@corvushold/guard-sdk 0.7.0 → 0.8.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.d.cts CHANGED
@@ -216,6 +216,47 @@ interface components {
216
216
  current_password: string;
217
217
  new_password: string;
218
218
  };
219
+ "controller.createProviderRequest": {
220
+ acs_url?: string;
221
+ allow_signup?: boolean;
222
+ attribute_mapping?: {
223
+ [key: string]: string[];
224
+ };
225
+ authorization_endpoint?: string;
226
+ client_id?: string;
227
+ client_secret?: string;
228
+ domains?: string[];
229
+ enabled?: boolean;
230
+ /** @description SAML fields */
231
+ entity_id?: string;
232
+ force_authn?: boolean;
233
+ idp_certificate?: string;
234
+ idp_entity_id?: string;
235
+ idp_metadata_url?: string;
236
+ idp_metadata_xml?: string;
237
+ idp_slo_url?: string;
238
+ idp_sso_url?: string;
239
+ /** @description OIDC/OAuth2 fields */
240
+ issuer?: string;
241
+ jwks_uri?: string;
242
+ name?: string;
243
+ provider_type?: components["schemas"]["domain.ProviderType"];
244
+ response_mode?: string;
245
+ response_type?: string;
246
+ scopes?: string[];
247
+ sign_requests?: boolean;
248
+ slo_url?: string;
249
+ slug?: string;
250
+ sp_certificate?: string;
251
+ sp_certificate_expires_at?: string;
252
+ sp_private_key?: string;
253
+ tenant_id?: string;
254
+ token_endpoint?: string;
255
+ trust_email_verified?: boolean;
256
+ userinfo_endpoint?: string;
257
+ want_assertions_signed?: boolean;
258
+ want_response_signed?: boolean;
259
+ };
219
260
  "controller.createTenantReq": {
220
261
  name: string;
221
262
  };
@@ -349,6 +390,15 @@ interface components {
349
390
  object_id?: string;
350
391
  object_type?: string;
351
392
  };
393
+ "controller.portalSessionRequest": {
394
+ token?: string;
395
+ };
396
+ "controller.portalSessionResponse": {
397
+ intent?: string;
398
+ portal_token_id?: string;
399
+ provider_slug?: string;
400
+ tenant_id?: string;
401
+ };
352
402
  "controller.putSettingsRequest": {
353
403
  /** @description App */
354
404
  app_cors_allowed_origins?: string;
@@ -485,6 +535,44 @@ interface components {
485
535
  first_name?: string;
486
536
  last_name?: string;
487
537
  };
538
+ "controller.updateProviderRequest": {
539
+ acs_url?: string;
540
+ allow_signup?: boolean;
541
+ attribute_mapping?: {
542
+ [key: string]: string[];
543
+ };
544
+ authorization_endpoint?: string;
545
+ client_id?: string;
546
+ client_secret?: string;
547
+ domains?: string[];
548
+ enabled?: boolean;
549
+ /** @description SAML fields */
550
+ entity_id?: string;
551
+ force_authn?: boolean;
552
+ idp_certificate?: string;
553
+ idp_entity_id?: string;
554
+ idp_metadata_url?: string;
555
+ idp_metadata_xml?: string;
556
+ idp_slo_url?: string;
557
+ idp_sso_url?: string;
558
+ /** @description OIDC/OAuth2 fields */
559
+ issuer?: string;
560
+ jwks_uri?: string;
561
+ name?: string;
562
+ response_mode?: string;
563
+ response_type?: string;
564
+ scopes?: string[];
565
+ sign_requests?: boolean;
566
+ slo_url?: string;
567
+ sp_certificate?: string;
568
+ sp_certificate_expires_at?: string;
569
+ sp_private_key?: string;
570
+ token_endpoint?: string;
571
+ trust_email_verified?: boolean;
572
+ userinfo_endpoint?: string;
573
+ want_assertions_signed?: boolean;
574
+ want_response_signed?: boolean;
575
+ };
488
576
  "domain.Introspection": {
489
577
  active?: boolean;
490
578
  email?: string;
@@ -499,6 +587,8 @@ interface components {
499
587
  "domain.PortalLink": {
500
588
  link?: string;
501
589
  };
590
+ /** @enum {string} */
591
+ "domain.ProviderType": "oidc" | "saml" | "oauth2" | "workos" | "dev";
502
592
  "domain.UserProfile": {
503
593
  email?: string;
504
594
  email_verified?: boolean;
@@ -1032,7 +1122,7 @@ declare class GuardClient {
1032
1122
  parseSsoCallbackTokens(url: string): TokensResp | null;
1033
1123
  getSsoOrganizationPortalLink(provider: SsoProvider, params: {
1034
1124
  tenant_id?: string;
1035
- organization_id: string;
1125
+ organization_id?: string;
1036
1126
  intent?: string;
1037
1127
  }): Promise<ResponseWrapper<PortalLink>>;
1038
1128
  ssoPortalSession(token: string): Promise<ResponseWrapper<SsoPortalSessionResp>>;
package/dist/index.d.ts CHANGED
@@ -216,6 +216,47 @@ interface components {
216
216
  current_password: string;
217
217
  new_password: string;
218
218
  };
219
+ "controller.createProviderRequest": {
220
+ acs_url?: string;
221
+ allow_signup?: boolean;
222
+ attribute_mapping?: {
223
+ [key: string]: string[];
224
+ };
225
+ authorization_endpoint?: string;
226
+ client_id?: string;
227
+ client_secret?: string;
228
+ domains?: string[];
229
+ enabled?: boolean;
230
+ /** @description SAML fields */
231
+ entity_id?: string;
232
+ force_authn?: boolean;
233
+ idp_certificate?: string;
234
+ idp_entity_id?: string;
235
+ idp_metadata_url?: string;
236
+ idp_metadata_xml?: string;
237
+ idp_slo_url?: string;
238
+ idp_sso_url?: string;
239
+ /** @description OIDC/OAuth2 fields */
240
+ issuer?: string;
241
+ jwks_uri?: string;
242
+ name?: string;
243
+ provider_type?: components["schemas"]["domain.ProviderType"];
244
+ response_mode?: string;
245
+ response_type?: string;
246
+ scopes?: string[];
247
+ sign_requests?: boolean;
248
+ slo_url?: string;
249
+ slug?: string;
250
+ sp_certificate?: string;
251
+ sp_certificate_expires_at?: string;
252
+ sp_private_key?: string;
253
+ tenant_id?: string;
254
+ token_endpoint?: string;
255
+ trust_email_verified?: boolean;
256
+ userinfo_endpoint?: string;
257
+ want_assertions_signed?: boolean;
258
+ want_response_signed?: boolean;
259
+ };
219
260
  "controller.createTenantReq": {
220
261
  name: string;
221
262
  };
@@ -349,6 +390,15 @@ interface components {
349
390
  object_id?: string;
350
391
  object_type?: string;
351
392
  };
393
+ "controller.portalSessionRequest": {
394
+ token?: string;
395
+ };
396
+ "controller.portalSessionResponse": {
397
+ intent?: string;
398
+ portal_token_id?: string;
399
+ provider_slug?: string;
400
+ tenant_id?: string;
401
+ };
352
402
  "controller.putSettingsRequest": {
353
403
  /** @description App */
354
404
  app_cors_allowed_origins?: string;
@@ -485,6 +535,44 @@ interface components {
485
535
  first_name?: string;
486
536
  last_name?: string;
487
537
  };
538
+ "controller.updateProviderRequest": {
539
+ acs_url?: string;
540
+ allow_signup?: boolean;
541
+ attribute_mapping?: {
542
+ [key: string]: string[];
543
+ };
544
+ authorization_endpoint?: string;
545
+ client_id?: string;
546
+ client_secret?: string;
547
+ domains?: string[];
548
+ enabled?: boolean;
549
+ /** @description SAML fields */
550
+ entity_id?: string;
551
+ force_authn?: boolean;
552
+ idp_certificate?: string;
553
+ idp_entity_id?: string;
554
+ idp_metadata_url?: string;
555
+ idp_metadata_xml?: string;
556
+ idp_slo_url?: string;
557
+ idp_sso_url?: string;
558
+ /** @description OIDC/OAuth2 fields */
559
+ issuer?: string;
560
+ jwks_uri?: string;
561
+ name?: string;
562
+ response_mode?: string;
563
+ response_type?: string;
564
+ scopes?: string[];
565
+ sign_requests?: boolean;
566
+ slo_url?: string;
567
+ sp_certificate?: string;
568
+ sp_certificate_expires_at?: string;
569
+ sp_private_key?: string;
570
+ token_endpoint?: string;
571
+ trust_email_verified?: boolean;
572
+ userinfo_endpoint?: string;
573
+ want_assertions_signed?: boolean;
574
+ want_response_signed?: boolean;
575
+ };
488
576
  "domain.Introspection": {
489
577
  active?: boolean;
490
578
  email?: string;
@@ -499,6 +587,8 @@ interface components {
499
587
  "domain.PortalLink": {
500
588
  link?: string;
501
589
  };
590
+ /** @enum {string} */
591
+ "domain.ProviderType": "oidc" | "saml" | "oauth2" | "workos" | "dev";
502
592
  "domain.UserProfile": {
503
593
  email?: string;
504
594
  email_verified?: boolean;
@@ -1032,7 +1122,7 @@ declare class GuardClient {
1032
1122
  parseSsoCallbackTokens(url: string): TokensResp | null;
1033
1123
  getSsoOrganizationPortalLink(provider: SsoProvider, params: {
1034
1124
  tenant_id?: string;
1035
- organization_id: string;
1125
+ organization_id?: string;
1036
1126
  intent?: string;
1037
1127
  }): Promise<ResponseWrapper<PortalLink>>;
1038
1128
  ssoPortalSession(token: string): Promise<ResponseWrapper<SsoPortalSessionResp>>;