@dynamic-labs-sdk/client 0.1.0-alpha.2 → 0.1.0-alpha.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -1,3 +1,7 @@
1
+ ## 0.1.0-alpha.3 (2025-09-09)
2
+
3
+ This was a version bump only, there were no code changes.
4
+
1
5
  ## 0.1.0-alpha.2 (2025-09-08)
2
6
 
3
7
  This was a version bump only, there were no code changes.
@@ -4,7 +4,7 @@ var sdkApiCore = require('@dynamic-labs/sdk-api-core');
4
4
  var buffer = require('buffer');
5
5
 
6
6
  var name = "@dynamic-labs-sdk/client";
7
- var version = "0.1.0-alpha.2";
7
+ var version = "0.1.0-alpha.3";
8
8
  var dependencies = {
9
9
  "@dynamic-labs/sdk-api-core": "0.0.762"};
10
10
 
@@ -2,7 +2,7 @@ import { AuthStorageEnum, SDKApi, Configuration } from '@dynamic-labs/sdk-api-co
2
2
  import { Buffer as Buffer$1 } from 'buffer';
3
3
 
4
4
  var name = "@dynamic-labs-sdk/client";
5
- var version = "0.1.0-alpha.2";
5
+ var version = "0.1.0-alpha.3";
6
6
  var dependencies = {
7
7
  "@dynamic-labs/sdk-api-core": "0.0.762"};
8
8
 
