@talken/talkenkit 2.5.3 → 2.5.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +9 -0
- package/README.md +28 -8
- package/dist/{abcWallet-BFCI4NEM.js → abcWallet-QJ5BKEXW.js} +1 -1
- package/dist/{chunk-WPRIYR63.js → chunk-YORGXWYS.js} +26 -0
- package/dist/index.js +137 -104
- package/dist/klipWallet-TBZJ5GGT.js +7 -0
- package/dist/wallets/walletConnectors/abcWallet/abcAccessKeyProvider.d.ts +4 -0
- package/dist/wallets/walletConnectors/abcWallet/abcAccessKeyProvider.js +1 -1
- package/dist/wallets/walletConnectors/abcWallet/abcConnector.js +2 -2
- package/dist/wallets/walletConnectors/abcWallet/abcSolanaWalletAdapter.js +3 -4
- package/dist/wallets/walletConnectors/abcWallet/abcWallet.js +3 -3
- package/dist/wallets/walletConnectors/abcWallet/index.js +3 -3
- package/dist/wallets/walletConnectors/berasigWallet/berasigWallet.js +2 -2
- package/dist/wallets/walletConnectors/bifrostWallet/bifrostWallet.js +2 -2
- package/dist/wallets/walletConnectors/binanceWallet/binanceWallet.js +2 -2
- package/dist/wallets/walletConnectors/bitgetWallet/bitgetWallet.js +2 -2
- package/dist/wallets/walletConnectors/bybitWallet/bybitWallet.js +2 -2
- package/dist/wallets/walletConnectors/{chunk-2N244XPQ.js → chunk-E6ZG77AF.js} +26 -0
- package/dist/wallets/walletConnectors/{chunk-DW36LXIV.js → chunk-G6SV7RAS.js} +1 -1
- package/dist/wallets/walletConnectors/chunk-HKMJ67FD.js +37 -0
- package/dist/wallets/walletConnectors/{chunk-OOCL4OPQ.js → chunk-SDRE2D5I.js} +1 -1
- package/dist/wallets/walletConnectors/clvWallet/clvWallet.js +2 -2
- package/dist/wallets/walletConnectors/coin98Wallet/coin98Wallet.js +2 -2
- package/dist/wallets/walletConnectors/coreWallet/coreWallet.js +2 -2
- package/dist/wallets/walletConnectors/foxWallet/foxWallet.js +2 -2
- package/dist/wallets/walletConnectors/frontierWallet/frontierWallet.js +2 -2
- package/dist/wallets/walletConnectors/gateWallet/gateWallet.js +2 -2
- package/dist/wallets/walletConnectors/index.d.ts +2 -1
- package/dist/wallets/walletConnectors/index.js +65 -61
- package/dist/wallets/walletConnectors/iopayWallet/iopayWallet.js +2 -2
- package/dist/wallets/walletConnectors/kaiaWallet/kaiaWallet.js +2 -2
- package/dist/wallets/walletConnectors/kaikasWallet/kaikasWallet.js +2 -2
- package/dist/wallets/walletConnectors/klipWallet/klipWallet.js +3 -63
- package/dist/wallets/walletConnectors/metaMaskWallet/metaMaskWallet.js +2 -2
- package/dist/wallets/walletConnectors/okxWallet/okxWallet.js +2 -2
- package/dist/wallets/walletConnectors/rainbowWallet/rainbowWallet.js +2 -2
- package/dist/wallets/walletConnectors/roninWallet/roninWallet.js +2 -2
- package/dist/wallets/walletConnectors/safepalWallet/safepalWallet.js +2 -2
- package/dist/wallets/walletConnectors/subWallet/subWallet.js +2 -2
- package/dist/wallets/walletConnectors/tokenPocketWallet/tokenPocketWallet.js +2 -2
- package/dist/wallets/walletConnectors/trustWallet/trustWallet.js +2 -2
- package/dist/wallets/walletConnectors/zealWallet/zealWallet.js +2 -2
- package/dist/wallets/walletConnectors/zerionWallet/zerionWallet.js +2 -2
