@dynamic-labs/sdk-api-core 0.0.697 → 0.0.698
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +1 -1
- package/src/apis/SDKApi.cjs +43 -79
- package/src/apis/SDKApi.d.ts +13 -24
- package/src/apis/SDKApi.js +44 -80
- package/src/index.cjs +4 -0
- package/src/index.js +1 -0
- package/src/models/GetPasskeyAuthenticationOptionsResponse.cjs +3 -3
- package/src/models/GetPasskeyAuthenticationOptionsResponse.d.ts +3 -3
- package/src/models/GetPasskeyAuthenticationOptionsResponse.js +3 -3
- package/src/models/PasskeyAllowCredential.cjs +36 -0
- package/src/models/PasskeyAllowCredential.d.ts +34 -0
- package/src/models/PasskeyAllowCredential.js +30 -0
- package/src/models/index.d.ts +1 -0
package/package.json
CHANGED
package/src/apis/SDKApi.cjs
CHANGED
|
@@ -79,13 +79,12 @@ var InitEmailAuthResponse = require('../models/InitEmailAuthResponse.cjs');
|
|
|
79
79
|
var InitPasskeyRecoveryRequest = require('../models/InitPasskeyRecoveryRequest.cjs');
|
|
80
80
|
var InitPasskeyRecoveryResponse = require('../models/InitPasskeyRecoveryResponse.cjs');
|
|
81
81
|
var JwksResponse = require('../models/JwksResponse.cjs');
|
|
82
|
-
var MFAAuthPasskeyDeviceGetResponse = require('../models/MFAAuthPasskeyDeviceGetResponse.cjs');
|
|
83
82
|
require('../models/PublicKeyCredentialType.cjs');
|
|
84
|
-
|
|
83
|
+
require('../models/MFADeviceType.cjs');
|
|
84
|
+
var PasskeyAuthRequest = require('../models/PasskeyAuthRequest.cjs');
|
|
85
85
|
var MFAAuthRecoveryDevicePostRequest = require('../models/MFAAuthRecoveryDevicePostRequest.cjs');
|
|
86
86
|
var MFAAuthTotpDevicePostRequest = require('../models/MFAAuthTotpDevicePostRequest.cjs');
|
|
87
87
|
var MFADevice = require('../models/MFADevice.cjs');
|
|
88
|
-
require('../models/MFADeviceType.cjs');
|
|
89
88
|
var MFAGetRecoveryCodesResponse = require('../models/MFAGetRecoveryCodesResponse.cjs');
|
|
90
89
|
var MFAListDevicesResponse = require('../models/MFAListDevicesResponse.cjs');
|
|
91
90
|
var MFARegenRecoveryCodesResponse = require('../models/MFARegenRecoveryCodesResponse.cjs');
|
|
@@ -108,9 +107,9 @@ require('../models/OauthResultStatus.cjs');
|
|
|
108
107
|
var OpenRoomResponse = require('../models/OpenRoomResponse.cjs');
|
|
109
108
|
var OpenRoomResponseForReshare = require('../models/OpenRoomResponseForReshare.cjs');
|
|
110
109
|
var OpenRoomResponseWithServerKeygenIds = require('../models/OpenRoomResponseWithServerKeygenIds.cjs');
|
|
110
|
+
require('../models/PasskeyTransport.cjs');
|
|
111
111
|
require('../models/PasskeyCredentialHint.cjs');
|
|
112
112
|
require('../models/PasskeyCredentialType.cjs');
|
|
113
|
-
require('../models/PasskeyTransport.cjs');
|
|
114
113
|
var PasskeyRegisterRequest = require('../models/PasskeyRegisterRequest.cjs');
|
|
115
114
|
var PrefetchRequest = require('../models/PrefetchRequest.cjs');
|
|
116
115
|
var ProjectSettings = require('../models/ProjectSettings.cjs');
|
|
@@ -169,81 +168,6 @@ require('../models/WaasChainEnum.cjs');
|
|
|
169
168
|
*
|
|
170
169
|
*/
|
|
171
170
|
class SDKApi extends runtime.BaseAPI {
|
|
172
|
-
/**
|
|
173
|
-
* Upgrade JWT scope with valid MFA session
|
|
174
|
-
*/
|
|
175
|
-
authMfaPasskeyDeviceRaw(requestParameters, initOverrides) {
|
|
176
|
-
return _tslib.__awaiter(this, void 0, void 0, function* () {
|
|
177
|
-
if (requestParameters.environmentId === null || requestParameters.environmentId === undefined) {
|
|
178
|
-
throw new runtime.RequiredError('environmentId', 'Required parameter requestParameters.environmentId was null or undefined when calling authMfaPasskeyDevice.');
|
|
179
|
-
}
|
|
180
|
-
if (requestParameters.mFAAuthPasskeyDevicePostRequest === null || requestParameters.mFAAuthPasskeyDevicePostRequest === undefined) {
|
|
181
|
-
throw new runtime.RequiredError('mFAAuthPasskeyDevicePostRequest', 'Required parameter requestParameters.mFAAuthPasskeyDevicePostRequest was null or undefined when calling authMfaPasskeyDevice.');
|
|
182
|
-
}
|
|
183
|
-
const queryParameters = {};
|
|
184
|
-
const headerParameters = {};
|
|
185
|
-
headerParameters['Content-Type'] = 'application/json';
|
|
186
|
-
if (this.configuration && this.configuration.accessToken) {
|
|
187
|
-
const token = this.configuration.accessToken;
|
|
188
|
-
const tokenString = yield token("bearerAuth", []);
|
|
189
|
-
if (tokenString) {
|
|
190
|
-
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
191
|
-
}
|
|
192
|
-
}
|
|
193
|
-
const response = yield this.request({
|
|
194
|
-
path: `/sdk/{environmentId}/users/mfa/auth/passkey`.replace(`{${"environmentId"}}`, encodeURIComponent(String(requestParameters.environmentId))),
|
|
195
|
-
method: 'POST',
|
|
196
|
-
headers: headerParameters,
|
|
197
|
-
query: queryParameters,
|
|
198
|
-
body: MFAAuthPasskeyDevicePostRequest.MFAAuthPasskeyDevicePostRequestToJSON(requestParameters.mFAAuthPasskeyDevicePostRequest),
|
|
199
|
-
}, initOverrides);
|
|
200
|
-
return new runtime.JSONApiResponse(response, (jsonValue) => VerifyResponse.VerifyResponseFromJSON(jsonValue));
|
|
201
|
-
});
|
