@corvushold/guard-sdk 0.7.0 → 0.8.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.cjs +68 -68
- package/dist/index.cjs.map +1 -1
- package/dist/index.d.cts +91 -1
- package/dist/index.d.ts +91 -1
- package/dist/index.js +68 -68
- package/dist/index.js.map +1 -1
- package/package.json +1 -1
package/dist/index.d.cts
CHANGED
|
@@ -216,6 +216,47 @@ interface components {
|
|
|
216
216
|
current_password: string;
|
|
217
217
|
new_password: string;
|
|
218
218
|
};
|
|
219
|
+
"controller.createProviderRequest": {
|
|
220
|
+
acs_url?: string;
|
|
221
|
+
allow_signup?: boolean;
|
|
222
|
+
attribute_mapping?: {
|
|
223
|
+
[key: string]: string[];
|
|
224
|
+
};
|
|
225
|
+
authorization_endpoint?: string;
|
|
226
|
+
client_id?: string;
|
|
227
|
+
client_secret?: string;
|
|
228
|
+
domains?: string[];
|
|
229
|
+
enabled?: boolean;
|
|
230
|
+
/** @description SAML fields */
|
|
231
|
+
entity_id?: string;
|
|
232
|
+
force_authn?: boolean;
|
|
233
|
+
idp_certificate?: string;
|
|
234
|
+
idp_entity_id?: string;
|
|
235
|
+
idp_metadata_url?: string;
|
|
236
|
+
idp_metadata_xml?: string;
|
|
237
|
+
idp_slo_url?: string;
|
|
238
|
+
idp_sso_url?: string;
|
|
239
|
+
/** @description OIDC/OAuth2 fields */
|
|
240
|
+
issuer?: string;
|
|
241
|
+
jwks_uri?: string;
|
|
242
|
+
name?: string;
|
|
243
|
+
provider_type?: components["schemas"]["domain.ProviderType"];
|
|
244
|
+
response_mode?: string;
|
|
245
|
+
response_type?: string;
|
|
246
|
+
scopes?: string[];
|
|
247
|
+
sign_requests?: boolean;
|
|
248
|
+
slo_url?: string;
|
|
249
|
+
slug?: string;
|
|
250
|
+
sp_certificate?: string;
|
|
251
|
+
sp_certificate_expires_at?: string;
|
|
252
|
+
sp_private_key?: string;
|
|
253
|
+
tenant_id?: string;
|
|
254
|
+
token_endpoint?: string;
|
|
255
|
+
trust_email_verified?: boolean;
|
|
256
|
+
userinfo_endpoint?: string;
|
|
257
|
+
want_assertions_signed?: boolean;
|
|
258
|
+
want_response_signed?: boolean;
|
|
259
|
+
};
|
|
219
260
|
"controller.createTenantReq": {
|
|
220
261
|
name: string;
|
|
221
262
|
};
|
|
@@ -349,6 +390,15 @@ interface components {
|
|
|
349
390
|
object_id?: string;
|
|
350
391
|
object_type?: string;
|
|
351
392
|
};
|
|
393
|
+
"controller.portalSessionRequest": {
|
|
394
|
+
token?: string;
|
|
395
|
+
};
|
|
396
|
+
"controller.portalSessionResponse": {
|
|
397
|
+
intent?: string;
|
|
398
|
+
portal_token_id?: string;
|
|
399
|
+
provider_slug?: string;
|
|
400
|
+
tenant_id?: string;
|
|
401
|
+
};
|
|
352
402
|
"controller.putSettingsRequest": {
|
|
353
403
|
/** @description App */
|
|
354
404
|
app_cors_allowed_origins?: string;
|
|
@@ -485,6 +535,44 @@ interface components {
|
|
|
485
535
|
first_name?: string;
|
|
486
536
|
last_name?: string;
|
|
487
537
|
};
|
|
538
|
+
"controller.updateProviderRequest": {
|
|
539
|
+
acs_url?: string;
|
|
540
|
+
allow_signup?: boolean;
|
|
541
|
+
attribute_mapping?: {
|
|
542
|
+
[key: string]: string[];
|
|
543
|
+
};
|
|
544
|
+
authorization_endpoint?: string;
|
|
545
|
+
client_id?: string;
|
|
546
|
+
client_secret?: string;
|
|
547
|
+
domains?: string[];
|
|
548
|
+
enabled?: boolean;
|
|
549
|
+
/** @description SAML fields */
|
|
550
|
+
entity_id?: string;
|
|
551
|
+
force_authn?: boolean;
|
|
552
|
+
idp_certificate?: string;
|
|
553
|
+
idp_entity_id?: string;
|
|
554
|
+
idp_metadata_url?: string;
|
|
555
|
+
idp_metadata_xml?: string;
|
|
556
|
+
idp_slo_url?: string;
|
|
557
|
+
idp_sso_url?: string;
|
|
558
|
+
/** @description OIDC/OAuth2 fields */
|
|
559
|
+
issuer?: string;
|
|
560
|
+
jwks_uri?: string;
|
|
561
|
+
name?: string;
|
|
562
|
+
response_mode?: string;
|
|
563
|
+
response_type?: string;
|
|
564
|
+
scopes?: string[];
|
|
565
|
+
sign_requests?: boolean;
|
|
566
|
+
slo_url?: string;
|
|
567
|
+
sp_certificate?: string;
|
|
568
|
+
sp_certificate_expires_at?: string;
|
|
569
|
+
sp_private_key?: string;
|
|
570
|
+
token_endpoint?: string;
|
|
571
|
+
trust_email_verified?: boolean;
|
|
572
|
+
userinfo_endpoint?: string;
|
|
573
|
+
want_assertions_signed?: boolean;
|
|
574
|
+
want_response_signed?: boolean;
|
|
575
|
+
};
|
|
488
576
|
"domain.Introspection": {
|
|
489
577
|
active?: boolean;
|
|
490
578
|
email?: string;
|
|
@@ -499,6 +587,8 @@ interface components {
|
|
|
499
587
|
"domain.PortalLink": {
|
|
500
588
|
link?: string;
|
|
501
589
|
};
|
|
590
|
+
/** @enum {string} */
|
|
591
|
+
"domain.ProviderType": "oidc" | "saml" | "oauth2" | "workos" | "dev";
|
|
502
592
|
"domain.UserProfile": {
|
|
503
593
|
email?: string;
|
|
504
594
|
email_verified?: boolean;
|
|
@@ -1032,7 +1122,7 @@ declare class GuardClient {
|
|
|
1032
1122
|
parseSsoCallbackTokens(url: string): TokensResp | null;
|
|
1033
1123
|
getSsoOrganizationPortalLink(provider: SsoProvider, params: {
|
|
1034
1124
|
tenant_id?: string;
|
|
1035
|
-
organization_id
|
|
1125
|
+
organization_id?: string;
|
|
1036
1126
|
intent?: string;
|
|
1037
1127
|
}): Promise<ResponseWrapper<PortalLink>>;
|
|
1038
1128
|
ssoPortalSession(token: string): Promise<ResponseWrapper<SsoPortalSessionResp>>;
|
package/dist/index.d.ts
CHANGED
|
@@ -216,6 +216,47 @@ interface components {
|
|
|
216
216
|
current_password: string;
|
|
217
217
|
new_password: string;
|
|
218
218
|
};
|
|
219
|
+
"controller.createProviderRequest": {
|
|
220
|
+
acs_url?: string;
|
|
221
|
+
allow_signup?: boolean;
|
|
222
|
+
attribute_mapping?: {
|
|
223
|
+
[key: string]: string[];
|
|
224
|
+
};
|
|
225
|
+
authorization_endpoint?: string;
|
|
226
|
+
client_id?: string;
|
|
227
|
+
client_secret?: string;
|
|
228
|
+
domains?: string[];
|
|
229
|
+
enabled?: boolean;
|
|
230
|
+
/** @description SAML fields */
|
|
231
|
+
entity_id?: string;
|
|
232
|
+
force_authn?: boolean;
|
|
233
|
+
idp_certificate?: string;
|
|
234
|
+
idp_entity_id?: string;
|
|
235
|
+
idp_metadata_url?: string;
|
|
236
|
+
idp_metadata_xml?: string;
|
|
237
|
+
idp_slo_url?: string;
|
|
238
|
+
idp_sso_url?: string;
|
|
239
|
+
/** @description OIDC/OAuth2 fields */
|
|
240
|
+
issuer?: string;
|
|
241
|
+
jwks_uri?: string;
|
|
242
|
+
name?: string;
|
|
243
|
+
provider_type?: components["schemas"]["domain.ProviderType"];
|
|
244
|
+
response_mode?: string;
|
|
245
|
+
response_type?: string;
|
|
246
|
+
scopes?: string[];
|
|
247
|
+
sign_requests?: boolean;
|
|
248
|
+
slo_url?: string;
|
|
249
|
+
slug?: string;
|
|
250
|
+
sp_certificate?: string;
|
|
251
|
+
sp_certificate_expires_at?: string;
|
|
252
|
+
sp_private_key?: string;
|
|
253
|
+
tenant_id?: string;
|
|
254
|
+
token_endpoint?: string;
|
|
255
|
+
trust_email_verified?: boolean;
|
|
256
|
+
userinfo_endpoint?: string;
|
|
257
|
+
want_assertions_signed?: boolean;
|
|
258
|
+
want_response_signed?: boolean;
|
|
259
|
+
};
|
|
219
260
|
"controller.createTenantReq": {
|
|
220
261
|
name: string;
|
|
221
262
|
};
|
|
@@ -349,6 +390,15 @@ interface components {
|
|
|
349
390
|
object_id?: string;
|
|
350
391
|
object_type?: string;
|
|
351
392
|
};
|
|
393
|
+
"controller.portalSessionRequest": {
|
|
394
|
+
token?: string;
|
|
395
|
+
};
|
|
396
|
+
"controller.portalSessionResponse": {
|
|
397
|
+
intent?: string;
|
|
398
|
+
portal_token_id?: string;
|
|
399
|
+
provider_slug?: string;
|
|
400
|
+
tenant_id?: string;
|
|
401
|
+
};
|
|
352
402
|
"controller.putSettingsRequest": {
|
|
353
403
|
/** @description App */
|
|
354
404
|
app_cors_allowed_origins?: string;
|
|
@@ -485,6 +535,44 @@ interface components {
|
|
|
485
535
|
first_name?: string;
|
|
486
536
|
last_name?: string;
|
|
487
537
|
};
|
|
538
|
+
"controller.updateProviderRequest": {
|
|
539
|
+
acs_url?: string;
|
|
540
|
+
allow_signup?: boolean;
|
|
541
|
+
attribute_mapping?: {
|
|
542
|
+
[key: string]: string[];
|
|
543
|
+
};
|
|
544
|
+
authorization_endpoint?: string;
|
|
545
|
+
client_id?: string;
|
|
546
|
+
client_secret?: string;
|
|
547
|
+
domains?: string[];
|
|
548
|
+
enabled?: boolean;
|
|
549
|
+
/** @description SAML fields */
|
|
550
|
+
entity_id?: string;
|
|
551
|
+
force_authn?: boolean;
|
|
552
|
+
idp_certificate?: string;
|
|
553
|
+
idp_entity_id?: string;
|
|
554
|
+
idp_metadata_url?: string;
|
|
555
|
+
idp_metadata_xml?: string;
|
|
556
|
+
idp_slo_url?: string;
|
|
557
|
+
idp_sso_url?: string;
|
|
558
|
+
/** @description OIDC/OAuth2 fields */
|
|
559
|
+
issuer?: string;
|
|
560
|
+
jwks_uri?: string;
|
|
561
|
+
name?: string;
|
|
562
|
+
response_mode?: string;
|
|
563
|
+
response_type?: string;
|
|
564
|
+
scopes?: string[];
|
|
565
|
+
sign_requests?: boolean;
|
|
566
|
+
slo_url?: string;
|
|
567
|
+
sp_certificate?: string;
|
|
568
|
+
sp_certificate_expires_at?: string;
|
|
569
|
+
sp_private_key?: string;
|
|
570
|
+
token_endpoint?: string;
|
|
571
|
+
trust_email_verified?: boolean;
|
|
572
|
+
userinfo_endpoint?: string;
|
|
573
|
+
want_assertions_signed?: boolean;
|
|
574
|
+
want_response_signed?: boolean;
|
|
575
|
+
};
|
|
488
576
|
"domain.Introspection": {
|
|
489
577
|
active?: boolean;
|
|
490
578
|
email?: string;
|
|
@@ -499,6 +587,8 @@ interface components {
|
|
|
499
587
|
"domain.PortalLink": {
|
|
500
588
|
link?: string;
|
|
501
589
|
};
|
|
590
|
+
/** @enum {string} */
|
|
591
|
+
"domain.ProviderType": "oidc" | "saml" | "oauth2" | "workos" | "dev";
|
|
502
592
|
"domain.UserProfile": {
|
|
503
593
|
email?: string;
|
|
504
594
|
email_verified?: boolean;
|
|
@@ -1032,7 +1122,7 @@ declare class GuardClient {
|
|
|
1032
1122
|
parseSsoCallbackTokens(url: string): TokensResp | null;
|
|
1033
1123
|
getSsoOrganizationPortalLink(provider: SsoProvider, params: {
|
|
1034
1124
|
tenant_id?: string;
|
|
1035
|
-
organization_id
|
|
1125
|
+
organization_id?: string;
|
|
1036
1126
|
intent?: string;
|
|
1037
1127
|
}): Promise<ResponseWrapper<PortalLink>>;
|
|
1038
1128
|
ssoPortalSession(token: string): Promise<ResponseWrapper<SsoPortalSessionResp>>;
|