@stytch/vanilla-js 5.9.3 → 5.9.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +8 -0
- package/dist/adminPortal/index.esm.js +1 -1
- package/dist/adminPortal/index.js +1 -1
- package/dist/b2b/index.esm.js +3 -3
- package/dist/b2b/index.headless.esm.js +3 -3
- package/dist/b2b/index.headless.js +2 -2
- package/dist/b2b/index.js +2 -2
- package/dist/{extractErrorMessage-Ctw0yaGs.js → extractErrorMessage-BThIxj3y.js} +1 -1
- package/dist/{extractErrorMessage-D81ze9XY.js → extractErrorMessage-C3sgO9Ia.js} +1 -1
- package/dist/index.esm.js +1 -1
- package/dist/index.headless.esm.js +56 -52
- package/dist/index.headless.js +56 -52
- package/dist/index.js +1 -1
- package/dist/{internal-C-jiPhWR.js → internal-Bq-MGoJK.js} +96 -96
- package/dist/{internal-CNzve7Hh.js → internal-DhpbqDn_.js} +96 -96
- package/package.json +2 -2
|
@@ -2815,24 +2815,28 @@ var HeadlessOTPClient = /*#__PURE__*/_createClass(function HeadlessOTPClient(_ne
|
|
|
2815
2815
|
this.email = {
|
|
2816
2816
|
loginOrCreate: function loginOrCreate(email, options) {
|
|
2817
2817
|
return __awaiter$1(_this7, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee34() {
|
|
2818
|
-
var captcha_token, requestBody;
|
|
2818
|
+
var _yield$this$dfpProtec7, dfp_telemetry_id, captcha_token, requestBody;
|
|
2819
2819
|
return _regeneratorRuntime().wrap(function _callee34$(_context34) {
|
|
2820
2820
|
while (1) switch (_context34.prev = _context34.next) {
|
|
2821
2821
|
case 0:
|
|
2822
2822
|
_context34.next = 2;
|
|
2823
|
-
return this.
|
|
2823
|
+
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
2824
2824
|
case 2:
|
|
2825
|
-
|
|
2825
|
+
_yield$this$dfpProtec7 = _context34.sent;
|
|
2826
|
+
dfp_telemetry_id = _yield$this$dfpProtec7.dfp_telemetry_id;
|
|
2827
|
+
captcha_token = _yield$this$dfpProtec7.captcha_token;
|
|
2826
2828
|
requestBody = Object.assign(Object.assign({}, options), {
|
|
2827
2829
|
email: email,
|
|
2828
|
-
captcha_token: captcha_token
|
|
2830
|
+
captcha_token: captcha_token,
|
|
2831
|
+
dfp_telemetry_id: dfp_telemetry_id
|
|
2829
2832
|
});
|
|
2830
|
-
return _context34.abrupt("return", this._networkClient.
|
|
2833
|
+
return _context34.abrupt("return", this._networkClient.retriableFetchSDK({
|
|
2831
2834
|
url: '/otps/email/login_or_create',
|
|
2832
2835
|
body: requestBody,
|
|
2833
|
-
method: 'POST'
|
|
2836
|
+
method: 'POST',
|
|
2837
|
+
retryCallback: this.dfpProtectedAuth.retryWithCaptchaAndDFP
|
|
2834
2838
|
}));
|
|
2835
|
-
case
|
|
2839
|
+
case 7:
|
|
2836
2840
|
case "end":
|
|
2837
2841
|
return _context34.stop();
|
|
2838
2842
|
}
|
|
@@ -2870,7 +2874,7 @@ var HeadlessOTPClient = /*#__PURE__*/_createClass(function HeadlessOTPClient(_ne
|
|
|
2870
2874
|
};
|
|
2871
2875
|
this.authenticate = function (code, method_id, options) {
|
|
2872
2876
|
return __awaiter$1(_this7, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee36() {
|
|
2873
|
-
var _yield$this$
|
|
2877
|
+
var _yield$this$dfpProtec8, dfp_telemetry_id, captcha_token, requestBody, resp;
|
|
2874
2878
|
return _regeneratorRuntime().wrap(function _callee36$(_context36) {
|
|
2875
2879
|
while (1) switch (_context36.prev = _context36.next) {
|
|
2876
2880
|
case 0:
|
|
@@ -2878,9 +2882,9 @@ var HeadlessOTPClient = /*#__PURE__*/_createClass(function HeadlessOTPClient(_ne
|
|
|
2878
2882
|
_context36.next = 3;
|
|
2879
2883
|
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
2880
2884
|
case 3:
|
|
2881
|
-
_yield$this$
|
|
2882
|
-
dfp_telemetry_id = _yield$this$
|
|
2883
|
-
captcha_token = _yield$this$
|
|
2885
|
+
_yield$this$dfpProtec8 = _context36.sent;
|
|
2886
|
+
dfp_telemetry_id = _yield$this$dfpProtec8.dfp_telemetry_id;
|
|
2887
|
+
captcha_token = _yield$this$dfpProtec8.captcha_token;
|
|
2884
2888
|
requestBody = Object.assign({
|
|
2885
2889
|
token: code,
|
|
2886
2890
|
method_id: method_id,
|
|
@@ -3203,7 +3207,7 @@ var HeadlessCryptoWalletClient = /*#__PURE__*/function () {
|
|
|
3203
3207
|
key: "authenticate",
|
|
3204
3208
|
value: function authenticate(options) {
|
|
3205
3209
|
return __awaiter$1(this, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee41() {
