vrchat 1.10.0 → 1.11.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/api.ts +130 -4
- package/base.ts +1 -1
- package/common.ts +1 -1
- package/configuration.ts +1 -1
- package/dist/api.d.ts +91 -1
- package/dist/api.js +77 -2
- package/dist/base.d.ts +1 -1
- package/dist/base.js +1 -1
- package/dist/common.d.ts +1 -1
- package/dist/common.js +1 -1
- package/dist/configuration.d.ts +1 -1
- package/dist/configuration.js +1 -1
- package/dist/index.d.ts +1 -1
- package/dist/index.js +1 -1
- package/index.ts +1 -1
- package/package.json +1 -1
package/api.ts
CHANGED
|
@@ -3,7 +3,7 @@
|
|
|
3
3
|
/**
|
|
4
4
|
* VRChat API Documentation
|
|
5
5
|
*
|
|
6
|
-
* The version of the OpenAPI document: 1.
|
|
6
|
+
* The version of the OpenAPI document: 1.11.0
|
|
7
7
|
* Contact: me@ariesclark.com
|
|
8
8
|
*
|
|
9
9
|
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
@@ -658,6 +658,31 @@ export interface APIHealth {
|
|
|
658
658
|
*/
|
|
659
659
|
'buildVersionTag': string;
|
|
660
660
|
}
|
|
661
|
+
/**
|
|
662
|
+
*
|
|
663
|
+
* @export
|
|
664
|
+
* @interface AccountDeletionLog
|
|
665
|
+
*/
|
|
666
|
+
export interface AccountDeletionLog {
|
|
667
|
+
/**
|
|
668
|
+
* Typically \"Deletion requested\" or \"Deletion canceled\". Other messages like \"Deletion completed\" may exist, but are these are not possible to see as a regular user.
|
|
669
|
+
* @type {string}
|
|
670
|
+
* @memberof AccountDeletionLog
|
|
671
|
+
*/
|
|
672
|
+
'message'?: string;
|
|
673
|
+
/**
|
|
674
|
+
* When the deletion is scheduled to happen, standard is 14 days after the request.
|
|
675
|
+
* @type {string}
|
|
676
|
+
* @memberof AccountDeletionLog
|
|
677
|
+
*/
|
|
678
|
+
'deletionScheduled'?: string | null;
|
|
679
|
+
/**
|
|
680
|
+
* Date and time of the deletion request.
|
|
681
|
+
* @type {string}
|
|
682
|
+
* @memberof AccountDeletionLog
|
|
683
|
+
*/
|
|
684
|
+
'dateTime'?: string;
|
|
685
|
+
}
|
|
661
686
|
/**
|
|
662
687
|
*
|
|
663
688
|
* @export
|
|
@@ -1262,7 +1287,13 @@ export interface CurrentUser {
|
|
|
1262
1287
|
*/
|
|
1263
1288
|
'accountDeletionDate'?: string | null;
|
|
1264
1289
|
/**
|
|
1265
|
-
*
|
|
1290
|
+
*
|
|
1291
|
+
* @type {Array<AccountDeletionLog>}
|
|
1292
|
+
* @memberof CurrentUser
|
|
1293
|
+
*/
|
|
1294
|
+
'accountDeletionLog'?: Array<AccountDeletionLog>;
|
|
1295
|
+
/**
|
|
1296
|
+
*
|
|
1266
1297
|
* @type {Array<string>}
|
|
1267
1298
|
* @memberof CurrentUser
|
|
1268
1299
|
*/
|
|
@@ -1280,7 +1311,7 @@ export interface CurrentUser {
|
|
|
1280
1311
|
*/
|
|
1281
1312
|
'bio': string;
|
|
1282
1313
|
/**
|
|
1283
|
-
*
|
|
1314
|
+
*
|
|
1284
1315
|
* @type {Array<string>}
|
|
1285
1316
|
* @memberof CurrentUser
|
|
1286
1317
|
*/
|
|
@@ -4487,6 +4518,19 @@ export interface TwoFactorAuthCode {
|
|
|
4487
4518
|
*/
|
|
4488
4519
|
'code': string;
|
|
4489
4520
|
}
|
|
4521
|
+
/**
|
|
4522
|
+
*
|
|
4523
|
+
* @export
|
|
4524
|
+
* @interface TwoFactorEmailCode
|
|
4525
|
+
*/
|
|
4526
|
+
export interface TwoFactorEmailCode {
|
|
4527
|
+
/**
|
|
4528
|
+
*
|
|
4529
|
+
* @type {string}
|
|
4530
|
+
* @memberof TwoFactorEmailCode
|
|
4531
|
+
*/
|
|
4532
|
+
'code': string;
|
|
4533
|
+
}
|
|
4490
4534
|
/**
|
