@rhinestone/1auth 0.4.0 → 0.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{chunk-X73ALCGW.mjs → chunk-N4BLW5UR.mjs} +6 -8
- package/dist/chunk-N4BLW5UR.mjs.map +1 -0
- package/dist/{client-DKuPEx83.d.mts → client-CHCVV9H3.d.mts} +87 -82
- package/dist/{client-DKuPEx83.d.ts → client-CHCVV9H3.d.ts} +87 -82
- package/dist/index.d.mts +4 -8
- package/dist/index.d.ts +4 -8
- package/dist/index.js +118 -156
- package/dist/index.js.map +1 -1
- package/dist/index.mjs +115 -150
- package/dist/index.mjs.map +1 -1
- package/dist/{provider-Dj5l4bWn.d.ts → provider-B5pLvKo_.d.mts} +2 -8
- package/dist/{provider-CmJarV7y.d.mts → provider-DzxXGyV8.d.ts} +2 -8
- package/dist/react.d.mts +1 -1
- package/dist/react.d.ts +1 -1
- package/dist/react.js +3 -3
- package/dist/react.js.map +1 -1
- package/dist/react.mjs +3 -3
- package/dist/react.mjs.map +1 -1
- package/dist/server.d.mts +2 -5
- package/dist/server.d.ts +2 -5
- package/dist/server.js +2 -2
- package/dist/server.js.map +1 -1
- package/dist/server.mjs +2 -2
- package/dist/server.mjs.map +1 -1
- package/dist/wagmi.d.mts +2 -2
- package/dist/wagmi.d.ts +2 -2
- package/dist/wagmi.js +5 -6
- package/dist/wagmi.js.map +1 -1
- package/dist/wagmi.mjs +3 -3
- package/dist/wagmi.mjs.map +1 -1
- package/package.json +1 -1
- package/dist/chunk-X73ALCGW.mjs.map +0 -1
|
@@ -19,29 +19,26 @@ interface PasskeyProviderConfig {
|
|
|
19
19
|
/** Optional theme configuration for the dialog */
|
|
20
20
|
theme?: ThemeConfig;
|
|
21
21
|
}
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
22
|
+
/**
|
|
23
|
+
* Result of {@link OneAuthClient.authWithModal} — covers both sign-in and sign-up.
|
|
24
|
+
*
|
|
25
|
+
* @example
|
|
26
|
+
* ```typescript
|
|
27
|
+
* const result = await client.authWithModal();
|
|
28
|
+
* if (result.success) {
|
|
29
|
+
* console.log(result.user?.username); // "alice"
|
|
30
|
+
* console.log(result.user?.address); // "0x1234..."
|
|
31
|
+
* }
|
|
32
|
+
* ```
|
|
33
|
+
*/
|
|
34
|
+
interface AuthResult {
|
|
26
35
|
success: boolean;
|
|
27
|
-
|
|
28
|
-
address?: string;
|
|
36
|
+
/** Authenticated user details (present when `success` is true) */
|
|
29
37
|
user?: {
|
|
30
38
|
id: string;
|
|
31
|
-
username
|
|
32
|
-
|
|
33
|
-
error?: {
|
|
34
|
-
code: string;
|
|
35
|
-
message: string;
|
|
39
|
+
username?: string;
|
|
40
|
+
address: `0x${string}`;
|
|
36
41
|
};
|
|
37
|
-
}
|
|
38
|
-
interface RegisterOptions {
|
|
39
|
-
username: string;
|
|
40
|
-
}
|
|
41
|
-
interface RegisterResult {
|
|
42
|
-
success: boolean;
|
|
43
|
-
username?: string;
|
|
44
|
-
address?: string;
|
|
45
42
|
error?: {
|
|
46
43
|
code: string;
|
|
47
44
|
message: string;
|
|
@@ -52,10 +49,11 @@ interface RegisterResult {
|
|
|
52
49
|
*/
|
|
53
50
|
interface ConnectResult {
|
|
54
51
|
success: boolean;
|
|
55
|
-
/**
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
|
|
52
|
+
/** Connected user details (present when `success` is true) */
|
|
53
|
+
user?: {
|
|
54
|
+
username?: string;
|
|
55
|
+
address: `0x${string}`;
|
|
56
|
+
};
|
|
59
57
|
/** Whether this was auto-connected (user had auto-connect enabled) */
|
|
60
58
|
autoConnected?: boolean;
|
|
61
59
|
/** Action to take when connection was not successful */
|
|
@@ -77,32 +75,29 @@ interface AuthenticateOptions {
|
|
|
77
75
|
challenge?: string;
|
|
78
76
|
}
|
|
79
77
|
/**
|
|
80
|
-
* Result of
|
|
78
|
+
* Result of {@link OneAuthClient.authenticate} — extends {@link AuthResult}
|
|
79
|
+
* with challenge-signing fields.
