@dynamic-labs-sdk/client 0.1.0-alpha.0 → 0.1.0-alpha.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +8 -0
- package/getChainFromVerifiedCredentialChain.cjs.js +1 -1
- package/getChainFromVerifiedCredentialChain.esm.js +1 -1
- package/index.cjs.js +47 -44
- package/index.esm.js +46 -43
- package/package.json +2 -2
- package/refreshUser.cjs.js +0 -22
- package/refreshUser.esm.js +0 -22
- package/src/exports/index.d.ts +3 -3
- package/src/exports/index.d.ts.map +1 -1
- package/src/modules/auth/events.d.ts +1 -7
- package/src/modules/auth/events.d.ts.map +1 -1
- package/src/modules/auth/updateAuthFromVerifyResponse/updateAuthFromVerifyResponse.d.ts.map +1 -1
- package/src/modules/mfa/{authMfaRecoveryCode/authMfaRecoveryCode.d.ts → authenticateMfaRecoveryCode/authenticateMfaRecoveryCode.d.ts} +5 -3
- package/src/modules/mfa/authenticateMfaRecoveryCode/authenticateMfaRecoveryCode.d.ts.map +1 -0
- package/src/modules/mfa/authenticateMfaRecoveryCode/index.d.ts +2 -0
- package/src/modules/mfa/authenticateMfaRecoveryCode/index.d.ts.map +1 -0
- package/src/modules/mfa/{authTotpMfaDevice/authTotpMfaDevice.d.ts → authenticateTotpMfaDevice/authenticateTotpMfaDevice.d.ts} +3 -3
- package/src/modules/mfa/authenticateTotpMfaDevice/authenticateTotpMfaDevice.d.ts.map +1 -0
- package/src/modules/mfa/authenticateTotpMfaDevice/index.d.ts +2 -0
- package/src/modules/mfa/authenticateTotpMfaDevice/index.d.ts.map +1 -0
- package/src/modules/otp/sendEmailOTP/sendEmailOTP.d.ts +2 -0
- package/src/modules/otp/sendEmailOTP/sendEmailOTP.d.ts.map +1 -1
- package/src/modules/auth/updateAuthFromVerifyResponse/checkAndRaiseAuthenticatedEvent/checkAndRaiseAuthenticatedEvent.d.ts +0 -10
- package/src/modules/auth/updateAuthFromVerifyResponse/checkAndRaiseAuthenticatedEvent/checkAndRaiseAuthenticatedEvent.d.ts.map +0 -1
- package/src/modules/auth/updateAuthFromVerifyResponse/checkAndRaiseAuthenticatedEvent/index.d.ts +0 -2
- package/src/modules/auth/updateAuthFromVerifyResponse/checkAndRaiseAuthenticatedEvent/index.d.ts.map +0 -1
- package/src/modules/mfa/authMfaRecoveryCode/authMfaRecoveryCode.d.ts.map +0 -1
- package/src/modules/mfa/authMfaRecoveryCode/index.d.ts +0 -2
- package/src/modules/mfa/authMfaRecoveryCode/index.d.ts.map +0 -1
- package/src/modules/mfa/authTotpMfaDevice/authTotpMfaDevice.d.ts.map +0 -1
- package/src/modules/mfa/authTotpMfaDevice/index.d.ts +0 -2
- package/src/modules/mfa/authTotpMfaDevice/index.d.ts.map +0 -1
package/CHANGELOG.md
CHANGED
|
@@ -4,7 +4,7 @@ var sdkApiCore = require('@dynamic-labs/sdk-api-core');
|
|
|
4
4
|
var buffer = require('buffer');
|
|
5
5
|
|
|
6
6
|
var name = "@dynamic-labs-sdk/client";
|
|
7
|
-
var version = "0.1.0-alpha.
|
|
7
|
+
var version = "0.1.0-alpha.2";
|
|
8
8
|
var dependencies = {
|
|
9
9
|
"@dynamic-labs/sdk-api-core": "0.0.762"};
|
|
10
10
|
|
|
@@ -2,7 +2,7 @@ import { AuthStorageEnum, SDKApi, Configuration } from '@dynamic-labs/sdk-api-co
|
|
|
2
2
|
import { Buffer as Buffer$1 } from 'buffer';
|
|
3
3
|
|
|
4
4
|
var name = "@dynamic-labs-sdk/client";
|
|
5
|
-
var version = "0.1.0-alpha.
|
|
5
|
+
var version = "0.1.0-alpha.2";
|
|
6
6
|
var dependencies = {
|
|
7
7
|
"@dynamic-labs/sdk-api-core": "0.0.762"};
|
|
8
8
|
|
package/index.cjs.js
CHANGED
|
@@ -1515,6 +1515,47 @@ const providersRequiringPkce = [
|
|
|
1515
1515
|
}, client);
|
|
1516
1516
|
};
|
|
1517
1517
|
|
|
1518
|
+
/**
|
|
1519
|
+
* Authenticates using an MFA recovery code.
|
|
1520
|
+
*
|
|
1521
|
+
* This function allows users to bypass normal MFA requirements by using
|
|
1522
|
+
* one of their backup recovery codes when none of the registered MFA methods are available.
|
|
1523
|
+
*
|
|
1524
|
+
* @param params.code - The recovery code to authenticate with.
|
|
1525
|
+
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
1526
|
+
* @returns A promise that resolves to the MFA authentication response with token.
|
|
1527
|
+
*/ const authenticateMfaRecoveryCode = async ({ code, createMfaTokenOptions }, client = getChainFromVerifiedCredentialChain.getDefaultClient())=>{
|
|
1528
|
+
const core = getChainFromVerifiedCredentialChain.getCore(client);
|
|
1529
|
+
const apiClient = getChainFromVerifiedCredentialChain.createApiClient({}, client);
|
|
1530
|
+
try {
|
|
1531
|
+
const response = await apiClient.authMfaRecovery({
|
|
1532
|
+
environmentId: core.environmentId,
|
|
1533
|
+
mFAAuthRecoveryDevicePostRequest: {
|
|
1534
|
+
code,
|
|
1535
|
+
createMfaToken: createMfaTokenOptions
|
|
1536
|
+
}
|
|
1537
|
+
});
|
|
1538
|
+
refreshUser.updateAuthFromVerifyResponse({
|
|
1539
|
+
response
|
|
1540
|
+
}, client);
|
|
1541
|
+
getWalletProviderByKey.emitEvent({
|
|
1542
|
+
args: {
|
|
1543
|
+
mfaToken: response.mfaToken
|
|
1544
|
+
},
|
|
1545
|
+
event: 'mfaCompletionSuccess'
|
|
1546
|
+
}, client);
|
|
1547
|
+
return response;
|
|
1548
|
+
} catch (error) {
|
|
1549
|
+
getWalletProviderByKey.emitEvent({
|
|
1550
|
+
args: {
|
|
1551
|
+
error
|
|
1552
|
+
},
|
|
1553
|
+
event: 'mfaCompletionFailure'
|
|
1554
|
+
}, client);
|
|
1555
|
+
throw error;
|
|
1556
|
+
}
|
|
1557
|
+
};
|
|
1558
|
+
|
|
1518
1559
|
const getPasskeyAuthenticationOptions = async (client)=>{
|
|
1519
1560
|
const core = getChainFromVerifiedCredentialChain.getCore(client);
|
|
1520
1561
|
const apiClient = getChainFromVerifiedCredentialChain.createApiClient({}, client);
|
|
@@ -1596,46 +1637,6 @@ const serverAuthenticatePasskey = async ({ authentication, createMfaToken }, cli
|
|
|
1596
1637
|
}
|
|
1597
1638
|
};
|
|
1598
1639
|
|
|
1599
|
-
/**
|
|
1600
|
-
* Authenticates using an MFA recovery code.
