@emilgroup/auth-sdk-node 1.4.0 → 1.9.1-beta.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.openapi-generator/FILES +2 -2
- package/README.md +2 -2
- package/api/authservice-api.ts +29 -29
- package/api/default-api.ts +8 -4
- package/dist/api/authservice-api.d.ts +613 -0
- package/dist/api/authservice-api.js +1069 -0
- package/dist/api/default-api.d.ts +70 -0
- package/dist/api/default-api.js +204 -0
- package/dist/api.d.ts +13 -0
- package/dist/api.js +31 -0
- package/dist/base.d.ts +78 -0
- package/dist/base.js +394 -0
- package/dist/common.d.ts +92 -0
- package/dist/common.js +277 -0
- package/dist/configuration.d.ts +90 -0
- package/dist/configuration.js +44 -0
- package/dist/index.d.ts +15 -0
- package/dist/index.js +36 -0
- package/dist/models/create-org-and-user-request-dto.d.ts +84 -0
- package/dist/models/create-org-and-user-request-dto.js +15 -0
- package/dist/models/create-org-and-user-response-class.d.ts +32 -0
- package/dist/models/create-org-and-user-response-class.js +15 -0
- package/dist/models/create-user-request-dto.d.ts +54 -0
- package/dist/models/create-user-request-dto.js +15 -0
- package/dist/models/create-user-response-class.d.ts +25 -0
- package/dist/models/create-user-response-class.js +15 -0
- package/dist/models/custom-schema-class.d.ts +66 -0
- package/dist/models/custom-schema-class.js +15 -0
- package/dist/models/forgot-password-request-dto.d.ts +24 -0
- package/dist/models/forgot-password-request-dto.js +15 -0
- package/dist/models/get-saml-login-link-request-dto.d.ts +24 -0
- package/dist/models/get-saml-login-link-request-dto.js +15 -0
- package/dist/models/index.d.ts +21 -0
- package/dist/models/index.js +37 -0
- package/dist/models/inline-response200.d.ts +54 -0
- package/dist/models/inline-response200.js +15 -0
- package/dist/models/inline-response503.d.ts +54 -0
- package/dist/models/inline-response503.js +15 -0
- package/dist/models/login-by-saml-request-dto.d.ts +30 -0
- package/dist/models/login-by-saml-request-dto.js +15 -0
- package/dist/models/login-class.d.ts +30 -0
- package/dist/models/login-class.js +15 -0
- package/dist/models/login-request-dto.d.ts +30 -0
- package/dist/models/login-request-dto.js +15 -0
- package/dist/models/logout-request-dto.d.ts +24 -0
- package/dist/models/logout-request-dto.js +15 -0
- package/dist/models/org-invitation-class.d.ts +109 -0
- package/dist/models/org-invitation-class.js +15 -0
- package/dist/models/organization-class.d.ts +114 -0
- package/dist/models/organization-class.js +15 -0
- package/dist/models/refresh-token-dto.d.ts +24 -0
- package/dist/models/refresh-token-dto.js +15 -0
- package/dist/models/reset-password-request-dto.d.ts +36 -0
- package/dist/models/reset-password-request-dto.js +15 -0
- package/dist/models/role-class.d.ts +54 -0
- package/dist/models/role-class.js +15 -0
- package/dist/models/user-class.d.ts +85 -0
- package/dist/models/user-class.js +15 -0
- package/dist/models/verify-org-invitation-request-dto.d.ts +24 -0
- package/dist/models/verify-org-invitation-request-dto.js +15 -0
- package/dist/models/verify-org-invitation-response-class.d.ts +32 -0
- package/dist/models/verify-org-invitation-response-class.js +15 -0
- package/models/{get-samllogin-link-request-dto.ts → get-saml-login-link-request-dto.ts} +3 -3
- package/models/index.ts +2 -2
- package/models/inline-response200.ts +6 -6
- package/models/inline-response503.ts +6 -6
- package/models/{login-by-samlrequest-dto.ts → login-by-saml-request-dto.ts} +4 -4
- package/package.json +1 -1
package/.openapi-generator/FILES
CHANGED
|
@@ -16,11 +16,11 @@ models/create-user-request-dto.ts
|
|
|
16
16
|
models/create-user-response-class.ts
|
|
17
17
|
models/custom-schema-class.ts
|
|
18
18
|
models/forgot-password-request-dto.ts
|
|
19
|
-
models/get-
|
|
19
|
+
models/get-saml-login-link-request-dto.ts
|
|
20
20
|
models/index.ts
|
|
21
21
|
models/inline-response200.ts
|
|
22
22
|
models/inline-response503.ts
|
|
23
|
-
models/login-by-
|
|
23
|
+
models/login-by-saml-request-dto.ts
|
|
24
24
|
models/login-class.ts
|
|
25
25
|
models/login-request-dto.ts
|
|
26
26
|
models/logout-request-dto.ts
|
package/README.md
CHANGED
|
@@ -17,11 +17,11 @@ Although this package can be used in both TypeScript and JavaScript, it is inten
|
|
|
17
17
|
Navigate to the folder of your consuming project and run one of the following commands:
|
|
18
18
|
|
|
19
19
|
```
|
|
20
|
-
npm install @emilgroup/auth-sdk-node@1.