|
|
80
|
+
*
|
|
81
|
+
* @example
|
|
82
|
+
* ```typescript
|
|
83
|
+
* const result = await client.authenticate({
|
|
84
|
+
* challenge: `Login to MyApp\nNonce: ${crypto.randomUUID()}`
|
|
85
|
+
* });
|
|
86
|
+
* if (result.success && result.challenge) {
|
|
87
|
+
* await verifyOnServer(result.user?.username, result.challenge.signature, result.challenge.signedHash);
|
|
88
|
+
* }
|
|
89
|
+
* ```
|
|
81
90
|
*/
|
|
82
|
-
interface AuthenticateResult {
|
|
83
|
-
|
|
84
|
-
|
|
85
|
-
|
|
86
|
-
|
|
87
|
-
|
|
88
|
-
|
|
89
|
-
|
|
90
|
-
|
|
91
|
-
|
|
92
|
-
accountAddress?: `0x${string}`;
|
|
93
|
-
/**
|
|
94
|
-
* Signature of the hashed challenge.
|
|
95
|
-
* Only present if a challenge was provided in the options.
|
|
96
|
-
*/
|
|
97
|
-
signature?: WebAuthnSignature;
|
|
98
|
-
/**
|
|
99
|
-
* The hash that was actually signed (so apps can verify server-side).
|
|
100
|
-
* Computed as: keccak256("\x19Ethereum Signed Message:\n" + len + challenge) (EIP-191)
|
|
101
|
-
*/
|
|
102
|
-
signedHash?: `0x${string}`;
|
|
103
|
-
error?: {
|
|
104
|
-
code: string;
|
|
105
|
-
message: string;
|
|
91
|
+
interface AuthenticateResult extends AuthResult {
|
|
92
|
+
/** Challenge signing result (present when a challenge was provided) */
|
|
93
|
+
challenge?: {
|
|
94
|
+
/** WebAuthn signature of the hashed challenge */
|
|
95
|
+
signature: WebAuthnSignature;
|
|
96
|
+
/**
|
|
97
|
+
* The hash that was actually signed (so apps can verify server-side).
|
|
98
|
+
* Computed as: keccak256("\x19Ethereum Signed Message:\n" + len + challenge) (EIP-191)
|
|
99
|
+
*/
|
|
100
|
+
signedHash: `0x${string}`;
|
|
106
101
|
};
|
|
107
102
|
}
|
|
108
103
|
/**
|
|
@@ -125,19 +120,13 @@ interface SignMessageOptions {
|
|
|
125
120
|
theme?: ThemeConfig;
|
|
126
121
|
}
|
|
127
122
|
/**
|
|
128
|
-
*
|
|
123
|
+
* Base result for all signing operations (message signing, typed data signing).
|
|
129
124
|
*/
|
|
130
|
-
interface
|
|
125
|
+
interface SigningResultBase {
|
|
131
126
|
success: boolean;
|
|
132
127
|
/** WebAuthn signature if successful */
|
|
133
128
|
signature?: WebAuthnSignature;
|
|
134
|
-
/** The
|
|
135
|
-
signedMessage?: string;
|
|
136
|
-
/**
|
|
137
|
-
* The hash that was actually signed (EIP-191 format).