|
4491
4535
|
*
|
|
4492
4536
|
* @export
|
|
@@ -5301,6 +5345,19 @@ export interface UserSubscription {
|
|
|
5301
5345
|
*/
|
|
5302
5346
|
'isGift': boolean;
|
|
5303
5347
|
}
|
|
5348
|
+
/**
|
|
5349
|
+
*
|
|
5350
|
+
* @export
|
|
5351
|
+
* @interface Verify2FAEmailCodeResult
|
|
5352
|
+
*/
|
|
5353
|
+
export interface Verify2FAEmailCodeResult {
|
|
5354
|
+
/**
|
|
5355
|
+
*
|
|
5356
|
+
* @type {boolean}
|
|
5357
|
+
* @memberof Verify2FAEmailCodeResult
|
|
5358
|
+
*/
|
|
5359
|
+
'verified': boolean;
|
|
5360
|
+
}
|
|
5304
5361
|
/**
|
|
5305
5362
|
*
|
|
5306
5363
|
* @export
|
|
@@ -5609,7 +5666,7 @@ export const AuthenticationApiAxiosParamCreator = function (configuration?: Conf
|
|
|
5609
5666
|
deleteUser: async (userId: string, options: AxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
5610
5667
|
// verify required parameter 'userId' is not null or undefined
|
|
5611
5668
|
assertParamExists('deleteUser', 'userId', userId)
|
|
5612
|
-
const localVarPath = `/
|
|
5669
|
+
const localVarPath = `/users/{userId}/delete`
|
|
5613
5670
|
.replace(`{${"userId"}}`, encodeURIComponent(String(userId)));
|
|
5614
5671
|
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
5615
5672
|
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
@@ -5743,6 +5800,42 @@ export const AuthenticationApiAxiosParamCreator = function (configuration?: Conf
|
|
|
5743
5800
|
options: localVarRequestOptions,
|
|
5744
5801
|
};
|
|
5745
5802
|
},
|
|
5803
|
+
/**
|
|
5804
|
+
* Finishes the login sequence with an 2FA email code.
|
|
5805
|
+
* @summary Verify 2FA email code
|
|
5806
|
+
* @param {TwoFactorEmailCode} [twoFactorEmailCode]
|
|
5807
|
+
* @param {*} [options] Override http request option.
|
|
5808
|
+
* @throws {RequiredError}
|
|
5809
|
+
*/
|
|
5810
|
+
verify2FAEmailCode: async (twoFactorEmailCode?: TwoFactorEmailCode, options: AxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
5811
|
+
const localVarPath = `/auth/twofactorauth/emailotp/verify`;
|
|
5812
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
5813
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
5814
|
+
let baseOptions;
|
|
5815
|
+
if (configuration) {
|
|
5816
|
+
baseOptions = configuration.baseOptions;
|
|
5817
|
+
}
|
|
5818
|
+
|
|
5819
|
+
const localVarRequestOptions = { method: 'POST', ...baseOptions, ...options};
|
|
5820
|
+
const localVarHeaderParameter = {} as any;
|
|
5821
|
+
const localVarQueryParameter = {} as any;
|
|
5822
|
+
|
|
5823
|
+
// authentication authCookie required
|
|
5824
|
+
|
|
5825
|
+
|
|
5826
|
+
|
|
5827
|
+
localVarHeaderParameter['Content-Type'] = 'application/json';
|
|
5828
|
+
|
|
5829
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
5830
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
5831
|
+
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
|
|
5832
|
+
localVarRequestOptions.data = serializeDataIfNeeded(twoFactorEmailCode, localVarRequestOptions, configuration)
|
|
5833
|
+
|
|
5834
|
+
return {
|
|
5835
|
+
url: toPathString(localVarUrlObj),
|
|
5836
|
+
options: localVarRequestOptions,
|
|
5837
|
+
};
|
|
5838
|
+
},
|
|
5746
5839
|
/**
|
|
5747
5840
|
* Verify whether the currently provided Auth Token is valid.
