# Embedded Components onramp quickstart
Build a fiat-to-crypto onramp flow with the Embedded Components SDK.
## Set up the Embedded Components onramp
This quickstart runs minimal code for the full flow. Use this when you want to get started quickly, or to explore the integration before you start building.
For React Native, the production SDK is [@stripe/stripe-react-native](https://github.com/stripe/stripe-react-native). For web, use [@stripe/crypto](https://www.npmjs.com/package/@stripe/crypto).
See our sample apps: [React Native (Expo)](https://github.com/stripe-samples/crypto-embedded-components-onramp) | [iOS](https://github.com/stripe/stripe-ios/tree/master/Example/CryptoOnramp%20Example) | [Android](https://github.com/stripe/stripe-android/tree/master/crypto-onramp-example). Follow the [integration guide](https://docs.stripe.com/crypto/onramp/embedded-components-integration-guide.md) for step-by-step instructions to build your integration.
### Install the Stripe Node library
Install the package and import it in your code. Alternatively, if you’re starting from scratch and need a package.json file, download the project files using the Download link in the code editor.
#### npm
Install the library:
```bash
npm install --save stripe
```
#### GitHub
Or download the stripe-node library source code directly [from GitHub](https://github.com/stripe/stripe-node).
### Install the Stripe Ruby library
Install the Stripe ruby gem and require it in your code. Alternatively, if you’re starting from scratch and need a Gemfile, download the project files using the link in the code editor.
#### Terminal
Install the gem:
```bash
gem install stripe
```
#### Bundler
Add this line to your Gemfile:
```bash
gem 'stripe'
```
#### GitHub
Or download the stripe-ruby gem source code directly [from GitHub](https://github.com/stripe/stripe-ruby).
### Install the Stripe Java library
Add the dependency to your build and import the library. Alternatively, if you’re starting from scratch and need a sample pom.xml file (for Maven), download the project files using the link in the code editor.
#### Maven
Add the following dependency to your POM and replace {VERSION} with the version number you want to use.
```bash
\ncom.stripe\nstripe-java\n{VERSION}\n
```
#### Gradle
Add the dependency to your build.gradle file and replace {VERSION} with the version number you want to use.
```bash
implementation "com.stripe:stripe-java:{VERSION}"
```
#### GitHub
Download the JAR directly [from GitHub](https://github.com/stripe/stripe-java/releases/latest).
### Install the Stripe Python package
Install the Stripe package and import it in your code. Alternatively, if you’re starting from scratch and need a requirements.txt file, download the project files using the link in the code editor.
#### pip
Install the package through pip:
```bash
pip3 install stripe
```
#### GitHub
Download the stripe-python library source code directly [from GitHub](https://github.com/stripe/stripe-python).
### Install the Stripe PHP library
Install the library with composer and initialize with your secret API key. Alternatively, if you’re starting from scratch and need a composer.json file, download the files using the link in the code editor.
#### Composer
Install the library:
```bash
composer require stripe/stripe-php
```
#### GitHub
Or download the stripe-php library source code directly [from GitHub](https://github.com/stripe/stripe-php).
### Set up your server
Add the dependency to your build and import the library. Alternatively, if you’re starting from scratch and need a go.mod file, download the project files using the link in the code editor.
#### Go
Make sure to initialize with Go Modules:
```bash
go get -u github.com/stripe/stripe-go/v85
```
#### GitHub
Or download the stripe-go module source code directly [from GitHub](https://github.com/stripe/stripe-go).
### Install the Stripe.net library
Install the package with .NET or NuGet. Alternatively, if you’re starting from scratch, download the files which contains a configured .csproj file.
#### dotnet
Install the library:
```bash
dotnet add package Stripe.net
```
#### NuGet
Install the library:
```bash
Install-Package Stripe.net
```
#### GitHub
Or download the Stripe.net library source code directly [from GitHub](https://github.com/stripe/stripe-dotnet).
### Install the Stripe libraries
Install the packages and import them in your code. Alternatively, if you’re starting from scratch and need a `package.json` file, download the project files using the link in the code editor.
Install the libraries:
```bash
npm install --save stripe @stripe/stripe-js next
```
### Set the Stripe-Version header
All backend requests to the Stripe API must include the `Stripe-Version` header with the `crypto_onramp_beta=v2` flag:
```
Stripe-Version: 2026-03-25.dahlia;crypto_onramp_beta=v2
```
### Create a LinkAuthIntent
Add an endpoint that creates a [LinkAuthIntent](https://docs.stripe.com/crypto/onramp/embedded-components-integration-guide.md#create-a-linkauthintent) with the onramp OAuth scopes described in the integration guide. The client uses the returned `authIntentId` when calling `authenticate()` from the SDK.
### Exchange for access tokens
After the user consents using `authenticate()` on the client, you can exchange the LinkAuthIntent for an OAuth access token using [Retrieve Access Tokens](https://docs.stripe.com/crypto/onramp/embedded-components-integration-guide.md#retrieve-access-tokens) API. Store the access token and use it in the `Stripe-OAuth-Token` header for all subsequent crypto API calls from your backend. Don’t expose the access token to the client.
### Refresh an expired access token
When the access token expires, call `POST https://login.link.com/auth/token` with `grant_type=refresh_token` and the refresh token from the original token exchange response to obtain a new access token. Pass your `LINK_CLIENT_ID` and `LINK_CLIENT_SECRET` along with the same OAuth scopes used in the original request.
### Retrieve a CryptoCustomer
Add an endpoint that calls the [Retrieve a CryptoCustomer](https://docs.stripe.com/api/crypto/customers/retrieve.md) API with the `customerId` from the authorize flow. Use the response to check the customer’s KYC and verification status so the client can prompt them complete setup (KYC, identity verification, wallet registration, payment method) before creating an onramp session.
### List ConsumerWallets
Add an endpoint that calls the [List ConsumerWallets](https://docs.stripe.com/api/crypto/consumer_wallets/list.md) API. Use it to see whether the user already has wallet addresses on file. If the list is empty, the client calls `registerWalletAddress()` before creating an onramp session.
### List PaymentTokens
Add an endpoint that calls the [List PaymentTokens](https://docs.stripe.com/api/crypto/payment_tokens/list.md) API. Use it to see which payment methods the user already has. If the list is empty, have the client call `collectPaymentMethod()` before creating an onramp session.
### Create a CryptoOnrampSession
Add an endpoint that creates a [CryptoOnrampSession](https://docs.stripe.com/api/crypto/onramp_sessions/create.md) with `ui_mode: headless`. Pass the `crypto_customer_id` from the authorize flow and `payment_token` from `collectPaymentMethod()` or an existing `payment_token` from [List PaymentTokens](https://docs.stripe.com/api/crypto/payment_tokens/list.md). Include the amount, currencies, network, and wallet address.
### Refresh an executable quote
Add an endpoint that calls the [Refresh a Quote](https://docs.stripe.com/api/crypto/onramp_sessions/quote.md) API to refresh a quote for the onramp session. Refresh the quote before it expires. Checkout will return a HTTP 400 response if you checkout with an expired quote.
### Perform checkout
Add an endpoint that calls the [Checkout](https://docs.stripe.com/api/crypto/onramp_sessions/checkout.md) API to confirm and fulfill the onramp session. Your back end returns the `client_secret` so the client SDK can validate and complete any required steps (for example, 3DS) using `performCheckout()`.
### Install the SDK
Install the `@stripe/crypto` package.
```bash
npm install @stripe/crypto
```
### Authentication flow
Call your server’s `/create-link-auth-intent` endpoint with the user’s email. A `404` response means the user doesn’t have a Link account — in that case, call `onramp.registerLinkUser(email, phoneNumber, country)` to create one. A successful response returns an `authIntentId` that you use in the next step.
Your server creates a LinkAuthIntent and returns the `authIntentId`. Call `authenticate(authIntentId, callback)` to start the authentication flow. The SDK returns an element to mount in your page that displays the authentication UI. We recommend presenting the authentication UI in a modal. When the user completes authentication, the callback fires with `crypto_customer_id`. Store it in your backend and use for the rest of the flow.
### Identity flow
Check the customer’s verification status by calling your server. If KYC is missing, call `submitKycInfo()` with the customer’s personal details. If identity verification is required, call `verifyDocuments()`. After each step completes, re-check the customer status to determine the next required action.
### Register a wallet address
Call `registerWalletAddress(walletAddress, network)` to register the user’s wallet address for the selected network.
### Payment flow
You can use [List PaymentTokens](https://docs.stripe.com/api/crypto/payment_tokens/list.md) to render a list of customer payment methods. If the customer has no payment method, call `collectPaymentMethod()` to display the payment UI and collect a `cryptoPaymentToken`.
### Checkout
Create a CryptoOnrampSession on your server. Then call `performCheckout(sessionId, fetchClientSecret)`, passing a callback that calls your backend’s `/checkout/:sessionId` and return the `client_secret`. If the quote expires, call your server’s `/quote/:sessionId` endpoint to refresh the quote.
### Install the Stripe Node library
Install the package and import it in your code. Alternatively, if you’re starting from scratch and need a package.json file, download the project files using the Download link in the code editor.
#### npm
Install the library:
```bash
npm install --save stripe
```
#### GitHub
Or download the stripe-node library source code directly [from GitHub](https://github.com/stripe/stripe-node).
### Install the Stripe Ruby library
Install the Stripe ruby gem and require it in your code. Alternatively, if you’re starting from scratch and need a Gemfile, download the project files using the link in the code editor.