|
|
138
|
-
* Computed as: keccak256("\x19Ethereum Signed Message:\n" + len + message)
|
|
139
|
-
* Use hashMessage() from the SDK to verify this matches your original message.
|
|
140
|
-
*/
|
|
129
|
+
/** The hash that was signed */
|
|
141
130
|
signedHash?: `0x${string}`;
|
|
142
131
|
/** Passkey credentials used for signing */
|
|
143
132
|
passkey?: PasskeyCredentials;
|
|
@@ -147,6 +136,13 @@ interface SignMessageResult {
|
|
|
147
136
|
message: string;
|
|
148
137
|
};
|
|
149
138
|
}
|
|
139
|
+
/**
|
|
140
|
+
* Result of signMessage
|
|
141
|
+
*/
|
|
142
|
+
interface SignMessageResult extends SigningResultBase {
|
|
143
|
+
/** The original message that was signed */
|
|
144
|
+
signedMessage?: string;
|
|
145
|
+
}
|
|
150
146
|
interface ClearSignData {
|
|
151
147
|
decoded: boolean;
|
|
152
148
|
verified: boolean;
|
|
@@ -315,8 +311,6 @@ interface DeveloperSignedIntent {
|
|
|
315
311
|
/** Optional token requests */
|
|
316
312
|
tokenRequests?: IntentTokenRequest[];
|
|
317
313
|
}
|
|
318
|
-
/** @deprecated Use DeveloperSignedIntent instead */
|
|
319
|
-
type MerchantSignedIntent = DeveloperSignedIntent;
|
|
320
314
|
type IntentSigner = (params: {
|
|
321
315
|
username: string;
|
|
322
316
|
accountAddress?: string;
|
|
@@ -580,19 +574,7 @@ interface SignTypedDataOptions {
|
|
|
580
574
|
/**
|
|
581
575
|
* Result of signTypedData
|
|
582
576
|
*/
|
|
583
|
-
interface SignTypedDataResult {
|
|
584
|
-
success: boolean;
|
|
585
|
-
/** WebAuthn signature if successful */
|
|
586
|
-
signature?: WebAuthnSignature;
|
|
587
|
-
/** The EIP-712 hash that was signed */
|
|
588
|
-
signedHash?: `0x${string}`;
|
|
589
|
-
/** Passkey credentials used for signing */
|
|
590
|
-
passkey?: PasskeyCredentials;
|
|
591
|
-
/** Error details if failed */
|
|
592
|
-
error?: {
|
|
593
|
-
code: SigningErrorCode;
|
|
594
|
-
message: string;
|
|
595
|
-
};
|
|
577
|
+
interface SignTypedDataResult extends SigningResultBase {
|
|
596
578
|
}
|
|
597
579
|
/**
|
|
598
580
|
* Options for querying intent history
|
|
@@ -839,13 +821,34 @@ declare class OneAuthClient {
|
|
|
839
821
|
getClientId(): string | undefined;
|
|
840
822
|
private waitForTransactionHash;
|
|
841
823
|
/**
|
|
842
|
-
* Open the
|
|
824
|
+
* Open the authentication modal (sign in + sign up).
|
|
825
|
+
*
|
|
826
|
+
* Handles both new user registration and returning user login in a single
|
|
827
|
+
* call — the modal shows the appropriate flow based on whether the user
|
|
828
|
+
* has a passkey registered.
