@dynamic-labs-sdk/client 0.10.0 → 0.12.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (97) hide show
  1. package/dist/{InvalidParamError-C-bDIPAn.cjs.js → InvalidParamError-B83QXOQl.cjs.js} +4 -4
  2. package/dist/{InvalidParamError-C-bDIPAn.cjs.js.map → InvalidParamError-B83QXOQl.cjs.js.map} +1 -1
  3. package/dist/{InvalidParamError-DwBXt02M.esm.js → InvalidParamError-Dyhydv4X.esm.js} +3 -3
  4. package/dist/{InvalidParamError-DwBXt02M.esm.js.map → InvalidParamError-Dyhydv4X.esm.js.map} +1 -1
  5. package/dist/{NotWaasWalletAccountError-Y7BwUjKU.esm.js → NotWaasWalletAccountError-By6DOi1X.esm.js} +3 -3
  6. package/dist/{NotWaasWalletAccountError-Y7BwUjKU.esm.js.map → NotWaasWalletAccountError-By6DOi1X.esm.js.map} +1 -1
  7. package/dist/{NotWaasWalletAccountError-Yd5uZ0f5.cjs.js → NotWaasWalletAccountError-C_XzpX9u.cjs.js} +3 -3
  8. package/dist/{NotWaasWalletAccountError-Yd5uZ0f5.cjs.js.map → NotWaasWalletAccountError-C_XzpX9u.cjs.js.map} +1 -1
  9. package/dist/core.cjs.js +6 -5
  10. package/dist/core.cjs.js.map +1 -1
  11. package/dist/core.esm.js +6 -6
  12. package/dist/core.esm.js.map +1 -1
  13. package/dist/exports/core.d.ts +2 -0
  14. package/dist/exports/core.d.ts.map +1 -1
  15. package/dist/exports/index.d.ts +6 -2
  16. package/dist/exports/index.d.ts.map +1 -1
  17. package/dist/{getNetworkProviderFromNetworkId-uv3gDI3_.cjs.js → getNetworkProviderFromNetworkId-BRin5Ty5.cjs.js} +7 -5
  18. package/dist/{getNetworkProviderFromNetworkId-uv3gDI3_.cjs.js.map → getNetworkProviderFromNetworkId-BRin5Ty5.cjs.js.map} +1 -1
  19. package/dist/{getNetworkProviderFromNetworkId-Bxzhboto.esm.js → getNetworkProviderFromNetworkId-D2FjIIXH.esm.js} +7 -5
  20. package/dist/{getNetworkProviderFromNetworkId-Bxzhboto.esm.js.map → getNetworkProviderFromNetworkId-D2FjIIXH.esm.js.map} +1 -1
  21. package/dist/{getSignedSessionId-rUbe9Ob0.esm.js → getSignedSessionId-BE84R-V_.esm.js} +24 -7
  22. package/dist/getSignedSessionId-BE84R-V_.esm.js.map +1 -0
  23. package/dist/{getSignedSessionId-Cseb1HzZ.cjs.js → getSignedSessionId-DqowqxuJ.cjs.js} +24 -7
  24. package/dist/getSignedSessionId-DqowqxuJ.cjs.js.map +1 -0
  25. package/dist/{getVerifiedCredentialForWalletAccount-DKSlfaeh.esm.js → getVerifiedCredentialForWalletAccount-B5WBFgF2.esm.js} +10 -7
  26. package/dist/getVerifiedCredentialForWalletAccount-B5WBFgF2.esm.js.map +1 -0
  27. package/dist/{getVerifiedCredentialForWalletAccount-CKl95diA.cjs.js → getVerifiedCredentialForWalletAccount-CsHHUt3-.cjs.js} +11 -8
  28. package/dist/getVerifiedCredentialForWalletAccount-CsHHUt3-.cjs.js.map +1 -0
  29. package/dist/index.cjs.js +116 -41
  30. package/dist/index.cjs.js.map +1 -1
  31. package/dist/index.esm.js +114 -42
  32. package/dist/index.esm.js.map +1 -1
  33. package/dist/{isMfaRequiredForAction-BJfSYQN8.esm.js → isMfaRequiredForAction-BHmylnPq.esm.js} +2 -2
  34. package/dist/{isMfaRequiredForAction-BJfSYQN8.esm.js.map → isMfaRequiredForAction-BHmylnPq.esm.js.map} +1 -1
  35. package/dist/{isMfaRequiredForAction-Dz3vNayT.cjs.js → isMfaRequiredForAction-BzWbWDdR.cjs.js} +2 -2
  36. package/dist/{isMfaRequiredForAction-Dz3vNayT.cjs.js.map → isMfaRequiredForAction-BzWbWDdR.cjs.js.map} +1 -1
  37. package/dist/modules/auth/decodeJwt/decodeJwt.d.ts +4 -4
  38. package/dist/modules/auth/decodeJwt/decodeJwt.d.ts.map +1 -1
  39. package/dist/modules/auth/logout/logout.d.ts.map +1 -1
  40. package/dist/modules/auth/state.d.ts +1 -1
  41. package/dist/modules/auth/state.d.ts.map +1 -1
  42. package/dist/modules/auth/updateAuthFromVerifyResponse/elevatedAccessTokens/parseElevatedAccessToken/parseElevatedAccessToken.d.ts.map +1 -1
  43. package/dist/modules/auth/updateAuthFromVerifyResponse/updateAuthFromVerifyResponse.d.ts.map +1 -1
  44. package/dist/modules/otp/verifyOTP/verifyOTP.d.ts +3 -2
  45. package/dist/modules/otp/verifyOTP/verifyOTP.d.ts.map +1 -1
  46. package/dist/modules/otp/verifyOTP/verifyOTPForUserUpdate/verifyOTPForUserUpdate.d.ts +1 -1
  47. package/dist/modules/otp/verifyOTP/verifyOTPForUserUpdate/verifyOTPForUserUpdate.d.ts.map +1 -1
  48. package/dist/modules/sessionKeys/generateNonceSignature/generateNonceSignature.d.ts +9 -0
  49. package/dist/modules/sessionKeys/generateNonceSignature/generateNonceSignature.d.ts.map +1 -0
  50. package/dist/modules/sessionKeys/generateNonceSignature/index.d.ts +2 -0
  51. package/dist/modules/sessionKeys/generateNonceSignature/index.d.ts.map +1 -0
  52. package/dist/modules/sessionKeys/getSignedSessionId/getSignedSessionId.d.ts.map +1 -1
  53. package/dist/modules/storageSync/hydrateStateWithStorage/hydrateStateWithStorage.d.ts.map +1 -1
  54. package/dist/modules/storageSync/schema.d.ts +8 -1
  55. package/dist/modules/storageSync/schema.d.ts.map +1 -1
  56. package/dist/modules/storageSync/syncStateWithStorage/syncStateWithStorage.d.ts.map +1 -1
  57. package/dist/modules/wallets/connectAndVerifyWithWalletProvider/connectAndVerifyWithWalletProvider.d.ts +4 -1
  58. package/dist/modules/wallets/connectAndVerifyWithWalletProvider/connectAndVerifyWithWalletProvider.d.ts.map +1 -1
  59. package/dist/modules/wallets/connectWithWalletProvider/connectWithWalletProvider.d.ts +4 -1
  60. package/dist/modules/wallets/connectWithWalletProvider/connectWithWalletProvider.d.ts.map +1 -1
  61. package/dist/modules/wallets/hardwareWallet/canConnectWithHardwareWallet/canConnectWithHardwareWallet.d.ts +16 -0
  62. package/dist/modules/wallets/hardwareWallet/canConnectWithHardwareWallet/canConnectWithHardwareWallet.d.ts.map +1 -0
  63. package/dist/modules/wallets/hardwareWallet/canConnectWithHardwareWallet/index.d.ts +2 -0
  64. package/dist/modules/wallets/hardwareWallet/canConnectWithHardwareWallet/index.d.ts.map +1 -0
  65. package/dist/modules/wallets/hardwareWallet/formatSignatureForHardwareWallet/formatSignatureForHardwareWallet.d.ts +15 -0
  66. package/dist/modules/wallets/hardwareWallet/formatSignatureForHardwareWallet/formatSignatureForHardwareWallet.d.ts.map +1 -0
  67. package/dist/modules/wallets/hardwareWallet/formatSignatureForHardwareWallet/index.d.ts +2 -0
  68. package/dist/modules/wallets/hardwareWallet/formatSignatureForHardwareWallet/index.d.ts.map +1 -0
  69. package/dist/modules/wallets/hardwareWallet/hardwareWallet.types.d.ts +5 -0
  70. package/dist/modules/wallets/hardwareWallet/hardwareWallet.types.d.ts.map +1 -0
  71. package/dist/modules/wallets/hardwareWallet/isHardwareWalletAccount/index.d.ts +2 -0
  72. package/dist/modules/wallets/hardwareWallet/isHardwareWalletAccount/index.d.ts.map +1 -0
  73. package/dist/modules/wallets/hardwareWallet/isHardwareWalletAccount/isHardwareWalletAccount.d.ts +13 -0
  74. package/dist/modules/wallets/hardwareWallet/isHardwareWalletAccount/isHardwareWalletAccount.d.ts.map +1 -0
  75. package/dist/modules/wallets/unverifiedWalletAccounts/schema.d.ts +2 -1
  76. package/dist/modules/wallets/unverifiedWalletAccounts/schema.d.ts.map +1 -1
  77. package/dist/modules/wallets/utils/convertVerifiedCredentialToWalletAccount/convertVerifiedCredentialToWalletAccount.d.ts.map +1 -1
  78. package/dist/modules/wallets/verifyMessageSignatureOwnership/verifyMessageSignatureOwnership.d.ts +3 -2
  79. package/dist/modules/wallets/verifyMessageSignatureOwnership/verifyMessageSignatureOwnership.d.ts.map +1 -1
  80. package/dist/modules/wallets/verifyWalletAccount/verifyWalletAccount.d.ts +3 -1
  81. package/dist/modules/wallets/verifyWalletAccount/verifyWalletAccount.d.ts.map +1 -1
  82. package/dist/modules/wallets/verifyWalletAccountForSignInOrTransfer/verifyWalletAccountForSignInOrTransfer.d.ts +3 -1
  83. package/dist/modules/wallets/verifyWalletAccountForSignInOrTransfer/verifyWalletAccountForSignInOrTransfer.d.ts.map +1 -1
  84. package/dist/modules/wallets/walletAccount/walletAccount.types.d.ts +2 -0
  85. package/dist/modules/wallets/walletAccount/walletAccount.types.d.ts.map +1 -1
  86. package/dist/modules/wallets/walletProvider/walletProvider.types.d.ts +5 -0
  87. package/dist/modules/wallets/walletProvider/walletProvider.types.d.ts.map +1 -1
  88. package/dist/tsconfig.lib.tsbuildinfo +1 -1
  89. package/dist/waas.cjs.js +4 -4
  90. package/dist/waas.esm.js +3 -3
  91. package/dist/waasCore.cjs.js +4 -4
  92. package/dist/waasCore.esm.js +3 -3
  93. package/package.json +3 -3
  94. package/dist/getSignedSessionId-Cseb1HzZ.cjs.js.map +0 -1
  95. package/dist/getSignedSessionId-rUbe9Ob0.esm.js.map +0 -1
  96. package/dist/getVerifiedCredentialForWalletAccount-CKl95diA.cjs.js.map +0 -1
  97. package/dist/getVerifiedCredentialForWalletAccount-DKSlfaeh.esm.js.map +0 -1
@@ -1,4 +1,4 @@
1
- import { O as getCore, l as createApiClient, w as getDefaultClient, y as assertDefined } from "./InvalidParamError-DwBXt02M.esm.js";
1
+ import { O as getCore, l as createApiClient, w as getDefaultClient, y as assertDefined } from "./InvalidParamError-Dyhydv4X.esm.js";
2
2
 
3
3
  //#region src/utils/bufferToHex/bufferToHex.ts
4
4
  /**
@@ -66,4 +66,4 @@ const isMfaRequiredForAction = async ({ mfaAction }, client = getDefaultClient()
66
66
 
67
67
  //#endregion
68
68
  export { bufferToHex as i, getMfaMethods as n, consumeMfaToken as r, isMfaRequiredForAction as t };
69
- //# sourceMappingURL=isMfaRequiredForAction-BJfSYQN8.esm.js.map
69
