ory-hydra-client 1.2.1 → 1.4.2
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +4 -5
- data/docs/AcceptConsentRequest.md +4 -2
- data/docs/AcceptLoginRequest.md +1 -1
- data/docs/ConsentRequest.md +3 -3
- data/docs/FlushInactiveOAuth2TokensRequest.md +1 -1
- data/docs/LoginRequest.md +2 -2
- data/docs/OAuth2Client.md +12 -12
- data/docs/PreviousConsentSession.md +2 -0
- data/docs/WellKnown.md +1 -1
- data/lib/ory-hydra-client.rb +1 -2
- data/lib/ory-hydra-client/api/admin_api.rb +1 -1
- data/lib/ory-hydra-client/api/public_api.rb +1 -1
- data/lib/ory-hydra-client/api_client.rb +1 -1
- data/lib/ory-hydra-client/api_error.rb +1 -1
- data/lib/ory-hydra-client/configuration.rb +1 -1
- data/lib/ory-hydra-client/models/accept_consent_request.rb +11 -4
- data/lib/ory-hydra-client/models/accept_login_request.rb +3 -6
- data/lib/ory-hydra-client/models/completed_request.rb +1 -1
- data/lib/ory-hydra-client/models/consent_request.rb +3 -8
- data/lib/ory-hydra-client/models/consent_request_session.rb +1 -1
- data/lib/ory-hydra-client/models/flush_inactive_o_auth2_tokens_request.rb +3 -3
- data/lib/ory-hydra-client/models/generic_error.rb +1 -1
- data/lib/ory-hydra-client/models/health_not_ready_status.rb +1 -1
- data/lib/ory-hydra-client/models/health_status.rb +1 -1
- data/lib/ory-hydra-client/models/json_web_key.rb +2 -1
- data/lib/ory-hydra-client/models/json_web_key_set.rb +2 -2
- data/lib/ory-hydra-client/models/json_web_key_set_generator_request.rb +2 -2
- data/lib/ory-hydra-client/models/login_request.rb +1 -3
- data/lib/ory-hydra-client/models/logout_request.rb +1 -1
- data/lib/ory-hydra-client/models/o_auth2_client.rb +4 -13
- data/lib/ory-hydra-client/models/o_auth2_token_introspection.rb +1 -1
- data/lib/ory-hydra-client/models/oauth2_token_response.rb +2 -2
- data/lib/ory-hydra-client/models/oauth_token_response.rb +1 -1
- data/lib/ory-hydra-client/models/open_id_connect_context.rb +1 -1
- data/lib/ory-hydra-client/models/previous_consent_session.rb +13 -3
- data/lib/ory-hydra-client/models/reject_request.rb +1 -1
- data/lib/ory-hydra-client/models/userinfo_response.rb +2 -2
- data/lib/ory-hydra-client/models/version.rb +1 -1
- data/lib/ory-hydra-client/models/well_known.rb +1 -1
- data/lib/ory-hydra-client/version.rb +2 -2
- data/ory-hydra-client.gemspec +1 -1
- metadata +20 -20
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 980cf4f331ee0fd209b54c2939957a64a4f4389fa1428c551afccd07e44ccf33
|
4
|
+
data.tar.gz: 2363dc4fdfc63bed7e17406031418908eac83d74acfa4548795e3b2cb511ba38
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 679b91e2764476fac20abe1d44b9a8994150acd684e11875ca27218bbc79105a834c01563e4d5464cc083c32f66cdfa010a602ce1462e434de32acf4650d299d
|
7
|
+
data.tar.gz: 51cf57feac5eb9948cd0049343f7d1ae0ef90e94ecbab6f16b0d9b7514eb7bff4966c4ceafb63cb106d6062e894b22189af2a30bb250044c71b0db49d858f804
|
data/README.md
CHANGED
@@ -7,7 +7,7 @@ Welcome to the ORY Hydra HTTP API documentation. You will find documentation for
|
|
7
7
|
This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
|
8
8
|
|
9
9
|
- API version: latest
|
10
|
-
- Package version: v1.2
|
10
|
+
- Package version: v1.4.2
|
11
11
|
- Build package: org.openapitools.codegen.languages.RubyClientCodegen
|
12
12
|
|
13
13
|
## Installation
|
@@ -23,16 +23,16 @@ gem build ory-hydra-client.gemspec
|
|
23
23
|
Then either install the gem locally:
|
24
24
|
|
25
25
|
```shell
|
26
|
-
gem install ./ory-hydra-client-v1.2.
|
26
|
+
gem install ./ory-hydra-client-v1.4.2.gem
|
27
27
|
```
|
28
28
|
|
29
|
-
(for development, run `gem install --dev ./ory-hydra-client-v1.2.
|
29
|
+
(for development, run `gem install --dev ./ory-hydra-client-v1.4.2.gem` to install the development dependencies)
|
30
30
|
|
31
31
|
or publish the gem to a gem hosting service, e.g. [RubyGems](https://rubygems.org/).