#### Terminal
Install the gem:
```bash
gem install stripe
```
#### Bundler
Add this line to your Gemfile:
```bash
gem 'stripe'
```
#### GitHub
Or download the stripe-ruby gem source code directly [from GitHub](https://github.com/stripe/stripe-ruby).
### Install the Stripe Java library
Add the dependency to your build and import the library. Alternatively, if you’re starting from scratch and need a sample pom.xml file (for Maven), download the project files using the link in the code editor.
#### Maven
Add the following dependency to your POM and replace {VERSION} with the version number you want to use.
```bash
\ncom.stripe\nstripe-java\n{VERSION}\n
```
#### Gradle
Add the dependency to your build.gradle file and replace {VERSION} with the version number you want to use.
```bash
implementation "com.stripe:stripe-java:{VERSION}"
```
#### GitHub
Download the JAR directly [from GitHub](https://github.com/stripe/stripe-java/releases/latest).
### Install the Stripe Python package
Install the Stripe package and import it in your code. Alternatively, if you’re starting from scratch and need a requirements.txt file, download the project files using the link in the code editor.
#### pip
Install the package through pip:
```bash
pip3 install stripe
```
#### GitHub
Download the stripe-python library source code directly [from GitHub](https://github.com/stripe/stripe-python).
### Install the Stripe PHP library
Install the library with composer and initialize with your secret API key. Alternatively, if you’re starting from scratch and need a composer.json file, download the files using the link in the code editor.
#### Composer
Install the library:
```bash
composer require stripe/stripe-php
```
#### GitHub
Or download the stripe-php library source code directly [from GitHub](https://github.com/stripe/stripe-php).
### Set up your server
Add the dependency to your build and import the library. Alternatively, if you’re starting from scratch and need a go.mod file, download the project files using the link in the code editor.
#### Go
Make sure to initialize with Go Modules:
```bash
go get -u github.com/stripe/stripe-go/v85
```
#### GitHub
Or download the stripe-go module source code directly [from GitHub](https://github.com/stripe/stripe-go).
### Install the Stripe.net library
Install the package with .NET or NuGet. Alternatively, if you’re starting from scratch, download the files which contains a configured .csproj file.
#### dotnet
Install the library:
```bash
dotnet add package Stripe.net
```
#### NuGet
Install the library:
```bash
Install-Package Stripe.net
```
#### GitHub
Or download the Stripe.net library source code directly [from GitHub](https://github.com/stripe/stripe-dotnet).
### Install the Stripe libraries
Install the packages and import them in your code. Alternatively, if you’re starting from scratch and need a `package.json` file, download the project files using the link in the code editor.
Install the libraries:
```bash
npm install --save stripe @stripe/stripe-js next
```
### Set the Stripe-Version header
All backend requests to the Stripe API must include the `Stripe-Version` header with the `crypto_onramp_beta=v2` flag:
```
Stripe-Version: 2026-03-25.dahlia;crypto_onramp_beta=v2
```
### Create a LinkAuthIntent
Add an endpoint that creates a [LinkAuthIntent](https://docs.stripe.com/crypto/onramp/embedded-components-integration-guide.md#create-a-linkauthintent) with the onramp OAuth scopes described in the integration guide. The client uses the returned `authIntentId` when calling `authorize()` from the SDK.
### Exchange for access tokens
After the user consents using `authorize()` on the client, you can exchange the LinkAuthIntent for an OAuth access token using [Retrieve Access Tokens](https://docs.stripe.com/crypto/onramp/embedded-components-integration-guide.md#retrieve-access-tokens) API. Store the access token and use it in the `Stripe-OAuth-Token` header for all subsequent crypto API calls from your backend. Don’t expose the access token to the client.
### Refresh an expired access token
When the access token expires, call `POST https://login.link.com/auth/token` with `grant_type=refresh_token` and the refresh token from the original token exchange response to obtain a new access token. Pass your `LINK_CLIENT_ID` and `LINK_CLIENT_SECRET` along with the same OAuth scopes used in the original request.
### Retrieve a CryptoCustomer
Add an endpoint that calls the [Retrieve a CryptoCustomer](https://docs.stripe.com/api/crypto/customers/retrieve.md) API with the `customerId` from the authorize flow. Use the response to check the customer’s KYC and verification status so the client can prompt them complete setup (KYC, identity verification, wallet registration, payment method) before creating an onramp session.
### List ConsumerWallets
Add an endpoint that calls the [List ConsumerWallets](https://docs.stripe.com/api/crypto/consumer_wallets/list.md) API. Use it to see whether the user already has wallet addresses on file. If the list is empty, the client calls `registerWalletAddress()` before creating an onramp session.
### List PaymentTokens
Add an endpoint that calls the [List PaymentTokens](https://docs.stripe.com/api/crypto/payment_tokens/list.md) API. Use it to see which payment methods the user already has. If the list is empty, have the client call `collectPaymentMethod()` before creating an onramp session.
### Create a CryptoOnrampSession
Add an endpoint that creates a [CryptoOnrampSession](https://docs.stripe.com/api/crypto/onramp_sessions/create.md) with `ui_mode: headless`. Pass the `crypto_customer_id` from the authorize flow and `payment_token` from `collectPaymentMethod()` or an existing `payment_token` from [List PaymentTokens](https://docs.stripe.com/api/crypto/payment_tokens/list.md). Include the amount, currencies, network, and wallet address.
### Refresh an executable quote
Add an endpoint that calls the [Refresh a Quote](https://docs.stripe.com/api/crypto/onramp_sessions/quote.md) API to refresh a quote for the onramp session. Refresh the quote before it expires. Checkout will return a HTTP 400 response if you checkout with an expired quote.
### Perform checkout
Add an endpoint that calls the [Checkout](https://docs.stripe.com/api/crypto/onramp_sessions/checkout.md) API to confirm and fulfill the onramp session. Your back end returns the `client_secret` so the client SDK can validate and complete any required steps (for example, 3DS) using `performCheckout()`.
### Basic setup
Wrap your application with `StripeProvider` at a high level so Stripe functionality is available throughout your component tree. The key properties are:
- `publishableKey` – Your Stripe publishable key
- `merchantIdentifier` – Your Apple Merchant ID (required for Apple Pay)
- `urlScheme` – Required for return URLs in authentication flows
### Initial configuration
Before you can call any Onramp APIs, configure the SDK using the `configure` method from the `useOnramp()` hook. `configure` takes an `Onramp.Configuration` instance to customize your business display name and appearance (colors, theme) for Stripe-provided interfaces such as wallets, one-time passcodes, and identity verification UIs. Call `configure()` when your component mounts.
### Authentication flow
Call your server’s `/create-link-auth-intent` endpoint with the user’s email. A `404` response means the user doesn’t have a Link account — in that case, call `registerLinkUser(email, phoneNumber, country)` to create one. Either way, proceed to authentication.
Call `authorize(authIntentId)` to prompt the user to login into their Link account. Store the returned `customerId` in your backend and use for the rest of the flow.
### Identity flow
Check verification status (your back end calls [Retrieve CryptoCustomer](https://docs.stripe.com/api/crypto/customers/retrieve.md)). If KYC is missing, call `attachKycInfo()`. If identity verification is required, call `verifyIdentity()`. Advance to the next step after each completes.
### Register a wallet address
Call `registerWalletAddress(walletAddress, network)` to register the user’s wallet address for the selected network.
### Payment flow
You can use [List PaymentTokens](https://docs.stripe.com/api/crypto/payment_tokens/list.md) to render a list of customer payment methods. If the customer has no payment method, call `collectPaymentMethod()` to display the payment UI, then call `createCryptoPaymentToken()` to tokenize the collected payment method.
### Checkout
Create a CryptoOnrampSession on your server. Then call `performCheckout(sessionId, fetchClientSecret)`, passing a callback that calls your backend’s `/checkout/:sessionId` and return the `client_secret`. If the quote is expired, call your server’s `/quote/:sessionId` endpoint to refresh the quote.
// This is a public sample test API key.
// Don't submit any personally identifiable information in requests made with this key.
// Sign in to see your own test API key embedded in code samples.
// Don't put any keys in code. See https://docs.stripe.com/keys-best-practices.
