@dynamic-labs-sdk/client 0.1.0-alpha.4 → 0.1.0-alpha.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -1,3 +1,9 @@
1
+ ## 0.1.0-alpha.5 (2025-09-11)
2
+
3
+ ### 🚀 Features
4
+
5
+ - expose the session expires at date ([#420](https://github.com/dynamic-labs/dynamic-sdk/pull/420))
6
+
1
7
  ## 0.1.0-alpha.4 (2025-09-10)
2
8
 
3
9
  ### 🩹 Fixes
package/core.esm.js CHANGED
@@ -1,6 +1,6 @@
1
1
  import { assertPackageVersion } from '@dynamic-labs-sdk/assert-package-version';
2
2
  import { B as BaseError, a as getCore, e as assertDefined, b as getBuffer, n as name, v as version } from './getChainFromVerifiedCredentialChain.esm.js';
3
- export { A as APIError, i as ClientNotFoundError, D as DYNAMIC_SDK_API_VERSION, V as ValueMustBeDefinedError, c as createApiClient, k as getChainFromVerifiedCredentialChain, g as getDefaultClient, j as isCookieEnabled } from './getChainFromVerifiedCredentialChain.esm.js';
3
+ export { A as APIError, j as ClientNotFoundError, D as DYNAMIC_SDK_API_VERSION, V as ValueMustBeDefinedError, c as createApiClient, k as getChainFromVerifiedCredentialChain, g as getDefaultClient, i as isCookieEnabled } from './getChainFromVerifiedCredentialChain.esm.js';
4
4
  import { c as createStorageKeySchema, d as getNetworkProviders, N as NoNetworkProvidersError } from './getNetworkProviderFromNetworkId.esm.js';
5
5
  export { C as CannotTrackError, I as InvalidStorageSet, a as createLogger, f as formatSignInMessage, e as getNetworkProviderBuilderRegistry, b as getNetworkProviderFromNetworkId, h as hasExtension, s as subscribeWithSelector } from './getNetworkProviderFromNetworkId.esm.js';
6
6
  import { b as getWalletProviderByKey, j as createRuntimeServiceAccessKey } from './getWalletProviderByKey.esm.js';
@@ -4,7 +4,7 @@ var sdkApiCore = require('@dynamic-labs/sdk-api-core');
4
4
  var buffer = require('buffer');
5
5
 
6
6
  var name = "@dynamic-labs-sdk/client";
7
- var version = "0.1.0-alpha.4";
7
+ var version = "0.1.0-alpha.5";
8
8
  var dependencies = {
9
9
  "@dynamic-labs/sdk-api-core": "0.0.762"};
10
10
 
@@ -2,7 +2,7 @@ import { AuthStorageEnum, SDKApi, Configuration } from '@dynamic-labs/sdk-api-co
2
2
  import { Buffer as Buffer$1 } from 'buffer';
3
3
 
4
4
  var name = "@dynamic-labs-sdk/client";
5
- var version = "0.1.0-alpha.4";
5
+ var version = "0.1.0-alpha.5";
6
6
  var dependencies = {
7
7
  "@dynamic-labs/sdk-api-core": "0.0.762"};
8
8
 
@@ -444,4 +444,4 @@ const getChainFromVerifiedCredentialChain = (verifiedCredentialChain)=>{
444
444
  return chain;
445
445
  };
446
446
 
447
- export { APIError as A, BaseError as B, CLIENT_SDK_NAME as C, DYNAMIC_SDK_API_VERSION as D, InvalidExternalAuthError as I, MfaInvalidOtpError as M, SandboxMaximumThresholdReachedError as S, ValueMustBeDefinedError as V, _extends as _, getCore as a, getBuffer as b, createApiClient as c, dependencies as d, assertDefined as e, CHAINS_INFO_MAP as f, getDefaultClient as g, MfaRateLimitedError as h, ClientNotFoundError as i, isCookieEnabled as j, getChainFromVerifiedCredentialChain as k, getSessionKeys as l, name as n, randomString as r, setDefaultClient as s, version as v };
447
+ export { APIError as A, BaseError as B, CLIENT_SDK_NAME as C, DYNAMIC_SDK_API_VERSION as D, InvalidExternalAuthError as I, MfaInvalidOtpError as M, SandboxMaximumThresholdReachedError as S, ValueMustBeDefinedError as V, _extends as _, getCore as a, getBuffer as b, createApiClient as c, dependencies as d, assertDefined as e, CHAINS_INFO_MAP as f, getDefaultClient as g, MfaRateLimitedError as h, isCookieEnabled as i, ClientNotFoundError as j, getChainFromVerifiedCredentialChain as k, getSessionKeys as l, name as n, randomString as r, setDefaultClient as s, version as v };
@@ -3,6 +3,13 @@
3
3
  var getChainFromVerifiedCredentialChain = require('./getChainFromVerifiedCredentialChain.cjs.js');
4
4
  var sdkApiCore = require('@dynamic-labs/sdk-api-core');
5
5
 
6
+ /**
7
+ * Sefelly sets the cookie in the browser.
