@dynamic-labs/sdk-api-core 0.0.697 → 0.0.699

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@dynamic-labs/sdk-api-core",
3
- "version": "0.0.697",
3
+ "version": "0.0.699",
4
4
  "author": "Dynamic Labs",
5
5
  "license": "Apache-2.0",
6
6
  "publishConfig": {
@@ -79,13 +79,12 @@ var InitEmailAuthResponse = require('../models/InitEmailAuthResponse.cjs');
79
79
  var InitPasskeyRecoveryRequest = require('../models/InitPasskeyRecoveryRequest.cjs');
80
80
  var InitPasskeyRecoveryResponse = require('../models/InitPasskeyRecoveryResponse.cjs');
81
81
  var JwksResponse = require('../models/JwksResponse.cjs');
82
- var MFAAuthPasskeyDeviceGetResponse = require('../models/MFAAuthPasskeyDeviceGetResponse.cjs');
83
82
  require('../models/PublicKeyCredentialType.cjs');
84
- var MFAAuthPasskeyDevicePostRequest = require('../models/MFAAuthPasskeyDevicePostRequest.cjs');
83
+ require('../models/MFADeviceType.cjs');
84
+ var PasskeyAuthRequest = require('../models/PasskeyAuthRequest.cjs');
85
85
  var MFAAuthRecoveryDevicePostRequest = require('../models/MFAAuthRecoveryDevicePostRequest.cjs');
86
86
  var MFAAuthTotpDevicePostRequest = require('../models/MFAAuthTotpDevicePostRequest.cjs');
87
87
  var MFADevice = require('../models/MFADevice.cjs');
88
- require('../models/MFADeviceType.cjs');
89
88
  var MFAGetRecoveryCodesResponse = require('../models/MFAGetRecoveryCodesResponse.cjs');
90
89
  var MFAListDevicesResponse = require('../models/MFAListDevicesResponse.cjs');
91
90
  var MFARegenRecoveryCodesResponse = require('../models/MFARegenRecoveryCodesResponse.cjs');
@@ -108,9 +107,9 @@ require('../models/OauthResultStatus.cjs');
108
107
  var OpenRoomResponse = require('../models/OpenRoomResponse.cjs');
109
108
  var OpenRoomResponseForReshare = require('../models/OpenRoomResponseForReshare.cjs');
110
109
  var OpenRoomResponseWithServerKeygenIds = require('../models/OpenRoomResponseWithServerKeygenIds.cjs');
110
+ require('../models/PasskeyTransport.cjs');
111
111
  require('../models/PasskeyCredentialHint.cjs');
112
112
  require('../models/PasskeyCredentialType.cjs');
113
- require('../models/PasskeyTransport.cjs');
114
113
  var PasskeyRegisterRequest = require('../models/PasskeyRegisterRequest.cjs');
115
114
  var PrefetchRequest = require('../models/PrefetchRequest.cjs');
116
115
  var ProjectSettings = require('../models/ProjectSettings.cjs');
@@ -169,81 +168,6 @@ require('../models/WaasChainEnum.cjs');
169
168
  *
170
169
  */
171
170
  class SDKApi extends runtime.BaseAPI {
172
- /**
173
- * Upgrade JWT scope with valid MFA session
174
- */
175
- authMfaPasskeyDeviceRaw(requestParameters, initOverrides) {
176
- return _tslib.__awaiter(this, void 0, void 0, function* () {
177
- if (requestParameters.environmentId === null || requestParameters.environmentId === undefined) {
178
- throw new runtime.RequiredError('environmentId', 'Required parameter requestParameters.environmentId was null or undefined when calling authMfaPasskeyDevice.');
179
- }
180
- if (requestParameters.mFAAuthPasskeyDevicePostRequest === null || requestParameters.mFAAuthPasskeyDevicePostRequest === undefined) {
181
- throw new runtime.RequiredError('mFAAuthPasskeyDevicePostRequest', 'Required parameter requestParameters.mFAAuthPasskeyDevicePostRequest was null or undefined when calling authMfaPasskeyDevice.');
182
- }
183
- const queryParameters = {};
184
- const headerParameters = {};
185
- headerParameters['Content-Type'] = 'application/json';
186
- if (this.configuration && this.configuration.accessToken) {
187
- const token = this.configuration.accessToken;
188
- const tokenString = yield token("bearerAuth", []);
189
- if (tokenString) {
190
- headerParameters["Authorization"] = `Bearer ${tokenString}`;
191
- }
192
- }
193
- const response = yield this.request({
194
- path: `/sdk/{environmentId}/users/mfa/auth/passkey`.replace(`{${"environmentId"}}`, encodeURIComponent(String(requestParameters.environmentId))),
195
- method: 'POST',
196
- headers: headerParameters,
197
- query: queryParameters,
198
- body: MFAAuthPasskeyDevicePostRequest.MFAAuthPasskeyDevicePostRequestToJSON(requestParameters.mFAAuthPasskeyDevicePostRequest),
199
- }, initOverrides);
200
- return new runtime.JSONApiResponse(response, (jsonValue) => VerifyResponse.VerifyResponseFromJSON(jsonValue));
201
- });
202
- }
203
- /**
204
- * Upgrade JWT scope with valid MFA session
205
- */
206
- authMfaPasskeyDevice(requestParameters, initOverrides) {
207
- return _tslib.__awaiter(this, void 0, void 0, function* () {
208
- const response = yield this.authMfaPasskeyDeviceRaw(requestParameters, initOverrides);
209
- return yield response.value();
210
- });
211
- }
212
- /**
213
- * Auth Passkey MFA device
214
- */
215
- authMfaPasskeyDeviceChallengeRaw(requestParameters, initOverrides) {
216
- return _tslib.__awaiter(this, void 0, void 0, function* () {
217
- if (requestParameters.environmentId === null || requestParameters.environmentId === undefined) {
218