- package/package.json +11 -12
- package/dist/AbcCredentialManager-DDHLW2IH.js +0 -7
- package/dist/abcWallet-2BVT5XFX.js +0 -161
- package/dist/chunk-ALBABQ53.js +0 -354
- package/dist/chunk-KOK5ZBR4.js +0 -5447
- package/dist/wallets/walletConnectors/chunk-6WF4SXLB.js +0 -156
- package/dist/wallets/walletConnectors/chunk-A66MTFML.js +0 -223
- package/dist/wallets/walletConnectors/chunk-ACLPF2UW.js +0 -96
- package/dist/wallets/walletConnectors/chunk-BHEVY4QY.js +0 -827
- package/dist/wallets/walletConnectors/chunk-BXH3GDX5.js +0 -273
- package/dist/wallets/walletConnectors/chunk-CABLJOMU.js +0 -194
- package/dist/wallets/walletConnectors/chunk-DPTDOCWL.js +0 -205
- package/dist/wallets/walletConnectors/chunk-FBJ5H6PM.js +0 -300
- package/dist/wallets/walletConnectors/chunk-IM7DEERX.js +0 -585
- package/dist/wallets/walletConnectors/chunk-J3YPHDHM.js +0 -827
- package/dist/wallets/walletConnectors/chunk-JADQLTFW.js +0 -194
- package/dist/wallets/walletConnectors/chunk-L6WDO3ZN.js +0 -445
- package/dist/wallets/walletConnectors/chunk-MO2AXXLI.js +0 -30
- package/dist/wallets/walletConnectors/chunk-NLA45GHJ.js +0 -300
- package/dist/wallets/walletConnectors/chunk-NU3ITJNK.js +0 -1485
- package/dist/wallets/walletConnectors/chunk-NULM3THX.js +0 -241
- package/dist/wallets/walletConnectors/chunk-OMOYFHBT.js +0 -1485
- package/dist/wallets/walletConnectors/chunk-VDWJ3NQ5.js +0 -52
- package/dist/wallets/walletConnectors/chunk-VMCIDCO5.js +0 -54
- package/dist/wallets/walletConnectors/chunk-VNL7XEWF.js +0 -54
- package/dist/wallets/walletConnectors/chunk-YV6IZWGE.js +0 -393
|
@@ -1,156 +0,0 @@
|
|
|
1
|
-
"use client";
|
|
2
|
-
import {
|
|
3
|
-
STORAGE_PREFIX
|
|
4
|
-
} from "./chunk-DPTDOCWL.js";
|
|
5
|
-
|
|
6
|
-
// src/wallets/walletConnectors/abcWallet/AbcCredentialManager.ts
|
|
7
|
-
var EMAIL_STORAGE_KEY = `${STORAGE_PREFIX}saved_email`;
|
|
8
|
-
var AUTH_STATE_KEY = `${STORAGE_PREFIX}auth_state`;
|
|
9
|
-
var EVM_CREDS_SESSION_KEY = `${STORAGE_PREFIX}evm_signing_creds`;
|
|
10
|
-
var PIN_HASH_SESSION_KEY = `${STORAGE_PREFIX}pin_hash`;
|
|
11
|
-
var AbcCredentialManager = class _AbcCredentialManager {
|
|
12
|
-
constructor() {
|
|
13
|
-
this.pinHash = null;
|
|
14
|
-
this.email_ = null;
|
|
15
|
-
this.restoreEmailFromStorage();
|
|
16
|
-
}
|
|
17
|
-
static getInstance() {
|
|
18
|
-
if (!_AbcCredentialManager.instance) {
|
|
19
|
-
_AbcCredentialManager.instance = new _AbcCredentialManager();
|
|
20
|
-
}
|
|
21
|
-
return _AbcCredentialManager.instance;
|
|
22
|
-
}
|
|
23
|
-
// ── PIN Hash (memory + sessionStorage) ───────────────────────────
|
|
24
|
-
setPinHash(hash) {
|
|
25
|
-
this.pinHash = hash;
|
|
26
|
-
if (typeof window !== "undefined") {
|
|
27
|
-
try {
|
|
28
|
-
sessionStorage.setItem(PIN_HASH_SESSION_KEY, hash);
|
|
29
|
-
} catch {
|
|
30
|
-
}
|
|
31
|
-
}
|
|
32
|
-
}
|
|
33
|
-
getPinHash() {
|
|
34
|
-
if (this.pinHash)
|
|
35
|
-
return this.pinHash;
|
|
36
|
-
if (typeof window !== "undefined") {
|
|
37
|
-
try {
|
|
38
|
-
