@dynamic-labs-sdk/client 0.0.1-alpha.16 → 0.0.1-alpha.18

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -1,3 +1,11 @@
1
+ ## 0.0.1-alpha.18 (2025-07-22)
2
+
3
+ This was a version bump only, there were no code changes.
4
+
5
+ ## 0.0.1-alpha.17 (2025-07-22)
6
+
7
+ This was a version bump only, there were no code changes.
8
+
1
9
  ## 0.0.1-alpha.16 (2025-07-14)
2
10
 
3
11
  ### 🚀 Features
@@ -70,9 +70,9 @@ function _extends() {
70
70
  return _extends.apply(this, arguments);
71
71
  }
72
72
 
73
- var version = "0.0.1-alpha.16";
73
+ var version = "0.0.1-alpha.18";
74
74
  var dependencies = {
75
- "@dynamic-labs/sdk-api-core": "0.0.714"};
75
+ "@dynamic-labs/sdk-api-core": "0.0.726"};
76
76
 
77
77
  const randomString = (length)=>{
78
78
  const CHARS = 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_';
@@ -197,6 +197,11 @@ class ValueMustBeDefinedError extends BaseError {
197
197
  return dynamicCookiesEnabled || byoJwtCookieEnabled;
198
198
  };
199
199
 
200
+ const DYNAMIC_API_VERSION_HEADER = 'x-dyn-api-version';
201
+ const DYNAMIC_REQUEST_ID_HEADER = 'x-dyn-request-id';
202
+ const DYNAMIC_SDK_VERSION_HEADER = 'x-dyn-version';
203
+ const MFA_TOKEN_HEADER = 'x-mfa-auth-token';
204
+
200
205
  class APIError extends BaseError {
201
206
  static async fromResponse(response) {
202
207
  const errorBody = await response.json();
@@ -306,15 +311,16 @@ class MfaRateLimitedError extends BaseError {
306
311
  * This is not meant for storing, as it is very light we can create it whenever needed.
307
312
  */ const createApiClient = (client, options = {})=>{
308
313
  const core = getCore(client);
314
+ const coreState = core.state.get();
309
315
  const settings = {
310
316
  basePath: core.apiBaseUrl,
311
317
  headers: _extends({
312
318
  'Content-Type': 'application/json',
313
- 'x-dyn-api-version': dependencies['@dynamic-labs/sdk-api-core'],
314
- 'x-dyn-request-id': randomString(50),
319
+ [DYNAMIC_API_VERSION_HEADER]: dependencies['@dynamic-labs/sdk-api-core'],
320
+ [DYNAMIC_REQUEST_ID_HEADER]: randomString(50),
315
321
  /**
316
322
  * Ticket revise API version
317
- */ 'x-dyn-version': 'WalletKit/4.22.5'
323
+ */ [DYNAMIC_SDK_VERSION_HEADER]: 'WalletKit/4.22.5'
318
324
  }, core.getApiHeaders())
319
325
  };
320
326
  if (client.token) {
@@ -323,6 +329,9 @@ class MfaRateLimitedError extends BaseError {
323
329
  if (client.projectSettings && isCookieEnabled(client)) {
324
330
  settings.credentials = 'include';
325
331
  }
332
+ if (options.includeMfaToken && coreState.mfaToken) {
333
+ settings.headers[MFA_TOKEN_HEADER] = coreState.mfaToken;
334
+ }
326
335
  return new sdkApiCore.SDKApi(new sdkApiCore.Configuration(_extends({}, settings, {
327
336
  fetchApi: core.fetch,
328
337
  middleware: [
@@ -68,9 +68,9 @@ function _extends() {
68
68
  return _extends.apply(this, arguments);
69
69
  }
70
70
 
71
- var version = "0.0.1-alpha.16";
71
+ var version = "0.0.1-alpha.18";
72
72
  var dependencies = {
73
- "@dynamic-labs/sdk-api-core": "0.0.714"};
73
+ "@dynamic-labs/sdk-api-core": "0.0.726"};
74
74
 
75
75
  const randomString = (length)=>{
76
76
  const CHARS = 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_';
@@ -195,6 +195,11 @@ class ValueMustBeDefinedError extends BaseError {
195
195
  return dynamicCookiesEnabled || byoJwtCookieEnabled;
196
196
  };
197
197
 
198
+ const DYNAMIC_API_VERSION_HEADER = 'x-dyn-api-version';
199
+ const DYNAMIC_REQUEST_ID_HEADER = 'x-dyn-request-id';
200
+ const DYNAMIC_SDK_VERSION_HEADER = 'x-dyn-version';
201
+ const MFA_TOKEN_HEADER = 'x-mfa-auth-token';
202
+
198
203
  class APIError extends BaseError {
199
204
  static async fromResponse(response) {
200
205
  const errorBody = await response.json();
@@ -304,15 +309,16 @@ class MfaRateLimitedError extends BaseError {
304
309
  * This is not meant for storing, as it is very light we can create it whenever needed.
305
310
  */ const createApiClient = (client, options = {})=>{
306
311
  const core = getCore(client);
312
+ const coreState = core.state.get();
307
313
  const settings = {
308
314
  basePath: core.apiBaseUrl,
309
315
  headers: _extends({
310
316
  'Content-Type': 'application/json',
311
- 'x-dyn-api-version': dependencies['@dynamic-labs/sdk-api-core'],
312
- 'x-dyn-request-id': randomString(50),
317
+ [DYNAMIC_API_VERSION_HEADER]: dependencies['@dynamic-labs/sdk-api-core'],
318
+ [DYNAMIC_REQUEST_ID_HEADER]: randomString(50),
313
319
  /**
314
320
  * Ticket revise API version
315
- */ 'x-dyn-version': 'WalletKit/4.22.5'
321
+ */ [DYNAMIC_SDK_VERSION_HEADER]: 'WalletKit/4.22.5'
316
322
  }, core.getApiHeaders())
317
323
  };
318
324
  if (client.token) {
@@ -321,6 +327,9 @@ class MfaRateLimitedError extends BaseError {
321
327
  if (client.projectSettings && isCookieEnabled(client)) {
322
328
  settings.credentials = 'include';
323
329
  }
330
+ if (options.includeMfaToken && coreState.mfaToken) {
331
+ settings.headers[MFA_TOKEN_HEADER] = coreState.mfaToken;
332
+ }
324
333
  return new SDKApi(new Configuration(_extends({}, settings, {
325
334
  fetchApi: core.fetch,
326
335
  middleware: [
package/index.cjs.js CHANGED
@@ -32,6 +32,7 @@ var z__namespace = /*#__PURE__*/_interopNamespaceDefault(z);
32
32
  * will have to come to this file and remember to add it here and in the interface.
33
33
  */ const stateChangeEvents = {
34
34
  initStatus: 'initStatusChanged',
35
+ mfaToken: 'mfaTokenChanged',
35
36
  projectSettings: 'projectSettingsChanged',
36
37
  token: 'tokenChanged',
37
38
  user: 'userChanged'
@@ -832,6 +833,9 @@ class InvalidStorageValue extends getWalletProviderFromWalletAccount.BaseError {
832
833
  get initStatus () {
833
834
  return core.state.get().initStatus;
834
835
  },
836
+ get mfaToken () {
837
+ return core.state.get().mfaToken;
838
+ },
835
839
  get projectSettings () {
836
840
  return core.state.get().projectSettings;
837
841
  },
@@ -990,6 +994,21 @@ const getPasskeys = async (client)=>{
990
994
  return response.passkeys;
991
995
  };
992
996
 
