@emilgroup/auth-sdk-node 1.4.1 → 1.9.1-beta.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.openapi-generator/FILES +2 -2
- package/README.md +2 -2
- package/api/authservice-api.ts +29 -29
- package/api/default-api.ts +8 -4
- package/dist/api/authservice-api.d.ts +23 -23
- package/dist/api/authservice-api.js +22 -22
- package/dist/api/default-api.d.ts +8 -4
- package/dist/api/default-api.js +8 -4
- package/dist/models/{get-samllogin-link-request-dto.d.ts → get-saml-login-link-request-dto.d.ts} +3 -3
- package/dist/models/index.d.ts +2 -2
- package/dist/models/index.js +2 -2
- package/dist/models/inline-response200.d.ts +6 -6
- package/dist/models/inline-response503.d.ts +6 -6
- package/dist/models/{login-by-samlrequest-dto.d.ts → login-by-saml-request-dto.d.ts} +4 -4
- package/models/{get-samllogin-link-request-dto.ts → get-saml-login-link-request-dto.ts} +3 -3
- package/models/index.ts +2 -2
- package/models/inline-response200.ts +6 -6
- package/models/inline-response503.ts +6 -6
- package/models/{login-by-samlrequest-dto.ts → login-by-saml-request-dto.ts} +4 -4
- package/package.json +2 -2
- /package/dist/models/{get-samllogin-link-request-dto.js → get-saml-login-link-request-dto.js} +0 -0
- /package/dist/models/{login-by-samlrequest-dto.js → login-by-saml-request-dto.js} +0 -0
package/.openapi-generator/FILES
CHANGED
|
@@ -16,11 +16,11 @@ models/create-user-request-dto.ts
|
|
|
16
16
|
models/create-user-response-class.ts
|
|
17
17
|
models/custom-schema-class.ts
|
|
18
18
|
models/forgot-password-request-dto.ts
|
|
19
|
-
models/get-
|
|
19
|
+
models/get-saml-login-link-request-dto.ts
|
|
20
20
|
models/index.ts
|
|
21
21
|
models/inline-response200.ts
|
|
22
22
|
models/inline-response503.ts
|
|
23
|
-
models/login-by-
|
|
23
|
+
models/login-by-saml-request-dto.ts
|
|
24
24
|
models/login-class.ts
|
|
25
25
|
models/login-request-dto.ts
|
|
26
26
|
models/logout-request-dto.ts
|
package/README.md
CHANGED
|
@@ -17,11 +17,11 @@ Although this package can be used in both TypeScript and JavaScript, it is inten
|
|
|
17
17
|
Navigate to the folder of your consuming project and run one of the following commands:
|
|
18
18
|
|
|
19
19
|
```
|
|
20
|
-
npm install @emilgroup/auth-sdk-node@1.
|
|
20
|
+
npm install @emilgroup/auth-sdk-node@1.9.1-beta.2 --save
|
|
21
21
|
```
|
|
22
22
|
or
|
|
23
23
|
```
|
|
24
|
-
yarn add @emilgroup/auth-sdk-node@1.
|
|
24
|
+
yarn add @emilgroup/auth-sdk-node@1.9.1-beta.2
|
|
25
25
|
```
|
|
26
26
|
|
|
27
27
|
And then you can import ``.
|
package/api/authservice-api.ts
CHANGED
|
@@ -31,7 +31,7 @@ import { CreateUserResponseClass } from '../models';
|
|
|
31
31
|
// @ts-ignore
|
|
32
32
|
import { ForgotPasswordRequestDto } from '../models';
|
|
33
33
|
// @ts-ignore
|
|
34
|
-
import {
|
|
34
|
+
import { LoginBySamlRequestDto } from '../models';
|
|
35
35
|
// @ts-ignore
|
|
36
36
|
import { LoginClass } from '../models';
|
|
37
37
|
// @ts-ignore
|
|
@@ -169,8 +169,8 @@ export const AuthserviceApiAxiosParamCreator = function (configuration?: Configu
|
|
|
169
169
|
};
|
|
170
170
|
},
|
|
171
171
|
/**
|
|
172
|
-
* Get
|
|
173
|
-
* @summary Get
|
|
172
|
+
* Get SAML login link configured for the tenant in cognito as well as tenant settings
|
|
173
|
+
* @summary Get SAML login link for tenant
|
|
174
174
|
* @param {string} tenantSlug
|
|
175
175
|
* @param {*} [options] Override http request option.
|
|
176
176
|
* @throws {RequiredError}
|
|
@@ -248,13 +248,13 @@ export const AuthserviceApiAxiosParamCreator = function (configuration?: Configu
|
|
|
248
248
|
/**
|
|
249
249
|
* Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
|
|
250
250
|
* @summary Login by SAML idp provider such as ADFS
|
|
251
|
-
* @param {
|
|
251
|
+
* @param {LoginBySamlRequestDto} loginBySamlRequestDto
|
|
252
252
|
* @param {*} [options] Override http request option.
|
|
253
253
|
* @throws {RequiredError}
|
|
254
254
|
*/
|
|
255
|
-
|
|
256
|
-
// verify required parameter '
|
|
257
|
-
assertParamExists('
|
|
255
|
+
loginBySaml: async (loginBySamlRequestDto: LoginBySamlRequestDto, options: AxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
256
|
+
// verify required parameter 'loginBySamlRequestDto' is not null or undefined
|
|
257
|
+
assertParamExists('loginBySaml', 'loginBySamlRequestDto', loginBySamlRequestDto)
|
|
258
258
|
const localVarPath = `/authservice/v1/login/saml`;
|
|
259
259
|
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
260
260
|
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
@@ -276,7 +276,7 @@ export const AuthserviceApiAxiosParamCreator = function (configuration?: Configu
|
|
|
276
276
|
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
277
277
|
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
278
278
|
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
|
|
279
|
-
localVarRequestOptions.data = serializeDataIfNeeded(
|
|
279
|
+
localVarRequestOptions.data = serializeDataIfNeeded(loginBySamlRequestDto, localVarRequestOptions, configuration)
|
|
280
280
|
|
|
281
281
|
return {
|
|
282
282
|
url: toPathString(localVarUrlObj),
|
|
@@ -563,8 +563,8 @@ export const AuthserviceApiFp = function(configuration?: Configuration) {
|
|
|
563
563
|
return createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration);
|
|
564
564
|
},
|
|
565
565
|
/**
|
|
566
|
-
* Get
|
|
567
|
-
* @summary Get
|
|
566
|
+
* Get SAML login link configured for the tenant in cognito as well as tenant settings
|
|
567
|
+
* @summary Get SAML login link for tenant
|
|
568
568
|
* @param {string} tenantSlug
|
|
569
569
|
* @param {*} [options] Override http request option.