|
202
|
-
}
|
|
203
|
-
/**
|
|
204
|
-
* Upgrade JWT scope with valid MFA session
|
|
205
|
-
*/
|
|
206
|
-
authMfaPasskeyDevice(requestParameters, initOverrides) {
|
|
207
|
-
return _tslib.__awaiter(this, void 0, void 0, function* () {
|
|
208
|
-
const response = yield this.authMfaPasskeyDeviceRaw(requestParameters, initOverrides);
|
|
209
|
-
return yield response.value();
|
|
210
|
-
});
|
|
211
|
-
}
|
|
212
|
-
/**
|
|
213
|
-
* Auth Passkey MFA device
|
|
214
|
-
*/
|
|
215
|
-
authMfaPasskeyDeviceChallengeRaw(requestParameters, initOverrides) {
|
|
216
|
-
return _tslib.__awaiter(this, void 0, void 0, function* () {
|
|
217
|
-
if (requestParameters.environmentId === null || requestParameters.environmentId === undefined) {
|
|
218
|
-
throw new runtime.RequiredError('environmentId', 'Required parameter requestParameters.environmentId was null or undefined when calling authMfaPasskeyDeviceChallenge.');
|
|
219
|
-
}
|
|
220
|
-
const queryParameters = {};
|
|
221
|
-
const headerParameters = {};
|
|
222
|
-
if (this.configuration && this.configuration.accessToken) {
|
|
223
|
-
const token = this.configuration.accessToken;
|
|
224
|
-
const tokenString = yield token("bearerAuth", []);
|
|
225
|
-
if (tokenString) {
|
|
226
|
-
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
227
|
-
}
|
|
228
|
-
}
|
|
229
|
-
const response = yield this.request({
|
|
230
|
-
path: `/sdk/{environmentId}/users/mfa/auth/passkey`.replace(`{${"environmentId"}}`, encodeURIComponent(String(requestParameters.environmentId))),
|
|
231
|
-
method: 'GET',
|
|
232
|
-
headers: headerParameters,
|
|
233
|
-
query: queryParameters,
|
|
234
|
-
}, initOverrides);
|
|
235
|
-
return new runtime.JSONApiResponse(response, (jsonValue) => MFAAuthPasskeyDeviceGetResponse.MFAAuthPasskeyDeviceGetResponseFromJSON(jsonValue));
|
|
236
|
-
});
|
|
237
|
-
}
|
|
238
|
-
/**
|
|
239
|
-
* Auth Passkey MFA device
|
|
240
|
-
*/
|
|
241
|
-
authMfaPasskeyDeviceChallenge(requestParameters, initOverrides) {
|
|
242
|
-
return _tslib.__awaiter(this, void 0, void 0, function* () {
|
|
243
|
-
const response = yield this.authMfaPasskeyDeviceChallengeRaw(requestParameters, initOverrides);
|
|
244
|
-
return yield response.value();
|
|
245
|
-
});
|
|
246
|
-
}
|
|
247
171
|
/**
|
|
248
172
|
* Options call for this endpoint
|
|
249
173
|
*/
|
|
@@ -405,6 +329,46 @@ class SDKApi extends runtime.BaseAPI {
|
|
|
405
329
|
yield this.authMfaTotpDeviceOptionsRaw(requestParameters, initOverrides);
|
|
406
330
|
});
|
|
407
331
|
}
|
|
332
|
+
/**
|
|
333
|
+
* Upgrade JWT scope with valid MFA session
|
|
334
|
+
*/
|
|
335
|
+
authenticateMfaPasskeyDeviceRaw(requestParameters, initOverrides) {
|
|
336
|
+
return _tslib.__awaiter(this, void 0, void 0, function* () {
|
|
337
|
+
if (requestParameters.environmentId === null || requestParameters.environmentId === undefined) {
|
|
338
|
+
throw new runtime.RequiredError('environmentId', 'Required parameter requestParameters.environmentId was null or undefined when calling authenticateMfaPasskeyDevice.');
|
|
339
|
+
}
|
|
340
|
+
if (requestParameters.passkeyAuthRequest === null || requestParameters.passkeyAuthRequest === undefined) {
|
|
341
|
+
throw new runtime.RequiredError('passkeyAuthRequest', 'Required parameter requestParameters.passkeyAuthRequest was null or undefined when calling authenticateMfaPasskeyDevice.');
|
|
342
|
+
}
|
|
343
|
+
const queryParameters = {};
|
|
344
|
+
const headerParameters = {};
|
|
345
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
346
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
347
|
+
const token = this.configuration.accessToken;
|
|
348
|
+
const tokenString = yield token("bearerAuth", []);
|
|
349
|
+
if (tokenString) {
|
|
350
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
351
|
+
}
|
|
352
|
+
}
|
|
353
|
+
const response = yield this.request({
|
|
354
|
+
path: `/sdk/{environmentId}/users/mfa/auth/passkey`.replace(`{${"environmentId"}}`, encodeURIComponent(String(requestParameters.environmentId))),
|
|
355
|
+
method: 'POST',
|
|
356
|
+
headers: headerParameters,
|
|
357
|
+
query: queryParameters,
|
|
358
|
+
body: PasskeyAuthRequest.PasskeyAuthRequestToJSON(requestParameters.passkeyAuthRequest),
|
|
359
|
+
}, initOverrides);
|
|
360
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => VerifyResponse.VerifyResponseFromJSON(jsonValue));
|
|
361
|
+
});
|
|
362
|
+
}
|
|
363
|
+
/**
|
|
364
|
+
* Upgrade JWT scope with valid MFA session
|
|
365
|
+
*/
|
|
366
|
+
authenticateMfaPasskeyDevice(requestParameters, initOverrides) {
|
|
367
|
+
return _tslib.__awaiter(this, void 0, void 0, function* () {
|
|
368
|
+
const response = yield this.authenticateMfaPasskeyDeviceRaw(requestParameters, initOverrides);
|
|
369
|
+
return yield response.value();
|
|
370
|
+
});
|
|
371
|
+
}
|
|
408
372
|
/**
|
|
409
373
|
* Backup multiple keyShares for a waaS wallet
|
|
410
374
|
*/
|
package/src/apis/SDKApi.d.ts
CHANGED
|
@@ -10,14 +10,7 @@
|
|
|
10
10
|
* Do not edit the class manually.