997
+ const updateAuthFromVerifyResponse = (client, response)=>{
998
+ const core = getWalletProviderFromWalletAccount.getCore(client);
999
+ const { user, minifiedJwt, expiresAt, mfaToken } = response;
1000
+ core.state.set({
1001
+ mfaToken: mfaToken != null ? mfaToken : null,
1002
+ // Expires at is in seconds, so we need to convert it to milliseconds
1003
+ sessionExpiresAt: new Date(expiresAt * 1000),
1004
+ token: minifiedJwt != null ? minifiedJwt : null,
1005
+ user
1006
+ });
1007
+ core.eventEmitter.emit('authenticated', {
1008
+ verifyResponse: response
1009
+ });
1010
+ };
1011
+
993
1012
  const getPasskeyRegistrationOptions = async (client)=>{
994
1013
  const core = getWalletProviderFromWalletAccount.getCore(client);
995
1014
  const apiClient = getWalletProviderFromWalletAccount.createApiClient(client);
@@ -1022,22 +1041,9 @@ const registerPasskey = async (client)=>{
1022
1041
  const registration = await core.passkey.register({
1023
1042
  optionsJSON: options
1024
1043
  });
1025
- return serverRegisterPasskey(client, registration);
1026
- };
1027
-
1028
- const updateAuthFromVerifyResponse = (client, response)=>{
1029
- const core = getWalletProviderFromWalletAccount.getCore(client);
1030
- const { user, minifiedJwt, expiresAt, mfaToken } = response;
1031
- core.state.set({
1032
- mfaToken: mfaToken != null ? mfaToken : null,
1033
- // Expires at is in seconds, so we need to convert it to milliseconds
1034
- sessionExpiresAt: new Date(expiresAt * 1000),
1035
- token: minifiedJwt != null ? minifiedJwt : null,
1036
- user
1037
- });
1038
- core.eventEmitter.emit('authenticated', {
1039
- verifyResponse: response
1040
- });
1044
+ const response = await serverRegisterPasskey(client, registration);
1045
+ updateAuthFromVerifyResponse(client, response);
1046
+ return response;
1041
1047
  };
1042
1048
 
1043
1049
  const getPasskeyAuthenticationSignInOptions = async (client)=>{
@@ -1256,21 +1262,21 @@ const providersRequiringPkce = [
1256
1262
  await core.navigate(url.toString());
1257
1263
  };
1258
1264
 
1259
- const getMultichainBalances = async (client, balanceRequests)=>{
1265
+ const getMultichainBalances = async (client, balanceRequest)=>{
1260
1266
  const core = getWalletProviderFromWalletAccount.getCore(client);
1261
1267
  const apiClient = getWalletProviderFromWalletAccount.createApiClient(client);
1262
1268
  const response = await apiClient.postMultichainAccountBalances({
1263
1269
  environmentId: core.environmentId,
1264
- multichainAccountBalancesRequest: {
1265
- balanceRequests
1266
- }
1270
+ multichainAccountBalancesRequest: balanceRequest
1267
1271
  });
1268
1272
  return response.chainBalances;
1269
1273
  };
1270
1274
 
1271
1275
  const updateUser = async (client, userFields)=>{
1272
1276
  const core = getWalletProviderFromWalletAccount.getCore(client);
1273
- const apiClient = getWalletProviderFromWalletAccount.createApiClient(client);
1277
+ const apiClient = getWalletProviderFromWalletAccount.createApiClient(client, {
1278
+ includeMfaToken: true
1279
+ });
1274
1280
  const response = await apiClient.updateSelf({
1275
1281
  environmentId: core.environmentId,
1276
1282
  userFields
@@ -1447,6 +1453,19 @@ const getMfaDevices = async (client)=>{
1447
1453
  return devices.map((device)=>getWalletProviderFromWalletAccount.assignClient(device, client));
1448
1454
  };
1449
1455
 
1456
+ const getMfaMethods = async (client, { verifiedOnly = false } = {})=>{
1457
+ const core = getWalletProviderFromWalletAccount.getCore(client);
1458
+ const apiClient = getWalletProviderFromWalletAccount.createApiClient(client);
1459
+ const userMfaMethods = await apiClient.getUserMfaMethods({
1460
+ environmentId: core.environmentId,
1461
+ verifiedOnly
1462
+ });
1463
+ return getWalletProviderFromWalletAccount._extends({}, userMfaMethods, {
1464
+ devices: userMfaMethods.devices.map((device)=>getWalletProviderFromWalletAccount.assignClient(device, client)),
1465
+ passkeys: userMfaMethods.passkeys.map((passkey)=>getWalletProviderFromWalletAccount.assignClient(passkey, client))
1466
+ });
1467
+ };
1468
+
1450
1469
  /**
1451
1470
  * Returns the recovery codes for the user's MFA device.
1452
1471
  */ const getMfaRecoveryCodes = async (client)=>{
@@ -2754,6 +2773,7 @@ exports.deleteMfaDevice = deleteMfaDevice;
2754
2773
  exports.detectOAuthRedirect = detectOAuthRedirect;
2755
2774
  exports.fetchProjectSettings = fetchProjectSettings;
2756
2775
  exports.getMfaDevices = getMfaDevices;
2776
+ exports.getMfaMethods = getMfaMethods;
2757
2777
  exports.getMfaRecoveryCodes = getMfaRecoveryCodes;
2758
2778
  exports.getMultichainBalances = getMultichainBalances;
2759
2779
  exports.getPasskeyAuthenticationOptions = getPasskeyAuthenticationOptions;
package/index.esm.js CHANGED
@@ -12,6 +12,7 @@ import { startRegistration, browserSupportsWebAuthn, startAuthentication } from
12
12
  * will have to come to this file and remember to add it here and in the interface.
13
13
  */ const stateChangeEvents = {
14
14
  initStatus: 'initStatusChanged',
15
+ mfaToken: 'mfaTokenChanged',
15
16
  projectSettings: 'projectSettingsChanged',
16
17
  token: 'tokenChanged',
17
18
  user: 'userChanged'
@@ -812,6 +813,9 @@ class InvalidStorageValue extends BaseError {
812
813
  get initStatus () {
813
814
  return core.state.get().initStatus;
814
815
  },
816
+ get mfaToken () {
817
+ return core.state.get().mfaToken;
818
+ },
815
819
  get projectSettings () {
816
820
  return core.state.get().projectSettings;
817
821
  },
@@ -970,6 +974,21 @@ const getPasskeys = async (client)=>{
970
974
  return response.passkeys;
971
975
  };
972
976
 