|
|
1601
|
-
*
|
|
1602
|
-
* This function allows users to bypass normal MFA requirements by using
|
|
1603
|
-
* one of their backup recovery codes when none of the registered MFA methods are available.
|
|
1604
|
-
*
|
|
1605
|
-
* @param params.code - The recovery code to authenticate with.
|
|
1606
|
-
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
1607
|
-
* @returns A promise that resolves to the MFA authentication response with token.
|
|
1608
|
-
*/ const authMfaRecoveryCode = async ({ code }, client = getChainFromVerifiedCredentialChain.getDefaultClient())=>{
|
|
1609
|
-
const core = getChainFromVerifiedCredentialChain.getCore(client);
|
|
1610
|
-
const apiClient = getChainFromVerifiedCredentialChain.createApiClient({}, client);
|
|
1611
|
-
try {
|
|
1612
|
-
const response = await apiClient.authMfaRecovery({
|
|
1613
|
-
environmentId: core.environmentId,
|
|
1614
|
-
mFAAuthRecoveryDevicePostRequest: {
|
|
1615
|
-
code
|
|
1616
|
-
}
|
|
1617
|
-
});
|
|
1618
|
-
refreshUser.updateAuthFromVerifyResponse({
|
|
1619
|
-
response
|
|
1620
|
-
}, client);
|
|
1621
|
-
getWalletProviderByKey.emitEvent({
|
|
1622
|
-
args: {
|
|
1623
|
-
mfaToken: response.mfaToken
|
|
1624
|
-
},
|
|
1625
|
-
event: 'mfaCompletionSuccess'
|
|
1626
|
-
}, client);
|
|
1627
|
-
return response;
|
|
1628
|
-
} catch (error) {
|
|
1629
|
-
getWalletProviderByKey.emitEvent({
|
|
1630
|
-
args: {
|
|
1631
|
-
error
|
|
1632
|
-
},
|
|
1633
|
-
event: 'mfaCompletionFailure'
|
|
1634
|
-
}, client);
|
|
1635
|
-
throw error;
|
|
1636
|
-
}
|
|
1637
|
-
};
|
|
1638
|
-
|
|
1639
1640
|
/**
|
|
1640
1641
|
* Authenticates using a TOTP (Time-based One-Time Password) MFA device.
|
|
1641
1642
|
*
|
|
@@ -1647,7 +1648,7 @@ const serverAuthenticatePasskey = async ({ authentication, createMfaToken }, cli
|
|
|
1647
1648
|
* @param [params.createMfaTokenOptions] - Optional configuration for MFA token creation.
|
|
1648
1649
|
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
1649
1650
|
* @returns A promise that resolves to the MFA authentication response.
|
|
1650
|
-
*/ const
|
|
1651
|
+
*/ const authenticateTotpMfaDevice = async ({ deviceId, code, createMfaTokenOptions }, client = getChainFromVerifiedCredentialChain.getDefaultClient())=>{
|
|
1651
1652
|
const core = getChainFromVerifiedCredentialChain.getCore(client);
|
|
1652
1653
|
const apiClient = getChainFromVerifiedCredentialChain.createApiClient({}, client);
|
|
1653
1654
|
try {
|
|
@@ -1824,6 +1825,8 @@ const serverAuthenticatePasskey = async ({ authentication, createMfaToken }, cli
|
|
|
1824
1825
|
/**
|
|
1825
1826
|
* Sends a one-time password (OTP) to the specified email address.
|
|
1826
1827
|
*
|
|
1828
|
+
* Once you have the OTP code, you should then use `verifyOTP` to verify it and complete the authentication process.
|
|
1829
|
+
*
|
|
1827
1830
|
* @param params.email - The email address to send the OTP to.
|
|
1828
1831
|
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
1829
1832
|
* @returns A promise that resolves to an OTPVerification object containing the email and verification UUID.
|
|
@@ -3240,7 +3243,7 @@ const isSameAddress = (left, right, chain)=>refreshUser.normalizeAddress(left, c
|
|
|
3240
3243
|
walletAccount
|
|
3241
3244
|
}, client);
|
|
3242
3245
|
const { networkId } = await walletProvider.getActiveNetworkId();
|
|
3243
|
-
const networksData = getNetworkProviderFromNetworkId.getNetworksData();
|
|
3246
|
+
const networksData = getNetworkProviderFromNetworkId.getNetworksData(client);
|
|
3244
3247
|
const activeNetworkData = networksData.find((data)=>data.networkId === networkId && data.chain === walletProvider.chain);
|
|
3245
3248
|
return {
|
|
3246
3249
|
networkData: activeNetworkData
|
|
@@ -3543,9 +3546,9 @@ exports.WalletProviderMethodUnavailableError = WalletProviderMethodUnavailableEr
|
|
|
3543
3546
|
exports.acknowledgeRecoveryCodes = acknowledgeRecoveryCodes;
|
|
3544
3547
|
exports.assertWalletAccountSigningAvailability = assertWalletAccountSigningAvailability;
|
|
3545
3548
|
exports.assertWalletProviderMethodDefined = assertWalletProviderMethodDefined;
|
|
3546
|
-
exports.