|
|
5748
5841
|
* @summary Verify Auth Token
|
|
@@ -5877,6 +5970,17 @@ export const AuthenticationApiFp = function(configuration?: Configuration) {
|
|
|
5877
5970
|
const localVarAxiosArgs = await localVarAxiosParamCreator.verify2FA(twoFactorAuthCode, options);
|
|
5878
5971
|
return createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration);
|
|
5879
5972
|
},
|
|
5973
|
+
/**
|
|
5974
|
+
* Finishes the login sequence with an 2FA email code.
|
|
5975
|
+
* @summary Verify 2FA email code
|
|
5976
|
+
* @param {TwoFactorEmailCode} [twoFactorEmailCode]
|
|
5977
|
+
* @param {*} [options] Override http request option.
|
|
5978
|
+
* @throws {RequiredError}
|
|
5979
|
+
*/
|
|
5980
|
+
async verify2FAEmailCode(twoFactorEmailCode?: TwoFactorEmailCode, options?: AxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Verify2FAEmailCodeResult>> {
|
|
5981
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.verify2FAEmailCode(twoFactorEmailCode, options);
|
|
5982
|
+
return createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration);
|
|
5983
|
+
},
|
|
5880
5984
|
/**
|
|
5881
5985
|
* Verify whether the currently provided Auth Token is valid.
|
|
5882
5986
|
* @summary Verify Auth Token
|
|
@@ -5959,6 +6063,16 @@ export const AuthenticationApiFactory = function (configuration?: Configuration,
|
|
|
5959
6063
|
verify2FA(twoFactorAuthCode?: TwoFactorAuthCode, options?: any): AxiosPromise<Verify2FAResult> {
|
|
5960
6064
|
return localVarFp.verify2FA(twoFactorAuthCode, options).then((request) => request(axios, basePath));
|
|
5961
6065
|
},
|
|
6066
|
+
/**
|
|
6067
|
+
* Finishes the login sequence with an 2FA email code.
|
|
6068
|
+
* @summary Verify 2FA email code
|
|
6069
|
+
* @param {TwoFactorEmailCode} [twoFactorEmailCode]
|
|
6070
|
+
* @param {*} [options] Override http request option.
|
|
6071
|
+
* @throws {RequiredError}
|
|
6072
|
+
*/
|
|
6073
|
+
verify2FAEmailCode(twoFactorEmailCode?: TwoFactorEmailCode, options?: any): AxiosPromise<Verify2FAEmailCodeResult> {
|
|
6074
|
+
return localVarFp.verify2FAEmailCode(twoFactorEmailCode, options).then((request) => request(axios, basePath));
|
|
6075
|
+
},
|
|
5962
6076
|
/**
|
|
5963
6077
|
* Verify whether the currently provided Auth Token is valid.
|
|
5964
6078
|
* @summary Verify Auth Token
|
|
@@ -6049,6 +6163,18 @@ export class AuthenticationApi extends BaseAPI {
|
|
|
6049
6163
|
return AuthenticationApiFp(this.configuration).verify2FA(twoFactorAuthCode, options).then((request) => request(this.axios, this.basePath));
|
|
6050
6164
|
}
|
|
6051
6165
|
|
|
6166
|
+
/**
|
|
6167
|
+
* Finishes the login sequence with an 2FA email code.
|
|
6168
|
+
* @summary Verify 2FA email code
|
|
6169
|
+
* @param {TwoFactorEmailCode} [twoFactorEmailCode]
|
|
6170
|
+
* @param {*} [options] Override http request option.
|
|
6171
|
+
* @throws {RequiredError}
|
|
6172
|
+
* @memberof AuthenticationApi
|
|
6173
|
+
*/
|
|
6174
|
+
public verify2FAEmailCode(twoFactorEmailCode?: TwoFactorEmailCode, options?: AxiosRequestConfig) {
|
|
6175
|
+
return AuthenticationApiFp(this.configuration).verify2FAEmailCode(twoFactorEmailCode, options).then((request) => request(this.axios, this.basePath));
|
|
6176
|
+
}
|
|
6177
|
+
|
|
6052
6178
|
/**
|
|
6053
6179
|
* Verify whether the currently provided Auth Token is valid.
|
|
6054
6180
|
* @summary Verify Auth Token
|
package/base.ts
CHANGED
package/common.ts
CHANGED
package/configuration.ts
CHANGED
package/dist/api.d.ts
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
/**
|
|
2
2
|
* VRChat API Documentation
|
|
3
3
|
*
|
|
4
|
-
* The version of the OpenAPI document: 1.
