@turnkey/http
Advanced tools
Comparing version 2.2.0 to 2.3.0
# @turnkey/http | ||
## 2.3.0 | ||
### Minor Changes | ||
- Sync protos from latest public endpoints | ||
## 2.2.0 | ||
@@ -4,0 +10,0 @@ |
@@ -12,3 +12,5 @@ import { THttpConfig, TSignedRequest, TStamper } from "../../../../../base"; | ||
import type { TGetPoliciesBody, TGetPoliciesResponse } from "./public_api.fetcher"; | ||
import type { TListPrivateKeyTagsBody, TListPrivateKeyTagsResponse } from "./public_api.fetcher"; | ||
import type { TGetPrivateKeysBody, TGetPrivateKeysResponse } from "./public_api.fetcher"; | ||
import type { TListUserTagsBody, TListUserTagsResponse } from "./public_api.fetcher"; | ||
import type { TGetUsersBody, TGetUsersResponse } from "./public_api.fetcher"; | ||
@@ -44,3 +46,2 @@ import type { TGetWalletAccountsBody, TGetWalletAccountsResponse } from "./public_api.fetcher"; | ||
import type { TSignTransactionBody, TSignTransactionResponse } from "./public_api.fetcher"; | ||
import type { TUpdateAllowedOriginsBody, TUpdateAllowedOriginsResponse } from "./public_api.fetcher"; | ||
import type { TUpdatePolicyBody, TUpdatePolicyResponse } from "./public_api.fetcher"; | ||
@@ -197,2 +198,16 @@ import type { TUpdatePrivateKeyTagBody, TUpdatePrivateKeyTagResponse } from "./public_api.fetcher"; | ||
/** | ||
* List all Private Key Tags within an Organization | ||
* | ||
* Sign the provided `TListPrivateKeyTagsBody` with the client's `stamp` function, and submit the request (POST /public/v1/query/list_private_key_tags). | ||
* | ||
* See also {@link stampListPrivateKeyTags}. | ||
*/ | ||
listPrivateKeyTags: (input: TListPrivateKeyTagsBody) => Promise<TListPrivateKeyTagsResponse>; | ||
/** | ||
* Produce a `SignedRequest` from `TListPrivateKeyTagsBody` by using the client's `stamp` function. | ||
* | ||
* See also {@link ListPrivateKeyTags}. | ||
*/ | ||
stampListPrivateKeyTags: (input: TListPrivateKeyTagsBody) => Promise<TSignedRequest>; | ||
/** | ||
* List all Private Keys within an Organization | ||
@@ -212,2 +227,16 @@ * | ||
/** | ||
* List all User Tags within an Organization | ||
* | ||
* Sign the provided `TListUserTagsBody` with the client's `stamp` function, and submit the request (POST /public/v1/query/list_user_tags). | ||
* | ||
* See also {@link stampListUserTags}. | ||
*/ | ||
listUserTags: (input: TListUserTagsBody) => Promise<TListUserTagsResponse>; | ||
/** | ||
* Produce a `SignedRequest` from `TListUserTagsBody` by using the client's `stamp` function. | ||
* | ||
* See also {@link ListUserTags}. | ||
*/ | ||
stampListUserTags: (input: TListUserTagsBody) => Promise<TSignedRequest>; | ||
/** | ||
* List all Users within an Organization | ||
@@ -633,16 +662,2 @@ * | ||
/** | ||
* Update the origins WebAuthN credentials are allowed to sign requests from. Setting this on a Parent-Organization applies to all Sub-Organizations. | ||
* | ||
* Sign the provided `TUpdateAllowedOriginsBody` with the client's `stamp` function, and submit the request (POST /public/v1/submit/update_allowed_origins). | ||
* | ||
* See also {@link stampUpdateAllowedOrigins}. | ||
*/ | ||
updateAllowedOrigins: (input: TUpdateAllowedOriginsBody) => Promise<TUpdateAllowedOriginsResponse>; | ||
/** | ||
* Produce a `SignedRequest` from `TUpdateAllowedOriginsBody` by using the client's `stamp` function. | ||
* | ||
* See also {@link UpdateAllowedOrigins}. | ||
*/ | ||
stampUpdateAllowedOrigins: (input: TUpdateAllowedOriginsBody) => Promise<TSignedRequest>; | ||
/** | ||
