@propelauth/node
Advanced tools
Comparing version 2.1.14 to 2.1.15
@@ -1,9 +0,2 @@ | ||
import { AccessToken, CreateAccessTokenRequest } from "./api/accessToken"; | ||
import { ApiKeysCreateRequest, ApiKeysQueryRequest, ApiKeyUpdateRequest } from "./api/endUserApiKeys"; | ||
import { CreateMagicLinkRequest, MagicLink } from "./api/magicLink"; | ||
import { MigrateUserFromExternalSourceRequest } from "./api/migrateUser"; | ||
import { AddUserToOrgRequest, ChangeUserRoleInOrgRequest, CreateOrgRequest, OrgQuery, OrgQueryResponse, RemoveUserFromOrgRequest, UpdateOrgRequest } from "./api/org"; | ||
import { TokenVerificationMetadata } from "./api/tokenVerificationMetadata"; | ||
import { CreateUserRequest, InviteUserToOrgRequest, UpdateUserEmailRequest, UpdateUserMetadataRequest, UpdateUserPasswordRequest, UserSignupQueryParams, UsersInOrgQuery, UsersPagedResponse, UsersQuery } from "./api/user"; | ||
import { ApiKeyFull, ApiKeyNew, ApiKeyResultPage, ApiKeyValidation, CreatedOrg, CreatedUser, Organization, OrgApiKeyValidation, PersonalApiKeyValidation, User, UserAndOrgMemberInfo, UserMetadata } from "./user"; | ||
import { TokenVerificationMetadata, User, UserAndOrgMemberInfo, UserClass } from "@propelauth/node-apis"; | ||
export declare type BaseAuthOptions = { | ||
@@ -26,2 +19,3 @@ authUrl: string; | ||
export declare function initBaseAuth(opts: BaseAuthOptions): { | ||
validateAccessTokenAndGetUserClass: (authorizationHeader?: string | undefined) => Promise<UserClass>; | ||
validateAccessTokenAndGetUser: (authorizationHeader?: string | undefined) => Promise<User>; | ||
@@ -33,27 +27,27 @@ validateAccessTokenAndGetUserWithOrgInfo: (authorizationHeader: string | undefined, requiredOrgInfo: RequiredOrgInfo) => Promise<UserAndOrgMemberInfo>; | ||
validateAccessTokenAndGetUserWithOrgInfoWithAllPermissions: (authorizationHeader: string | undefined, requiredOrgInfo: RequiredOrgInfo, permissions: string[]) => Promise<UserAndOrgMemberInfo>; | ||
fetchUserMetadataByUserId: (userId: string, includeOrgs?: boolean | undefined) => Promise<UserMetadata | null>; | ||
fetchUserMetadataByEmail: (email: string, includeOrgs?: boolean | undefined) => Promise<UserMetadata | null>; | ||
fetchUserMetadataByUsername: (username: string, includeOrgs?: boolean | undefined) => Promise<UserMetadata | null>; | ||
fetchUserSignupQueryParams: (userId: string) => Promise<UserSignupQueryParams | null>; | ||
fetchUserMetadataByUserId: (userId: string, includeOrgs?: boolean | undefined) => Promise<import("@propelauth/node-apis").UserMetadata | null>; | ||
fetchUserMetadataByEmail: (email: string, includeOrgs?: boolean | undefined) => Promise<import("@propelauth/node-apis").UserMetadata | null>; | ||
fetchUserMetadataByUsername: (username: string, includeOrgs?: boolean | undefined) => Promise<import("@propelauth/node-apis").UserMetadata | null>; | ||
fetchUserSignupQueryParams: (userId: string) => Promise<import("@propelauth/node-apis").UserSignupQueryParams | null>; | ||
fetchBatchUserMetadataByUserIds: (userIds: string[], includeOrgs?: boolean | undefined) => Promise<{ | ||
[userId: string]: UserMetadata; | ||
[userId: string]: import("@propelauth/node-apis").UserMetadata; | ||
}>; | ||
fetchBatchUserMetadataByEmails: (emails: string[], includeOrgs?: boolean | undefined) => Promise<{ | ||
[email: string]: UserMetadata; | ||
[email: string]: import("@propelauth/node-apis").UserMetadata; | ||
}>; | ||
fetchBatchUserMetadataByUsernames: (usernames: string[], includeOrgs?: boolean | undefined) => Promise<{ | ||
