@settlemint/dalp-cli 2.1.7-main.25523277805 → 2.1.7-main.25539666483
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/dalp.js +503 -2
- package/package.json +1 -1
package/dist/dalp.js
CHANGED
|
@@ -64508,6 +64508,226 @@ var DAPI_ROUTE_ERROR_ENTRIES = [
|
|
|
64508
64508
|
expectedClientError: true
|
|
64509
64509
|
})
|
|
64510
64510
|
},
|
|
64511
|
+
{
|
|
64512
|
+
code: "COMPLIANCE_SIGNATURE_INVALID",
|
|
64513
|
+
definition: dapiError({
|
|
64514
|
+
id: "DALP-0488",
|
|
64515
|
+
category: "auth",
|
|
64516
|
+
status: 401,
|
|
64517
|
+
message: "Webhook authentication failed.",
|
|
64518
|
+
why: "The compliance webhook signature or URL token could not be verified against the integration credentials.",
|
|
64519
|
+
fix: "Verify the provider webhook URL and signing secret configuration, then send a freshly signed event.",
|
|
64520
|
+
retryable: false,
|
|
64521
|
+
expectedClientError: true,
|
|
64522
|
+
surfaces: ["unknown-hono"],
|
|
64523
|
+
transports: ["hono"]
|
|
64524
|
+
})
|
|
64525
|
+
},
|
|
64526
|
+
{
|
|
64527
|
+
code: "COMPLIANCE_REPLAY_WINDOW_EXCEEDED",
|
|
64528
|
+
definition: dapiError({
|
|
64529
|
+
id: "DALP-0489",
|
|
64530
|
+
category: "client",
|
|
64531
|
+
status: 400,
|
|
64532
|
+
message: "Webhook timestamp is outside the accepted replay window.",
|
|
64533
|
+
why: "The compliance webhook timestamp was more than five minutes away from the server clock.",
|
|
64534
|
+
fix: "Send a fresh provider event with a current timestamp and verify clock synchronization for the provider integration.",
|
|
64535
|
+
retryable: false,
|
|
64536
|
+
expectedClientError: true,
|
|
64537
|
+
surfaces: ["unknown-hono"],
|
|
64538
|
+
transports: ["hono"]
|
|
64539
|
+
})
|
|
64540
|
+
},
|
|
64541
|
+
{
|
|
64542
|
+
code: "COMPLIANCE_SUBJECT_MAPPING_MISSING",
|
|
64543
|
+
definition: dapiError({
|
|
64544
|
+
id: "DALP-0490",
|
|
64545
|
+
category: "domain",
|
|
64546
|
+
status: 404,
|
|
64547
|
+
message: "Compliance subject mapping was not found.",
|
|
64548
|
+
why: "A compliance webhook referenced an external subject ID that has not been mapped to a DALP identity or wallet.",
|
|
64549
|
+
fix: "Create the subject through DALP before accepting provider webhooks for that external ID, or reconcile the event from the audit log.",
|
|
64550
|
+
retryable: false,
|
|
64551
|
+
expectedClientError: true,
|
|
64552
|
+
surfaces: ["unknown-hono", "dependency-restate"],
|
|
64553
|
+
transports: ["hono", "background"],
|
|
64554
|
+
authSensitivity: {
|
|
64555
|
+
existenceDisclosure: "conceal",
|
|
64556
|
+
rationale: "Subject mappings are tenant scoped; unknown and unauthorized subjects must not reveal tenant membership."
|
|
64557
|
+
}
|
|
64558
|
+
})
|
|
64559
|
+
},
|
|
64560
|
+
{
|
|
64561
|
+
code: "COMPLIANCE_INTEGRATION_PAUSED",
|
|
64562
|
+
definition: dapiError({
|
|
64563
|
+
id: "DALP-0491",
|
|
64564
|
+
category: "domain",
|
|
64565
|
+
status: 404,
|
|
64566
|
+
message: "Compliance integration is not accepting webhook events.",
|
|
64567
|
+
why: "The webhook target is not currently available for compliance event intake.",
|
|
64568
|
+
fix: "Verify the integration configuration and resume the integration before sending more provider events.",
|
|
64569
|
+
retryable: false,
|
|
64570
|
+
expectedClientError: true,
|
|
64571
|
+
surfaces: ["unknown-hono"],
|
|
64572
|
+
transports: ["hono"],
|
|
64573
|
+
authSensitivity: {
|
|
64574
|
+
existenceDisclosure: "conceal",
|
|
64575
|
+
rationale: "Unknown integration IDs intentionally return this same public shape to avoid a tenant integration existence oracle."
