@emilgroup/auth-sdk-node 1.4.1 → 1.9.1-beta.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -16,11 +16,11 @@ models/create-user-request-dto.ts
16
16
  models/create-user-response-class.ts
17
17
  models/custom-schema-class.ts
18
18
  models/forgot-password-request-dto.ts
19
- models/get-samllogin-link-request-dto.ts
19
+ models/get-saml-login-link-request-dto.ts
20
20
  models/index.ts
21
21
  models/inline-response200.ts
22
22
  models/inline-response503.ts
23
- models/login-by-samlrequest-dto.ts
23
+ models/login-by-saml-request-dto.ts
24
24
  models/login-class.ts
25
25
  models/login-request-dto.ts
26
26
  models/logout-request-dto.ts
package/README.md CHANGED
@@ -17,11 +17,11 @@ Although this package can be used in both TypeScript and JavaScript, it is inten
17
17
  Navigate to the folder of your consuming project and run one of the following commands:
18
18
 
19
19
  ```
20
- npm install @emilgroup/auth-sdk-node@1.4.1 --save
20
+ npm install @emilgroup/auth-sdk-node@1.9.1-beta.2 --save
21
21
  ```
22
22
  or
23
23
  ```
24
- yarn add @emilgroup/auth-sdk-node@1.4.1
24
+ yarn add @emilgroup/auth-sdk-node@1.9.1-beta.2
25
25
  ```
26
26
 
27
27
  And then you can import ``.
@@ -31,7 +31,7 @@ import { CreateUserResponseClass } from '../models';
31
31
  // @ts-ignore
32
32
  import { ForgotPasswordRequestDto } from '../models';
33
33
  // @ts-ignore
34
- import { LoginBySAMLRequestDto } from '../models';
34
+ import { LoginBySamlRequestDto } from '../models';
35
35
  // @ts-ignore
36
36
  import { LoginClass } from '../models';
37
37
  // @ts-ignore
@@ -169,8 +169,8 @@ export const AuthserviceApiAxiosParamCreator = function (configuration?: Configu
169
169
  };
170
170
  },
171
171
  /**
172
- * Get saml login link configured for the tenant in cognito as well as tenant settings
173
- * @summary Get saml login link for tenant
172
+ * Get SAML login link configured for the tenant in cognito as well as tenant settings
173
+ * @summary Get SAML login link for tenant
174
174
  * @param {string} tenantSlug
175
175
  * @param {*} [options] Override http request option.
176
176
  * @throws {RequiredError}
@@ -248,13 +248,13 @@ export const AuthserviceApiAxiosParamCreator = function (configuration?: Configu
248
248
  /**
249
249
  * Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
250
250
  * @summary Login by SAML idp provider such as ADFS
251
- * @param {LoginBySAMLRequestDto} loginBySAMLRequestDto
251
+ * @param {LoginBySamlRequestDto} loginBySamlRequestDto
252
252
  * @param {*} [options] Override http request option.
253
253
  * @throws {RequiredError}
254
254
  */
255
- loginBySAML: async (loginBySAMLRequestDto: LoginBySAMLRequestDto, options: AxiosRequestConfig = {}): Promise<RequestArgs> => {
256
- // verify required parameter 'loginBySAMLRequestDto' is not null or undefined
257
- assertParamExists('loginBySAML', 'loginBySAMLRequestDto', loginBySAMLRequestDto)
255
+ loginBySaml: async (loginBySamlRequestDto: LoginBySamlRequestDto, options: AxiosRequestConfig = {}): Promise<RequestArgs> => {
256
+ // verify required parameter 'loginBySamlRequestDto' is not null or undefined
257
+ assertParamExists('loginBySaml', 'loginBySamlRequestDto', loginBySamlRequestDto)
258
258
  const localVarPath = `/authservice/v1/login/saml`;
259
259
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
260
260
  const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
@@ -276,7 +276,7 @@ export const AuthserviceApiAxiosParamCreator = function (configuration?: Configu
276
276
  setSearchParams(localVarUrlObj, localVarQueryParameter);
277
277
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
278
278
  localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
279
- localVarRequestOptions.data = serializeDataIfNeeded(loginBySAMLRequestDto, localVarRequestOptions, configuration)
279
+ localVarRequestOptions.data = serializeDataIfNeeded(loginBySamlRequestDto, localVarRequestOptions, configuration)
280
280
 
281
281
  return {
282
282
  url: toPathString(localVarUrlObj),
@@ -563,8 +563,8 @@ export const AuthserviceApiFp = function(configuration?: Configuration) {
563
563
  return createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration);
564
564
  },
565
565
  /**
566
- * Get saml login link configured for the tenant in cognito as well as tenant settings
567
- * @summary Get saml login link for tenant
566
+ * Get SAML login link configured for the tenant in cognito as well as tenant settings
567
+ * @summary Get SAML login link for tenant
568
568
  * @param {string} tenantSlug
569
569
  * @param {*} [options] Override http request option.
570
570
  * @throws {RequiredError}
@@ -587,12 +587,12 @@ export const AuthserviceApiFp = function(configuration?: Configuration) {
587
587
  /**
588
588
  * Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
589
589
  * @summary Login by SAML idp provider such as ADFS
590
- * @param {LoginBySAMLRequestDto} loginBySAMLRequestDto
590
+ * @param {LoginBySamlRequestDto} loginBySamlRequestDto
591
591
  * @param {*} [options] Override http request option.