977
+ const updateAuthFromVerifyResponse = (client, response)=>{
978
+ const core = getCore(client);
979
+ const { user, minifiedJwt, expiresAt, mfaToken } = response;
980
+ core.state.set({
981
+ mfaToken: mfaToken != null ? mfaToken : null,
982
+ // Expires at is in seconds, so we need to convert it to milliseconds
983
+ sessionExpiresAt: new Date(expiresAt * 1000),
984
+ token: minifiedJwt != null ? minifiedJwt : null,
985
+ user
986
+ });
987
+ core.eventEmitter.emit('authenticated', {
988
+ verifyResponse: response
989
+ });
990
+ };
991
+
973
992
  const getPasskeyRegistrationOptions = async (client)=>{
974
993
  const core = getCore(client);
975
994
  const apiClient = createApiClient(client);
@@ -1002,22 +1021,9 @@ const registerPasskey = async (client)=>{
1002
1021
  const registration = await core.passkey.register({
1003
1022
  optionsJSON: options
1004
1023
  });
1005
- return serverRegisterPasskey(client, registration);
1006
- };
1007
-
1008
- const updateAuthFromVerifyResponse = (client, response)=>{
1009
- const core = getCore(client);
1010
- const { user, minifiedJwt, expiresAt, mfaToken } = response;
1011
- core.state.set({
1012
- mfaToken: mfaToken != null ? mfaToken : null,
1013
- // Expires at is in seconds, so we need to convert it to milliseconds
1014
- sessionExpiresAt: new Date(expiresAt * 1000),
1015
- token: minifiedJwt != null ? minifiedJwt : null,
1016
- user
1017
- });
1018
- core.eventEmitter.emit('authenticated', {
1019
- verifyResponse: response
1020
- });
1024
+ const response = await serverRegisterPasskey(client, registration);
1025
+ updateAuthFromVerifyResponse(client, response);
1026
+ return response;
1021
1027
  };
1022
1028
 
1023
1029
  const getPasskeyAuthenticationSignInOptions = async (client)=>{
@@ -1236,21 +1242,21 @@ const providersRequiringPkce = [
1236
1242
  await core.navigate(url.toString());
1237
1243
  };
1238
1244
 
1239
- const getMultichainBalances = async (client, balanceRequests)=>{
1245
+ const getMultichainBalances = async (client, balanceRequest)=>{
1240
1246
  const core = getCore(client);
1241
1247
  const apiClient = createApiClient(client);
1242
1248
  const response = await apiClient.postMultichainAccountBalances({
1243
1249
  environmentId: core.environmentId,
1244
- multichainAccountBalancesRequest: {
1245
- balanceRequests
1246
- }
1250
+ multichainAccountBalancesRequest: balanceRequest
1247
1251
  });
1248
1252
  return response.chainBalances;
1249
1253
  };
1250
1254
 
1251
1255
  const updateUser = async (client, userFields)=>{
1252
1256
  const core = getCore(client);
1253
- const apiClient = createApiClient(client);
1257
+ const apiClient = createApiClient(client, {
1258
+ includeMfaToken: true
1259
+ });
1254
1260
  const response = await apiClient.updateSelf({
1255
1261
  environmentId: core.environmentId,
1256
1262
  userFields
@@ -1427,6 +1433,19 @@ const getMfaDevices = async (client)=>{
1427
1433
  return devices.map((device)=>assignClient(device, client));
1428
1434
  };
1429
1435
 
1436
+ const getMfaMethods = async (client, { verifiedOnly = false } = {})=>{
1437
+ const core = getCore(client);
1438
+ const apiClient = createApiClient(client);
1439
+ const userMfaMethods = await apiClient.getUserMfaMethods({
1440
+ environmentId: core.environmentId,
1441
+ verifiedOnly
1442
+ });
1443
+ return _extends({}, userMfaMethods, {
1444
+ devices: userMfaMethods.devices.map((device)=>assignClient(device, client)),
1445
+ passkeys: userMfaMethods.passkeys.map((passkey)=>assignClient(passkey, client))
1446
+ });
1447
+ };
1448
+
1430
1449
  /**
1431
1450
  * Returns the recovery codes for the user's MFA device.
1432
1451
  */ const getMfaRecoveryCodes = async (client)=>{
@@ -2701,4 +2720,4 @@ const isSameAddress = (left, right, chain)=>normalizeAddress(left, chain) === no
2701
2720
  return verifiedWalletAccount;
2702
2721
  };
2703
2722
 