8
+ */ const setCookie = (cookie)=>{
9
+ // eslint-disable-next-line no-restricted-globals
10
+ document.cookie = cookie;
11
+ };
12
+
6
13
  /**
7
14
  * Adds an event listener for Dynamic client events.
8
15
  *
@@ -292,6 +299,8 @@ const getWalletProviderFromWalletAccount = ({ walletAccount }, client)=>{
292
299
  return walletProvider;
293
300
  };
294
301
 
302
+ const DYNAMIC_AUTH_COOKIE_NAME = 'DYNAMIC_JWT_TOKEN';
303
+
295
304
  /**
296
305
  * Emits the `walletAccountsChanged` event.
297
306
  */ const emitWalletAccountsChangedEvent = (client)=>{
@@ -318,14 +327,23 @@ const updateAuthFromVerifyResponse = ({ response }, client)=>{
318
327
  const core = getChainFromVerifiedCredentialChain.getCore(client);
319
328
  const previousState = getChainFromVerifiedCredentialChain._extends({}, core.state.get());
320
329
  const { user, minifiedJwt, jwt, expiresAt, mfaToken } = response;
330
+ // Expires at is in seconds, so we need to convert it to milliseconds
331
+ const sessionExpiresAt = new Date(expiresAt * 1000);
321
332
  core.state.set({
322
333
  legacyToken: jwt != null ? jwt : null,
323
334
  mfaToken: mfaToken != null ? mfaToken : null,
324
- // Expires at is in seconds, so we need to convert it to milliseconds
325
- sessionExpiresAt: new Date(expiresAt * 1000),
335
+ sessionExpiresAt: sessionExpiresAt,
326
336
  token: minifiedJwt != null ? minifiedJwt : null,
327
337
  user
328
338
  });
339
+ /**
340
+ * For customers using a sandbox environment with cookies enabled, we need to set the cookie
341
+ * programmatically because Redcoast won't set the cookie via headers. We set the cookie programmatically
342
+ * so customers can access the cookie from document.cookie consistently between sandbox and live environments.