|
32
32
|
|
33
33
|
Finally add this to the Gemfile:
|
34
34
|
|
35
|
-
gem 'ory-hydra-client', '~> v1.2
|
35
|
+
gem 'ory-hydra-client', '~> v1.4.2'
|
36
36
|
|
37
37
|
### Install from Git
|
38
38
|
|
@@ -136,7 +136,6 @@ Class | Method | HTTP request | Description
|
|
136
136
|
- [OryHydraClient::OAuth2Client](docs/OAuth2Client.md)
|
137
137
|
- [OryHydraClient::OAuth2TokenIntrospection](docs/OAuth2TokenIntrospection.md)
|
138
138
|
- [OryHydraClient::Oauth2TokenResponse](docs/Oauth2TokenResponse.md)
|
139
|
-
- [OryHydraClient::OauthTokenResponse](docs/OauthTokenResponse.md)
|
140
139
|
- [OryHydraClient::OpenIDConnectContext](docs/OpenIDConnectContext.md)
|
141
140
|
- [OryHydraClient::PreviousConsentSession](docs/PreviousConsentSession.md)
|
142
141
|
- [OryHydraClient::RejectRequest](docs/RejectRequest.md)
|
@@ -4,8 +4,9 @@
|
|
4
4
|
|
5
5
|
Name | Type | Description | Notes
|
6
6
|
------------ | ------------- | ------------- | -------------
|
7
|
-
**grant_access_token_audience** | **Array<String>** |
|
8
|
-
**grant_scope** | **Array<String>** |
|
7
|
+
**grant_access_token_audience** | **Array<String>** | | [optional]
|
8
|
+
**grant_scope** | **Array<String>** | | [optional]
|
9
|
+
**handled_at** | **DateTime** | | [optional]
|
9
10
|
**remember** | **Boolean** | Remember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same client asks the same user for the same, or a subset of, scope. | [optional]
|
10
11
|
**remember_for** | **Integer** | RememberFor sets how long the consent authorization should be remembered for in seconds. If set to `0`, the authorization will be remembered indefinitely. | [optional]
|
11
12
|
**session** | [**ConsentRequestSession**](ConsentRequestSession.md) | | [optional]
|
@@ -17,6 +18,7 @@ require 'OryHydraClient'
|
|
17
18
|
|
18
19
|
instance = OryHydraClient::AcceptConsentRequest.new(grant_access_token_audience: null,
|
19
20
|
grant_scope: null,
|
21
|
+
handled_at: null,
|
20
22
|
remember: null,
|
21
23
|
remember_for: null,
|
22
24
|
session: null)
|
data/docs/AcceptLoginRequest.md
CHANGED
@@ -5,7 +5,7 @@
|
|
5
5
|
Name | Type | Description | Notes
|
6
6
|
------------ | ------------- | ------------- | -------------
|
7
7
|
**acr** | **String** | ACR sets the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it to express that, for example, a user authenticated using two factor authentication. | [optional]
|
8
|
-
**context** | **
|
8
|
+
**context** | [**Object**](.md) | | [optional]
|
9
9
|
**force_subject_identifier** | **String** | ForceSubjectIdentifier forces the \"pairwise\" user ID of the end-user that authenticated. The \"pairwise\" user ID refers to the (Pairwise Identifier Algorithm)[http://openid.net/specs/openid-connect-core-1_0.html#PairwiseAlg] of the OpenID Connect specification. It allows you to set an obfuscated subject (\"user\") identifier that is unique to the client. Please note that this changes the user ID on endpoint /userinfo and sub claim of the ID Token. It does not change the sub claim in the OAuth 2.0 Introspection. Per default, ORY Hydra handles this value with its own algorithm. In case you want to set this yourself you can use this field. Please note that setting this field has no effect if `pairwise` is not configured in ORY Hydra or the OAuth 2.0 Client does not expect a pairwise identifier (set via `subject_type` key in the client's configuration). Please also be aware that ORY Hydra is unable to properly compute this value during authentication. This implies that you have to compute this value on every authentication process (probably depending on the client ID or some other unique value). If you fail to compute the proper value, then authentication processes which have id_token_hint set might fail. | [optional]
|
10
10
|
**remember** | **Boolean** | Remember, if set to true, tells ORY Hydra to remember this user by telling the user agent (browser) to store a cookie with authentication data. If the same user performs another OAuth 2.0 Authorization Request, he/she will not be asked to log in again. | [optional]
|
11
11
|
**remember_for** | **Integer** | RememberFor sets how long the authentication should be remembered for in seconds. If set to `0`, the authorization will be remembered for the duration of the browser session (using a session cookie). | [optional]
|
data/docs/ConsentRequest.md
CHANGED
@@ -7,13 +7,13 @@ Name | Type | Description | Notes
|
|
7
7
|
**acr** | **String** | ACR represents the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it to express that, for example, a user authenticated using two factor authentication. | [optional]
|
8
8
|
**challenge** | **String** | Challenge is the identifier (\"authorization challenge\") of the consent authorization request. It is used to identify the session. | [optional]
|
9
9
|
**client** | [**OAuth2Client**](OAuth2Client.md) | | [optional]
|
10
|
-
**context** | **
|
10
|
+
**context** | [**Object**](.md) | | [optional]
|
11
11
|
**login_challenge** | **String** | LoginChallenge is the login challenge this consent challenge belongs to. It can be used to associate a login and consent request in the login & consent app. | [optional]
|
12
12
|
**login_session_id** | **String** | LoginSessionID is the login session ID. If the user-agent reuses a login session (via cookie / remember flag) this ID will remain the same. If the user-agent did not have an existing authentication session (e.g. remember is false) this will be a new random value. This value is used as the \"sid\" parameter in the ID Token and in OIDC Front-/Back- channel logout. It's value can generally be used to associate consecutive login requests by a certain user. | [optional]
|
13
13
|
**oidc_context** | [**OpenIDConnectContext**](OpenIDConnectContext.md) | | [optional]
|
14
14
|
**request_url** | **String** | RequestURL is the original OAuth 2.0 Authorization URL requested by the OAuth 2.0 client. It is the URL which initiates the OAuth 2.0 Authorization Code or OAuth 2.0 Implicit flow. This URL is typically not needed, but might come in handy if you want to deal with additional request parameters. | [optional]
|
15
|
-
**requested_access_token_audience** | **Array<String>** |
|
16
|
-
**requested_scope** | **Array<String>** |
|
15
|
+
**requested_access_token_audience** | **Array<String>** | | [optional]
|
16
|
+
**requested_scope** | **Array<String>** | | [optional]
|
17
17
|
**skip** | **Boolean** | Skip, if true, implies that the client has requested the same scopes from the same user previously. If true, you must not ask the user to grant the requested scopes. You must however either allow or deny the consent request using the usual API call. | [optional]
|
18
18
|
**subject** | **String** | Subject is the user ID of the end-user that authenticated. Now, that end user needs to grant or deny the scope requested by the OAuth 2.0 client. | [optional]
|
19
19
|
|
@@ -4,7 +4,7 @@
|
|
4
4
|
|
5
5
|
Name | Type | Description | Notes
|
6
6
|
------------ | ------------- | ------------- | -------------
|
7
|
-
**not_after** | **DateTime** | NotAfter sets after which point tokens should not be flushed. This is useful when you want to keep a history of recently issued tokens for auditing. Format: date-time
|
7
|
+
**not_after** | **DateTime** | NotAfter sets after which point tokens should not be flushed. This is useful when you want to keep a history of recently issued tokens for auditing. Format: date-time | [optional]
|