[username: string]: UserMetadata; | ||
[username: string]: import("@propelauth/node-apis").UserMetadata; | ||
}>; | ||
fetchOrg: (orgId: string) => Promise<Organization | null>; | ||
fetchOrgByQuery: (orgQuery: OrgQuery) => Promise<OrgQueryResponse>; | ||
fetchUsersByQuery: (usersQuery: UsersQuery) => Promise<UsersPagedResponse>; | ||
fetchUsersInOrg: (usersInOrgQuery: UsersInOrgQuery) => Promise<UsersPagedResponse>; | ||
createUser: (createUserRequest: CreateUserRequest) => Promise<CreatedUser>; | ||
fetchOrg: (orgId: string) => Promise<import("@propelauth/node-apis").Organization | null>; | ||
fetchOrgByQuery: (orgQuery: import("@propelauth/node-apis").OrgQuery) => Promise<import("@propelauth/node-apis").OrgQueryResponse>; | ||
fetchUsersByQuery: (usersQuery: import("@propelauth/node-apis").UsersQuery) => Promise<import("@propelauth/node-apis").UsersPagedResponse>; | ||
fetchUsersInOrg: (usersInOrgQuery: import("@propelauth/node-apis").UsersInOrgQuery) => Promise<import("@propelauth/node-apis").UsersPagedResponse>; | ||
createUser: (createUserRequest: import("@propelauth/node-apis").CreateUserRequest) => Promise<import("@propelauth/node-apis").CreatedUser>; | ||
clearUserPassword: (userId: string) => Promise<boolean>; | ||
updateUserMetadata: (userId: string, updateUserMetadataRequest: UpdateUserMetadataRequest) => Promise<boolean>; | ||
updateUserEmail: (userId: string, updateUserEmailRequest: UpdateUserEmailRequest) => Promise<boolean>; | ||
updateUserPassword: (userId: string, updateUserPasswordRequest: UpdateUserPasswordRequest) => Promise<boolean>; | ||
createMagicLink: (createMagicLinkRequest: CreateMagicLinkRequest) => Promise<MagicLink>; | ||
createAccessToken: (createAccessTokenRequest: CreateAccessTokenRequest) => Promise<AccessToken>; | ||
migrateUserFromExternalSource: (migrateUserFromExternalSourceRequest: MigrateUserFromExternalSourceRequest) => Promise<User>; | ||
updateUserMetadata: (userId: string, updateUserMetadataRequest: import("@propelauth/node-apis").UpdateUserMetadataRequest) => Promise<boolean>; | ||
updateUserEmail: (userId: string, updateUserEmailRequest: import("@propelauth/node-apis").UpdateUserEmailRequest) => Promise<boolean>; | ||
updateUserPassword: (userId: string, updateUserPasswordRequest: import("@propelauth/node-apis").UpdateUserPasswordRequest) => Promise<boolean>; | ||
createMagicLink: (createMagicLinkRequest: import("@propelauth/node-apis").CreateMagicLinkRequest) => Promise<import("@propelauth/node-apis").MagicLink>; | ||
createAccessToken: (createAccessTokenRequest: import("@propelauth/node-apis").CreateAccessTokenRequest) => Promise<import("@propelauth/node-apis").AccessToken>; | ||
migrateUserFromExternalSource: (migrateUserFromExternalSourceRequest: import("@propelauth/node-apis").MigrateUserFromExternalSourceRequest) => Promise<import("@propelauth/node-apis").CreatedUser>; | ||
deleteUser: (userId: string) => Promise<boolean>; | ||
@@ -65,20 +59,20 @@ disableUser: (userId: string) => Promise<boolean>; | ||
disableUserCanCreateOrgs: (userId: string) => Promise<boolean>; | ||
createOrg: (createOrgRequest: CreateOrgRequest) => Promise<CreatedOrg>; | ||
addUserToOrg: (addUserToOrgRequest: AddUserToOrgRequest) => Promise<boolean>; | ||
changeUserRoleInOrg: (changeUserRoleInOrgRequest: ChangeUserRoleInOrgRequest) => Promise<boolean>; | ||
removeUserFromOrg: (removeUserFromOrgRequest: RemoveUserFromOrgRequest) => Promise<boolean>; | ||
updateOrg: (updateOrgRequest: UpdateOrgRequest) => Promise<boolean>; | ||