343
+ */ if (minifiedJwt && getChainFromVerifiedCredentialChain.isCookieEnabled(client)) {
344
+ const expireDate = sessionExpiresAt.toUTCString();
345
+ setCookie(`${DYNAMIC_AUTH_COOKIE_NAME}=${minifiedJwt}; expires=${expireDate}; path=/; SameSite=Lax`);
346
+ }
329
347
  checkAndRaiseWalletAccountsChangedEvent({
330
348
  previousState
331
349
  }, client);
@@ -349,6 +367,7 @@ const getWalletProviderByKey = ({ walletProviderKey }, client)=>{
349
367
  return walletProvider;
350
368
  };
351
369
 
370
+ exports.DYNAMIC_AUTH_COOKIE_NAME = DYNAMIC_AUTH_COOKIE_NAME;
352
371
  exports.NoWalletProviderFoundError = NoWalletProviderFoundError;
353
372
  exports.createRuntimeServiceAccessKey = createRuntimeServiceAccessKey;
354
373
  exports.createWalletAccountId = createWalletAccountId;
@@ -364,4 +383,5 @@ exports.normalizeAddress = normalizeAddress;
364
383
  exports.offEvent = offEvent;
365
384
  exports.onEvent = onEvent;
366
385
  exports.onceEvent = onceEvent;
386
+ exports.setCookie = setCookie;
367
387
  exports.updateAuthFromVerifyResponse = updateAuthFromVerifyResponse;
@@ -1,6 +1,13 @@
1
- import { g as getDefaultClient, a as getCore, e as assertDefined, k as getChainFromVerifiedCredentialChain, B as BaseError, _ as _extends } from './getChainFromVerifiedCredentialChain.esm.js';
1
+ import { g as getDefaultClient, a as getCore, e as assertDefined, k as getChainFromVerifiedCredentialChain, B as BaseError, _ as _extends, i as isCookieEnabled } from './getChainFromVerifiedCredentialChain.esm.js';
2
2
  import { JwtVerifiedCredentialFormatEnum } from '@dynamic-labs/sdk-api-core';
3
3
 
4
+ /**
5
+ * Sefelly sets the cookie in the browser.
6
+ */ const setCookie = (cookie)=>{
7
+ // eslint-disable-next-line no-restricted-globals
8
+ document.cookie = cookie;
9
+ };
10
+
4
11
  /**
5
12
  * Adds an event listener for Dynamic client events.
6
13
  *
@@ -290,6 +297,8 @@ const getWalletProviderFromWalletAccount = ({ walletAccount }, client)=>{
290
297
  return walletProvider;
291
298
  };
292
299
 
300
+ const DYNAMIC_AUTH_COOKIE_NAME = 'DYNAMIC_JWT_TOKEN';
301
+
293
302
  /**
294
303
  * Emits the `walletAccountsChanged` event.
295
304
  */ const emitWalletAccountsChangedEvent = (client)=>{
@@ -316,14 +325,23 @@ const updateAuthFromVerifyResponse = ({ response }, client)=>{
316
325
  const core = getCore(client);
317
326
  const previousState = _extends({}, core.state.get());
318
327
  const { user, minifiedJwt, jwt, expiresAt, mfaToken } = response;
328
+ // Expires at is in seconds, so we need to convert it to milliseconds
329
+ const sessionExpiresAt = new Date(expiresAt * 1000);
319
330
  core.state.set({
320
331
  legacyToken: jwt != null ? jwt : null,
321
332
  mfaToken: mfaToken != null ? mfaToken : null,
322
- // Expires at is in seconds, so we need to convert it to milliseconds
323
- sessionExpiresAt: new Date(expiresAt * 1000),
333
+ sessionExpiresAt: sessionExpiresAt,
324
334
  token: minifiedJwt != null ? minifiedJwt : null,
325
335
  user
326
336
  });
337
+ /**
338
+ * For customers using a sandbox environment with cookies enabled, we need to set the cookie
339
+ * programmatically because Redcoast won't set the cookie via headers. We set the cookie programmatically
340
+ * so customers can access the cookie from document.cookie consistently between sandbox and live environments.