const secretKey = '<>';
const oauthScopes = process.env.LINK_OAUTH_SCOPES || 'crypto:ramp,kyc.status:read';
app.post('/create-link-auth-intent', async (req, res) => {
const { email } = req.body;
const linkRes = await fetch('https://login.link.com/v1/link_auth_intent', {
method: 'POST',
headers: {
'Content-Type': 'application/json',
'Authorization': `Bearer ${secretKey}`,
},
body: JSON.stringify({
email,
oauth_scopes: oauthScopes,
oauth_client_id: process.env.LINK_OAUTH_CLIENT_ID || 'your_oauth_client_id',
}),
});
const data = await linkRes.json();
if (data.id) {
res.json({ authIntentId: data.id });
} else {
res.status(linkRes.status).json(data);
}
});
async function exchangeTokens(authIntentId) {
const res = await fetch(`https://login.link.com/v1/link_auth_intent/${authIntentId}/tokens`, {
method: 'POST',
headers: { 'Authorization': `Bearer ${secretKey}` },
});
const data = await res.json();
if (!data.access_token) throw new Error('Token exchange failed');
return data.access_token;
}
async function refreshExchangeTokens(refreshToken) {
const params = new URLSearchParams({
client_id: process.env.LINK_CLIENT_ID || 'lwlpk_xxxxx',
client_secret: process.env.LINK_CLIENT_SECRET || 'lwlsk_xxxxx',
grant_type: 'refresh_token',
refresh_token: refreshToken,
scope: oauthScopes,
});
const res = await fetch('https://login.link.com/auth/token', {
method: 'POST',
headers: {
'Authorization': `Bearer ${secretKey}`,
'Content-Type': 'application/x-www-form-urlencoded',
},
body: params,
});
const data = await res.json();
if (!data.access_token) throw new Error('Token refresh failed');
return data.access_token;
}
app.get('/crypto/customer/:id', async (req, res) => {
const oauthToken = await exchangeTokens(req.query.authIntentId);
const stripeRes = await fetch(`https://api.stripe.com/v1/crypto/customers/${req.params.id}`, {
headers: {
'Authorization': `Bearer ${secretKey}`,
'Stripe-OAuth-Token': oauthToken,
'Stripe-Version': '2026-03-25.dahlia;crypto_onramp_beta=v2',
},
});
const data = await stripeRes.json();
res.status(stripeRes.status).json(data);
});
app.get('/crypto/customer/:id/wallets', async (req, res) => {
const oauthToken = await exchangeTokens(req.query.authIntentId);
const stripeRes = await fetch(
`https://api.stripe.com/v1/crypto/customers/${req.params.id}/crypto_consumer_wallets`,
{
headers: {
'Authorization': `Bearer ${secretKey}`,
'Stripe-OAuth-Token': oauthToken,
'Stripe-Version': '2026-03-25.dahlia;crypto_onramp_beta=v2',
},
}
);
const data = await stripeRes.json();
res.status(stripeRes.status).json(data);
});
app.get('/crypto/customer/:id/payment-tokens', async (req, res) => {
const oauthToken = await exchangeTokens(req.query.authIntentId);
const stripeRes = await fetch(
`https://api.stripe.com/v1/crypto/customers/${req.params.id}/payment_tokens`,
{
headers: {
'Authorization': `Bearer ${secretKey}`,
'Stripe-OAuth-Token': oauthToken,
'Stripe-Version': '2026-03-25.dahlia;crypto_onramp_beta=v2',
},
}
);
const data = await stripeRes.json();
res.status(stripeRes.status).json(data);
});
app.post('/create-onramp-session', async (req, res) => {
const {
authIntentId,
crypto_customer_id,
payment_token,
source_amount,
source_currency,
destination_currency,
destination_network,
wallet_address,
} = req.body;
const oauthToken = await exchangeTokens(authIntentId);
const params = new URLSearchParams({
ui_mode: 'headless',
crypto_customer_id,
payment_token,
source_amount: String(source_amount),
source_currency,
destination_currency,
'destination_currencies[]': destination_currency,
destination_network,
'destination_networks[]': destination_network,
wallet_address,
customer_ip_address: req.ip || req.socket.remoteAddress,
});
const stripeRes = await fetch('https://api.stripe.com/v1/crypto/onramp_sessions', {
method: 'POST',
headers: {
'Content-Type': 'application/x-www-form-urlencoded',
'Authorization': `Bearer ${secretKey}`,
'Stripe-OAuth-Token': oauthToken,
'Stripe-Version': '2026-03-25.dahlia;crypto_onramp_beta=v2',
},
body: params,
});
const data = await stripeRes.json();
if (data.id) {
res.json({ id: data.id, quote_expires_at: data.quote?.expires_at ?? null });
} else {
res.status(stripeRes.status).json(data);
}
});
app.post('/quote/:sessionId', async (req, res) => {
const oauthToken = await exchangeTokens(req.body.authIntentId);
const stripeRes = await fetch(
`https://api.stripe.com/v1/crypto/onramp_sessions/${req.params.sessionId}/quote`,
{
method: 'POST',
headers: {
'Authorization': `Bearer ${secretKey}`,
'Stripe-OAuth-Token': oauthToken,
'Stripe-Version': '2026-03-25.dahlia;crypto_onramp_beta=v2',
},
}
);
const data = await stripeRes.json();
res.status(stripeRes.status).json(data);
});
app.post('/checkout/:sessionId', async (req, res) => {
const oauthToken = await exchangeTokens(req.body.authIntentId);
const params = new URLSearchParams({
'mandate_data[customer_acceptance][type]': 'online',
'mandate_data[customer_acceptance][accepted_at]': String(Math.floor(Date.now() / 1000)),
'mandate_data[customer_acceptance][online][ip_address]': req.ip || req.socket.remoteAddress || '',
'mandate_data[customer_acceptance][online][user_agent]': req.headers['user-agent'] || '',
});
const stripeRes = await fetch(
`https://api.stripe.com/v1/crypto/onramp_sessions/${req.params.sessionId}/checkout`,
{
method: 'POST',
headers: {
'Content-Type': 'application/x-www-form-urlencoded',
'Authorization': `Bearer ${secretKey}`,
'Stripe-OAuth-Token': oauthToken,
'Stripe-Version': '2026-03-25.dahlia;crypto_onramp_beta=v2',
},
body: params,
}
);
const data = await stripeRes.json();
res.status(stripeRes.status).json(data);
});
\# This is a public sample test API key.
# Don't submit any personally identifiable information in requests made with this key.
# Sign in to see your own test API key embedded in code samples.
\# Don't put any keys in code. See https://docs.stripe.com/keys-best-practices.
SECRET_KEY = '<>'
OAUTH_SCOPES = ENV['LINK_OAUTH_SCOPES'] || 'crypto:ramp,kyc.status:read'
post '/create-link-auth-intent' do
body = JSON.parse(request.body.read)
uri = URI('https://login.link.com/v1/link_auth_intent')
req = Net::HTTP::Post.new(uri)
req['Authorization'] = "Bearer #{SECRET_KEY}"
req['Content-Type'] = 'application/x-www-form-urlencoded'
req.body = URI.encode_www_form(
email: body['email'],
oauth_scopes: OAUTH_SCOPES,
oauth_client_id: ENV['LINK_OAUTH_CLIENT_ID'] || 'your_oauth_client_id'
)
res = Net::HTTP.start(uri.hostname, uri.port, use_ssl: true) { |http| http.request(req) }
data = JSON.parse(res.body)
data['id'] ? { authIntentId: data['id'] }.to_json : [res.code.to_i, data.to_json]
end
def exchange_tokens(auth_intent_id)
uri = URI("https://login.link.com/v1/link_auth_intent/#{auth_intent_id}/tokens")
req = Net::HTTP::Post.new(uri)
req['Authorization'] = "Bearer #{SECRET_KEY}"
res = Net::HTTP.start(uri.hostname, uri.port, use_ssl: true) { |http| http.request(req) }
JSON.parse(res.body)['access_token']
end
def refresh_exchange_tokens(refresh_token)
uri = URI('https://login.link.com/auth/token')
req = Net::HTTP::Post.new(uri)
req['Authorization'] = "Bearer #{SECRET_KEY}"
req['Content-Type'] = 'application/x-www-form-urlencoded'
req.body = URI.encode_www_form(
client_id: ENV['LINK_CLIENT_ID'] || 'lwlpk_xxxxx',
client_secret: ENV['LINK_CLIENT_SECRET'] || 'lwlsk_xxxxx',
grant_type: 'refresh_token',
refresh_token: refresh_token,
scope: OAUTH_SCOPES
)
res = Net::HTTP.start(uri.hostname, uri.port, use_ssl: true) { |http| http.request(req) }
JSON.parse(res.body)['access_token']
end
get '/crypto/customer/:id' do
oauth_token = exchange_tokens(params['authIntentId'])
uri = URI("https://api.stripe.com/v1/crypto/customers/#{params['id']}")
req = Net::HTTP::Get.new(uri)
req['Authorization'] = "Bearer #{SECRET_KEY}"
req['Stripe-OAuth-Token'] = oauth_token
req['Stripe-Version'] = '2026-03-25.dahlia;crypto_onramp_beta=v2'
res = Net::HTTP.start(uri.hostname, uri.port, use_ssl: true) { |http| http.request(req) }
[res.code.to_i, res.body]
end