|
|
570
570
|
* @throws {RequiredError}
|
|
@@ -587,12 +587,12 @@ export const AuthserviceApiFp = function(configuration?: Configuration) {
|
|
|
587
587
|
/**
|
|
588
588
|
* Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
|
|
589
589
|
* @summary Login by SAML idp provider such as ADFS
|
|
590
|
-
* @param {
|
|
590
|
+
* @param {LoginBySamlRequestDto} loginBySamlRequestDto
|
|
591
591
|
* @param {*} [options] Override http request option.
|
|
592
592
|
* @throws {RequiredError}
|
|
593
593
|
*/
|
|
594
|
-
async
|
|
595
|
-
const localVarAxiosArgs = await localVarAxiosParamCreator.
|
|
594
|
+
async loginBySaml(loginBySamlRequestDto: LoginBySamlRequestDto, options?: AxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LoginClass>> {
|
|
595
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.loginBySaml(loginBySamlRequestDto, options);
|
|
596
596
|
return createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration);
|
|
597
597
|
},
|
|
598
598
|
/**
|
|
@@ -703,8 +703,8 @@ export const AuthserviceApiFactory = function (configuration?: Configuration, ba
|
|
|
703
703
|
return localVarFp.forgotPassword(forgotPasswordRequestDto, options).then((request) => request(axios, basePath));
|
|
704
704
|
},
|
|
705
705
|
/**
|
|
706
|
-
* Get
|
|
707
|
-
* @summary Get
|
|
706
|
+
* Get SAML login link configured for the tenant in cognito as well as tenant settings
|
|
707
|
+
* @summary Get SAML login link for tenant
|
|
708
708
|
* @param {string} tenantSlug
|
|
709
709
|
* @param {*} [options] Override http request option.
|
|
710
710
|
* @throws {RequiredError}
|
|
@@ -725,12 +725,12 @@ export const AuthserviceApiFactory = function (configuration?: Configuration, ba
|
|
|
725
725
|
/**
|
|
726
726
|
* Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
|
|
727
727
|
* @summary Login by SAML idp provider such as ADFS
|
|
728
|
-
* @param {
|
|
728
|
+
* @param {LoginBySamlRequestDto} loginBySamlRequestDto
|
|
729
729
|
* @param {*} [options] Override http request option.
|
|
730
730
|
* @throws {RequiredError}
|
|
731
731
|
*/
|
|
732
|
-
|
|
733
|
-
return localVarFp.
|
|
732
|
+
loginBySaml(loginBySamlRequestDto: LoginBySamlRequestDto, options?: any): AxiosPromise<LoginClass> {
|
|
733
|
+
return localVarFp.loginBySaml(loginBySamlRequestDto, options).then((request) => request(axios, basePath));
|
|
734
734
|
},
|
|
735
735
|
/**
|
|
736
736
|
* Sign tenant user out.
|
|
@@ -867,17 +867,17 @@ export interface AuthserviceApiLoginRequest {
|
|
|
867
867
|
}
|
|
868
868
|
|
|
869
869
|
/**
|
|
870
|
-
* Request parameters for
|
|
870
|
+
* Request parameters for loginBySaml operation in AuthserviceApi.
|
|
871
871
|
* @export
|
|
872
|
-
* @interface
|
|
872
|
+
* @interface AuthserviceApiLoginBySamlRequest
|
|
873
873
|
*/
|
|
874
|
-
export interface
|
|
874
|
+
export interface AuthserviceApiLoginBySamlRequest {
|
|
875
875
|
/**
|
|
876
876
|
*
|
|
877
|
-
* @type {
|
|
878
|
-
* @memberof
|
|
877
|
+
* @type {LoginBySamlRequestDto}
|
|
878
|
+
* @memberof AuthserviceApiLoginBySaml
|
|
879
879
|
*/
|
|
880
|
-
readonly
|
|
880
|
+
readonly loginBySamlRequestDto: LoginBySamlRequestDto
|
|
881
881
|
}
|
|
882
882
|
|
|
883
883
|
/**
|
|
@@ -1015,8 +1015,8 @@ export class AuthserviceApi extends BaseAPI {
|
|
|
1015
1015
|
}
|
|
1016
1016
|
|
|
1017
1017
|
/**
|
|
1018
|
-
* Get
|
|
1019
|
-
* @summary Get
|
|
1018
|
+
* Get SAML login link configured for the tenant in cognito as well as tenant settings
|
|
1019
|
+
* @summary Get SAML login link for tenant
|
|
1020
1020
|
* @param {AuthserviceApiGetSamlLoginLinkRequest} requestParameters Request parameters.
|
|
1021
1021
|
* @param {*} [options] Override http request option.
|
|
1022
1022
|
* @throws {RequiredError}
|
|
@@ -1041,13 +1041,13 @@ export class AuthserviceApi extends BaseAPI {
|
|
|
1041
1041
|
/**
|
|
1042
1042
|
* Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
|
|
1043
1043
|
* @summary Login by SAML idp provider such as ADFS
|
|
1044
|
-
* @param {
|
|
1044
|
+
* @param {AuthserviceApiLoginBySamlRequest} requestParameters Request parameters.
|
|
1045
1045
|
* @param {*} [options] Override http request option.
|
|
1046
1046
|
* @throws {RequiredError}
|
|
1047
1047
|
* @memberof AuthserviceApi
|
|
1048
1048
|
*/
|
|
1049
|
-
public
|
|
1050
|
-
return AuthserviceApiFp(this.configuration).
|
|
1049
|
+
public loginBySaml(requestParameters: AuthserviceApiLoginBySamlRequest, options?: AxiosRequestConfig) {
|
|
1050
|
+
return AuthserviceApiFp(this.configuration).loginBySaml(requestParameters.loginBySamlRequestDto, options).then((request) => request(this.axios, this.basePath));
|
|
1051
1051
|
}
|
|
1052
1052
|
|
|
1053
1053
|
/**
|
package/api/default-api.ts
CHANGED
|
@@ -35,7 +35,8 @@ const FormData = require('form-data');
|
|
|
35
35
|
export const DefaultApiAxiosParamCreator = function (configuration?: Configuration) {
|
|
36
36
|
return {
|
|
37
37
|
/**
|
|
38
|
-
*
|
|
38
|
+
* Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
|
|
39
|
+
* @summary Health Check
|
|
39
40
|
* @param {*} [options] Override http request option.
