@dynamic-labs/sdk-api-core
Advanced tools
Comparing version 0.0.529 to 0.0.530
{ | ||
"name": "@dynamic-labs/sdk-api-core", | ||
"version": "0.0.529", | ||
"version": "0.0.530", | ||
"author": "Dynamic Labs", | ||
@@ -5,0 +5,0 @@ "license": "Apache-2.0", |
@@ -80,2 +80,3 @@ export { BASE_PATH, BaseAPI, BlobApiResponse, COLLECTION_FORMATS, Configuration, JSONApiResponse, RequiredError, TextApiResponse, VoidApiResponse, canConsumeForm, exists, mapValues, querystring } from './runtime.js'; | ||
export { JwtVerifiedCredentialFormatEnum, JwtVerifiedCredentialFormatEnumFromJSON, JwtVerifiedCredentialFormatEnumFromJSONTyped, JwtVerifiedCredentialFormatEnumToJSON } from './models/JwtVerifiedCredentialFormatEnum.js'; | ||
export { JwtVerifiedCredentialHashesFromJSON, JwtVerifiedCredentialHashesFromJSONTyped, JwtVerifiedCredentialHashesToJSON } from './models/JwtVerifiedCredentialHashes.js'; | ||
export { KycFieldType, KycFieldTypeFromJSON, KycFieldTypeFromJSONTyped, KycFieldTypeToJSON } from './models/KycFieldType.js'; | ||
@@ -82,0 +83,0 @@ export { MFAAuthPasskeyDeviceGetResponseFromJSON, MFAAuthPasskeyDeviceGetResponseFromJSONTyped, MFAAuthPasskeyDeviceGetResponseToJSON } from './models/MFAAuthPasskeyDeviceGetResponse.js'; |
@@ -57,2 +57,8 @@ /** | ||
passkeyAlias?: string; | ||
/** | ||
* | ||
* @type {string} | ||
* @memberof CreateEmbeddedWalletParams | ||
*/ | ||
sessionPublicKey?: string; | ||
} | ||
@@ -59,0 +65,0 @@ export declare function CreateEmbeddedWalletParamsFromJSON(json: any): CreateEmbeddedWalletParams; |
@@ -21,2 +21,3 @@ import { exists } from '../runtime.js'; | ||
'passkeyAlias': !exists(json, 'passkeyAlias') ? undefined : json['passkeyAlias'], | ||
'sessionPublicKey': !exists(json, 'sessionPublicKey') ? undefined : json['sessionPublicKey'], | ||
}; | ||
@@ -38,2 +39,3 @@ } | ||
'passkeyAlias': value.passkeyAlias, | ||
'sessionPublicKey': value.sessionPublicKey, | ||
}; | ||
@@ -40,0 +42,0 @@ } |
@@ -15,2 +15,3 @@ /** | ||
import { JwtVerifiedCredential } from './JwtVerifiedCredential'; | ||
import { JwtVerifiedCredentialHashes } from './JwtVerifiedCredentialHashes'; | ||
import { ProjectSettingsKyc } from './ProjectSettingsKyc'; | ||
@@ -265,2 +266,8 @@ /** | ||
* | ||
* @type {JwtVerifiedCredentialHashes} | ||
* @memberof DynamicJwt | ||
*/ | ||
verifiedCredentialsHashes?: JwtVerifiedCredentialHashes; | ||
/** | ||
* | ||
* @type {JwtPayloadDeprecatedInfo} | ||
@@ -267,0 +274,0 @@ * @memberof DynamicJwt |
@@ -5,2 +5,3 @@ import { exists } from '../runtime.js'; | ||
import { JwtVerifiedCredentialFromJSON, JwtVerifiedCredentialToJSON } from './JwtVerifiedCredential.js'; | ||
import { JwtVerifiedCredentialHashesFromJSON, JwtVerifiedCredentialHashesToJSON } from './JwtVerifiedCredentialHashes.js'; | ||
import { ProjectSettingsKycFromJSON, ProjectSettingsKycToJSON } from './ProjectSettingsKyc.js'; | ||
@@ -57,2 +58,3 @@ | ||
'metadata': !exists(json, 'metadata') ? undefined : json['metadata'], | ||
'verifiedCredentialsHashes': !exists(json, 'verifiedCredentialsHashes') ? undefined : JwtVerifiedCredentialHashesFromJSON(json['verifiedCredentialsHashes']), | ||
'info': !exists(json, 'info') ? undefined : JwtPayloadDeprecatedInfoFromJSON(json['info']), | ||
@@ -109,2 +111,3 @@ }; | ||
'metadata': value.metadata, | ||
'verifiedCredentialsHashes': JwtVerifiedCredentialHashesToJSON(value.verifiedCredentialsHashes), | ||
'info': JwtPayloadDeprecatedInfoToJSON(value.info), | ||