get '/crypto/customer/:id/wallets' do
oauth_token = exchange_tokens(params['authIntentId'])
uri = URI("https://api.stripe.com/v1/crypto/customers/#{params['id']}/crypto_consumer_wallets")
req = Net::HTTP::Get.new(uri)
req['Authorization'] = "Bearer #{SECRET_KEY}"
req['Stripe-OAuth-Token'] = oauth_token
req['Stripe-Version'] = '2026-03-25.dahlia;crypto_onramp_beta=v2'
res = Net::HTTP.start(uri.hostname, uri.port, use_ssl: true) { |http| http.request(req) }
[res.code.to_i, res.body]
end
get '/crypto/customer/:id/payment-tokens' do
oauth_token = exchange_tokens(params['authIntentId'])
uri = URI("https://api.stripe.com/v1/crypto/customers/#{params['id']}/payment_tokens")
req = Net::HTTP::Get.new(uri)
req['Authorization'] = "Bearer #{SECRET_KEY}"
req['Stripe-OAuth-Token'] = oauth_token
req['Stripe-Version'] = '2026-03-25.dahlia;crypto_onramp_beta=v2'
res = Net::HTTP.start(uri.hostname, uri.port, use_ssl: true) { |http| http.request(req) }
[res.code.to_i, res.body]
end
post '/create-onramp-session' do
body = JSON.parse(request.body.read)
oauth_token = exchange_tokens(body['authIntentId'])
params_hash = {
ui_mode: 'headless',
crypto_customer_id: body['crypto_customer_id'],
payment_token: body['payment_token'],
source_amount: body['source_amount'],
source_currency: body['source_currency'],
destination_currency: body['destination_currency'],
'destination_currencies[]' => body['destination_currency'],
destination_network: body['destination_network'],
'destination_networks[]' => body['destination_network'],
wallet_address: body['wallet_address']
}
params_hash[:customer_ip_address] = request.ip
uri = URI('https://api.stripe.com/v1/crypto/onramp_sessions')
req = Net::HTTP::Post.new(uri)
req['Authorization'] = "Bearer #{SECRET_KEY}"
req['Stripe-OAuth-Token'] = oauth_token
req['Stripe-Version'] = '2026-03-25.dahlia;crypto_onramp_beta=v2'
req['Content-Type'] = 'application/x-www-form-urlencoded'
req.body = URI.encode_www_form(params_hash)
res = Net::HTTP.start(uri.hostname, uri.port, use_ssl: true) { |http| http.request(req) }
data = JSON.parse(res.body)
data['id'] ? { id: data['id'], quote_expires_at: data.dig('quote', 'expires_at') }.to_json : [res.code.to_i, data.to_json]
end
post '/quote/:sessionId' do
body = JSON.parse(request.body.read)
oauth_token = exchange_tokens(body['authIntentId'])
uri = URI("https://api.stripe.com/v1/crypto/onramp_sessions/#{params['sessionId']}/quote")
req = Net::HTTP::Post.new(uri)
req['Authorization'] = "Bearer #{SECRET_KEY}"
req['Stripe-OAuth-Token'] = oauth_token
req['Stripe-Version'] = '2026-03-25.dahlia;crypto_onramp_beta=v2'
res = Net::HTTP.start(uri.hostname, uri.port, use_ssl: true) { |http| http.request(req) }
[res.code.to_i, res.body]
end
post '/checkout/:sessionId' do
body = JSON.parse(request.body.read)
oauth_token = exchange_tokens(body['authIntentId'])
uri = URI("https://api.stripe.com/v1/crypto/onramp_sessions/#{params['sessionId']}/checkout")
req = Net::HTTP::Post.new(uri)
req['Authorization'] = "Bearer #{SECRET_KEY}"
req['Stripe-OAuth-Token'] = oauth_token
req['Stripe-Version'] = '2026-03-25.dahlia;crypto_onramp_beta=v2'
req['Content-Type'] = 'application/x-www-form-urlencoded'
req.body = URI.encode_www_form(
'mandate_data[customer_acceptance][type]' => 'online',
'mandate_data[customer_acceptance][accepted_at]' => Time.now.to_i.to_s,
'mandate_data[customer_acceptance][online][ip_address]' => request.ip,
'mandate_data[customer_acceptance][online][user_agent]' => request.env['HTTP_USER_AGENT'] || ''
)
res = Net::HTTP.start(uri.hostname, uri.port, use_ssl: true) { |http| http.request(req) }
[res.code.to_i, res.body]
end
\# This is a public sample test API key.
# Don't submit any personally identifiable information in requests made with this key.
# Sign in to see your own test API key embedded in code samples.
\# Don't put any keys in code. See https://docs.stripe.com/keys-best-practices.
SECRET_KEY = '<>'
OAUTH_SCOPES = os.environ.get('LINK_OAUTH_SCOPES', 'crypto:ramp,kyc.status:read')
@app.route('/create-link-auth-intent', methods=['POST'])
def create_link_auth_intent():
body = request.get_json()
data = urllib.parse.urlencode({
'email': body['email'],
'oauth_scopes': OAUTH_SCOPES,
'oauth_client_id': os.environ.get('LINK_OAUTH_CLIENT_ID', 'your_oauth_client_id'),
}).encode()
req = urllib.request.Request(
'https://login.link.com/v1/link_auth_intent',
data=data,
headers={
'Authorization': f'Bearer {SECRET_KEY}',
'Content-Type': 'application/x-www-form-urlencoded',
},
method='POST'
)
try:
with urllib.request.urlopen(req) as res:
link_data = json.loads(res.read().decode())
except urllib.error.HTTPError as e:
return jsonify(json.loads(e.read().decode())), e.code
if 'id' in link_data:
return jsonify(authIntentId=link_data['id'])
return jsonify(link_data), 400
def exchange_tokens(auth_intent_id):
req = urllib.request.Request(
f'https://login.link.com/v1/link_auth_intent/{auth_intent_id}/tokens',
headers={'Authorization': f'Bearer {SECRET_KEY}'},
method='POST'
)
with urllib.request.urlopen(req) as res:
return json.loads(res.read().decode()).get('access_token')
def refresh_exchange_tokens(refresh_token):
data = urllib.parse.urlencode({
'client_id': os.environ.get('LINK_CLIENT_ID', 'lwlpk_xxxxx'),
'client_secret': os.environ.get('LINK_CLIENT_SECRET', 'lwlsk_xxxxx'),
'grant_type': 'refresh_token',
'refresh_token': refresh_token,
'scope': OAUTH_SCOPES,
}).encode()
req = urllib.request.Request(
'https://login.link.com/auth/token',
data=data,
headers={
'Authorization': f'Bearer {SECRET_KEY}',
'Content-Type': 'application/x-www-form-urlencoded',
},
method='POST'
)
with urllib.request.urlopen(req) as res:
return json.loads(res.read().decode()).get('access_token')
@app.route('/crypto/customer/')
def get_crypto_customer(customer_id):
oauth_token = exchange_tokens(request.args.get('authIntentId'))
data = stripe_request('GET', f'/v1/crypto/customers/{customer_id}', oauth_token=oauth_token)
return jsonify(data)
@app.route('/crypto/customer//wallets')
def get_wallets(customer_id):
oauth_token = exchange_tokens(request.args.get('authIntentId'))
data = stripe_request('GET', f'/v1/crypto/customers/{customer_id}/crypto_consumer_wallets', oauth_token=oauth_token)
return jsonify(data)
@app.route('/crypto/customer//payment-tokens')
def get_payment_tokens(customer_id):
oauth_token = exchange_tokens(request.args.get('authIntentId'))
data = stripe_request('GET', f'/v1/crypto/customers/{customer_id}/payment_tokens', oauth_token=oauth_token)
return jsonify(data)
@app.route('/create-onramp-session', methods=['POST'])
def create_onramp_session():
body = request.get_json()
oauth_token = exchange_tokens(body['authIntentId'])
params = {
'ui_mode': 'headless',
'crypto_customer_id': body['crypto_customer_id'],
'payment_token': body['payment_token'],
'source_amount': str(body['source_amount']),
'source_currency': body['source_currency'],
'destination_currency': body['destination_currency'],
'destination_currencies[]': body['destination_currency'],
'destination_network': body['destination_network'],
'destination_networks[]': body['destination_network'],
'wallet_address': body['wallet_address'],
}
params['customer_ip_address'] = request.remote_addr
data = urllib.parse.urlencode(params).encode()
req = urllib.request.Request(
'https://api.stripe.com/v1/crypto/onramp_sessions',
data=data,
headers={
'Authorization': f'Bearer {SECRET_KEY}',
'Stripe-OAuth-Token': oauth_token,
'Stripe-Version': '2026-03-25.dahlia;crypto_onramp_beta=v2',
'Content-Type': 'application/x-www-form-urlencoded',
},
method='POST'
)
with urllib.request.urlopen(req) as res:
session_data = json.loads(res.read().decode())
if 'id' in session_data:
quote = session_data.get('quote') or {}
return jsonify(id=session_data['id'], quote_expires_at=quote.get('expires_at'))
return jsonify(session_data), 400
@app.route('/quote/', methods=['POST'])
def refresh_quote(session_id):
oauth_token = exchange_tokens(request.get_json()['authIntentId'])