|
|
3206
|
-
var _yield$this$
|
|
3210
|
+
var _yield$this$dfpProtec9, dfp_telemetry_id, captcha_token, resp;
|
|
3207
3211
|
return _regeneratorRuntime().wrap(function _callee41$(_context41) {
|
|
3208
3212
|
while (1) switch (_context41.prev = _context41.next) {
|
|
3209
3213
|
case 0:
|
|
@@ -3211,9 +3215,9 @@ var HeadlessCryptoWalletClient = /*#__PURE__*/function () {
|
|
|
3211
3215
|
_context41.next = 3;
|
|
3212
3216
|
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
3213
3217
|
case 3:
|
|
3214
|
-
_yield$this$
|
|
3215
|
-
dfp_telemetry_id = _yield$this$
|
|
3216
|
-
captcha_token = _yield$this$
|
|
3218
|
+
_yield$this$dfpProtec9 = _context41.sent;
|
|
3219
|
+
dfp_telemetry_id = _yield$this$dfpProtec9.dfp_telemetry_id;
|
|
3220
|
+
captcha_token = _yield$this$dfpProtec9.captcha_token;
|
|
3217
3221
|
_context41.next = 8;
|
|
3218
3222
|
return this._apiNetworkClient.retriableFetchSDK({
|
|
3219
3223
|
url: '/crypto_wallets/authenticate',
|
|
@@ -3289,7 +3293,7 @@ var HeadlessTOTPClient = /*#__PURE__*/function () {
|
|
|
3289
3293
|
key: "authenticate",
|
|
3290
3294
|
value: function authenticate(options) {
|
|
3291
3295
|
return __awaiter$1(this, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee43() {
|
|
3292
|
-
var _yield$this$
|
|
3296
|
+
var _yield$this$dfpProtec10, dfp_telemetry_id, captcha_token, resp;
|
|
3293
3297
|
return _regeneratorRuntime().wrap(function _callee43$(_context43) {
|
|
3294
3298
|
while (1) switch (_context43.prev = _context43.next) {
|
|
3295
3299
|
case 0:
|
|
@@ -3297,9 +3301,9 @@ var HeadlessTOTPClient = /*#__PURE__*/function () {
|
|
|
3297
3301
|
_context43.next = 3;
|
|
3298
3302
|
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
3299
3303
|
case 3:
|
|
3300
|
-
_yield$this$
|
|
3301
|
-
dfp_telemetry_id = _yield$this$
|
|
3302
|
-
captcha_token = _yield$this$
|
|
3304
|
+
_yield$this$dfpProtec10 = _context43.sent;
|
|
3305
|
+
dfp_telemetry_id = _yield$this$dfpProtec10.dfp_telemetry_id;
|
|
3306
|
+
captcha_token = _yield$this$dfpProtec10.captcha_token;
|
|
3303
3307
|
_context43.next = 8;
|
|
3304
3308
|
return this._networkClient.retriableFetchSDK({
|
|
3305
3309
|
url: '/totps/authenticate',
|
|
@@ -3353,7 +3357,7 @@ var HeadlessTOTPClient = /*#__PURE__*/function () {
|
|
|
3353
3357
|
key: "recover",
|
|
3354
3358
|
value: function recover(options) {
|
|
3355
3359
|
return __awaiter$1(this, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee45() {
|
|
3356
|
-
var _yield$this$
|
|
3360
|
+
var _yield$this$dfpProtec11, dfp_telemetry_id, captcha_token, resp;
|
|
3357
3361
|
return _regeneratorRuntime().wrap(function _callee45$(_context45) {
|
|
3358
3362
|
while (1) switch (_context45.prev = _context45.next) {
|
|
3359
3363
|
case 0:
|
|
@@ -3361,9 +3365,9 @@ var HeadlessTOTPClient = /*#__PURE__*/function () {
|
|
|
3361
3365
|
_context45.next = 3;
|
|
3362
3366
|
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
3363
3367
|
case 3:
|
|
3364
|
-
_yield$this$
|
|
3365
|
-
dfp_telemetry_id = _yield$this$
|
|
3366
|
-
captcha_token = _yield$this$
|
|
3368
|
+
_yield$this$dfpProtec11 = _context45.sent;
|
|
3369
|
+
dfp_telemetry_id = _yield$this$dfpProtec11.dfp_telemetry_id;
|
|
3370
|
+
captcha_token = _yield$this$dfpProtec11.captcha_token;
|
|
3367
3371
|
_context45.next = 8;
|
|
3368
3372
|
return this._networkClient.retriableFetchSDK({
|
|
3369
3373
|
url: '/totps/recover',
|
|
@@ -3695,7 +3699,7 @@ var HeadlessWebAuthnClient = /*#__PURE__*/function () {
|
|
|
3695
3699
|
value: function authenticate(options) {
|
|
3696
3700
|
var _a, _b;
|
|
3697
3701
|
return __awaiter$1(this, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee49() {
|
|
3698
|
-
var _yield$this$
|
|
3702
|
+
var _yield$this$dfpProtec12, dfp_telemetry_id, captcha_token, isLoggedIn, endpoint, startResp, publicKeyCredentialRequestOptions, abortController, credReqOptions, conditionalMediationCredReqOption, credential, authenticationData;
|
|
3699
3703
|
return _regeneratorRuntime().wrap(function _callee49$(_context49) {
|
|
3700
3704
|
while (1) switch (_context49.prev = _context49.next) {
|
|
3701
3705
|
case 0:
|
|