|
|
3547
|
-
exports.authTotpMfaDevice = authTotpMfaDevice;
|
|
3549
|
+
exports.authenticateMfaRecoveryCode = authenticateMfaRecoveryCode;
|
|
3548
3550
|
exports.authenticatePasskeyMFA = authenticatePasskeyMFA;
|
|
3551
|
+
exports.authenticateTotpMfaDevice = authenticateTotpMfaDevice;
|
|
3549
3552
|
exports.completeSocialRedirectSignIn = completeSocialRedirectSignIn;
|
|
3550
3553
|
exports.connectAndVerifyWithWalletProvider = connectAndVerifyWithWalletProvider;
|
|
3551
3554
|
exports.connectWithWalletProvider = connectWithWalletProvider;
|
package/index.esm.js
CHANGED
|
@@ -1499,6 +1499,47 @@ const providersRequiringPkce = [
|
|
|
1499
1499
|
}, client);
|
|
1500
1500
|
};
|
|
1501
1501
|
|
|
1502
|
+
/**
|
|
1503
|
+
* Authenticates using an MFA recovery code.
|
|
1504
|
+
*
|
|
1505
|
+
* This function allows users to bypass normal MFA requirements by using
|
|
1506
|
+
* one of their backup recovery codes when none of the registered MFA methods are available.
|
|
1507
|
+
*
|
|
1508
|
+
* @param params.code - The recovery code to authenticate with.
|
|
1509
|
+
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
1510
|
+
* @returns A promise that resolves to the MFA authentication response with token.
|
|
1511
|
+
*/ const authenticateMfaRecoveryCode = async ({ code, createMfaTokenOptions }, client = getDefaultClient())=>{
|
|
1512
|
+
const core = getCore(client);
|
|
1513
|
+
const apiClient = createApiClient({}, client);
|
|
1514
|
+
try {
|
|
1515
|
+
const response = await apiClient.authMfaRecovery({
|
|
1516
|
+
environmentId: core.environmentId,
|
|
1517
|
+
mFAAuthRecoveryDevicePostRequest: {
|
|
1518
|
+
code,
|
|
1519
|
+
createMfaToken: createMfaTokenOptions
|
|
1520
|
+
}
|
|
1521
|
+
});
|
|
1522
|
+
updateAuthFromVerifyResponse({
|
|
1523
|
+
response
|
|
1524
|
+
}, client);
|
|
1525
|
+
emitEvent({
|
|
1526
|
+
args: {
|
|
1527
|
+
mfaToken: response.mfaToken
|
|
1528
|
+
},
|
|
1529
|
+
event: 'mfaCompletionSuccess'
|
|
1530
|
+
}, client);
|
|
1531
|
+
return response;
|
|
1532
|
+
} catch (error) {
|
|
1533
|
+
emitEvent({
|
|
1534
|
+
args: {
|
|
1535
|
+
error
|
|
1536
|
+
},
|
|
1537
|
+
event: 'mfaCompletionFailure'
|
|
1538
|
+
}, client);
|
|
1539
|
+
throw error;
|
|
1540
|
+
}
|
|
1541
|
+
};
|
|
1542
|
+
|
|
1502
1543
|
const getPasskeyAuthenticationOptions = async (client)=>{
|
|
1503
1544
|
const core = getCore(client);
|
|
1504
1545
|
const apiClient = createApiClient({}, client);
|
|
@@ -1580,46 +1621,6 @@ const serverAuthenticatePasskey = async ({ authentication, createMfaToken }, cli
|
|
|
1580
1621
|
}
|
|
1581
1622
|
};
|
|
1582
1623
|
|
|
1583
|
-
/**
|
|
1584
|
-
* Authenticates using an MFA recovery code.
|
|
1585
|
-
*
|
|
1586
|
-
* This function allows users to bypass normal MFA requirements by using
|
|
1587
|
-
* one of their backup recovery codes when none of the registered MFA methods are available.
|
|
1588
|
-
*
|
|
1589
|
-
* @param params.code - The recovery code to authenticate with.
|
|
1590
|
-
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
1591
|
-
* @returns A promise that resolves to the MFA authentication response with token.
|
|
1592
|
-
*/ const authMfaRecoveryCode = async ({ code }, client = getDefaultClient())=>{
|
|
1593
|
-
const core = getCore(client);
|
|
1594
|
-
const apiClient = createApiClient({}, client);
|
|
1595
|
-
try {
|
|
1596
|
-
const response = await apiClient.authMfaRecovery({
|
|
1597
|
-
environmentId: core.environmentId,
|
|
1598
|
-
mFAAuthRecoveryDevicePostRequest: {
|
|
1599
|
-
code
|
|
1600
|
-
}
|
|
1601
|
-
});
|
|
1602
|
-
updateAuthFromVerifyResponse({
|
|
1603
|
-
response
|
|
1604
|
-
}, client);
|
|
1605
|
-
emitEvent({
|
|
1606
|
-
args: {
|
|
1607
|
-
mfaToken: response.mfaToken
|
|
1608
|
-
},
|
|
1609
|
-
event: 'mfaCompletionSuccess'
|
|
1610
|
-
}, client);
|
|
1611
|
-
return response;
|
|
1612
|
-
} catch (error) {
|
|
1613
|
-
emitEvent({
|
|
1614
|
-
args: {
|
|
1615
|
-
error
|
|
1616
|
-
},
|
|
1617
|
-
event: 'mfaCompletionFailure'
|
|
1618
|
-
}, client);
|
|
1619
|
-
throw error;
|
|
1620
|
-
}
|
|
1621
|
-
};
|
|
1622
|
-
|
|
1623
1624
|
/**
|
|
1624
1625
|
* Authenticates using a TOTP (Time-based One-Time Password) MFA device.
|
|
1625
1626
|
*
|
|
@@ -1631,7 +1632,7 @@ const serverAuthenticatePasskey = async ({ authentication, createMfaToken }, cli
|
|
|
1631
1632
|
* @param [params.createMfaTokenOptions] - Optional configuration for MFA token creation.
|
|
1632
1633
|
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
1633
1634
|
* @returns A promise that resolves to the MFA authentication response.
|
|
1634
|
-
*/ const
|
|
1635
|
+
*/ const authenticateTotpMfaDevice = async ({ deviceId, code, createMfaTokenOptions }, client = getDefaultClient())=>{
|
|
1635
1636
|
const core = getCore(client);
|
|
1636
1637
|
const apiClient = createApiClient({}, client);
|
|
1637
1638
|
try {
|
|
@@ -1808,6 +1809,8 @@ const serverAuthenticatePasskey = async ({ authentication, createMfaToken }, cli
|
|
|
1808
1809
|
/**
|
|
1809
1810
|
* Sends a one-time password (OTP) to the specified email address.
|
|
1810
1811
|
*
|
|
1812
|
+
* Once you have the OTP code, you should then use `verifyOTP` to verify it and complete the authentication process.
|
|
1813
|
+
*
|
|
1811
1814
|
* @param params.email - The email address to send the OTP to.
|
|
1812
1815
|
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
1813
1816
|
* @returns A promise that resolves to an OTPVerification object containing the email and verification UUID.