|
|
11
11
|
*/
|
|
12
12
|
import * as runtime from '../runtime';
|
|
13
|
-
import { Account, BackupKeySharesToLocationRequest, BackupKeySharesToLocationResponse, BackupMultipleClientKeySharesRequest, BackupMultipleClientKeySharesResponse, ChainEnum, CompletePasskeyRecoveryRequest, ConnectRequest, CreateEmbeddedWalletsRequest, CreateExchangeTransferRequest, CreateWaasAccountRequest, CreateWalletAccountRequest, Currency, DeleteEmbeddedWalletsRequest, EmailProviderResponse, EmailVerificationCreateRequest, EmailVerificationCreateResponse, EmailVerificationRetryRequest, EmailVerificationVerifyRequest, EmbeddedWalletAuthToken, EmbeddedWalletAuthType, EmbeddedWalletChainEnum, EmbeddedWalletPasscodeClaimRequest, EmbeddedWalletSecret, ExchangeKeyEnum, ExchangeTransaction, ExchangeTransferResponse, ExportEmbeddedWalletResponse, ExportWaasWalletPrivateKeyRequest, ExternalAuthSigninRequest, FarcasterSignInRequest, GetPasskeyAuthenticationOptionsResponse, GetPasskeyRegistrationOptionsResponse, GetUserPasskeysResponse, GlobalWalletSettings, HealthcheckResponse, ImportWaasPrivateKeyRequest, InitEmailAuthRequest, InitEmailAuthResponse, InitPasskeyRecoveryRequest, InitPasskeyRecoveryResponse, JwksResponse,
|
|
14
|
-
export interface AuthMfaPasskeyDeviceRequest {
|
|
15
|
-
environmentId: string;
|
|
16
|
-
mFAAuthPasskeyDevicePostRequest: MFAAuthPasskeyDevicePostRequest;
|
|
17
|
-
}
|
|
18
|
-
export interface AuthMfaPasskeyDeviceChallengeRequest {
|
|
19
|
-
environmentId: string;
|
|
20
|
-
}
|
|
13
|
+
import { Account, BackupKeySharesToLocationRequest, BackupKeySharesToLocationResponse, BackupMultipleClientKeySharesRequest, BackupMultipleClientKeySharesResponse, ChainEnum, CompletePasskeyRecoveryRequest, ConnectRequest, CreateEmbeddedWalletsRequest, CreateExchangeTransferRequest, CreateWaasAccountRequest, CreateWalletAccountRequest, Currency, DeleteEmbeddedWalletsRequest, EmailProviderResponse, EmailVerificationCreateRequest, EmailVerificationCreateResponse, EmailVerificationRetryRequest, EmailVerificationVerifyRequest, EmbeddedWalletAuthToken, EmbeddedWalletAuthType, EmbeddedWalletChainEnum, EmbeddedWalletPasscodeClaimRequest, EmbeddedWalletSecret, ExchangeKeyEnum, ExchangeTransaction, ExchangeTransferResponse, ExportEmbeddedWalletResponse, ExportWaasWalletPrivateKeyRequest, ExternalAuthSigninRequest, FarcasterSignInRequest, GetPasskeyAuthenticationOptionsResponse, GetPasskeyRegistrationOptionsResponse, GetUserPasskeysResponse, GlobalWalletSettings, HealthcheckResponse, ImportWaasPrivateKeyRequest, InitEmailAuthRequest, InitEmailAuthResponse, InitPasskeyRecoveryRequest, InitPasskeyRecoveryResponse, JwksResponse, MFAAuthRecoveryDevicePostRequest, MFAAuthTotpDevicePostRequest, MFADevice, MFAGetRecoveryCodesResponse, MFAListDevicesResponse, MFARegenRecoveryCodesResponse, MFARegisterPasskeyDeviceGetResponse, MFARegisterPasskeyDevicePostRequest, MFARegisterTotpDeviceGetResponse, MFARegisterTotpDevicePostRequest, MFAUpdateDeviceRequest, MergeUserConflictResolutions, NetworkConfigurationResponse, NonceResponse, OauthInitAuthRequest, OauthProviderLoginUrl, OauthRequest, OauthResultRequest, OauthResultResponse, OpenRoomResponse, OpenRoomResponseForReshare, OpenRoomResponseWithServerKeygenIds, PasskeyAuthRequest, PasskeyRegisterRequest, PrefetchRequest, ProjectSettings, ProviderEnum, PublishEvents, RecoverMultipleClientKeySharesRequest, RecoverMultipleClientKeySharesResponse, RegisterEmbeddedWalletSessionKeyResponse, RegisterSessionKeyRequest, ReshareRequest, ScanWebsiteUrlRequest, ScanWebsiteUrlResponse, SdkSettingsRequest, SdkUser, SignMessageWithWaasRequest, SimulateEVMTransactionRequest, SimulateSVMTransactionRequest, SimulateTransactionResponse, SimulateUserOpRequest, SmsVerificationCreateRequest, SmsVerificationCreateResponse, SmsVerificationRetryRequest, SmsVerificationVerifyRequest, SolanaTransactionOptimizationRequest, SolanaTransactionOptimizationResponse, SupportedOfframpsResponse, SupportedOnrampsResponse, TelegramPostRequest, TokenBalance, TurnkeyCreateWalletAccountsRequestBody, TurnkeyDeleteEmbeddedWalletsRequestBody, UpdateRecoveryEmailRequest, UpdateSelfResponse, UpdateUserPasskeyRequest, UpgradeEmbeddedWalletToV2Request, UserFields, UserFieldsCheckParams, UserFieldsCheckResponse, UserOauthAccessTokenResponse, UserPasskey, UserWalletSelectionRequest, VerifyRequest, VerifyResponse, VerifyUnlinkRequest } from '../models';
|
|
21
14
|
export interface AuthMfaPasskeyDeviceOptionsRequest {
|
|
22
15
|
environmentId: string;
|
|
23
16
|
}
|
|
@@ -35,6 +28,10 @@ export interface AuthMfaTotpDeviceRequest {
|
|
|
35
28
|
export interface AuthMfaTotpDeviceOptionsRequest {
|
|
36
29
|
environmentId: string;
|
|
37
30
|
}
|
|
31
|
+
export interface AuthenticateMfaPasskeyDeviceRequest {
|
|
32
|
+
environmentId: string;
|
|
33
|
+
passkeyAuthRequest: PasskeyAuthRequest;
|
|
34
|
+
}
|
|
38
35
|
export interface BackupKeySharesRequest {
|
|
39
36
|
environmentId: string;
|
|