592
592
  * @throws {RequiredError}
593
593
  */
594
- async loginBySAML(loginBySAMLRequestDto: LoginBySAMLRequestDto, options?: AxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LoginClass>> {
595
- const localVarAxiosArgs = await localVarAxiosParamCreator.loginBySAML(loginBySAMLRequestDto, options);
594
+ async loginBySaml(loginBySamlRequestDto: LoginBySamlRequestDto, options?: AxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LoginClass>> {
595
+ const localVarAxiosArgs = await localVarAxiosParamCreator.loginBySaml(loginBySamlRequestDto, options);
596
596
  return createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration);
597
597
  },
598
598
  /**
@@ -703,8 +703,8 @@ export const AuthserviceApiFactory = function (configuration?: Configuration, ba
703
703
  return localVarFp.forgotPassword(forgotPasswordRequestDto, options).then((request) => request(axios, basePath));
704
704
  },
705
705
  /**
706
- * Get saml login link configured for the tenant in cognito as well as tenant settings
707
- * @summary Get saml login link for tenant
706
+ * Get SAML login link configured for the tenant in cognito as well as tenant settings
707
+ * @summary Get SAML login link for tenant
708
708
  * @param {string} tenantSlug
709
709
  * @param {*} [options] Override http request option.
710
710
  * @throws {RequiredError}
@@ -725,12 +725,12 @@ export const AuthserviceApiFactory = function (configuration?: Configuration, ba
725
725
  /**
726
726
  * Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
727
727
  * @summary Login by SAML idp provider such as ADFS
728
- * @param {LoginBySAMLRequestDto} loginBySAMLRequestDto
728
+ * @param {LoginBySamlRequestDto} loginBySamlRequestDto
729
729
  * @param {*} [options] Override http request option.
730
730
  * @throws {RequiredError}
731
731
  */
732
- loginBySAML(loginBySAMLRequestDto: LoginBySAMLRequestDto, options?: any): AxiosPromise<LoginClass> {
733
- return localVarFp.loginBySAML(loginBySAMLRequestDto, options).then((request) => request(axios, basePath));
732
+ loginBySaml(loginBySamlRequestDto: LoginBySamlRequestDto, options?: any): AxiosPromise<LoginClass> {
733
+ return localVarFp.loginBySaml(loginBySamlRequestDto, options).then((request) => request(axios, basePath));
734
734
  },
735
735
  /**
736
736
  * Sign tenant user out.
@@ -867,17 +867,17 @@ export interface AuthserviceApiLoginRequest {
867
867
  }
868
868
 
869
869
  /**
870
- * Request parameters for loginBySAML operation in AuthserviceApi.
870
+ * Request parameters for loginBySaml operation in AuthserviceApi.
871
871
  * @export
872
- * @interface AuthserviceApiLoginBySAMLRequest
872
+ * @interface AuthserviceApiLoginBySamlRequest
873
873
  */
874
- export interface AuthserviceApiLoginBySAMLRequest {
874
+ export interface AuthserviceApiLoginBySamlRequest {
875
875
  /**
876
876
  *
877
- * @type {LoginBySAMLRequestDto}
878
- * @memberof AuthserviceApiLoginBySAML
877
+ * @type {LoginBySamlRequestDto}
878
+ * @memberof AuthserviceApiLoginBySaml
879
879
  */
880
- readonly loginBySAMLRequestDto: LoginBySAMLRequestDto
880
+ readonly loginBySamlRequestDto: LoginBySamlRequestDto
881
881
  }
882
882
 
883
883
  /**
@@ -1015,8 +1015,8 @@ export class AuthserviceApi extends BaseAPI {
1015
1015
  }
1016
1016
 
1017
1017
  /**
1018
- * Get saml login link configured for the tenant in cognito as well as tenant settings
1019
- * @summary Get saml login link for tenant
1018
+ * Get SAML login link configured for the tenant in cognito as well as tenant settings
1019
+ * @summary Get SAML login link for tenant
1020
1020
  * @param {AuthserviceApiGetSamlLoginLinkRequest} requestParameters Request parameters.
1021
1021
  * @param {*} [options] Override http request option.
1022
1022
  * @throws {RequiredError}
@@ -1041,13 +1041,13 @@ export class AuthserviceApi extends BaseAPI {
1041
1041
  /**
1042
1042
  * Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
1043
1043
  * @summary Login by SAML idp provider such as ADFS
1044
- * @param {AuthserviceApiLoginBySAMLRequest} requestParameters Request parameters.
1044
+ * @param {AuthserviceApiLoginBySamlRequest} requestParameters Request parameters.
1045
1045
  * @param {*} [options] Override http request option.
1046
1046
  * @throws {RequiredError}
1047
1047
  * @memberof AuthserviceApi
1048
1048
  */
1049
- public loginBySAML(requestParameters: AuthserviceApiLoginBySAMLRequest, options?: AxiosRequestConfig) {
1050
- return AuthserviceApiFp(this.configuration).loginBySAML(requestParameters.loginBySAMLRequestDto, options).then((request) => request(this.axios, this.basePath));
1049
+ public loginBySaml(requestParameters: AuthserviceApiLoginBySamlRequest, options?: AxiosRequestConfig) {
1050
+ return AuthserviceApiFp(this.configuration).loginBySaml(requestParameters.loginBySamlRequestDto, options).then((request) => request(this.axios, this.basePath));
1051
1051
  }
1052
1052
 
1053
1053
  /**
@@ -35,7 +35,8 @@ const FormData = require('form-data');
35
35
  export const DefaultApiAxiosParamCreator = function (configuration?: Configuration) {
36
36
  return {
37
37
  /**
38
- *
38
+ * Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
39
+ * @summary Health Check
39
40
  * @param {*} [options] Override http request option.