|
|
40
41
|
* @throws {RequiredError}
|
|
41
42
|
*/
|
|
@@ -76,7 +77,8 @@ export const DefaultApiFp = function(configuration?: Configuration) {
|
|
|
76
77
|
const localVarAxiosParamCreator = DefaultApiAxiosParamCreator(configuration)
|
|
77
78
|
return {
|
|
78
79
|
/**
|
|
79
|
-
*
|
|
80
|
+
* Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
|
|
81
|
+
* @summary Health Check
|
|
80
82
|
* @param {*} [options] Override http request option.
|
|
81
83
|
* @throws {RequiredError}
|
|
82
84
|
*/
|
|
@@ -95,7 +97,8 @@ export const DefaultApiFactory = function (configuration?: Configuration, basePa
|
|
|
95
97
|
const localVarFp = DefaultApiFp(configuration)
|
|
96
98
|
return {
|
|
97
99
|
/**
|
|
98
|
-
*
|
|
100
|
+
* Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
|
|
101
|
+
* @summary Health Check
|
|
99
102
|
* @param {*} [options] Override http request option.
|
|
100
103
|
* @throws {RequiredError}
|
|
101
104
|
*/
|
|
@@ -113,7 +116,8 @@ export const DefaultApiFactory = function (configuration?: Configuration, basePa
|
|
|
113
116
|
*/
|
|
114
117
|
export class DefaultApi extends BaseAPI {
|
|
115
118
|
/**
|
|
116
|
-
*
|
|
119
|
+
* Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
|
|
120
|
+
* @summary Health Check
|
|
117
121
|
* @param {*} [options] Override http request option.
|
|
118
122
|
* @throws {RequiredError}
|
|
119
123
|
* @memberof DefaultApi
|
|
@@ -17,7 +17,7 @@ import { CreateOrgAndUserResponseClass } from '../models';
|
|
|
17
17
|
import { CreateUserRequestDto } from '../models';
|
|
18
18
|
import { CreateUserResponseClass } from '../models';
|
|
19
19
|
import { ForgotPasswordRequestDto } from '../models';
|
|
20
|
-
import {
|
|
20
|
+
import { LoginBySamlRequestDto } from '../models';
|
|
21
21
|
import { LoginClass } from '../models';
|
|
22
22
|
import { LoginRequestDto } from '../models';
|
|
23
23
|
import { LogoutRequestDto } from '../models';
|
|
@@ -54,8 +54,8 @@ export declare const AuthserviceApiAxiosParamCreator: (configuration?: Configura
|
|
|
54
54
|
*/
|
|
55
55
|
forgotPassword: (forgotPasswordRequestDto: ForgotPasswordRequestDto, options?: AxiosRequestConfig) => Promise<RequestArgs>;
|
|
56
56
|
/**
|
|
57
|
-
* Get
|
|
58
|
-
* @summary Get
|
|
57
|
+
* Get SAML login link configured for the tenant in cognito as well as tenant settings
|
|
58
|
+
* @summary Get SAML login link for tenant
|
|
59
59
|
* @param {string} tenantSlug
|
|
60
60
|
* @param {*} [options] Override http request option.
|
|
61
61
|
* @throws {RequiredError}
|
|
@@ -72,11 +72,11 @@ export declare const AuthserviceApiAxiosParamCreator: (configuration?: Configura
|
|
|
72
72
|
/**
|
|
73
73
|
* Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
|
|
74
74
|
* @summary Login by SAML idp provider such as ADFS
|
|
75
|
-
* @param {
|
|
75
|
+
* @param {LoginBySamlRequestDto} loginBySamlRequestDto
|
|
76
76
|
* @param {*} [options] Override http request option.
|
|
77
77
|
* @throws {RequiredError}
|
|
78
78
|
*/
|
|
79
|
-
|
|
79
|
+
loginBySaml: (loginBySamlRequestDto: LoginBySamlRequestDto, options?: AxiosRequestConfig) => Promise<RequestArgs>;
|
|
80
80
|
/**
|
|
81
81
|
* Sign tenant user out.
|
|
82
82
|
* @summary Logout tenant
|
|
@@ -157,8 +157,8 @@ export declare const AuthserviceApiFp: (configuration?: Configuration) => {
|
|
|
157
157
|
*/
|
|
158
158
|
forgotPassword(forgotPasswordRequestDto: ForgotPasswordRequestDto, options?: AxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<void>>;
|
|
159
159
|
/**
|
|
160
|
-
* Get
|
|
161
|
-
* @summary Get
|
|
160
|
+
* Get SAML login link configured for the tenant in cognito as well as tenant settings
|
|
161
|
+
* @summary Get SAML login link for tenant
|
|
162
162
|
* @param {string} tenantSlug
|
|
163
163
|
* @param {*} [options] Override http request option.
|
|
164
164
|
* @throws {RequiredError}
|
|
@@ -175,11 +175,11 @@ export declare const AuthserviceApiFp: (configuration?: Configuration) => {
|
|
|
175
175
|
/**
|
|
176
176
|
* Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
|
|
177
177
|
* @summary Login by SAML idp provider such as ADFS
|
|
178
|
-
* @param {
|
|
178
|
+
* @param {LoginBySamlRequestDto} loginBySamlRequestDto
|
|
179
179
|
* @param {*} [options] Override http request option.
|
|
180
180
|
* @throws {RequiredError}
|
|
181
181
|
*/
|
|
182
|
-
|
|
182
|
+
loginBySaml(loginBySamlRequestDto: LoginBySamlRequestDto, options?: AxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LoginClass>>;
|
|
183
183
|
/**
|
|
184
184
|
* Sign tenant user out.
|
|
185
185
|
* @summary Logout tenant
|
|
@@ -260,8 +260,8 @@ export declare const AuthserviceApiFactory: (configuration?: Configuration, base
|
|
|
260
260
|
*/
|
|
261
261
|
forgotPassword(forgotPasswordRequestDto: ForgotPasswordRequestDto, options?: any): AxiosPromise<void>;
|
|
262
262
|
/**
|
|
263
|
-
* Get
|
|
264
|
-
* @summary Get
|
|
263
|
+
* Get SAML login link configured for the tenant in cognito as well as tenant settings
|
|
264
|
+
* @summary Get SAML login link for tenant
|
|
265
265
|
* @param {string} tenantSlug
|
|
266
266
|
* @param {*} [options] Override http request option.
