@dynamic-labs-sdk/client 0.1.0-alpha.0 → 0.1.0-alpha.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (33) hide show
  1. package/CHANGELOG.md +8 -0
  2. package/getChainFromVerifiedCredentialChain.cjs.js +1 -1
  3. package/getChainFromVerifiedCredentialChain.esm.js +1 -1
  4. package/index.cjs.js +47 -44
  5. package/index.esm.js +46 -43
  6. package/package.json +2 -2
  7. package/refreshUser.cjs.js +0 -22
  8. package/refreshUser.esm.js +0 -22
  9. package/src/exports/index.d.ts +3 -3
  10. package/src/exports/index.d.ts.map +1 -1
  11. package/src/modules/auth/events.d.ts +1 -7
  12. package/src/modules/auth/events.d.ts.map +1 -1
  13. package/src/modules/auth/updateAuthFromVerifyResponse/updateAuthFromVerifyResponse.d.ts.map +1 -1
  14. package/src/modules/mfa/{authMfaRecoveryCode/authMfaRecoveryCode.d.ts → authenticateMfaRecoveryCode/authenticateMfaRecoveryCode.d.ts} +5 -3
  15. package/src/modules/mfa/authenticateMfaRecoveryCode/authenticateMfaRecoveryCode.d.ts.map +1 -0
  16. package/src/modules/mfa/authenticateMfaRecoveryCode/index.d.ts +2 -0
  17. package/src/modules/mfa/authenticateMfaRecoveryCode/index.d.ts.map +1 -0
  18. package/src/modules/mfa/{authTotpMfaDevice/authTotpMfaDevice.d.ts → authenticateTotpMfaDevice/authenticateTotpMfaDevice.d.ts} +3 -3
  19. package/src/modules/mfa/authenticateTotpMfaDevice/authenticateTotpMfaDevice.d.ts.map +1 -0
  20. package/src/modules/mfa/authenticateTotpMfaDevice/index.d.ts +2 -0
  21. package/src/modules/mfa/authenticateTotpMfaDevice/index.d.ts.map +1 -0
  22. package/src/modules/otp/sendEmailOTP/sendEmailOTP.d.ts +2 -0
  23. package/src/modules/otp/sendEmailOTP/sendEmailOTP.d.ts.map +1 -1
  24. package/src/modules/auth/updateAuthFromVerifyResponse/checkAndRaiseAuthenticatedEvent/checkAndRaiseAuthenticatedEvent.d.ts +0 -10
  25. package/src/modules/auth/updateAuthFromVerifyResponse/checkAndRaiseAuthenticatedEvent/checkAndRaiseAuthenticatedEvent.d.ts.map +0 -1
  26. package/src/modules/auth/updateAuthFromVerifyResponse/checkAndRaiseAuthenticatedEvent/index.d.ts +0 -2
  27. package/src/modules/auth/updateAuthFromVerifyResponse/checkAndRaiseAuthenticatedEvent/index.d.ts.map +0 -1
  28. package/src/modules/mfa/authMfaRecoveryCode/authMfaRecoveryCode.d.ts.map +0 -1
  29. package/src/modules/mfa/authMfaRecoveryCode/index.d.ts +0 -2
  30. package/src/modules/mfa/authMfaRecoveryCode/index.d.ts.map +0 -1
  31. package/src/modules/mfa/authTotpMfaDevice/authTotpMfaDevice.d.ts.map +0 -1
  32. package/src/modules/mfa/authTotpMfaDevice/index.d.ts +0 -2
  33. package/src/modules/mfa/authTotpMfaDevice/index.d.ts.map +0 -1
package/CHANGELOG.md CHANGED
@@ -1,3 +1,11 @@
1
+ ## 0.1.0-alpha.2 (2025-09-08)
2
+
3
+ This was a version bump only, there were no code changes.
4
+
5
+ ## 0.1.0-alpha.1 (2025-09-02)
6
+
7
+ This was a version bump only, there were no code changes.
8
+
1
9
  ## 0.1.0-alpha.0 (2025-09-02)
2
10
 
3
11
  ### 🚀 Features
@@ -4,7 +4,7 @@ var sdkApiCore = require('@dynamic-labs/sdk-api-core');
4
4
  var buffer = require('buffer');
5
5
 
6
6
  var name = "@dynamic-labs-sdk/client";
7
- var version = "0.1.0-alpha.0";
7
+ var version = "0.1.0-alpha.2";
8
8
  var dependencies = {
9
9
  "@dynamic-labs/sdk-api-core": "0.0.762"};
10
10
 
@@ -2,7 +2,7 @@ import { AuthStorageEnum, SDKApi, Configuration } from '@dynamic-labs/sdk-api-co
2
2
  import { Buffer as Buffer$1 } from 'buffer';
3
3
 
4
4
  var name = "@dynamic-labs-sdk/client";
5
- var version = "0.1.0-alpha.0";
5
+ var version = "0.1.0-alpha.2";
6
6
  var dependencies = {
7
7
  "@dynamic-labs/sdk-api-core": "0.0.762"};
8
8
 
package/index.cjs.js CHANGED
@@ -1515,6 +1515,47 @@ const providersRequiringPkce = [
1515
1515
  }, client);
1516
1516
  };
1517
1517
 
1518
+ /**
1519
+ * Authenticates using an MFA recovery code.
1520
+ *
1521
+ * This function allows users to bypass normal MFA requirements by using
1522
+ * one of their backup recovery codes when none of the registered MFA methods are available.
1523
+ *
1524
+ * @param params.code - The recovery code to authenticate with.
1525
+ * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
1526
+ * @returns A promise that resolves to the MFA authentication response with token.
1527
+ */ const authenticateMfaRecoveryCode = async ({ code, createMfaTokenOptions }, client = getChainFromVerifiedCredentialChain.getDefaultClient())=>{
1528
+ const core = getChainFromVerifiedCredentialChain.getCore(client);
1529
+ const apiClient = getChainFromVerifiedCredentialChain.createApiClient({}, client);
1530
+ try {
1531
+ const response = await apiClient.authMfaRecovery({
1532
+ environmentId: core.environmentId,
1533
+ mFAAuthRecoveryDevicePostRequest: {
1534
+ code,
1535
+ createMfaToken: createMfaTokenOptions
1536
+ }
1537
+ });
1538
+ refreshUser.updateAuthFromVerifyResponse({
1539
+ response
1540
+ }, client);
1541
+ getWalletProviderByKey.emitEvent({
1542
+ args: {
1543
+ mfaToken: response.mfaToken
1544
+ },
1545
+ event: 'mfaCompletionSuccess'
1546
+ }, client);
1547
+ return response;
1548
+ } catch (error) {
1549
+ getWalletProviderByKey.emitEvent({
1550
+ args: {
1551
+ error
1552
+ },
1553
+ event: 'mfaCompletionFailure'
1554
+ }, client);
1555
+ throw error;
1556
+ }
1557
+ };
1558
+
1518
1559
  const getPasskeyAuthenticationOptions = async (client)=>{
1519
1560
  const core = getChainFromVerifiedCredentialChain.getCore(client);
1520
1561
  const apiClient = getChainFromVerifiedCredentialChain.createApiClient({}, client);
@@ -1596,46 +1637,6 @@ const serverAuthenticatePasskey = async ({ authentication, createMfaToken }, cli
1596
1637
  }
1597
1638
  };
1598
1639
 
1599
- /**
1600
- * Authenticates using an MFA recovery code.
1601
- *
1602
- * This function allows users to bypass normal MFA requirements by using
1603
- * one of their backup recovery codes when none of the registered MFA methods are available.
1604
- *
1605
- * @param params.code - The recovery code to authenticate with.
1606
- * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
1607
- * @returns A promise that resolves to the MFA authentication response with token.
