@workos-inc/widgets 1.9.1 → 1.10.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (58) hide show
  1. package/CHANGELOG.md +8 -0
  2. package/dist/cjs/admin-portal-audit-log-streaming.client.cjs +167 -0
  3. package/dist/cjs/admin-portal-audit-log-streaming.client.cjs.map +1 -0
  4. package/dist/cjs/admin-portal-audit-log-streaming.client.d.cts +26 -0
  5. package/dist/cjs/api/api-provider.cjs.map +1 -1
  6. package/dist/cjs/api/api-provider.d.cts +1 -1
  7. package/dist/cjs/api/endpoint.cjs.map +1 -1
  8. package/dist/cjs/api/endpoint.d.cts +35 -32
  9. package/dist/cjs/experimental/api/fetch.cjs.map +1 -1
  10. package/dist/cjs/experimental/api/fetch.d.cts +35 -32
  11. package/dist/cjs/experimental/api/react-query.cjs.map +1 -1
  12. package/dist/cjs/experimental/api/react-query.d.cts +35 -32
  13. package/dist/cjs/experimental/api/swr.cjs.map +1 -1
  14. package/dist/cjs/experimental/api/swr.d.cts +35 -32
  15. package/dist/cjs/index.cjs +11 -0
  16. package/dist/cjs/index.cjs.map +1 -1
  17. package/dist/cjs/index.d.cts +2 -0
  18. package/dist/cjs/lib/admin-portal-audit-log-streaming.cjs +321 -0
  19. package/dist/cjs/lib/admin-portal-audit-log-streaming.cjs.map +1 -0
  20. package/dist/cjs/lib/admin-portal-audit-log-streaming.d.cts +54 -0
  21. package/dist/cjs/lib/api/user.d.cts +6 -6
  22. package/dist/cjs/lib/api-keys/api-keys-table.cjs +2 -2
  23. package/dist/cjs/lib/api-keys/api-keys-table.cjs.map +1 -1
  24. package/dist/cjs/lib/audit-log-stream-icons.cjs +63 -0
  25. package/dist/cjs/lib/audit-log-stream-icons.cjs.map +1 -0
  26. package/dist/cjs/lib/audit-log-stream-icons.d.cts +5 -0
  27. package/dist/cjs/lib/identity-providers.d.cts +2 -2
  28. package/dist/cjs/lib/use-permissions.cjs.map +1 -1
  29. package/dist/cjs/lib/use-permissions.d.cts +1 -1
  30. package/dist/esm/admin-portal-audit-log-streaming.client.d.ts +26 -0
  31. package/dist/esm/admin-portal-audit-log-streaming.client.js +153 -0
  32. package/dist/esm/admin-portal-audit-log-streaming.client.js.map +1 -0
  33. package/dist/esm/api/api-provider.d.ts +1 -1
  34. package/dist/esm/api/api-provider.js.map +1 -1
  35. package/dist/esm/api/endpoint.d.ts +35 -32
  36. package/dist/esm/api/endpoint.js.map +1 -1
  37. package/dist/esm/experimental/api/fetch.d.ts +35 -32
  38. package/dist/esm/experimental/api/fetch.js.map +1 -1
  39. package/dist/esm/experimental/api/react-query.d.ts +35 -32
  40. package/dist/esm/experimental/api/react-query.js.map +1 -1
  41. package/dist/esm/experimental/api/swr.d.ts +35 -32
  42. package/dist/esm/experimental/api/swr.js.map +1 -1
  43. package/dist/esm/index.d.ts +2 -0
  44. package/dist/esm/index.js +12 -0
  45. package/dist/esm/index.js.map +1 -1
  46. package/dist/esm/lib/admin-portal-audit-log-streaming.d.ts +54 -0
  47. package/dist/esm/lib/admin-portal-audit-log-streaming.js +290 -0
  48. package/dist/esm/lib/admin-portal-audit-log-streaming.js.map +1 -0
  49. package/dist/esm/lib/api/user.d.ts +6 -6
  50. package/dist/esm/lib/api-keys/api-keys-table.js +2 -2
  51. package/dist/esm/lib/api-keys/api-keys-table.js.map +1 -1
  52. package/dist/esm/lib/audit-log-stream-icons.d.ts +5 -0
  53. package/dist/esm/lib/audit-log-stream-icons.js +39 -0
  54. package/dist/esm/lib/audit-log-stream-icons.js.map +1 -0
  55. package/dist/esm/lib/identity-providers.d.ts +2 -2
  56. package/dist/esm/lib/use-permissions.d.ts +1 -1
  57. package/dist/esm/lib/use-permissions.js.map +1 -1
  58. package/package.json +1 -1
