@emilgroup/auth-sdk-node 1.4.0 → 1.9.1-beta.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (68) hide show
  1. package/.openapi-generator/FILES +2 -2
  2. package/README.md +2 -2
  3. package/api/authservice-api.ts +29 -29
  4. package/api/default-api.ts +8 -4
  5. package/dist/api/authservice-api.d.ts +613 -0
  6. package/dist/api/authservice-api.js +1069 -0
  7. package/dist/api/default-api.d.ts +70 -0
  8. package/dist/api/default-api.js +204 -0
  9. package/dist/api.d.ts +13 -0
  10. package/dist/api.js +31 -0
  11. package/dist/base.d.ts +78 -0
  12. package/dist/base.js +394 -0
  13. package/dist/common.d.ts +92 -0
  14. package/dist/common.js +277 -0
  15. package/dist/configuration.d.ts +90 -0
  16. package/dist/configuration.js +44 -0
  17. package/dist/index.d.ts +15 -0
  18. package/dist/index.js +36 -0
  19. package/dist/models/create-org-and-user-request-dto.d.ts +84 -0
  20. package/dist/models/create-org-and-user-request-dto.js +15 -0
  21. package/dist/models/create-org-and-user-response-class.d.ts +32 -0
  22. package/dist/models/create-org-and-user-response-class.js +15 -0
  23. package/dist/models/create-user-request-dto.d.ts +54 -0
  24. package/dist/models/create-user-request-dto.js +15 -0
  25. package/dist/models/create-user-response-class.d.ts +25 -0
  26. package/dist/models/create-user-response-class.js +15 -0
  27. package/dist/models/custom-schema-class.d.ts +66 -0
  28. package/dist/models/custom-schema-class.js +15 -0
  29. package/dist/models/forgot-password-request-dto.d.ts +24 -0
  30. package/dist/models/forgot-password-request-dto.js +15 -0
  31. package/dist/models/get-saml-login-link-request-dto.d.ts +24 -0
  32. package/dist/models/get-saml-login-link-request-dto.js +15 -0
  33. package/dist/models/index.d.ts +21 -0
  34. package/dist/models/index.js +37 -0
  35. package/dist/models/inline-response200.d.ts +54 -0
  36. package/dist/models/inline-response200.js +15 -0
  37. package/dist/models/inline-response503.d.ts +54 -0
  38. package/dist/models/inline-response503.js +15 -0
  39. package/dist/models/login-by-saml-request-dto.d.ts +30 -0
  40. package/dist/models/login-by-saml-request-dto.js +15 -0
  41. package/dist/models/login-class.d.ts +30 -0
  42. package/dist/models/login-class.js +15 -0
  43. package/dist/models/login-request-dto.d.ts +30 -0
  44. package/dist/models/login-request-dto.js +15 -0
  45. package/dist/models/logout-request-dto.d.ts +24 -0
  46. package/dist/models/logout-request-dto.js +15 -0
  47. package/dist/models/org-invitation-class.d.ts +109 -0
  48. package/dist/models/org-invitation-class.js +15 -0
  49. package/dist/models/organization-class.d.ts +114 -0
  50. package/dist/models/organization-class.js +15 -0
  51. package/dist/models/refresh-token-dto.d.ts +24 -0
  52. package/dist/models/refresh-token-dto.js +15 -0
  53. package/dist/models/reset-password-request-dto.d.ts +36 -0
  54. package/dist/models/reset-password-request-dto.js +15 -0
  55. package/dist/models/role-class.d.ts +54 -0
  56. package/dist/models/role-class.js +15 -0
  57. package/dist/models/user-class.d.ts +85 -0
  58. package/dist/models/user-class.js +15 -0
  59. package/dist/models/verify-org-invitation-request-dto.d.ts +24 -0
  60. package/dist/models/verify-org-invitation-request-dto.js +15 -0
  61. package/dist/models/verify-org-invitation-response-class.d.ts +32 -0
  62. package/dist/models/verify-org-invitation-response-class.js +15 -0
  63. package/models/{get-samllogin-link-request-dto.ts → get-saml-login-link-request-dto.ts} +3 -3
  64. package/models/index.ts +2 -2
  65. package/models/inline-response200.ts +6 -6
  66. package/models/inline-response503.ts +6 -6
  67. package/models/{login-by-samlrequest-dto.ts → login-by-saml-request-dto.ts} +4 -4
  68. package/package.json +1 -1
@@ -16,11 +16,11 @@ models/create-user-request-dto.ts
16
16
  models/create-user-response-class.ts
17
17
  models/custom-schema-class.ts
18
18
  models/forgot-password-request-dto.ts
19
- models/get-samllogin-link-request-dto.ts
19
+ models/get-saml-login-link-request-dto.ts
20
20
  models/index.ts
21
21
  models/inline-response200.ts
22
22
  models/inline-response503.ts
23
- models/login-by-samlrequest-dto.ts
23
+ models/login-by-saml-request-dto.ts
24
24
  models/login-class.ts
25
25
  models/login-request-dto.ts
26
26
  models/logout-request-dto.ts
package/README.md CHANGED
@@ -17,11 +17,11 @@ Although this package can be used in both TypeScript and JavaScript, it is inten
17
17
  Navigate to the folder of your consuming project and run one of the following commands:
18
18
 