8
8
|
|
9
9
|
## Code Sample
|
10
10
|
|
data/docs/LoginRequest.md
CHANGED
@@ -8,8 +8,8 @@ Name | Type | Description | Notes
|
|
8
8
|
**client** | [**OAuth2Client**](OAuth2Client.md) | | [optional]
|
9
9
|
**oidc_context** | [**OpenIDConnectContext**](OpenIDConnectContext.md) | | [optional]
|
10
10
|
**request_url** | **String** | RequestURL is the original OAuth 2.0 Authorization URL requested by the OAuth 2.0 client. It is the URL which initiates the OAuth 2.0 Authorization Code or OAuth 2.0 Implicit flow. This URL is typically not needed, but might come in handy if you want to deal with additional request parameters. | [optional]
|
11
|
-
**requested_access_token_audience** | **Array<String>** |
|
12
|
-
**requested_scope** | **Array<String>** |
|
11
|
+
**requested_access_token_audience** | **Array<String>** | | [optional]
|
12
|
+
**requested_scope** | **Array<String>** | | [optional]
|
13
13
|
**session_id** | **String** | SessionID is the login session ID. If the user-agent reuses a login session (via cookie / remember flag) this ID will remain the same. If the user-agent did not have an existing authentication session (e.g. remember is false) this will be a new random value. This value is used as the \"sid\" parameter in the ID Token and in OIDC Front-/Back- channel logout. It's value can generally be used to associate consecutive login requests by a certain user. | [optional]
|
14
14
|
**skip** | **Boolean** | Skip, if true, implies that the client has requested the same scopes from the same user previously. If true, you can skip asking the user to grant the requested scopes, and simply forward the user to the redirect URL. This feature allows you to update / set session information. | [optional]
|
15
15
|
**subject** | **String** | Subject is the user ID of the end-user that authenticated. Now, that end user needs to grant or deny the scope requested by the OAuth 2.0 client. If this value is set and `skip` is true, you MUST include this subject type when accepting the login request, or the request will fail. | [optional]
|
data/docs/OAuth2Client.md
CHANGED
@@ -4,8 +4,8 @@
|
|
4
4
|
|
5
5
|
Name | Type | Description | Notes
|
6
6
|
------------ | ------------- | ------------- | -------------
|
7
|
-
**allowed_cors_origins** | **Array<String>** |
|
8
|
-
**audience** | **Array<String>** |
|
7
|
+
**allowed_cors_origins** | **Array<String>** | | [optional]
|
8
|
+
**audience** | **Array<String>** | | [optional]
|
9
9
|
**backchannel_logout_session_required** | **Boolean** | Boolean value specifying whether the RP requires that a sid (session ID) Claim be included in the Logout Token to identify the RP session with the OP when the backchannel_logout_uri is used. If omitted, the default value is false. | [optional]
|
10
10
|
**backchannel_logout_uri** | **String** | RP URL that will cause the RP to log itself out when sent a Logout Token by the OP. | [optional]
|
11
11
|
**client_id** | **String** | ClientID is the id for this client. | [optional]
|
@@ -13,28 +13,28 @@ Name | Type | Description | Notes
|
|
13
13
|
**client_secret** | **String** | Secret is the client's secret. The secret will be included in the create request as cleartext, and then never again. The secret is stored using BCrypt so it is impossible to recover it. Tell your users that they need to write the secret down as it will not be made available again. | [optional]
|
14
14
|
**client_secret_expires_at** | **Integer** | SecretExpiresAt is an integer holding the time at which the client secret will expire or 0 if it will not expire. The time is represented as the number of seconds from 1970-01-01T00:00:00Z as measured in UTC until the date/time of expiration. This feature is currently not supported and it's value will always be set to 0. | [optional]
|
15
15
|
**client_uri** | **String** | ClientURI is an URL string of a web page providing information about the client. If present, the server SHOULD display this URL to the end-user in a clickable fashion. | [optional]
|
16
|
-
**contacts** | **Array<String>** |
|
17
|
-
**created_at** | **DateTime** | CreatedAt returns the timestamp of the client's creation. | [optional]
|
16
|
+
**contacts** | **Array<String>** | | [optional]
|
17
|
+
**created_at** | **DateTime** | CreatedAt returns the timestamp of the client's creation. Format: date-time | [optional]
|
18
18
|
**frontchannel_logout_session_required** | **Boolean** | Boolean value specifying whether the RP requires that iss (issuer) and sid (session ID) query parameters be included to identify the RP session with the OP when the frontchannel_logout_uri is used. If omitted, the default value is false. | [optional]
|
19
19
|
**frontchannel_logout_uri** | **String** | RP URL that will cause the RP to log itself out when rendered in an iframe by the OP. An iss (issuer) query parameter and a sid (session ID) query parameter MAY be included by the OP to enable the RP to validate the request and to determine which of the potentially multiple sessions is to be logged out; if either is included, both MUST be. | [optional]
|
20
|
-
**grant_types** | **Array<String>** |
|
21
|
-
**jwks** | [**
|
20
|
+
**grant_types** | **Array<String>** | | [optional]
|
21
|
+
**jwks** | [**Object**](.md) | | [optional]
|
22
22
|
**jwks_uri** | **String** | URL for the Client's JSON Web Key Set [JWK] document. If the Client signs requests to the Server, it contains the signing key(s) the Server uses to validate signatures from the Client. The JWK Set MAY also contain the Client's encryption keys(s), which are used by the Server to encrypt responses to the Client. When both signing and encryption keys are made available, a use (Key Use) parameter value is REQUIRED for all keys in the referenced JWK Set to indicate each key's intended usage. Although some algorithms allow the same key to be used for both signatures and encryption, doing so is NOT RECOMMENDED, as it is less secure. The JWK x5c parameter MAY be used to provide X.509 representations of keys provided. When used, the bare key values MUST still be present and MUST match those in the certificate. | [optional]
|
23
23
|
**logo_uri** | **String** | LogoURI is an URL string that references a logo for the client. | [optional]
|
24
|
-
**metadata** | [**Object**](.md) |
|
24
|
+
**metadata** | [**Object**](.md) | | [optional]
|
25
25
|
**owner** | **String** | Owner is a string identifying the owner of the OAuth 2.0 Client. | [optional]
|
26
26
|
**policy_uri** | **String** | PolicyURI is a URL string that points to a human-readable privacy policy document that describes how the deployment organization collects, uses, retains, and discloses personal data. | [optional]
|
27
|
-
**post_logout_redirect_uris** | **Array<String>** |
|
28
|
-
**redirect_uris** | **Array<String>** |
|
27
|
+
**post_logout_redirect_uris** | **Array<String>** | | [optional]
|
28
|
+
**redirect_uris** | **Array<String>** | | [optional]
|
29
29
|
**request_object_signing_alg** | **String** | JWS [JWS] alg algorithm [JWA] that MUST be used for signing Request Objects sent to the OP. All Request Objects from this Client MUST be rejected, if not signed with this algorithm. | [optional]
|
30
|
-
**request_uris** | **Array<String>** |
|
31
|
-
**response_types** | **Array<String>** |
|
30
|
+
**request_uris** | **Array<String>** | | [optional]
|
31
|
+
**response_types** | **Array<String>** | | [optional]
|
32
32
|
**scope** | **String** | Scope is a string containing a space-separated list of scope values (as described in Section 3.3 of OAuth 2.0 [RFC6749]) that the client can use when requesting access tokens. | [optional]
|
33
33
|
**sector_identifier_uri** | **String** | URL using the https scheme to be used in calculating Pseudonymous Identifiers by the OP. The URL references a file with a single JSON array of redirect_uri values. | [optional]
|
34
34
|
**subject_type** | **String** | SubjectType requested for responses to this Client. The subject_types_supported Discovery parameter contains a list of the supported subject_type values for this server. Valid types include `pairwise` and `public`. | [optional]
|
35
35
|
**token_endpoint_auth_method** | **String** | Requested Client Authentication method for the Token Endpoint. The options are client_secret_post, client_secret_basic, private_key_jwt, and none. | [optional]
|
36
36
|
**tos_uri** | **String** | TermsOfServiceURI is a URL string that points to a human-readable terms of service document for the client that describes a contractual relationship between the end-user and the client that the end-user accepts when authorizing the client. | [optional]
|
37
|
-
**updated_at** | **DateTime** | UpdatedAt returns the timestamp of the last update. | [optional]
|
37
|
+
**updated_at** | **DateTime** | UpdatedAt returns the timestamp of the last update. Format: date-time | [optional]
|
38
38
|
**userinfo_signed_response_alg** | **String** | JWS alg algorithm [JWA] REQUIRED for signing UserInfo Responses. If this is specified, the response will be JWT [JWT] serialized, and signed using JWS. The default, if omitted, is for the UserInfo Response to return the Claims as a UTF-8 encoded JSON object using the application/json content-type. | [optional]
|
39
39
|
|
40
40
|
## Code Sample
|
@@ -7,6 +7,7 @@ Name | Type | Description | Notes
|
|
7
7
|
**consent_request** | [**ConsentRequest**](ConsentRequest.md) | | [optional]
|
8
8
|
**grant_access_token_audience** | **Array<String>** | GrantedAudience sets the audience the user authorized the client to use. Should be a subset of `requested_access_token_audience`. | [optional]
|
9
9
|
**grant_scope** | **Array<String>** | GrantScope sets the scope the user authorized the client to use. Should be a subset of `requested_scope` | [optional]
|
10
|
+
**handled_at** | **DateTime** | handled at Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time | [optional]
|
10
11
|
**remember** | **Boolean** | Remember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same client asks the same user for the same, or a subset of, scope. | [optional]
|
11
12
|
**remember_for** | **Integer** | RememberFor sets how long the consent authorization should be remembered for in seconds. If set to `0`, the authorization will be remembered indefinitely. | [optional]
|
12
13
|
**session** | [**ConsentRequestSession**](ConsentRequestSession.md) | | [optional]
|
@@ -19,6 +20,7 @@ require 'OryHydraClient'
|
|
19
20
|
instance = OryHydraClient::PreviousConsentSession.new(consent_request: null,
|
20
21
|
grant_access_token_audience: null,
|
21
22
|
grant_scope: null,
|
23
|
+
handled_at: null,
|
22
24
|
remember: null,
|
23
25
|
remember_for: null,
|
24
26
|
session: null)
|
data/docs/WellKnown.md
CHANGED
@@ -55,7 +55,7 @@ instance = OryHydraClient::WellKnown.new(authorization_endpoint: https://playgro
|
|
55
55
|
response_types_supported: null,
|
56
56
|
revocation_endpoint: null,
|
57
57
|
scopes_supported: null,
|
58
|
-
subject_types_supported:
|
58
|
+
subject_types_supported: null,
|
59
59
|
token_endpoint: https://playground.ory.sh/ory-hydra/public/oauth2/token,
|
60
60
|
token_endpoint_auth_methods_supported: null,
|
61
61
|
userinfo_endpoint: null,
|
data/lib/ory-hydra-client.rb
CHANGED
@@ -6,7 +6,7 @@
|
|
6
6
|
The version of the OpenAPI document: latest
|
7
7
|
|
8
8
|
Generated by: https://openapi-generator.tech
|
9
|
-
OpenAPI Generator version: 4.2.
|
9
|
+
OpenAPI Generator version: 4.2.3
|
10
10
|
|
11
11
|
=end
|
12
12
|
|
@@ -34,7 +34,6 @@ require 'ory-hydra-client/models/logout_request'
|
|
34
34
|
require 'ory-hydra-client/models/o_auth2_client'
|
35
35
|
require 'ory-hydra-client/models/o_auth2_token_introspection'
|
36
36
|
require 'ory-hydra-client/models/oauth2_token_response'
|
37
|
-
require 'ory-hydra-client/models/oauth_token_response'
|
38
37
|
require 'ory-hydra-client/models/open_id_connect_context'
|
39
38
|
require 'ory-hydra-client/models/previous_consent_session'
|
40
39
|
require 'ory-hydra-client/models/reject_request'
|
@@ -6,7 +6,7 @@
|
|
6
6
|
The version of the OpenAPI document: latest
|
7
7
|
|
8
8
|
Generated by: https://openapi-generator.tech
|
9
|
-
OpenAPI Generator version: 4.2.
|
9
|
+
OpenAPI Generator version: 4.2.3
|
10
10
|
|
11
11
|
=end
|
12
12
|
|
@@ -14,12 +14,12 @@ require 'date'
|
|
14
14
|
|
15
15
|
module OryHydraClient
|
16
16
|
class AcceptConsentRequest
|
17
|
-
# GrantedAudience sets the audience the user authorized the client to use. Should be a subset of `requested_access_token_audience`.
|
18
17
|
attr_accessor :grant_access_token_audience
|
19
18
|
|
20
|
-
# GrantScope sets the scope the user authorized the client to use. Should be a subset of `requested_scope`.
|
21
19
|
attr_accessor :grant_scope
|
22
20
|
|
21
|
+
attr_accessor :handled_at
|
22
|
+
|
23
23
|
# Remember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same client asks the same user for the same, or a subset of, scope.
|
24
24
|
attr_accessor :remember
|
25
25
|
|
@@ -33,6 +33,7 @@ module OryHydraClient
|
|
33
33
|
{
|
34
34
|
:'grant_access_token_audience' => :'grant_access_token_audience',
|
35
35
|
:'grant_scope' => :'grant_scope',
|
36
|
+
:'handled_at' => :'handled_at',
|
36
37
|
:'remember' => :'remember',
|
37
38
|
:'remember_for' => :'remember_for',
|
38
39
|
:'session' => :'session'
|
@@ -44,6 +45,7 @@ module OryHydraClient
|
|
44
45
|
{
|
45
46
|
:'grant_access_token_audience' => :'Array<String>',
|
46
47
|
:'grant_scope' => :'Array<String>',
|
48
|
+
:'handled_at' => :'DateTime',
|
47
49
|
:'remember' => :'Boolean',
|
48
50
|
:'remember_for' => :'Integer',
|
49
51
|
:'session' => :'ConsentRequestSession'
|
@@ -83,6 +85,10 @@ module OryHydraClient
|
|
83
85
|
end
|
84
86
|
end
|
85
87
|
|
88
|
+
if attributes.key?(:'handled_at')
|
89
|
+
self.handled_at = attributes[:'handled_at']
|
90
|
+
end
|
91
|
+
|
86
92
|
if attributes.key?(:'remember')
|
87
93
|
self.remember = attributes[:'remember']
|
88
94
|
end
|
@@ -116,6 +122,7 @@ module OryHydraClient
|
|
116
122
|
self.class == o.class &&
|
117
123
|
grant_access_token_audience == o.grant_access_token_audience &&
|
118
124
|
grant_scope == o.grant_scope &&
|
125
|
+
handled_at == o.handled_at &&
|
119
126
|
remember == o.remember &&
|
120
127
|
remember_for == o.remember_for &&
|
121
128
|
session == o.session
|
@@ -130,7 +137,7 @@ module OryHydraClient
|
|
130
137
|
# Calculates hash code according to all attributes.
|
131
138
|
# @return [Integer] Hash code
|
132
139
|
def hash
|
133
|
-
[grant_access_token_audience, grant_scope, remember, remember_for, session].hash
|
140
|
+
[grant_access_token_audience, grant_scope, handled_at, remember, remember_for, session].hash
|
134
141
|
end
|
135
142
|
|
136
143
|
# Builds the object from hash
|
@@ -6,7 +6,7 @@
|
|
6
6
|
The version of the OpenAPI document: latest
|
7
7
|
|
8
8
|
Generated by: https://openapi-generator.tech
|
9
|
-
OpenAPI Generator version: 4.2.
