@blezgo/api-sdk 0.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +6 -0
- package/README.md +27 -0
- package/dist/account/client.d.ts +3 -0
- package/dist/account/client.d.ts.map +1 -0
- package/dist/account/client.js +3 -0
- package/dist/account/client.js.map +1 -0
- package/dist/account/generated.d.ts +2648 -0
- package/dist/account/generated.d.ts.map +1 -0
- package/dist/account/generated.js +6 -0
- package/dist/account/generated.js.map +1 -0
- package/dist/account/index.d.ts +2 -0
- package/dist/account/index.d.ts.map +1 -0
- package/dist/account/index.js +2 -0
- package/dist/account/index.js.map +1 -0
- package/dist/admin/client.d.ts +3 -0
- package/dist/admin/client.d.ts.map +1 -0
- package/dist/admin/client.js +3 -0
- package/dist/admin/client.js.map +1 -0
- package/dist/admin/generated.d.ts +956 -0
- package/dist/admin/generated.d.ts.map +1 -0
- package/dist/admin/generated.js +6 -0
- package/dist/admin/generated.js.map +1 -0
- package/dist/admin/index.d.ts +2 -0
- package/dist/admin/index.d.ts.map +1 -0
- package/dist/admin/index.js +2 -0
- package/dist/admin/index.js.map +1 -0
- package/dist/authentication/client.d.ts +3 -0
- package/dist/authentication/client.d.ts.map +1 -0
- package/dist/authentication/client.js +3 -0
- package/dist/authentication/client.js.map +1 -0
- package/dist/authentication/generated.d.ts +746 -0
- package/dist/authentication/generated.d.ts.map +1 -0
- package/dist/authentication/generated.js +6 -0
- package/dist/authentication/generated.js.map +1 -0
- package/dist/authentication/index.d.ts +2 -0
- package/dist/authentication/index.d.ts.map +1 -0
- package/dist/authentication/index.js +2 -0
- package/dist/authentication/index.js.map +1 -0
- package/dist/cache/client.d.ts +3 -0
- package/dist/cache/client.d.ts.map +1 -0
- package/dist/cache/client.js +3 -0
- package/dist/cache/client.js.map +1 -0
- package/dist/cache/generated.d.ts +3355 -0
- package/dist/cache/generated.d.ts.map +1 -0
- package/dist/cache/generated.js +6 -0
- package/dist/cache/generated.js.map +1 -0
- package/dist/cache/index.d.ts +2 -0
- package/dist/cache/index.d.ts.map +1 -0
- package/dist/cache/index.js +2 -0
- package/dist/cache/index.js.map +1 -0
- package/dist/config/client.d.ts +3 -0
- package/dist/config/client.d.ts.map +1 -0
- package/dist/config/client.js +3 -0
- package/dist/config/client.js.map +1 -0
- package/dist/config/generated.d.ts +1150 -0
- package/dist/config/generated.d.ts.map +1 -0
- package/dist/config/generated.js +6 -0
- package/dist/config/generated.js.map +1 -0
- package/dist/config/index.d.ts +2 -0
- package/dist/config/index.d.ts.map +1 -0
- package/dist/config/index.js +2 -0
- package/dist/config/index.js.map +1 -0
- package/dist/dashboard/client.d.ts +3 -0
- package/dist/dashboard/client.d.ts.map +1 -0
- package/dist/dashboard/client.js +3 -0
- package/dist/dashboard/client.js.map +1 -0
- package/dist/dashboard/generated.d.ts +4831 -0
- package/dist/dashboard/generated.d.ts.map +1 -0
- package/dist/dashboard/generated.js +6 -0
- package/dist/dashboard/generated.js.map +1 -0
- package/dist/dashboard/index.d.ts +2 -0
- package/dist/dashboard/index.d.ts.map +1 -0
- package/dist/dashboard/index.js +2 -0
- package/dist/dashboard/index.js.map +1 -0
- package/dist/errors/client.d.ts +3 -0
- package/dist/errors/client.d.ts.map +1 -0
- package/dist/errors/client.js +3 -0
- package/dist/errors/client.js.map +1 -0
- package/dist/errors/generated.d.ts +340 -0
- package/dist/errors/generated.d.ts.map +1 -0
- package/dist/errors/generated.js +6 -0
- package/dist/errors/generated.js.map +1 -0
- package/dist/errors/index.d.ts +2 -0
- package/dist/errors/index.d.ts.map +1 -0
- package/dist/errors/index.js +2 -0
- package/dist/errors/index.js.map +1 -0
- package/dist/index.d.ts +15 -0
- package/dist/index.d.ts.map +1 -0
- package/dist/index.js +19 -0
- package/dist/index.js.map +1 -0
- package/dist/internationalization/client.d.ts +3 -0
- package/dist/internationalization/client.d.ts.map +1 -0
- package/dist/internationalization/client.js +3 -0
- package/dist/internationalization/client.js.map +1 -0
- package/dist/internationalization/generated.d.ts +587 -0
- package/dist/internationalization/generated.d.ts.map +1 -0
- package/dist/internationalization/generated.js +6 -0
- package/dist/internationalization/generated.js.map +1 -0
- package/dist/internationalization/index.d.ts +2 -0