package/index.cjs.js CHANGED
@@ -348,6 +348,7 @@ const getAvailableWalletProvidersFromWalletAccounts = (client)=>{
348
348
  core.logger.error('Failed to revoke session', error);
349
349
  }
350
350
  core.state.set({
351
+ legacyToken: null,
351
352
  sessionExpiresAt: null,
352
353
  token: null,
353
354
  user: null
@@ -442,6 +443,11 @@ const sessionKeySchema = getNetworkProviderFromNetworkId.createStorageKeySchema(
442
443
  key: 'session',
443
444
  schema: z__namespace.object({
444
445
  /**
446
+ * Legacy token will be undefined in environments with cookie based sessions.
447
+ *
448
+ * @deprecated Use `token` instead.
449
+ */ legacyToken: z__namespace.nullable(z__namespace.string()),
450
+ /**
445
451
  * The current available MFA token.
446
452
  */ mfaToken: z__namespace.nullable(z__namespace.string()),
447
453
  /**
@@ -464,6 +470,7 @@ const hydrateStateWithStorage = async (client)=>{
464
470
  const isSessionValid = (session == null ? void 0 : session.sessionExpiration) && session.sessionExpiration > Date.now();
465
471
  if (isSessionValid) {
466
472
  stateChanges.token = session.token;
473
+ stateChanges.legacyToken = session.legacyToken;
467
474
  stateChanges.sessionExpiresAt = new Date(session.sessionExpiration);
468
475
  stateChanges.mfaToken = session.mfaToken;
469
476
  stateChanges.sessionKeys = session.sessionKeys;
@@ -490,6 +497,7 @@ const syncStateWithStorage = (client)=>{
490
497
  void core.storage.removeItem(sessionKeySchema);
491
498
  } else {
492
499
  void core.storage.setItem(sessionKeySchema, {
500
+ legacyToken: state.legacyToken,
493
501
  mfaToken: state.mfaToken,
494
502
  sessionExpiration: state.sessionExpiresAt.getTime(),
495
503
  sessionKeys: state.sessionKeys,
@@ -794,6 +802,7 @@ class InvalidStorageValue extends getChainFromVerifiedCredentialChain.BaseError
794
802
  * The initial values for the state of the client.
795
803
  */ const getInitialState = ()=>({
796
804
  initStatus: 'uninitialized',
805
+ legacyToken: null,
797
806
  mfaToken: null,
798
807
  projectSettings: null,
799
808
  sessionExpiresAt: null,
package/index.esm.js CHANGED
@@ -332,6 +332,7 @@ const getAvailableWalletProvidersFromWalletAccounts = (client)=>{
332
332
  core.logger.error('Failed to revoke session', error);
333
333
  }
334
334
  core.state.set({
335
+ legacyToken: null,
335
336
  sessionExpiresAt: null,
336
337
  token: null,
337
338
  user: null
@@ -426,6 +427,11 @@ const sessionKeySchema = createStorageKeySchema({
426
427
  key: 'session',
427
428
  schema: z.object({
428
429
  /**
430
+ * Legacy token will be undefined in environments with cookie based sessions.
431
+ *
432
+ * @deprecated Use `token` instead.
433
+ */ legacyToken: z.nullable(z.string()),
434
+ /**
429
435
  * The current available MFA token.
430
436
  */ mfaToken: z.nullable(z.string()),
431
437
  /**
@@ -448,6 +454,7 @@ const hydrateStateWithStorage = async (client)=>{
448
454
  const isSessionValid = (session == null ? void 0 : session.sessionExpiration) && session.sessionExpiration > Date.now();
449
455
  if (isSessionValid) {
450
456
  stateChanges.token = session.token;
457
+ stateChanges.legacyToken = session.legacyToken;
451
458
  stateChanges.sessionExpiresAt = new Date(session.sessionExpiration);
452
459
  stateChanges.mfaToken = session.mfaToken;
453
460
  stateChanges.sessionKeys = session.sessionKeys;
@@ -474,6 +481,7 @@ const syncStateWithStorage = (client)=>{
474
481
  void core.storage.removeItem(sessionKeySchema);
475
482
  } else {
476
483
  void core.storage.setItem(sessionKeySchema, {
484
+ legacyToken: state.legacyToken,
477
485
  mfaToken: state.mfaToken,
478
486
  sessionExpiration: state.sessionExpiresAt.getTime(),
479
487
  sessionKeys: state.sessionKeys,
@@ -778,6 +786,7 @@ class InvalidStorageValue extends BaseError {
778
786
  * The initial values for the state of the client.
779
787
  */ const getInitialState = ()=>({
780
788
  initStatus: 'uninitialized',
789
+ legacyToken: null,
781
790
  mfaToken: null,
782
791
  projectSettings: null,
783
792
  sessionExpiresAt: null,
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@dynamic-labs-sdk/client",
3
- "version": "0.1.0-alpha.2",
3
+ "version": "0.1.0-alpha.3",
4
4
  "type": "module",
5
5
  "main": "./index.cjs.js",
6
6
  "module": "./index.esm.js",
@@ -29,7 +29,7 @@
29
29
  }
30
30
  },
31
31
  "dependencies": {
32
- "@dynamic-labs-sdk/assert-package-version": "0.1.0-alpha.2",
32
+ "@dynamic-labs-sdk/assert-package-version": "0.1.0-alpha.3",
33
33
  "@dynamic-labs/sdk-api-core": "0.0.762",
34
34
  "@dynamic-labs-wallet/browser-wallet-client": "0.0.144",
35
35
  "@simplewebauthn/browser": "^13.1.0",
@@ -120,8 +120,9 @@ const getWalletAccountsHash = (state)=>getWalletAccountsFromState(state).map(({
120
120
  const updateAuthFromVerifyResponse = ({ response }, client)=>{
121
121
  const core = getChainFromVerifiedCredentialChain.getCore(client);
122
122
  const previousState = getChainFromVerifiedCredentialChain._extends({}, core.state.get());
123
- const { user, minifiedJwt, expiresAt, mfaToken } = response;
123
+ const { user, minifiedJwt, jwt, expiresAt, mfaToken } = response;
124
124
  core.state.set({
125
+ legacyToken: jwt != null ? jwt : null,
125
126
  mfaToken: mfaToken != null ? mfaToken : null,
126
127
  // Expires at is in seconds, so we need to convert it to milliseconds
127
128
  sessionExpiresAt: new Date(expiresAt * 1000),
@@ -118,8 +118,9 @@ const getWalletAccountsHash = (state)=>getWalletAccountsFromState(state).map(({
118
118
  const updateAuthFromVerifyResponse = ({ response }, client)=>{
119
119
  const core = getCore(client);
120
120
  const previousState = _extends({}, core.state.get());