|
|
64576
|
+
}
|
|
64577
|
+
})
|
|
64578
|
+
},
|
|
64579
|
+
{
|
|
64580
|
+
code: "COMPLIANCE_INTEGRATION_FAILED",
|
|
64581
|
+
definition: dapiError({
|
|
64582
|
+
id: "DALP-0492",
|
|
64583
|
+
category: "domain",
|
|
64584
|
+
status: 409,
|
|
64585
|
+
message: "Compliance integration is in a failed state.",
|
|
64586
|
+
why: "The compliance integration failed provisioning or health checks and cannot process provider events.",
|
|
64587
|
+
fix: "Repair or reprovision the integration before retrying webhook processing.",
|
|
64588
|
+
retryable: false,
|
|
64589
|
+
expectedClientError: true,
|
|
64590
|
+
surfaces: ["unknown-hono", "orpc-v2-rest", "orpc-rpc"],
|
|
64591
|
+
transports: ["hono", "orpc-rest", "orpc-rpc"]
|
|
64592
|
+
})
|
|
64593
|
+
},
|
|
64594
|
+
{
|
|
64595
|
+
code: "COMPLIANCE_UNMAPPED_EVENT",
|
|
64596
|
+
definition: dapiError({
|
|
64597
|
+
id: "DALP-0493",
|
|
64598
|
+
category: "domain",
|
|
64599
|
+
status: 422,
|
|
64600
|
+
message: "Compliance provider event could not be mapped.",
|
|
64601
|
+
why: "The provider payload did not match a supported ClaimSource verdict or monitoring-alert shape and was persisted for audit.",
|
|
64602
|
+
fix: "Review the provider event type and update the adapter mapping before replaying the event.",
|
|
64603
|
+
retryable: false,
|
|
64604
|
+
expectedClientError: true,
|
|
64605
|
+
surfaces: ["unknown-hono", "dependency-restate"],
|
|
64606
|
+
transports: ["hono", "background"]
|
|
64607
|
+
})
|
|
64608
|
+
},
|
|
64609
|
+
{
|
|
64610
|
+
code: "COMPLIANCE_OUT_OF_ORDER_EVENT",
|
|
64611
|
+
definition: dapiError({
|
|
64612
|
+
id: "DALP-0494",
|
|
64613
|
+
category: "domain",
|
|
64614
|
+
status: 409,
|
|
64615
|
+
message: "Compliance provider event is older than the current subject state.",
|
|
64616
|
+
why: "The event timestamp or sequence is behind the last applied event for the same integration, subject, and topic.",
|
|
64617
|
+
fix: "Do not replay stale provider events; inspect the audit event if the provider's ordering guarantees appear broken.",
|
|
64618
|
+
retryable: false,
|
|
64619
|
+
expectedClientError: true,
|
|
64620
|
+
surfaces: ["dependency-restate"],
|
|
64621
|
+
transports: ["background"]
|
|
64622
|
+
})
|
|
64623
|
+
},
|
|
64624
|
+
{
|
|
64625
|
+
code: "COMPLIANCE_PROVIDER_HEALTH_CHECK_FAILED",
|
|
64626
|
+
definition: dapiError({
|
|
64627
|
+
id: "DALP-0495",
|
|
64628
|
+
category: "dependency",
|
|
64629
|
+
status: 503,
|
|
64630
|
+
message: "Compliance provider health check failed.",
|
|
64631
|
+
why: "DAPI could not reach the provider health endpoint or the provider returned an unhealthy response.",
|
|
64632
|
+
fix: "Retry after a short backoff; if the failure persists, verify provider availability and the integration credentials.",
|
|
64633
|
+
retryable: true,
|
|
64634
|
+
expectedClientError: false,
|
|
64635
|
+
surfaces: ["orpc-v2-rest", "orpc-rpc"],
|
|
64636
|
+
transports: ["orpc-rest", "orpc-rpc"]
|
|
64637
|
+
})
|
|
64638
|
+
},
|
|
64639
|
+
{
|
|
64640
|
+
code: "COMPLIANCE_APPLICANT_CREATE_FAILED",
|
|
64641
|
+
definition: dapiError({
|
|
64642
|
+
id: "DALP-0496",
|
|
64643
|
+
category: "dependency",
|
|
64644
|
+
status: 502,
|
|
64645
|
+
message: "Compliance provider rejected applicant creation.",
|
|
64646
|
+
why: "The provider applicant or monitored-subject creation call failed before DALP could persist the subject mapping.",
|
|
64647
|
+
fix: "Verify provider credentials and the submitted subject fields, then retry applicant creation.",
|
|
64648
|
+
retryable: false,
|
|
64649
|
+
expectedClientError: false,
|
|
64650
|
+
surfaces: ["orpc-v2-rest", "orpc-rpc", "dependency-restate"],
|
|
64651
|
+
transports: ["orpc-rest", "orpc-rpc", "background"]
|
|
64652
|
+
})
|
|
64653
|
+
},
|
|
64654
|
+
{
|
|
64655
|
+
code: "COMPLIANCE_TIR_REGISTRATION_FAILED",
|
|
64656
|
+
definition: dapiError({
|
|
64657
|
+
id: "DALP-0497",
|
|
64658
|
+
category: "contract",
|
|
64659
|
+
status: 502,
|
|
64660
|
+