341
+ */ if (minifiedJwt && isCookieEnabled(client)) {
342
+ const expireDate = sessionExpiresAt.toUTCString();
343
+ setCookie(`${DYNAMIC_AUTH_COOKIE_NAME}=${minifiedJwt}; expires=${expireDate}; path=/; SameSite=Lax`);
344
+ }
327
345
  checkAndRaiseWalletAccountsChangedEvent({
328
346
  previousState
329
347
  }, client);
@@ -347,4 +365,4 @@ const getWalletProviderByKey = ({ walletProviderKey }, client)=>{
347
365
  return walletProvider;
348
366
  };
349
367
 
350
- export { NoWalletProviderFoundError as N, WalletProviderPriority as W, getWalletProviderFromWalletAccount as a, getWalletProviderByKey as b, createWalletAccountId as c, emitWalletAccountsChangedEvent as d, emitEvent as e, getWalletProviders as f, getWalletAccounts as g, onceEvent as h, onEvent as i, createRuntimeServiceAccessKey as j, formatWalletProviderKey as k, getWalletProviderRegistry as l, normalizeAddress as n, offEvent as o, updateAuthFromVerifyResponse as u };
368
+ export { DYNAMIC_AUTH_COOKIE_NAME as D, NoWalletProviderFoundError as N, WalletProviderPriority as W, getWalletProviderFromWalletAccount as a, getWalletProviderByKey as b, createWalletAccountId as c, emitWalletAccountsChangedEvent as d, emitEvent as e, getWalletProviders as f, getWalletAccounts as g, onceEvent as h, onEvent as i, createRuntimeServiceAccessKey as j, formatWalletProviderKey as k, getWalletProviderRegistry as l, normalizeAddress as n, offEvent as o, setCookie as s, updateAuthFromVerifyResponse as u };
package/index.cjs.js CHANGED
@@ -41,6 +41,7 @@ var z__namespace = /*#__PURE__*/_interopNamespaceDefault(z);
41
41
  initStatus: 'initStatusChanged',
42
42
  mfaToken: 'mfaTokenChanged',
43
43
  projectSettings: 'projectSettingsChanged',
44
+ sessionExpiresAt: 'sessionExpiresAtChanged',
44
45
  token: 'tokenChanged',
45
46
  user: 'userChanged'
46
47
  };
@@ -347,6 +348,12 @@ const getAvailableWalletProvidersFromWalletAccounts = (client)=>{
347
348
  } catch (error) {
348
349
  core.logger.error('Failed to revoke session', error);
349
350
  }
351
+ /**
352
+ * This deletes the auth cookie if it exists.
353
+ * If the cookie doesn't exist, this sets a new cookie that expires immediately.
354
+ */ if (getChainFromVerifiedCredentialChain.isCookieEnabled(client)) {
355
+ getWalletProviderByKey.setCookie(`${getWalletProviderByKey.DYNAMIC_AUTH_COOKIE_NAME}=; Max-Age=-99999999; path=/; SameSite=Lax`);
356
+ }
350
357
  core.state.set({
351
358
  legacyToken: null,
352
359
  sessionExpiresAt: null,
@@ -885,6 +892,9 @@ class InvalidStorageValue extends getChainFromVerifiedCredentialChain.BaseError
885
892
  get projectSettings () {
886
893
  return core.state.get().projectSettings;
887
894
  },
895
+ get sessionExpiresAt () {
896
+ return core.state.get().sessionExpiresAt;
897
+ },
888
898
  get token () {
889
899
  return core.state.get().token;
890
900
  },
package/index.esm.js CHANGED
@@ -1,9 +1,9 @@
1
1
  import { assertPackageVersion } from '@dynamic-labs-sdk/assert-package-version';
2
- import { B as BaseError, g as getDefaultClient, a as getCore, c as createApiClient, C as CLIENT_SDK_NAME, b as getBuffer, d as dependencies, v as version, s as setDefaultClient, _ as _extends, e as assertDefined, r as randomString, f as CHAINS_INFO_MAP, n as name } from './getChainFromVerifiedCredentialChain.esm.js';
2
+ import { B as BaseError, g as getDefaultClient, a as getCore, c as createApiClient, C as CLIENT_SDK_NAME, b as getBuffer, i as isCookieEnabled, d as dependencies, v as version, s as setDefaultClient, _ as _extends, e as assertDefined, r as randomString, f as CHAINS_INFO_MAP, n as name } from './getChainFromVerifiedCredentialChain.esm.js';
3
3
  export { I as InvalidExternalAuthError, M as MfaInvalidOtpError, h as MfaRateLimitedError, S as SandboxMaximumThresholdReachedError } from './getChainFromVerifiedCredentialChain.esm.js';