|
|
829
|
+
*
|
|
830
|
+
* @param options.username - Pre-fill the username field
|
|
831
|
+
* @param options.theme - Override the theme for this modal invocation
|
|
832
|
+
* @param options.oauthEnabled - Set to false to hide OAuth sign-in buttons
|
|
833
|
+
* @returns {@link AuthResult} with user details and typed address
|
|
834
|
+
*
|
|
835
|
+
* @example
|
|
836
|
+
* ```typescript
|
|
837
|
+
* const result = await client.authWithModal();
|
|
838
|
+
*
|
|
839
|
+
* if (result.success) {
|
|
840
|
+
* console.log('Signed in as:', result.user?.username);
|
|
841
|
+
* console.log('Address:', result.user?.address); // typed `0x${string}`
|
|
842
|
+
* } else if (result.error?.code === 'USER_CANCELLED') {
|
|
843
|
+
* // User closed the modal
|
|
844
|
+
* }
|
|
845
|
+
* ```
|
|
843
846
|
*/
|
|
844
847
|
authWithModal(options?: {
|
|
845
848
|
username?: string;
|
|
846
849
|
theme?: ThemeConfig;
|
|
847
850
|
oauthEnabled?: boolean;
|
|
848
|
-
}): Promise<
|
|
851
|
+
}): Promise<AuthResult>;
|
|
849
852
|
/**
|
|
850
853
|
* Open the connect dialog (lightweight connection without passkey auth).
|
|
851
854
|
*
|
|
@@ -861,7 +864,7 @@ declare class OneAuthClient {
|
|
|
861
864
|
* const result = await client.connectWithModal();
|
|
862
865
|
*
|
|
863
866
|
* if (result.success) {
|
|
864
|
-
* console.log('Connected as:', result.username);
|
|
867
|
+
* console.log('Connected as:', result.user?.username);
|
|
865
868
|
* } else if (result.action === 'switch') {
|
|
866
869
|
* // User needs to sign in first
|
|
867
870
|
* const authResult = await client.authWithModal();
|
|
@@ -923,17 +926,16 @@ declare class OneAuthClient {
|
|
|
923
926
|
*
|
|
924
927
|
* @example
|
|
925
928
|
* ```typescript
|
|
926
|
-
* // Authenticate with a login challenge
|
|
927
929
|
* const result = await client.authenticate({
|
|
928
930
|
* challenge: `Login to MyApp\nTimestamp: ${Date.now()}\nNonce: ${crypto.randomUUID()}`
|
|
929
931
|
* });
|
|
930
932
|
*
|
|
931
|
-
* if (result.success && result.
|
|
933
|
+
* if (result.success && result.challenge) {
|
|
932
934
|
* // Verify signature server-side
|
|
933
935
|
* const isValid = await verifyOnServer(
|
|
934
|
-
* result.username,
|
|
935
|
-
* result.signature,
|
|
936
|
-
* result.signedHash
|
|
936
|
+
* result.user?.username,
|
|
937
|
+
* result.challenge.signature,
|
|
938
|
+
* result.challenge.signedHash
|
|
937
939
|
* );
|
|
938
940
|
* }
|
|
939
941
|
* ```
|
|
@@ -1200,7 +1202,10 @@ declare class OneAuthClient {
|
|
|
1200
1202
|
*/
|
|
1201
1203
|
private waitForDialogReady;
|
|
1202
1204
|
/**
|
|
1203
|
-
* Create a modal dialog with
|
|
1205
|
+
* Create a modal dialog with a full-viewport iframe inside.
|
|
1206
|
+
* All visual chrome (backdrop, positioning, animations) is rendered
|
|
1207
|
+
* by the passkey app inside the iframe — the SDK just provides
|
|
1208
|
+
* a transparent full-screen container.