40
41
  * @throws {RequiredError}
41
42
  */
@@ -76,7 +77,8 @@ export const DefaultApiFp = function(configuration?: Configuration) {
76
77
  const localVarAxiosParamCreator = DefaultApiAxiosParamCreator(configuration)
77
78
  return {
78
79
  /**
79
- *
80
+ * Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
81
+ * @summary Health Check
80
82
  * @param {*} [options] Override http request option.
81
83
  * @throws {RequiredError}
82
84
  */
@@ -95,7 +97,8 @@ export const DefaultApiFactory = function (configuration?: Configuration, basePa
95
97
  const localVarFp = DefaultApiFp(configuration)
96
98
  return {
97
99
  /**
98
- *
100
+ * Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
101
+ * @summary Health Check
99
102
  * @param {*} [options] Override http request option.
100
103
  * @throws {RequiredError}
101
104
  */
@@ -113,7 +116,8 @@ export const DefaultApiFactory = function (configuration?: Configuration, basePa
113
116
  */
114
117
  export class DefaultApi extends BaseAPI {
115
118
  /**
116
- *
119
+ * Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
120
+ * @summary Health Check
117
121
  * @param {*} [options] Override http request option.
118
122
  * @throws {RequiredError}
119
123
  * @memberof DefaultApi
@@ -17,7 +17,7 @@ import { CreateOrgAndUserResponseClass } from '../models';
17
17
  import { CreateUserRequestDto } from '../models';
18
18
  import { CreateUserResponseClass } from '../models';
19
19
  import { ForgotPasswordRequestDto } from '../models';
20
- import { LoginBySAMLRequestDto } from '../models';
20
+ import { LoginBySamlRequestDto } from '../models';
21
21
  import { LoginClass } from '../models';
22
22
  import { LoginRequestDto } from '../models';
23
23
  import { LogoutRequestDto } from '../models';
@@ -54,8 +54,8 @@ export declare const AuthserviceApiAxiosParamCreator: (configuration?: Configura
54
54
  */
55
55
  forgotPassword: (forgotPasswordRequestDto: ForgotPasswordRequestDto, options?: AxiosRequestConfig) => Promise<RequestArgs>;
56
56
  /**
57
- * Get saml login link configured for the tenant in cognito as well as tenant settings
58
- * @summary Get saml login link for tenant
57
+ * Get SAML login link configured for the tenant in cognito as well as tenant settings
58
+ * @summary Get SAML login link for tenant
59
59
  * @param {string} tenantSlug
60
60
  * @param {*} [options] Override http request option.
61
61
  * @throws {RequiredError}
@@ -72,11 +72,11 @@ export declare const AuthserviceApiAxiosParamCreator: (configuration?: Configura
72
72
  /**
73
73
  * Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
74
74
  * @summary Login by SAML idp provider such as ADFS
75
- * @param {LoginBySAMLRequestDto} loginBySAMLRequestDto
75
+ * @param {LoginBySamlRequestDto} loginBySamlRequestDto
76
76
  * @param {*} [options] Override http request option.
77
77
  * @throws {RequiredError}
78
78
  */
79
- loginBySAML: (loginBySAMLRequestDto: LoginBySAMLRequestDto, options?: AxiosRequestConfig) => Promise<RequestArgs>;
79
+ loginBySaml: (loginBySamlRequestDto: LoginBySamlRequestDto, options?: AxiosRequestConfig) => Promise<RequestArgs>;
80
80
  /**
81
81
  * Sign tenant user out.
82
82
  * @summary Logout tenant
@@ -157,8 +157,8 @@ export declare const AuthserviceApiFp: (configuration?: Configuration) => {
157
157
  */
158
158
  forgotPassword(forgotPasswordRequestDto: ForgotPasswordRequestDto, options?: AxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<void>>;
159
159
  /**
160
- * Get saml login link configured for the tenant in cognito as well as tenant settings
161
- * @summary Get saml login link for tenant
160
+ * Get SAML login link configured for the tenant in cognito as well as tenant settings
161
+ * @summary Get SAML login link for tenant
162
162
  * @param {string} tenantSlug
163
163
  * @param {*} [options] Override http request option.
164
164
  * @throws {RequiredError}
@@ -175,11 +175,11 @@ export declare const AuthserviceApiFp: (configuration?: Configuration) => {
175
175
  /**
176
176
  * Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
177
177
  * @summary Login by SAML idp provider such as ADFS
178
- * @param {LoginBySAMLRequestDto} loginBySAMLRequestDto
178
+ * @param {LoginBySamlRequestDto} loginBySamlRequestDto
179
179
  * @param {*} [options] Override http request option.
180
180
  * @throws {RequiredError}
181
181
  */
182
- loginBySAML(loginBySAMLRequestDto: LoginBySAMLRequestDto, options?: AxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LoginClass>>;
182
+ loginBySaml(loginBySamlRequestDto: LoginBySamlRequestDto, options?: AxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LoginClass>>;
183
183
  /**
184
184
  * Sign tenant user out.
185
185
  * @summary Logout tenant
@@ -260,8 +260,8 @@ export declare const AuthserviceApiFactory: (configuration?: Configuration, base
260
260
  */
261
261
  forgotPassword(forgotPasswordRequestDto: ForgotPasswordRequestDto, options?: any): AxiosPromise<void>;
262
262
  /**
263
- * Get saml login link configured for the tenant in cognito as well as tenant settings
264
- * @summary Get saml login link for tenant
263
+ * Get SAML login link configured for the tenant in cognito as well as tenant settings
264
+ * @summary Get SAML login link for tenant
265
265
  * @param {string} tenantSlug
266
266
  * @param {*} [options] Override http request option.
267
267
  * @throws {RequiredError}
@@ -278,11 +278,11 @@ export declare const AuthserviceApiFactory: (configuration?: Configuration, base
278
278
  /**
279
279
  * Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
280
280
  * @summary Login by SAML idp provider such as ADFS
281
- * @param {LoginBySAMLRequestDto} loginBySAMLRequestDto
281
+ * @param {LoginBySamlRequestDto} loginBySamlRequestDto
282
282
  * @param {*} [options] Override http request option.
283
283
  * @throws {RequiredError}
284
284
  */
285
- loginBySAML(loginBySAMLRequestDto: LoginBySAMLRequestDto, options?: any): AxiosPromise<LoginClass>;
285
+ loginBySaml(loginBySamlRequestDto: LoginBySamlRequestDto, options?: any): AxiosPromise<LoginClass>;
286
286
  /**
287
287
  * Sign tenant user out.
288
288
  * @summary Logout tenant
@@ -399,17 +399,17 @@ export interface AuthserviceApiLoginRequest {
399
399
  readonly loginRequestDto: LoginRequestDto;
400
400
  }
401
401
  /**
402
- * Request parameters for loginBySAML operation in AuthserviceApi.
402
+ * Request parameters for loginBySaml operation in AuthserviceApi.
403
403
  * @export
404
- * @interface AuthserviceApiLoginBySAMLRequest
404
+ * @interface AuthserviceApiLoginBySamlRequest
405
405
  */
406
- export interface AuthserviceApiLoginBySAMLRequest {
406
+ export interface AuthserviceApiLoginBySamlRequest {
407
407
  /**
408
408
  *
409
- * @type {LoginBySAMLRequestDto}
410
- * @memberof AuthserviceApiLoginBySAML
409
+ * @type {LoginBySamlRequestDto}
410
+ * @memberof AuthserviceApiLoginBySaml
411
411
  */
412
- readonly loginBySAMLRequestDto: LoginBySAMLRequestDto;
412
+ readonly loginBySamlRequestDto: LoginBySamlRequestDto;
413
413
  }
414
414
  /**
415
415
  * Request parameters for logout operation in AuthserviceApi.
@@ -530,8 +530,8 @@ export declare class AuthserviceApi extends BaseAPI {
530
530
  */
531
531
  forgotPassword(requestParameters: AuthserviceApiForgotPasswordRequest, options?: AxiosRequestConfig): Promise<import("axios").AxiosResponse<void, any>>;
532
532
  /**
533
- * Get saml login link configured for the tenant in cognito as well as tenant settings
534
- * @summary Get saml login link for tenant
533
+ * Get SAML login link configured for the tenant in cognito as well as tenant settings
534
+ * @summary Get SAML login link for tenant
535
535
  * @param {AuthserviceApiGetSamlLoginLinkRequest} requestParameters Request parameters.
536
536
  * @param {*} [options] Override http request option.
537
537
  * @throws {RequiredError}
@@ -550,12 +550,12 @@ export declare class AuthserviceApi extends BaseAPI {
550
550
  /**
551
551
  * Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
552
552
  * @summary Login by SAML idp provider such as ADFS
553
- * @param {AuthserviceApiLoginBySAMLRequest} requestParameters Request parameters.
553
+ * @param {AuthserviceApiLoginBySamlRequest} requestParameters Request parameters.
554
554
  * @param {*} [options] Override http request option.
555
555
  * @throws {RequiredError}
556
556
  * @memberof AuthserviceApi
557
557
  */
558
- loginBySAML(requestParameters: AuthserviceApiLoginBySAMLRequest, options?: AxiosRequestConfig): Promise<import("axios").AxiosResponse<LoginClass, any>>;
558
+ loginBySaml(requestParameters: AuthserviceApiLoginBySamlRequest, options?: AxiosRequestConfig): Promise<import("axios").AxiosResponse<LoginClass, any>>;
559
559
  /**
560
560
  * Sign tenant user out.
561
561
  * @summary Logout tenant
@@ -202,8 +202,8 @@ var AuthserviceApiAxiosParamCreator = function (configuration) {
202
202
  });
203
203
  },
204
204
  /**
205
- * Get saml login link configured for the tenant in cognito as well as tenant settings
206
- * @summary Get saml login link for tenant
205
+ * Get SAML login link configured for the tenant in cognito as well as tenant settings
206
+ * @summary Get SAML login link for tenant
207
207
  * @param {string} tenantSlug
208
208
  * @param {*} [options] Override http request option.
209
209
  * @throws {RequiredError}
@@ -275,17 +275,17 @@ var AuthserviceApiAxiosParamCreator = function (configuration) {
275
275
  /**
276
276
  * Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
277
277
  * @summary Login by SAML idp provider such as ADFS
278
- * @param {LoginBySAMLRequestDto} loginBySAMLRequestDto
278
+ * @param {LoginBySamlRequestDto} loginBySamlRequestDto
279
279
  * @param {*} [options] Override http request option.