* Update an existing Policy | ||
@@ -649,0 +664,0 @@ * |
@@ -259,2 +259,27 @@ "use strict"; | ||
/** | ||
* List all Private Key Tags within an Organization | ||
* | ||
* Sign the provided `TListPrivateKeyTagsBody` with the client's `stamp` function, and submit the request (POST /public/v1/query/list_private_key_tags). | ||
* | ||
* See also {@link stampListPrivateKeyTags}. | ||
*/ | ||
this.listPrivateKeyTags = async (input) => { | ||
return this.request("/public/v1/query/list_private_key_tags", input); | ||
}; | ||
/** | ||
* Produce a `SignedRequest` from `TListPrivateKeyTagsBody` by using the client's `stamp` function. | ||
* | ||
* See also {@link ListPrivateKeyTags}. | ||
*/ | ||
this.stampListPrivateKeyTags = async (input) => { | ||
const fullUrl = this.config.baseUrl + "/public/v1/query/list_private_key_tags"; | ||
const body = JSON.stringify(input); | ||
const stamp = await this.stamper.stamp(body); | ||
return { | ||
body: body, | ||
stamp: stamp, | ||
url: fullUrl, | ||
}; | ||
}; | ||
/** | ||
* List all Private Keys within an Organization | ||
@@ -285,2 +310,27 @@ * | ||
/** | ||
* List all User Tags within an Organization | ||
* | ||
* Sign the provided `TListUserTagsBody` with the client's `stamp` function, and submit the request (POST /public/v1/query/list_user_tags). | ||
* | ||
* See also {@link stampListUserTags}. | ||
*/ | ||
this.listUserTags = async (input) => { | ||
return this.request("/public/v1/query/list_user_tags", input); | ||
}; | ||
/** | ||
* Produce a `SignedRequest` from `TListUserTagsBody` by using the client's `stamp` function. | ||
* | ||
* See also {@link ListUserTags}. | ||
*/ | ||
this.stampListUserTags = async (input) => { | ||
const fullUrl = this.config.baseUrl + "/public/v1/query/list_user_tags"; | ||
const body = JSON.stringify(input); | ||
const stamp = await this.stamper.stamp(body); | ||
return { | ||
body: body, | ||
stamp: stamp, | ||
url: fullUrl, | ||
}; | ||
}; | ||
/** | ||
* List all Users within an Organization | ||
@@ -1036,27 +1086,2 @@ * | ||
/** | ||
* Update the origins WebAuthN credentials are allowed to sign requests from. Setting this on a Parent-Organization applies to all Sub-Organizations. | ||
* | ||
* Sign the provided `TUpdateAllowedOriginsBody` with the client's `stamp` function, and submit the request (POST /public/v1/submit/update_allowed_origins). | ||
* | ||
* See also {@link stampUpdateAllowedOrigins}. | ||
*/ | ||
this.updateAllowedOrigins = async (input) => { | ||
return this.request("/public/v1/submit/update_allowed_origins", input); | ||
}; | ||
/** | ||
* Produce a `SignedRequest` from `TUpdateAllowedOriginsBody` by using the client's `stamp` function. | ||
* | ||
* See also {@link UpdateAllowedOrigins}. | ||
*/ | ||
this.stampUpdateAllowedOrigins = async (input) => { | ||
const fullUrl = this.config.baseUrl + "/public/v1/submit/update_allowed_origins"; | ||
const body = JSON.stringify(input); | ||
const stamp = await this.stamper.stamp(body); | ||
return { | ||
body: body, | ||
stamp: stamp, | ||
url: fullUrl, | ||
}; | ||
}; | ||
/** | ||
* Update an existing Policy | ||
@@ -1063,0 +1088,0 @@ * |
"use strict"; | ||
