@settlemint/dalp-cli 2.1.7-main.25523277805 → 2.1.7-main.25539666483

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/dist/dalp.js +503 -2
  2. package/package.json +1 -1
package/dist/dalp.js CHANGED
@@ -64508,6 +64508,226 @@ var DAPI_ROUTE_ERROR_ENTRIES = [
64508
64508
  expectedClientError: true
64509
64509
  })
64510
64510
  },
64511
+ {
64512
+ code: "COMPLIANCE_SIGNATURE_INVALID",
64513
+ definition: dapiError({
64514
+ id: "DALP-0488",
64515
+ category: "auth",
64516
+ status: 401,
64517
+ message: "Webhook authentication failed.",
64518
+ why: "The compliance webhook signature or URL token could not be verified against the integration credentials.",
64519
+ fix: "Verify the provider webhook URL and signing secret configuration, then send a freshly signed event.",
64520
+ retryable: false,
64521
+ expectedClientError: true,
64522
+ surfaces: ["unknown-hono"],
64523
+ transports: ["hono"]
64524
+ })
64525
+ },
64526
+ {
64527
+ code: "COMPLIANCE_REPLAY_WINDOW_EXCEEDED",
64528
+ definition: dapiError({
64529
+ id: "DALP-0489",
64530
+ category: "client",
64531
+ status: 400,
64532
+ message: "Webhook timestamp is outside the accepted replay window.",
64533
+ why: "The compliance webhook timestamp was more than five minutes away from the server clock.",
64534
+ fix: "Send a fresh provider event with a current timestamp and verify clock synchronization for the provider integration.",
64535
+ retryable: false,
64536
+ expectedClientError: true,
64537
+ surfaces: ["unknown-hono"],
64538
+ transports: ["hono"]
64539
+ })
64540
+ },
64541
+ {
64542
+ code: "COMPLIANCE_SUBJECT_MAPPING_MISSING",
64543
+ definition: dapiError({
64544
+ id: "DALP-0490",
64545
+ category: "domain",
64546
+ status: 404,
64547
+ message: "Compliance subject mapping was not found.",
64548
+ why: "A compliance webhook referenced an external subject ID that has not been mapped to a DALP identity or wallet.",
64549
+ fix: "Create the subject through DALP before accepting provider webhooks for that external ID, or reconcile the event from the audit log.",
64550
+ retryable: false,
64551
+ expectedClientError: true,
64552
+ surfaces: ["unknown-hono", "dependency-restate"],
64553
+ transports: ["hono", "background"],
64554
+ authSensitivity: {
64555
+ existenceDisclosure: "conceal",
64556
+ rationale: "Subject mappings are tenant scoped; unknown and unauthorized subjects must not reveal tenant membership."
64557
+ }
64558
+ })
64559
+ },
64560
+ {
64561
+ code: "COMPLIANCE_INTEGRATION_PAUSED",
64562
+ definition: dapiError({
64563
+ id: "DALP-0491",
64564
+ category: "domain",
64565
+ status: 404,
64566
+ message: "Compliance integration is not accepting webhook events.",
64567
+ why: "The webhook target is not currently available for compliance event intake.",
64568
+ fix: "Verify the integration configuration and resume the integration before sending more provider events.",
64569
+ retryable: false,
64570
+ expectedClientError: true,
64571
+ surfaces: ["unknown-hono"],
64572
+ transports: ["hono"],
64573
+ authSensitivity: {
64574
+ existenceDisclosure: "conceal",
64575
+ rationale: "Unknown integration IDs intentionally return this same public shape to avoid a tenant integration existence oracle."