|
|
@@ -3224,7 +3227,7 @@ const isSameAddress = (left, right, chain)=>normalizeAddress(left, chain) === no
|
|
|
3224
3227
|
walletAccount
|
|
3225
3228
|
}, client);
|
|
3226
3229
|
const { networkId } = await walletProvider.getActiveNetworkId();
|
|
3227
|
-
const networksData = getNetworksData();
|
|
3230
|
+
const networksData = getNetworksData(client);
|
|
3228
3231
|
const activeNetworkData = networksData.find((data)=>data.networkId === networkId && data.chain === walletProvider.chain);
|
|
3229
3232
|
return {
|
|
3230
3233
|
networkData: activeNetworkData
|
|
@@ -3489,4 +3492,4 @@ const isSameAddress = (left, right, chain)=>normalizeAddress(left, chain) === no
|
|
|
3489
3492
|
|
|
3490
3493
|
assertPackageVersion(name, version);
|
|
3491
3494
|
|
|
3492
|
-
export { BaseError, ClientAlreadyInitializedError, InvalidRedirectStorageStateError, MissingRedirectStorageStateError, MissingSocialUrlParamError, NetworkSwitchingUnavailableError, NoAddressFoundError, NoPasskeyCredentialsFoundError, NoWebAuthNSupportError, UnavailableInServerSideError, UnrecognizedNetworkError, UserNotAuthenticatedError, UserRejectedError, WalletAccountAlreadyVerifiedError, WalletAccountNotSelectedError, WalletAlreadyLinkedToAnotherUserError, WalletProviderMethodUnavailableError, acknowledgeRecoveryCodes, assertWalletAccountSigningAvailability, assertWalletProviderMethodDefined,
|
|
3495
|
+
export { BaseError, ClientAlreadyInitializedError, InvalidRedirectStorageStateError, MissingRedirectStorageStateError, MissingSocialUrlParamError, NetworkSwitchingUnavailableError, NoAddressFoundError, NoPasskeyCredentialsFoundError, NoWebAuthNSupportError, UnavailableInServerSideError, UnrecognizedNetworkError, UserNotAuthenticatedError, UserRejectedError, WalletAccountAlreadyVerifiedError, WalletAccountNotSelectedError, WalletAlreadyLinkedToAnotherUserError, WalletProviderMethodUnavailableError, acknowledgeRecoveryCodes, assertWalletAccountSigningAvailability, assertWalletProviderMethodDefined, authenticateMfaRecoveryCode, authenticatePasskeyMFA, authenticateTotpMfaDevice, completeSocialRedirectSignIn, connectAndVerifyWithWalletProvider, connectWithWalletProvider, createDynamicClient, createNewMfaRecoveryCodes, deleteMfaDevice, deletePasskey, detectOAuthRedirect, fetchProjectSettings, getActiveNetworkData, getActiveNetworkId, getAvailableWalletProvidersData, getBalance, getBalanceForAddress, getConnectedAddresses, getDefaultClient, getMfaDevices, getMfaRecoveryCodes, getMultichainBalances, getNetworksData, getPasskeys, getPrimaryWalletAccount, getWalletAccountFromAddress, getWalletAccounts, initializeClient, isPendingRecoveryCodesAcknowledgment, isProgrammaticNetworkSwitchAvailable, isSignedIn, isUserMissingMfaAuth, logout, offWalletProviderEvent, onWalletProviderEvent, proveWalletAccountOwnership, registerPasskey, registerTotpMfaDevice, removeWalletAccount, selectPrimaryWalletAccount, sendEmailOTP, sendSmsOTP, setDefaultMfaDevice, signInWithExternalJwt, signInWithPasskey, signInWithSocialRedirect, signMessage, switchActiveNetwork, updateUser, verifyOTP, verifyWalletAccount };
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@dynamic-labs-sdk/client",
|
|
3
|
-
"version": "0.1.0-alpha.
|
|
3
|
+
"version": "0.1.0-alpha.2",
|
|
4
4
|
"type": "module",
|
|
5
5
|
"main": "./index.cjs.js",
|
|
6
6
|
"module": "./index.esm.js",
|
|
@@ -29,7 +29,7 @@
|
|
|
29
29
|
}
|
|
30
30
|
},
|
|
31
31
|
"dependencies": {
|
|
32
|
-
"@dynamic-labs-sdk/assert-package-version": "0.1.0-alpha.
|
|
32
|
+
"@dynamic-labs-sdk/assert-package-version": "0.1.0-alpha.2",
|
|
33
33
|
"@dynamic-labs/sdk-api-core": "0.0.762",
|
|
34
34
|
"@dynamic-labs-wallet/browser-wallet-client": "0.0.144",
|
|
35
35
|
"@simplewebauthn/browser": "^13.1.0",
|
package/refreshUser.cjs.js
CHANGED
|
@@ -95,24 +95,6 @@ class NotWaasWalletAccountError extends getChainFromVerifiedCredentialChain.Base
|
|
|
95
95
|
}
|
|
96
96
|
}
|
|
97
97
|
|
|
98
|
-
const checkAndRaiseAuthenticatedEvent = ({ previousState, response }, client)=>{
|
|
99
|
-
const core = getChainFromVerifiedCredentialChain.getCore(client);
|
|
100
|
-
/*
|
|
101
|
-
* If there was no user before, it means we are signing in
|
|
102
|
-
* we should check user and not jwt because of cookie based auth
|
|
103
|
-
*/ const isSigningIn = previousState.user === null;
|
|
104
|
-
if (!isSigningIn) {
|
|
105
|
-
return;
|
|
106
|
-
}
|
|
107
|
-
core.logger.debug('[updateAuthFromVerifyResponse] sign in detected, raising authenticated event');
|
|
108
|
-
getWalletProviderByKey.emitEvent({
|
|
109
|
-
args: {
|
|
110
|
-
verifyResponse: response
|
|
111
|
-
},
|
|
112
|
-
event: 'authenticated'
|
|
113
|
-
}, client);
|
|
114
|
-
};
|
|
115
|
-
|
|
116
98
|
/**
|
|
117
99
|
* Emits the `walletAccountsChanged` event.