message: "Compliance trusted-issuer registration failed.",
|
|
64661
|
+
why: "The tenant trusted issuer registry rejected the provider issuer EOA registration transaction.",
|
|
64662
|
+
fix: "Verify the provider issuer address, claim topic, tenant registry address, and transaction trace before retrying provisioning.",
|
|
64663
|
+
retryable: false,
|
|
64664
|
+
expectedClientError: false,
|
|
64665
|
+
surfaces: ["dependency-restate"],
|
|
64666
|
+
transports: ["background"]
|
|
64667
|
+
})
|
|
64668
|
+
},
|
|
64669
|
+
{
|
|
64670
|
+
code: "COMPLIANCE_TOPIC_MISMATCH",
|
|
64671
|
+
definition: dapiError({
|
|
64672
|
+
id: "DALP-0498",
|
|
64673
|
+
category: "domain",
|
|
64674
|
+
status: 400,
|
|
64675
|
+
message: "Compliance provider event topic does not match the integration.",
|
|
64676
|
+
why: "The webhook payload declared a claim topic different from the single topic configured for the integration.",
|
|
64677
|
+
fix: "Send the event to an integration configured for that topic, or correct the provider adapter topic mapping.",
|
|
64678
|
+
retryable: false,
|
|
64679
|
+
expectedClientError: true,
|
|
64680
|
+
surfaces: ["unknown-hono", "dependency-restate"],
|
|
64681
|
+
transports: ["hono", "background"]
|
|
64682
|
+
})
|
|
64683
|
+
},
|
|
64684
|
+
{
|
|
64685
|
+
code: "COMPLIANCE_WALLET_NOT_REGISTERED",
|
|
64686
|
+
definition: dapiError({
|
|
64687
|
+
id: "DALP-0499",
|
|
64688
|
+
category: "domain",
|
|
64689
|
+
status: 404,
|
|
64690
|
+
message: "Wallet does not have an associated OnchainID identity.",
|
|
64691
|
+
why: "A wallet-subject compliance provider event referenced a wallet that DALP could not resolve to an OnchainID identity.",
|
|
64692
|
+
fix: "Register the wallet to an OnchainID identity before creating or replaying the compliance subject mapping.",
|
|
64693
|
+
retryable: false,
|
|
64694
|
+
expectedClientError: true,
|
|
64695
|
+
authSensitivity: {
|
|
64696
|
+
existenceDisclosure: "conceal",
|
|
64697
|
+
rationale: "Wallet-to-identity mappings are tenant scoped and must not reveal whether another tenant has registered the wallet."
|
|
64698
|
+
}
|
|
64699
|
+
})
|
|
64700
|
+
},
|
|
64701
|
+
{
|
|
64702
|
+
code: "COMPLIANCE_SECRET_ROTATION_GRACE_EXPIRED",
|
|
64703
|
+
definition: dapiError({
|
|
64704
|
+
id: "DALP-0500",
|
|
64705
|
+
category: "domain",
|
|
64706
|
+
status: 410,
|
|
64707
|
+
message: "Compliance webhook signing secret rotation grace period expired.",
|
|
64708
|
+
why: "The pending webhook signing secret expired before it was promoted to the active secret.",
|
|
64709
|
+
fix: "Start a new secret rotation and update the provider dashboard with the active webhook signing secret.",
|
|
64710
|
+
retryable: false,
|
|
64711
|
+
expectedClientError: true,
|
|
64712
|
+
surfaces: ["orpc-v2-rest", "orpc-rpc", "unknown-hono"],
|
|
64713
|
+
transports: ["orpc-rest", "orpc-rpc", "hono"]
|
|
64714
|
+
})
|
|
64715
|
+
},
|
|
64716
|
+
{
|
|
64717
|
+
code: "COMPLIANCE_INVALID_STATE_TRANSITION",
|
|
64718
|
+
definition: dapiError({
|
|
64719
|
+
id: "DALP-0501",
|
|
64720
|
+
category: "client",
|
|
64721
|
+
status: 409,
|
|
64722
|
+
message: "Compliance integration cannot transition to the requested state.",
|
|
64723
|
+
why: "The integration is not in a state that permits the requested action (for example, resume requires paused; revoke is terminal).",
|
|
64724
|
+
fix: "Refresh the integration and choose an action that matches its current state.",
|
|
64725
|
+
retryable: false,
|
|
64726
|
+
expectedClientError: true,
|
|
64727
|
+
surfaces: ["orpc-v2-rest", "orpc-rpc"],
|
|
64728
|
+
transports: ["orpc-rest", "orpc-rpc"]
|
|
64729
|
+
})
|
|
64730
|
+
},
|
|
64511
64731
|
{
|
|
64512
64732
|
code: "CONTACT_NOT_FOUND",
|
|
64513
64733
|
definition: dapiError({
|
|
@@ -82223,6 +82443,286 @@ var contactsV2Contract = {
|
|
|
82223
82443
|
upsert: upsert3,
|
|
82224
82444
|
delete: del5
|
|
82225
82445
|
};
|
|
82446
|
+
var ComplianceProviderKindSchema = exports_external2.enum(["sumsub", "elliptic"]);
|
|
82447