64576
+ }
64577
+ })
64578
+ },
64579
+ {
64580
+ code: "COMPLIANCE_INTEGRATION_FAILED",
64581
+ definition: dapiError({
64582
+ id: "DALP-0492",
64583
+ category: "domain",
64584
+ status: 409,
64585
+ message: "Compliance integration is in a failed state.",
64586
+ why: "The compliance integration failed provisioning or health checks and cannot process provider events.",
64587
+ fix: "Repair or reprovision the integration before retrying webhook processing.",
64588
+ retryable: false,
64589
+ expectedClientError: true,
64590
+ surfaces: ["unknown-hono", "orpc-v2-rest", "orpc-rpc"],
64591
+ transports: ["hono", "orpc-rest", "orpc-rpc"]
64592
+ })
64593
+ },
64594
+ {
64595
+ code: "COMPLIANCE_UNMAPPED_EVENT",
64596
+ definition: dapiError({
64597
+ id: "DALP-0493",
64598
+ category: "domain",
64599
+ status: 422,
64600
+ message: "Compliance provider event could not be mapped.",
64601
+ why: "The provider payload did not match a supported ClaimSource verdict or monitoring-alert shape and was persisted for audit.",
64602
+ fix: "Review the provider event type and update the adapter mapping before replaying the event.",
64603
+ retryable: false,
64604
+ expectedClientError: true,
64605
+ surfaces: ["unknown-hono", "dependency-restate"],
64606
+ transports: ["hono", "background"]
64607
+ })
64608
+ },
64609
+ {
64610
+ code: "COMPLIANCE_OUT_OF_ORDER_EVENT",
64611
+ definition: dapiError({
64612
+ id: "DALP-0494",
64613
+ category: "domain",
64614
+ status: 409,
64615
+ message: "Compliance provider event is older than the current subject state.",
64616
+ why: "The event timestamp or sequence is behind the last applied event for the same integration, subject, and topic.",
64617
+ fix: "Do not replay stale provider events; inspect the audit event if the provider's ordering guarantees appear broken.",
64618
+ retryable: false,
64619
+ expectedClientError: true,
64620
+ surfaces: ["dependency-restate"],
64621
+ transports: ["background"]
64622
+ })
64623
+ },
64624
+ {
64625
+ code: "COMPLIANCE_PROVIDER_HEALTH_CHECK_FAILED",
64626
+ definition: dapiError({
64627
+ id: "DALP-0495",
64628
+ category: "dependency",
64629
+ status: 503,
64630
+ message: "Compliance provider health check failed.",
64631
+ why: "DAPI could not reach the provider health endpoint or the provider returned an unhealthy response.",
64632
+ fix: "Retry after a short backoff; if the failure persists, verify provider availability and the integration credentials.",
64633
+ retryable: true,
64634
+ expectedClientError: false,
64635
+ surfaces: ["orpc-v2-rest", "orpc-rpc"],
64636
+ transports: ["orpc-rest", "orpc-rpc"]
64637
+ })
64638
+ },
64639
+ {
64640
+ code: "COMPLIANCE_APPLICANT_CREATE_FAILED",
64641
+ definition: dapiError({
64642
+ id: "DALP-0496",
64643
+ category: "dependency",
64644
+ status: 502,
64645
+ message: "Compliance provider rejected applicant creation.",
64646
+ why: "The provider applicant or monitored-subject creation call failed before DALP could persist the subject mapping.",
64647
+ fix: "Verify provider credentials and the submitted subject fields, then retry applicant creation.",
64648
+ retryable: false,
64649
+ expectedClientError: false,
64650
+ surfaces: ["orpc-v2-rest", "orpc-rpc", "dependency-restate"],
64651
+ transports: ["orpc-rest", "orpc-rpc", "background"]
64652
+ })
64653
+ },
64654
+ {
64655
+ code: "COMPLIANCE_TIR_REGISTRATION_FAILED",
64656
+ definition: dapiError({
64657
+ id: "DALP-0497",
64658
+ category: "contract",
64659
+ status: 502,
64660
+ message: "Compliance trusted-issuer registration failed.",
64661
+ why: "The tenant trusted issuer registry rejected the provider issuer EOA registration transaction.",