@@ -3703,9 +3707,9 @@ var HeadlessWebAuthnClient = /*#__PURE__*/function () {
|
|
|
3703
3707
|
_context49.next = 3;
|
|
3704
3708
|
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
3705
3709
|
case 3:
|
|
3706
|
-
_yield$this$
|
|
3707
|
-
dfp_telemetry_id = _yield$this$
|
|
3708
|
-
captcha_token = _yield$this$
|
|
3710
|
+
_yield$this$dfpProtec12 = _context49.sent;
|
|
3711
|
+
dfp_telemetry_id = _yield$this$dfpProtec12.dfp_telemetry_id;
|
|
3712
|
+
captcha_token = _yield$this$dfpProtec12.captcha_token;
|
|
3709
3713
|
if (!options.conditional_mediation) {
|
|
3710
3714
|
_context49.next = 14;
|
|
3711
3715
|
break;
|
|
@@ -3896,7 +3900,7 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
3896
3900
|
key: "create",
|
|
3897
3901
|
value: function create(options) {
|
|
3898
3902
|
return __awaiter$1(this, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee53() {
|
|
3899
|
-
var _yield$this$
|
|
3903
|
+
var _yield$this$dfpProtec13, dfp_telemetry_id, captcha_token, resp;
|
|
3900
3904
|
return _regeneratorRuntime().wrap(function _callee53$(_context53) {
|
|
3901
3905
|
while (1) switch (_context53.prev = _context53.next) {
|
|
3902
3906
|
case 0:
|
|
@@ -3904,9 +3908,9 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
3904
3908
|
_context53.next = 3;
|
|
3905
3909
|
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
3906
3910
|
case 3:
|
|
3907
|
-
_yield$this$
|
|
3908
|
-
dfp_telemetry_id = _yield$this$
|
|
3909
|
-
captcha_token = _yield$this$
|
|
3911
|
+
_yield$this$dfpProtec13 = _context53.sent;
|
|
3912
|
+
dfp_telemetry_id = _yield$this$dfpProtec13.dfp_telemetry_id;
|
|
3913
|
+
captcha_token = _yield$this$dfpProtec13.captcha_token;
|
|
3910
3914
|
_context53.next = 8;
|
|
3911
3915
|
return this._networkClient.retriableFetchSDK({
|
|
3912
3916
|
url: '/passwords',
|
|
@@ -3943,7 +3947,7 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
3943
3947
|
key: "authenticate",
|
|
3944
3948
|
value: function authenticate(options) {
|
|
3945
3949
|
return __awaiter$1(this, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee54() {
|
|
3946
|
-
var _yield$this$
|
|
3950
|
+
var _yield$this$dfpProtec14, dfp_telemetry_id, captcha_token, resp;
|
|
3947
3951
|
return _regeneratorRuntime().wrap(function _callee54$(_context54) {
|
|
3948
3952
|
while (1) switch (_context54.prev = _context54.next) {
|
|
3949
3953
|
case 0:
|
|
@@ -3951,9 +3955,9 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
3951
3955
|
_context54.next = 3;
|
|
3952
3956
|
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
3953
3957
|
case 3:
|
|
3954
|
-
_yield$this$
|
|
3955
|
-
dfp_telemetry_id = _yield$this$
|
|
3956
|
-
captcha_token = _yield$this$
|
|
3958
|
+
_yield$this$dfpProtec14 = _context54.sent;
|
|
3959
|
+
dfp_telemetry_id = _yield$this$dfpProtec14.dfp_telemetry_id;
|
|
3960
|
+
captcha_token = _yield$this$dfpProtec14.captcha_token;
|
|
3957
3961
|
_context54.next = 8;
|
|
3958
3962
|
return this._networkClient.retriableFetchSDK({
|
|
3959
3963
|
url: '/passwords/authenticate',
|
|
@@ -3990,7 +3994,7 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
3990
3994
|
key: "resetByEmailStart",
|
|
3991
3995
|
value: function resetByEmailStart(options) {
|
|
3992
3996
|
return __awaiter$1(this, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee55() {
|
|
3993
|
-
var code_challenge, _yield$this$
|
|
3997
|
+
var code_challenge, _yield$this$dfpProtec15, dfp_telemetry_id, captcha_token;
|
|
3994
3998
|
return _regeneratorRuntime().wrap(function _callee55$(_context55) {
|
|
3995
3999
|
while (1) switch (_context55.prev = _context55.next) {
|
|
3996
4000
|
case 0:
|
|
@@ -4002,9 +4006,9 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
4002
4006
|
_context55.next = 6;
|
|
4003
4007
|
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
4004
4008
|
case 6:
|
|
4005
|
-
_yield$this$
|
|
4006
|
-
dfp_telemetry_id = _yield$this$
|
|
4007
|
-
captcha_token = _yield$this$
|
|
4009
|
+
_yield$this$dfpProtec15 = _context55.sent;
|
|
4010
|
+
dfp_telemetry_id = _yield$this$dfpProtec15.dfp_telemetry_id;
|
|
4011
|
+
captcha_token = _yield$this$dfpProtec15.captcha_token;
|
|
4008
4012
|