4
4
  import { I as InvalidStorageSet, c as createStorageKeySchema, s as subscribeWithSelector, i as isEqualShallow, C as CannotTrackError, a as createLogger, f as formatSignInMessage, g as getNetworksData, b as getNetworkProviderFromNetworkId } from './getNetworkProviderFromNetworkId.esm.js';
5
5
  export { N as NoNetworkProvidersError, h as hasExtension } from './getNetworkProviderFromNetworkId.esm.js';
6
- import { g as getWalletAccounts, a as getWalletProviderFromWalletAccount, e as emitEvent, u as updateAuthFromVerifyResponse, b as getWalletProviderByKey, c as createWalletAccountId, d as emitWalletAccountsChangedEvent, n as normalizeAddress, f as getWalletProviders } from './getWalletProviderByKey.esm.js';
6
+ import { g as getWalletAccounts, a as getWalletProviderFromWalletAccount, s as setCookie, e as emitEvent, D as DYNAMIC_AUTH_COOKIE_NAME, u as updateAuthFromVerifyResponse, b as getWalletProviderByKey, c as createWalletAccountId, d as emitWalletAccountsChangedEvent, n as normalizeAddress, f as getWalletProviders } from './getWalletProviderByKey.esm.js';
7
7
  export { o as offEvent, i as onEvent, h as onceEvent } from './getWalletProviderByKey.esm.js';
8
8
  import * as z from 'zod/mini';
9
9
  import { b as bufferToHex } from './isMfaRequiredForAction.esm.js';
@@ -24,6 +24,7 @@ import 'buffer';
24
24
  initStatus: 'initStatusChanged',
25
25
  mfaToken: 'mfaTokenChanged',
26
26
  projectSettings: 'projectSettingsChanged',
27
+ sessionExpiresAt: 'sessionExpiresAtChanged',
27
28
  token: 'tokenChanged',
28
29
  user: 'userChanged'
29
30
  };
@@ -330,6 +331,12 @@ const getAvailableWalletProvidersFromWalletAccounts = (client)=>{
330
331
  } catch (error) {
331
332
  core.logger.error('Failed to revoke session', error);
332
333
  }
334
+ /**
335
+ * This deletes the auth cookie if it exists.
336
+ * If the cookie doesn't exist, this sets a new cookie that expires immediately.
337
+ */ if (isCookieEnabled(client)) {
338
+ setCookie(`${DYNAMIC_AUTH_COOKIE_NAME}=; Max-Age=-99999999; path=/; SameSite=Lax`);
339
+ }
333
340
  core.state.set({
334
341
  legacyToken: null,
335
342
  sessionExpiresAt: null,
@@ -868,6 +875,9 @@ class InvalidStorageValue extends BaseError {
868
875
  get projectSettings () {
869
876
  return core.state.get().projectSettings;
870
877
  },
878
+ get sessionExpiresAt () {
879
+ return core.state.get().sessionExpiresAt;
880
+ },
871
881
  get token () {
872
882
  return core.state.get().token;
873
883
  },
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@dynamic-labs-sdk/client",
3
- "version": "0.1.0-alpha.4",
3
+ "version": "0.1.0-alpha.5",
4
4
  "type": "module",
5
5
  "main": "./index.cjs.js",
6
6
  "module": "./index.esm.js",
@@ -29,7 +29,7 @@
29
29
  }
30
30
  },
31
31
  "dependencies": {
32
- "@dynamic-labs-sdk/assert-package-version": "0.1.0-alpha.4",
32
+ "@dynamic-labs-sdk/assert-package-version": "0.1.0-alpha.5",
33
33
  "@dynamic-labs/sdk-api-core": "0.0.762",
34
34
  "@dynamic-labs-wallet/browser-wallet-client": "0.0.155",
35
35
  "@simplewebauthn/browser": "^13.1.0",
@@ -1 +1 @@
1
- {"version":3,"file":"createDynamicClient.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/client/createDynamicClient/createDynamicClient.ts"],"names":[],"mappings":"AAIA,OAAO,KAAK,EAAE,aAAa,EAAE,mBAAmB,EAAE,MAAM,UAAU,CAAC;AAEnE;;;;;;;;;;;;;GAaG;AACH,eAAO,MAAM,mBAAmB,WACtB,mBAAmB,KAC1B,aAkCF,CAAC"}
1
+ {"version":3,"file":"createDynamicClient.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/client/createDynamicClient/createDynamicClient.ts"],"names":[],"mappings":"AAIA,OAAO,KAAK,EAAE,aAAa,EAAE,mBAAmB,EAAE,MAAM,UAAU,CAAC;AAEnE;;;;;;;;;;;;;GAaG;AACH,eAAO,MAAM,mBAAmB,WACtB,mBAAmB,KAC1B,aAqCF,CAAC"}
@@ -16,6 +16,10 @@ export type DynamicClient = {
16
16
  * The settings of your Dynamic project as configured in dashboard.