- package/dist/internationalization/index.d.ts.map +1 -0
- package/dist/internationalization/index.js +2 -0
- package/dist/internationalization/index.js.map +1 -0
- package/dist/invitations/client.d.ts +3 -0
- package/dist/invitations/client.d.ts.map +1 -0
- package/dist/invitations/client.js +3 -0
- package/dist/invitations/client.js.map +1 -0
- package/dist/invitations/generated.d.ts +4019 -0
- package/dist/invitations/generated.d.ts.map +1 -0
- package/dist/invitations/generated.js +6 -0
- package/dist/invitations/generated.js.map +1 -0
- package/dist/invitations/index.d.ts +2 -0
- package/dist/invitations/index.d.ts.map +1 -0
- package/dist/invitations/index.js +2 -0
- package/dist/invitations/index.js.map +1 -0
- package/dist/registration/client.d.ts +3 -0
- package/dist/registration/client.d.ts.map +1 -0
- package/dist/registration/client.js +3 -0
- package/dist/registration/client.js.map +1 -0
- package/dist/registration/generated.d.ts +1010 -0
- package/dist/registration/generated.d.ts.map +1 -0
- package/dist/registration/generated.js +6 -0
- package/dist/registration/generated.js.map +1 -0
- package/dist/registration/index.d.ts +2 -0
- package/dist/registration/index.d.ts.map +1 -0
- package/dist/registration/index.js +2 -0
- package/dist/registration/index.js.map +1 -0
- package/dist/role/client.d.ts +3 -0
- package/dist/role/client.d.ts.map +1 -0
- package/dist/role/client.js +3 -0
- package/dist/role/client.js.map +1 -0
- package/dist/role/generated.d.ts +6324 -0
- package/dist/role/generated.d.ts.map +1 -0
- package/dist/role/generated.js +6 -0
- package/dist/role/generated.js.map +1 -0
- package/dist/role/index.d.ts +2 -0
- package/dist/role/index.d.ts.map +1 -0
- package/dist/role/index.js +2 -0
- package/dist/role/index.js.map +1 -0
- package/dist/tenant/client.d.ts +3 -0
- package/dist/tenant/client.d.ts.map +1 -0
- package/dist/tenant/client.js +3 -0
- package/dist/tenant/client.js.map +1 -0
- package/dist/tenant/generated.d.ts +8273 -0
- package/dist/tenant/generated.d.ts.map +1 -0
- package/dist/tenant/generated.js +6 -0
- package/dist/tenant/generated.js.map +1 -0
- package/dist/tenant/index.d.ts +2 -0
- package/dist/tenant/index.d.ts.map +1 -0
- package/dist/tenant/index.js +2 -0
- package/dist/tenant/index.js.map +1 -0
- package/dist/tokens/client.d.ts +3 -0
- package/dist/tokens/client.d.ts.map +1 -0
- package/dist/tokens/client.js +3 -0
- package/dist/tokens/client.js.map +1 -0
- package/dist/tokens/generated.d.ts +528 -0
- package/dist/tokens/generated.d.ts.map +1 -0
- package/dist/tokens/generated.js +6 -0
- package/dist/tokens/generated.js.map +1 -0
- package/dist/tokens/index.d.ts +2 -0
- package/dist/tokens/index.d.ts.map +1 -0
- package/dist/tokens/index.js +2 -0
- package/dist/tokens/index.js.map +1 -0
- package/dist/user/client.d.ts +3 -0
- package/dist/user/client.d.ts.map +1 -0
- package/dist/user/client.js +3 -0
- package/dist/user/client.js.map +1 -0
- package/dist/user/generated.d.ts +4350 -0
- package/dist/user/generated.d.ts.map +1 -0
- package/dist/user/generated.js +6 -0
- package/dist/user/generated.js.map +1 -0
- package/dist/user/index.d.ts +2 -0
- package/dist/user/index.d.ts.map +1 -0
- package/dist/user/index.js +2 -0
- package/dist/user/index.js.map +1 -0
- package/package.json +39 -0
|
@@ -0,0 +1,746 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* This file was auto-generated by openapi-typescript.
|
|
3
|
+
* Do not make direct changes to the file.
|
|
4
|
+
*/
|
|
5
|
+
export interface paths {
|
|
6
|
+
"/v1/auth/sessions": {
|
|
7
|
+
parameters: {
|
|
8
|
+
query?: never;
|
|
9
|
+
header?: never;
|
|
10
|
+
path?: never;
|
|
11
|
+
cookie?: never;
|
|
12
|
+
};
|
|
13
|
+
get?: never;
|
|
14
|
+
put?: never;
|
|
15
|
+
/**
|
|
16
|
+
* Login User
|
|
17
|
+
* @description Authenticate user and create session.
|
|
18
|
+
*
|
|
19
|
+
* **Authentication**: None (public endpoint)
|
|
20
|
+
* **Rate Limit**: 10 requests per minute
|
|
21
|
+
*
|
|
22
|
+
* ## Request Body Examples:
|
|
23
|
+
*
|
|
24
|
+
* ### Login with Email + Password:
|
|
25
|
+
* ```json
|
|
26
|
+
* {
|
|
27
|
+
* "email": "john.doe@example.com",
|
|
28
|
+
* "password": "SecurePass123!",
|
|
29
|
+
* "space_id": "spc_abc123xyz",
|
|
30
|
+
* "device_id": "device_uuid_12345",
|
|
31
|
+
* "g_recaptcha_response": "03AGdBq27..."