|
|
4
|
+
* The version of the OpenAPI document: 1.11.0
|
|
5
5
|
* Contact: me@ariesclark.com
|
|
6
6
|
*
|
|
7
7
|
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
@@ -648,6 +648,31 @@ export interface APIHealth {
|
|
|
648
648
|
*/
|
|
649
649
|
'buildVersionTag': string;
|
|
650
650
|
}
|
|
651
|
+
/**
|
|
652
|
+
*
|
|
653
|
+
* @export
|
|
654
|
+
* @interface AccountDeletionLog
|
|
655
|
+
*/
|
|
656
|
+
export interface AccountDeletionLog {
|
|
657
|
+
/**
|
|
658
|
+
* Typically \"Deletion requested\" or \"Deletion canceled\". Other messages like \"Deletion completed\" may exist, but are these are not possible to see as a regular user.
|
|
659
|
+
* @type {string}
|
|
660
|
+
* @memberof AccountDeletionLog
|
|
661
|
+
*/
|
|
662
|
+
'message'?: string;
|
|
663
|
+
/**
|
|
664
|
+
* When the deletion is scheduled to happen, standard is 14 days after the request.
|
|
665
|
+
* @type {string}
|
|
666
|
+
* @memberof AccountDeletionLog
|
|
667
|
+
*/
|
|
668
|
+
'deletionScheduled'?: string | null;
|
|
669
|
+
/**
|
|
670
|
+
* Date and time of the deletion request.
|
|
671
|
+
* @type {string}
|
|
672
|
+
* @memberof AccountDeletionLog
|
|
673
|
+
*/
|
|
674
|
+
'dateTime'?: string;
|
|
675
|
+
}
|
|
651
676
|
/**
|
|
652
677
|
*
|
|
653
678
|
* @export
|
|
@@ -1251,6 +1276,12 @@ export interface CurrentUser {
|
|
|
1251
1276
|
* @memberof CurrentUser
|
|
1252
1277
|
*/
|
|
1253
1278
|
'accountDeletionDate'?: string | null;
|
|
1279
|
+
/**
|
|
1280
|
+
*
|
|
1281
|
+
* @type {Array<AccountDeletionLog>}
|
|
1282
|
+
* @memberof CurrentUser
|
|
1283
|
+
*/
|
|
1284
|
+
'accountDeletionLog'?: Array<AccountDeletionLog>;
|
|
1254
1285
|
/**
|
|
1255
1286
|
*
|
|
1256
1287
|
* @type {Array<string>}
|
|
@@ -4379,6 +4410,19 @@ export interface TwoFactorAuthCode {
|
|
|
4379
4410
|
*/
|
|
4380
4411
|
'code': string;
|
|
4381
4412
|
}
|
|
4413
|
+
/**
|
|
4414
|
+
*
|
|
4415
|
+
* @export
|
|
4416
|
+
* @interface TwoFactorEmailCode
|
|
4417
|
+
*/
|
|
4418
|
+
export interface TwoFactorEmailCode {
|
|
4419
|
+
/**
|
|
4420
|
+
*
|
|
4421
|
+
* @type {string}
|
|
4422
|
+
* @memberof TwoFactorEmailCode
|
|
4423
|
+
*/
|
|
4424
|
+
'code': string;
|
|
4425
|
+
}
|
|
4382
4426
|
/**
|
|
4383
4427
|
*
|
|
4384
4428
|
* @export
|
|
@@ -5185,6 +5229,19 @@ export interface UserSubscription {
|
|
|
5185
5229
|
*/
|
|
5186
5230
|
'isGift': boolean;
|
|
5187
5231
|
}
|
|
5232
|
+
/**
|
|
5233
|
+
*
|
|
5234
|
+
* @export
|
|
5235
|
+
* @interface Verify2FAEmailCodeResult
|
|
5236
|
+
*/
|
|
5237
|
+
export interface Verify2FAEmailCodeResult {
|
|
5238
|
+
/**
|
|
5239
|
+
*
|
|
5240
|
+
* @type {boolean}
|
|
5241
|
+
* @memberof Verify2FAEmailCodeResult
|
|
5242
|
+
*/
|
|
5243
|
+
'verified': boolean;
|
|
5244
|
+
}
|
|
5188
5245
|
/**
|
|
5189
5246
|
*
|
|
5190
5247
|
* @export
|
|
@@ -5470,6 +5527,14 @@ export declare const AuthenticationApiAxiosParamCreator: (configuration?: Config
|
|
|
5470
5527
|
* @throws {RequiredError}
|
|
5471
5528
|
*/
|
|
5472
5529
|
verify2FA: (twoFactorAuthCode?: TwoFactorAuthCode, options?: AxiosRequestConfig) => Promise<RequestArgs>;
|
|
5530
|
+
/**
|
|
5531
|
+
* Finishes the login sequence with an 2FA email code.
