From ebae98d7efeffd98988c74423925fc505106f222 Mon Sep 17 00:00:00 2001 From: "fern-api[bot]" <115122769+fern-api[bot]@users.noreply.github.com> Date: Fri, 12 Dec 2025 04:48:53 +0000 Subject: [PATCH] SDK regeneration Unable to analyze changes with AI, incrementing PATCH version. --- changelog.md | 4 + package.json | 2 +- reference.md | 207 +------------ src/management/api/requests/requests.ts | 62 +--- .../resources/customDomains/client/Client.ts | 12 +- .../pushNotification/client/Client.ts | 273 +---------------- .../discoveryDomains/client/Client.ts | 4 +- src/management/api/types/types.ts | 56 +--- src/management/tests/wire/clients.test.ts | 28 -- .../tests/wire/customDomains.test.ts | 2 + .../guardian/factors/pushNotification.test.ts | 274 ++---------------- .../organizations/discoveryDomains.test.ts | 8 - src/management/version.ts | 2 +- yarn.lock | 12 +- 14 files changed, 94 insertions(+), 852 deletions(-) create mode 100644 changelog.md diff --git a/changelog.md b/changelog.md new file mode 100644 index 000000000..f7c69fdb4 --- /dev/null +++ b/changelog.md @@ -0,0 +1,4 @@ +## 5.2.1 - 2025-12-12 +* SDK regeneration +* Unable to analyze changes with AI, incrementing PATCH version. + diff --git a/package.json b/package.json index e909a17c7..c6201f110 100644 --- a/package.json +++ b/package.json @@ -1,6 +1,6 @@ { "name": "auth0", - "version": "5.2.0", + "version": "5.2.1", "private": false, "repository": { "type": "git", diff --git a/reference.md b/reference.md index 741fc2d86..a43c78164 100644 --- a/reference.md +++ b/reference.md @@ -2378,6 +2378,8 @@ Retrieve details on custom domai ```typescript await client.customDomains.list({ + take: 1, + from: "from", q: "q", fields: "fields", include_fields: true, @@ -17413,69 +17415,6 @@ await client.guardian.factors.pushNotification.getApnsProvider();
-Overwrite all configuration details of the multi-factor authentication APNS provider associated with your tenant. - -
-
- - - -#### 🔌 Usage - -
-
- -
-
- -```typescript -await client.guardian.factors.pushNotification.setApnsProvider(); -``` - -
-
-
-
- -#### ⚙️ Parameters - -
-
- -
-
- -**request:** `Management.SetGuardianFactorsProviderPushNotificationApnsRequestContent` - -
-
- -
-
- -**requestOptions:** `PushNotificationClient.RequestOptions` - -
-
-
-
- - - - - -
client.guardian.factors.pushNotification.updateApnsProvider({ ...params }) -> Management.UpdateGuardianFactorsProviderPushNotificationApnsResponseContent -
-
- -#### 📝 Description - -
-
- -
-
- Modify configuration details of the multi-factor authentication APNS provider associated with your tenant.
@@ -17492,7 +17431,7 @@ Modify configuration details of the multi-factor authentication APNS provider as
```typescript -await client.guardian.factors.pushNotification.updateApnsProvider(); +await client.guardian.factors.pushNotification.setApnsProvider({}); ```
@@ -17508,7 +17447,7 @@ await client.guardian.factors.pushNotification.updateApnsProvider();
-**request:** `Management.UpdateGuardianFactorsProviderPushNotificationApnsRequestContent` +**request:** `Management.SetGuardianFactorsProviderPushNotificationApnsRequestContent`
@@ -17539,69 +17478,6 @@ await client.guardian.factors.pushNotification.updateApnsProvider();
-Overwrite all configuration details of the multi-factor authentication FCM provider associated with your tenant. - -
-
-
-
- -#### 🔌 Usage - -
-
- -
-
- -```typescript -await client.guardian.factors.pushNotification.setFcmProvider(); -``` - -
-
-
-
- -#### ⚙️ Parameters - -
-
- -
-
- -**request:** `Management.SetGuardianFactorsProviderPushNotificationFcmRequestContent` - -
-
- -
-
- -**requestOptions:** `PushNotificationClient.RequestOptions` - -
-
-
-
- -
-
-
- -
client.guardian.factors.pushNotification.updateFcmProvider({ ...params }) -> Management.UpdateGuardianFactorsProviderPushNotificationFcmResponseContent -
-
- -#### 📝 Description - -
-
- -
-
- Modify configuration details of the multi-factor authentication FCM provider associated with your tenant.
@@ -17618,7 +17494,7 @@ Modify configuration details of the multi-factor authentication FCM provider ass
```typescript -await client.guardian.factors.pushNotification.updateFcmProvider(); +await client.guardian.factors.pushNotification.setFcmProvider({}); ```
@@ -17634,7 +17510,7 @@ await client.guardian.factors.pushNotification.updateFcmProvider();
-**request:** `Management.UpdateGuardianFactorsProviderPushNotificationFcmRequestContent` +**request:** `Management.SetGuardianFactorsProviderPushNotificationFcmRequestContent`
@@ -17665,69 +17541,6 @@ await client.guardian.factors.pushNotification.updateFcmProvider();
-Overwrite all configuration details of the multi-factor authentication FCMV1 provider associated with your tenant. - -
-
-
-
- -#### 🔌 Usage - -
-
- -
-
- -```typescript -await client.guardian.factors.pushNotification.setFcmv1Provider(); -``` - -
-
-
-
- -#### ⚙️ Parameters - -
-
- -
-
- -**request:** `Management.SetGuardianFactorsProviderPushNotificationFcmv1RequestContent` - -
-
- -
-
- -**requestOptions:** `PushNotificationClient.RequestOptions` - -
-
-
-
- -
-
-
- -
client.guardian.factors.pushNotification.updateFcmv1Provider({ ...params }) -> Management.UpdateGuardianFactorsProviderPushNotificationFcmv1ResponseContent -
-
- -#### 📝 Description - -
-
- -
-
- Modify configuration details of the multi-factor authentication FCMV1 provider associated with your tenant.
@@ -17744,7 +17557,7 @@ Modify configuration details of the multi-factor authentication FCMV1 provider a
```typescript -await client.guardian.factors.pushNotification.updateFcmv1Provider(); +await client.guardian.factors.pushNotification.setFcmv1Provider({}); ```
@@ -17760,7 +17573,7 @@ await client.guardian.factors.pushNotification.updateFcmv1Provider();
-**request:** `Management.UpdateGuardianFactorsProviderPushNotificationFcmv1RequestContent` +**request:** `Management.SetGuardianFactorsProviderPushNotificationFcmv1RequestContent`
@@ -20355,7 +20168,7 @@ const response = page.response;
-Update the verification status and/or use_for_organization_discovery for an organization discovery domain. The status field must be either pending or verified. The use_for_organization_discovery field can be true or false (default: true). +Update the verification status for an organization discovery domain. The status field must be either pending or verified.