64662
+ fix: "Verify the provider issuer address, claim topic, tenant registry address, and transaction trace before retrying provisioning.",
64663
+ retryable: false,
64664
+ expectedClientError: false,
64665
+ surfaces: ["dependency-restate"],
64666
+ transports: ["background"]
64667
+ })
64668
+ },
64669
+ {
64670
+ code: "COMPLIANCE_TOPIC_MISMATCH",
64671
+ definition: dapiError({
64672
+ id: "DALP-0498",
64673
+ category: "domain",
64674
+ status: 400,
64675
+ message: "Compliance provider event topic does not match the integration.",
64676
+ why: "The webhook payload declared a claim topic different from the single topic configured for the integration.",
64677
+ fix: "Send the event to an integration configured for that topic, or correct the provider adapter topic mapping.",
64678
+ retryable: false,
64679
+ expectedClientError: true,
64680
+ surfaces: ["unknown-hono", "dependency-restate"],
64681
+ transports: ["hono", "background"]
64682
+ })
64683
+ },
64684
+ {
64685
+ code: "COMPLIANCE_WALLET_NOT_REGISTERED",
64686
+ definition: dapiError({
64687
+ id: "DALP-0499",
64688
+ category: "domain",
64689
+ status: 404,
64690
+ message: "Wallet does not have an associated OnchainID identity.",
64691
+ why: "A wallet-subject compliance provider event referenced a wallet that DALP could not resolve to an OnchainID identity.",
64692
+ fix: "Register the wallet to an OnchainID identity before creating or replaying the compliance subject mapping.",
64693
+ retryable: false,
64694
+ expectedClientError: true,
64695
+ authSensitivity: {
64696
+ existenceDisclosure: "conceal",
64697
+ rationale: "Wallet-to-identity mappings are tenant scoped and must not reveal whether another tenant has registered the wallet."
64698
+ }
64699
+ })
64700
+ },
64701
+ {
64702
+ code: "COMPLIANCE_SECRET_ROTATION_GRACE_EXPIRED",
64703
+ definition: dapiError({
64704
+ id: "DALP-0500",
64705
+ category: "domain",
64706
+ status: 410,
64707
+ message: "Compliance webhook signing secret rotation grace period expired.",
64708
+ why: "The pending webhook signing secret expired before it was promoted to the active secret.",
64709
+ fix: "Start a new secret rotation and update the provider dashboard with the active webhook signing secret.",
64710
+ retryable: false,
64711
+ expectedClientError: true,
64712
+ surfaces: ["orpc-v2-rest", "orpc-rpc", "unknown-hono"],
64713
+ transports: ["orpc-rest", "orpc-rpc", "hono"]
64714
+ })
64715
+ },
64716
+ {
64717
+ code: "COMPLIANCE_INVALID_STATE_TRANSITION",
64718
+ definition: dapiError({
64719
+ id: "DALP-0501",
64720
+ category: "client",
64721
+ status: 409,
64722
+ message: "Compliance integration cannot transition to the requested state.",
64723
+ why: "The integration is not in a state that permits the requested action (for example, resume requires paused; revoke is terminal).",
64724
+ fix: "Refresh the integration and choose an action that matches its current state.",
64725
+ retryable: false,
64726
+ expectedClientError: true,
64727
+ surfaces: ["orpc-v2-rest", "orpc-rpc"],
64728
+ transports: ["orpc-rest", "orpc-rpc"]
64729
+ })
64730
+ },
64511
64731
  {
64512
64732
  code: "CONTACT_NOT_FOUND",
64513
64733
  definition: dapiError({
@@ -82223,6 +82443,286 @@ var contactsV2Contract = {
82223
82443
  upsert: upsert3,
82224
82444
  delete: del5
82225
82445
  };
82446
+ var ComplianceProviderKindSchema = exports_external2.enum(["sumsub", "elliptic"]);
82447
+ var ComplianceProviderStatusSchema = exports_external2.enum(["pending", "active", "paused", "revoked", "failed"]);
82448
+ var ComplianceProviderLastActivitySchema = exports_external2.discriminatedUnion("kind", [
