@dynamic-labs-wallet/node-svm 0.0.0-beta.329 → 0.0.0-beta.331
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/index.cjs.js +63 -14
- package/index.esm.js +63 -14
- package/package.json +9 -3
- package/src/client/client.d.ts.map +1 -1
- package/src/delegatedClient.d.ts.map +1 -1
- package/src/services/logger.d.ts +10 -0
- package/src/services/logger.d.ts.map +1 -0
package/index.cjs.js
CHANGED
|
@@ -2,6 +2,9 @@
|
|
|
2
2
|
|
|
3
3
|
var node = require('@dynamic-labs-wallet/node');
|
|
4
4
|
var web3_js = require('@solana/web3.js');
|
|
5
|
+
var logger$1 = require('@dynamic-labs/logger');
|
|
6
|
+
var axios = require('axios');
|
|
7
|
+
var core = require('@dynamic-labs-wallet/core');
|
|
5
8
|
|
|
6
9
|
function _extends() {
|
|
7
10
|
_extends = Object.assign || function assign(target) {
|
|
@@ -83,6 +86,17 @@ function decodeBase58(str) {
|
|
|
83
86
|
return out;
|
|
84
87
|
}
|
|
85
88
|
|
|
89
|
+
const logger = new logger$1.Logger('DynamicWaasWalletClient');
|
|
90
|
+
const logError = ({ message, error, context })=>{
|
|
91
|
+
if (error instanceof axios.AxiosError) {
|
|
92
|
+
core.handleAxiosError(error, message, context, logger);
|
|
93
|
+
}
|
|
94
|
+
logger.error('[DynamicWaasWalletClient] Error in node-svm client', {
|
|
95
|
+
error: error instanceof Error ? error.message : String(error),
|
|
96
|
+
context
|
|
97
|
+
});
|
|
98
|
+
};
|
|
99
|
+
|
|
86
100
|
// Helper: normalize bytes to hex without triggering Buffer.from(string, encoding) overload
|
|
87
101
|
const toHex = (bytes)=>(Buffer.isBuffer(bytes) ? bytes : Buffer.from(bytes)).toString('hex');
|
|
88
102
|
class DynamicSvmWalletClient extends node.DynamicWalletClient {
|
|
@@ -146,7 +160,11 @@ class DynamicSvmWalletClient extends node.DynamicWalletClient {
|
|
|
146
160
|
externalServerKeyShares
|
|
147
161
|
};
|
|
148
162
|
} catch (error) {
|
|
149
|
-
|
|
163
|
+
logError({
|
|
164
|
+
message: ERROR_CREATE_WALLET_ACCOUNT,
|
|
165
|
+
error: error,
|
|
166
|
+
context: {}
|
|
167
|
+
});
|
|
150
168
|
throw new Error(ERROR_CREATE_WALLET_ACCOUNT);
|
|
151
169
|
}
|
|
152
170
|
}
|
|
@@ -173,10 +191,15 @@ class DynamicSvmWalletClient extends node.DynamicWalletClient {
|
|
|
173
191
|
if (!accountAddress) {
|
|
174
192
|
throw new Error('Account address is required');
|
|
175
193
|
}
|
|
176
|
-
if (Array.isArray(externalServerKeyShares) && externalServerKeyShares.length === 0) {
|
|
177
|
-
throw new Error('External server key shares are required');
|
|
178
|
-
}
|
|
179
194
|
try {
|
|
195
|
+
// Attempt to recover key shares from backup if not provided
|
|
196
|
+
await this.ensureKeySharesRecovered({
|
|
197
|
+
accountAddress,
|
|
198
|
+
password,
|
|
199
|
+
walletOperation: node.WalletOperation.SIGN_MESSAGE,
|
|
200
|
+
externalServerKeyShares,
|
|
201
|
+
errorMessage: 'External server key shares are required to sign a message. No backup shares available for recovery.'