|
|
118
100
|
*/ const emitWalletAccountsChangedEvent = (client)=>{
|
|
@@ -146,10 +128,6 @@ const updateAuthFromVerifyResponse = ({ response }, client)=>{
|
|
|
146
128
|
token: minifiedJwt != null ? minifiedJwt : null,
|
|
147
129
|
user
|
|
148
130
|
});
|
|
149
|
-
checkAndRaiseAuthenticatedEvent({
|
|
150
|
-
previousState,
|
|
151
|
-
response
|
|
152
|
-
}, client);
|
|
153
131
|
checkAndRaiseWalletAccountsChangedEvent({
|
|
154
132
|
previousState
|
|
155
133
|
}, client);
|
package/refreshUser.esm.js
CHANGED
|
@@ -93,24 +93,6 @@ class NotWaasWalletAccountError extends BaseError {
|
|
|
93
93
|
}
|
|
94
94
|
}
|
|
95
95
|
|
|
96
|
-
const checkAndRaiseAuthenticatedEvent = ({ previousState, response }, client)=>{
|
|
97
|
-
const core = getCore(client);
|
|
98
|
-
/*
|
|
99
|
-
* If there was no user before, it means we are signing in
|
|
100
|
-
* we should check user and not jwt because of cookie based auth
|
|
101
|
-
*/ const isSigningIn = previousState.user === null;
|
|
102
|
-
if (!isSigningIn) {
|
|
103
|
-
return;
|
|
104
|
-
}
|
|
105
|
-
core.logger.debug('[updateAuthFromVerifyResponse] sign in detected, raising authenticated event');
|
|
106
|
-
emitEvent({
|
|
107
|
-
args: {
|
|
108
|
-
verifyResponse: response
|
|
109
|
-
},
|
|
110
|
-
event: 'authenticated'
|
|
111
|
-
}, client);
|
|
112
|
-
};
|
|
113
|
-
|
|
114
96
|
/**
|
|
115
97
|
* Emits the `walletAccountsChanged` event.
|
|
116
98
|
*/ const emitWalletAccountsChangedEvent = (client)=>{
|
|
@@ -144,10 +126,6 @@ const updateAuthFromVerifyResponse = ({ response }, client)=>{
|
|
|
144
126
|
token: minifiedJwt != null ? minifiedJwt : null,
|
|
145
127
|
user
|
|
146
128
|
});
|
|
147
|
-
checkAndRaiseAuthenticatedEvent({
|
|
148
|
-
previousState,
|
|
149
|
-
response
|
|
150
|
-
}, client);
|
|
151
129
|
checkAndRaiseWalletAccountsChangedEvent({
|
|
152
130
|
previousState
|
|
153
131
|
}, client);
|
package/src/exports/index.d.ts
CHANGED
|
@@ -9,7 +9,7 @@ import '../modules/mfa/events';
|
|
|
9
9
|
import '../modules/state/raiseStateEvents/events';
|
|
10
10
|
import '../modules/wallets/walletAccount/events';
|
|
11
11
|
import '../modules/wallets/walletProviderRegistry/events';
|
|
12
|
-
export type { CreateMfaToken } from '@dynamic-labs/sdk-api-core';
|
|
12
|
+
export type { CreateMfaToken, MFAAction } from '@dynamic-labs/sdk-api-core';
|
|
13
13
|
export type { DynamicCoreConfig } from '../client/core/types';
|
|
14
14
|
export { createDynamicClient } from '../client/createDynamicClient';
|
|
15
15
|
export { getDefaultClient } from '../client/defaultClient';
|
|
@@ -56,9 +56,9 @@ export { hasExtension } from '../modules/extension/hasExtension';
|
|
|
56
56
|
export { initializeClient } from '../modules/initializeClient';
|
|
57
57
|
export type { DynamicInitStatus } from '../modules/initializeClient/state';
|
|
58
58
|
export { acknowledgeRecoveryCodes } from '../modules/mfa/acknowledgeRecoveryCodes';
|
|
59
|
+
export { authenticateMfaRecoveryCode } from '../modules/mfa/authenticateMfaRecoveryCode';
|
|
59
60
|
export { authenticatePasskeyMFA } from '../modules/mfa/authenticatePasskeyMFA';
|
|
60
|
-
export {
|
|
61
|
-
export { authTotpMfaDevice } from '../modules/mfa/authTotpMfaDevice';
|
|
61
|
+
export { authenticateTotpMfaDevice } from '../modules/mfa/authenticateTotpMfaDevice';
|
|
62
62
|
export { consumeMfaToken } from '../modules/mfa/consumeMfaToken';
|
|
63
63
|
export { createNewMfaRecoveryCodes } from '../modules/mfa/createNewMfaRecoveryCodes';
|
|
64
64
|
export { deleteMfaDevice } from '../modules/mfa/deleteMfaDevice';