82449
+ exports_external2.object({
82450
+ kind: exports_external2.literal("verdict"),
82451
+ state: exports_external2.enum(["approved", "rejected", "under_review", "action_required"]).nullable(),
82452
+ outcome: exports_external2.string().nullable(),
82453
+ at: exports_external2.date()
82454
+ }),
82455
+ exports_external2.object({
82456
+ kind: exports_external2.literal("alert"),
82457
+ severity: exports_external2.number().int().min(0).max(100).nullable(),
82458
+ outcome: exports_external2.string().nullable(),
82459
+ at: exports_external2.date()
82460
+ })
82461
+ ]);
82462
+ var ComplianceProviderHealthSchema = exports_external2.object({
82463
+ status: exports_external2.enum(["healthy", "degraded", "unknown"]),
82464
+ checkedAt: exports_external2.date().nullable(),
82465
+ message: exports_external2.string().nullable()
82466
+ });
82467
+ var ComplianceProviderIntegrationSchema = exports_external2.object({
82468
+ id: exports_external2.uuid(),
82469
+ providerKind: ComplianceProviderKindSchema,
82470
+ topicName: claimTopicSchema(),
82471
+ topicId: exports_external2.string().regex(/^\d+$/),
82472
+ status: ComplianceProviderStatusSchema,
82473
+ statusExplanation: exports_external2.string(),
82474
+ issuerEoaAddress: ethereumAddress,
82475
+ webhookUrlToken: exports_external2.uuid(),
82476
+ revocationSeverityThreshold: exports_external2.number().int().min(0).max(100),
82477
+ pendingSecretExpiresAt: exports_external2.date().nullable(),
82478
+ lastActivity: ComplianceProviderLastActivitySchema.nullable(),
82479
+ lastHealthCheck: ComplianceProviderHealthSchema.nullable(),
82480
+ createdAt: exports_external2.date(),
82481
+ updatedAt: exports_external2.date()
82482
+ });
82483
+ var COMPLIANCE_PROVIDER_INTEGRATION_COLLECTION_FIELDS = {
82484
+ providerKind: enumField(ComplianceProviderKindSchema.options, { defaultOperator: "eq" }),
82485
+ topicName: textField({ defaultOperator: "iLike" }),
82486
+ status: enumField(ComplianceProviderStatusSchema.options, { defaultOperator: "eq", facetable: true }),
82487
+ revocationSeverityThreshold: numberField(),
82488
+ createdAt: dateField(),
82489
+ updatedAt: dateField()
82490
+ };
82491
+ var ComplianceProviderIntegrationsListInputSchema = createCollectionInputSchema(COMPLIANCE_PROVIDER_INTEGRATION_COLLECTION_FIELDS, {
82492
+ defaultSort: "-updatedAt",
82493
+ globalSearch: true
82494
+ });
82495
+ var ComplianceProviderIntegrationsListOutputSchema = createPaginatedResponse(ComplianceProviderIntegrationSchema);
82496
+ var ComplianceProviderIntegrationReadInputSchema = exports_external2.object({
82497
+ integrationId: exports_external2.uuid()
82498
+ });
82499
+ var ComplianceProviderIntegrationReadOutputSchema = createSingleResponse(ComplianceProviderIntegrationSchema);
82500
+ var SumsubCredentialsSchema = exports_external2.object({
82501
+ appToken: exports_external2.string().min(1),
82502
+ secretKey: exports_external2.string().min(1)
82503
+ });
82504
+ var EllipticCredentialsSchema = exports_external2.object({
82505
+ apiKey: exports_external2.string().min(1),
82506
+ apiSecret: exports_external2.string().min(1)
82507
+ });
82508
+ var ComplianceProviderCredentialsSchema = exports_external2.discriminatedUnion("providerKind", [
82509
+ exports_external2.object({
82510
+ providerKind: exports_external2.literal("sumsub"),
82511
+ credentials: SumsubCredentialsSchema
82512
+ }),
82513
+ exports_external2.object({
82514
+ providerKind: exports_external2.literal("elliptic"),
82515
+ credentials: EllipticCredentialsSchema
82516
+ })
82517
+ ]);
82518
+ var ComplianceProviderValidateCredentialsInputSchema = ComplianceProviderCredentialsSchema;