+ //# sourceMappingURL=isMfaRequiredForAction-BHmylnPq.esm.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"isMfaRequiredForAction-BJfSYQN8.esm.js","names":[],"sources":["../src/utils/bufferToHex/bufferToHex.ts","../src/modules/mfa/consumeMfaToken/consumeMfaToken.ts","../src/modules/mfa/getMfaMethods/getMfaMethods.ts","../src/modules/mfa/isMfaRequiredForAction/isMfaRequiredForAction.ts"],"sourcesContent":["/**\n * Converts an ArrayBuffer to a hex-encoded string\n */\nexport const bufferToHex = (buffer: ArrayBufferLike) =>\n [...new Uint8Array(buffer)]\n .map((x) => x.toString(16).padStart(2, '0'))\n .join('');\n","import { getCore } from '../../../client/core/getCore';\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport { assertDefined } from '../../../utils/assertDefined';\n\n/**\n * Consumes and clears the current MFA token from the client state.\n *\n * This function retrieves the MFA token obtained from a successful MFA authentication,\n * and removes it from the client, to prevent it from being used again.\n *\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns The MFA token that was consumed.\n * @throws Error if no MFA token is found.\n */\nexport const consumeMfaToken = (client = getDefaultClient()) => {\n const core = getCore(client);\n\n const mfaToken = core.state.get().mfaToken;\n\n assertDefined(mfaToken, 'No MFA token found');\n\n core.state.set({\n mfaToken: null,\n });\n\n return mfaToken;\n};\n","import { getCore } from '../../../client/core/getCore';\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport { createApiClient } from '../../apiClient';\n\n/**\n * Retrieves the available MFA methods for the current user.\n *\n * This function fetches information about which multi-factor authentication\n * methods are available and configured for the user's account.\n *\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves to the user's MFA methods configuration.\n */\nexport const getMfaMethods = async (client = getDefaultClient()) => {\n const core = getCore(client);\n const apiClient = createApiClient({}, client);\n\n const userMfaMethods = await apiClient.getUserMfaMethods({\n environmentId: core.environmentId,\n verifiedOnly: true,\n });\n\n return userMfaMethods;\n};\n","import type { MFAAction } from '@dynamic-labs/sdk-api-core';\n\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport { getMfaMethods } from '../getMfaMethods';\n\ntype IsMfaRequiredForActionParams = {\n mfaAction: MFAAction;\n};\n\n/**\n * Checks if MFA is required for a specific action.\n *\n * This function determines whether multi-factor authentication is required\n * for the specified action based on project settings and user configuration.\n *\n * @param params.mfaAction - The action to check MFA requirements for.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves to true if MFA is required for the action, false otherwise.\n */\nexport const isMfaRequiredForAction = async (\n { mfaAction }: IsMfaRequiredForActionParams,\n client = getDefaultClient()\n) => {\n const projectSettings = client.projectSettings;\n\n const isRequiredForAction = projectSettings?.security?.mfa?.actions?.some(\n (action) => action.action === mfaAction && action.required\n );\n\n // if mfa is not required for the action, return false\n // no matter if general mfa is set to required or not\n if (!isRequiredForAction) {\n return false;\n }\n\n const isMfaMethodRequired = projectSettings?.security?.mfa?.required;\n\n // if mfa is required for the action and also set as required in general, return true\n if (isMfaMethodRequired) {\n return true;\n }\n\n const mfaMethods = await getMfaMethods(client);\n // if general mfa is optional, but user has registered methods,\n // then it should be required for the action\n return mfaMethods.userHasVerifiedMfaMethods;\n};\n"],"mappings":";;;;;;AAGA,MAAa,eAAe,WAC1B,CAAC,GAAG,IAAI,WAAW,OAAO,CAAC,CACxB,KAAK,MAAM,EAAE,SAAS,GAAG,CAAC,SAAS,GAAG,IAAI,CAAC,CAC3C,KAAK,GAAG;;;;;;;;;;;;;;ACQb,MAAa,mBAAmB,SAAS,kBAAkB,KAAK;CAC9D,MAAM,OAAO,QAAQ,OAAO;CAE5B,MAAM,WAAW,KAAK,MAAM,KAAK,CAAC;AAElC,eAAc,UAAU,qBAAqB;AAE7C,MAAK,MAAM,IAAI,EACb,UAAU,MACX,CAAC;AAEF,QAAO;;;;;;;;;;;;;;ACZT,MAAa,gBAAgB,OAAO,SAAS,kBAAkB,KAAK;CAClE,MAAM,OAAO,QAAQ,OAAO;AAQ5B,QALuB,MAFL,gBAAgB,EAAE,EAAE,OAAO,CAEN,kBAAkB;EACvD,eAAe,KAAK;EACpB,cAAc;EACf,CAAC;;;;;;;;;;;;;;;ACDJ,MAAa,yBAAyB,OACpC,EAAE,aACF,SAAS,kBAAkB,KACxB;CACH,MAAM,kBAAkB,OAAO;AAQ/B,KAAI,CANwB,iBAAiB,UAAU,KAAK,SAAS,MAClE,WAAW,OAAO,WAAW,aAAa,OAAO,SACnD,CAKC,QAAO;AAMT,KAH4B,iBAAiB,UAAU,KAAK,SAI1D,QAAO;AAMT,SAHmB,MAAM,cAAc,OAAO,EAG5B"}
1
+ {"version":3,"file":"isMfaRequiredForAction-BHmylnPq.esm.js","names":[],"sources":["../src/utils/bufferToHex/bufferToHex.ts","../src/modules/mfa/consumeMfaToken/consumeMfaToken.ts","../src/modules/mfa/getMfaMethods/getMfaMethods.ts","../src/modules/mfa/isMfaRequiredForAction/isMfaRequiredForAction.ts"],"sourcesContent":["/**\n * Converts an ArrayBuffer to a hex-encoded string\n */\nexport const bufferToHex = (buffer: ArrayBufferLike) =>\n [...new Uint8Array(buffer)]\n .map((x) => x.toString(16).padStart(2, '0'))\n .join('');\n","import { getCore } from '../../../client/core/getCore';\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport { assertDefined } from '../../../utils/assertDefined';\n\n/**\n * Consumes and clears the current MFA token from the client state.\n *\n * This function retrieves the MFA token obtained from a successful MFA authentication,\n * and removes it from the client, to prevent it from being used again.\n *\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns The MFA token that was consumed.\n * @throws Error if no MFA token is found.\n */\nexport const consumeMfaToken = (client = getDefaultClient()) => {\n const core = getCore(client);\n\n const mfaToken = core.state.get().mfaToken;\n\n assertDefined(mfaToken, 'No MFA token found');\n\n core.state.set({\n mfaToken: null,\n });\n\n return mfaToken;\n};\n","import { getCore } from '../../../client/core/getCore';\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport { createApiClient } from '../../apiClient';\n\n/**\n * Retrieves the available MFA methods for the current user.\n *\n * This function fetches information about which multi-factor authentication\n * methods are available and configured for the user's account.\n *\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves to the user's MFA methods configuration.\n */\nexport const getMfaMethods = async (client = getDefaultClient()) => {\n const core = getCore(client);\n const apiClient = createApiClient({}, client);\n\n const userMfaMethods = await apiClient.getUserMfaMethods({\n environmentId: core.environmentId,\n verifiedOnly: true,\n });\n\n return userMfaMethods;\n};\n","import type { MFAAction } from '@dynamic-labs/sdk-api-core';\n\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport { getMfaMethods } from '../getMfaMethods';\n\ntype IsMfaRequiredForActionParams = {\n mfaAction: MFAAction;\n};\n\n/**\n * Checks if MFA is required for a specific action.\n *\n * This function determines whether multi-factor authentication is required\n * for the specified action based on project settings and user configuration.\n *\n * @param params.mfaAction - The action to check MFA requirements for.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves to true if MFA is required for the action, false otherwise.\n */\nexport const isMfaRequiredForAction = async (\n { mfaAction }: IsMfaRequiredForActionParams,\n client = getDefaultClient()\n) => {\n const projectSettings = client.projectSettings;\n\n const isRequiredForAction = projectSettings?.security?.mfa?.actions?.some(\n (action) => action.action === mfaAction && action.required\n );\n\n // if mfa is not required for the action, return false\n // no matter if general mfa is set to required or not\n if (!isRequiredForAction) {\n return false;\n }\n\n const isMfaMethodRequired = projectSettings?.security?.mfa?.required;\n\n // if mfa is required for the action and also set as required in general, return true\n if (isMfaMethodRequired) {\n return true;\n }\n\n const mfaMethods = await getMfaMethods(client);\n // if general mfa is optional, but user has registered methods,\n // then it should be required for the action\n return mfaMethods.userHasVerifiedMfaMethods;\n};\n"],"mappings":";;;;;;AAGA,MAAa,eAAe,WAC1B,CAAC,GAAG,IAAI,WAAW,OAAO,CAAC,CACxB,KAAK,MAAM,EAAE,SAAS,GAAG,CAAC,SAAS,GAAG,IAAI,CAAC,CAC3C,KAAK,GAAG;;;;;;;;;;;;;;ACQb,MAAa,mBAAmB,SAAS,kBAAkB,KAAK;CAC9D,MAAM,OAAO,QAAQ,OAAO;CAE5B,MAAM,WAAW,KAAK,MAAM,KAAK,CAAC;AAElC,eAAc,UAAU,qBAAqB;AAE7C,MAAK,MAAM,IAAI,EACb,UAAU,MACX,CAAC;AAEF,QAAO;;;;;;;;;;;;;;ACZT,MAAa,gBAAgB,OAAO,SAAS,kBAAkB,KAAK;CAClE,MAAM,OAAO,QAAQ,OAAO;AAQ5B,QALuB,MAFL,gBAAgB,EAAE,EAAE,OAAO,CAEN,kBAAkB;EACvD,eAAe,KAAK;EACpB,cAAc;EACf,CAAC;;;;;;;;;;;;;;;ACDJ,MAAa,yBAAyB,OACpC,EAAE,aACF,SAAS,kBAAkB,KACxB;CACH,MAAM,kBAAkB,OAAO;AAQ/B,KAAI,CANwB,iBAAiB,UAAU,KAAK,SAAS,MAClE,WAAW,OAAO,WAAW,aAAa,OAAO,SACnD,CAKC,QAAO;AAMT,KAH4B,iBAAiB,UAAU,KAAK,SAI1D,QAAO;AAMT,SAHmB,MAAM,cAAc,OAAO,EAG5B"}
@@ -1,4 +1,4 @@
1
- const require_InvalidParamError = require('./InvalidParamError-C-bDIPAn.cjs.js');
1
+ const require_InvalidParamError = require('./InvalidParamError-B83QXOQl.cjs.js');
2
2
 
3
3
  //#region src/utils/bufferToHex/bufferToHex.ts
4
4
  /**
@@ -89,4 +89,4 @@ Object.defineProperty(exports, 'isMfaRequiredForAction', {
89
89
  return isMfaRequiredForAction;
90
90
  }
91
91
  });
92
- //# sourceMappingURL=isMfaRequiredForAction-Dz3vNayT.cjs.js.map
92