const cached = sessionStorage.getItem(PIN_HASH_SESSION_KEY);
|
|
39
|
-
if (cached) {
|
|
40
|
-
this.pinHash = cached;
|
|
41
|
-
return cached;
|
|
42
|
-
}
|
|
43
|
-
} catch {
|
|
44
|
-
}
|
|
45
|
-
}
|
|
46
|
-
return null;
|
|
47
|
-
}
|
|
48
|
-
clearPinHash() {
|
|
49
|
-
this.pinHash = null;
|
|
50
|
-
if (typeof window !== "undefined") {
|
|
51
|
-
try {
|
|
52
|
-
sessionStorage.removeItem(PIN_HASH_SESSION_KEY);
|
|
53
|
-
} catch {
|
|
54
|
-
}
|
|
55
|
-
}
|
|
56
|
-
}
|
|
57
|
-
// ── Email ─────────────────────────────────────────────────────────
|
|
58
|
-
setEmail(email) {
|
|
59
|
-
this.email_ = email;
|
|
60
|
-
if (typeof window !== "undefined") {
|
|
61
|
-
try {
|
|
62
|
-
localStorage.setItem(EMAIL_STORAGE_KEY, email);
|
|
63
|
-
} catch {
|
|
64
|
-
}
|
|
65
|
-
}
|
|
66
|
-
}
|
|
67
|
-
/**
|
|
68
|
-
* Get recovery email.
|
|
69
|
-
* Priority: in-memory → auth_state JSON → saved_email localStorage
|
|
70
|
-
*/
|
|
71
|
-
getEmail() {
|
|
72
|
-
if (this.email_)
|
|
73
|
-
return this.email_;
|
|
74
|
-
if (typeof window === "undefined")
|
|
75
|
-
return null;
|
|
76
|
-
try {
|
|
77
|
-
const authState = localStorage.getItem(AUTH_STATE_KEY);
|
|
78
|
-
if (authState) {
|
|
79
|
-
const data = JSON.parse(authState);
|
|
80
|
-
const email = data?.user?.email || data?.wallet?.email;
|
|
81
|
-
if (typeof email === "string" && email.trim()) {
|
|
82
|
-
this.email_ = email.trim();
|
|
83
|
-
return this.email_;
|
|
84
|
-
}
|
|
85
|
-
}
|
|
86
|
-
} catch {
|
|
87
|
-
}
|
|
88
|
-
try {
|
|
89
|
-
const saved = localStorage.getItem(EMAIL_STORAGE_KEY);
|
|
90
|
-
if (saved?.trim()) {
|
|
91
|
-
this.email_ = saved.trim();
|
|
92
|
-
return this.email_;
|
|
93
|
-
}
|
|
94
|
-
} catch {
|
|
95
|
-
}
|
|
96
|
-
return null;
|
|
97
|
-
}
|
|
98
|
-
// ── EVM Signing Credentials (sessionStorage — tab-scoped) ────────
|
|
99
|
-
setEvmSigningCredentials(creds) {
|
|
100
|
-
if (typeof window === "undefined")
|
|
101
|
-
return;
|
|
102
|
-
try {
|
|
103
|
-
sessionStorage.setItem(EVM_CREDS_SESSION_KEY, JSON.stringify(creds));
|
|
104
|
-
} catch {
|
|
105
|
-
}
|
|
106
|
-
}
|
|
107
|
-
getEvmSigningCredentials() {
|
|
108
|
-
if (typeof window === "undefined")
|
|
109
|
-
return null;
|
|
110
|
-
try {
|
|
111
|
-
const raw = sessionStorage.getItem(EVM_CREDS_SESSION_KEY);
|
|
112
|
-
if (!raw)
|
|
113
|
-
return null;
|
|
114
|
-
const parsed = JSON.parse(raw);
|
|
115
|
-
if (parsed?.uid && parsed?.wid && parsed?.sid && parsed?.pvencstr && parsed?.encryptDevicePassword) {
|
|
116
|
-
return parsed;
|
|
117
|
-
}
|
|
118
|
-
return null;
|
|
119
|
-
} catch {
|
|
120
|
-
return null;
|
|
121
|
-
}
|
|
122
|
-
}
|
|
123
|
-
clearEvmSigningCredentials() {
|
|
124
|
-
if (typeof window === "undefined")
|
|
125
|
-
return;
|
|
126
|
-
try {
|
|
127
|
-
sessionStorage.removeItem(EVM_CREDS_SESSION_KEY);
|
|
128
|
-
} catch {
|
|
129
|
-
}
|
|
130
|
-
}
|
|
131
|
-
// ── Lifecycle ─────────────────────────────────────────────────────
|
|
132
|
-
/**
|
|
133
|
-
* Restore email from localStorage on initialization.