|
|
20
|
+
npm install @emilgroup/auth-sdk-node@1.9.1-beta.2 --save
|
|
21
21
|
```
|
|
22
22
|
or
|
|
23
23
|
```
|
|
24
|
-
yarn add @emilgroup/auth-sdk-node@1.
|
|
24
|
+
yarn add @emilgroup/auth-sdk-node@1.9.1-beta.2
|
|
25
25
|
```
|
|
26
26
|
|
|
27
27
|
And then you can import ``.
|
package/api/authservice-api.ts
CHANGED
|
@@ -31,7 +31,7 @@ import { CreateUserResponseClass } from '../models';
|
|
|
31
31
|
// @ts-ignore
|
|
32
32
|
import { ForgotPasswordRequestDto } from '../models';
|
|
33
33
|
// @ts-ignore
|
|
34
|
-
import {
|
|
34
|
+
import { LoginBySamlRequestDto } from '../models';
|
|
35
35
|
// @ts-ignore
|
|
36
36
|
import { LoginClass } from '../models';
|
|
37
37
|
// @ts-ignore
|
|
@@ -169,8 +169,8 @@ export const AuthserviceApiAxiosParamCreator = function (configuration?: Configu
|
|
|
169
169
|
};
|
|
170
170
|
},
|
|
171
171
|
/**
|
|
172
|
-
* Get
|
|
173
|
-
* @summary Get
|
|
172
|
+
* Get SAML login link configured for the tenant in cognito as well as tenant settings
|
|
173
|
+
* @summary Get SAML login link for tenant
|
|
174
174
|
* @param {string} tenantSlug
|
|
175
175
|
* @param {*} [options] Override http request option.
|
|
176
176
|
* @throws {RequiredError}
|
|
@@ -248,13 +248,13 @@ export const AuthserviceApiAxiosParamCreator = function (configuration?: Configu
|
|
|
248
248
|
/**
|
|
249
249
|
* Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
|
|
250
250
|
* @summary Login by SAML idp provider such as ADFS
|
|
251
|
-
* @param {
|
|
251
|
+
* @param {LoginBySamlRequestDto} loginBySamlRequestDto
|
|
252
252
|
* @param {*} [options] Override http request option.
|
|
253
253
|
* @throws {RequiredError}
|
|
254
254
|
*/
|
|
255
|
-
|
|
256
|
-
// verify required parameter '
|
|
257
|
-
assertParamExists('
|
|
255
|
+
loginBySaml: async (loginBySamlRequestDto: LoginBySamlRequestDto, options: AxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
256
|
+
// verify required parameter 'loginBySamlRequestDto' is not null or undefined
|
|
257
|
+
assertParamExists('loginBySaml', 'loginBySamlRequestDto', loginBySamlRequestDto)
|
|
258
258
|
const localVarPath = `/authservice/v1/login/saml`;
|
|
259
259
|
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
260
260
|
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
@@ -276,7 +276,7 @@ export const AuthserviceApiAxiosParamCreator = function (configuration?: Configu
|
|
|
276
276
|
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
277
277
|
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
278
278
|
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
|
|
279
|
-
localVarRequestOptions.data = serializeDataIfNeeded(
|
|
279
|
+
localVarRequestOptions.data = serializeDataIfNeeded(loginBySamlRequestDto, localVarRequestOptions, configuration)
|
|
280
280
|
|
|
281
281
|
return {
|
|
282
282
|
url: toPathString(localVarUrlObj),
|
|
@@ -563,8 +563,8 @@ export const AuthserviceApiFp = function(configuration?: Configuration) {
|
|
|
563
563
|
return createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration);
|
|
564
564
|
},
|
|
565
565
|
/**
|
|
566
|
-
* Get
|
|
567
|
-
* @summary Get
|
|
566
|
+
* Get SAML login link configured for the tenant in cognito as well as tenant settings
|
|
567
|
+
* @summary Get SAML login link for tenant
|
|
568
568
|
* @param {string} tenantSlug
|
|
569
569
|
* @param {*} [options] Override http request option.
