void;\n [RecoveryFactorEventOnReceived.RecoveryFactorDeleted]: () => void;\n} & RecencyCheckEventHandlers;\n\nexport enum RecoveryMethodType {\n PhoneNumber = 'phone_number',\n}\n\nexport interface UpdateEmailConfiguration {\n /**\n * The new email address to update to\n */\n email: string;\n\n /**\n * When `true`, a pre-built pending modal interface will\n * guide the user to check their new, followed by old emails\n * for confirmation emails.\n */\n showUI?: boolean;\n}\n\nexport interface UpdateWebAuthnInfoConfiguration {\n /**\n * WebAuthn info id\n */\n id: string;\n\n /**\n * nickname that user attempts to update to the webauth device associate to the id.\n */\n nickname: string;\n}\n\nexport interface RecoverAccountConfiguration {\n /**\n * The email to recover\n */\n email: string;\n showUI: boolean;\n}\n\nexport interface ShowSettingsConfiguration {\n /**\n * deep linking destination\n */\n page: DeepLinkPage;\n showUI?: boolean;\n}\n\nexport enum RecoverAccountEventOnReceived {\n SmsOtpSent = 'sms-otp-sent',\n LoginThrottled = 'login-throttled',\n InvalidSmsOtp = 'invalid-sms-otp',\n SmsVerified = 'sms-verified',\n AccountRecovered = 'account-recovered',\n UpdateEmailRequired = 'update-email-required',\n}\n\nexport enum RecoverAccountEventEmit {\n Cancel = 'cancel',\n VerifyOtp = 'verify-otp-code',\n ResendSms = 'resend-sms-otp',\n UpdateEmail = 'update-email',\n}\n\nexport type RecoverAccountEventHandlers = {\n // Event Received\n [RecoverAccountEventEmit.Cancel]: () => void;\n [RecoverAccountEventEmit.VerifyOtp]: (otp: string) => void;\n [RecoverAccountEventEmit.ResendSms]: () => void;\n [RecoverAccountEventEmit.UpdateEmail]: (email: string) => void;\n\n // Event sent\n [RecoverAccountEventOnReceived.SmsOtpSent]: ({ phoneNumber }: { phoneNumber: string }) => void;\n [RecoverAccountEventOnReceived.LoginThrottled]: (error: string) => void;\n [RecoverAccountEventOnReceived.InvalidSmsOtp]: ({\n errorMessage,\n errorCode,\n }: {\n errorMessage: string;\n errorCode: string;\n }) => void;\n [RecoverAccountEventOnReceived.SmsVerified]: () => void;\n [RecoverAccountEventOnReceived.AccountRecovered]: () => void;\n [RecoverAccountEventOnReceived.UpdateEmailRequired]: () => void;\n};\n", "export type NFTResponseStatus = 'cancelled' | 'pending' | 'processed' | 'declined' | 'expired';\n\nexport type NFTResponse = {\n status: NFTResponseStatus;\n};\n\nexport interface NFTPurchaseRequest {\n nft: {\n name: string;\n imageUrl: string;\n blockchainNftId: string;\n contractAddress: string;\n network: string;\n platform: string;\n type: string;\n };\n identityPrefill: {\n firstName: string;\n lastName: string;\n dateOfBirth: string; // YYYY-MM-DD\n emailAddress: string;\n phone: string;\n address: {\n street1: string;\n street2: string;\n city: string;\n regionCode: string;\n postalCode: string;\n countryCode: string;\n };\n };\n}\n\nexport type NFTPurchaseResponse = NFTResponse & {\n errorMessage?: string;\n};\n\nexport interface NFTCheckoutRequest {\n // given by magic / found in the developer dashboard in future\n contractId: string;\n // in contract, if ERC1155\u2026 for ERC721, use token ID = 0\n tokenId: string;\n name: string;\n imageUrl: string;\n quantity?: number; // default is 1\n walletAddress?: string; // default is user's wallet address\n // If enabled, the user will be able to pay with crypto. the default is false\n isCryptoCheckoutEnabled?: boolean;\n walletProvider?: 'magic' | 'web3modal';\n}\n\nexport type NFTCheckoutResponse = NFTResponse;\n\nexport type NFTCheckoutEvents = {\n disconnect: () => void;\n 'nft-checkout-initiated': (rawTransaction: string) => void;\n};\n\nexport interface NFTTransferRequest {\n tokenId: string;\n contractAddress: string;\n quantity?: number;\n recipient?: string;\n}\n\nexport type NFTTransferResponse = NFTResponse;\n\nexport enum NftCheckoutIntermediaryEvents {\n Success = 'nft-checkout-success',\n Failure = 'nft-checkout-failure',\n Initiated = 'nft-checkout-initiated',\n Disconnect = 'disconnect',\n}\n\nexport type NftCheckoutEventHandler = {\n [NftCheckoutIntermediaryEvents.Initiated]: (rawTransaction: string) => void;\n [NftCheckoutIntermediaryEvents.Success]: (signedTransaction: string) => void;\n [NftCheckoutIntermediaryEvents.Failure]: () => void;\n};\n", "export type AccessListEntry = { address: string; storageKeys: Array<string> };\n\n/**\n * An ordered collection of [[AccessList]] entries.\n */\nexport type AccessList = Array<AccessListEntry>;\n\nexport enum WalletEventOnReceived {\n WalletInfoFetched = 'Wallet/wallet-info-fetched',\n}\n\n/**\n * Request parameters for EIP-7702 authorization signing\n */\nexport interface Sign7702AuthorizationRequest {\n /**\n * The smart contract implementation address the EOA delegates to\n */\n contractAddress: string;\n\n /**\n * The chain ID for the network (use 0 for universal cross-chain authorization)\n */\n chainId: number;\n\n /**\n * The nonce for the EOA account (transaction count)\n */\n nonce?: number;\n}\n\n/**\n * Response from EIP-7702 authorization signing\n */\nexport interface Sign7702AuthorizationResponse {\n /**\n * The contract address that was authorized\n */\n contractAddress: string;\n\n /**\n * The chain ID for the authorization\n */\n chainId: number;\n\n /**\n * The nonce used in the authorization\n */\n nonce: number;\n\n /**\n * The v component of the signature (recovery id)\n */\n v: number;\n\n /**\n * The r component of the signature\n */\n r: string;\n\n /**\n * The s component of the signature\n */\n s: string;\n\n /**\n * Optional: Full signature as hex string\n */\n signature?: string;\n}\n\n/**\n * Request parameters for sending an EIP-7702 transaction with authorization list\n */\nexport interface Send7702TransactionRequest {\n /**\n * The recipient address\n */\n to: string;\n\n /**\n * The value to send in wei (as hex string)\n */\n value?: string;\n\n /**\n * The transaction data (calldata)\n */\n data?: string;\n\n /**\n * Gas limit for the transaction (as hex string)\n */\n gas?: string;\n\n /**\n * Gas limit for the transaction (alias for gas)\n */\n gasLimit?: string;\n\n /**\n * Maximum fee per gas for EIP-1559 transactions (as hex string)\n */\n maxFeePerGas?: string;\n\n /**\n * Maximum priority fee per gas for EIP-1559 transactions (as hex string)\n */\n maxPriorityFeePerGas?: string;\n\n /**\n * Transaction nonce (if not provided, will be fetched from network)\n */\n nonce?: number;\n\n /**\n * The list of signed EIP-7702 authorizations to include in the transaction\n */\n authorizationList: Sign7702AuthorizationResponse[];\n}\n\n/**\n * Response from sending an EIP-7702 transaction\n */\nexport interface Send7702TransactionResponse {\n /**\n * The transaction hash\n */\n transactionHash: string;\n}", "export enum UiEventsEmit {\n CloseMagicWindow = 'close-magic-window',\n}\n", "// Shared MFA events reused by both popup and redirect flows\nexport enum OAuthMFAEventEmit {\n Cancel = 'cancel',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n}\n\nexport enum OAuthMFAEventOnReceived {\n MfaSentHandle = 'mfa-sent-handle',\n InvalidMfaOtp = 'invalid-mfa-otp',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n}\n\ntype OAuthMFAEventHandlers = {\n // Event sent\n [OAuthMFAEventEmit.Cancel]: () => void;\n [OAuthMFAEventEmit.VerifyMFACode]: (mfa: string) => void;\n [OAuthMFAEventEmit.LostDevice]: () => void;\n [OAuthMFAEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n // Event Received\n [OAuthMFAEventOnReceived.MfaSentHandle]: () => void;\n [OAuthMFAEventOnReceived.InvalidMfaOtp]: () => void;\n [OAuthMFAEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [OAuthMFAEventOnReceived.InvalidRecoveryCode]: () => void;\n [OAuthMFAEventOnReceived.RecoveryCodeSuccess]: () => void;\n};\n\n// Popup-specific events\nexport enum OAuthPopupEventOnReceived {\n PopupUrl = 'popup-url',\n}\n\nexport enum OAuthPopupEventEmit {\n PopupEvent = 'popup-event',\n}\n\nexport type OAuthPopupEventHandlers = {\n [OAuthPopupEventEmit.PopupEvent]: (eventData: unknown) => void;\n [OAuthPopupEventOnReceived.PopupUrl]: (event: { popupUrl: string; provider: string }) => void;\n} & OAuthMFAEventHandlers;\n\n// Redirect-specific handler type\nexport type OAuthGetResultEventHandlers = OAuthMFAEventHandlers;\n", "export interface PasskeyResult {\n // null if skipDIDToken is true\n idToken: string | null;\n\n // Info of the device used to authenticate\n deviceInfo: {\n id: string;\n nickname: string;\n transport: string;\n userAgent: string;\n };\n}\n\nexport enum PasskeyMFAEventEmit {\n Cancel = 'cancel',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n}\nexport enum PasskeyMFAEventOnReceived {\n MfaSentHandle = 'mfa-sent-handle',\n InvalidMfaOtp = 'invalid-mfa-otp',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n}\n\nexport type PasskeyEventHandlers = {\n // Event sent\n [PasskeyMFAEventEmit.Cancel]: () => void;\n [PasskeyMFAEventEmit.VerifyMFACode]: (mfa: string) => void;\n [PasskeyMFAEventEmit.LostDevice]: () => void;\n [PasskeyMFAEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n // Event Received\n [PasskeyMFAEventOnReceived.MfaSentHandle]: () => void;\n [PasskeyMFAEventOnReceived.InvalidMfaOtp]: () => void;\n [PasskeyMFAEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [PasskeyMFAEventOnReceived.InvalidRecoveryCode]: () => void;\n [PasskeyMFAEventOnReceived.RecoveryCodeSuccess]: () => void;\n};\n", "/**\n * Encode given buffer or decode given string with Base64URL.\n */\nexport class Base64URL {\n /**\n * Convert bytes into a base64url-encoded string\n */\n static encode(buffer: ArrayBuffer): string {\n const base64 = globalThis.btoa(String.fromCharCode(...new Uint8Array(buffer)));\n\n return base64.replace(/=/g, '').replace(/\\+/g, '-').replace(/\\//g, '_');\n }\n\n /**\n * Convert a base64url-encoded string into bytes\n */\n static decode(base64url: string): ArrayBuffer {\n const base64 = base64url.replace(/-/g, '+').replace(/_/g, '/');\n const binStr = globalThis.atob(base64);\n const bin = new Uint8Array(binStr.length);\n\n for (let i = 0; i < binStr.length; i++) {\n bin[i] = binStr.charCodeAt(i);\n }\n\n return bin.buffer;\n }\n}\n", "import { Base64URL } from './base64';\n\nfunction isAuthenticatorAssertionResponse(value: AuthenticatorResponse): value is AuthenticatorAssertionResponse {\n if (typeof value !