+ //# sourceMappingURL=isMfaRequiredForAction-BzWbWDdR.cjs.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"isMfaRequiredForAction-Dz3vNayT.cjs.js","names":["getDefaultClient","getCore","getDefaultClient","getCore","createApiClient","getDefaultClient"],"sources":["../src/utils/bufferToHex/bufferToHex.ts","../src/modules/mfa/consumeMfaToken/consumeMfaToken.ts","../src/modules/mfa/getMfaMethods/getMfaMethods.ts","../src/modules/mfa/isMfaRequiredForAction/isMfaRequiredForAction.ts"],"sourcesContent":["/**\n * Converts an ArrayBuffer to a hex-encoded string\n */\nexport const bufferToHex = (buffer: ArrayBufferLike) =>\n [...new Uint8Array(buffer)]\n .map((x) => x.toString(16).padStart(2, '0'))\n .join('');\n","import { getCore } from '../../../client/core/getCore';\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport { assertDefined } from '../../../utils/assertDefined';\n\n/**\n * Consumes and clears the current MFA token from the client state.\n *\n * This function retrieves the MFA token obtained from a successful MFA authentication,\n * and removes it from the client, to prevent it from being used again.\n *\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns The MFA token that was consumed.\n * @throws Error if no MFA token is found.\n */\nexport const consumeMfaToken = (client = getDefaultClient()) => {\n const core = getCore(client);\n\n const mfaToken = core.state.get().mfaToken;\n\n assertDefined(mfaToken, 'No MFA token found');\n\n core.state.set({\n mfaToken: null,\n });\n\n return mfaToken;\n};\n","import { getCore } from '../../../client/core/getCore';\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport { createApiClient } from '../../apiClient';\n\n/**\n * Retrieves the available MFA methods for the current user.\n *\n * This function fetches information about which multi-factor authentication\n * methods are available and configured for the user's account.\n *\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves to the user's MFA methods configuration.\n */\nexport const getMfaMethods = async (client = getDefaultClient()) => {\n const core = getCore(client);\n const apiClient = createApiClient({}, client);\n\n const userMfaMethods = await apiClient.getUserMfaMethods({\n environmentId: core.environmentId,\n verifiedOnly: true,\n });\n\n return userMfaMethods;\n};\n","import type { MFAAction } from '@dynamic-labs/sdk-api-core';\n\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport { getMfaMethods } from '../getMfaMethods';\n\ntype IsMfaRequiredForActionParams = {\n mfaAction: MFAAction;\n};\n\n/**\n * Checks if MFA is required for a specific action.\n *\n * This function determines whether multi-factor authentication is required\n * for the specified action based on project settings and user configuration.\n *\n * @param params.mfaAction - The action to check MFA requirements for.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves to true if MFA is required for the action, false otherwise.\n */\nexport const isMfaRequiredForAction = async (\n { mfaAction }: IsMfaRequiredForActionParams,\n client = getDefaultClient()\n) => {\n const projectSettings = client.projectSettings;\n\n const isRequiredForAction = projectSettings?.security?.mfa?.actions?.some(\n (action) => action.action === mfaAction && action.required\n );\n\n // if mfa is not required for the action, return false\n // no matter if general mfa is set to required or not\n if (!isRequiredForAction) {\n return false;\n }\n\n const isMfaMethodRequired = projectSettings?.security?.mfa?.required;\n\n // if mfa is required for the action and also set as required in general, return true\n if (isMfaMethodRequired) {\n return true;\n }\n\n const mfaMethods = await getMfaMethods(client);\n // if general mfa is optional, but user has registered methods,\n // then it should be required for the action\n return mfaMethods.userHasVerifiedMfaMethods;\n};\n"],"mappings":";;;;;;AAGA,MAAa,eAAe,WAC1B,CAAC,GAAG,IAAI,WAAW,OAAO,CAAC,CACxB,KAAK,MAAM,EAAE,SAAS,GAAG,CAAC,SAAS,GAAG,IAAI,CAAC,CAC3C,KAAK,GAAG;;;;;;;;;;;;;;ACQb,MAAa,mBAAmB,SAASA,4CAAkB,KAAK;CAC9D,MAAM,OAAOC,kCAAQ,OAAO;CAE5B,MAAM,WAAW,KAAK,MAAM,KAAK,CAAC;AAElC,yCAAc,UAAU,qBAAqB;AAE7C,MAAK,MAAM,IAAI,EACb,UAAU,MACX,CAAC;AAEF,QAAO;;;;;;;;;;;;;;ACZT,MAAa,gBAAgB,OAAO,SAASC,4CAAkB,KAAK;CAClE,MAAM,OAAOC,kCAAQ,OAAO;AAQ5B,QALuB,MAFLC,0CAAgB,EAAE,EAAE,OAAO,CAEN,kBAAkB;EACvD,eAAe,KAAK;EACpB,cAAc;EACf,CAAC;;;;;;;;;;;;;;;ACDJ,MAAa,yBAAyB,OACpC,EAAE,aACF,SAASC,4CAAkB,KACxB;CACH,MAAM,kBAAkB,OAAO;AAQ/B,KAAI,CANwB,iBAAiB,UAAU,KAAK,SAAS,MAClE,WAAW,OAAO,WAAW,aAAa,OAAO,SACnD,CAKC,QAAO;AAMT,KAH4B,iBAAiB,UAAU,KAAK,SAI1D,QAAO;AAMT,SAHmB,MAAM,cAAc,OAAO,EAG5B"}
1
+ {"version":3,"file":"isMfaRequiredForAction-BzWbWDdR.cjs.js","names":["getDefaultClient","getCore","getDefaultClient","getCore","createApiClient","getDefaultClient"],"sources":["../src/utils/bufferToHex/bufferToHex.ts","../src/modules/mfa/consumeMfaToken/consumeMfaToken.ts","../src/modules/mfa/getMfaMethods/getMfaMethods.ts","../src/modules/mfa/isMfaRequiredForAction/isMfaRequiredForAction.ts"],"sourcesContent":["/**\n * Converts an ArrayBuffer to a hex-encoded string\n */\nexport const bufferToHex = (buffer: ArrayBufferLike) =>\n [...new Uint8Array(buffer)]\n .map((x) => x.toString(16).padStart(2, '0'))\n .join('');\n","import { getCore } from '../../../client/core/getCore';\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport { assertDefined } from '../../../utils/assertDefined';\n\n/**\n * Consumes and clears the current MFA token from the client state.\n *\n * This function retrieves the MFA token obtained from a successful MFA authentication,\n * and removes it from the client, to prevent it from being used again.\n *\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns The MFA token that was consumed.\n * @throws Error if no MFA token is found.\n */\nexport const consumeMfaToken = (client = getDefaultClient()) => {\n const core = getCore(client);\n\n const mfaToken = core.state.get().mfaToken;\n\n assertDefined(mfaToken, 'No MFA token found');\n\n core.state.set({\n mfaToken: null,\n });\n\n return mfaToken;\n};\n","import { getCore } from '../../../client/core/getCore';\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport { createApiClient } from '../../apiClient';\n\n/**\n * Retrieves the available MFA methods for the current user.\n *\n * This function fetches information about which multi-factor authentication\n * methods are available and configured for the user's account.\n *\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves to the user's MFA methods configuration.\n */\nexport const getMfaMethods = async (client = getDefaultClient()) => {\n const core = getCore(client);\n const apiClient = createApiClient({}, client);\n\n const userMfaMethods = await apiClient.getUserMfaMethods({\n environmentId: core.environmentId,\n verifiedOnly: true,\n });\n\n return userMfaMethods;\n};\n","import type { MFAAction } from '@dynamic-labs/sdk-api-core';\n\nimport { getDefaultClient } from '../../../client/defaultClient';\nimport { getMfaMethods } from '../getMfaMethods';\n\ntype IsMfaRequiredForActionParams = {\n mfaAction: MFAAction;\n};\n\n/**\n * Checks if MFA is required for a specific action.\n *\n * This function determines whether multi-factor authentication is required\n * for the specified action based on project settings and user configuration.\n *\n * @param params.mfaAction - The action to check MFA requirements for.\n * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.\n * @returns A promise that resolves to true if MFA is required for the action, false otherwise.\n */\nexport const isMfaRequiredForAction = async (\n { mfaAction }: IsMfaRequiredForActionParams,\n client = getDefaultClient()\n) => {\n const projectSettings = client.projectSettings;\n\n const isRequiredForAction = projectSettings?.security?.mfa?.actions?.some(\n (action) => action.action === mfaAction && action.required\n );\n\n // if mfa is not required for the action, return false\n // no matter if general mfa is set to required or not\n if (!isRequiredForAction) {\n return false;\n }\n\n const isMfaMethodRequired = projectSettings?.security?.mfa?.required;\n\n // if mfa is required for the action and also set as required in general, return true\n if (isMfaMethodRequired) {\n return true;\n }\n\n const mfaMethods = await getMfaMethods(client);\n // if general mfa is optional, but user has registered methods,\n // then it should be required for the action\n return mfaMethods.userHasVerifiedMfaMethods;\n};\n"],"mappings":";;;;;;AAGA,MAAa,eAAe,WAC1B,CAAC,GAAG,IAAI,WAAW,OAAO,CAAC,CACxB,KAAK,MAAM,EAAE,SAAS,GAAG,CAAC,SAAS,GAAG,IAAI,CAAC,CAC3C,KAAK,GAAG;;;;;;;;;;;;;;ACQb,MAAa,mBAAmB,SAASA,4CAAkB,KAAK;CAC9D,MAAM,OAAOC,kCAAQ,OAAO;CAE5B,MAAM,WAAW,KAAK,MAAM,KAAK,CAAC;AAElC,yCAAc,UAAU,qBAAqB;AAE7C,MAAK,MAAM,IAAI,EACb,UAAU,MACX,CAAC;AAEF,QAAO;;;;;;;;;;;;;;ACZT,MAAa,gBAAgB,OAAO,SAASC,4CAAkB,KAAK;CAClE,MAAM,OAAOC,kCAAQ,OAAO;AAQ5B,QALuB,MAFLC,0CAAgB,EAAE,EAAE,OAAO,CAEN,kBAAkB;EACvD,eAAe,KAAK;EACpB,cAAc;EACf,CAAC;;;;;;;;;;;;;;;ACDJ,MAAa,yBAAyB,OACpC,EAAE,aACF,SAASC,4CAAkB,KACxB;CACH,MAAM,kBAAkB,OAAO;AAQ/B,KAAI,CANwB,iBAAiB,UAAU,KAAK,SAAS,MAClE,WAAW,OAAO,WAAW,aAAa,OAAO,SACnD,CAKC,QAAO;AAMT,KAH4B,iBAAiB,UAAU,KAAK,SAI1D,QAAO;AAMT,SAHmB,MAAM,cAAc,OAAO,EAG5B"}
@@ -1,10 +1,10 @@
1
1
  export type JwtPayload = {
2
2
  [key: string]: unknown;
3
- exp?: number;
4
- iat?: number;
5
- scopes?: string[];
3
+ exp: number;
4
+ iat: number;
5
+ scope: string;
6
6
  singleUse?: boolean;
7
- sub?: string;
7
+ sub: string;
8
8
  };
9
9
  /**
10
10
  * Decodes a JWT token and returns the full payload.