@@ -1,7 +1,7 @@
1
- declare const IDENTITY_PROVIDER_DICT: Map<"asana" | "box" | "dropbox" | "github" | "gitlab" | "google" | "google-calendar" | "google-drive" | "hubspot" | "intercom" | "linear" | "microsoft" | "notion" | "salesforce" | "slack" | "stripe" | "xero" | "zendesk" | "bamboohr" | "hibob" | "personio" | "rippling" | "workday" | "azure" | "access-people-hr" | "adp" | "apple" | "auth0" | "aws" | "bamboo-hr" | "bitbucket" | "breathe-hr" | "bubble" | "cas" | "cezanne-hr" | "classlink" | "clerk" | "cloudflare" | "cyberark" | "datadog" | "duo" | "firebase" | "fourth" | "generic-saml" | "generic-oidc" | "godaddy" | "google-analytics" | "google-mail" | "google-cloud" | "intuit" | "jumpcloud" | "keycloak" | "lastpass" | "linkedin" | "login-gov" | "miniorange" | "net-iq" | "next-auth" | "okta" | "onelogin" | "oracle" | "ping-identity" | "react-native-expo" | "segment" | "shibboleth" | "simple-saml-php" | "splunk" | "supabase" | "vercel" | "vmware" | "workos" | "test-idp" | "discord" | "clever", "GoDaddy" | "Datadog" | "Splunk" | "Access People HR" | "ADP" | "Apple" | "Asana" | "Auth0" | "Azure" | "AWS" | "BambooHR" | "Bitbucket" | "Box" | "BreatheHR" | "Bubble" | "CAS" | "Cezanne HR" | "Classlink" | "Clerk" | "Cloudflare" | "CyberArk" | "Dropbox" | "Duo" | "Firebase" | "Fourth" | "Generic SAML" | "Generic OIDC" | "GitHub" | "GitLab" | "Google" | "Google Analytics" | "Google Calendar" | "Google Drive" | "Google Mail" | "Google Cloud" | "HiBob" | "Hubspot" | "Intercom" | "Intuit" | "JumpCloud" | "Keycloak" | "LastPass" | "Linear" | "LinkedIn" | "Login.gov" | "Microsoft" | "Miniorange" | "NetIQ" | "NextAuth" | "Notion" | "Okta" | "OneLogin" | "Oracle" | "Personio" | "Ping Identity" | "React Native Expo" | "Rippling" | "Salesforce" | "Segment" | "Shibboleth" | "Simple SAML PHP" | "Slack" | "Stripe" | "Supabase" | "Vercel" | "VMware" | "Workday" | "WorkOS" | "Xero" | "Zendesk" | "Test IDP" | "Discord" | "Clever">;
1
+ declare const IDENTITY_PROVIDER_DICT: Map<"bamboohr" | "hibob" | "personio" | "rippling" | "workday" | "azure" | "linear" | "access-people-hr" | "adp" | "apple" | "asana" | "auth0" | "aws" | "bamboo-hr" | "bitbucket" | "box" | "breathe-hr" | "bubble" | "cas" | "cezanne-hr" | "classlink" | "clerk" | "cloudflare" | "cyberark" | "datadog" | "dropbox" | "duo" | "firebase" | "fourth" | "generic-saml" | "generic-oidc" | "github" | "gitlab" | "godaddy" | "google" | "google-analytics" | "google-calendar" | "google-drive" | "google-mail" | "google-cloud" | "hubspot" | "intercom" | "intuit" | "jumpcloud" | "keycloak" | "lastpass" | "linkedin" | "login-gov" | "microsoft" | "miniorange" | "net-iq" | "next-auth" | "notion" | "okta" | "onelogin" | "oracle" | "ping-identity" | "react-native-expo" | "salesforce" | "segment" | "shibboleth" | "simple-saml-php" | "slack" | "splunk" | "stripe" | "supabase" | "vercel" | "vmware" | "workos" | "xero" | "zendesk" | "test-idp" | "discord" | "clever", "Datadog" | "Splunk" | "GoDaddy" | "Access People HR" | "ADP" | "Apple" | "Asana" | "Auth0" | "Azure" | "AWS" | "BambooHR" | "Bitbucket" | "Box" | "BreatheHR" | "Bubble" | "CAS" | "Cezanne HR" | "Classlink" | "Clerk" | "Cloudflare" | "CyberArk" | "Dropbox" | "Duo" | "Firebase" | "Fourth" | "Generic SAML" | "Generic OIDC" | "GitHub" | "GitLab" | "Google" | "Google Analytics" | "Google Calendar" | "Google Drive" | "Google Mail" | "Google Cloud" | "HiBob" | "Hubspot" | "Intercom" | "Intuit" | "JumpCloud" | "Keycloak" | "LastPass" | "Linear" | "LinkedIn" | "Login.gov" | "Microsoft" | "Miniorange" | "NetIQ" | "NextAuth" | "Notion" | "Okta" | "OneLogin" | "Oracle" | "Personio" | "Ping Identity" | "React Native Expo" | "Rippling" | "Salesforce" | "Segment" | "Shibboleth" | "Simple SAML PHP" | "Slack" | "Stripe" | "Supabase" | "Vercel" | "VMware" | "Workday" | "WorkOS" | "Xero" | "Zendesk" | "Test IDP" | "Discord" | "Clever">;