|
|
134
|
-
* PIN hash is intentionally NOT restored (memory-only).
|
|
135
|
-
*/
|
|
136
|
-
restoreEmailFromStorage() {
|
|
137
|
-
if (typeof window === "undefined")
|
|
138
|
-
return;
|
|
139
|
-
this.getEmail();
|
|
140
|
-
}
|
|
141
|
-
/**
|
|
142
|
-
* Clear all credentials (logout).
|
|
143
|
-
*/
|
|
144
|
-
clear() {
|
|
145
|
-
this.pinHash = null;
|
|
146
|
-
this.email_ = null;
|
|
147
|
-
this.clearEvmSigningCredentials();
|
|
148
|
-
}
|
|
149
|
-
};
|
|
150
|
-
function getCredentialManager() {
|
|
151
|
-
return AbcCredentialManager.getInstance();
|
|
152
|
-
}
|
|
153
|
-
|
|
154
|
-
export {
|
|
155
|
-
getCredentialManager
|
|
156
|
-
};
|
|
@@ -1,223 +0,0 @@
|
|
|
1
|
-
"use client";
|
|
2
|
-
import {
|
|
3
|
-
AbcError
|
|
4
|
-
} from "./chunk-4P3SPC44.js";
|
|
5
|
-
import {
|
|
6
|
-
PIN_CONFIG,
|
|
7
|
-
STORAGE_PREFIX,
|
|
8
|
-
TOKEN_EXPIRY
|
|
9
|
-
} from "./chunk-DPTDOCWL.js";
|
|
10
|
-
|
|
11
|
-
// src/wallets/walletConnectors/abcWallet/utils.ts
|
|
12
|
-
async function hashPin(pin) {
|
|
13
|
-
if (typeof window === "undefined" || !window.crypto?.subtle) {
|
|
14
|
-
return btoa(pin);
|
|
15
|
-
}
|
|
16
|
-
const encoder = new TextEncoder();
|
|
17
|
-
const data = encoder.encode(pin);
|
|
18
|
-
const hashBuffer = await window.crypto.subtle.digest("SHA-256", data);
|
|
19
|
-
const hashArray = Array.from(new Uint8Array(hashBuffer));
|
|
20
|
-
const hashHex = hashArray.map((b) => b.toString(16).padStart(2, "0")).join("");
|
|
21
|
-
return hashHex;
|
|
22
|
-
}
|
|
23
|
-
function validatePin(pin) {
|
|
24
|
-
if (!pin || typeof pin !== "string") {
|
|
25
|
-
return false;
|
|
26
|
-
}
|
|
27
|
-
const pinLength = pin.length;
|
|
28
|
-
if (pinLength < PIN_CONFIG.MIN_LENGTH || pinLength > PIN_CONFIG.MAX_LENGTH) {
|
|
29
|
-
return false;
|
|
30
|
-
}
|
|
31
|
-
return /^\d+$/.test(pin);
|
|
32
|
-
}
|
|
33
|
-
function validateEmail(email) {
|
|
34
|
-
if (!email || typeof email !== "string") {
|
|
35
|
-
return false;
|
|
36
|
-
}
|
|
37
|
-
const emailRegex = /^[^\s@]+@[^\s@]+\.[^\s@]+$/;
|
|
38
|
-
return emailRegex.test(email);
|
|
39
|
-
}
|
|
40
|
-
function getStorageKey(key) {
|
|
41
|
-
return `${STORAGE_PREFIX}${key}`;
|
|
42
|
-
}
|
|
43
|
-
function saveToStorage(key, value) {
|
|
44
|
-
if (typeof window === "undefined")
|
|
45
|
-
return;
|
|
46
|
-
try {
|
|
47
|
-
const storageKey = getStorageKey(key);
|
|
48
|
-
const serialized = JSON.stringify(value);
|
|
49
|
-
localStorage.setItem(storageKey, serialized);
|
|
50
|
-
} catch (error) {
|
|
51
|
-
console.error("Failed to save to storage:", error);
|
|
52
|
-
}
|
|
53
|
-
}
|
|
54
|
-
function loadFromStorage(key) {
