Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

@turnkey/http

Package Overview
Dependencies
Maintainers
3
Versions
65
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@turnkey/http - npm Package Compare versions

Comparing version 2.2.0 to 2.3.0

6

CHANGELOG.md
# @turnkey/http
## 2.3.0
### Minor Changes
- Sync protos from latest public endpoints
## 2.2.0

@@ -4,0 +10,0 @@

45

dist/__generated__/services/coordinator/public/v1/public_api.client.d.ts

@@ -12,3 +12,5 @@ import { THttpConfig, TSignedRequest, TStamper } from "../../../../../base";

import type { TGetPoliciesBody, TGetPoliciesResponse } from "./public_api.fetcher";
import type { TListPrivateKeyTagsBody, TListPrivateKeyTagsResponse } from "./public_api.fetcher";
import type { TGetPrivateKeysBody, TGetPrivateKeysResponse } from "./public_api.fetcher";
import type { TListUserTagsBody, TListUserTagsResponse } from "./public_api.fetcher";
import type { TGetUsersBody, TGetUsersResponse } from "./public_api.fetcher";

@@ -44,3 +46,2 @@ import type { TGetWalletAccountsBody, TGetWalletAccountsResponse } from "./public_api.fetcher";

import type { TSignTransactionBody, TSignTransactionResponse } from "./public_api.fetcher";
import type { TUpdateAllowedOriginsBody, TUpdateAllowedOriginsResponse } from "./public_api.fetcher";
import type { TUpdatePolicyBody, TUpdatePolicyResponse } from "./public_api.fetcher";

@@ -197,2 +198,16 @@ import type { TUpdatePrivateKeyTagBody, TUpdatePrivateKeyTagResponse } from "./public_api.fetcher";

/**
* List all Private Key Tags within an Organization
*
* Sign the provided `TListPrivateKeyTagsBody` with the client's `stamp` function, and submit the request (POST /public/v1/query/list_private_key_tags).
*
* See also {@link stampListPrivateKeyTags}.
*/
listPrivateKeyTags: (input: TListPrivateKeyTagsBody) => Promise<TListPrivateKeyTagsResponse>;
/**
* Produce a `SignedRequest` from `TListPrivateKeyTagsBody` by using the client's `stamp` function.
*
* See also {@link ListPrivateKeyTags}.
*/
stampListPrivateKeyTags: (input: TListPrivateKeyTagsBody) => Promise<TSignedRequest>;
/**
* List all Private Keys within an Organization

@@ -212,2 +227,16 @@ *

/**
* List all User Tags within an Organization
*
* Sign the provided `TListUserTagsBody` with the client's `stamp` function, and submit the request (POST /public/v1/query/list_user_tags).
*
* See also {@link stampListUserTags}.
*/
listUserTags: (input: TListUserTagsBody) => Promise<TListUserTagsResponse>;
/**
* Produce a `SignedRequest` from `TListUserTagsBody` by using the client's `stamp` function.
*
* See also {@link ListUserTags}.
*/
stampListUserTags: (input: TListUserTagsBody) => Promise<TSignedRequest>;
/**
* List all Users within an Organization

@@ -633,16 +662,2 @@ *

/**
* Update the origins WebAuthN credentials are allowed to sign requests from. Setting this on a Parent-Organization applies to all Sub-Organizations.
*
* Sign the provided `TUpdateAllowedOriginsBody` with the client's `stamp` function, and submit the request (POST /public/v1/submit/update_allowed_origins).
*
* See also {@link stampUpdateAllowedOrigins}.
*/
updateAllowedOrigins: (input: TUpdateAllowedOriginsBody) => Promise<TUpdateAllowedOriginsResponse>;
/**
* Produce a `SignedRequest` from `TUpdateAllowedOriginsBody` by using the client's `stamp` function.
*
* See also {@link UpdateAllowedOrigins}.
*/
stampUpdateAllowedOrigins: (input: TUpdateAllowedOriginsBody) => Promise<TSignedRequest>;
/**
* Update an existing Policy

@@ -649,0 +664,0 @@ *

@@ -259,2 +259,27 @@ "use strict";