== 'object') {\n return false;\n }\n if (\n (value as AuthenticatorAssertionResponse)?.authenticatorData === undefined ||\n typeof (value as AuthenticatorAssertionResponse)?.authenticatorData !== 'object'\n ) {\n return false;\n }\n return true;\n}\n\nfunction isAuthenticatorAttestationResponse(value: AuthenticatorResponse): value is AuthenticatorAttestationResponse {\n if (typeof value !== 'object') {\n return false;\n }\n if (\n (value as AuthenticatorAttestationResponse)?.attestationObject === undefined ||\n typeof (value as AuthenticatorAttestationResponse)?.attestationObject !== 'object'\n ) {\n return false;\n }\n return true;\n}\n\n/**\n * Polyfill `PublicKeyCredential.prototype.toJSON`\n *\n * See https://w3c.github.io/webauthn/#dom-publickeycredential-tojson\n */\nexport function toJSON(cred: PublicKeyCredential): PublicKeyCredentialJSON {\n // Prefer native implementation if available\n if (typeof cred.toJSON === 'function') {\n return cred.toJSON();\n }\n\n try {\n const id = cred.id;\n const rawId = Base64URL.encode(cred.rawId);\n const authenticatorAttachment = cred.authenticatorAttachment;\n const clientExtensionResults = {};\n const type = cred.type;\n\n // This is authentication.\n if (isAuthenticatorAssertionResponse(cred.response)) {\n return {\n id,\n rawId,\n response: {\n authenticatorData: Base64URL.encode(cred.response.authenticatorData),\n clientDataJSON: Base64URL.encode(cred.response.clientDataJSON),\n signature: Base64URL.encode(cred.response.signature),\n userHandle: cred.response.userHandle ? Base64URL.encode(cred.response.userHandle) : undefined,\n },\n authenticatorAttachment,\n clientExtensionResults,\n type,\n };\n }\n\n if (isAuthenticatorAttestationResponse(cred.response)) {\n // This is registration.\n return {\n id,\n rawId,\n response: {\n clientDataJSON: Base64URL.encode(cred.response.clientDataJSON),\n attestationObject: Base64URL.encode(cred.response.attestationObject),\n transports: cred.response?.getTransports() || [],\n },\n authenticatorAttachment,\n clientExtensionResults,\n type,\n };\n }\n\n throw new Error('Unexpected object.');\n } catch (error) {\n console.error(error);\n throw error;\n }\n}\n"],
5
- "mappings": "AAAA,OAAS,aAAAA,OAAiB,sBCAnB,IAAKC,GAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,eAAiB,sBACjBA,EAAA,kBAAoB,qBACpBA,EAAA,gBAAkB,mBAClBA,EAAA,wBAA0B,4BAC1BA,EAAA,uBAAyB,0BAPfA,IAAAA,GAAA,CAAA,CAAA,EAUAC,GAAAA,IACVA,EAAA,eAAiB,mBACjBA,EAAA,gBAAkB,mBAClBA,EAAA,iCAAmC,sCACnCA,EAAA,kBAAoB,qBACpBA,EAAA,oBAAsB,eALZA,IAAAA,GAAA,CAAA,CAAA,EAQAC,GAAAA,IAEVA,EAAAA,EAAA,WAAa,MAAA,EAAb,aACAA,EAAAA,EAAA,eAAiB,MAAA,EAAjB,iBACAA,EAAAA,EAAA,eAAiB,MAAA,EAAjB,iBACAA,EAAAA,EAAA,cAAgB,MAAA,EAAhB,gBACAA,EAAAA,EAAA,cAAgB,MAAA,EAAhB,gBAGAA,EAAAA,EAAA,4BAA8B,IAAA,EAA9B,8BACAA,EAAAA,EAAA,iBAAmB,MAAA,EAAnB,mBACAA,EAAAA,EAAA,qBAAuB,MAAA,EAAvB,uBACAA,EAAAA,EAAA,oBAAsB,MAAA,EAAtB,sBACAA,EAAAA,EAAA,kBAAoB,MAAA,EAApB,oBACAA,EAAAA,EAAA,qBAAuB,MAAA,EAAvB,uBACAA,EAAAA,EAAA,4BAA8B,MAAA,EAA9B,8BACAA,EAAAA,EAAA,kBAAoB,MAAA,EAApB,oBACAA,EAAAA,EAAA,mBAAqB,MAAA,EAArB,qBACAA,EAAAA,EAAA,mBAAqB,MAAA,EAArB,qBACAA,EAAAA,EAAA,iBAAmB,MAAA,EAAnB,mBACAA,EAAAA,EAAA,sBAAwB,MAAA,EAAxB,wBACAA,EAAAA,EAAA,kBAAoB,MAAA,EAApB,oBACAA,EAAAA,EAAA,sBAAwB,MAAA,EAAxB,wBACAA,EAAAA,EAAA,SAAW,MAAA,EAAX,WACAA,EAAAA,EAAA,gBAAkB,MAAA,EAAlB,kBACAA,EAAAA,EAAA,mBAAqB,MAAA,EAArB,qBACAA,EAAAA,EAAA,gBAAkB,MAAA,EAAlB,kBA1BUA,IAAAA,GAAA,CAAA,CAAA,ECgCAC,GAAAA,IACVA,EAAA,SAAW,qBACXA,EAAA,QAAU,oBACVA,EAAA,SAAW,oBAHDA,IAAAA,GAAA,CAAA,CAAA,EAMAC,GAAAA,IACVA,EAAA,gBAAkB,mBAClBA,EAAA,eAAiB,kBACjBA,EAAA,kBAAoB,qBAHVA,IAAAA,GAAA,CAAA,CAAA,EAoBAC,GAAAA,IACVA,EAAA,aAAe,4BACfA,EAAA,kBAAoB,kCACpBA,EAAA,mBAAqB,mCACrBA,EAAA,oBAAsB,mCACtBA,EAAA,sBAAwB,qCACxBA,EAAA,WAAa,0BACbA,EAAA,gBAAkB,+BAClBA,EAAA,YAAc,0BACdA,EAAA,WAAa,qBACbA,EAAA,OAAS,oBACTA,EAAA,YAAc,0BACdA,EAAA,aAAe,sBACfA,EAAA,qBAAuB,mCACvBA,EAAA,qBAAuB,yCACvBA,EAAA,0BAA4B,+CAC5BA,EAAA,2BAA6B,2CAC7BA,EAAA,4BAA8B,gDAC9BA,EAAA,mBAAqB,uCACrBA,EAAA,wBAA0B,4CAC1BA,EAAA,oBAAsB,uCACtBA,EAAA,mBAAqB,uCACrBA,EAAA,eAAiB,iCACjBA,EAAA,oBAAsB,uCACtBA,EAAA,kBAAoB,2BACpBA,EAAA,gBAAkB,sBAClBA,EAAA,QAAU,iBACVA,EAAA,OAAS,eACTA,EAAA,YAAc,qBACdA,EAAA,YAAc,qBACdA,EAAA,YAAc,qBACdA,EAAA,sBAAwB,uBACxBA,EAAA,WAAa,gBAGbA,EAAA,eAAiB,6BACjBA,EAAA,uBAAyB,0CACzBA,EAAA,kBAAoB,uBACpBA,EAAA,YAAc,kBACdA,EAAA,MAAQ,WACRA,EAAA,UAAY,wBACZA,EAAA,UAAY,wBACZA,EAAA,SAAW,kBACXA,EAAA,WAAa,yBACbA,EAAA,iBAAmB,4BACnBA,EAAA,YAAc,qBACdA,EAAA,aAAe,sBACfA,EAAA,SAAW,mBACXA,EAAA,UAAY,6BACZA,EAAA,WAAa,8BACbA,EAAA,2BAA6B,sCAC7BA,EAAA,sBAAwB,uCACxBA,EAAA,oBAAsB,0BApDZA,IAAAA,GAAA,CAAA,CAAA,EC1EL,IAAKC,GAAAA,IACVA,EAAA,sBAAwB,wBACxBA,EAAA,oBAAsB,sBACtBA,EAAA,mBAAqB,qBACrBA,EAAA,mBAAqB,qBACrBA,EAAA,mBAAqB,qBACrBA,EAAA,0BAA4B,4BAC5BA,EAAA,gCAAkC,kCAClCA,EAAA,WAAa,aACbA,EAAA,qBAAuB,uBACvBA,EAAA,kCAAoC,oCACpCA,EAAA,iCAAmC,mCACnCA,EAAA,sBAAwB,wBAZdA,IAAAA,GAAA,CAAA,CAAA,EAeAC,GAAAA,IACVA,EAAA,qBAAuB,uBACvBA,EAAA,kCAAoC,oCACpCA,EAAA,gCAAkC,iCAClCA,EAAA,WAAa,aAJHA,IAAAA,GAAA,CAAA,CAAA,ECjBAC,GAAAA,IACVA,EAAA,YAAc,eACdA,EAAA,IAAM,MACNA,EAAA,SAAW,WAHDA,IAAAA,GAAA,CAAA,CAAA,EC8IAC,GAAAA,IACVA,EAAA,MAAQ,QADEA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,UAAY,aACZA,EAAA,oBAAsB,wBAFZA,IAAAA,GAAA,CAAA,CAAA,EAKAC,GAAAA,IACVA,EAAA,eAAiB,mBACjBA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBACrBA,EAAA,OAAS,SALCA,IAAAA,GAAA,CAAA,CAAA,EAQAC,GAAAA,IACVA,EAAA,aAAe,iBACfA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBACrBA,EAAA,OAAS,SACTA,EAAA,MAAQ,QANEA,IAAAA,GAAA,CAAA,CAAA,EASAC,GAAAA,IACVA,EAAA,WAAa,eACbA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,eAAiB,kBACjBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBATZA,IAAAA,GAAA,CAAA,CAAA,EAYAC,GAAAA,IACVA,EAAA,aAAe,iBACfA,EAAA,gBAAkB,oBAClBA,EAAA,cAAgB,kBAChBA,EAAA,gBAAkB,oBAClBA,EAAA,cAAgB,kBAChBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBACtBA,EAAA,eAAiB,kBACjBA,EAAA,mBAAqB,uBAVXA,IAAAA,GAAA,CAAA,CAAA,EAaAC,GAAAA,IACVA,EAAA,MAAQ,eADEA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,eAAiB,kBACjBA,EAAA,oBAAsB,wBACtBA,EAAA,8BAAgC,mCAChCA,EAAA,4BAA8B,iCAJpBA,IAAAA,GAAA,CAAA,CAAA,EAOAC,GAAAA,IACVA,EAAA,MAAQ,4BACRA,EAAA,OAAS,0CACTA,EAAA,eAAiB,uCACjBA,EAAA,cAAgB,0BAJNA,IAAAA,GAAA,CAAA,CAAA,EAOAC,GAAAA,IACVA,EAAA,mCAAqC,yCACrCA,EAAA,0BAA4B,+BAC5BA,EAAA,gBAAkB,wCAClBA,EAAA,aAAe,iDACfA,EAAA,UAAY,8CACZA,EAAA,oBAAsB,yDANZA,IAAAA,GAAA,CAAA,CAAA,EASAC,GAAAA,IACVA,EAAA,kBAAoB,mCACpBA,EAAA,OAAS,4CACTA,EAAA,eAAiB,mCAHPA,IAAAA,GAAA,CAAA,CAAA,EAMAC,GAAAA,IACVA,EAAA,+BAAiC,2CACjCA,EAAA,aAAe,4BACfA,EAAA,gBAAkB,0CAClBA,EAAA,aAAe,mDACfA,EAAA,UAAY,gDACZA,EAAA,oBAAsB,2DACtBA,EAAA,aAAe,gCACfA,EAAA,mBAAqB,uCARXA,IAAAA,GAAA,CAAA,CAAA,EAWAC,GAAAA,IACVA,EAAA,eAAiB,wBADPA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,OAAS,mBADCA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,mBAAqB,uBACrBA,EAAA,cAAgB,kBAChBA,EAAA,iBAAmB,qBAHTA,IAAAA,GAAA,CAAA,CAAA,EAKAC,GAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,OAAS,mBAFCA,IAAAA,GAAA,CAAA,CAAA,EAKAC,GAAAA,IACVA,EAAA,iBAAmB,qBACnBA,EAAA,cAAgB,kBAChBA,EAAA,oBAAsB,wBAHZA,IAAAA,GAAA,CAAA,CAAA,EAMAC,GAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,OAAS,qBAHCA,IAAAA,GAAA,CAAA,CAAA,ECnQAC,GAAAA,IACVA,EAAA,QAAU,UADAA,IAAAA,GAAA,CAAA,CAAA,ECiBAC,GAAAA,IACVA,EAAA,aAAe,iBADLA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,aAAe,6BADLA,IAAAA,GAAA,CAAA,CAAA,EAyCAC,GAAAA,IACVA,EAAA,oBAAsB,yBACtBA,EAAA,aAAe,iBACfA,EAAA,4BAA8B,iCAC9BA,EAAA,qBAAuB,yBACvBA,EAAA,eAAiB,mBACjBA,EAAA,sBAAwB,0BACxBA,EAAA,sBAAwB,0BAPdA,IAAAA,GAAA,CAAA,CAAA,EAUAC,GAAAA,IACVA,EAAA,mBAAqB,wBACrBA,EAAA,YAAc,gBACdA,EAAA,OAAS,SACTA,EAAA,qBAAuB,0BAJbA,IAAAA,GAAA,CAAA,CAAA,EA6BAC,GAAAA,IACVA,EAAA,YAAc,eADJA,IAAAA,GAAA,CAAA,CAAA,EA8CAC,IAAAA,IACVA,EAAA,WAAa,eACbA,EAAA,eAAiB,kBACjBA,EAAA,cAAgB,kBAChBA,EAAA,YAAc,eACdA,EAAA,iBAAmB,oBACnBA,EAAA,oBAAsB,wBANZA,IAAAA,IAAA,CAAA,CAAA,EASAC,IAAAA,IACVA,EAAA,OAAS,SACTA,EAAA,UAAY,kBACZA,EAAA,UAAY,iBACZA,EAAA,YAAc,eAJJA,IAAAA,IAAA,CAAA,CAAA,EC3FAC,IAAAA,IACVA,EAAA,QAAU,uBACVA,EAAA,QAAU,uBACVA,EAAA,UAAY,yBACZA,EAAA,WAAa,aAJHA,IAAAA,IAAA,CAAA,CAAA,EC5DAC,IAAAA,IACVA,EAAA,kBAAoB,6BADVA,IAAAA,IAAA,CAAA,CAAA,ECPAC,IAAAA,IACVA,EAAA,iBAAmB,qBADTA,IAAAA,IAAA,CAAA,CAAA,ECCAC,IAAAA,IACVA,EAAA,OAAS,SACTA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBAJXA,IAAAA,IAAA,CAAA,CAAA,EAOAC,IAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBALZA,IAAAA,IAAA,CAAA,CAAA,EAuBAC,IAAAA,IACVA,EAAA,SAAW,YADDA,IAAAA,IAAA,CAAA,CAAA,EAIAC,IAAAA,IACVA,EAAA,WAAa,cADHA,IAAAA,IAAA,CAAA,CAAA,ECtBAC,GAAAA,IACVA,EAAA,OAAS,SACTA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBAJXA,IAAAA,GAAA,CAAA,CAAA,EAMAC,GAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBALZA,IAAAA,GAAA,CAAA,CAAA,EChBL,IAAMC,EAAN,KAAgB,CAIrB,OAAO,OAAOC,EAA6B,CAGzC,OAFe,WAAW,KAAK,OAAO,aAAa,GAAG,IAAI,WAAWA,CAAM,CAAC,CAAC,EAE/D,QAAQ,KAAM,EAAE,EAAE,QAAQ,MAAO,GAAG,EAAE,QAAQ,MAAO,GAAG,CACxE,CAKA,OAAO,OAAOC,EAAgC,CAC5C,IAAMC,EAASD,EAAU,QAAQ,KAAM,GAAG,EAAE,QAAQ,KAAM,GAAG,EACvDE,EAAS,WAAW,KAAKD,CAAM,EAC/BE,EAAM,IAAI,WAAWD,EAAO,MAAM,EAExC,QAASE,EAAI,EAAGA,EAAIF,EAAO,OAAQE,IACjCD,EAAIC,CAAC,EAAIF,EAAO,WAAWE,CAAC,EAG9B,OAAOD,EAAI,MACb,CACF,ECzBA,SAASE,GAAiCC,EAAuE,CAI/G,MAHI,SAAOA,GAAU,UAIlBA,GAA0C,oBAAsB,QACjE,OAAQA,GAA0C,mBAAsB,SAK5E,CAEA,SAASC,GAAmCD,EAAyE,CAInH,MAHI,SAAOA,GAAU,UAIlBA,GAA4C,oBAAsB,QACnE,OAAQA,GAA4C,mBAAsB,SAK9E,CAOO,SAASE,EAAOC,EAAoD,CAEzE,GAAI,OAAOA,EAAK,QAAW,WACzB,OAAOA,EAAK,OAAO,EAGrB,GAAI,CACF,IAAMC,EAAKD,EAAK,GACVE,EAAQC,EAAU,OAAOH,EAAK,KAAK,EACnCI,EAA0BJ,EAAK,wBAC/BK,EAAyB,CAAC,EAC1BC,EAAON,EAAK,KAGlB,GAAIJ,GAAiCI,EAAK,QAAQ,EAChD,MAAO,CACL,GAAAC,EACA,MAAAC,EACA,SAAU,CACR,kBAAmBC,EAAU,OAAOH,EAAK,SAAS,iBAAiB,EACnE,eAAgBG,EAAU,OAAOH,EAAK,SAAS,cAAc,EAC7D,UAAWG,EAAU,OAAOH,EAAK,SAAS,SAAS,EACnD,WAAYA,EAAK,SAAS,WAAaG,EAAU,OAAOH,EAAK,SAAS,UAAU,EAAI,MACtF,EACA,wBAAAI,EACA,uBAAAC,EACA,KAAAC,CACF,EAGF,GAAIR,GAAmCE,EAAK,QAAQ,EAElD,MAAO,CACL,GAAAC,EACA,MAAAC,EACA,SAAU,CACR,eAAgBC,EAAU,OAAOH,EAAK,SAAS,cAAc,EAC7D,kBAAmBG,EAAU,OAAOH,EAAK,SAAS,iBAAiB,EACnE,WAAYA,EAAK,UAAU,cAAc,GAAK,CAAC