280
280
  * @throws {RequiredError}
281
281
  */
282
- loginBySAML: function (loginBySAMLRequestDto, options) {
282
+ loginBySaml: function (loginBySamlRequestDto, options) {
283
283
  if (options === void 0) { options = {}; }
284
284
  return __awaiter(_this, void 0, void 0, function () {
285
285
  var localVarPath, localVarUrlObj, baseOptions, baseAccessToken, localVarRequestOptions, localVarHeaderParameter, localVarQueryParameter, headersFromBaseOptions;
286
286
  return __generator(this, function (_a) {
287
- // verify required parameter 'loginBySAMLRequestDto' is not null or undefined
288
- (0, common_1.assertParamExists)('loginBySAML', 'loginBySAMLRequestDto', loginBySAMLRequestDto);
287
+ // verify required parameter 'loginBySamlRequestDto' is not null or undefined
288
+ (0, common_1.assertParamExists)('loginBySaml', 'loginBySamlRequestDto', loginBySamlRequestDto);
289
289
  localVarPath = "/authservice/v1/login/saml";
290
290
  localVarUrlObj = new url_1.URL(localVarPath, common_1.DUMMY_BASE_URL);
291
291
  if (configuration) {
@@ -299,7 +299,7 @@ var AuthserviceApiAxiosParamCreator = function (configuration) {
299
299
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
300
300
  headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
301
301
  localVarRequestOptions.headers = __assign(__assign(__assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
302
- localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(loginBySAMLRequestDto, localVarRequestOptions, configuration);
302
+ localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(loginBySamlRequestDto, localVarRequestOptions, configuration);
303
303
  return [2 /*return*/, {
304
304
  url: (0, common_1.toPathString)(localVarUrlObj),
305
305
  options: localVarRequestOptions,
@@ -595,8 +595,8 @@ var AuthserviceApiFp = function (configuration) {
595
595
  });
596
596
  },
597
597
  /**
598
- * Get saml login link configured for the tenant in cognito as well as tenant settings
599
- * @summary Get saml login link for tenant
598
+ * Get SAML login link configured for the tenant in cognito as well as tenant settings
599
+ * @summary Get SAML login link for tenant
600
600
  * @param {string} tenantSlug
601
601
  * @param {*} [options] Override http request option.
602
602
  * @throws {RequiredError}
@@ -637,16 +637,16 @@ var AuthserviceApiFp = function (configuration) {
637
637
  /**
638
638
  * Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
639
639
  * @summary Login by SAML idp provider such as ADFS
640
- * @param {LoginBySAMLRequestDto} loginBySAMLRequestDto
640
+ * @param {LoginBySamlRequestDto} loginBySamlRequestDto
641
641
  * @param {*} [options] Override http request option.
642
642
  * @throws {RequiredError}
643
643
  */
644
- loginBySAML: function (loginBySAMLRequestDto, options) {
644
+ loginBySaml: function (loginBySamlRequestDto, options) {
645
645
  return __awaiter(this, void 0, void 0, function () {
646
646
  var localVarAxiosArgs;
647
647
  return __generator(this, function (_a) {
648
648
  switch (_a.label) {
649
- case 0: return [4 /*yield*/, localVarAxiosParamCreator.loginBySAML(loginBySAMLRequestDto, options)];
649
+ case 0: return [4 /*yield*/, localVarAxiosParamCreator.loginBySaml(loginBySamlRequestDto, options)];
650
650
  case 1:
651
651
  localVarAxiosArgs = _a.sent();
652
652
  return [2 /*return*/, (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)];
@@ -816,8 +816,8 @@ var AuthserviceApiFactory = function (configuration, basePath, axios) {
816
816
  return localVarFp.forgotPassword(forgotPasswordRequestDto, options).then(function (request) { return request(axios, basePath); });
817
817
  },
818
818
  /**
819
- * Get saml login link configured for the tenant in cognito as well as tenant settings
820
- * @summary Get saml login link for tenant
819
+ * Get SAML login link configured for the tenant in cognito as well as tenant settings
820
+ * @summary Get SAML login link for tenant
821
821
  * @param {string} tenantSlug
822
822
  * @param {*} [options] Override http request option.
823
823
  * @throws {RequiredError}
@@ -838,12 +838,12 @@ var AuthserviceApiFactory = function (configuration, basePath, axios) {
838
838
  /**
839
839
  * Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
840
840
  * @summary Login by SAML idp provider such as ADFS
841
- * @param {LoginBySAMLRequestDto} loginBySAMLRequestDto
841
+ * @param {LoginBySamlRequestDto} loginBySamlRequestDto
842
842
  * @param {*} [options] Override http request option.
843
843
  * @throws {RequiredError}
844
844
  */
845
- loginBySAML: function (loginBySAMLRequestDto, options) {
846
- return localVarFp.loginBySAML(loginBySAMLRequestDto, options).then(function (request) { return request(axios, basePath); });
845
+ loginBySaml: function (loginBySamlRequestDto, options) {
846
+ return localVarFp.loginBySaml(loginBySamlRequestDto, options).then(function (request) { return request(axios, basePath); });
847
847
  },
848
848
  /**
849
849
  * Sign tenant user out.
@@ -957,8 +957,8 @@ var AuthserviceApi = /** @class */ (function (_super) {
957
957
  return (0, exports.AuthserviceApiFp)(this.configuration).forgotPassword(requestParameters.forgotPasswordRequestDto, options).then(function (request) { return request(_this.axios, _this.basePath); });
958
958
  };
959
959
  /**
960
- * Get saml login link configured for the tenant in cognito as well as tenant settings
961
- * @summary Get saml login link for tenant
960
+ * Get SAML login link configured for the tenant in cognito as well as tenant settings
961
+ * @summary Get SAML login link for tenant
962
962
  * @param {AuthserviceApiGetSamlLoginLinkRequest} requestParameters Request parameters.
963
963
  * @param {*} [options] Override http request option.
964
964
  * @throws {RequiredError}
@@ -983,14 +983,14 @@ var AuthserviceApi = /** @class */ (function (_super) {
983
983
  /**
984
984
  * Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
985
985
  * @summary Login by SAML idp provider such as ADFS
986
- * @param {AuthserviceApiLoginBySAMLRequest} requestParameters Request parameters.
986
+ * @param {AuthserviceApiLoginBySamlRequest} requestParameters Request parameters.
987
987
  * @param {*} [options] Override http request option.
988
988
  * @throws {RequiredError}
989
989
  * @memberof AuthserviceApi
990
990
  */
991
- AuthserviceApi.prototype.loginBySAML = function (requestParameters, options) {
991
+ AuthserviceApi.prototype.loginBySaml = function (requestParameters, options) {
992
992
  var _this = this;
993
- return (0, exports.AuthserviceApiFp)(this.configuration).loginBySAML(requestParameters.loginBySAMLRequestDto, options).then(function (request) { return request(_this.axios, _this.basePath); });
993
+ return (0, exports.AuthserviceApiFp)(this.configuration).loginBySaml(requestParameters.loginBySamlRequestDto, options).then(function (request) { return request(_this.axios, _this.basePath); });
994
994
  };
995
995
  /**
996
996
  * Sign tenant user out.
@@ -19,7 +19,8 @@ import { InlineResponse200 } from '../models';
19
19
  */
20
20
  export declare const DefaultApiAxiosParamCreator: (configuration?: Configuration) => {
21
21
  /**
22
- *
22
+ * Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
23
+ * @summary Health Check
23
24
  * @param {*} [options] Override http request option.
24
25
  * @throws {RequiredError}
25
26
  */
@@ -31,7 +32,8 @@ export declare const DefaultApiAxiosParamCreator: (configuration?: Configuration
31
32
  */
32
33
  export declare const DefaultApiFp: (configuration?: Configuration) => {
33
34
  /**
34
- *
35
+ * Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
36
+ * @summary Health Check
35
37
  * @param {*} [options] Override http request option.
36
38
  * @throws {RequiredError}
37
39
  */
@@ -43,7 +45,8 @@ export declare const DefaultApiFp: (configuration?: Configuration) => {
43
45
  */
44
46
  export declare const DefaultApiFactory: (configuration?: Configuration, basePath?: string, axios?: AxiosInstance) => {
45
47
  /**
46
- *
48
+ * Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
49
+ * @summary Health Check
47
50
  * @param {*} [options] Override http request option.
48
51
  * @throws {RequiredError}
49
52
  */
@@ -57,7 +60,8 @@ export declare const DefaultApiFactory: (configuration?: Configuration, basePath
57
60
  */
58
61
  export declare class DefaultApi extends BaseAPI {
59
62
  /**
60
- *
63
+ * Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
64
+ * @summary Health Check
61
65
  * @param {*} [options] Override http request option.
62
66
  * @throws {RequiredError}
63
67
  * @memberof DefaultApi
@@ -97,7 +97,8 @@ var DefaultApiAxiosParamCreator = function (configuration) {
97
97
  var _this = this;
98
98
  return {
99
99
  /**
100
- *
100
+ * Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
101
+ * @summary Health Check
101
102
  * @param {*} [options] Override http request option.
102
103
  * @throws {RequiredError}
103
104
  */
@@ -136,7 +137,8 @@ var DefaultApiFp = function (configuration) {
136
137
  var localVarAxiosParamCreator = (0, exports.DefaultApiAxiosParamCreator)(configuration);
137
138
  return {
138
139
  /**
139
- *
140
+ * Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
141
+ * @summary Health Check
140
142
  * @param {*} [options] Override http request option.
141
143
  * @throws {RequiredError}
142
144
  */
@@ -164,7 +166,8 @@ var DefaultApiFactory = function (configuration, basePath, axios) {
164
166
  var localVarFp = (0, exports.DefaultApiFp)(configuration);
165
167
  return {
166
168
  /**
167
- *
169
+ * Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
170
+ * @summary Health Check
168
171
  * @param {*} [options] Override http request option.
169
172
  * @throws {RequiredError}
170
173
  */
@@ -186,7 +189,8 @@ var DefaultApi = /** @class */ (function (_super) {
186
189
  return _super !== null && _super.apply(this, arguments) || this;
187
190
  }
188
191
  /**
189
- *
192
+ * Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
193
+ * @summary Health Check
190
194
  * @param {*} [options] Override http request option.
191
195
  * @throws {RequiredError}
192
196
  * @memberof DefaultApi
@@ -12,13 +12,13 @@
12
12
  /**
13
13
  *
14
14
  * @export
15
- * @interface GetSAMLLoginLinkRequestDto
15
+ * @interface GetSamlLoginLinkRequestDto
16
16
  */
17
- export interface GetSAMLLoginLinkRequestDto {
17
+ export interface GetSamlLoginLinkRequestDto {
18
18
  /**
19
19
  *
20
20
  * @type {string}
21
- * @memberof GetSAMLLoginLinkRequestDto
21
+ * @memberof GetSamlLoginLinkRequestDto
22
22
  */
23
23
  'tenantSlug': string;
24
24
  }
@@ -4,10 +4,10 @@ export * from './create-user-request-dto';
4
4
  export * from './create-user-response-class';
5
5
  export * from './custom-schema-class';
6
6
  export * from './forgot-password-request-dto';
7
- export * from './get-samllogin-link-request-dto';
7
+ export * from './get-saml-login-link-request-dto';
8
8
  export * from './inline-response200';
9
9
  export * from './inline-response503';
10
- export * from './login-by-samlrequest-dto';
10
+ export * from './login-by-saml-request-dto';
11
11
  export * from './login-class';
12
12
  export * from './login-request-dto';
13
13
  export * from './logout-request-dto';
@@ -20,10 +20,10 @@ __exportStar(require("./create-user-request-dto"), exports);
20
20
  __exportStar(require("./create-user-response-class"), exports);
21
21
  __exportStar(require("./custom-schema-class"), exports);
22
22
  __exportStar(require("./forgot-password-request-dto"), exports);
23
- __exportStar(require("./get-samllogin-link-request-dto"), exports);
23
+ __exportStar(require("./get-saml-login-link-request-dto"), exports);
24
24
  __exportStar(require("./inline-response200"), exports);
25
25
  __exportStar(require("./inline-response503"), exports);
26
- __exportStar(require("./login-by-samlrequest-dto"), exports);
26
+ __exportStar(require("./login-by-saml-request-dto"), exports);
27
27
  __exportStar(require("./login-class"), exports);
28
28
  __exportStar(require("./login-request-dto"), exports);
29
29
  __exportStar(require("./logout-request-dto"), exports);
@@ -23,32 +23,32 @@ export interface InlineResponse200 {
23
23
  'status'?: string;
24
24
  /**
25
25
  *
26
- * @type {{ [key: string]: { [key: string]: string; }; }}
26
+ * @type {{ [key: string]: { [key: string]: object; }; }}
27
27
  * @memberof InlineResponse200
28
28
  */
29
29
  'info'?: {
30
30
  [key: string]: {
31
- [key: string]: string;
31
+ [key: string]: object;
32
32
  };
33
33
  } | null;
34
34
  /**
35
35
  *
36
- * @type {{ [key: string]: { [key: string]: string; }; }}
36
+ * @type {{ [key: string]: { [key: string]: object; }; }}
37
37
  * @memberof InlineResponse200
38
38
  */
39
39
  'error'?: {
40
40
  [key: string]: {
41
- [key: string]: string;
41
+ [key: string]: object;
42
42
  };
43
43
  } | null;
44
44
  /**
45
45
  *
46
- * @type {{ [key: string]: { [key: string]: string; }; }}
46
+ * @type {{ [key: string]: { [key: string]: object; }; }}
47
47
  * @memberof InlineResponse200
48
48
  */
49
49
  'details'?: {
50
50
  [key: string]: {
51
- [key: string]: string;
51
+ [key: string]: object;
52
52
  };
53
53
  };
54
54
  }
@@ -23,32 +23,32 @@ export interface InlineResponse503 {
23
23
  'status'?: string;
24
24
  /**
25
25
  *
26
- * @type {{ [key: string]: { [key: string]: string; }; }}
26
+ * @type {{ [key: string]: { [key: string]: object; }; }}
27
27
  * @memberof InlineResponse503
28
28
  */
29
29
  'info'?: {
30
30
  [key: string]: {
31
- [key: string]: string;
31
+ [key: string]: object;
32
32
  };
33
33
  } | null;
34
34
  /**
35
35
  *
36
- * @type {{ [key: string]: { [key: string]: string; }; }}
36
+ * @type {{ [key: string]: { [key: string]: object; }; }}
37
37
  * @memberof InlineResponse503
38
38
  */
39
39
  'error'?: {
40
40
  [key: string]: {
41
- [key: string]: string;
41
+ [key: string]: object;
42
42
  };
43
43
  } | null;
44
44
  /**
45
45
  *
46
- * @type {{ [key: string]: { [key: string]: string; }; }}
46
+ * @type {{ [key: string]: { [key: string]: object; }; }}
47
47
  * @memberof InlineResponse503
48
48
  */
49
49
  'details'?: {
50
50
  [key: string]: {
51
- [key: string]: string;
51
+ [key: string]: object;
52
52
  };
53
53
  };
54
54
  }
@@ -12,19 +12,19 @@
12
12
  /**
13
13
  *
14
14
  * @export
15
- * @interface LoginBySAMLRequestDto
15
+ * @interface LoginBySamlRequestDto
16
16
  */
17
- export interface LoginBySAMLRequestDto {
17
+ export interface LoginBySamlRequestDto {
18
18
  /**
19
19
  * code for grant type authorization code
20
20
  * @type {string}
21
- * @memberof LoginBySAMLRequestDto
21
+ * @memberof LoginBySamlRequestDto
22
22
  */
23
23
  'code': string;