- throw new runtime.RequiredError('environmentId', 'Required parameter requestParameters.environmentId was null or undefined when calling authMfaPasskeyDeviceChallenge.');
219
- }
220
- const queryParameters = {};
221
- const headerParameters = {};
222
- if (this.configuration && this.configuration.accessToken) {
223
- const token = this.configuration.accessToken;
224
- const tokenString = yield token("bearerAuth", []);
225
- if (tokenString) {
226
- headerParameters["Authorization"] = `Bearer ${tokenString}`;
227
- }
228
- }
229
- const response = yield this.request({
230
- path: `/sdk/{environmentId}/users/mfa/auth/passkey`.replace(`{${"environmentId"}}`, encodeURIComponent(String(requestParameters.environmentId))),
231
- method: 'GET',
232
- headers: headerParameters,
233
- query: queryParameters,
234
- }, initOverrides);
235
- return new runtime.JSONApiResponse(response, (jsonValue) => MFAAuthPasskeyDeviceGetResponse.MFAAuthPasskeyDeviceGetResponseFromJSON(jsonValue));
236
- });
237
- }
238
- /**
239
- * Auth Passkey MFA device
240
- */
241
- authMfaPasskeyDeviceChallenge(requestParameters, initOverrides) {
242
- return _tslib.__awaiter(this, void 0, void 0, function* () {
243
- const response = yield this.authMfaPasskeyDeviceChallengeRaw(requestParameters, initOverrides);
244
- return yield response.value();
245
- });
246
- }
247
171
  /**
248
172
  * Options call for this endpoint
249
173
  */
@@ -405,6 +329,46 @@ class SDKApi extends runtime.BaseAPI {
405
329
  yield this.authMfaTotpDeviceOptionsRaw(requestParameters, initOverrides);
406
330
  });
407
331
  }
332
+ /**
333
+ * Upgrade JWT scope with valid MFA session
334
+ */
335
+ authenticateMfaPasskeyDeviceRaw(requestParameters, initOverrides) {
336
+ return _tslib.__awaiter(this, void 0, void 0, function* () {
337
+ if (requestParameters.environmentId === null || requestParameters.environmentId === undefined) {
338
+ throw new runtime.RequiredError('environmentId', 'Required parameter requestParameters.environmentId was null or undefined when calling authenticateMfaPasskeyDevice.');
339
+ }
340
+ if (requestParameters.passkeyAuthRequest === null || requestParameters.passkeyAuthRequest === undefined) {
341
+ throw new runtime.RequiredError('passkeyAuthRequest', 'Required parameter requestParameters.passkeyAuthRequest was null or undefined when calling authenticateMfaPasskeyDevice.');
342
+ }
343
+ const queryParameters = {};
344
+ const headerParameters = {};
345
+ headerParameters['Content-Type'] = 'application/json';
346
+ if (this.configuration && this.configuration.accessToken) {
347
+ const token = this.configuration.accessToken;
348
+ const tokenString = yield token("bearerAuth", []);
349
+ if (tokenString) {
350
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
351
+ }
352
+ }
353
+ const response = yield this.request({
354
+ path: `/sdk/{environmentId}/users/mfa/auth/passkey`.replace(`{${"environmentId"}}`, encodeURIComponent(String(requestParameters.environmentId))),
355
+ method: 'POST',
356
+ headers: headerParameters,
357
+ query: queryParameters,
358
+ body: PasskeyAuthRequest.PasskeyAuthRequestToJSON(requestParameters.passkeyAuthRequest),
359
+ }, initOverrides);
360
+ return new runtime.JSONApiResponse(response, (jsonValue) => VerifyResponse.VerifyResponseFromJSON(jsonValue));
361
+ });
362
+ }
363
+ /**
364
+ * Upgrade JWT scope with valid MFA session
365
+ */
366
+ authenticateMfaPasskeyDevice(requestParameters, initOverrides) {
367
+ return _tslib.__awaiter(this, void 0, void 0, function* () {
368
+ const response = yield this.authenticateMfaPasskeyDeviceRaw(requestParameters, initOverrides);
369
+ return yield response.value();
370
+ });
371
+ }
408
372
  /**
409
373
  * Backup multiple keyShares for a waaS wallet
410
374
  */
@@ -10,14 +10,7 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import * as runtime from '../runtime';
13
- import { Account, BackupKeySharesToLocationRequest, BackupKeySharesToLocationResponse, BackupMultipleClientKeySharesRequest, BackupMultipleClientKeySharesResponse, ChainEnum, CompletePasskeyRecoveryRequest, ConnectRequest, CreateEmbeddedWalletsRequest, CreateExchangeTransferRequest, CreateWaasAccountRequest, CreateWalletAccountRequest, Currency, DeleteEmbeddedWalletsRequest, EmailProviderResponse, EmailVerificationCreateRequest, EmailVerificationCreateResponse, EmailVerificationRetryRequest, EmailVerificationVerifyRequest, EmbeddedWalletAuthToken, EmbeddedWalletAuthType, EmbeddedWalletChainEnum, EmbeddedWalletPasscodeClaimRequest, EmbeddedWalletSecret, ExchangeKeyEnum, ExchangeTransaction, ExchangeTransferResponse, ExportEmbeddedWalletResponse, ExportWaasWalletPrivateKeyRequest, ExternalAuthSigninRequest, FarcasterSignInRequest, GetPasskeyAuthenticationOptionsResponse, GetPasskeyRegistrationOptionsResponse, GetUserPasskeysResponse, GlobalWalletSettings, HealthcheckResponse, ImportWaasPrivateKeyRequest, InitEmailAuthRequest, InitEmailAuthResponse, InitPasskeyRecoveryRequest, InitPasskeyRecoveryResponse, JwksResponse, MFAAuthPasskeyDeviceGetResponse, MFAAuthPasskeyDevicePostRequest, MFAAuthRecoveryDevicePostRequest, MFAAuthTotpDevicePostRequest, MFADevice, MFAGetRecoveryCodesResponse, MFAListDevicesResponse, MFARegenRecoveryCodesResponse, MFARegisterPasskeyDeviceGetResponse, MFARegisterPasskeyDevicePostRequest, MFARegisterTotpDeviceGetResponse, MFARegisterTotpDevicePostRequest, MFAUpdateDeviceRequest, MergeUserConflictResolutions, NetworkConfigurationResponse, NonceResponse, OauthInitAuthRequest, OauthProviderLoginUrl, OauthRequest, OauthResultRequest, OauthResultResponse, OpenRoomResponse, OpenRoomResponseForReshare, OpenRoomResponseWithServerKeygenIds, PasskeyRegisterRequest, PrefetchRequest, ProjectSettings, ProviderEnum, PublishEvents, RecoverMultipleClientKeySharesRequest, RecoverMultipleClientKeySharesResponse, RegisterEmbeddedWalletSessionKeyResponse, RegisterSessionKeyRequest, ReshareRequest, ScanWebsiteUrlRequest, ScanWebsiteUrlResponse, SdkSettingsRequest, SdkUser, SignMessageWithWaasRequest, SimulateEVMTransactionRequest, SimulateSVMTransactionRequest, SimulateTransactionResponse, SimulateUserOpRequest, SmsVerificationCreateRequest, SmsVerificationCreateResponse, SmsVerificationRetryRequest, SmsVerificationVerifyRequest, SolanaTransactionOptimizationRequest, SolanaTransactionOptimizationResponse, SupportedOfframpsResponse, SupportedOnrampsResponse, TelegramPostRequest, TokenBalance, TurnkeyCreateWalletAccountsRequestBody, TurnkeyDeleteEmbeddedWalletsRequestBody, UpdateRecoveryEmailRequest, UpdateSelfResponse, UpdateUserPasskeyRequest, UpgradeEmbeddedWalletToV2Request, UserFields, UserFieldsCheckParams, UserFieldsCheckResponse, UserOauthAccessTokenResponse, UserPasskey, UserWalletSelectionRequest, VerifyRequest, VerifyResponse, VerifyUnlinkRequest } from '../models';
14
- export interface AuthMfaPasskeyDeviceRequest {
15
- environmentId: string;
16
- mFAAuthPasskeyDevicePostRequest: MFAAuthPasskeyDevicePostRequest;
17
- }
18
- export interface AuthMfaPasskeyDeviceChallengeRequest {
19
- environmentId: string;
20
- }
13
+ import { Account, BackupKeySharesToLocationRequest, BackupKeySharesToLocationResponse, BackupMultipleClientKeySharesRequest, BackupMultipleClientKeySharesResponse, ChainEnum, CompletePasskeyRecoveryRequest, ConnectRequest, CreateEmbeddedWalletsRequest, CreateExchangeTransferRequest, CreateWaasAccountRequest, CreateWalletAccountRequest, Currency, DeleteEmbeddedWalletsRequest, EmailProviderResponse, EmailVerificationCreateRequest, EmailVerificationCreateResponse, EmailVerificationRetryRequest, EmailVerificationVerifyRequest, EmbeddedWalletAuthToken, EmbeddedWalletAuthType, EmbeddedWalletChainEnum, EmbeddedWalletPasscodeClaimRequest, EmbeddedWalletSecret, ExchangeKeyEnum, ExchangeTransaction, ExchangeTransferResponse, ExportEmbeddedWalletResponse, ExportWaasWalletPrivateKeyRequest, ExternalAuthSigninRequest, FarcasterSignInRequest, GetPasskeyAuthenticationOptionsResponse, GetPasskeyRegistrationOptionsResponse, GetUserPasskeysResponse, GlobalWalletSettings, HealthcheckResponse, ImportWaasPrivateKeyRequest, InitEmailAuthRequest, InitEmailAuthResponse, InitPasskeyRecoveryRequest, InitPasskeyRecoveryResponse, JwksResponse, MFAAuthRecoveryDevicePostRequest, MFAAuthTotpDevicePostRequest, MFADevice, MFAGetRecoveryCodesResponse, MFAListDevicesResponse, MFARegenRecoveryCodesResponse, MFARegisterPasskeyDeviceGetResponse, MFARegisterPasskeyDevicePostRequest, MFARegisterTotpDeviceGetResponse, MFARegisterTotpDevicePostRequest, MFAUpdateDeviceRequest, MergeUserConflictResolutions, NetworkConfigurationResponse, NonceResponse, OauthInitAuthRequest, OauthProviderLoginUrl, OauthRequest, OauthResultRequest, OauthResultResponse, OpenRoomResponse, OpenRoomResponseForReshare, OpenRoomResponseWithServerKeygenIds, PasskeyAuthRequest, PasskeyRegisterRequest, PrefetchRequest, ProjectSettings, ProviderEnum, PublishEvents, RecoverMultipleClientKeySharesRequest, RecoverMultipleClientKeySharesResponse, RegisterEmbeddedWalletSessionKeyResponse, RegisterSessionKeyRequest, ReshareRequest, ScanWebsiteUrlRequest, ScanWebsiteUrlResponse, SdkSettingsRequest, SdkUser, SignMessageWithWaasRequest, SimulateEVMTransactionRequest, SimulateSVMTransactionRequest, SimulateTransactionResponse, SimulateUserOpRequest, SmsVerificationCreateRequest, SmsVerificationCreateResponse, SmsVerificationRetryRequest, SmsVerificationVerifyRequest, SolanaTransactionOptimizationRequest, SolanaTransactionOptimizationResponse, SupportedOfframpsResponse, SupportedOnrampsResponse, TelegramPostRequest, TokenBalance, TurnkeyCreateWalletAccountsRequestBody, TurnkeyDeleteEmbeddedWalletsRequestBody, UpdateRecoveryEmailRequest, UpdateSelfResponse, UpdateUserPasskeyRequest, UpgradeEmbeddedWalletToV2Request, UserFields, UserFieldsCheckParams, UserFieldsCheckResponse, UserOauthAccessTokenResponse, UserPasskey, UserWalletSelectionRequest, VerifyRequest, VerifyResponse, VerifyUnlinkRequest } from '../models';
21
14
