ory-hydra-client 0.0.0.alpha63 → 1.2.0.alpha2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (103) hide show
  1. checksums.yaml +4 -4
  2. data/Gemfile +1 -1
  3. data/README.md +37 -45
  4. data/docs/AcceptConsentRequest.md +2 -4
  5. data/docs/AcceptLoginRequest.md +1 -1
  6. data/docs/AdminApi.md +70 -110
  7. data/docs/AttributeTypeAndValue.md +19 -0
  8. data/docs/Certificate.md +101 -0
  9. data/docs/CompletedRequest.md +1 -1
  10. data/docs/ConsentRequest.md +4 -4
  11. data/docs/ConsentRequestSession.md +2 -2
  12. data/docs/Extension.md +21 -0
  13. data/docs/IPNet.md +19 -0
  14. data/docs/JSONWebKey.md +12 -12
  15. data/docs/LoginRequest.md +7 -7
  16. data/docs/Name.md +27 -0
  17. data/docs/OAuth2Client.md +11 -13
  18. data/docs/OAuth2TokenIntrospection.md +3 -5
  19. data/docs/Oauth2TokenResponse.md +6 -6
  20. data/docs/OpenIDConnectContext.md +1 -1
  21. data/docs/PreviousConsentSession.md +2 -4
  22. data/docs/PublicApi.md +15 -15
  23. data/docs/RejectRequest.md +5 -5
  24. data/docs/URL.md +33 -0
  25. data/docs/WellKnown.md +1 -3
  26. data/lib/ory-hydra-client.rb +9 -16
  27. data/lib/ory-hydra-client/api/admin_api.rb +47 -113
  28. data/lib/ory-hydra-client/api/public_api.rb +12 -12
  29. data/lib/ory-hydra-client/api_client.rb +7 -9
  30. data/lib/ory-hydra-client/api_error.rb +2 -2
  31. data/lib/ory-hydra-client/configuration.rb +2 -2
  32. data/lib/ory-hydra-client/models/accept_consent_request.rb +5 -12
  33. data/lib/ory-hydra-client/models/accept_login_request.rb +7 -4
  34. data/lib/ory-hydra-client/models/{plugin_config_rootfs.rb → attribute_type_and_value.rb} +21 -22
  35. data/lib/ory-hydra-client/models/certificate.rb +683 -0
  36. data/lib/ory-hydra-client/models/completed_request.rb +2 -7
  37. data/lib/ory-hydra-client/models/consent_request.rb +10 -10
  38. data/lib/ory-hydra-client/models/consent_request_session.rb +10 -6
  39. data/lib/ory-hydra-client/models/{plugin_config_network.rb → extension.rb} +37 -19
  40. data/lib/ory-hydra-client/models/flush_inactive_o_auth2_tokens_request.rb +2 -2
  41. data/lib/ory-hydra-client/models/generic_error.rb +2 -2
  42. data/lib/ory-hydra-client/models/health_not_ready_status.rb +2 -2
  43. data/lib/ory-hydra-client/models/health_status.rb +2 -2
  44. data/lib/ory-hydra-client/models/{plugin_config_user.rb → ip_net.rb} +23 -21
  45. data/lib/ory-hydra-client/models/json_web_key.rb +15 -3
  46. data/lib/ory-hydra-client/models/json_web_key_set.rb +3 -3
  47. data/lib/ory-hydra-client/models/json_web_key_set_generator_request.rb +3 -2
  48. data/lib/ory-hydra-client/models/login_request.rb +5 -38
  49. data/lib/ory-hydra-client/models/logout_request.rb +2 -2
  50. data/lib/ory-hydra-client/models/{plugin_settings.rb → name.rb} +61 -58
  51. data/lib/ory-hydra-client/models/o_auth2_client.rb +14 -15
  52. data/lib/ory-hydra-client/models/o_auth2_token_introspection.rb +9 -17
  53. data/lib/ory-hydra-client/models/oauth2_token_response.rb +8 -2
  54. data/lib/ory-hydra-client/models/oauth_token_response.rb +2 -2
  55. data/lib/ory-hydra-client/models/open_id_connect_context.rb +6 -4
  56. data/lib/ory-hydra-client/models/previous_consent_session.rb +6 -13
  57. data/lib/ory-hydra-client/models/reject_request.rb +7 -7
  58. data/lib/ory-hydra-client/models/{plugin_device.rb → url.rb} +77 -49
  59. data/lib/ory-hydra-client/models/userinfo_response.rb +3 -3
  60. data/lib/ory-hydra-client/models/version.rb +3 -2
  61. data/lib/ory-hydra-client/models/well_known.rb +3 -15
  62. data/lib/ory-hydra-client/version.rb +3 -3
  63. data/ory-hydra-client.gemspec +2 -2
  64. data/spec/models/{plugin_config_rootfs_spec.rb → attribute_type_and_value_spec.rb} +9 -9
  65. data/spec/models/certificate_spec.rb +293 -0
  66. data/spec/models/{plugin_interface_type_spec.rb → extension_spec.rb} +10 -10
  67. data/spec/models/{plugin_config_user_spec.rb → ip_net_spec.rb} +9 -9
  68. data/spec/models/{plugin_mount_spec.rb → name_spec.rb} +13 -19
  69. data/spec/models/url_spec.rb +89 -0
  70. metadata +43 -75
  71. data/docs/ContainerWaitOKBodyError.md +0 -17
  72. data/docs/PluginConfig.md +0 -47
  73. data/docs/PluginConfigArgs.md +0 -23
  74. data/docs/PluginConfigInterface.md +0 -19
  75. data/docs/PluginConfigLinux.md +0 -21
  76. data/docs/PluginConfigNetwork.md +0 -17
  77. data/docs/PluginConfigRootfs.md +0 -19
  78. data/docs/PluginConfigUser.md +0 -19
  79. data/docs/PluginDevice.md +0 -23
  80. data/docs/PluginEnv.md +0 -23
  81. data/docs/PluginInterfaceType.md +0 -21
  82. data/docs/PluginMount.md +0 -29
  83. data/docs/PluginSettings.md +0 -23
  84. data/docs/VolumeUsageData.md +0 -19
  85. data/lib/ory-hydra-client/models/container_wait_ok_body_error.rb +0 -208
  86. data/lib/ory-hydra-client/models/plugin_config.rb +0 -422
  87. data/lib/ory-hydra-client/models/plugin_config_args.rb +0 -262
  88. data/lib/ory-hydra-client/models/plugin_config_interface.rb +0 -230
  89. data/lib/ory-hydra-client/models/plugin_config_linux.rb +0 -247
  90. data/lib/ory-hydra-client/models/plugin_env.rb +0 -260
  91. data/lib/ory-hydra-client/models/plugin_interface_type.rb +0 -243
  92. data/lib/ory-hydra-client/models/plugin_mount.rb +0 -307
  93. data/lib/ory-hydra-client/models/volume_usage_data.rb +0 -228
  94. data/spec/models/container_wait_ok_body_error_spec.rb +0 -41
  95. data/spec/models/plugin_config_args_spec.rb +0 -59
  96. data/spec/models/plugin_config_interface_spec.rb +0 -47
  97. data/spec/models/plugin_config_linux_spec.rb +0 -53
  98. data/spec/models/plugin_config_network_spec.rb +0 -41
  99. data/spec/models/plugin_config_spec.rb +0 -131
  100. data/spec/models/plugin_device_spec.rb +0 -59
  101. data/spec/models/plugin_env_spec.rb +0 -59
  102. data/spec/models/plugin_settings_spec.rb +0 -59
  103. data/spec/models/volume_usage_data_spec.rb +0 -47
@@ -0,0 +1,19 @@
1
+ # OryHydraClient::AttributeTypeAndValue
2
+
3
+ ## Properties
4
+
5
+ Name | Type | Description | Notes
6
+ ------------ | ------------- | ------------- | -------------
7
+ **type** | **Array<Integer>** | | [optional]
8
+ **value** | [**Object**](.md) | value | [optional]
9
+
10
+ ## Code Sample
11
+
12
+ ```ruby
13
+ require 'OryHydraClient'
14
+
15
+ instance = OryHydraClient::AttributeTypeAndValue.new(type: null,
16
+ value: null)
17
+ ```
18
+
19
+
@@ -0,0 +1,101 @@
1
+ # OryHydraClient::Certificate
2
+
3
+ ## Properties
4
+
5
+ Name | Type | Description | Notes
6
+ ------------ | ------------- | ------------- | -------------
7
+ **authority_key_id** | **Array<Integer>** | authority key Id | [optional]
8
+ **basic_constraints_valid** | **Boolean** | BasicConstraintsValid indicates whether IsCA, MaxPathLen, and MaxPathLenZero are valid. | [optional]
9
+ **crl_distribution_points** | **Array<String>** | CRL Distribution Points | [optional]
10
+ **dns_names** | **Array<String>** | Subject Alternate Name values. (Note that these values may not be valid if invalid values were contained within a parsed certificate. For example, an element of DNSNames may not be a valid DNS domain name.) | [optional]
11
+ **email_addresses** | **Array<String>** | email addresses | [optional]
12
+ **excluded_dns_domains** | **Array<String>** | excluded DNS domains | [optional]
13
+ **excluded_email_addresses** | **Array<String>** | excluded email addresses | [optional]
14
+ **excluded_ip_ranges** | [**Array<IPNet>**](IPNet.md) | excluded IP ranges | [optional]
15
+ **excluded_uri_domains** | **Array<String>** | excluded URI domains | [optional]
16
+ **ext_key_usage** | **Array<Integer>** | ext key usage | [optional]
17
+ **extensions** | [**Array<Extension>**](Extension.md) | Extensions contains raw X.509 extensions. When parsing certificates, this can be used to extract non-critical extensions that are not parsed by this package. When marshaling certificates, the Extensions field is ignored, see ExtraExtensions. | [optional]
18
+ **extra_extensions** | [**Array<Extension>**](Extension.md) | ExtraExtensions contains extensions to be copied, raw, into any marshaled certificates. Values override any extensions that would otherwise be produced based on the other fields. The ExtraExtensions field is not populated when parsing certificates, see Extensions. | [optional]
19
+ **ip_addresses** | **Array<Array>** | IP addresses | [optional]
20
+ **is_ca** | **Boolean** | is c a | [optional]
21
+ **issuer** | [**Name**](Name.md) | | [optional]
22
+ **issuing_certificate_url** | **Array<String>** | issuing certificate URL | [optional]
23
+ **key_usage** | **Integer** | KeyUsage KeyUsage KeyUsage KeyUsage represents the set of actions that are valid for a given key. It's a bitmap of the KeyUsage* constants. | [optional]
24
+ **max_path_len** | **Integer** | MaxPathLen and MaxPathLenZero indicate the presence and value of the BasicConstraints' \"pathLenConstraint\". When parsing a certificate, a positive non-zero MaxPathLen means that the field was specified, -1 means it was unset, and MaxPathLenZero being true mean that the field was explicitly set to zero. The case of MaxPathLen==0 with MaxPathLenZero==false should be treated equivalent to -1 (unset). When generating a certificate, an unset pathLenConstraint can be requested with either MaxPathLen == -1 or using the zero value for both MaxPathLen and MaxPathLenZero. | [optional]
25
+ **max_path_len_zero** | **Boolean** | MaxPathLenZero indicates that BasicConstraintsValid==true and MaxPathLen==0 should be interpreted as an actual maximum path length of zero. Otherwise, that combination is interpreted as MaxPathLen not being set. | [optional]
26
+ **not_before** | **DateTime** | not before Format: date-time Format: date-time Format: date-time | [optional]
27
+ **ocsp_server** | **Array<String>** | RFC 5280, 4.2.2.1 (Authority Information Access) | [optional]
28
+ **permitted_dns_domains** | **Array<String>** | permitted DNS domains | [optional]
29
+ **permitted_dns_domains_critical** | **Boolean** | Name constraints | [optional]
30
+ **permitted_email_addresses** | **Array<String>** | permitted email addresses | [optional]
31
+ **permitted_ip_ranges** | [**Array<IPNet>**](IPNet.md) | permitted IP ranges | [optional]
32
+ **permitted_uri_domains** | **Array<String>** | permitted URI domains | [optional]
33
+ **policy_identifiers** | **Array<Array>** | policy identifiers | [optional]
34
+ **public_key** | [**Object**](.md) | public key | [optional]
35
+ **public_key_algorithm** | **Integer** | PublicKeyAlgorithm PublicKeyAlgorithm PublicKeyAlgorithm public key algorithm | [optional]
36
+ **raw** | **Array<Integer>** | raw | [optional]
37
+ **raw_issuer** | **Array<Integer>** | raw issuer | [optional]
38
+ **raw_subject** | **Array<Integer>** | raw subject | [optional]
39
+ **raw_subject_public_key_info** | **Array<Integer>** | raw subject public key info | [optional]
40
+ **raw_tbs_certificate** | **Array<Integer>** | raw t b s certificate | [optional]
41
+ **serial_number** | [**Object**](.md) | Operations always take pointer arguments (*Int) rather than Int values, and each unique Int value requires its own unique *Int pointer. To \"copy\" an Int value, an existing (or newly allocated) Int must be set to a new value using the Int.Set method; shallow copies of Ints are not supported and may lead to errors. | [optional]
42
+ **signature** | **Array<Integer>** | signature | [optional]
43
+ **signature_algorithm** | **Integer** | SignatureAlgorithm SignatureAlgorithm SignatureAlgorithm signature algorithm | [optional]
44
+ **subject** | [**Name**](Name.md) | | [optional]
45
+ **subject_key_id** | **Array<Integer>** | subject key Id | [optional]
46
+ **ur_is** | [**Array<URL>**](URL.md) | u r is | [optional]
47
+ **unhandled_critical_extensions** | **Array<Array>** | UnhandledCriticalExtensions contains a list of extension IDs that were not (fully) processed when parsing. Verify will fail if this slice is non-empty, unless verification is delegated to an OS library which understands all the critical extensions. Users can access these extensions using Extensions and can remove elements from this slice if they believe that they have been handled. | [optional]
48
+ **unknown_ext_key_usage** | **Array<Array>** | unknown ext key usage | [optional]
49
+ **version** | **Integer** | version | [optional]
50
+
51
+ ## Code Sample
52
+
53
+ ```ruby
54
+ require 'OryHydraClient'
55
+
56
+ instance = OryHydraClient::Certificate.new(authority_key_id: null,
57
+ basic_constraints_valid: null,
58
+ crl_distribution_points: null,
59
+ dns_names: null,
60
+ email_addresses: null,
61
+ excluded_dns_domains: null,
62
+ excluded_email_addresses: null,
63
+ excluded_ip_ranges: null,
64
+ excluded_uri_domains: null,
65
+ ext_key_usage: null,
66
+ extensions: null,
67
+ extra_extensions: null,
68
+ ip_addresses: null,
69
+ is_ca: null,
70
+ issuer: null,
71
+ issuing_certificate_url: null,
72
+ key_usage: null,
73
+ max_path_len: null,
74
+ max_path_len_zero: null,
75
+ not_before: null,
76
+ ocsp_server: null,
77
+ permitted_dns_domains: null,
78
+ permitted_dns_domains_critical: null,
79
+ permitted_email_addresses: null,
80
+ permitted_ip_ranges: null,
81
+ permitted_uri_domains: null,
82
+ policy_identifiers: null,
83
+ public_key: null,
84
+ public_key_algorithm: null,
85
+ raw: null,
86
+ raw_issuer: null,
87
+ raw_subject: null,
88
+ raw_subject_public_key_info: null,
89
+ raw_tbs_certificate: null,
90
+ serial_number: null,
91
+ signature: null,
92
+ signature_algorithm: null,
93
+ subject: null,
94
+ subject_key_id: null,
95
+ ur_is: null,
96
+ unhandled_critical_extensions: null,
97
+ unknown_ext_key_usage: null,
98
+ version: null)
99
+ ```
100
+
101
+
@@ -4,7 +4,7 @@
4
4
 
5
5
  Name | Type | Description | Notes
6
6
  ------------ | ------------- | ------------- | -------------
7
- **redirect_to** | **String** | RedirectURL is the URL which you should redirect the user to once the authentication process is completed. |
7
+ **redirect_to** | **String** | RedirectURL is the URL which you should redirect the user to once the authentication process is completed. | [optional]
8
8
 
9
9
  ## Code Sample
10
10
 
@@ -5,15 +5,15 @@
5
5
  Name | Type | Description | Notes
6
6
  ------------ | ------------- | ------------- | -------------
7
7
  **acr** | **String** | ACR represents the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it to express that, for example, a user authenticated using two factor authentication. | [optional]
8
- **challenge** | **String** | ID is the identifier (\"authorization challenge\") of the consent authorization request. It is used to identify the session. |
8
+ **challenge** | **String** | Challenge is the identifier (\"authorization challenge\") of the consent authorization request. It is used to identify the session. | [optional]
9
9
  **client** | [**OAuth2Client**](OAuth2Client.md) | | [optional]
10
- **context** | [**Object**](.md) | | [optional]
10
+ **context** | **Hash<String, Object>** | Context contains arbitrary information set by the login endpoint or is empty if not set. | [optional]
11
11
  **login_challenge** | **String** | LoginChallenge is the login challenge this consent challenge belongs to. It can be used to associate a login and consent request in the login & consent app. | [optional]
12
12
  **login_session_id** | **String** | LoginSessionID is the login session ID. If the user-agent reuses a login session (via cookie / remember flag) this ID will remain the same. If the user-agent did not have an existing authentication session (e.g. remember is false) this will be a new random value. This value is used as the \"sid\" parameter in the ID Token and in OIDC Front-/Back- channel logout. It's value can generally be used to associate consecutive login requests by a certain user. | [optional]
13
13
  **oidc_context** | [**OpenIDConnectContext**](OpenIDConnectContext.md) | | [optional]
14
14
  **request_url** | **String** | RequestURL is the original OAuth 2.0 Authorization URL requested by the OAuth 2.0 client. It is the URL which initiates the OAuth 2.0 Authorization Code or OAuth 2.0 Implicit flow. This URL is typically not needed, but might come in handy if you want to deal with additional request parameters. | [optional]
15
- **requested_access_token_audience** | **Array<String>** | | [optional]
16
- **requested_scope** | **Array<String>** | | [optional]
15
+ **requested_access_token_audience** | **Array<String>** | RequestedScope contains the access token audience as requested by the OAuth 2.0 Client. | [optional]
16
+ **requested_scope** | **Array<String>** | RequestedScope contains the OAuth 2.0 Scope requested by the OAuth 2.0 Client. | [optional]
17
17
  **skip** | **Boolean** | Skip, if true, implies that the client has requested the same scopes from the same user previously. If true, you must not ask the user to grant the requested scopes. You must however either allow or deny the consent request using the usual API call. | [optional]
18
18
  **subject** | **String** | Subject is the user ID of the end-user that authenticated. Now, that end user needs to grant or deny the scope requested by the OAuth 2.0 client. | [optional]
19
19
 
@@ -4,8 +4,8 @@
4
4
 
5
5
  Name | Type | Description | Notes
6
6
  ------------ | ------------- | ------------- | -------------
7
- **access_token** | [**Object**](.md) | AccessToken sets session data for the access and refresh token, as well as any future tokens issued by the refresh grant. Keep in mind that this data will be available to anyone performing OAuth 2.0 Challenge Introspection. If only your services can perform OAuth 2.0 Challenge Introspection, this is usually fine. But if third parties can access that endpoint as well, sensitive data from the session might be exposed to them. Use with care! | [optional]
8
- **id_token** | [**Object**](.md) | IDToken sets session data for the OpenID Connect ID token. Keep in mind that the session'id payloads are readable by anyone that has access to the ID Challenge. Use with care! | [optional]
7
+ **access_token** | **Hash<String, Object>** | AccessToken sets session data for the access and refresh token, as well as any future tokens issued by the refresh grant. Keep in mind that this data will be available to anyone performing OAuth 2.0 Challenge Introspection. If only your services can perform OAuth 2.0 Challenge Introspection, this is usually fine. But if third parties can access that endpoint as well, sensitive data from the session might be exposed to them. Use with care! | [optional]
8
+ **id_token** | **Hash<String, Object>** | IDToken sets session data for the OpenID Connect ID token. Keep in mind that the session'id payloads are readable by anyone that has access to the ID Challenge. Use with care! | [optional]
9
9
 
10
10
  ## Code Sample
11
11
 
data/docs/Extension.md ADDED
@@ -0,0 +1,21 @@
1
+ # OryHydraClient::Extension
2
+
3
+ ## Properties
4
+
5
+ Name | Type | Description | Notes
6
+ ------------ | ------------- | ------------- | -------------
7
+ **critical** | **Boolean** | critical | [optional]
8
+ **id** | **Array<Integer>** | | [optional]
9
+ **value** | **Array<Integer>** | value | [optional]
10
+
11
+ ## Code Sample
12
+
13
+ ```ruby
14
+ require 'OryHydraClient'
15
+
16
+ instance = OryHydraClient::Extension.new(critical: null,
17
+ id: null,
18
+ value: null)
19
+ ```
20
+
21
+
data/docs/IPNet.md ADDED
@@ -0,0 +1,19 @@
1
+ # OryHydraClient::IPNet
2
+
3
+ ## Properties
4
+
5
+ Name | Type | Description | Notes
6
+ ------------ | ------------- | ------------- | -------------
7
+ **ip** | **Array<Integer>** | Note that in this documentation, referring to an IP address as an IPv4 address or an IPv6 address is a semantic property of the address, not just the length of the byte slice: a 16-byte slice can still be an IPv4 address. | [optional]
8
+ **mask** | **Array<Integer>** | | [optional]
9
+
10
+ ## Code Sample
11
+
12
+ ```ruby
13
+ require 'OryHydraClient'
14
+
15
+ instance = OryHydraClient::IPNet.new(ip: null,
16
+ mask: null)
17
+ ```
18
+
19
+
data/docs/JSONWebKey.md CHANGED
@@ -5,22 +5,22 @@
5
5
  Name | Type | Description | Notes
6
6
  ------------ | ------------- | ------------- | -------------
7
7
  **alg** | **String** | The \"alg\" (algorithm) parameter identifies the algorithm intended for use with the key. The values used should either be registered in the IANA \"JSON Web Signature and Encryption Algorithms\" registry established by [JWA] or be a value that contains a Collision- Resistant Name. |
8
- **crv** | **String** | | [optional]
9
- **d** | **String** | | [optional]
10
- **dp** | **String** | | [optional]
11
- **dq** | **String** | | [optional]
12
- **e** | **String** | | [optional]
13
- **k** | **String** | | [optional]
8
+ **crv** | **String** | crv | [optional]
9
+ **d** | **String** | d | [optional]
10
+ **dp** | **String** | dp | [optional]
11
+ **dq** | **String** | dq | [optional]
12
+ **e** | **String** | e | [optional]
13
+ **k** | **String** | k | [optional]
14
14
  **kid** | **String** | The \"kid\" (key ID) parameter is used to match a specific key. This is used, for instance, to choose among a set of keys within a JWK Set during key rollover. The structure of the \"kid\" value is unspecified. When \"kid\" values are used within a JWK Set, different keys within the JWK Set SHOULD use distinct \"kid\" values. (One example in which different keys might use the same \"kid\" value is if they have different \"kty\" (key type) values but are considered to be equivalent alternatives by the application using them.) The \"kid\" value is a case-sensitive string. |
15
15
  **kty** | **String** | The \"kty\" (key type) parameter identifies the cryptographic algorithm family used with the key, such as \"RSA\" or \"EC\". \"kty\" values should either be registered in the IANA \"JSON Web Key Types\" registry established by [JWA] or be a value that contains a Collision- Resistant Name. The \"kty\" value is a case-sensitive string. |
16
- **n** | **String** | | [optional]
17
- **p** | **String** | | [optional]
18
- **q** | **String** | | [optional]
19
- **qi** | **String** | | [optional]
16
+ **n** | **String** | n | [optional]
17
+ **p** | **String** | p | [optional]
18
+ **q** | **String** | q | [optional]
19
+ **qi** | **String** | qi | [optional]
20
20
  **use** | **String** | Use (\"public key use\") identifies the intended use of the public key. The \"use\" parameter is employed to indicate whether a public key is used for encrypting data or verifying the signature on data. Values are commonly \"sig\" (signature) or \"enc\" (encryption). |
21
- **x** | **String** | | [optional]
21
+ **x** | **String** | x | [optional]
22
22
  **x5c** | **Array<String>** | The \"x5c\" (X.509 certificate chain) parameter contains a chain of one or more PKIX certificates [RFC5280]. The certificate chain is represented as a JSON array of certificate value strings. Each string in the array is a base64-encoded (Section 4 of [RFC4648] -- not base64url-encoded) DER [ITU.X690.1994] PKIX certificate value. The PKIX certificate containing the key value MUST be the first certificate. | [optional]
23
- **y** | **String** | | [optional]
23
+ **y** | **String** | y | [optional]
24
24
 
25
25
  ## Code Sample
26
26
 
data/docs/LoginRequest.md CHANGED
@@ -4,15 +4,15 @@
4
4
 
5
5
  Name | Type | Description | Notes
6
6
  ------------ | ------------- | ------------- | -------------
7
- **challenge** | **String** | ID is the identifier (\"login challenge\") of the login request. It is used to identify the session. |
8
- **client** | [**OAuth2Client**](OAuth2Client.md) | |
7
+ **challenge** | **String** | Challenge is the identifier (\"login challenge\") of the login request. It is used to identify the session. | [optional]
8
+ **client** | [**OAuth2Client**](OAuth2Client.md) | | [optional]
9
9
  **oidc_context** | [**OpenIDConnectContext**](OpenIDConnectContext.md) | | [optional]
10
- **request_url** | **String** | RequestURL is the original OAuth 2.0 Authorization URL requested by the OAuth 2.0 client. It is the URL which initiates the OAuth 2.0 Authorization Code or OAuth 2.0 Implicit flow. This URL is typically not needed, but might come in handy if you want to deal with additional request parameters. |
11
- **requested_access_token_audience** | **Array<String>** | |
12
- **requested_scope** | **Array<String>** | |
10
+ **request_url** | **String** | RequestURL is the original OAuth 2.0 Authorization URL requested by the OAuth 2.0 client. It is the URL which initiates the OAuth 2.0 Authorization Code or OAuth 2.0 Implicit flow. This URL is typically not needed, but might come in handy if you want to deal with additional request parameters. | [optional]
11
+ **requested_access_token_audience** | **Array<String>** | RequestedScope contains the access token audience as requested by the OAuth 2.0 Client. | [optional]
12
+ **requested_scope** | **Array<String>** | RequestedScope contains the OAuth 2.0 Scope requested by the OAuth 2.0 Client. | [optional]
13
13
  **session_id** | **String** | SessionID is the login session ID. If the user-agent reuses a login session (via cookie / remember flag) this ID will remain the same. If the user-agent did not have an existing authentication session (e.g. remember is false) this will be a new random value. This value is used as the \"sid\" parameter in the ID Token and in OIDC Front-/Back- channel logout. It's value can generally be used to associate consecutive login requests by a certain user. | [optional]
14
- **skip** | **Boolean** | Skip, if true, implies that the client has requested the same scopes from the same user previously. If true, you can skip asking the user to grant the requested scopes, and simply forward the user to the redirect URL. This feature allows you to update / set session information. |
15
- **subject** | **String** | Subject is the user ID of the end-user that authenticated. Now, that end user needs to grant or deny the scope requested by the OAuth 2.0 client. If this value is set and `skip` is true, you MUST include this subject type when accepting the login request, or the request will fail. |
14