|
|
1204
1209
|
*/
|
|
1205
1210
|
private createModalDialog;
|
|
1206
1211
|
private waitForModalAuthResponse;
|
|
@@ -1217,4 +1222,4 @@ declare class OneAuthClient {
|
|
|
1217
1222
|
private fetchSigningResult;
|
|
1218
1223
|
}
|
|
1219
1224
|
|
|
1220
|
-
export { type
|
|
1225
|
+
export { type RequestConsentResult as $, type AuthResult as A, type BalanceRequirement as B, type CreateSigningRequestResponse as C, type DeveloperSignedIntent as D, type EmbedOptions as E, type CloseOnStatus as F, type PrepareIntentResponse as G, type ExecuteIntentResponse as H, type IntentSigner as I, type IntentHistoryOptions as J, type IntentHistoryItem as K, type IntentHistoryResult as L, type SendSwapOptions as M, type SendSwapResult as N, OneAuthClient as O, type PasskeyProviderConfig as P, type SwapQuote as Q, type ThemeConfig as R, type SendIntentResult as S, type TransactionAction as T, type UserPasskeysResponse as U, type ConsentField as V, type WebAuthnSignature as W, type ConsentData as X, type CheckConsentOptions as Y, type CheckConsentResult as Z, type RequestConsentOptions as _, type IntentCall as a, type BatchIntentItem as a0, type SendBatchIntentOptions as a1, type SendBatchIntentResult as a2, type BatchIntentItemResult as a3, type PreparedBatchIntent as a4, type PrepareBatchIntentResponse as a5, type SigningRequestOptions as b, type SigningResult as c, type SigningSuccess as d, type SigningError as e, type SigningErrorCode as f, type SigningRequestStatus as g, type PasskeyCredential as h, type ConnectResult as i, type AuthenticateOptions as j, type AuthenticateResult as k, type SigningResultBase as l, type SignMessageOptions as m, type SignMessageResult as n, type SignTypedDataOptions as o, type SignTypedDataResult as p, type EIP712Domain as q, type EIP712Types as r, type EIP712TypeField as s, type TransactionFees as t, type TransactionDetails as u, type IntentTokenRequest as v, type SendIntentOptions as w, type IntentQuote as x, type IntentStatus as y, type OrchestratorStatus as z };
|
package/dist/index.d.mts
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
|
-
import { O as OneAuthClient, I as IntentSigner, W as WebAuthnSignature, a as IntentCall, S as SendIntentResult } from './client-
|
|
2
|
-
export { A as AuthenticateOptions,
|
|
3
|
-
export { O as OneAuthProvider,
|
|
1
|
+
import { O as OneAuthClient, I as IntentSigner, W as WebAuthnSignature, a as IntentCall, S as SendIntentResult } from './client-CHCVV9H3.mjs';
|
|
2
|
+
export { A as AuthResult, j as AuthenticateOptions, k as AuthenticateResult, B as BalanceRequirement, a0 as BatchIntentItem, a3 as BatchIntentItemResult, Y as CheckConsentOptions, Z as CheckConsentResult, F as CloseOnStatus, i as ConnectResult, X as ConsentData, V as ConsentField, C as CreateSigningRequestResponse, D as DeveloperSignedIntent, q as EIP712Domain, s as EIP712TypeField, r as EIP712Types, E as EmbedOptions, H as ExecuteIntentResponse, K as IntentHistoryItem, J as IntentHistoryOptions, L as IntentHistoryResult, x as IntentQuote, y as IntentStatus, v as IntentTokenRequest, z as OrchestratorStatus, h as PasskeyCredential, P as PasskeyProviderConfig, a5 as PrepareBatchIntentResponse, G as PrepareIntentResponse, a4 as PreparedBatchIntent, _ as RequestConsentOptions, $ as RequestConsentResult, a1 as SendBatchIntentOptions, a2 as SendBatchIntentResult, w as SendIntentOptions, M as SendSwapOptions, N as SendSwapResult, m as SignMessageOptions, n as SignMessageResult, o as SignTypedDataOptions, p as SignTypedDataResult, e as SigningError, f as SigningErrorCode, b as SigningRequestOptions, g as SigningRequestStatus, c as SigningResult, l as SigningResultBase, d as SigningSuccess, Q as SwapQuote, R as ThemeConfig, T as TransactionAction, u as TransactionDetails, t as TransactionFees, U as UserPasskeysResponse } from './client-CHCVV9H3.mjs';
|
|
3
|
+
export { O as OneAuthProvider, a as OneAuthProviderOptions, c as createOneAuthProvider } from './provider-B5pLvKo_.mjs';
|
|
4
4
|
import { Address, LocalAccount, Chain, Transport, Hex, WalletClient, Hash } from 'viem';
|
|
5
5
|
import * as react_jsx_runtime from 'react/jsx-runtime';
|
|
6
6
|
import * as React from 'react';
|
|
@@ -232,10 +232,6 @@ declare function isTokenAddressSupported(tokenAddress: Address, chainId: number)
|
|
|
232
232
|
* This is the standard Ethereum message prefix for `personal_sign`.