  export interface AuthMfaPasskeyDeviceOptionsRequest {
22
15
  environmentId: string;
23
16
  }
@@ -35,6 +28,10 @@ export interface AuthMfaTotpDeviceRequest {
35
28
  export interface AuthMfaTotpDeviceOptionsRequest {
36
29
  environmentId: string;
37
30
  }
31
+ export interface AuthenticateMfaPasskeyDeviceRequest {
32
+ environmentId: string;
33
+ passkeyAuthRequest: PasskeyAuthRequest;
34
+ }
38
35
  export interface BackupKeySharesRequest {
39
36
  environmentId: string;
40
37
  walletId: string;
@@ -827,22 +824,6 @@ export interface WalletAccountRequestOptionsRequest {
827
824
  *
828
825
  */
829
826
  export declare class SDKApi extends runtime.BaseAPI {
830
- /**
831
- * Upgrade JWT scope with valid MFA session
832
- */
833
- authMfaPasskeyDeviceRaw(requestParameters: AuthMfaPasskeyDeviceRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<VerifyResponse>>;
834
- /**
835
- * Upgrade JWT scope with valid MFA session
836
- */
837
- authMfaPasskeyDevice(requestParameters: AuthMfaPasskeyDeviceRequest, initOverrides?: RequestInit): Promise<VerifyResponse>;
838
- /**
839
- * Auth Passkey MFA device
840
- */
841
- authMfaPasskeyDeviceChallengeRaw(requestParameters: AuthMfaPasskeyDeviceChallengeRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<MFAAuthPasskeyDeviceGetResponse>>;
842
- /**
843
- * Auth Passkey MFA device
844
- */
845
- authMfaPasskeyDeviceChallenge(requestParameters: AuthMfaPasskeyDeviceChallengeRequest, initOverrides?: RequestInit): Promise<MFAAuthPasskeyDeviceGetResponse>;
846
827
  /**
847
828
  * Options call for this endpoint
848
829
  */
@@ -883,6 +864,14 @@ export declare class SDKApi extends runtime.BaseAPI {
883
864
  * Options call for this endpoint
884
865
  */
885
866
  authMfaTotpDeviceOptions(requestParameters: AuthMfaTotpDeviceOptionsRequest, initOverrides?: RequestInit): Promise<void>;
867
+ /**
868
+ * Upgrade JWT scope with valid MFA session
869
+ */
870
+ authenticateMfaPasskeyDeviceRaw(requestParameters: AuthenticateMfaPasskeyDeviceRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<VerifyResponse>>;
871
+ /**
872
+ * Upgrade JWT scope with valid MFA session
873
+ */
874
+ authenticateMfaPasskeyDevice(requestParameters: AuthenticateMfaPasskeyDeviceRequest, initOverrides?: RequestInit): Promise<VerifyResponse>;
886
875
  /**
887
876
  * Backup multiple keyShares for a waaS wallet
888
877
  */
@@ -1,5 +1,5 @@
1
1
  import { __awaiter } from '../../_virtual/_tslib.js';
2
- import { BaseAPI, RequiredError, JSONApiResponse, VoidApiResponse, TextApiResponse, canConsumeForm } from '../runtime.js';
2
+ import { BaseAPI, RequiredError, VoidApiResponse, JSONApiResponse, TextApiResponse, canConsumeForm } from '../runtime.js';
3
3
  import { AccountFromJSON } from '../models/Account.js';
4
4
  import '../models/AttestationConveyancePreference.js';
5
5
  import '../models/AuthModeEnum.js';
@@ -75,13 +75,12 @@ import { InitEmailAuthResponseFromJSON } from '../models/InitEmailAuthResponse.j
75
75
  import { InitPasskeyRecoveryRequestToJSON } from '../models/InitPasskeyRecoveryRequest.js';
76
76
  import { InitPasskeyRecoveryResponseFromJSON } from '../models/InitPasskeyRecoveryResponse.js';
77
77
  import { JwksResponseFromJSON } from '../models/JwksResponse.js';
78
- import { MFAAuthPasskeyDeviceGetResponseFromJSON } from '../models/MFAAuthPasskeyDeviceGetResponse.js';
79
78
  import '../models/PublicKeyCredentialType.js';
80
- import { MFAAuthPasskeyDevicePostRequestToJSON } from '../models/MFAAuthPasskeyDevicePostRequest.js';
79
+ import '../models/MFADeviceType.js';
80
+ import { PasskeyAuthRequestToJSON } from '../models/PasskeyAuthRequest.js';
81
81
  import { MFAAuthRecoveryDevicePostRequestToJSON } from '../models/MFAAuthRecoveryDevicePostRequest.js';
82
82
  import { MFAAuthTotpDevicePostRequestToJSON } from '../models/MFAAuthTotpDevicePostRequest.js';
83
83
  import { MFADeviceFromJSON } from '../models/MFADevice.js';
84
- import '../models/MFADeviceType.js';
85
84
  import { MFAGetRecoveryCodesResponseFromJSON } from '../models/MFAGetRecoveryCodesResponse.js';
86
85
  import { MFAListDevicesResponseFromJSON } from '../models/MFAListDevicesResponse.js';
87
86
  import { MFARegenRecoveryCodesResponseFromJSON } from '../models/MFARegenRecoveryCodesResponse.js';
@@ -104,9 +103,9 @@ import '../models/OauthResultStatus.js';
104
103
  import { OpenRoomResponseFromJSON } from '../models/OpenRoomResponse.js';
105
104
  import { OpenRoomResponseForReshareFromJSON } from '../models/OpenRoomResponseForReshare.js';
106
105
  import { OpenRoomResponseWithServerKeygenIdsFromJSON } from '../models/OpenRoomResponseWithServerKeygenIds.js';
106
+ import '../models/PasskeyTransport.js';
107
107
  import '../models/PasskeyCredentialHint.js';
108
108
  import '../models/PasskeyCredentialType.js';
109
- import '../models/PasskeyTransport.js';
110
109
  import { PasskeyRegisterRequestToJSON } from '../models/PasskeyRegisterRequest.js';
111
110
  import { PrefetchRequestToJSON } from '../models/PrefetchRequest.js';