2
2
  type MapKey<T extends Map<unknown, unknown>> = T extends Map<infer K, unknown> ? K : never;
3
3
  type IdentityProvider = MapKey<typeof IDENTITY_PROVIDER_DICT>;
4
- declare function getIdentityProviderName(provider: IdentityProvider): "GoDaddy" | "Datadog" | "Splunk" | "Access People HR" | "ADP" | "Apple" | "Asana" | "Auth0" | "Azure" | "AWS" | "BambooHR" | "Bitbucket" | "Box" | "BreatheHR" | "Bubble" | "CAS" | "Cezanne HR" | "Classlink" | "Clerk" | "Cloudflare" | "CyberArk" | "Dropbox" | "Duo" | "Firebase" | "Fourth" | "Generic SAML" | "Generic OIDC" | "GitHub" | "GitLab" | "Google" | "Google Analytics" | "Google Calendar" | "Google Drive" | "Google Mail" | "Google Cloud" | "HiBob" | "Hubspot" | "Intercom" | "Intuit" | "JumpCloud" | "Keycloak" | "LastPass" | "Linear" | "LinkedIn" | "Login.gov" | "Microsoft" | "Miniorange" | "NetIQ" | "NextAuth" | "Notion" | "Okta" | "OneLogin" | "Oracle" | "Personio" | "Ping Identity" | "React Native Expo" | "Rippling" | "Salesforce" | "Segment" | "Shibboleth" | "Simple SAML PHP" | "Slack" | "Stripe" | "Supabase" | "Vercel" | "VMware" | "Workday" | "WorkOS" | "Xero" | "Zendesk" | "Test IDP" | "Discord" | "Clever" | undefined;
4
+ declare function getIdentityProviderName(provider: IdentityProvider): "Datadog" | "Splunk" | "GoDaddy" | "Access People HR" | "ADP" | "Apple" | "Asana" | "Auth0" | "Azure" | "AWS" | "BambooHR" | "Bitbucket" | "Box" | "BreatheHR" | "Bubble" | "CAS" | "Cezanne HR" | "Classlink" | "Clerk" | "Cloudflare" | "CyberArk" | "Dropbox" | "Duo" | "Firebase" | "Fourth" | "Generic SAML" | "Generic OIDC" | "GitHub" | "GitLab" | "Google" | "Google Analytics" | "Google Calendar" | "Google Drive" | "Google Mail" | "Google Cloud" | "HiBob" | "Hubspot" | "Intercom" | "Intuit" | "JumpCloud" | "Keycloak" | "LastPass" | "Linear" | "LinkedIn" | "Login.gov" | "Microsoft" | "Miniorange" | "NetIQ" | "NextAuth" | "Notion" | "Okta" | "OneLogin" | "Oracle" | "Personio" | "Ping Identity" | "React Native Expo" | "Rippling" | "Salesforce" | "Segment" | "Shibboleth" | "Simple SAML PHP" | "Slack" | "Stripe" | "Supabase" | "Vercel" | "VMware" | "Workday" | "WorkOS" | "Xero" | "Zendesk" | "Test IDP" | "Discord" | "Clever" | undefined;
5
5
  declare function getDirectoryTypeIcon(directoryType: string): IdentityProvider | null;
6
6
  declare function getDirectoryTypeName(directoryType: string): string;
7
7
  declare function isIdentityProvider(provider: unknown): boolean;
@@ -1,6 +1,6 @@
1
1
  import * as _tanstack_react_query from '@tanstack/react-query';
2
2
 
3
- type WidgetScope = "widgets:users-table:manage" | "widgets:sso:manage" | "widgets:domain-verification:manage" | "widgets:dsync:manage" | "widgets:api-keys:manage";
3
+ type WidgetScope = "widgets:users-table:manage" | "widgets:sso:manage" | "widgets:domain-verification:manage" | "widgets:dsync:manage" | "widgets:api-keys:manage" | "widgets:audit-log-streaming:manage";
4
4
  declare function usePermissions(scope: WidgetScope): _tanstack_react_query.UseQueryResult<boolean, Error>;
5
5
 
6
6
  export { usePermissions };
@@ -1 +1 @@
1