82519
+ var ComplianceProviderValidateCredentialsOutputSchema = createSingleResponse(exports_external2.object({
82520
+ valid: exports_external2.boolean(),
82521
+ providerMessage: exports_external2.string().nullable()
82522
+ }));
82523
+ var ComplianceProviderIntegrationCreateInputSchema = ComplianceProviderCredentialsSchema.and(exports_external2.object({
82524
+ topicName: claimTopicSchema(),
82525
+ webhookSigningSecret: exports_external2.string().min(1),
82526
+ revocationSeverityThreshold: exports_external2.number().int().min(0).max(100).default(80)
82527
+ }));
82528
+ var ComplianceProviderIntegrationCreateOutputSchema = ComplianceProviderIntegrationReadOutputSchema;
82529
+ var ComplianceProviderIntegrationStatusActionInputSchema = exports_external2.object({
82530
+ integrationId: exports_external2.uuid()
82531
+ });
82532
+ var ComplianceProviderIntegrationRevokeInputSchema = exports_external2.object({
82533
+ integrationId: exports_external2.uuid()
82534
+ });
82535
+ var ComplianceProviderIntegrationRevokeOutputSchema = createSingleResponse(exports_external2.object({
82536
+ integration: ComplianceProviderIntegrationSchema
82537
+ }));
82538
+ var ComplianceProviderIntegrationUpdatePolicyInputSchema = exports_external2.object({
82539
+ integrationId: exports_external2.uuid(),
82540
+ revocationSeverityThreshold: exports_external2.number().int().min(0).max(100).optional()
82541
+ });
82542
+ var ComplianceProviderIntegrationRotateSecretInputSchema = exports_external2.object({
82543
+ integrationId: exports_external2.uuid(),
82544
+ webhookSigningSecret: exports_external2.string().min(1),
82545
+ graceWindowMinutes: exports_external2.number().int().min(1).max(24 * 60).default(15)
82546
+ });
82547
+ var ComplianceProviderIntegrationMonitoringAlertSchema = exports_external2.object({
82548
+ id: exports_external2.uuid(),
82549
+ providerEventId: exports_external2.string(),
82550
+ subjectAddress: ethereumAddress.nullable(),
82551
+ topicName: exports_external2.string().nullable(),
82552
+ severity: exports_external2.number().int().min(0).max(100).nullable(),
82553
+ outcome: exports_external2.string(),
82554
+ rawPayload: exports_external2.record(exports_external2.string(), exports_external2.unknown()),
82555
+ processedAt: exports_external2.date().nullable(),
82556
+ createdAt: exports_external2.date()
82557
+ });
82558
+ var COMPLIANCE_PROVIDER_MONITORING_COLLECTION_FIELDS = {
82559
+ providerEventId: textField({ defaultOperator: "iLike" }),
82560
+ subjectAddress: textField({ defaultOperator: "iLike" }),
82561
+ severity: numberField(),
82562
+ outcome: textField({ defaultOperator: "eq" }),
82563
+ createdAt: dateField()
82564
+ };
82565
+ var ComplianceProviderMonitoringListInputSchema = createCollectionInputSchema(COMPLIANCE_PROVIDER_MONITORING_COLLECTION_FIELDS, {
82566
+ defaultSort: "-createdAt",
82567
+ globalSearch: true
82568
+ });
82569
+ var ComplianceProviderMonitoringListOutputSchema = createPaginatedResponse(ComplianceProviderIntegrationMonitoringAlertSchema);
82570
+ var ComplianceSubjectCreateApplicantInputSchema = exports_external2.object({
82571
+ integrationId: exports_external2.uuid(),
82572
+ identityAddress: ethereumAddress,
82573
+ applicantHints: exports_external2.object({
82574
+ externalUserId: exports_external2.string().min(1).optional(),
82575
+ level: exports_external2.string().min(1).optional()
82576
+ }).passthrough().optional()
82577
+ });
82578
+ var ComplianceSubjectCreateApplicantResultSchema = exports_external2.object({
82579
+ externalId: exports_external2.string().min(1),
82580