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../packages/client/src/exports/index.ts"],"names":[],"mappings":"AAWA,OAAO,uBAAuB,CAAC;AAC/B,OAAO,mCAAmC,CAAC;AAC3C,OAAO,sBAAsB,CAAC;AAC9B,OAAO,kCAAkC,CAAC;AAC1C,OAAO,8BAA8B,CAAC;AACtC,OAAO,mDAAmD,CAAC;AAG3D,OAAO,wBAAwB,CAAC;AAChC,OAAO,uBAAuB,CAAC;AAC/B,OAAO,0CAA0C,CAAC;AAClD,OAAO,yCAAyC,CAAC;AACjD,OAAO,kDAAkD,CAAC;AAE1D,YAAY,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../packages/client/src/exports/index.ts"],"names":[],"mappings":"AAWA,OAAO,uBAAuB,CAAC;AAC/B,OAAO,mCAAmC,CAAC;AAC3C,OAAO,sBAAsB,CAAC;AAC9B,OAAO,kCAAkC,CAAC;AAC1C,OAAO,8BAA8B,CAAC;AACtC,OAAO,mDAAmD,CAAC;AAG3D,OAAO,wBAAwB,CAAC;AAChC,OAAO,uBAAuB,CAAC;AAC/B,OAAO,0CAA0C,CAAC;AAClD,OAAO,yCAAyC,CAAC;AACjD,OAAO,kDAAkD,CAAC;AAE1D,YAAY,EAAE,cAAc,EAAE,SAAS,EAAE,MAAM,4BAA4B,CAAC;AAC5E,YAAY,EAAE,iBAAiB,EAAE,MAAM,sBAAsB,CAAC;AAC9D,OAAO,EAAE,mBAAmB,EAAE,MAAM,+BAA+B,CAAC;AACpE,OAAO,EAAE,gBAAgB,EAAE,MAAM,yBAAyB,CAAC;AAC3D,YAAY,EAAE,aAAa,EAAE,mBAAmB,EAAE,MAAM,iBAAiB,CAAC;AAC1E,OAAO,EAAE,SAAS,EAAE,KAAK,mBAAmB,EAAE,MAAM,gBAAgB,CAAC;AACrE,OAAO,EAAE,6BAA6B,EAAE,MAAM,yCAAyC,CAAC;AACxF,OAAO,EAAE,wBAAwB,EAAE,MAAM,oCAAoC,CAAC;AAC9E,OAAO,EAAE,iBAAiB,EAAE,MAAM,6BAA6B,CAAC;AAChE,OAAO,EAAE,gCAAgC,EAAE,MAAM,4CAA4C,CAAC;AAC9F,OAAO,EAAE,kBAAkB,EAAE,MAAM,8BAA8B,CAAC;AAClE,OAAO,EAAE,mBAAmB,EAAE,MAAM,+BAA+B,CAAC;AACpE,OAAO,EAAE,gCAAgC,EAAE,MAAM,4CAA4C,CAAC;AAC9F,OAAO,EAAE,0BAA0B,EAAE,MAAM,sCAAsC,CAAC;AAClF,OAAO,EAAE,gCAAgC,EAAE,MAAM,4CAA4C,CAAC;AAC9F,OAAO,EAAE,mBAAmB,EAAE,MAAM,+BAA+B,CAAC;AACpE,OAAO,EAAE,uBAAuB,EAAE,MAAM,mCAAmC,CAAC;AAC5E,OAAO,EAAE,8BAA8B,EAAE,MAAM,0CAA0C,CAAC;AAC1F,OAAO,EAAE,yBAAyB,EAAE,MAAM,qCAAqC,CAAC;AAChF,OAAO,EAAE,sBAAsB,EAAE,MAAM,kCAAkC,CAAC;AAC1E,OAAO,EAAE,mCAAmC,EAAE,MAAM,+CAA+C,CAAC;AACpG,OAAO,EAAE,4BAA4B,EAAE,MAAM,wCAAwC,CAAC;AACtF,OAAO,EAAE,wBAAwB,EAAE,MAAM,oCAAoC,CAAC;AAC9E,OAAO,EAAE,yBAAyB,EAAE,MAAM,qCAAqC,CAAC;AAChF,OAAO,EAAE,iBAAiB,EAAE,MAAM,6BAA6B,CAAC;AAChE,OAAO,EAAE,iCAAiC,EAAE,MAAM,6CAA6C,CAAC;AAChG,OAAO,EAAE,6BAA6B,EAAE,MAAM,yCAAyC,CAAC;AACxF,OAAO,EAAE,qCAAqC,EAAE,MAAM,iDAAiD,CAAC;AACxG,OAAO,EAAE,oCAAoC,EAAE,MAAM,gDAAgD,CAAC;AACtG,OAAO,EAAE,qBAAqB,EAAE,MAAM,oDAAoD,CAAC;AAC3F,OAAO,EAAE,UAAU,EAAE,MAAM,4BAA4B,CAAC;AACxD,OAAO,EAAE,MAAM,EAAE,MAAM,wBAAwB,CAAC;AAChD,OAAO,EAAE,aAAa,EAAE,MAAM,wCAAwC,CAAC;AACvE,OAAO,EAAE,WAAW,EAAE,MAAM,sCAAsC,CAAC;AACnE,OAAO,EAAE,eAAe,EAAE,MAAM,0CAA0C,CAAC;AAC3E,OAAO,EAAE,iBAAiB,EAAE,MAAM,4CAA4C,CAAC;AAC/E,OAAO,EAAE,4BAA4B,EAAE,MAAM,2DAA2D,CAAC;AACzG,OAAO,EAAE,mBAAmB,EAAE,MAAM,kDAAkD,CAAC;AACvF,OAAO,EAAE,wBAAwB,EAAE,MAAM,uDAAuD,CAAC;AACjG,YAAY,EAAE,cAAc,EAAE,MAAM,qCAAqC,CAAC;AAC1E,OAAO,EAAE,qBAAqB,EAAE,MAAM,iEAAiE,CAAC;AACxG,YAAY,EAAE,KAAK,EAAE,MAAM,kBAAkB,CAAC;AAC9C,OAAO,EAAE,QAAQ,EAAE,SAAS,EAAE,OAAO,EAAE,MAAM,yBAAyB,CAAC;AACvE,OAAO,EAAE,YAAY,EAAE,MAAM,mCAAmC,CAAC;AACjE,OAAO,EAAE,gBAAgB,EAAE,MAAM,6BAA6B,CAAC;AAC/D,YAAY,EAAE,iBAAiB,EAAE,MAAM,mCAAmC,CAAC;AAC3E,OAAO,EAAE,wBAAwB,EAAE,MAAM,yCAAyC,CAAC;AACnF,OAAO,EAAE,2BAA2B,EAAE,MAAM,4CAA4C,CAAC;AACzF,OAAO,EAAE,sBAAsB,EAAE,MAAM,uCAAuC,CAAC;AAC/E,OAAO,EAAE,yBAAyB,EAAE,MAAM,0CAA0C,CAAC;AACrF,OAAO,EAAE,eAAe,EAAE,MAAM,gCAAgC,CAAC;AACjE,OAAO,EAAE,yBAAyB,EAAE,MAAM,0CAA0C,CAAC;AACrF,OAAO,EAAE,eAAe,EAAE,MAAM,gCAAgC,CAAC;AACjE,OAAO,EAAE,aAAa,EAAE,MAAM,8BAA8B,CAAC;AAC7D,OAAO,EAAE,aAAa,EAAE,MAAM,8BAA8B,CAAC;AAC7D,OAAO,EAAE,mBAAmB,EAAE,MAAM,oCAAoC,CAAC;AACzE,OAAO,EAAE,sBAAsB,EAAE,MAAM,uCAAuC,CAAC;AAC/E,OAAO,EAAE,oCAAoC,EAAE,MAAM,qDAAqD,CAAC;AAC3G,OAAO,EAAE,oBAAoB,EAAE,MAAM,qCAAqC,CAAC;AAC3E,YAAY,EAAE,SAAS,EAAE,MAAM,0BAA0B,CAAC;AAC1D,OAAO,EAAE,qBAAqB,EAAE,MAAM,sCAAsC,CAAC;AAC7E,OAAO,EAAE,mBAAmB,EAAE,MAAM,oCAAoC,CAAC;AACzE,YAAY,EAAE,eAAe,EAAE,MAAM,0BAA0B,CAAC;AAChE,OAAO,EAAE,YAAY,EAAE,MAAM,6BAA6B,CAAC;AAC3D,OAAO,EAAE,UAAU,EAAE,MAAM,2BAA2B,CAAC;AACvD,OAAO,EAAE,SAAS,EAAE,MAAM,0BAA0B,CAAC;AACrD,OAAO,EAAE,oBAAoB,EAAE,MAAM,iDAAiD,CAAC;AACvF,OAAO,EAAE,WAAW,EAAE,MAAM,6BAA6B,CAAC;AAC1D,OAAO,EAAE,UAAU,EAAE,MAAM,4BAA4B,CAAC;AACxD,YAAY,EAAE,gBAAgB,EAAE,MAAM,4BAA4B,CAAC;AACnE,OAAO,EAAE,sCAAsC,EAAE,MAAM,2DAA2D,CAAC;AACnH,OAAO,EAAE,kCAAkC,EAAE,MAAM,uDAAuD,CAAC;AAC3G,OAAO,EAAE,yBAAyB,EAAE,MAAM,8CAA8C,CAAC;AACzF,OAAO,EAAE,+BAA+B,EAAE,MAAM,oDAAoD,CAAC;AACrG,OAAO,EAAE,qBAAqB,EAAE,MAAM,0CAA0C,CAAC;AACjF,OAAO,EAAE,iBAAiB,EAAE,MAAM,sCAAsC,CAAC;AACzE,OAAO,EAAE,oBAAoB,EAAE,MAAM,kDAAkD,CAAC;AACxF,OAAO,EAAE,kBAAkB,EAAE,MAAM,gDAAgD,CAAC;AACpF,OAAO,EAAE,UAAU,EAAE,MAAM,wCAAwC,CAAC;AACpE,OAAO,EAAE,oBAAoB,EAAE,MAAM,kDAAkD,CAAC;AACxF,OAAO,EAAE,eAAe,EAAE,MAAM,6CAA6C,CAAC;AAC9E,OAAO,EAAE,oCAAoC,EAAE,MAAM,kEAAkE,CAAC;AACxH,YAAY,EAAE,eAAe,EAAE,MAAM,6CAA6C,CAAC;AACnF,YAAY,EAAE,WAAW,EAAE,MAAM,mEAAmE,CAAC;AACrG,OAAO,EAAE,mBAAmB,EAAE,MAAM,iDAAiD,CAAC;AACtF,OAAO,EAAE,uBAAuB,EAAE,MAAM,iEAAiE,CAAC;AAC1G,OAAO,EAAE,0BAA0B,EAAE,MAAM,oEAAoE,CAAC;AAChH,OAAO,EAAE,2BAA2B,EAAE,MAAM,gDAAgD,CAAC;AAC7F,OAAO,EAAE,mBAAmB,EAAE,MAAM,wCAAwC,CAAC;AAC7E,OAAO,EAAE,WAAW,EAAE,MAAM,gCAAgC,CAAC;AAC7D,OAAO,EAAE,iCAAiC,EAAE,MAAM,4DAA4D,CAAC;AAC/G,OAAO,EAAE,2BAA2B,EAAE,MAAM,sDAAsD,CAAC;AACnG,OAAO,EAAE,mBAAmB,EAAE,MAAM,wCAAwC,CAAC;AAC7E,YAAY,EAAE,aAAa,EAAE,MAAM,kCAAkC,CAAC;AACtE,YAAY,EAAE,kBAAkB,EAAE,MAAM,mCAAmC,CAAC;AAC5E,OAAO,EAAE,sBAAsB,EAAE,MAAM,iEAAiE,CAAC;AACzG,OAAO,EAAE,qBAAqB,EAAE,MAAM,gEAAgE,CAAC"}