@@ -111,0 +114,0 @@ }; |
@@ -78,2 +78,3 @@ export * from './AttestationConveyancePreference'; | ||
export * from './JwtVerifiedCredentialFormatEnum'; | ||
export * from './JwtVerifiedCredentialHashes'; | ||
export * from './KycFieldType'; | ||
@@ -80,0 +81,0 @@ export * from './MFAAuthPasskeyDeviceGetResponse'; |
@@ -12,2 +12,3 @@ /** | ||
*/ | ||
import { JwtVerifiedCredentialHashes } from './JwtVerifiedCredentialHashes'; | ||
/** | ||
@@ -79,2 +80,8 @@ * This contains standard JWT claims to identify a session for the Dynamic user. For more details, see: https://www.iana.org/assignments/jwt/jwt.xhtml#claims | ||
scope?: string; | ||
/** | ||
* | ||
* @type {JwtVerifiedCredentialHashes} | ||
* @memberof MinifiedDynamicJwt | ||
*/ | ||
verifiedCredentialsHashes?: JwtVerifiedCredentialHashes; | ||
} | ||
@@ -81,0 +88,0 @@ export declare function MinifiedDynamicJwtFromJSON(json: any): MinifiedDynamicJwt; |
import { exists } from '../runtime.js'; | ||
import { JwtVerifiedCredentialHashesFromJSON, JwtVerifiedCredentialHashesToJSON } from './JwtVerifiedCredentialHashes.js'; | ||
@@ -22,2 +23,3 @@ /* tslint:disable */ | ||
'scope': !exists(json, 'scope') ? undefined : json['scope'], | ||
'verifiedCredentialsHashes': !exists(json, 'verifiedCredentialsHashes') ? undefined : JwtVerifiedCredentialHashesFromJSON(json['verifiedCredentialsHashes']), | ||
}; | ||
@@ -43,2 +45,3 @@ } | ||
'scope': value.scope, | ||
'verifiedCredentialsHashes': JwtVerifiedCredentialHashesToJSON(value.verifiedCredentialsHashes), | ||
}; | ||
@@ -45,0 +48,0 @@ } |
@@ -31,2 +31,8 @@ /** | ||
/** | ||
* Force create a user for Telegram Auto Login | ||
* @type {boolean} | ||
* @memberof OauthResultRequest | ||
*/ | ||
forceCreateUser?: boolean; | ||
/** | ||
* | ||
@@ -33,0 +39,0 @@ * @type {string} |
@@ -14,2 +14,3 @@ import { exists } from '../runtime.js'; | ||
'telegramAuthToken': !exists(json, 'telegramAuthToken') ? undefined : json['telegramAuthToken'], | ||
'forceCreateUser': !exists(json, 'forceCreateUser') ? undefined : json['forceCreateUser'], | ||
'code': !exists(json, 'code') ? undefined : json['code'], | ||
@@ -29,2 +30,3 @@ 'sessionPublicKey': !exists(json, 'sessionPublicKey') ? undefined : json['sessionPublicKey'], | ||
'telegramAuthToken': value.telegramAuthToken, | ||
'forceCreateUser': value.forceCreateUser, | ||
'code': value.code, | ||
@@ -31,0 +33,0 @@ 'sessionPublicKey': value.sessionPublicKey, |
@@ -82,2 +82,8 @@ /** | ||
defaultWalletVersion?: EmbeddedWalletVersionEnum; | ||
/** | ||
* When true, the user will be prompted to export their private key after creating a wallet. | ||
* @type {boolean} | ||
* @memberof ProjectSettingsSdkEmbeddedWallets | ||
*/ | ||
promptForKeyExport?: boolean; | ||
} | ||
@@ -84,0 +90,0 @@ export declare function ProjectSettingsSdkEmbeddedWalletsFromJSON(json: any): ProjectSettingsSdkEmbeddedWallets; |
@@ -26,2 +26,3 @@ import { exists } from '../runtime.js'; | ||
'defaultWalletVersion': !exists(json, 'defaultWalletVersion') ? undefined : EmbeddedWalletVersionEnumFromJSON(json['defaultWalletVersion']), | ||
'promptForKeyExport': !exists(json, 'promptForKeyExport') ? undefined : json['promptForKeyExport'], | ||
}; | ||
@@ -47,2 +48,3 @@ } | ||
'defaultWalletVersion': EmbeddedWalletVersionEnumToJSON(value.defaultWalletVersion), | ||
'promptForKeyExport': value.promptForKeyExport, | ||
}; | ||
@@ -49,0 +51,0 @@ } |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
1688756
662
40054