req = urllib.request.Request(
f'https://api.stripe.com/v1/crypto/onramp_sessions/{session_id}/quote',
headers={
'Authorization': f'Bearer {SECRET_KEY}',
'Stripe-OAuth-Token': oauth_token,
'Stripe-Version': '2026-03-25.dahlia;crypto_onramp_beta=v2',
},
method='POST'
)
with urllib.request.urlopen(req) as res:
return jsonify(json.loads(res.read().decode()))
@app.route('/checkout/', methods=['POST'])
def checkout(session_id):
oauth_token = exchange_tokens(request.get_json()['authIntentId'])
data = urllib.parse.urlencode({
'mandate_data[customer_acceptance][type]': 'online',
'mandate_data[customer_acceptance][accepted_at]': str(int(time.time())),
'mandate_data[customer_acceptance][online][ip_address]': request.remote_addr,
'mandate_data[customer_acceptance][online][user_agent]': request.headers.get('User-Agent', ''),
}).encode()
req = urllib.request.Request(
f'https://api.stripe.com/v1/crypto/onramp_sessions/{session_id}/checkout',
data=data,
headers={
'Authorization': f'Bearer {SECRET_KEY}',
'Stripe-OAuth-Token': oauth_token,
'Stripe-Version': '2026-03-25.dahlia;crypto_onramp_beta=v2',
'Content-Type': 'application/x-www-form-urlencoded',
},
method='POST'
)
with urllib.request.urlopen(req) as res:
return jsonify(json.loads(res.read().decode()))
$secretKey = $stripeSecretKey;
$oauthScopes = getenv('LINK_OAUTH_SCOPES') ?: 'crypto:ramp,kyc.status:read';
if ($_SERVER['REQUEST_METHOD'] === 'POST' && $path === '/create-link-auth-intent') {
$ch = curl_init('https://login.link.com/v1/link_auth_intent');
curl_setopt_array($ch, [
CURLOPT_POST => true,
CURLOPT_POSTFIELDS => http_build_query([
'email' => $input['email'] ?? '',
'oauth_scopes' => $oauthScopes,
'oauth_client_id' => getenv('LINK_OAUTH_CLIENT_ID') ?: 'your_oauth_client_id',
]),
CURLOPT_HTTPHEADER => [
'Authorization: Bearer ' . $secretKey,
'Content-Type: application/x-www-form-urlencoded',
],
CURLOPT_RETURNTRANSFER => true,
]);
$res = curl_exec($ch);
$httpCode = curl_getinfo($ch, CURLINFO_HTTP_CODE);
curl_close($ch);
$data = json_decode($res, true);
if ($data['id']) {
echo json_encode(['authIntentId' => $data['id']]);
} else {
http_response_code($httpCode);
echo $res;
}
exit;
}
function exchangeTokens($authIntentId, $secretKey) {
$ch = curl_init("https://login.link.com/v1/link_auth_intent/{$authIntentId}/tokens");
curl_setopt_array($ch, [
CURLOPT_POST => true,
CURLOPT_HTTPHEADER => ['Authorization: Bearer ' . $secretKey],
CURLOPT_RETURNTRANSFER => true,
]);
$data = json_decode(curl_exec($ch), true);
return $data['access_token'] ?? null;
}
function refreshExchangeTokens($refreshToken, $secretKey, $oauthScopes) {
$ch = curl_init('https://login.link.com/auth/token');
curl_setopt_array($ch, [
CURLOPT_POST => true,
CURLOPT_POSTFIELDS => http_build_query([
'client_id' => getenv('LINK_CLIENT_ID') ?: 'lwlpk_xxxxx',
'client_secret' => getenv('LINK_CLIENT_SECRET') ?: 'lwlsk_xxxxx',
'grant_type' => 'refresh_token',
'refresh_token' => $refreshToken,
'scope' => $oauthScopes,
]),
CURLOPT_HTTPHEADER => [
'Authorization: Bearer ' . $secretKey,
'Content-Type: application/x-www-form-urlencoded',
],
CURLOPT_RETURNTRANSFER => true,
]);
$data = json_decode(curl_exec($ch), true);
return $data['access_token'] ?? null;
}
if ($_SERVER['REQUEST_METHOD'] === 'GET' && preg_match('#^/crypto/customer/([^/]+)$#', $path, $m)) {
$customerId = $m[1];
$oauthToken = exchangeTokens($_GET['authIntentId'] ?? '', $secretKey);
$ch = curl_init("https://api.stripe.com/v1/crypto/customers/{$customerId}");
curl_setopt_array($ch, [
CURLOPT_HTTPHEADER => [
'Authorization: Bearer ' . $secretKey,
'Stripe-OAuth-Token: ' . $oauthToken,
'Stripe-Version: 2026-03-25.dahlia;crypto_onramp_beta=v2',
],
CURLOPT_RETURNTRANSFER => true,
]);
echo curl_exec($ch);
exit;
}
if ($_SERVER['REQUEST_METHOD'] === 'GET' && preg_match('#^/crypto/customer/([^/]+)/wallets$#', $path, $m)) {
$customerId = $m[1];
$oauthToken = exchangeTokens($_GET['authIntentId'] ?? '', $secretKey);
$ch = curl_init("https://api.stripe.com/v1/crypto/customers/{$customerId}/crypto_consumer_wallets");
curl_setopt_array($ch, [
CURLOPT_HTTPHEADER => [
'Authorization: Bearer ' . $secretKey,
'Stripe-OAuth-Token: ' . $oauthToken,
'Stripe-Version: 2026-03-25.dahlia;crypto_onramp_beta=v2',
],
CURLOPT_RETURNTRANSFER => true,
]);
echo curl_exec($ch);
exit;
}
if ($_SERVER['REQUEST_METHOD'] === 'GET' && preg_match('#^/crypto/customer/([^/]+)/payment-tokens$#', $path, $m)) {
$customerId = $m[1];
$oauthToken = exchangeTokens($_GET['authIntentId'] ?? '', $secretKey);
$ch = curl_init("https://api.stripe.com/v1/crypto/customers/{$customerId}/payment_tokens");
curl_setopt_array($ch, [
CURLOPT_HTTPHEADER => [
'Authorization: Bearer ' . $secretKey,
'Stripe-OAuth-Token: ' . $oauthToken,
'Stripe-Version: 2026-03-25.dahlia;crypto_onramp_beta=v2',
],
CURLOPT_RETURNTRANSFER => true,
]);
echo curl_exec($ch);
exit;
}
if ($_SERVER['REQUEST_METHOD'] === 'POST' && $path === '/create-onramp-session') {
$oauthToken = exchangeTokens($input['authIntentId'] ?? '', $secretKey);
$params = [
'ui_mode' => 'headless',
'crypto_customer_id' => $input['crypto_customer_id'],
'payment_token' => $input['payment_token'],
'source_amount' => $input['source_amount'],
'source_currency' => $input['source_currency'],
'destination_currency' => $input['destination_currency'],
'destination_currencies[]' => $input['destination_currency'],
'destination_network' => $input['destination_network'],
'destination_networks[]' => $input['destination_network'],
'wallet_address' => $input['wallet_address'],
'customer_ip_address' => $_SERVER['REMOTE_ADDR'],
];
$ch = curl_init('https://api.stripe.com/v1/crypto/onramp_sessions');
curl_setopt_array($ch, [
CURLOPT_POST => true,
CURLOPT_POSTFIELDS => http_build_query($params),
CURLOPT_HTTPHEADER => [
'Authorization: Bearer ' . $secretKey,
'Stripe-OAuth-Token: ' . $oauthToken,
'Stripe-Version: 2026-03-25.dahlia;crypto_onramp_beta=v2',
'Content-Type: application/x-www-form-urlencoded',
],
CURLOPT_RETURNTRANSFER => true,
]);
$res = curl_exec($ch);
$data = json_decode($res, true);
echo $data['id'] ? json_encode(['id' => $data['id'], 'quote_expires_at' => $data['quote']['expires_at'] ?? null]) : $res;
exit;
}
if (preg_match('#^/quote/([^/]+)$#', $path, $m) && $_SERVER['REQUEST_METHOD'] === 'POST') {
$sessionId = $m[1];
$oauthToken = exchangeTokens($input['authIntentId'] ?? '', $secretKey);
$ch = curl_init("https://api.stripe.com/v1/crypto/onramp_sessions/{$sessionId}/quote");
curl_setopt_array($ch, [
CURLOPT_POST => true,
CURLOPT_HTTPHEADER => [
'Authorization: Bearer ' . $secretKey,
'Stripe-OAuth-Token: ' . $oauthToken,
'Stripe-Version: 2026-03-25.dahlia;crypto_onramp_beta=v2',
],
CURLOPT_RETURNTRANSFER => true,
]);
echo curl_exec($ch);
exit;
}
if (preg_match('#^/checkout/([^/]+)$#', $path, $m) && $_SERVER['REQUEST_METHOD'] === 'POST') {
$sessionId = $m[1];
$oauthToken = exchangeTokens($input['authIntentId'] ?? '', $secretKey);
$ch = curl_init("https://api.stripe.com/v1/crypto/onramp_sessions/{$sessionId}/checkout");
curl_setopt_array($ch, [
CURLOPT_POST => true,
CURLOPT_POSTFIELDS => http_build_query([
'mandate_data[customer_acceptance][type]' => 'online',
'mandate_data[customer_acceptance][accepted_at]' => time(),
'mandate_data[customer_acceptance][online][ip_address]' => $_SERVER['REMOTE_ADDR'],
'mandate_data[customer_acceptance][online][user_agent]' => $_SERVER['HTTP_USER_AGENT'] ?? '',
]),
CURLOPT_HTTPHEADER => [
'Authorization: Bearer ' . $secretKey,
'Stripe-OAuth-Token: ' . $oauthToken,
'Stripe-Version: 2026-03-25.dahlia;crypto_onramp_beta=v2',
'Content-Type: application/x-www-form-urlencoded',
],
CURLOPT_RETURNTRANSFER => true,
]);
echo curl_exec($ch);
exit;
}
// Don't put any keys in code. See https://docs.stripe.com/keys-best-practices.
$stripeSecretKey = '<>';
// This is a public sample test API key.
// Don't submit any personally identifiable information in requests made with this key.
// Sign in to see your own test API key embedded in code samples.