17
17
  */
18
18
  readonly projectSettings: ProjectSettings | null;
19
+ /**
20
+ * The session expiration date.
21
+ */
22
+ readonly sessionExpiresAt: DynamicCoreState['sessionExpiresAt'];
19
23
  /**
20
24
  * The JWT of the current user.
21
25
  */
@@ -1 +1 @@
1
- {"version":3,"file":"DynamicClient.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/client/types/DynamicClient.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,4BAA4B,CAAC;AAElE,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,eAAe,CAAC;AAEtD;;GAEG;AACH,MAAM,MAAM,aAAa,GAAG;IAC1B;;OAEG;IACH,QAAQ,CAAC,UAAU,EAAE,gBAAgB,CAAC,YAAY,CAAC,CAAC;IAEpD;;OAEG;IACH,QAAQ,CAAC,QAAQ,EAAE,MAAM,GAAG,IAAI,CAAC;IAEjC;;OAEG;IACH,QAAQ,CAAC,eAAe,EAAE,eAAe,GAAG,IAAI,CAAC;IAEjD;;OAEG;IACH,QAAQ,CAAC,KAAK,EAAE,MAAM,GAAG,IAAI,CAAC;IAE9B;;OAEG;IACH,QAAQ,CAAC,IAAI,EAAE,gBAAgB,CAAC,MAAM,CAAC,CAAC;CACzC,CAAC"}
1
+ {"version":3,"file":"DynamicClient.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/client/types/DynamicClient.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,4BAA4B,CAAC;AAElE,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,eAAe,CAAC;AAEtD;;GAEG;AACH,MAAM,MAAM,aAAa,GAAG;IAC1B;;OAEG;IACH,QAAQ,CAAC,UAAU,EAAE,gBAAgB,CAAC,YAAY,CAAC,CAAC;IAEpD;;OAEG;IACH,QAAQ,CAAC,QAAQ,EAAE,MAAM,GAAG,IAAI,CAAC;IAEjC;;OAEG;IACH,QAAQ,CAAC,eAAe,EAAE,eAAe,GAAG,IAAI,CAAC;IAEjD;;OAEG;IACH,QAAQ,CAAC,gBAAgB,EAAE,gBAAgB,CAAC,kBAAkB,CAAC,CAAC;IAEhE;;OAEG;IACH,QAAQ,CAAC,KAAK,EAAE,MAAM,GAAG,IAAI,CAAC;IAE9B;;OAEG;IACH,QAAQ,CAAC,IAAI,EAAE,gBAAgB,CAAC,MAAM,CAAC,CAAC;CACzC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export declare const DYNAMIC_AUTH_COOKIE_NAME = "DYNAMIC_JWT_TOKEN";
2
+ //# sourceMappingURL=consts.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"consts.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/modules/auth/consts.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,wBAAwB,sBAAsB,CAAC"}
@@ -1 +1 @@
1
- {"version":3,"file":"logout.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/auth/logout/logout.ts"],"names":[],"mappings":"AAQA;;;;;GAKG;AACH,eAAO,MAAM,MAAM,sEA6BlB,CAAC"}
1
+ {"version":3,"file":"logout.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/auth/logout/logout.ts"],"names":[],"mappings":"AAWA;;;;;GAKG;AACH,eAAO,MAAM,MAAM,sEAuClB,CAAC"}
@@ -1 +1 @@
1