121
- const { user, minifiedJwt, expiresAt, mfaToken } = response;
121
+ const { user, minifiedJwt, jwt, expiresAt, mfaToken } = response;
122
122
  core.state.set({
123
+ legacyToken: jwt != null ? jwt : null,
123
124
  mfaToken: mfaToken != null ? mfaToken : null,
124
125
  // Expires at is in seconds, so we need to convert it to milliseconds
125
126
  sessionExpiresAt: new Date(expiresAt * 1000),
@@ -1 +1 @@
1
- {"version":3,"file":"getInitialState.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/client/core/createCore/getInitialState.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,UAAU,CAAC;AAEjD;;GAEG;AACH,eAAO,MAAM,eAAe,QAAO,gBASjC,CAAC"}
1
+ {"version":3,"file":"getInitialState.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/client/core/createCore/getInitialState.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,UAAU,CAAC;AAEjD;;GAEG;AACH,eAAO,MAAM,eAAe,QAAO,gBAUjC,CAAC"}
@@ -1 +1 @@
1
- {"version":3,"file":"logout.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/auth/logout/logout.ts"],"names":[],"mappings":"AAQA;;;;;GAKG;AACH,eAAO,MAAM,MAAM,sEA4BlB,CAAC"}
1
+ {"version":3,"file":"logout.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/auth/logout/logout.ts"],"names":[],"mappings":"AAQA;;;;;GAKG;AACH,eAAO,MAAM,MAAM,sEA6BlB,CAAC"}
@@ -1,6 +1,17 @@
1
1
  import type { User } from '../user/user.types';
2
2
  declare global {
3
3
  interface DynamicCoreState {
4
+ /**
5
+ * The legacy JWT of the current user.
6
+ *
7
+ * This is full JWT that is used for legacy authentication.
8
+ *
9
+ * In cookie based environments, the token will always be null as the token is stored in the cookie.
10
+ * It is not possible to access the cookie from the client.
11
+ *
12
+ * @deprecated use token instead
13
+ */
14
+ legacyToken: string | null;
4
15
  /**
5
16
  * The expiration date of the current session.
6
17
  */
@@ -1 +1 @@
1
- {"version":3,"file":"state.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/modules/auth/state.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,IAAI,EAAE,MAAM,oBAAoB,CAAC;AAE/C,OAAO,CAAC,MAAM,CAAC;IACb,UAAU,gBAAgB;QACxB;;WAEG;QACH,gBAAgB,EAAE,IAAI,GAAG,IAAI,CAAC;QAE9B;;;;;WAKG;QACH,KAAK,EAAE,MAAM,GAAG,IAAI,CAAC;QAErB;;WAEG;QACH,IAAI,EAAE,IAAI,GAAG,IAAI,CAAC;KACnB;CACF"}
1
+ {"version":3,"file":"state.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/modules/auth/state.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,IAAI,EAAE,MAAM,oBAAoB,CAAC;AAE/C,OAAO,CAAC,MAAM,CAAC;IACb,UAAU,gBAAgB;QACxB;;;;;;;;;WASG;QACH,WAAW,EAAE,MAAM,GAAG,IAAI,CAAC;QAE3B;;WAEG;QACH,gBAAgB,EAAE,IAAI,GAAG,IAAI,CAAC;QAE9B;;;;;WAKG;QACH,KAAK,EAAE,MAAM,GAAG,IAAI,CAAC;QAErB;;WAEG;QACH,IAAI,EAAE,IAAI,GAAG,IAAI,CAAC;KACnB;CACF"}
@@ -1 +1 @@
1
- {"version":3,"file":"updateAuthFromVerifyResponse.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/auth/updateAuthFromVerifyResponse/updateAuthFromVerifyResponse.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAGjE,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAG3D,KAAK,kCAAkC,GAAG;IACxC,QAAQ,EAAE,cAAc,CAAC;CAC1B,CAAC;AAEF,eAAO,MAAM,4BAA4B,iBACzB,kCAAkC,UACxC,aAAa,SAiBtB,CAAC"}
1
+ {"version":3,"file":"updateAuthFromVerifyResponse.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/auth/updateAuthFromVerifyResponse/updateAuthFromVerifyResponse.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAGjE,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAG3D,KAAK,kCAAkC,GAAG;IACxC,QAAQ,EAAE,cAAc,CAAC;CAC1B,CAAC;AAEF,eAAO,MAAM,4BAA4B,iBACzB,kCAAkC,UACxC,aAAa,SAkBtB,CAAC"}
@@ -1 +1 @@
1
- {"version":3,"file":"hydrateStateWithStorage.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/storageSync/hydrateStateWithStorage/hydrateStateWithStorage.ts"],"names":[],"mappings":"AAEA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAI3D,eAAO,MAAM,uBAAuB,WAC1B,aAAa,KACpB,OAAO,CAAC,IAAI,CAmCd,CAAC"}
1
+ {"version":3,"file":"hydrateStateWithStorage.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/storageSync/hydrateStateWithStorage/hydrateStateWithStorage.ts"],"names":[],"mappings":"AAEA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAI3D,eAAO,MAAM,uBAAuB,WAC1B,aAAa,KACpB,OAAO,CAAC,IAAI,CAoCd,CAAC"}
@@ -5,6 +5,7 @@ export declare const stateStorageKeySchema: import("../../services/storage/stora
5
5
  user: SdkUser | null;
6
6
  }>;
7
7
  export declare const sessionKeySchema: import("../../services/storage/storage.types").StorageKeySchema<{
8
+ legacyToken: string | null;
8
9
  mfaToken: string | null;
9
10
  sessionExpiration: number;
10
11
  sessionKeys: string | null;
@@ -1 +1 @@
1
- {"version":3,"file":"schema.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/modules/storageSync/schema.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,eAAe,EAAE,OAAO,EAAE,MAAM,4BAA4B,CAAC;AAK3E,eAAO,MAAM,qBAAqB;;;;EAOhC,CAAC;AAEH,eAAO,MAAM,gBAAgB;;;;;EAuB3B,CAAC"}
1
+ {"version":3,"file":"schema.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/modules/storageSync/schema.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,eAAe,EAAE,OAAO,EAAE,MAAM,4BAA4B,CAAC;AAK3E,eAAO,MAAM,qBAAqB;;;;EAOhC,CAAC;AAEH,eAAO,MAAM,gBAAgB;;;;;;EA8B3B,CAAC"}
@@ -1 +1 @@
1
- {"version":3,"file":"syncStateWithStorage.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/storageSync/syncStateWithStorage/syncStateWithStorage.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAI3D,eAAO,MAAM,oBAAoB,WAAY,aAAa,SAqBzD,CAAC"}
1
+ {"version":3,"file":"syncStateWithStorage.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/storageSync/syncStateWithStorage/syncStateWithStorage.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAI3D,eAAO,MAAM,oBAAoB,WAAY,aAAa,SAsBzD,CAAC"}