112
111
  import { ProjectSettingsFromJSON } from '../models/ProjectSettings.js';
@@ -165,81 +164,6 @@ import '../models/WaasChainEnum.js';
165
164
  *
166
165
  */
167
166
  class SDKApi extends BaseAPI {
168
- /**
169
- * Upgrade JWT scope with valid MFA session
170
- */
171
- authMfaPasskeyDeviceRaw(requestParameters, initOverrides) {
172
- return __awaiter(this, void 0, void 0, function* () {
173
- if (requestParameters.environmentId === null || requestParameters.environmentId === undefined) {
174
- throw new RequiredError('environmentId', 'Required parameter requestParameters.environmentId was null or undefined when calling authMfaPasskeyDevice.');
175
- }
176
- if (requestParameters.mFAAuthPasskeyDevicePostRequest === null || requestParameters.mFAAuthPasskeyDevicePostRequest === undefined) {
177
- throw new RequiredError('mFAAuthPasskeyDevicePostRequest', 'Required parameter requestParameters.mFAAuthPasskeyDevicePostRequest was null or undefined when calling authMfaPasskeyDevice.');
178
- }
179
- const queryParameters = {};
180
- const headerParameters = {};
181
- headerParameters['Content-Type'] = 'application/json';
182
- if (this.configuration && this.configuration.accessToken) {
183
- const token = this.configuration.accessToken;
184
- const tokenString = yield token("bearerAuth", []);
185
- if (tokenString) {
186
- headerParameters["Authorization"] = `Bearer ${tokenString}`;
187
- }
188
- }
189
- const response = yield this.request({
190
- path: `/sdk/{environmentId}/users/mfa/auth/passkey`.replace(`{${"environmentId"}}`, encodeURIComponent(String(requestParameters.environmentId))),
191
- method: 'POST',
192
- headers: headerParameters,
193
- query: queryParameters,
194
- body: MFAAuthPasskeyDevicePostRequestToJSON(requestParameters.mFAAuthPasskeyDevicePostRequest),
195
- }, initOverrides);
196
- return new JSONApiResponse(response, (jsonValue) => VerifyResponseFromJSON(jsonValue));
197
- });
198
- }
199
- /**
200
- * Upgrade JWT scope with valid MFA session
201
- */
202
- authMfaPasskeyDevice(requestParameters, initOverrides) {
203
- return __awaiter(this, void 0, void 0, function* () {
204
- const response = yield this.authMfaPasskeyDeviceRaw(requestParameters, initOverrides);
205
- return yield response.value();
206
- });
207
- }
208
- /**
209
- * Auth Passkey MFA device
210
- */
211
- authMfaPasskeyDeviceChallengeRaw(requestParameters, initOverrides) {
212
- return __awaiter(this, void 0, void 0, function* () {
213
- if (requestParameters.environmentId === null || requestParameters.environmentId === undefined) {
214
- throw new RequiredError('environmentId', 'Required parameter requestParameters.environmentId was null or undefined when calling authMfaPasskeyDeviceChallenge.');
215
- }
216
- const queryParameters = {};
217
- const headerParameters = {};
218
- if (this.configuration && this.configuration.accessToken) {
219
- const token = this.configuration.accessToken;
220
- const tokenString = yield token("bearerAuth", []);
221
- if (tokenString) {
222
- headerParameters["Authorization"] = `Bearer ${tokenString}`;
223
- }
224
- }
225
- const response = yield this.request({
226
- path: `/sdk/{environmentId}/users/mfa/auth/passkey`.replace(`{${"environmentId"}}`, encodeURIComponent(String(requestParameters.environmentId))),
227
- method: 'GET',
228
- headers: headerParameters,
229
- query: queryParameters,
230
- }, initOverrides);
231
- return new JSONApiResponse(response, (jsonValue) => MFAAuthPasskeyDeviceGetResponseFromJSON(jsonValue));
232
- });
233
- }
234
- /**
235
- * Auth Passkey MFA device
236
- */
237
- authMfaPasskeyDeviceChallenge(requestParameters, initOverrides) {
238
- return __awaiter(this, void 0, void 0, function* () {
239
- const response = yield this.authMfaPasskeyDeviceChallengeRaw(requestParameters, initOverrides);
240
- return yield response.value();
241
- });
242
- }
243
167
  /**
244
168
  * Options call for this endpoint
245
169
  */
@@ -401,6 +325,46 @@ class SDKApi extends BaseAPI {
401
325
  yield this.authMfaTotpDeviceOptionsRaw(requestParameters, initOverrides);
402
326
  });
403
327
  }
328
+ /**
329
+ * Upgrade JWT scope with valid MFA session
330
+ */
331
+ authenticateMfaPasskeyDeviceRaw(requestParameters, initOverrides) {
332
+ return __awaiter(this, void 0, void 0, function* () {
333
+ if (requestParameters.environmentId === null || requestParameters.environmentId === undefined) {
334
+ throw new RequiredError('environmentId', 'Required parameter requestParameters.environmentId was null or undefined when calling authenticateMfaPasskeyDevice.');
335
+ }
336
+ if (requestParameters.passkeyAuthRequest === null || requestParameters.passkeyAuthRequest === undefined) {
337
+ throw new RequiredError('passkeyAuthRequest', 'Required parameter requestParameters.passkeyAuthRequest was null or undefined when calling authenticateMfaPasskeyDevice.');
338
+ }
339
+ const queryParameters = {};
340
+ const headerParameters = {};
341
+ headerParameters['Content-Type'] = 'application/json';
342
+ if (this.configuration && this.configuration.accessToken) {
343
+ const token = this.configuration.accessToken;
344
+ const tokenString = yield token("bearerAuth", []);
345
+ if (tokenString) {
346
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
347
+ }
348
+ }
349
+ const response = yield this.request({
350
+ path: `/sdk/{environmentId}/users/mfa/auth/passkey`.replace(`{${"environmentId"}}`, encodeURIComponent(String(requestParameters.environmentId))),
351
+ method: 'POST',
352
+ headers: headerParameters,
353
+ query: queryParameters,
354
+ body: PasskeyAuthRequestToJSON(requestParameters.passkeyAuthRequest),
355
+ }, initOverrides);
356
+ return new JSONApiResponse(response, (jsonValue) => VerifyResponseFromJSON(jsonValue));
357
+ });
358
+ }
359
+ /**
360
+ * Upgrade JWT scope with valid MFA session
361
+ */
362
+ authenticateMfaPasskeyDevice(requestParameters, initOverrides) {
363
+ return __awaiter(this, void 0, void 0, function* () {
364
+ const response = yield this.authenticateMfaPasskeyDeviceRaw(requestParameters, initOverrides);
365
+ return yield response.value();
366
+ });
367
+ }
404
368
  /**
405
369
  * Backup multiple keyShares for a waaS wallet
406
370
  */
package/src/index.cjs CHANGED
@@ -168,6 +168,7 @@ var OnrampProviders = require('./models/OnrampProviders.cjs');
168
168
  var OpenRoomResponse = require('./models/OpenRoomResponse.cjs');
169
169
  var OpenRoomResponseForReshare = require('./models/OpenRoomResponseForReshare.cjs');
170
170
  var OpenRoomResponseWithServerKeygenIds = require('./models/OpenRoomResponseWithServerKeygenIds.cjs');
171
+ var PasskeyAllowCredential = require('./models/PasskeyAllowCredential.cjs');
171
172
  var PasskeyAuthRequest = require('./models/PasskeyAuthRequest.cjs');
172
173
  var PasskeyCredentialHint = require('./models/PasskeyCredentialHint.cjs');
173
174
  var PasskeyCredentialType = require('./models/PasskeyCredentialType.cjs');
@@ -928,6 +929,9 @@ exports.OpenRoomResponseForReshareToJSON = OpenRoomResponseForReshare.OpenRoomRe
928
929
  exports.OpenRoomResponseWithServerKeygenIdsFromJSON = OpenRoomResponseWithServerKeygenIds.OpenRoomResponseWithServerKeygenIdsFromJSON;
929
930
  exports.OpenRoomResponseWithServerKeygenIdsFromJSONTyped = OpenRoomResponseWithServerKeygenIds.OpenRoomResponseWithServerKeygenIdsFromJSONTyped;
930
931
  exports.OpenRoomResponseWithServerKeygenIdsToJSON = OpenRoomResponseWithServerKeygenIds.OpenRoomResponseWithServerKeygenIdsToJSON;
932
+ exports.PasskeyAllowCredentialFromJSON = PasskeyAllowCredential.PasskeyAllowCredentialFromJSON;
933
+ exports.PasskeyAllowCredentialFromJSONTyped = PasskeyAllowCredential.PasskeyAllowCredentialFromJSONTyped;
934
+ exports.PasskeyAllowCredentialToJSON = PasskeyAllowCredential.PasskeyAllowCredentialToJSON;
931
935
  exports.PasskeyAuthRequestFromJSON = PasskeyAuthRequest.PasskeyAuthRequestFromJSON;
932
936
  exports.PasskeyAuthRequestFromJSONTyped = PasskeyAuthRequest.PasskeyAuthRequestFromJSONTyped;
933
937
  exports.PasskeyAuthRequestToJSON = PasskeyAuthRequest.PasskeyAuthRequestToJSON;
package/src/index.js CHANGED
@@ -164,6 +164,7 @@ export { OnrampProviders, OnrampProvidersFromJSON, OnrampProvidersFromJSONTyped,
164
164
  export { OpenRoomResponseFromJSON, OpenRoomResponseFromJSONTyped, OpenRoomResponseToJSON } from './models/OpenRoomResponse.js';
165
165
  export { OpenRoomResponseForReshareFromJSON, OpenRoomResponseForReshareFromJSONTyped, OpenRoomResponseForReshareToJSON } from './models/OpenRoomResponseForReshare.js';
166
166
  export { OpenRoomResponseWithServerKeygenIdsFromJSON, OpenRoomResponseWithServerKeygenIdsFromJSONTyped, OpenRoomResponseWithServerKeygenIdsToJSON } from './models/OpenRoomResponseWithServerKeygenIds.js';
167
+ export { PasskeyAllowCredentialFromJSON, PasskeyAllowCredentialFromJSONTyped, PasskeyAllowCredentialToJSON } from './models/PasskeyAllowCredential.js';
167
168
  export { PasskeyAuthRequestFromJSON, PasskeyAuthRequestFromJSONTyped, PasskeyAuthRequestToJSON } from './models/PasskeyAuthRequest.js';
168
169
  export { PasskeyCredentialHint, PasskeyCredentialHintFromJSON, PasskeyCredentialHintFromJSONTyped, PasskeyCredentialHintToJSON } from './models/PasskeyCredentialHint.js';
169
170
  export { PasskeyCredentialType, PasskeyCredentialTypeFromJSON, PasskeyCredentialTypeFromJSONTyped, PasskeyCredentialTypeToJSON } from './models/PasskeyCredentialType.js';
@@ -24,6 +24,7 @@ function FeatureFlagsFromJSONTyped(json, ignoreDiscriminator) {
24
24
  }
25
25
  return {
26
26
  'connectOnlyMultiAsset': json['connectOnlyMultiAsset'],
27
+ 'enableExchanges': json['enableExchanges'],
27
28
  };
28
29
  }
29
30
  function FeatureFlagsToJSON(value) {
@@ -35,6 +36,7 @@ function FeatureFlagsToJSON(value) {
35
36
  }
36
37
  return {
37
38
  'connectOnlyMultiAsset': value.connectOnlyMultiAsset,
39
+ 'enableExchanges': value.enableExchanges,
38
40
  };
39
41
  }
40
42
 
@@ -21,6 +21,12 @@ export interface FeatureFlags {