// Don't put any keys in code. See https://docs.stripe.com/keys-best-practices.
var secretKey = "<>"
var oauthScopes = func() string {
if v := os.Getenv("LINK_OAUTH_SCOPES"); v != "" {
return v
}
return "crypto:ramp,kyc.status:read"
}()
func handleCreateAuthIntent(w http.ResponseWriter, r *http.Request) {
if r.Method != "POST" {
http.Error(w, "Method not allowed", 405)
return
}
var body struct {
Email string `json:"email"`
}
json.NewDecoder(r.Body).Decode(&body)
form := url.Values{}
form.Set("email", body.Email)
form.Set("oauth_scopes", oauthScopes)
form.Set("oauth_client_id", "your_oauth_client_id")
req, _ := http.NewRequest("POST", "https://login.link.com/v1/link_auth_intent", strings.NewReader(form.Encode()))
req.Header.Set("Authorization", "Bearer "+secretKey)
req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
res, _ := http.DefaultClient.Do(req)
defer res.Body.Close()
w.WriteHeader(res.StatusCode)
io.Copy(w, res.Body)
}
func exchangeTokens(authIntentID string) (string, error) {
req, _ := http.NewRequest("POST", "https://login.link.com/v1/link_auth_intent/"+authIntentID+"/tokens", nil)
req.Header.Set("Authorization", "Bearer "+secretKey)
res, err := http.DefaultClient.Do(req)
if err != nil {
return "", err
}
defer res.Body.Close()
var data map[string]interface{}
json.NewDecoder(res.Body).Decode(&data)
accessToken, ok := data["access_token"].(string)
if !ok {
return "", fmt.Errorf("token exchange failed")
}
return accessToken, nil
}
func refreshExchangeTokens(refreshToken string) (string, error) {
form := url.Values{}
form.Set("client_id", os.Getenv("LINK_CLIENT_ID"))
form.Set("client_secret", os.Getenv("LINK_CLIENT_SECRET"))
form.Set("grant_type", "refresh_token")
form.Set("refresh_token", refreshToken)
form.Set("scope", oauthScopes)
req, _ := http.NewRequest("POST", "https://login.link.com/auth/token", strings.NewReader(form.Encode()))
req.Header.Set("Authorization", "Bearer "+secretKey)
req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
res, err := http.DefaultClient.Do(req)
if err != nil {
return "", err
}
defer res.Body.Close()
var data map[string]interface{}
json.NewDecoder(res.Body).Decode(&data)
accessToken, ok := data["access_token"].(string)
if !ok {
return "", fmt.Errorf("token refresh failed")
}
return accessToken, nil
}
func handleCryptoCustomer(w http.ResponseWriter, r *http.Request) {
path := r.URL.Path
path = strings.TrimPrefix(path, "/crypto/customer/")
parts := strings.SplitN(path, "/", 2)
customerID := parts[0]
stripePath := "/v1/crypto/customers/" + customerID
if len(parts) > 1 {
switch parts[1] {
case "wallets":
stripePath += "/crypto_consumer_wallets"
case "payment-tokens":
stripePath += "/payment_tokens"
}
}
oauthToken, err := exchangeTokens(r.URL.Query().Get("authIntentId"))
if err != nil {
http.Error(w, err.Error(), 500)
return
}
req, _ := http.NewRequest(r.Method, "https://api.stripe.com"+stripePath, r.Body)
req.Header.Set("Authorization", "Bearer "+secretKey)
req.Header.Set("Stripe-OAuth-Token", oauthToken)
req.Header.Set("Stripe-Version", "2026-03-25.dahlia;crypto_onramp_beta=v2")
res, _ := http.DefaultClient.Do(req)
io.Copy(w, res.Body)
}
func handleCreateSession(w http.ResponseWriter, r *http.Request) {
if r.Method != "POST" {
http.Error(w, "Method not allowed", 405)
return
}
var body struct {
AuthIntentID string `json:"authIntentId"`
CryptoCustomerID string `json:"crypto_customer_id"`
PaymentToken string `json:"payment_token"`
SourceAmount float64 `json:"source_amount"`
SourceCurrency string `json:"source_currency"`
DestinationCurrency string `json:"destination_currency"`
DestinationNetwork string `json:"destination_network"`
WalletAddress string `json:"wallet_address"`
}
json.NewDecoder(r.Body).Decode(&body)
oauthToken, err := exchangeTokens(body.AuthIntentID)
if err != nil {
http.Error(w, err.Error(), 500)
return
}
form := url.Values{}
form.Set("ui_mode", "headless")
form.Set("crypto_customer_id", body.CryptoCustomerID)
form.Set("payment_token", body.PaymentToken)
form.Set("source_amount", fmt.Sprintf("%.0f", body.SourceAmount))
form.Set("source_currency", body.SourceCurrency)
form.Set("destination_currency", body.DestinationCurrency)
form.Set("destination_currencies[]", body.DestinationCurrency)
form.Set("destination_network", body.DestinationNetwork)
form.Set("destination_networks[]", body.DestinationNetwork)
clientIP := r.RemoteAddr
if i := strings.LastIndex(clientIP, ":"); i >= 0 {
clientIP = clientIP[:i]
}
form.Set("customer_ip_address", clientIP)
form.Set("wallet_address", body.WalletAddress)
req, _ := http.NewRequest("POST", "https://api.stripe.com/v1/crypto/onramp_sessions", strings.NewReader(form.Encode()))
req.Header.Set("Authorization", "Bearer "+secretKey)
req.Header.Set("Stripe-OAuth-Token", oauthToken)
req.Header.Set("Stripe-Version", "2026-03-25.dahlia;crypto_onramp_beta=v2")
req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
res, _ := http.DefaultClient.Do(req)
defer res.Body.Close()
var data map[string]interface{}
json.NewDecoder(res.Body).Decode(&data)
w.Header().Set("Content-Type", "application/json")
if id, ok := data["id"].(string); ok {
var quoteExpiresAt interface{}
if q, ok := data["quote"].(map[string]interface{}); ok {
quoteExpiresAt = q["expires_at"]
}
json.NewEncoder(w).Encode(map[string]interface{}{"id": id, "quote_expires_at": quoteExpiresAt})
} else {
w.WriteHeader(res.StatusCode)
json.NewEncoder(w).Encode(data)
}
}
func handleRefreshQuote(w http.ResponseWriter, r *http.Request) {
if r.Method != "POST" {
http.Error(w, "Method not allowed", 405)
return
}
parts := strings.Split(r.URL.Path, "/")
sessionID := parts[len(parts)-1]
var body struct {
AuthIntentID string `json:"authIntentId"`
}
json.NewDecoder(r.Body).Decode(&body)
oauthToken, err := exchangeTokens(body.AuthIntentID)
if err != nil {
http.Error(w, err.Error(), 500)
return
}
req, _ := http.NewRequest("POST", "https://api.stripe.com/v1/crypto/onramp_sessions/"+sessionID+"/quote", nil)
req.Header.Set("Authorization", "Bearer "+secretKey)
req.Header.Set("Stripe-OAuth-Token", oauthToken)
req.Header.Set("Stripe-Version", "2026-03-25.dahlia;crypto_onramp_beta=v2")
res, _ := http.DefaultClient.Do(req)
io.Copy(w, res.Body)
}
func handleCheckout(w http.ResponseWriter, r *http.Request) {
if r.Method != "POST" {
http.Error(w, "Method not allowed", 405)
return
}
parts := strings.Split(r.URL.Path, "/")
sessionID := parts[len(parts)-1]
var body struct {
AuthIntentID string `json:"authIntentId"`
}
json.NewDecoder(r.Body).Decode(&body)
oauthToken, err := exchangeTokens(body.AuthIntentID)
if err != nil {
http.Error(w, err.Error(), 500)
return
}
clientIP := r.RemoteAddr
if i := strings.LastIndex(clientIP, ":"); i >= 0 {
clientIP = clientIP[:i]
}
form := url.Values{}
form.Set("mandate_data[customer_acceptance][type]", "online")
form.Set("mandate_data[customer_acceptance][accepted_at]", fmt.Sprintf("%d", time.Now().Unix()))
form.Set("mandate_data[customer_acceptance][online][ip_address]", clientIP)
form.Set("mandate_data[customer_acceptance][online][user_agent]", r.Header.Get("User-Agent"))
req, _ := http.NewRequest("POST", "https://api.stripe.com/v1/crypto/onramp_sessions/"+sessionID+"/checkout", strings.NewReader(form.Encode()))
req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
req.Header.Set("Authorization", "Bearer "+secretKey)
req.Header.Set("Stripe-OAuth-Token", oauthToken)
req.Header.Set("Stripe-Version", "2026-03-25.dahlia;crypto_onramp_beta=v2")
res, _ := http.DefaultClient.Do(req)
io.Copy(w, res.Body)
}
// This is a public sample test API key.
// Don't submit any personally identifiable information in requests made with this key.
// Sign in to see your own test API key embedded in code samples.
// Don't put any keys in code. See https://docs.stripe.com/keys-best-practices.