1608
- */ const authMfaRecoveryCode = async ({ code }, client = getChainFromVerifiedCredentialChain.getDefaultClient())=>{
1609
- const core = getChainFromVerifiedCredentialChain.getCore(client);
1610
- const apiClient = getChainFromVerifiedCredentialChain.createApiClient({}, client);
1611
- try {
1612
- const response = await apiClient.authMfaRecovery({
1613
- environmentId: core.environmentId,
1614
- mFAAuthRecoveryDevicePostRequest: {
1615
- code
1616
- }
1617
- });
1618
- refreshUser.updateAuthFromVerifyResponse({
1619
- response
1620
- }, client);
1621
- getWalletProviderByKey.emitEvent({
1622
- args: {
1623
- mfaToken: response.mfaToken
1624
- },
1625
- event: 'mfaCompletionSuccess'
1626
- }, client);
1627
- return response;
1628
- } catch (error) {
1629
- getWalletProviderByKey.emitEvent({
1630
- args: {
1631
- error
1632
- },
1633
- event: 'mfaCompletionFailure'
1634
- }, client);
1635
- throw error;
1636
- }
1637
- };
1638
-
1639
1640
  /**
1640
1641
  * Authenticates using a TOTP (Time-based One-Time Password) MFA device.
1641
1642
  *
@@ -1647,7 +1648,7 @@ const serverAuthenticatePasskey = async ({ authentication, createMfaToken }, cli
1647
1648
  * @param [params.createMfaTokenOptions] - Optional configuration for MFA token creation.
1648
1649
  * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
1649
1650
  * @returns A promise that resolves to the MFA authentication response.
1650
- */ const authTotpMfaDevice = async ({ deviceId, code, createMfaTokenOptions }, client = getChainFromVerifiedCredentialChain.getDefaultClient())=>{
1651
+ */ const authenticateTotpMfaDevice = async ({ deviceId, code, createMfaTokenOptions }, client = getChainFromVerifiedCredentialChain.getDefaultClient())=>{
1651
1652
  const core = getChainFromVerifiedCredentialChain.getCore(client);
1652
1653
  const apiClient = getChainFromVerifiedCredentialChain.createApiClient({}, client);
1653
1654
  try {
@@ -1824,6 +1825,8 @@ const serverAuthenticatePasskey = async ({ authentication, createMfaToken }, cli
1824
1825
  /**
1825
1826
  * Sends a one-time password (OTP) to the specified email address.
1826
1827
  *
1828
+ * Once you have the OTP code, you should then use `verifyOTP` to verify it and complete the authentication process.
1829
+ *
1827
1830
  * @param params.email - The email address to send the OTP to.
1828
1831
  * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
1829
1832
  * @returns A promise that resolves to an OTPVerification object containing the email and verification UUID.
@@ -3240,7 +3243,7 @@ const isSameAddress = (left, right, chain)=>refreshUser.normalizeAddress(left, c
3240
3243
  walletAccount
3241
3244
  }, client);
3242
3245
  const { networkId } = await walletProvider.getActiveNetworkId();
3243
- const networksData = getNetworkProviderFromNetworkId.getNetworksData();
3246
+ const networksData = getNetworkProviderFromNetworkId.getNetworksData(client);
3244
3247
  const activeNetworkData = networksData.find((data)=>data.networkId === networkId && data.chain === walletProvider.chain);
3245
3248
  return {
3246
3249
  networkData: activeNetworkData
@@ -3543,9 +3546,9 @@ exports.WalletProviderMethodUnavailableError = WalletProviderMethodUnavailableEr
3543
3546
  exports.acknowledgeRecoveryCodes = acknowledgeRecoveryCodes;
3544
3547
  exports.assertWalletAccountSigningAvailability = assertWalletAccountSigningAvailability;
3545
3548
  exports.assertWalletProviderMethodDefined = assertWalletProviderMethodDefined;
3546
- exports.authMfaRecoveryCode = authMfaRecoveryCode;
3547
- exports.authTotpMfaDevice = authTotpMfaDevice;
3549
+ exports.authenticateMfaRecoveryCode = authenticateMfaRecoveryCode;
3548
3550
  exports.authenticatePasskeyMFA = authenticatePasskeyMFA;
3551
+ exports.authenticateTotpMfaDevice = authenticateTotpMfaDevice;
3549
3552
  exports.completeSocialRedirectSignIn = completeSocialRedirectSignIn;
3550
3553
  exports.connectAndVerifyWithWalletProvider = connectAndVerifyWithWalletProvider;
3551
3554
  exports.connectWithWalletProvider = connectWithWalletProvider;
package/index.esm.js CHANGED
@@ -1499,6 +1499,47 @@ const providersRequiringPkce = [
1499
1499
  }, client);
1500
1500
  };
1501
1501
 
1502
+ /**
1503
+ * Authenticates using an MFA recovery code.
1504
+ *
1505
+ * This function allows users to bypass normal MFA requirements by using
1506
+ * one of their backup recovery codes when none of the registered MFA methods are available.
1507
+ *
1508
+ * @param params.code - The recovery code to authenticate with.
1509
+ * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
1510
+ * @returns A promise that resolves to the MFA authentication response with token.
1511
+ */ const authenticateMfaRecoveryCode = async ({ code, createMfaTokenOptions }, client = getDefaultClient())=>{
1512
+ const core = getCore(client);
1513
+ const apiClient = createApiClient({}, client);
1514
+ try {
1515
+ const response = await apiClient.authMfaRecovery({
1516
+ environmentId: core.environmentId,
1517
+ mFAAuthRecoveryDevicePostRequest: {
1518
+ code,
1519
+ createMfaToken: createMfaTokenOptions
1520
+ }
1521
+ });
1522
+ updateAuthFromVerifyResponse({
1523
+ response
1524
+ }, client);
1525
+ emitEvent({
1526
+ args: {
1527
+ mfaToken: response.mfaToken
1528
+ },
1529
+ event: 'mfaCompletionSuccess'
1530
+ }, client);
1531
+ return response;
1532
+ } catch (error) {
1533
+ emitEvent({
1534
+ args: {
1535
+ error
1536
+ },
1537
+ event: 'mfaCompletionFailure'
1538
+ }, client);
1539
+ throw error;
1540
+ }
1541
+ };
1542
+
1502
1543
  const getPasskeyAuthenticationOptions = async (client)=>{
1503
1544
  const core = getCore(client);
1504
1545
  const apiClient = createApiClient({}, client);
@@ -1580,46 +1621,6 @@ const serverAuthenticatePasskey = async ({ authentication, createMfaToken }, cli
1580
1621
  }
1581
1622
  };
1582
1623
 
1583
- /**
1584
- * Authenticates using an MFA recovery code.
1585
- *
1586
- * This function allows users to bypass normal MFA requirements by using
1587
- * one of their backup recovery codes when none of the registered MFA methods are available.
1588
- *
1589
- * @param params.code - The recovery code to authenticate with.
1590
- * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
1591
- * @returns A promise that resolves to the MFA authentication response with token.
1592
- */ const authMfaRecoveryCode = async ({ code }, client = getDefaultClient())=>{
1593
- const core = getCore(client);
1594
- const apiClient = createApiClient({}, client);
1595
- try {
1596
- const response = await apiClient.authMfaRecovery({
1597
- environmentId: core.environmentId,
1598
- mFAAuthRecoveryDevicePostRequest: {
1599
- code
1600
- }
1601
- });
1602
- updateAuthFromVerifyResponse({
1603
- response
1604
- }, client);
1605
- emitEvent({
1606
- args: {
1607
- mfaToken: response.mfaToken
1608
- },
1609
- event: 'mfaCompletionSuccess'
1610
- }, client);
1611
- return response;
1612
- } catch (error) {
1613
- emitEvent({
1614
- args: {
1615
- error
1616
- },
1617
- event: 'mfaCompletionFailure'
1618
- }, client);
1619
- throw error;
1620
- }
1621
- };
1622
-
1623
1624
  /**
1624
1625
  * Authenticates using a TOTP (Time-based One-Time Password) MFA device.
1625
1626
  *
@@ -1631,7 +1632,7 @@ const serverAuthenticatePasskey = async ({ authentication, createMfaToken }, cli
1631
1632
  * @param [params.createMfaTokenOptions] - Optional configuration for MFA token creation.
1632
1633
  * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
1633
1634
  * @returns A promise that resolves to the MFA authentication response.
1634
- */ const authTotpMfaDevice = async ({ deviceId, code, createMfaTokenOptions }, client = getDefaultClient())=>{
1635
+ */ const authenticateTotpMfaDevice = async ({ deviceId, code, createMfaTokenOptions }, client = getDefaultClient())=>{
1635
1636
  const core = getCore(client);
1636
1637
  const apiClient = createApiClient({}, client);
1637
1638
  try {
@@ -1808,6 +1809,8 @@ const serverAuthenticatePasskey = async ({ authentication, createMfaToken }, cli
1808
1809
  /**
1809
1810
  * Sends a one-time password (OTP) to the specified email address.
1810
1811
  *
1812
+ * Once you have the OTP code, you should then use `verifyOTP` to verify it and complete the authentication process.
1813
+ *
1811
1814
  * @param params.email - The email address to send the OTP to.
1812
1815
  * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
1813
1816
  * @returns A promise that resolves to an OTPVerification object containing the email and verification UUID.
@@ -3224,7 +3227,7 @@ const isSameAddress = (left, right, chain)=>normalizeAddress(left, chain) === no
3224
3227
  walletAccount
3225
3228
  }, client);
3226
3229
  const { networkId } = await walletProvider.getActiveNetworkId();
3227
- const networksData = getNetworksData();
3230
+ const networksData = getNetworksData(client);
3228
3231
  const activeNetworkData = networksData.find((data)=>data.networkId === networkId && data.chain === walletProvider.chain);
3229
3232
  return {
3230
3233
  networkData: activeNetworkData
@@ -3489,4 +3492,4 @@ const isSameAddress = (left, right, chain)=>normalizeAddress(left, chain) === no
3489
3492
 
3490
3493
  assertPackageVersion(name, version);
3491
3494
 
3492
- export { BaseError, ClientAlreadyInitializedError, InvalidRedirectStorageStateError, MissingRedirectStorageStateError, MissingSocialUrlParamError, NetworkSwitchingUnavailableError, NoAddressFoundError, NoPasskeyCredentialsFoundError, NoWebAuthNSupportError, UnavailableInServerSideError, UnrecognizedNetworkError, UserNotAuthenticatedError, UserRejectedError, WalletAccountAlreadyVerifiedError, WalletAccountNotSelectedError, WalletAlreadyLinkedToAnotherUserError, WalletProviderMethodUnavailableError, acknowledgeRecoveryCodes, assertWalletAccountSigningAvailability, assertWalletProviderMethodDefined, authMfaRecoveryCode, authTotpMfaDevice, authenticatePasskeyMFA, completeSocialRedirectSignIn, connectAndVerifyWithWalletProvider, connectWithWalletProvider, createDynamicClient, createNewMfaRecoveryCodes, deleteMfaDevice, deletePasskey, detectOAuthRedirect, fetchProjectSettings, getActiveNetworkData, getActiveNetworkId, getAvailableWalletProvidersData, getBalance, getBalanceForAddress, getConnectedAddresses, getDefaultClient, getMfaDevices, getMfaRecoveryCodes, getMultichainBalances, getNetworksData, getPasskeys, getPrimaryWalletAccount, getWalletAccountFromAddress, getWalletAccounts, initializeClient, isPendingRecoveryCodesAcknowledgment, isProgrammaticNetworkSwitchAvailable, isSignedIn, isUserMissingMfaAuth, logout, offWalletProviderEvent, onWalletProviderEvent, proveWalletAccountOwnership, registerPasskey, registerTotpMfaDevice, removeWalletAccount, selectPrimaryWalletAccount, sendEmailOTP, sendSmsOTP, setDefaultMfaDevice, signInWithExternalJwt, signInWithPasskey, signInWithSocialRedirect, signMessage, switchActiveNetwork, updateUser, verifyOTP, verifyWalletAccount };
3495
+ export { BaseError, ClientAlreadyInitializedError, InvalidRedirectStorageStateError, MissingRedirectStorageStateError, MissingSocialUrlParamError, NetworkSwitchingUnavailableError, NoAddressFoundError, NoPasskeyCredentialsFoundError, NoWebAuthNSupportError, UnavailableInServerSideError, UnrecognizedNetworkError, UserNotAuthenticatedError, UserRejectedError, WalletAccountAlreadyVerifiedError, WalletAccountNotSelectedError, WalletAlreadyLinkedToAnotherUserError, WalletProviderMethodUnavailableError, acknowledgeRecoveryCodes, assertWalletAccountSigningAvailability, assertWalletProviderMethodDefined, authenticateMfaRecoveryCode, authenticatePasskeyMFA, authenticateTotpMfaDevice, completeSocialRedirectSignIn, connectAndVerifyWithWalletProvider, connectWithWalletProvider, createDynamicClient, createNewMfaRecoveryCodes, deleteMfaDevice, deletePasskey, detectOAuthRedirect, fetchProjectSettings, getActiveNetworkData, getActiveNetworkId, getAvailableWalletProvidersData, getBalance, getBalanceForAddress, getConnectedAddresses, getDefaultClient, getMfaDevices, getMfaRecoveryCodes, getMultichainBalances, getNetworksData, getPasskeys, getPrimaryWalletAccount, getWalletAccountFromAddress, getWalletAccounts, initializeClient, isPendingRecoveryCodesAcknowledgment, isProgrammaticNetworkSwitchAvailable, isSignedIn, isUserMissingMfaAuth, logout, offWalletProviderEvent, onWalletProviderEvent, proveWalletAccountOwnership, registerPasskey, registerTotpMfaDevice, removeWalletAccount, selectPrimaryWalletAccount, sendEmailOTP, sendSmsOTP, setDefaultMfaDevice, signInWithExternalJwt, signInWithPasskey, signInWithSocialRedirect, signMessage, switchActiveNetwork, updateUser, verifyOTP, verifyWalletAccount };
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@dynamic-labs-sdk/client",
3
- "version": "0.1.0-alpha.0",
3
+ "version": "0.1.0-alpha.2",
4
4
  "type": "module",
5
5
  "main": "./index.cjs.js",
6
6
  "module": "./index.esm.js",
@@ -29,7 +29,7 @@
29
29
  }
30
30
  },
31
31
  "dependencies": {
32
- "@dynamic-labs-sdk/assert-package-version": "0.1.0-alpha.0",
32
+ "@dynamic-labs-sdk/assert-package-version": "0.1.0-alpha.2",
33
33
  "@dynamic-labs/sdk-api-core": "0.0.762",
34
34
  "@dynamic-labs-wallet/browser-wallet-client": "0.0.144",
35
35
  "@simplewebauthn/browser": "^13.1.0",
@@ -95,24 +95,6 @@ class NotWaasWalletAccountError extends getChainFromVerifiedCredentialChain.Base
95
95
  }
96
96
  }
97
97
 
98
- const checkAndRaiseAuthenticatedEvent = ({ previousState, response }, client)=>{
99
- const core = getChainFromVerifiedCredentialChain.getCore(client);
100
- /*
101
- * If there was no user before, it means we are signing in
102
- * we should check user and not jwt because of cookie based auth
103
- */ const isSigningIn = previousState.user === null;
104
- if (!isSigningIn) {
105
- return;
106
- }
107
- core.logger.debug('[updateAuthFromVerifyResponse] sign in detected, raising authenticated event');
108
- getWalletProviderByKey.emitEvent({
109
- args: {
110
- verifyResponse: response
111
- },
112
- event: 'authenticated'
113
- }, client);
114
- };
115
-
116
98
  /**
117
99
  * Emits the `walletAccountsChanged` event.