+ redirectUrl: exports_external2.string().url().optional()
82581
+ });
82582
+ var ComplianceSubjectCreateApplicantOutputSchema = createSingleResponse(ComplianceSubjectCreateApplicantResultSchema);
82583
+ var ComplianceSubjectRegisterWalletInputSchema = exports_external2.object({
82584
+ integrationId: exports_external2.uuid(),
82585
+ walletAddress: ethereumAddress
82586
+ });
82587
+ var ComplianceSubjectRegisterWalletResultSchema = exports_external2.object({
82588
+ externalId: exports_external2.string().min(1),
82589
+ identityAddress: ethereumAddress
82590
+ });
82591
+ var ComplianceSubjectRegisterWalletOutputSchema = createSingleResponse(ComplianceSubjectRegisterWalletResultSchema);
82592
+ var listIntegrations = v2Contract.route({
82593
+ method: "GET",
82594
+ path: "/compliance/integrations",
82595
+ description: "List tenant compliance provider integrations with monitoring activity.",
82596
+ successDescription: "Paginated compliance provider integrations.",
82597
+ tags: [V2_TAG.compliance]
82598
+ }).input(v2Input.query(ComplianceProviderIntegrationsListInputSchema)).output(ComplianceProviderIntegrationsListOutputSchema);
82599
+ var createIntegration = v2Contract.route({
82600
+ method: "POST",
82601
+ path: "/compliance/integrations",
82602
+ description: "Create and provision a tenant compliance provider integration.",
82603
+ successDescription: "Compliance provider integration provisioned.",
82604
+ tags: [V2_TAG.compliance]
82605
+ }).input(v2Input.body(ComplianceProviderIntegrationCreateInputSchema)).output(ComplianceProviderIntegrationCreateOutputSchema);
82606
+ var readIntegration = v2Contract.route({
82607
+ method: "GET",
82608
+ path: "/compliance/integrations/{integrationId}",
82609
+ description: "Read a tenant compliance provider integration.",
82610
+ successDescription: "Compliance provider integration retrieved.",
82611
+ tags: [V2_TAG.compliance]
82612
+ }).input(v2Input.params(ComplianceProviderIntegrationReadInputSchema)).output(ComplianceProviderIntegrationReadOutputSchema);
82613
+ var validateCredentials = v2Contract.route({
82614
+ method: "POST",
82615
+ path: "/compliance/integrations/validate-credentials",
82616
+ description: "Validate write-only compliance provider credentials before provisioning starts.",
82617
+ successDescription: "Credential validation result returned.",
82618
+ tags: [V2_TAG.compliance]
82619
+ }).input(v2Input.body(ComplianceProviderValidateCredentialsInputSchema)).output(ComplianceProviderValidateCredentialsOutputSchema);
82620
+ var pauseIntegration = v2Contract.route({
82621
+ method: "POST",
82622
+ path: "/compliance/integrations/{integrationId}/pause",
82623
+ description: "Pause a compliance provider integration.",
82624
+ successDescription: "Compliance provider integration paused.",
82625
+ tags: [V2_TAG.compliance]
82626
+ }).input(v2Input.params(ComplianceProviderIntegrationStatusActionInputSchema)).output(ComplianceProviderIntegrationReadOutputSchema);
82627
+ var resumeIntegration = v2Contract.route({
82628
+ method: "POST",
82629
+ path: "/compliance/integrations/{integrationId}/resume",
82630
+ description: "Resume a paused compliance provider integration.",
82631
+ successDescription: "Compliance provider integration resumed.",
82632
+ tags: [V2_TAG.compliance]
82633
+ }).input(v2Input.params(ComplianceProviderIntegrationStatusActionInputSchema)).output(ComplianceProviderIntegrationReadOutputSchema);
82634
+ var retryProvisioning = v2Contract.route({
82635
+ method: "POST",
82636
+ path: "/compliance/integrations/{integrationId}/retry-provisioning",
82637
+ description: "Retry idempotent provisioning for a failed compliance provider integration.",