2704
- export { BaseError, ClientAlreadyInitializedError, InvalidRedirectStorageStateError, MissingRedirectStorageStateError, MissingSocialUrlParamError, NoAddressFoundError, NoPasskeyCredentialsFoundError, NoWebAuthNSupportError, UnavailableInServerSideError, UserNotAuthenticatedError, WalletAccountAlreadyVerifiedError, WalletAccountNotSelectedError, WalletAlreadyLinkedToAnotherUserError, acknowledgeRecoveryCodes, assertWalletAccountSigningAvailability, authMfaRecoveryCode, authTotpMfaDevice, authenticatePasskeyMFA, completeSocialRedirectSignIn, connectWithWalletProvider, consumeMfaToken, createDynamicClient, createNewMfaRecoveryCodes, deleteMfaDevice, detectOAuthRedirect, fetchProjectSettings, getMfaDevices, getMfaRecoveryCodes, getMultichainBalances, getPasskeyAuthenticationOptions, getPasskeys, getPrimaryWalletAccount, getWalletAccounts, getWalletProviders, initializeClient, isPendingRecoveryCodesAcknowledgment, isSignedIn, isUserMissingMfaAuth, logout, registerPasskey, registerTotpMfaDevice, removeWalletAccount, selectPrimaryWalletAccount, sendEmailOTP, sendSmsOTP, setDefaultMfaDevice, signInWithPasskey, signInWithSocialRedirect, signMessage, updateUser, verifyOTP, verifyWalletAccount };
2723
+ export { BaseError, ClientAlreadyInitializedError, InvalidRedirectStorageStateError, MissingRedirectStorageStateError, MissingSocialUrlParamError, NoAddressFoundError, NoPasskeyCredentialsFoundError, NoWebAuthNSupportError, UnavailableInServerSideError, UserNotAuthenticatedError, WalletAccountAlreadyVerifiedError, WalletAccountNotSelectedError, WalletAlreadyLinkedToAnotherUserError, acknowledgeRecoveryCodes, assertWalletAccountSigningAvailability, authMfaRecoveryCode, authTotpMfaDevice, authenticatePasskeyMFA, completeSocialRedirectSignIn, connectWithWalletProvider, consumeMfaToken, createDynamicClient, createNewMfaRecoveryCodes, deleteMfaDevice, detectOAuthRedirect, fetchProjectSettings, getMfaDevices, getMfaMethods, getMfaRecoveryCodes, getMultichainBalances, getPasskeyAuthenticationOptions, getPasskeys, getPrimaryWalletAccount, getWalletAccounts, getWalletProviders, initializeClient, isPendingRecoveryCodesAcknowledgment, isSignedIn, isUserMissingMfaAuth, logout, registerPasskey, registerTotpMfaDevice, removeWalletAccount, selectPrimaryWalletAccount, sendEmailOTP, sendSmsOTP, setDefaultMfaDevice, signInWithPasskey, signInWithSocialRedirect, signMessage, updateUser, verifyOTP, verifyWalletAccount };
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@dynamic-labs-sdk/client",
3
- "version": "0.0.1-alpha.16",
3
+ "version": "0.0.1-alpha.18",
4
4
  "type": "module",
5
5
  "main": "./index.cjs.js",
6
6
  "module": "./index.esm.js",
@@ -19,7 +19,7 @@
19
19
  }
20
20
  },
21
21
  "dependencies": {
22
- "@dynamic-labs/sdk-api-core": "0.0.714",
22
+ "@dynamic-labs/sdk-api-core": "0.0.726",
23
23
  "@simplewebauthn/browser": "^13.1.0",
24
24
  "@zod/mini": "^4.0.0-beta.0",
25
25
  "buffer": "6.0.3",
@@ -1 +1 @@
1
- {"version":3,"file":"createDynamicClient.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/client/createDynamicClient/createDynamicClient.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,aAAa,EAAE,mBAAmB,EAAE,MAAM,UAAU,CAAC;AAEnE;;;;;;;;;;GAUG;AACH,eAAO,MAAM,mBAAmB,WACtB,mBAAmB,KAC1B,aA6BF,CAAC"}
1
+ {"version":3,"file":"createDynamicClient.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/client/createDynamicClient/createDynamicClient.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,aAAa,EAAE,mBAAmB,EAAE,MAAM,UAAU,CAAC;AAEnE;;;;;;;;;;GAUG;AACH,eAAO,MAAM,mBAAmB,WACtB,mBAAmB,KAC1B,aAgCF,CAAC"}
@@ -8,6 +8,10 @@ export type DynamicClient = {
8
8
  * Status of client initialization.
9
9
  */
10
10
  readonly initStatus: DynamicCoreState['initStatus'];
11
+ /**
12
+ * The MFA token of the current user.
13
+ */
14
+ readonly mfaToken: string | null;
11
15
  /**
12
16
  * The settings of your Dynamic project as configured in dashboard.
13
17
  */
@@ -1 +1 @@
1
- {"version":3,"file":"DynamicClient.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/client/types/DynamicClient.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,4BAA4B,CAAC;AAElE,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,eAAe,CAAC;AAEtD;;GAEG;AACH,MAAM,MAAM,aAAa,GAAG;IAC1B;;OAEG;IACH,QAAQ,CAAC,UAAU,EAAE,gBAAgB,CAAC,YAAY,CAAC,CAAC;IAEpD;;OAEG;IACH,QAAQ,CAAC,eAAe,EAAE,eAAe,GAAG,IAAI,CAAC;IAEjD;;OAEG;IACH,QAAQ,CAAC,KAAK,EAAE,MAAM,GAAG,IAAI,CAAC;IAE9B;;OAEG;IACH,QAAQ,CAAC,IAAI,EAAE,gBAAgB,CAAC,MAAM,CAAC,CAAC;CACzC,CAAC"}