|
|
55
|
-
if (typeof window === "undefined")
|
|
56
|
-
return null;
|
|
57
|
-
try {
|
|
58
|
-
const storageKey = getStorageKey(key);
|
|
59
|
-
const serialized = localStorage.getItem(storageKey);
|
|
60
|
-
if (!serialized)
|
|
61
|
-
return null;
|
|
62
|
-
try {
|
|
63
|
-
return JSON.parse(serialized);
|
|
64
|
-
} catch {
|
|
65
|
-
return serialized;
|
|
66
|
-
}
|
|
67
|
-
} catch (error) {
|
|
68
|
-
console.error("Failed to load from storage:", error);
|
|
69
|
-
return null;
|
|
70
|
-
}
|
|
71
|
-
}
|
|
72
|
-
function removeFromStorage(key) {
|
|
73
|
-
if (typeof window === "undefined")
|
|
74
|
-
return;
|
|
75
|
-
try {
|
|
76
|
-
const storageKey = getStorageKey(key);
|
|
77
|
-
localStorage.removeItem(storageKey);
|
|
78
|
-
} catch (error) {
|
|
79
|
-
console.error("Failed to remove from storage:", error);
|
|
80
|
-
}
|
|
81
|
-
}
|
|
82
|
-
function clearStorage() {
|
|
83
|
-
if (typeof window === "undefined")
|
|
84
|
-
return;
|
|
85
|
-
const keysToRemove = [];
|
|
86
|
-
for (let i = 0; i < localStorage.length; i++) {
|
|
87
|
-
const key = localStorage.key(i);
|
|
88
|
-
if (key?.startsWith(STORAGE_PREFIX)) {
|
|
89
|
-
keysToRemove.push(key);
|
|
90
|
-
}
|
|
91
|
-
}
|
|
92
|
-
for (const key of keysToRemove) {
|
|
93
|
-
localStorage.removeItem(key);
|
|
94
|
-
}
|
|
95
|
-
}
|
|
96
|
-
function isTokenExpired(expiresAt) {
|
|
97
|
-
if (!expiresAt)
|
|
98
|
-
return true;
|
|
99
|
-
return Date.now() >= expiresAt - TOKEN_EXPIRY.REFRESH_BUFFER;
|
|
100
|
-
}
|
|
101
|
-
function calculateExpiryTimestamp(expiresIn) {
|
|
102
|
-
return Date.now() + expiresIn * 1e3;
|
|
103
|
-
}
|
|
104
|
-
function saveAuthState(state) {
|
|
105
|
-
saveToStorage("auth_state" /* AUTH_STATE */, state);
|
|
106
|
-
if (state.user) {
|
|
107
|
-
saveToStorage("user" /* USER */, state.user);
|
|
108
|
-
}
|
|
109
|
-
if (state.wallet) {
|
|
110
|
-
saveToStorage("wallet" /* WALLET */, state.wallet);
|
|
111
|
-
}
|
|
112
|
-
if (state.solanaWallet) {
|
|
113
|
-
saveToStorage("solana_wallet" /* SOLANA_WALLET */, state.solanaWallet);
|
|
114
|
-
}
|
|
115
|
-
if (state.bitcoinWallet) {
|
|
116
|
-
saveToStorage("bitcoin_wallet" /* BITCOIN_WALLET */, state.bitcoinWallet);
|
|
117
|
-
}
|
|
118
|
-
if (state.tronWallet) {
|
|
119
|
-
saveToStorage("tron_wallet" /* TRON_WALLET */, state.tronWallet);
|
|
120
|
-
}
|
|
121
|
-
if (state.accessToken) {
|
|
122
|
-
saveToStorage("access_token" /* ACCESS_TOKEN */, state.accessToken);
|
|
123
|
-
}
|
|
124
|
-
if (state.refreshToken) {
|
|
125
|
-
saveToStorage("refresh_token" /* REFRESH_TOKEN */, state.refreshToken);
|
|
126
|
-
}
|
|
127
|
-
