@dynamic-labs/sdk-api 0.0.881 → 0.0.883
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +1 -1
- package/src/models/DynamicJwt.cjs +2 -0
- package/src/models/DynamicJwt.d.ts +6 -0
- package/src/models/DynamicJwt.js +2 -0
- package/src/models/MinifiedDynamicJwt.cjs +2 -0
- package/src/models/MinifiedDynamicJwt.d.ts +6 -0
- package/src/models/MinifiedDynamicJwt.js +2 -0
- package/src/models/TokenScopes.cjs +1 -0
- package/src/models/TokenScopes.d.ts +1 -0
- package/src/models/TokenScopes.js +1 -0
- package/src/models/TransactionFeeEstimateResponse.cjs +1 -1
- package/src/models/TransactionFeeEstimateResponse.d.ts +1 -1
- package/src/models/TransactionFeeEstimateResponse.js +1 -1
- package/src/models/WaasPolicyRule.cjs +2 -0
- package/src/models/WaasPolicyRule.d.ts +6 -0
- package/src/models/WaasPolicyRule.js +2 -0
package/package.json
CHANGED
|
@@ -46,6 +46,7 @@ function DynamicJwtFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
46
46
|
'verifiedAccount': !runtime.exists(json, 'verified_account') ? undefined : JwtBlockchainAccount.JwtBlockchainAccountFromJSON(json['verified_account']),
|
|
47
47
|
'verifiedCredentials': (json['verified_credentials'].map(JwtVerifiedCredential.JwtVerifiedCredentialFromJSON)),
|
|
48
48
|
'lastVerifiedCredentialId': json['last_verified_credential_id'],
|
|
49
|
+
'signinCredentialId': !runtime.exists(json, 'signin_credential_id') ? undefined : json['signin_credential_id'],
|
|
49
50
|
'firstVisit': !runtime.exists(json, 'first_visit') ? undefined : (new Date(json['first_visit'])),
|
|
50
51
|
'lastVisit': !runtime.exists(json, 'last_visit') ? undefined : (new Date(json['last_visit'])),
|
|
51
52
|
'newUser': !runtime.exists(json, 'new_user') ? undefined : json['new_user'],
|
|
@@ -104,6 +105,7 @@ function DynamicJwtToJSON(value) {
|
|
|
104
105
|
'verified_account': JwtBlockchainAccount.JwtBlockchainAccountToJSON(value.verifiedAccount),
|
|
105
106
|
'verified_credentials': (value.verifiedCredentials.map(JwtVerifiedCredential.JwtVerifiedCredentialToJSON)),
|
|
106
107
|
'last_verified_credential_id': value.lastVerifiedCredentialId,
|
|
108
|
+
'signin_credential_id': value.signinCredentialId,
|
|
107
109
|
'first_visit': value.firstVisit === undefined ? undefined : (value.firstVisit.toISOString()),
|
|
108
110
|
'last_visit': value.lastVisit === undefined ? undefined : (value.lastVisit.toISOString()),
|
|
109
111
|
'new_user': value.newUser,
|
package/src/models/DynamicJwt.js
CHANGED
|
@@ -42,6 +42,7 @@ function DynamicJwtFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
42
42
|
'verifiedAccount': !exists(json, 'verified_account') ? undefined : JwtBlockchainAccountFromJSON(json['verified_account']),
|
|
43
43
|
'verifiedCredentials': (json['verified_credentials'].map(JwtVerifiedCredentialFromJSON)),
|
|
44
44
|
'lastVerifiedCredentialId': json['last_verified_credential_id'],
|
|
45
|
+
'signinCredentialId': !exists(json, 'signin_credential_id') ? undefined : json['signin_credential_id'],
|
|
45
46
|
'firstVisit': !exists(json, 'first_visit') ? undefined : (new Date(json['first_visit'])),
|
|
46
47
|
'lastVisit': !exists(json, 'last_visit') ? undefined : (new Date(json['last_visit'])),
|
|
47
48
|
'newUser': !exists(json, 'new_user') ? undefined : json['new_user'],
|
|
@@ -100,6 +101,7 @@ function DynamicJwtToJSON(value) {