19
19
  ```
20
- npm install @emilgroup/auth-sdk-node@1.4.0 --save
20
+ npm install @emilgroup/auth-sdk-node@1.9.1-beta.2 --save
21
21
  ```
22
22
  or
23
23
  ```
24
- yarn add @emilgroup/auth-sdk-node@1.4.0
24
+ yarn add @emilgroup/auth-sdk-node@1.9.1-beta.2
25
25
  ```
26
26
 
27
27
  And then you can import ``.
@@ -31,7 +31,7 @@ import { CreateUserResponseClass } from '../models';
31
31
  // @ts-ignore
32
32
  import { ForgotPasswordRequestDto } from '../models';
33
33
  // @ts-ignore
34
- import { LoginBySAMLRequestDto } from '../models';
34
+ import { LoginBySamlRequestDto } from '../models';
35
35
  // @ts-ignore
36
36
  import { LoginClass } from '../models';
37
37
  // @ts-ignore
@@ -169,8 +169,8 @@ export const AuthserviceApiAxiosParamCreator = function (configuration?: Configu
169
169
  };
170
170
  },
171
171
  /**
172
- * Get saml login link configured for the tenant in cognito as well as tenant settings
173
- * @summary Get saml login link for tenant
172
+ * Get SAML login link configured for the tenant in cognito as well as tenant settings
173
+ * @summary Get SAML login link for tenant
174
174
  * @param {string} tenantSlug
175
175
  * @param {*} [options] Override http request option.
176
176
  * @throws {RequiredError}
@@ -248,13 +248,13 @@ export const AuthserviceApiAxiosParamCreator = function (configuration?: Configu
248
248
  /**
249
249
  * Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
250
250
  * @summary Login by SAML idp provider such as ADFS
251
- * @param {LoginBySAMLRequestDto} loginBySAMLRequestDto
251
+ * @param {LoginBySamlRequestDto} loginBySamlRequestDto
252
252
  * @param {*} [options] Override http request option.
253
253
  * @throws {RequiredError}
254
254
  */
255
- loginBySAML: async (loginBySAMLRequestDto: LoginBySAMLRequestDto, options: AxiosRequestConfig = {}): Promise<RequestArgs> => {
256
- // verify required parameter 'loginBySAMLRequestDto' is not null or undefined
257
- assertParamExists('loginBySAML', 'loginBySAMLRequestDto', loginBySAMLRequestDto)
255
+ loginBySaml: async (loginBySamlRequestDto: LoginBySamlRequestDto, options: AxiosRequestConfig = {}): Promise<RequestArgs> => {
256
+ // verify required parameter 'loginBySamlRequestDto' is not null or undefined
257
+ assertParamExists('loginBySaml', 'loginBySamlRequestDto', loginBySamlRequestDto)
258
258
  const localVarPath = `/authservice/v1/login/saml`;
259
259
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
260
260
  const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
@@ -276,7 +276,7 @@ export const AuthserviceApiAxiosParamCreator = function (configuration?: Configu
276
276
  setSearchParams(localVarUrlObj, localVarQueryParameter);
277
277
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
278
278
  localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
279
- localVarRequestOptions.data = serializeDataIfNeeded(loginBySAMLRequestDto, localVarRequestOptions, configuration)
279
+ localVarRequestOptions.data = serializeDataIfNeeded(loginBySamlRequestDto, localVarRequestOptions, configuration)
280
280
 
