@shipengine/js-api
Advanced tools
+11
-1
| import { AxiosInstance } from "axios"; | ||
| import { ConfigResponse, CreateSessionRequest, CreateSessionResponse, PaymentMethodsResponse, PreviewTransactionRequest, PreviewTransactionResponse, UpdatePaymentMethodRequest, UpdatePaymentMethodResponse } from "./types"; | ||
| import { ConfigResponse, CreateSessionRequest, CreateSessionResponse, IdentityVerificationResponse, PaymentAccountResponse, PaymentMethodsResponse, PreviewTransactionRequest, PreviewTransactionResponse, UpdatePaymentMethodRequest, UpdatePaymentMethodResponse } from "./types"; | ||
| /** | ||
@@ -46,2 +46,12 @@ * # Auctane Pay API module - /v1/payments | ||
| updatePaymentMethod: (paymentMethodId: string, payload: UpdatePaymentMethodRequest) => Promise<import("axios").AxiosResponse<UpdatePaymentMethodResponse, any>>; | ||
| /** | ||
| * The `identityVerification` method returns a Plaid IDV verification URL for a given user | ||
| * @docs https://auctane.atlassian.net/wiki/spaces/SEEU/pages/5906662077/AUCTANE+PAY+ENDPOINTS+FOR+SHIPSTATION+API#Identity-verification | ||
| */ | ||
| identityVerification: () => Promise<import("axios").AxiosResponse<IdentityVerificationResponse, any>>; | ||
| /** | ||
| * The `getPaymentAccount` method returns the Payment Account data for a given user | ||
| * @docs https://auctane.atlassian.net/wiki/spaces/SEEU/pages/5906662077/AUCTANE+PAY+ENDPOINTS+FOR+SHIPSTATION+API | ||
| */ | ||
| getPaymentAccount: () => Promise<import("axios").AxiosResponse<PaymentAccountResponse, any>>; | ||
| } |
@@ -147,2 +147,26 @@ /** | ||
| export type UpdatePaymentMethodResponse = Omit<PaymentMethod, "sourceAccountId" | "paymentMethodType" | "institutionName">; | ||
| export type IdentityProvider = "Plaid"; | ||
| export type IdentityVerificationResponse = { | ||
| /** Provider used for the identity verification */ | ||
| identityProvider: IdentityProvider; | ||
| plaidLinkToken: string; | ||
| /** URL of the provider to start the identity verification */ | ||
| verificationUrl: string; | ||
| }; | ||
| export type PaymentAccountTrustLevel = "New" | "Trusted" | "Restricted" | "Grandfathered"; | ||
| export type PaymentAccountEnrollmentStatus = "NotSet" | "Enrolled" | "Prohibited" | "OptedOut"; | ||
| export type PaymentAccountResponse = { | ||
| /** Boolean to know if there is a IDV in progress */ | ||
| isVerificationRequested: boolean; | ||
| /** Determine if the Wallet was created with Auctane Pay */ | ||
| isWalletCreatedAfterAuctanePayLaunch: boolean; | ||
| /** Max amount of money the user can use */ | ||
| limit: number; | ||
| /** Remaining amount of money */ | ||
| limitRemaining: number; | ||
| /** Represents the surcharge enrollment status for an account. */ | ||
| surchargeEnrollmentStatus: PaymentAccountEnrollmentStatus; | ||
| /** Auctane Pay's trust level for a particular customer. */ | ||
| trustLevel: PaymentAccountTrustLevel; | ||
| }; | ||
| /** | ||
@@ -149,0 +173,0 @@ * @category Entities |
+1
-1
| { | ||
| "name": "@shipengine/js-api", | ||
| "version": "4.15.0", | ||
| "version": "4.16.0", | ||
| "main": "./index.js", | ||
@@ -5,0 +5,0 @@ "types": "./index.d.ts", |
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
1598864
0.2%45322
0.14%