|
|
|
100
101
|
'verified_account': JwtBlockchainAccountToJSON(value.verifiedAccount),
|
|
101
102
|
'verified_credentials': (value.verifiedCredentials.map(JwtVerifiedCredentialToJSON)),
|
|
102
103
|
'last_verified_credential_id': value.lastVerifiedCredentialId,
|
|
104
|
+
'signin_credential_id': value.signinCredentialId,
|
|
103
105
|
'first_visit': value.firstVisit === undefined ? undefined : (value.firstVisit.toISOString()),
|
|
104
106
|
'last_visit': value.lastVisit === undefined ? undefined : (value.lastVisit.toISOString()),
|
|
105
107
|
'new_user': value.newUser,
|
|
@@ -23,6 +23,7 @@ function MinifiedDynamicJwtFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
23
23
|
'iat': !runtime.exists(json, 'iat') ? undefined : json['iat'],
|
|
24
24
|
'environmentId': json['environment_id'],
|
|
25
25
|
'lastVerifiedCredentialId': json['last_verified_credential_id'],
|
|
26
|
+
'signinCredentialId': !runtime.exists(json, 'signin_credential_id') ? undefined : json['signin_credential_id'],
|
|
26
27
|
'sessionPublicKey': !runtime.exists(json, 'session_public_key') ? undefined : json['session_public_key'],
|
|
27
28
|
'scope': !runtime.exists(json, 'scope') ? undefined : json['scope'],
|
|
28
29
|
'verifiedCredentialsHashes': !runtime.exists(json, 'verifiedCredentialsHashes') ? undefined : JwtVerifiedCredentialHashes.JwtVerifiedCredentialHashesFromJSON(json['verifiedCredentialsHashes']),
|
|
@@ -52,6 +53,7 @@ function MinifiedDynamicJwtToJSON(value) {
|
|
|
52
53
|
'iat': value.iat,
|
|
53
54
|
'environment_id': value.environmentId,
|
|
54
55
|
'last_verified_credential_id': value.lastVerifiedCredentialId,
|
|
56
|
+
'signin_credential_id': value.signinCredentialId,
|
|
55
57
|
'session_public_key': value.sessionPublicKey,
|
|
56
58
|
'scope': value.scope,
|
|
57
59
|
'verifiedCredentialsHashes': JwtVerifiedCredentialHashes.JwtVerifiedCredentialHashesToJSON(value.verifiedCredentialsHashes),
|
|
@@ -70,6 +70,12 @@ export interface MinifiedDynamicJwt {
|
|
|
70
70
|
* @memberof MinifiedDynamicJwt
|
|
71
71
|
*/
|
|
72
72
|
lastVerifiedCredentialId: string;
|
|
73
|
+
/**
|
|
74
|
+
* ID of the credential that was used to sign in and create this session. Unlike last_verified_credential_id, this value is immutable for the lifetime of the session and always refers to a sign-in capable credential.
|
|
75
|
+
* @type {string}
|
|
76
|
+
* @memberof MinifiedDynamicJwt
|
|
77
|
+
*/
|
|
78
|
+
signinCredentialId?: string;
|
|
73
79
|
/**
|
|
74
80
|
* Client session public key
|
|
75
81
|
* @type {string}
|
|
@@ -19,6 +19,7 @@ function MinifiedDynamicJwtFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
19
19
|
'iat': !exists(json, 'iat') ? undefined : json['iat'],
|
|
20
20
|
'environmentId': json['environment_id'],
|
|
21
21
|
'lastVerifiedCredentialId': json['last_verified_credential_id'],
|
|
22
|
+
'signinCredentialId': !exists(json, 'signin_credential_id') ? undefined : json['signin_credential_id'],
|
|
22
23
|
'sessionPublicKey': !exists(json, 'session_public_key') ? undefined : json['session_public_key'],
|
|
23
24
|
'scope': !exists(json, 'scope') ? undefined : json['scope'],
|
|
24
25
|
'verifiedCredentialsHashes': !exists(json, 'verifiedCredentialsHashes') ? undefined : JwtVerifiedCredentialHashesFromJSON(json['verifiedCredentialsHashes']),
|