281
281
  return {
282
282
  url: toPathString(localVarUrlObj),
@@ -563,8 +563,8 @@ export const AuthserviceApiFp = function(configuration?: Configuration) {
563
563
  return createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration);
564
564
  },
565
565
  /**
566
- * Get saml login link configured for the tenant in cognito as well as tenant settings
567
- * @summary Get saml login link for tenant
566
+ * Get SAML login link configured for the tenant in cognito as well as tenant settings
567
+ * @summary Get SAML login link for tenant
568
568
  * @param {string} tenantSlug
569
569
  * @param {*} [options] Override http request option.
570
570
  * @throws {RequiredError}
@@ -587,12 +587,12 @@ export const AuthserviceApiFp = function(configuration?: Configuration) {
587
587
  /**
588
588
  * Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
589
589
  * @summary Login by SAML idp provider such as ADFS
590
- * @param {LoginBySAMLRequestDto} loginBySAMLRequestDto
590
+ * @param {LoginBySamlRequestDto} loginBySamlRequestDto
591
591
  * @param {*} [options] Override http request option.
592
592
  * @throws {RequiredError}
593
593
  */
594
- async loginBySAML(loginBySAMLRequestDto: LoginBySAMLRequestDto, options?: AxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LoginClass>> {
595
- const localVarAxiosArgs = await localVarAxiosParamCreator.loginBySAML(loginBySAMLRequestDto, options);
594
+ async loginBySaml(loginBySamlRequestDto: LoginBySamlRequestDto, options?: AxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LoginClass>> {
595
+ const localVarAxiosArgs = await localVarAxiosParamCreator.loginBySaml(loginBySamlRequestDto, options);
596
596
  return createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration);
597
597
  },
598
598
  /**
@@ -703,8 +703,8 @@ export const AuthserviceApiFactory = function (configuration?: Configuration, ba
703
703
  return localVarFp.forgotPassword(forgotPasswordRequestDto, options).then((request) => request(axios, basePath));
704
704
  },
705
705
  /**
706
- * Get saml login link configured for the tenant in cognito as well as tenant settings
707
- * @summary Get saml login link for tenant
706
+ * Get SAML login link configured for the tenant in cognito as well as tenant settings
707
+ * @summary Get SAML login link for tenant
708
708
  * @param {string} tenantSlug
709
709
  * @param {*} [options] Override http request option.
710
710
  * @throws {RequiredError}
@@ -725,12 +725,12 @@ export const AuthserviceApiFactory = function (configuration?: Configuration, ba
725
725
  /**
726
726
  * Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
727
727
  * @summary Login by SAML idp provider such as ADFS
728
- * @param {LoginBySAMLRequestDto} loginBySAMLRequestDto
728
+ * @param {LoginBySamlRequestDto} loginBySamlRequestDto
729
729
  * @param {*} [options] Override http request option.
730
730
  * @throws {RequiredError}
731
731
  */
732
- loginBySAML(loginBySAMLRequestDto: LoginBySAMLRequestDto, options?: any): AxiosPromise<LoginClass> {
733
- return localVarFp.loginBySAML(loginBySAMLRequestDto, options).then((request) => request(axios, basePath));
732
+ loginBySaml(loginBySamlRequestDto: LoginBySamlRequestDto, options?: any): AxiosPromise<LoginClass> {
733
+ return localVarFp.loginBySaml(loginBySamlRequestDto, options).then((request) => request(axios, basePath));
734
734
  },
735
735
  /**
736
736
  * Sign tenant user out.
@@ -867,17 +867,17 @@ export interface AuthserviceApiLoginRequest {
867
867
  }
868
868
 
