@corvushold/guard-sdk 0.10.0 → 0.11.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.d.cts CHANGED
@@ -1091,7 +1091,7 @@ declare class GuardClient {
1091
1091
  updateTenantSettings(tenantId: string, settings: TenantSettingsPutRequest): Promise<ResponseWrapper<unknown>>;
1092
1092
  /**
1093
1093
  * Start SSO flow with a provider slug.
1094
- * Uses V2 tenant-scoped URLs: /auth/sso/t/{tenant_id}/{slug}/login
1094
+ * Uses V2 tenant-scoped URLs: /api/v1/auth/sso/t/{tenant_id}/{slug}/login
1095
1095
  *
1096
1096
  * @param providerSlug - The provider slug (e.g., 'okta', 'azure-ad', 'google-saml')
1097
1097
  * @param params - Optional parameters for the SSO flow
@@ -1113,7 +1113,7 @@ declare class GuardClient {
1113
1113
  }>>;
1114
1114
  /**
1115
1115
  * Handle SSO callback and exchange code for tokens.
1116
- * Uses V2 tenant-scoped URLs: /auth/sso/t/{tenant_id}/{slug}/callback
1116
+ * Uses V2 tenant-scoped URLs: /api/v1/auth/sso/t/{tenant_id}/{slug}/callback
1117
1117
  *
1118
1118
  * @param providerSlug - The provider slug used in startSso
1119
1119
  * @param params - Callback parameters (code, state from IdP redirect)
@@ -1161,7 +1161,7 @@ declare class GuardClient {
1161
1161
  /**
1162
1162
  * Get computed Service Provider (SP) URLs for SAML configuration.
1163
1163
  * These URLs are needed by admins to configure their Identity Provider (IdP).
1164
- * URLs use V2 tenant-scoped format: /auth/sso/t/{tenant_id}/{slug}/*
1164
+ * URLs use V2 tenant-scoped format: /api/v1/auth/sso/t/{tenant_id}/{slug}/*
1165
1165
  *
1166
1166
  * @param slug - The provider slug (e.g. 'okta', 'azure-ad')
1167
1167
  * @param tenantId - Optional tenant ID (uses client's default if not provided)
@@ -1170,8 +1170,8 @@ declare class GuardClient {
1170
1170
  * @example
1171
1171
  * ```ts
1172
1172
  * const spInfo = await client.ssoGetSPInfo('okta');
1173
- * console.log(spInfo.data.entity_id); // https://api.example.com/auth/sso/t/{tenant_id}/okta/metadata
1174
- * console.log(spInfo.data.acs_url); // https://api.example.com/auth/sso/t/{tenant_id}/okta/callback
1173
+ * console.log(spInfo.data.entity_id); // https://api.example.com/api/v1/auth/sso/t/{tenant_id}/okta/metadata
1174
+ * console.log(spInfo.data.acs_url); // https://api.example.com/api/v1/auth/sso/t/{tenant_id}/okta/callback
1175
1175
  * console.log(spInfo.data.tenant_id); // The tenant UUID used in the URLs
1176
1176
  * ```
1177
1177
  */
package/dist/index.d.ts CHANGED
@@ -1091,7 +1091,7 @@ declare class GuardClient {
1091
1091
  updateTenantSettings(tenantId: string, settings: TenantSettingsPutRequest): Promise<ResponseWrapper<unknown>>;
1092
1092
  /**
1093
1093
  * Start SSO flow with a provider slug.
1094
- * Uses V2 tenant-scoped URLs: /auth/sso/t/{tenant_id}/{slug}/login
1094
+ * Uses V2 tenant-scoped URLs: /api/v1/auth/sso/t/{tenant_id}/{slug}/login
1095
1095
  *
1096
1096
  * @param providerSlug - The provider slug (e.g., 'okta', 'azure-ad', 'google-saml')
1097
1097
  * @param params - Optional parameters for the SSO flow
@@ -1113,7 +1113,7 @@ declare class GuardClient {
1113
1113
  }>>;
1114
1114
  /**
1115
1115
  * Handle SSO callback and exchange code for tokens.
1116
- * Uses V2 tenant-scoped URLs: /auth/sso/t/{tenant_id}/{slug}/callback
1116
+ * Uses V2 tenant-scoped URLs: /api/v1/auth/sso/t/{tenant_id}/{slug}/callback
1117
1117
  *
1118
1118
  * @param providerSlug - The provider slug used in startSso
1119
1119
  * @param params - Callback parameters (code, state from IdP redirect)
@@ -1161,7 +1161,7 @@ declare class GuardClient {
1161
1161
  /**
1162
1162
  * Get computed Service Provider (SP) URLs for SAML configuration.
1163
1163
  * These URLs are needed by admins to configure their Identity Provider (IdP).
1164
- * URLs use V2 tenant-scoped format: /auth/sso/t/{tenant_id}/{slug}/*
1164
+ * URLs use V2 tenant-scoped format: /api/v1/auth/sso/t/{tenant_id}/{slug}/*
1165
1165
  *
1166
1166
  * @param slug - The provider slug (e.g. 'okta', 'azure-ad')
1167
1167
  * @param tenantId - Optional tenant ID (uses client's default if not provided)
@@ -1170,8 +1170,8 @@ declare class GuardClient {
1170
1170
  * @example
1171
1171
  * ```ts
1172
1172
  * const spInfo = await client.ssoGetSPInfo('okta');
1173
- * console.log(spInfo.data.entity_id); // https://api.example.com/auth/sso/t/{tenant_id}/okta/metadata
1174
- * console.log(spInfo.data.acs_url); // https://api.example.com/auth/sso/t/{tenant_id}/okta/callback
1173
+ * console.log(spInfo.data.entity_id); // https://api.example.com/api/v1/auth/sso/t/{tenant_id}/okta/metadata
1174
+ * console.log(spInfo.data.acs_url); // https://api.example.com/api/v1/auth/sso/t/{tenant_id}/okta/callback
1175
1175
  * console.log(spInfo.data.tenant_id); // The tenant UUID used in the URLs
1176
1176
  * ```
1177
1177
  */
package/dist/index.js CHANGED
@@ -277,7 +277,7 @@ var HttpClient = class {
277
277
 
278
278
  // package.json
279
279
  var package_default = {
280
- version: "0.10.0"};
280
+ version: "0.11.1"};
281
281
 
282
282
  // src/client.ts
283
283
  function isTenantSelectionRequired(data) {
@@ -589,7 +589,7 @@ var GuardClient = class {
589
589
  }
590
590
  /**
591
591
  * Start SSO flow with a provider slug.
592
- * Uses V2 tenant-scoped URLs: /auth/sso/t/{tenant_id}/{slug}/login
592
+ * Uses V2 tenant-scoped URLs: /api/v1/auth/sso/t/{tenant_id}/{slug}/login
593
593
  *
594
594
  * @param providerSlug - The provider slug (e.g., 'okta', 'azure-ad', 'google-saml')
595
595
  * @param params - Optional parameters for the SSO flow
@@ -636,7 +636,7 @@ var GuardClient = class {
636
636
  }
637
637
  /**
638
638
  * Handle SSO callback and exchange code for tokens.
639
- * Uses V2 tenant-scoped URLs: /auth/sso/t/{tenant_id}/{slug}/callback
639
+ * Uses V2 tenant-scoped URLs: /api/v1/auth/sso/t/{tenant_id}/{slug}/callback
640
640
  *
641
641
  * @param providerSlug - The provider slug used in startSso
642
642
  * @param params - Callback parameters (code, state from IdP redirect)
@@ -803,7 +803,7 @@ var GuardClient = class {
803
803
  /**
804
804
  * Get computed Service Provider (SP) URLs for SAML configuration.
805
805
  * These URLs are needed by admins to configure their Identity Provider (IdP).
806
- * URLs use V2 tenant-scoped format: /auth/sso/t/{tenant_id}/{slug}/*
806
+ * URLs use V2 tenant-scoped format: /api/v1/auth/sso/t/{tenant_id}/{slug}/*
807
807
  *
808
808
  * @param slug - The provider slug (e.g. 'okta', 'azure-ad')
809
809
  * @param tenantId - Optional tenant ID (uses client's default if not provided)
@@ -812,8 +812,8 @@ var GuardClient = class {
812
812
  * @example
813
813
  * ```ts
814
814
  * const spInfo = await client.ssoGetSPInfo('okta');
815
- * console.log(spInfo.data.entity_id); // https://api.example.com/auth/sso/t/{tenant_id}/okta/metadata
816
- * console.log(spInfo.data.acs_url); // https://api.example.com/auth/sso/t/{tenant_id}/okta/callback
815
+ * console.log(spInfo.data.entity_id); // https://api.example.com/api/v1/auth/sso/t/{tenant_id}/okta/metadata
816
+ * console.log(spInfo.data.acs_url); // https://api.example.com/api/v1/auth/sso/t/{tenant_id}/okta/callback
817
817
  * console.log(spInfo.data.tenant_id); // The tenant UUID used in the URLs
818
818
  * ```
819
819
  */