/* @generated by `@turnkey/fetchers`. DO NOT EDIT BY HAND */ | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.signCreateUserTag = exports.createUserTag = exports.signCreateSubOrganization = exports.createSubOrganization = exports.signCreatePrivateKeys = exports.createPrivateKeys = exports.signCreatePrivateKeyTag = exports.createPrivateKeyTag = exports.signCreatePolicy = exports.createPolicy = exports.signCreateInvitations = exports.createInvitations = exports.signCreateAuthenticators = exports.createAuthenticators = exports.signCreateApiOnlyUsers = exports.createApiOnlyUsers = exports.signCreateApiKeys = exports.createApiKeys = exports.signApproveActivity = exports.approveActivity = exports.signGetWhoami = exports.getWhoami = exports.signGetWallets = exports.getWallets = exports.signGetWalletAccounts = exports.getWalletAccounts = exports.signGetUsers = exports.getUsers = exports.signGetPrivateKeys = exports.getPrivateKeys = exports.signGetPolicies = exports.getPolicies = exports.signGetActivities = exports.getActivities = exports.signGetWallet = exports.getWallet = exports.signGetUser = exports.getUser = exports.signGetPrivateKey = exports.getPrivateKey = exports.signGetPolicy = exports.getPolicy = exports.signGetOrganization = exports.getOrganization = exports.signGetAuthenticators = exports.getAuthenticators = exports.signGetAuthenticator = exports.getAuthenticator = exports.signGetActivity = exports.getActivity = void 0; | ||
exports.signNOOPCodegenAnchor = exports.nOOPCodegenAnchor = exports.signUpdateUserTag = exports.updateUserTag = exports.signUpdateUser = exports.updateUser = exports.signUpdateRootQuorum = exports.updateRootQuorum = exports.signUpdatePrivateKeyTag = exports.updatePrivateKeyTag = exports.signUpdatePolicy = exports.updatePolicy = exports.signUpdateAllowedOrigins = exports.updateAllowedOrigins = exports.signSignTransaction = exports.signTransaction = exports.signSignRawPayload = exports.signRawPayload = exports.signSetOrganizationFeature = exports.setOrganizationFeature = exports.signRemoveOrganizationFeature = exports.removeOrganizationFeature = exports.signRejectActivity = exports.rejectActivity = exports.signRecoverUser = exports.recoverUser = exports.signInitUserEmailRecovery = exports.initUserEmailRecovery = exports.signExportWallet = exports.exportWallet = exports.signExportPrivateKey = exports.exportPrivateKey = exports.signDeletePolicy = exports.deletePolicy = exports.signDeleteInvitation = exports.deleteInvitation = exports.signDeleteAuthenticators = exports.deleteAuthenticators = exports.signDeleteApiKeys = exports.deleteApiKeys = exports.signCreateWalletAccounts = exports.createWalletAccounts = exports.signCreateWallet = exports.createWallet = exports.signCreateUsers = exports.createUsers = void 0; | ||
exports.signCreatePrivateKeys = exports.createPrivateKeys = exports.signCreatePrivateKeyTag = exports.createPrivateKeyTag = exports.signCreatePolicy = exports.createPolicy = exports.signCreateInvitations = exports.createInvitations = exports.signCreateAuthenticators = exports.createAuthenticators = exports.signCreateApiOnlyUsers = exports.createApiOnlyUsers = exports.signCreateApiKeys = exports.createApiKeys = exports.signApproveActivity = exports.approveActivity = exports.signGetWhoami = exports.getWhoami = exports.signGetWallets = exports.getWallets = exports.signGetWalletAccounts = exports.getWalletAccounts = exports.signGetUsers = exports.getUsers = exports.signListUserTags = exports.listUserTags = exports.signGetPrivateKeys = exports.getPrivateKeys = exports.signListPrivateKeyTags = exports.listPrivateKeyTags = exports.signGetPolicies = exports.getPolicies = exports.signGetActivities = exports.getActivities = exports.signGetWallet = exports.getWallet = exports.signGetUser = exports.getUser = exports.signGetPrivateKey = exports.getPrivateKey = exports.signGetPolicy = exports.getPolicy = exports.signGetOrganization = exports.getOrganization = exports.signGetAuthenticators = exports.getAuthenticators = exports.signGetAuthenticator = exports.getAuthenticator = exports.signGetActivity = exports.getActivity = void 0; | ||