|
|
32
|
+
* }
|
|
33
|
+
* ```
|
|
34
|
+
*
|
|
35
|
+
* ### Login with Username + Password:
|
|
36
|
+
* ```json
|
|
37
|
+
* {
|
|
38
|
+
* "username": "johndoe",
|
|
39
|
+
* "password": "SecurePass123!",
|
|
40
|
+
* "space_id": "spc_abc123xyz",
|
|
41
|
+
* "device_id": "device_uuid_12345"
|
|
42
|
+
* }
|
|
43
|
+
* ```
|
|
44
|
+
*
|
|
45
|
+
* ### Login with Mobile + Password:
|
|
46
|
+
* ```json
|
|
47
|
+
* {
|
|
48
|
+
* "mobile_isd_code": "+1",
|
|
49
|
+
* "mobile_no": "5551234567",
|
|
50
|
+
* "password": "SecurePass123!",
|
|
51
|
+
* "space_id": "spc_abc123xyz"
|
|
52
|
+
* }
|
|
53
|
+
* ```
|
|
54
|
+
*
|
|
55
|
+
* ### Login with Mobile + OTP:
|
|
56
|
+
* ```json
|
|
57
|
+
* {
|
|
58
|
+
* "mobile_isd_code": "+1",
|
|
59
|
+
* "mobile_no": "5551234567",
|
|
60
|
+
* "otp": "1234",
|
|
61
|
+
* "space_id": "spc_abc123xyz"
|
|
62
|
+
* }
|
|
63
|
+
* ```
|
|
64
|
+
*
|
|
65
|
+
* ## Required Fields:
|
|
66
|
+
* - **Identifier**: One of: `email`, `username`, or (`mobile_isd_code` + `mobile_no`)
|
|
67
|
+
* - **Credentials**: Either `password` or `otp`
|
|
68
|
+
* - **Space**: `space_id` (external ID format: `spc_xxx`)
|
|
69
|
+
*
|
|
70
|
+
* ## Optional Fields:
|
|
71
|
+
* - **device_id**: UUID for device trust (enables "remember this device" for MFA)
|
|
72
|
+
* - **g_recaptcha_response**: reCAPTCHA token (required if triggered by failed attempts)
|
|
73
|
+
* - **tracking_id**: UTM/campaign tracking identifier
|
|
74
|
+
* - **return_data**: Additional data to return in response
|
|
75
|
+
*
|
|
76
|
+
* ## Response Scenarios:
|
|
77
|
+
*
|
|
78
|
+
* ### Standard Success:
|
|
79
|
+
* Returns `access_token`, `user` data, and session info.
|
|
80
|
+
* `refresh_token` is set as an HttpOnly cookie — not returned in the response body.
|
|
81
|
+
*
|
|
82
|
+
* ### MFA Required (if enabled):
|
|
83
|
+
* ```json
|
|
84
|
+
* {
|
|
85
|
+
* "status": "mfa_required",
|
|
86
|
+
* "challenge_id": "chg_abc123",
|
|
87
|
+
* "mfa_token": "short_lived_jwt_token",
|
|
88
|
+
* "challenge_type": "primary",
|
|
89
|
+
* "available_methods": ["totp", "sms", "email"],
|
|
90
|
+
* "primary_method": "totp",
|
|
91
|
+
* "masked_phone": "+1***7890",
|
|
92
|
+
* "masked_email": "j***@example.com",
|
|
93
|
+
* "message": "MFA verification required"
|
|
94
|
+
* }
|
|
95
|
+
* ```
|
|
96
|
+
* Client must then call `POST /v1/auth/mfa/challenges` to complete login.
|
|
97
|
+
*
|
|
98
|
+
* ## Security Features:
|
|
99
|
+
* - Account lockout after max failed attempts (default: 5)
|
|
100
|
+
* - reCAPTCHA trigger after failed attempts (default: 2)
|
|
101
|
+
* - Rate limiting (10 requests/minute)
|
|
102
|
+
* - MFA support (TOTP, SMS, Email)
|
|
103
|
+
* - Device trust (30-day remember device)
|
|
104
|
+
*
|
|
105
|
+
* **Reference**: See `docs/AUTH_CONFIG_EXAMPLES.md` and `docs/MFA_IMPLEMENTATION_GUIDE.md` for complete details.
|
|
106
|
+
*/
|
|
107
|
+
post: operations["createSession"];
|
|
108
|
+
/**
|
|
109
|
+
* Logout User
|
|
110
|
+
* @description Logout user and invalidate the refresh token.
|
|
111
|
+
*
|
|
112
|
+
* **Authentication**: Bearer access token (or refresh_token cookie as fallback)
|
|
113
|
+
* **Rate Limit**: 5 requests per minute
|
|
114
|
+
*
|
|
115
|
+
* Clears the `refresh_token` HttpOnly cookie regardless of outcome.
|
|
116
|
+
*/
|
|
117
|
+
delete: operations["deleteSession"];
|
|
118
|
+
options?: never;
|
|
119
|
+
head?: never;
|
|
120
|
+
patch?: never;
|
|
121
|
+
trace?: never;
|
|
122
|
+
};
|
|
123
|
+
"/v1/auth/tokens/refresh": {
|
|
124
|
+
parameters: {
|
|
125
|
+
query?: never;
|
|
126
|
+
header?: never;
|
|
127
|
+
path?: never;
|
|
128
|
+
cookie?: never;
|
|
129
|
+
};
|
|
130
|
+
get?: never;
|
|
131
|
+
put?: never;
|
|
132
|
+
/**
|
|
133
|
+
* Refresh User Token
|
|
134
|
+
* @description Refresh access token using the HttpOnly refresh_token cookie.
|
|
135
|
+
*
|
|
136
|
+
* **Authentication**: None (uses HttpOnly cookie set at login)
|
|
137
|
+
* **Rate Limit**: 60 requests per minute
|
|
138
|
+
*
|
|
139
|
+
* The refresh_token is read from the `refresh_token` HttpOnly cookie.