if (state.expiresAt) {
|
|
128
|
-
saveToStorage("expires_at" /* EXPIRES_AT */, state.expiresAt);
|
|
129
|
-
}
|
|
130
|
-
}
|
|
131
|
-
function hydrateAuthStateFromIndividualStorage(state) {
|
|
132
|
-
const user = loadFromStorage("user" /* USER */);
|
|
133
|
-
const wallet = loadFromStorage("wallet" /* WALLET */);
|
|
134
|
-
const solanaWallet = loadFromStorage(
|
|
135
|
-
"solana_wallet" /* SOLANA_WALLET */
|
|
136
|
-
);
|
|
137
|
-
const bitcoinWallet = loadFromStorage(
|
|
138
|
-
"bitcoin_wallet" /* BITCOIN_WALLET */
|
|
139
|
-
);
|
|
140
|
-
const tronWallet = loadFromStorage("tron_wallet" /* TRON_WALLET */);
|
|
141
|
-
const accessToken = loadFromStorage("access_token" /* ACCESS_TOKEN */);
|
|
142
|
-
const refreshToken = loadFromStorage("refresh_token" /* REFRESH_TOKEN */);
|
|
143
|
-
const expiresAt = loadFromStorage("expires_at" /* EXPIRES_AT */);
|
|
144
|
-
const nextState = {
|
|
145
|
-
...state,
|
|
146
|
-
user: state.user || user || null,
|
|
147
|
-
wallet: state.wallet || wallet || null,
|
|
148
|
-
solanaWallet: state.solanaWallet || solanaWallet || null,
|
|
149
|
-
bitcoinWallet: state.bitcoinWallet || bitcoinWallet || null,
|
|
150
|
-
tronWallet: state.tronWallet || tronWallet || null,
|
|
151
|
-
accessToken: state.accessToken || accessToken || null,
|
|
152
|
-
refreshToken: state.refreshToken || refreshToken || null,
|
|
153
|
-
expiresAt: state.expiresAt || expiresAt || null
|
|
154
|
-
};
|
|
155
|
-
const wasHydrated = nextState.user !== state.user || nextState.wallet !== state.wallet || nextState.solanaWallet !== state.solanaWallet || nextState.bitcoinWallet !== state.bitcoinWallet || nextState.tronWallet !== state.tronWallet || nextState.accessToken !== state.accessToken || nextState.refreshToken !== state.refreshToken || nextState.expiresAt !== state.expiresAt;
|
|
156
|
-
if (wasHydrated) {
|
|
157
|
-
saveToStorage("auth_state" /* AUTH_STATE */, nextState);
|
|
158
|
-
}
|
|
159
|
-
return nextState;
|
|
160
|
-
}
|
|
161
|
-
function loadAuthState() {
|
|
162
|
-
const state = loadFromStorage("auth_state" /* AUTH_STATE */);
|
|
163
|
-
if (state) {
|
|
164
|
-
if (state.accessToken && isTokenExpired(state.expiresAt)) {
|
|
165
|
-
clearStorage();
|
|
166
|
-
return null;
|
|
167
|
-
}
|
|
168
|
-
return hydrateAuthStateFromIndividualStorage(state);
|
|
169
|
-
}
|
|
170
|
-
const user = loadFromStorage("user" /* USER */);
|
|
171
|
-
const wallet = loadFromStorage("wallet" /* WALLET */);
|
|
172
|
-
const solanaWallet = loadFromStorage("solana_wallet" /* SOLANA_WALLET */);
|
|
173
|
-
const accessToken = loadFromStorage("access_token" /* ACCESS_TOKEN */);
|
|
174
|
-
const refreshToken = loadFromStorage("refresh_token" /* REFRESH_TOKEN */);
|
|
175
|
-
const expiresAt = loadFromStorage("expires_at" /* EXPIRES_AT */);
|
|
176
|
-
if (!user || !accessToken) {
|
|
177
|
-
return null;
|
|
178
|
-
}
|
|
179
|
-
const bitcoinWallet = loadFromStorage("bitcoin_wallet" /* BITCOIN_WALLET */);
|
|
180
|
-
const tronWallet = loadFromStorage("tron_wallet" /* TRON_WALLET */);
|
|
181
|
-
return {
|
|
182
|
-
isAuthenticated: true,
|
|
183
|
-
user,
|
|
184
|
-
wallet,
|
|
185
|
-
solanaWallet,
|
|
186
|
-
bitcoinWallet,
|
|
187
|
-
tronWallet,
|
|
188
|
-
accessToken,
|
|
189
|
-
refreshToken,
|
|
190
|
-
expiresAt
|
|
191
|
-
};
|
|
192
|
-
}
|
|
193
|
-
function clearAuthState() {
|
|
194
|
-
clearStorage();
|
|
195
|
-
}
|
|
196
|
-
function createAbcError(code, message, details, statusCode) {
|
|
197
|
-
return new AbcError(code, message, details, statusCode);
|
|
198
|
-
}
|
|
199
|
-
function hexToNumber(hex) {
|
|
200
|
-
return Number.parseInt(hex, 16);
|
|
201
|
-
}
|
|
202
|
-
function numberToHex(num) {
|
|
203
|
-
return `0x${num.toString(16)}`;
|
|
204
|
-
}
|
|
205
|
-
|
|
206
|
-
export {
|
|
207
|
-
hashPin,
|
|
208
|
-
validatePin,
|
|
209
|
-
validateEmail,
|
|
210
|
-
getStorageKey,
|
|
211
|
-
saveToStorage,
|
|
212
|
-
loadFromStorage,
|
|
213
|
-
removeFromStorage,
|
|
214
|
-
clearStorage,
|
|
215
|
-
isTokenExpired,
|
|
216
|
-
calculateExpiryTimestamp,
|
|
217
|
-
saveAuthState,
|
|
218
|
-
loadAuthState,
|
|
219
|
-
clearAuthState,
|
|
220
|
-
createAbcError,
|
|
221
|
-
hexToNumber,
|
|
222
|
-
numberToHex
|
|
223
|
-
};
|
|
@@ -1,96 +0,0 @@
|
|
|
1
|
-
"use client";
|
|
2
|
-
import {
|
|
3
|
-
STORAGE_PREFIX
|
|
4
|
-
} from "./chunk-DPTDOCWL.js";
|
|
5
|
-
|
|
6
|
-
// src/wallets/walletConnectors/abcWallet/sessionUtils.ts
|
|
7
|
-
import { getTalkenApiClient } from "@talken/talkenkit";
|
|
8
|
-
var SessionExpiredError = class extends Error {
|
|
9
|
-
constructor(message = "Session expired. Please reconnect your wallet.") {
|
|
10
|
-
super(message);
|
|
11
|
-
this.name = "SessionExpiredError";
|
|
12
|
-
}
|
|
13
|
-
};
|
|
14
|
-
function dispatchSessionExpired() {
|
|
15
|
-
if (typeof window !== "undefined") {
|
|
16
|
-
console.warn("[SessionUtils] \u{1F6A8} dispatchSessionExpired called from:");
|
|
17
|
-
console.trace();
|
|
18
|
-
window.dispatchEvent(new CustomEvent("talkenkit:session_expired"));
|
|
19
|
-
}
|
|
20
|
-
}
|
|
21
|
-
function handleUnauthorizedResponse(response) {
|
|
22
|
-
if (response.status === 401) {
|
|
23
|
-
dispatchSessionExpired();
|
|
24
|
-
throw new SessionExpiredError(
|
|
25
|
-
"Session expired. Please reconnect your wallet."