21
21
  * @memberof FeatureFlags
22
22
  */
23
23
  connectOnlyMultiAsset: boolean;
24
+ /**
25
+ *
26
+ * @type {boolean}
27
+ * @memberof FeatureFlags
28
+ */
29
+ enableExchanges: boolean;
24
30
  }
25
31
  export declare function FeatureFlagsFromJSON(json: any): FeatureFlags;
26
32
  export declare function FeatureFlagsFromJSONTyped(json: any, ignoreDiscriminator: boolean): FeatureFlags;
@@ -20,6 +20,7 @@ function FeatureFlagsFromJSONTyped(json, ignoreDiscriminator) {
20
20
  }
21
21
  return {
22
22
  'connectOnlyMultiAsset': json['connectOnlyMultiAsset'],
23
+ 'enableExchanges': json['enableExchanges'],
23
24
  };
24
25
  }
25
26
  function FeatureFlagsToJSON(value) {
@@ -31,6 +32,7 @@ function FeatureFlagsToJSON(value) {
31
32
  }
32
33
  return {
33
34
  'connectOnlyMultiAsset': value.connectOnlyMultiAsset,
35
+ 'enableExchanges': value.enableExchanges,
34
36
  };
35
37
  }
36
38
 
@@ -3,8 +3,8 @@
3
3
  Object.defineProperty(exports, '__esModule', { value: true });
4
4
 
5
5
  var runtime = require('../runtime.cjs');
6
+ var PasskeyAllowCredential = require('./PasskeyAllowCredential.cjs');
6
7
  var PasskeyCredentialHint = require('./PasskeyCredentialHint.cjs');
7
- var PasskeyExcludeCredential = require('./PasskeyExcludeCredential.cjs');
8
8
  var PasskeyExtension = require('./PasskeyExtension.cjs');
9
9
  var UserVerificationRequirement = require('./UserVerificationRequirement.cjs');
10
10
 
@@ -21,7 +21,7 @@ function GetPasskeyAuthenticationOptionsResponseFromJSONTyped(json, ignoreDiscri
21
21
  'timeout': !runtime.exists(json, 'timeout') ? undefined : json['timeout'],
22
22
  'rpId': !runtime.exists(json, 'rpId') ? undefined : json['rpId'],
23
23
  'userVerification': !runtime.exists(json, 'userVerification') ? undefined : UserVerificationRequirement.UserVerificationRequirementFromJSON(json['userVerification']),
24
- 'allowCredentials': !runtime.exists(json, 'allowCredentials') ? undefined : PasskeyExcludeCredential.PasskeyExcludeCredentialFromJSON(json['allowCredentials']),
24
+ 'allowCredentials': !runtime.exists(json, 'allowCredentials') ? undefined : (json['allowCredentials'].map(PasskeyAllowCredential.PasskeyAllowCredentialFromJSON)),
25
25
  'extensions': !runtime.exists(json, 'extensions') ? undefined : PasskeyExtension.PasskeyExtensionFromJSON(json['extensions']),
26
26
  'hints': !runtime.exists(json, 'hints') ? undefined : PasskeyCredentialHint.PasskeyCredentialHintFromJSON(json['hints']),
27
27
  };
@@ -38,7 +38,7 @@ function GetPasskeyAuthenticationOptionsResponseToJSON(value) {
38
38
  'timeout': value.timeout,
39
39
  'rpId': value.rpId,
40
40
  'userVerification': UserVerificationRequirement.UserVerificationRequirementToJSON(value.userVerification),
41
- 'allowCredentials': PasskeyExcludeCredential.PasskeyExcludeCredentialToJSON(value.allowCredentials),
41
+ 'allowCredentials': value.allowCredentials === undefined ? undefined : (value.allowCredentials.map(PasskeyAllowCredential.PasskeyAllowCredentialToJSON)),
42
42
  'extensions': PasskeyExtension.PasskeyExtensionToJSON(value.extensions),
43
43
  'hints': PasskeyCredentialHint.PasskeyCredentialHintToJSON(value.hints),
44
44
  };
@@ -9,8 +9,8 @@
9
9
  * https://openapi-generator.tech
10
10
  * Do not edit the class manually.
11
11
  */
12
+ import { PasskeyAllowCredential } from './PasskeyAllowCredential';
12
13
  import { PasskeyCredentialHint } from './PasskeyCredentialHint';
13
- import { PasskeyExcludeCredential } from './PasskeyExcludeCredential';
14
14
  import { PasskeyExtension } from './PasskeyExtension';
15
15
  import { UserVerificationRequirement } from './UserVerificationRequirement';
16
16
  /**
@@ -45,10 +45,10 @@ export interface GetPasskeyAuthenticationOptionsResponse {
45
45
  userVerification?: UserVerificationRequirement;
46
46
  /**
47
47
  *
48
- * @type {PasskeyExcludeCredential}
48
+ * @type {Array<PasskeyAllowCredential>}
49
49
  * @memberof GetPasskeyAuthenticationOptionsResponse
50
50
  */
51
- allowCredentials?: PasskeyExcludeCredential;
51
+ allowCredentials?: Array<PasskeyAllowCredential>;
52
52
  /**
53
53
  *
54
54
  * @type {PasskeyExtension}
@@ -1,6 +1,6 @@
1
1
  import { exists } from '../runtime.js';
2
+ import { PasskeyAllowCredentialFromJSON, PasskeyAllowCredentialToJSON } from './PasskeyAllowCredential.js';
2
3
  import { PasskeyCredentialHintFromJSON, PasskeyCredentialHintToJSON } from './PasskeyCredentialHint.js';
3
- import { PasskeyExcludeCredentialFromJSON, PasskeyExcludeCredentialToJSON } from './PasskeyExcludeCredential.js';
4
4
  import { PasskeyExtensionFromJSON, PasskeyExtensionToJSON } from './PasskeyExtension.js';
5
5
  import { UserVerificationRequirementFromJSON, UserVerificationRequirementToJSON } from './UserVerificationRequirement.js';
6
6
 
@@ -17,7 +17,7 @@ function GetPasskeyAuthenticationOptionsResponseFromJSONTyped(json, ignoreDiscri
17
17
  'timeout': !exists(json, 'timeout') ? undefined : json['timeout'],
18
18
  'rpId': !exists(json, 'rpId') ? undefined : json['rpId'],