@@ -1 +1 @@
1
- {"version":3,"file":"decodeJwt.d.ts","sourceRoot":"","sources":["../../../../src/modules/auth/decodeJwt/decodeJwt.ts"],"names":[],"mappings":"AAEA,MAAM,MAAM,UAAU,GAAG;IACvB,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC;IACvB,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,MAAM,CAAC,EAAE,MAAM,EAAE,CAAC;IAClB,SAAS,CAAC,EAAE,OAAO,CAAC;IACpB,GAAG,CAAC,EAAE,MAAM,CAAC;CACd,CAAC;AAEF;;;;;;;;;;;;;;;GAeG;AACH,eAAO,MAAM,SAAS,QAAS,MAAM,KAAG,UA4BvC,CAAC"}
1
+ {"version":3,"file":"decodeJwt.d.ts","sourceRoot":"","sources":["../../../../src/modules/auth/decodeJwt/decodeJwt.ts"],"names":[],"mappings":"AAEA,MAAM,MAAM,UAAU,GAAG;IACvB,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC;IACvB,GAAG,EAAE,MAAM,CAAC;IACZ,GAAG,EAAE,MAAM,CAAC;IACZ,KAAK,EAAE,MAAM,CAAC;IACd,SAAS,CAAC,EAAE,OAAO,CAAC;IACpB,GAAG,EAAE,MAAM,CAAC;CACb,CAAC;AAEF;;;;;;;;;;;;;;;GAeG;AACH,eAAO,MAAM,SAAS,QAAS,MAAM,KAAG,UA4BvC,CAAC"}
@@ -1 +1 @@
1
- {"version":3,"file":"logout.d.ts","sourceRoot":"","sources":["../../../../src/modules/auth/logout/logout.ts"],"names":[],"mappings":"AAWA;;;;;GAKG;AACH,eAAO,MAAM,MAAM,sEA+ClB,CAAC"}
1
+ {"version":3,"file":"logout.d.ts","sourceRoot":"","sources":["../../../../src/modules/auth/logout/logout.ts"],"names":[],"mappings":"AAWA;;;;;GAKG;AACH,eAAO,MAAM,MAAM,sEAgDlB,CAAC"}
@@ -9,7 +9,7 @@ declare global {
9
9
  * Tokens are removed when consumed or expired.
10
10
  */
11
11
  elevatedAccessTokens: Array<{
12
- expiresAt: Date | null;
12
+ expiresAt: Date;
13
13
  scopes: string[];
14
14
  singleUse: boolean;
15
15
  token: string;
@@ -1 +1 @@
1
- {"version":3,"file":"state.d.ts","sourceRoot":"","sources":["../../../src/modules/auth/state.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,IAAI,EAAE,MAAM,oBAAoB,CAAC;AAE/C,OAAO,CAAC,MAAM,CAAC;IACb,UAAU,gBAAgB;QACxB;;;;;;WAMG;QACH,oBAAoB,EAAE,KAAK,CAAC;YAC1B,SAAS,EAAE,IAAI,GAAG,IAAI,CAAC;YACvB,MAAM,EAAE,MAAM,EAAE,CAAC;YACjB,SAAS,EAAE,OAAO,CAAC;YACnB,KAAK,EAAE,MAAM,CAAC;SACf,CAAC,CAAC;QAEH;;;;;;;;;WASG;QACH,WAAW,EAAE,MAAM,GAAG,IAAI,CAAC;QAE3B;;WAEG;QACH,gBAAgB,EAAE,IAAI,GAAG,IAAI,CAAC;QAE9B;;;;;WAKG;QACH,KAAK,EAAE,MAAM,GAAG,IAAI,CAAC;QAErB;;WAEG;QACH,IAAI,EAAE,IAAI,GAAG,IAAI,CAAC;KACnB;CACF"}
1
+ {"version":3,"file":"state.d.ts","sourceRoot":"","sources":["../../../src/modules/auth/state.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,IAAI,EAAE,MAAM,oBAAoB,CAAC;AAE/C,OAAO,CAAC,MAAM,CAAC;IACb,UAAU,gBAAgB;QACxB;;;;;;WAMG;QACH,oBAAoB,EAAE,KAAK,CAAC;YAC1B,SAAS,EAAE,IAAI,CAAC;YAChB,MAAM,EAAE,MAAM,EAAE,CAAC;YACjB,SAAS,EAAE,OAAO,CAAC;YACnB,KAAK,EAAE,MAAM,CAAC;SACf,CAAC,CAAC;QAEH;;;;;;;;;WASG;QACH,WAAW,EAAE,MAAM,GAAG,IAAI,CAAC;QAE3B;;WAEG;QACH,gBAAgB,EAAE,IAAI,GAAG,IAAI,CAAC;QAE9B;;;;;WAKG;QACH,KAAK,EAAE,MAAM,GAAG,IAAI,CAAC;QAErB;;WAEG;QACH,IAAI,EAAE,IAAI,GAAG,IAAI,CAAC;KACnB;CACF"}
@@ -1 +1 @@
1
- {"version":3,"file":"parseElevatedAccessToken.d.ts","sourceRoot":"","sources":["../../../../../../src/modules/auth/updateAuthFromVerifyResponse/elevatedAccessTokens/parseElevatedAccessToken/parseElevatedAccessToken.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,yBAAyB,EAAE,MAAM,+BAA+B,CAAC;AAG/E;;;;;;;;;;;;;GAaG;AACH,eAAO,MAAM,wBAAwB,UAC5B,MAAM,QACR,IAAI,KACR,yBAAyB,GAAG,IA8B9B,CAAC"}
1
+ {"version":3,"file":"parseElevatedAccessToken.d.ts","sourceRoot":"","sources":["../../../../../../src/modules/auth/updateAuthFromVerifyResponse/elevatedAccessTokens/parseElevatedAccessToken/parseElevatedAccessToken.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,yBAAyB,EAAE,MAAM,+BAA+B,CAAC;AAG/E;;;;;;;;;;;;;GAaG;AACH,eAAO,MAAM,wBAAwB,UAC5B,MAAM,QACR,IAAI,KACR,yBAAyB,GAAG,IAgC9B,CAAC"}
@@ -1 +1 @@
1
- {"version":3,"file":"updateAuthFromVerifyResponse.d.ts","sourceRoot":"","sources":["../../../../src/modules/auth/updateAuthFromVerifyResponse/updateAuthFromVerifyResponse.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAIjE,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAS3D,KAAK,kCAAkC,GAAG;IACxC,QAAQ,EAAE,cAAc,CAAC;CAC1B,CAAC;AAEF,eAAO,MAAM,4BAA4B,iBACzB,kCAAkC,UACxC,aAAa,SA4DtB,CAAC"}
1
+ {"version":3,"file":"updateAuthFromVerifyResponse.d.ts","sourceRoot":"","sources":["../../../../src/modules/auth/updateAuthFromVerifyResponse/updateAuthFromVerifyResponse.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAIjE,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAS3D,KAAK,kCAAkC,GAAG;IACxC,QAAQ,EAAE,cAAc,CAAC;CAC1B,CAAC;AAEF,eAAO,MAAM,4BAA4B,iBACzB,kCAAkC,UACxC,aAAa,SA+DtB,CAAC"}
@@ -1,7 +1,8 @@
1
- import type { VerifyResponse } from '@dynamic-labs/sdk-api-core';
1
+ import type { TokenScope, VerifyResponse } from '@dynamic-labs/sdk-api-core';
2
2
  import type { OTPVerification } from '../otp.types';
3
3
  export type VerifyOTPParams = {
4
4
  otpVerification: OTPVerification;
5
+ requestedScopes?: TokenScope[];
5
6
  verificationToken: string;
6
7
  };
7
8
  /**
@@ -15,5 +16,5 @@ export type VerifyOTPParams = {
15
16
  * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
16
17
  * @returns A promise that resolves to the verify response object upon successful verification.