|
|
233
233
|
*/
|
|
234
234
|
declare const ETHEREUM_MESSAGE_PREFIX = "\u0019Ethereum Signed Message:\n";
|
|
235
|
-
/**
|
|
236
|
-
* @deprecated Use ETHEREUM_MESSAGE_PREFIX instead. Kept for backwards compatibility.
|
|
237
|
-
*/
|
|
238
|
-
declare const PASSKEY_MESSAGE_PREFIX = "\u0019Ethereum Signed Message:\n";
|
|
239
235
|
/**
|
|
240
236
|
* Hash a message with the EIP-191 Ethereum prefix.
|
|
241
237
|
*
|
|
@@ -277,4 +273,4 @@ declare function hashMessage(message: string): `0x${string}`;
|
|
|
277
273
|
*/
|
|
278
274
|
declare function verifyMessageHash(message: string, signedHash: string | undefined): boolean;
|
|
279
275
|
|
|
280
|
-
export { type BatchQueueContextValue, BatchQueueProvider, type BatchQueueProviderProps, BatchQueueWidget, type BatchQueueWidgetProps, type BatchedCall, type ChainFilterOptions, ETHEREUM_MESSAGE_PREFIX, IntentCall, IntentSigner, OneAuthClient,
|
|
276
|
+
export { type BatchQueueContextValue, BatchQueueProvider, type BatchQueueProviderProps, BatchQueueWidget, type BatchQueueWidgetProps, type BatchedCall, type ChainFilterOptions, ETHEREUM_MESSAGE_PREFIX, IntentCall, IntentSigner, OneAuthClient, type PasskeyAccount, type PasskeyWalletClient, type PasskeyWalletClientConfig, type SendCallsParams, SendIntentResult, type TokenConfig, type TransactionCall, WebAuthnSignature, createPasskeyAccount, createPasskeyWalletClient, encodeWebAuthnSignature, getAllSupportedChainsAndTokens, getChainById, getChainExplorerUrl, getChainName, getChainRpcUrl, getSupportedChainIds, getSupportedChains, getSupportedTokenSymbols, getSupportedTokens, getTokenSymbol, hashCalls, hashMessage, isTestnet, isTokenAddressSupported, resolveTokenAddress, useBatchQueue, verifyMessageHash };
|
package/dist/index.d.ts
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
|
-
import { O as OneAuthClient, I as IntentSigner, W as WebAuthnSignature, a as IntentCall, S as SendIntentResult } from './client-
|
|
2
|
-
export { A as AuthenticateOptions,
|
|
3
|
-
export { O as OneAuthProvider,
|
|
1
|
+
import { O as OneAuthClient, I as IntentSigner, W as WebAuthnSignature, a as IntentCall, S as SendIntentResult } from './client-CHCVV9H3.js';
|
|
2
|
+
export { A as AuthResult, j as AuthenticateOptions, k as AuthenticateResult, B as BalanceRequirement, a0 as BatchIntentItem, a3 as BatchIntentItemResult, Y as CheckConsentOptions, Z as CheckConsentResult, F as CloseOnStatus, i as ConnectResult, X as ConsentData, V as ConsentField, C as CreateSigningRequestResponse, D as DeveloperSignedIntent, q as EIP712Domain, s as EIP712TypeField, r as EIP712Types, E as EmbedOptions, H as ExecuteIntentResponse, K as IntentHistoryItem, J as IntentHistoryOptions, L as IntentHistoryResult, x as IntentQuote, y as IntentStatus, v as IntentTokenRequest, z as OrchestratorStatus, h as PasskeyCredential, P as PasskeyProviderConfig, a5 as PrepareBatchIntentResponse, G as