|
|
5532
|
+
* @summary Verify 2FA email code
|
|
5533
|
+
* @param {TwoFactorEmailCode} [twoFactorEmailCode]
|
|
5534
|
+
* @param {*} [options] Override http request option.
|
|
5535
|
+
* @throws {RequiredError}
|
|
5536
|
+
*/
|
|
5537
|
+
verify2FAEmailCode: (twoFactorEmailCode?: TwoFactorEmailCode, options?: AxiosRequestConfig) => Promise<RequestArgs>;
|
|
5473
5538
|
/**
|
|
5474
5539
|
* Verify whether the currently provided Auth Token is valid.
|
|
5475
5540
|
* @summary Verify Auth Token
|
|
@@ -5532,6 +5597,14 @@ export declare const AuthenticationApiFp: (configuration?: Configuration) => {
|
|
|
5532
5597
|
* @throws {RequiredError}
|
|
5533
5598
|
*/
|
|
5534
5599
|
verify2FA(twoFactorAuthCode?: TwoFactorAuthCode, options?: AxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Verify2FAResult>>;
|
|
5600
|
+
/**
|
|
5601
|
+
* Finishes the login sequence with an 2FA email code.
|
|
5602
|
+
* @summary Verify 2FA email code
|
|
5603
|
+
* @param {TwoFactorEmailCode} [twoFactorEmailCode]
|
|
5604
|
+
* @param {*} [options] Override http request option.
|
|
5605
|
+
* @throws {RequiredError}
|
|
5606
|
+
*/
|
|
5607
|
+
verify2FAEmailCode(twoFactorEmailCode?: TwoFactorEmailCode, options?: AxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Verify2FAEmailCodeResult>>;
|
|
5535
5608
|
/**
|
|
5536
5609
|
* Verify whether the currently provided Auth Token is valid.
|
|
5537
5610
|
* @summary Verify Auth Token
|
|
@@ -5594,6 +5667,14 @@ export declare const AuthenticationApiFactory: (configuration?: Configuration, b
|
|
|
5594
5667
|
* @throws {RequiredError}
|
|
5595
5668
|
*/
|
|
5596
5669
|
verify2FA(twoFactorAuthCode?: TwoFactorAuthCode, options?: any): AxiosPromise<Verify2FAResult>;
|
|
5670
|
+
/**
|
|
5671
|
+
* Finishes the login sequence with an 2FA email code.
|
|
5672
|
+
* @summary Verify 2FA email code
|
|
5673
|
+
* @param {TwoFactorEmailCode} [twoFactorEmailCode]
|
|
5674
|
+
* @param {*} [options] Override http request option.
|
|
5675
|
+
* @throws {RequiredError}
|
|
5676
|
+
*/
|
|
5677
|
+
verify2FAEmailCode(twoFactorEmailCode?: TwoFactorEmailCode, options?: any): AxiosPromise<Verify2FAEmailCodeResult>;
|
|
5597
5678
|
/**
|
|
5598
5679
|
* Verify whether the currently provided Auth Token is valid.
|
|
5599
5680
|
* @summary Verify Auth Token
|
|
@@ -5663,6 +5744,15 @@ export declare class AuthenticationApi extends BaseAPI {
|
|
|
5663
5744
|
* @memberof AuthenticationApi
|
|
5664
5745
|
*/
|
|
5665
5746
|
verify2FA(twoFactorAuthCode?: TwoFactorAuthCode, options?: AxiosRequestConfig): Promise<import("axios").AxiosResponse<Verify2FAResult, any>>;
|
|
5747
|
+
/**
|
|
5748
|
+
* Finishes the login sequence with an 2FA email code.
|
|
5749
|
+
* @summary Verify 2FA email code
|
|
5750
|
+
* @param {TwoFactorEmailCode} [twoFactorEmailCode]
|
|
5751
|
+
* @param {*} [options] Override http request option.