17
18
  */
18
- export declare const verifyOTP: ({ otpVerification, verificationToken }: VerifyOTPParams, client?: import("../../../exports").DynamicClient) => Promise<VerifyResponse>;
19
+ export declare const verifyOTP: ({ otpVerification, verificationToken, requestedScopes }: VerifyOTPParams, client?: import("../../../exports").DynamicClient) => Promise<VerifyResponse>;
19
20
  //# sourceMappingURL=verifyOTP.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"verifyOTP.d.ts","sourceRoot":"","sources":["../../../../src/modules/otp/verifyOTP/verifyOTP.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAIjE,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,cAAc,CAAC;AAIpD,MAAM,MAAM,eAAe,GAAG;IAC5B,eAAe,EAAE,eAAe,CAAC;IACjC,iBAAiB,EAAE,MAAM,CAAC;CAC3B,CAAC;AAEF;;;;;;;;;;GAUG;AACH,eAAO,MAAM,SAAS,2CACoB,eAAe,wDAEtD,OAAO,CAAC,cAAc,CAgBxB,CAAC"}
1
+ {"version":3,"file":"verifyOTP.d.ts","sourceRoot":"","sources":["../../../../src/modules/otp/verifyOTP/verifyOTP.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,UAAU,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAI7E,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,cAAc,CAAC;AAIpD,MAAM,MAAM,eAAe,GAAG;IAC5B,eAAe,EAAE,eAAe,CAAC;IACjC,eAAe,CAAC,EAAE,UAAU,EAAE,CAAC;IAC/B,iBAAiB,EAAE,MAAM,CAAC;CAC3B,CAAC;AAEF;;;;;;;;;;GAUG;AACH,eAAO,MAAM,SAAS,4DACqC,eAAe,wDAEvE,OAAO,CAAC,cAAc,CAqBxB,CAAC"}
@@ -1,4 +1,4 @@
1
1
  import type { DynamicClient } from '../../../../client/types';
2
2
  import type { VerifyOTPParams } from '../verifyOTP';
3
- export declare const verifyOTPForUserUpdate: ({ otpVerification, verificationToken }: VerifyOTPParams, client: DynamicClient) => Promise<import("@dynamic-labs/sdk-api-core").UpdateSelfResponse>;
3
+ export declare const verifyOTPForUserUpdate: ({ otpVerification, verificationToken, requestedScopes }: VerifyOTPParams, client: DynamicClient) => Promise<import("@dynamic-labs/sdk-api-core").UpdateSelfResponse>;
4
4
  //# sourceMappingURL=verifyOTPForUserUpdate.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"verifyOTPForUserUpdate.d.ts","sourceRoot":"","sources":["../../../../../src/modules/otp/verifyOTP/verifyOTPForUserUpdate/verifyOTPForUserUpdate.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,0BAA0B,CAAC;AAE9D,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,cAAc,CAAC;AAEpD,eAAO,MAAM,sBAAsB,2CACO,eAAe,UAC/C,aAAa,qEAqBtB,CAAC"}
1
+ {"version":3,"file":"verifyOTPForUserUpdate.d.ts","sourceRoot":"","sources":["../../../../../src/modules/otp/verifyOTP/verifyOTPForUserUpdate/verifyOTPForUserUpdate.ts"],"names":[],"mappings":"AAMA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,0BAA0B,CAAC;AAE9D,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,cAAc,CAAC;AAEpD,eAAO,MAAM,sBAAsB,4DACwB,eAAe,UAChE,aAAa,qEAwBtB,CAAC"}
@@ -0,0 +1,9 @@
1
+ import type { DynamicClient } from '../../../client/types';
2
+ type GenerateNonceSignatureParams = {
3
+ nonce: string;
4
+ };
5
+ export declare const generateNonceSignature: ({ nonce }: GenerateNonceSignatureParams, client: DynamicClient) => Promise<{
6
+ signature: string;
7
+ }>;
8
+ export {};
9
+ //# sourceMappingURL=generateNonceSignature.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"generateNonceSignature.d.ts","sourceRoot":"","sources":["../../../../src/modules/sessionKeys/generateNonceSignature/generateNonceSignature.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAK3D,KAAK,4BAA4B,GAAG;IAClC,KAAK,EAAE,MAAM,CAAC;CACf,CAAC;AAEF,eAAO,MAAM,sBAAsB,cACtB,4BAA4B,UAC/B,aAAa;;EAatB,CAAC"}
@@ -0,0 +1,2 @@
1
+ export { generateNonceSignature } from './generateNonceSignature';
2
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/modules/sessionKeys/generateNonceSignature/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,sBAAsB,EAAE,MAAM,0BAA0B,CAAC"}
@@ -1 +1 @@
1
- {"version":3,"file":"getSignedSessionId.d.ts","sourceRoot":"","sources":["../../../../src/modules/sessionKeys/getSignedSessionId/getSignedSessionId.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAI3D,eAAO,MAAM,kBAAkB,WAAkB,aAAa;;EAgB7D,CAAC"}
1
+ {"version":3,"file":"getSignedSessionId.d.ts","sourceRoot":"","sources":["../../../../src/modules/sessionKeys/getSignedSessionId/getSignedSessionId.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAM3D,eAAO,MAAM,kBAAkB,WAAkB,aAAa;;EAkC7D,CAAC"}
@@ -1 +1 @@
1
- {"version":3,"file":"hydrateStateWithStorage.d.ts","sourceRoot":"","sources":["../../../../src/modules/storageSync/hydrateStateWithStorage/hydrateStateWithStorage.ts"],"names":[],"mappings":"AAEA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAK3D,eAAO,MAAM,uBAAuB,WAC1B,aAAa,KACpB,OAAO,CAAC,IAAI,CAsDd,CAAC"}
1
+ {"version":3,"file":"hydrateStateWithStorage.d.ts","sourceRoot":"","sources":["../../../../src/modules/storageSync/hydrateStateWithStorage/hydrateStateWithStorage.ts"],"names":[],"mappings":"AAEA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAK3D,eAAO,MAAM,uBAAuB,WAC1B,aAAa,KACpB,OAAO,CAAC,IAAI,CA4Dd,CAAC"}
@@ -10,15 +10,22 @@ export declare const stateStorageKeySchema: import("../../services/storage").Sto
10
10
  walletProviderKey: string;
11
11
  addressesWithTypes?: {
12
12
  address: string;
13
- type: "ordinals" | "payment" | "cosmos" | "evm" | "ton";
13
+ type: "ordinals" | "payment" | "cosmos" | "evm" | "stellar" | "ton";
14
14
  publicKey?: string | undefined;
15
15
  }[] | undefined;
16
+ hardwareWalletVendor?: "ledger" | undefined;
16
17
  }[];
17
18
  user: SdkUser | null;
18
19
  walletProviderKeyMap: Record<string, string>;
19
20
  }>;
20
21
  export declare const sessionStorageKeySchema: import("../../services/storage").StorageKeySchema<{
21
22
  captchaToken: string | null;
23
+ elevatedAccessTokens: {
24
+ expiresAt: number;
25
+ scopes: string[];
26
+ singleUse: boolean | null;
27
+ token: string;
28
+ }[];
22
29
  legacyToken: string | null;
23
30
  mfaToken: string | null;
24
31
  sessionExpiration: number;
@@ -1 +1 @@
1
- {"version":3,"file":"schema.d.ts","sourceRoot":"","sources":["../../../src/modules/storageSync/schema.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,eAAe,EAAE,OAAO,EAAE,MAAM,4BAA4B,CAAC;AAO3E,eAAO,MAAM,qBAAqB;;;;;;;;;;;;;;;;;EAShC,CAAC;AAEH,eAAO,MAAM,uBAAuB;;;;;;;EAmClC,CAAC"}
1
+ {"version":3,"file":"schema.d.ts","sourceRoot":"","sources":["../../../src/modules/storageSync/schema.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,eAAe,EAAE,OAAO,EAAE,MAAM,4BAA4B,CAAC;AAO3E,eAAO,MAAM,qBAAqB;;;;;;;;;;;;;;;;;;EAShC,CAAC;AAEH,eAAO,MAAM,uBAAuB;;;;;;;;;;;;;EA2DlC,CAAC"}
@@ -1 +1 @@
1
- {"version":3,"file":"syncStateWithStorage.d.ts","sourceRoot":"","sources":["../../../../src/modules/storageSync/syncStateWithStorage/syncStateWithStorage.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAI3D,eAAO,MAAM,oBAAoB,WAAY,aAAa,SAyBzD,CAAC"}
1
+ {"version":3,"file":"syncStateWithStorage.d.ts","sourceRoot":"","sources":["../../../../src/modules/storageSync/syncStateWithStorage/syncStateWithStorage.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAI3D,eAAO,MAAM,oBAAoB,WAAY,aAAa,SAiCzD,CAAC"}
@@ -1,4 +1,6 @@
1
+ import type { HardwareWalletVendor } from '../hardwareWallet/hardwareWallet.types';
1
2
  type ConnectAndVerifyWithWalletProviderParams = {
3
+ hardwareWalletVendor?: HardwareWalletVendor;
2
4
  walletProviderKey: string;
3
5
  };
4
6
  /**
@@ -9,9 +11,10 @@ type ConnectAndVerifyWithWalletProviderParams = {
9
11
  * the wallet account is added to their profile.
10
12
  *
11
13
  * @param params.walletProviderKey - The unique key identifying the wallet provider to connect to.
14
+ * @param [params.hardwareWalletVendor] - The hardware wallet vendor, if connecting via a hardware wallet (e.g. 'ledger').
12
15
  * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
13
16
  * @returns A promise that resolves to the connected and verified wallet account.
14
17
  */
15
- export declare const connectAndVerifyWithWalletProvider: ({ walletProviderKey }: ConnectAndVerifyWithWalletProviderParams, client?: import("../../../exports").DynamicClient) => Promise<import("../walletAccount").BaseWalletAccount<import("../../chain").Chain>>;
18
+ export declare const connectAndVerifyWithWalletProvider: ({ walletProviderKey, hardwareWalletVendor }: ConnectAndVerifyWithWalletProviderParams, client?: import("../../../exports").DynamicClient) => Promise<import("../walletAccount").BaseWalletAccount<import("../../chain").Chain>>;
16
19
  export {};
17
20
  //# sourceMappingURL=connectAndVerifyWithWalletProvider.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"connectAndVerifyWithWalletProvider.d.ts","sourceRoot":"","sources":["../../../../src/modules/wallets/connectAndVerifyWithWalletProvider/connectAndVerifyWithWalletProvider.ts"],"names":[],"mappings":"AAOA,KAAK,wCAAwC,GAAG;IAC9C,iBAAiB,EAAE,MAAM,CAAC;CAC3B,CAAC;AAEF;;;;;;;;;;GAUG;AACH,eAAO,MAAM,kCAAkC,0BACtB,wCAAwC,0IAiBhE,CAAC"}
1
+ {"version":3,"file":"connectAndVerifyWithWalletProvider.d.ts","sourceRoot":"","sources":["../../../../src/modules/wallets/connectAndVerifyWithWalletProvider/connectAndVerifyWithWalletProvider.ts"],"names":[],"mappings":"AAKA,OAAO,KAAK,EAAE,oBAAoB,EAAE,MAAM,wCAAwC,CAAC;AAGnF,KAAK,wCAAwC,GAAG;IAC9C,oBAAoB,CAAC,EAAE,oBAAoB,CAAC;IAC5C,iBAAiB,EAAE,MAAM,CAAC;CAC3B,CAAC;AAEF;;;;;;;;;;;GAWG;AACH,eAAO,MAAM,kCAAkC,gDACA,wCAAwC,0IAiBtF,CAAC"}
@@ -1,6 +1,8 @@
1
+ import type { HardwareWalletVendor } from '../hardwareWallet/hardwareWallet.types';
1
2
  import type { WalletAccount } from '../walletAccount';
2
3
  type ConnectWithWalletProviderParams = {
3
4
  addToDynamicWalletAccounts?: boolean;
5
+ hardwareWalletVendor?: HardwareWalletVendor;
4
6
  walletProviderKey: string;
5
7
  };
6
8
  /**
@@ -13,10 +15,11 @@ type ConnectWithWalletProviderParams = {
13
15
  *
14
16
  * @param params.walletProviderKey - The unique key identifying the wallet provider to connect to (e.g. 'metamaskevm', 'phantomsol').
15
17
  * @param [params.addToDynamicWalletAccounts] - Whether to add the connected wallet account to the user's wallet accounts. Defaults to true.
18
+ * @param [params.hardwareWalletVendor] - The hardware wallet vendor, if connecting via a hardware wallet (e.g. 'ledger').
16
19
  * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
17
20
  * @returns A promise that resolves to the connected wallet account.
18
21
  * @throws NoAddressFoundError If the request to connect was successful but no address is connected to your app.
19
22
  */
20
- export declare const connectWithWalletProvider: ({ walletProviderKey, addToDynamicWalletAccounts, }: ConnectWithWalletProviderParams, client?: import("../../../exports").DynamicClient) => Promise<WalletAccount>;
23
+ export declare const connectWithWalletProvider: ({ walletProviderKey, addToDynamicWalletAccounts, hardwareWalletVendor, }: ConnectWithWalletProviderParams, client?: import("../../../exports").DynamicClient) => Promise<WalletAccount>;
21
24
  export {};
22
25
  //# sourceMappingURL=connectWithWalletProvider.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"connectWithWalletProvider.d.ts","sourceRoot":"","sources":["../../../../src/modules/wallets/connectWithWalletProvider/connectWithWalletProvider.ts"],"names":[],"mappings":"AASA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,kBAAkB,CAAC;AAGtD,KAAK,+BAA+B,GAAG;IACrC,0BAA0B,CAAC,EAAE,OAAO,CAAC;IACrC,iBAAiB,EAAE,MAAM,CAAC;CAC3B,CAAC;AAEF;;;;;;;;;;;;;GAaG;AACH,eAAO,MAAM,yBAAyB,uDAIjC,+BAA+B,wDAEjC,OAAO,CAAC,aAAa,CA+DvB,CAAC"}
1
+ {"version":3,"file":"connectWithWalletProvider.d.ts","sourceRoot":"","sources":["../../../../src/modules/wallets/connectWithWalletProvider/connectWithWalletProvider.ts"],"names":[],"mappings":"AAKA,OAAO,KAAK,EAAE,oBAAoB,EAAE,MAAM,wCAAwC,CAAC;AAKnF,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,kBAAkB,CAAC;AAGtD,KAAK,+BAA+B,GAAG;IACrC,0BAA0B,CAAC,EAAE,OAAO,CAAC;IACrC,oBAAoB,CAAC,EAAE,oBAAoB,CAAC;IAC5C,iBAAiB,EAAE,MAAM,CAAC;CAC3B,CAAC;AAEF;;;;;;;;;;;;;;GAcG;AACH,eAAO,MAAM,yBAAyB,6EAKjC,+BAA+B,wDAEjC,OAAO,CAAC,aAAa,CAgEvB,CAAC"}
@@ -0,0 +1,16 @@
1
+ import type { HardwareWalletVendor } from '../hardwareWallet.types';
2
+ type CanConnectWithHardwareWalletParams = {
3
+ hardwareWalletVendor: HardwareWalletVendor;
4
+ walletProviderKey: string;
5
+ };
6
+ /**
7
+ * Checks whether a wallet provider supports connecting with a specific hardware wallet vendor.