/**
* List all Private Key Tags within an Organization
*
* Sign the provided `TListPrivateKeyTagsBody` with the client's `stamp` function, and submit the request (POST /public/v1/query/list_private_key_tags).
*
* See also {@link stampListPrivateKeyTags}.
*/
this.listPrivateKeyTags = async (input) => {
return this.request("/public/v1/query/list_private_key_tags", input);
};
/**
* Produce a `SignedRequest` from `TListPrivateKeyTagsBody` by using the client's `stamp` function.
*
* See also {@link ListPrivateKeyTags}.
*/
this.stampListPrivateKeyTags = async (input) => {
const fullUrl = this.config.baseUrl + "/public/v1/query/list_private_key_tags";
const body = JSON.stringify(input);
const stamp = await this.stamper.stamp(body);
return {
body: body,
stamp: stamp,
url: fullUrl,
};
};
/**
* List all Private Keys within an Organization

@@ -285,2 +310,27 @@ *

/**
* List all User Tags within an Organization
*
* Sign the provided `TListUserTagsBody` with the client's `stamp` function, and submit the request (POST /public/v1/query/list_user_tags).
*
* See also {@link stampListUserTags}.
*/
this.listUserTags = async (input) => {
return this.request("/public/v1/query/list_user_tags", input);
};
/**
* Produce a `SignedRequest` from `TListUserTagsBody` by using the client's `stamp` function.
*
* See also {@link ListUserTags}.
*/
this.stampListUserTags = async (input) => {
const fullUrl = this.config.baseUrl + "/public/v1/query/list_user_tags";
const body = JSON.stringify(input);
const stamp = await this.stamper.stamp(body);
return {
body: body,
stamp: stamp,
url: fullUrl,
};
};
/**
* List all Users within an Organization

@@ -1036,27 +1086,2 @@ *

/**
* Update the origins WebAuthN credentials are allowed to sign requests from. Setting this on a Parent-Organization applies to all Sub-Organizations.
*
* Sign the provided `TUpdateAllowedOriginsBody` with the client's `stamp` function, and submit the request (POST /public/v1/submit/update_allowed_origins).
*
* See also {@link stampUpdateAllowedOrigins}.
*/
this.updateAllowedOrigins = async (input) => {
return this.request("/public/v1/submit/update_allowed_origins", input);
};
/**
* Produce a `SignedRequest` from `TUpdateAllowedOriginsBody` by using the client's `stamp` function.
*
* See also {@link UpdateAllowedOrigins}.
*/
this.stampUpdateAllowedOrigins = async (input) => {
const fullUrl = this.config.baseUrl + "/public/v1/submit/update_allowed_origins";
const body = JSON.stringify(input);
const stamp = await this.stamper.stamp(body);
return {
body: body,
stamp: stamp,
url: fullUrl,
};
};
/**
* Update an existing Policy