var secretKey = "<>";
var oauthScopes = Environment.GetEnvironmentVariable("LINK_OAUTH_SCOPES") ?? "crypto:ramp,kyc.status:read";
app.MapPost("/create-link-auth-intent", async (HttpRequest req) => {
var body = await JsonSerializer.DeserializeAsync(req.Body);
var content = new FormUrlEncodedContent(new[] {
new KeyValuePair("email", body.GetProperty("email").GetString()!),
new KeyValuePair("oauth_scopes", oauthScopes),
new KeyValuePair("oauth_client_id", "your_oauth_client_id"),
});
var msg = new HttpRequestMessage(HttpMethod.Post, "https://login.link.com/v1/link_auth_intent") {
Content = content,
Headers = { { "Authorization", $"Bearer {secretKey}" } }
};
var res = await http.SendAsync(msg);
return Results.Json(await res.Content.ReadFromJsonAsync(), statusCode: (int)res.StatusCode);
});
async Task exchangeTokens(string authIntentId) {
var msg = new HttpRequestMessage(HttpMethod.Post, $"https://login.link.com/v1/link_auth_intent/{authIntentId}/tokens") {
Headers = { { "Authorization", $"Bearer {secretKey}" } }
};
var res = await http.SendAsync(msg);
var data = await res.Content.ReadFromJsonAsync();
return data.TryGetProperty("access_token", out var tok) ? tok.GetString() : null;
}
async Task refreshExchangeTokens(string refreshToken) {
var content = new FormUrlEncodedContent(new[] {
new KeyValuePair("client_id", Environment.GetEnvironmentVariable("LINK_CLIENT_ID") ?? "lwlpk_xxxxx"),
new KeyValuePair("client_secret", Environment.GetEnvironmentVariable("LINK_CLIENT_SECRET") ?? "lwlsk_xxxxx"),
new KeyValuePair("grant_type", "refresh_token"),
new KeyValuePair("refresh_token", refreshToken),
new KeyValuePair("scope", oauthScopes),
});
var msg = new HttpRequestMessage(HttpMethod.Post, "https://login.link.com/auth/token") {
Content = content,
Headers = { { "Authorization", $"Bearer {secretKey}" } }
};
var res = await http.SendAsync(msg);
var data = await res.Content.ReadFromJsonAsync();
return data.TryGetProperty("access_token", out var tok) ? tok.GetString() : null;
}
app.MapPost("/create-onramp-session", async (HttpRequest req) => {
var body = await JsonSerializer.DeserializeAsync(req.Body);
var oauthToken = await exchangeTokens(body.GetProperty("authIntentId").GetString()!);
var form = new List> {
new("ui_mode", "headless"),
new("crypto_customer_id", body.GetProperty("crypto_customer_id").GetString()!),
new("payment_token", body.GetProperty("payment_token").GetString()!),
new("source_amount", body.GetProperty("source_amount").GetRawText()),
new("source_currency", body.GetProperty("source_currency").GetString()!),
new("destination_currency", body.GetProperty("destination_currency").GetString()!),
new("destination_currencies[]", body.GetProperty("destination_currency").GetString()!),
new("destination_network", body.GetProperty("destination_network").GetString()!),
new("destination_networks[]", body.GetProperty("destination_network").GetString()!),
new("wallet_address", body.GetProperty("wallet_address").GetString()!),
};
form.Add(new("customer_ip_address", req.HttpContext.Connection.RemoteIpAddress?.ToString() ?? ""));
var msg = new HttpRequestMessage(HttpMethod.Post, "https://api.stripe.com/v1/crypto/onramp_sessions") {
Content = new FormUrlEncodedContent(form),
Headers = {
{ "Authorization", $"Bearer {secretKey}" },
{ "Stripe-OAuth-Token", oauthToken ?? "" },
{ "Stripe-Version", "2026-03-25.dahlia;crypto_onramp_beta=v2" },
}
};
var res = await http.SendAsync(msg);
var data = await res.Content.ReadFromJsonAsync();
long? quoteExpiresAt = data.TryGetProperty("quote", out var q) && q.TryGetProperty("expires_at", out var exp)
? exp.GetInt64() : null;
return data.TryGetProperty("id", out var idProp)
? Results.Json(new { id = idProp.GetString(), quote_expires_at = quoteExpiresAt })
: Results.Json(data, statusCode: (int)res.StatusCode);
});
app.MapPost("/quote/{sessionId}", async (string sessionId, HttpRequest req) => {
var body = await JsonSerializer.DeserializeAsync(req.Body);
var oauthToken = await exchangeTokens(body.GetProperty("authIntentId").GetString()!);
var msg = new HttpRequestMessage(HttpMethod.Post, $"https://api.stripe.com/v1/crypto/onramp_sessions/{sessionId}/quote") {
Headers = {
{ "Authorization", $"Bearer {secretKey}" },
{ "Stripe-OAuth-Token", oauthToken ?? "" },
{ "Stripe-Version", "2026-03-25.dahlia;crypto_onramp_beta=v2" },
}
};
var res = await http.SendAsync(msg);
return Results.Content(await res.Content.ReadAsStringAsync(), "application/json", statusCode: (int)res.StatusCode);
});
app.MapPost("/checkout/{sessionId}", async (string sessionId, HttpRequest req) => {
var body = await JsonSerializer.DeserializeAsync(req.Body);
var oauthToken = await exchangeTokens(body.GetProperty("authIntentId").GetString()!);
var form = new FormUrlEncodedContent(new[] {
new KeyValuePair("mandate_data[customer_acceptance][type]", "online"),
new KeyValuePair("mandate_data[customer_acceptance][accepted_at]", DateTimeOffset.UtcNow.ToUnixTimeSeconds().ToString()),
new KeyValuePair("mandate_data[customer_acceptance][online][ip_address]", req.HttpContext.Connection.RemoteIpAddress?.ToString() ?? ""),
new KeyValuePair("mandate_data[customer_acceptance][online][user_agent]", req.Headers["User-Agent"].FirstOrDefault() ?? ""),
});
var msg = new HttpRequestMessage(HttpMethod.Post, $"https://api.stripe.com/v1/crypto/onramp_sessions/{sessionId}/checkout") {
Content = form,
Headers = {
{ "Authorization", $"Bearer {secretKey}" },
{ "Stripe-OAuth-Token", oauthToken ?? "" },
{ "Stripe-Version", "2026-03-25.dahlia;crypto_onramp_beta=v2" },
}
};
var res = await http.SendAsync(msg);
return Results.Content(await res.Content.ReadAsStringAsync(), "application/json", statusCode: (int)res.StatusCode);
});
app.MapGet("/crypto/customer/{*path}", async (string path, HttpRequest req) => {
var oauthToken = await exchangeTokens(req.Query["authIntentId"].FirstOrDefault()!);
var parts = (path ?? "").Split('/', 2, StringSplitOptions.RemoveEmptyEntries);
var stripePath = parts.Length switch {
1 => $"v1/crypto/customers/{parts[0]}",
2 when parts[1] == "wallets" => $"v1/crypto/customers/{parts[0]}/crypto_consumer_wallets",
2 when parts[1] == "payment-tokens" => $"v1/crypto/customers/{parts[0]}/payment_tokens",
_ => $"v1/crypto/customers/{path}",
};
var msg = new HttpRequestMessage(HttpMethod.Get, $"https://api.stripe.com/{stripePath}") {
Headers = {
{ "Authorization", $"Bearer {secretKey}" },
{ "Stripe-OAuth-Token", oauthToken ?? "" },
{ "Stripe-Version", "2026-03-25.dahlia;crypto_onramp_beta=v2" },
}
};
var res = await http.SendAsync(msg);
return Results.Content(await res.Content.ReadAsStringAsync(), "application/json", statusCode: (int)res.StatusCode);
});
// This is a public sample test API key.
// Don't submit any personally identifiable information in requests made with this key.
// Sign in to see your own test API key embedded in code samples.
// Don't put any keys in code. See https://docs.stripe.com/keys-best-practices.
private static final String SECRET_KEY = "<>";
private static final String OAUTH_SCOPES = System.getenv("LINK_OAUTH_SCOPES") != null
? System.getenv("LINK_OAUTH_SCOPES") : "crypto:ramp,kyc.status:read";
private static String exchangeTokens(String authIntentId) throws Exception {
HttpRequest req = HttpRequest.newBuilder()
.uri(URI.create("https://login.link.com/v1/link_auth_intent/" + authIntentId + "/tokens"))
.header("Authorization", "Bearer " + SECRET_KEY)
.POST(HttpRequest.BodyPublishers.noBody())
.build();
HttpResponse resp = http.send(req, HttpResponse.BodyHandlers.ofString());
JsonObject data = gson.fromJson(resp.body(), JsonObject.class);
if (!data.has("access_token")) throw new RuntimeException("Token exchange failed");
return data.get("access_token").getAsString();
}
private static String refreshExchangeTokens(String refreshToken) throws Exception {
String form = "client_id=" + (System.getenv("LINK_CLIENT_ID") != null ? System.getenv("LINK_CLIENT_ID") : "lwlpk_xxxxx")
+ "&client_secret=" + (System.getenv("LINK_CLIENT_SECRET") != null ? System.getenv("LINK_CLIENT_SECRET") : "lwlsk_xxxxx")
+ "&grant_type=refresh_token"
+ "&refresh_token=" + refreshToken
+ "&scope=" + OAUTH_SCOPES;
HttpRequest req = HttpRequest.newBuilder()
.uri(URI.create("https://login.link.com/auth/token"))
.header("Authorization", "Bearer " + SECRET_KEY)
.header("Content-Type", "application/x-www-form-urlencoded")
.POST(HttpRequest.BodyPublishers.ofString(form))
.build();
HttpResponse resp = http.send(req, HttpResponse.BodyHandlers.ofString());
JsonObject data = gson.fromJson(resp.body(), JsonObject.class);
if (!data.has("access_token")) throw new RuntimeException("Token refresh failed");
return data.get("access_token").getAsString();
}
post("/create-link-auth-intent", (req, res) -> {
JsonObject body = gson.fromJson(req.body(), JsonObject.class);
String form = "email=" + body.get("email").getAsString()
+ "&oauth_scopes=" + OAUTH_SCOPES
+ "&oauth_client_id=your_oauth_client_id";
HttpRequest req2 = HttpRequest.newBuilder()
.uri(URI.create("https://login.link.com/v1/link_auth_intent"))