|
@@ -48,6 +49,7 @@ function MinifiedDynamicJwtToJSON(value) {
|
|
|
48
49
|
'iat': value.iat,
|
|
49
50
|
'environment_id': value.environmentId,
|
|
50
51
|
'last_verified_credential_id': value.lastVerifiedCredentialId,
|
|
52
|
+
'signin_credential_id': value.signinCredentialId,
|
|
51
53
|
'session_public_key': value.sessionPublicKey,
|
|
52
54
|
'scope': value.scope,
|
|
53
55
|
'verifiedCredentialsHashes': JwtVerifiedCredentialHashesToJSON(value.verifiedCredentialsHashes),
|
|
@@ -22,6 +22,7 @@ Object.defineProperty(exports, '__esModule', { value: true });
|
|
|
22
22
|
*/
|
|
23
23
|
exports.TokenScopes = void 0;
|
|
24
24
|
(function (TokenScopes) {
|
|
25
|
+
TokenScopes["AllRead"] = "all.read";
|
|
25
26
|
TokenScopes["WaasDelegatedAccessSignMessage"] = "waas.delegatedAccess.signMessage";
|
|
26
27
|
TokenScopes["WaasAuthenticate"] = "waas.authenticate";
|
|
27
28
|
TokenScopes["EnvironmentSettingsRead"] = "environment.settings.read";
|
|
@@ -18,6 +18,7 @@
|
|
|
18
18
|
*/
|
|
19
19
|
var TokenScopes;
|
|
20
20
|
(function (TokenScopes) {
|
|
21
|
+
TokenScopes["AllRead"] = "all.read";
|
|
21
22
|
TokenScopes["WaasDelegatedAccessSignMessage"] = "waas.delegatedAccess.signMessage";
|
|
22
23
|
TokenScopes["WaasAuthenticate"] = "waas.authenticate";
|
|
23
24
|
TokenScopes["EnvironmentSettingsRead"] = "environment.settings.read";
|
|
@@ -15,7 +15,7 @@ function TransactionFeeEstimateResponseFromJSONTyped(json, ignoreDiscriminator)
|
|
|
15
15
|
return {
|
|
16
16
|
'estimatedFee': json['estimatedFee'],
|
|
17
17
|
'currency': json['currency'],
|
|
18
|
-
'decimals': json['decimals'],
|
|
18
|
+
'decimals': !runtime.exists(json, 'decimals') ? undefined : json['decimals'],
|
|
19
19
|
'units': !runtime.exists(json, 'units') ? undefined : json['units'],
|
|
20
20
|
'unitPrice': !runtime.exists(json, 'unitPrice') ? undefined : json['unitPrice'],
|
|
21
21
|
'baseFee': !runtime.exists(json, 'baseFee') ? undefined : json['baseFee'],
|
|
@@ -32,7 +32,7 @@ export interface TransactionFeeEstimateResponse {
|
|
|
32
32
|
* @type {number}
|
|
33
33
|
* @memberof TransactionFeeEstimateResponse
|
|
34
34
|
*/
|
|
35
|
-
decimals
|
|
35
|
+
decimals?: number;
|
|
36
36
|
/**
|
|
37
37
|
* Estimated units of compute/space required (gas, compute units, vBytes, etc.)
|
|
38
38
|
* @type {string}
|
|
@@ -11,7 +11,7 @@ function TransactionFeeEstimateResponseFromJSONTyped(json, ignoreDiscriminator)
|
|
|
11
11
|
return {
|
|
12
12
|
'estimatedFee': json['estimatedFee'],
|
|
13
13
|
'currency': json['currency'],
|
|
14
|
-
'decimals': json['decimals'],
|
|
14
|
+
'decimals': !exists(json, 'decimals') ? undefined : json['decimals'],
|
|
15
15
|
'units': !exists(json, 'units') ? undefined : json['units'],
|
|
16
16
|
'unitPrice': !exists(json, 'unitPrice') ? undefined : json['unitPrice'],
|
|
17
17
|
'baseFee': !exists(json, 'baseFee') ? undefined : json['baseFee'],
|
|
@@ -31,6 +31,7 @@ function WaasPolicyRuleFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
31
31
|
'argumentConstraints': !runtime.exists(json, 'argumentConstraints') ? undefined : (json['argumentConstraints'].map(WaasPolicyArgumentConstraint.WaasPolicyArgumentConstraintFromJSON)),
|
|
32
32
|
'valueLimit': !runtime.exists(json, 'valueLimit') ? undefined : WaasPolicyRuleValueLimit.WaasPolicyRuleValueLimitFromJSON(json['valueLimit']),