40
37
|
walletId: string;
|
|
@@ -827,22 +824,6 @@ export interface WalletAccountRequestOptionsRequest {
|
|
|
827
824
|
*
|
|
828
825
|
*/
|
|
829
826
|
export declare class SDKApi extends runtime.BaseAPI {
|
|
830
|
-
/**
|
|
831
|
-
* Upgrade JWT scope with valid MFA session
|
|
832
|
-
*/
|
|
833
|
-
authMfaPasskeyDeviceRaw(requestParameters: AuthMfaPasskeyDeviceRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<VerifyResponse>>;
|
|
834
|
-
/**
|
|
835
|
-
* Upgrade JWT scope with valid MFA session
|
|
836
|
-
*/
|
|
837
|
-
authMfaPasskeyDevice(requestParameters: AuthMfaPasskeyDeviceRequest, initOverrides?: RequestInit): Promise<VerifyResponse>;
|
|
838
|
-
/**
|
|
839
|
-
* Auth Passkey MFA device
|
|
840
|
-
*/
|
|
841
|
-
authMfaPasskeyDeviceChallengeRaw(requestParameters: AuthMfaPasskeyDeviceChallengeRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<MFAAuthPasskeyDeviceGetResponse>>;
|
|
842
|
-
/**
|
|
843
|
-
* Auth Passkey MFA device
|
|
844
|
-
*/
|
|
845
|
-
authMfaPasskeyDeviceChallenge(requestParameters: AuthMfaPasskeyDeviceChallengeRequest, initOverrides?: RequestInit): Promise<MFAAuthPasskeyDeviceGetResponse>;
|
|
846
827
|
/**
|
|
847
828
|
* Options call for this endpoint
|
|
848
829
|
*/
|
|
@@ -883,6 +864,14 @@ export declare class SDKApi extends runtime.BaseAPI {
|
|
|
883
864
|
* Options call for this endpoint
|
|
884
865
|
*/
|
|
885
866
|
authMfaTotpDeviceOptions(requestParameters: AuthMfaTotpDeviceOptionsRequest, initOverrides?: RequestInit): Promise<void>;
|
|
867
|
+
/**
|
|
868
|
+
* Upgrade JWT scope with valid MFA session
|
|
869
|
+
*/
|
|
870
|
+
authenticateMfaPasskeyDeviceRaw(requestParameters: AuthenticateMfaPasskeyDeviceRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<VerifyResponse>>;
|
|
871
|
+
/**
|
|
872
|
+
* Upgrade JWT scope with valid MFA session
|
|
873
|
+
*/
|
|
874
|
+
authenticateMfaPasskeyDevice(requestParameters: AuthenticateMfaPasskeyDeviceRequest, initOverrides?: RequestInit): Promise<VerifyResponse>;
|
|
886
875
|
/**
|
|
887
876
|
* Backup multiple keyShares for a waaS wallet
|
|
888
877
|
*/
|
package/src/apis/SDKApi.js
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { __awaiter } from '../../_virtual/_tslib.js';
|
|
2
|
-
import { BaseAPI, RequiredError,
|
|
2
|
+
import { BaseAPI, RequiredError, VoidApiResponse, JSONApiResponse, TextApiResponse, canConsumeForm } from '../runtime.js';
|
|
3
3
|
import { AccountFromJSON } from '../models/Account.js';
|
|
4
4
|
import '../models/AttestationConveyancePreference.js';
|
|
5
5
|
import '../models/AuthModeEnum.js';
|
|
@@ -75,13 +75,12 @@ import { InitEmailAuthResponseFromJSON } from '../models/InitEmailAuthResponse.j
|
|
|
75
75
|
import { InitPasskeyRecoveryRequestToJSON } from '../models/InitPasskeyRecoveryRequest.js';
|
|
76
76
|
import { InitPasskeyRecoveryResponseFromJSON } from '../models/InitPasskeyRecoveryResponse.js';
|
|
77
77
|
import { JwksResponseFromJSON } from '../models/JwksResponse.js';
|
|
78
|
-
import { MFAAuthPasskeyDeviceGetResponseFromJSON } from '../models/MFAAuthPasskeyDeviceGetResponse.js';
|
|
79
78
|
import '../models/PublicKeyCredentialType.js';
|
|
80
|
-
import
|
|
79
|
+
import '../models/MFADeviceType.js';
|
|
80
|
+
import { PasskeyAuthRequestToJSON } from '../models/PasskeyAuthRequest.js';
|
|
81
81
|
import { MFAAuthRecoveryDevicePostRequestToJSON } from '../models/MFAAuthRecoveryDevicePostRequest.js';
|
|
82
82
|
import { MFAAuthTotpDevicePostRequestToJSON } from '../models/MFAAuthTotpDevicePostRequest.js';
|
|
83
83
|
import { MFADeviceFromJSON } from '../models/MFADevice.js';
|
|
84
|
-
import '../models/MFADeviceType.js';
|
|
85
84
|
import { MFAGetRecoveryCodesResponseFromJSON } from '../models/MFAGetRecoveryCodesResponse.js';
|
|
86
85
|
import { MFAListDevicesResponseFromJSON } from '../models/MFAListDevicesResponse.js';
|
|
87
86
|
import { MFARegenRecoveryCodesResponseFromJSON } from '../models/MFARegenRecoveryCodesResponse.js';
|
|
@@ -104,9 +103,9 @@ import '../models/OauthResultStatus.js';
|
|
|
104
103
|
import { OpenRoomResponseFromJSON } from '../models/OpenRoomResponse.js';
|
|
105
104
|
import { OpenRoomResponseForReshareFromJSON } from '../models/OpenRoomResponseForReshare.js';
|
|
106
105
|
import { OpenRoomResponseWithServerKeygenIdsFromJSON } from '../models/OpenRoomResponseWithServerKeygenIds.js';
|
|
106
|
+
import '../models/PasskeyTransport.js';
|
|
107
107
|
import '../models/PasskeyCredentialHint.js';
|
|
108
108
|
import '../models/PasskeyCredentialType.js';
|
|
109
|
-
import '../models/PasskeyTransport.js';
|
|
110
109
|
import { PasskeyRegisterRequestToJSON } from '../models/PasskeyRegisterRequest.js';
|
|
111
110
|
import { PrefetchRequestToJSON } from '../models/PrefetchRequest.js';
|
|
112
111
|
import { ProjectSettingsFromJSON } from '../models/ProjectSettings.js';
|
|
@@ -165,81 +164,6 @@ import '../models/WaasChainEnum.js';
|
|
|
165
164
|
*
|
|
166
165
|
*/
|
|
167