118
100
  */ const emitWalletAccountsChangedEvent = (client)=>{
@@ -146,10 +128,6 @@ const updateAuthFromVerifyResponse = ({ response }, client)=>{
146
128
  token: minifiedJwt != null ? minifiedJwt : null,
147
129
  user
148
130
  });
149
- checkAndRaiseAuthenticatedEvent({
150
- previousState,
151
- response
152
- }, client);
153
131
  checkAndRaiseWalletAccountsChangedEvent({
154
132
  previousState
155
133
  }, client);
@@ -93,24 +93,6 @@ class NotWaasWalletAccountError extends BaseError {
93
93
  }
94
94
  }
95
95
 
96
- const checkAndRaiseAuthenticatedEvent = ({ previousState, response }, client)=>{
97
- const core = getCore(client);
98
- /*
99
- * If there was no user before, it means we are signing in
100
- * we should check user and not jwt because of cookie based auth
101
- */ const isSigningIn = previousState.user === null;
102
- if (!isSigningIn) {
103
- return;
104
- }
105
- core.logger.debug('[updateAuthFromVerifyResponse] sign in detected, raising authenticated event');
106
- emitEvent({
107
- args: {
108
- verifyResponse: response
109
- },
110
- event: 'authenticated'
111
- }, client);
112
- };
113
-
114
96
  /**
115
97
  * Emits the `walletAccountsChanged` event.
116
98
  */ const emitWalletAccountsChangedEvent = (client)=>{
@@ -144,10 +126,6 @@ const updateAuthFromVerifyResponse = ({ response }, client)=>{
144
126
  token: minifiedJwt != null ? minifiedJwt : null,
145
127
  user
146
128
  });
147
- checkAndRaiseAuthenticatedEvent({
148
- previousState,
149
- response
150
- }, client);
151
129
  checkAndRaiseWalletAccountsChangedEvent({
152
130
  previousState
153
131
  }, client);
@@ -9,7 +9,7 @@ import '../modules/mfa/events';
9
9
  import '../modules/state/raiseStateEvents/events';
10
10
  import '../modules/wallets/walletAccount/events';
11
11
  import '../modules/wallets/walletProviderRegistry/events';
12
- export type { CreateMfaToken } from '@dynamic-labs/sdk-api-core';
12
+ export type { CreateMfaToken, MFAAction } from '@dynamic-labs/sdk-api-core';
13
13
  export type { DynamicCoreConfig } from '../client/core/types';
14
14
  export { createDynamicClient } from '../client/createDynamicClient';
15
15
  export { getDefaultClient } from '../client/defaultClient';
@@ -56,9 +56,9 @@ export { hasExtension } from '../modules/extension/hasExtension';
56
56
  export { initializeClient } from '../modules/initializeClient';
57
57
  export type { DynamicInitStatus } from '../modules/initializeClient/state';
58
58
  export { acknowledgeRecoveryCodes } from '../modules/mfa/acknowledgeRecoveryCodes';
59
+ export { authenticateMfaRecoveryCode } from '../modules/mfa/authenticateMfaRecoveryCode';
59
60
  export { authenticatePasskeyMFA } from '../modules/mfa/authenticatePasskeyMFA';
60
- export { authMfaRecoveryCode } from '../modules/mfa/authMfaRecoveryCode';
61
- export { authTotpMfaDevice } from '../modules/mfa/authTotpMfaDevice';
61
+ export { authenticateTotpMfaDevice } from '../modules/mfa/authenticateTotpMfaDevice';
62
62
  export { consumeMfaToken } from '../modules/mfa/consumeMfaToken';
63
63
  export { createNewMfaRecoveryCodes } from '../modules/mfa/createNewMfaRecoveryCodes';
64
64
  export { deleteMfaDevice } from '../modules/mfa/deleteMfaDevice';
@@ -1 +1 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../packages/client/src/exports/index.ts"],"names":[],"mappings":"AAWA,OAAO,uBAAuB,CAAC;AAC/B,OAAO,mCAAmC,CAAC;AAC3C,OAAO,sBAAsB,CAAC;AAC9B,OAAO,kCAAkC,CAAC;AAC1C,OAAO,8BAA8B,CAAC;AACtC,OAAO,mDAAmD,CAAC;AAG3D,OAAO,wBAAwB,CAAC;AAChC,OAAO,uBAAuB,CAAC;AAC/B,OAAO,0CAA0C,CAAC;AAClD,OAAO,yCAAyC,CAAC;AACjD,OAAO,kDAAkD,CAAC;AAE1D,YAAY,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AACjE,YAAY,EAAE,iBAAiB,EAAE,MAAM,sBAAsB,CAAC;AAC9D,OAAO,EAAE,mBAAmB,EAAE,MAAM,+BAA+B,CAAC;AACpE,OAAO,EAAE,gBAAgB,EAAE,MAAM,yBAAyB,CAAC;AAC3D,YAAY,EAAE,aAAa,EAAE,mBAAmB,EAAE,MAAM,iBAAiB,CAAC;AAC1E,OAAO,EAAE,SAAS,EAAE,KAAK,mBAAmB,EAAE,MAAM,gBAAgB,CAAC;AACrE,OAAO,EAAE,6BAA6B,EAAE,MAAM,yCAAyC,CAAC;AACxF,OAAO,EAAE,wBAAwB,EAAE,MAAM,oCAAoC,CAAC;AAC9E,OAAO,EAAE,iBAAiB,EAAE,MAAM,6BAA6B,CAAC;AAChE,OAAO,EAAE,gCAAgC,EAAE,MAAM,4CAA4C,CAAC;AAC9F,OAAO,EAAE,kBAAkB,EAAE,MAAM,8BAA8B,CAAC;AAClE,OAAO,EAAE,mBAAmB,EAAE,MAAM,+BAA+B,CAAC;AACpE,OAAO,EAAE,gCAAgC,EAAE,MAAM,4CAA4C,CAAC;AAC9F,OAAO,EAAE,0BAA0B,EAAE,MAAM,sCAAsC,CAAC;AAClF,OAAO,EAAE,gCAAgC,EAAE,MAAM,4CAA4C,CAAC;AAC9F,OAAO,EAAE,mBAAmB,EAAE,MAAM,+BAA+B,CAAC;AACpE,OAAO,EAAE,uBAAuB,EAAE,MAAM,mCAAmC,CAAC;AAC5E,OAAO,EAAE,8BAA8B,EAAE,MAAM,0CAA0C,CAAC;AAC1F,OAAO,EAAE,yBAAyB,EAAE,MAAM,qCAAqC,CAAC;AAChF,OAAO,EAAE,sBAAsB,EAAE,MAAM,kCAAkC,CAAC;AAC1E,OAAO,EAAE,mCAAmC,EAAE,MAAM,+CAA+C,CAAC;AACpG,OAAO,EAAE,4BAA4B,EAAE,MAAM,wCAAwC,CAAC;AACtF,OAAO,EAAE,wBAAwB,EAAE,MAAM,oCAAoC,CAAC;AAC9E,OAAO,EAAE,yBAAyB,EAAE,MAAM,qCAAqC,CAAC;AAChF,OAAO,EAAE,iBAAiB,EAAE,MAAM,6BAA6B,CAAC;AAChE,OAAO,EAAE,iCAAiC,EAAE,MAAM,6CAA6C,CAAC;AAChG,OAAO,EAAE,6BAA6B,EAAE,MAAM,yCAAyC,CAAC;AACxF,OAAO,EAAE,qCAAqC,EAAE,MAAM,iDAAiD,CAAC;AACxG,OAAO,EAAE,oCAAoC,EAAE,MAAM,gDAAgD,CAAC;AACtG,OAAO,EAAE,qBAAqB,EAAE,MAAM,oDAAoD,CAAC;AAC3F,OAAO,EAAE,UAAU,EAAE,MAAM,4BAA4B,CAAC;AACxD,OAAO,EAAE,MAAM,EAAE,MAAM,wBAAwB,CAAC;AAChD,OAAO,EAAE,aAAa,EAAE,MAAM,wCAAwC,CAAC;AACvE,OAAO,EAAE,WAAW,EAAE,MAAM,sCAAsC,CAAC;AACnE,OAAO,EAAE,eAAe,EAAE,MAAM,0CAA0C,CAAC;AAC3E,OAAO,EAAE,iBAAiB,EAAE,MAAM,4CAA4C,CAAC;AAC/E,OAAO,EAAE,4BAA4B,EAAE,MAAM,2DAA2D,CAAC;AACzG,OAAO,EAAE,mBAAmB,EAAE,MAAM,kDAAkD,CAAC;AACvF,OAAO,EAAE,wBAAwB,EAAE,MAAM,uDAAuD,CAAC;AACjG,YAAY,EAAE,cAAc,EAAE,MAAM,qCAAqC,CAAC;AAC1E,OAAO,EAAE,qBAAqB,EAAE,MAAM,iEAAiE,CAAC;AACxG,YAAY,EAAE,KAAK,EAAE,MAAM,kBAAkB,CAAC;AAC9C,OAAO,EAAE,QAAQ,EAAE,SAAS,EAAE,OAAO,EAAE,MAAM,yBAAyB,CAAC;AACvE,OAAO,EAAE,YAAY,EAAE,MAAM,mCAAmC,CAAC;AACjE,OAAO,EAAE,gBAAgB,EAAE,MAAM,6BAA6B,CAAC;AAC/D,YAAY,EAAE,iBAAiB,EAAE,MAAM,mCAAmC,CAAC;AAC3E,OAAO,EAAE,wBAAwB,EAAE,MAAM,yCAAyC,CAAC;AACnF,OAAO,EAAE,sBAAsB,EAAE,MAAM,uCAAuC,CAAC;AAC/E,OAAO,EAAE,mBAAmB,EAAE,MAAM,oCAAoC,CAAC;AACzE,OAAO,EAAE,iBAAiB,EAAE,MAAM,kCAAkC,CAAC;AACrE,OAAO,EAAE,eAAe,EAAE,MAAM,gCAAgC,CAAC;AACjE,OAAO,EAAE,yBAAyB,EAAE,MAAM,0CAA0C,CAAC;AACrF,OAAO,EAAE,eAAe,EAAE,MAAM,gCAAgC,CAAC;AACjE,OAAO,EAAE,aAAa,EAAE,MAAM,8BAA8B,CAAC;AAC7D,OAAO,EAAE,aAAa,EAAE,MAAM,8BAA8B,CAAC;AAC7D,OAAO,EAAE,mBAAmB,EAAE,MAAM,oCAAoC,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,uCAAuC,CAAC;AAC/E,OAAO,EAAE,oCAAoC,EAAE,MAAM,qDAAqD,CAAC;AAC3G,OAAO,EAAE,oBAAoB,EAAE,MAAM,qCAAqC,CAAC;AAC3E,YAAY,EAAE,SAAS,EAAE,MAAM,0BAA0B,CAAC;AAC1D,OAAO,EAAE,qBAAqB,EAAE,MAAM,sCAAsC,CAAC;AAC7E,OAAO,EAAE,mBAAmB,EAAE,MAAM,oCAAoC,CAAC;AACzE,YAAY,EAAE,eAAe,EAAE,MAAM,0BAA0B,CAAC;AAChE,OAAO,EAAE,YAAY,EAAE,MAAM,6BAA6B,CAAC;AAC3D,OAAO,EAAE,UAAU,EAAE,MAAM,2BAA2B,CAAC;AACvD,OAAO,EAAE,SAAS,EAAE,MAAM,0BAA0B,CAAC;AACrD,OAAO,EAAE,oBAAoB,EAAE,MAAM,iDAAiD,CAAC;AACvF,OAAO,EAAE,WAAW,EAAE,MAAM,6BAA6B,CAAC;AAC1D,OAAO,EAAE,UAAU,EAAE,MAAM,4BAA4B,CAAC;AACxD,YAAY,EAAE,gBAAgB,EAAE,MAAM,4BAA4B,CAAC;AACnE,OAAO,EAAE,sCAAsC,EAAE,MAAM,2DAA2D,CAAC;AACnH,OAAO,EAAE,kCAAkC,EAAE,MAAM,uDAAuD,CAAC;AAC3G,OAAO,EAAE,yBAAyB,EAAE,MAAM,8CAA8C,CAAC;AACzF,OAAO,EAAE,+BAA+B,EAAE,MAAM,oDAAoD,CAAC;AACrG,OAAO,EAAE,qBAAqB,EAAE,MAAM,0CAA0C,CAAC;AACjF,OAAO,EAAE,iBAAiB,EAAE,MAAM,sCAAsC,CAAC;AACzE,OAAO,EAAE,oBAAoB,EAAE,MAAM,kDAAkD,CAAC;AACxF,OAAO,EAAE,kBAAkB,EAAE,MAAM,gDAAgD,CAAC;AACpF,OAAO,EAAE,UAAU,EAAE,MAAM,wCAAwC,CAAC;AACpE,OAAO,EAAE,oBAAoB,EAAE,MAAM,kDAAkD,CAAC;AACxF,OAAO,EAAE,eAAe,EAAE,MAAM,6CAA6C,CAAC;AAC9E,OAAO,EAAE,oCAAoC,EAAE,MAAM,kEAAkE,CAAC;AACxH,YAAY,EAAE,eAAe,EAAE,MAAM,6CAA6C,CAAC;AACnF,YAAY,EAAE,WAAW,EAAE,MAAM,mEAAmE,CAAC;AACrG,OAAO,EAAE,mBAAmB,EAAE,MAAM,iDAAiD,CAAC;AACtF,OAAO,EAAE,uBAAuB,EAAE,MAAM,iEAAiE,CAAC;AAC1G,OAAO,EAAE,0BAA0B,EAAE,MAAM,oEAAoE,CAAC;AAChH,OAAO,EAAE,2BAA2B,EAAE,MAAM,gDAAgD,CAAC;AAC7F,OAAO,EAAE,mBAAmB,EAAE,MAAM,wCAAwC,CAAC;AAC7E,OAAO,EAAE,WAAW,EAAE,MAAM,gCAAgC,CAAC;AAC7D,OAAO,EAAE,iCAAiC,EAAE,MAAM,4DAA4D,CAAC;AAC/G,OAAO,EAAE,2BAA2B,EAAE,MAAM,sDAAsD,CAAC;AACnG,OAAO,EAAE,mBAAmB,EAAE,MAAM,wCAAwC,CAAC;AAC7E,YAAY,EAAE,aAAa,EAAE,MAAM,kCAAkC,CAAC;AACtE,YAAY,EAAE,kBAAkB,EAAE,MAAM,mCAAmC,CAAC;AAC5E,OAAO,EAAE,sBAAsB,EAAE,MAAM,iEAAiE,CAAC;AACzG,OAAO,EAAE,qBAAqB,EAAE,MAAM,gEAAgE,CAAC"}