exports.signNOOPCodegenAnchor = exports.nOOPCodegenAnchor = exports.signUpdateUserTag = exports.updateUserTag = exports.signUpdateUser = exports.updateUser = exports.signUpdateRootQuorum = exports.updateRootQuorum = exports.signUpdatePrivateKeyTag = exports.updatePrivateKeyTag = exports.signUpdatePolicy = exports.updatePolicy = exports.signSignTransaction = exports.signTransaction = exports.signSignRawPayload = exports.signRawPayload = exports.signSetOrganizationFeature = exports.setOrganizationFeature = exports.signRemoveOrganizationFeature = exports.removeOrganizationFeature = exports.signRejectActivity = exports.rejectActivity = exports.signRecoverUser = exports.recoverUser = exports.signInitUserEmailRecovery = exports.initUserEmailRecovery = exports.signExportWallet = exports.exportWallet = exports.signExportPrivateKey = exports.exportPrivateKey = exports.signDeletePolicy = exports.deletePolicy = exports.signDeleteInvitation = exports.deleteInvitation = exports.signDeleteAuthenticators = exports.deleteAuthenticators = exports.signDeleteApiKeys = exports.deleteApiKeys = exports.signCreateWalletAccounts = exports.createWalletAccounts = exports.signCreateWallet = exports.createWallet = exports.signCreateUsers = exports.createUsers = exports.signCreateUserTag = exports.createUserTag = exports.signCreateSubOrganization = exports.createSubOrganization = void 0; | ||
const base_1 = require("../../../../../base"); | ||
@@ -248,2 +248,26 @@ /** | ||
/** | ||
* List Private Key Tags | ||
* | ||
* List all Private Key Tags within an Organization | ||
* | ||
* `POST /public/v1/query/list_private_key_tags` | ||
*/ | ||
const listPrivateKeyTags = (input) => (0, base_1.request)({ | ||
uri: "/public/v1/query/list_private_key_tags", | ||
method: "POST", | ||
body: input.body, | ||
}); | ||
exports.listPrivateKeyTags = listPrivateKeyTags; | ||
/** | ||
* Request a WebAuthn assertion and return a signed `ListPrivateKeyTags` request, ready to be POSTed to Turnkey. | ||
* | ||
* See {@link ListPrivateKeyTags} | ||
*/ | ||
const signListPrivateKeyTags = (input, options) => (0, base_1.signedRequest)({ | ||
uri: "/public/v1/query/list_private_key_tags", | ||
body: input.body, | ||
options, | ||
}); | ||
exports.signListPrivateKeyTags = signListPrivateKeyTags; | ||
/** | ||
* List Private Keys | ||
@@ -273,2 +297,26 @@ * | ||
/** | ||
* List User Tags | ||
* | ||
* List all User Tags within an Organization | ||
* | ||
* `POST /public/v1/query/list_user_tags` | ||
*/ | ||
const listUserTags = (input) => (0, base_1.request)({ | ||
uri: "/public/v1/query/list_user_tags", | ||
method: "POST", | ||
body: input.body, | ||
}); | ||
exports.listUserTags = listUserTags; | ||
/** | ||
* Request a WebAuthn assertion and return a signed `ListUserTags` request, ready to be POSTed to Turnkey. | ||
* | ||
* See {@link ListUserTags} | ||
*/ | ||
const signListUserTags = (input, options) => (0, base_1.signedRequest)({ | ||
uri: "/public/v1/query/list_user_tags", | ||
body: input.body, | ||
options, | ||
}); | ||
exports.signListUserTags = signListUserTags; | ||
/** | ||
* List Users | ||
@@ -994,26 +1042,2 @@ * | ||
/** | ||
* Update Allowed Origins | ||
* | ||