|
|
5752
|
+
* @throws {RequiredError}
|
|
5753
|
+
* @memberof AuthenticationApi
|
|
5754
|
+
*/
|
|
5755
|
+
verify2FAEmailCode(twoFactorEmailCode?: TwoFactorEmailCode, options?: AxiosRequestConfig): Promise<import("axios").AxiosResponse<Verify2FAEmailCodeResult, any>>;
|
|
5666
5756
|
/**
|
|
5667
5757
|
* Verify whether the currently provided Auth Token is valid.
|
|
5668
5758
|
* @summary Verify Auth Token
|
package/dist/api.js
CHANGED
|
@@ -4,7 +4,7 @@
|
|
|
4
4
|
/**
|
|
5
5
|
* VRChat API Documentation
|
|
6
6
|
*
|
|
7
|
-
* The version of the OpenAPI document: 1.
|
|
7
|
+
* The version of the OpenAPI document: 1.11.0
|
|
8
8
|
* Contact: me@ariesclark.com
|
|
9
9
|
*
|
|
10
10
|
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
@@ -461,7 +461,7 @@ var AuthenticationApiAxiosParamCreator = function (configuration) {
|
|
|
461
461
|
return __generator(this, function (_a) {
|
|
462
462
|
// verify required parameter 'userId' is not null or undefined
|
|
463
463
|
(0, common_1.assertParamExists)('deleteUser', 'userId', userId);
|
|
464
|
-
localVarPath = "/
|
|
464
|
+
localVarPath = "/users/{userId}/delete"
|
|
465
465
|
.replace("{".concat("userId", "}"), encodeURIComponent(String(userId)));
|
|
466
466
|
localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
467
467
|
if (configuration) {
|
|
@@ -579,6 +579,39 @@ var AuthenticationApiAxiosParamCreator = function (configuration) {
|
|
|
579
579
|
});
|
|
580
580
|
});
|
|
581
581
|
},
|
|
582
|
+
/**
|
|
583
|
+
* Finishes the login sequence with an 2FA email code.
|
|
584
|
+
* @summary Verify 2FA email code
|
|
585
|
+
* @param {TwoFactorEmailCode} [twoFactorEmailCode]
|
|
586
|
+
* @param {*} [options] Override http request option.
|
|
587
|
+
* @throws {RequiredError}
|
|
588
|
+
*/
|
|
589
|
+
verify2FAEmailCode: function (twoFactorEmailCode, options) {
|
|
590
|
+
if (options === void 0) { options = {}; }
|
|
591
|
+
return __awaiter(_this, void 0, void 0, function () {
|
|
592
|
+
var localVarPath, localVarUrlObj, baseOptions, localVarRequestOptions, localVarHeaderParameter, localVarQueryParameter, headersFromBaseOptions;
|
|
593
|
+
return __generator(this, function (_a) {
|
|
594
|
+
localVarPath = "/auth/twofactorauth/emailotp/verify";
|
|
595
|
+
localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
596
|
+
if (configuration) {
|
|
597
|
+
baseOptions = configuration.baseOptions;
|
|
598
|
+
}
|
|
599
|
+
localVarRequestOptions = __assign(__assign({ method: 'POST' }, baseOptions), options);
|
|
600
|
+
localVarHeaderParameter = {};
|
|
601
|
+
localVarQueryParameter = {};
|
|
602
|
+
// authentication authCookie required
|
|
603
|
+
localVarHeaderParameter['Content-Type'] = 'application/json';
|
|
604
|
+
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
605
|
+
headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
606
|
+
localVarRequestOptions.headers = __assign(__assign(__assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
607
|
+
localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(twoFactorEmailCode, localVarRequestOptions, configuration);
|
|
608
|
+
return [2 /*return*/, {
|
|
609
|
+
url: (0, common_1.toPathString)(localVarUrlObj),
|
|
610
|
+
options: localVarRequestOptions,
|
|
611
|
+
}];
|
|
612
|
+
});
|
|
613
|
+
});
|
|
614
|
+
},
|
|
582
615
|
/**
|
|
583
616
|
* Verify whether the currently provided Auth Token is valid.
|
|
584
617
|
* @summary Verify Auth Token
|
|
@@ -753,6 +786,26 @@ var AuthenticationApiFp = function (configuration) {
|
|
|
753
786
|
});
|
|
754
787
|
});
|
|
755
788
|
},
|
|
789
|
+
/**
|
|
790
|
+
* Finishes the login sequence with an 2FA email code.