.header("Authorization", "Bearer " + SECRET_KEY)
.header("Content-Type", "application/x-www-form-urlencoded")
.POST(HttpRequest.BodyPublishers.ofString(form))
.build();
HttpResponse resp = http.send(req2, HttpResponse.BodyHandlers.ofString());
JsonObject data = gson.fromJson(resp.body(), JsonObject.class);
if (data.has("id")) return "{\"authIntentId\":\"" + data.get("id").getAsString() + "\"}";
res.status(resp.statusCode());
return resp.body();
});
get("/crypto/customer/:id", (req, res) -> {
String customerId = req.params(":id");
String oauthToken = exchangeTokens(req.queryParams("authIntentId"));
HttpRequest req2 = HttpRequest.newBuilder()
.uri(URI.create("https://api.stripe.com/v1/crypto/customers/" + customerId))
.header("Authorization", "Bearer " + SECRET_KEY)
.header("Stripe-OAuth-Token", oauthToken)
.header("Stripe-Version", "2026-03-25.dahlia;crypto_onramp_beta=v2")
.GET()
.build();
return http.send(req2, HttpResponse.BodyHandlers.ofString()).body();
});
get("/crypto/customer/:id/wallets", (req, res) -> {
String customerId = req.params(":id");
String oauthToken = exchangeTokens(req.queryParams("authIntentId"));
HttpRequest req2 = HttpRequest.newBuilder()
.uri(URI.create("https://api.stripe.com/v1/crypto/customers/" + customerId + "/crypto_consumer_wallets"))
.header("Authorization", "Bearer " + SECRET_KEY)
.header("Stripe-OAuth-Token", oauthToken)
.header("Stripe-Version", "2026-03-25.dahlia;crypto_onramp_beta=v2")
.GET()
.build();
return http.send(req2, HttpResponse.BodyHandlers.ofString()).body();
});
get("/crypto/customer/:id/payment-tokens", (req, res) -> {
String customerId = req.params(":id");
String oauthToken = exchangeTokens(req.queryParams("authIntentId"));
HttpRequest req2 = HttpRequest.newBuilder()
.uri(URI.create("https://api.stripe.com/v1/crypto/customers/" + customerId + "/payment_tokens"))
.header("Authorization", "Bearer " + SECRET_KEY)
.header("Stripe-OAuth-Token", oauthToken)
.header("Stripe-Version", "2026-03-25.dahlia;crypto_onramp_beta=v2")
.GET()
.build();
return http.send(req2, HttpResponse.BodyHandlers.ofString()).body();
});
post("/create-onramp-session", (req, res) -> {
JsonObject body = gson.fromJson(req.body(), JsonObject.class);
String oauthToken = exchangeTokens(body.get("authIntentId").getAsString());
Map params = new HashMap<>(Map.of(
"ui_mode", "headless",
"crypto_customer_id", body.get("crypto_customer_id").getAsString(),
"payment_token", body.get("payment_token").getAsString(),
"source_amount", body.get("source_amount").getAsString(),
"source_currency", body.get("source_currency").getAsString()
));
params.put("destination_currency", body.get("destination_currency").getAsString());
params.put("destination_currencies[]", body.get("destination_currency").getAsString());
params.put("destination_network", body.get("destination_network").getAsString());
params.put("destination_networks[]", body.get("destination_network").getAsString());
params.put("wallet_address", body.get("wallet_address").getAsString());
params.put("customer_ip_address", req.ip());
String form = params.entrySet().stream()
.map(e -> e.getKey() + "=" + e.getValue())
.collect(Collectors.joining("&"));
HttpRequest req2 = HttpRequest.newBuilder()
.uri(URI.create("https://api.stripe.com/v1/crypto/onramp_sessions"))
.header("Authorization", "Bearer " + SECRET_KEY)
.header("Stripe-OAuth-Token", oauthToken)
.header("Stripe-Version", "2026-03-25.dahlia;crypto_onramp_beta=v2")
.header("Content-Type", "application/x-www-form-urlencoded")
.POST(HttpRequest.BodyPublishers.ofString(form))
.build();
HttpResponse resp = http.send(req2, HttpResponse.BodyHandlers.ofString());
JsonObject data = gson.fromJson(resp.body(), JsonObject.class);
if (!data.has("id")) return resp.body();
JsonObject result = new JsonObject();
result.addProperty("id", data.get("id").getAsString());
if (data.has("quote") && !data.get("quote").isJsonNull()) {
JsonElement exp = data.getAsJsonObject("quote").get("expires_at");
if (exp != null && !exp.isJsonNull()) result.add("quote_expires_at", exp);
}
return result.toString();
});
post("/quote/:sessionId", (req, res) -> {
String sessionId = req.params(":sessionId");
JsonObject body = gson.fromJson(req.body(), JsonObject.class);
String oauthToken = exchangeTokens(body.get("authIntentId").getAsString());
HttpRequest req2 = HttpRequest.newBuilder()
.uri(URI.create("https://api.stripe.com/v1/crypto/onramp_sessions/" + sessionId + "/quote"))
.header("Authorization", "Bearer " + SECRET_KEY)
.header("Stripe-OAuth-Token", oauthToken)
.header("Stripe-Version", "2026-03-25.dahlia;crypto_onramp_beta=v2")
.POST(HttpRequest.BodyPublishers.noBody())
.build();
return http.send(req2, HttpResponse.BodyHandlers.ofString()).body();
});
post("/checkout/:sessionId", (req, res) -> {
String sessionId = req.params(":sessionId");
JsonObject body = gson.fromJson(req.body(), JsonObject.class);
String oauthToken = exchangeTokens(body.get("authIntentId").getAsString());
String form = "mandate_data[customer_acceptance][type]=online"
+ "&mandate_data[customer_acceptance][accepted_at]=" + (System.currentTimeMillis() / 1000)
+ "&mandate_data[customer_acceptance][online][ip_address]=" + req.ip()
+ "&mandate_data[customer_acceptance][online][user_agent]=" + java.net.URLEncoder.encode(req.headers("User-Agent") != null ? req.headers("User-Agent") : "", java.nio.charset.StandardCharsets.UTF_8);
HttpRequest req2 = HttpRequest.newBuilder()
.uri(URI.create("https://api.stripe.com/v1/crypto/onramp_sessions/" + sessionId + "/checkout"))
.header("Authorization", "Bearer " + SECRET_KEY)
.header("Stripe-OAuth-Token", oauthToken)
.header("Stripe-Version", "2026-03-25.dahlia;crypto_onramp_beta=v2")
.header("Content-Type", "application/x-www-form-urlencoded")
.POST(HttpRequest.BodyPublishers.ofString(form))
.build();
return http.send(req2, HttpResponse.BodyHandlers.ofString()).body();
});
import React, { useState, useEffect, useRef } from 'react';
import { loadCryptoOnrampAndInitialize } from '@stripe/crypto';
export default function App() {
const [onramp, setOnramp] = useState(null);
useEffect(() => {
loadCryptoOnrampAndInitialize('<>').then(setOnramp);
}, []);
async function handleLogin() {
let res = await fetch(`${SERVER}/create-link-auth-intent`, {
method: 'POST',
headers: { 'Content-Type': 'application/json' },
body: JSON.stringify({ email }),
});
if (res.status === 404) {
await onramp.registerLinkUser(email, '+18004444444', 'US');
res = await fetch(`${SERVER}/create-link-auth-intent`, {
method: 'POST',
headers: { 'Content-Type': 'application/json' },
body: JSON.stringify({ email }),
});
}
const { authIntentId } = await res.json();
setLinkAuthIntentId(authIntentId);
const element = await onramp.authenticate(authIntentId, async ({ crypto_customer_id }) => {
setAuthElement(null);
setCryptoCustomerId(crypto_customer_id);
await routeNext(crypto_customer_id, authIntentId);
});
setAuthElement(element);
}
async function handleSubmitKyc() {
await onramp.submitKycInfo({
given_name: 'John',
surname: 'Verified',
date_of_birth: { day: 1, month: 1, year: 1990 },
address: { line1: 'address_full_match', city: 'San Francisco', state: 'CA', postal_code: '94111', country: 'US' },
id_number: { type: 'us_ssn', value: '000000000' },
});
await routeNext(cryptoCustomerId, linkAuthIntentId);
}
async function handleVerify() {
await onramp.verifyDocuments();
await routeNext(cryptoCustomerId, linkAuthIntentId);
}
async function handleRegisterWallet() {
await onramp.registerWalletAddress(walletAddress, walletNetwork);
await routeNext(cryptoCustomerId, linkAuthIntentId);
}
async function handleCollectPayment() {
const element = await onramp.collectPaymentMethod(
{ payment_method_types: ['card'], wallets: { applePay: 'auto', googlePay: 'auto' } },
({ cryptoPaymentToken: token }) => {
setCryptoPaymentToken(token);
setStep('checkout');
},
);
paymentRef.current?.replaceChildren(element);
}
async function handleCheckout() {
const session = await fetch(`${SERVER}/create-onramp-session`, {
method: 'POST',
headers: { 'Content-Type': 'application/json' },
body: JSON.stringify({
authIntentId: linkAuthIntentId,
crypto_customer_id: cryptoCustomerId,
payment_token: cryptoPaymentToken,
source_amount: parseFloat(amount),
source_currency: 'usd',
destination_currency: 'usdc',
destination_network: walletNetwork || 'base',
wallet_address: walletAddress,
}),
}).then(r => r.json());
const now = Math.floor(Date.now() / 1000);
if (!session.quote_expires_at || now >= session.quote_expires_at) {
await fetch(`${SERVER}/quote/${session.id}`, {
method: 'POST',
headers: { 'Content-Type': 'application/json' },
body: JSON.stringify({ authIntentId: linkAuthIntentId }),
});
}
await onramp.performCheckout(session.id, async () => {
const { client_secret } = await fetch(`${SERVER}/checkout/${session.id}`, {
method: 'POST',
headers: { 'Content-Type': 'application/json' },
body: JSON.stringify({ authIntentId: linkAuthIntentId }),
}).then(r => r.json());
return client_secret;
});
setStep('complete');
}
Submit your identity information to complete KYC verification.