|
|
@@ -1,16 +1,10 @@
|
|
|
1
|
-
import type { VerifyResponse } from '@dynamic-labs/sdk-api-core';
|
|
2
1
|
declare global {
|
|
3
2
|
interface DynamicEvents {
|
|
4
|
-
/**
|
|
5
|
-
* Raised when the user is authenticated.
|
|
6
|
-
*/
|
|
7
|
-
authenticated: (args: {
|
|
8
|
-
verifyResponse: VerifyResponse;
|
|
9
|
-
}) => void;
|
|
10
3
|
/**
|
|
11
4
|
* Raised when "logout" is called.
|
|
12
5
|
*/
|
|
13
6
|
logout: () => void;
|
|
14
7
|
}
|
|
15
8
|
}
|
|
9
|
+
export {};
|
|
16
10
|
//# sourceMappingURL=events.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"events.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/modules/auth/events.ts"],"names":[],"mappings":"AAAA,OAAO,
|
|
1
|
+
{"version":3,"file":"events.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/modules/auth/events.ts"],"names":[],"mappings":"AAAA,OAAO,CAAC,MAAM,CAAC;IACb,UAAU,aAAa;QACrB;;WAEG;QACH,MAAM,EAAE,MAAM,IAAI,CAAC;KACpB;CACF;AAED,OAAO,EAAE,CAAC"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"updateAuthFromVerifyResponse.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/auth/updateAuthFromVerifyResponse/updateAuthFromVerifyResponse.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAGjE,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;
|
|
1
|
+
{"version":3,"file":"updateAuthFromVerifyResponse.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/auth/updateAuthFromVerifyResponse/updateAuthFromVerifyResponse.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAGjE,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAG3D,KAAK,kCAAkC,GAAG;IACxC,QAAQ,EAAE,cAAc,CAAC;CAC1B,CAAC;AAEF,eAAO,MAAM,4BAA4B,iBACzB,kCAAkC,UACxC,aAAa,SAiBtB,CAAC"}
|
|
@@ -1,5 +1,7 @@
|
|
|
1
|
-
type
|
|
1
|
+
import type { CreateMfaToken } from '@dynamic-labs/sdk-api-core';
|
|
2
|
+
type AuthenticateMfaRecoveryCodeParams = {
|
|
2
3
|
code: string;
|
|
4
|
+
createMfaTokenOptions?: CreateMfaToken;
|
|
3
5
|
};
|
|
4
6
|
/**
|
|
5
7
|
* Authenticates using an MFA recovery code.
|
|
@@ -11,6 +13,6 @@ type AuthMfaRecoveryCodeParams = {
|
|
|
11
13
|
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
12
14
|
* @returns A promise that resolves to the MFA authentication response with token.
|
|
13
15
|
*/
|
|
14
|
-
export declare const
|
|
16
|
+
export declare const authenticateMfaRecoveryCode: ({ code, createMfaTokenOptions }: AuthenticateMfaRecoveryCodeParams, client?: import("../../../exports").DynamicClient) => Promise<import("@dynamic-labs/sdk-api-core").VerifyResponse>;
|
|
15
17
|
export {};
|
|
16
|
-
//# sourceMappingURL=
|
|
18
|
+
//# sourceMappingURL=authenticateMfaRecoveryCode.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"authenticateMfaRecoveryCode.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/mfa/authenticateMfaRecoveryCode/authenticateMfaRecoveryCode.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAQjE,KAAK,iCAAiC,GAAG;IACvC,IAAI,EAAE,MAAM,CAAC;IACb,qBAAqB,CAAC,EAAE,cAAc,CAAC;CACxC,CAAC;AAEF;;;;;;;;;GASG;AACH,eAAO,MAAM,2BAA2B,oCACL,iCAAiC,oHAoCnE,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/mfa/authenticateMfaRecoveryCode/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,2BAA2B,EAAE,MAAM,+BAA+B,CAAC"}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import type { CreateMfaToken } from '@dynamic-labs/sdk-api-core';
|
|
2
|
-
type
|
|
2
|
+
type AuthenticateTotpMfaDeviceParams = {
|
|
3
3
|
code: string;
|
|
4
4
|
createMfaTokenOptions?: CreateMfaToken;
|
|
5
5
|
deviceId?: string;
|
|
@@ -16,6 +16,6 @@ type AuthTotpMfaDeviceParams = {
|
|
|
16
16
|
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
17
17
|
* @returns A promise that resolves to the MFA authentication response.