|
|
33
33
|
'operationRestrictions': !runtime.exists(json, 'operationRestrictions') ? undefined : WaasPolicyRuleOperationRestrictions.WaasPolicyRuleOperationRestrictionsFromJSON(json['operationRestrictions']),
|
|
34
|
+
'disableBlockaidSecurityChecks': !runtime.exists(json, 'disableBlockaidSecurityChecks') ? undefined : json['disableBlockaidSecurityChecks'],
|
|
34
35
|
};
|
|
35
36
|
}
|
|
36
37
|
function WaasPolicyRuleToJSON(value) {
|
|
@@ -54,6 +55,7 @@ function WaasPolicyRuleToJSON(value) {
|
|
|
54
55
|
'argumentConstraints': value.argumentConstraints === undefined ? undefined : (value.argumentConstraints.map(WaasPolicyArgumentConstraint.WaasPolicyArgumentConstraintToJSON)),
|
|
55
56
|
'valueLimit': WaasPolicyRuleValueLimit.WaasPolicyRuleValueLimitToJSON(value.valueLimit),
|
|
56
57
|
'operationRestrictions': WaasPolicyRuleOperationRestrictions.WaasPolicyRuleOperationRestrictionsToJSON(value.operationRestrictions),
|
|
58
|
+
'disableBlockaidSecurityChecks': value.disableBlockaidSecurityChecks,
|
|
57
59
|
};
|
|
58
60
|
}
|
|
59
61
|
|
|
@@ -98,6 +98,12 @@ export interface WaasPolicyRule {
|
|
|
98
98
|
* @memberof WaasPolicyRule
|
|
99
99
|
*/
|
|
100
100
|
operationRestrictions?: WaasPolicyRuleOperationRestrictions;
|
|
101
|
+
/**
|
|
102
|
+
* When true, disables Blockaid security enforcement for this rule. Blockaid simulation will still run for policy evaluation, but security verdicts (e.g., malicious transactions) will not block execution. Transaction approval will be determined solely by customer-defined policy rules. Use with caution as this bypasses automated security protections.
|
|
103
|
+
* @type {boolean}
|
|
104
|
+
* @memberof WaasPolicyRule
|
|
105
|
+
*/
|
|
106
|
+
disableBlockaidSecurityChecks?: boolean;
|
|
101
107
|
}
|
|
102
108
|
export declare function WaasPolicyRuleFromJSON(json: any): WaasPolicyRule;
|
|
103
109
|
export declare function WaasPolicyRuleFromJSONTyped(json: any, ignoreDiscriminator: boolean): WaasPolicyRule;
|
|
@@ -27,6 +27,7 @@ function WaasPolicyRuleFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
27
27
|
'argumentConstraints': !exists(json, 'argumentConstraints') ? undefined : (json['argumentConstraints'].map(WaasPolicyArgumentConstraintFromJSON)),
|
|
28
28
|
'valueLimit': !exists(json, 'valueLimit') ? undefined : WaasPolicyRuleValueLimitFromJSON(json['valueLimit']),
|
|
29
29
|
'operationRestrictions': !exists(json, 'operationRestrictions') ? undefined : WaasPolicyRuleOperationRestrictionsFromJSON(json['operationRestrictions']),
|
|
30
|
+
'disableBlockaidSecurityChecks': !exists(json, 'disableBlockaidSecurityChecks') ? undefined : json['disableBlockaidSecurityChecks'],
|
|
30
31
|
};
|
|
31
32
|
}
|
|
32
33
|
function WaasPolicyRuleToJSON(value) {
|
|
@@ -50,6 +51,7 @@ function WaasPolicyRuleToJSON(value) {
|
|
|
50
51
|
'argumentConstraints': value.argumentConstraints === undefined ? undefined : (value.argumentConstraints.map(WaasPolicyArgumentConstraintToJSON)),
|
|
51
52
|
'valueLimit': WaasPolicyRuleValueLimitToJSON(value.valueLimit),
|
|
52
53
|
'operationRestrictions': WaasPolicyRuleOperationRestrictionsToJSON(value.operationRestrictions),
|
|
54
|
+
'disableBlockaidSecurityChecks': value.disableBlockaidSecurityChecks,
|
|
53
55
|
};
|
|
54
56
|
}
|
|
55
57
|
|