|
+
var ComplianceProviderStatusSchema = exports_external2.enum(["pending", "active", "paused", "revoked", "failed"]);
|
|
82448
|
+
var ComplianceProviderLastActivitySchema = exports_external2.discriminatedUnion("kind", [
|
|
82449
|
+
exports_external2.object({
|
|
82450
|
+
kind: exports_external2.literal("verdict"),
|
|
82451
|
+
state: exports_external2.enum(["approved", "rejected", "under_review", "action_required"]).nullable(),
|
|
82452
|
+
outcome: exports_external2.string().nullable(),
|
|
82453
|
+
at: exports_external2.date()
|
|
82454
|
+
}),
|
|
82455
|
+
exports_external2.object({
|
|
82456
|
+
kind: exports_external2.literal("alert"),
|
|
82457
|
+
severity: exports_external2.number().int().min(0).max(100).nullable(),
|
|
82458
|
+
outcome: exports_external2.string().nullable(),
|
|
82459
|
+
at: exports_external2.date()
|
|
82460
|
+
})
|
|
82461
|
+
]);
|
|
82462
|
+
var ComplianceProviderHealthSchema = exports_external2.object({
|
|
82463
|
+
status: exports_external2.enum(["healthy", "degraded", "unknown"]),
|
|
82464
|
+
checkedAt: exports_external2.date().nullable(),
|
|
82465
|
+
message: exports_external2.string().nullable()
|
|
82466
|
+
});
|
|
82467
|
+
var ComplianceProviderIntegrationSchema = exports_external2.object({
|
|
82468
|
+
id: exports_external2.uuid(),
|
|
82469
|
+
providerKind: ComplianceProviderKindSchema,
|
|
82470
|
+
topicName: claimTopicSchema(),
|
|
82471
|
+
topicId: exports_external2.string().regex(/^\d+$/),
|
|
82472
|
+
status: ComplianceProviderStatusSchema,
|
|
82473
|
+
statusExplanation: exports_external2.string(),
|
|
82474
|
+
issuerEoaAddress: ethereumAddress,
|
|
82475
|
+
webhookUrlToken: exports_external2.uuid(),
|
|
82476
|
+
revocationSeverityThreshold: exports_external2.number().int().min(0).max(100),
|
|
82477
|
+
pendingSecretExpiresAt: exports_external2.date().nullable(),
|
|
82478
|
+
lastActivity: ComplianceProviderLastActivitySchema.nullable(),
|
|
82479
|
+
lastHealthCheck: ComplianceProviderHealthSchema.nullable(),
|
|
82480
|
+
createdAt: exports_external2.date(),
|
|
82481
|
+
updatedAt: exports_external2.date()
|
|
82482
|
+
});
|
|
82483
|
+
var COMPLIANCE_PROVIDER_INTEGRATION_COLLECTION_FIELDS = {
|
|
82484
|
+
providerKind: enumField(ComplianceProviderKindSchema.options, { defaultOperator: "eq" }),
|
|
82485
|
+
topicName: textField({ defaultOperator: "iLike" }),
|
|
82486
|
+
status: enumField(ComplianceProviderStatusSchema.options, { defaultOperator: "eq", facetable: true }),
|
|
82487
|
+
revocationSeverityThreshold: numberField(),
|
|
82488
|
+
createdAt: dateField(),
|
|
82489
|
+
updatedAt: dateField()
|
|
82490
|
+
};
|
|
82491
|
+
var ComplianceProviderIntegrationsListInputSchema = createCollectionInputSchema(COMPLIANCE_PROVIDER_INTEGRATION_COLLECTION_FIELDS, {
|
|
82492
|
+
defaultSort: "-updatedAt",
|
|
82493
|
+
globalSearch: true
|
|
82494
|
+
});
|
|
82495
|
+
var ComplianceProviderIntegrationsListOutputSchema = createPaginatedResponse(ComplianceProviderIntegrationSchema);
|
|
82496
|
+
var ComplianceProviderIntegrationReadInputSchema = exports_external2.object({
|
|
82497
|
+
integrationId: exports_external2.uuid()
|
|
82498
|
+
});
|
|
82499
|
+
var ComplianceProviderIntegrationReadOutputSchema = createSingleResponse(ComplianceProviderIntegrationSchema);
|
|
82500
|
+
var SumsubCredentialsSchema = exports_external2.object({
|
|
82501
|
+
appToken: exports_external2.string().min(1),
|
|
82502
|
+
secretKey: exports_external2.string().min(1)
|
|
82503
|
+
});
|
|
82504
|
+
var EllipticCredentialsSchema = exports_external2.object({
|
|
82505
|
+
apiKey: exports_external2.string().min(1),
|
|
82506
|
+
apiSecret: exports_external2.string().min(1)
|
|
82507
|
+
});
|
|
82508
|
+
var ComplianceProviderCredentialsSchema = exports_external2.discriminatedUnion("providerKind", [
|
|
82509
|
+
exports_external2.object({
|
|
82510
|
+
providerKind: exports_external2.literal("sumsub"),
|
|
82511
|
+
credentials: SumsubCredentialsSchema
|
|
82512
|
+
}),
|
|
82513
|
+
exports_external2.object({
|