- {"version":3,"file":"updateAuthFromVerifyResponse.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/auth/updateAuthFromVerifyResponse/updateAuthFromVerifyResponse.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAGjE,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAG3D,KAAK,kCAAkC,GAAG;IACxC,QAAQ,EAAE,cAAc,CAAC;CAC1B,CAAC;AAEF,eAAO,MAAM,4BAA4B,iBACzB,kCAAkC,UACxC,aAAa,SAkBtB,CAAC"}
1
+ {"version":3,"file":"updateAuthFromVerifyResponse.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/auth/updateAuthFromVerifyResponse/updateAuthFromVerifyResponse.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAGjE,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAM3D,KAAK,kCAAkC,GAAG;IACxC,QAAQ,EAAE,cAAc,CAAC;CAC1B,CAAC;AAEF,eAAO,MAAM,4BAA4B,iBACzB,kCAAkC,UACxC,aAAa,SAiCtB,CAAC"}
@@ -9,6 +9,7 @@ export declare const stateChangeEvents: {
9
9
  initStatus: "initStatusChanged";
10
10
  mfaToken: "mfaTokenChanged";
11
11
  projectSettings: "projectSettingsChanged";
12
+ sessionExpiresAt: "sessionExpiresAtChanged";
12
13
  token: "tokenChanged";
13
14
  user: "userChanged";
14
15
  };
@@ -23,6 +24,9 @@ declare global {
23
24
  projectSettingsChanged: (args: {
24
25
  projectSettings: DynamicClient['projectSettings'];
25
26
  }) => void;
27
+ sessionExpiresAtChanged: (args: {
28
+ sessionExpiresAt: DynamicClient['sessionExpiresAt'];
29
+ }) => void;
26
30
  tokenChanged: (args: {
27
31
  token: DynamicClient['token'];
28
32
  }) => void;
@@ -1 +1 @@
1
- {"version":3,"file":"events.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/state/raiseStateEvents/events.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAE3D;;;;;GAKG;AACH,eAAO,MAAM,iBAAiB;;;;;;CAQ7B,CAAC;AAGF,OAAO,CAAC,MAAM,CAAC;IACb,UAAU,aAAa;QACrB,iBAAiB,EAAE,CAAC,IAAI,EAAE;YACxB,UAAU,EAAE,aAAa,CAAC,YAAY,CAAC,CAAC;SACzC,KAAK,IAAI,CAAC;QAEX,eAAe,EAAE,CAAC,IAAI,EAAE;YAAE,QAAQ,EAAE,aAAa,CAAC,UAAU,CAAC,CAAA;SAAE,KAAK,IAAI,CAAC;QAEzE,sBAAsB,EAAE,CAAC,IAAI,EAAE;YAC7B,eAAe,EAAE,aAAa,CAAC,iBAAiB,CAAC,CAAC;SACnD,KAAK,IAAI,CAAC;QAEX,YAAY,EAAE,CAAC,IAAI,EAAE;YAAE,KAAK,EAAE,aAAa,CAAC,OAAO,CAAC,CAAA;SAAE,KAAK,IAAI,CAAC;QAEhE,WAAW,EAAE,CAAC,IAAI,EAAE;YAAE,IAAI,EAAE,aAAa,CAAC,MAAM,CAAC,CAAA;SAAE,KAAK,IAAI,CAAC;KAC9D;CACF;AAED,MAAM,MAAM,wBAAwB,GAClC,aAAa,CAAC,CAAC,OAAO,iBAAiB,CAAC,CAAC,MAAM,OAAO,iBAAiB,CAAC,CAAC,CAAC"}
1
+ {"version":3,"file":"events.d.ts","sourceRoot":"","sources":["../../../../../../../packages/client/src/modules/state/raiseStateEvents/events.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAE3D;;;;;GAKG;AACH,eAAO,MAAM,iBAAiB;;;;;;;CAS7B,CAAC;AAGF,OAAO,CAAC,MAAM,CAAC;IACb,UAAU,aAAa;QACrB,iBAAiB,EAAE,CAAC,IAAI,EAAE;YACxB,UAAU,EAAE,aAAa,CAAC,YAAY,CAAC,CAAC;SACzC,KAAK,IAAI,CAAC;QAEX,eAAe,EAAE,CAAC,IAAI,EAAE;YAAE,QAAQ,EAAE,aAAa,CAAC,UAAU,CAAC,CAAA;SAAE,KAAK,IAAI,CAAC;QAEzE,sBAAsB,EAAE,CAAC,IAAI,EAAE;YAC7B,eAAe,EAAE,aAAa,CAAC,iBAAiB,CAAC,CAAC;SACnD,KAAK,IAAI,CAAC;QAEX,uBAAuB,EAAE,CAAC,IAAI,EAAE;YAC9B,gBAAgB,EAAE,aAAa,CAAC,kBAAkB,CAAC,CAAC;SACrD,KAAK,IAAI,CAAC;QAEX,YAAY,EAAE,CAAC,IAAI,EAAE;YAAE,KAAK,EAAE,aAAa,CAAC,OAAO,CAAC,CAAA;SAAE,KAAK,IAAI,CAAC;QAEhE,WAAW,EAAE,CAAC,IAAI,EAAE;YAAE,IAAI,EAAE,aAAa,CAAC,MAAM,CAAC,CAAA;SAAE,KAAK,IAAI,CAAC;KAC9D;CACF;AAED,MAAM,MAAM,wBAAwB,GAClC,aAAa,CAAC,CAAC,OAAO,iBAAiB,CAAC,CAAC,MAAM,OAAO,iBAAiB,CAAC,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export { setCookie } from './setCookie';
2
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/utils/setCookie/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAAE,MAAM,aAAa,CAAC"}
@@ -0,0 +1,5 @@
1
+ /**
2
+ * Sefelly sets the cookie in the browser.
3
+ */
4
+ export declare const setCookie: (cookie: string) => void;
5
+ //# sourceMappingURL=setCookie.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"setCookie.d.ts","sourceRoot":"","sources":["../../../../../../packages/client/src/utils/setCookie/setCookie.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,eAAO,MAAM,SAAS,WAAY,MAAM,SAGvC,CAAC"}
package/waasCore.esm.js CHANGED
@@ -1,5 +1,5 @@
1
1
  import { assertPackageVersion } from '@dynamic-labs-sdk/assert-package-version';
2
- import { a as getCore, C as CLIENT_SDK_NAME, j as isCookieEnabled, f as CHAINS_INFO_MAP, k as getChainFromVerifiedCredentialChain, n as name, v as version } from './getChainFromVerifiedCredentialChain.esm.js';
2
+ import { a as getCore, C as CLIENT_SDK_NAME, i as isCookieEnabled, f as CHAINS_INFO_MAP, k as getChainFromVerifiedCredentialChain, n as name, v as version } from './getChainFromVerifiedCredentialChain.esm.js';
3
3
  import { a as DEFAULT_WAAS_BASE_MPC_RELAY_API_URL, b as DEFAULT_WAAS_BASE_API_URL, D as DYNAMIC_WAAS_METADATA } from './constants.esm.js';
4
4
  import { DynamicWalletClient, ThresholdSignatureScheme } from '@dynamic-labs-wallet/browser-wallet-client';
5
5
  import { MFAAction, WalletProviderEnum } from '@dynamic-labs/sdk-api-core';