8
+ *
9
+ * @param params.walletProviderKey - The key of the wallet provider to check.
10
+ * @param params.hardwareWalletVendor - The hardware wallet vendor to check for.
11
+ * @param [client] - The Dynamic client instance. Only required when using multiple Dynamic clients.
12
+ * @returns Whether the wallet provider supports the specified hardware wallet vendor.
13
+ */
14
+ export declare const canConnectWithHardwareWallet: ({ walletProviderKey, hardwareWalletVendor, }: CanConnectWithHardwareWalletParams, client?: import("../../../../exports").DynamicClient) => boolean;
15
+ export {};
16
+ //# sourceMappingURL=canConnectWithHardwareWallet.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"canConnectWithHardwareWallet.d.ts","sourceRoot":"","sources":["../../../../../src/modules/wallets/hardwareWallet/canConnectWithHardwareWallet/canConnectWithHardwareWallet.ts"],"names":[],"mappings":"AAEA,OAAO,KAAK,EAAE,oBAAoB,EAAE,MAAM,yBAAyB,CAAC;AAEpE,KAAK,kCAAkC,GAAG;IACxC,oBAAoB,EAAE,oBAAoB,CAAC;IAC3C,iBAAiB,EAAE,MAAM,CAAC;CAC3B,CAAC;AAEF;;;;;;;GAOG;AACH,eAAO,MAAM,4BAA4B,iDAIpC,kCAAkC,2DAEpC,OAWF,CAAC"}
@@ -0,0 +1,2 @@
1
+ export { canConnectWithHardwareWallet } from './canConnectWithHardwareWallet';
2
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../src/modules/wallets/hardwareWallet/canConnectWithHardwareWallet/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,4BAA4B,EAAE,MAAM,gCAAgC,CAAC"}
@@ -0,0 +1,15 @@
1
+ import type { HardwareWalletVendor } from '../hardwareWallet.types';
2
+ type FormatSignatureForHardwareWalletParams = {
3
+ hardwareWalletVendor: HardwareWalletVendor;
4
+ signature: string;
5
+ };
6
+ /**
7
+ * Wraps a raw signature in the JSON format expected by the backend for hardware wallet verification.
8
+ *
9
+ * @param params.hardwareWalletVendor - The hardware wallet vendor that produced the signature.
10
+ * @param params.signature - The raw signature string to wrap.
11
+ * @returns The signature wrapped in `{ signedTransaction: { data } }` JSON format.
12
+ */
13
+ export declare const formatSignatureForHardwareWallet: ({ signature, hardwareWalletVendor: _, }: FormatSignatureForHardwareWalletParams) => string;
14
+ export {};
15
+ //# sourceMappingURL=formatSignatureForHardwareWallet.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"formatSignatureForHardwareWallet.d.ts","sourceRoot":"","sources":["../../../../../src/modules/wallets/hardwareWallet/formatSignatureForHardwareWallet/formatSignatureForHardwareWallet.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,oBAAoB,EAAE,MAAM,yBAAyB,CAAC;AAEpE,KAAK,sCAAsC,GAAG;IAC5C,oBAAoB,EAAE,oBAAoB,CAAC;IAC3C,SAAS,EAAE,MAAM,CAAC;CACnB,CAAC;AAEF;;;;;;GAMG;AACH,eAAO,MAAM,gCAAgC,4CAG1C,sCAAsC,KAAG,MAKxC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export { formatSignatureForHardwareWallet } from './formatSignatureForHardwareWallet';
2
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../src/modules/wallets/hardwareWallet/formatSignatureForHardwareWallet/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,gCAAgC,EAAE,MAAM,oCAAoC,CAAC"}
@@ -0,0 +1,5 @@
1
+ /**
2
+ * The vendor of a hardware wallet device.
3
+ */
4
+ export type HardwareWalletVendor = 'ledger';
5
+ //# sourceMappingURL=hardwareWallet.types.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"hardwareWallet.types.d.ts","sourceRoot":"","sources":["../../../../src/modules/wallets/hardwareWallet/hardwareWallet.types.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,MAAM,MAAM,oBAAoB,GAAG,QAAQ,CAAC"}
@@ -0,0 +1,2 @@
1
+ export { isHardwareWalletAccount } from './isHardwareWalletAccount';
2
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../src/modules/wallets/hardwareWallet/isHardwareWalletAccount/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,uBAAuB,EAAE,MAAM,2BAA2B,CAAC"}
@@ -0,0 +1,13 @@
1
+ import type { WalletAccount } from '../../walletAccount';
2
+ type IsHardwareWalletAccountParams = {
3
+ walletAccount: WalletAccount;
4
+ };
5
+ /**
6
+ * Checks whether a wallet account was connected via a hardware wallet.
7
+ *
8
+ * @param params.walletAccount - The wallet account to check.
9
+ * @returns Whether the wallet account has a hardware wallet vendor set.
10
+ */
11
+ export declare const isHardwareWalletAccount: ({ walletAccount, }: IsHardwareWalletAccountParams) => boolean;
12
+ export {};
13
+ //# sourceMappingURL=isHardwareWalletAccount.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"isHardwareWalletAccount.d.ts","sourceRoot":"","sources":["../../../../../src/modules/wallets/hardwareWallet/isHardwareWalletAccount/isHardwareWalletAccount.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,qBAAqB,CAAC;AAEzD,KAAK,6BAA6B,GAAG;IACnC,aAAa,EAAE,aAAa,CAAC;CAC9B,CAAC;AAEF;;;;;GAKG;AACH,eAAO,MAAM,uBAAuB,uBAEjC,6BAA6B,KAAG,OACe,CAAC"}
@@ -5,9 +5,10 @@ export declare const unverifiedWalletAccountSchema: z.ZodMiniObject<{
5
5
  addressesWithTypes: z.ZodMiniOptional<z.ZodMiniArray<z.ZodMiniObject<{
6
6
  address: z.ZodMiniString<string>;
7
7
  publicKey: z.ZodMiniOptional<z.ZodMiniString<string>>;
8
- type: z.ZodMiniCustom<"ordinals" | "payment" | "cosmos" | "evm" | "ton", "ordinals" | "payment" | "cosmos" | "evm" | "ton">;
8
+ type: z.ZodMiniCustom<"ordinals" | "payment" | "cosmos" | "evm" | "stellar" | "ton", "ordinals" | "payment" | "cosmos" | "evm" | "stellar" | "ton">;
9
9
  }, z.core.$strip>>>;
10
10
  chain: z.ZodMiniCustom<Chain, Chain>;
11
+ hardwareWalletVendor: z.ZodMiniOptional<z.ZodMiniCustom<"ledger", "ledger">>;
11
12
  id: z.ZodMiniString<string>;
12
13
  lastSelectedAt: z.ZodMiniNullable<z.ZodMiniDate<Date>>;
13
14
  walletProviderKey: z.ZodMiniString<string>;
@@ -1 +1 @@
1
- {"version":3,"file":"schema.d.ts","sourceRoot":"","sources":["../../../../src/modules/wallets/unverifiedWalletAccounts/schema.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,CAAC,MAAM,UAAU,CAAC;AAE9B,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,aAAa,CAAC;AAGzC,eAAO,MAAM,6BAA6B;;;;;;;;;;;iBAexC,CAAC"}
1
+ {"version":3,"file":"schema.d.ts","sourceRoot":"","sources":["../../../../src/modules/wallets/unverifiedWalletAccounts/schema.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,CAAC,MAAM,UAAU,CAAC;AAE9B,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,aAAa,CAAC;AAIzC,eAAO,MAAM,6BAA6B;;;;;;;;;;;;iBAkBxC,CAAC"}
@@ -1 +1 @@
1
- {"version":3,"file":"convertVerifiedCredentialToWalletAccount.d.ts","sourceRoot":"","sources":["../../../../../src/modules/wallets/utils/convertVerifiedCredentialToWalletAccount/convertVerifiedCredentialToWalletAccount.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,qBAAqB,EAAE,MAAM,4BAA4B,CAAC;AAExE,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,0BAA0B,CAAC;AAG9D,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,qBAAqB,CAAC;AAIzD,KAAK,8CAA8C,GAAG;IACpD,kBAAkB,EAAE,qBAAqB,CAAC;CAC3C,CAAC;AAEF,eAAO,MAAM,wCAAwC,2BAC3B,8CAA8C,UAC9D,aAAa,KACpB,aAkCF,CAAC"}
1
+ {"version":3,"file":"convertVerifiedCredentialToWalletAccount.d.ts","sourceRoot":"","sources":["../../../../../src/modules/wallets/utils/convertVerifiedCredentialToWalletAccount/convertVerifiedCredentialToWalletAccount.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,qBAAqB,EAAE,MAAM,4BAA4B,CAAC;AAExE,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,0BAA0B,CAAC;AAI9D,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,qBAAqB,CAAC;AAIzD,KAAK,8CAA8C,GAAG;IACpD,kBAAkB,EAAE,qBAAqB,CAAC;CAC3C,CAAC;AAEF,eAAO,MAAM,wCAAwC,2BAC3B,8CAA8C,UAC9D,aAAa,KACpB,aAqCF,CAAC"}
@@ -1,4 +1,4 @@
1
- import type { VerifyResponse, WalletProviderEnum } from '@dynamic-labs/sdk-api-core';
1
+ import type { TokenScope, VerifyResponse, WalletProviderEnum } from '@dynamic-labs/sdk-api-core';
2
2
  import type { DynamicClient } from '../../../client/types';
3
3
  import type { Chain } from '../../chain';
4
4
  import type { WalletAddressWithType } from '../walletAccount/walletAccount.types';
@@ -8,6 +8,7 @@ type VerifyMessageSignatureOwnershipParams = {
8
8
  isTransfer?: boolean;
9
9
  messageToSign: string;
10
10
  networkId?: string;
11
+ requestedScopes?: TokenScope[];
11
12
  signature: string;
12
13
  walletAddress: string;
13
14
  walletDisplayName: string;
@@ -19,6 +20,6 @@ type VerifyMessageSignatureOwnershipParams = {
19
20
  *
20
21
  * Does NOT call updateAuthFromVerifyResponse, it should be called from the return of this function.