|
|
202
|
+
});
|
|
180
203
|
const messageBytes = typeof message === 'string' ? new TextEncoder().encode(message) : message;
|
|
181
204
|
const messageHex = toHex(messageBytes);
|
|
182
205
|
const signatureEd25519 = await this.sign({
|
|
@@ -188,7 +211,13 @@ class DynamicSvmWalletClient extends node.DynamicWalletClient {
|
|
|
188
211
|
});
|
|
189
212
|
return encodeBase58(signatureEd25519);
|
|
190
213
|
} catch (error) {
|
|
191
|
-
|
|
214
|
+
logError({
|
|
215
|
+
message: 'Error signing message:',
|
|
216
|
+
error: error,
|
|
217
|
+
context: {
|
|
218
|
+
accountAddress
|
|
219
|
+
}
|
|
220
|
+
});
|
|
192
221
|
throw error;
|
|
193
222
|
}
|
|
194
223
|
}
|
|
@@ -198,15 +227,20 @@ class DynamicSvmWalletClient extends node.DynamicWalletClient {
|
|
|
198
227
|
if (!senderAddress) {
|
|
199
228
|
throw new Error('Sender address is required');
|
|
200
229
|
}
|
|
201
|
-
if (Array.isArray(externalServerKeyShares) && externalServerKeyShares.length === 0) {
|
|
202
|
-
throw new Error('External server key shares are required');
|
|
203
|
-
}
|
|
204
230
|
await this.verifyPassword({
|
|
205
231
|
accountAddress: senderAddress,
|
|
206
232
|
password,
|
|
207
233
|
walletOperation: node.WalletOperation.SIGN_TRANSACTION
|
|
208
234
|
});
|
|
209
235
|
try {
|
|
236
|
+
// Attempt to recover key shares from backup if not provided
|
|
237
|
+
await this.ensureKeySharesRecovered({
|
|
238
|
+
accountAddress: senderAddress,
|
|
239
|
+
password,
|
|
240
|
+
walletOperation: node.WalletOperation.SIGN_TRANSACTION,
|
|
241
|
+
externalServerKeyShares,
|
|
242
|
+
errorMessage: 'External server key shares are required to sign transaction. No backup shares available for recovery.'
|
|
243
|
+
});
|
|
210
244
|
let messageToSign;
|
|
211
245
|
if (typeof transaction === 'string') {
|
|
212
246
|
messageToSign = transaction.startsWith('0x') ? transaction.slice(2) : transaction;
|
|
@@ -229,10 +263,13 @@ class DynamicSvmWalletClient extends node.DynamicWalletClient {
|
|
|
229
263
|
}
|
|
230
264
|
return encodeBase58(signatureEd25519);
|
|
231
265
|
} catch (error) {
|
|
232
|
-
|
|
233
|
-
|
|
234
|
-
|
|
235
|
-
|
|
266
|
+
logError({
|
|
267
|
+
message: 'Error in signTransaction:',
|
|
268
|
+
error: error,
|
|
269
|
+
context: {
|
|
270
|
+
senderAddress
|
|
271
|
+
}
|
|
272
|
+
});
|
|
236
273
|
throw error;
|
|
237
274
|
}
|
|
238
275
|
}
|
|
@@ -443,7 +480,13 @@ async function sendTransaction({ signedTransaction, rpcUrl = 'https://api.devnet
|
|
|
443
480
|
const base58Signature = encodeBase58(signatureEd25519);
|
|
444
481
|
return base58Signature;
|
|
445
482
|
} catch (error) {
|
|
446
|
-
|
|
483
|
+
logError({
|
|
484
|
+
message: 'Error in delegatedSignMessage',
|
|
485
|
+
error: error,
|
|
486
|
+
context: {
|
|
487
|
+
walletId
|
|
488
|
+
}
|
|
489
|
+
});
|
|
447
490
|
throw error;
|
|
448
491
|
}
|
|
449
492
|
};
|
|
@@ -495,7 +538,13 @@ async function sendTransaction({ signedTransaction, rpcUrl = 'https://api.devnet
|
|
|
495
538
|
});
|
|
496
539
|
return signedTransaction;
|
|
497
540
|