,CACjD,EACA,wBAAAI,EACA,uBAAAC,EACA,KAAAC,CACF,EAGF,MAAM,IAAI,MAAM,oBAAoB,CACtC,OAASC,EAAO,CACd,cAAQ,MAAMA,CAAK,EACbA,CACR,CACF,CdzEO,IAAMC,EAAN,cAAgCC,GAAU,QAA0B,CACzE,KAAO,WACP,OAAc,CAAC,EAEP,+BAAgC,CACtC,KAAK,qCAAuD,4CAA6C,CAAC,CAAC,CAC7G,CAEQ,mCAAmCC,EAAiB,CAC1D,KAAK,+CAAgE,8BAA8BA,CAAO,GAAI,CAAC,CAAC,CAClH,CAEA,MAAa,gBAAgBC,EAA8C,CACzE,GAAI,CAAC,OAAO,oBACV,MAAM,KAAK,8BAA8B,EAE3C,GAAM,CAAE,SAAAC,EAAU,SAAAC,EAAW,GAAI,aAAAC,EAAc,SAAAC,CAAS,EAAIJ,GAAiB,CAAC,EAExE,CAAE,oBAAAK,EAAqB,kBAAAC,CAAkB,EAAI,MAAM,KAAK,QAC5D,KAAK,MAAM,gEAA6E,CAAC,CAAE,SAAAL,CAAS,CAAC,CAAC,CACxG,EAEIM,EACJ,GAAI,CACFA,EAAc,MAAM,UAAU,YAAY,OAAO,CAC/C,UAAWF,CACb,CAAC,CACH,OAASG,EAAU,CACjB,MAAM,KAAK,mCAAmCA,CAAG,CACnD,CAEA,OAAO,KAAK,QACV,KAAK,MAAM,iEAA8E,CACvF,CACE,kBAAAF,EACA,qBAAsBG,EAAOF,CAAU,EACvC,SAAAL,EACA,UAAWK,EAAW,SAAS,cAAc,EAC7C,UAAW,UAAU,UACrB,aAAAJ,EACA,SAAAC,CACF,CACF,CAAC,CACH,CACF,CAEO,MAAMJ,EAAgD,CAC3D,GAAM,CAAE,SAAAC,EAAU,aAAAS,EAAc,aAAAP,EAAc,SAAAC,CAAS,EAAIJ,GAAiB,CAAC,EAEzEW,EAEEC,EAAa,KAAK,MAAM,iBAAsD,MAAOC,EAASC,IAAW,CAC7G,GAAI,CAAC,OAAO,oBACV,OAAOA,EAAO,KAAK,8BAA8B,CAAC,EAGpD,GAAM,CAAE,oBAAAC,EAAqB,sBAAAC,CAAsB,EAAI,MAAM,KAAK,QAChE,KAAK,MAAM,kEAA8E,CAAC,CAAE,SAAAf,CAAS,CAAC,CAAC,CACzG,EAEIgB,EACJ,GAAI,CACFA,EAAa,MAAM,UAAU,YAAY,IAAI,CAC3C,UAAWD,CACb,CAAC,CACH,OAASR,EAAU,CACjB,OAAOM,EAAO,KAAK,mCAAmCN,CAAG,CAAC,CAC5D,CAEA,IAAMU,EAAiB,KAAK,MAAM,mEAA+E,CAC/G,CACE,oBAAAH,EACA,kBAAmBN,EAAOQ,CAAS,EACnC,OAAQP,EACR,aAAAP,EACA,SAAAC,CACF,CACF,CAAC,EAEDO,EAAkBO,EAAe,GAEjC,IAAMC,EAAe,KAAK,QAA6CD,CAAc,EAEhFR,IACHS,EAAa,GAAGC,EAA0B,cAAe,IAAM,CAC7DR,EAAW,KAAKQ,EAA0B,aAAa,CACzD,CAAC,EACDD,EAAa,GAAGC,EAA0B,cAAe,IAAM,CAC7DR,EAAW,KAAKQ,EAA0B,aAAa,CACzD,CAAC,EACDD,EAAa,GAAGC,EAA0B,uBAAwB,IAAM,CACtER,EAAW,KAAKQ,EAA0B,sBAAsB,CAClE,CAAC,EACDD,EAAa,GAAGC,EAA0B,oBAAqB,IAAM,CACnER,EAAW,KAAKQ,EAA0B,mBAAmB,CAC/D,CAAC,EACDD,EAAa,GAAGC,EAA0B,oBAAqB,IAAM,CACnER,EAAW,KAAKQ,EAA0B,mBAAmB,CAC/D,CAAC,GAGH,GAAI,CACF,IAAMC,EAAS,MAAMF,EACrBN,EAAQQ,CAAM,CAChB,OAASC,EAAO,CACdR,EAAOQ,CAAK,CACd,CACF,CAAC,EAED,MAAI,CAACZ,GAAgBE,IACnBA,EAAW,GAAGW,EAAoB,cAAgBC,GAAgB,CAChE,KAAK,wBAAwBD,EAAoB,cAAeZ,CAAe,EAAEa,CAAG,CACtF,CAAC,EACDZ,EAAW,GAAGW,EAAoB,WAAY,IAAM,CAClD,KAAK,wBAAwBA,EAAoB,WAAYZ,CAAe,EAAE,CAChF,CAAC,EACDC,EAAW,GAAGW,EAAoB,mBAAqBE,GAAyB,CAC9E,KAAK,wBAAwBF,EAAoB,mBAAoBZ,CAAe,EAAEc,CAAY,CACpG,CAAC,EACDb,EAAW,GAAGW,EAAoB,OAAQ,IAAM,CAC9C,KAAK,wBAAwBA,EAAoB,OAAQZ,CAAe,EAAE,CAC5E,CAAC,GAGIC,CACT,CAEO,WAAWZ,EAAgD,CAChE,GAAM,CAAE,GAAA0B,EAAI,SAAAxB,CAAS,EAAIF,EACnBkB,EAAiB,KAAK,MAAM,yDAA2E,CAC3G,CACE,sBAAuBQ,EACvB,SAAAxB,CACF,CACF,CAAC,EACD,OAAO,KAAK,QAAegB,CAAc,CAC3C,CAEO,iBAAiBQ,EAAY,CAClC,IAAMR,EAAiB,KAAK,MAAM,6DAAgF,CAChH,CACE,sBAAuBQ,CACzB,CACF,CAAC,EAED,OAAO,KAAK,QAAaR,CAAc,CACzC,CAEA,MAAa,kBAAkBhB,EAAW,GAAI,CAC5C,GAAI,CAAC,OAAO,oBACV,MAAM,KAAK,8BAA8B,EAE3C,IAAMyB,EAAU,MAAM,KAAK,QACzB,KAAK,MAAM,wEAAmF,CAAC,CAAC,CAClG,EAEIpB,EACJ,GAAI,CACFA,EAAc,MAAM,UAAU,YAAY,OAAO,CAC/C,UAAWoB,EAAQ,kBACrB,CAAC,CACH,OAASnB,EAAU,CACjB,MAAM,KAAK,mCAAmCA,CAAG,CACnD,CAEA,OAAO,KAAK,QACV,KAAK,MAAM,kEAA8E,CACvF,CACE,SAAAN,EACA,UAAWK,EAAW,SAAS,cAAc,EAC7C,WAAY,UAAU,UACtB,sBAAuBE,EAAOF,CAAU,CAC1C,CACF,CAAC,CACH,CACF,CAEO,aAAc,CACnB,IAAMW,EAAiB,KAAK,MAAM,kEAAwE,CAAC,CAAC,EAC5G,OAAO,KAAK,QAAeA,CAAc,CAC3C,CACF",
4
+ "sourcesContent": ["import { Extension } from '@magic-sdk/provider';\nimport {\n RegisterNewUserConfiguration,\n LoginWithWebAuthnConfiguration,\n MagicWebAuthnPayloadMethod,\n WebAuthnSDKErrorCode,\n UpdateWebAuthnInfoConfiguration,\n} from './types';\nimport { PasskeyResult, PasskeyEventHandlers, PasskeyMFAEventEmit, PasskeyMFAEventOnReceived } from '@magic-sdk/types';\nimport { toJSON } from './utils/polyfills';\n\nexport class WebAuthnExtension extends Extension.Internal<'webauthn', any> {\n name = 'webauthn' as const;\n config: any = {};\n\n private createWebAuthnNotSupportError() {\n this.createError(WebAuthnSDKErrorCode.WebAuthnNotSupported, 'WebAuthn is not supported in this device.', {});\n }\n\n private createWebAuthCreateCredentialError(message: string) {\n this.createError(WebAuthnSDKErrorCode.WebAuthnCreateCredentialError, `Error creating credential: ${message}`, {});\n }\n\n public async registerNewUser(configuration?: RegisterNewUserConfiguration) {\n if (!window.PublicKeyCredential) {\n throw this.createWebAuthnNotSupportError();\n }\n const { username, nickname = '', skipDIDToken, lifespan } = configuration ?? {};\n\n const { registrationOptions, registrationToken } = await this.request<any>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterPasskeyStart, [{ username }]),\n );\n\n let credential;\n try {\n credential = (await navigator.credentials.create({\n publicKey: registrationOptions,\n })) as any;\n } catch (err: any) {\n throw this.createWebAuthCreateCredentialError(err);\n }\n\n return this.request<string | null>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterPasskeyVerify, [\n {\n registrationToken,\n registrationResponse: toJSON(credential),\n nickname,\n transport: credential.response.getTransports(),\n userAgent: navigator.userAgent,\n skipDIDToken,\n lifespan,\n },\n ]),\n );\n }\n\n public login(configuration?: LoginWithWebAuthnConfiguration) {\n const { username, showMfaModal, skipDIDToken, lifespan } = configuration ?? {};\n\n let verifyPayloadId: string;\n\n const promiEvent = this.utils.createPromiEvent<PasskeyResult, PasskeyEventHandlers>(async (resolve, reject) => {\n if (!window.PublicKeyCredential) {\n return reject(this.createWebAuthnNotSupportError());\n }\n\n const { authenticationToken, authenticationOptions } = await this.request<any>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.LoginWithPasskeyStart, [{ username }]),\n );\n\n let assertion;\n try {\n assertion = (await navigator.credentials.get({\n publicKey: authenticationOptions,\n })) as any;\n } catch (err: any) {\n return reject(this.createWebAuthCreateCredentialError(err));\n }\n\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.LoginWithPasskeyVerify, [\n {\n authenticationToken,\n assertionResponse: toJSON(assertion),\n showUI: showMfaModal,\n skipDIDToken,\n lifespan,\n },\n ]);\n\n verifyPayloadId = requestPayload.id as string;\n\n const loginRequest = this.request<PasskeyResult, PasskeyEventHandlers>(requestPayload);\n\n if (!showMfaModal) {\n loginRequest.on(PasskeyMFAEventOnReceived.MfaSentHandle, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.MfaSentHandle);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.InvalidMfaOtp, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.InvalidMfaOtp);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.RecoveryCodeSentHandle, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.RecoveryCodeSentHandle);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.InvalidRecoveryCode, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.InvalidRecoveryCode);\n });\n loginRequest.on(PasskeyMFAEventOnReceived.RecoveryCodeSuccess, () => {\n promiEvent.emit(PasskeyMFAEventOnReceived.RecoveryCodeSuccess);\n });\n }\n\n try {\n const result = await loginRequest;\n resolve(result);\n } catch (error) {\n reject(error);\n }\n });\n\n if (!showMfaModal && promiEvent) {\n promiEvent.on(PasskeyMFAEventEmit.VerifyMFACode, (mfa: string) => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.VerifyMFACode, verifyPayloadId)(mfa);\n });\n promiEvent.on(PasskeyMFAEventEmit.LostDevice, () => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.LostDevice, verifyPayloadId)();\n });\n promiEvent.on(PasskeyMFAEventEmit.VerifyRecoveryCode, (recoveryCode: string) => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.VerifyRecoveryCode, verifyPayloadId)(recoveryCode);\n });\n promiEvent.on(PasskeyMFAEventEmit.Cancel, () => {\n this.createIntermediaryEvent(PasskeyMFAEventEmit.Cancel, verifyPayloadId)();\n });\n }\n\n return promiEvent;\n }\n\n public updateInfo(configuration: UpdateWebAuthnInfoConfiguration) {\n const { id, nickname } = configuration;\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.UpdateWebAuthnInfo, [\n {\n webAuthnCredentialsId: id,\n nickname,\n },\n ]);\n return this.request<any[]>(requestPayload);\n }\n\n public unregisterDevice(id: string) {\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.UnregisterWebAuthDevice, [\n {\n webAuthnCredentialsId: id,\n },\n ]);\n\n return this.request<any>(requestPayload);\n }\n\n public async registerNewDevice(nickname = '') {\n if (!window.PublicKeyCredential) {\n throw this.createWebAuthnNotSupportError();\n }\n const options = await this.request<any>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterWebAuthDeviceStart, []),\n );\n\n let credential;\n try {\n credential = (await navigator.credentials.create({\n publicKey: options.credential_options,\n })) as any;\n } catch (err: any) {\n throw this.createWebAuthCreateCredentialError(err);\n }\n\n return this.request<string | null>(\n this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.RegisterWebAuthDevice, [\n {\n nickname,\n transport: credential.response.getTransports(),\n user_agent: navigator.userAgent,\n registration_response: toJSON(credential),\n },\n ]),\n );\n }\n\n public getMetadata() {\n const requestPayload = this.utils.createJsonRpcRequestPayload(MagicWebAuthnPayloadMethod.GetWebAuthnInfo, []);\n return this.request<any[]>(requestPayload);\n }\n}\n", "export enum SDKErrorCode {\n MissingApiKey = 'MISSING_API_KEY',\n ModalNotReady = 'MODAL_NOT_READY',\n ConnectionLost = 'CONNECTION_WAS_LOST',\n MalformedResponse = 'MALFORMED_RESPONSE',\n InvalidArgument = 'INVALID_ARGUMENT',\n ExtensionNotInitialized = 'EXTENSION_NOT_INITIALIZED',\n IncompatibleExtensions = 'INCOMPATIBLE_EXTENSIONS',\n}\n\nexport enum SDKWarningCode {\n SyncWeb3Method = 'SYNC_WEB3_METHOD',\n DuplicateIframe = 'DUPLICATE_IFRAME',\n ReactNativeEndpointConfiguration = 'REACT_NATIVE_ENDPOINT_CONFIGURATION',\n DeprecationNotice = 'DEPRECATION_NOTICE',\n ProductAnnouncement = 'ANNOUNCEMENT',\n}\n\nexport enum RPCErrorCode {\n // Standard JSON RPC 2.0 Error Codes\n ParseError = -32700,\n InvalidRequest = -32600,\n MethodNotFound = -32601,\n InvalidParams = -32602,\n InternalError = -32603,\n\n // Custom RPC Error Codes\n MagicLinkFailedVerification = -10000,\n MagicLinkExpired = -10001,\n MagicLinkRateLimited = -10002,\n UserAlreadyLoggedIn = -10003,\n UpdateEmailFailed = -10004,\n UserRequestEditEmail = -10005,\n MagicLinkInvalidRedirectURL = -10006,\n InactiveRecipient = -10010,\n AccessDeniedToUser = -10011,\n UserRejectedAction = -10012,\n RequestCancelled = -10014,\n RedirectLoginComplete = -10015,\n SessionTerminated = -10016,\n PopupRequestOverriden = -10017,\n SanEmail = -10018,\n DpopInvalidated = -10019,\n MaxAttemptsReached = -10031,\n UserRequiredMfa = -10033,\n}\n\nexport type ErrorCode = SDKErrorCode | RPCErrorCode;\nexport type WarningCode = SDKWarningCode;\n", "import { RPCErrorCode } from './exception-types';\n\n// --- Request interfaces\n\nexport interface JsonRpcRequestPayload<TParams = any> {\n jsonrpc: string;\n id: string | number | null;\n method: string;\n params?: TParams;\n}\n\nexport interface JsonRpcRequestCallback {\n /** Callback executed upon JSON RPC response. */\n (err: JsonRpcError | null, result?: JsonRpcResponsePayload | null): void;\n}\n\nexport interface JsonRpcBatchRequestCallback {\n /** Callback executed upon JSON RPC response. */\n (err: JsonRpcError | null, result?: (JsonRpcResponsePayload | null)[] | null): void;\n}\n\n// --- Response interfaces\n\nexport interface JsonRpcError {\n message: string;\n code: RPCErrorCode;\n data?: any;\n}\n\nexport interface JsonRpcResponsePayload<ResultType = any> {\n jsonrpc: string;\n id: string | number | null;\n result?: ResultType | null;\n error?: JsonRpcError | null;\n}\n\nexport interface UserInfo {\n email?: string;\n}\n\nexport type ShowUIPromiEvents = {\n disconnect: () => void;\n};\n\nexport interface RequestUserInfoScope {\n scope?: {\n email?: 'required' | 'optional';\n };\n}\n\nexport enum LocalStorageKeys {\n PROVIDER = 'magic_3pw_provider',\n ADDRESS = 'magic_3pw_address',\n CHAIN_ID = 'magic_3pw_chainId',\n}\n\nexport enum ThirdPartyWalletEvents {\n WalletConnected = 'wallet_connected',\n WalletRejected = 'wallet_rejected',\n Web3ModalSelected = 'web3modal_selected',\n}\n\nexport interface ConnectWithUIOptions {\n autoPromptThirdPartyWallets?: boolean;\n}\n\nexport type ConnectWithUiEvents = {\n 'id-token-created': (params: { idToken: string }) => void;\n} & { [key in ThirdPartyWalletEvents]: () => void };\n\n// --- Payload methods\n\n/**\n * Enum of JSON RPC methods for interacting with the Magic SDK authentication\n * relayer.\n */\nexport enum MagicPayloadMethod {\n LoginWithSms = 'magic_auth_login_with_sms',\n LoginWithEmailOTP = 'magic_auth_login_with_email_otp',\n LoginWithMagicLink = 'magic_auth_login_with_magic_link',\n LoginWithCredential = 'magic_auth_login_with_credential',\n SetAuthorizationToken = 'magic_auth_set_authorization_token',\n GetIdToken = 'magic_auth_get_id_token',\n GenerateIdToken = 'magic_auth_generate_id_token',\n GetMetadata = 'magic_auth_get_metadata',\n IsLoggedIn = 'magic_is_logged_in',\n Logout = 'magic_auth_logout',\n UpdateEmail = 'magic_auth_update_email',\n UserSettings = 'magic_auth_settings',\n UserSettingsTestMode = 'magic_auth_settings_testing_mode',\n LoginWithSmsTestMode = 'magic_auth_login_with_sms_testing_mode',\n LoginWithEmailOTPTestMode = 'magic_auth_login_with_email_otp_testing_mode',\n LoginWithMagicLinkTestMode = 'magic_login_with_magic_link_testing_mode',\n LoginWithCredentialTestMode = 'magic_auth_login_with_credential_testing_mode',\n GetIdTokenTestMode = 'magic_auth_get_id_token_testing_mode',\n GenerateIdTokenTestMode = 'magic_auth_generate_id_token_testing_mode',\n GetMetadataTestMode = 'magic_auth_get_metadata_testing_mode',\n IsLoggedInTestMode = 'magic_auth_is_logged_in_testing_mode',\n LogoutTestMode = 'magic_auth_logout_testing_mode',\n UpdateEmailTestMode = 'magic_auth_update_email_testing_mode',\n IntermediaryEvent = 'magic_intermediary_event',\n RequestAccounts = 'eth_requestAccounts',\n GetInfo = 'magic_get_info',\n ShowUI = 'magic_wallet',\n NFTPurchase = 'magic_nft_purchase',\n NFTCheckout = 'magic_nft_checkout',\n NFTTransfer = 'magic_nft_transfer',\n RequestUserInfoWithUI = 'mc_request_user_info',\n Disconnect = 'mc_disconnect',\n // UpdatePhoneNumber = 'magic_auth_update_phone_number',\n // UpdatePhoneNumberTestMode = 'magic_auth_update_phone_number_testing_mode',\n RecoverAccount = 'magic_auth_recover_account',\n RecoverAccountTestMode = 'magic_auth_recover_account_testing_mode',\n MagicBoxHeartBeat = 'magic_box_heart_beat',\n AutoConnect = 'mc_auto_connect',\n Login = 'mc_login',\n EncryptV1 = 'magic_auth_encrypt_v1',\n DecryptV1 = 'magic_auth_decrypt_v1',\n ShowNFTs = 'magic_show_nfts',\n ShowOnRamp = 'magic_show_fiat_onramp',\n ShowSendTokensUI = 'magic_show_send_tokens_ui',\n ShowAddress = 'magic_show_address',\n ShowBalances = 'magic_show_balances',\n RevealPK = 'magic_reveal_key',\n EnableMFA = 'magic_auth_enable_mfa_flow',\n DisableMFA = 'magic_auth_disable_mfa_flow',\n GetMultichainPublicAddress = 'magic_get_multichain_public_address',\n Sign7702Authorization = 'magic_wallet_sign_7702_authorization',\n Send7702Transaction = 'eth_send7702Transaction',\n}\n\n// Methods to not route if connected to third party wallet\nexport const routeToMagicMethods = [\n MagicPayloadMethod.IntermediaryEvent,\n MagicPayloadMethod.NFTCheckout,\n MagicPayloadMethod.Login,\n];\n", "import { JsonRpcResponsePayload, JsonRpcError, JsonRpcRequestPayload } from './json-rpc-types';\n\nexport enum MagicIncomingWindowMessage {\n MAGIC_HANDLE_RESPONSE = 'MAGIC_HANDLE_RESPONSE',\n MAGIC_OVERLAY_READY = 'MAGIC_OVERLAY_READY',\n MAGIC_SHOW_OVERLAY = 'MAGIC_SHOW_OVERLAY',\n MAGIC_HIDE_OVERLAY = 'MAGIC_HIDE_OVERLAY',\n MAGIC_HANDLE_EVENT = 'MAGIC_HANDLE_EVENT',\n MAGIC_MG_BOX_SEND_RECEIPT = 'MAGIC_MG_BOX_SEND_RECEIPT',\n MAGIC_SEND_PRODUCT_ANNOUNCEMENT = 'MAGIC_SEND_PRODUCT_ANNOUNCEMENT',\n MAGIC_PONG = 'MAGIC_PONG',\n MAGIC_POPUP_RESPONSE = 'MAGIC_POPUP_RESPONSE',\n MAGIC_POPUP_OAUTH_VERIFY_RESPONSE = 'MAGIC_POPUP_OAUTH_VERIFY_RESPONSE',\n MAGIC_THIRD_PARTY_WALLET_REQUEST = 'MAGIC_THIRD_PARTY_WALLET_REQUEST',\n MAGIC_OPEN_MOBILE_URL = 'MAGIC_OPEN_MOBILE_URL',\n}\n\nexport enum MagicOutgoingWindowMessage {\n MAGIC_HANDLE_REQUEST = 'MAGIC_HANDLE_REQUEST',\n MAGIC_THIRD_PARTY_WALLET_RESPONSE = 'MAGIC_THIRD_PARTY_WALLET_RESPONSE',\n MAGIC_THIRD_PARTY_WALLET_UPDATE = 'MAGIC_THIRD_PARTY_WALLET_EVENT',\n MAGIC_PING = 'MAGIC_PING',\n}\n\n/** The shape of responding window message data from the Magic iframe context. */\nexport interface MagicMessageRequest {\n msgType: string;\n payload: JsonRpcRequestPayload | JsonRpcRequestPayload[];\n rt?: string;\n jwt?: string;\n deviceShare?: string;\n}\n\n/** The shape of responding window message data from the Magic iframe context. */\nexport interface MagicMessageResponse<ResultType = any> {\n msgType: string;\n response: Partial<JsonRpcError> & Partial<JsonRpcResponsePayload<ResultType>>;\n rt?: string;\n deviceShare?: string;\n}\n\n/** The expected message event returned by the Magic iframe context. */\nexport interface MagicMessageEvent extends Partial<MessageEvent> {\n data: MagicMessageResponse;\n}\n\nexport interface MagicThirdPartyWalletRequest {\n msgType: MagicIncomingWindowMessage.MAGIC_THIRD_PARTY_WALLET_REQUEST;\n payload: JsonRpcRequestPayload;\n}\n\nexport interface MagicThirdPartyWalletResponse {\n msgType: `${MagicOutgoingWindowMessage.MAGIC_THIRD_PARTY_WALLET_RESPONSE}-${string}`;\n response: JsonRpcResponsePayload;\n}\n\nexport interface MagicThirdPartyWalletUpdate {\n msgType: `${MagicOutgoingWindowMessage.MAGIC_THIRD_PARTY_WALLET_UPDATE}-${string}`;\n details: {\n address: `0x${string}` | undefined;\n addresses: readonly `0x${string}`[] | undefined;\n chain: { id: number; name: string; [key: string]: unknown } | undefined;\n updatedField: 'chain' | 'address';\n };\n}\n\nexport type MagicThirdPartyWalletEventPayload = MagicThirdPartyWalletResponse | MagicThirdPartyWalletUpdate;\n", "export enum DeepLinkPage {\n UpdateEmail = 'update-email',\n MFA = 'mfa',\n Recovery = 'recovery',\n}\n", "import { WalletEventOnReceived } from './wallet-types';\n\nexport interface LoginWithMagicLinkConfiguration {\n /**\n * The email address of the user attempting to login.\n */\n email: string;\n\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to check their email for the \"magic link\" to complete their\n * authentication.\n */\n showUI?: boolean;\n\n /**\n * You can optionally provide a redirect URI that will be followed at the end\n * of the magic link flow. Don't forget to invoke\n * `magic.auth.loginWithCredential()` to complete the login from the route you\n * configure here.\n */\n redirectURI?: string;\n\n /**\n * Enterprise users with a custom SMTP can create custom email templates\n * from their dashboard. The default Magic loginWithMagicLink email will be\n * overridden when a variation is passed here.\n */\n overrides?: {\n variation?: string;\n };\n\n /**\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface LoginWithSmsConfiguration {\n /**\n * Specify the phone number of the user attempting to login.\n */\n phoneNumber: string;\n\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to check their SMS for the one time passcode (OTP) to complete their\n * authentication.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the SMS OTP flow.\n */\n showUI?: boolean;\n\n /*\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\nexport interface LoginWithEmailOTPConfiguration {\n /**\n * Specify the email address of the user attempting to login.\n */\n email: string;\n\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to check their email for the one time passcode (OTP) to complete their\n * authentication.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the email OTP flow.\n */\n showUI?: boolean;\n\n /**\n * Device Unrecognized UI will enforce showing up to secure user's login\n *\n * When set to true (default), an improved device recognition UI will be displayed to the user,\n * prompting them to verify their login by checking their email for device approval. This feature\n * enhances authentication security.