21
22
  */
22
- export declare const verifyMessageSignatureOwnership: ({ messageToSign, walletAddress, addressesWithTypes, signature, chain, isTransfer, walletDisplayName, walletProviderType, networkId, }: VerifyMessageSignatureOwnershipParams, client: DynamicClient) => Promise<VerifyResponse>;
23
+ export declare const verifyMessageSignatureOwnership: ({ messageToSign, walletAddress, addressesWithTypes, signature, chain, isTransfer, walletDisplayName, walletProviderType, networkId, requestedScopes, }: VerifyMessageSignatureOwnershipParams, client: DynamicClient) => Promise<VerifyResponse>;
23
24
  export {};
24
25
  //# sourceMappingURL=verifyMessageSignatureOwnership.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"verifyMessageSignatureOwnership.d.ts","sourceRoot":"","sources":["../../../../src/modules/wallets/verifyMessageSignatureOwnership/verifyMessageSignatureOwnership.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAEV,cAAc,EAEd,kBAAkB,EACnB,MAAM,4BAA4B,CAAC;AAGpC,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAI3D,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,aAAa,CAAC;AAEzC,OAAO,KAAK,EAAE,qBAAqB,EAAE,MAAM,sCAAsC,CAAC;AAGlF,KAAK,qCAAqC,GAAG;IAC3C,kBAAkB,CAAC,EAAE,qBAAqB,EAAE,CAAC;IAC7C,KAAK,EAAE,KAAK,CAAC;IACb,UAAU,CAAC,EAAE,OAAO,CAAC;IACrB,aAAa,EAAE,MAAM,CAAC;IACtB,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,SAAS,EAAE,MAAM,CAAC;IAClB,aAAa,EAAE,MAAM,CAAC;IACtB,iBAAiB,EAAE,MAAM,CAAC;IAC1B,kBAAkB,EAAE,kBAAkB,CAAC;CACxC,CAAC;AAEF;;;;;GAKG;AACH,eAAO,MAAM,+BAA+B,0IAWvC,qCAAqC,UAChC,aAAa,KACpB,OAAO,CAAC,cAAc,CAoDxB,CAAC"}
1
+ {"version":3,"file":"verifyMessageSignatureOwnership.d.ts","sourceRoot":"","sources":["../../../../src/modules/wallets/verifyMessageSignatureOwnership/verifyMessageSignatureOwnership.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAEV,UAAU,EACV,cAAc,EAEd,kBAAkB,EACnB,MAAM,4BAA4B,CAAC;AAGpC,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAI3D,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,aAAa,CAAC;AAEzC,OAAO,KAAK,EAAE,qBAAqB,EAAE,MAAM,sCAAsC,CAAC;AAGlF,KAAK,qCAAqC,GAAG;IAC3C,kBAAkB,CAAC,EAAE,qBAAqB,EAAE,CAAC;IAC7C,KAAK,EAAE,KAAK,CAAC;IACb,UAAU,CAAC,EAAE,OAAO,CAAC;IACrB,aAAa,EAAE,MAAM,CAAC;IACtB,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,eAAe,CAAC,EAAE,UAAU,EAAE,CAAC;IAC/B,SAAS,EAAE,MAAM,CAAC;IAClB,aAAa,EAAE,MAAM,CAAC;IACtB,iBAAiB,EAAE,MAAM,CAAC;IAC1B,kBAAkB,EAAE,kBAAkB,CAAC;CACxC,CAAC;AAEF;;;;;GAKG;AACH,eAAO,MAAM,+BAA+B,2JAYvC,qCAAqC,UAChC,aAAa,KACpB,OAAO,CAAC,cAAc,CA8DxB,CAAC"}
@@ -1,5 +1,7 @@
1
+ import type { TokenScope } from '@dynamic-labs/sdk-api-core';
1
2
  import type { WalletAccount } from '../walletAccount';
2
3
  type VerifyWalletAccountParams = {
4
+ requestedScopes?: TokenScope[];
3
5
  walletAccount: WalletAccount;
4
6
  };
5
7
  /**
@@ -14,6 +16,6 @@ type VerifyWalletAccountParams = {
14
16
  * @throws WalletAccountAlreadyVerifiedError If the wallet is already verified.
15
17
  * @throws WalletAlreadyLinkedToAnotherUserError If the wallet is linked to another user.
16
18
  */
17
- export declare const verifyWalletAccount: ({ walletAccount }: VerifyWalletAccountParams, client?: import("../../../exports").DynamicClient) => Promise<WalletAccount>;
19
+ export declare const verifyWalletAccount: ({ walletAccount, requestedScopes }: VerifyWalletAccountParams, client?: import("../../../exports").DynamicClient) => Promise<WalletAccount>;
18
20
  export {};
19
21
  //# sourceMappingURL=verifyWalletAccount.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"verifyWalletAccount.d.ts","sourceRoot":"","sources":["../../../../src/modules/wallets/verifyWalletAccount/verifyWalletAccount.ts"],"names":[],"mappings":"AAEA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,kBAAkB,CAAC;AAEtD,KAAK,yBAAyB,GAAG;IAC/B,aAAa,EAAE,aAAa,CAAC;CAC9B,CAAC;AAEF;;;;;;;;;;;GAWG;AACH,eAAO,MAAM,mBAAmB,sBACX,yBAAyB,wDAE3C,OAAO,CAAC,aAAa,CAQvB,CAAC"}
1
+ {"version":3,"file":"verifyWalletAccount.d.ts","sourceRoot":"","sources":["../../../../src/modules/wallets/verifyWalletAccount/verifyWalletAccount.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,4BAA4B,CAAC;AAI7D,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,kBAAkB,CAAC;AAEtD,KAAK,yBAAyB,GAAG;IAC/B,eAAe,CAAC,EAAE,UAAU,EAAE,CAAC;IAC/B,aAAa,EAAE,aAAa,CAAC;CAC9B,CAAC;AAEF;;;;;;;;;;;GAWG;AACH,eAAO,MAAM,mBAAmB,uCACM,yBAAyB,wDAE5D,OAAO,CAAC,aAAa,CASvB,CAAC"}
@@ -1,9 +1,11 @@
1
+ import type { TokenScope } from '@dynamic-labs/sdk-api-core';
1
2
  import type { DynamicClient } from '../../../client/types';
2
3
  import type { WalletAccount } from '../walletAccount';
3
4
  type VerifyWalletAccountForSignInOrTransferParams = {
4
5
  isTransfer: boolean;
6
+ requestedScopes?: TokenScope[];
5
7
  walletAccount: WalletAccount;
6
8
  };
7
- export declare const verifyWalletAccountForSignInOrTransfer: ({ walletAccount, isTransfer }: VerifyWalletAccountForSignInOrTransferParams, client: DynamicClient) => Promise<WalletAccount>;
9
+ export declare const verifyWalletAccountForSignInOrTransfer: ({ walletAccount, isTransfer, requestedScopes, }: VerifyWalletAccountForSignInOrTransferParams, client: DynamicClient) => Promise<WalletAccount>;
8
10
  export {};
9
11
  //# sourceMappingURL=verifyWalletAccountForSignInOrTransfer.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"verifyWalletAccountForSignInOrTransfer.d.ts","sourceRoot":"","sources":["../../../../src/modules/wallets/verifyWalletAccountForSignInOrTransfer/verifyWalletAccountForSignInOrTransfer.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAS3D,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,kBAAkB,CAAC;AAItD,KAAK,4CAA4C,GAAG;IAClD,UAAU,EAAE,OAAO,CAAC;IACpB,aAAa,EAAE,aAAa,CAAC;CAC9B,CAAC;AAEF,eAAO,MAAM,sCAAsC,kCAClB,4CAA4C,UACnE,aAAa,KACpB,OAAO,CAAC,aAAa,CAmFvB,CAAC"}
1
+ {"version":3,"file":"verifyWalletAccountForSignInOrTransfer.d.ts","sourceRoot":"","sources":["../../../../src/modules/wallets/verifyWalletAccountForSignInOrTransfer/verifyWalletAccountForSignInOrTransfer.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,4BAA4B,CAAC;AAE7D,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAU3D,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,kBAAkB,CAAC;AAItD,KAAK,4CAA4C,GAAG;IAClD,UAAU,EAAE,OAAO,CAAC;IACpB,eAAe,CAAC,EAAE,UAAU,EAAE,CAAC;IAC/B,aAAa,EAAE,aAAa,CAAC;CAC9B,CAAC;AAEF,eAAO,MAAM,sCAAsC,oDAK9C,4CAA4C,UACvC,aAAa,KACpB,OAAO,CAAC,aAAa,CA2FvB,CAAC"}
@@ -1,5 +1,6 @@
1
1
  import type { WalletAddressType as ApiWalletAddressType } from '@dynamic-labs/sdk-api-core';
2
2
  import type { Chain } from '../../chain';
3
+ import type { HardwareWalletVendor } from '../hardwareWallet/hardwareWallet.types';
3
4
  declare global {
4
5
  interface WalletAccountMap {
5
6
  }
@@ -14,6 +15,7 @@ export type BaseWalletAccount<TChain extends Chain = Chain> = {
14
15
  address: string;
15
16
  addressesWithTypes?: WalletAddressWithType[];
16
17
  chain: TChain;
18
+ hardwareWalletVendor?: HardwareWalletVendor;
17
19
  id: string;
18
20
  lastSelectedAt: Date | null;
19
21
  verifiedCredentialId: string | null;
@@ -1 +1 @@
1