82638
+ successDescription: "Compliance provider provisioning retried.",
82639
+ tags: [V2_TAG.compliance]
82640
+ }).input(v2Input.params(ComplianceProviderIntegrationStatusActionInputSchema)).output(ComplianceProviderIntegrationReadOutputSchema);
82641
+ var revokeIntegration = v2Contract.route({
82642
+ method: "POST",
82643
+ path: "/compliance/integrations/{integrationId}/revoke",
82644
+ description: "Revoke a compliance provider integration, optionally revoking previously-issued claims.",
82645
+ successDescription: "Compliance provider integration revoked.",
82646
+ tags: [V2_TAG.compliance]
82647
+ }).input(v2Input.paramsBody(ComplianceProviderIntegrationReadInputSchema, ComplianceProviderIntegrationRevokeInputSchema.omit({ integrationId: true }))).output(ComplianceProviderIntegrationRevokeOutputSchema);
82648
+ var updatePolicy = v2Contract.route({
82649
+ method: "PATCH",
82650
+ path: "/compliance/integrations/{integrationId}/policy",
82651
+ description: "Update the revocation severity threshold for a compliance provider integration.",
82652
+ successDescription: "Compliance provider integration policy updated.",
82653
+ tags: [V2_TAG.compliance]
82654
+ }).input(v2Input.paramsBody(ComplianceProviderIntegrationReadInputSchema, ComplianceProviderIntegrationUpdatePolicyInputSchema.omit({ integrationId: true }))).output(ComplianceProviderIntegrationReadOutputSchema);
82655
+ var rotateSecret = v2Contract.route({
82656
+ method: "POST",
82657
+ path: "/compliance/integrations/{integrationId}/rotate-secret",
82658
+ description: "Stage a pending webhook signing secret with a bounded dual-secret grace window.",
82659
+ successDescription: "Webhook signing secret rotation staged.",
82660
+ tags: [V2_TAG.compliance]
82661
+ }).input(v2Input.paramsBody(ComplianceProviderIntegrationReadInputSchema, ComplianceProviderIntegrationRotateSecretInputSchema.omit({ integrationId: true }))).output(ComplianceProviderIntegrationReadOutputSchema);
82662
+ var promoteSecret = v2Contract.route({
82663
+ method: "POST",
82664
+ path: "/compliance/integrations/{integrationId}/promote-secret",
82665
+ description: "Promote a pending webhook signing secret immediately.",
82666
+ successDescription: "Pending webhook signing secret promoted.",
82667
+ tags: [V2_TAG.compliance]
82668
+ }).input(v2Input.params(ComplianceProviderIntegrationReadInputSchema)).output(ComplianceProviderIntegrationReadOutputSchema);
82669
+ var cancelSecretRotation = v2Contract.route({
82670
+ method: "POST",
82671
+ path: "/compliance/integrations/{integrationId}/cancel-secret-rotation",
82672
+ description: "Discard a pending webhook signing secret before the grace window ends.",
82673
+ successDescription: "Pending webhook signing secret discarded.",
82674
+ tags: [V2_TAG.compliance]
82675
+ }).input(v2Input.params(ComplianceProviderIntegrationReadInputSchema)).output(ComplianceProviderIntegrationReadOutputSchema);
82676
+ var health = v2Contract.route({
82677
+ method: "GET",
82678
+ path: "/compliance/integrations/{integrationId}/health",
82679
+ description: "Check stored credential/secret references for a compliance provider integration.",
82680
+ successDescription: "Compliance provider integration health returned.",
82681
+ tags: [V2_TAG.compliance]
82682
+ }).input(v2Input.params(ComplianceProviderIntegrationReadInputSchema)).output(ComplianceProviderIntegrationReadOutputSchema);
82683
+ var listMonitoring = v2Contract.route({
82684
+ method: "GET",
82685
+ path: "/compliance/integrations/{integrationId}/monitoring",
82686
+ description: "List monitoring alerts for a compliance provider integration.",