\n *\n * This param will only be affected if showUI is false. When set to false,\n * developers have the flexibility to implement their own customized UI to\n * handle device check events, providing a more tailored user experience.\n */\n deviceCheckUI?: boolean;\n\n /**\n * Enterprise users with a custom SMTP can create custom email templates\n * from their dashboard. The default Magic loginWithOTP email will be\n * overridden when a variation is passed here.\n */\n overrides?: {\n variation?: string;\n appName?: string;\n assetUrl?: string;\n };\n\n /**\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface LoginWithCredentialConfiguration {\n /**\n * A credential token or a valid query string (prefixed with ? or #)\n */\n credentialOrQueryString?: string;\n\n /**\n * The number of seconds until the generated Decentralized ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface EnableMFAConfiguration {\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to enable MFA using Google Authenticator app.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the enable MFA flow.\n */\n showUI?: boolean;\n}\n\nexport interface DisableMFAConfiguration {\n /**\n * When `true`, a pre-built modal interface will show to the user, directing\n * them to disable MFA.\n *\n * When `false`, developers will be able to implement their own custom UI to\n * continue the disable MFA flow.\n */\n showUI?: boolean;\n}\n\n/**\n * Auth Events Enum\n */\nexport enum LoginWithMagicLinkEventEmit {\n Retry = 'retry',\n}\n\nexport enum LoginWithMagicLinkEventOnReceived {\n EmailSent = 'email-sent',\n EmailNotDeliverable = 'email-not-deliverable',\n}\n\nexport enum LoginWithEmailOTPEventEmit {\n VerifyEmailOtp = 'verify-email-otp',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n Cancel = 'cancel',\n}\n\nexport enum LoginWithSmsOTPEventEmit {\n VerifySmsOtp = 'verify-sms-otp',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n Cancel = 'cancel',\n Retry = 'retry',\n}\n\nexport enum LoginWithSmsOTPEventOnReceived {\n SmsOTPSent = 'sms-otp-sent',\n InvalidSmsOtp = 'invalid-sms-otp',\n ExpiredSmsOtp = 'expired-sms-otp',\n MfaSentHandle = 'mfa-sent-handle',\n InvalidMfaOtp = 'invalid-mfa-otp',\n LoginThrottled = 'login-throttled',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n}\n\nexport enum LoginWithEmailOTPEventOnReceived {\n EmailOTPSent = 'email-otp-sent',\n InvalidEmailOtp = 'invalid-email-otp',\n InvalidMfaOtp = 'invalid-mfa-otp',\n ExpiredEmailOtp = 'expired-email-otp',\n MfaSentHandle = 'mfa-sent-handle',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n LoginThrottled = 'login-throttled',\n MaxAttemptsReached = 'max-attempts-reached',\n}\n\nexport enum DeviceVerificationEventEmit {\n Retry = 'device-retry',\n}\n\nexport enum DeviceVerificationEventOnReceived {\n DeviceApproved = 'device-approved',\n DeviceNeedsApproval = 'device-needs-approval',\n DeviceVerificationLinkExpired = 'device-verification-link-expired',\n DeviceVerificationEmailSent = 'device-verification-email-sent',\n}\n\nexport enum RecencyCheckEventEmit {\n Retry = 'Recency/auth-factor-retry',\n Cancel = 'Recency/auth-factor-verification-cancel',\n VerifyEmailOtp = 'Recency/auth-factor-verify-email-otp',\n VerifyMFACode = 'Recency/verify-mfa-code',\n}\n\nexport enum RecencyCheckEventOnReceived {\n PrimaryAuthFactorNeedsVerification = 'Recency/auth-factor-needs-verification',\n PrimaryAuthFactorVerified = 'Recency/auth-factor-verified',\n InvalidEmailOtp = 'Recency/auth-factor-invalid-email-otp',\n EmailExpired = 'Recency/auth-factor-verification-email-expired',\n EmailSent = 'Recency/auth-factor-verification-email-sent',\n EmailNotDeliverable = 'Recency/auth-factor-verification-email-not-deliverable',\n}\n\nexport enum UpdateEmailEventEmit {\n RetryWithNewEmail = 'UpdateEmail/retry-with-new-email',\n Cancel = 'UpdateEmail/new-email-verification-cancel',\n VerifyEmailOtp = 'UpdateEmail/new-email-verify-otp',\n}\n\nexport enum UpdateEmailEventOnReceived {\n NewAuthFactorNeedsVerification = 'UpdateEmail/new-email-needs-verification',\n EmailUpdated = 'UpdateEmail/email-updated',\n InvalidEmailOtp = 'UpdateEmail/new-email-invalid-email-otp',\n EmailExpired = 'UpdateEmail/new-email-verification-email-expired',\n EmailSent = 'UpdateEmail/new-email-verification-email-sent',\n EmailNotDeliverable = 'UpdateEmail/new-email-verification-email-not-deliverable',\n InvalidEmail = 'UpdateEmail/new-email-invalid',\n EmailAlreadyExists = 'UpdateEmail/new-email-already-exists',\n}\n\nexport enum AuthEventOnReceived {\n IDTokenCreated = 'Auth/id-token-created',\n}\n\nexport enum FarcasterLoginEventEmit {\n Cancel = 'Farcaster/cancel',\n}\n\nexport enum EnableMFAEventOnReceived {\n MFASecretGenerated = 'mfa-secret-generated',\n InvalidMFAOtp = 'invalid-mfa-otp',\n MFARecoveryCodes = 'mfa-recovery-codes',\n}\nexport enum EnableMFAEventEmit {\n VerifyMFACode = 'verify-mfa-code',\n Cancel = 'cancel-mfa-setup',\n}\n\nexport enum DisableMFAEventOnReceived {\n MFACodeRequested = 'mfa-code-requested',\n InvalidMFAOtp = 'invalid-mfa-otp',\n InvalidRecoveryCode = 'invalid-recovery-code',\n}\n\nexport enum DisableMFAEventEmit {\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n Cancel = 'cancel-mfa-disable',\n}\n\n/**\n * EventHandlers\n */\nexport type LoginWithMagicLinkEventHandlers = {\n // Event Received\n [LoginWithMagicLinkEventOnReceived.EmailSent]: () => void;\n [LoginWithMagicLinkEventOnReceived.EmailNotDeliverable]: () => void;\n\n // Event sent\n [LoginWithMagicLinkEventEmit.Retry]: () => void;\n} & DeviceVerificationEventHandlers;\n\nexport type LoginWithSmsOTPEventHandlers = {\n // Event sent\n [LoginWithSmsOTPEventEmit.VerifySmsOtp]: (otp: string) => void;\n [LoginWithSmsOTPEventEmit.VerifyMFACode]: (mfa: string) => void;\n [LoginWithSmsOTPEventEmit.LostDevice]: () => void;\n [LoginWithSmsOTPEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n [LoginWithSmsOTPEventEmit.Cancel]: () => void;\n [LoginWithSmsOTPEventEmit.Retry]: () => void;\n\n // Event received\n [LoginWithSmsOTPEventOnReceived.SmsOTPSent]: () => void;\n [LoginWithSmsOTPEventOnReceived.InvalidSmsOtp]: () => void;\n [LoginWithSmsOTPEventOnReceived.ExpiredSmsOtp]: () => void;\n [LoginWithSmsOTPEventOnReceived.MfaSentHandle]: () => void;\n [LoginWithSmsOTPEventOnReceived.InvalidMfaOtp]: () => void;\n [LoginWithSmsOTPEventOnReceived.LoginThrottled]: () => void;\n [LoginWithSmsOTPEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [LoginWithSmsOTPEventOnReceived.InvalidRecoveryCode]: () => void;\n [LoginWithSmsOTPEventOnReceived.RecoveryCodeSuccess]: () => void;\n} & DeviceVerificationEventHandlers;\n\nexport type LoginWithEmailOTPEventHandlers = {\n // Event Received\n [LoginWithEmailOTPEventOnReceived.EmailOTPSent]: () => void;\n [LoginWithEmailOTPEventOnReceived.LoginThrottled]: () => void;\n [LoginWithEmailOTPEventOnReceived.InvalidEmailOtp]: () => void;\n [LoginWithEmailOTPEventOnReceived.InvalidMfaOtp]: () => void;\n [LoginWithEmailOTPEventOnReceived.ExpiredEmailOtp]: () => void;\n [LoginWithEmailOTPEventOnReceived.MfaSentHandle]: () => void;\n [LoginWithEmailOTPEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [LoginWithEmailOTPEventOnReceived.InvalidRecoveryCode]: () => void;\n [LoginWithEmailOTPEventOnReceived.RecoveryCodeSuccess]: () => void;\n [LoginWithEmailOTPEventOnReceived.MaxAttemptsReached]: () => void;\n [AuthEventOnReceived.IDTokenCreated]: (idToken: string) => void;\n [WalletEventOnReceived.WalletInfoFetched]: () => void;\n\n // Event sent\n [LoginWithEmailOTPEventEmit.VerifyEmailOtp]: (otp: string) => void;\n [LoginWithEmailOTPEventEmit.VerifyMFACode]: (mfa: string) => void;\n [LoginWithEmailOTPEventEmit.LostDevice]: () => void;\n [LoginWithEmailOTPEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n [LoginWithEmailOTPEventEmit.Cancel]: () => void;\n} & DeviceVerificationEventHandlers;\n\ntype DeviceVerificationEventHandlers = {\n // Event Received\n [DeviceVerificationEventOnReceived.DeviceNeedsApproval]: () => void;\n [DeviceVerificationEventOnReceived.DeviceVerificationEmailSent]: () => void;\n [DeviceVerificationEventOnReceived.DeviceVerificationLinkExpired]: () => void;\n [DeviceVerificationEventOnReceived.DeviceApproved]: () => void;\n\n // Event sent\n [DeviceVerificationEventEmit.Retry]: () => void;\n};\n\n/**\n * Update Email\n */\n\nexport type RecencyCheckEventHandlers = {\n [RecencyCheckEventOnReceived.PrimaryAuthFactorNeedsVerification]: () => void;\n [RecencyCheckEventOnReceived.PrimaryAuthFactorVerified]: () => void;\n [RecencyCheckEventOnReceived.InvalidEmailOtp]: () => void;\n [RecencyCheckEventOnReceived.EmailNotDeliverable]: () => void;\n [RecencyCheckEventOnReceived.EmailExpired]: () => void;\n [RecencyCheckEventOnReceived.EmailSent]: () => void;\n\n [RecencyCheckEventEmit.Cancel]: () => void;\n [RecencyCheckEventEmit.Retry]: () => void;\n [RecencyCheckEventEmit.VerifyEmailOtp]: (otp: string) => void;\n [RecencyCheckEventEmit.VerifyMFACode]: (mfa: string) => void;\n};\n\nexport type UpdateEmailEventHandlers = {\n [UpdateEmailEventOnReceived.NewAuthFactorNeedsVerification]: () => void;\n [UpdateEmailEventOnReceived.EmailUpdated]: () => void;\n [UpdateEmailEventOnReceived.InvalidEmailOtp]: () => void;\n [UpdateEmailEventOnReceived.EmailNotDeliverable]: () => void;\n [UpdateEmailEventOnReceived.EmailExpired]: () => void;\n [UpdateEmailEventOnReceived.EmailSent]: () => void;\n [UpdateEmailEventOnReceived.InvalidEmail]: () => void;\n [UpdateEmailEventOnReceived.EmailAlreadyExists]: () => void;\n\n [UpdateEmailEventEmit.Cancel]: () => void;\n [UpdateEmailEventEmit.RetryWithNewEmail]: (email?: string) => void;\n [UpdateEmailEventEmit.VerifyEmailOtp]: (otp: string) => void;\n} & RecencyCheckEventHandlers;\n\n/**\n * Enable MFA\n */\n\nexport type EnableMFAEventHandlers = {\n // Event Received\n [EnableMFAEventOnReceived.MFASecretGenerated]: ({ QRCode, key }: { QRCode: string; key: string }) => void;\n [EnableMFAEventOnReceived.InvalidMFAOtp]: ({ errorCode }: { errorCode: string }) => void;\n [EnableMFAEventOnReceived.MFARecoveryCodes]: ({ recoveryCode }: { recoveryCode: string }) => void;\n\n // Event sent\n [EnableMFAEventEmit.VerifyMFACode]: (totp: string) => void;\n [EnableMFAEventEmit.Cancel]: () => void;\n};\n\n/**\n * Disable MFA\n */\n\nexport type DisableMFAEventHandlers = {\n // Event Received\n [DisableMFAEventOnReceived.MFACodeRequested]: () => void;\n [DisableMFAEventOnReceived.InvalidMFAOtp]: ({ errorCode }: { errorCode: string }) => void;\n [DisableMFAEventOnReceived.InvalidRecoveryCode]: () => void;\n\n // Event sent\n [DisableMFAEventEmit.VerifyMFACode]: (totp: string) => void;\n [DisableMFAEventEmit.LostDevice]: (recoveryCode: string) => void;\n [DisableMFAEventEmit.Cancel]: () => void;\n};\n", "export type EthNetworkName = 'mainnet' | 'goerli' | 'sepolia';\n\nexport enum EthChainType {\n Harmony = 'HARMONY',\n}\n\nexport interface CustomNodeConfiguration {\n rpcUrl: string;\n chainId?: number;\n chainType?: EthChainType;\n}\n\nexport type EthNetworkConfiguration = EthNetworkName | CustomNodeConfiguration;\n\nexport type ProviderEnableEvents = {\n 'id-token-created': (params: { idToken: string }) => void;\n};\n", "import { RecencyCheckEventHandlers } from './auth-types';\nimport { DeepLinkPage } from '../core/deep-link-pages';\n\nexport interface GetIdTokenConfiguration {\n /**\n * The number of seconds until the generated ID token will expire.