166
|
class SDKApi extends BaseAPI {
|
|
168
|
-
/**
|
|
169
|
-
* Upgrade JWT scope with valid MFA session
|
|
170
|
-
*/
|
|
171
|
-
authMfaPasskeyDeviceRaw(requestParameters, initOverrides) {
|
|
172
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
173
|
-
if (requestParameters.environmentId === null || requestParameters.environmentId === undefined) {
|
|
174
|
-
throw new RequiredError('environmentId', 'Required parameter requestParameters.environmentId was null or undefined when calling authMfaPasskeyDevice.');
|
|
175
|
-
}
|
|
176
|
-
if (requestParameters.mFAAuthPasskeyDevicePostRequest === null || requestParameters.mFAAuthPasskeyDevicePostRequest === undefined) {
|
|
177
|
-
throw new RequiredError('mFAAuthPasskeyDevicePostRequest', 'Required parameter requestParameters.mFAAuthPasskeyDevicePostRequest was null or undefined when calling authMfaPasskeyDevice.');
|
|
178
|
-
}
|
|
179
|
-
const queryParameters = {};
|
|
180
|
-
const headerParameters = {};
|
|
181
|
-
headerParameters['Content-Type'] = 'application/json';
|
|
182
|
-
if (this.configuration && this.configuration.accessToken) {
|
|
183
|
-
const token = this.configuration.accessToken;
|
|
184
|
-
const tokenString = yield token("bearerAuth", []);
|
|
185
|
-
if (tokenString) {
|
|
186
|
-
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
187
|
-
}
|
|
188
|
-
}
|
|
189
|
-
const response = yield this.request({
|
|
190
|
-
path: `/sdk/{environmentId}/users/mfa/auth/passkey`.replace(`{${"environmentId"}}`, encodeURIComponent(String(requestParameters.environmentId))),
|
|
191
|
-
method: 'POST',
|
|
192
|
-
headers: headerParameters,
|
|
193
|
-
query: queryParameters,
|
|
194
|
-
body: MFAAuthPasskeyDevicePostRequestToJSON(requestParameters.mFAAuthPasskeyDevicePostRequest),
|
|
195
|
-
}, initOverrides);
|
|
196
|
-
return new JSONApiResponse(response, (jsonValue) => VerifyResponseFromJSON(jsonValue));
|
|
197
|
-
});
|
|
198
|
-
}
|
|
199
|
-
/**
|
|
200
|
-
* Upgrade JWT scope with valid MFA session
|
|
201
|
-
*/
|
|
202
|
-
authMfaPasskeyDevice(requestParameters, initOverrides) {
|
|
203
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
204
|
-
const response = yield this.authMfaPasskeyDeviceRaw(requestParameters, initOverrides);
|
|
205
|
-
return yield response.value();
|
|
206
|
-
});
|
|
207
|
-
}
|
|
208
|
-
/**
|
|
209
|
-
* Auth Passkey MFA device
|
|
210
|
-
*/
|
|
211
|
-
authMfaPasskeyDeviceChallengeRaw(requestParameters, initOverrides) {
|
|
212
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
213
|
-
if (requestParameters.environmentId === null || requestParameters.environmentId === undefined) {
|
|
214
|
-
throw new RequiredError('environmentId', 'Required parameter requestParameters.environmentId was null or undefined when calling authMfaPasskeyDeviceChallenge.');
|
|
215
|
-
}
|
|
216
|
-
const queryParameters = {};
|
|
217
|
-
const headerParameters = {};
|
|
218
|
-
if (this.configuration && this.configuration.accessToken) {
|
|
219
|
-
const token = this.configuration.accessToken;
|
|
220
|
-
const tokenString = yield token("bearerAuth", []);
|
|
221
|
-
if (tokenString) {
|
|
222
|
-
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
223
|
-
}
|
|
224
|
-
}
|
|
225
|
-
const response = yield this.request({
|
|
226
|
-
path: `/sdk/{environmentId}/users/mfa/auth/passkey`.replace(`{${"environmentId"}}`, encodeURIComponent(String(requestParameters.environmentId))),
|
|
227
|
-
method: 'GET',
|
|
228
|
-
headers: headerParameters,
|
|
229
|
-
query: queryParameters,
|
|
230
|
-
}, initOverrides);
|
|
231
|
-
return new JSONApiResponse(response, (jsonValue) => MFAAuthPasskeyDeviceGetResponseFromJSON(jsonValue));
|
|
232
|
-
});
|
|
233
|
-
}
|
|
234
|
-
/**
|
|
235
|
-
* Auth Passkey MFA device
|
|
236
|
-
*/
|
|
237
|
-
authMfaPasskeyDeviceChallenge(requestParameters, initOverrides) {
|
|
238
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
239
|
-
const response = yield this.authMfaPasskeyDeviceChallengeRaw(requestParameters, initOverrides);
|
|
240
|
-
return yield response.value();
|
|
241
|
-
});
|
|
242
|
-
}
|
|
243
167
|
/**
|
|
244
168
|
* Options call for this endpoint
|
|
245
169
|
*/
|
|
@@ -401,6 +325,46 @@ class SDKApi extends BaseAPI {
|
|
|
401
325
|
yield this.authMfaTotpDeviceOptionsRaw(requestParameters, initOverrides);
|
|
402
326
|
});
|
|
403
327
|
}
|
|
328
|
+
/**
|
|
329
|
+
* Upgrade JWT scope with valid MFA session
|
|
330
|
+
*/
|
|
331
|
+
authenticateMfaPasskeyDeviceRaw(requestParameters, initOverrides) {
|
|
332
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
333
|
+
if (requestParameters.environmentId === null || requestParameters.environmentId === undefined) {
|
|
334
|
+
throw new RequiredError('environmentId', 'Required parameter requestParameters.environmentId was null or undefined when calling authenticateMfaPasskeyDevice.');
|
|
335
|
+
}
|
|
336
|
+
if (requestParameters.passkeyAuthRequest === null || requestParameters.passkeyAuthRequest === undefined) {