82687
+ successDescription: "Paginated monitoring alert history.",
82688
+ tags: [V2_TAG.compliance]
82689
+ }).input(v2Input.paramsQuery(ComplianceProviderIntegrationReadInputSchema, ComplianceProviderMonitoringListInputSchema)).output(ComplianceProviderMonitoringListOutputSchema);
82690
+ var createApplicant = v2Contract.route({
82691
+ method: "POST",
82692
+ path: "/compliance/subjects/create-applicant",
82693
+ description: "Create a provider applicant for a compliance integration and persist the DALP subject mapping.",
82694
+ successDescription: "Provider applicant created and mapped.",
82695
+ tags: [V2_TAG.compliance]
82696
+ }).input(v2Input.body(ComplianceSubjectCreateApplicantInputSchema)).output(ComplianceSubjectCreateApplicantOutputSchema);
82697
+ var registerWallet = v2Contract.route({
82698
+ method: "POST",
82699
+ path: "/compliance/subjects/register-wallet",
82700
+ description: "Register a wallet with a monitoring provider and persist the wallet-to-identity subject mapping.",
82701
+ successDescription: "Provider wallet subject registered and mapped.",
82702
+ tags: [V2_TAG.compliance]
82703
+ }).input(v2Input.body(ComplianceSubjectRegisterWalletInputSchema)).output(ComplianceSubjectRegisterWalletOutputSchema);
82704
+ var complianceV2Contract = {
82705
+ integrations: {
82706
+ list: listIntegrations,
82707
+ create: createIntegration,
82708
+ read: readIntegration,
82709
+ validateCredentials,
82710
+ pause: pauseIntegration,
82711
+ resume: resumeIntegration,
82712
+ retryProvisioning,
82713
+ revoke: revokeIntegration,
82714
+ updatePolicy,
82715
+ rotateSecret,
82716
+ promoteSecret,
82717
+ cancelSecretRotation,
82718
+ health,
82719
+ monitoring: listMonitoring
82720
+ },
82721
+ subjects: {
82722
+ createApplicant,
82723
+ registerWallet
82724
+ }
82725
+ };
82226
82726
  var FX_PROVIDERS = ["er-api", "ECB", "manual"];
82227
82727
  var ExchangeRateHistoryV2ItemSchema = exports_external2.object({
82228
82728
  baseCurrency: fiatCurrency().meta({
@@ -87834,6 +88334,7 @@ var v2Contract2 = {
87834
88334
  },
87835
88335
  organization: organizationV2Contract,
87836
88336
  contacts: contactsV2Contract,
88337
+ compliance: complianceV2Contract,
87837
88338
  exchangeRates: exchangeRatesV2Contract,
87838
88339
  externalToken: externalTokenV2Contract,
87839
88340
  identityRecovery: identityRecoveryV2Contract,
@@ -88046,7 +88547,7 @@ function normalizeDalpBaseUrl(url3) {
88046
88547
  }
88047
88548
  var package_default = {
88048
88549
  name: "@settlemint/dalp-sdk",
88049
- version: "2.1.7-main.25523277805",
88550
+ version: "2.1.7-main.25539666483",
88050
88551
  private: false,
88051
88552
  description: "Fully typed SDK for the DALP tokenization platform API",
88052
88553
  homepage: "https://settlemint.com",
@@ -88605,7 +89106,7 @@ function trimConfigValue(name, value3) {
88605
89106
  // package.json
88606
89107
  var package_default2 = {
88607
89108
  name: "@settlemint/dalp-cli",
88608
- version: "2.1.7-main.25523277805",
89109
+ version: "2.1.7-main.25539666483",
88609
89110
  private: false,
88610
89111
  description: "CLI for the Digital Asset Lifecycle Platform — manage tokens, identities, compliance, and more from the command line.",
88611
89112
  homepage: "https://settlemint.com",
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@settlemint/dalp-cli",
3
- "version": "2.1.7-main.25523277805",
3
+ "version": "2.1.7-main.25539666483",
4
4
  "private": false,
5
5
  "description": "CLI for the Digital Asset Lifecycle Platform — manage tokens, identities, compliance, and more from the command line.",
6
6
  "homepage": "https://settlemint.com",