return _context55.abrupt("return", this._networkClient.retriableFetchSDK({
|
|
4009
4013
|
url: '/passwords/email/reset/start',
|
|
4010
4014
|
method: 'POST',
|
|
@@ -4031,7 +4035,7 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
4031
4035
|
key: "resetByEmail",
|
|
4032
4036
|
value: function resetByEmail(options) {
|
|
4033
4037
|
return __awaiter$1(this, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee56() {
|
|
4034
|
-
var _yield$this$
|
|
4038
|
+
var _yield$this$dfpProtec16, dfp_telemetry_id, captcha_token, pkPair, code_verifier, resp;
|
|
4035
4039
|
return _regeneratorRuntime().wrap(function _callee56$(_context56) {
|
|
4036
4040
|
while (1) switch (_context56.prev = _context56.next) {
|
|
4037
4041
|
case 0:
|
|
@@ -4039,9 +4043,9 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
4039
4043
|
_context56.next = 3;
|
|
4040
4044
|
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
4041
4045
|
case 3:
|
|
4042
|
-
_yield$this$
|
|
4043
|
-
dfp_telemetry_id = _yield$this$
|
|
4044
|
-
captcha_token = _yield$this$
|
|
4046
|
+
_yield$this$dfpProtec16 = _context56.sent;
|
|
4047
|
+
dfp_telemetry_id = _yield$this$dfpProtec16.dfp_telemetry_id;
|
|
4048
|
+
captcha_token = _yield$this$dfpProtec16.captcha_token;
|
|
4045
4049
|
_context56.next = 8;
|
|
4046
4050
|
return this._pkceManager.getPKPair();
|
|
4047
4051
|
case 8:
|
|
@@ -4085,7 +4089,7 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
4085
4089
|
key: "resetByExistingPassword",
|
|
4086
4090
|
value: function resetByExistingPassword(options) {
|
|
4087
4091
|
return __awaiter$1(this, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee57() {
|
|
4088
|
-
var _yield$this$
|
|
4092
|
+
var _yield$this$dfpProtec17, dfp_telemetry_id, captcha_token, resp;
|
|
4089
4093
|
return _regeneratorRuntime().wrap(function _callee57$(_context57) {
|
|
4090
4094
|
while (1) switch (_context57.prev = _context57.next) {
|
|
4091
4095
|
case 0:
|
|
@@ -4093,9 +4097,9 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
4093
4097
|
_context57.next = 3;
|
|
4094
4098
|
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
4095
4099
|
case 3:
|
|
4096
|
-
_yield$this$
|
|
4097
|
-
dfp_telemetry_id = _yield$this$
|
|
4098
|
-
captcha_token = _yield$this$
|
|
4100
|
+
_yield$this$dfpProtec17 = _context57.sent;
|
|
4101
|
+
dfp_telemetry_id = _yield$this$dfpProtec17.dfp_telemetry_id;
|
|
4102
|
+
captcha_token = _yield$this$dfpProtec17.captcha_token;
|
|
4099
4103
|
_context57.next = 8;
|
|
4100
4104
|
return this._networkClient.retriableFetchSDK({
|
|
4101
4105
|
url: '/passwords/existing_password/reset',
|
|
@@ -4133,7 +4137,7 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
4133
4137
|
key: "resetBySession",
|
|
4134
4138
|
value: function resetBySession(options) {
|
|
4135
4139
|
return __awaiter$1(this, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee58() {
|
|
4136
|
-
var _yield$this$
|
|
4140
|
+
var _yield$this$dfpProtec18, dfp_telemetry_id, captcha_token, resp;
|
|
4137
4141
|
return _regeneratorRuntime().wrap(function _callee58$(_context58) {
|
|
4138
4142
|
while (1) switch (_context58.prev = _context58.next) {
|
|
4139
4143
|
case 0:
|
|
@@ -4141,9 +4145,9 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
4141
4145
|
_context58.next = 3;
|
|
4142
4146
|
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
4143
4147
|
case 3:
|
|
4144
|
-
_yield$this$
|
|
4145
|
-
dfp_telemetry_id = _yield$this$
|
|
4146
|
-
captcha_token = _yield$this$
|
|
4148
|
+
_yield$this$dfpProtec18 = _context58.sent;
|
|
4149
|
+
dfp_telemetry_id = _yield$this$dfpProtec18.dfp_telemetry_id;
|
|
4150
|
+
captcha_token = _yield$this$dfpProtec18.captcha_token;
|
|
4147
4151
|
_context58.next = 8;
|
|
4148
4152
|
return this._networkClient.retriableFetchSDK({
|
|
4149
4153
|
url: '/passwords/session/reset',
|
|
@@ -5678,7 +5682,7 @@ var internalSymB2C = Symbol["for"]('stytch__internal_b2c');
|
|
|
5678
5682
|
var writeB2CInternals = function writeB2CInternals(obj, internals) {
|
|
5679
5683
|
Object.assign(obj, _defineProperty({}, internalSymB2C, internals));
|
|
5680
5684
|
};
|
|
5681
|
-
var version = "5.9.