1
+ {"version":3,"file":"DynamicClient.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/client/types/DynamicClient.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,4BAA4B,CAAC;AAElE,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,eAAe,CAAC;AAEtD;;GAEG;AACH,MAAM,MAAM,aAAa,GAAG;IAC1B;;OAEG;IACH,QAAQ,CAAC,UAAU,EAAE,gBAAgB,CAAC,YAAY,CAAC,CAAC;IAEpD;;OAEG;IACH,QAAQ,CAAC,QAAQ,EAAE,MAAM,GAAG,IAAI,CAAC;IAEjC;;OAEG;IACH,QAAQ,CAAC,eAAe,EAAE,eAAe,GAAG,IAAI,CAAC;IAEjD;;OAEG;IACH,QAAQ,CAAC,KAAK,EAAE,MAAM,GAAG,IAAI,CAAC;IAE9B;;OAEG;IACH,QAAQ,CAAC,IAAI,EAAE,gBAAgB,CAAC,MAAM,CAAC,CAAC;CACzC,CAAC"}
@@ -52,6 +52,7 @@ export { consumeMfaToken } from '../modules/mfa/consumeMfaToken';
52
52
  export { createNewMfaRecoveryCodes } from '../modules/mfa/createNewMfaRecoveryCodes';
53
53
  export { deleteMfaDevice } from '../modules/mfa/deleteMfaDevice';
54
54
  export { getMfaDevices } from '../modules/mfa/getMfaDevices';
55
+ export { getMfaMethods } from '../modules/mfa/getMfaMethods';
55
56
  export { getMfaRecoveryCodes } from '../modules/mfa/getMfaRecoveryCodes';
56
57
  export { isPendingRecoveryCodesAcknowledgment } from '../modules/mfa/isPendingRecoveryCodesAcknowledgment';
57
58
  export { isUserMissingMfaAuth } from '../modules/mfa/isUserMissingMfaAuth';
@@ -1 +1 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../packages/client/src/exports/index.ts"],"names":[],"mappings":"AAGA,OAAO,uBAAuB,CAAC;AAC/B,OAAO,mCAAmC,CAAC;AAC3C,OAAO,sBAAsB,CAAC;AAC9B,OAAO,kCAAkC,CAAC;AAC1C,OAAO,mDAAmD,CAAC;AAG3D,OAAO,wBAAwB,CAAC;AAChC,OAAO,uBAAuB,CAAC;AAC/B,OAAO,0CAA0C,CAAC;AAClD,OAAO,yCAAyC,CAAC;AACjD,OAAO,kDAAkD,CAAC;AAE1D,YAAY,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AACjE,YAAY,EAAE,iBAAiB,EAAE,MAAM,sBAAsB,CAAC;AAC9D,OAAO,EAAE,mBAAmB,EAAE,MAAM,+BAA+B,CAAC;AACpE,YAAY,EAAE,aAAa,EAAE,mBAAmB,EAAE,MAAM,iBAAiB,CAAC;AAC1E,OAAO,EAAE,SAAS,EAAE,MAAM,gBAAgB,CAAC;AAC3C,OAAO,EAAE,6BAA6B,EAAE,MAAM,yCAAyC,CAAC;AACxF,OAAO,EAAE,gCAAgC,EAAE,MAAM,4CAA4C,CAAC;AAC9F,OAAO,EAAE,kBAAkB,EAAE,MAAM,8BAA8B,CAAC;AAClE,OAAO,EAAE,mBAAmB,EAAE,MAAM,+BAA+B,CAAC;AACpE,OAAO,EAAE,gCAAgC,EAAE,MAAM,4CAA4C,CAAC;AAC9F,OAAO,EAAE,0BAA0B,EAAE,MAAM,sCAAsC,CAAC;AAClF,OAAO,EAAE,mBAAmB,EAAE,MAAM,+BAA+B,CAAC;AACpE,OAAO,EAAE,8BAA8B,EAAE,MAAM,0CAA0C,CAAC;AAC1F,OAAO,EAAE,sBAAsB,EAAE,MAAM,kCAAkC,CAAC;AAC1E,OAAO,EAAE,4BAA4B,EAAE,MAAM,wCAAwC,CAAC;AACtF,OAAO,EAAE,yBAAyB,EAAE,MAAM,qCAAqC,CAAC;AAChF,OAAO,EAAE,iCAAiC,EAAE,MAAM,6CAA6C,CAAC;AAChG,OAAO,EAAE,6BAA6B,EAAE,MAAM,yCAAyC,CAAC;AACxF,OAAO,EAAE,qCAAqC,EAAE,MAAM,iDAAiD,CAAC;AACxG,OAAO,EAAE,UAAU,EAAE,MAAM,4BAA4B,CAAC;AACxD,OAAO,EAAE,MAAM,EAAE,MAAM,wBAAwB,CAAC;AAChD,OAAO,EAAE,+BAA+B,EAAE,MAAM,0DAA0D,CAAC;AAC3G,YAAY,EAAE,qCAAqC,EAAE,MAAM,0DAA0D,CAAC;AACtH,OAAO,EAAE,WAAW,EAAE,MAAM,sCAAsC,CAAC;AACnE,OAAO,EAAE,eAAe,EAAE,MAAM,0CAA0C,CAAC;AAC3E,OAAO,EAAE,iBAAiB,EAAE,MAAM,4CAA4C,CAAC;AAC/E,OAAO,EAAE,4BAA4B,EAAE,MAAM,2DAA2D,CAAC;AACzG,OAAO,EAAE,mBAAmB,EAAE,MAAM,kDAAkD,CAAC;AACvF,OAAO,EAAE,wBAAwB,EAAE,MAAM,uDAAuD,CAAC;AACjG,YAAY,EAAE,cAAc,EAAE,MAAM,uDAAuD,CAAC;AAC5F,OAAO,EAAE,qBAAqB,EAAE,MAAM,iEAAiE,CAAC;AACxG,YAAY,EAAE,KAAK,EAAE,MAAM,kBAAkB,CAAC;AAC9C,OAAO,EAAE,QAAQ,EAAE,SAAS,EAAE,OAAO,EAAE,MAAM,mBAAmB,CAAC;AACjE,OAAO,EAAE,YAAY,EAAE,MAAM,mCAAmC,CAAC;AACjE,OAAO,EAAE,gBAAgB,EAAE,MAAM,6BAA6B,CAAC;AAC/D,YAAY,EAAE,iBAAiB,EAAE,MAAM,mCAAmC,CAAC;AAC3E,OAAO,EAAE,wBAAwB,EAAE,MAAM,yCAAyC,CAAC;AACnF,OAAO,EAAE,sBAAsB,EAAE,MAAM,uCAAuC,CAAC;AAC/E,OAAO,EAAE,mBAAmB,EAAE,MAAM,oCAAoC,CAAC;AACzE,OAAO,EAAE,iBAAiB,EAAE,MAAM,kCAAkC,CAAC;AACrE,OAAO,EAAE,eAAe,EAAE,MAAM,gCAAgC,CAAC;AACjE,OAAO,EAAE,yBAAyB,EAAE,MAAM,0CAA0C,CAAC;AACrF,OAAO,EAAE,eAAe,EAAE,MAAM,gCAAgC,CAAC;AACjE,OAAO,EAAE,aAAa,EAAE,MAAM,8BAA8B,CAAC;AAC7D,OAAO,EAAE,mBAAmB,EAAE,MAAM,oCAAoC,CAAC;AACzE,OAAO,EAAE,oCAAoC,EAAE,MAAM,qDAAqD,CAAC;AAC3G,OAAO,EAAE,oBAAoB,EAAE,MAAM,qCAAqC,CAAC;AAC3E,OAAO,EAAE,qBAAqB,EAAE,MAAM,sCAAsC,CAAC;AAC7E,OAAO,EAAE,mBAAmB,EAAE,MAAM,oCAAoC,CAAC;AACzE,YAAY,EAAE,SAAS,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EAAE,YAAY,EAAE,MAAM,6BAA6B,CAAC;AAC3D,OAAO,EAAE,UAAU,EAAE,MAAM,2BAA2B,CAAC;AACvD,YAAY,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AAC5D,OAAO,EAAE,SAAS,EAAE,MAAM,0BAA0B,CAAC;AACrD,OAAO,EAAE,oBAAoB,EAAE,MAAM,iDAAiD,CAAC;AACvF,YAAY,EAAE,gBAAgB,EAAE,MAAM,uBAAuB,CAAC;AAC9D,OAAO,EAAE,UAAU,EAAE,MAAM,4BAA4B,CAAC;AACxD,OAAO,EAAE,sCAAsC,EAAE,MAAM,2DAA2D,CAAC;AACnH,OAAO,EAAE,yBAAyB,EAAE,MAAM,8CAA8C,CAAC;AACzF,OAAO,EAAE,iBAAiB,EAAE,MAAM,sCAAsC,CAAC;AACzE,OAAO,EAAE,kBAAkB,EAAE,MAAM,uCAAuC,CAAC;AAC3E,OAAO,EAAE,uBAAuB,EAAE,MAAM,iEAAiE,CAAC;AAC1G,OAAO,EAAE,0BAA0B,EAAE,MAAM,oEAAoE,CAAC;AAChH,OAAO,EAAE,mBAAmB,EAAE,MAAM,wCAAwC,CAAC;AAC7E,OAAO,EAAE,WAAW,EAAE,MAAM,gCAAgC,CAAC;AAC7D,OAAO,EAAE,mBAAmB,EAAE,MAAM,wCAAwC,CAAC;AAC7E,YAAY,EAAE,aAAa,EAAE,MAAM,kCAAkC,CAAC;AACtE,YAAY,EAAE,cAAc,EAAE,MAAM,mCAAmC,CAAC"}
