@dynamic-labs/sdk-api 0.0.881 → 0.0.883

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@dynamic-labs/sdk-api",
3
- "version": "0.0.881",
3
+ "version": "0.0.883",
4
4
  "author": "Dynamic Labs",
5
5
  "license": "Apache-2.0",
6
6
  "publishConfig": {
@@ -46,6 +46,7 @@ function DynamicJwtFromJSONTyped(json, ignoreDiscriminator) {
46
46
  'verifiedAccount': !runtime.exists(json, 'verified_account') ? undefined : JwtBlockchainAccount.JwtBlockchainAccountFromJSON(json['verified_account']),
47
47
  'verifiedCredentials': (json['verified_credentials'].map(JwtVerifiedCredential.JwtVerifiedCredentialFromJSON)),
48
48
  'lastVerifiedCredentialId': json['last_verified_credential_id'],
49
+ 'signinCredentialId': !runtime.exists(json, 'signin_credential_id') ? undefined : json['signin_credential_id'],
49
50
  'firstVisit': !runtime.exists(json, 'first_visit') ? undefined : (new Date(json['first_visit'])),
50
51
  'lastVisit': !runtime.exists(json, 'last_visit') ? undefined : (new Date(json['last_visit'])),
51
52
  'newUser': !runtime.exists(json, 'new_user') ? undefined : json['new_user'],
@@ -104,6 +105,7 @@ function DynamicJwtToJSON(value) {
104
105
  'verified_account': JwtBlockchainAccount.JwtBlockchainAccountToJSON(value.verifiedAccount),
105
106
  'verified_credentials': (value.verifiedCredentials.map(JwtVerifiedCredential.JwtVerifiedCredentialToJSON)),
106
107
  'last_verified_credential_id': value.lastVerifiedCredentialId,
108
+ 'signin_credential_id': value.signinCredentialId,
107
109
  'first_visit': value.firstVisit === undefined ? undefined : (value.firstVisit.toISOString()),
108
110
  'last_visit': value.lastVisit === undefined ? undefined : (value.lastVisit.toISOString()),
109
111
  'new_user': value.newUser,
@@ -188,6 +188,12 @@ export interface DynamicJwt {
188
188
  * @memberof DynamicJwt
189
189
  */
190
190
  lastVerifiedCredentialId: string;
191
+ /**
192
+ *
193
+ * @type {string}
194
+ * @memberof DynamicJwt
195
+ */
196
+ signinCredentialId?: string;
191
197
  /**
192
198
  *
193
199
  * @type {Date}
@@ -42,6 +42,7 @@ function DynamicJwtFromJSONTyped(json, ignoreDiscriminator) {
42
42
  'verifiedAccount': !exists(json, 'verified_account') ? undefined : JwtBlockchainAccountFromJSON(json['verified_account']),
43
43
  'verifiedCredentials': (json['verified_credentials'].map(JwtVerifiedCredentialFromJSON)),
44
44
  'lastVerifiedCredentialId': json['last_verified_credential_id'],
45
+ 'signinCredentialId': !exists(json, 'signin_credential_id') ? undefined : json['signin_credential_id'],
45
46
  'firstVisit': !exists(json, 'first_visit') ? undefined : (new Date(json['first_visit'])),
46
47
  'lastVisit': !exists(json, 'last_visit') ? undefined : (new Date(json['last_visit'])),
47
48
  'newUser': !exists(json, 'new_user') ? undefined : json['new_user'],
@@ -100,6 +101,7 @@ function DynamicJwtToJSON(value) {
100
101
  'verified_account': JwtBlockchainAccountToJSON(value.verifiedAccount),
101
102
  'verified_credentials': (value.verifiedCredentials.map(JwtVerifiedCredentialToJSON)),
102
103
  'last_verified_credential_id': value.lastVerifiedCredentialId,
104
+ 'signin_credential_id': value.signinCredentialId,
103
105
  'first_visit': value.firstVisit === undefined ? undefined : (value.firstVisit.toISOString()),
104
106
  'last_visit': value.lastVisit === undefined ? undefined : (value.lastVisit.toISOString()),
105
107
  'new_user': value.newUser,
@@ -23,6 +23,7 @@ function MinifiedDynamicJwtFromJSONTyped(json, ignoreDiscriminator) {
23
23
  'iat': !runtime.exists(json, 'iat') ? undefined : json['iat'],
24
24
  'environmentId': json['environment_id'],
25
25
  'lastVerifiedCredentialId': json['last_verified_credential_id'],
26
+ 'signinCredentialId': !runtime.exists(json, 'signin_credential_id') ? undefined : json['signin_credential_id'],
26
27
  'sessionPublicKey': !runtime.exists(json, 'session_public_key') ? undefined : json['session_public_key'],
27
28
  'scope': !runtime.exists(json, 'scope') ? undefined : json['scope'],
28
29
  'verifiedCredentialsHashes': !runtime.exists(json, 'verifiedCredentialsHashes') ? undefined : JwtVerifiedCredentialHashes.JwtVerifiedCredentialHashesFromJSON(json['verifiedCredentialsHashes']),
@@ -52,6 +53,7 @@ function MinifiedDynamicJwtToJSON(value) {
52
53
  'iat': value.iat,
53
54
  'environment_id': value.environmentId,
54
55
  'last_verified_credential_id': value.lastVerifiedCredentialId,
56
+ 'signin_credential_id': value.signinCredentialId,
55
57
  'session_public_key': value.sessionPublicKey,
56
58
  'scope': value.scope,
57
59
  'verifiedCredentialsHashes': JwtVerifiedCredentialHashes.JwtVerifiedCredentialHashesToJSON(value.verifiedCredentialsHashes),
@@ -70,6 +70,12 @@ export interface MinifiedDynamicJwt {
70
70
  * @memberof MinifiedDynamicJwt
71
71
  */
72
72
  lastVerifiedCredentialId: string;
73
+ /**
74
+ * ID of the credential that was used to sign in and create this session. Unlike last_verified_credential_id, this value is immutable for the lifetime of the session and always refers to a sign-in capable credential.
75
+ * @type {string}
76
+ * @memberof MinifiedDynamicJwt
77
+ */
78
+ signinCredentialId?: string;
73
79
  /**
74
80
  * Client session public key
75
81
  * @type {string}
@@ -19,6 +19,7 @@ function MinifiedDynamicJwtFromJSONTyped(json, ignoreDiscriminator) {
19
19
  'iat': !exists(json, 'iat') ? undefined : json['iat'],
20
20
  'environmentId': json['environment_id'],
21
21
  'lastVerifiedCredentialId': json['last_verified_credential_id'],
22
+ 'signinCredentialId': !exists(json, 'signin_credential_id') ? undefined : json['signin_credential_id'],
22
23
  'sessionPublicKey': !exists(json, 'session_public_key') ? undefined : json['session_public_key'],
23
24
  'scope': !exists(json, 'scope') ? undefined : json['scope'],
24
25
  'verifiedCredentialsHashes': !exists(json, 'verifiedCredentialsHashes') ? undefined : JwtVerifiedCredentialHashesFromJSON(json['verifiedCredentialsHashes']),
@@ -48,6 +49,7 @@ function MinifiedDynamicJwtToJSON(value) {
48
49
  'iat': value.iat,
49
50
  'environment_id': value.environmentId,
50
51
  'last_verified_credential_id': value.lastVerifiedCredentialId,
52
+ 'signin_credential_id': value.signinCredentialId,
51
53
  'session_public_key': value.sessionPublicKey,
52
54
  'scope': value.scope,
53
55
  'verifiedCredentialsHashes': JwtVerifiedCredentialHashesToJSON(value.verifiedCredentialsHashes),
@@ -22,6 +22,7 @@ Object.defineProperty(exports, '__esModule', { value: true });
22
22
  */
23
23
  exports.TokenScopes = void 0;
24
24
  (function (TokenScopes) {
25
+ TokenScopes["AllRead"] = "all.read";
25
26
  TokenScopes["WaasDelegatedAccessSignMessage"] = "waas.delegatedAccess.signMessage";
26
27
  TokenScopes["WaasAuthenticate"] = "waas.authenticate";
27
28
  TokenScopes["EnvironmentSettingsRead"] = "environment.settings.read";
@@ -15,6 +15,7 @@
15
15
  * @enum {string}
16
16
  */
17
17
  export declare enum TokenScopes {
18
+ AllRead = "all.read",
18
19
  WaasDelegatedAccessSignMessage = "waas.delegatedAccess.signMessage",
19
20
  WaasAuthenticate = "waas.authenticate",
20
21
  EnvironmentSettingsRead = "environment.settings.read",
@@ -18,6 +18,7 @@
18
18
  */
19
19
  var TokenScopes;
20
20
  (function (TokenScopes) {
21
+ TokenScopes["AllRead"] = "all.read";
21
22
  TokenScopes["WaasDelegatedAccessSignMessage"] = "waas.delegatedAccess.signMessage";
22
23
  TokenScopes["WaasAuthenticate"] = "waas.authenticate";
23
24
  TokenScopes["EnvironmentSettingsRead"] = "environment.settings.read";
@@ -15,7 +15,7 @@ function TransactionFeeEstimateResponseFromJSONTyped(json, ignoreDiscriminator)
15
15
  return {
16
16
  'estimatedFee': json['estimatedFee'],
17
17
  'currency': json['currency'],
18
- 'decimals': json['decimals'],
18
+ 'decimals': !runtime.exists(json, 'decimals') ? undefined : json['decimals'],
19
19
  'units': !runtime.exists(json, 'units') ? undefined : json['units'],
20
20
  'unitPrice': !runtime.exists(json, 'unitPrice') ? undefined : json['unitPrice'],
21
21
  'baseFee': !runtime.exists(json, 'baseFee') ? undefined : json['baseFee'],
@@ -32,7 +32,7 @@ export interface TransactionFeeEstimateResponse {
32
32
  * @type {number}
33
33
  * @memberof TransactionFeeEstimateResponse
34
34
  */
35
- decimals: number;
35
+ decimals?: number;
36
36
  /**
37
37
  * Estimated units of compute/space required (gas, compute units, vBytes, etc.)
38
38
  * @type {string}
@@ -11,7 +11,7 @@ function TransactionFeeEstimateResponseFromJSONTyped(json, ignoreDiscriminator)
11
11
  return {
12
12
  'estimatedFee': json['estimatedFee'],
13
13
  'currency': json['currency'],
14
- 'decimals': json['decimals'],
14
+ 'decimals': !exists(json, 'decimals') ? undefined : json['decimals'],
15
15
  'units': !exists(json, 'units') ? undefined : json['units'],
16
16
  'unitPrice': !exists(json, 'unitPrice') ? undefined : json['unitPrice'],
17
17
  'baseFee': !exists(json, 'baseFee') ? undefined : json['baseFee'],
@@ -31,6 +31,7 @@ function WaasPolicyRuleFromJSONTyped(json, ignoreDiscriminator) {
31
31
  'argumentConstraints': !runtime.exists(json, 'argumentConstraints') ? undefined : (json['argumentConstraints'].map(WaasPolicyArgumentConstraint.WaasPolicyArgumentConstraintFromJSON)),
32
32
  'valueLimit': !runtime.exists(json, 'valueLimit') ? undefined : WaasPolicyRuleValueLimit.WaasPolicyRuleValueLimitFromJSON(json['valueLimit']),
33
33
  'operationRestrictions': !runtime.exists(json, 'operationRestrictions') ? undefined : WaasPolicyRuleOperationRestrictions.WaasPolicyRuleOperationRestrictionsFromJSON(json['operationRestrictions']),
34
+ 'disableBlockaidSecurityChecks': !runtime.exists(json, 'disableBlockaidSecurityChecks') ? undefined : json['disableBlockaidSecurityChecks'],
34
35
  };
35
36
  }
36
37
  function WaasPolicyRuleToJSON(value) {
@@ -54,6 +55,7 @@ function WaasPolicyRuleToJSON(value) {
54
55
  'argumentConstraints': value.argumentConstraints === undefined ? undefined : (value.argumentConstraints.map(WaasPolicyArgumentConstraint.WaasPolicyArgumentConstraintToJSON)),
55
56
  'valueLimit': WaasPolicyRuleValueLimit.WaasPolicyRuleValueLimitToJSON(value.valueLimit),
56
57
  'operationRestrictions': WaasPolicyRuleOperationRestrictions.WaasPolicyRuleOperationRestrictionsToJSON(value.operationRestrictions),
58
+ 'disableBlockaidSecurityChecks': value.disableBlockaidSecurityChecks,
57
59
  };
58
60
  }
59
61
 
@@ -98,6 +98,12 @@ export interface WaasPolicyRule {
98
98
  * @memberof WaasPolicyRule
99
99
  */
100
100
  operationRestrictions?: WaasPolicyRuleOperationRestrictions;
101
+ /**
102
+ * When true, disables Blockaid security enforcement for this rule. Blockaid simulation will still run for policy evaluation, but security verdicts (e.g., malicious transactions) will not block execution. Transaction approval will be determined solely by customer-defined policy rules. Use with caution as this bypasses automated security protections.
103
+ * @type {boolean}
104
+ * @memberof WaasPolicyRule
105
+ */
106
+ disableBlockaidSecurityChecks?: boolean;
101
107
  }
102
108
  export declare function WaasPolicyRuleFromJSON(json: any): WaasPolicyRule;
103
109
  export declare function WaasPolicyRuleFromJSONTyped(json: any, ignoreDiscriminator: boolean): WaasPolicyRule;
@@ -27,6 +27,7 @@ function WaasPolicyRuleFromJSONTyped(json, ignoreDiscriminator) {
27
27
  'argumentConstraints': !exists(json, 'argumentConstraints') ? undefined : (json['argumentConstraints'].map(WaasPolicyArgumentConstraintFromJSON)),
28
28
  'valueLimit': !exists(json, 'valueLimit') ? undefined : WaasPolicyRuleValueLimitFromJSON(json['valueLimit']),
29
29
  'operationRestrictions': !exists(json, 'operationRestrictions') ? undefined : WaasPolicyRuleOperationRestrictionsFromJSON(json['operationRestrictions']),
30
+ 'disableBlockaidSecurityChecks': !exists(json, 'disableBlockaidSecurityChecks') ? undefined : json['disableBlockaidSecurityChecks'],
30
31
  };
31
32
  }
32
33
  function WaasPolicyRuleToJSON(value) {
@@ -50,6 +51,7 @@ function WaasPolicyRuleToJSON(value) {
50
51
  'argumentConstraints': value.argumentConstraints === undefined ? undefined : (value.argumentConstraints.map(WaasPolicyArgumentConstraintToJSON)),
51
52
  'valueLimit': WaasPolicyRuleValueLimitToJSON(value.valueLimit),
52
53
  'operationRestrictions': WaasPolicyRuleOperationRestrictionsToJSON(value.operationRestrictions),
54
+ 'disableBlockaidSecurityChecks': value.disableBlockaidSecurityChecks,
53
55
  };
54
56
  }
55
57