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../packages/client/src/exports/index.ts"],"names":[],"mappings":"AAWA,OAAO,uBAAuB,CAAC;AAC/B,OAAO,mCAAmC,CAAC;AAC3C,OAAO,sBAAsB,CAAC;AAC9B,OAAO,kCAAkC,CAAC;AAC1C,OAAO,8BAA8B,CAAC;AACtC,OAAO,mDAAmD,CAAC;AAG3D,OAAO,wBAAwB,CAAC;AAChC,OAAO,uBAAuB,CAAC;AAC/B,OAAO,0CAA0C,CAAC;AAClD,OAAO,yCAAyC,CAAC;AACjD,OAAO,kDAAkD,CAAC;AAE1D,YAAY,EAAE,cAAc,EAAE,SAAS,EAAE,MAAM,4BAA4B,CAAC;AAC5E,YAAY,EAAE,iBAAiB,EAAE,MAAM,sBAAsB,CAAC;AAC9D,OAAO,EAAE,mBAAmB,EAAE,MAAM,+BAA+B,CAAC;AACpE,OAAO,EAAE,gBAAgB,EAAE,MAAM,yBAAyB,CAAC;AAC3D,YAAY,EAAE,aAAa,EAAE,mBAAmB,EAAE,MAAM,iBAAiB,CAAC;AAC1E,OAAO,EAAE,SAAS,EAAE,KAAK,mBAAmB,EAAE,MAAM,gBAAgB,CAAC;AACrE,OAAO,EAAE,6BAA6B,EAAE,MAAM,yCAAyC,CAAC;AACxF,OAAO,EAAE,wBAAwB,EAAE,MAAM,oCAAoC,CAAC;AAC9E,OAAO,EAAE,iBAAiB,EAAE,MAAM,6BAA6B,CAAC;AAChE,OAAO,EAAE,gCAAgC,EAAE,MAAM,4CAA4C,CAAC;AAC9F,OAAO,EAAE,kBAAkB,EAAE,MAAM,8BAA8B,CAAC;AAClE,OAAO,EAAE,mBAAmB,EAAE,MAAM,+BAA+B,CAAC;AACpE,OAAO,EAAE,gCAAgC,EAAE,MAAM,4CAA4C,CAAC;AAC9F,OAAO,EAAE,0BAA0B,EAAE,MAAM,sCAAsC,CAAC;AAClF,OAAO,EAAE,gCAAgC,EAAE,MAAM,4CAA4C,CAAC;AAC9F,OAAO,EAAE,mBAAmB,EAAE,MAAM,+BAA+B,CAAC;AACpE,OAAO,EAAE,uBAAuB,EAAE,MAAM,mCAAmC,CAAC;AAC5E,OAAO,EAAE,8BAA8B,EAAE,MAAM,0CAA0C,CAAC;AAC1F,OAAO,EAAE,yBAAyB,EAAE,MAAM,qCAAqC,CAAC;AAChF,OAAO,EAAE,sBAAsB,EAAE,MAAM,kCAAkC,CAAC;AAC1E,OAAO,EAAE,mCAAmC,EAAE,MAAM,+CAA+C,CAAC;AACpG,OAAO,EAAE,4BAA4B,EAAE,MAAM,wCAAwC,CAAC;AACtF,OAAO,EAAE,wBAAwB,EAAE,MAAM,oCAAoC,CAAC;AAC9E,OAAO,EAAE,yBAAyB,EAAE,MAAM,qCAAqC,CAAC;AAChF,OAAO,EAAE,iBAAiB,EAAE,MAAM,6BAA6B,CAAC;AAChE,OAAO,EAAE,iCAAiC,EAAE,MAAM,6CAA6C,CAAC;AAChG,OAAO,EAAE,6BAA6B,EAAE,MAAM,yCAAyC,CAAC;AACxF,OAAO,EAAE,qCAAqC,EAAE,MAAM,iDAAiD,CAAC;AACxG,OAAO,EAAE,oCAAoC,EAAE,MAAM,gDAAgD,CAAC;AACtG,OAAO,EAAE,qBAAqB,EAAE,MAAM,oDAAoD,CAAC;AAC3F,OAAO,EAAE,UAAU,EAAE,MAAM,4BAA4B,CAAC;AACxD,OAAO,EAAE,MAAM,EAAE,MAAM,wBAAwB,CAAC;AAChD,OAAO,EAAE,aAAa,EAAE,MAAM,wCAAwC,CAAC;AACvE,OAAO,EAAE,WAAW,EAAE,MAAM,sCAAsC,CAAC;AACnE,OAAO,EAAE,eAAe,EAAE,MAAM,0CAA0C,CAAC;AAC3E,OAAO,EAAE,iBAAiB,EAAE,MAAM,4CAA4C,CAAC;AAC/E,OAAO,EAAE,4BAA4B,EAAE,MAAM,2DAA2D,CAAC;AACzG,OAAO,EAAE,mBAAmB,EAAE,MAAM,kDAAkD,CAAC;AACvF,OAAO,EAAE,wBAAwB,EAAE,MAAM,uDAAuD,CAAC;AACjG,YAAY,EAAE,cAAc,EAAE,MAAM,qCAAqC,CAAC;AAC1E,OAAO,EAAE,qBAAqB,EAAE,MAAM,iEAAiE,CAAC;AACxG,YAAY,EAAE,KAAK,EAAE,MAAM,kBAAkB,CAAC;AAC9C,OAAO,EAAE,QAAQ,EAAE,SAAS,EAAE,OAAO,EAAE,MAAM,yBAAyB,CAAC;AACvE,OAAO,EAAE,YAAY,EAAE,MAAM,mCAAmC,CAAC;AACjE,OAAO,EAAE,gBAAgB,EAAE,MAAM,6BAA6B,CAAC;AAC/D,YAAY,EAAE,iBAAiB,EAAE,MAAM,mCAAmC,CAAC;AAC3E,OAAO,EAAE,wBAAwB,EAAE,MAAM,yCAAyC,CAAC;AACnF,OAAO,EAAE,2BAA2B,EAAE,MAAM,4CAA4C,CAAC;AACzF,OAAO,EAAE,sBAAsB,EAAE,MAAM,uCAAuC,CAAC;AAC/E,OAAO,EAAE,yBAAyB,EAAE,MAAM,0CAA0C,CAAC;AACrF,OAAO,EAAE,eAAe,EAAE,MAAM,gCAAgC,CAAC;AACjE,OAAO,EAAE,yBAAyB,EAAE,MAAM,0CAA0C,CAAC;AACrF,OAAO,EAAE,eAAe,EAAE,MAAM,gCAAgC,CAAC;AACjE,OAAO,EAAE,aAAa,EAAE,MAAM,8BAA8B,CAAC;AAC7D,OAAO,EAAE,aAAa,EAAE,MAAM,8BAA8B,CAAC;AAC7D,OAAO,EAAE,mBAAmB,EAAE,MAAM,oCAAoC,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,uCAAuC,CAAC;AAC/E,OAAO,EAAE,oCAAoC,EAAE,MAAM,qDAAqD,CAAC;AAC3G,OAAO,EAAE,oBAAoB,EAAE,MAAM,qCAAqC,CAAC;AAC3E,YAAY,EAAE,SAAS,EAAE,MAAM,0BAA0B,CAAC;AAC1D,OAAO,EAAE,qBAAqB,EAAE,MAAM,sCAAsC,CAAC;AAC7E,OAAO,EAAE,mBAAmB,EAAE,MAAM,oCAAoC,CAAC;AACzE,YAAY,EAAE,eAAe,EAAE,MAAM,0BAA0B,CAAC;AAChE,OAAO,EAAE,YAAY,EAAE,MAAM,6BAA6B,CAAC;AAC3D,OAAO,EAAE,UAAU,EAAE,MAAM,2BAA2B,CAAC;AACvD,OAAO,EAAE,SAAS,EAAE,MAAM,0BAA0B,CAAC;AACrD,OAAO,EAAE,oBAAoB,EAAE,MAAM,iDAAiD,CAAC;AACvF,OAAO,EAAE,WAAW,EAAE,MAAM,6BAA6B,CAAC;AAC1D,OAAO,EAAE,UAAU,EAAE,MAAM,4BAA4B,CAAC;AACxD,YAAY,EAAE,gBAAgB,EAAE,MAAM,4BAA4B,CAAC;AACnE,OAAO,EAAE,sCAAsC,EAAE,MAAM,2DAA2D,CAAC;AACnH,OAAO,EAAE,kCAAkC,EAAE,MAAM,uDAAuD,CAAC;AAC3G,OAAO,EAAE,yBAAyB,EAAE,MAAM,8CAA8C,CAAC;AACzF,OAAO,EAAE,+BAA+B,EAAE,MAAM,oDAAoD,CAAC;AACrG,OAAO,EAAE,qBAAqB,EAAE,MAAM,0CAA0C,CAAC;AACjF,OAAO,EAAE,iBAAiB,EAAE,MAAM,sCAAsC,CAAC;AACzE,OAAO,EAAE,oBAAoB,EAAE,MAAM,kDAAkD,CAAC;AACxF,OAAO,EAAE,kBAAkB,EAAE,MAAM,gDAAgD,CAAC;AACpF,OAAO,EAAE,UAAU,EAAE,MAAM,wCAAwC,CAAC;AACpE,OAAO,EAAE,oBAAoB,EAAE,MAAM,kDAAkD,CAAC;AACxF,OAAO,EAAE,eAAe,EAAE,MAAM,6CAA6C,CAAC;AAC9E,OAAO,EAAE,oCAAoC,EAAE,MAAM,kEAAkE,CAAC;AACxH,YAAY,EAAE,eAAe,EAAE,MAAM,6CAA6C,CAAC;AACnF,YAAY,EAAE,WAAW,EAAE,MAAM,mEAAmE,CAAC;AACrG,OAAO,EAAE,mBAAmB,EAAE,MAAM,iDAAiD,CAAC;AACtF,OAAO,EAAE,uBAAuB,EAAE,MAAM,iEAAiE,CAAC;AAC1G,OAAO,EAAE,0BAA0B,EAAE,MAAM,oEAAoE,CAAC;AAChH,OAAO,EAAE,2BAA2B,EAAE,MAAM,gDAAgD,CAAC;AAC7F,OAAO,EAAE,mBAAmB,EAAE,MAAM,wCAAwC,CAAC;AAC7E,OAAO,EAAE,WAAW,EAAE,MAAM,gCAAgC,CAAC;AAC7D,OAAO,EAAE,iCAAiC,EAAE,MAAM,4DAA4D,CAAC;AAC/G,OAAO,EAAE,2BAA2B,EAAE,MAAM,sDAAsD,CAAC;AACnG,OAAO,EAAE,mBAAmB,EAAE,MAAM,wCAAwC,CAAC;AAC7E,YAAY,EAAE,aAAa,EAAE,MAAM,kCAAkC,CAAC;AACtE,YAAY,EAAE,kBAAkB,EAAE,MAAM,mCAAmC,CAAC;AAC5E,OAAO,EAAE,sBAAsB,EAAE,MAAM,iEAAiE,CAAC;AACzG,OAAO,EAAE,qBAAqB,EAAE,MAAM,gEAAgE,CAAC"}