|
9
|
+
OpenAPI Generator version: 4.2.3
|
10
10
|
|
11
11
|
=end
|
12
12
|
|
@@ -17,7 +17,6 @@ module OryHydraClient
|
|
17
17
|
# ACR sets the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it to express that, for example, a user authenticated using two factor authentication.
|
18
18
|
attr_accessor :acr
|
19
19
|
|
20
|
-
# Context is an optional object which can hold arbitrary data. The data will be made available when fetching the consent request under the \"context\" field. This is useful in scenarios where login and consent endpoints share data.
|
21
20
|
attr_accessor :context
|
22
21
|
|
23
22
|
# ForceSubjectIdentifier forces the \"pairwise\" user ID of the end-user that authenticated. The \"pairwise\" user ID refers to the (Pairwise Identifier Algorithm)[http://openid.net/specs/openid-connect-core-1_0.html#PairwiseAlg] of the OpenID Connect specification. It allows you to set an obfuscated subject (\"user\") identifier that is unique to the client. Please note that this changes the user ID on endpoint /userinfo and sub claim of the ID Token. It does not change the sub claim in the OAuth 2.0 Introspection. Per default, ORY Hydra handles this value with its own algorithm. In case you want to set this yourself you can use this field. Please note that setting this field has no effect if `pairwise` is not configured in ORY Hydra or the OAuth 2.0 Client does not expect a pairwise identifier (set via `subject_type` key in the client's configuration). Please also be aware that ORY Hydra is unable to properly compute this value during authentication. This implies that you have to compute this value on every authentication process (probably depending on the client ID or some other unique value). If you fail to compute the proper value, then authentication processes which have id_token_hint set might fail.
|
@@ -48,7 +47,7 @@ module OryHydraClient
|
|
48
47
|
def self.openapi_types
|
49
48
|
{
|
50
49
|
:'acr' => :'String',
|
51
|
-
:'context' => :'
|
50
|
+
:'context' => :'Object',
|
52
51
|
:'force_subject_identifier' => :'String',
|
53
52
|
:'remember' => :'Boolean',
|
54
53
|
:'remember_for' => :'Integer',
|
@@ -82,9 +81,7 @@ module OryHydraClient
|
|
82
81
|
end
|
83
82
|
|
84
83
|
if attributes.key?(:'context')
|
85
|
-
|
86
|
-
self.context = value
|
87
|
-
end
|
84
|
+
self.context = attributes[:'context']
|
88
85
|
end
|
89
86
|
|
90
87
|
if attributes.key?(:'force_subject_identifier')
|
@@ -6,7 +6,7 @@
|
|
6
6
|
The version of the OpenAPI document: latest
|
7
7
|
|
8
8
|
Generated by: https://openapi-generator.tech
|
9
|
-
OpenAPI Generator version: 4.2.
|
9
|
+
OpenAPI Generator version: 4.2.3
|
10
10
|
|
11
11
|
=end
|
12
12
|
|
@@ -22,7 +22,6 @@ module OryHydraClient
|
|
22
22
|
|
23
23
|
attr_accessor :client
|
24
24
|
|
25
|
-
# Context contains arbitrary information set by the login endpoint or is empty if not set.
|
26
25
|
attr_accessor :context
|
27
26
|
|
28
27
|
# LoginChallenge is the login challenge this consent challenge belongs to. It can be used to associate a login and consent request in the login & consent app.
|
@@ -36,10 +35,8 @@ module OryHydraClient
|
|
36
35
|
# RequestURL is the original OAuth 2.0 Authorization URL requested by the OAuth 2.0 client. It is the URL which initiates the OAuth 2.0 Authorization Code or OAuth 2.0 Implicit flow. This URL is typically not needed, but might come in handy if you want to deal with additional request parameters.
|
37
36
|
attr_accessor :request_url
|
38
37
|
|
39
|
-
# RequestedScope contains the access token audience as requested by the OAuth 2.0 Client.
|
40
38
|
attr_accessor :requested_access_token_audience
|
41
39
|
|
42
|
-
# RequestedScope contains the OAuth 2.0 Scope requested by the OAuth 2.0 Client.
|
43
40
|
attr_accessor :requested_scope
|
44
41
|
|
45
42
|
# Skip, if true, implies that the client has requested the same scopes from the same user previously. If true, you must not ask the user to grant the requested scopes. You must however either allow or deny the consent request using the usual API call.
|
@@ -72,7 +69,7 @@ module OryHydraClient
|
|
72
69
|
:'acr' => :'String',
|
73
70
|
:'challenge' => :'String',
|
74
71
|
:'client' => :'OAuth2Client',
|
75
|
-
:'context' => :'
|
72
|
+
:'context' => :'Object',
|
76
73
|
:'login_challenge' => :'String',
|
77
74
|
:'login_session_id' => :'String',
|
78
75
|
:'oidc_context' => :'OpenIDConnectContext',
|
@@ -118,9 +115,7 @@ module OryHydraClient
|
|
118
115
|
end
|
119
116
|
|
120
117
|
if attributes.key?(:'context')
|
121
|
-
|
122
|
-
self.context = value
|
123
|
-
end
|
118
|
+
self.context = attributes[:'context']
|
124
119
|
end
|
125
120
|
|
126
121
|
if attributes.key?(:'login_challenge')
|
@@ -6,16 +6,16 @@
|
|
6
6
|
The version of the OpenAPI document: latest
|
7
7
|
|
8
8
|
Generated by: https://openapi-generator.tech
|
9
|
-
OpenAPI Generator version: 4.2.
|
9
|
+
OpenAPI Generator version: 4.2.3
|
10
10
|
|
11
11
|
=end
|
12
12
|
|
13
13
|
require 'date'
|
14
14
|
|
15
15
|
module OryHydraClient
|
16
|
-
# FlushInactiveOAuth2TokensRequest
|
16
|
+
# FlushInactiveOAuth2TokensRequest flush inactive o auth2 tokens request
|
17
17
|
class FlushInactiveOAuth2TokensRequest
|
18
|
-
# NotAfter sets after which point tokens should not be flushed. This is useful when you want to keep a history of recently issued tokens for auditing. Format: date-time
|
18
|
+
# NotAfter sets after which point tokens should not be flushed. This is useful when you want to keep a history of recently issued tokens for auditing. Format: date-time
|
19
19
|
attr_accessor :not_after
|
20
20
|
|
21
21
|
# Attribute mapping from ruby-style variable name to JSON key.
|
@@ -6,13 +6,14 @@
|
|
6
6
|
The version of the OpenAPI document: latest
|
7
7
|
|
8
8
|
Generated by: https://openapi-generator.tech
|
9
|
-
OpenAPI Generator version: 4.2.