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../packages/client/src/exports/index.ts"],"names":[],"mappings":"AAGA,OAAO,uBAAuB,CAAC;AAC/B,OAAO,mCAAmC,CAAC;AAC3C,OAAO,sBAAsB,CAAC;AAC9B,OAAO,kCAAkC,CAAC;AAC1C,OAAO,mDAAmD,CAAC;AAG3D,OAAO,wBAAwB,CAAC;AAChC,OAAO,uBAAuB,CAAC;AAC/B,OAAO,0CAA0C,CAAC;AAClD,OAAO,yCAAyC,CAAC;AACjD,OAAO,kDAAkD,CAAC;AAE1D,YAAY,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AACjE,YAAY,EAAE,iBAAiB,EAAE,MAAM,sBAAsB,CAAC;AAC9D,OAAO,EAAE,mBAAmB,EAAE,MAAM,+BAA+B,CAAC;AACpE,YAAY,EAAE,aAAa,EAAE,mBAAmB,EAAE,MAAM,iBAAiB,CAAC;AAC1E,OAAO,EAAE,SAAS,EAAE,MAAM,gBAAgB,CAAC;AAC3C,OAAO,EAAE,6BAA6B,EAAE,MAAM,yCAAyC,CAAC;AACxF,OAAO,EAAE,gCAAgC,EAAE,MAAM,4CAA4C,CAAC;AAC9F,OAAO,EAAE,kBAAkB,EAAE,MAAM,8BAA8B,CAAC;AAClE,OAAO,EAAE,mBAAmB,EAAE,MAAM,+BAA+B,CAAC;AACpE,OAAO,EAAE,gCAAgC,EAAE,MAAM,4CAA4C,CAAC;AAC9F,OAAO,EAAE,0BAA0B,EAAE,MAAM,sCAAsC,CAAC;AAClF,OAAO,EAAE,mBAAmB,EAAE,MAAM,+BAA+B,CAAC;AACpE,OAAO,EAAE,8BAA8B,EAAE,MAAM,0CAA0C,CAAC;AAC1F,OAAO,EAAE,sBAAsB,EAAE,MAAM,kCAAkC,CAAC;AAC1E,OAAO,EAAE,4BAA4B,EAAE,MAAM,wCAAwC,CAAC;AACtF,OAAO,EAAE,yBAAyB,EAAE,MAAM,qCAAqC,CAAC;AAChF,OAAO,EAAE,iCAAiC,EAAE,MAAM,6CAA6C,CAAC;AAChG,OAAO,EAAE,6BAA6B,EAAE,MAAM,yCAAyC,CAAC;AACxF,OAAO,EAAE,qCAAqC,EAAE,MAAM,iDAAiD,CAAC;AACxG,OAAO,EAAE,UAAU,EAAE,MAAM,4BAA4B,CAAC;AACxD,OAAO,EAAE,MAAM,EAAE,MAAM,wBAAwB,CAAC;AAChD,OAAO,EAAE,+BAA+B,EAAE,MAAM,0DAA0D,CAAC;AAC3G,YAAY,EAAE,qCAAqC,EAAE,MAAM,0DAA0D,CAAC;AACtH,OAAO,EAAE,WAAW,EAAE,MAAM,sCAAsC,CAAC;AACnE,OAAO,EAAE,eAAe,EAAE,MAAM,0CAA0C,CAAC;AAC3E,OAAO,EAAE,iBAAiB,EAAE,MAAM,4CAA4C,CAAC;AAC/E,OAAO,EAAE,4BAA4B,EAAE,MAAM,2DAA2D,CAAC;AACzG,OAAO,EAAE,mBAAmB,EAAE,MAAM,kDAAkD,CAAC;AACvF,OAAO,EAAE,wBAAwB,EAAE,MAAM,uDAAuD,CAAC;AACjG,YAAY,EAAE,cAAc,EAAE,MAAM,uDAAuD,CAAC;AAC5F,OAAO,EAAE,qBAAqB,EAAE,MAAM,iEAAiE,CAAC;AACxG,YAAY,EAAE,KAAK,EAAE,MAAM,kBAAkB,CAAC;AAC9C,OAAO,EAAE,QAAQ,EAAE,SAAS,EAAE,OAAO,EAAE,MAAM,mBAAmB,CAAC;AACjE,OAAO,EAAE,YAAY,EAAE,MAAM,mCAAmC,CAAC;AACjE,OAAO,EAAE,gBAAgB,EAAE,MAAM,6BAA6B,CAAC;AAC/D,YAAY,EAAE,iBAAiB,EAAE,MAAM,mCAAmC,CAAC;AAC3E,OAAO,EAAE,wBAAwB,EAAE,MAAM,yCAAyC,CAAC;AACnF,OAAO,EAAE,sBAAsB,EAAE,MAAM,uCAAuC,CAAC;AAC/E,OAAO,EAAE,mBAAmB,EAAE,MAAM,oCAAoC,CAAC;AACzE,OAAO,EAAE,iBAAiB,EAAE,MAAM,kCAAkC,CAAC;AACrE,OAAO,EAAE,eAAe,EAAE,MAAM,gCAAgC,CAAC;AACjE,OAAO,EAAE,yBAAyB,EAAE,MAAM,0CAA0C,CAAC;AACrF,OAAO,EAAE,eAAe,EAAE,MAAM,gCAAgC,CAAC;AACjE,OAAO,EAAE,aAAa,EAAE,MAAM,8BAA8B,CAAC;AAC7D,OAAO,EAAE,aAAa,EAAE,MAAM,8BAA8B,CAAC;AAC7D,OAAO,EAAE,mBAAmB,EAAE,MAAM,oCAAoC,CAAC;AACzE,OAAO,EAAE,oCAAoC,EAAE,MAAM,qDAAqD,CAAC;AAC3G,OAAO,EAAE,oBAAoB,EAAE,MAAM,qCAAqC,CAAC;AAC3E,OAAO,EAAE,qBAAqB,EAAE,MAAM,sCAAsC,CAAC;AAC7E,OAAO,EAAE,mBAAmB,EAAE,MAAM,oCAAoC,CAAC;AACzE,YAAY,EAAE,SAAS,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EAAE,YAAY,EAAE,MAAM,6BAA6B,CAAC;AAC3D,OAAO,EAAE,UAAU,EAAE,MAAM,2BAA2B,CAAC;AACvD,YAAY,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AAC5D,OAAO,EAAE,SAAS,EAAE,MAAM,0BAA0B,CAAC;AACrD,OAAO,EAAE,oBAAoB,EAAE,MAAM,iDAAiD,CAAC;AACvF,YAAY,EAAE,gBAAgB,EAAE,MAAM,uBAAuB,CAAC;AAC9D,OAAO,EAAE,UAAU,EAAE,MAAM,4BAA4B,CAAC;AACxD,OAAO,EAAE,sCAAsC,EAAE,MAAM,2DAA2D,CAAC;AACnH,OAAO,EAAE,yBAAyB,EAAE,MAAM,8CAA8C,CAAC;AACzF,OAAO,EAAE,iBAAiB,EAAE,MAAM,sCAAsC,CAAC;AACzE,OAAO,EAAE,kBAAkB,EAAE,MAAM,uCAAuC,CAAC;AAC3E,OAAO,EAAE,uBAAuB,EAAE,MAAM,iEAAiE,CAAC;AAC1G,OAAO,EAAE,0BAA0B,EAAE,MAAM,oEAAoE,CAAC;AAChH,OAAO,EAAE,mBAAmB,EAAE,MAAM,wCAAwC,CAAC;AAC7E,OAAO,EAAE,WAAW,EAAE,MAAM,gCAAgC,CAAC;AAC7D,OAAO,EAAE,mBAAmB,EAAE,MAAM,wCAAwC,CAAC;AAC7E,YAAY,EAAE,aAAa,EAAE,MAAM,kCAAkC,CAAC;AACtE,YAAY,EAAE,cAAc,EAAE,MAAM,mCAAmC,CAAC"}
@@ -0,0 +1,5 @@
1
+ export declare const DYNAMIC_API_VERSION_HEADER = "x-dyn-api-version";
2
+ export declare const DYNAMIC_REQUEST_ID_HEADER = "x-dyn-request-id";
3
+ export declare const DYNAMIC_SDK_VERSION_HEADER = "x-dyn-version";
4
+ export declare const MFA_TOKEN_HEADER = "x-mfa-auth-token";
5
