Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

@trinsic/trinsic

Package Overview
Dependencies
Maintainers
3
Versions
67
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@trinsic/trinsic - npm Package Compare versions

Comparing version 1.13.0 to 1.13.1-rc1

4

lib/src/ConnectClient.js

@@ -303,4 +303,4 @@ "use strict";

authority: this.baseUrl,
client_id: "http://localhost:8080/",
redirect_uri: "http://localhost:8080/",
client_id: window.location.origin,
redirect_uri: window.location.origin,
response_type: "code",

@@ -307,0 +307,0 @@ scope: "openid",

@@ -16,2 +16,4 @@ import ServiceBase from "./ServiceBase";

listSessions(request: proto.ListSessionsRequest): Promise<proto.ListSessionsResponse>;
/** Checks if the identity provided in the request has a wallet containing a valid reusable credential */
hasValidCredential(request: proto.HasValidCredentialRequest): Promise<proto.HasValidCredentialResponse>;
}

@@ -64,4 +64,10 @@ "use strict";

}
/** Checks if the identity provided in the request has a wallet containing a valid reusable credential */
async hasValidCredential(request) {
return this.client.hasValidCredential(request, {
metadata: await this.buildMetadata(proto.HasValidCredentialRequest.encode(request).finish())
});
}
}
exports.ConnectService = ConnectService;
//# sourceMappingURL=ConnectService.js.map
import _m0 from "protobufjs/minimal";
import { OrderDirection } from "../../common/v1/common";
import { CreateWalletRequest_ExternalIdentity } from "../../universal-wallet/v1/universal-wallet";
/** The type of verification to perform */

@@ -198,3 +199,11 @@ export declare enum VerificationType {

verifications?: RequestedVerification[] | undefined;
/** Debugging information used to help diagnose issues */
debugInformation?: {
[key: string]: string;
} | undefined;
}
export interface CreateSessionRequest_DebugInformationEntry {
key: string;
value: string;
}
/** A verification to perform in an IDV flow */

@@ -290,2 +299,18 @@ export interface RequestedVerification {

}
/** Request to preemptively check if an identity has a valid reusable credential */
export interface HasValidCredentialRequest {
/** The the identity used to find a credential for */
identity?: CreateWalletRequest_ExternalIdentity | undefined;
/** The criteria used to find a valid credential */
credentialRequestData?: CredentialRequestData | undefined;
}
/** Response to `HasValidCredentialRequest` */
export interface HasValidCredentialResponse {
/** Whether the identity has a valid credential */
hasValidCredential?: boolean | undefined;
}
export interface CredentialRequestData {
/** The type of verification which the credential can be used for */
type?: VerificationType | undefined;
}
export declare const IDVSession: {

@@ -331,2 +356,10 @@ encode(message: IDVSession, writer?: _m0.Writer): _m0.Writer;

};
export declare const CreateSessionRequest_DebugInformationEntry: {
encode(message: CreateSessionRequest_DebugInformationEntry, writer?: _m0.Writer): _m0.Writer;
decode(input: _m0.Reader | Uint8Array, length?: number): CreateSessionRequest_DebugInformationEntry;
fromJSON(object: any): CreateSessionRequest_DebugInformationEntry;
toJSON(message: CreateSessionRequest_DebugInformationEntry): unknown;
create(base?: DeepPartial<CreateSessionRequest_DebugInformationEntry>): CreateSessionRequest_DebugInformationEntry;
fromPartial(object: DeepPartial<CreateSessionRequest_DebugInformationEntry>): CreateSessionRequest_DebugInformationEntry;
};
export declare const RequestedVerification: {

@@ -412,2 +445,26 @@ encode(message: RequestedVerification, writer?: _m0.Writer): _m0.Writer;