|
|
791
|
+
* @summary Verify 2FA email code
|
|
792
|
+
* @param {TwoFactorEmailCode} [twoFactorEmailCode]
|
|
793
|
+
* @param {*} [options] Override http request option.
|
|
794
|
+
* @throws {RequiredError}
|
|
795
|
+
*/
|
|
796
|
+
verify2FAEmailCode: function (twoFactorEmailCode, options) {
|
|
797
|
+
return __awaiter(this, void 0, void 0, function () {
|
|
798
|
+
var localVarAxiosArgs;
|
|
799
|
+
return __generator(this, function (_a) {
|
|
800
|
+
switch (_a.label) {
|
|
801
|
+
case 0: return [4 /*yield*/, localVarAxiosParamCreator.verify2FAEmailCode(twoFactorEmailCode, options)];
|
|
802
|
+
case 1:
|
|
803
|
+
localVarAxiosArgs = _a.sent();
|
|
804
|
+
return [2 /*return*/, (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)];
|
|
805
|
+
}
|
|
806
|
+
});
|
|
807
|
+
});
|
|
808
|
+
},
|
|
756
809
|
/**
|
|
757
810
|
* Verify whether the currently provided Auth Token is valid.
|
|
758
811
|
* @summary Verify Auth Token
|
|
@@ -853,6 +906,16 @@ var AuthenticationApiFactory = function (configuration, basePath, axios) {
|
|
|
853
906
|
verify2FA: function (twoFactorAuthCode, options) {
|
|
854
907
|
return localVarFp.verify2FA(twoFactorAuthCode, options).then(function (request) { return request(axios, basePath); });
|
|
855
908
|
},
|
|
909
|
+
/**
|
|
910
|
+
* Finishes the login sequence with an 2FA email code.
|
|
911
|
+
* @summary Verify 2FA email code
|
|
912
|
+
* @param {TwoFactorEmailCode} [twoFactorEmailCode]
|
|
913
|
+
* @param {*} [options] Override http request option.
|
|
914
|
+
* @throws {RequiredError}
|
|
915
|
+
*/
|
|
916
|
+
verify2FAEmailCode: function (twoFactorEmailCode, options) {
|
|
917
|
+
return localVarFp.verify2FAEmailCode(twoFactorEmailCode, options).then(function (request) { return request(axios, basePath); });
|
|
918
|
+
},
|
|
856
919
|
/**
|
|
857
920
|
* Verify whether the currently provided Auth Token is valid.
|
|
858
921
|
* @summary Verify Auth Token
|
|
@@ -947,6 +1010,18 @@ var AuthenticationApi = /** @class */ (function (_super) {
|
|
|
947
1010
|
var _this = this;
|
|
948
1011
|
return (0, exports.AuthenticationApiFp)(this.configuration).verify2FA(twoFactorAuthCode, options).then(function (request) { return request(_this.axios, _this.basePath); });
|
|
949
1012
|
};
|
|
1013
|
+
/**
|
|
1014
|
+
* Finishes the login sequence with an 2FA email code.
|
|
1015
|
+
* @summary Verify 2FA email code
|
|
1016
|
+
* @param {TwoFactorEmailCode} [twoFactorEmailCode]
|
|
1017
|
+
* @param {*} [options] Override http request option.
|
|
1018
|
+
* @throws {RequiredError}
|
|
1019
|
+
* @memberof AuthenticationApi
|
|
1020
|
+
*/
|
|
1021
|
+
AuthenticationApi.prototype.verify2FAEmailCode = function (twoFactorEmailCode, options) {
|
|
1022
|
+
var _this = this;
|
|
1023
|
+
return (0, exports.AuthenticationApiFp)(this.configuration).verify2FAEmailCode(twoFactorEmailCode, options).then(function (request) { return request(_this.axios, _this.basePath); });
|
|
1024
|
+
};
|
|
950
1025
|
/**
|
|
951
1026
|
* Verify whether the currently provided Auth Token is valid.
|
|
952
1027
|
* @summary Verify Auth Token
|
package/dist/base.d.ts
CHANGED
package/dist/base.js
CHANGED
package/dist/common.d.ts
CHANGED
package/dist/common.js
CHANGED
package/dist/configuration.d.ts
CHANGED
package/dist/configuration.js
CHANGED
package/dist/index.d.ts
CHANGED
package/dist/index.js
CHANGED
package/index.ts
CHANGED