|
|
337
|
+
throw new RequiredError('passkeyAuthRequest', 'Required parameter requestParameters.passkeyAuthRequest was null or undefined when calling authenticateMfaPasskeyDevice.');
|
|
338
|
+
}
|
|
339
|
+
const queryParameters = {};
|
|
340
|
+
const headerParameters = {};
|
|
341
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
342
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
343
|
+
const token = this.configuration.accessToken;
|
|
344
|
+
const tokenString = yield token("bearerAuth", []);
|
|
345
|
+
if (tokenString) {
|
|
346
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
347
|
+
}
|
|
348
|
+
}
|
|
349
|
+
const response = yield this.request({
|
|
350
|
+
path: `/sdk/{environmentId}/users/mfa/auth/passkey`.replace(`{${"environmentId"}}`, encodeURIComponent(String(requestParameters.environmentId))),
|
|
351
|
+
method: 'POST',
|
|
352
|
+
headers: headerParameters,
|
|
353
|
+
query: queryParameters,
|
|
354
|
+
body: PasskeyAuthRequestToJSON(requestParameters.passkeyAuthRequest),
|
|
355
|
+
}, initOverrides);
|
|
356
|
+
return new JSONApiResponse(response, (jsonValue) => VerifyResponseFromJSON(jsonValue));
|
|
357
|
+
});
|
|
358
|
+
}
|
|
359
|
+
/**
|
|
360
|
+
* Upgrade JWT scope with valid MFA session
|
|
361
|
+
*/
|
|
362
|
+
authenticateMfaPasskeyDevice(requestParameters, initOverrides) {
|
|
363
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
364
|
+
const response = yield this.authenticateMfaPasskeyDeviceRaw(requestParameters, initOverrides);
|
|
365
|
+
return yield response.value();
|
|
366
|
+
});
|
|
367
|
+
}
|
|
404
368
|
/**
|
|
405
369
|
* Backup multiple keyShares for a waaS wallet
|
|
406
370
|
*/
|
package/src/index.cjs
CHANGED
|
@@ -168,6 +168,7 @@ var OnrampProviders = require('./models/OnrampProviders.cjs');
|
|
|
168
168
|
var OpenRoomResponse = require('./models/OpenRoomResponse.cjs');
|
|
169
169
|
var OpenRoomResponseForReshare = require('./models/OpenRoomResponseForReshare.cjs');
|
|
170
170
|
var OpenRoomResponseWithServerKeygenIds = require('./models/OpenRoomResponseWithServerKeygenIds.cjs');
|
|
171
|
+
var PasskeyAllowCredential = require('./models/PasskeyAllowCredential.cjs');
|
|
171
172
|
var PasskeyAuthRequest = require('./models/PasskeyAuthRequest.cjs');
|
|
172
173
|
var PasskeyCredentialHint = require('./models/PasskeyCredentialHint.cjs');
|
|
173
174
|
var PasskeyCredentialType = require('./models/PasskeyCredentialType.cjs');
|
|
@@ -928,6 +929,9 @@ exports.OpenRoomResponseForReshareToJSON = OpenRoomResponseForReshare.OpenRoomRe
|
|
|
928
929
|
exports.OpenRoomResponseWithServerKeygenIdsFromJSON = OpenRoomResponseWithServerKeygenIds.OpenRoomResponseWithServerKeygenIdsFromJSON;
|
|
929
930
|
exports.OpenRoomResponseWithServerKeygenIdsFromJSONTyped = OpenRoomResponseWithServerKeygenIds.OpenRoomResponseWithServerKeygenIdsFromJSONTyped;
|
|
930
931
|
exports.OpenRoomResponseWithServerKeygenIdsToJSON = OpenRoomResponseWithServerKeygenIds.OpenRoomResponseWithServerKeygenIdsToJSON;
|
|
932
|
+
exports.PasskeyAllowCredentialFromJSON = PasskeyAllowCredential.PasskeyAllowCredentialFromJSON;
|
|
933
|
+
exports.PasskeyAllowCredentialFromJSONTyped = PasskeyAllowCredential.PasskeyAllowCredentialFromJSONTyped;
|
|
934
|
+
exports.PasskeyAllowCredentialToJSON = PasskeyAllowCredential.PasskeyAllowCredentialToJSON;
|
|
931
935
|
exports.PasskeyAuthRequestFromJSON = PasskeyAuthRequest.PasskeyAuthRequestFromJSON;
|
|
932
936
|
exports.PasskeyAuthRequestFromJSONTyped = PasskeyAuthRequest.PasskeyAuthRequestFromJSONTyped;
|
|
933
937
|
exports.PasskeyAuthRequestToJSON = PasskeyAuthRequest.PasskeyAuthRequestToJSON;
|
package/src/index.js
CHANGED
|
@@ -164,6 +164,7 @@ export { OnrampProviders, OnrampProvidersFromJSON, OnrampProvidersFromJSONTyped,
|
|
|
164
164
|
export { OpenRoomResponseFromJSON, OpenRoomResponseFromJSONTyped, OpenRoomResponseToJSON } from './models/OpenRoomResponse.js';
|
|
165
165
|
export { OpenRoomResponseForReshareFromJSON, OpenRoomResponseForReshareFromJSONTyped, OpenRoomResponseForReshareToJSON } from './models/OpenRoomResponseForReshare.js';
|
|
166
166
|
export { OpenRoomResponseWithServerKeygenIdsFromJSON, OpenRoomResponseWithServerKeygenIdsFromJSONTyped, OpenRoomResponseWithServerKeygenIdsToJSON } from './models/OpenRoomResponseWithServerKeygenIds.js';
|
|
167
|
+
export { PasskeyAllowCredentialFromJSON, PasskeyAllowCredentialFromJSONTyped, PasskeyAllowCredentialToJSON } from './models/PasskeyAllowCredential.js';
|
|
167
168
|
export { PasskeyAuthRequestFromJSON, PasskeyAuthRequestFromJSONTyped, PasskeyAuthRequestToJSON } from './models/PasskeyAuthRequest.js';
|
|
168
169
|
export { PasskeyCredentialHint, PasskeyCredentialHintFromJSON, PasskeyCredentialHintFromJSONTyped, PasskeyCredentialHintToJSON } from './models/PasskeyCredentialHint.js';
|
|
169
170
|