+ **skip** | **Boolean** | Skip, if true, implies that the client has requested the same scopes from the same user previously. If true, you can skip asking the user to grant the requested scopes, and simply forward the user to the redirect URL. This feature allows you to update / set session information. | [optional]
15
+ **subject** | **String** | Subject is the user ID of the end-user that authenticated. Now, that end user needs to grant or deny the scope requested by the OAuth 2.0 client. If this value is set and `skip` is true, you MUST include this subject type when accepting the login request, or the request will fail. | [optional]
16
16
 
17
17
  ## Code Sample
18
18
 
data/docs/Name.md ADDED
@@ -0,0 +1,27 @@
1
+ # OryHydraClient::Name
2
+
3
+ ## Properties
4
+
5
+ Name | Type | Description | Notes
6
+ ------------ | ------------- | ------------- | -------------
7
+ **country** | **Array<String>** | country | [optional]
8
+ **extra_names** | [**Array<AttributeTypeAndValue>**](AttributeTypeAndValue.md) | extra names | [optional]
9
+ **locality** | **Array<String>** | locality | [optional]
10
+ **names** | [**Array<AttributeTypeAndValue>**](AttributeTypeAndValue.md) | names | [optional]
11
+ **serial_number** | **String** | serial number | [optional]
12
+ **street_address** | **Array<String>** | street address | [optional]
13
+
14
+ ## Code Sample
15
+
16
+ ```ruby
17
+ require 'OryHydraClient'
18
+
19
+ instance = OryHydraClient::Name.new(country: null,
20
+ extra_names: null,
21
+ locality: null,
22
+ names: null,
23
+ serial_number: null,
24
+ street_address: null)
25
+ ```
26
+
27
+
data/docs/OAuth2Client.md CHANGED
@@ -4,36 +4,35 @@
4
4
 
5
5
  Name | Type | Description | Notes
6
6
  ------------ | ------------- | ------------- | -------------
7
- **allowed_cors_origins** | **Array<String>** | | [optional]
8
- **audience** | **Array<String>** | | [optional]
7
+ **allowed_cors_origins** | **Array<String>** | AllowedCORSOrigins are one or more URLs (scheme://host[:port]) which are allowed to make CORS requests to the /oauth/token endpoint. If this array is empty, the sever's CORS origin configuration (`CORS_ALLOWED_ORIGINS`) will be used instead. If this array is set, the allowed origins are appended to the server's CORS origin configuration. Be aware that environment variable `CORS_ENABLED` MUST be set to `true` for this to work. | [optional]
8
+ **audience** | **Array<String>** | Audience is a whitelist defining the audiences this client is allowed to request tokens for. An audience limits the applicability of an OAuth 2.0 Access Token to, for example, certain API endpoints. The value is a list of URLs. URLs MUST NOT contain whitespaces. | [optional]
9
9
  **backchannel_logout_session_required** | **Boolean** | Boolean value specifying whether the RP requires that a sid (session ID) Claim be included in the Logout Token to identify the RP session with the OP when the backchannel_logout_uri is used. If omitted, the default value is false. | [optional]
10
10
  **backchannel_logout_uri** | **String** | RP URL that will cause the RP to log itself out when sent a Logout Token by the OP. | [optional]
11
- **client_id** | **String** | ID is the id for this client. | [optional]
11
+ **client_id** | **String** | ClientID is the id for this client. | [optional]
12
12
  **client_name** | **String** | Name is the human-readable string name of the client to be presented to the end-user during authorization. | [optional]
13
13
  **client_secret** | **String** | Secret is the client's secret. The secret will be included in the create request as cleartext, and then never again. The secret is stored using BCrypt so it is impossible to recover it. Tell your users that they need to write the secret down as it will not be made available again. | [optional]
14
14
  **client_secret_expires_at** | **Integer** | SecretExpiresAt is an integer holding the time at which the client secret will expire or 0 if it will not expire. The time is represented as the number of seconds from 1970-01-01T00:00:00Z as measured in UTC until the date/time of expiration. This feature is currently not supported and it's value will always be set to 0. | [optional]
15
15
  **client_uri** | **String** | ClientURI is an URL string of a web page providing information about the client. If present, the server SHOULD display this URL to the end-user in a clickable fashion. | [optional]
16
- **contacts** | **Array<String>** | | [optional]
16
+ **contacts** | **Array<String>** | Contacts is a array of strings representing ways to contact people responsible for this client, typically email addresses. | [optional]
17
17
  **created_at** | **DateTime** | CreatedAt returns the timestamp of the client's creation. | [optional]
18
18
  **frontchannel_logout_session_required** | **Boolean** | Boolean value specifying whether the RP requires that iss (issuer) and sid (session ID) query parameters be included to identify the RP session with the OP when the frontchannel_logout_uri is used. If omitted, the default value is false. | [optional]
19
19
  **frontchannel_logout_uri** | **String** | RP URL that will cause the RP to log itself out when rendered in an iframe by the OP. An iss (issuer) query parameter and a sid (session ID) query parameter MAY be included by the OP to enable the RP to validate the request and to determine which of the potentially multiple sessions is to be logged out; if either is included, both MUST be. | [optional]
20
- **grant_types** | **Array<String>** | | [optional]
21
- **jwks** | [**Object**](.md) | | [optional]
20
+ **grant_types** | **Array<String>** | GrantTypes is an array of grant types the client is allowed to use. | [optional]
21
+ **jwks** | [**JSONWebKeySet**](JSONWebKeySet.md) | | [optional]
22
22
  **jwks_uri** | **String** | URL for the Client's JSON Web Key Set [JWK] document. If the Client signs requests to the Server, it contains the signing key(s) the Server uses to validate signatures from the Client. The JWK Set MAY also contain the Client's encryption keys(s), which are used by the Server to encrypt responses to the Client. When both signing and encryption keys are made available, a use (Key Use) parameter value is REQUIRED for all keys in the referenced JWK Set to indicate each key's intended usage. Although some algorithms allow the same key to be used for both signatures and encryption, doing so is NOT RECOMMENDED, as it is less secure. The JWK x5c parameter MAY be used to provide X.509 representations of keys provided. When used, the bare key values MUST still be present and MUST match those in the certificate. | [optional]
23