|
82514
|
+
providerKind: exports_external2.literal("elliptic"),
|
|
82515
|
+
credentials: EllipticCredentialsSchema
|
|
82516
|
+
})
|
|
82517
|
+
]);
|
|
82518
|
+
var ComplianceProviderValidateCredentialsInputSchema = ComplianceProviderCredentialsSchema;
|
|
82519
|
+
var ComplianceProviderValidateCredentialsOutputSchema = createSingleResponse(exports_external2.object({
|
|
82520
|
+
valid: exports_external2.boolean(),
|
|
82521
|
+
providerMessage: exports_external2.string().nullable()
|
|
82522
|
+
}));
|
|
82523
|
+
var ComplianceProviderIntegrationCreateInputSchema = ComplianceProviderCredentialsSchema.and(exports_external2.object({
|
|
82524
|
+
topicName: claimTopicSchema(),
|
|
82525
|
+
webhookSigningSecret: exports_external2.string().min(1),
|
|
82526
|
+
revocationSeverityThreshold: exports_external2.number().int().min(0).max(100).default(80)
|
|
82527
|
+
}));
|
|
82528
|
+
var ComplianceProviderIntegrationCreateOutputSchema = ComplianceProviderIntegrationReadOutputSchema;
|
|
82529
|
+
var ComplianceProviderIntegrationStatusActionInputSchema = exports_external2.object({
|
|
82530
|
+
integrationId: exports_external2.uuid()
|
|
82531
|
+
});
|
|
82532
|
+
var ComplianceProviderIntegrationRevokeInputSchema = exports_external2.object({
|
|
82533
|
+
integrationId: exports_external2.uuid()
|
|
82534
|
+
});
|
|
82535
|
+
var ComplianceProviderIntegrationRevokeOutputSchema = createSingleResponse(exports_external2.object({
|
|
82536
|
+
integration: ComplianceProviderIntegrationSchema
|
|
82537
|
+
}));
|
|
82538
|
+
var ComplianceProviderIntegrationUpdatePolicyInputSchema = exports_external2.object({
|
|
82539
|
+
integrationId: exports_external2.uuid(),
|
|
82540
|
+
revocationSeverityThreshold: exports_external2.number().int().min(0).max(100).optional()
|
|
82541
|
+
});
|
|
82542
|
+
var ComplianceProviderIntegrationRotateSecretInputSchema = exports_external2.object({
|
|
82543
|
+
integrationId: exports_external2.uuid(),
|
|
82544
|
+
webhookSigningSecret: exports_external2.string().min(1),
|
|
82545
|
+
graceWindowMinutes: exports_external2.number().int().min(1).max(24 * 60).default(15)
|
|
82546
|
+
});
|
|
82547
|
+
var ComplianceProviderIntegrationMonitoringAlertSchema = exports_external2.object({
|
|
82548
|
+
id: exports_external2.uuid(),
|
|
82549
|
+
providerEventId: exports_external2.string(),
|
|
82550
|
+
subjectAddress: ethereumAddress.nullable(),
|
|
82551
|
+
topicName: exports_external2.string().nullable(),
|
|
82552
|
+
severity: exports_external2.number().int().min(0).max(100).nullable(),
|
|
82553
|
+
outcome: exports_external2.string(),
|
|
82554
|
+
rawPayload: exports_external2.record(exports_external2.string(), exports_external2.unknown()),
|
|
82555
|
+
processedAt: exports_external2.date().nullable(),
|
|
82556
|
+
createdAt: exports_external2.date()
|
|
82557
|
+
});
|
|
82558
|
+
var COMPLIANCE_PROVIDER_MONITORING_COLLECTION_FIELDS = {
|
|
82559
|
+
providerEventId: textField({ defaultOperator: "iLike" }),
|
|
82560
|
+
subjectAddress: textField({ defaultOperator: "iLike" }),
|
|
82561
|
+
severity: numberField(),
|
|
82562
|
+
outcome: textField({ defaultOperator: "eq" }),
|
|
82563
|
+
createdAt: dateField()
|
|
82564
|
+
};
|
|
82565
|
+
var ComplianceProviderMonitoringListInputSchema = createCollectionInputSchema(COMPLIANCE_PROVIDER_MONITORING_COLLECTION_FIELDS, {
|
|
82566
|
+
defaultSort: "-createdAt",
|
|
82567
|
+
globalSearch: true
|
|
82568
|
+
});
|
|
82569
|
+
var ComplianceProviderMonitoringListOutputSchema = createPaginatedResponse(ComplianceProviderIntegrationMonitoringAlertSchema);
|
|
82570
|
+
var ComplianceSubjectCreateApplicantInputSchema = exports_external2.object({
|
|
82571
|
+
integrationId: exports_external2.uuid(),
|
|
82572
|
+
identityAddress: ethereumAddress,
|
|
82573
|
+
applicantHints: exports_external2.object({
|
|
82574
|
+
externalUserId: exports_external2.string().min(1).optional(),
|
|
82575
|
+
level: exports_external2.string().min(1).optional()
|
|
82576
|
+
}).passthrough().optional()
|
|
82577