PrepareIntentResponse, a4 as PreparedBatchIntent, _ as RequestConsentOptions, $ as RequestConsentResult, a1 as SendBatchIntentOptions, a2 as SendBatchIntentResult, w as SendIntentOptions, M as SendSwapOptions, N as SendSwapResult, m as SignMessageOptions, n as SignMessageResult, o as SignTypedDataOptions, p as SignTypedDataResult, e as SigningError, f as SigningErrorCode, b as SigningRequestOptions, g as SigningRequestStatus, c as SigningResult, l as SigningResultBase, d as SigningSuccess, Q as SwapQuote, R as ThemeConfig, T as TransactionAction, u as TransactionDetails, t as TransactionFees, U as UserPasskeysResponse } from './client-CHCVV9H3.js';
|
|
3
|
+
export { O as OneAuthProvider, a as OneAuthProviderOptions, c as createOneAuthProvider } from './provider-DzxXGyV8.js';
|
|
4
4
|
import { Address, LocalAccount, Chain, Transport, Hex, WalletClient, Hash } from 'viem';
|
|
5
5
|
import * as react_jsx_runtime from 'react/jsx-runtime';
|
|
6
6
|
import * as React from 'react';
|
|
@@ -232,10 +232,6 @@ declare function isTokenAddressSupported(tokenAddress: Address, chainId: number)
|
|
|
232
232
|
* This is the standard Ethereum message prefix for `personal_sign`.
|
|
233
233
|
*/
|
|
234
234
|
declare const ETHEREUM_MESSAGE_PREFIX = "\u0019Ethereum Signed Message:\n";
|
|
235
|
-
/**
|
|
236
|
-
* @deprecated Use ETHEREUM_MESSAGE_PREFIX instead. Kept for backwards compatibility.
|
|
237
|
-
*/
|
|
238
|
-
declare const PASSKEY_MESSAGE_PREFIX = "\u0019Ethereum Signed Message:\n";
|
|
239
235
|
/**
|
|
240
236
|
* Hash a message with the EIP-191 Ethereum prefix.
|
|
241
237
|
*
|
|
@@ -277,4 +273,4 @@ declare function hashMessage(message: string): `0x${string}`;
|
|
|
277
273
|
*/
|
|
278
274
|
declare function verifyMessageHash(message: string, signedHash: string | undefined): boolean;
|
|
279
275
|
|
|
280
|
-
export { type BatchQueueContextValue, BatchQueueProvider, type BatchQueueProviderProps, BatchQueueWidget, type BatchQueueWidgetProps, type BatchedCall, type ChainFilterOptions, ETHEREUM_MESSAGE_PREFIX, IntentCall, IntentSigner, OneAuthClient,
|
|
276
|
+
export { type BatchQueueContextValue, BatchQueueProvider, type BatchQueueProviderProps, BatchQueueWidget, type BatchQueueWidgetProps, type BatchedCall, type ChainFilterOptions, ETHEREUM_MESSAGE_PREFIX, IntentCall, IntentSigner, OneAuthClient, type PasskeyAccount, type PasskeyWalletClient, type PasskeyWalletClientConfig, type SendCallsParams, SendIntentResult, type TokenConfig, type TransactionCall, WebAuthnSignature, createPasskeyAccount, createPasskeyWalletClient, encodeWebAuthnSignature, getAllSupportedChainsAndTokens, getChainById, getChainExplorerUrl, getChainName, getChainRpcUrl, getSupportedChainIds, getSupportedChains, getSupportedTokenSymbols, getSupportedTokens, getTokenSymbol, hashCalls, hashMessage, isTestnet, isTokenAddressSupported, resolveTokenAddress, useBatchQueue, verifyMessageHash };
|