UNPKG

auth0

Version:
379 lines 18.8 kB
"use strict"; var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { if (k2 === undefined) k2 = k; var desc = Object.getOwnPropertyDescriptor(m, k); if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) { desc = { enumerable: true, get: function() { return m[k]; } }; } Object.defineProperty(o, k2, desc); }) : (function(o, m, k, k2) { if (k2 === undefined) k2 = k; o[k2] = m[k]; })); var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { Object.defineProperty(o, "default", { enumerable: true, value: v }); }) : function(o, v) { o["default"] = v; }); var __importStar = (this && this.__importStar) || function (mod) { if (mod && mod.__esModule) return mod; var result = {}; if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); __setModuleDefault(result, mod); return result; }; Object.defineProperty(exports, "__esModule", { value: true }); exports.ClientsManager = void 0; const runtime = __importStar(require("../../../lib/runtime.js")); const { BaseAPI } = runtime; /** * */ class ClientsManager extends BaseAPI { /** * Delete a client and related configuration (rules, connections, etc). * Delete a client * * @throws {RequiredError} */ async delete(requestParameters, initOverrides) { runtime.validateRequiredRequestParams(requestParameters, ['client_id']); const response = await this.request({ path: `/clients/{client_id}`.replace('{client_id}', encodeURIComponent(String(requestParameters.client_id))), method: 'DELETE', }, initOverrides); return runtime.VoidApiResponse.fromResponse(response); } /** * Delete a client credential you previously created. May be enabled or disabled. For more information, read <a href="https://www.auth0.com/docs/get-started/authentication-and-authorization-flow/client-credentials-flow">Client Credential Flow</a>. * Delete a client credential * * @throws {RequiredError} */ async deleteCredential(requestParameters, initOverrides) { runtime.validateRequiredRequestParams(requestParameters, ['client_id', 'credential_id']); const response = await this.request({ path: `/clients/{client_id}/credentials/{credential_id}` .replace('{client_id}', encodeURIComponent(String(requestParameters.client_id))) .replace('{credential_id}', encodeURIComponent(String(requestParameters.credential_id))), method: 'DELETE', }, initOverrides); return runtime.VoidApiResponse.fromResponse(response); } /** * Retrieve all connections that are enabled for the specified <a href="https://www.auth0.com/docs/get-started/applications"> Application</a>, using checkpoint pagination. A list of fields to include or exclude for each connection may also be specified. * <ul> * <li> * This endpoint requires the <code>read:connections</code> scope and any one of <code>read:clients</code> or <code>read:client_summary</code>. * </li> * <li> * <b>Note</b>: The first time you call this endpoint, omit the <code>from</code> parameter. If there are more results, a <code>next</code> value is included in the response. You can use this for subsequent API calls. When <code>next</code> is no longer included in the response, no further results are remaining. * </li> * </ul> * * Get enabled connections for a client * * @throws {RequiredError} */ async getEnabledConnections(requestParameters, initOverrides) { runtime.validateRequiredRequestParams(requestParameters, ['client_id']); const queryParameters = runtime.applyQueryParams(requestParameters, [ { key: 'strategy', config: { isArray: true, isCollectionFormatMulti: true, }, }, { key: 'from', config: {}, }, { key: 'take', config: {}, }, { key: 'fields', config: {}, }, { key: 'include_fields', config: {}, }, ]); const response = await this.request({ path: `/clients/{client_id}/connections`.replace('{client_id}', encodeURIComponent(String(requestParameters.client_id))), method: 'GET', query: queryParameters, }, initOverrides); return runtime.JSONApiResponse.fromResponse(response); } async getAll(requestParameters = {}, initOverrides) { const queryParameters = runtime.applyQueryParams(requestParameters, [ { key: 'fields', config: {}, }, { key: 'include_fields', config: {}, }, { key: 'page', config: {}, }, { key: 'per_page', config: {}, }, { key: 'include_totals', config: {}, }, { key: 'from', config: {}, }, { key: 'take', config: {}, }, { key: 'is_global', config: {}, }, { key: 'is_first_party', config: {}, }, { key: 'app_type', config: {}, }, { key: 'client_ids', config: {}, }, { key: 'q', config: {}, }, ]); const response = await this.request({ path: `/clients`, method: 'GET', query: queryParameters, }, initOverrides); return runtime.JSONApiResponse.fromResponse(response); } /** * Retrieve client details by ID. Clients are SSO connections or Applications linked with your Auth0 tenant. A list of fields to include or exclude may also be specified. * For more information, read <a href="https://www.auth0.com/docs/get-started/applications"> Applications in Auth0</a> and <a href="https://www.auth0.com/docs/authenticate/single-sign-on"> Single Sign-On</a>. * <ul> * <li> * The following properties can be retrieved with any of the scopes: * <code>client_id</code>, <code>app_type</code>, <code>name</code>, and <code>description</code>. * </li> * <li> * The