|
|
5685
|
+
var version = "5.9.4";
|
|
5682
5686
|
var NetworkClient = /*#__PURE__*/function () {
|
|
5683
5687
|
function NetworkClient(_publicToken, _subscriptionDataLayer, _liveAPIURL, _testAPIURL, additionalTelemetryDataFn) {
|
|
5684
5688
|
_classCallCheck2(this, NetworkClient);
|
package/dist/index.headless.js
CHANGED
|
@@ -2817,24 +2817,28 @@ var HeadlessOTPClient = /*#__PURE__*/_createClass(function HeadlessOTPClient(_ne
|
|
|
2817
2817
|
this.email = {
|
|
2818
2818
|
loginOrCreate: function loginOrCreate(email, options) {
|
|
2819
2819
|
return __awaiter$1(_this7, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee34() {
|
|
2820
|
-
var captcha_token, requestBody;
|
|
2820
|
+
var _yield$this$dfpProtec7, dfp_telemetry_id, captcha_token, requestBody;
|
|
2821
2821
|
return _regeneratorRuntime().wrap(function _callee34$(_context34) {
|
|
2822
2822
|
while (1) switch (_context34.prev = _context34.next) {
|
|
2823
2823
|
case 0:
|
|
2824
2824
|
_context34.next = 2;
|
|
2825
|
-
return this.
|
|
2825
|
+
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
2826
2826
|
case 2:
|
|
2827
|
-
|
|
2827
|
+
_yield$this$dfpProtec7 = _context34.sent;
|
|
2828
|
+
dfp_telemetry_id = _yield$this$dfpProtec7.dfp_telemetry_id;
|
|
2829
|
+
captcha_token = _yield$this$dfpProtec7.captcha_token;
|
|
2828
2830
|
requestBody = Object.assign(Object.assign({}, options), {
|
|
2829
2831
|
email: email,
|
|
2830
|
-
captcha_token: captcha_token
|
|
2832
|
+
captcha_token: captcha_token,
|
|
2833
|
+
dfp_telemetry_id: dfp_telemetry_id
|
|
2831
2834
|
});
|
|
2832
|
-
return _context34.abrupt("return", this._networkClient.
|
|
2835
|
+
return _context34.abrupt("return", this._networkClient.retriableFetchSDK({
|
|
2833
2836
|
url: '/otps/email/login_or_create',
|
|
2834
2837
|
body: requestBody,
|
|
2835
|
-
method: 'POST'
|
|
2838
|
+
method: 'POST',
|
|
2839
|
+
retryCallback: this.dfpProtectedAuth.retryWithCaptchaAndDFP
|
|
2836
2840
|
}));
|
|
2837
|
-
case
|
|
2841
|
+
case 7:
|
|
2838
2842
|
case "end":
|
|
2839
2843
|
return _context34.stop();
|
|
2840
2844
|
}
|
|
@@ -2872,7 +2876,7 @@ var HeadlessOTPClient = /*#__PURE__*/_createClass(function HeadlessOTPClient(_ne
|
|
|
2872
2876
|
};
|
|
2873
2877
|
this.authenticate = function (code, method_id, options) {
|
|
2874
2878
|
return __awaiter$1(_this7, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee36() {
|
|
2875
|
-
var _yield$this$
|
|
2879
|
+
var _yield$this$dfpProtec8, dfp_telemetry_id, captcha_token, requestBody, resp;
|
|
2876
2880
|
return _regeneratorRuntime().wrap(function _callee36$(_context36) {
|
|
2877
2881
|
while (1) switch (_context36.prev = _context36.next) {
|
|
2878
2882
|
case 0:
|
|
@@ -2880,9 +2884,9 @@ var HeadlessOTPClient = /*#__PURE__*/_createClass(function HeadlessOTPClient(_ne
|
|
|
2880
2884
|
_context36.next = 3;
|
|
2881
2885
|
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
2882
2886
|
case 3:
|
|
2883
|
-
_yield$this$
|
|
2884
|
-
dfp_telemetry_id = _yield$this$
|
|
2885
|
-
captcha_token = _yield$this$
|
|
2887
|
+
_yield$this$dfpProtec8 = _context36.sent;
|
|
2888
|
+
dfp_telemetry_id = _yield$this$dfpProtec8.dfp_telemetry_id;
|
|
2889
|
+
captcha_token = _yield$this$dfpProtec8.captcha_token;
|
|
2886
2890
|
requestBody = Object.assign({
|
|
2887
2891
|
token: code,
|
|
2888
2892
|
method_id: method_id,
|
|
@@ -3205,7 +3209,7 @@ var HeadlessCryptoWalletClient = /*#__PURE__*/function () {
|
|
|
3205
3209
|
key: "authenticate",
|
|
3206
3210
|
value: function authenticate(options) {
|
|
3207
3211
|
return __awaiter$1(this, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee41() {
|
|
3208
|
-
var _yield$this$
|
|
3212
|
+
var _yield$this$dfpProtec9, dfp_telemetry_id, captcha_token, resp;
|
|
3209
3213
|
return _regeneratorRuntime().wrap(function _callee41$(_context41) {
|
|
3210
3214
|
while (1) switch (_context41.prev = _context41.next) {
|
|
3211
3215
|
case 0:
|
|
@@ -3213,9 +3217,9 @@ var HeadlessCryptoWalletClient = /*#__PURE__*/function () {
|
|
|
3213
3217
|
_context41.next = 3;
|
|
3214
3218
|
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
3215
3219
|
case 3:
|
|
3216
|
-
_yield$this$
|
|
3217
|
-
dfp_telemetry_id = _yield$this$
|
|
3218
|
-
captcha_token = _yield$this$
|
|
3220
|
+
_yield$this$dfpProtec9 = _context41.sent;
|
|
3221
|
+
dfp_telemetry_id = _yield$this$dfpProtec9.dfp_telemetry_id;
|
|
3222
|
+
captcha_token = _yield$this$dfpProtec9.captcha_token;
|
|
3219
3223
|
_context41.next = 8;
|
|
3220
3224
|
return this._apiNetworkClient.retriableFetchSDK({
|
|
3221
3225
|
url: '/crypto_wallets/authenticate',
|
|
@@ -3291,7 +3295,7 @@ var HeadlessTOTPClient = /*#__PURE__*/function () {
|
|
|
3291
3295
|
key: "authenticate",
|
|
3292
3296
|
value: function authenticate(options) {
|
|
3293
3297
|
return __awaiter$1(this, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee43() {
|
|
3294
|
-
var _yield$this$
|
|
3298
|
+
var _yield$this$dfpProtec10, dfp_telemetry_id, captcha_token, resp;
|
|
3295
3299
|
return _regeneratorRuntime().wrap(function _callee43$(_context43) {
|
|
3296
3300
|
while (1) switch (_context43.prev = _context43.next) {
|
|
3297
3301
|
case 0:
|
|
@@ -3299,9 +3303,9 @@ var HeadlessTOTPClient = /*#__PURE__*/function () {
|
|
|
3299
3303
|
_context43.next = 3;
|
|
3300
3304
|
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
3301
3305
|
case 3:
|
|
3302
|
-
_yield$this$
|
|
3303
|
-
dfp_telemetry_id = _yield$this$
|
|
3304
|
-
captcha_token = _yield$this$
|
|
3306
|
+
_yield$this$dfpProtec10 = _context43.sent;
|
|
3307
|
+
dfp_telemetry_id = _yield$this$dfpProtec10.dfp_telemetry_id;
|
|
3308
|
+
captcha_token = _yield$this$dfpProtec10.captcha_token;
|
|
3305
3309
|
_context43.next = 8;
|
|
3306
3310
|
return this._networkClient.retriableFetchSDK({
|
|
3307
3311
|
url: '/totps/authenticate',
|
|
@@ -3355,7 +3359,7 @@ var HeadlessTOTPClient = /*#__PURE__*/function () {
|
|
|
3355
3359
|
key: "recover",
|
|
3356
3360
|
value: function recover(options) {
|
|
3357
3361
|
return __awaiter$1(this, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee45() {
|
|
3358
|
-
var _yield$this$
|
|
3362
|
+
var _yield$this$dfpProtec11, dfp_telemetry_id, captcha_token, resp;
|
|
3359
3363
|
return _regeneratorRuntime().wrap(function _callee45$(_context45) {
|
|
3360
3364
|
while (1) switch (_context45.prev = _context45.next) {
|
|
3361
3365
|
case 0:
|
|
@@ -3363,9 +3367,9 @@ var HeadlessTOTPClient = /*#__PURE__*/function () {
|
|
|
3363
3367
|
_context45.next = 3;
|
|
3364
3368
|
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
3365
3369
|
case 3:
|
|
3366
|
-
_yield$this$
|
|
3367
|
-
dfp_telemetry_id = _yield$this$
|
|
3368
|
-
captcha_token = _yield$this$
|
|
3370
|
+
_yield$this$dfpProtec11 = _context45.sent;
|
|
3371
|
+
dfp_telemetry_id = _yield$this$dfpProtec11.dfp_telemetry_id;
|
|
3372
|
+
captcha_token = _yield$this$dfpProtec11.captcha_token;
|
|
3369
3373
|
_context45.next = 8;
|
|
3370
3374
|
return this._networkClient.retriableFetchSDK({
|
|
3371
3375
|
url: '/totps/recover',
|
|
@@ -3697,7 +3701,7 @@ var HeadlessWebAuthnClient = /*#__PURE__*/function () {
|
|
|
3697
3701
|
value: function authenticate(options) {
|
|
3698
3702
|
var _a, _b;
|
|
3699
3703
|
return __awaiter$1(this, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee49() {
|
|
3700
|
-
var _yield$this$
|
|
3704
|
+
var _yield$this$dfpProtec12, dfp_telemetry_id, captcha_token, isLoggedIn, endpoint, startResp, publicKeyCredentialRequestOptions, abortController, credReqOptions, conditionalMediationCredReqOption, credential, authenticationData;
|
|
3701
3705
|
return _regeneratorRuntime().wrap(function _callee49$(_context49) {
|
|
3702
3706
|
while (1) switch (_context49.prev = _context49.next) {
|
|
3703
3707
|
case 0:
|
|
@@ -3705,9 +3709,9 @@ var HeadlessWebAuthnClient = /*#__PURE__*/function () {
|
|
|
3705
3709
|
_context49.next = 3;
|
|
3706
3710
|
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
3707
3711
|
case 3:
|
|
3708
|
-
_yield$this$
|
|
3709
|
-
dfp_telemetry_id = _yield$this$
|
|
3710
|
-
captcha_token = _yield$this$
|
|
3712
|
+
_yield$this$dfpProtec12 = _context49.sent;
|
|
3713
|
+
dfp_telemetry_id = _yield$this$dfpProtec12.dfp_telemetry_id;