\n */\n lifespan?: number;\n}\n\nexport interface GenerateIdTokenConfiguration extends GetIdTokenConfiguration {\n /**\n * An optional piece of data to sign with the token. Note, however, that the\n * unsigned data _will not_ be encoded in the token, only an encrypted\n * signature of the data.\n */\n attachment?: string;\n}\n\nexport enum UserEventsEmit {\n ClosedByUser = 'closed-by-user',\n}\n\nexport enum UserEventsOnReceived {\n ClosedByUser = 'closed-by-user-on-received',\n}\n\nexport interface ChainWalletInfo {\n publicAddress: string | null;\n subAccounts: Array<{ name: string; publicAddress: string }>;\n}\n\nexport interface MagicUserMetadata {\n issuer: string | null;\n email: string | null;\n phoneNumber: string | null;\n isMfaEnabled: boolean;\n recoveryFactors: [RecoveryFactor] | [];\n firstLoginAt: string | null;\n wallets: {\n ethereum?: ChainWalletInfo;\n algorand?: ChainWalletInfo;\n aptos?: ChainWalletInfo;\n avalancheX?: ChainWalletInfo;\n bitcoin?: ChainWalletInfo;\n conflux?: ChainWalletInfo;\n cosmos?: ChainWalletInfo;\n flow?: ChainWalletInfo;\n harmony?: ChainWalletInfo;\n hedera?: ChainWalletInfo;\n icon?: ChainWalletInfo;\n kadena?: ChainWalletInfo;\n near?: ChainWalletInfo;\n polkadot?: ChainWalletInfo;\n solana?: ChainWalletInfo;\n sui?: ChainWalletInfo;\n taquito?: ChainWalletInfo;\n terra?: ChainWalletInfo;\n tezos?: ChainWalletInfo;\n zilliqa?: ChainWalletInfo;\n [chain: string]: ChainWalletInfo | undefined;\n };\n}\n\nexport enum RecoveryFactorEventOnReceived {\n EnterNewPhoneNumber = 'enter-new-phone-number',\n EnterOtpCode = 'enter-otp-code',\n RecoveryFactorAlreadyExists = 'recovery-factor-already-exists',\n MalformedPhoneNumber = 'malformed-phone-number',\n InvalidOtpCode = 'invalid-otp-code',\n RecoveryFactorUpdated = 'recovery-factor-updated',\n RecoveryFactorDeleted = 'recovery-factor-deleted',\n}\n\nexport enum RecoveryFactorEventEmit {\n SendNewPhoneNumber = 'send-new-phone-number',\n SendOtpCode = 'send-otp-code',\n Cancel = 'cancel',\n StartEditPhoneNumber = 'start-edit-phone-number',\n}\n\ntype RecoveryFactor = {\n type: RecoveryMethodType;\n value: string;\n};\n\nexport type RecoveryFactorEventHandlers = {\n // Event Received\n [RecoveryFactorEventEmit.SendNewPhoneNumber]: (phone_number: string) => void;\n [RecoveryFactorEventEmit.SendOtpCode]: (otp: string) => void;\n [RecoveryFactorEventEmit.StartEditPhoneNumber]: () => void;\n [RecoveryFactorEventEmit.Cancel]: () => void;\n\n // Event sent\n [RecoveryFactorEventOnReceived.EnterNewPhoneNumber]: () => void;\n [RecoveryFactorEventOnReceived.EnterOtpCode]: () => void;\n [RecoveryFactorEventOnReceived.RecoveryFactorAlreadyExists]: () => void;\n [RecoveryFactorEventOnReceived.MalformedPhoneNumber]: () => void;\n [RecoveryFactorEventOnReceived.InvalidOtpCode]: () => void;\n [RecoveryFactorEventOnReceived.RecoveryFactorUpdated]: (updatedFactor: { type: string; value: string }) => void;\n [RecoveryFactorEventOnReceived.RecoveryFactorDeleted]: () => void;\n} & RecencyCheckEventHandlers;\n\nexport enum RecoveryMethodType {\n PhoneNumber = 'phone_number',\n}\n\nexport interface UpdateEmailConfiguration {\n /**\n * The new email address to update to\n */\n email: string;\n\n /**\n * When `true`, a pre-built pending modal interface will\n * guide the user to check their new, followed by old emails\n * for confirmation emails.\n */\n showUI?: boolean;\n}\n\nexport interface UpdateWebAuthnInfoConfiguration {\n /**\n * WebAuthn info id\n */\n id: string;\n\n /**\n * nickname that user attempts to update to the webauth device associate to the id.\n */\n nickname: string;\n}\n\nexport interface RecoverAccountConfiguration {\n /**\n * The email to recover\n */\n email: string;\n showUI: boolean;\n}\n\nexport interface ShowSettingsConfiguration {\n /**\n * deep linking destination\n */\n page: DeepLinkPage;\n showUI?: boolean;\n}\n\nexport enum RecoverAccountEventOnReceived {\n SmsOtpSent = 'sms-otp-sent',\n LoginThrottled = 'login-throttled',\n InvalidSmsOtp = 'invalid-sms-otp',\n SmsVerified = 'sms-verified',\n AccountRecovered = 'account-recovered',\n UpdateEmailRequired = 'update-email-required',\n}\n\nexport enum RecoverAccountEventEmit {\n Cancel = 'cancel',\n VerifyOtp = 'verify-otp-code',\n ResendSms = 'resend-sms-otp',\n UpdateEmail = 'update-email',\n}\n\nexport type RecoverAccountEventHandlers = {\n // Event Received\n [RecoverAccountEventEmit.Cancel]: () => void;\n [RecoverAccountEventEmit.VerifyOtp]: (otp: string) => void;\n [RecoverAccountEventEmit.ResendSms]: () => void;\n [RecoverAccountEventEmit.UpdateEmail]: (email: string) => void;\n\n // Event sent\n [RecoverAccountEventOnReceived.SmsOtpSent]: ({ phoneNumber }: { phoneNumber: string }) => void;\n [RecoverAccountEventOnReceived.LoginThrottled]: (error: string) => void;\n [RecoverAccountEventOnReceived.InvalidSmsOtp]: ({\n errorMessage,\n errorCode,\n }: {\n errorMessage: string;\n errorCode: string;\n }) => void;\n [RecoverAccountEventOnReceived.SmsVerified]: () => void;\n [RecoverAccountEventOnReceived.AccountRecovered]: () => void;\n [RecoverAccountEventOnReceived.UpdateEmailRequired]: () => void;\n};\n", "export type NFTResponseStatus = 'cancelled' | 'pending' | 'processed' | 'declined' | 'expired';\n\nexport type NFTResponse = {\n status: NFTResponseStatus;\n};\n\nexport interface NFTPurchaseRequest {\n nft: {\n name: string;\n imageUrl: string;\n blockchainNftId: string;\n contractAddress: string;\n network: string;\n platform: string;\n type: string;\n };\n identityPrefill: {\n firstName: string;\n lastName: string;\n dateOfBirth: string; // YYYY-MM-DD\n emailAddress: string;\n phone: string;\n address: {\n street1: string;\n street2: string;\n city: string;\n regionCode: string;\n postalCode: string;\n countryCode: string;\n };\n };\n}\n\nexport type NFTPurchaseResponse = NFTResponse & {\n errorMessage?: string;\n};\n\nexport interface NFTCheckoutRequest {\n // given by magic / found in the developer dashboard in future\n contractId: string;\n // in contract, if ERC1155\u2026 for ERC721, use token ID = 0\n tokenId: string;\n name: string;\n imageUrl: string;\n quantity?: number; // default is 1\n walletAddress?: string; // default is user's wallet address\n // If enabled, the user will be able to pay with crypto. the default is false\n isCryptoCheckoutEnabled?: boolean;\n walletProvider?: 'magic' | 'web3modal';\n}\n\nexport type NFTCheckoutResponse = NFTResponse;\n\nexport type NFTCheckoutEvents = {\n disconnect: () => void;\n 'nft-checkout-initiated': (rawTransaction: string) => void;\n};\n\nexport interface NFTTransferRequest {\n tokenId: string;\n contractAddress: string;\n quantity?: number;\n recipient?: string;\n}\n\nexport type NFTTransferResponse = NFTResponse;\n\nexport enum NftCheckoutIntermediaryEvents {\n Success = 'nft-checkout-success',\n Failure = 'nft-checkout-failure',\n Initiated = 'nft-checkout-initiated',\n Disconnect = 'disconnect',\n}\n\nexport type NftCheckoutEventHandler = {\n [NftCheckoutIntermediaryEvents.Initiated]: (rawTransaction: string) => void;\n [NftCheckoutIntermediaryEvents.Success]: (signedTransaction: string) => void;\n [NftCheckoutIntermediaryEvents.Failure]: () => void;\n};\n", "export type AccessListEntry = { address: string; storageKeys: Array<string> };\n\n/**\n * An ordered collection of [[AccessList]] entries.\n */\nexport type AccessList = Array<AccessListEntry>;\n\nexport enum WalletEventOnReceived {\n WalletInfoFetched = 'Wallet/wallet-info-fetched',\n}\n\n/**\n * Request parameters for EIP-7702 authorization signing\n */\nexport interface Sign7702AuthorizationRequest {\n /**\n * The smart contract implementation address the EOA delegates to\n */\n contractAddress: string;\n\n /**\n * The chain ID for the network (use 0 for universal cross-chain authorization)\n */\n chainId: number;\n\n /**\n * The nonce for the EOA account (transaction count)\n */\n nonce?: number;\n}\n\n/**\n * Response from EIP-7702 authorization signing\n */\nexport interface Sign7702AuthorizationResponse {\n /**\n * The contract address that was authorized\n */\n contractAddress: string;\n\n /**\n * The chain ID for the authorization\n */\n chainId: number;\n\n /**\n * The nonce used in the authorization\n */\n nonce: number;\n\n /**\n * The v component of the signature (recovery id)\n */\n v: number;\n\n /**\n * The r component of the signature\n */\n r: string;\n\n /**\n * The s component of the signature\n */\n s: string;\n\n /**\n * Optional: Full signature as hex string\n */\n signature?: string;\n}\n\n/**\n * Request parameters for sending an EIP-7702 transaction with authorization list\n */\nexport interface Send7702TransactionRequest {\n /**\n * The recipient address\n */\n to: string;\n\n /**\n * The value to send in wei (as hex string)\n */\n value?: string;\n\n /**\n * The transaction data (calldata)\n */\n data?: string;\n\n /**\n * Gas