|
|
140
|
+
* Non-browser clients may send it as `Authorization: Bearer <refresh_token>` instead
|
|
141
|
+
* (deprecated — migrate to cookie before the announced removal deadline).
|
|
142
|
+
*
|
|
143
|
+
* ## Frontend retry contract:
|
|
144
|
+
* - `401` → authentication failure — send user to login, do NOT retry
|
|
145
|
+
* - `5xx` / network timeout → infrastructure failure — retry with exponential backoff
|
|
146
|
+
* (3 attempts: 1 s, 2 s, 4 s)
|
|
147
|
+
*/
|
|
148
|
+
post: operations["refreshToken"];
|
|
149
|
+
delete?: never;
|
|
150
|
+
options?: never;
|
|
151
|
+
head?: never;
|
|
152
|
+
patch?: never;
|
|
153
|
+
trace?: never;
|
|
154
|
+
};
|
|
155
|
+
"/v1/auth/social/sessions": {
|
|
156
|
+
parameters: {
|
|
157
|
+
query?: never;
|
|
158
|
+
header?: never;
|
|
159
|
+
path?: never;
|
|
160
|
+
cookie?: never;
|
|
161
|
+
};
|
|
162
|
+
get?: never;
|
|
163
|
+
put?: never;
|
|
164
|
+
/**
|
|
165
|
+
* Initiate Social Login
|
|
166
|
+
* @description Initiate social login by generating OAuth authorization URL.
|
|
167
|
+
*
|
|
168
|
+
* **For**: All users (public endpoint)
|
|
169
|
+
* **Purpose**: Start social login flow
|
|
170
|
+
*
|
|
171
|
+
* **Example Request Body**:
|
|
172
|
+
* ```json
|
|
173
|
+
* {
|
|
174
|
+
* "provider": "google",
|
|
175
|
+
* "space_id": "spc_aBc123",
|
|
176
|
+
* "state": "optional-custom-state"
|
|
177
|
+
* }
|
|
178
|
+
* ```
|
|
179
|
+
*
|
|
180
|
+
* **Supported Providers**: google, facebook, linkedin, x, apple
|
|
181
|
+
* **Required Fields**: provider, space_id
|
|
182
|
+
* **Rate Limit**: 10 requests per minute
|
|
183
|
+
* **Authentication**: None (public endpoint — org_id resolved from Bearer app_token)
|
|
184
|
+
*
|
|
185
|
+
* **Flow**:
|
|
186
|
+
* 1. Client calls this endpoint with provider and space_id
|
|
187
|
+
* 2. Server returns authorization_url
|
|
188
|
+
* 3. Client redirects user to authorization_url
|
|
189
|
+
* 4. User authenticates with provider
|
|
190
|
+
* 5. Provider redirects back to callback endpoint
|
|
191
|
+
*/
|
|
192
|
+
post: operations["initiateSocialLogin"];
|
|
193
|
+
delete?: never;
|
|
194
|
+
options?: never;
|
|
195
|
+
head?: never;
|
|
196
|
+
patch?: never;
|
|
197
|
+
trace?: never;
|
|
198
|
+
};
|
|
199
|
+
"/v1/auth/social/callback/{provider}": {
|
|
200
|
+
parameters: {
|
|
201
|
+
query?: never;
|
|
202
|
+
header?: never;
|
|
203
|
+
path?: never;
|
|
204
|
+
cookie?: never;
|
|
205
|
+
};
|
|
206
|
+
/**
|
|
207
|
+
* Handle Social Callback
|
|
208
|
+
* @description Handle OAuth callback from social provider.
|
|
209
|
+
*
|
|
210
|
+
* **For**: All users (callback endpoint)
|
|
211
|
+
* **Purpose**: Complete social login flow, issue JWT tokens
|
|
212
|
+
*
|
|
213
|
+
* **Query Parameters**:
|
|
214
|
+
* - code: Authorization code from provider (required)
|
|
215
|
+
* - state: State parameter containing space_id (required)
|
|
216
|
+
* - error: Optional error from provider
|
|
217
|
+
*
|
|
218
|
+
* **Rate Limit**: 10 requests per minute
|
|
219
|
+
* **Authentication**: None (callback endpoint — org_id resolved from state JWT)
|
|
220
|
+
*
|
|
221
|
+
* **Success Response**:
|
|
222
|
+
* - New User: Creates account, returns tokens
|
|
223
|
+
* - Existing Social User: Returns tokens
|
|
224
|
+
* - Linked User: Links social account, returns tokens
|
|
225
|
+
*
|
|
226
|
+
* **Error Response**:
|
|
227
|
+
* - Invalid code/state
|
|
228
|
+
* - Provider error
|
|
229
|
+
* - Email conflict
|
|
230
|
+
*/
|
|
231
|
+
get: operations["handleSocialCallback"];
|
|
232
|
+
put?: never;
|
|
233
|
+
post?: never;
|
|
234
|
+
delete?: never;
|
|
235
|
+
options?: never;
|
|
236
|
+
head?: never;
|
|
237
|
+
patch?: never;
|
|
238
|
+
trace?: never;
|
|
239
|
+
};
|
|
240
|
+
"/v1/auth/mfa/challenges": {
|
|
241
|
+
parameters: {
|
|
242
|
+
query?: never;
|
|
243
|
+
header?: never;
|
|
244
|
+
path?: never;
|
|
245
|
+
cookie?: never;
|
|
246
|
+
};
|
|
247
|
+
get?: never;
|
|
248
|
+
put?: never;
|
|
249
|
+
/**
|
|
250
|
+
* Verify Mfa Challenge
|
|
251
|
+
* @description **Verify MFA code** during login.
|
|
252
|
+
*
|
|
253
|
+
* Called after receiving `mfa_required` response from login endpoint.
|
|
254
|
+
*
|
|
255
|
+
* **Authentication**: MFA Token (short-lived, from login response)
|
|
256
|
+
*
|
|
257
|
+
* **Request Body**:
|
|
258
|
+
* ```json
|
|
259
|
+
* {
|
|
260
|
+
* "challenge_id": "chg_abc123",
|
|
261
|
+
* "mfa_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...",
|
|
262
|
+
* "code": "123456",
|
|
263
|
+
* "method": "totp",
|
|
264
|
+
* "remember_device": true
|
|
265
|
+
* }
|
|
266
|
+
* ```
|
|
267
|
+
*
|
|
268
|
+
* **Response**: Full authentication (access_token, refresh_token, user)
|
|
269
|
+
*
|
|
270
|
+
* **Methods**:
|
|
271
|
+
* - `totp`: 6-digit code from authenticator app
|
|
272
|
+
* - `sms`: 6-digit code sent via SMS
|
|
273
|
+
* - `email`: 6-digit code sent via email
|
|
274
|
+
* - `backup_code`: 8-character backup code (XXXX-YYYY)
|
|
275
|
+
*/
|
|
276
|
+
post: operations["verifyMFAChallenge"];
|
|
277
|
+
delete?: never;
|
|
278
|
+
options?: never;
|
|
279
|
+
head?: never;
|
|
280
|
+
patch?: never;
|
|
281
|
+
trace?: never;
|
|
282
|
+
};
|
|
283
|
+
"/v1/auth/mfa/challenges/{challenge_id}/resend": {
|
|
284
|
+
parameters: {
|
|
285
|
+
query?: never;
|
|
286
|
+
header?: never;
|
|
287
|
+
path?: never;
|
|
288
|
+
cookie?: never;
|
|
289
|
+
};
|
|
290
|
+
get?: never;
|
|
291
|
+
put?: never;
|
|
292
|
+
/**
|
|
293
|
+
* Resend Mfa Otp
|
|
294
|
+
* @description **Resend OTP** (SMS/Email only).
|
|
295
|
+
*
|
|
296
|
+
* **Authentication**: MFA Token
|
|
297
|
+
*
|
|
298
|
+
* **Request Body**:
|
|
299
|
+
* ```json
|
|
300
|
+
* {
|
|
301
|
+
* "mfa_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...",
|
|
302
|
+
* "method": "sms"
|
|
303
|
+
* }
|
|
304
|
+
* ```
|
|
305
|
+
*
|
|
306
|
+
* **Rate Limit**: 30-second cooldown between resends, max 3 resends per challenge
|
|
307
|
+
*/
|
|
308
|
+
post: operations["resendMFAOTP"];
|
|
309
|
+
delete?: never;
|
|
310
|
+
options?: never;
|
|
311
|
+
head?: never;
|
|
312
|
+
patch?: never;
|
|
313
|
+
trace?: never;
|
|
314
|
+
};
|
|
315
|
+
}
|
|
316
|
+
export type webhooks = Record<string, never>;
|
|
317
|
+
export interface components {
|
|
318
|
+
schemas: {
|
|
319
|
+
/**
|
|
320
|
+
* SocialLoginRequest
|
|
321
|
+
* @description Request model for initiating social login.
|
|
322
|
+
*/
|
|
323
|
+
SocialLoginRequest: {
|
|
324
|
+
/**
|
|
325
|
+
* Provider
|
|
326
|
+
* @enum {string}
|
|
327
|
+
*/
|
|
328
|
+
provider: "google" | "facebook" | "linkedin" | "x" | "apple";
|
|
329
|
+
/** Space Id */
|
|
330
|
+
space_id: string;
|
|
331
|
+
/**
|
|
332
|
+
* State
|
|
333
|
+
* @description Custom state to preserve
|
|
334
|
+
*/
|
|
335
|
+
state?: string | null;
|
|
336
|
+
};
|
|
337
|
+
Extensions: {
|
|
338
|
+
/** @example GENERIC_ERROR */
|
|
339
|
+
message_code?: string;
|
|
340
|
+
/** @example [] */
|
|
341
|
+
invalid_params?: components["schemas"]["InvalidParam"][];
|
|
342
|
+
extra_data?: Record<string, never> | null;
|
|
343
|
+
/** @example Detailed debug information */
|
|
344
|
+
debug?: string | null;
|
|
345
|
+
};
|
|
346
|
+
/** ValidationError */
|
|
347
|
+
ValidationError: {
|
|
348
|
+
/** Location */
|
|
349
|
+
loc: (string | number)[];
|
|
350
|
+
/** Message */
|
|
351
|
+
msg: string;
|
|
352
|
+
/** Error Type */
|
|
353
|
+
type: string;
|
|
354
|
+
};
|
|
355
|
+
/** LoginRequest */
|
|
356
|
+
LoginRequest: {
|
|
357
|
+
/** Email */
|
|
358
|
+
email?: string | null;
|
|
359
|
+
/** Username */
|
|
360
|
+
username?: string | null;
|
|
361
|
+
/** Mobile Isd Code */
|
|
362
|
+
mobile_isd_code?: string | null;
|
|
363
|
+
/** Mobile No */
|
|
364
|
+
mobile_no?: string | null;
|
|
365
|
+
/** Password */
|
|
366
|
+
password?: string | null;
|
|
367
|
+
/** Otp */
|
|
368
|
+
otp?: string | null;
|
|
369
|
+
/**
|
|
370
|
+
* Otp Challenge Id
|
|
371
|
+
* @description OTP challenge ID (otp_xxx) from step 1
|
|
372
|
+
*/
|
|
373
|
+
otp_challenge_id?: string | null;
|
|
374
|
+
/** Space Id */
|
|
375
|
+
space_id: string;
|
|
376
|
+
/** G Recaptcha Response */
|
|
377
|
+
g_recaptcha_response?: string | null;
|
|
378
|
+
/** Return Data */
|
|
379
|
+
return_data?: {
|
|
380
|
+
[key: string]: unknown;
|
|
381
|
+
} | null;
|
|
382
|
+
/** Tracking Id */
|
|
383
|
+
tracking_id?: string | null;
|
|
384
|
+
/**
|
|
385
|
+
* Device Id
|
|
386
|
+
* @description Device UUID for MFA device trust
|
|
387
|
+
*/
|
|
388
|
+
device_id?: string | null;
|
|
389
|
+
};
|
|
390
|
+
/**
|
|
391
|
+
* @example {
|
|
392
|
+
* "status": "success",
|
|
393
|
+
* "message": "Operation successful",
|
|
394
|
+
* "message_code": "api_suc_20001",
|
|
395
|
+
* "data": {},
|
|
396
|
+
* "metadata": {
|
|
397
|
+
* "timestamp": "2026-03-26T10:00:00.000Z",
|
|
398
|
+
* "requestId": "07e22004-cb60-4dfc-bc9c-b6f99664dca1",
|
|
399
|
+
* "traceId": "a9f1204c-bb82-41de-b234-7c3a9e120000",
|
|
400
|
+
* "version": "v1",
|
|
401
|
+
* "executionTime": 42,
|
|
402
|
+
* "language": "en-US"
|
|
403
|
+
* }
|
|
404
|
+
* }
|
|
405
|
+
*/
|
|
406
|
+
StandardResponse: {
|
|
407
|
+
/** @example success */
|
|
408
|
+
status?: string;
|
|
409
|
+
data?: Record<string, never> | null;
|
|
410
|
+
/** @example Operation successful */
|
|
411
|
+
message?: string | null;
|
|
412
|
+
/** @example api_suc_20001 */
|
|
413
|
+
message_code?: string | null;
|
|
414
|
+
metadata?: Record<string, never> | null;
|
|
415
|
+
error?: components["schemas"]["ErrorResponse"];
|
|
416
|
+
};
|
|
417
|
+
InvalidParam: {
|
|
418
|
+
/** @example items[0].quantity */
|
|
419
|
+
field?: string;
|
|
420
|
+
/** @example Input should be greater than or equal to 1 */
|
|
421
|
+
error?: string;
|
|
422
|
+
};
|
|
423
|
+
ErrorResponse: {
|
|
424
|
+
/** @example about:blank */
|
|
425
|
+
type?: string;
|
|
426
|
+
/** @example GENERIC_ERROR */
|
|
427
|
+
code?: string;
|
|
428
|
+
/** @example Client Error */
|
|
429
|
+
title?: string;
|
|
430
|
+
/** @example 400 */
|
|
431
|
+
status?: number;
|
|
432
|
+
/** @example An error occurred */
|
|
433
|
+
detail?: string;
|
|
434
|
+
/** @example /v1/cart/items */
|
|
435
|
+
instance?: string;
|
|
436
|
+
extensions?: components["schemas"]["Extensions"];
|
|
437
|
+
};
|
|
438
|
+
StandardResponse_Dict_str__Any__: {
|
|
439
|
+
[key: string]: unknown;
|
|
440
|
+
};
|
|
441
|
+
/** HTTPValidationError */
|
|
442
|
+
HTTPValidationError: {
|
|
443
|
+
/** Detail */
|
|
444
|
+
detail?: components["schemas"]["ValidationError"][];
|
|
445
|
+
};
|
|
446
|
+
/**
|
|
447
|
+
* MFAResendRequest
|
|
448
|
+
* @description Request to resend OTP
|
|
449
|
+
*/
|
|
450
|
+
MFAResendRequest: {
|
|
451
|
+
/**
|
|
452
|
+
* Challenge Id
|
|
453
|
+
* @description Challenge session ID
|
|
454
|
+
*/
|
|
455
|
+
challenge_id: string;
|
|
456
|
+
/**
|
|
457
|
+
* Mfa Token
|
|
458
|
+
* @description Short-lived JWT from login response
|
|
459
|
+
*/
|
|
460
|
+
mfa_token: string;
|
|
461
|
+
/**
|
|
462
|
+
* Method
|
|
463
|
+
* @description Method to resend (not TOTP)
|
|
464
|
+
* @enum {string}
|
|
465
|
+
*/
|
|
466
|
+
method: "sms" | "email";
|
|
467
|
+
};
|
|
468
|
+
/** LogoutRequest */
|
|
469
|
+
LogoutRequest: {
|
|
470
|
+
/**
|
|
471
|
+
* Logout All
|
|
472
|
+
* @default false
|
|
473
|
+
*/
|
|
474
|
+
logout_all: boolean | null;
|
|
475
|
+
};
|
|
476
|
+
/**
|
|
477
|
+
* MFAVerifyRequest
|
|
478
|
+
* @description Request to verify MFA code
|
|
479
|
+
*/
|
|
480
|
+
MFAVerifyRequest: {
|
|
481
|
+
/**
|
|
482
|
+
* Challenge Id
|
|
483
|
+
* @description Challenge session ID
|
|
484
|
+
*/
|
|
485
|
+
challenge_id: string;
|
|
486
|
+
/**
|
|
487
|
+
* Mfa Token
|
|
488
|
+
* @description Short-lived JWT from login response
|
|
489
|
+
*/
|
|
490
|
+
mfa_token: string;
|
|
491
|
+
/**
|
|
492
|
+
* Code
|
|
493
|
+
* @description OTP/TOTP code or backup code
|
|
494
|
+
*/
|
|
495
|
+
code: string;
|
|
496
|
+
/**
|
|
497
|
+
* Method
|
|
498
|
+
* @enum {string}
|
|
499
|
+
*/
|
|
500
|
+
method: "totp" | "sms" | "email" | "backup_code";
|
|
501
|
+
/**
|
|
502
|
+
* Remember Device
|
|
503
|
+
* @description Trust this device for 30 days
|
|
504
|
+
* @default false
|
|
505
|
+
*/
|
|
506
|
+
remember_device: boolean;
|
|
507
|
+
};
|
|
508
|
+
};
|
|
509
|
+
responses: never;
|
|
510
|
+
parameters: never;
|
|
511
|
+
requestBodies: never;
|
|
512
|
+
headers: never;
|
|
513
|
+
pathItems: never;
|
|
514
|
+
}
|
|
515
|
+
export type $defs = Record<string, never>;
|
|
516
|
+
export interface operations {
|
|
517
|
+
createSession: {
|
|
518
|
+
parameters: {
|
|
519
|
+
query?: never;
|
|
520
|
+
header?: never;
|
|
521
|
+
path?: never;
|
|
522
|
+
cookie?: never;
|
|
523
|
+
};
|
|
524
|
+
requestBody: {
|
|
525
|
+
content: {
|
|
526
|
+
"application/json": components["schemas"]["LoginRequest"];
|
|
527
|
+
};
|
|
528
|
+
};
|
|
529
|
+
responses: {
|
|
530
|
+
/** @description Successful Response */
|
|
531
|
+
200: {
|
|
532
|
+
headers: {
|
|
533
|
+
[name: string]: unknown;
|
|
534
|
+
};
|
|
535
|
+
content: {
|
|
536
|
+
"application/json": components["schemas"]["StandardResponse"];
|
|
537
|
+
};
|
|
538
|
+
};
|
|
539
|
+
/** @description Validation Error */
|
|
540
|
+
422: {
|
|
541
|
+
headers: {
|
|
542
|
+
[name: string]: unknown;
|
|
543
|
+
};
|
|
544
|
+
content: {
|
|
545
|
+
"application/json": components["schemas"]["HTTPValidationError"];
|
|
546
|
+
};
|
|
547
|
+
};
|
|
548
|
+
};
|
|
549
|
+
};
|
|
550
|
+
deleteSession: {
|
|
551
|
+
parameters: {
|
|
552
|
+
query?: never;
|
|
553
|
+
header?: {
|
|
554
|
+
authorization?: string | null;
|
|
555
|
+
};
|
|
556
|
+
path?: never;
|
|
557
|
+
cookie?: never;
|
|
558
|
+
};
|
|
559
|
+
requestBody?: {
|
|
560
|
+
content: {
|
|
561
|
+
"application/json": components["schemas"]["LogoutRequest"] | null;
|
|
562
|
+
};
|
|
563
|
+
};
|
|
564
|
+
responses: {
|
|
565
|
+
/** @description Successful Response */
|
|
566
|
+
200: {
|
|
567
|
+
headers: {
|
|
568
|
+
[name: string]: unknown;
|
|
569
|
+
};
|
|
570
|
+
content: {
|
|
571
|
+
"application/json": components["schemas"]["StandardResponse_Dict_str__Any__"];
|
|
572
|
+
};
|
|
573
|
+
};
|
|
574
|
+
/** @description Validation Error */
|
|
575
|
+
422: {
|
|
576
|
+
headers: {
|
|
577
|
+
[name: string]: unknown;
|
|
578
|
+
};
|
|
579
|
+
content: {
|
|
580
|
+
"application/json": components["schemas"]["HTTPValidationError"];
|
|
581
|
+
};
|
|
582
|
+
};
|
|
583
|
+
};
|
|
584
|
+
};
|
|
585
|
+
refreshToken: {
|
|
586
|
+
parameters: {
|
|
587
|
+
query?: never;
|
|
588
|
+
header?: never;
|
|
589
|
+
path?: never;
|
|
590
|
+
cookie?: never;
|
|
591
|
+
};
|
|
592
|
+
requestBody?: never;
|
|
593
|
+
responses: {
|
|
594
|
+
/** @description Successful Response */
|
|
595
|
+
200: {
|
|
596
|
+
headers: {
|
|
597
|
+
[name: string]: unknown;
|
|
598
|
+
};
|
|
599
|
+
content: {
|
|
600
|
+
"application/json": components["schemas"]["StandardResponse_Dict_str__Any__"];
|
|
601
|
+
};
|
|
602
|
+
};
|
|
603
|
+
};
|
|
604
|
+
};
|
|
605
|
+
initiateSocialLogin: {
|
|
606
|
+
parameters: {
|
|
607
|
+
query?: never;
|
|
608
|
+
header?: never;
|
|
609
|
+
path?: never;
|
|
610
|
+
cookie?: never;
|
|
611
|
+
};
|
|
612
|
+
requestBody: {
|
|
613
|
+
content: {
|
|
614
|
+
"application/json": components["schemas"]["SocialLoginRequest"];
|
|
615
|
+
};
|
|
616
|
+
};
|
|
617
|
+
responses: {
|
|
618
|
+
/** @description Successful Response */
|
|
619
|
+
200: {
|
|
620
|
+
headers: {
|
|
621
|
+
[name: string]: unknown;
|
|
622
|
+
};
|
|
623
|
+
content: {
|
|
624
|
+
"application/json": components["schemas"]["StandardResponse"];
|
|
625
|
+
};
|
|
626
|
+
};
|
|
627
|
+
/** @description Validation Error */
|
|
628
|
+
422: {
|
|
629
|
+
headers: {
|
|
630
|
+
[name: string]: unknown;
|
|
631
|
+
};
|
|
632
|
+
content: {
|
|
633
|
+
"application/json": components["schemas"]["HTTPValidationError"];
|
|
634
|
+
};
|
|
635
|
+
};
|
|
636
|
+
};
|
|
637
|
+
};
|
|
638
|
+
handleSocialCallback: {
|
|
639
|
+
parameters: {
|
|
640
|
+
query: {
|
|
641
|
+
/** @description Authorization code from OAuth provider */
|
|
642
|
+
code: string;
|
|
643
|
+
/** @description State parameter containing space_id and org_id */
|
|
644
|
+
state: string;
|
|
645
|
+
/** @description Error from OAuth provider */
|
|
646
|
+
error?: string | null;
|
|
647
|
+
};
|
|
648
|
+
header?: never;
|
|
649
|
+
path: {
|
|
650
|
+
provider: "google" | "facebook" | "linkedin" | "x" | "apple";
|
|
651
|
+
};
|
|
652
|
+
cookie?: never;
|
|
653
|
+
};
|
|
654
|
+
requestBody?: never;
|
|
655
|
+
responses: {
|
|
656
|
+
/** @description Successful Response */
|
|
657
|
+
200: {
|
|
658
|
+
headers: {
|
|
659
|
+
[name: string]: unknown;
|
|
660
|
+
};
|
|
661
|
+
content: {
|
|
662
|
+
"application/json": components["schemas"]["StandardResponse"];
|
|
663
|
+
};
|
|
664
|
+
};
|
|
665
|
+
/** @description Validation Error */
|
|
666
|
+
422: {
|
|
667
|
+
headers: {
|
|
668
|
+
[name: string]: unknown;
|
|
669
|
+
};
|
|
670
|
+
content: {
|
|
671
|
+
"application/json": components["schemas"]["HTTPValidationError"];
|
|
672
|
+
};
|
|
673
|
+
};
|
|
674
|
+
};
|
|
675
|
+
};
|
|
676
|
+
verifyMFAChallenge: {
|
|
677
|
+
parameters: {
|
|
678
|
+
query?: never;
|
|
679
|
+
header?: never;
|
|
680
|
+
path?: never;
|
|
681
|
+
cookie?: never;
|
|
682
|
+
};
|
|
683
|
+
requestBody: {
|
|
684
|
+
content: {
|
|
685
|
+
"application/json": components["schemas"]["MFAVerifyRequest"];
|
|
686
|
+
};
|
|
687
|
+
};
|
|
688
|
+
responses: {
|
|
689
|
+
/** @description Successful Response */
|
|
690
|
+
200: {
|
|
691
|
+
headers: {
|
|
692
|
+
[name: string]: unknown;
|
|
693
|
+
};
|
|
694
|
+
content: {
|
|
695
|
+
"application/json": components["schemas"]["StandardResponse"];
|
|
696
|
+
};
|
|
697
|
+
};
|
|
698
|
+
/** @description Validation Error */
|
|
699
|
+
422: {
|
|
700
|
+
headers: {
|
|
701
|
+
[name: string]: unknown;
|
|
702
|
+
};
|
|
703
|
+
content: {
|
|
704
|
+
"application/json": components["schemas"]["HTTPValidationError"];
|
|
705
|
+
};
|
|
706
|
+
};
|
|
707
|
+
};
|
|
708
|
+
};
|
|
709
|
+
resendMFAOTP: {
|
|
710
|
+
parameters: {
|
|
711
|
+
query?: never;
|
|
712
|
+
header?: never;
|
|
713
|
+
path: {
|
|
714
|
+
/** @description MFA challenge ID from the login response */
|
|
715
|
+
challenge_id: string;
|
|
716
|
+
};
|
|
717
|
+
cookie?: never;
|
|
718
|
+
};
|
|
719
|
+
requestBody: {
|
|
720
|
+
content: {
|
|
721
|
+
"application/json": components["schemas"]["MFAResendRequest"];
|
|
722
|
+
};
|
|
723
|
+
};
|
|
724
|
+
responses: {
|
|
725
|
+
/** @description Successful Response */
|
|
726
|
+
200: {
|
|
727
|
+
headers: {
|
|
728
|
+
[name: string]: unknown;
|
|
729
|
+
};
|
|
730
|
+
content: {
|
|
731
|
+
"application/json": components["schemas"]["StandardResponse"];
|
|
732
|
+
};
|
|
733
|
+
};
|
|
734
|
+
/** @description Validation Error */
|
|
735
|
+
422: {
|
|
736
|
+
headers: {
|
|
737
|
+
[name: string]: unknown;
|
|
738
|
+
};
|
|
739
|
+
content: {
|
|
740
|
+
"application/json": components["schemas"]["HTTPValidationError"];
|
|
741
|
+
};
|
|
742
|
+
};
|
|
743
|
+
};
|
|
744
|
+
};
|
|
745
|
+
}
|
|
746
|
+
//# sourceMappingURL=generated.d.ts.map
|