@@ -20570,7 +20383,7 @@ await client.organizations.discoveryDomains.delete("id", "discovery_domain_id");
-Update the verification status and/or use_for_organization_discovery for an organization discovery domain. The status field must be either pending or verified. The use_for_organization_discovery field can be true or false (default: true). +Update the verification status for an organization discovery domain. The status field must be either pending or verified.
diff --git a/src/management/api/requests/requests.ts b/src/management/api/requests/requests.ts index 5fab41ff7..96a884f84 100644 --- a/src/management/api/requests/requests.ts +++ b/src/management/api/requests/requests.ts @@ -533,6 +533,8 @@ export interface UpdateConnectionRequestContent { /** * @example * { + * take: 1, + * from: "from", * q: "q", * fields: "fields", * include_fields: true, @@ -540,6 +542,10 @@ export interface UpdateConnectionRequestContent { * } */ export interface ListCustomDomainsRequestParameters { + /** Number of results per page. Defaults to 50. */ + take?: number | null; + /** Optional Id from which to start selection. */ + from?: string | null; /** Query in Lucene query string syntax. */ q?: string | null; /** Comma-separated list of fields to include or exclude (based on value provided for include_fields) in the result. Leave empty to retrieve all fields. */ @@ -2543,58 +2549,6 @@ export interface SetGuardianFactorPhoneTemplatesRequestContent { verification_message: string; } -/** - * @example - * {} - */ -export interface SetGuardianFactorsProviderPushNotificationApnsRequestContent { - sandbox?: boolean; - bundle_id?: string | null; - p12?: string | null; -} - -/** - * @example - * {} - */ -export interface UpdateGuardianFactorsProviderPushNotificationApnsRequestContent { - sandbox?: boolean; - bundle_id?: string | null; - p12?: string | null; -} - -/** - * @example - * {} - */ -export interface SetGuardianFactorsProviderPushNotificationFcmRequestContent { - server_key?: string | null; -} - -/** - * @example - * {} - */ -export interface UpdateGuardianFactorsProviderPushNotificationFcmRequestContent { - server_key?: string | null; -} - -/** - * @example - * {} - */ -export interface SetGuardianFactorsProviderPushNotificationFcmv1RequestContent { - server_credentials?: string | null; -} - -/** - * @example - * {} - */ -export interface UpdateGuardianFactorsProviderPushNotificationFcmv1RequestContent { - server_credentials?: string | null; -} - /** * @example * {} @@ -2848,8 +2802,6 @@ export interface CreateOrganizationDiscoveryDomainRequestContent { /** The domain name to associate with the organization e.g. acme.com. */ domain: string; status?: Management.OrganizationDiscoveryDomainStatus; - /** Indicates whether this discovery domain should be used for organization discovery. */ - use_for_organization_discovery?: boolean; } /** @@ -2858,8 +2810,6 @@ export interface CreateOrganizationDiscoveryDomainRequestContent { */ export interface UpdateOrganizationDiscoveryDomainRequestContent { status?: Management.OrganizationDiscoveryDomainStatus; - /** Indicates whether this discovery domain should be used for organization discovery. */ - use_for_organization_discovery?: boolean; } /** diff --git a/src/management/api/resources/customDomains/client/Client.ts b/src/management/api/resources/customDomains/client/Client.ts index b23fd130c..de568d49b 100644 --- a/src/management/api/resources/customDomains/client/Client.ts +++ b/src/management/api/resources/customDomains/client/Client.ts @@ -34,6 +34,8 @@ export class CustomDomainsClient { * * @example * await client.customDomains.list({ + * take: 1, + * from: "from", * q: "q", * fields: "fields", * include_fields: true, @@ -51,8 +53,16 @@ export class CustomDomainsClient { request: Management.ListCustomDomainsRequestParameters = {}, requestOptions?: CustomDomainsClient.RequestOptions, ): Promise> { - const { q, fields, include_fields: includeFields, sort } = request; + const { take = 50, from: from_, q, fields, include_fields: includeFields, sort } = request; const _queryParams: Record = {}; + if (take !== undefined) { + _queryParams["take"] = take?.toString() ?? null; + } + + if (from_ !== undefined) { + _queryParams["from"] = from_; + } + if (q !== undefined) { _queryParams["q"] = q; } diff --git a/src/management/api/resources/guardian/resources/factors/resources/pushNotification/client/Client.ts b/src/management/api/resources/guardian/resources/factors/resources/pushNotification/client/Client.ts index 61934a05e..f5451c2ef 100644 --- a/src/management/api/resources/guardian/resources/factors/resources/pushNotification/client/Client.ts +++ b/src/management/api/resources/guardian/resources/factors/resources/pushNotification/client/Client.ts @@ -101,7 +101,7 @@ export class PushNotificationClient { } /** - * Overwrite all configuration details of the multi-factor authentication APNS provider associated with your tenant. + * Modify configuration details of the multi-factor authentication APNS provider associated with your tenant. * * @param {Management.SetGuardianFactorsProviderPushNotificationApnsRequestContent} request * @param {PushNotificationClient.RequestOptions} requestOptions - Request-specific configuration. @@ -111,100 +111,19 @@ export class PushNotificationClient { * @throws {@link Management.ForbiddenError} * * @example - * await client.guardian.factors.pushNotification.setApnsProvider() + * await client.guardian.factors.pushNotification.setApnsProvider({}) */ public setApnsProvider( - request: Management.SetGuardianFactorsProviderPushNotificationApnsRequestContent = {}, + request: Management.SetGuardianFactorsProviderPushNotificationApnsRequestContent, requestOptions?: PushNotificationClient.RequestOptions, ): core.HttpResponsePromise { return core.HttpResponsePromise.fromPromise(this.__setApnsProvider(request, requestOptions)); } private async __setApnsProvider( - request: Management.SetGuardianFactorsProviderPushNotificationApnsRequestContent = {}, + request: Management.SetGuardianFactorsProviderPushNotificationApnsRequestContent, requestOptions?: PushNotificationClient.RequestOptions, ): Promise> { - const _authRequest: core.AuthRequest = await this._options.authProvider.getAuthRequest(); - let _headers: core.Fetcher.Args["headers"] = mergeHeaders( - _authRequest.headers, - this._options?.headers, - requestOptions?.headers, - ); - const _response = await (this._options.fetcher ?? core.fetcher)({ - url: core.url.join( - (await core.Supplier.get(this._options.baseUrl)) ?? - (await core.Supplier.get(this._options.environment)) ?? - environments.ManagementEnvironment.Default, - "guardian/factors/push-notification/providers/apns", - ), - method: "PUT", - headers: _headers, - contentType: "application/json", - queryParameters: requestOptions?.queryParams, - requestType: "json", - body: request, - timeoutMs: (requestOptions?.timeoutInSeconds ?? this._options?.timeoutInSeconds ?? 60) * 1000, - maxRetries: requestOptions?.maxRetries ?? this._options?.maxRetries, - abortSignal: requestOptions?.abortSignal, - fetchFn: this._options?.fetch, - logging: this._options.logging, - }); - if (_response.ok) { - return { - data: _response.body as Management.SetGuardianFactorsProviderPushNotificationApnsResponseContent, - rawResponse: _response.rawResponse, - }; - } - - if (_response.error.reason === "status-code") { - switch (_response.error.statusCode) { - case 400: - throw new Management.BadRequestError(_response.error.body as unknown, _response.rawResponse); - case 401: - throw new Management.UnauthorizedError(_response.error.body as unknown, _response.rawResponse); - case 403: - throw new Management.ForbiddenError(_response.error.body as unknown, _response.rawResponse); - default: - throw new errors.ManagementError({ - statusCode: _response.error.statusCode, - body: _response.error.body, - rawResponse: _response.rawResponse, - }); - } - } - - return handleNonStatusCodeError( - _response.error, - _response.rawResponse, - "PUT", - "/guardian/factors/push-notification/providers/apns", - ); - } - - /** - * Modify configuration details of the multi-factor authentication APNS provider associated with your tenant. - * - * @param {Management.UpdateGuardianFactorsProviderPushNotificationApnsRequestContent} request - * @param {PushNotificationClient.RequestOptions} requestOptions - Request-specific configuration. - * - * @throws {@link Management.BadRequestError} - * @throws {@link Management.UnauthorizedError} - * @throws {@link Management.ForbiddenError} - * - * @example - * await client.guardian.factors.pushNotification.updateApnsProvider() - */ - public updateApnsProvider( - request: Management.UpdateGuardianFactorsProviderPushNotificationApnsRequestContent = {}, - requestOptions?: PushNotificationClient.RequestOptions, - ): core.HttpResponsePromise { - return core.HttpResponsePromise.fromPromise(this.__updateApnsProvider(request, requestOptions)); - } - - private async __updateApnsProvider( - request: Management.UpdateGuardianFactorsProviderPushNotificationApnsRequestContent = {}, - requestOptions?: PushNotificationClient.RequestOptions, - ): Promise> { const _authRequest: core.AuthRequest = await this._options.authProvider.getAuthRequest(); let _headers: core.Fetcher.Args["headers"] = mergeHeaders( _authRequest.headers, @@ -232,7 +151,7 @@ export class PushNotificationClient { }); if (_response.ok) { return { - data: _response.body as Management.UpdateGuardianFactorsProviderPushNotificationApnsResponseContent, + data: _response.body as Management.SetGuardianFactorsProviderPushNotificationApnsResponseContent, rawResponse: _response.rawResponse, }; } @@ -263,7 +182,7 @@ export class PushNotificationClient { } /** - * Overwrite all configuration details of the multi-factor authentication FCM provider associated with your tenant. + * Modify configuration details of the multi-factor authentication FCM provider associated with your tenant. * * @param {Management.SetGuardianFactorsProviderPushNotificationFcmRequestContent} request * @param {PushNotificationClient.RequestOptions} requestOptions - Request-specific configuration. @@ -273,100 +192,19 @@ export class PushNotificationClient { * @throws {@link Management.ForbiddenError} * * @example - * await client.guardian.factors.pushNotification.setFcmProvider() + * await client.guardian.factors.pushNotification.setFcmProvider({}) */ public setFcmProvider( - request: Management.SetGuardianFactorsProviderPushNotificationFcmRequestContent = {}, + request: Management.SetGuardianFactorsProviderPushNotificationFcmRequestContent, requestOptions?: PushNotificationClient.RequestOptions, ): core.HttpResponsePromise { return core.HttpResponsePromise.fromPromise(this.__setFcmProvider(request, requestOptions)); } private async __setFcmProvider( - request: Management.SetGuardianFactorsProviderPushNotificationFcmRequestContent = {}, + request: Management.SetGuardianFactorsProviderPushNotificationFcmRequestContent, requestOptions?: PushNotificationClient.RequestOptions, ): Promise> { - const _authRequest: core.AuthRequest = await this._options.authProvider.getAuthRequest(); - let _headers: core.Fetcher.Args["headers"] = mergeHeaders( - _authRequest.headers, - this._options?.headers, - requestOptions?.headers, - ); - const _response = await (this._options.fetcher ?? core.fetcher)({ - url: core.url.join( - (await core.Supplier.get(this._options.baseUrl)) ?? - (await core.Supplier.get(this._options.environment)) ?? - environments.ManagementEnvironment.Default, - "guardian/factors/push-notification/providers/fcm", - ), - method: "PUT", - headers: _headers, - contentType: "application/json", - queryParameters: requestOptions?.queryParams, - requestType: "json", - body: request, - timeoutMs: (requestOptions?.timeoutInSeconds ?? this._options?.timeoutInSeconds ?? 60) * 1000, - maxRetries: requestOptions?.maxRetries ?? this._options?.maxRetries, - abortSignal: requestOptions?.abortSignal, - fetchFn: this._options?.fetch, - logging: this._options.logging, - }); - if (_response.ok) { - return { - data: _response.body as Management.SetGuardianFactorsProviderPushNotificationFcmResponseContent, - rawResponse: _response.rawResponse, - }; - } - - if (_response.error.reason === "status-code") { - switch (_response.error.statusCode) { - case 400: - throw new Management.BadRequestError(_response.error.body as unknown, _response.rawResponse); - case 401: - throw new Management.UnauthorizedError(_response.error.body as unknown, _response.rawResponse); - case 403: - throw new Management.ForbiddenError(_response.error.body as unknown, _response.rawResponse); - default: - throw new errors.ManagementError({ - statusCode: _response.error.statusCode, - body: _response.error.body, - rawResponse: _response.rawResponse, - }); - } - } - - return handleNonStatusCodeError( - _response.error, - _response.rawResponse, - "PUT", - "/guardian/factors/push-notification/providers/fcm", - ); - } - - /** - * Modify configuration details of the multi-factor authentication FCM provider associated with your tenant. - * - * @param {Management.UpdateGuardianFactorsProviderPushNotificationFcmRequestContent} request - * @param {PushNotificationClient.RequestOptions} requestOptions - Request-specific configuration. - * - * @throws {@link Management.BadRequestError} - * @throws {@link Management.UnauthorizedError} - * @throws {@link Management.ForbiddenError} - * - * @example - * await client.guardian.factors.pushNotification.updateFcmProvider() - */ - public updateFcmProvider( - request: Management.UpdateGuardianFactorsProviderPushNotificationFcmRequestContent = {}, - requestOptions?: PushNotificationClient.RequestOptions, - ): core.HttpResponsePromise { - return core.HttpResponsePromise.fromPromise(this.__updateFcmProvider(request, requestOptions)); - } - - private async __updateFcmProvider( - request: Management.UpdateGuardianFactorsProviderPushNotificationFcmRequestContent = {}, - requestOptions?: PushNotificationClient.RequestOptions, - ): Promise> { const _authRequest: core.AuthRequest = await this._options.authProvider.getAuthRequest(); let _headers: core.Fetcher.Args["headers"] = mergeHeaders( _authRequest.headers, @@ -394,7 +232,7 @@ export class PushNotificationClient { }); if (_response.ok) { return { - data: _response.body as Management.UpdateGuardianFactorsProviderPushNotificationFcmResponseContent, + data: _response.body as Management.SetGuardianFactorsProviderPushNotificationFcmResponseContent, rawResponse: _response.rawResponse, }; } @@ -425,7 +263,7 @@ export class PushNotificationClient { } /** - * Overwrite all configuration details of the multi-factor authentication FCMV1 provider associated with your tenant. + * Modify configuration details of the multi-factor authentication FCMV1 provider associated with your tenant. * * @param {Management.SetGuardianFactorsProviderPushNotificationFcmv1RequestContent} request * @param {PushNotificationClient.RequestOptions} requestOptions - Request-specific configuration. @@ -435,100 +273,19 @@ export class PushNotificationClient { * @throws {@link Management.ForbiddenError} * * @example - * await client.guardian.factors.pushNotification.setFcmv1Provider() + * await client.guardian.factors.pushNotification.setFcmv1Provider({}) */ public setFcmv1Provider( - request: Management.SetGuardianFactorsProviderPushNotificationFcmv1RequestContent = {}, + request: Management.SetGuardianFactorsProviderPushNotificationFcmv1RequestContent, requestOptions?: PushNotificationClient.RequestOptions, ): core.HttpResponsePromise { return core.HttpResponsePromise.fromPromise(this.__setFcmv1Provider(request, requestOptions)); } private async __setFcmv1Provider( - request: Management.SetGuardianFactorsProviderPushNotificationFcmv1RequestContent = {}, + request: Management.SetGuardianFactorsProviderPushNotificationFcmv1RequestContent, requestOptions?: PushNotificationClient.RequestOptions, ): Promise> { - const _authRequest: core.AuthRequest = await this._options.authProvider.getAuthRequest(); - let _headers: core.Fetcher.Args["headers"] = mergeHeaders( - _authRequest.headers, - this._options?.headers, - requestOptions?.headers, - ); - const _response = await (this._options.fetcher ?? core.fetcher)({ - url: core.url.join( - (await core.Supplier.get(this._options.baseUrl)) ?? - (await core.Supplier.get(this._options.environment)) ?? - environments.ManagementEnvironment.Default, - "guardian/factors/push-notification/providers/fcmv1", - ), - method: "PUT", - headers: _headers, - contentType: "application/json", - queryParameters: requestOptions?.queryParams, - requestType: "json", - body: request, - timeoutMs: (requestOptions?.timeoutInSeconds ?? this._options?.timeoutInSeconds ?? 60) * 1000, - maxRetries: requestOptions?.maxRetries ?? this._options?.maxRetries, - abortSignal: requestOptions?.abortSignal, - fetchFn: this._options?.fetch, - logging: this._options.logging, - }); - if (_response.ok) { - return { - data: _response.body as Management.SetGuardianFactorsProviderPushNotificationFcmv1ResponseContent, - rawResponse: _response.rawResponse, - }; - } - - if (_response.error.reason === "status-code") { - switch (_response.error.statusCode) { - case 400: - throw new Management.BadRequestError(_response.error.body as unknown, _response.rawResponse); - case 401: - throw new Management.UnauthorizedError(_response.error.body as unknown, _response.rawResponse); - case 403: - throw new Management.ForbiddenError(_response.error.body as unknown, _response.rawResponse); - default: - throw new errors.ManagementError({ - statusCode: _response.error.statusCode, - body: _response.error.body, - rawResponse: _response.rawResponse, - }); - } - } - - return handleNonStatusCodeError( - _response.error, - _response.rawResponse, - "PUT", - "/guardian/factors/push-notification/providers/fcmv1", - ); - } - - /** - * Modify configuration details of the multi-factor authentication FCMV1 provider associated with your tenant. - * - * @param {Management.UpdateGuardianFactorsProviderPushNotificationFcmv1RequestContent} request - * @param {PushNotificationClient.RequestOptions} requestOptions - Request-specific configuration. - * - * @throws {@link Management.BadRequestError} - * @throws {@link Management.UnauthorizedError} - * @throws {@link Management.ForbiddenError} - * - * @example - * await client.guardian.factors.pushNotification.updateFcmv1Provider() - */ - public updateFcmv1Provider( - request: Management.UpdateGuardianFactorsProviderPushNotificationFcmv1RequestContent = {}, - requestOptions?: PushNotificationClient.RequestOptions, - ): core.HttpResponsePromise { - return core.HttpResponsePromise.fromPromise(this.__updateFcmv1Provider(request, requestOptions)); - } - - private async __updateFcmv1Provider( - request: Management.UpdateGuardianFactorsProviderPushNotificationFcmv1RequestContent = {}, - requestOptions?: PushNotificationClient.RequestOptions, - ): Promise> { const _authRequest: core.AuthRequest = await this._options.authProvider.getAuthRequest(); let _headers: core.Fetcher.Args["headers"] = mergeHeaders( _authRequest.headers, @@ -556,7 +313,7 @@ export class PushNotificationClient { }); if (_response.ok) { return { - data: _response.body as Management.UpdateGuardianFactorsProviderPushNotificationFcmv1ResponseContent, + data: _response.body as Management.SetGuardianFactorsProviderPushNotificationFcmv1ResponseContent, rawResponse: _response.rawResponse, }; } diff --git a/src/management/api/resources/organizations/resources/discoveryDomains/client/Client.ts b/src/management/api/resources/organizations/resources/discoveryDomains/client/Client.ts index 26cd37a39..f70912a91 100644 --- a/src/management/api/resources/organizations/resources/discoveryDomains/client/Client.ts +++ b/src/management/api/resources/organizations/resources/discoveryDomains/client/Client.ts @@ -142,7 +142,7 @@ export class DiscoveryDomainsClient { } /** - * Update the verification status and/or use_for_organization_discovery for an organization discovery domain. The status field must be either pending or verified. The use_for_organization_discovery field can be true or false (default: true). + * Update the verification status for an organization discovery domain. The status field must be either pending or verified. * * @param {string} id - ID of the organization. * @param {Management.CreateOrganizationDiscoveryDomainRequestContent} request @@ -405,7 +405,7 @@ export class DiscoveryDomainsClient { } /** - * Update the verification status and/or use_for_organization_discovery for an organization discovery domain. The status field must be either pending or verified. The use_for_organization_discovery field can be true or false (default: true). + * Update the verification status for an organization discovery domain. The status field must be either pending or verified. * * @param {string} id - ID of the organization. * @param {string} discovery_domain_id - ID of the discovery domain to update. diff --git a/src/management/api/types/types.ts b/src/management/api/types/types.ts index 82c359bc8..5a1c7a0f1 100644 --- a/src/management/api/types/types.ts +++ b/src/management/api/types/types.ts @@ -2687,15 +2687,6 @@ export interface ClientRefreshTokenConfiguration { idle_token_lifetime?: number; /** Prevents tokens from expiring without use when `true` (takes precedence over `idle_token_lifetime` values) */ infinite_idle_token_lifetime?: boolean; - /** A collection of policies governing multi-resource refresh token exchange (MRRT), defining how refresh tokens can be used across different resource servers */ - policies?: Management.ClientRefreshTokenPolicy[]; -} - -export interface ClientRefreshTokenPolicy { - /** The identifier of the resource server to which the Multi Resource Refresh Token Policy applies */ - audience: string; - /** The resource server permissions granted under the Multi Resource Refresh Token Policy, defining the context in which an access token can be used */ - scope: string[]; } export const ClientSessionTransferAllowedAuthenticationMethodsEnum = { @@ -3654,7 +3645,7 @@ export type ConnectionOptionsBitly = Management.ConnectionOptionsOAuth2Common; export type ConnectionOptionsBox = Management.ConnectionOptionsOAuth2Common; /** - * Common attributes for connection options including non-persistent attributes and Cross App Access + * Common attributes for connection options including non-persistent attributes and cross-app access */ export interface ConnectionOptionsCommon { non_persistent_attrs?: Management.ConnectionNonPersistentAttrs; @@ -6775,8 +6766,6 @@ export interface CreateOrganizationDiscoveryDomainResponseContent { /** The domain name to associate with the organization e.g. acme.com. */ domain: string; status: Management.OrganizationDiscoveryDomainStatus; - /** Indicates whether this domain should be used for organization discovery. Note: This field is only returned when the ss_org_dove_enabled feature flag is enabled for the tenant. */ - use_for_organization_discovery?: boolean; /** A unique token generated for the discovery domain. This must be placed in a DNS TXT record at the location specified by the verification_host field to prove domain ownership. */ verification_txt: string; /** The full domain where the TXT record should be added. */ @@ -11375,28 +11364,12 @@ export interface GetOrganizationConnectionResponseContent { connection?: Management.OrganizationConnectionInformation; } -export interface GetOrganizationDiscoveryDomainByNameResponseContent { - /** Organization discovery domain identifier. */ - id: string; - /** The domain name to associate with the organization e.g. acme.com. */ - domain: string; - status: Management.OrganizationDiscoveryDomainStatus; - /** Indicates whether this domain should be used for organization discovery. Note: This field is only returned when the ss_org_dove_enabled feature flag is enabled for the tenant. */ - use_for_organization_discovery?: boolean; - /** A unique token generated for the discovery domain. This must be placed in a DNS TXT record at the location specified by the verification_host field to prove domain ownership. */ - verification_txt: string; - /** The full domain where the TXT record should be added. */ - verification_host: string; -} - export interface GetOrganizationDiscoveryDomainResponseContent { /** Organization discovery domain identifier. */ id: string; /** The domain name to associate with the organization e.g. acme.com. */ domain: string; status: Management.OrganizationDiscoveryDomainStatus; - /** Indicates whether this domain should be used for organization discovery. Note: This field is only returned when the ss_org_dove_enabled feature flag is enabled for the tenant. */ - use_for_organization_discovery?: boolean; /** A unique token generated for the discovery domain. This must be placed in a DNS TXT record at the location specified by the verification_host field to prove domain ownership. */ verification_txt: string; /** The full domain where the TXT record should be added. */ @@ -13378,8 +13351,6 @@ export interface OrganizationDiscoveryDomain { /** The domain name to associate with the organization e.g. acme.com. */ domain: string; status: Management.OrganizationDiscoveryDomainStatus; - /** Indicates whether this domain should be used for organization discovery. Note: This field is only returned when the ss_org_dove_enabled feature flag is enabled for the tenant. */ - use_for_organization_discovery?: boolean; /** A unique token generated for the discovery domain. This must be placed in a DNS TXT record at the location specified by the verification_host field to prove domain ownership. */ verification_txt: string; /** The full domain where the TXT record should be added. */ @@ -14778,13 +14749,27 @@ export interface SetGuardianFactorsProviderPhoneTwilioResponseContent { sid?: string | null; } +export interface SetGuardianFactorsProviderPushNotificationApnsRequestContent { + sandbox?: boolean; + bundle_id?: string | null; + p12?: string | null; +} + export interface SetGuardianFactorsProviderPushNotificationApnsResponseContent { sandbox?: boolean; bundle_id?: string | null; } +export interface SetGuardianFactorsProviderPushNotificationFcmRequestContent { + server_key?: string | null; +} + export type SetGuardianFactorsProviderPushNotificationFcmResponseContent = Record; +export interface SetGuardianFactorsProviderPushNotificationFcmv1RequestContent { + server_credentials?: string | null; +} + export type SetGuardianFactorsProviderPushNotificationFcmv1ResponseContent = Record; export interface SetGuardianFactorsProviderPushNotificationResponseContent { @@ -15891,15 +15876,6 @@ export interface UpdateGuardianFactorDuoSettingsResponseContent { host?: string; } -export interface UpdateGuardianFactorsProviderPushNotificationApnsResponseContent { - sandbox?: boolean; - bundle_id?: string | null; -} - -export type UpdateGuardianFactorsProviderPushNotificationFcmResponseContent = Record; - -export type UpdateGuardianFactorsProviderPushNotificationFcmv1ResponseContent = Record; - export interface UpdateGuardianFactorsProviderPushNotificationSnsResponseContent { aws_access_key_id?: string | null; aws_secret_access_key?: string | null; @@ -15969,8 +15945,6 @@ export interface UpdateOrganizationDiscoveryDomainResponseContent { /** The domain name to associate with the organization e.g. acme.com. */ domain: string; status: Management.OrganizationDiscoveryDomainStatus; - /** Indicates whether this domain should be used for organization discovery. Note: This field is only returned when the ss_org_dove_enabled feature flag is enabled for the tenant. */ - use_for_organization_discovery?: boolean; /** A unique token generated for the discovery domain. This must be placed in a DNS TXT record at the location specified by the verification_host field to prove domain ownership. */ verification_txt: string; /** The full domain where the TXT record should be added. */ diff --git a/src/management/tests/wire/clients.test.ts b/src/management/tests/wire/clients.test.ts index a39572e64..8927f0556 100644 --- a/src/management/tests/wire/clients.test.ts +++ b/src/management/tests/wire/clients.test.ts @@ -401,7 +401,6 @@ describe("ClientsClient", () => { infinite_token_lifetime: true, idle_token_lifetime: 1, infinite_idle_token_lifetime: true, - policies: [{ audience: "audience", scope: ["scope"] }], }, default_organization: { organization_id: "organization_id", flows: ["client_credentials"] }, organization_usage: "deny", @@ -681,12 +680,6 @@ describe("ClientsClient", () => { infinite_token_lifetime: true, idle_token_lifetime: 1, infinite_idle_token_lifetime: true, - policies: [ - { - audience: "audience", - scope: ["scope"], - }, - ], }, default_organization: { organization_id: "organization_id", @@ -1028,7 +1021,6 @@ describe("ClientsClient", () => { infinite_token_lifetime: true, idle_token_lifetime: 1, infinite_idle_token_lifetime: true, - policies: [{ audience: "audience", scope: ["scope"] }], }, default_organization: { organization_id: "organization_id", flows: ["client_credentials"] }, organization_usage: "deny", @@ -1302,12 +1294,6 @@ describe("ClientsClient", () => { infinite_token_lifetime: true, idle_token_lifetime: 1, infinite_idle_token_lifetime: true, - policies: [ - { - audience: "audience", - scope: ["scope"], - }, - ], }, default_organization: { organization_id: "organization_id", @@ -1662,7 +1648,6 @@ describe("ClientsClient", () => { infinite_token_lifetime: true, idle_token_lifetime: 1, infinite_idle_token_lifetime: true, - policies: [{ audience: "audience", scope: ["scope"] }], }, default_organization: { organization_id: "organization_id", flows: ["client_credentials"] }, organization_usage: "deny", @@ -1940,12 +1925,6 @@ describe("ClientsClient", () => { infinite_token_lifetime: true, idle_token_lifetime: 1, infinite_idle_token_lifetime: true, - policies: [ - { - audience: "audience", - scope: ["scope"], - }, - ], }, default_organization: { organization_id: "organization_id", @@ -2277,7 +2256,6 @@ describe("ClientsClient", () => { infinite_token_lifetime: true, idle_token_lifetime: 1, infinite_idle_token_lifetime: true, - policies: [{ audience: "audience", scope: ["scope"] }], }, default_organization: { organization_id: "organization_id", flows: ["client_credentials"] }, organization_usage: "deny", @@ -2554,12 +2532,6 @@ describe("ClientsClient", () => { infinite_token_lifetime: true, idle_token_lifetime: 1, infinite_idle_token_lifetime: true, - policies: [ - { - audience: "audience", - scope: ["scope"], - }, - ], }, default_organization: { organization_id: "organization_id", diff --git a/src/management/tests/wire/customDomains.test.ts b/src/management/tests/wire/customDomains.test.ts index 0d35b11f1..3973e0ae8 100644 --- a/src/management/tests/wire/customDomains.test.ts +++ b/src/management/tests/wire/customDomains.test.ts @@ -37,6 +37,8 @@ describe("CustomDomainsClient", () => { server.mockEndpoint().get("/custom-domains").respondWith().statusCode(200).jsonBody(rawResponseBody).build(); const response = await client.customDomains.list({ + take: 1, + from: "from", q: "q", fields: "fields", include_fields: true, diff --git a/src/management/tests/wire/guardian/factors/pushNotification.test.ts b/src/management/tests/wire/guardian/factors/pushNotification.test.ts index e25fd885f..db64d5ff4 100644 --- a/src/management/tests/wire/guardian/factors/pushNotification.test.ts +++ b/src/management/tests/wire/guardian/factors/pushNotification.test.ts @@ -81,84 +81,6 @@ describe("PushNotificationClient", () => { }); test("setApnsProvider (1)", async () => { - const server = mockServerPool.createServer(); - const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); - const rawRequestBody = {}; - const rawResponseBody = { sandbox: true, bundle_id: "bundle_id" }; - server - .mockEndpoint() - .put("/guardian/factors/push-notification/providers/apns") - .jsonBody(rawRequestBody) - .respondWith() - .statusCode(200) - .jsonBody(rawResponseBody) - .build(); - - const response = await client.guardian.factors.pushNotification.setApnsProvider(); - expect(response).toEqual({ - sandbox: true, - bundle_id: "bundle_id", - }); - }); - - test("setApnsProvider (2)", async () => { - const server = mockServerPool.createServer(); - const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); - const rawRequestBody = {}; - const rawResponseBody = { key: "value" }; - server - .mockEndpoint() - .put("/guardian/factors/push-notification/providers/apns") - .jsonBody(rawRequestBody) - .respondWith() - .statusCode(400) - .jsonBody(rawResponseBody) - .build(); - - await expect(async () => { - return await client.guardian.factors.pushNotification.setApnsProvider(); - }).rejects.toThrow(Management.BadRequestError); - }); - - test("setApnsProvider (3)", async () => { - const server = mockServerPool.createServer(); - const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); - const rawRequestBody = {}; - const rawResponseBody = { key: "value" }; - server - .mockEndpoint() - .put("/guardian/factors/push-notification/providers/apns") - .jsonBody(rawRequestBody) - .respondWith() - .statusCode(401) - .jsonBody(rawResponseBody) - .build(); - - await expect(async () => { - return await client.guardian.factors.pushNotification.setApnsProvider(); - }).rejects.toThrow(Management.UnauthorizedError); - }); - - test("setApnsProvider (4)", async () => { - const server = mockServerPool.createServer(); - const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); - const rawRequestBody = {}; - const rawResponseBody = { key: "value" }; - server - .mockEndpoint() - .put("/guardian/factors/push-notification/providers/apns") - .jsonBody(rawRequestBody) - .respondWith() - .statusCode(403) - .jsonBody(rawResponseBody) - .build(); - - await expect(async () => { - return await client.guardian.factors.pushNotification.setApnsProvider(); - }).rejects.toThrow(Management.ForbiddenError); - }); - - test("updateApnsProvider (1)", async () => { const server = mockServerPool.createServer(); const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); const rawRequestBody = {}; @@ -172,14 +94,14 @@ describe("PushNotificationClient", () => { .jsonBody(rawResponseBody) .build(); - const response = await client.guardian.factors.pushNotification.updateApnsProvider(); + const response = await client.guardian.factors.pushNotification.setApnsProvider({}); expect(response).toEqual({ sandbox: true, bundle_id: "bundle_id", }); }); - test("updateApnsProvider (2)", async () => { + test("setApnsProvider (2)", async () => { const server = mockServerPool.createServer(); const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); const rawRequestBody = {}; @@ -194,11 +116,11 @@ describe("PushNotificationClient", () => { .build(); await expect(async () => { - return await client.guardian.factors.pushNotification.updateApnsProvider(); + return await client.guardian.factors.pushNotification.setApnsProvider({}); }).rejects.toThrow(Management.BadRequestError); }); - test("updateApnsProvider (3)", async () => { + test("setApnsProvider (3)", async () => { const server = mockServerPool.createServer(); const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); const rawRequestBody = {}; @@ -213,11 +135,11 @@ describe("PushNotificationClient", () => { .build(); await expect(async () => { - return await client.guardian.factors.pushNotification.updateApnsProvider(); + return await client.guardian.factors.pushNotification.setApnsProvider({}); }).rejects.toThrow(Management.UnauthorizedError); }); - test("updateApnsProvider (4)", async () => { + test("setApnsProvider (4)", async () => { const server = mockServerPool.createServer(); const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); const rawRequestBody = {}; @@ -232,88 +154,11 @@ describe("PushNotificationClient", () => { .build(); await expect(async () => { - return await client.guardian.factors.pushNotification.updateApnsProvider(); + return await client.guardian.factors.pushNotification.setApnsProvider({}); }).rejects.toThrow(Management.ForbiddenError); }); test("setFcmProvider (1)", async () => { - const server = mockServerPool.createServer(); - const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); - const rawRequestBody = {}; - const rawResponseBody = { key: "value" }; - server - .mockEndpoint() - .put("/guardian/factors/push-notification/providers/fcm") - .jsonBody(rawRequestBody) - .respondWith() - .statusCode(200) - .jsonBody(rawResponseBody) - .build(); - - const response = await client.guardian.factors.pushNotification.setFcmProvider(); - expect(response).toEqual({ - key: "value", - }); - }); - - test("setFcmProvider (2)", async () => { - const server = mockServerPool.createServer(); - const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); - const rawRequestBody = {}; - const rawResponseBody = { key: "value" }; - server - .mockEndpoint() - .put("/guardian/factors/push-notification/providers/fcm") - .jsonBody(rawRequestBody) - .respondWith() - .statusCode(400) - .jsonBody(rawResponseBody) - .build(); - - await expect(async () => { - return await client.guardian.factors.pushNotification.setFcmProvider(); - }).rejects.toThrow(Management.BadRequestError); - }); - - test("setFcmProvider (3)", async () => { - const server = mockServerPool.createServer(); - const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); - const rawRequestBody = {}; - const rawResponseBody = { key: "value" }; - server - .mockEndpoint() - .put("/guardian/factors/push-notification/providers/fcm") - .jsonBody(rawRequestBody) - .respondWith() - .statusCode(401) - .jsonBody(rawResponseBody) - .build(); - - await expect(async () => { - return await client.guardian.factors.pushNotification.setFcmProvider(); - }).rejects.toThrow(Management.UnauthorizedError); - }); - - test("setFcmProvider (4)", async () => { - const server = mockServerPool.createServer(); - const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); - const rawRequestBody = {}; - const rawResponseBody = { key: "value" }; - server - .mockEndpoint() - .put("/guardian/factors/push-notification/providers/fcm") - .jsonBody(rawRequestBody) - .respondWith() - .statusCode(403) - .jsonBody(rawResponseBody) - .build(); - - await expect(async () => { - return await client.guardian.factors.pushNotification.setFcmProvider(); - }).rejects.toThrow(Management.ForbiddenError); - }); - - test("updateFcmProvider (1)", async () => { const server = mockServerPool.createServer(); const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); const rawRequestBody = {}; @@ -327,13 +172,13 @@ describe("PushNotificationClient", () => { .jsonBody(rawResponseBody) .build(); - const response = await client.guardian.factors.pushNotification.updateFcmProvider(); + const response = await client.guardian.factors.pushNotification.setFcmProvider({}); expect(response).toEqual({ key: "value", }); }); - test("updateFcmProvider (2)", async () => { + test("setFcmProvider (2)", async () => { const server = mockServerPool.createServer(); const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); const rawRequestBody = {}; @@ -348,11 +193,11 @@ describe("PushNotificationClient", () => { .build(); await expect(async () => { - return await client.guardian.factors.pushNotification.updateFcmProvider(); + return await client.guardian.factors.pushNotification.setFcmProvider({}); }).rejects.toThrow(Management.BadRequestError); }); - test("updateFcmProvider (3)", async () => { + test("setFcmProvider (3)", async () => { const server = mockServerPool.createServer(); const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); const rawRequestBody = {}; @@ -367,11 +212,11 @@ describe("PushNotificationClient", () => { .build(); await expect(async () => { - return await client.guardian.factors.pushNotification.updateFcmProvider(); + return await client.guardian.factors.pushNotification.setFcmProvider({}); }).rejects.toThrow(Management.UnauthorizedError); }); - test("updateFcmProvider (4)", async () => { + test("setFcmProvider (4)", async () => { const server = mockServerPool.createServer(); const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); const rawRequestBody = {}; @@ -386,88 +231,11 @@ describe("PushNotificationClient", () => { .build(); await expect(async () => { - return await client.guardian.factors.pushNotification.updateFcmProvider(); + return await client.guardian.factors.pushNotification.setFcmProvider({}); }).rejects.toThrow(Management.ForbiddenError); }); test("setFcmv1Provider (1)", async () => { - const server = mockServerPool.createServer(); - const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); - const rawRequestBody = {}; - const rawResponseBody = { key: "value" }; - server - .mockEndpoint() - .put("/guardian/factors/push-notification/providers/fcmv1") - .jsonBody(rawRequestBody) - .respondWith() - .statusCode(200) - .jsonBody(rawResponseBody) - .build(); - - const response = await client.guardian.factors.pushNotification.setFcmv1Provider(); - expect(response).toEqual({ - key: "value", - }); - }); - - test("setFcmv1Provider (2)", async () => { - const server = mockServerPool.createServer(); - const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); - const rawRequestBody = {}; - const rawResponseBody = { key: "value" }; - server - .mockEndpoint() - .put("/guardian/factors/push-notification/providers/fcmv1") - .jsonBody(rawRequestBody) - .respondWith() - .statusCode(400) - .jsonBody(rawResponseBody) - .build(); - - await expect(async () => { - return await client.guardian.factors.pushNotification.setFcmv1Provider(); - }).rejects.toThrow(Management.BadRequestError); - }); - - test("setFcmv1Provider (3)", async () => { - const server = mockServerPool.createServer(); - const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); - const rawRequestBody = {}; - const rawResponseBody = { key: "value" }; - server - .mockEndpoint() - .put("/guardian/factors/push-notification/providers/fcmv1") - .jsonBody(rawRequestBody) - .respondWith() - .statusCode(401) - .jsonBody(rawResponseBody) - .build(); - - await expect(async () => { - return await client.guardian.factors.pushNotification.setFcmv1Provider(); - }).rejects.toThrow(Management.UnauthorizedError); - }); - - test("setFcmv1Provider (4)", async () => { - const server = mockServerPool.createServer(); - const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); - const rawRequestBody = {}; - const rawResponseBody = { key: "value" }; - server - .mockEndpoint() - .put("/guardian/factors/push-notification/providers/fcmv1") - .jsonBody(rawRequestBody) - .respondWith() - .statusCode(403) - .jsonBody(rawResponseBody) - .build(); - - await expect(async () => { - return await client.guardian.factors.pushNotification.setFcmv1Provider(); - }).rejects.toThrow(Management.ForbiddenError); - }); - - test("updateFcmv1Provider (1)", async () => { const server = mockServerPool.createServer(); const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); const rawRequestBody = {}; @@ -481,13 +249,13 @@ describe("PushNotificationClient", () => { .jsonBody(rawResponseBody) .build(); - const response = await client.guardian.factors.pushNotification.updateFcmv1Provider(); + const response = await client.guardian.factors.pushNotification.setFcmv1Provider({}); expect(response).toEqual({ key: "value", }); }); - test("updateFcmv1Provider (2)", async () => { + test("setFcmv1Provider (2)", async () => { const server = mockServerPool.createServer(); const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); const rawRequestBody = {}; @@ -502,11 +270,11 @@ describe("PushNotificationClient", () => { .build(); await expect(async () => { - return await client.guardian.factors.pushNotification.updateFcmv1Provider(); + return await client.guardian.factors.pushNotification.setFcmv1Provider({}); }).rejects.toThrow(Management.BadRequestError); }); - test("updateFcmv1Provider (3)", async () => { + test("setFcmv1Provider (3)", async () => { const server = mockServerPool.createServer(); const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); const rawRequestBody = {}; @@ -521,11 +289,11 @@ describe("PushNotificationClient", () => { .build(); await expect(async () => { - return await client.guardian.factors.pushNotification.updateFcmv1Provider(); + return await client.guardian.factors.pushNotification.setFcmv1Provider({}); }).rejects.toThrow(Management.UnauthorizedError); }); - test("updateFcmv1Provider (4)", async () => { + test("setFcmv1Provider (4)", async () => { const server = mockServerPool.createServer(); const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl }); const rawRequestBody = {}; @@ -540,7 +308,7 @@ describe("PushNotificationClient", () => { .build(); await expect(async () => { - return await client.guardian.factors.pushNotification.updateFcmv1Provider(); + return await client.guardian.factors.pushNotification.setFcmv1Provider({}); }).rejects.toThrow(Management.ForbiddenError); }); diff --git a/src/management/tests/wire/organizations/discoveryDomains.test.ts b/src/management/tests/wire/organizations/discoveryDomains.test.ts index 37a9c535c..d864fd799 100644 --- a/src/management/tests/wire/organizations/discoveryDomains.test.ts +++ b/src/management/tests/wire/organizations/discoveryDomains.test.ts @@ -16,7 +16,6 @@ describe("DiscoveryDomainsClient", () => { id: "id", domain: "domain", status: "pending", - use_for_organization_discovery: true, verification_txt: "verification_txt", verification_host: "verification_host", }, @@ -37,7 +36,6 @@ describe("DiscoveryDomainsClient", () => { id: "id", domain: "domain", status: "pending", - use_for_organization_discovery: true, verification_txt: "verification_txt", verification_host: "verification_host", }, @@ -152,7 +150,6 @@ describe("DiscoveryDomainsClient", () => { id: "id", domain: "domain", status: "pending", - use_for_organization_discovery: true, verification_txt: "verification_txt", verification_host: "verification_host", }; @@ -172,7 +169,6 @@ describe("DiscoveryDomainsClient", () => { id: "id", domain: "domain", status: "pending", - use_for_organization_discovery: true, verification_txt: "verification_txt", verification_host: "verification_host", }); @@ -312,7 +308,6 @@ describe("DiscoveryDomainsClient", () => { id: "id", domain: "domain", status: "pending", - use_for_organization_discovery: true, verification_txt: "verification_txt", verification_host: "verification_host", }; @@ -329,7 +324,6 @@ describe("DiscoveryDomainsClient", () => { id: "id", domain: "domain", status: "pending", - use_for_organization_discovery: true, verification_txt: "verification_txt", verification_host: "verification_host", }); @@ -520,7 +514,6 @@ describe("DiscoveryDomainsClient", () => { id: "id", domain: "domain", status: "pending", - use_for_organization_discovery: true, verification_txt: "verification_txt", verification_host: "verification_host", }; @@ -538,7 +531,6 @@ describe("DiscoveryDomainsClient", () => { id: "id", domain: "domain", status: "pending", - use_for_organization_discovery: true, verification_txt: "verification_txt", verification_host: "verification_host", }); diff --git a/src/management/version.ts b/src/management/version.ts index 426f2b820..10fd77024 100644 --- a/src/management/version.ts +++ b/src/management/version.ts @@ -1 +1 @@ -export const SDK_VERSION = "5.2.0"; +export const SDK_VERSION = "5.2.1"; diff --git a/yarn.lock b/yarn.lock index 45b11a937..e360ef476 100644 --- a/yarn.lock +++ b/yarn.lock @@ -887,9 +887,9 @@ integrity sha512-5+fP8P8MFNC+AyZCDxrB2pkZFPGzqQWUzpSeuuVLvm8VMcorNYavBqoFcxK8bQz4Qsbn4oUEEem4wDLfcysGHA== "@types/node@*": - version "24.10.2" - resolved "https://registry.yarnpkg.com/@types/node/-/node-24.10.2.tgz#82a57476a19647d8f2c7750d0924788245e39b26" - integrity sha512-WOhQTZ4G8xZ1tjJTvKOpyEVSGgOTvJAfDK3FNFgELyaTpzhdgHVHeqW8V+UJvzF5BT+/B54T/1S2K6gd9c7bbA== + version "25.0.0" + resolved "https://registry.yarnpkg.com/@types/node/-/node-25.0.0.tgz#c0e0022c3c7b41635c49322e6b3a0279fffa7d62" + integrity sha512-rl78HwuZlaDIUSeUKkmogkhebA+8K1Hy7tddZuJ3D0xV8pZSfsYGTsliGUol1JPzu9EKnTxPC4L1fiWouStRew== dependencies: undici-types "~7.16.0" @@ -1379,9 +1379,9 @@ balanced-match@^1.0.0: integrity sha512-3oSeUO0TMV67hN1AmbXsK4yaqU7tjiHlbxRDZOpH0KW9+CeX4bRAaX0Anxt0tx2MrpRpWwQaPwIlISEJhYU5Pw== baseline-browser-mapping@^2.9.0: - version "2.9.5" - resolved "https://registry.yarnpkg.com/baseline-browser-mapping/-/baseline-browser-mapping-2.9.5.tgz#47f9549e0be1a84cd16651ac4c3b7d87a71408e6" - integrity sha512-D5vIoztZOq1XM54LUdttJVc96ggEsIfju2JBvht06pSzpckp3C7HReun67Bghzrtdsq9XdMGbSSB3v3GhMNmAA== + version "2.9.6" + resolved "https://registry.yarnpkg.com/baseline-browser-mapping/-/baseline-browser-mapping-2.9.6.tgz#82de0f7ee5860df86d60daf0d9524ae7227eeee7" + integrity sha512-v9BVVpOTLB59C9E7aSnmIF8h7qRsFpx+A2nugVMTszEOMcfjlZMsXRm4LF23I3Z9AJxc8ANpIvzbzONoX9VJlg== brace-expansion@^1.1.7: version "1.1.12"