|
9
|
+
OpenAPI Generator version: 4.2.3
|
10
10
|
|
11
11
|
=end
|
12
12
|
|
13
13
|
require 'date'
|
14
14
|
|
15
15
|
module OryHydraClient
|
16
|
+
# It is important that this model object is named JSONWebKey for \"swagger generate spec\" to generate only on definition of a JSONWebKey.
|
16
17
|
class JSONWebKey
|
17
18
|
# The \"alg\" (algorithm) parameter identifies the algorithm intended for use with the key. The values used should either be registered in the IANA \"JSON Web Signature and Encryption Algorithms\" registry established by [JWA] or be a value that contains a Collision- Resistant Name.
|
18
19
|
attr_accessor :alg
|
@@ -6,14 +6,14 @@
|
|
6
6
|
The version of the OpenAPI document: latest
|
7
7
|
|
8
8
|
Generated by: https://openapi-generator.tech
|
9
|
-
OpenAPI Generator version: 4.2.
|
9
|
+
OpenAPI Generator version: 4.2.3
|
10
10
|
|
11
11
|
=end
|
12
12
|
|
13
13
|
require 'date'
|
14
14
|
|
15
15
|
module OryHydraClient
|
16
|
-
# JSONWebKeySet JSONWebKeySet
|
16
|
+
# It is important that this model object is named JSONWebKeySet for \"swagger generate spec\" to generate only on definition of a JSONWebKeySet. Since one with the same name is previously defined as client.Client.JSONWebKeys and this one is last, this one will be effectively written in the swagger spec.
|
17
17
|
class JSONWebKeySet
|
18
18
|
# The value of the \"keys\" parameter is an array of JWK values. By default, the order of the JWK values within the array does not imply an order of preference among them, although applications of JWK Sets can choose to assign a meaning to the order for their purposes, if desired.
|
19
19
|
attr_accessor :keys
|
@@ -6,14 +6,14 @@
|
|
6
6
|
The version of the OpenAPI document: latest
|
7
7
|
|
8
8
|
Generated by: https://openapi-generator.tech
|
9
|
-
OpenAPI Generator version: 4.2.
|
9
|
+
OpenAPI Generator version: 4.2.3
|
10
10
|
|
11
11
|
=end
|
12
12
|
|
13
13
|
require 'date'
|
14
14
|
|
15
15
|
module OryHydraClient
|
16
|
-
# JSONWebKeySetGeneratorRequest JSONWebKeySetGeneratorRequest json web key set generator request
|
16
|
+
# JSONWebKeySetGeneratorRequest JSONWebKeySetGeneratorRequest JSONWebKeySetGeneratorRequest JSONWebKeySetGeneratorRequest JSONWebKeySetGeneratorRequest json web key set generator request
|
17
17
|
class JsonWebKeySetGeneratorRequest
|
18
18
|
# The algorithm to be used for creating the key. Supports \"RS256\", \"ES512\", \"HS512\", and \"HS256\"
|
19
19
|
attr_accessor :alg
|
@@ -6,7 +6,7 @@
|
|
6
6
|
The version of the OpenAPI document: latest
|
7
7
|
|
8
8
|
Generated by: https://openapi-generator.tech
|
9
|
-
OpenAPI Generator version: 4.2.
|
9
|
+
OpenAPI Generator version: 4.2.3
|
10
10
|
|
11
11
|
=end
|
12
12
|
|
@@ -24,10 +24,8 @@ module OryHydraClient
|
|
24
24
|
# RequestURL is the original OAuth 2.0 Authorization URL requested by the OAuth 2.0 client. It is the URL which initiates the OAuth 2.0 Authorization Code or OAuth 2.0 Implicit flow. This URL is typically not needed, but might come in handy if you want to deal with additional request parameters.
|
25
25
|
attr_accessor :request_url
|
26
26
|
|
27
|
-
# RequestedScope contains the access token audience as requested by the OAuth 2.0 Client.
|
28
27
|
attr_accessor :requested_access_token_audience
|
29
28
|
|
30
|
-
# RequestedScope contains the OAuth 2.0 Scope requested by the OAuth 2.0 Client.
|
31
29
|
attr_accessor :requested_scope
|
32
30
|
|
33
31
|
# SessionID is the login session ID. If the user-agent reuses a login session (via cookie / remember flag) this ID will remain the same. If the user-agent did not have an existing authentication session (e.g. remember is false) this will be a new random value. This value is used as the \"sid\" parameter in the ID Token and in OIDC Front-/Back- channel logout. It's value can generally be used to associate consecutive login requests by a certain user.
|
@@ -6,7 +6,7 @@
|
|
6
6
|
The version of the OpenAPI document: latest
|
7
7
|
|
8
8
|
Generated by: https://openapi-generator.tech
|
9
|
-
OpenAPI Generator version: 4.2.
|
9
|
+
OpenAPI Generator version: 4.2.3
|
10
10
|
|
11
11
|
=end
|
12
12
|
|
@@ -14,10 +14,8 @@ require 'date'
|
|
14
14
|
|
15
15
|
module OryHydraClient
|
16
16
|
class OAuth2Client
|
17
|
-
# AllowedCORSOrigins are one or more URLs (scheme://host[:port]) which are allowed to make CORS requests to the /oauth/token endpoint. If this array is empty, the sever's CORS origin configuration (`CORS_ALLOWED_ORIGINS`) will be used instead. If this array is set, the allowed origins are appended to the server's CORS origin configuration. Be aware that environment variable `CORS_ENABLED` MUST be set to `true` for this to work.
|
18
17
|
attr_accessor :allowed_cors_origins
|
19
18
|
|
20
|
-
# Audience is a whitelist defining the audiences this client is allowed to request tokens for. An audience limits the applicability of an OAuth 2.0 Access Token to, for example, certain API endpoints. The value is a list of URLs. URLs MUST NOT contain whitespaces.
|
21
19
|
attr_accessor :audience
|
22
20
|
|
23
21
|
# Boolean value specifying whether the RP requires that a sid (session ID) Claim be included in the Logout Token to identify the RP session with the OP when the backchannel_logout_uri is used. If omitted, the default value is false.
|
@@ -41,10 +39,9 @@ module OryHydraClient
|
|
41
39
|
# ClientURI is an URL string of a web page providing information about the client. If present, the server SHOULD display this URL to the end-user in a clickable fashion.
|
42
40
|
attr_accessor :client_uri
|
43
41
|
|
44
|
-
# Contacts is a array of strings representing ways to contact people responsible for this client, typically email addresses.