|
|
26
|
-
);
|
|
27
|
-
}
|
|
28
|
-
}
|
|
29
|
-
async function fetchWithSessionCheck(url, options) {
|
|
30
|
-
const response = await fetch(url, options);
|
|
31
|
-
if (!response.ok && response.status === 401) {
|
|
32
|
-
const errorText = await response.text();
|
|
33
|
-
console.error("[ABC WaaS] \u274C Unauthorized (401):", errorText);
|
|
34
|
-
dispatchSessionExpired();
|
|
35
|
-
throw new SessionExpiredError(
|
|
36
|
-
"Session expired. Please reconnect your wallet."
|
|
37
|
-
);
|
|
38
|
-
}
|
|
39
|
-
return response;
|
|
40
|
-
}
|
|
41
|
-
async function refreshAccessToken(pinCallback) {
|
|
42
|
-
if (pinCallback) {
|
|
43
|
-
await pinCallback();
|
|
44
|
-
}
|
|
45
|
-
const api = getTalkenApiClient();
|
|
46
|
-
if (!api) {
|
|
47
|
-
console.warn(
|
|
48
|
-
"[SessionUtils] TalkenApiClient not initialized - opening connect modal"
|
|
49
|
-
);
|
|
50
|
-
dispatchSessionExpired();
|
|
51
|
-
await new Promise((resolve) => setTimeout(resolve, 100));
|
|
52
|
-
throw new SessionExpiredError(
|
|
53
|
-
"Session expired. Please reconnect your wallet."
|
|
54
|
-
);
|
|
55
|
-
}
|
|
56
|
-
const refreshToken = api.getRefreshToken() || localStorage.getItem(`${STORAGE_PREFIX}refresh_token`);
|
|
57
|
-
if (!refreshToken) {
|
|
58
|
-
console.warn("[SessionUtils] No refresh token - opening connect modal");
|
|
59
|
-
dispatchSessionExpired();
|
|
60
|
-
await new Promise((resolve) => setTimeout(resolve, 100));
|
|
61
|
-
throw new SessionExpiredError(
|
|
62
|
-
"Session expired. Please reconnect your wallet."
|
|
63
|
-
);
|
|
64
|
-
}
|
|
65
|
-
try {
|
|
66
|
-
const res = await api.auth.refresh();
|
|
67
|
-
const expiresAt = Date.now() + res.expiresIn * 1e3;
|
|
68
|
-
api.setTokens(res.accessToken, res.refreshToken || refreshToken, expiresAt);
|
|
69
|
-
localStorage.setItem(`${STORAGE_PREFIX}access_token`, res.accessToken);
|
|
70
|
-
if (res.refreshToken) {
|
|
71
|
-
localStorage.setItem(`${STORAGE_PREFIX}refresh_token`, res.refreshToken);
|
|
72
|
-
}
|
|
73
|
-
localStorage.setItem(`${STORAGE_PREFIX}expires_at`, String(expiresAt));
|
|
74
|
-
console.log(
|
|
75
|
-
"[SessionUtils] \u2705 Token refreshed - expires in:",
|
|
76
|
-
(res.expiresIn / 60 / 60).toFixed(2),
|
|
77
|
-
"hours"
|
|
78
|
-
);
|
|
79
|
-
return res.accessToken;
|
|
80
|
-
} catch (error) {
|
|
81
|
-
console.error("[SessionUtils] Token refresh failed:", error);
|
|
82
|
-
dispatchSessionExpired();
|
|
83
|
-
await new Promise((resolve) => setTimeout(resolve, 100));
|
|
84
|
-
throw new SessionExpiredError(
|
|
85
|
-
"Session expired. Please reconnect your wallet."
|
|
86
|
-
);
|
|
87
|
-
}
|
|
88
|
-
}
|
|
89
|
-
|
|
90
|
-
export {
|
|
91
|
-
SessionExpiredError,
|
|
92
|
-
dispatchSessionExpired,
|
|
93
|
-
handleUnauthorizedResponse,
|
|
94
|
-
fetchWithSessionCheck,
|
|
95
|
-
refreshAccessToken
|
|
96
|
-
};
|