24
24
  /**
25
25
  * Tenant slug
26
26
  * @type {string}
27
- * @memberof LoginBySAMLRequestDto
27
+ * @memberof LoginBySamlRequestDto
28
28
  */
29
29
  'tenantSlug': string;
30
30
  }
@@ -17,13 +17,13 @@
17
17
  /**
18
18
  *
19
19
  * @export
20
- * @interface GetSAMLLoginLinkRequestDto
20
+ * @interface GetSamlLoginLinkRequestDto
21
21
  */
22
- export interface GetSAMLLoginLinkRequestDto {
22
+ export interface GetSamlLoginLinkRequestDto {
23
23
  /**
24
24
  *
25
25
  * @type {string}
26
- * @memberof GetSAMLLoginLinkRequestDto
26
+ * @memberof GetSamlLoginLinkRequestDto
27
27
  */
28
28
  'tenantSlug': string;
29
29
  }
package/models/index.ts CHANGED
@@ -4,10 +4,10 @@ export * from './create-user-request-dto';
4
4
  export * from './create-user-response-class';
5
5
  export * from './custom-schema-class';
6
6
  export * from './forgot-password-request-dto';
7
- export * from './get-samllogin-link-request-dto';
7
+ export * from './get-saml-login-link-request-dto';
8
8
  export * from './inline-response200';
9
9
  export * from './inline-response503';
10
- export * from './login-by-samlrequest-dto';
10
+ export * from './login-by-saml-request-dto';
11
11
  export * from './login-class';
12
12
  export * from './login-request-dto';
13
13
  export * from './logout-request-dto';
@@ -28,21 +28,21 @@ export interface InlineResponse200 {
28
28
  'status'?: string;
29
29
  /**
30
30
  *
31
- * @type {{ [key: string]: { [key: string]: string; }; }}
31
+ * @type {{ [key: string]: { [key: string]: object; }; }}
32
32
  * @memberof InlineResponse200
33
33
  */
34
- 'info'?: { [key: string]: { [key: string]: string; }; } | null;
34
+ 'info'?: { [key: string]: { [key: string]: object; }; } | null;
35
35
  /**
36
36
  *
37
- * @type {{ [key: string]: { [key: string]: string; }; }}
37
+ * @type {{ [key: string]: { [key: string]: object; }; }}
38
38
  * @memberof InlineResponse200
39
39
  */
40
- 'error'?: { [key: string]: { [key: string]: string; }; } | null;
40
+ 'error'?: { [key: string]: { [key: string]: object; }; } | null;
41
41
  /**
42
42
  *
43
- * @type {{ [key: string]: { [key: string]: string; }; }}
43
+ * @type {{ [key: string]: { [key: string]: object; }; }}
44
44
  * @memberof InlineResponse200
45
45
  */
46
- 'details'?: { [key: string]: { [key: string]: string; }; };
46
+ 'details'?: { [key: string]: { [key: string]: object; }; };
47
47
  }
48
48
 
@@ -28,21 +28,21 @@ export interface InlineResponse503 {
28
28
  'status'?: string;
29
29
  /**
30
30
  *
31
- * @type {{ [key: string]: { [key: string]: string; }; }}
31
+ * @type {{ [key: string]: { [key: string]: object; }; }}
32
32
  * @memberof InlineResponse503
33
33
  */
34
- 'info'?: { [key: string]: { [key: string]: string; }; } | null;
34
+ 'info'?: { [key: string]: { [key: string]: object; }; } | null;
35
35
  /**
36
36
  *
37
- * @type {{ [key: string]: { [key: string]: string; }; }}
37
+ * @type {{ [key: string]: { [key: string]: object; }; }}
38
38
  * @memberof InlineResponse503
39
39
  */
40
- 'error'?: { [key: string]: { [key: string]: string; }; } | null;
40
+ 'error'?: { [key: string]: { [key: string]: object; }; } | null;
41
41
  /**
42
42
  *
43
- * @type {{ [key: string]: { [key: string]: string; }; }}
43
+ * @type {{ [key: string]: { [key: string]: object; }; }}
44
44
  * @memberof InlineResponse503
45
45
  */
46
- 'details'?: { [key: string]: { [key: string]: string; }; };
46
+ 'details'?: { [key: string]: { [key: string]: object; }; };
47
47
  }
48
48
 
@@ -17,19 +17,19 @@
17
17
  /**
18
18
  *
19
19
  * @export
20
- * @interface LoginBySAMLRequestDto
20
+ * @interface LoginBySamlRequestDto
21
21
  */
22
- export interface LoginBySAMLRequestDto {
22
+ export interface LoginBySamlRequestDto {
23
23
  /**
24
24
  * code for grant type authorization code
25
25
  * @type {string}
26
- * @memberof LoginBySAMLRequestDto
26
+ * @memberof LoginBySamlRequestDto
27
27
  */
28
28
  'code': string;
29
29
  /**
30
30
  * Tenant slug
31
31
  * @type {string}
32
- * @memberof LoginBySAMLRequestDto
32
+ * @memberof LoginBySamlRequestDto
33
33
  */
34
34
  'tenantSlug': string;
35
35
  }
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@emilgroup/auth-sdk-node",
3
- "version": "1.4.1",
3
+ "version": "1.9.1-beta.2",
4
4
  "description": "OpenAPI client for @emilgroup/auth-sdk-node",
5
5
  "author": "OpenAPI-Generator Contributors",
6
6
  "keywords": [
@@ -23,7 +23,7 @@
23
23
  "url": "^0.11.0"
24
24
  },
25
25
  "devDependencies": {
26
- "@types/node": "^12.11.5",
26
+ "@types/node": "^12.11.5",
27
27
  "typescript": "^4.0"
28
28
  }
29
29
  }