- {"version":3,"file":"walletAccount.types.d.ts","sourceRoot":"","sources":["../../../../src/modules/wallets/walletAccount/walletAccount.types.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,iBAAiB,IAAI,oBAAoB,EAAE,MAAM,4BAA4B,CAAC;AAE5F,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,aAAa,CAAC;AAEzC,OAAO,CAAC,MAAM,CAAC;IAEb,UAAU,gBAAgB;KAAG;CAC9B;AAED,MAAM,MAAM,iBAAiB,GAAG,GAAG,oBAAoB,EAAE,CAAC;AAE1D,MAAM,MAAM,qBAAqB,GAAG;IAClC,OAAO,EAAE,MAAM,CAAC;IAChB,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,IAAI,EAAE,iBAAiB,CAAC;CACzB,CAAC;AAEF,MAAM,MAAM,iBAAiB,CAAC,MAAM,SAAS,KAAK,GAAG,KAAK,IAAI;IAC5D,OAAO,EAAE,MAAM,CAAC;IAChB,kBAAkB,CAAC,EAAE,qBAAqB,EAAE,CAAC;IAC7C,KAAK,EAAE,MAAM,CAAC;IACd,EAAE,EAAE,MAAM,CAAC;IACX,cAAc,EAAE,IAAI,GAAG,IAAI,CAAC;IAC5B,oBAAoB,EAAE,MAAM,GAAG,IAAI,CAAC;IACpC,iBAAiB,EAAE,MAAM,CAAC;CAC3B,CAAC;AAEF,MAAM,MAAM,aAAa,GACvB,gBAAgB,CAAC,MAAM,gBAAgB,CAAC,SAAS,KAAK,GAClD,iBAAiB,CAAC,KAAK,CAAC,GACxB,gBAAgB,CAAC,MAAM,gBAAgB,CAAC,CAAC"}
1
+ {"version":3,"file":"walletAccount.types.d.ts","sourceRoot":"","sources":["../../../../src/modules/wallets/walletAccount/walletAccount.types.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,iBAAiB,IAAI,oBAAoB,EAAE,MAAM,4BAA4B,CAAC;AAE5F,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,aAAa,CAAC;AACzC,OAAO,KAAK,EAAE,oBAAoB,EAAE,MAAM,wCAAwC,CAAC;AAEnF,OAAO,CAAC,MAAM,CAAC;IAEb,UAAU,gBAAgB;KAAG;CAC9B;AAED,MAAM,MAAM,iBAAiB,GAAG,GAAG,oBAAoB,EAAE,CAAC;AAE1D,MAAM,MAAM,qBAAqB,GAAG;IAClC,OAAO,EAAE,MAAM,CAAC;IAChB,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,IAAI,EAAE,iBAAiB,CAAC;CACzB,CAAC;AAEF,MAAM,MAAM,iBAAiB,CAAC,MAAM,SAAS,KAAK,GAAG,KAAK,IAAI;IAC5D,OAAO,EAAE,MAAM,CAAC;IAChB,kBAAkB,CAAC,EAAE,qBAAqB,EAAE,CAAC;IAC7C,KAAK,EAAE,MAAM,CAAC;IACd,oBAAoB,CAAC,EAAE,oBAAoB,CAAC;IAC5C,EAAE,EAAE,MAAM,CAAC;IACX,cAAc,EAAE,IAAI,GAAG,IAAI,CAAC;IAC5B,oBAAoB,EAAE,MAAM,GAAG,IAAI,CAAC;IACpC,iBAAiB,EAAE,MAAM,CAAC;CAC3B,CAAC;AAEF,MAAM,MAAM,aAAa,GACvB,gBAAgB,CAAC,MAAM,gBAAgB,CAAC,SAAS,KAAK,GAClD,iBAAiB,CAAC,KAAK,CAAC,GACxB,gBAAgB,CAAC,MAAM,gBAAgB,CAAC,CAAC"}
@@ -1,6 +1,7 @@
1
1
  import type { WalletProviderEnum } from '@dynamic-labs/sdk-api-core';
2
2
  import type EventEmitter from 'eventemitter3';
3
3
  import type { Chain } from '../../chain';
4
+ import type { HardwareWalletVendor } from '../hardwareWallet/hardwareWallet.types';
4
5
  import type { NetworkData } from '../networks/networkProvider/networkProvider.types';
5
6
  import type { WalletAccount, WalletAddressType } from '../walletAccount';
6
7
  import type { WalletProviderEvents } from './events/walletProviderEvents.types';
@@ -13,6 +14,10 @@ export type WalletProviderMetadata = {
13
14
  * A URL to an icon that can be displayed to the user
14
15
  */
15
16
  icon: string;
17
+ /**
18
+ * The hardware wallet vendors supported by this wallet provider
19
+ */
20
+ supportedHardwareWalletVendors?: HardwareWalletVendor[];
16
21
  };
17
22
  /**
18
23
  *
@@ -1 +1 @@
1
- {"version":3,"file":"walletProvider.types.d.ts","sourceRoot":"","sources":["../../../../src/modules/wallets/walletProvider/walletProvider.types.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,kBAAkB,EAAE,MAAM,4BAA4B,CAAC;AACrE,OAAO,KAAK,YAAY,MAAM,eAAe,CAAC;AAE9C,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,aAAa,CAAC;AACzC,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,mDAAmD,CAAC;AACrF,OAAO,KAAK,EAAE,aAAa,EAAE,iBAAiB,EAAE,MAAM,kBAAkB,CAAC;AACzE,OAAO,KAAK,EAAE,oBAAoB,EAAE,MAAM,qCAAqC,CAAC;AAEhF,MAAM,MAAM,sBAAsB,GAAG;IACnC;;OAEG;IACH,WAAW,EAAE,MAAM,CAAC;IACpB;;OAEG;IACH,IAAI,EAAE,MAAM,CAAC;CACd,CAAC;AAEF;;;;GAIG;AACH,MAAM,MAAM,kBAAkB,GAAG;IAC/B;;OAEG;IACH,KAAK,EAAE,KAAK,CAAC;IACb;;OAEG;IACH,QAAQ,EAAE,MAAM,CAAC;IACjB;;OAEG;IACH,GAAG,EAAE,MAAM,CAAC;IACZ;;OAEG;IACH,QAAQ,EAAE,sBAAsB,CAAC;IACjC;;;OAGG;IACH,kBAAkB,EAAE,kBAAkB,CAAC;CACxC,CAAC;AAEF,MAAM,MAAM,4BAA4B,GAAG;IACzC,OAAO,EAAE,MAAM,CAAC;IAChB,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,IAAI,CAAC,EAAE,iBAAiB,CAAC;CAC1B,CAAC;AAEF,MAAM,MAAM,2BAA2B,GAAG;IACxC,SAAS,EAAE,4BAA4B,EAAE,CAAC;CAC3C,CAAC;AAEF,MAAM,MAAM,cAAc,GAAG,kBAAkB,GAAG;IAChD;;OAEG;IACH,UAAU,CAAC,EAAE,CAAC,IAAI,EAAE;QAAE,WAAW,EAAE,WAAW,CAAA;KAAE,KAAK,OAAO,CAAC,IAAI,CAAC,CAAC;IACnE;;;OAGG;IACH,OAAO,CAAC,EAAE,MAAM,OAAO,CAAC,2BAA2B,CAAC,CAAC;IACrD;;;OAGG;IACH,UAAU,CAAC,EAAE,MAAM,OAAO,CAAC,IAAI,CAAC,CAAC;IACjC;;;;;OAKG;IACH,uBAAuB,CAAC,EAAE,CAAC,IAAI,EAAE;QAC/B,aAAa,EAAE,aAAa,CAAC;KAC9B,KAAK,OAAO,CAAC,IAAI,CAAC,CAAC;IACpB;;OAEG;IACH,MAAM,CAAC,EAAE,YAAY,CAAC,oBAAoB,CAAC,GAAG;QAC5C;;WAEG;QACH,eAAe,EAAE,CAAC,MAAM,oBAAoB,CAAC,EAAE,CAAC;KACjD,CAAC;IACF;;OAEG;IACH,kBAAkB,EAAE,MAAM,OAAO,CAAC;QAAE,SAAS,EAAE,MAAM,CAAA;KAAE,CAAC,CAAC;IACzD;;OAEG;IACH,qBAAqB,EAAE,MAAM,OAAO,CAAC;QAAE,SAAS,EAAE,MAAM,EAAE,CAAA;KAAE,CAAC,CAAC;IAC9D;;;OAGG;IACH,WAAW,CAAC,EAAE,CAAC,IAAI,EAAE;QACnB,OAAO,EAAE,MAAM,CAAC;QAChB,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,KAAK,OAAO,CAAC;QAAE,SAAS,EAAE,MAAM,CAAA;KAAE,CAAC,CAAC;IACrC;;OAEG;IACH,mBAAmB,CAAC,EAAE,CAAC,KAAK,EAAE;QAAE,SAAS,EAAE,MAAM,CAAA;KAAE,KAAK,OAAO,CAAC,IAAI,CAAC,CAAC;IACtE;;;OAGG;IACH,SAAS,CAAC,EAAE,MAAM,OAAO,CAAC,IAAI,CAAC,CAAC;CACjC,CAAC"}
1
+ {"version":3,"file":"walletProvider.types.d.ts","sourceRoot":"","sources":["../../../../src/modules/wallets/walletProvider/walletProvider.types.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,kBAAkB,EAAE,MAAM,4BAA4B,CAAC;AACrE,OAAO,KAAK,YAAY,MAAM,eAAe,CAAC;AAE9C,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,aAAa,CAAC;AACzC,OAAO,KAAK,EAAE,oBAAoB,EAAE,MAAM,wCAAwC,CAAC;AACnF,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,mDAAmD,CAAC;AACrF,OAAO,KAAK,EAAE,aAAa,EAAE,iBAAiB,EAAE,MAAM,kBAAkB,CAAC;AACzE,OAAO,KAAK,EAAE,oBAAoB,EAAE,MAAM,qCAAqC,CAAC;AAEhF,MAAM,MAAM,sBAAsB,GAAG;IACnC;;OAEG;IACH,WAAW,EAAE,MAAM,CAAC;IACpB;;OAEG;IACH,IAAI,EAAE,MAAM,CAAC;IACb;;OAEG;IACH,8BAA8B,CAAC,EAAE,oBAAoB,EAAE,CAAC;CACzD,CAAC;AAEF;;;;GAIG;AACH,MAAM,MAAM,kBAAkB,GAAG;IAC/B;;OAEG;IACH,KAAK,EAAE,KAAK,CAAC;IACb;;OAEG;IACH,QAAQ,EAAE,MAAM,CAAC;IACjB;;OAEG;IACH,GAAG,EAAE,MAAM,CAAC;IACZ;;OAEG;IACH,QAAQ,EAAE,sBAAsB,CAAC;IACjC;;;OAGG;IACH,kBAAkB,EAAE,kBAAkB,CAAC;CACxC,CAAC;AAEF,MAAM,MAAM,4BAA4B,GAAG;IACzC,OAAO,EAAE,MAAM,CAAC;IAChB,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,IAAI,CAAC,EAAE,iBAAiB,CAAC;CAC1B,CAAC;AAEF,MAAM,MAAM,2BAA2B,GAAG;IACxC,SAAS,EAAE,4BAA4B,EAAE,CAAC;CAC3C,CAAC;AAEF,MAAM,MAAM,cAAc,GAAG,kBAAkB,GAAG;IAChD;;OAEG;IACH,UAAU,CAAC,EAAE,CAAC,IAAI,EAAE;QAAE,WAAW,EAAE,WAAW,CAAA;KAAE,KAAK,OAAO,CAAC,IAAI,CAAC,CAAC;IACnE;;;OAGG;IACH,OAAO,CAAC,EAAE,MAAM,OAAO,CAAC,2BAA2B,CAAC,CAAC;IACrD;;;OAGG;IACH,UAAU,CAAC,EAAE,MAAM,OAAO,CAAC,IAAI,CAAC,CAAC;IACjC;;;;;OAKG;IACH,uBAAuB,CAAC,EAAE,CAAC,IAAI,EAAE;QAC/B,aAAa,EAAE,aAAa,CAAC;KAC9B,KAAK,OAAO,CAAC,IAAI,CAAC,CAAC;IACpB;;OAEG;IACH,MAAM,CAAC,EAAE,YAAY,CAAC,oBAAoB,CAAC,GAAG;QAC5C;;WAEG;QACH,eAAe,EAAE,CAAC,MAAM,oBAAoB,CAAC,EAAE,CAAC;KACjD,CAAC;IACF;;OAEG;IACH,kBAAkB,EAAE,MAAM,OAAO,CAAC;QAAE,SAAS,EAAE,MAAM,CAAA;KAAE,CAAC,CAAC;IACzD;;OAEG;IACH,qBAAqB,EAAE,MAAM,OAAO,CAAC;QAAE,SAAS,EAAE,MAAM,EAAE,CAAA;KAAE,CAAC,CAAC;IAC9D;;;OAGG;IACH,WAAW,CAAC,EAAE,CAAC,IAAI,EAAE;QACnB,OAAO,EAAE,MAAM,CAAC;QAChB,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,KAAK,OAAO,CAAC;QAAE,SAAS,EAAE,MAAM,CAAA;KAAE,CAAC,CAAC;IACrC;;OAEG;IACH,mBAAmB,CAAC,EAAE,CAAC,KAAK,EAAE;QAAE,SAAS,EAAE,MAAM,CAAA;KAAE,KAAK,OAAO,CAAC,IAAI,CAAC,CAAC;IACtE;;;OAGG;IACH,SAAS,CAAC,EAAE,MAAM,OAAO,CAAC,IAAI,CAAC,CAAC;CACjC,CAAC"}