|
|
570
570
|
* @throws {RequiredError}
|
|
@@ -587,12 +587,12 @@ export const AuthserviceApiFp = function(configuration?: Configuration) {
|
|
|
587
587
|
/**
|
|
588
588
|
* Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
|
|
589
589
|
* @summary Login by SAML idp provider such as ADFS
|
|
590
|
-
* @param {
|
|
590
|
+
* @param {LoginBySamlRequestDto} loginBySamlRequestDto
|
|
591
591
|
* @param {*} [options] Override http request option.
|
|
592
592
|
* @throws {RequiredError}
|
|
593
593
|
*/
|
|
594
|
-
async
|
|
595
|
-
const localVarAxiosArgs = await localVarAxiosParamCreator.
|
|
594
|
+
async loginBySaml(loginBySamlRequestDto: LoginBySamlRequestDto, options?: AxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LoginClass>> {
|
|
595
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.loginBySaml(loginBySamlRequestDto, options);
|
|
596
596
|
return createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration);
|
|
597
597
|
},
|
|
598
598
|
/**
|
|
@@ -703,8 +703,8 @@ export const AuthserviceApiFactory = function (configuration?: Configuration, ba
|
|
|
703
703
|
return localVarFp.forgotPassword(forgotPasswordRequestDto, options).then((request) => request(axios, basePath));
|
|
704
704
|
},
|
|
705
705
|
/**
|
|
706
|
-
* Get
|
|
707
|
-
* @summary Get
|
|
706
|
+
* Get SAML login link configured for the tenant in cognito as well as tenant settings
|
|
707
|
+
* @summary Get SAML login link for tenant
|
|
708
708
|
* @param {string} tenantSlug
|
|
709
709
|
* @param {*} [options] Override http request option.
|
|
710
710
|
* @throws {RequiredError}
|
|
@@ -725,12 +725,12 @@ export const AuthserviceApiFactory = function (configuration?: Configuration, ba
|
|
|
725
725
|
/**
|
|
726
726
|
* Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
|
|
727
727
|
* @summary Login by SAML idp provider such as ADFS
|
|
728
|
-
* @param {
|
|
728
|
+
* @param {LoginBySamlRequestDto} loginBySamlRequestDto
|
|
729
729
|
* @param {*} [options] Override http request option.
|
|
730
730
|
* @throws {RequiredError}
|
|
731
731
|
*/
|
|
732
|
-
|
|
733
|
-
return localVarFp.
|
|
732
|
+
loginBySaml(loginBySamlRequestDto: LoginBySamlRequestDto, options?: any): AxiosPromise<LoginClass> {
|
|
733
|
+
return localVarFp.loginBySaml(loginBySamlRequestDto, options).then((request) => request(axios, basePath));
|
|
734
734
|
},
|
|
735
735
|
/**
|
|
736
736
|
* Sign tenant user out.
|
|
@@ -867,17 +867,17 @@ export interface AuthserviceApiLoginRequest {
|
|
|
867
867
|
}
|
|
868
868
|
|
|
869
869
|
/**
|
|
870
|
-
* Request parameters for
|
|
870
|
+
* Request parameters for loginBySaml operation in AuthserviceApi.