export { PasskeyCredentialType, PasskeyCredentialTypeFromJSON, PasskeyCredentialTypeFromJSONTyped, PasskeyCredentialTypeToJSON } from './models/PasskeyCredentialType.js';
|
|
@@ -3,8 +3,8 @@
|
|
|
3
3
|
Object.defineProperty(exports, '__esModule', { value: true });
|
|
4
4
|
|
|
5
5
|
var runtime = require('../runtime.cjs');
|
|
6
|
+
var PasskeyAllowCredential = require('./PasskeyAllowCredential.cjs');
|
|
6
7
|
var PasskeyCredentialHint = require('./PasskeyCredentialHint.cjs');
|
|
7
|
-
var PasskeyExcludeCredential = require('./PasskeyExcludeCredential.cjs');
|
|
8
8
|
var PasskeyExtension = require('./PasskeyExtension.cjs');
|
|
9
9
|
var UserVerificationRequirement = require('./UserVerificationRequirement.cjs');
|
|
10
10
|
|
|
@@ -21,7 +21,7 @@ function GetPasskeyAuthenticationOptionsResponseFromJSONTyped(json, ignoreDiscri
|
|
|
21
21
|
'timeout': !runtime.exists(json, 'timeout') ? undefined : json['timeout'],
|
|
22
22
|
'rpId': !runtime.exists(json, 'rpId') ? undefined : json['rpId'],
|
|
23
23
|
'userVerification': !runtime.exists(json, 'userVerification') ? undefined : UserVerificationRequirement.UserVerificationRequirementFromJSON(json['userVerification']),
|
|
24
|
-
'allowCredentials': !runtime.exists(json, 'allowCredentials') ? undefined :
|
|
24
|
+
'allowCredentials': !runtime.exists(json, 'allowCredentials') ? undefined : (json['allowCredentials'].map(PasskeyAllowCredential.PasskeyAllowCredentialFromJSON)),
|
|
25
25
|
'extensions': !runtime.exists(json, 'extensions') ? undefined : PasskeyExtension.PasskeyExtensionFromJSON(json['extensions']),
|
|
26
26
|
'hints': !runtime.exists(json, 'hints') ? undefined : PasskeyCredentialHint.PasskeyCredentialHintFromJSON(json['hints']),
|
|
27
27
|
};
|
|
@@ -38,7 +38,7 @@ function GetPasskeyAuthenticationOptionsResponseToJSON(value) {
|
|
|
38
38
|
'timeout': value.timeout,
|
|
39
39
|
'rpId': value.rpId,
|
|
40
40
|
'userVerification': UserVerificationRequirement.UserVerificationRequirementToJSON(value.userVerification),
|
|
41
|
-
'allowCredentials':
|
|
41
|
+
'allowCredentials': value.allowCredentials === undefined ? undefined : (value.allowCredentials.map(PasskeyAllowCredential.PasskeyAllowCredentialToJSON)),
|
|
42
42
|
'extensions': PasskeyExtension.PasskeyExtensionToJSON(value.extensions),
|
|
43
43
|
'hints': PasskeyCredentialHint.PasskeyCredentialHintToJSON(value.hints),
|
|
44
44
|
};
|
|
@@ -9,8 +9,8 @@
|
|
|
9
9
|
* https://openapi-generator.tech
|
|
10
10
|
* Do not edit the class manually.
|
|
11
11
|
*/
|
|
12
|
+
import { PasskeyAllowCredential } from './PasskeyAllowCredential';
|
|
12
13
|
import { PasskeyCredentialHint } from './PasskeyCredentialHint';
|
|
13
|
-
import { PasskeyExcludeCredential } from './PasskeyExcludeCredential';
|
|
14
14
|
import { PasskeyExtension } from './PasskeyExtension';
|
|
15
15
|
import { UserVerificationRequirement } from './UserVerificationRequirement';
|
|
16
16
|
/**
|
|
@@ -45,10 +45,10 @@ export interface GetPasskeyAuthenticationOptionsResponse {
|
|
|
45
45
|
userVerification?: UserVerificationRequirement;
|
|
46
46
|
/**
|
|
47
47
|
*
|
|
48
|
-
* @type {
|
|
48
|
+
* @type {Array<PasskeyAllowCredential>}
|
|
49
49
|
* @memberof GetPasskeyAuthenticationOptionsResponse
|
|
50
50
|
*/
|
|
51
|
-
allowCredentials?:
|
|
51
|
+
allowCredentials?: Array<PasskeyAllowCredential>;
|
|
52
52
|
/**
|
|
53
53
|
*
|
|
54
54
|
* @type {PasskeyExtension}
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import { exists } from '../runtime.js';
|
|
2
|
+
import { PasskeyAllowCredentialFromJSON, PasskeyAllowCredentialToJSON } from './PasskeyAllowCredential.js';
|
|
2
3
|
import { PasskeyCredentialHintFromJSON, PasskeyCredentialHintToJSON } from './PasskeyCredentialHint.js';
|
|
3
|
-
import { PasskeyExcludeCredentialFromJSON, PasskeyExcludeCredentialToJSON } from './PasskeyExcludeCredential.js';
|
|
4
4
|
import { PasskeyExtensionFromJSON, PasskeyExtensionToJSON } from './PasskeyExtension.js';
|
|
5
5
|
import { UserVerificationRequirementFromJSON, UserVerificationRequirementToJSON } from './UserVerificationRequirement.js';
|
|
6
6
|
|
|
@@ -17,7 +17,7 @@ function GetPasskeyAuthenticationOptionsResponseFromJSONTyped(json, ignoreDiscri
|
|
|
17
17
|
'timeout': !exists(json, 'timeout') ? undefined : json['timeout'],
|
|
18
18
|
'rpId': !exists(json, 'rpId') ? undefined : json['rpId'],
|
|
19
19
|
'userVerification': !exists(json, 'userVerification') ? undefined : UserVerificationRequirementFromJSON(json['userVerification']),
|
|
20
|
-
'allowCredentials': !exists(json, 'allowCredentials') ? undefined :
|
|
20
|
+
'allowCredentials': !exists(json, 'allowCredentials') ? undefined : (json['allowCredentials'].map(PasskeyAllowCredentialFromJSON)),
|
|
21
21
|
'extensions': !exists(json, 'extensions') ? undefined : PasskeyExtensionFromJSON(json['extensions']),
|
|
22
22
|
'hints': !exists(json, 'hints') ? undefined : PasskeyCredentialHintFromJSON(json['hints']),
|
|
23
23
|
};
|
|
@@ -34,7 +34,7 @@ function GetPasskeyAuthenticationOptionsResponseToJSON(value) {