@@ -1,16 +1,10 @@
1
- import type { VerifyResponse } from '@dynamic-labs/sdk-api-core';
2
1
  declare global {
3
2
  interface DynamicEvents {
4
- /**
5
- * Raised when the user is authenticated.
6
- */
7
- authenticated: (args: {
8
- verifyResponse: VerifyResponse;
9
- }) => void;
10
3
  /**
11
4
  * Raised when "logout" is called.
12
5
  */
13
6
  logout: () => void;
14
7
  }
15
8
  }
9
+ export {};
16
10
  //# sourceMappingURL=events.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"events.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/modules/auth/events.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAEjE,OAAO,CAAC,MAAM,CAAC;IACb,UAAU,aAAa;QACrB;;WAEG;QACH,aAAa,EAAE,CAAC,IAAI,EAAE;YAAE,cAAc,EAAE,cAAc,CAAA;SAAE,KAAK,IAAI,CAAC;QAElE;;WAEG;QACH,MAAM,EAAE,MAAM,IAAI,CAAC;KACpB;CACF"}
1
+ {"version":3,"file":"events.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/modules/auth/events.ts"],"names":[],"mappings":"AAAA,OAAO,CAAC,MAAM,CAAC;IACb,UAAU,aAAa;QACrB;;WAEG;QACH,MAAM,EAAE,MAAM,IAAI,CAAC;KACpB;CACF;AAED,OAAO,EAAE,CAAC"}
@@ -1 +1 @@
1
- {"version":3,"file":"updateAuthFromVerifyResponse.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/auth/updateAuthFromVerifyResponse/updateAuthFromVerifyResponse.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAGjE,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAI3D,KAAK,kCAAkC,GAAG;IACxC,QAAQ,EAAE,cAAc,CAAC;CAC1B,CAAC;AAEF,eAAO,MAAM,4BAA4B,iBACzB,kCAAkC,UACxC,aAAa,SAmBtB,CAAC"}
1
+ {"version":3,"file":"updateAuthFromVerifyResponse.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/auth/updateAuthFromVerifyResponse/updateAuthFromVerifyResponse.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAGjE,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAG3D,KAAK,kCAAkC,GAAG;IACxC,QAAQ,EAAE,cAAc,CAAC;CAC1B,CAAC;AAEF,eAAO,MAAM,4BAA4B,iBACzB,kCAAkC,UACxC,aAAa,SAiBtB,CAAC"}
@@ -1,5 +1,7 @@
1
- type AuthMfaRecoveryCodeParams = {
1
+ import type { CreateMfaToken } from '@dynamic-labs/sdk-api-core';
2
+ type AuthenticateMfaRecoveryCodeParams = {
2
3
  code: string;
4
+ createMfaTokenOptions?: CreateMfaToken;
3
5
  };
4
6
  /**
5
7
  * Authenticates using an MFA recovery code.
@@ -11,6 +13,6 @@ type AuthMfaRecoveryCodeParams = {
11
13
  * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
12
14
  * @returns A promise that resolves to the MFA authentication response with token.
13
15
  */
14
- export declare const authMfaRecoveryCode: ({ code }: AuthMfaRecoveryCodeParams, client?: import("../../../exports").DynamicClient) => Promise<import("@dynamic-labs/sdk-api-core").VerifyResponse>;
16
+ export declare const authenticateMfaRecoveryCode: ({ code, createMfaTokenOptions }: AuthenticateMfaRecoveryCodeParams, client?: import("../../../exports").DynamicClient) => Promise<import("@dynamic-labs/sdk-api-core").VerifyResponse>;
15
17
  export {};
16
- //# sourceMappingURL=authMfaRecoveryCode.d.ts.map
18
+ //# sourceMappingURL=authenticateMfaRecoveryCode.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"authenticateMfaRecoveryCode.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/mfa/authenticateMfaRecoveryCode/authenticateMfaRecoveryCode.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAQjE,KAAK,iCAAiC,GAAG;IACvC,IAAI,EAAE,MAAM,CAAC;IACb,qBAAqB,CAAC,EAAE,cAAc,CAAC;CACxC,CAAC;AAEF;;;;;;;;;GASG;AACH,eAAO,MAAM,2BAA2B,oCACL,iCAAiC,oHAoCnE,CAAC"}
@@ -0,0 +1,2 @@
1
+ export { authenticateMfaRecoveryCode } from './authenticateMfaRecoveryCode';
2
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/mfa/authenticateMfaRecoveryCode/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,2BAA2B,EAAE,MAAM,+BAA+B,CAAC"}
@@ -1,5 +1,5 @@
1
1
  import type { CreateMfaToken } from '@dynamic-labs/sdk-api-core';
2
- type AuthTotpMfaDeviceParams = {
2
+ type AuthenticateTotpMfaDeviceParams = {
3
3
  code: string;
4
4
  createMfaTokenOptions?: CreateMfaToken;
5
5
  deviceId?: string;
@@ -16,6 +16,6 @@ type AuthTotpMfaDeviceParams = {
16
16
  * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
17
17
  * @returns A promise that resolves to the MFA authentication response.