+ //# sourceMappingURL=constants.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"constants.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/modules/apiClient/constants.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,0BAA0B,sBAAsB,CAAC;AAE9D,eAAO,MAAM,yBAAyB,qBAAqB,CAAC;AAE5D,eAAO,MAAM,0BAA0B,kBAAkB,CAAC;AAE1D,eAAO,MAAM,gBAAgB,qBAAqB,CAAC"}
@@ -1 +1 @@
1
- {"version":3,"file":"createApiClient.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/modules/apiClient/createApiClient.ts"],"names":[],"mappings":"AAAA,OAAO,EAAiB,MAAM,EAAE,MAAM,4BAA4B,CAAC;AAInE,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,oBAAoB,CAAC;AAGxD,OAAO,KAAK,EAAE,sBAAsB,EAAE,MAAM,SAAS,CAAC;AAgBtD;;;;GAIG;AACH,eAAO,MAAM,eAAe,WAClB,aAAa,YACZ,sBAAsB,WAqChC,CAAC"}
1
+ {"version":3,"file":"createApiClient.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/modules/apiClient/createApiClient.ts"],"names":[],"mappings":"AAAA,OAAO,EAAiB,MAAM,EAAE,MAAM,4BAA4B,CAAC;AAInE,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,oBAAoB,CAAC;AASxD,OAAO,KAAK,EAAE,sBAAsB,EAAE,MAAM,SAAS,CAAC;AAiBtD;;;;GAIG;AACH,eAAO,MAAM,eAAe,WAClB,aAAa,YACZ,sBAAsB,WA0ChC,CAAC"}
@@ -31,5 +31,11 @@ export type CreateApiClientOptions = {
31
31
  * ```
32
32
  */
33
33
  errorMappers?: ErrorMapper[];
34
+ /**
35
+ * Whether to include the MFA token in the request headers.
36
+ *
37
+ * @default false
38
+ */
39
+ includeMfaToken?: boolean;
34
40
  };
35
41
  //# sourceMappingURL=types.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/modules/apiClient/types.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;GAeG;AACH,MAAM,MAAM,WAAW,GAAG,CAAC,KAAK,EAAE,KAAK,KAAK,KAAK,GAAG,IAAI,CAAC;AAEzD,MAAM,MAAM,sBAAsB,GAAG;IACnC;;;;;;;;;;;;;OAaG;IACH,YAAY,CAAC,EAAE,WAAW,EAAE,CAAC;CAC9B,CAAC"}
1
+ {"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/modules/apiClient/types.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;GAeG;AACH,MAAM,MAAM,WAAW,GAAG,CAAC,KAAK,EAAE,KAAK,KAAK,KAAK,GAAG,IAAI,CAAC;AAEzD,MAAM,MAAM,sBAAsB,GAAG;IACnC;;;;;;;;;;;;;OAaG;IACH,YAAY,CAAC,EAAE,WAAW,EAAE,CAAC;IAE7B;;;;OAIG;IACH,eAAe,CAAC,EAAE,OAAO,CAAC;CAC3B,CAAC"}
@@ -1 +1 @@
1
- {"version":3,"file":"registerPasskey.d.ts","sourceRoot":"","sources":["../../../../../../../../packages/client/src/modules/auth/passkeys/registerPasskey/registerPasskey.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,0BAA0B,CAAC;AAK9D,eAAO,MAAM,eAAe,WAAkB,aAAa,iEAc1D,CAAC"}
1
+ {"version":3,"file":"registerPasskey.d.ts","sourceRoot":"","sources":["../../../../../../../../packages/client/src/modules/auth/passkeys/registerPasskey/registerPasskey.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,0BAA0B,CAAC;AAM9D,eAAO,MAAM,eAAe,WAAkB,aAAa,iEAgB1D,CAAC"}
@@ -1,4 +1,4 @@
1
1
  import type { MultichainAccountBalanceResponse, MultichainAccountBalancesRequest } from '@dynamic-labs/sdk-api-core';
2
2
  import type { DynamicClient } from '../../../exports';
3
- export declare const getMultichainBalances: (client: DynamicClient, balanceRequests: MultichainAccountBalancesRequest["balanceRequests"]) => Promise<MultichainAccountBalanceResponse["chainBalances"]>;
3
+ export declare const getMultichainBalances: (client: DynamicClient, balanceRequest: MultichainAccountBalancesRequest) => Promise<MultichainAccountBalanceResponse["chainBalances"]>;
4
4
  //# sourceMappingURL=getMultichainBalances.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"getMultichainBalances.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/balances/getMultichainBalances/getMultichainBalances.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EACV,gCAAgC,EAChC,gCAAgC,EACjC,MAAM,4BAA4B,CAAC;AAGpC,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,kBAAkB,CAAC;AAGtD,eAAO,MAAM,qBAAqB,WACxB,aAAa,mBACJ,gCAAgC,CAAC,iBAAiB,CAAC,KACnE,OAAO,CAAC,gCAAgC,CAAC,eAAe,CAAC,CAY3D,CAAC"}
1
+ {"version":3,"file":"getMultichainBalances.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/balances/getMultichainBalances/getMultichainBalances.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EACV,gCAAgC,EAChC,gCAAgC,EACjC,MAAM,4BAA4B,CAAC;AAGpC,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,kBAAkB,CAAC;AAGtD,eAAO,MAAM,qBAAqB,WACxB,aAAa,kBACL,gCAAgC,KAC/C,OAAO,CAAC,gCAAgC,CAAC,eAAe,CAAC,CAU3D,CAAC"}
@@ -0,0 +1,9 @@
1
+ import type { DynamicClient } from '../../../client/types';
2
+ export declare const getMfaMethods: (client: DynamicClient, { verifiedOnly }?: {