};
export declare const HasValidCredentialRequest: {
encode(message: HasValidCredentialRequest, writer?: _m0.Writer): _m0.Writer;
decode(input: _m0.Reader | Uint8Array, length?: number): HasValidCredentialRequest;
fromJSON(object: any): HasValidCredentialRequest;
toJSON(message: HasValidCredentialRequest): unknown;
create(base?: DeepPartial<HasValidCredentialRequest>): HasValidCredentialRequest;
fromPartial(object: DeepPartial<HasValidCredentialRequest>): HasValidCredentialRequest;
};
export declare const HasValidCredentialResponse: {
encode(message: HasValidCredentialResponse, writer?: _m0.Writer): _m0.Writer;
decode(input: _m0.Reader | Uint8Array, length?: number): HasValidCredentialResponse;
fromJSON(object: any): HasValidCredentialResponse;
toJSON(message: HasValidCredentialResponse): unknown;
create(base?: DeepPartial<HasValidCredentialResponse>): HasValidCredentialResponse;
fromPartial(object: DeepPartial<HasValidCredentialResponse>): HasValidCredentialResponse;
};
export declare const CredentialRequestData: {
encode(message: CredentialRequestData, writer?: _m0.Writer): _m0.Writer;
decode(input: _m0.Reader | Uint8Array, length?: number): CredentialRequestData;
fromJSON(object: any): CredentialRequestData;
toJSON(message: CredentialRequestData): unknown;
create(base?: DeepPartial<CredentialRequestData>): CredentialRequestData;
fromPartial(object: DeepPartial<CredentialRequestData>): CredentialRequestData;
};
/** The Connect service provides access to Trinsic Connect, a reusable identity verification service. */

@@ -511,2 +568,25 @@ export declare type ConnectDefinition = typeof ConnectDefinition;

};
/** Checks if the identity provided in the request has a wallet containing a valid reusable credential */
readonly hasValidCredential: {
readonly name: "HasValidCredential";
readonly requestType: {
encode(message: HasValidCredentialRequest, writer?: _m0.Writer): _m0.Writer;
decode(input: _m0.Reader | Uint8Array, length?: number): HasValidCredentialRequest;
fromJSON(object: any): HasValidCredentialRequest;
toJSON(message: HasValidCredentialRequest): unknown;
create(base?: DeepPartial<HasValidCredentialRequest>): HasValidCredentialRequest;
fromPartial(object: DeepPartial<HasValidCredentialRequest>): HasValidCredentialRequest;
};
readonly requestStream: false;
readonly responseType: {
encode(message: HasValidCredentialResponse, writer?: _m0.Writer): _m0.Writer;
decode(input: _m0.Reader | Uint8Array, length?: number): HasValidCredentialResponse;
fromJSON(object: any): HasValidCredentialResponse;
toJSON(message: HasValidCredentialResponse): unknown;
create(base?: DeepPartial<HasValidCredentialResponse>): HasValidCredentialResponse;
fromPartial(object: DeepPartial<HasValidCredentialResponse>): HasValidCredentialResponse;
};
readonly responseStream: false;
readonly options: {};
};
};

@@ -513,0 +593,0 @@ };

@@ -13,2 +13,4 @@ import _m0 from "protobufjs/minimal";

Passkey = 3,
/** TrinsicAuthenticator - Identity provider is passkey using Trinsic Authenticator for mobile phones */
TrinsicAuthenticator = 4,
UNRECOGNIZED = -1

@@ -15,0 +17,0 @@ }

@@ -21,2 +21,4 @@ "use strict";

IdentityProvider[IdentityProvider["Passkey"] = 3] = "Passkey";
/** TrinsicAuthenticator - Identity provider is passkey using Trinsic Authenticator for mobile phones */
IdentityProvider[IdentityProvider["TrinsicAuthenticator"] = 4] = "TrinsicAuthenticator";
IdentityProvider[IdentityProvider["UNRECOGNIZED"] = -1] = "UNRECOGNIZED";

@@ -38,2 +40,5 @@ })(IdentityProvider = exports.IdentityProvider || (exports.IdentityProvider = {}));

return IdentityProvider.Passkey;
case 4:
case "TrinsicAuthenticator":
return IdentityProvider.TrinsicAuthenticator;
case -1:

@@ -56,2 +61,4 @@ case "UNRECOGNIZED":

return "Passkey";
case IdentityProvider.TrinsicAuthenticator:
return "TrinsicAuthenticator";
case IdentityProvider.UNRECOGNIZED:

@@ -58,0 +65,0 @@ default:

@@ -5,3 +5,3 @@ "use strict";

function getSdkVersion() {
const sdkVersion = "1.13.0";
const sdkVersion = "1.13.1-rc1";
return sdkVersion;

@@ -8,0 +8,0 @@ }

{
"name": "@trinsic/trinsic",
"version": "1.13.0",
"version": "1.13.1-rc1",
"description": "Node and Browser wrapper for the Trinsic services",

@@ -5,0 +5,0 @@ "main": "lib/index.js",

Sorry, the diff of this file is too big to display

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is too big to display

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc