@appwrite.io/console 0.6.0-rc.14 → 0.6.0-rc.15
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/dist/cjs/sdk.js +217 -70
- package/dist/cjs/sdk.js.map +1 -1
- package/dist/esm/sdk.js +218 -71
- package/dist/esm/sdk.js.map +1 -1
- package/dist/iife/sdk.js +217 -70
- package/docs/examples/account/{add-authenticator.md → create-mfa-authenticator.md} +3 -3
- package/docs/examples/account/{create-challenge.md → create-mfa-challenge.md} +3 -3
- package/docs/examples/account/create-mfa-recovery-codes.md +11 -0
- package/docs/examples/account/{verify-authenticator.md → delete-mfa-authenticator.md} +3 -3
- package/docs/examples/account/get-mfa-recovery-codes.md +11 -0
- package/docs/examples/account/{list-factors.md → list-mfa-factors.md} +1 -1
- package/docs/examples/account/{delete-authenticator.md → update-mfa-authenticator.md} +3 -3
- package/docs/examples/account/{update-challenge.md → update-mfa-challenge.md} +1 -1
- package/docs/examples/account/update-mfa-recovery-codes.md +11 -0
- package/docs/examples/users/create-mfa-recovery-codes.md +13 -0
- package/docs/examples/users/{delete-authenticator.md → delete-mfa-authenticator.md} +3 -3
- package/docs/examples/users/get-mfa-recovery-codes.md +13 -0
- package/docs/examples/users/{list-factors.md → list-mfa-factors.md} +1 -1
- package/docs/examples/users/update-mfa-recovery-codes.md +13 -0
- package/package.json +1 -1
- package/src/client.ts +1 -1
- package/src/enums/{authentication-factor.ts → factor.ts} +4 -3
- package/src/enums/type.ts +3 -0
- package/src/index.ts +2 -2
- package/src/models.ts +13 -8
- package/src/services/account.ts +130 -59
- package/src/services/users.ts +88 -10
- package/types/enums/factor.d.ts +6 -0
- package/types/enums/type.d.ts +3 -0
- package/types/index.d.ts +2 -2
- package/types/models.d.ts +13 -8
- package/types/services/account.d.ts +69 -25
- package/types/services/users.d.ts +45 -6
- package/src/enums/authenticator-type.ts +0 -3
- package/types/enums/authentication-factor.d.ts +0 -5
- package/types/enums/authenticator-type.d.ts +0 -3
package/README.md
CHANGED
|
@@ -33,7 +33,7 @@ import { Client, Account } from "@appwrite.io/console";
|
|
|
33
33
|
To install with a CDN (content delivery network) add the following scripts to the bottom of your <body> tag, but before you use any Appwrite services:
|
|
34
34
|
|
|
35
35
|
```html
|
|
36
|
-
<script src="https://cdn.jsdelivr.net/npm/@appwrite.io/console@0.6.0-rc.
|
|
36
|
+
<script src="https://cdn.jsdelivr.net/npm/@appwrite.io/console@0.6.0-rc.15"></script>
|
|
37
37
|
```
|
|
38
38
|
|
|
39
39
|
|
package/dist/cjs/sdk.js
CHANGED
|
@@ -117,7 +117,7 @@ class Client {
|
|
|
117
117
|
'x-sdk-name': 'Console',
|
|
118
118
|
'x-sdk-platform': 'console',
|
|
119
119
|
'x-sdk-language': 'web',
|
|
120
|
-
'x-sdk-version': '0.6.0-rc.
|
|
120
|
+
'x-sdk-version': '0.6.0-rc.15',
|
|
121
121
|
'X-Appwrite-Response-Format': '1.5.0',
|
|
122
122
|
};
|
|
123
123
|
this.realtime = {
|
|
@@ -692,15 +692,103 @@ class Account extends Service {
|
|
|
692
692
|
}, payload);
|
|
693
693
|
});
|
|
694
694
|
}
|
|
695
|
+
/**
|
|
696
|
+
* Add Authenticator
|
|
697
|
+
*
|
|
698
|
+
* Add an authenticator app to be used as an MFA factor. Verify the
|
|
699
|
+
* authenticator using the [verify
|
|
700
|
+
* authenticator](/docs/references/cloud/client-web/account#verifyAuthenticator)
|
|
701
|
+
* method.
|
|
702
|
+
*
|
|
703
|
+
* @param {Type} type
|
|
704
|
+
* @throws {AppwriteException}
|
|
705
|
+
* @returns {Promise}
|
|
706
|
+
*/
|
|
707
|
+
createMfaAuthenticator(type) {
|
|
708
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
709
|
+
if (typeof type === 'undefined') {
|
|
710
|
+
throw new AppwriteException('Missing required parameter: "type"');
|
|
711
|
+
}
|
|
712
|
+
const apiPath = '/account/mfa/authenticators/{type}'.replace('{type}', type);
|
|
713
|
+
const payload = {};
|
|
714
|
+
const uri = new URL(this.client.config.endpoint + apiPath);
|
|
715
|
+
return yield this.client.call('post', uri, {
|
|
716
|
+
'content-type': 'application/json',
|
|
717
|
+
}, payload);
|
|
718
|
+
});
|
|
719
|
+
}
|
|
720
|
+
/**
|
|
721
|
+
* Verify Authenticator
|
|
722
|
+
*
|
|
723
|
+
* Verify an authenticator app after adding it using the [add
|
|
724
|
+
* authenticator](/docs/references/cloud/client-web/account#addAuthenticator)
|
|
725
|
+
* method.
|
|
726
|
+
*
|
|
727
|
+
* @param {Type} type
|
|
728
|
+
* @param {string} otp
|
|
729
|
+
* @throws {AppwriteException}
|
|
730
|
+
* @returns {Promise}
|
|
731
|
+
*/
|
|
732
|
+
updateMfaAuthenticator(type, otp) {
|
|
733
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
734
|
+
if (typeof type === 'undefined') {
|
|
735
|
+
throw new AppwriteException('Missing required parameter: "type"');
|
|
736
|
+
}
|
|
737
|
+
if (typeof otp === 'undefined') {
|
|
738
|
+
throw new AppwriteException('Missing required parameter: "otp"');
|
|
739
|
+
}
|
|
740
|
+
const apiPath = '/account/mfa/authenticators/{type}'.replace('{type}', type);
|
|
741
|
+
const payload = {};
|
|
742
|
+
if (typeof otp !== 'undefined') {
|
|
743
|
+
payload['otp'] = otp;
|
|
744
|
+
}
|
|
745
|
+
const uri = new URL(this.client.config.endpoint + apiPath);
|
|
746
|
+
return yield this.client.call('put', uri, {
|
|
747
|
+
'content-type': 'application/json',
|
|
748
|
+
}, payload);
|
|
749
|
+
});
|
|
750
|
+
}
|
|
751
|
+
/**
|
|
752
|
+
* Delete Authenticator
|
|
753
|
+
*
|
|
754
|
+
* Delete an authenticator for a user by ID.
|
|
755
|
+
*
|
|
756
|
+
* @param {Type} type
|
|
757
|
+
* @param {string} otp
|
|
758
|
+
* @throws {AppwriteException}
|
|
759
|
+
* @returns {Promise}
|
|
760
|
+
*/
|
|
761
|
+
deleteMfaAuthenticator(type, otp) {
|
|
762
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
763
|
+
if (typeof type === 'undefined') {
|
|
764
|
+
throw new AppwriteException('Missing required parameter: "type"');
|
|
765
|
+
}
|
|
766
|
+
if (typeof otp === 'undefined') {
|
|
767
|
+
throw new AppwriteException('Missing required parameter: "otp"');
|
|
768
|
+
}
|
|
769
|
+
const apiPath = '/account/mfa/authenticators/{type}'.replace('{type}', type);
|
|
770
|
+
const payload = {};
|
|
771
|
+
if (typeof otp !== 'undefined') {
|
|
772
|
+
payload['otp'] = otp;
|
|
773
|
+
}
|
|
774
|
+
const uri = new URL(this.client.config.endpoint + apiPath);
|
|
775
|
+
return yield this.client.call('delete', uri, {
|
|
776
|
+
'content-type': 'application/json',
|
|
777
|
+
}, payload);
|
|
778
|
+
});
|
|
779
|
+
}
|
|
695
780
|
/**
|
|
696
781
|
* Create 2FA Challenge
|
|
697
782
|
*
|
|
783
|
+
* Begin the process of MFA verification after sign-in. Finish the flow with
|
|
784
|
+
* [updateMfaChallenge](/docs/references/cloud/client-web/account#updateMfaChallenge)
|
|
785
|
+
* method.
|
|
698
786
|
*
|
|
699
|
-
* @param {
|
|
787
|
+
* @param {Factor} factor
|
|
700
788
|
* @throws {AppwriteException}
|
|
701
789
|
* @returns {Promise}
|
|
702
790
|
*/
|
|
703
|
-
|
|
791
|
+
createMfaChallenge(factor) {
|
|
704
792
|
return __awaiter(this, void 0, void 0, function* () {
|
|
705
793
|
if (typeof factor === 'undefined') {
|
|
706
794
|
throw new AppwriteException('Missing required parameter: "factor"');
|
|
@@ -719,14 +807,18 @@ class Account extends Service {
|
|
|
719
807
|
/**
|
|
720
808
|
* Create MFA Challenge (confirmation)
|
|
721
809
|
*
|
|
722
|
-
* Complete the MFA challenge by providing the one-time password.
|
|
810
|
+
* Complete the MFA challenge by providing the one-time password. Finish the
|
|
811
|
+
* process of MFA verification by providing the one-time password. To begin
|
|
812
|
+
* the flow, use
|
|
813
|
+
* [createMfaChallenge](/docs/references/cloud/client-web/account#createMfaChallenge)
|
|
814
|
+
* method.
|
|
723
815
|
*
|
|
724
816
|
* @param {string} challengeId
|
|
725
817
|
* @param {string} otp
|
|
726
818
|
* @throws {AppwriteException}
|
|
727
819
|
* @returns {Promise}
|
|
728
820
|
*/
|
|
729
|
-
|
|
821
|
+
updateMfaChallenge(challengeId, otp) {
|
|
730
822
|
return __awaiter(this, void 0, void 0, function* () {
|
|
731
823
|
if (typeof challengeId === 'undefined') {
|
|
732
824
|
throw new AppwriteException('Missing required parameter: "challengeId"');
|
|
@@ -756,7 +848,7 @@ class Account extends Service {
|
|
|
756
848
|
* @throws {AppwriteException}
|
|
757
849
|
* @returns {Promise}
|
|
758
850
|
*/
|
|
759
|
-
|
|
851
|
+
listMfaFactors() {
|
|
760
852
|
return __awaiter(this, void 0, void 0, function* () {
|
|
761
853
|
const apiPath = '/account/mfa/factors';
|
|
762
854
|
const payload = {};
|
|
@@ -767,86 +859,65 @@ class Account extends Service {
|
|
|
767
859
|
});
|
|
768
860
|
}
|
|
769
861
|
/**
|
|
770
|
-
*
|
|
862
|
+
* Get MFA Recovery Codes
|
|
771
863
|
*
|
|
772
|
-
*
|
|
773
|
-
*
|
|
774
|
-
*
|
|
775
|
-
* method.
|
|
864
|
+
* Get recovery codes that can be used as backup for MFA flow. Before getting
|
|
865
|
+
* codes, they must be generated using
|
|
866
|
+
* [createMfaRecoveryCodes](/docs/references/cloud/client-web/account#createMfaRecoveryCodes)
|
|
867
|
+
* method. An OTP challenge is required to read recovery codes.
|
|
776
868
|
*
|
|
777
|
-
* @param {AuthenticatorType} type
|
|
778
869
|
* @throws {AppwriteException}
|
|
779
870
|
* @returns {Promise}
|
|
780
871
|
*/
|
|
781
|
-
|
|
872
|
+
getMfaRecoveryCodes() {
|
|
782
873
|
return __awaiter(this, void 0, void 0, function* () {
|
|
783
|
-
|
|
784
|
-
throw new AppwriteException('Missing required parameter: "type"');
|
|
785
|
-
}
|
|
786
|
-
const apiPath = '/account/mfa/{type}'.replace('{type}', type);
|
|
874
|
+
const apiPath = '/account/mfa/recovery-codes';
|
|
787
875
|
const payload = {};
|
|
788
876
|
const uri = new URL(this.client.config.endpoint + apiPath);
|
|
789
|
-
return yield this.client.call('
|
|
877
|
+
return yield this.client.call('get', uri, {
|
|
790
878
|
'content-type': 'application/json',
|
|
791
879
|
}, payload);
|
|
792
880
|
});
|
|
793
881
|
}
|
|
794
882
|
/**
|
|
795
|
-
*
|
|
883
|
+
* Create MFA Recovery Codes
|
|
796
884
|
*
|
|
797
|
-
*
|
|
798
|
-
*
|
|
885
|
+
* Generate recovery codes as backup for MFA flow. It's recommended to
|
|
886
|
+
* generate and show then immediately after user successfully adds their
|
|
887
|
+
* authehticator. Recovery codes can be used as a MFA verification type in
|
|
888
|
+
* [createMfaChallenge](/docs/references/cloud/client-web/account#createMfaChallenge)
|
|
799
889
|
* method.
|
|
800
890
|
*
|
|
801
|
-
* @param {AuthenticatorType} type
|
|
802
|
-
* @param {string} otp
|
|
803
891
|
* @throws {AppwriteException}
|
|
804
892
|
* @returns {Promise}
|
|
805
893
|
*/
|
|
806
|
-
|
|
894
|
+
createMfaRecoveryCodes() {
|
|
807
895
|
return __awaiter(this, void 0, void 0, function* () {
|
|
808
|
-
|
|
809
|
-
throw new AppwriteException('Missing required parameter: "type"');
|
|
810
|
-
}
|
|
811
|
-
if (typeof otp === 'undefined') {
|
|
812
|
-
throw new AppwriteException('Missing required parameter: "otp"');
|
|
813
|
-
}
|
|
814
|
-
const apiPath = '/account/mfa/{type}'.replace('{type}', type);
|
|
896
|
+
const apiPath = '/account/mfa/recovery-codes';
|
|
815
897
|
const payload = {};
|
|
816
|
-
if (typeof otp !== 'undefined') {
|
|
817
|
-
payload['otp'] = otp;
|
|
818
|
-
}
|
|
819
898
|
const uri = new URL(this.client.config.endpoint + apiPath);
|
|
820
|
-
return yield this.client.call('
|
|
899
|
+
return yield this.client.call('post', uri, {
|
|
821
900
|
'content-type': 'application/json',
|
|
822
901
|
}, payload);
|
|
823
902
|
});
|
|
824
903
|
}
|
|
825
904
|
/**
|
|
826
|
-
*
|
|
905
|
+
* Regenerate MFA Recovery Codes
|
|
827
906
|
*
|
|
828
|
-
*
|
|
907
|
+
* Regenerate recovery codes that can be used as backup for MFA flow. Before
|
|
908
|
+
* regenerating codes, they must be first generated using
|
|
909
|
+
* [createMfaRecoveryCodes](/docs/references/cloud/client-web/account#createMfaRecoveryCodes)
|
|
910
|
+
* method. An OTP challenge is required to regenreate recovery codes.
|
|
829
911
|
*
|
|
830
|
-
* @param {AuthenticatorType} type
|
|
831
|
-
* @param {string} otp
|
|
832
912
|
* @throws {AppwriteException}
|
|
833
913
|
* @returns {Promise}
|
|
834
914
|
*/
|
|
835
|
-
|
|
915
|
+
updateMfaRecoveryCodes() {
|
|
836
916
|
return __awaiter(this, void 0, void 0, function* () {
|
|
837
|
-
|
|
838
|
-
throw new AppwriteException('Missing required parameter: "type"');
|
|
839
|
-
}
|
|
840
|
-
if (typeof otp === 'undefined') {
|
|
841
|
-
throw new AppwriteException('Missing required parameter: "otp"');
|
|
842
|
-
}
|
|
843
|
-
const apiPath = '/account/mfa/{type}'.replace('{type}', type);
|
|
917
|
+
const apiPath = '/account/mfa/recovery-codes';
|
|
844
918
|
const payload = {};
|
|
845
|
-
if (typeof otp !== 'undefined') {
|
|
846
|
-
payload['otp'] = otp;
|
|
847
|
-
}
|
|
848
919
|
const uri = new URL(this.client.config.endpoint + apiPath);
|
|
849
|
-
return yield this.client.call('
|
|
920
|
+
return yield this.client.call('patch', uri, {
|
|
850
921
|
'content-type': 'application/json',
|
|
851
922
|
}, payload);
|
|
852
923
|
});
|
|
@@ -11677,6 +11748,32 @@ class Users extends Service {
|
|
|
11677
11748
|
}, payload);
|
|
11678
11749
|
});
|
|
11679
11750
|
}
|
|
11751
|
+
/**
|
|
11752
|
+
* Delete Authenticator
|
|
11753
|
+
*
|
|
11754
|
+
* Delete an authenticator app.
|
|
11755
|
+
*
|
|
11756
|
+
* @param {string} userId
|
|
11757
|
+
* @param {Type} type
|
|
11758
|
+
* @throws {AppwriteException}
|
|
11759
|
+
* @returns {Promise}
|
|
11760
|
+
*/
|
|
11761
|
+
deleteMfaAuthenticator(userId, type) {
|
|
11762
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
11763
|
+
if (typeof userId === 'undefined') {
|
|
11764
|
+
throw new AppwriteException('Missing required parameter: "userId"');
|
|
11765
|
+
}
|
|
11766
|
+
if (typeof type === 'undefined') {
|
|
11767
|
+
throw new AppwriteException('Missing required parameter: "type"');
|
|
11768
|
+
}
|
|
11769
|
+
const apiPath = '/users/{userId}/mfa/authenticators/{type}'.replace('{userId}', userId).replace('{type}', type);
|
|
11770
|
+
const payload = {};
|
|
11771
|
+
const uri = new URL(this.client.config.endpoint + apiPath);
|
|
11772
|
+
return yield this.client.call('delete', uri, {
|
|
11773
|
+
'content-type': 'application/json',
|
|
11774
|
+
}, payload);
|
|
11775
|
+
});
|
|
11776
|
+
}
|
|
11680
11777
|
/**
|
|
11681
11778
|
* List Factors
|
|
11682
11779
|
*
|
|
@@ -11686,7 +11783,7 @@ class Users extends Service {
|
|
|
11686
11783
|
* @throws {AppwriteException}
|
|
11687
11784
|
* @returns {Promise}
|
|
11688
11785
|
*/
|
|
11689
|
-
|
|
11786
|
+
listMfaFactors(userId) {
|
|
11690
11787
|
return __awaiter(this, void 0, void 0, function* () {
|
|
11691
11788
|
if (typeof userId === 'undefined') {
|
|
11692
11789
|
throw new AppwriteException('Missing required parameter: "userId"');
|
|
@@ -11700,27 +11797,76 @@ class Users extends Service {
|
|
|
11700
11797
|
});
|
|
11701
11798
|
}
|
|
11702
11799
|
/**
|
|
11703
|
-
*
|
|
11800
|
+
* Get MFA Recovery Codes
|
|
11704
11801
|
*
|
|
11705
|
-
*
|
|
11802
|
+
* Get recovery codes that can be used as backup for MFA flow by User ID.
|
|
11803
|
+
* Before getting codes, they must be generated using
|
|
11804
|
+
* [createMfaRecoveryCodes](/docs/references/cloud/client-web/account#createMfaRecoveryCodes)
|
|
11805
|
+
* method.
|
|
11706
11806
|
*
|
|
11707
11807
|
* @param {string} userId
|
|
11708
|
-
* @param {AuthenticatorType} type
|
|
11709
11808
|
* @throws {AppwriteException}
|
|
11710
11809
|
* @returns {Promise}
|
|
11711
11810
|
*/
|
|
11712
|
-
|
|
11811
|
+
getMfaRecoveryCodes(userId) {
|
|
11713
11812
|
return __awaiter(this, void 0, void 0, function* () {
|
|
11714
11813
|
if (typeof userId === 'undefined') {
|
|
11715
11814
|
throw new AppwriteException('Missing required parameter: "userId"');
|
|
11716
11815
|
}
|
|
11717
|
-
|
|
11718
|
-
|
|
11816
|
+
const apiPath = '/users/{userId}/mfa/recovery-codes'.replace('{userId}', userId);
|
|
11817
|
+
const payload = {};
|
|
11818
|
+
const uri = new URL(this.client.config.endpoint + apiPath);
|
|
11819
|
+
return yield this.client.call('get', uri, {
|
|
11820
|
+
'content-type': 'application/json',
|
|
11821
|
+
}, payload);
|
|
11822
|
+
});
|
|
11823
|
+
}
|
|
11824
|
+
/**
|
|
11825
|
+
* Regenerate MFA Recovery Codes
|
|
11826
|
+
*
|
|
11827
|
+
* Regenerate recovery codes that can be used as backup for MFA flow by User
|
|
11828
|
+
* ID. Before regenerating codes, they must be first generated using
|
|
11829
|
+
* [createMfaRecoveryCodes](/docs/references/cloud/client-web/account#createMfaRecoveryCodes)
|
|
11830
|
+
* method.
|
|
11831
|
+
*
|
|
11832
|
+
* @param {string} userId
|
|
11833
|
+
* @throws {AppwriteException}
|
|
11834
|
+
* @returns {Promise}
|
|
11835
|
+
*/
|
|
11836
|
+
updateMfaRecoveryCodes(userId) {
|
|
11837
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
11838
|
+
if (typeof userId === 'undefined') {
|
|
11839
|
+
throw new AppwriteException('Missing required parameter: "userId"');
|
|
11719
11840
|
}
|
|
11720
|
-
const apiPath = '/users/{userId}/mfa/
|
|
11841
|
+
const apiPath = '/users/{userId}/mfa/recovery-codes'.replace('{userId}', userId);
|
|
11721
11842
|
const payload = {};
|
|
11722
11843
|
const uri = new URL(this.client.config.endpoint + apiPath);
|
|
11723
|
-
return yield this.client.call('
|
|
11844
|
+
return yield this.client.call('put', uri, {
|
|
11845
|
+
'content-type': 'application/json',
|
|
11846
|
+
}, payload);
|
|
11847
|
+
});
|
|
11848
|
+
}
|
|
11849
|
+
/**
|
|
11850
|
+
* Create MFA Recovery Codes
|
|
11851
|
+
*
|
|
11852
|
+
* Generate recovery codes used as backup for MFA flow for User ID. Recovery
|
|
11853
|
+
* codes can be used as a MFA verification type in
|
|
11854
|
+
* [createMfaChallenge](/docs/references/cloud/client-web/account#createMfaChallenge)
|
|
11855
|
+
* method by client SDK.
|
|
11856
|
+
*
|
|
11857
|
+
* @param {string} userId
|
|
11858
|
+
* @throws {AppwriteException}
|
|
11859
|
+
* @returns {Promise}
|
|
11860
|
+
*/
|
|
11861
|
+
createMfaRecoveryCodes(userId) {
|
|
11862
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
11863
|
+
if (typeof userId === 'undefined') {
|
|
11864
|
+
throw new AppwriteException('Missing required parameter: "userId"');
|
|
11865
|
+
}
|
|
11866
|
+
const apiPath = '/users/{userId}/mfa/recovery-codes'.replace('{userId}', userId);
|
|
11867
|
+
const payload = {};
|
|
11868
|
+
const uri = new URL(this.client.config.endpoint + apiPath);
|
|
11869
|
+
return yield this.client.call('patch', uri, {
|
|
11724
11870
|
'content-type': 'application/json',
|
|
11725
11871
|
}, payload);
|
|
11726
11872
|
});
|
|
@@ -12618,17 +12764,18 @@ class ID {
|
|
|
12618
12764
|
}
|
|
12619
12765
|
}
|
|
12620
12766
|
|
|
12621
|
-
exports.
|
|
12622
|
-
(function (
|
|
12623
|
-
|
|
12624
|
-
|
|
12625
|
-
AuthenticationFactor["Email"] = "email";
|
|
12626
|
-
})(exports.AuthenticationFactor || (exports.AuthenticationFactor = {}));
|
|
12767
|
+
exports.Type = void 0;
|
|
12768
|
+
(function (Type) {
|
|
12769
|
+
Type["Totp"] = "totp";
|
|
12770
|
+
})(exports.Type || (exports.Type = {}));
|
|
12627
12771
|
|
|
12628
|
-
exports.
|
|
12629
|
-
(function (
|
|
12630
|
-
|
|
12631
|
-
|
|
12772
|
+
exports.Factor = void 0;
|
|
12773
|
+
(function (Factor) {
|
|
12774
|
+
Factor["Email"] = "email";
|
|
12775
|
+
Factor["Phone"] = "phone";
|
|
12776
|
+
Factor["Totp"] = "totp";
|
|
12777
|
+
Factor["Recoverycode"] = "recoverycode";
|
|
12778
|
+
})(exports.Factor || (exports.Factor = {}));
|
|
12632
12779
|
|
|
12633
12780
|
exports.OAuthProvider = void 0;
|
|
12634
12781
|
(function (OAuthProvider) {
|