|
|
267
267
|
* @throws {RequiredError}
|
|
@@ -278,11 +278,11 @@ export declare const AuthserviceApiFactory: (configuration?: Configuration, base
|
|
|
278
278
|
/**
|
|
279
279
|
* Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
|
|
280
280
|
* @summary Login by SAML idp provider such as ADFS
|
|
281
|
-
* @param {
|
|
281
|
+
* @param {LoginBySamlRequestDto} loginBySamlRequestDto
|
|
282
282
|
* @param {*} [options] Override http request option.
|
|
283
283
|
* @throws {RequiredError}
|
|
284
284
|
*/
|
|
285
|
-
|
|
285
|
+
loginBySaml(loginBySamlRequestDto: LoginBySamlRequestDto, options?: any): AxiosPromise<LoginClass>;
|
|
286
286
|
/**
|
|
287
287
|
* Sign tenant user out.
|
|
288
288
|
* @summary Logout tenant
|
|
@@ -399,17 +399,17 @@ export interface AuthserviceApiLoginRequest {
|
|
|
399
399
|
readonly loginRequestDto: LoginRequestDto;
|
|
400
400
|
}
|
|
401
401
|
/**
|
|
402
|
-
* Request parameters for
|
|
402
|
+
* Request parameters for loginBySaml operation in AuthserviceApi.
|
|
403
403
|
* @export
|
|
404
|
-
* @interface
|
|
404
|
+
* @interface AuthserviceApiLoginBySamlRequest
|
|
405
405
|
*/
|
|
406
|
-
export interface
|
|
406
|
+
export interface AuthserviceApiLoginBySamlRequest {
|
|
407
407
|
/**
|
|
408
408
|
*
|
|
409
|
-
* @type {
|
|
410
|
-
* @memberof
|
|
409
|
+
* @type {LoginBySamlRequestDto}
|
|
410
|
+
* @memberof AuthserviceApiLoginBySaml
|
|
411
411
|
*/
|
|
412
|
-
readonly
|
|
412
|
+
readonly loginBySamlRequestDto: LoginBySamlRequestDto;
|
|
413
413
|
}
|
|
414
414
|
/**
|
|
415
415
|
* Request parameters for logout operation in AuthserviceApi.
|
|
@@ -530,8 +530,8 @@ export declare class AuthserviceApi extends BaseAPI {
|
|
|
530
530
|
*/
|
|
531
531
|
forgotPassword(requestParameters: AuthserviceApiForgotPasswordRequest, options?: AxiosRequestConfig): Promise<import("axios").AxiosResponse<void, any>>;
|
|
532
532
|
/**
|
|
533
|
-
* Get
|
|
534
|
-
* @summary Get
|
|
533
|
+
* Get SAML login link configured for the tenant in cognito as well as tenant settings
|
|
534
|
+
* @summary Get SAML login link for tenant
|
|
535
535
|
* @param {AuthserviceApiGetSamlLoginLinkRequest} requestParameters Request parameters.
|
|
536
536
|
* @param {*} [options] Override http request option.
|
|
537
537
|
* @throws {RequiredError}
|
|
@@ -550,12 +550,12 @@ export declare class AuthserviceApi extends BaseAPI {
|
|
|
550
550
|
/**
|
|
551
551
|
* Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
|
|
552
552
|
* @summary Login by SAML idp provider such as ADFS
|
|
553
|
-
* @param {
|
|
553
|
+
* @param {AuthserviceApiLoginBySamlRequest} requestParameters Request parameters.
|
|
554
554
|
* @param {*} [options] Override http request option.
|
|
555
555
|
* @throws {RequiredError}
|
|
556
556
|
* @memberof AuthserviceApi
|
|
557
557
|
*/
|
|
558
|
-
|
|
558
|
+
loginBySaml(requestParameters: AuthserviceApiLoginBySamlRequest, options?: AxiosRequestConfig): Promise<import("axios").AxiosResponse<LoginClass, any>>;
|
|
559
559
|
/**
|
|
560
560
|
* Sign tenant user out.
|
|
561
561
|
* @summary Logout tenant
|
|
@@ -202,8 +202,8 @@ var AuthserviceApiAxiosParamCreator = function (configuration) {
|
|
|
202
202
|
});
|
|
203
203
|
},
|
|
204
204
|
/**
|
|
205
|
-
* Get
|
|
206
|
-
* @summary Get
|
|
205
|
+
* Get SAML login link configured for the tenant in cognito as well as tenant settings
|
|
206
|
+
* @summary Get SAML login link for tenant
|
|
207
207
|
* @param {string} tenantSlug
|
|
208
208
|
* @param {*} [options] Override http request option.
|
|
209
209
|
* @throws {RequiredError}
|
|
@@ -275,17 +275,17 @@ var AuthserviceApiAxiosParamCreator = function (configuration) {
|
|
|
275
275
|
/**
|
|
276
276
|
* Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
|
|
277
277
|
* @summary Login by SAML idp provider such as ADFS
|
|
278
|
-
* @param {
|
|
278
|
+
* @param {LoginBySamlRequestDto} loginBySamlRequestDto
|
|
279
279
|
* @param {*} [options] Override http request option.
|
|
280
280
|
* @throws {RequiredError}
|
|
281
281
|
*/
|
|
282
|
-
|
|
282
|
+
loginBySaml: function (loginBySamlRequestDto, options) {
|
|
283
283
|
if (options === void 0) { options = {}; }
|
|
284
284
|
return __awaiter(_this, void 0, void 0, function () {
|
|
285
285
|
var localVarPath, localVarUrlObj, baseOptions, baseAccessToken, localVarRequestOptions, localVarHeaderParameter, localVarQueryParameter, headersFromBaseOptions;
|
|
286
286
|
return __generator(this, function (_a) {
|
|
287
|
-
// verify required parameter '
|
|
288
|
-
(0, common_1.assertParamExists)('
|
|
287
|
+
// verify required parameter 'loginBySamlRequestDto' is not null or undefined
|
|
288
|
+
(0, common_1.assertParamExists)('loginBySaml', 'loginBySamlRequestDto', loginBySamlRequestDto);
|
|
289
289
|
localVarPath = "/authservice/v1/login/saml";
|
|
290
290
|
localVarUrlObj = new url_1.URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
291
291
|
if (configuration) {
|
|
@@ -299,7 +299,7 @@ var AuthserviceApiAxiosParamCreator = function (configuration) {
|
|
|
299
299
|
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
300
300
|
headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
301
301
|
localVarRequestOptions.headers = __assign(__assign(__assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
302
|
-
localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(
|
|
302
|
+
localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(loginBySamlRequestDto, localVarRequestOptions, configuration);
|
|
303
303
|
return [2 /*return*/, {
|
|
304
304
|
url: (0, common_1.toPathString)(localVarUrlObj),
|
|
305
305
|
options: localVarRequestOptions,
|
|
@@ -595,8 +595,8 @@ var AuthserviceApiFp = function (configuration) {
|
|
|
595
595
|
});
|
|
596
596
|
},
|
|
597
597
|
/**
|
|
598
|
-
* Get
|
|
599
|
-
* @summary Get
|
|
598
|
+
* Get SAML login link configured for the tenant in cognito as well as tenant settings
|
|
599
|
+
* @summary Get SAML login link for tenant
|
|
600
600
|
* @param {string} tenantSlug
|
|
601
601
|
* @param {*} [options] Override http request option.
|
|
602
602
|
* @throws {RequiredError}
|
|
@@ -637,16 +637,16 @@ var AuthserviceApiFp = function (configuration) {
|
|
|
637
637
|
/**
|
|
638
638
|
* Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
|
|
639
639
|
* @summary Login by SAML idp provider such as ADFS
|
|
640
|
-
* @param {
|
|
640
|
+
* @param {LoginBySamlRequestDto} loginBySamlRequestDto
|
|
641
641
|
* @param {*} [options] Override http request option.
|
|
642
642
|
* @throws {RequiredError}
|
|
643
643
|
*/
|
|
644
|
-
|
|
644
|
+
loginBySaml: function (loginBySamlRequestDto, options) {
|
|
645
645
|
return __awaiter(this, void 0, void 0, function () {
|
|
646
646
|
var localVarAxiosArgs;
|
|
647
647
|
return __generator(this, function (_a) {
|
|
648
648
|
switch (_a.label) {
|
|
649
|
-
case 0: return [4 /*yield*/, localVarAxiosParamCreator.
|
|
649
|
+
case 0: return [4 /*yield*/, localVarAxiosParamCreator.loginBySaml(loginBySamlRequestDto, options)];
|
|
650
650
|
case 1:
|
|
651
651
|
localVarAxiosArgs = _a.sent();
|
|
652
652
|
return [2 /*return*/, (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)];
|
|
@@ -816,8 +816,8 @@ var AuthserviceApiFactory = function (configuration, basePath, axios) {
|
|
|
816
816
|
return localVarFp.forgotPassword(forgotPasswordRequestDto, options).then(function (request) { return request(axios, basePath); });
|
|
817
817
|
},
|
|
818
818
|
/**
|
|
819
|
-
* Get
|
|
820
|
-
* @summary Get
|
|
819
|
+
* Get SAML login link configured for the tenant in cognito as well as tenant settings
|
|
820
|
+
* @summary Get SAML login link for tenant
|
|
821
821
|
* @param {string} tenantSlug
|
|
822
822
|
* @param {*} [options] Override http request option.
|
|
823
823
|
* @throws {RequiredError}
|
|
@@ -838,12 +838,12 @@ var AuthserviceApiFactory = function (configuration, basePath, axios) {
|
|
|
838
838
|
/**
|
|
839
839
|
* Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
|
|
840
840
|
* @summary Login by SAML idp provider such as ADFS
|
|
841
|
-
* @param {
|
|
841
|
+
* @param {LoginBySamlRequestDto} loginBySamlRequestDto
|
|
842
842
|
* @param {*} [options] Override http request option.
|
|
843
843
|
* @throws {RequiredError}
|
|
844
844
|
*/
|
|
845
|
-
|
|
846
|
-
return localVarFp.
|
|
845
|
+
loginBySaml: function (loginBySamlRequestDto, options) {
|
|
846
|
+
return localVarFp.loginBySaml(loginBySamlRequestDto, options).then(function (request) { return request(axios, basePath); });
|
|
847
847
|
},
|
|
848
848
|
/**
|
|
849
849
|
* Sign tenant user out.
|
|
@@ -957,8 +957,8 @@ var AuthserviceApi = /** @class */ (function (_super) {
|
|
|
957
957
|
return (0, exports.AuthserviceApiFp)(this.configuration).forgotPassword(requestParameters.forgotPasswordRequestDto, options).then(function (request) { return request(_this.axios, _this.basePath); });
|
|
958
958
|
};
|
|
959
959
|
/**
|
|
960
|
-
* Get
|
|
961
|
-
* @summary Get
|
|
960
|
+
* Get SAML login link configured for the tenant in cognito as well as tenant settings
|
|
961
|
+
* @summary Get SAML login link for tenant
|
|
962
962
|
* @param {AuthserviceApiGetSamlLoginLinkRequest} requestParameters Request parameters.
|
|
963
963
|
* @param {*} [options] Override http request option.
|
|
964
964
|
* @throws {RequiredError}
|
|
@@ -983,14 +983,14 @@ var AuthserviceApi = /** @class */ (function (_super) {
|
|
|
983
983
|
/**
|
|
984
984
|
* Get new access token, refresh token after successful login. This api also creates a tenant user if user does not exist
|
|
985
985
|
* @summary Login by SAML idp provider such as ADFS
|
|
986
|
-
* @param {
|
|
986
|
+
* @param {AuthserviceApiLoginBySamlRequest} requestParameters Request parameters.
|
|
987
987
|
* @param {*} [options] Override http request option.
|
|
988
988
|
* @throws {RequiredError}
|
|
989
989
|
* @memberof AuthserviceApi
|
|
990
990
|
*/
|
|
991
|
-
AuthserviceApi.prototype.
|
|
991
|
+
AuthserviceApi.prototype.loginBySaml = function (requestParameters, options) {
|
|
992
992
|
var _this = this;
|
|
993
|
-
return (0, exports.AuthserviceApiFp)(this.configuration).