createOrg: (createOrgRequest: import("@propelauth/node-apis").CreateOrgRequest) => Promise<import("@propelauth/node-apis").CreatedOrg>; | ||
addUserToOrg: (addUserToOrgRequest: import("@propelauth/node-apis").AddUserToOrgRequest) => Promise<boolean>; | ||
changeUserRoleInOrg: (changeUserRoleInOrgRequest: import("@propelauth/node-apis").ChangeUserRoleInOrgRequest) => Promise<boolean>; | ||
removeUserFromOrg: (removeUserFromOrgRequest: import("@propelauth/node-apis").RemoveUserFromOrgRequest) => Promise<boolean>; | ||
updateOrg: (updateOrgRequest: import("@propelauth/node-apis").UpdateOrgRequest) => Promise<boolean>; | ||
deleteOrg: (orgId: string) => Promise<boolean>; | ||
allowOrgToSetupSamlConnection: (orgId: string) => Promise<boolean>; | ||
disallowOrgToSetupSamlConnection: (orgId: string) => Promise<boolean>; | ||
inviteUserToOrg: (inviteUserToOrgRequest: InviteUserToOrgRequest) => Promise<boolean>; | ||
fetchApiKey: (apiKeyId: string) => Promise<ApiKeyFull>; | ||
fetchCurrentApiKeys: (apiKeyQuery: ApiKeysQueryRequest) => Promise<ApiKeyResultPage>; | ||
fetchArchivedApiKeys: (apiKeyQuery: ApiKeysQueryRequest) => Promise<ApiKeyResultPage>; | ||
createApiKey: (apiKeyCreate: ApiKeysCreateRequest) => Promise<ApiKeyNew>; | ||
updateApiKey: (apiKeyId: string, ApiKeyUpdate: ApiKeyUpdateRequest) => Promise<boolean>; | ||
inviteUserToOrg: (inviteUserToOrgRequest: import("@propelauth/node-apis").InviteUserToOrgRequest) => Promise<boolean>; | ||
fetchApiKey: (apiKeyId: string) => Promise<import("@propelauth/node-apis").ApiKeyFull>; | ||
fetchCurrentApiKeys: (apiKeyQuery: import("@propelauth/node-apis").ApiKeysQueryRequest) => Promise<import("@propelauth/node-apis").ApiKeyResultPage>; | ||
fetchArchivedApiKeys: (apiKeyQuery: import("@propelauth/node-apis").ApiKeysQueryRequest) => Promise<import("@propelauth/node-apis").ApiKeyResultPage>; | ||
createApiKey: (apiKeyCreate: import("@propelauth/node-apis").ApiKeysCreateRequest) => Promise<import("@propelauth/node-apis").ApiKeyNew>; | ||
updateApiKey: (apiKeyId: string, ApiKeyUpdate: import("@propelauth/node-apis").ApiKeyUpdateRequest) => Promise<boolean>; | ||
deleteApiKey: (apiKeyId: string) => Promise<boolean>; | ||
validateApiKey: (apiKeyToken: string) => Promise<ApiKeyValidation>; | ||
validatePersonalApiKey: (apiKeyToken: string) => Promise<PersonalApiKeyValidation>; | ||
validateOrgApiKey: (apiKeyToken: string) => Promise<OrgApiKeyValidation>; | ||
validateApiKey: (apiKeyToken: string) => Promise<import("@propelauth/node-apis").ApiKeyValidation>; | ||
validatePersonalApiKey: (apiKeyToken: string) => Promise<import("@propelauth/node-apis").PersonalApiKeyValidation>; | ||
validateOrgApiKey: (apiKeyToken: string) => Promise<import("@propelauth/node-apis").OrgApiKeyValidation>; | ||
}; | ||
@@ -85,0 +79,0 @@ export declare type RequiredOrgInfo = { |
@@ -1,9 +0,3 @@ | ||
export { AccessToken, CreateAccessTokenRequest } from "./api/accessToken"; | ||
export { CreateMagicLinkRequest, MagicLink } from "./api/magicLink"; | ||
export { OrgQuery, OrgQueryResponse, AddUserToOrgRequest, ChangeUserRoleInOrgRequest, } from "./api/org"; | ||
export { TokenVerificationMetadata } from "./api/tokenVerificationMetadata"; | ||
export { CreateUserRequest, InviteUserToOrgRequest, UpdateUserEmailRequest, UpdateUserMetadataRequest, UserSignupQueryParams, UsersInOrgQuery, UsersPagedResponse, UsersQuery, } from "./api/user"; | ||
export { AccessTokenCreationException, AddUserToOrgException, ApiKeyCreateException, ApiKeyDeleteException, ApiKeyFetchException, ApiKeyUpdateException, ApiKeyValidateException, BadRequestException, ChangeUserRoleInOrgException, CreateOrgException, CreateUserException, ForbiddenException, MagicLinkCreationException, MigrateUserException, OrgMemberInfo, RemoveUserFromOrgException, toOrgIdToOrgMemberInfo, toUser, UnauthorizedException, UnexpectedException, UpdateOrgException, UpdateUserEmailException, UpdateUserMetadataException, UpdateUserPasswordException, UserClass, UserNotFoundException, } from "@propelauth/node-apis"; | ||
export type { AccessToken, AddUserToOrgRequest, ApiKeyFull, ApiKeyNew, ApiKeyResultPage, ApiKeysCreateRequest, ApiKeysQueryRequest, ApiKeyUpdateRequest, ApiKeyValidation, ChangeUserRoleInOrgRequest, CreateAccessTokenRequest, CreatedOrg, CreatedUser, CreateMagicLinkRequest, CreateOrgRequest, CreateUserRequest, InternalOrgMemberInfo, InternalUser, InviteUserToOrgRequest, LoginMethod, MagicLink, MigrateUserFromExternalSourceRequest, Org, OrgApiKeyValidation, OrgIdToOrgMemberInfo, OrgQuery, OrgQueryResponse, PersonalApiKeyValidation, RemoveUserFromOrgRequest, SamlLoginProvider, SocialLoginProvider, TokenVerificationMetadata, UpdateOrgRequest, UpdateUserEmailRequest, UpdateUserMetadataRequest, UpdateUserPasswordRequest, User, UserAndOrgMemberInfo, UserMetadata, UserProperties, UserSignupQueryParams, UsersInOrgQuery, UsersPagedResponse, UsersQuery, } from "@propelauth/node-apis"; | ||
export { BaseAuthOptions, handleError, HandleErrorOptions, HandleErrorResponse, initBaseAuth, RequiredOrgInfo as RequriedOrgInfo, } from "./auth"; | ||
export { AccessTokenCreationException, AddUserToOrgException, ApiKeyCreateException, ApiKeyDeleteException, ApiKeyFetchException, ApiKeyUpdateException, ApiKeyValidateException, BadRequestException, CreateOrgException, CreateUserException, ForbiddenException, MagicLinkCreationException, MigrateUserException, UnauthorizedException, UnexpectedException, UpdateUserEmailException, UpdateUserMetadataException, UserNotFoundException, } from "./exceptions"; | ||
export { LoginMethod, SamlLoginProvider, SocialLoginProvider } from "./loginMethod"; | ||
export { CreatedOrg, CreatedUser, InternalOrgMemberInfo, InternalUser, Org, Organization, OrgIdToOrgMemberInfo, OrgMemberInfo, OrgRoleStructure, toOrgIdToOrgMemberInfo, toUser, User, UserAndOrgMemberInfo, UserClass, UserMetadata, } from "./user"; |
@@ -1,4 +0,1 @@ | ||
import { OrgApiKeyValidation, PersonalApiKeyValidation } from "./user"; | ||
export declare function validateAuthUrl(authUrl: string): URL; | ||
export declare function validatePersonalApiKey(authUrl: URL, integrationApiKey: string, apiKeyToken: string): Promise<PersonalApiKeyValidation>; | ||
export declare function validateOrgApiKey(authUrl: URL, integrationApiKey: string, apiKeyToken: string): Promise<OrgApiKeyValidation>; |
@@ -7,3 +7,3 @@ { | ||
}, | ||
"version": "2.1.14", | ||
"version": "2.1.15", | ||
"license": "MIT", | ||
@@ -16,2 +16,3 @@ "keywords": [ | ||
"dependencies": { | ||
"@propelauth/node-apis": "^2.1.13", | ||
"jose": "^5.2.0" | ||
@@ -27,4 +28,5 @@ }, | ||
"jest": "^27.0.6", | ||
"jest-fetch-mock": "^3.0.3", | ||
"nock": "^13.1.2", | ||
"prettier": "^2.3.2", | ||
"prettier": "^2.8.8", | ||
"prettier-plugin-organize-imports": "^2.3.3", | ||
@@ -62,4 +64,7 @@ "rimraf": "^3.0.2", | ||
"^.+\\.(ts|tsx)?$": "ts-jest" | ||
} | ||
}, | ||
"setupFiles": [ | ||
"./setupJest.js" | ||
] | ||
} | ||
} |
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is not supported yet
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
701343
2
17
11
5690
+ Added@propelauth/node-apis@2.1.22(transitive)