* Update the origins WebAuthN credentials are allowed to sign requests from. Setting this on a Parent-Organization applies to all Sub-Organizations. | ||
* | ||
* `POST /public/v1/submit/update_allowed_origins` | ||
*/ | ||
const updateAllowedOrigins = (input) => (0, base_1.request)({ | ||
uri: "/public/v1/submit/update_allowed_origins", | ||
method: "POST", | ||
body: input.body, | ||
}); | ||
exports.updateAllowedOrigins = updateAllowedOrigins; | ||
/** | ||
* Request a WebAuthn assertion and return a signed `UpdateAllowedOrigins` request, ready to be POSTed to Turnkey. | ||
* | ||
* See {@link UpdateAllowedOrigins} | ||
*/ | ||
const signUpdateAllowedOrigins = (input, options) => (0, base_1.signedRequest)({ | ||
uri: "/public/v1/submit/update_allowed_origins", | ||
body: input.body, | ||
options, | ||
}); | ||
exports.signUpdateAllowedOrigins = signUpdateAllowedOrigins; | ||
/** | ||
* Update Policy | ||
@@ -1020,0 +1044,0 @@ * |
@@ -256,2 +256,27 @@ /* @generated by `@turnkey/fetchers`. DO NOT EDIT BY HAND */ | ||
/** | ||
* List all Private Key Tags within an Organization | ||
* | ||
* Sign the provided `TListPrivateKeyTagsBody` with the client's `stamp` function, and submit the request (POST /public/v1/query/list_private_key_tags). | ||
* | ||
* See also {@link stampListPrivateKeyTags}. | ||
*/ | ||
this.listPrivateKeyTags = async (input) => { | ||
return this.request("/public/v1/query/list_private_key_tags", input); | ||
}; | ||
/** | ||
* Produce a `SignedRequest` from `TListPrivateKeyTagsBody` by using the client's `stamp` function. | ||
* | ||
* See also {@link ListPrivateKeyTags}. | ||
*/ | ||
this.stampListPrivateKeyTags = async (input) => { | ||
const fullUrl = this.config.baseUrl + "/public/v1/query/list_private_key_tags"; | ||
const body = JSON.stringify(input); | ||
const stamp = await this.stamper.stamp(body); | ||
return { | ||
body: body, | ||
stamp: stamp, | ||
url: fullUrl, | ||
}; | ||
}; | ||
/** | ||
* List all Private Keys within an Organization | ||
@@ -282,2 +307,27 @@ * | ||
/** | ||
* List all User Tags within an Organization | ||
* | ||
* Sign the provided `TListUserTagsBody` with the client's `stamp` function, and submit the request (POST /public/v1/query/list_user_tags). | ||
* | ||
* See also {@link stampListUserTags}. | ||
*/ | ||
this.listUserTags = async (input) => { | ||
return this.request("/public/v1/query/list_user_tags", input); | ||
}; | ||
/** | ||
* Produce a `SignedRequest` from `TListUserTagsBody` by using the client's `stamp` function. | ||
* | ||
* See also {@link ListUserTags}. | ||
*/ | ||
this.stampListUserTags = async (input) => { | ||
const fullUrl = this.config.baseUrl + "/public/v1/query/list_user_tags"; | ||
const body = JSON.stringify(input); | ||
const stamp = await this.stamper.stamp(body); | ||
return { | ||
body: body, | ||
stamp: stamp, | ||
url: fullUrl, | ||
}; | ||
}; | ||
/** | ||
* List all Users within an Organization | ||
@@ -1033,27 +1083,2 @@ * | ||
/** | ||
* Update the origins WebAuthN credentials are allowed to sign requests from. Setting this on a Parent-Organization applies to all Sub-Organizations. | ||
* | ||
* Sign the provided `TUpdateAllowedOriginsBody` with the client's `stamp` function, and submit the request (POST /public/v1/submit/update_allowed_origins). | ||
* | ||
* See also {@link stampUpdateAllowedOrigins}. | ||
*/ | ||
this.updateAllowedOrigins = async (input) => { | ||
return this.request("/public/v1/submit/update_allowed_origins", input); | ||
}; | ||
/** | ||
* Produce a `SignedRequest` from `TUpdateAllowedOriginsBody` by using the client's `stamp` function. | ||
* | ||
* See also {@link UpdateAllowedOrigins}. | ||
*/ | ||
this.stampUpdateAllowedOrigins = async (input) => { | ||
const fullUrl = this.config.baseUrl + "/public/v1/submit/update_allowed_origins"; | ||
const body = JSON.stringify(input); | ||
const stamp = await this.stamper.stamp(body); | ||
return { | ||
body: body, | ||
stamp: stamp, | ||
url: fullUrl, | ||
}; | ||
}; | ||
/** | ||
* Update an existing Policy | ||
@@ -1060,0 +1085,0 @@ * |
@@ -224,2 +224,24 @@ /* @generated by `@turnkey/fetchers`. DO NOT EDIT BY HAND */ | ||
/** | ||
* List Private Key Tags | ||
* | ||
* List all Private Key Tags within an Organization | ||
* | ||
* `POST /public/v1/query/list_private_key_tags` | ||
*/ | ||
export const listPrivateKeyTags = (input) => request({ | ||
uri: "/public/v1/query/list_private_key_tags", | ||
method: "POST", | ||
body: input.body, | ||
}); | ||
/** | ||
* Request a WebAuthn assertion and return a signed `ListPrivateKeyTags` request, ready to be POSTed to Turnkey. | ||
* | ||
* See {@link ListPrivateKeyTags} | ||
*/ | ||
export const signListPrivateKeyTags = (input, options) => signedRequest({ | ||
uri: "/public/v1/query/list_private_key_tags", | ||
body: input.body, | ||
options, | ||
}); | ||
/** | ||
* List Private Keys | ||
@@ -247,2 +269,24 @@ * | ||
/** | ||
* List User Tags | ||
* | ||
* List all User Tags within an Organization | ||
* | ||
* `POST /public/v1/query/list_user_tags` | ||
*/ | ||
export const listUserTags = (input) => request({ | ||
uri: "/public/v1/query/list_user_tags", | ||
method: "POST", | ||
body: input.body, | ||
}); | ||
/** | ||
* Request a WebAuthn assertion and return a signed `ListUserTags` request, ready to be POSTed to Turnkey. | ||
* | ||
* See {@link ListUserTags} | ||
*/ | ||
export const signListUserTags = (input, options) => signedRequest({ | ||
uri: "/public/v1/query/list_user_tags", | ||
body: input.body, | ||
options, | ||
}); | ||
/** | ||
* List Users | ||
@@ -908,24 +952,2 @@ * | ||
/** | ||
* Update Allowed Origins | ||
* | ||
* Update the origins WebAuthN credentials are allowed to sign requests from. Setting this on a Parent-Organization applies to all Sub-Organizations. | ||
* | ||
* `POST /public/v1/submit/update_allowed_origins` | ||
*/ | ||
export const updateAllowedOrigins = (input) => request({ | ||
uri: "/public/v1/submit/update_allowed_origins", | ||
method: "POST", | ||
body: input.body, | ||
}); | ||
/** | ||
* Request a WebAuthn assertion and return a signed `UpdateAllowedOrigins` request, ready to be POSTed to Turnkey. | ||
* | ||
* See {@link UpdateAllowedOrigins} | ||
*/ | ||
export const signUpdateAllowedOrigins = (input, options) => signedRequest({ | ||
uri: "/public/v1/submit/update_allowed_origins", | ||
body: input.body, | ||
options, | ||
}); | ||
/** | ||
* Update Policy | ||
@@ -932,0 +954,0 @@ * |
{ | ||
"name": "@turnkey/http", | ||
"version": "2.2.0", | ||
"version": "2.3.0", | ||
"main": "./dist/index.js", | ||
@@ -43,3 +43,3 @@ "module": "./dist/esm/index.js", | ||
"@turnkey/api-key-stamper": "0.1.1", | ||
"@turnkey/webauthn-stamper": "0.2.0" | ||
"@turnkey/webauthn-stamper": "0.3.0" | ||
}, | ||
@@ -46,0 +46,0 @@ "engines": { |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is too big to display
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
2383669
50797
+ Added@turnkey/webauthn-stamper@0.3.0(transitive)
- Removed@turnkey/webauthn-stamper@0.2.0(transitive)