|
|
18
18
|
*/
|
|
19
|
-
export declare const
|
|
19
|
+
export declare const authenticateTotpMfaDevice: ({ deviceId, code, createMfaTokenOptions }: AuthenticateTotpMfaDeviceParams, client?: import("../../../exports").DynamicClient) => Promise<import("@dynamic-labs/sdk-api-core").VerifyResponse>;
|
|
20
20
|
export {};
|
|
21
|
-
//# sourceMappingURL=
|
|
21
|
+
//# sourceMappingURL=authenticateTotpMfaDevice.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"authenticateTotpMfaDevice.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/mfa/authenticateTotpMfaDevice/authenticateTotpMfaDevice.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAQjE,KAAK,+BAA+B,GAAG;IACrC,IAAI,EAAE,MAAM,CAAC;IACb,qBAAqB,CAAC,EAAE,cAAc,CAAC;IACvC,QAAQ,CAAC,EAAE,MAAM,CAAC;CACnB,CAAC;AAEF;;;;;;;;;;;GAWG;AACH,eAAO,MAAM,yBAAyB,8CACO,+BAA+B,oHAqC3E,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/mfa/authenticateTotpMfaDevice/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,yBAAyB,EAAE,MAAM,6BAA6B,CAAC"}
|
|
@@ -5,6 +5,8 @@ export type SendEmailOTPParams = {
|
|
|
5
5
|
/**
|
|
6
6
|
* Sends a one-time password (OTP) to the specified email address.
|
|
7
7
|
*
|
|
8
|
+
* Once you have the OTP code, you should then use `verifyOTP` to verify it and complete the authentication process.
|
|
9
|
+
*
|
|
8
10
|
* @param params.email - The email address to send the OTP to.
|
|
9
11
|
* @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
|
|
10
12
|
* @returns A promise that resolves to an OTPVerification object containing the email and verification UUID.
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"sendEmailOTP.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/otp/sendEmailOTP/sendEmailOTP.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,cAAc,CAAC;AAEpD,MAAM,MAAM,kBAAkB,GAAG;IAC/B,KAAK,EAAE,MAAM,CAAC;CACf,CAAC;AAEF
|
|
1
|
+
{"version":3,"file":"sendEmailOTP.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/otp/sendEmailOTP/sendEmailOTP.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,cAAc,CAAC;AAEpD,MAAM,MAAM,kBAAkB,GAAG;IAC/B,KAAK,EAAE,MAAM,CAAC;CACf,CAAC;AAEF;;;;;;;;GAQG;AACH,eAAO,MAAM,YAAY,cACZ,kBAAkB,wDAE5B,OAAO,CAAC,eAAe,CAYzB,CAAC"}
|
|
@@ -1,10 +0,0 @@
|
|
|
1
|
-
import type { VerifyResponse } from '@dynamic-labs/sdk-api-core';
|
|
2
|
-
import type { DynamicCoreState } from '../../../../client/core/types';
|
|
3
|
-
import type { DynamicClient } from '../../../../client/types';
|
|
4
|
-
type CheckAndRaiseAuthenticatedEventParams = {
|
|
5
|
-
previousState: Readonly<DynamicCoreState>;
|
|
6
|
-
response: VerifyResponse;
|
|
7
|
-
};
|
|
8
|
-
export declare const checkAndRaiseAuthenticatedEvent: ({ previousState, response }: CheckAndRaiseAuthenticatedEventParams, client: DynamicClient) => void;
|
|
9
|
-
export {};
|
|
10
|
-
//# sourceMappingURL=checkAndRaiseAuthenticatedEvent.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"checkAndRaiseAuthenticatedEvent.d.ts","sourceRoot":"","sources":["../../../../../../../../packages/client/src/modules/auth/updateAuthFromVerifyResponse/checkAndRaiseAuthenticatedEvent/checkAndRaiseAuthenticatedEvent.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAGjE,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,+BAA+B,CAAC;AACtE,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,0BAA0B,CAAC;AAG9D,KAAK,qCAAqC,GAAG;IAC3C,aAAa,EAAE,QAAQ,CAAC,gBAAgB,CAAC,CAAC;IAC1C,QAAQ,EAAE,cAAc,CAAC;CAC1B,CAAC;AAEF,eAAO,MAAM,+BAA+B,gCACb,qCAAqC,UAC1D,aAAa,SAyBtB,CAAC"}
|
package/src/modules/auth/updateAuthFromVerifyResponse/checkAndRaiseAuthenticatedEvent/index.d.ts.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../../../../packages/client/src/modules/auth/updateAuthFromVerifyResponse/checkAndRaiseAuthenticatedEvent/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,+BAA+B,EAAE,MAAM,mCAAmC,CAAC"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"authMfaRecoveryCode.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/mfa/authMfaRecoveryCode/authMfaRecoveryCode.ts"],"names":[],"mappings":"AAMA,KAAK,yBAAyB,GAAG;IAC/B,IAAI,EAAE,MAAM,CAAC;CACd,CAAC;AAEF;;;;;;;;;GASG;AACH,eAAO,MAAM,mBAAmB,aACpB,yBAAyB,oHAmCpC,CAAC"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/mfa/authMfaRecoveryCode/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,mBAAmB,EAAE,MAAM,uBAAuB,CAAC"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"authTotpMfaDevice.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/mfa/authTotpMfaDevice/authTotpMfaDevice.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAQjE,KAAK,uBAAuB,GAAG;IAC7B,IAAI,EAAE,MAAM,CAAC;IACb,qBAAqB,CAAC,EAAE,cAAc,CAAC;IACvC,QAAQ,CAAC,EAAE,MAAM,CAAC;CACnB,CAAC;AAEF;;;;;;;;;;;GAWG;AACH,eAAO,MAAM,iBAAiB,8CACe,uBAAuB,oHAqCnE,CAAC"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/mfa/authTotpMfaDevice/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,iBAAiB,EAAE,MAAM,qBAAqB,CAAC"}
|