following properties can only be retrieved with the <code>read:clients</code> or * <code>read:client_keys</code> scopes: * <code>callbacks</code>, <code>oidc_logout</code>, <code>allowed_origins</code>, * <code>web_origins</code>, <code>tenant</code>, <code>global</code>, <code>config_route</code>, * <code>callback_url_template</code>, <code>jwt_configuration</code>, * <code>jwt_configuration.lifetime_in_seconds</code>, <code>jwt_configuration.secret_encoded</code>, * <code>jwt_configuration.scopes</code>, <code>jwt_configuration.alg</code>, <code>api_type</code>, * <code>logo_uri</code>, <code>allowed_clients</code>, <code>owners</code>, <code>custom_login_page</code>, * <code>custom_login_page_off</code>, <code>sso</code>, <code>addons</code>, <code>form_template</code>, * <code>custom_login_page_codeview</code>, <code>resource_servers</code>, <code>client_metadata</code>, * <code>mobile</code>, <code>mobile.android</code>, <code>mobile.ios</code>, <code>allowed_logout_urls</code>, * <code>token_endpoint_auth_method</code>, <code>is_first_party</code>, <code>oidc_conformant</code>, * <code>is_token_endpoint_ip_header_trusted</code>, <code>initiate_login_uri</code>, <code>grant_types</code>, * <code>refresh_token</code>, <code>refresh_token.rotation_type</code>, <code>refresh_token.expiration_type</code>, * <code>refresh_token.leeway</code>, <code>refresh_token.token_lifetime</code>, <code>refresh_token.policies</code>, <code>organization_usage</code>, * <code>organization_require_behavior</code>. * </li> * <li> * The following properties can only be retrieved with the <code>read:client_keys</code> or <code>read:client_credentials</code> scopes: * <code>encryption_key</code>, <code>encryption_key.pub</code>, <code>encryption_key.cert</code>, * <code>client_secret</code>, <code>client_authentication_methods</code> and <code>signing_key</code>. * </li> * </ul> * * Get client by ID * * @throws {RequiredError} */ async get(requestParameters, initOverrides) { runtime.validateRequiredRequestParams(requestParameters, ['client_id']); const queryParameters = runtime.applyQueryParams(requestParameters, [ { key: 'fields', config: {}, }, { key: 'include_fields', config: {}, }, ]); const response = await this.request({ path: `/clients/{client_id}`.replace('{client_id}', encodeURIComponent(String(requestParameters.client_id))), method: 'GET', query: queryParameters, }, initOverrides); return runtime.JSONApiResponse.fromResponse(response); } /** * Get the details of a client credential. * * <b>Important</b>: To enable credentials to be used for Private Key JWT authentication method, set the <code>client_authentication_methods</code> property on the client. * Get client credentials * * @throws {RequiredError} */ async getCredentials(requestParameters, initOverrides) { runtime.validateRequiredRequestParams(requestParameters, ['client_id']); const response = await this.request({ path: `/clients/{client_id}/credentials`.replace('{client_id}', encodeURIComponent(String(requestParameters.client_id))), method: 'GET', }, initOverrides); return runtime.JSONApiResponse.fromResponse(response); } /** * Get the details of a client credential. * * <b>Important</b>: To enable credentials to be used for Private Key JWT authentication method, set the <code>client_authentication_methods</code> property on the client. * Get client credential details * * @throws {RequiredError} */ async getCredential(requestParameters, initOverrides) { runtime.validateRequiredRequestParams(requestParameters, ['client_id', 'credential_id']); const response = await this.request({ path: `/clients/{client_id}/credentials/{credential_id}` .replace('{client_id}', encodeURIComponent(String(requestParameters.client_id))) .replace('{credential_id}', encodeURIComponent(String(requestParameters.credential_id))), method: 'GET', }, initOverrides); return runtime.JSONApiResponse.fromResponse(response); } /** * Updates a client's settings. For more information, read <a href="https://www.auth0.com/docs/get-started/applications"> Applications in Auth0</a> and <a href="https://www.auth0.com/docs/authenticate/single-sign-on"> Single Sign-On</a>. * * Notes: * - The `client_secret` and `signing_key` attributes can only be updated with the `update:client_keys` scope. * - The <code>client_authentication_methods</code> and <code>token_endpoint_auth_method</code> properties are mutually exclusive. Use * <code>client_authentication_methods</code> to configure the client with Private Key JWT authentication method. Otherwise, use <code>token_endpoint_auth_method</code> * to configure the client with client secret (basic or post) or with no authentication method (none). * - When using <code>client_authentication_methods</code> to configure the client with Private Key JWT authentication method, only specify the credential IDs * that were generated when creating the credentials on the client. * - To configure <code>client_authentication_methods</code>, the <code>update:client_credentials</code> scope is required. * - To configure <code>client_authentication_methods</code>, the property <code>jwt_configuration.alg</code> must be set to RS256. * Update a client * * @throws {RequiredError} */ async update(requestParameters, bodyParameters, initOverrides) { runtime.validateRequiredRequestParams(requestParameters, ['client_id']); const headerParameters = {}; headerParameters['Content-Type'] = 'application/json'; const response = await this.request({ path: `/clients/{client_id}`.replace('{client_id}', encodeURIComponent(String(requestParameters.client_id))), method: 'PATCH', headers: headerParameters, body: bodyParameters, }, initOverrides); return runtime.JSONApiResponse.fromResponse(response); } /** * Change a client credential you previously created. May be enabled or disabled. For more information, read <a href="https://www.auth0.com/docs/get-started/authentication-and-authorization-flow/client-credentials-flow">Client Credential Flow</a>. * Update a client credential * * @throws {RequiredError} */ async updateCredential(requestParameters, bodyParameters, initOverrides) { runtime.validateRequiredRequestParams(requestParameters, ['client_id', 'credential_id']); const headerParameters = {}; headerParameters['Content-Type'] = 'application/json'; const response = await this.request({ path: `/clients/{client_id}/credentials/{credential_id}` .replace('{client_id}', encodeURIComponent(String(requestParameters.client_id))) .replace('{credential_id}', encodeURIComponent(String(requestParameters.credential_id))), method: 'PATCH', headers: headerParameters, body: bodyParameters, }, initOverrides); return runtime.JSONApiResponse.fromResponse(response); } /** * Create a new client (application or SSO integration). For more information, read <a href="https://www.auth0.com/docs/get-started/auth0-overview/create-applications">Create Applications</a> * <a href="https://www.auth0.com/docs/authenticate/single-sign-on/api-endpoints-for-single-sign-on>">API Endpoints for Single Sign-On</a>. * * Notes: * - We recommend leaving the `client_secret` parameter unspecified to allow the generation of a safe secret. * - The <code>client_authentication_methods</code> and <code>token_endpoint_auth_method</code> properties are mutually exclusive. Use * <code>client_authentication_methods</code> to configure the client with Private Key JWT authentication method. Otherwise, use <code>token_endpoint_auth_method</code> * to configure the client with client secret (basic or post) or with no authentication method (none). * - When using <code>client_authentication_methods</code> to configure the client with Private Key JWT authentication method, specify fully defined credentials. * These credentials will be automatically enabled for Private Key JWT authentication on the client. * - To configure <code>client_authentication_methods</code>, the <code>create:client_credentials</code> scope is required. * - To configure <code>client_authentication_methods</code>, the property <code>jwt_configuration.alg</code> must be set to RS256. * * <div class="alert alert-warning">SSO Integrations created via this endpoint will accept login requests and share user profile information.</div> * * Create a client * * @throws {RequiredError} */ async create(bodyParameters, initOverrides) { const headerParameters = {}; headerParameters['Content-Type'] = 'application/json'; const response = await this.request({ path: `/clients`, method: 'POST', headers: headerParameters, body: bodyParameters, }, initOverrides); return runtime.JSONApiResponse.fromResponse(response); } /** * Create a client credential associated to your application. The credential will be created but not yet enabled for use with Private Key JWT authentication method. To enable the credential, set the <code>client_authentication_methods</code> property on the client. * For more information, read <a href="https://www.auth0.com//docs/get-started/applications/configure-private-key-jwt">Configure Private Key JWT Authentication</a>. * Create a client credential * * @throws {RequiredError} */ async createCredential(requestParameters, bodyParameters, initOverrides) { runtime.validateRequiredRequestParams(requestParameters, ['client_id']); const headerParameters = {}; headerParameters['Content-Type'] = 'application/json'; const response = await this.request({ path: `/clients/{client_id}/credentials`.replace('{client_id}', encodeURIComponent(String(requestParameters.client_id))), method: 'POST', headers: headerParameters, body: bodyParameters, }, initOverrides); return runtime.JSONApiResponse.fromResponse(response); } /** * Rotate a client secret. * * This endpoint cannot be used with clients configured with Private Key JWT authentication method (client_authentication_methods configured with private_key_jwt). * * Note: The generated secret is NOT base64 encoded. * * Rotate a client secret * * @throws {RequiredError} */ async rotateClientSecret(requestParameters, initOverrides) { runtime.validateRequiredRequestParams(requestParameters, ['client_id']); const response = await this.request({ path: `/clients/{client_id}/rotate-secret`.replace('{client_id}', encodeURIComponent(String(requestParameters.client_id))), method: 'POST', }, initOverrides); return runtime.JSONApiResponse.fromResponse(response); } } exports.ClientsManager = ClientsManager; //# sourceMappingURL=clients-manager.js.map