18
18
  */
19
- export declare const authTotpMfaDevice: ({ deviceId, code, createMfaTokenOptions }: AuthTotpMfaDeviceParams, client?: import("../../../exports").DynamicClient) => Promise<import("@dynamic-labs/sdk-api-core").VerifyResponse>;
19
+ export declare const authenticateTotpMfaDevice: ({ deviceId, code, createMfaTokenOptions }: AuthenticateTotpMfaDeviceParams, client?: import("../../../exports").DynamicClient) => Promise<import("@dynamic-labs/sdk-api-core").VerifyResponse>;
20
20
  export {};
21
- //# sourceMappingURL=authTotpMfaDevice.d.ts.map
21
+ //# sourceMappingURL=authenticateTotpMfaDevice.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"authenticateTotpMfaDevice.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/mfa/authenticateTotpMfaDevice/authenticateTotpMfaDevice.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAQjE,KAAK,+BAA+B,GAAG;IACrC,IAAI,EAAE,MAAM,CAAC;IACb,qBAAqB,CAAC,EAAE,cAAc,CAAC;IACvC,QAAQ,CAAC,EAAE,MAAM,CAAC;CACnB,CAAC;AAEF;;;;;;;;;;;GAWG;AACH,eAAO,MAAM,yBAAyB,8CACO,+BAA+B,oHAqC3E,CAAC"}
@@ -0,0 +1,2 @@
1
+ export { authenticateTotpMfaDevice } from './authenticateTotpMfaDevice';
2
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/mfa/authenticateTotpMfaDevice/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,yBAAyB,EAAE,MAAM,6BAA6B,CAAC"}
@@ -5,6 +5,8 @@ export type SendEmailOTPParams = {
5
5
  /**
6
6
  * Sends a one-time password (OTP) to the specified email address.
7
7
  *
8
+ * Once you have the OTP code, you should then use `verifyOTP` to verify it and complete the authentication process.
9
+ *
8
10
  * @param params.email - The email address to send the OTP to.
9
11
  * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
10
12
  * @returns A promise that resolves to an OTPVerification object containing the email and verification UUID.
@@ -1 +1 @@
1
- {"version":3,"file":"sendEmailOTP.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/otp/sendEmailOTP/sendEmailOTP.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,cAAc,CAAC;AAEpD,MAAM,MAAM,kBAAkB,GAAG;IAC/B,KAAK,EAAE,MAAM,CAAC;CACf,CAAC;AAEF;;;;;;GAMG;AACH,eAAO,MAAM,YAAY,cACZ,kBAAkB,wDAE5B,OAAO,CAAC,eAAe,CAYzB,CAAC"}
1
+ {"version":3,"file":"sendEmailOTP.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/otp/sendEmailOTP/sendEmailOTP.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,cAAc,CAAC;AAEpD,MAAM,MAAM,kBAAkB,GAAG;IAC/B,KAAK,EAAE,MAAM,CAAC;CACf,CAAC;AAEF;;;;;;;;GAQG;AACH,eAAO,MAAM,YAAY,cACZ,kBAAkB,wDAE5B,OAAO,CAAC,eAAe,CAYzB,CAAC"}
@@ -1,10 +0,0 @@
1
- import type { VerifyResponse } from '@dynamic-labs/sdk-api-core';
2
- import type { DynamicCoreState } from '../../../../client/core/types';
3
- import type { DynamicClient } from '../../../../client/types';
4
- type CheckAndRaiseAuthenticatedEventParams = {
5
- previousState: Readonly<DynamicCoreState>;
6
- response: VerifyResponse;
7
- };
8
- export declare const checkAndRaiseAuthenticatedEvent: ({ previousState, response }: CheckAndRaiseAuthenticatedEventParams, client: DynamicClient) => void;
9
- export {};
10
- //# sourceMappingURL=checkAndRaiseAuthenticatedEvent.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"checkAndRaiseAuthenticatedEvent.d.ts","sourceRoot":"","sources":["../../../../../../../../packages/client/src/modules/auth/updateAuthFromVerifyResponse/checkAndRaiseAuthenticatedEvent/checkAndRaiseAuthenticatedEvent.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAGjE,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,+BAA+B,CAAC;AACtE,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,0BAA0B,CAAC;AAG9D,KAAK,qCAAqC,GAAG;IAC3C,aAAa,EAAE,QAAQ,CAAC,gBAAgB,CAAC,CAAC;IAC1C,QAAQ,EAAE,cAAc,CAAC;CAC1B,CAAC;AAEF,eAAO,MAAM,+BAA+B,gCACb,qCAAqC,UAC1D,aAAa,SAyBtB,CAAC"}
@@ -1,2 +0,0 @@
1
- export { checkAndRaiseAuthenticatedEvent } from './checkAndRaiseAuthenticatedEvent';
2
- //# sourceMappingURL=index.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../../../../packages/client/src/modules/auth/updateAuthFromVerifyResponse/checkAndRaiseAuthenticatedEvent/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,+BAA+B,EAAE,MAAM,mCAAmC,CAAC"}
@@ -1 +0,0 @@
1
- {"version":3,"file":"authMfaRecoveryCode.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/mfa/authMfaRecoveryCode/authMfaRecoveryCode.ts"],"names":[],"mappings":"AAMA,KAAK,yBAAyB,GAAG;IAC/B,IAAI,EAAE,MAAM,CAAC;CACd,CAAC;AAEF;;;;;;;;;GASG;AACH,eAAO,MAAM,mBAAmB,aACpB,yBAAyB,oHAmCpC,CAAC"}
@@ -1,2 +0,0 @@
1
- export { authMfaRecoveryCode } from './authMfaRecoveryCode';
2
- //# sourceMappingURL=index.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/mfa/authMfaRecoveryCode/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,mBAAmB,EAAE,MAAM,uBAAuB,CAAC"}
@@ -1 +0,0 @@
1
- {"version":3,"file":"authTotpMfaDevice.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/mfa/authTotpMfaDevice/authTotpMfaDevice.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAQjE,KAAK,uBAAuB,GAAG;IAC7B,IAAI,EAAE,MAAM,CAAC;IACb,qBAAqB,CAAC,EAAE,cAAc,CAAC;IACvC,QAAQ,CAAC,EAAE,MAAM,CAAC;CACnB,CAAC;AAEF;;;;;;;;;;;GAWG;AACH,eAAO,MAAM,iBAAiB,8CACe,uBAAuB,oHAqCnE,CAAC"}
@@ -1,2 +0,0 @@
1
- export { authTotpMfaDevice } from './authTotpMfaDevice';
2
- //# sourceMappingURL=index.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/mfa/authTotpMfaDevice/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,iBAAiB,EAAE,MAAM,qBAAqB,CAAC"}