23
  **logo_uri** | **String** | LogoURI is an URL string that references a logo for the client. | [optional]
24
- **metadata** | [**Object**](.md) | | [optional]
24
+ **metadata** | [**Object**](.md) | Metadata is arbitrary data. | [optional]
25
25
  **owner** | **String** | Owner is a string identifying the owner of the OAuth 2.0 Client. | [optional]
26
26
  **policy_uri** | **String** | PolicyURI is a URL string that points to a human-readable privacy policy document that describes how the deployment organization collects, uses, retains, and discloses personal data. | [optional]
27
- **post_logout_redirect_uris** | **Array<String>** | | [optional]
28
- **redirect_uris** | **Array<String>** | | [optional]
27
+ **post_logout_redirect_uris** | **Array<String>** | Array of URLs supplied by the RP to which it MAY request that the End-User's User Agent be redirected using the post_logout_redirect_uri parameter after a logout has been performed. | [optional]
28
+ **redirect_uris** | **Array<String>** | RedirectURIs is an array of allowed redirect urls for the client, for example http://mydomain/oauth/callback . | [optional]
29
29
  **request_object_signing_alg** | **String** | JWS [JWS] alg algorithm [JWA] that MUST be used for signing Request Objects sent to the OP. All Request Objects from this Client MUST be rejected, if not signed with this algorithm. | [optional]
30
- **request_uris** | **Array<String>** | | [optional]
31
- **response_types** | **Array<String>** | | [optional]
30
+ **request_uris** | **Array<String>** | Array of request_uri values that are pre-registered by the RP for use at the OP. Servers MAY cache the contents of the files referenced by these URIs and not retrieve them at the time they are used in a request. OPs can require that request_uri values used be pre-registered with the require_request_uri_registration discovery parameter. | [optional]
31
+ **response_types** | **Array<String>** | ResponseTypes is an array of the OAuth 2.0 response type strings that the client can use at the authorization endpoint. | [optional]
32
32
  **scope** | **String** | Scope is a string containing a space-separated list of scope values (as described in Section 3.3 of OAuth 2.0 [RFC6749]) that the client can use when requesting access tokens. | [optional]
33
33
  **sector_identifier_uri** | **String** | URL using the https scheme to be used in calculating Pseudonymous Identifiers by the OP. The URL references a file with a single JSON array of redirect_uri values. | [optional]
34
34
  **subject_type** | **String** | SubjectType requested for responses to this Client. The subject_types_supported Discovery parameter contains a list of the supported subject_type values for this server. Valid types include `pairwise` and `public`. | [optional]
35
35
  **token_endpoint_auth_method** | **String** | Requested Client Authentication method for the Token Endpoint. The options are client_secret_post, client_secret_basic, private_key_jwt, and none. | [optional]
36
- **token_endpoint_auth_signing_alg** | **String** | Requested Client Authentication signing algorithm for the Token Endpoint. | [optional]
37
36
  **tos_uri** | **String** | TermsOfServiceURI is a URL string that points to a human-readable terms of service document for the client that describes a contractual relationship between the end-user and the client that the end-user accepts when authorizing the client. | [optional]
38
37
  **updated_at** | **DateTime** | UpdatedAt returns the timestamp of the last update. | [optional]
39
38
  **userinfo_signed_response_alg** | **String** | JWS alg algorithm [JWA] REQUIRED for signing UserInfo Responses. If this is specified, the response will be JWT [JWT] serialized, and signed using JWS. The default, if omitted, is for the UserInfo Response to return the Claims as a UTF-8 encoded JSON object using the application/json content-type. | [optional]
@@ -72,7 +71,6 @@ instance = OryHydraClient::OAuth2Client.new(allowed_cors_origins: null,
72
71
  sector_identifier_uri: null,
73
72
  subject_type: null,
74
73
  token_endpoint_auth_method: null,
75
- token_endpoint_auth_signing_alg: null,
76
74
  tos_uri: null,
77
75
  updated_at: null,
78
76
  userinfo_signed_response_alg: null)
@@ -6,17 +6,16 @@ Name | Type | Description | Notes
6
6
  ------------ | ------------- | ------------- | -------------
7
7
  **active** | **Boolean** | Active is a boolean indicator of whether or not the presented token is currently active. The specifics of a token's \"active\" state will vary depending on the implementation of the authorization server and the information it keeps about its tokens, but a \"true\" value return for the \"active\" property will generally indicate that a given token has been issued by this authorization server, has not been revoked by the resource owner, and is within its given time window of validity (e.g., after its issuance time and before its expiration time). |
8
8
  **aud** | **Array<String>** | Audience contains a list of the token's intended audiences. | [optional]
9
- **client_id** | **String** | ID is aclient identifier for the OAuth 2.0 client that requested this token. | [optional]
9
+ **client_id** | **String** | ClientID is aclient identifier for the OAuth 2.0 client that requested this token. | [optional]
10
10
  **exp** | **Integer** | Expires at is an integer timestamp, measured in the number of seconds since January 1 1970 UTC, indicating when this token will expire. | [optional]
11
- **ext** | [**Object**](.md) | Extra is arbitrary data set by the session. | [optional]
11
+ **ext** | **Hash<String, Object>** | Extra is arbitrary data set by the session. | [optional]
12
12
  **iat** | **Integer** | Issued at is an integer timestamp, measured in the number of seconds since January 1 1970 UTC, indicating when this token was originally issued. | [optional]
13
13
  **iss** | **String** | IssuerURL is a string representing the issuer of this token | [optional]
14
14
  **nbf** | **Integer** | NotBefore is an integer timestamp, measured in the number of seconds since January 1 1970 UTC, indicating when this token is not to be used before. | [optional]
15
15
  **obfuscated_subject** | **String** | ObfuscatedSubject is set when the subject identifier algorithm was set to \"pairwise\" during authorization. It is the `sub` value of the ID Token that was issued. | [optional]
16
16
  **scope** | **String** | Scope is a JSON string containing a space-separated list of scopes associated with this token. | [optional]
17