- {"version":3,"sources":["../../../src/lib/use-permissions.ts"],"sourcesContent":["import { skipToken, useQuery } from \"@tanstack/react-query\";\nimport { getClaims } from \"../api/utils.js\";\nimport { IncorrectPermissionsError, NoAuthTokenError } from \"./errors.js\";\nimport { useApi } from \"../api/api-provider.js\";\n\n// TODO find a way to reuse the same type in the @workos-inc/node package\ntype WidgetScope =\n | \"widgets:users-table:manage\"\n | \"widgets:sso:manage\"\n | \"widgets:domain-verification:manage\"\n | \"widgets:dsync:manage\"\n | \"widgets:api-keys:manage\";\n\nexport function usePermissions(scope: WidgetScope) {\n const { authToken } = useApi();\n\n return useQuery({\n queryKey: [\"permission\", scope, authToken],\n queryFn: authToken\n ? async () => {\n const { permissions } = getClaims(authToken);\n\n // When the permissions is not present in the token\n if (!permissions || !Array.isArray(permissions)) {\n throw new NoAuthTokenError();\n }\n\n // When the scope is not present in the permissions\n if (!permissions.includes(scope)) {\n throw new IncorrectPermissionsError();\n }\n\n return true;\n }\n : skipToken,\n });\n}\n"],"mappings":"AAAA,SAAS,WAAW,gBAAgB;AACpC,SAAS,iBAAiB;AAC1B,SAAS,2BAA2B,wBAAwB;AAC5D,SAAS,cAAc;AAUhB,SAAS,eAAe,OAAoB;AACjD,QAAM,EAAE,UAAU,IAAI,OAAO;AAE7B,SAAO,SAAS;AAAA,IACd,UAAU,CAAC,cAAc,OAAO,SAAS;AAAA,IACzC,SAAS,YACL,YAAY;AACV,YAAM,EAAE,YAAY,IAAI,UAAU,SAAS;AAG3C,UAAI,CAAC,eAAe,CAAC,MAAM,QAAQ,WAAW,GAAG;AAC/C,cAAM,IAAI,iBAAiB;AAAA,MAC7B;AAGA,UAAI,CAAC,YAAY,SAAS,KAAK,GAAG;AAChC,cAAM,IAAI,0BAA0B;AAAA,MACtC;AAEA,aAAO;AAAA,IACT,IACA;AAAA,EACN,CAAC;AACH;","names":[]}
1
+ {"version":3,"sources":["../../../src/lib/use-permissions.ts"],"sourcesContent":["import { skipToken, useQuery } from \"@tanstack/react-query\";\nimport { getClaims } from \"../api/utils.js\";\nimport { IncorrectPermissionsError, NoAuthTokenError } from \"./errors.js\";\nimport { useApi } from \"../api/api-provider.js\";\n\n// TODO find a way to reuse the same type in the @workos-inc/node package\ntype WidgetScope =\n | \"widgets:users-table:manage\"\n | \"widgets:sso:manage\"\n | \"widgets:domain-verification:manage\"\n | \"widgets:dsync:manage\"\n | \"widgets:api-keys:manage\"\n | \"widgets:audit-log-streaming:manage\";\n\nexport function usePermissions(scope: WidgetScope) {\n const { authToken } = useApi();\n\n return useQuery({\n queryKey: [\"permission\", scope, authToken],\n queryFn: authToken\n ? async () => {\n const { permissions } = getClaims(authToken);\n\n // When the permissions is not present in the token\n if (!permissions || !Array.isArray(permissions)) {\n throw new NoAuthTokenError();\n }\n\n // When the scope is not present in the permissions\n if (!permissions.includes(scope)) {\n throw new IncorrectPermissionsError();\n }\n\n return true;\n }\n : skipToken,\n });\n}\n"],"mappings":"AAAA,SAAS,WAAW,gBAAgB;AACpC,SAAS,iBAAiB;AAC1B,SAAS,2BAA2B,wBAAwB;AAC5D,SAAS,cAAc;AAWhB,SAAS,eAAe,OAAoB;AACjD,QAAM,EAAE,UAAU,IAAI,OAAO;AAE7B,SAAO,SAAS;AAAA,IACd,UAAU,CAAC,cAAc,OAAO,SAAS;AAAA,IACzC,SAAS,YACL,YAAY;AACV,YAAM,EAAE,YAAY,IAAI,UAAU,SAAS;AAG3C,UAAI,CAAC,eAAe,CAAC,MAAM,QAAQ,WAAW,GAAG;AAC/C,cAAM,IAAI,iBAAiB;AAAA,MAC7B;AAGA,UAAI,CAAC,YAAY,SAAS,KAAK,GAAG;AAChC,cAAM,IAAI,0BAA0B;AAAA,MACtC;AAEA,aAAO;AAAA,IACT,IACA;AAAA,EACN,CAAC;AACH;","names":[]}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@workos-inc/widgets",
3
- "version": "1.9.1",
3
+ "version": "1.10.1",
4
4
  "license": "MIT",
5
5
  "type": "module",
6
6
  "exports": {