|
45
42
|
attr_accessor :contacts
|
46
43
|
|
47
|
-
# CreatedAt returns the timestamp of the client's creation.
|
44
|
+
# CreatedAt returns the timestamp of the client's creation. Format: date-time
|
48
45
|
attr_accessor :created_at
|
49
46
|
|
50
47
|
# Boolean value specifying whether the RP requires that iss (issuer) and sid (session ID) query parameters be included to identify the RP session with the OP when the frontchannel_logout_uri is used. If omitted, the default value is false.
|
@@ -53,7 +50,6 @@ module OryHydraClient
|
|
53
50
|
# RP URL that will cause the RP to log itself out when rendered in an iframe by the OP. An iss (issuer) query parameter and a sid (session ID) query parameter MAY be included by the OP to enable the RP to validate the request and to determine which of the potentially multiple sessions is to be logged out; if either is included, both MUST be.
|
54
51
|
attr_accessor :frontchannel_logout_uri
|
55
52
|
|
56
|
-
# GrantTypes is an array of grant types the client is allowed to use.
|
57
53
|
attr_accessor :grant_types
|
58
54
|
|
59
55
|
attr_accessor :jwks
|
@@ -64,7 +60,6 @@ module OryHydraClient
|
|
64
60
|
# LogoURI is an URL string that references a logo for the client.
|
65
61
|
attr_accessor :logo_uri
|
66
62
|
|
67
|
-
# Metadata is arbitrary data.
|
68
63
|
attr_accessor :metadata
|
69
64
|
|
70
65
|
# Owner is a string identifying the owner of the OAuth 2.0 Client.
|
@@ -73,19 +68,15 @@ module OryHydraClient
|
|
73
68
|
# PolicyURI is a URL string that points to a human-readable privacy policy document that describes how the deployment organization collects, uses, retains, and discloses personal data.
|
74
69
|
attr_accessor :policy_uri
|
75
70
|
|
76
|
-
# Array of URLs supplied by the RP to which it MAY request that the End-User's User Agent be redirected using the post_logout_redirect_uri parameter after a logout has been performed.
|
77
71
|
attr_accessor :post_logout_redirect_uris
|
78
72
|
|
79
|
-
# RedirectURIs is an array of allowed redirect urls for the client, for example http://mydomain/oauth/callback .
|
80
73
|
attr_accessor :redirect_uris
|
81
74
|
|
82
75
|
# JWS [JWS] alg algorithm [JWA] that MUST be used for signing Request Objects sent to the OP. All Request Objects from this Client MUST be rejected, if not signed with this algorithm.
|
83
76
|
attr_accessor :request_object_signing_alg
|
84
77
|
|
85
|
-
# Array of request_uri values that are pre-registered by the RP for use at the OP. Servers MAY cache the contents of the files referenced by these URIs and not retrieve them at the time they are used in a request. OPs can require that request_uri values used be pre-registered with the require_request_uri_registration discovery parameter.
|
86
78
|
attr_accessor :request_uris
|
87
79
|
|
88
|
-
# ResponseTypes is an array of the OAuth 2.0 response type strings that the client can use at the authorization endpoint.
|
89
80
|
attr_accessor :response_types
|
90
81
|
|
91
82
|
# Scope is a string containing a space-separated list of scope values (as described in Section 3.3 of OAuth 2.0 [RFC6749]) that the client can use when requesting access tokens.
|
@@ -103,7 +94,7 @@ module OryHydraClient
|
|
103
94
|
# TermsOfServiceURI is a URL string that points to a human-readable terms of service document for the client that describes a contractual relationship between the end-user and the client that the end-user accepts when authorizing the client.
|
104
95
|
attr_accessor :tos_uri
|
105
96
|
|
106
|
-
# UpdatedAt returns the timestamp of the last update.
|
97
|
+
# UpdatedAt returns the timestamp of the last update. Format: date-time
|
107
98
|
attr_accessor :updated_at
|
108
99
|
|
109
100
|
# JWS alg algorithm [JWA] REQUIRED for signing UserInfo Responses. If this is specified, the response will be JWT [JWT] serialized, and signed using JWS. The default, if omitted, is for the UserInfo Response to return the Claims as a UTF-8 encoded JSON object using the application/json content-type.
|
@@ -164,7 +155,7 @@ module OryHydraClient
|
|
164
155
|
:'frontchannel_logout_session_required' => :'Boolean',
|
165
156
|
:'frontchannel_logout_uri' => :'String',
|
166
157
|
:'grant_types' => :'Array<String>',
|
167
|
-
:'jwks' => :'
|
158
|
+
:'jwks' => :'Object',
|
168
159
|
:'jwks_uri' => :'String',
|
169
160
|
:'logo_uri' => :'String',
|
170
161
|
:'metadata' => :'Object',
|
@@ -6,14 +6,14 @@
|
|
6
6
|
The version of the OpenAPI document: latest
|
7
7
|
|
8
8
|
Generated by: https://openapi-generator.tech
|
9
|
-
OpenAPI Generator version: 4.2.
|
9
|
+
OpenAPI Generator version: 4.2.3
|
10
10
|
|
11
11
|
=end
|
12
12
|
|
13
13
|
require 'date'
|
14
14
|
|
15
15
|
module OryHydraClient
|
16
|
-
#
|
16
|
+
# The Access Token Response
|
17
17
|
class Oauth2TokenResponse
|
18
18
|
# access token
|
19
19
|
attr_accessor :access_token
|
@@ -3,7 +3,7 @@
|
|
3
3
|
|
4
4
|
#Welcome to the ORY Hydra HTTP API documentation. You will find documentation for all HTTP APIs here.
|
5
5
|
|
6
|
-
The version of the OpenAPI document:
|
6
|
+
The version of the OpenAPI document: v0.0.0-alpha.40
|
7
7
|
|
8
8
|
Generated by: https://openapi-generator.tech
|
9
9
|
OpenAPI Generator version: 4.2.2
|
@@ -6,14 +6,14 @@
|
|
6
6
|
The version of the OpenAPI document: latest
|
7
7
|
|
8
8
|
Generated by: https://openapi-generator.tech
|
9
|
-
OpenAPI Generator version: 4.2.
|
9
|
+
OpenAPI Generator version: 4.2.3
|
10
10
|
|
11
11
|
=end
|
12
12
|
|
13
13
|
require 'date'
|
14
14
|
|
15
15
|
module OryHydraClient
|
16
|
-
# PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession The response used to return used consent requests same as HandledLoginRequest, just with consent_request exposed as json
|
16
|
+
# PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession The response used to return used consent requests same as HandledLoginRequest, just with consent_request exposed as json
|
17
17
|
class PreviousConsentSession
|
18
18
|
attr_accessor :consent_request
|
19
19
|
|
@@ -23,6 +23,9 @@ module OryHydraClient
|
|
23
23
|
# GrantScope sets the scope the user authorized the client to use. Should be a subset of `requested_scope`
|
24
24
|
attr_accessor :grant_scope
|
25
25
|
|
26
|
+
# handled at Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time
|
27
|
+
attr_accessor :handled_at
|
28
|
+
|
26
29
|
# Remember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same client asks the same user for the same, or a subset of, scope.
|
27
30
|
attr_accessor :remember
|
28
31
|
|
@@ -37,6 +40,7 @@ module OryHydraClient
|
|
37
40
|
:'consent_request' => :'consent_request',
|
38
41
|
:'grant_access_token_audience' => :'grant_access_token_audience',
|
39
42
|
:'grant_scope' => :'grant_scope',
|
43
|
+
:'handled_at' => :'handled_at',
|
40
44
|
:'remember' => :'remember',
|
41
45
|
:'remember_for' => :'remember_for',
|
42
46
|
:'session' => :'session'
|
@@ -49,6 +53,7 @@ module OryHydraClient
|
|
49
53
|
:'consent_request' => :'ConsentRequest',
|
50
54
|
:'grant_access_token_audience' => :'Array<String>',
|
51
55
|
:'grant_scope' => :'Array<String>',
|
56
|
+
:'handled_at' => :'DateTime',
|
52
57
|
:'remember' => :'Boolean',
|
53
58
|
:'remember_for' => :'Integer',
|
54
59
|
:'session' => :'ConsentRequestSession'
|
@@ -92,6 +97,10 @@ module OryHydraClient
|
|
92
97
|
end
|
93
98
|
end
|
94
99
|
|
100
|
+
if attributes.key?(:'handled_at')
|
101
|
+
self.handled_at = attributes[:'handled_at']
|
102
|
+
end
|
103
|
+
|
95
104
|
if attributes.key?(:'remember')
|
96
105
|
self.remember = attributes[:'remember']
|
97
106
|
end
|
@@ -126,6 +135,7 @@ module OryHydraClient
|
|
126
135
|
consent_request == o.consent_request &&
|
127
136
|
grant_access_token_audience == o.grant_access_token_audience &&
|
128
137
|
grant_scope == o.grant_scope &&
|
138
|
+
handled_at == o.handled_at &&
|
129
139
|
remember == o.remember &&
|
130
140
|
remember_for == o.remember_for &&
|
131
141
|
session == o.session
|
@@ -140,7 +150,7 @@ module OryHydraClient
|
|
140
150
|
# Calculates hash code according to all attributes.
|
141
151
|
# @return [Integer] Hash code
|
142
152
|
def hash
|
143
|
-
[consent_request, grant_access_token_audience, grant_scope, remember, remember_for, session].hash
|
153
|
+
[consent_request, grant_access_token_audience, grant_scope, handled_at, remember, remember_for, session].hash
|
144
154
|
end
|
145
155
|
|
146
156
|
# Builds the object from hash
|
@@ -6,14 +6,14 @@
|
|
6
6
|
The version of the OpenAPI document: latest
|
7
7
|
|
8
8
|
Generated by: https://openapi-generator.tech
|
9
|
-
OpenAPI Generator version: 4.2.
|
9
|
+
OpenAPI Generator version: 4.2.3
|
10
10
|
|
11
11
|
=end
|
12
12
|
|
13
13
|
require 'date'
|
14
14
|
|
15
15
|
module OryHydraClient
|
16
|
-
#
|
16
|
+
# The userinfo response
|
17
17
|
class UserinfoResponse
|
18
18
|
# End-User's birthday, represented as an ISO 8601:2004 [ISO8601‑2004] YYYY-MM-DD format. The year MAY be 0000, indicating that it is omitted. To represent only the year, YYYY format is allowed. Note that depending on the underlying platform's date related function, providing just year can result in varying month and day, so the implementers need to take this factor into account to correctly process the dates.
|
19
19
|
attr_accessor :birthdate
|
data/ory-hydra-client.gemspec
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: ory-hydra-client
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.2
|
4
|
+
version: 1.4.2
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- ORY GmbH
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2020-
|
11
|
+
date: 2020-04-03 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: typhoeus
|
@@ -197,28 +197,28 @@ test_files:
|
|
197
197
|
- spec/api/public_api_spec.rb
|
198
198
|
- spec/api_client_spec.rb
|
199
199
|
- spec/configuration_spec.rb
|
200
|
-
- spec/models/
|
201
|
-
- spec/models/
|
202
|
-
- spec/models/
|
200
|
+
- spec/models/flush_inactive_o_auth2_tokens_request_spec.rb
|
201
|
+
- spec/models/o_auth2_token_introspection_spec.rb
|
202
|
+
- spec/models/open_id_connect_context_spec.rb
|
203
|
+
- spec/models/health_status_spec.rb
|
203
204
|
- spec/models/version_spec.rb
|
205
|
+
- spec/models/completed_request_spec.rb
|
206
|
+
- spec/models/health_not_ready_status_spec.rb
|
207
|
+
- spec/models/json_web_key_set_spec.rb
|
204
208
|
- spec/models/json_web_key_spec.rb
|
205
|
-
- spec/models/
|
206
|
-
- spec/models/logout_request_spec.rb
|
207
|
-
- spec/models/generic_error_spec.rb
|
208
|
-
- spec/models/login_request_spec.rb
|
209
|
-
- spec/models/health_status_spec.rb
|
209
|
+
- spec/models/reject_request_spec.rb
|
210
210
|
- spec/models/well_known_spec.rb
|
211
|
+
- spec/models/userinfo_response_spec.rb
|
212
|
+
- spec/models/accept_consent_request_spec.rb
|
213
|
+
- spec/models/json_web_key_set_generator_request_spec.rb
|
211
214
|
- spec/models/previous_consent_session_spec.rb
|
212
|
-
- spec/models/
|
213
|
-
- spec/models/
|
214
|
-
- spec/models/accept_login_request_spec.rb
|
215
|
-
- spec/models/reject_request_spec.rb
|
216
|
-
- spec/models/oauth_token_response_spec.rb
|
217
|
-
- spec/models/flush_inactive_o_auth2_tokens_request_spec.rb
|
218
|
-
- spec/models/health_not_ready_status_spec.rb
|
219
|
-
- spec/models/consent_request_spec.rb
|
215
|
+
- spec/models/login_request_spec.rb
|
216
|
+
- spec/models/o_auth2_client_spec.rb
|
220
217
|
- spec/models/consent_request_session_spec.rb
|
218
|
+
- spec/models/logout_request_spec.rb
|
221
219
|
- spec/models/oauth2_token_response_spec.rb
|
222
|
-
- spec/models/
|
223
|
-
- spec/models/
|
220
|
+
- spec/models/oauth_token_response_spec.rb
|
221
|
+
- spec/models/accept_login_request_spec.rb
|
222
|
+
- spec/models/consent_request_spec.rb
|
223
|
+
- spec/models/generic_error_spec.rb
|
224
224
|
- spec/spec_helper.rb
|