|
|
871
871
|
* @export
|
|
872
|
-
* @interface
|
|
872
|
+
* @interface AuthserviceApiLoginBySamlRequest
|
|
873
873
|
*/
|
|
874
|
-
export interface
|
|
874
|
+
export interface AuthserviceApiLoginBySamlRequest {
|
|
875
875
|
/**
|
|
876
876
|
*
|
|
877
|
-
* @type {
|
|
878
|
-
* @memberof
|
|
877
|
+
* @type {LoginBySamlRequestDto}
|
|
878
|
+
* @memberof AuthserviceApiLoginBySaml
|
|
879
879
|
*/
|
|
880
|
-
readonly
|
|
880
|
+
readonly loginBySamlRequestDto: LoginBySamlRequestDto
|
|
881
881
|
}
|
|
882
882
|
|
|
883
883
|
/**
|
|
@@ -1015,8 +1015,8 @@ export class AuthserviceApi extends BaseAPI {
|
|
|
1015
1015
|
}
|
|
1016
1016
|
|
|
1017
1017
|
/**
|
|
1018
|
-
* Get
|
|
1019
|
-
* @summary Get
|
|
1018
|
+
* Get SAML login link configured for the tenant in cognito as well as tenant settings
|
|
1019
|
+
* @summary Get SAML login link for tenant
|
|
1020
1020
|
* @param {AuthserviceApiGetSamlLoginLinkRequest} requestParameters Request parameters.
|
|
1021
1021
|
* @param {*} [options] Override http request option.
|
|
1022
1022
|
* @throws {RequiredError}
|
|
@@ -1041,13 +1041,13 @@ export class AuthserviceApi extends BaseAPI {
|
|
|
1041
1041
|
/**
|
|
1042
1042
|
* Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
|
|
1043
1043
|
* @summary Login by SAML idp provider such as ADFS
|
|
1044
|
-
* @param {
|
|
1044
|
+
* @param {AuthserviceApiLoginBySamlRequest} requestParameters Request parameters.
|
|
1045
1045
|
* @param {*} [options] Override http request option.
|
|
1046
1046
|
* @throws {RequiredError}
|
|
1047
1047
|
* @memberof AuthserviceApi
|
|
1048
1048
|
*/
|
|
1049
|
-
public
|
|
1050
|
-
return AuthserviceApiFp(this.configuration).
|
|
1049
|
+
public loginBySaml(requestParameters: AuthserviceApiLoginBySamlRequest, options?: AxiosRequestConfig) {
|
|
1050
|
+
return AuthserviceApiFp(this.configuration).loginBySaml(requestParameters.loginBySamlRequestDto, options).then((request) => request(this.axios, this.basePath));
|
|
1051
1051
|
}
|
|
1052
1052
|
|
|
1053
1053
|
/**
|
package/api/default-api.ts
CHANGED
|
@@ -35,7 +35,8 @@ const FormData = require('form-data');
|
|
|
35
35
|
export const DefaultApiAxiosParamCreator = function (configuration?: Configuration) {
|
|
36
36
|
return {
|
|
37
37
|
/**
|
|
38
|
-
*
|
|
38
|
+
* Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
|
|
39
|
+
* @summary Health Check
|
|
39
40
|
* @param {*} [options] Override http request option.
|
|
40
41
|
* @throws {RequiredError}
|
|
41
42
|
*/
|
|
@@ -76,7 +77,8 @@ export const DefaultApiFp = function(configuration?: Configuration) {
|
|
|
76
77
|
const localVarAxiosParamCreator = DefaultApiAxiosParamCreator(configuration)
|
|
77
78
|
return {
|
|
78
79
|
/**
|
|
79
|
-
*
|
|
80
|
+
* Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
|
|
81
|
+
* @summary Health Check
|
|
80
82
|
* @param {*} [options] Override http request option.
|
|
81
83
|
* @throws {RequiredError}
|
|
82
84
|
*/
|
|
@@ -95,7 +97,8 @@ export const DefaultApiFactory = function (configuration?: Configuration, basePa
|
|
|
95
97
|
const localVarFp = DefaultApiFp(configuration)
|
|
96
98
|
return {
|
|
97
99
|
/**
|
|
98
|
-
*
|
|
100
|
+
* Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
|
|
101
|
+
* @summary Health Check
|
|
99
102
|
* @param {*} [options] Override http request option.
|
|
100
103
|
* @throws {RequiredError}
|
|
101
104
|
*/
|
|
@@ -113,7 +116,8 @@ export const DefaultApiFactory = function (configuration?: Configuration, basePa
|
|
|
113
116
|
*/
|
|
114
117
|
export class DefaultApi extends BaseAPI {
|
|
115
118
|
/**
|
|
116
|
-
*
|
|
119
|
+
* Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
|
|
120
|
+
* @summary Health Check
|
|
117
121
|
* @param {*} [options] Override http request option.
|
|
118
122
|
* @throws {RequiredError}
|
|
119
123
|
* @memberof DefaultApi
|