869
869
  /**
870
- * Request parameters for loginBySAML operation in AuthserviceApi.
870
+ * Request parameters for loginBySaml operation in AuthserviceApi.
871
871
  * @export
872
- * @interface AuthserviceApiLoginBySAMLRequest
872
+ * @interface AuthserviceApiLoginBySamlRequest
873
873
  */
874
- export interface AuthserviceApiLoginBySAMLRequest {
874
+ export interface AuthserviceApiLoginBySamlRequest {
875
875
  /**
876
876
  *
877
- * @type {LoginBySAMLRequestDto}
878
- * @memberof AuthserviceApiLoginBySAML
877
+ * @type {LoginBySamlRequestDto}
878
+ * @memberof AuthserviceApiLoginBySaml
879
879
  */
880
- readonly loginBySAMLRequestDto: LoginBySAMLRequestDto
880
+ readonly loginBySamlRequestDto: LoginBySamlRequestDto
881
881
  }
882
882
 
883
883
  /**
@@ -1015,8 +1015,8 @@ export class AuthserviceApi extends BaseAPI {
1015
1015
  }
1016
1016
 
1017
1017
  /**
1018
- * Get saml login link configured for the tenant in cognito as well as tenant settings
1019
- * @summary Get saml login link for tenant
1018
+ * Get SAML login link configured for the tenant in cognito as well as tenant settings
1019
+ * @summary Get SAML login link for tenant
1020
1020
  * @param {AuthserviceApiGetSamlLoginLinkRequest} requestParameters Request parameters.
1021
1021
  * @param {*} [options] Override http request option.
1022
1022
  * @throws {RequiredError}
@@ -1041,13 +1041,13 @@ export class AuthserviceApi extends BaseAPI {
1041
1041
  /**
1042
1042
  * Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
1043
1043
  * @summary Login by SAML idp provider such as ADFS
1044
- * @param {AuthserviceApiLoginBySAMLRequest} requestParameters Request parameters.
1044
+ * @param {AuthserviceApiLoginBySamlRequest} requestParameters Request parameters.
1045
1045
  * @param {*} [options] Override http request option.
1046
1046
  * @throws {RequiredError}
1047
1047
  * @memberof AuthserviceApi
1048
1048
  */
1049
- public loginBySAML(requestParameters: AuthserviceApiLoginBySAMLRequest, options?: AxiosRequestConfig) {
1050
- return AuthserviceApiFp(this.configuration).loginBySAML(requestParameters.loginBySAMLRequestDto, options).then((request) => request(this.axios, this.basePath));
1049
+ public loginBySaml(requestParameters: AuthserviceApiLoginBySamlRequest, options?: AxiosRequestConfig) {
1050
+ return AuthserviceApiFp(this.configuration).loginBySaml(requestParameters.loginBySamlRequestDto, options).then((request) => request(this.axios, this.basePath));
1051
1051
  }
1052
1052
 
1053
1053
  /**
@@ -35,7 +35,8 @@ const FormData = require('form-data');
35
35
  export const DefaultApiAxiosParamCreator = function (configuration?: Configuration) {
36
36
  return {
37
37
  /**
38
- *
38
+ * Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
39
+ * @summary Health Check
39
40
  * @param {*} [options] Override http request option.
40
41
  * @throws {RequiredError}
41
42
  */
@@ -76,7 +77,8 @@ export const DefaultApiFp = function(configuration?: Configuration) {
76
77
  const localVarAxiosParamCreator = DefaultApiAxiosParamCreator(configuration)
77
78
  return {
78
79
  /**
79
- *
80
+ * Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
81
+ * @summary Health Check
80
82
  * @param {*} [options] Override http request option.
81
83
  * @throws {RequiredError}
82
84
  */
@@ -95,7 +97,8 @@ export const DefaultApiFactory = function (configuration?: Configuration, basePa
95
97
  const localVarFp = DefaultApiFp(configuration)
96
98
  return {
97
99
  /**
98
- *
100
+ * Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
101
+ * @summary Health Check
99
102
  * @param {*} [options] Override http request option.
100
103
  * @throws {RequiredError}
101
104
  */
@@ -113,7 +116,8 @@ export const DefaultApiFactory = function (configuration?: Configuration, basePa
113
116
  */
114
117
  export class DefaultApi extends BaseAPI {
115
118
  /**
116
- *
119
+ * Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
120
+ * @summary Health Check
117
121
  * @param {*} [options] Override http request option.
118
122
  * @throws {RequiredError}
119
123
  * @memberof DefaultApi