limit for the transaction (as hex string)\n */\n gas?: string;\n\n /**\n * Gas limit for the transaction (alias for gas)\n */\n gasLimit?: string;\n\n /**\n * Maximum fee per gas for EIP-1559 transactions (as hex string)\n */\n maxFeePerGas?: string;\n\n /**\n * Maximum priority fee per gas for EIP-1559 transactions (as hex string)\n */\n maxPriorityFeePerGas?: string;\n\n /**\n * Transaction nonce (if not provided, will be fetched from network)\n */\n nonce?: number;\n\n /**\n * The list of signed EIP-7702 authorizations to include in the transaction\n */\n authorizationList: Sign7702AuthorizationResponse[];\n}\n\n/**\n * Response from sending an EIP-7702 transaction\n */\nexport interface Send7702TransactionResponse {\n /**\n * The transaction hash\n */\n transactionHash: string;\n}", "export enum UiEventsEmit {\n CloseMagicWindow = 'close-magic-window',\n}\n", "// Shared MFA events reused by both popup and redirect flows\nexport enum OAuthMFAEventEmit {\n Cancel = 'cancel',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n}\n\nexport enum OAuthMFAEventOnReceived {\n MfaSentHandle = 'mfa-sent-handle',\n InvalidMfaOtp = 'invalid-mfa-otp',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n}\n\ntype OAuthMFAEventHandlers = {\n // Event sent\n [OAuthMFAEventEmit.Cancel]: () => void;\n [OAuthMFAEventEmit.VerifyMFACode]: (mfa: string) => void;\n [OAuthMFAEventEmit.LostDevice]: () => void;\n [OAuthMFAEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n // Event Received\n [OAuthMFAEventOnReceived.MfaSentHandle]: () => void;\n [OAuthMFAEventOnReceived.InvalidMfaOtp]: () => void;\n [OAuthMFAEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [OAuthMFAEventOnReceived.InvalidRecoveryCode]: () => void;\n [OAuthMFAEventOnReceived.RecoveryCodeSuccess]: () => void;\n};\n\n// Popup-specific events\nexport enum OAuthPopupEventOnReceived {\n PopupUrl = 'popup-url',\n}\n\nexport enum OAuthPopupEventEmit {\n PopupEvent = 'popup-event',\n}\n\nexport type OAuthPopupEventHandlers = {\n [OAuthPopupEventEmit.PopupEvent]: (eventData: unknown) => void;\n [OAuthPopupEventOnReceived.PopupUrl]: (event: { popupUrl: string; provider: string }) => void;\n} & OAuthMFAEventHandlers;\n\n// Redirect-specific handler type\nexport type OAuthGetResultEventHandlers = OAuthMFAEventHandlers;\n", "export interface PasskeyResult {\n // null if skipDIDToken is true\n idToken: string | null;\n\n // Info of the device used to authenticate\n deviceInfo: DeviceInfo;\n}\n\nexport interface DeviceInfo {\n id: string;\n nickname: string;\n transport: string;\n userAgent: string;\n}\n\nexport interface PasskeyMetadata {\n devicesInfo: DeviceInfo[];\n}\n\nexport enum PasskeyMFAEventEmit {\n Cancel = 'cancel',\n VerifyMFACode = 'verify-mfa-code',\n LostDevice = 'lost-device',\n VerifyRecoveryCode = 'verify-recovery-code',\n}\nexport enum PasskeyMFAEventOnReceived {\n MfaSentHandle = 'mfa-sent-handle',\n InvalidMfaOtp = 'invalid-mfa-otp',\n RecoveryCodeSentHandle = 'recovery-code-sent-handle',\n InvalidRecoveryCode = 'invalid-recovery-code',\n RecoveryCodeSuccess = 'recovery-code-success',\n}\n\nexport type PasskeyEventHandlers = {\n // Event sent\n [PasskeyMFAEventEmit.Cancel]: () => void;\n [PasskeyMFAEventEmit.VerifyMFACode]: (mfa: string) => void;\n [PasskeyMFAEventEmit.LostDevice]: () => void;\n [PasskeyMFAEventEmit.VerifyRecoveryCode]: (recoveryCode: string) => void;\n // Event Received\n [PasskeyMFAEventOnReceived.MfaSentHandle]: () => void;\n [PasskeyMFAEventOnReceived.InvalidMfaOtp]: () => void;\n [PasskeyMFAEventOnReceived.RecoveryCodeSentHandle]: () => void;\n [PasskeyMFAEventOnReceived.InvalidRecoveryCode]: () => void;\n [PasskeyMFAEventOnReceived.RecoveryCodeSuccess]: () => void;\n};\n", "/**\n * Encode given buffer or decode given string with Base64URL.\n */\nexport class Base64URL {\n /**\n * Convert bytes into a base64url-encoded string\n */\n static encode(buffer: ArrayBuffer): string {\n const base64 = globalThis.btoa(String.fromCharCode(...new Uint8Array(buffer)));\n\n return base64.replace(/=/g, '').replace(/\\+/g, '-').replace(/\\//g, '_');\n }\n\n /**\n * Convert a base64url-encoded string into bytes\n */\n static decode(base64url: string): ArrayBuffer {\n const base64 = base64url.replace(/-/g, '+').replace(/_/g, '/');\n const binStr = globalThis.atob(base64);\n const bin = new Uint8Array(binStr.length);\n\n for (let i = 0; i < binStr.length; i++) {\n bin[i] = binStr.charCodeAt(i);\n }\n\n return bin.buffer;\n }\n}\n", "import { Base64URL } from './base64';\n\nfunction isAuthenticatorAssertionResponse(value: AuthenticatorResponse): value is AuthenticatorAssertionResponse {\n if (typeof value !== 'object') {\n return false;\n }\n if (\n (value as AuthenticatorAssertionResponse)?.authenticatorData === undefined ||\n typeof (value as AuthenticatorAssertionResponse)?.authenticatorData !== 'object'\n ) {\n return false;\n }\n return true;\n}\n\nfunction isAuthenticatorAttestationResponse(value: AuthenticatorResponse): value is AuthenticatorAttestationResponse {\n if (typeof value !== 'object') {\n return false;\n }\n if (\n (value as AuthenticatorAttestationResponse)?.attestationObject === undefined ||\n typeof (value as AuthenticatorAttestationResponse)?.attestationObject !== 'object'\n ) {\n return false;\n }\n return true;\n}\n\n/**\n * Polyfill `PublicKeyCredential.prototype.toJSON`\n *\n * See https://w3c.github.io/webauthn/#dom-publickeycredential-tojson\n */\nexport function toJSON(cred: PublicKeyCredential): PublicKeyCredentialJSON {\n // Prefer native implementation if available\n if (typeof cred.toJSON === 'function') {\n return cred.toJSON();\n }\n\n try {\n const id = cred.id;\n const rawId = Base64URL.encode(cred.rawId);\n const authenticatorAttachment = cred.authenticatorAttachment;\n const clientExtensionResults = {};\n const type = cred.type;\n\n // This is authentication.\n if (isAuthenticatorAssertionResponse(cred.response)) {\n return {\n id,\n rawId,\n response: {\n authenticatorData: Base64URL.encode(cred.response.authenticatorData),\n clientDataJSON: Base64URL.encode(cred.response.clientDataJSON),\n signature: Base64URL.encode(cred.response.signature),\n userHandle: cred.response.userHandle ? Base64URL.encode(cred.response.userHandle) : undefined,\n },\n authenticatorAttachment,\n clientExtensionResults,\n type,\n };\n }\n\n if (isAuthenticatorAttestationResponse(cred.response)) {\n // This is registration.\n return {\n id,\n rawId,\n response: {\n clientDataJSON: Base64URL.encode(cred.response.clientDataJSON),\n attestationObject: Base64URL.encode(cred.response.attestationObject),\n transports: cred.response?.getTransports() || [],\n },\n authenticatorAttachment,\n clientExtensionResults,\n type,\n };\n }\n\n throw new Error('Unexpected object.');\n } catch (error) {\n console.error(error);\n throw error;\n }\n}\n"],
5
+ "mappings": "AAAA,OAAS,aAAAA,OAAiB,sBCAnB,IAAKC,GAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,eAAiB,sBACjBA,EAAA,kBAAoB,qBACpBA,EAAA,gBAAkB,mBAClBA,EAAA,wBAA0B,4BAC1BA,EAAA,uBAAyB,0BAPfA,IAAAA,GAAA,CAAA,CAAA,EAUAC,GAAAA,IACVA,EAAA,eAAiB,mBACjBA,EAAA,gBAAkB,mBAClBA,EAAA,iCAAmC,sCACnCA,EAAA,kBAAoB,qBACpBA,EAAA,oBAAsB,eALZA,IAAAA,GAAA,CAAA,CAAA,EAQAC,GAAAA,IAEVA,EAAAA,EAAA,WAAa,MAAA,EAAb,aACAA,EAAAA,EAAA,eAAiB,MAAA,EAAjB,iBACAA,EAAAA,EAAA,eAAiB,MAAA,EAAjB,iBACAA,EAAAA,EAAA,cAAgB,MAAA,EAAhB,gBACAA,EAAAA,EAAA,cAAgB,MAAA,EAAhB,gBAGAA,EAAAA,EAAA,4BAA8B,IAAA,EAA9B,8BACAA,EAAAA,EAAA,iBAAmB,MAAA,EAAnB,mBACAA,EAAAA,EAAA,qBAAuB,MAAA,EAAvB,uBACAA,EAAAA,EAAA,oBAAsB,MAAA,EAAtB,sBACAA,EAAAA,EAAA,kBAAoB,MAAA,EAApB,oBACAA,EAAAA,EAAA,qBAAuB,MAAA,EAAvB,uBACAA,EAAAA,EAAA,4BAA8B,MAAA,EAA9B,8BACAA,EAAAA,EAAA,kBAAoB,MAAA,EAApB,oBACAA,EAAAA,EAAA,mBAAqB,MAAA,EAArB,qBACAA,EAAAA,EAAA,mBAAqB,MAAA,EAArB,qBACAA,EAAAA,EAAA,iBAAmB,MAAA,EAAnB,mBACAA,EAAAA,EAAA,sBAAwB,MAAA,EAAxB,wBACAA,EAAAA,EAAA,kBAAoB,MAAA,EAApB,oBACAA,EAAAA,EAAA,sBAAwB,MAAA,EAAxB,wBACAA,EAAAA,EAAA,SAAW,MAAA,EAAX,WACAA,EAAAA,EAAA,gBAAkB,MAAA,EAAlB,kBACAA,EAAAA,EAAA,mBAAqB,MAAA,EAArB,qBACAA,EAAAA,EAAA,gBAAkB,MAAA,EAAlB,kBA1BUA,IAAAA,GAAA,CAAA,CAAA,ECgCAC,GAAAA,IACVA,EAAA,SAAW,qBACXA,EAAA,QAAU,oBACVA,EAAA,SAAW,oBAHDA,IAAAA,GAAA,CAAA,CAAA,EAMAC,GAAAA,IACVA,EAAA,gBAAkB,mBAClBA,EAAA,eAAiB,kBACjBA,EAAA,kBAAoB,qBAHVA,IAAAA,GAAA,CAAA,CAAA,EAoBAC,GAAAA,IACVA,EAAA,aAAe,4BACfA,EAAA,kBAAoB,kCACpBA,EAAA,mBAAqB,mCACrBA,EAAA,oBAAsB,mCACtBA,EAAA,sBAAwB,qCACxBA,EAAA,WAAa,0BACbA,EAAA,gBAAkB,+BAClBA,EAAA,YAAc,0BACdA,EAAA,WAAa,qBACbA,EAAA,OAAS,oBACTA,EAAA,YAAc,0BACdA,EAAA,aAAe,sBACfA,EAAA,qBAAuB,mCACvBA,EAAA,qBAAuB,yCACvBA,EAAA,0BAA4B,+CAC5BA,EAAA,2BAA6B,2CAC7BA,EAAA,4BAA8B,gDAC9BA,EAAA,mBAAqB,uCACrBA,EAAA,wBAA0B,4CAC1BA,EAAA,oBAAsB,uCACtBA,EAAA,mBAAqB,uCACrBA,EAAA,eAAiB,iCACjBA,EAAA,oBAAsB,uCACtBA,EAAA,kBAAoB,2BACpBA,EAAA,gBAAkB,sBAClBA,EAAA,QAAU,iBACVA,EAAA,OAAS,eACTA,EAAA,YAAc,qBACdA,EAAA,YAAc,qBACdA,EAAA,YAAc,qBACdA,EAAA,sBAAwB,uBACxBA,EAAA,WAAa,gBAGbA,EAAA,eAAiB,6BACjBA,EAAA,uBAAyB,0CACzBA,EAAA,kBAAoB,uBACpBA,EAAA,YAAc,kBACdA,EAAA,MAAQ,WACRA,EAAA,UAAY,wBACZA,EAAA,UAAY,wBACZA,EAAA,SAAW,kBACXA,EAAA,WAAa,yBACbA,EAAA,iBAAmB,4BACnBA,EAAA,YAAc,qBACdA,EAAA,aAAe,sBACfA,EAAA,SAAW,mBACXA,EAAA,UAAY,6BACZA,EAAA,WAAa,8BACbA,EAAA,2BAA6B,sCAC7BA,EAAA,sBAAwB,uCACxBA,EAAA,oBAAsB,0BApDZA,IAAAA,GAAA,CAAA,CAAA,EC1EL,IAAKC,GAAAA,IACVA,EAAA,sBAAwB,wBACxBA,EAAA,oBAAsB,sBACtBA,EAAA,mBAAqB,qBACrBA,EAAA,mBAAqB,qBACrBA,EAAA,mBAAqB,qBACrBA,EAAA,0BAA4B,4BAC5BA,EAAA,gCAAkC,kCAClCA,EAAA,WAAa,aACbA,EAAA,qBAAuB,uBACvBA,EAAA,kCAAoC,oCACpCA,EAAA,iCAAmC,mCACnCA,EAAA,sBAAwB,wBAZdA,IAAAA,GAAA,CAAA,CAAA,EAeAC,GAAAA,IACVA,EAAA,qBAAuB,uBACvBA,EAAA,kCAAoC,oCACpCA,EAAA,gCAAkC,iCAClCA,EAAA,WAAa,aAJHA,IAAAA,GAAA,CAAA,CAAA,ECjBAC,GAAAA,IACVA,EAAA,YAAc,eACdA,EAAA,IAAM,MACNA,EAAA,SAAW,WAHDA,IAAAA,GAAA,CAAA,CAAA,EC8IAC,GAAAA,IACVA,EAAA,MAAQ,QADEA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,UAAY,aACZA,EAAA,oBAAsB,wBAFZA,IAAAA,GAAA,CAAA,CAAA,EAKAC,GAAAA,IACVA,EAAA,eAAiB,mBACjBA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBACrBA,EAAA,OAAS,SALCA,IAAAA,GAAA,CAAA,CAAA,EAQAC,GAAAA,IACVA,EAAA,aAAe,iBACfA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBACrBA,EAAA,OAAS,SACTA,EAAA,MAAQ,QANEA,IAAAA,GAAA,CAAA,CAAA,EASAC,GAAAA,IACVA,EAAA,WAAa,eACbA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,eAAiB,kBACjBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBATZA,IAAAA,GAAA,CAAA,CAAA,EAYAC,GAAAA,IACVA,EAAA,aAAe,iBACfA,EAAA,gBAAkB,oBAClBA,EAAA,cAAgB,kBAChBA,EAAA,gBAAkB,oBAClBA,EAAA,cAAgB,kBAChBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBACtBA,EAAA,eAAiB,kBACjBA,EAAA,mBAAqB,uBAVXA,IAAAA,GAAA,CAAA,CAAA,EAaAC,GAAAA,IACVA,EAAA,MAAQ,eADEA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,eAAiB,kBACjBA,EAAA,oBAAsB,wBACtBA,EAAA,8BAAgC,mCAChCA,EAAA,4BAA8B,iCAJpBA,IAAAA,GAAA,CAAA,CAAA,EAOAC,GAAAA,IACVA,EAAA,MAAQ,4BACRA,EAAA,OAAS,0CACTA,EAAA,eAAiB,uCACjBA,EAAA,cAAgB,0BAJNA,IAAAA,GAAA,CAAA,CAAA,EAOAC,GAAAA,IACVA,EAAA,mCAAqC,yCACrCA,EAAA,0BAA4B,+BAC5BA,EAAA,gBAAkB,wCAClBA,EAAA,aAAe,iDACfA,EAAA,UAAY,8CACZA,EAAA,oBAAsB,yDANZA,IAAAA,GAAA,CAAA,CAAA,EASAC,GAAAA,IACVA,EAAA,kBAAoB,mCACpBA,EAAA,OAAS,4CACTA,EAAA,eAAiB,mCAHPA,IAAAA,GAAA,CAAA,CAAA,EAMAC,GAAAA,IACVA,EAAA,+BAAiC,2CACjCA,EAAA,aAAe,4BACfA,EAAA,gBAAkB,0CAClBA,EAAA,aAAe,mDACfA,EAAA,UAAY,gDACZA,EAAA,oBAAsB,2DACtBA,EAAA,aAAe,gCACfA,EAAA,mBAAqB,uCARXA,IAAAA,GAAA,CAAA,CAAA,EAWAC,GAAAA,IACVA,EAAA,eAAiB,wBADPA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,OAAS,mBADCA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,mBAAqB,uBACrBA,EAAA,cAAgB,kBAChBA,EAAA,iBAAmB,qBAHTA,IAAAA,GAAA,CAAA,CAAA,EAKAC,GAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,OAAS,mBAFCA,IAAAA,GAAA,CAAA,CAAA,EAKAC,GAAAA,IACVA,EAAA,iBAAmB,qBACnBA,EAAA,cAAgB,kBAChBA,EAAA,oBAAsB,wBAHZA,IAAAA,GAAA,CAAA,CAAA,EAMAC,GAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,OAAS,qBAHCA,IAAAA,GAAA,CAAA,CAAA,ECnQAC,GAAAA,IACVA,EAAA,QAAU,UADAA,IAAAA,GAAA,CAAA,CAAA,ECiBAC,GAAAA,IACVA,EAAA,aAAe,iBADLA,IAAAA,GAAA,CAAA,CAAA,EAIAC,GAAAA,IACVA,EAAA,aAAe,6BADLA,IAAAA,GAAA,CAAA,CAAA,EAyCAC,GAAAA,IACVA,EAAA,oBAAsB,yBACtBA,EAAA,aAAe,iBACfA,EAAA,4BAA8B,iCAC9BA,EAAA,qBAAuB,yBACvBA,EAAA,eAAiB,mBACjBA,EAAA,sBAAwB,0BACxBA,EAAA,sBAAwB,0BAPdA,IAAAA,GAAA,CAAA,CAAA,EAUAC,GAAAA,IACVA,EAAA,mBAAqB,wBACrBA,EAAA,YAAc,gBACdA,EAAA,OAAS,SACTA,EAAA,qBAAuB,0BAJbA,IAAAA,GAAA,CAAA,CAAA,EA6BAC,GAAAA,IACVA,EAAA,YAAc,eADJA,IAAAA,GAAA,CAAA,CAAA,EA8CAC,IAAAA,IACVA,EAAA,WAAa,eACbA,EAAA,eAAiB,kBACjBA,EAAA,cAAgB,kBAChBA,EAAA,YAAc,eACdA,EAAA,iBAAmB,oBACnBA,EAAA,oBAAsB,wBANZA,IAAAA,IAAA,CAAA,CAAA,EASAC,IAAAA,IACVA,EAAA,OAAS,SACTA,EAAA,UAAY,kBACZA,EAAA,UAAY,iBACZA,EAAA,YAAc,eAJJA,IAAAA,IAAA,CAAA,CAAA,EC3FAC,IAAAA,IACVA,EAAA,QAAU,uBACVA,EAAA,QAAU,uBACVA,EAAA,UAAY,yBACZA,EAAA,WAAa,aAJHA,IAAAA,IAAA,CAAA,CAAA,EC5DAC,IAAAA,IACVA,EAAA,kBAAoB,6BADVA,IAAAA,IAAA,CAAA,CAAA,ECPAC,IAAAA,IACVA,EAAA,iBAAmB,qBADTA,IAAAA,IAAA,CAAA,CAAA,ECCAC,IAAAA,IACVA,EAAA,OAAS,SACTA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBAJXA,IAAAA,IAAA,CAAA,CAAA,EAOAC,IAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBALZA,IAAAA,IAAA,CAAA,CAAA,EAuBAC,IAAAA,IACVA,EAAA,SAAW,YADDA,IAAAA,IAAA,CAAA,CAAA,EAIAC,IAAAA,IACVA,EAAA,WAAa,cADHA,IAAAA,IAAA,CAAA,CAAA,EChBAC,GAAAA,IACVA,EAAA,OAAS,SACTA,EAAA,cAAgB,kBAChBA,EAAA,WAAa,cACbA,EAAA,mBAAqB,uBAJXA,IAAAA,GAAA,CAAA,CAAA,EAMAC,GAAAA,IACVA,EAAA,cAAgB,kBAChBA,EAAA,cAAgB,kBAChBA,EAAA,uBAAyB,4BACzBA,EAAA,oBAAsB,wBACtBA,EAAA,oBAAsB,wBALZA,IAAAA,GAAA,CAAA,CAAA,ECtBL,IAAMC,EAAN,KAAgB,CAIrB,OAAO,OAAOC,EAA6B,CAGzC,OAFe,WAAW,KAAK,OAAO,aAAa,GAAG,IAAI,WAAWA,CAAM,CAAC,CAAC,EAE/D,QAAQ,KAAM,EAAE,EAAE,QAAQ,MAAO,GAAG,EAAE,QAAQ,MAAO,GAAG,CACxE,CAKA,OAAO,OAAOC,EAAgC,CAC5C,IAAMC,EAASD,EAAU,QAAQ,KAAM,GAAG,EAAE,QAAQ,KAAM,GAAG,EACvDE,EAAS,WAAW,KAAKD,CAAM,EAC/BE,EAAM,IAAI,WAAWD,EAAO,MAAM,EAExC,QAASE,EAAI,EAAGA,EAAIF,EAAO,OAAQE,IACjCD,EAAIC,CAAC,EAAIF,EAAO,WAAWE,CAAC,EAG9B,OAAOD,EAAI,MACb,CACF,ECzBA,SAASE,GAAiCC,EAAuE,CAI/G,MAHI,SAAOA,GAAU,UAIlBA,GAA0C,oBAAsB,QACjE,OAAQA,GAA0C,mBAAsB,SAK5E,CAEA,SAASC,GAAmCD,EAAyE,CAInH,MAHI,SAAOA,GAAU,UAIlBA,GAA4C,oBAAsB,QACnE,OAAQA,GAA4C,mBAAsB,SAK9E,CAOO,SAASE,EAAOC,EAAoD,CAEzE,GAAI,OAAOA,EAAK,QAAW,WACzB,OAAOA,EAAK,OAAO,EAGrB,GAAI,CACF,IAAMC,EAAKD,EAAK,GACVE,EAAQC,EAAU,OAAOH,EAAK,KAAK,EACnCI,EAA0BJ,EAAK,wBAC/BK,EAAyB,CAAC,EAC1BC,EAAON,EAAK,KAGlB,GAAIJ,GAAiCI,EAAK,QAAQ,EAChD,MAAO,CACL,GAAAC,EACA,MAAAC,EACA,SAAU,CACR,kBAAmBC,EAAU,OAAOH,EAAK,SAAS,iBAAiB,EACnE,eAAgBG,EAAU,OAAOH,EAAK,SAAS,cAAc,EAC7D,UAAWG,EAAU,OAAOH,EAAK,SAAS,SAAS,EACnD,WAAYA,EAAK,SAAS,WAAaG,EAAU,OAAOH,EAAK,SAAS,UAAU,EAAI,MACtF,EACA,wBAAAI,EACA,uBAAAC,EACA,KAAAC,CACF,EAGF,GAAIR,GAAmCE,EAAK,QAAQ,EAElD,MAAO,CACL,GAAAC,EACA,MAAAC,EACA,SAAU,CACR,eAAgBC,EAAU,OAAOH,EAAK,SAAS,cAAc,EAC7D,kBAAmBG,EAAU,OAAOH,EAAK,SAAS,iBAAiB,EACnE,WAAYA,EAAK,UAAU,cAAc,GAAK,CAAC,CACjD,EACA,wBAAAI,EACA,uBAAAC,EACA,KAAAC,CACF,EAGF,MAAM,IAAI,MAAM,oBAAoB,CACtC,OAASC,EAAO,CACd,cAAQ,MAAMA,CAAK,EACbA,CACR,CACF,CdzEO,IAAMC,EAAN,cAAgCC,GAAU,QAA0B,CACzE,KAAO,WACP,OAAc,CAAC,EAEP,+BAAgC,CACtC,KAAK,qCAAuD,4CAA6C,CAAC,CAAC,CAC7G,CAEQ,mCAAmCC,EAAiB,CAC1D,KAAK,+CAAgE,8BAA8BA,CAAO,GAAI,CAAC,CAAC,CAClH,CAEA,MAAa,gBAAgBC,EAA8C,CACzE,GAAI,CAAC,OAAO,oBACV,MAAM,KAAK,8BAA8B,EAE3C,GAAM,CAAE,SAAAC,EAAU,SAAAC,EAAW,GAAI,aAAAC,EAAc,SAAAC,CAAS,EAAIJ,GAAiB,CAAC,EAExE,CAAE,oBAAAK,EAAqB,kBAAAC,CAAkB,EAAI,MAAM,KAAK,QAC5D,KAAK,MAAM,gEAA6E,CAAC,CAAE,SAAAL,CAAS,CAAC,CAAC,CACxG,EAEIM,EACJ,GAAI,CACFA,EAAc,MAAM,UAAU,YAAY,OAAO,CAC/C,UAAWF,CACb,CAAC,CACH,OAASG,EAAU,CACjB,MAAM,KAAK,mCAAmCA,CAAG,CACnD,CAEA,OAAO,KAAK,QACV,KAAK,MAAM,iEAA8E,CACvF,CACE,kBAAAF,EACA,qBAAsBG,EAAOF,CAAU,EACvC,SAAAL,EACA,UAAWK,EAAW,SAAS,cAAc,EAC7C,UAAW,UAAU,UACrB,aAAAJ,EACA,SAAAC,CACF,CACF,CAAC,CACH,CACF,CAEO,MAAMJ,EAAgD,CAC3D,GAAM,CAAE,SAAAC,EAAU,aAAAS,EAAc,aAAAP,EAAc,SAAAC,CAAS,EAAIJ,GAAiB,CAAC,EAEzEW,EAEEC,EAAa,KAAK,MAAM,iBAAsD,MAAOC,EAASC,IAAW,CAC7G,GAAI,CAAC,OAAO,oBACV,OAAOA,EAAO,KAAK,8BAA8B,CAAC,EAGpD,GAAM,CAAE,oBAAAC,EAAqB,sBAAAC,CAAsB,EAAI,MAAM,KAAK,QAChE,KAAK,MAAM,kEAA8E,CAAC,CAAE,SAAAf,CAAS,CAAC,CAAC,CACzG,EAEIgB,EACJ,GAAI,CACFA,EAAa,MAAM,UAAU,YAAY,IAAI,CAC3C,UAAWD,CACb,CAAC,CACH,OAASR,EAAU,CACjB,OAAOM,EAAO,KAAK,mCAAmCN,CAAG,CAAC,CAC5D,CAEA,IAAMU,EAAiB,KAAK,MAAM,mEAA+E,CAC/G,CACE,oBAAAH,EACA,kBAAmBN,EAAOQ,CAAS,EACnC,OAAQP,EACR,aAAAP,EACA,SAAAC,CACF,CACF,CAAC,EAEDO,EAAkBO,EAAe,GAEjC,IAAMC,EAAe,KAAK,QAA6CD,CAAc,EAEhFR,IACHS,EAAa,GAAGC,EAA0B,cAAe,IAAM,CAC7DR,EAAW,KAAKQ,EAA0B,aAAa,CACzD,CAAC,EACDD,EAAa,GAAGC,EAA0B,cAAe,IAAM,CAC7DR,EAAW,KAAKQ,EAA0B,aAAa,CACzD,CAAC,EACDD,EAAa,GAAGC,EAA0B,uBAAwB,IAAM,CACtER,EAAW,KAAKQ,EAA0B,sBAAsB,CAClE,CAAC,EACDD,EAAa,GAAGC,EAA0B,oBAAqB,IAAM,CACnER,EAAW,KAAKQ,EAA0B,mBAAmB,CAC/D,CAAC,EACDD,EAAa,GAAGC,EAA0B,oBAAqB,IAAM,CACnER,EAAW,KAAKQ,EAA0B,mBAAmB,CAC/D,CAAC,GAGH,GAAI,CACF,IAAMC,EAAS,MAAMF,EACrBN,EAAQQ,CAAM,CAChB,OAASC,EAAO,CACdR,EAAOQ,CAAK,CACd,CACF,CAAC,EAED,MAAI,CAACZ,GAAgBE,IACnBA,EAAW,GAAGW,EAAoB,cAAgBC,GAAgB,CAChE,KAAK,wBAAwBD,EAAoB,cAAeZ,CAAe,EAAEa,CAAG,CACtF,CAAC,EACDZ,EAAW,GAAGW,EAAoB,WAAY,IAAM,CAClD,KAAK,wBAAwBA,EAAoB,WAAYZ,CAAe,EAAE,CAChF,CAAC,EACDC,EAAW,GAAGW,EAAoB,mBAAqBE,GAAyB,CAC9E,KAAK,wBAAwBF,EAAoB,mBAAoBZ,CAAe,EAAEc,CAAY,CACpG,CAAC,EACDb,EAAW,GAAGW,EAAoB,OAAQ,IAAM,CAC9C,KAAK,wBAAwBA,EAAoB,OAAQZ,CAAe,EAAE,CAC5E,CAAC,GAGIC,CACT,CAEO,WAAWZ,EAAgD,CAChE,GAAM,CAAE,GAAA0B,EAAI,SAAAxB,CAAS,EAAIF,EACnBkB,EAAiB,KAAK,MAAM,yDAA2E,CAC3G,CACE,sBAAuBQ,EACvB,SAAAxB,CACF,CACF,CAAC,EACD,OAAO,KAAK,QAAegB,CAAc,CAC3C,CAEO,iBAAiBQ,EAAY,CAClC,IAAMR,EAAiB,KAAK,MAAM,6DAAgF,CAChH,CACE,sBAAuBQ,CACzB,CACF,CAAC,EAED,OAAO,KAAK,QAAaR,CAAc,CACzC,CAEA,MAAa,kBAAkBhB,EAAW,GAAI,CAC5C,GAAI,CAAC,OAAO,oBACV,MAAM,KAAK,8BAA8B,EAE3C,IAAMyB,EAAU,MAAM,KAAK,QACzB,KAAK,MAAM,wEAAmF,CAAC,CAAC,CAClG,EAEIpB,EACJ,GAAI,CACFA,EAAc,MAAM,UAAU,YAAY,OAAO,CAC/C,UAAWoB,EAAQ,kBACrB,CAAC,CACH,OAASnB,EAAU,CACjB,MAAM,KAAK,mCAAmCA,CAAG,CACnD,CAEA,OAAO,KAAK,QACV,KAAK,MAAM,kEAA8E,CACvF,CACE,SAAAN,EACA,UAAWK,EAAW,SAAS,cAAc,EAC7C,WAAY,UAAU,UACtB,sBAAuBE,EAAOF,CAAU,CAC1C,CACF,CAAC,CACH,CACF,CAEO,aAAc,CACnB,IAAMW,EAAiB,KAAK,MAAM,kEAAwE,CAAC,CAAC,EAC5G,OAAO,KAAK,QAAeA,CAAc,CAC3C,CACF",
6
6
  "names": ["Extension", "SDKErrorCode", "SDKWarningCode", "RPCErrorCode", "LocalStorageKeys", "ThirdPartyWalletEvents", "MagicPayloadMethod", "MagicIncomingWindowMessage", "MagicOutgoingWindowMessage", "DeepLinkPage", "LoginWithMagicLinkEventEmit", "LoginWithMagicLinkEventOnReceived", "LoginWithEmailOTPEventEmit", "LoginWithSmsOTPEventEmit", "LoginWithSmsOTPEventOnReceived", "LoginWithEmailOTPEventOnReceived", "DeviceVerificationEventEmit", "DeviceVerificationEventOnReceived", "RecencyCheckEventEmit", "RecencyCheckEventOnReceived", "UpdateEmailEventEmit", "UpdateEmailEventOnReceived", "AuthEventOnReceived", "FarcasterLoginEventEmit", "EnableMFAEventOnReceived", "EnableMFAEventEmit", "DisableMFAEventOnReceived", "DisableMFAEventEmit", "EthChainType", "UserEventsEmit", "UserEventsOnReceived", "RecoveryFactorEventOnReceived", "RecoveryFactorEventEmit", "RecoveryMethodType", "RecoverAccountEventOnReceived", "RecoverAccountEventEmit", "NftCheckoutIntermediaryEvents", "WalletEventOnReceived", "UiEventsEmit", "OAuthMFAEventEmit", "OAuthMFAEventOnReceived", "OAuthPopupEventOnReceived", "OAuthPopupEventEmit", "PasskeyMFAEventEmit", "PasskeyMFAEventOnReceived", "Base64URL", "buffer", "base64url", "base64", "binStr", "bin", "i", "isAuthenticatorAssertionResponse", "value", "isAuthenticatorAttestationResponse", "toJSON", "cred", "id", "rawId", "Base64URL", "authenticatorAttachment", "clientExtensionResults", "type", "error", "WebAuthnExtension", "Extension", "message", "configuration", "username", "nickname", "skipDIDToken", "lifespan", "registrationOptions", "registrationToken", "credential", "err", "toJSON", "showMfaModal", "verifyPayloadId", "promiEvent", "resolve", "reject", "authenticationToken", "authenticationOptions", "assertion", "requestPayload", "loginRequest", "ie", "result", "error", "te", "mfa", "recoveryCode", "id", "options"]
7
7
  }
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@magic-ext/webauthn",
3
- "version": "27.6.0",
3
+ "version": "27.6.1-canary.b65c8d0.0",
4
4
  "description": "Magic SDK WabAuthn Extension",
5
5
  "author": "Magic <team@magic.link> (https://magic.link/)",
6
6
  "license": "MIT",
@@ -28,7 +28,7 @@
28
28
  ]
29
29
  },
30
30
  "devDependencies": {
31
- "@magic-sdk/provider": "^33.7.0"
31
+ "@magic-sdk/provider": "33.7.1-canary.b65c8d0.0"
32
32
  },
33
- "gitHead": "c73384ac33b2da261a95b755ca9998fda80310c7"
33
+ "gitHead": "b65c8d0c41288038946408d2bf402349a615a3b1"
34
34
  }