3
+ verifiedOnly?: boolean;
4
+ }) => Promise<{
5
+ devices: import("@dynamic-labs/sdk-api-core").MFADevice[];
6
+ passkeys: import("@dynamic-labs/sdk-api-core").UserPasskey[];
7
+ userHasVerifiedMfaMethods: boolean;
8
+ }>;
9
+ //# sourceMappingURL=getMfaMethods.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"getMfaMethods.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/mfa/getMfaMethods/getMfaMethods.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAI3D,eAAO,MAAM,aAAa,WAChB,aAAa,qBACK;IAAE,YAAY,CAAC,EAAE,OAAO,CAAA;CAAE;;;;EAmBrD,CAAC"}
@@ -0,0 +1,2 @@
1
+ export { getMfaMethods } from './getMfaMethods';
2
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/mfa/getMfaMethods/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,aAAa,EAAE,MAAM,iBAAiB,CAAC"}
@@ -7,16 +7,18 @@ import type { DynamicClient } from '../../../client/types';
7
7
  */
8
8
  export declare const stateChangeEvents: {
9
9
  initStatus: "initStatusChanged";
10
+ mfaToken: "mfaTokenChanged";
10
11
  projectSettings: "projectSettingsChanged";
11
12
  token: "tokenChanged";
12
13
  user: "userChanged";
13
14
  };
14
15
  declare global {
15
16
  interface DynamicEvents {
16
- 'initStatusChanged': (value: DynamicClient['initStatus'], previous: DynamicClient['initStatus']) => void;
17
- 'projectSettingsChanged': (value: DynamicClient['projectSettings'], previous: DynamicClient['projectSettings']) => void;
18
- 'tokenChanged': (value: DynamicClient['token'], previous: DynamicClient['token']) => void;
19
- 'userChanged': (value: DynamicClient['user'], previous: DynamicClient['user']) => void;
17
+ initStatusChanged: (value: DynamicClient['initStatus'], previous: DynamicClient['initStatus']) => void;
18
+ mfaTokenChanged: (value: DynamicClient['mfaToken'], previous: DynamicClient['mfaToken']) => void;
19
+ projectSettingsChanged: (value: DynamicClient['projectSettings'], previous: DynamicClient['projectSettings']) => void;
20
+ tokenChanged: (value: DynamicClient['token'], previous: DynamicClient['token']) => void;
21
+ userChanged: (value: DynamicClient['user'], previous: DynamicClient['user']) => void;
20
22
  }
21
23
  }
22
24
  //# sourceMappingURL=events.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"events.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/state/raiseStateEvents/events.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAE3D;;;;;GAKG;AACH,eAAO,MAAM,iBAAiB;;;;;CAO7B,CAAC;AAGF,OAAO,CAAC,MAAM,CAAC;IACb,UAAU,aAAa;QACrB,mBAAmB,EAAE,CACnB,KAAK,EAAE,aAAa,CAAC,YAAY,CAAC,EAClC,QAAQ,EAAE,aAAa,CAAC,YAAY,CAAC,KAClC,IAAI,CAAC;QAEV,wBAAwB,EAAE,CACxB,KAAK,EAAE,aAAa,CAAC,iBAAiB,CAAC,EACvC,QAAQ,EAAE,aAAa,CAAC,iBAAiB,CAAC,KACvC,IAAI,CAAC;QAEV,cAAc,EAAE,CACd,KAAK,EAAE,aAAa,CAAC,OAAO,CAAC,EAC7B,QAAQ,EAAE,aAAa,CAAC,OAAO,CAAC,KAC7B,IAAI,CAAC;QAEV,aAAa,EAAE,CACb,KAAK,EAAE,aAAa,CAAC,MAAM,CAAC,EAC5B,QAAQ,EAAE,aAAa,CAAC,MAAM,CAAC,KAC5B,IAAI,CAAC;KACX;CACF"}
1
+ {"version":3,"file":"events.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/state/raiseStateEvents/events.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAE3D;;;;;GAKG;AACH,eAAO,MAAM,iBAAiB;;;;;;CAQ7B,CAAC;AAGF,OAAO,CAAC,MAAM,CAAC;IACb,UAAU,aAAa;QACrB,iBAAiB,EAAE,CACjB,KAAK,EAAE,aAAa,CAAC,YAAY,CAAC,EAClC,QAAQ,EAAE,aAAa,CAAC,YAAY,CAAC,KAClC,IAAI,CAAC;QAEV,eAAe,EAAE,CACf,KAAK,EAAE,aAAa,CAAC,UAAU,CAAC,EAChC,QAAQ,EAAE,aAAa,CAAC,UAAU,CAAC,KAChC,IAAI,CAAC;QAEV,sBAAsB,EAAE,CACtB,KAAK,EAAE,aAAa,CAAC,iBAAiB,CAAC,EACvC,QAAQ,EAAE,aAAa,CAAC,iBAAiB,CAAC,KACvC,IAAI,CAAC;QAEV,YAAY,EAAE,CACZ,KAAK,EAAE,aAAa,CAAC,OAAO,CAAC,EAC7B,QAAQ,EAAE,aAAa,CAAC,OAAO,CAAC,KAC7B,IAAI,CAAC;QAEV,WAAW,EAAE,CACX,KAAK,EAAE,aAAa,CAAC,MAAM,CAAC,EAC5B,QAAQ,EAAE,aAAa,CAAC,MAAM,CAAC,KAC5B,IAAI,CAAC;KACX;CACF"}
@@ -1 +1 @@
1
- {"version":3,"file":"createWebPasskeyService.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/services/passkey/createWebPasskeyService/createWebPasskeyService.ts"],"names":[],"mappings":"AAMA,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,UAAU,CAAC;AAE/C;;GAEG;AACH,eAAO,MAAM,uBAAuB,QAAO,cAIzC,CAAC"}
1
+ {"version":3,"file":"createWebPasskeyService.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/services/passkey/createWebPasskeyService/createWebPasskeyService.ts"],"names":[],"mappings":"AAaA,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,UAAU,CAAC;AAE/C;;GAEG;AACH,eAAO,MAAM,uBAAuB,QAAO,cAIzC,CAAC"}