@@ -1063,0 +1088,0 @@ *

"use strict";
/* @generated by `@turnkey/fetchers`. DO NOT EDIT BY HAND */
Object.defineProperty(exports, "__esModule", { value: true });
exports.signCreateUserTag = exports.createUserTag = exports.signCreateSubOrganization = exports.createSubOrganization = exports.signCreatePrivateKeys = exports.createPrivateKeys = exports.signCreatePrivateKeyTag = exports.createPrivateKeyTag = exports.signCreatePolicy = exports.createPolicy = exports.signCreateInvitations = exports.createInvitations = exports.signCreateAuthenticators = exports.createAuthenticators = exports.signCreateApiOnlyUsers = exports.createApiOnlyUsers = exports.signCreateApiKeys = exports.createApiKeys = exports.signApproveActivity = exports.approveActivity = exports.signGetWhoami = exports.getWhoami = exports.signGetWallets = exports.getWallets = exports.signGetWalletAccounts = exports.getWalletAccounts = exports.signGetUsers = exports.getUsers = exports.signGetPrivateKeys = exports.getPrivateKeys = exports.signGetPolicies = exports.getPolicies = exports.signGetActivities = exports.getActivities = exports.signGetWallet = exports.getWallet = exports.signGetUser = exports.getUser = exports.signGetPrivateKey = exports.getPrivateKey = exports.signGetPolicy = exports.getPolicy = exports.signGetOrganization = exports.getOrganization = exports.signGetAuthenticators = exports.getAuthenticators = exports.signGetAuthenticator = exports.getAuthenticator = exports.signGetActivity = exports.getActivity = void 0;
exports.signNOOPCodegenAnchor = exports.nOOPCodegenAnchor = exports.signUpdateUserTag = exports.updateUserTag = exports.signUpdateUser = exports.updateUser = exports.signUpdateRootQuorum = exports.updateRootQuorum = exports.signUpdatePrivateKeyTag = exports.updatePrivateKeyTag = exports.signUpdatePolicy = exports.updatePolicy = exports.signUpdateAllowedOrigins = exports.updateAllowedOrigins = exports.signSignTransaction = exports.signTransaction = exports.signSignRawPayload = exports.signRawPayload = exports.signSetOrganizationFeature = exports.setOrganizationFeature = exports.signRemoveOrganizationFeature = exports.removeOrganizationFeature = exports.signRejectActivity = exports.rejectActivity = exports.signRecoverUser = exports.recoverUser = exports.signInitUserEmailRecovery = exports.initUserEmailRecovery = exports.signExportWallet = exports.exportWallet = exports.signExportPrivateKey = exports.exportPrivateKey = exports.signDeletePolicy = exports.deletePolicy = exports.signDeleteInvitation = exports.deleteInvitation = exports.signDeleteAuthenticators = exports.deleteAuthenticators = exports.signDeleteApiKeys = exports.deleteApiKeys = exports.signCreateWalletAccounts = exports.createWalletAccounts = exports.signCreateWallet = exports.createWallet = exports.signCreateUsers = exports.createUsers = void 0;
exports.signCreatePrivateKeys = exports.createPrivateKeys = exports.signCreatePrivateKeyTag = exports.createPrivateKeyTag = exports.signCreatePolicy = exports.createPolicy = exports.signCreateInvitations = exports.createInvitations = exports.signCreateAuthenticators = exports.createAuthenticators = exports.signCreateApiOnlyUsers = exports.createApiOnlyUsers = exports.signCreateApiKeys = exports.createApiKeys = exports.signApproveActivity = exports.approveActivity = exports.signGetWhoami = exports.getWhoami = exports.signGetWallets = exports.getWallets = exports.signGetWalletAccounts = exports.getWalletAccounts = exports.signGetUsers = exports.getUsers = exports.signListUserTags = exports.listUserTags = exports.signGetPrivateKeys = exports.getPrivateKeys = exports.signListPrivateKeyTags = exports.listPrivateKeyTags = exports.signGetPolicies = exports.getPolicies = exports.signGetActivities = exports.getActivities = exports.signGetWallet = exports.getWallet = exports.signGetUser = exports.getUser = exports.signGetPrivateKey = exports.getPrivateKey = exports.signGetPolicy = exports.getPolicy = exports.signGetOrganization = exports.getOrganization = exports.signGetAuthenticators = exports.getAuthenticators = exports.signGetAuthenticator = exports.getAuthenticator = exports.signGetActivity = exports.getActivity = void 0;
exports.signNOOPCodegenAnchor = exports.nOOPCodegenAnchor = exports.signUpdateUserTag = exports.updateUserTag = exports.signUpdateUser = exports.updateUser = exports.signUpdateRootQuorum = exports.updateRootQuorum = exports.signUpdatePrivateKeyTag = exports.updatePrivateKeyTag = exports.signUpdatePolicy = exports.updatePolicy = exports.signSignTransaction = exports.signTransaction = exports.signSignRawPayload = exports.signRawPayload = exports.signSetOrganizationFeature = exports.setOrganizationFeature = exports.signRemoveOrganizationFeature = exports.removeOrganizationFeature = exports.signRejectActivity = exports.rejectActivity = exports.signRecoverUser = exports.recoverUser = exports.signInitUserEmailRecovery = exports.initUserEmailRecovery = exports.signExportWallet = exports.exportWallet = exports.signExportPrivateKey = exports.exportPrivateKey = exports.signDeletePolicy = exports.deletePolicy = exports.signDeleteInvitation = exports.deleteInvitation = exports.signDeleteAuthenticators = exports.deleteAuthenticators = exports.signDeleteApiKeys = exports.deleteApiKeys = exports.signCreateWalletAccounts = exports.createWalletAccounts = exports.signCreateWallet = exports.createWallet = exports.signCreateUsers = exports.createUsers = exports.signCreateUserTag = exports.createUserTag = exports.signCreateSubOrganization = exports.createSubOrganization = void 0;
const base_1 = require("../../../../../base");