17
  **sub** | **String** | Subject of the token, as defined in JWT [RFC7519]. Usually a machine-readable identifier of the resource owner who authorized this token. | [optional]
18
- **token_type** | **String** | TokenType is the introspected token's type, typically `Bearer`. | [optional]
19
- **token_use** | **String** | TokenUse is the introspected token's use, for example `access_token` or `refresh_token`. | [optional]
18
+ **token_type** | **String** | TokenType is the introspected token's type, for example `access_token` or `refresh_token`. | [optional]
20
19
  **username** | **String** | Username is a human-readable identifier for the resource owner who authorized this token. | [optional]
21
20
 
22
21
  ## Code Sample
@@ -36,7 +35,6 @@ instance = OryHydraClient::OAuth2TokenIntrospection.new(active: null,
36
35
  scope: null,
37
36
  sub: null,
38
37
  token_type: null,
39
- token_use: null,
40
38
  username: null)
41
39
  ```
42
40
 
@@ -4,12 +4,12 @@
4
4
 
5
5
  Name | Type | Description | Notes
6
6
  ------------ | ------------- | ------------- | -------------
7
- **access_token** | **String** | | [optional]
8
- **expires_in** | **Integer** | | [optional]
9
- **id_token** | **String** | | [optional]
10
- **refresh_token** | **String** | | [optional]
11
- **scope** | **String** | | [optional]
12
- **token_type** | **String** | | [optional]
7
+ **access_token** | **String** | access token | [optional]
8
+ **expires_in** | **Integer** | expires in | [optional]
9
+ **id_token** | **String** | id token | [optional]
10
+ **refresh_token** | **String** | refresh token | [optional]
11
+ **scope** | **String** | scope | [optional]
12
+ **token_type** | **String** | token type | [optional]
13
13
 
14
14
  ## Code Sample
15
15
 
@@ -6,7 +6,7 @@ Name | Type | Description | Notes
6
6
  ------------ | ------------- | ------------- | -------------
7
7
  **acr_values** | **Array<String>** | ACRValues is the Authentication AuthorizationContext Class Reference requested in the OAuth 2.0 Authorization request. It is a parameter defined by OpenID Connect and expresses which level of authentication (e.g. 2FA) is required. OpenID Connect defines it as follows: > Requested Authentication AuthorizationContext Class Reference values. Space-separated string that specifies the acr values that the Authorization Server is being requested to use for processing this Authentication Request, with the values appearing in order of preference. The Authentication AuthorizationContext Class satisfied by the authentication performed is returned as the acr Claim Value, as specified in Section 2. The acr Claim is requested as a Voluntary Claim by this parameter. | [optional]
8
8
  **display** | **String** | Display is a string value that specifies how the Authorization Server displays the authentication and consent user interface pages to the End-User. The defined values are: page: The Authorization Server SHOULD display the authentication and consent UI consistent with a full User Agent page view. If the display parameter is not specified, this is the default display mode. popup: The Authorization Server SHOULD display the authentication and consent UI consistent with a popup User Agent window. The popup User Agent window should be of an appropriate size for a login-focused dialog and should not obscure the entire window that it is popping up over. touch: The Authorization Server SHOULD display the authentication and consent UI consistent with a device that leverages a touch interface. wap: The Authorization Server SHOULD display the authentication and consent UI consistent with a \"feature phone\" type display. The Authorization Server MAY also attempt to detect the capabilities of the User Agent and present an appropriate display. | [optional]
9
- **id_token_hint_claims** | [**Object**](.md) | IDTokenHintClaims are the claims of the ID Token previously issued by the Authorization Server being passed as a hint about the End-User's current or past authenticated session with the Client. | [optional]
9
+ **id_token_hint_claims** | **Hash<String, Object>** | IDTokenHintClaims are the claims of the ID Token previously issued by the Authorization Server being passed as a hint about the End-User's current or past authenticated session with the Client. | [optional]
10
10
  **login_hint** | **String** | LoginHint hints about the login identifier the End-User might use to log in (if necessary). This hint can be used by an RP if it first asks the End-User for their e-mail address (or other identifier) and then wants to pass that value as a hint to the discovered authorization service. This value MAY also be a phone number in the format specified for the phone_number Claim. The use of this parameter is optional. | [optional]
11
11
  **ui_locales** | **Array<String>** | UILocales is the End-User'id preferred languages and scripts for the user interface, represented as a space-separated list of BCP47 [RFC5646] language tag values, ordered by preference. For instance, the value \"fr-CA fr en\" represents a preference for French as spoken in Canada, then French (without a region designation), followed by English (without a region designation). An error SHOULD NOT result if some or all of the requested locales are not supported by the OpenID Provider. | [optional]
12
12
 
@@ -5,9 +5,8 @@
5
5
  Name | Type | Description | Notes
6
6
  ------------ | ------------- | ------------- | -------------
7
7
  **consent_request** | [**ConsentRequest**](ConsentRequest.md) | | [optional]
8
- **grant_access_token_audience** | **Array<String>** | | [optional]
9
- **grant_scope** | **Array<String>** | | [optional]
10
- **handled_at** | **DateTime** | | [optional]
8
+ **grant_access_token_audience** | **Array<String>** | GrantedAudience sets the audience the user authorized the client to use. Should be a subset of `requested_access_token_audience`. | [optional]
9
+ **grant_scope** | **Array<String>** | GrantScope sets the scope the user authorized the client to use. Should be a subset of `requested_scope` | [optional]
11
10
  **remember** | **Boolean** | Remember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same client asks the same user for the same, or a subset of, scope. | [optional]
12
11
  **remember_for** | **Integer** | RememberFor sets how long the consent authorization should be remembered for in seconds. If set to `0`, the authorization will be remembered indefinitely. | [optional]
13
12
  **session** | [**ConsentRequestSession**](ConsentRequestSession.md) | | [optional]
@@ -20,7 +19,6 @@ require 'OryHydraClient'
20
19
  instance = OryHydraClient::PreviousConsentSession.new(consent_request: null,
21
20
  grant_access_token_audience: null,
22
21
  grant_scope: null,
23
- handled_at: null,
24
22
  remember: null,
25
23
  remember_for: null,
26
24
  session: null)
data/docs/PublicApi.md CHANGED
@@ -4,12 +4,12 @@ All URIs are relative to *http://localhost*
4
4
 
5
5
  Method | HTTP request | Description
6
6
  ------------- | ------------- | -------------
7
- [**disconnect_user**](PublicApi.md#disconnect_user) | **GET** /oauth2/sessions/logout | OpenID Connect Front-Backchannel Enabled Logout
7
+ [**disconnect_user**](PublicApi.md#disconnect_user) | **GET** /oauth2/sessions/logout | OpenID Connect Front-Backchannel enabled Logout
8
8
  [**discover_open_id_configuration**](PublicApi.md#discover_open_id_configuration) | **GET** /.well-known/openid-configuration | OpenID Connect Discovery
9
- [**is_instance_ready**](PublicApi.md#is_instance_ready) | **GET** /health/ready | Check Readiness Status
10
- [**oauth2_token**](PublicApi.md#oauth2_token) | **POST** /oauth2/token | The OAuth 2.0 Token Endpoint
11
- [**oauth_auth**](PublicApi.md#oauth_auth) | **GET** /oauth2/auth | The OAuth 2.0 Authorize Endpoint
12
- [**revoke_o_auth2_token**](PublicApi.md#revoke_o_auth2_token) | **POST** /oauth2/revoke | Revoke OAuth2 Tokens
9
+ [**is_instance_ready**](PublicApi.md#is_instance_ready) | **GET** /health/ready | Check readiness status
10
+ [**oauth2_token**](PublicApi.md#oauth2_token) | **POST** /oauth2/token | The OAuth 2.0 token endpoint
11
+ [**oauth_auth**](PublicApi.md#oauth_auth) | **GET** /oauth2/auth | The OAuth 2.0 authorize endpoint
12
+ [**revoke_o_auth2_token**](PublicApi.md#revoke_o_auth2_token) | **POST** /oauth2/revoke | Revoke OAuth2 tokens
13
13
  [**userinfo**](PublicApi.md#userinfo) | **GET** /userinfo | OpenID Connect Userinfo
14
14
  [**well_known**](PublicApi.md#well_known) | **GET** /.well-known/jwks.json | JSON Web Keys Discovery
15
15
 
@@ -19,7 +19,7 @@ Method | HTTP request | Description
19
19
 
20
20
  > disconnect_user
21
21
 
22
- OpenID Connect Front-Backchannel Enabled Logout
22
+ OpenID Connect Front-Backchannel enabled Logout
23
23
 
24
24
  This endpoint initiates and completes user logout at ORY Hydra and initiates OpenID Connect Front-/Back-channel logout: https://openid.net/specs/openid-connect-frontchannel-1_0.html https://openid.net/specs/openid-connect-backchannel-1_0.html
25
25
 
@@ -32,7 +32,7 @@ require 'ory-hydra-client'
32
32
  api_instance = OryHydraClient::PublicApi.new
33
33
 
34
34
  begin
35
- #OpenID Connect Front-Backchannel Enabled Logout
35
+ #OpenID Connect Front-Backchannel enabled Logout
36
36
  api_instance.disconnect_user
37
37
  rescue OryHydraClient::ApiError => e
38
38
  puts "Exception when calling PublicApi->disconnect_user: #{e}"
@@ -104,7 +104,7 @@ No authorization required
104
104
 
105
105
  > HealthStatus is_instance_ready
106
106
 
107
- Check Readiness Status
107
+ Check readiness status
108
108
 
109
109
  This endpoint returns a 200 status code when the HTTP server is up running and the environment dependencies (e.g. the database) are responsive as well. If the service supports TLS Edge Termination, this endpoint does not require the `X-Forwarded-Proto` header to be set. Be aware that if you are running multiple nodes of this service, the health status will never refer to the cluster state, only to a single instance.
110
110
 
@@ -117,7 +117,7 @@ require 'ory-hydra-client'
117
117
  api_instance = OryHydraClient::PublicApi.new
118
118
 
119
119
  begin
120
- #Check Readiness Status
120
+ #Check readiness status
121
121
  result = api_instance.is_instance_ready
122
122
  p result
123
123
  rescue OryHydraClient::ApiError => e
@@ -147,7 +147,7 @@ No authorization required
147
147
 
148
148
  > Oauth2TokenResponse oauth2_token(grant_type, opts)
149
149
 
150
- The OAuth 2.0 Token Endpoint
150
+ The OAuth 2.0 token endpoint
151
151
 
152
152
  The client makes a request to the token endpoint by sending the following parameters using the \"application/x-www-form-urlencoded\" HTTP request entity-body. > Do not implement a client for this endpoint yourself. Use a library. There are many libraries > available for any programming language. You can find a list of libraries here: https://oauth.net/code/ > > Do note that Hydra SDK does not implement this endpoint properly. Use one of the libraries listed above!
153
153
 
@@ -176,7 +176,7 @@ opts = {
176
176
  }
177
177
 
178
178
  begin
179
- #The OAuth 2.0 Token Endpoint
179
+ #The OAuth 2.0 token endpoint
180
180
  result = api_instance.oauth2_token(grant_type, opts)
181
181
  p result
182
182
  rescue OryHydraClient::ApiError => e
@@ -213,7 +213,7 @@ Name | Type | Description | Notes
213
213
 
214
214
  > oauth_auth
215
215
 
216
- The OAuth 2.0 Authorize Endpoint
216
+ The OAuth 2.0 authorize endpoint
217
217
 
218
218
  This endpoint is not documented here because you should never use your own implementation to perform OAuth2 flows. OAuth2 is a very popular protocol and a library for your programming language will exists. To learn more about this flow please refer to the specification: https://tools.ietf.org/html/rfc6749
219
219
 
@@ -226,7 +226,7 @@ require 'ory-hydra-client'
226
226
  api_instance = OryHydraClient::PublicApi.new
227
227
 
228
228
  begin
229
- #The OAuth 2.0 Authorize Endpoint
229
+ #The OAuth 2.0 authorize endpoint
230
230
  api_instance.oauth_auth
231
231
  rescue OryHydraClient::ApiError => e
232
232
  puts "Exception when calling PublicApi->oauth_auth: #{e}"
@@ -255,7 +255,7 @@ No authorization required
255
255
 
256
256
  > revoke_o_auth2_token(token)
257
257
 
258
- Revoke OAuth2 Tokens
258
+ Revoke OAuth2 tokens
259
259
 
260
260
  Revoking a token (both access and refresh) means that the tokens will be invalid. A revoked access token can no longer be used to make access requests, and a revoked refresh token can no longer be used to refresh an access token. Revoking a refresh token also invalidates the access token that was created with it. A token may only be revoked by the client the token was generated for.
261
261
 
@@ -278,7 +278,7 @@ api_instance = OryHydraClient::PublicApi.new
278
278
  token = 'token_example' # String |
279
279
 
280
280
  begin
281
- #Revoke OAuth2 Tokens
281
+ #Revoke OAuth2 tokens
282
282
  api_instance.revoke_o_auth2_token(token)
283
283
  rescue OryHydraClient::ApiError => e
284
284
  puts "Exception when calling PublicApi->revoke_o_auth2_token: #{e}"