|
|
993
|
+
return (0, exports.AuthserviceApiFp)(this.configuration).loginBySaml(requestParameters.loginBySamlRequestDto, options).then(function (request) { return request(_this.axios, _this.basePath); });
|
|
994
994
|
};
|
|
995
995
|
/**
|
|
996
996
|
* Sign tenant user out.
|
|
@@ -19,7 +19,8 @@ import { InlineResponse200 } from '../models';
|
|
|
19
19
|
*/
|
|
20
20
|
export declare const DefaultApiAxiosParamCreator: (configuration?: Configuration) => {
|
|
21
21
|
/**
|
|
22
|
-
*
|
|
22
|
+
* Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
|
|
23
|
+
* @summary Health Check
|
|
23
24
|
* @param {*} [options] Override http request option.
|
|
24
25
|
* @throws {RequiredError}
|
|
25
26
|
*/
|
|
@@ -31,7 +32,8 @@ export declare const DefaultApiAxiosParamCreator: (configuration?: Configuration
|
|
|
31
32
|
*/
|
|
32
33
|
export declare const DefaultApiFp: (configuration?: Configuration) => {
|
|
33
34
|
/**
|
|
34
|
-
*
|
|
35
|
+
* Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
|
|
36
|
+
* @summary Health Check
|
|
35
37
|
* @param {*} [options] Override http request option.
|
|
36
38
|
* @throws {RequiredError}
|
|
37
39
|
*/
|
|
@@ -43,7 +45,8 @@ export declare const DefaultApiFp: (configuration?: Configuration) => {
|
|
|
43
45
|
*/
|
|
44
46
|
export declare const DefaultApiFactory: (configuration?: Configuration, basePath?: string, axios?: AxiosInstance) => {
|
|
45
47
|
/**
|
|
46
|
-
*
|
|
48
|
+
* Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
|
|
49
|
+
* @summary Health Check
|
|
47
50
|
* @param {*} [options] Override http request option.
|
|
48
51
|
* @throws {RequiredError}
|
|
49
52
|
*/
|
|
@@ -57,7 +60,8 @@ export declare const DefaultApiFactory: (configuration?: Configuration, basePath
|
|
|
57
60
|
*/
|
|
58
61
|
export declare class DefaultApi extends BaseAPI {
|
|
59
62
|
/**
|
|
60
|
-
*
|
|
63
|
+
* Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
|
|
64
|
+
* @summary Health Check
|
|
61
65
|
* @param {*} [options] Override http request option.
|
|
62
66
|
* @throws {RequiredError}
|
|
63
67
|
* @memberof DefaultApi
|
package/dist/api/default-api.js
CHANGED
|
@@ -97,7 +97,8 @@ var DefaultApiAxiosParamCreator = function (configuration) {
|
|
|
97
97
|
var _this = this;
|
|
98
98
|
return {
|
|
99
99
|
/**
|
|
100
|
-
*
|
|
100
|
+
* Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
|
|
101
|
+
* @summary Health Check
|
|
101
102
|
* @param {*} [options] Override http request option.
|
|
102
103
|
* @throws {RequiredError}
|
|
103
104
|
*/
|
|
@@ -136,7 +137,8 @@ var DefaultApiFp = function (configuration) {
|
|
|
136
137
|
var localVarAxiosParamCreator = (0, exports.DefaultApiAxiosParamCreator)(configuration);
|
|
137
138
|
return {
|
|
138
139
|
/**
|
|
139
|
-
*
|
|
140
|
+
* Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
|
|
141
|
+
* @summary Health Check
|
|
140
142
|
* @param {*} [options] Override http request option.
|
|
141
143
|
* @throws {RequiredError}
|
|
142
144
|
*/
|
|
@@ -164,7 +166,8 @@ var DefaultApiFactory = function (configuration, basePath, axios) {
|
|
|
164
166
|
var localVarFp = (0, exports.DefaultApiFp)(configuration);
|
|
165
167
|
return {
|
|
166
168
|
/**
|
|
167
|
-
*
|
|
169
|
+
* Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
|
|
170
|
+
* @summary Health Check
|
|
168
171
|
* @param {*} [options] Override http request option.
|
|
169
172
|
* @throws {RequiredError}
|
|
170
173
|
*/
|
|
@@ -186,7 +189,8 @@ var DefaultApi = /** @class */ (function (_super) {
|
|
|
186
189
|
return _super !== null && _super.apply(this, arguments) || this;
|
|
187
190
|
}
|
|
188
191
|
/**
|
|
189
|
-
*
|
|
192
|
+
* Returns the health status of the auth service. This endpoint is used to monitor the operational status of the auth service. It typically returns a simple status indicator, such as \'UP\' or \'OK\', confirming that the service is operational and available.
|
|
193
|
+
* @summary Health Check
|
|
190
194
|
* @param {*} [options] Override http request option.
|
|
191
195
|
* @throws {RequiredError}
|
|
192
196
|
* @memberof DefaultApi
|
package/dist/models/{get-samllogin-link-request-dto.d.ts → get-saml-login-link-request-dto.d.ts}
RENAMED
|
@@ -12,13 +12,13 @@
|
|
|
12
12
|
/**
|
|
13
13
|
*
|
|
14
14
|
* @export
|
|
15
|
-
* @interface
|
|
15
|
+
* @interface GetSamlLoginLinkRequestDto
|
|
16
16
|
*/
|
|
17
|
-
export interface
|
|
17
|
+
export interface GetSamlLoginLinkRequestDto {
|
|
18
18
|
/**
|
|
19
19
|
*
|
|
20
20
|
* @type {string}
|
|
21
|
-
* @memberof
|
|
21
|
+
* @memberof GetSamlLoginLinkRequestDto
|
|
22
22
|
*/
|
|
23
23
|
'tenantSlug': string;
|
|
24
24
|
}
|
package/dist/models/index.d.ts
CHANGED
|
@@ -4,10 +4,10 @@ export * from './create-user-request-dto';
|
|
|
4
4
|
export * from './create-user-response-class';
|
|
5
5
|
export * from './custom-schema-class';
|
|
6
6
|
export * from './forgot-password-request-dto';
|
|
7
|
-
export * from './get-
|
|
7
|
+
export * from './get-saml-login-link-request-dto';
|
|
8
8
|
export * from './inline-response200';
|
|
9
9
|
export * from './inline-response503';
|
|
10
|
-
export * from './login-by-
|
|
10
|
+
export * from './login-by-saml-request-dto';
|
|
11
11
|
export * from './login-class';
|
|
12
12
|
export * from './login-request-dto';
|
|
13
13
|
export * from './logout-request-dto';
|
package/dist/models/index.js
CHANGED
|
@@ -20,10 +20,10 @@ __exportStar(require("./create-user-request-dto"), exports);
|
|
|
20
20
|
__exportStar(require("./create-user-response-class"), exports);
|
|
21
21
|
__exportStar(require("./custom-schema-class"), exports);
|
|
22
22
|
__exportStar(require("./forgot-password-request-dto"), exports);
|
|
23
|
-
__exportStar(require("./get-
|
|
23
|
+
__exportStar(require("./get-saml-login-link-request-dto"), exports);
|
|
24
24
|
__exportStar(require("./inline-response200"), exports);
|
|
25
25
|
__exportStar(require("./inline-response503"), exports);
|
|
26
|
-
__exportStar(require("./login-by-
|
|
26
|
+
__exportStar(require("./login-by-saml-request-dto"), exports);
|
|
27
27
|
__exportStar(require("./login-class"), exports);
|
|
28
28
|
__exportStar(require("./login-request-dto"), exports);
|
|
29
29
|
__exportStar(require("./logout-request-dto"), exports);
|
|
@@ -23,32 +23,32 @@ export interface InlineResponse200 {
|
|
|
23
23
|
'status'?: string;
|
|
24
24
|
/**
|
|
25
25
|
*
|
|
26
|
-
* @type {{ [key: string]: { [key: string]:
|
|
26
|
+
* @type {{ [key: string]: { [key: string]: object; }; }}
|
|
27
27
|
* @memberof InlineResponse200
|
|
28
28
|
*/
|
|
29
29
|
'info'?: {
|
|
30
30
|
[key: string]: {
|
|
31
|
-
[key: string]:
|
|
31
|
+
[key: string]: object;
|
|
32
32
|
};
|
|
33
33
|
} | null;
|
|
34
34
|
/**
|
|
35
35
|
*
|
|
36
|
-
* @type {{ [key: string]: { [key: string]:
|
|
36
|
+
* @type {{ [key: string]: { [key: string]: object; }; }}
|
|
37
37
|
* @memberof InlineResponse200
|
|
38
38
|
*/
|
|
39
39
|
'error'?: {
|
|
40
40
|
[key: string]: {
|
|
41
|
-
[key: string]:
|
|
41
|
+
[key: string]: object;
|
|
42
42
|
};
|
|
43
43
|
} | null;
|
|
44
44
|
/**
|
|
45
45
|
*
|
|
46
|
-
* @type {{ [key: string]: { [key: string]:
|
|
46
|
+
* @type {{ [key: string]: { [key: string]: object; }; }}
|
|
47
47
|
* @memberof InlineResponse200
|
|
48
48
|
*/
|
|
49
49
|
'details'?: {
|
|
50
50
|
[key: string]: {
|
|
51
|
-
[key: string]:
|
|
51
|
+
[key: string]: object;
|
|
52
52
|
};
|
|
53
53
|
};
|
|
54
54
|
}
|
|
@@ -23,32 +23,32 @@ export interface InlineResponse503 {
|
|
|
23
23
|
'status'?: string;
|
|
24
24
|
/**
|
|
25
25
|
*
|
|
26
|
-
* @type {{ [key: string]: { [key: string]:
|
|
26
|
+
* @type {{ [key: string]: { [key: string]: object; }; }}
|
|
27
27
|
* @memberof InlineResponse503
|
|
28
28
|
*/
|
|
29
29
|
'info'?: {
|
|
30
30
|
[key: string]: {
|
|
31
|
-
[key: string]:
|
|
31
|
+
[key: string]: object;
|
|
32
32
|
};
|
|
33
33
|
} | null;
|
|
34
34
|
/**
|
|
35
35
|
*
|
|
36
|
-
* @type {{ [key: string]: { [key: string]:
|
|
36
|
+
* @type {{ [key: string]: { [key: string]: object; }; }}
|
|
37
37
|
* @memberof InlineResponse503
|
|
38
38
|
*/
|
|
39
39
|
'error'?: {
|
|
40
40
|
[key: string]: {
|
|
41
|
-
[key: string]:
|
|
41
|
+
[key: string]: object;
|
|
42
42
|
};
|
|
43
43
|
} | null;
|
|
44
44
|
/**
|
|
45
45
|
*
|
|
46
|
-
* @type {{ [key: string]: { [key: string]:
|
|
46
|
+
* @type {{ [key: string]: { [key: string]: object; }; }}
|
|
47
47
|
* @memberof InlineResponse503
|
|
48
48
|
*/
|
|
49
49
|
'details'?: {
|
|
50
50
|
[key: string]: {
|
|
51
|
-
[key: string]:
|
|
51
|
+
[key: string]: object;
|
|
52
52
|
};
|
|
53
53
|
};
|
|
54
54
|
}
|
|
@@ -12,19 +12,19 @@
|
|
|
12
12
|
/**
|
|
13
13
|
*
|
|
14
14
|
* @export
|
|
15
|
-
* @interface
|
|
15
|
+
* @interface LoginBySamlRequestDto
|
|
16
16
|
*/
|
|
17
|
-
export interface
|
|
17
|
+
export interface LoginBySamlRequestDto {
|
|
18
18
|
/**
|
|
19
19
|
* code for grant type authorization code
|
|
20
20
|
* @type {string}
|
|
21
|
-
* @memberof
|
|
21
|
+
* @memberof LoginBySamlRequestDto
|
|
22
22
|
*/
|
|
23
23
|
'code': string;
|
|
24
24
|
/**
|
|
25
25
|
* Tenant slug
|
|
26
26
|
* @type {string}
|
|
27
|
-
* @memberof
|
|
27
|
+
* @memberof LoginBySamlRequestDto
|
|
28
28
|
*/
|
|
29
29
|
'tenantSlug': string;
|
|
30
30
|
}
|
|
@@ -17,13 +17,13 @@
|
|
|
17
17
|
/**
|
|
18
18
|
*
|
|
19
19
|
* @export
|
|
20
|
-
* @interface
|
|
20
|
+
* @interface GetSamlLoginLinkRequestDto
|
|
21
21
|
*/
|
|
22
|
-
export interface
|
|
22
|
+
export interface GetSamlLoginLinkRequestDto {
|
|
23
23
|
/**
|
|
24
24
|
*
|
|
25
25
|
* @type {string}
|
|
26
|
-
* @memberof
|
|
26
|
+
* @memberof GetSamlLoginLinkRequestDto
|
|
27
27
|
*/
|
|
28
28
|
'tenantSlug': string;
|
|
29
29
|
}
|
package/models/index.ts
CHANGED
|
@@ -4,10 +4,10 @@ export * from './create-user-request-dto';
|
|
|
4
4
|
export * from './create-user-response-class';
|
|
5
5
|
export * from './custom-schema-class';
|
|
6
6
|
export * from './forgot-password-request-dto';
|
|
7
|
-
export * from './get-
|
|
7
|
+
export * from './get-saml-login-link-request-dto';
|
|
8
8
|
export * from './inline-response200';
|
|
9
9
|
export * from './inline-response503';
|
|
10
|
-
export * from './login-by-
|
|
10
|
+
export * from './login-by-saml-request-dto';
|
|
11
11
|
export * from './login-class';
|
|
12
12
|
export * from './login-request-dto';
|
|
13
13
|
export * from './logout-request-dto';
|
|
@@ -28,21 +28,21 @@ export interface InlineResponse200 {
|
|
|
28
28
|
'status'?: string;
|
|
29
29
|
/**
|
|
30
30
|
*
|
|
31
|
-
* @type {{ [key: string]: { [key: string]:
|
|
31
|
+
* @type {{ [key: string]: { [key: string]: object; }; }}
|
|
32
32
|
* @memberof InlineResponse200
|
|
33
33
|
*/
|
|
34
|
-
'info'?: { [key: string]: { [key: string]:
|
|
34
|
+
'info'?: { [key: string]: { [key: string]: object; }; } | null;
|
|
35
35
|
/**
|
|
36
36
|
*
|
|
37
|
-
* @type {{ [key: string]: { [key: string]:
|
|
37
|
+
* @type {{ [key: string]: { [key: string]: object; }; }}
|
|
38
38
|
* @memberof InlineResponse200
|
|
39
39
|
*/
|
|
40
|
-
'error'?: { [key: string]: { [key: string]:
|
|
40
|
+
'error'?: { [key: string]: { [key: string]: object; }; } | null;
|
|
41
41
|
/**
|
|
42
42
|
*
|
|
43
|
-
* @type {{ [key: string]: { [key: string]:
|
|
43
|
+
* @type {{ [key: string]: { [key: string]: object; }; }}
|
|
44
44
|
* @memberof InlineResponse200
|
|
45
45
|
*/
|
|
46
|
-
'details'?: { [key: string]: { [key: string]:
|
|
46
|
+
'details'?: { [key: string]: { [key: string]: object; }; };
|
|
47
47
|
}
|
|
48
48
|
|
|
@@ -28,21 +28,21 @@ export interface InlineResponse503 {
|
|
|
28
28
|
'status'?: string;
|
|
29
29
|
/**
|
|
30
30
|
*
|
|
31
|
-
* @type {{ [key: string]: { [key: string]:
|
|
31
|
+
* @type {{ [key: string]: { [key: string]: object; }; }}
|
|
32
32
|
* @memberof InlineResponse503
|
|
33
33
|
*/
|
|
34
|
-
'info'?: { [key: string]: { [key: string]:
|
|
34
|
+
'info'?: { [key: string]: { [key: string]: object; }; } | null;
|
|
35
35
|
/**
|
|
36
36
|
*
|
|
37
|
-
* @type {{ [key: string]: { [key: string]:
|
|
37
|
+
* @type {{ [key: string]: { [key: string]: object; }; }}
|
|
38
38
|
* @memberof InlineResponse503
|
|
39
39
|
*/
|
|
40
|
-
'error'?: { [key: string]: { [key: string]:
|
|
40
|
+
'error'?: { [key: string]: { [key: string]: object; }; } | null;
|
|
41
41
|
/**
|
|
42
42
|
*
|
|
43
|
-
* @type {{ [key: string]: { [key: string]:
|
|
43
|
+
* @type {{ [key: string]: { [key: string]: object; }; }}
|
|
44
44
|
* @memberof InlineResponse503
|
|
45
45
|
*/
|
|
46
|
-
'details'?: { [key: string]: { [key: string]:
|
|
46
|
+
'details'?: { [key: string]: { [key: string]: object; }; };
|
|
47
47
|
}
|
|
48
48
|
|
|
@@ -17,19 +17,19 @@
|
|
|
17
17
|
/**
|
|
18
18
|
*
|
|
19
19
|
* @export
|
|
20
|
-
* @interface
|
|
20
|
+
* @interface LoginBySamlRequestDto
|
|
21
21
|
*/
|
|
22
|
-
export interface
|
|
22
|
+
export interface LoginBySamlRequestDto {
|
|
23
23
|
/**
|
|
24
24
|
* code for grant type authorization code
|
|
25
25
|
* @type {string}
|
|
26
|
-
* @memberof
|
|
26
|
+
* @memberof LoginBySamlRequestDto
|
|
27
27
|
*/
|
|
28
28
|
'code': string;
|
|
29
29
|
/**
|
|
30
30
|
* Tenant slug
|
|
31
31
|
* @type {string}
|
|
32
|
-
* @memberof
|
|
32
|
+
* @memberof LoginBySamlRequestDto
|
|
33
33
|
*/
|
|
34
34
|
'tenantSlug': string;
|
|
35
35
|
}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@emilgroup/auth-sdk-node",
|
|
3
|
-
"version": "1.
|
|
3
|
+
"version": "1.9.1-beta.2",
|
|
4
4
|
"description": "OpenAPI client for @emilgroup/auth-sdk-node",
|
|
5
5
|
"author": "OpenAPI-Generator Contributors",
|
|
6
6
|
"keywords": [
|
|
@@ -23,7 +23,7 @@
|
|
|
23
23
|
"url": "^0.11.0"
|
|
24
24
|
},
|
|
25
25
|
"devDependencies": {
|
|
26
|
-
|
|
26
|
+
"@types/node": "^12.11.5",
|
|
27
27
|
"typescript": "^4.0"
|
|
28
28
|
}
|
|
29
29
|
}
|
/package/dist/models/{get-samllogin-link-request-dto.js → get-saml-login-link-request-dto.js}
RENAMED
|
File without changes
|
|
File without changes
|