|
+
});
|
|
82578
|
+
var ComplianceSubjectCreateApplicantResultSchema = exports_external2.object({
|
|
82579
|
+
externalId: exports_external2.string().min(1),
|
|
82580
|
+
redirectUrl: exports_external2.string().url().optional()
|
|
82581
|
+
});
|
|
82582
|
+
var ComplianceSubjectCreateApplicantOutputSchema = createSingleResponse(ComplianceSubjectCreateApplicantResultSchema);
|
|
82583
|
+
var ComplianceSubjectRegisterWalletInputSchema = exports_external2.object({
|
|
82584
|
+
integrationId: exports_external2.uuid(),
|
|
82585
|
+
walletAddress: ethereumAddress
|
|
82586
|
+
});
|
|
82587
|
+
var ComplianceSubjectRegisterWalletResultSchema = exports_external2.object({
|
|
82588
|
+
externalId: exports_external2.string().min(1),
|
|
82589
|
+
identityAddress: ethereumAddress
|
|
82590
|
+
});
|
|
82591
|
+
var ComplianceSubjectRegisterWalletOutputSchema = createSingleResponse(ComplianceSubjectRegisterWalletResultSchema);
|
|
82592
|
+
var listIntegrations = v2Contract.route({
|
|
82593
|
+
method: "GET",
|
|
82594
|
+
path: "/compliance/integrations",
|
|
82595
|
+
description: "List tenant compliance provider integrations with monitoring activity.",
|
|
82596
|
+
successDescription: "Paginated compliance provider integrations.",
|
|
82597
|
+
tags: [V2_TAG.compliance]
|
|
82598
|
+
}).input(v2Input.query(ComplianceProviderIntegrationsListInputSchema)).output(ComplianceProviderIntegrationsListOutputSchema);
|
|
82599
|
+
var createIntegration = v2Contract.route({
|
|
82600
|
+
method: "POST",
|
|
82601
|
+
path: "/compliance/integrations",
|
|
82602
|
+
description: "Create and provision a tenant compliance provider integration.",
|
|
82603
|
+
successDescription: "Compliance provider integration provisioned.",
|
|
82604
|
+
tags: [V2_TAG.compliance]
|
|
82605
|
+
}).input(v2Input.body(ComplianceProviderIntegrationCreateInputSchema)).output(ComplianceProviderIntegrationCreateOutputSchema);
|
|
82606
|
+
var readIntegration = v2Contract.route({
|
|
82607
|
+
method: "GET",
|
|
82608
|
+
path: "/compliance/integrations/{integrationId}",
|
|
82609
|
+
description: "Read a tenant compliance provider integration.",
|
|
82610
|
+
successDescription: "Compliance provider integration retrieved.",
|
|
82611
|
+
tags: [V2_TAG.compliance]
|
|
82612
|
+
}).input(v2Input.params(ComplianceProviderIntegrationReadInputSchema)).output(ComplianceProviderIntegrationReadOutputSchema);
|
|
82613
|
+
var validateCredentials = v2Contract.route({
|
|
82614
|
+
method: "POST",
|
|
82615
|
+
path: "/compliance/integrations/validate-credentials",
|
|
82616
|
+
description: "Validate write-only compliance provider credentials before provisioning starts.",
|
|
82617
|
+
successDescription: "Credential validation result returned.",
|
|
82618
|
+
tags: [V2_TAG.compliance]
|
|
82619
|
+
}).input(v2Input.body(ComplianceProviderValidateCredentialsInputSchema)).output(ComplianceProviderValidateCredentialsOutputSchema);
|
|
82620
|
+
var pauseIntegration = v2Contract.route({
|
|
82621
|
+
method: "POST",
|
|
82622
|
+
path: "/compliance/integrations/{integrationId}/pause",
|
|
82623
|
+
description: "Pause a compliance provider integration.",
|
|
82624
|
+
successDescription: "Compliance provider integration paused.",
|
|
82625
|
+
tags: [V2_TAG.compliance]
|
|
82626
|
+
}).input(v2Input.params(ComplianceProviderIntegrationStatusActionInputSchema)).output(ComplianceProviderIntegrationReadOutputSchema);
|
|
82627
|
+
var resumeIntegration = v2Contract.route({
|
|
82628
|
+
method: "POST",
|
|
82629
|
+
path: "/compliance/integrations/{integrationId}/resume",
|
|
82630
|
+
description: "Resume a paused compliance provider integration.",
|
|
82631
|
+
successDescription: "Compliance provider integration resumed.",
|
|
82632
|
+
tags: [V2_TAG.compliance]
|
|
82633
|
+
}).input(v2Input.params(ComplianceProviderIntegrationStatusActionInputSchema)).output(ComplianceProviderIntegrationReadOutputSchema);
|
|
82634
|
+
var retryProvisioning = v2Contract.route({
|
|
82635
|
+
method: "POST",
|
|
82636
|
+