} catch (error) {
|
|
498
|
-
|
|
541
|
+
logError({
|
|
542
|
+
message: 'Error in delegatedSignTransaction',
|
|
543
|
+
error: error,
|
|
544
|
+
context: {
|
|
545
|
+
walletId
|
|
546
|
+
}
|
|
547
|
+
});
|
|
499
548
|
throw error;
|
|
500
549
|
}
|
|
501
550
|
};
|
package/index.esm.js
CHANGED
|
@@ -1,5 +1,8 @@
|
|
|
1
1
|
import { DynamicWalletClient, getMPCChainConfig, getExternalServerKeyShareBackupInfo, WalletOperation, SOLANA_RPC_URL, createDelegatedWalletClient, delegatedSignMessage as delegatedSignMessage$1, revokeDelegation as revokeDelegation$1 } from '@dynamic-labs-wallet/node';
|
|
2
2
|
import { PublicKey, VersionedTransaction, Keypair, Connection, Transaction, SystemProgram } from '@solana/web3.js';
|
|
3
|
+
import { Logger } from '@dynamic-labs/logger';
|
|
4
|
+
import { AxiosError } from 'axios';
|
|
5
|
+
import { handleAxiosError } from '@dynamic-labs-wallet/core';
|
|
3
6
|
|
|
4
7
|
function _extends() {
|
|
5
8
|
_extends = Object.assign || function assign(target) {
|
|
@@ -81,6 +84,17 @@ function decodeBase58(str) {
|
|
|
81
84
|
return out;
|
|
82
85
|
}
|
|
83
86
|
|
|
87
|
+
const logger = new Logger('DynamicWaasWalletClient');
|
|
88
|
+
const logError = ({ message, error, context })=>{
|
|
89
|
+
if (error instanceof AxiosError) {
|
|
90
|
+
handleAxiosError(error, message, context, logger);
|
|
91
|
+
}
|
|
92
|
+
logger.error('[DynamicWaasWalletClient] Error in node-svm client', {
|
|
93
|
+
error: error instanceof Error ? error.message : String(error),
|
|
94
|
+
context
|
|
95
|
+
});
|
|
96
|
+
};
|
|
97
|
+
|
|
84
98
|
// Helper: normalize bytes to hex without triggering Buffer.from(string, encoding) overload
|
|
85
99
|
const toHex = (bytes)=>(Buffer.isBuffer(bytes) ? bytes : Buffer.from(bytes)).toString('hex');
|
|
86
100
|
class DynamicSvmWalletClient extends DynamicWalletClient {
|
|
@@ -144,7 +158,11 @@ class DynamicSvmWalletClient extends DynamicWalletClient {
|
|
|
144
158
|
externalServerKeyShares
|
|
145
159
|
};
|
|
146
160
|
} catch (error) {
|
|
147
|
-
|
|
161
|
+
logError({
|
|
162
|
+
message: ERROR_CREATE_WALLET_ACCOUNT,
|
|
163
|
+
error: error,
|
|
164
|
+
context: {}
|
|
165
|
+
});
|
|
148
166
|
throw new Error(ERROR_CREATE_WALLET_ACCOUNT);
|
|
149
167
|
}
|
|
150
168
|
}
|
|
@@ -171,10 +189,15 @@ class DynamicSvmWalletClient extends DynamicWalletClient {
|
|
|
171
189
|
if (!accountAddress) {
|
|
172
190
|
throw new Error('Account address is required');
|
|
173
191
|
}
|
|
174
|
-
if (Array.isArray(externalServerKeyShares) && externalServerKeyShares.length === 0) {
|
|
175
|
-
throw new Error('External server key shares are required');
|
|
176
|
-
}
|
|
177
192
|
try {
|
|
193
|
+
// Attempt to recover key shares from backup if not provided
|
|
194
|
+
await this.ensureKeySharesRecovered({
|
|
195
|
+
accountAddress,
|
|
196
|
+
password,
|
|
197
|
+
walletOperation: WalletOperation.SIGN_MESSAGE,
|
|
198
|
+
externalServerKeyShares,
|
|
199
|
+
errorMessage: 'External server key shares are required to sign a message. No backup shares available for recovery.'
|
|
200
|
+
});
|
|
178
201
|
const messageBytes = typeof message === 'string' ? new TextEncoder().encode(message) : message;
|
|
179
202
|
const messageHex = toHex(messageBytes);
|
|
180
203
|
const signatureEd25519 = await this.sign({
|
|
@@ -186,7 +209,13 @@ class DynamicSvmWalletClient extends DynamicWalletClient {
|
|
|
186
209
|
});
|
|
187
210
|
return encodeBase58(signatureEd25519);
|
|
188
211
|
} catch (error) {
|
|
189
|
-
|
|
212
|
+
logError({
|
|
213
|
+
message: 'Error signing message:',
|
|
214
|
+
error: error,
|
|
215
|
+
context: {
|
|
216
|
+
accountAddress
|
|
217
|
+
}
|
|
218
|
+
});
|
|
190
219
|
throw error;
|
|
191
220
|
}
|
|
192
221
|
}
|
|
@@ -196,15 +225,20 @@ class DynamicSvmWalletClient extends DynamicWalletClient {
|
|
|
196
225
|
if (!senderAddress) {
|
|
197
226
|
throw new Error('Sender address is required');
|
|
198
227
|
}
|
|
199
|
-
if (Array.isArray(externalServerKeyShares) && externalServerKeyShares.length === 0) {
|
|
200
|
-
throw new Error('External server key shares are required');
|
|
201
|
-
}
|
|
202
228
|
await this.verifyPassword({
|
|
203
229
|
accountAddress: senderAddress,
|
|
204
230
|
password,
|
|
205
231
|
walletOperation: WalletOperation.SIGN_TRANSACTION
|
|
206
232
|
});
|
|
207
233
|
try {
|
|
234
|
+
// Attempt to recover key shares from backup if not provided
|
|
235
|
+
await this.ensureKeySharesRecovered({
|
|
236
|
+
accountAddress: senderAddress,
|
|
237
|
+
password,
|
|
238
|
+
walletOperation: WalletOperation.SIGN_TRANSACTION,
|
|
239
|
+
externalServerKeyShares,
|
|
240
|
+
errorMessage: 'External server key shares are required to sign transaction. No backup shares available for recovery.'
|
|
241
|
+
});
|
|
208
242
|
let messageToSign;
|
|
209
243
|
if (typeof transaction === 'string') {
|
|
210
244
|
messageToSign = transaction.startsWith('0x') ? transaction.slice(2) : transaction;
|
|
@@ -227,10 +261,13 @@ class DynamicSvmWalletClient extends DynamicWalletClient {
|
|
|
227
261
|
}
|
|
228
262
|
return encodeBase58(signatureEd25519);
|
|
229
263
|
} catch (error) {
|
|
230
|
-
|
|
231
|
-
|
|
232
|
-
|
|
233
|
-
|
|
264
|
+
logError({
|
|
265
|
+
message: 'Error in signTransaction:',
|
|
266
|
+
error: error,
|
|
267
|
+
context: {
|
|
268
|
+
senderAddress
|
|
269
|
+
}
|
|
270
|
+
});
|
|
234
271
|
throw error;
|
|
235
272
|
}
|
|
236
273
|
}
|
|
@@ -441,7 +478,13 @@ async function sendTransaction({ signedTransaction, rpcUrl = 'https://api.devnet
|
|
|
441
478
|
const base58Signature = encodeBase58(signatureEd25519);
|
|
442
479
|
return base58Signature;
|
|
443
480
|
} catch (error) {
|
|
444
|
-
|
|
481
|
+
logError({
|
|
482
|
+
message: 'Error in delegatedSignMessage',
|
|
483
|
+
error: error,
|
|
484
|
+
context: {
|
|
485
|
+
walletId
|
|
486
|
+
}
|
|
487
|
+
});
|
|
445
488
|
throw error;
|
|
446
489
|
}
|
|
447
490
|
};
|
|
@@ -493,7 +536,13 @@ async function sendTransaction({ signedTransaction, rpcUrl = 'https://api.devnet
|
|
|
493
536
|
});
|
|
494
537
|
return signedTransaction;
|
|
495
538
|
} catch (error) {
|
|
496
|
-
|
|
539
|
+
logError({
|
|
540
|
+
message: 'Error in delegatedSignTransaction',
|
|
541
|
+
error: error,
|
|
542
|
+
context: {
|
|
543
|
+
walletId
|
|
544
|
+
}
|
|
545
|
+
});
|
|
497
546
|
throw error;
|
|
498
547
|
}
|
|
499
548
|
};
|
package/package.json
CHANGED
|
@@ -1,11 +1,14 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@dynamic-labs-wallet/node-svm",
|
|
3
|
-
"version": "0.0.0-beta.
|
|
3
|
+
"version": "0.0.0-beta.331",
|
|
4
4
|
"license": "MIT",
|
|
5
5
|
"type": "module",
|
|
6
6
|
"dependencies": {
|
|
7
|
-
"@dynamic-labs-wallet/
|
|
8
|
-
"@
|
|
7
|
+
"@dynamic-labs-wallet/core": "0.0.0-beta.331",
|
|
8
|
+
"@dynamic-labs-wallet/node": "0.0.0-beta.331",
|
|
9
|
+
"@dynamic-labs/logger": "^4.25.3",
|
|
10
|
+
"@solana/web3.js": "^1.98.2",
|
|
11
|
+
"axios": "1.13.2"
|
|
9
12
|
},
|
|
10
13
|
"publishConfig": {
|
|
11
14
|
"access": "public"
|
|
@@ -28,5 +31,8 @@
|
|
|
28
31
|
"import": "./index.esm.js",
|
|
29
32
|
"require": "./index.cjs.js"
|
|
30
33
|
}
|
|
34
|
+
},
|
|
35
|
+
"devDependencies": {
|
|
36
|
+
"@types/http-errors": "^2.0.0"
|
|
31
37
|
}
|
|
32
38
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"client.d.ts","sourceRoot":"","sources":["../../src/client/client.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,cAAc,EACnB,mBAAmB,EACnB,KAAK,mBAAmB,EACxB,KAAK,wBAAwB,EAI7B,KAAK,wBAAwB,EAC9B,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAEL,KAAK,WAAW,EAChB,oBAAoB,EAErB,MAAM,iBAAiB,CAAC;
|
|
1
|
+
{"version":3,"file":"client.d.ts","sourceRoot":"","sources":["../../src/client/client.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,cAAc,EACnB,mBAAmB,EACnB,KAAK,mBAAmB,EACxB,KAAK,wBAAwB,EAI7B,KAAK,wBAAwB,EAC9B,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAEL,KAAK,WAAW,EAChB,oBAAoB,EAErB,MAAM,iBAAiB,CAAC;AASzB,qBAAa,sBAAuB,SAAQ,mBAAmB;IAC7D,QAAQ,CAAC,SAAS,SAAS;IAC3B,cAAc,CAAC,EAAE,MAAM,CAAC;gBAEZ,EACV,aAAa,EACb,UAAU,EACV,kBAAkB,EAClB,oBAAoB,GACrB,EAAE,wBAAwB;IAS3B;;;;;OAKG;IACG,mBAAmB,CAAC,EACxB,wBAAwB,EACxB,QAAoB,EACpB,OAAO,EACP,0BAAkC,GACnC,EAAE;QACD,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,0BAA0B,CAAC,EAAE,OAAO,CAAC;KACtC,GAAG,OAAO,CAAC;QACV,cAAc,EAAE,MAAM,CAAC;QACvB,YAAY,EAAE,UAAU,GAAG,MAAM,CAAC;QAClC,uBAAuB,EAAE,cAAc,EAAE,CAAC;KAC3C,CAAC;IAgFI,oBAAoB,CAAC,YAAY,EAAE,MAAM,GAAG,UAAU;;;IAc5D;;;;;;OAMG;IACG,WAAW,CAAC,EAChB,OAAO,EACP,cAAc,EACd,QAAoB,EACpB,uBAAuB,GACxB,EAAE;QACD,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;KAC5C;IA2CK,eAAe,CAAC,EACpB,aAAa,EACb,WAAW,EACX,QAAoB,EACpB,uBAAuB,GACxB,EAAE;QACD,aAAa,EAAE,MAAM,CAAC;QACtB,WAAW,EAAE,oBAAoB,GAAG,WAAW,GAAG,MAAM,CAAC;QACzD,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;KAC5C,GAAG,OAAO,CAAC,MAAM,CAAC;IAgEnB;;;;;;OAMG;IACG,gBAAgB,CAAC,EACrB,cAAc,EACd,QAAoB,EACpB,uBAAuB,GACxB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;KAC5C;IAcD;;;;;OAKG;IACG,uBAAuB,CAAC,EAC5B,SAAS,EACT,cAAc,GACf,EAAE;QACD,SAAS,EAAE,mBAAmB,EAAE,CAAC;QACjC,cAAc,CAAC,EAAE,MAAM,CAAC;KACzB;;;IASD;;;;;OAKG;IACH,yBAAyB,CAAC,UAAU,EAAE,MAAM;IAO5C,0BAA0B,CAAC,UAAU,EAAE,MAAM;IAM7C,eAAe,CAAC,SAAS,EAAE,UAAU,GAAG,MAAM;IAO9C;;;;;;;;OAQG;IACG,gBAAgB,CAAC,EACrB,UAAU,EACV,SAAS,EACT,wBAAwB,EACxB,QAAoB,EACpB,OAAO,EACP,0BAAkC,GACnC,EAAE;QACD,UAAU,EAAE,MAAM,CAAC;QACnB,SAAS,EAAE,MAAM,CAAC;QAClB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,0BAA0B,CAAC,EAAE,OAAO,CAAC;KACtC,GAAG,OAAO,CAAC;QACV,cAAc,EAAE,MAAM,CAAC;QACvB,YAAY,EAAE,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC9C,uBAAuB,EAAE,cAAc,EAAE,CAAC;KAC3C,CAAC;IAqEI,aAAa;CAOpB"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"delegatedClient.d.ts","sourceRoot":"","sources":["../../packages/src/delegatedClient.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EACV,qBAAqB,EACrB,cAAc,EACf,MAAM,2BAA2B,CAAC;AAMnC,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,iBAAiB,CAAC;AACnD,OAAO,EAAa,oBAAoB,EAAE,MAAM,iBAAiB,CAAC;
|
|
1
|
+
{"version":3,"file":"delegatedClient.d.ts","sourceRoot":"","sources":["../../packages/src/delegatedClient.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EACV,qBAAqB,EACrB,cAAc,EACf,MAAM,2BAA2B,CAAC;AAMnC,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,iBAAiB,CAAC;AACnD,OAAO,EAAa,oBAAoB,EAAE,MAAM,iBAAiB,CAAC;AAKlE,MAAM,MAAM,wBAAwB,GAAG;IACrC,aAAa,EAAE,MAAM,CAAC;IACtB,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,kBAAkB,CAAC,EAAE,MAAM,CAAC;IAC5B,MAAM,EAAE,MAAM,CAAC;IACf,KAAK,CAAC,EAAE,OAAO,CAAC;CACjB,CAAC;AAEF,MAAM,MAAM,wBAAwB,GAAG,qBAAqB,GAAG;IAC7D,QAAQ,CAAC,SAAS,EAAE,KAAK,CAAC;CAC3B,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,8BAA8B,sEAMxC,wBAAwB,KAAG,wBAe7B,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,oBAAoB,WACvB,wBAAwB,+DAO7B;IACD,QAAQ,EAAE,MAAM,CAAC;IACjB,YAAY,EAAE,MAAM,CAAC;IACrB,QAAQ,EAAE,cAAc,CAAC;IACzB,OAAO,EAAE,MAAM,CAAC;IAChB,WAAW,CAAC,EAAE,OAAO,CAAC;CACvB,KACA,OAAO,CAAC,MAAM,CAwBhB,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,wBAAwB,WAC3B,wBAAwB,sDAM7B;IACD,QAAQ,EAAE,MAAM,CAAC;IACjB,YAAY,EAAE,MAAM,CAAC;IACrB,QAAQ,EAAE,GAAG,CAAC;IACd,WAAW,EAAE,oBAAoB,GAAG,WAAW,CAAC;CACjD,KACA,OAAO,CAAC,oBAAoB,GAAG,WAAW,CA2D5C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,gBAAgB,WACnB,wBAAwB,UACxB,GAAG,kBAGZ,CAAC"}
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
import { Logger } from '@dynamic-labs/logger';
|
|
2
|
+
export declare const logger: Logger;
|
|
3
|
+
declare const logError: ({ message, error, context, }: {
|
|
4
|
+
message: string;
|
|
5
|
+
error: Error;
|
|
6
|
+
context: Record<string, unknown>;
|
|
7
|
+
}) => void;
|
|
8
|
+
export { Logger } from '@dynamic-labs/logger';
|
|
9
|
+
export { logError };
|
|
10
|
+
//# sourceMappingURL=logger.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"logger.d.ts","sourceRoot":"","sources":["../../src/services/logger.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,sBAAsB,CAAC;AAI9C,eAAO,MAAM,MAAM,QAAwC,CAAC;AAE5D,QAAA,MAAM,QAAQ,iCAIX;IACD,OAAO,EAAE,MAAM,CAAC;IAChB,KAAK,EAAE,KAAK,CAAC;IACb,OAAO,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;CAClC,KAAG,IAQH,CAAC;AAEF,OAAO,EAAE,MAAM,EAAE,MAAM,sBAAsB,CAAC;AAC9C,OAAO,EAAE,QAAQ,EAAE,CAAC"}
|