|
|
3714
|
+
captcha_token = _yield$this$dfpProtec12.captcha_token;
|
|
3711
3715
|
if (!options.conditional_mediation) {
|
|
3712
3716
|
_context49.next = 14;
|
|
3713
3717
|
break;
|
|
@@ -3898,7 +3902,7 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
3898
3902
|
key: "create",
|
|
3899
3903
|
value: function create(options) {
|
|
3900
3904
|
return __awaiter$1(this, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee53() {
|
|
3901
|
-
var _yield$this$
|
|
3905
|
+
var _yield$this$dfpProtec13, dfp_telemetry_id, captcha_token, resp;
|
|
3902
3906
|
return _regeneratorRuntime().wrap(function _callee53$(_context53) {
|
|
3903
3907
|
while (1) switch (_context53.prev = _context53.next) {
|
|
3904
3908
|
case 0:
|
|
@@ -3906,9 +3910,9 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
3906
3910
|
_context53.next = 3;
|
|
3907
3911
|
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
3908
3912
|
case 3:
|
|
3909
|
-
_yield$this$
|
|
3910
|
-
dfp_telemetry_id = _yield$this$
|
|
3911
|
-
captcha_token = _yield$this$
|
|
3913
|
+
_yield$this$dfpProtec13 = _context53.sent;
|
|
3914
|
+
dfp_telemetry_id = _yield$this$dfpProtec13.dfp_telemetry_id;
|
|
3915
|
+
captcha_token = _yield$this$dfpProtec13.captcha_token;
|
|
3912
3916
|
_context53.next = 8;
|
|
3913
3917
|
return this._networkClient.retriableFetchSDK({
|
|
3914
3918
|
url: '/passwords',
|
|
@@ -3945,7 +3949,7 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
3945
3949
|
key: "authenticate",
|
|
3946
3950
|
value: function authenticate(options) {
|
|
3947
3951
|
return __awaiter$1(this, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee54() {
|
|
3948
|
-
var _yield$this$
|
|
3952
|
+
var _yield$this$dfpProtec14, dfp_telemetry_id, captcha_token, resp;
|
|
3949
3953
|
return _regeneratorRuntime().wrap(function _callee54$(_context54) {
|
|
3950
3954
|
while (1) switch (_context54.prev = _context54.next) {
|
|
3951
3955
|
case 0:
|
|
@@ -3953,9 +3957,9 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
3953
3957
|
_context54.next = 3;
|
|
3954
3958
|
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
3955
3959
|
case 3:
|
|
3956
|
-
_yield$this$
|
|
3957
|
-
dfp_telemetry_id = _yield$this$
|
|
3958
|
-
captcha_token = _yield$this$
|
|
3960
|
+
_yield$this$dfpProtec14 = _context54.sent;
|
|
3961
|
+
dfp_telemetry_id = _yield$this$dfpProtec14.dfp_telemetry_id;
|
|
3962
|
+
captcha_token = _yield$this$dfpProtec14.captcha_token;
|
|
3959
3963
|
_context54.next = 8;
|
|
3960
3964
|
return this._networkClient.retriableFetchSDK({
|
|
3961
3965
|
url: '/passwords/authenticate',
|
|
@@ -3992,7 +3996,7 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
3992
3996
|
key: "resetByEmailStart",
|
|
3993
3997
|
value: function resetByEmailStart(options) {
|
|
3994
3998
|
return __awaiter$1(this, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee55() {
|
|
3995
|
-
var code_challenge, _yield$this$
|
|
3999
|
+
var code_challenge, _yield$this$dfpProtec15, dfp_telemetry_id, captcha_token;
|
|
3996
4000
|
return _regeneratorRuntime().wrap(function _callee55$(_context55) {
|
|
3997
4001
|
while (1) switch (_context55.prev = _context55.next) {
|
|
3998
4002
|
case 0:
|
|
@@ -4004,9 +4008,9 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
4004
4008
|
_context55.next = 6;
|
|
4005
4009
|
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
4006
4010
|
case 6:
|
|
4007
|
-
_yield$this$
|
|
4008
|
-
dfp_telemetry_id = _yield$this$
|
|
4009
|
-
captcha_token = _yield$this$
|
|
4011
|
+
_yield$this$dfpProtec15 = _context55.sent;
|
|
4012
|
+
dfp_telemetry_id = _yield$this$dfpProtec15.dfp_telemetry_id;
|
|
4013
|
+
captcha_token = _yield$this$dfpProtec15.captcha_token;
|
|
4010
4014
|
return _context55.abrupt("return", this._networkClient.retriableFetchSDK({
|
|
4011
4015
|
url: '/passwords/email/reset/start',
|
|
4012
4016
|
method: 'POST',
|
|
@@ -4033,7 +4037,7 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
4033
4037
|
key: "resetByEmail",
|
|
4034
4038
|
value: function resetByEmail(options) {
|
|
4035
4039
|