path: "/compliance/integrations/{integrationId}/retry-provisioning",
|
|
82637
|
+
description: "Retry idempotent provisioning for a failed compliance provider integration.",
|
|
82638
|
+
successDescription: "Compliance provider provisioning retried.",
|
|
82639
|
+
tags: [V2_TAG.compliance]
|
|
82640
|
+
}).input(v2Input.params(ComplianceProviderIntegrationStatusActionInputSchema)).output(ComplianceProviderIntegrationReadOutputSchema);
|
|
82641
|
+
var revokeIntegration = v2Contract.route({
|
|
82642
|
+
method: "POST",
|
|
82643
|
+
path: "/compliance/integrations/{integrationId}/revoke",
|
|
82644
|
+
description: "Revoke a compliance provider integration, optionally revoking previously-issued claims.",
|
|
82645
|
+
successDescription: "Compliance provider integration revoked.",
|
|
82646
|
+
tags: [V2_TAG.compliance]
|
|
82647
|
+
}).input(v2Input.paramsBody(ComplianceProviderIntegrationReadInputSchema, ComplianceProviderIntegrationRevokeInputSchema.omit({ integrationId: true }))).output(ComplianceProviderIntegrationRevokeOutputSchema);
|
|
82648
|
+
var updatePolicy = v2Contract.route({
|
|
82649
|
+
method: "PATCH",
|
|
82650
|
+
path: "/compliance/integrations/{integrationId}/policy",
|
|
82651
|
+
description: "Update the revocation severity threshold for a compliance provider integration.",
|
|
82652
|
+
successDescription: "Compliance provider integration policy updated.",
|
|
82653
|
+
tags: [V2_TAG.compliance]
|
|
82654
|
+
}).input(v2Input.paramsBody(ComplianceProviderIntegrationReadInputSchema, ComplianceProviderIntegrationUpdatePolicyInputSchema.omit({ integrationId: true }))).output(ComplianceProviderIntegrationReadOutputSchema);
|
|
82655
|
+
var rotateSecret = v2Contract.route({
|
|
82656
|
+
method: "POST",
|
|
82657
|
+
path: "/compliance/integrations/{integrationId}/rotate-secret",
|
|
82658
|
+
description: "Stage a pending webhook signing secret with a bounded dual-secret grace window.",
|
|
82659
|
+
successDescription: "Webhook signing secret rotation staged.",
|
|
82660
|
+
tags: [V2_TAG.compliance]
|
|
82661
|
+
}).input(v2Input.paramsBody(ComplianceProviderIntegrationReadInputSchema, ComplianceProviderIntegrationRotateSecretInputSchema.omit({ integrationId: true }))).output(ComplianceProviderIntegrationReadOutputSchema);
|
|
82662
|
+
var promoteSecret = v2Contract.route({
|
|
82663
|
+
method: "POST",
|
|
82664
|
+
path: "/compliance/integrations/{integrationId}/promote-secret",
|
|
82665
|
+
description: "Promote a pending webhook signing secret immediately.",
|
|
82666
|
+
successDescription: "Pending webhook signing secret promoted.",
|
|
82667
|
+
tags: [V2_TAG.compliance]
|
|
82668
|
+
}).input(v2Input.params(ComplianceProviderIntegrationReadInputSchema)).output(ComplianceProviderIntegrationReadOutputSchema);
|
|
82669
|
+
var cancelSecretRotation = v2Contract.route({
|
|
82670
|
+
method: "POST",
|
|
82671
|
+
path: "/compliance/integrations/{integrationId}/cancel-secret-rotation",
|
|
82672
|
+
description: "Discard a pending webhook signing secret before the grace window ends.",
|
|
82673
|
+
successDescription: "Pending webhook signing secret discarded.",
|
|
82674
|
+
tags: [V2_TAG.compliance]
|
|
82675
|
+
}).input(v2Input.params(ComplianceProviderIntegrationReadInputSchema)).output(ComplianceProviderIntegrationReadOutputSchema);
|
|
82676
|
+
var health = v2Contract.route({
|
|
82677
|
+
method: "GET",
|
|
82678
|
+
path: "/compliance/integrations/{integrationId}/health",
|
|
82679
|
+
description: "Check stored credential/secret references for a compliance provider integration.",
|
|
82680
|
+
successDescription: "Compliance provider integration health returned.",
|
|
82681
|
+
tags: [V2_TAG.compliance]
|
|
82682
|
+
}).input(v2Input.params(ComplianceProviderIntegrationReadInputSchema)).output(ComplianceProviderIntegrationReadOutputSchema);
|
|
82683
|
+
var listMonitoring = v2Contract.route({
|
|
82684
|
+
method: "GET",
|
|
82685
|
+
path: "/compliance/integrations/{integrationId}/monitoring",
|
|
82686
|
+