|
|
|
34
34
|
'timeout': value.timeout,
|
|
35
35
|
'rpId': value.rpId,
|
|
36
36
|
'userVerification': UserVerificationRequirementToJSON(value.userVerification),
|
|
37
|
-
'allowCredentials':
|
|
37
|
+
'allowCredentials': value.allowCredentials === undefined ? undefined : (value.allowCredentials.map(PasskeyAllowCredentialToJSON)),
|
|
38
38
|
'extensions': PasskeyExtensionToJSON(value.extensions),
|
|
39
39
|
'hints': PasskeyCredentialHintToJSON(value.hints),
|
|
40
40
|
};
|
|
@@ -0,0 +1,36 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
Object.defineProperty(exports, '__esModule', { value: true });
|
|
4
|
+
|
|
5
|
+
var runtime = require('../runtime.cjs');
|
|
6
|
+
var PasskeyTransport = require('./PasskeyTransport.cjs');
|
|
7
|
+
|
|
8
|
+
/* tslint:disable */
|
|
9
|
+
function PasskeyAllowCredentialFromJSON(json) {
|
|
10
|
+
return PasskeyAllowCredentialFromJSONTyped(json);
|
|
11
|
+
}
|
|
12
|
+
function PasskeyAllowCredentialFromJSONTyped(json, ignoreDiscriminator) {
|
|
13
|
+
if ((json === undefined) || (json === null)) {
|
|
14
|
+
return json;
|
|
15
|
+
}
|
|
16
|
+
return {
|
|
17
|
+
'id': json['id'],
|
|
18
|
+
'transports': !runtime.exists(json, 'transports') ? undefined : (json['transports'].map(PasskeyTransport.PasskeyTransportFromJSON)),
|
|
19
|
+
};
|
|
20
|
+
}
|
|
21
|
+
function PasskeyAllowCredentialToJSON(value) {
|
|
22
|
+
if (value === undefined) {
|
|
23
|
+
return undefined;
|
|
24
|
+
}
|
|
25
|
+
if (value === null) {
|
|
26
|
+
return null;
|
|
27
|
+
}
|
|
28
|
+
return {
|
|
29
|
+
'id': value.id,
|
|
30
|
+
'transports': value.transports === undefined ? undefined : (value.transports.map(PasskeyTransport.PasskeyTransportToJSON)),
|
|
31
|
+
};
|
|
32
|
+
}
|
|
33
|
+
|
|
34
|
+
exports.PasskeyAllowCredentialFromJSON = PasskeyAllowCredentialFromJSON;
|
|
35
|
+
exports.PasskeyAllowCredentialFromJSONTyped = PasskeyAllowCredentialFromJSONTyped;
|
|
36
|
+
exports.PasskeyAllowCredentialToJSON = PasskeyAllowCredentialToJSON;
|
|
@@ -0,0 +1,34 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Dashboard API
|
|
3
|
+
* Dashboard API documentation
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 1.0.0
|
|
6
|
+
*
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
import { PasskeyTransport } from './PasskeyTransport';
|
|
13
|
+
/**
|
|
14
|
+
*
|
|
15
|
+
* @export
|
|
16
|
+
* @interface PasskeyAllowCredential
|
|
17
|
+
*/
|
|
18
|
+
export interface PasskeyAllowCredential {
|
|
19
|
+
/**
|
|
20
|
+
* Base64URL encoded credential ID
|
|
21
|
+
* @type {string}
|
|
22
|
+
* @memberof PasskeyAllowCredential
|
|
23
|
+
*/
|
|
24
|
+
id: string;
|
|
25
|
+
/**
|
|
26
|
+
*
|
|
27
|
+
* @type {Array<PasskeyTransport>}
|
|
28
|
+
* @memberof PasskeyAllowCredential
|
|
29
|
+
*/
|
|
30
|
+
transports?: Array<PasskeyTransport>;
|
|
31
|
+
}
|
|
32
|
+
export declare function PasskeyAllowCredentialFromJSON(json: any): PasskeyAllowCredential;
|
|
33
|
+
export declare function PasskeyAllowCredentialFromJSONTyped(json: any, ignoreDiscriminator: boolean): PasskeyAllowCredential;
|
|
34
|
+
export declare function PasskeyAllowCredentialToJSON(value?: PasskeyAllowCredential | null): any;
|
|
@@ -0,0 +1,30 @@
|
|
|
1
|
+
import { exists } from '../runtime.js';
|
|
2
|
+
import { PasskeyTransportFromJSON, PasskeyTransportToJSON } from './PasskeyTransport.js';
|
|
3
|
+
|
|
4
|
+
/* tslint:disable */
|
|
5
|
+
function PasskeyAllowCredentialFromJSON(json) {
|
|
6
|
+
return PasskeyAllowCredentialFromJSONTyped(json);
|
|
7
|
+
}
|
|
8
|
+
function PasskeyAllowCredentialFromJSONTyped(json, ignoreDiscriminator) {
|
|
9
|
+
if ((json === undefined) || (json === null)) {
|
|
10
|
+
return json;
|
|
11
|
+
}
|
|
12
|
+
return {
|
|
13
|
+
'id': json['id'],
|
|
14
|
+
'transports': !exists(json, 'transports') ? undefined : (json['transports'].map(PasskeyTransportFromJSON)),
|
|
15
|
+
};
|
|
16
|
+
}
|
|
17
|
+
function PasskeyAllowCredentialToJSON(value) {
|
|
18
|
+
if (value === undefined) {
|
|
19
|
+
return undefined;
|
|
20
|
+
}
|
|
21
|
+
if (value === null) {
|
|
22
|
+
return null;
|
|
23
|
+
}
|
|
24
|
+
return {
|
|
25
|
+
'id': value.id,
|
|
26
|
+
'transports': value.transports === undefined ? undefined : (value.transports.map(PasskeyTransportToJSON)),
|
|
27
|
+
};
|
|
28
|
+
}
|
|
29
|
+
|
|
30
|
+
export { PasskeyAllowCredentialFromJSON, PasskeyAllowCredentialFromJSONTyped, PasskeyAllowCredentialToJSON };
|
package/src/models/index.d.ts
CHANGED
|
@@ -162,6 +162,7 @@ export * from './OnrampProviders';
|
|
|
162
162
|
export * from './OpenRoomResponse';
|
|
163
163
|
export * from './OpenRoomResponseForReshare';
|
|
164
164
|
export * from './OpenRoomResponseWithServerKeygenIds';
|
|
165
|
+
export * from './PasskeyAllowCredential';
|
|
165
166
|
export * from './PasskeyAuthRequest';
|
|
166
167
|
export * from './PasskeyCredentialHint';
|
|
167
168
|
export * from './PasskeyCredentialType';
|