return __awaiter$1(this, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee56() {
|
|
4036
|
-
var _yield$this$
|
|
4040
|
+
var _yield$this$dfpProtec16, dfp_telemetry_id, captcha_token, pkPair, code_verifier, resp;
|
|
4037
4041
|
return _regeneratorRuntime().wrap(function _callee56$(_context56) {
|
|
4038
4042
|
while (1) switch (_context56.prev = _context56.next) {
|
|
4039
4043
|
case 0:
|
|
@@ -4041,9 +4045,9 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
4041
4045
|
_context56.next = 3;
|
|
4042
4046
|
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
4043
4047
|
case 3:
|
|
4044
|
-
_yield$this$
|
|
4045
|
-
dfp_telemetry_id = _yield$this$
|
|
4046
|
-
captcha_token = _yield$this$
|
|
4048
|
+
_yield$this$dfpProtec16 = _context56.sent;
|
|
4049
|
+
dfp_telemetry_id = _yield$this$dfpProtec16.dfp_telemetry_id;
|
|
4050
|
+
captcha_token = _yield$this$dfpProtec16.captcha_token;
|
|
4047
4051
|
_context56.next = 8;
|
|
4048
4052
|
return this._pkceManager.getPKPair();
|
|
4049
4053
|
case 8:
|
|
@@ -4087,7 +4091,7 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
4087
4091
|
key: "resetByExistingPassword",
|
|
4088
4092
|
value: function resetByExistingPassword(options) {
|
|
4089
4093
|
return __awaiter$1(this, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee57() {
|
|
4090
|
-
var _yield$this$
|
|
4094
|
+
var _yield$this$dfpProtec17, dfp_telemetry_id, captcha_token, resp;
|
|
4091
4095
|
return _regeneratorRuntime().wrap(function _callee57$(_context57) {
|
|
4092
4096
|
while (1) switch (_context57.prev = _context57.next) {
|
|
4093
4097
|
case 0:
|
|
@@ -4095,9 +4099,9 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
4095
4099
|
_context57.next = 3;
|
|
4096
4100
|
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
4097
4101
|
case 3:
|
|
4098
|
-
_yield$this$
|
|
4099
|
-
dfp_telemetry_id = _yield$this$
|
|
4100
|
-
captcha_token = _yield$this$
|
|
4102
|
+
_yield$this$dfpProtec17 = _context57.sent;
|
|
4103
|
+
dfp_telemetry_id = _yield$this$dfpProtec17.dfp_telemetry_id;
|
|
4104
|
+
captcha_token = _yield$this$dfpProtec17.captcha_token;
|
|
4101
4105
|
_context57.next = 8;
|
|
4102
4106
|
return this._networkClient.retriableFetchSDK({
|
|
4103
4107
|
url: '/passwords/existing_password/reset',
|
|
@@ -4135,7 +4139,7 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
4135
4139
|
key: "resetBySession",
|
|
4136
4140
|
value: function resetBySession(options) {
|
|
4137
4141
|
return __awaiter$1(this, void 0, void 0, /*#__PURE__*/_regeneratorRuntime().mark(function _callee58() {
|
|
4138
|
-
var _yield$this$
|
|
4142
|
+
var _yield$this$dfpProtec18, dfp_telemetry_id, captcha_token, resp;
|
|
4139
4143
|
return _regeneratorRuntime().wrap(function _callee58$(_context58) {
|
|
4140
4144
|
while (1) switch (_context58.prev = _context58.next) {
|
|
4141
4145
|
case 0:
|
|
@@ -4143,9 +4147,9 @@ var HeadlessPasswordClient = /*#__PURE__*/function () {
|
|
|
4143
4147
|
_context58.next = 3;
|
|
4144
4148
|
return this.dfpProtectedAuth.getDFPTelemetryIDAndCaptcha();
|
|
4145
4149
|
case 3:
|
|
4146
|
-
_yield$this$
|
|
4147
|
-
dfp_telemetry_id = _yield$this$
|
|
4148
|
-
captcha_token = _yield$this$
|
|
4150
|
+
_yield$this$dfpProtec18 = _context58.sent;
|
|
4151
|
+
dfp_telemetry_id = _yield$this$dfpProtec18.dfp_telemetry_id;
|
|
4152
|
+
captcha_token = _yield$this$dfpProtec18.captcha_token;
|
|
4149
4153
|
_context58.next = 8;
|
|
4150
4154
|
return this._networkClient.retriableFetchSDK({
|
|
4151
4155
|
url: '/passwords/session/reset',
|
|
@@ -5680,7 +5684,7 @@ var internalSymB2C = Symbol["for"]('stytch__internal_b2c');
|
|
|
5680
5684
|
var writeB2CInternals = function writeB2CInternals(obj, internals) {
|
|
5681
5685
|
Object.assign(obj, _defineProperty({}, internalSymB2C, internals));
|
|
5682
5686
|
};
|
|
5683
|
-
var version = "5.9.
|
|
5687
|
+
var version = "5.9.4";
|
|
5684
5688
|
var NetworkClient = /*#__PURE__*/function () {
|
|
5685
5689
|
function NetworkClient(_publicToken, _subscriptionDataLayer, _liveAPIURL, _testAPIURL, additionalTelemetryDataFn) {
|
|
5686
5690
|
_classCallCheck2(this, NetworkClient);
|