19
19
  'userVerification': !exists(json, 'userVerification') ? undefined : UserVerificationRequirementFromJSON(json['userVerification']),
20
- 'allowCredentials': !exists(json, 'allowCredentials') ? undefined : PasskeyExcludeCredentialFromJSON(json['allowCredentials']),
20
+ 'allowCredentials': !exists(json, 'allowCredentials') ? undefined : (json['allowCredentials'].map(PasskeyAllowCredentialFromJSON)),
21
21
  'extensions': !exists(json, 'extensions') ? undefined : PasskeyExtensionFromJSON(json['extensions']),
22
22
  'hints': !exists(json, 'hints') ? undefined : PasskeyCredentialHintFromJSON(json['hints']),
23
23
  };
@@ -34,7 +34,7 @@ function GetPasskeyAuthenticationOptionsResponseToJSON(value) {
34
34
  'timeout': value.timeout,
35
35
  'rpId': value.rpId,
36
36
  'userVerification': UserVerificationRequirementToJSON(value.userVerification),
37
- 'allowCredentials': PasskeyExcludeCredentialToJSON(value.allowCredentials),
37
+ 'allowCredentials': value.allowCredentials === undefined ? undefined : (value.allowCredentials.map(PasskeyAllowCredentialToJSON)),
38
38
  'extensions': PasskeyExtensionToJSON(value.extensions),
39
39
  'hints': PasskeyCredentialHintToJSON(value.hints),
40
40
  };
@@ -0,0 +1,36 @@
1
+ 'use strict';
2
+
3
+ Object.defineProperty(exports, '__esModule', { value: true });
4
+
5
+ var runtime = require('../runtime.cjs');
6
+ var PasskeyTransport = require('./PasskeyTransport.cjs');
7
+
8
+ /* tslint:disable */
9
+ function PasskeyAllowCredentialFromJSON(json) {
10
+ return PasskeyAllowCredentialFromJSONTyped(json);
11
+ }
12
+ function PasskeyAllowCredentialFromJSONTyped(json, ignoreDiscriminator) {
13
+ if ((json === undefined) || (json === null)) {
14
+ return json;
15
+ }
16
+ return {
17
+ 'id': json['id'],
18
+ 'transports': !runtime.exists(json, 'transports') ? undefined : (json['transports'].map(PasskeyTransport.PasskeyTransportFromJSON)),
19
+ };
20
+ }
21
+ function PasskeyAllowCredentialToJSON(value) {
22
+ if (value === undefined) {
23
+ return undefined;
24
+ }
25
+ if (value === null) {
26
+ return null;
27
+ }
28
+ return {
29
+ 'id': value.id,
30
+ 'transports': value.transports === undefined ? undefined : (value.transports.map(PasskeyTransport.PasskeyTransportToJSON)),
31
+ };
32
+ }
33
+
34
+ exports.PasskeyAllowCredentialFromJSON = PasskeyAllowCredentialFromJSON;
35
+ exports.PasskeyAllowCredentialFromJSONTyped = PasskeyAllowCredentialFromJSONTyped;
36
+ exports.PasskeyAllowCredentialToJSON = PasskeyAllowCredentialToJSON;
@@ -0,0 +1,34 @@
1
+ /**
2
+ * Dashboard API
3
+ * Dashboard API documentation
4
+ *
5
+ * The version of the OpenAPI document: 1.0.0
6
+ *
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ import { PasskeyTransport } from './PasskeyTransport';
13
+ /**
14
+ *
15
+ * @export
16
+ * @interface PasskeyAllowCredential
17
+ */
18
+ export interface PasskeyAllowCredential {
19
+ /**
20
+ * Base64URL encoded credential ID
21
+ * @type {string}
22
+ * @memberof PasskeyAllowCredential
23
+ */
24
+ id: string;
25
+ /**
26
+ *
27
+ * @type {Array<PasskeyTransport>}
28
+ * @memberof PasskeyAllowCredential
29
+ */
30
+ transports?: Array<PasskeyTransport>;
31
+ }
32
+ export declare function PasskeyAllowCredentialFromJSON(json: any): PasskeyAllowCredential;
33
+ export declare function PasskeyAllowCredentialFromJSONTyped(json: any, ignoreDiscriminator: boolean): PasskeyAllowCredential;
34
+ export declare function PasskeyAllowCredentialToJSON(value?: PasskeyAllowCredential | null): any;
@@ -0,0 +1,30 @@
1
+ import { exists } from '../runtime.js';
2
+ import { PasskeyTransportFromJSON, PasskeyTransportToJSON } from './PasskeyTransport.js';
3
+
4
+ /* tslint:disable */
5
+ function PasskeyAllowCredentialFromJSON(json) {
6
+ return PasskeyAllowCredentialFromJSONTyped(json);
7
+ }
8
+ function PasskeyAllowCredentialFromJSONTyped(json, ignoreDiscriminator) {
9
+ if ((json === undefined) || (json === null)) {
10
+ return json;
11
+ }
12
+ return {
13
+ 'id': json['id'],
14
+ 'transports': !exists(json, 'transports') ? undefined : (json['transports'].map(PasskeyTransportFromJSON)),
15
+ };
16
+ }
17
+ function PasskeyAllowCredentialToJSON(value) {
18
+ if (value === undefined) {
19
+ return undefined;
20
+ }
21
+ if (value === null) {
22
+ return null;
23
+ }
24
+ return {
25
+ 'id': value.id,
26
+ 'transports': value.transports === undefined ? undefined : (value.transports.map(PasskeyTransportToJSON)),
27
+ };
28
+ }
29
+
30
+ export { PasskeyAllowCredentialFromJSON, PasskeyAllowCredentialFromJSONTyped, PasskeyAllowCredentialToJSON };
@@ -162,6 +162,7 @@ export * from './OnrampProviders';
162
162
  export * from './OpenRoomResponse';
163
163
  export * from './OpenRoomResponseForReshare';
164
164
  export * from './OpenRoomResponseWithServerKeygenIds';
165
+ export * from './PasskeyAllowCredential';
165
166
  export * from './PasskeyAuthRequest';
166
167
  export * from './PasskeyCredentialHint';
167
168
  export * from './PasskeyCredentialType';