@@ -248,2 +248,26 @@ /**

/**
* List Private Key Tags
*
* List all Private Key Tags within an Organization
*
* `POST /public/v1/query/list_private_key_tags`
*/
const listPrivateKeyTags = (input) => (0, base_1.request)({
uri: "/public/v1/query/list_private_key_tags",
method: "POST",
body: input.body,
});
exports.listPrivateKeyTags = listPrivateKeyTags;
/**
* Request a WebAuthn assertion and return a signed `ListPrivateKeyTags` request, ready to be POSTed to Turnkey.
*
* See {@link ListPrivateKeyTags}
*/
const signListPrivateKeyTags = (input, options) => (0, base_1.signedRequest)({
uri: "/public/v1/query/list_private_key_tags",
body: input.body,
options,
});
exports.signListPrivateKeyTags = signListPrivateKeyTags;
/**
* List Private Keys

@@ -273,2 +297,26 @@ *

/**
* List User Tags
*
* List all User Tags within an Organization
*
* `POST /public/v1/query/list_user_tags`
*/
const listUserTags = (input) => (0, base_1.request)({
uri: "/public/v1/query/list_user_tags",
method: "POST",
body: input.body,
});
exports.listUserTags = listUserTags;
/**
* Request a WebAuthn assertion and return a signed `ListUserTags` request, ready to be POSTed to Turnkey.
*
* See {@link ListUserTags}
*/
const signListUserTags = (input, options) => (0, base_1.signedRequest)({
uri: "/public/v1/query/list_user_tags",
body: input.body,
options,
});
exports.signListUserTags = signListUserTags;
/**
* List Users

@@ -994,26 +1042,2 @@ *

/**
* Update Allowed Origins
*
* Update the origins WebAuthN credentials are allowed to sign requests from. Setting this on a Parent-Organization applies to all Sub-Organizations.
*
* `POST /public/v1/submit/update_allowed_origins`
*/
const updateAllowedOrigins = (input) => (0, base_1.request)({
uri: "/public/v1/submit/update_allowed_origins",
method: "POST",
body: input.body,
});
exports.updateAllowedOrigins = updateAllowedOrigins;
/**
* Request a WebAuthn assertion and return a signed `UpdateAllowedOrigins` request, ready to be POSTed to Turnkey.
*
* See {@link UpdateAllowedOrigins}
*/
const signUpdateAllowedOrigins = (input, options) => (0, base_1.signedRequest)({
uri: "/public/v1/submit/update_allowed_origins",
body: input.body,
options,
});
exports.signUpdateAllowedOrigins = signUpdateAllowedOrigins;
/**
* Update Policy

@@ -1020,0 +1044,0 @@ *

@@ -256,2 +256,27 @@ /* @generated by `@turnkey/fetchers`. DO NOT EDIT BY HAND */

/**
* List all Private Key Tags within an Organization
*
* Sign the provided `TListPrivateKeyTagsBody` with the client's `stamp` function, and submit the request (POST /public/v1/query/list_private_key_tags).
*
* See also {@link stampListPrivateKeyTags}.
*/
this.listPrivateKeyTags = async (input) => {
return this.request("/public/v1/query/list_private_key_tags", input);
};
/**
* Produce a `SignedRequest` from `TListPrivateKeyTagsBody` by using the client's `stamp` function.
*
* See also {@link ListPrivateKeyTags}.
*/
this.stampListPrivateKeyTags = async (input) => {
const fullUrl = this.config.baseUrl + "/public/v1/query/list_private_key_tags";
const body = JSON.stringify(input);
const stamp = await this.stamper.stamp(body);
return {
body: body,
stamp: stamp,
url: fullUrl,
};
};
/**
* List all Private Keys within an Organization

@@ -282,2 +307,27 @@ *

/**
* List all User Tags within an Organization
*
* Sign the provided `TListUserTagsBody` with the client's `stamp` function, and submit the request (POST /public/v1/query/list_user_tags).
*
* See also {@link stampListUserTags}.
*/
this.listUserTags = async (input) => {
return this.request("/public/v1/query/list_user_tags", input);
};
/**
* Produce a `SignedRequest` from `TListUserTagsBody` by using the client's `stamp` function.
*
* See also {@link ListUserTags}.
*/
this.stampListUserTags = async (input) => {
const fullUrl = this.config.baseUrl + "/public/v1/query/list_user_tags";
const body = JSON.stringify(input);
const stamp = await this.stamper.stamp(body);
return {
body: body,
stamp: stamp,
url: fullUrl,
};
};
/**
* List all Users within an Organization