description: "List monitoring alerts for a compliance provider integration.",
|
|
82687
|
+
successDescription: "Paginated monitoring alert history.",
|
|
82688
|
+
tags: [V2_TAG.compliance]
|
|
82689
|
+
}).input(v2Input.paramsQuery(ComplianceProviderIntegrationReadInputSchema, ComplianceProviderMonitoringListInputSchema)).output(ComplianceProviderMonitoringListOutputSchema);
|
|
82690
|
+
var createApplicant = v2Contract.route({
|
|
82691
|
+
method: "POST",
|
|
82692
|
+
path: "/compliance/subjects/create-applicant",
|
|
82693
|
+
description: "Create a provider applicant for a compliance integration and persist the DALP subject mapping.",
|
|
82694
|
+
successDescription: "Provider applicant created and mapped.",
|
|
82695
|
+
tags: [V2_TAG.compliance]
|
|
82696
|
+
}).input(v2Input.body(ComplianceSubjectCreateApplicantInputSchema)).output(ComplianceSubjectCreateApplicantOutputSchema);
|
|
82697
|
+
var registerWallet = v2Contract.route({
|
|
82698
|
+
method: "POST",
|
|
82699
|
+
path: "/compliance/subjects/register-wallet",
|
|
82700
|
+
description: "Register a wallet with a monitoring provider and persist the wallet-to-identity subject mapping.",
|
|
82701
|
+
successDescription: "Provider wallet subject registered and mapped.",
|
|
82702
|
+
tags: [V2_TAG.compliance]
|
|
82703
|
+
}).input(v2Input.body(ComplianceSubjectRegisterWalletInputSchema)).output(ComplianceSubjectRegisterWalletOutputSchema);
|
|
82704
|
+
var complianceV2Contract = {
|
|
82705
|
+
integrations: {
|
|
82706
|
+
list: listIntegrations,
|
|
82707
|
+
create: createIntegration,
|
|
82708
|
+
read: readIntegration,
|
|
82709
|
+
validateCredentials,
|
|
82710
|
+
pause: pauseIntegration,
|
|
82711
|
+
resume: resumeIntegration,
|
|
82712
|
+
retryProvisioning,
|
|
82713
|
+
revoke: revokeIntegration,
|
|
82714
|
+
updatePolicy,
|
|
82715
|
+
rotateSecret,
|
|
82716
|
+
promoteSecret,
|
|
82717
|
+
cancelSecretRotation,
|
|
82718
|
+
health,
|
|
82719
|
+
monitoring: listMonitoring
|
|
82720
|
+
},
|
|
82721
|
+
subjects: {
|
|
82722
|
+
createApplicant,
|
|
82723
|
+
registerWallet
|
|
82724
|
+
}
|
|
82725
|
+
};
|
|
82226
82726
|
var FX_PROVIDERS = ["er-api", "ECB", "manual"];
|
|
82227
82727
|
var ExchangeRateHistoryV2ItemSchema = exports_external2.object({
|
|
82228
82728
|
baseCurrency: fiatCurrency().meta({
|
|
@@ -87834,6 +88334,7 @@ var v2Contract2 = {
|
|
|
87834
88334
|
},
|
|
87835
88335
|
organization: organizationV2Contract,
|
|
87836
88336
|
contacts: contactsV2Contract,
|
|
88337
|
+
compliance: complianceV2Contract,
|
|
87837
88338
|
exchangeRates: exchangeRatesV2Contract,
|
|
87838
88339
|
externalToken: externalTokenV2Contract,
|
|
87839
88340
|
identityRecovery: identityRecoveryV2Contract,
|
|
@@ -88046,7 +88547,7 @@ function normalizeDalpBaseUrl(url3) {
|
|
|
88046
88547
|
}
|
|
88047
88548
|
var package_default = {
|
|
88048
88549
|
name: "@settlemint/dalp-sdk",
|
|
88049
|
-
version: "2.1.7-main.
|
|
88550
|
+
version: "2.1.7-main.25539666483",
|
|
88050
88551
|
private: false,
|
|
88051
88552
|
description: "Fully typed SDK for the DALP tokenization platform API",
|
|
88052
88553
|
homepage: "https://settlemint.com",
|
|
@@ -88605,7 +89106,7 @@ function trimConfigValue(name, value3) {
|
|
|
88605
89106
|
// package.json
|
|
88606
89107
|
var package_default2 = {
|
|
88607
89108
|
name: "@settlemint/dalp-cli",
|
|
88608
|
-
version: "2.1.7-main.
|
|
89109
|
+
version: "2.1.7-main.25539666483",
|
|
88609
89110
|
private: false,
|
|
88610
89111
|
description: "CLI for the Digital Asset Lifecycle Platform — manage tokens, identities, compliance, and more from the command line.",
|
|
88611
89112
|
homepage: "https://settlemint.com",
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@settlemint/dalp-cli",
|
|
3
|
-
"version": "2.1.7-main.
|
|
3
|
+
"version": "2.1.7-main.25539666483",
|
|
4
4
|
"private": false,
|
|
5
5
|
"description": "CLI for the Digital Asset Lifecycle Platform — manage tokens, identities, compliance, and more from the command line.",
|
|
6
6
|
"homepage": "https://settlemint.com",
|