@@ -1033,27 +1083,2 @@ *

/**
* Update the origins WebAuthN credentials are allowed to sign requests from. Setting this on a Parent-Organization applies to all Sub-Organizations.
*
* Sign the provided `TUpdateAllowedOriginsBody` with the client's `stamp` function, and submit the request (POST /public/v1/submit/update_allowed_origins).
*
* See also {@link stampUpdateAllowedOrigins}.
*/
this.updateAllowedOrigins = async (input) => {
return this.request("/public/v1/submit/update_allowed_origins", input);
};
/**
* Produce a `SignedRequest` from `TUpdateAllowedOriginsBody` by using the client's `stamp` function.
*
* See also {@link UpdateAllowedOrigins}.
*/
this.stampUpdateAllowedOrigins = async (input) => {
const fullUrl = this.config.baseUrl + "/public/v1/submit/update_allowed_origins";
const body = JSON.stringify(input);
const stamp = await this.stamper.stamp(body);
return {
body: body,
stamp: stamp,
url: fullUrl,
};
};
/**
* Update an existing Policy

@@ -1060,0 +1085,0 @@ *

@@ -224,2 +224,24 @@ /* @generated by `@turnkey/fetchers`. DO NOT EDIT BY HAND */

/**
* List Private Key Tags
*
* List all Private Key Tags within an Organization
*
* `POST /public/v1/query/list_private_key_tags`
*/
export const listPrivateKeyTags = (input) => request({
uri: "/public/v1/query/list_private_key_tags",
method: "POST",
body: input.body,
});
/**
* Request a WebAuthn assertion and return a signed `ListPrivateKeyTags` request, ready to be POSTed to Turnkey.
*
* See {@link ListPrivateKeyTags}
*/
export const signListPrivateKeyTags = (input, options) => signedRequest({
uri: "/public/v1/query/list_private_key_tags",
body: input.body,
options,
});
/**
* List Private Keys

@@ -247,2 +269,24 @@ *

/**
* List User Tags
*
* List all User Tags within an Organization
*
* `POST /public/v1/query/list_user_tags`
*/
export const listUserTags = (input) => request({
uri: "/public/v1/query/list_user_tags",
method: "POST",
body: input.body,
});
/**
* Request a WebAuthn assertion and return a signed `ListUserTags` request, ready to be POSTed to Turnkey.
*
* See {@link ListUserTags}
*/
export const signListUserTags = (input, options) => signedRequest({
uri: "/public/v1/query/list_user_tags",
body: input.body,
options,
});
/**
* List Users

@@ -908,24 +952,2 @@ *

/**
* Update Allowed Origins
*
* Update the origins WebAuthN credentials are allowed to sign requests from. Setting this on a Parent-Organization applies to all Sub-Organizations.
*
* `POST /public/v1/submit/update_allowed_origins`
*/
export const updateAllowedOrigins = (input) => request({
uri: "/public/v1/submit/update_allowed_origins",
method: "POST",
body: input.body,
});
/**
* Request a WebAuthn assertion and return a signed `UpdateAllowedOrigins` request, ready to be POSTed to Turnkey.
*
* See {@link UpdateAllowedOrigins}
*/
export const signUpdateAllowedOrigins = (input, options) => signedRequest({
uri: "/public/v1/submit/update_allowed_origins",
body: input.body,
options,
});
/**
* Update Policy

@@ -932,0 +954,0 @@ *

{
"name": "@turnkey/http",
"version": "2.2.0",
"version": "2.3.0",
"main": "./dist/index.js",

@@ -43,3 +43,3 @@ "module": "./dist/esm/index.js",

"@turnkey/api-key-stamper": "0.1.1",
"@turnkey/webauthn-stamper": "0.2.0"
"@turnkey/webauthn-stamper": "0.3.0"
},

@@ -46,0 +46,0 @@ "engines": {

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is too big to display

Sorry, the diff of this file is too big to display

Sorry, the diff of this file is too big to display

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc