ory-hydra-client 1.3.2 → 1.4.1

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 84785bafebe74ac2172af5b7de7f9df9589ea739203cd1f42ffba4b390312349
4
- data.tar.gz: 90181927d4a4ad732c1e62213041116476525d8080c651ec2fb8bfe22d5dba6e
3
+ metadata.gz: d6a490f9faac07623e5aa7a01dfbc589530ab39bbd66fea049fcefecc4dfb1c1
4
+ data.tar.gz: aed7cd0c1400fdfabb70dbeeaf004721b5d5e64ac13c9223c181cce0139896a0
5
5
  SHA512:
6
- metadata.gz: 46e2bb09670740872b0d13b69efb636776ffcdb3380524fa4bb2ab8c3074d48ef98eac78130f459d76a52bc0def440370e78d3df6bb4e7846ba0fc142103519a
7
- data.tar.gz: 8b283644d069a220bcc1e0c51cec826d9dbbfbf58bd0d42538e6b28d51231eb528a4e254e623a8380505c77c823b9ea1b0a5a9fec14305b50455931adc280c38
6
+ metadata.gz: 398db49801184b680ad5f051c9769006778181df8e4f56e09b6eb3a61b0636a796743b36c50689d3e2d327a8863d4f2cd95286406ce6d953df5f38bd48654790
7
+ data.tar.gz: 131372a2fd30b34d7ffb09e1ddb32e32e1130a8f5976b6a4e81e4de346cf243bd0cfc00a677060488f26be681a4bc1b3a0cf2c5a2c27b8234416131985d64431
data/README.md CHANGED
@@ -7,7 +7,7 @@ Welcome to the ORY Hydra HTTP API documentation. You will find documentation for
7
7
  This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
8
8
 
9
9
  - API version: latest
10
- - Package version: v1.3.2
10
+ - Package version: v1.4.1
11
11
  - Build package: org.openapitools.codegen.languages.RubyClientCodegen
12
12
 
13
13
  ## Installation
@@ -23,16 +23,16 @@ gem build ory-hydra-client.gemspec
23
23
  Then either install the gem locally:
24
24
 
25
25
  ```shell
26
- gem install ./ory-hydra-client-v1.3.2.gem
26
+ gem install ./ory-hydra-client-v1.4.1.gem
27
27
  ```
28
28
 
29
- (for development, run `gem install --dev ./ory-hydra-client-v1.3.2.gem` to install the development dependencies)
29
+ (for development, run `gem install --dev ./ory-hydra-client-v1.4.1.gem` to install the development dependencies)
30
30
 
31
31
  or publish the gem to a gem hosting service, e.g. [RubyGems](https://rubygems.org/).
32
32
 
33
33
  Finally add this to the Gemfile:
34
34
 
35
- gem 'ory-hydra-client', '~> v1.3.2'
35
+ gem 'ory-hydra-client', '~> v1.4.1'
36
36
 
37
37
  ### Install from Git
38
38
 
@@ -4,9 +4,9 @@
4
4
 
5
5
  Name | Type | Description | Notes
6
6
  ------------ | ------------- | ------------- | -------------
7
- **grant_access_token_audience** | **Array<String>** | GrantedAudience sets the audience the user authorized the client to use. Should be a subset of `requested_access_token_audience`. | [optional]
8
- **grant_scope** | **Array<String>** | GrantScope sets the scope the user authorized the client to use. Should be a subset of `requested_scope`. | [optional]
9
- **handled_at** | **DateTime** | HandledAt contains the timestamp the consent request was handled. | [optional]
7
+ **grant_access_token_audience** | **Array<String>** | | [optional]
8
+ **grant_scope** | **Array<String>** | | [optional]
9
+ **handled_at** | **DateTime** | | [optional]
10
10
  **remember** | **Boolean** | Remember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same client asks the same user for the same, or a subset of, scope. | [optional]
11
11
  **remember_for** | **Integer** | RememberFor sets how long the consent authorization should be remembered for in seconds. If set to `0`, the authorization will be remembered indefinitely. | [optional]
12
12
  **session** | [**ConsentRequestSession**](ConsentRequestSession.md) | | [optional]
@@ -5,7 +5,7 @@
5
5
  Name | Type | Description | Notes
6
6
  ------------ | ------------- | ------------- | -------------
7
7
  **acr** | **String** | ACR sets the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it to express that, for example, a user authenticated using two factor authentication. | [optional]
8
- **context** | **Hash<String, Object>** | Context is an optional object which can hold arbitrary data. The data will be made available when fetching the consent request under the \"context\" field. This is useful in scenarios where login and consent endpoints share data. | [optional]
8
+ **context** | [**Object**](.md) | | [optional]
9
9
  **force_subject_identifier** | **String** | ForceSubjectIdentifier forces the \"pairwise\" user ID of the end-user that authenticated. The \"pairwise\" user ID refers to the (Pairwise Identifier Algorithm)[http://openid.net/specs/openid-connect-core-1_0.html#PairwiseAlg] of the OpenID Connect specification. It allows you to set an obfuscated subject (\"user\") identifier that is unique to the client. Please note that this changes the user ID on endpoint /userinfo and sub claim of the ID Token. It does not change the sub claim in the OAuth 2.0 Introspection. Per default, ORY Hydra handles this value with its own algorithm. In case you want to set this yourself you can use this field. Please note that setting this field has no effect if `pairwise` is not configured in ORY Hydra or the OAuth 2.0 Client does not expect a pairwise identifier (set via `subject_type` key in the client's configuration). Please also be aware that ORY Hydra is unable to properly compute this value during authentication. This implies that you have to compute this value on every authentication process (probably depending on the client ID or some other unique value). If you fail to compute the proper value, then authentication processes which have id_token_hint set might fail. | [optional]
10
10
  **remember** | **Boolean** | Remember, if set to true, tells ORY Hydra to remember this user by telling the user agent (browser) to store a cookie with authentication data. If the same user performs another OAuth 2.0 Authorization Request, he/she will not be asked to log in again. | [optional]
11
11
  **remember_for** | **Integer** | RememberFor sets how long the authentication should be remembered for in seconds. If set to `0`, the authorization will be remembered for the duration of the browser session (using a session cookie). | [optional]
@@ -7,13 +7,13 @@ Name | Type | Description | Notes
7
7
  **acr** | **String** | ACR represents the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it to express that, for example, a user authenticated using two factor authentication. | [optional]
8
8
  **challenge** | **String** | Challenge is the identifier (\"authorization challenge\") of the consent authorization request. It is used to identify the session. | [optional]
9
9
  **client** | [**OAuth2Client**](OAuth2Client.md) | | [optional]
10
- **context** | **Hash<String, Object>** | Context contains arbitrary information set by the login endpoint or is empty if not set. | [optional]
10
+ **context** | [**Object**](.md) | | [optional]
11
11
  **login_challenge** | **String** | LoginChallenge is the login challenge this consent challenge belongs to. It can be used to associate a login and consent request in the login & consent app. | [optional]
12
12
  **login_session_id** | **String** | LoginSessionID is the login session ID. If the user-agent reuses a login session (via cookie / remember flag) this ID will remain the same. If the user-agent did not have an existing authentication session (e.g. remember is false) this will be a new random value. This value is used as the \"sid\" parameter in the ID Token and in OIDC Front-/Back- channel logout. It's value can generally be used to associate consecutive login requests by a certain user. | [optional]
13
13
  **oidc_context** | [**OpenIDConnectContext**](OpenIDConnectContext.md) | | [optional]
14
14
  **request_url** | **String** | RequestURL is the original OAuth 2.0 Authorization URL requested by the OAuth 2.0 client. It is the URL which initiates the OAuth 2.0 Authorization Code or OAuth 2.0 Implicit flow. This URL is typically not needed, but might come in handy if you want to deal with additional request parameters. | [optional]
15
- **requested_access_token_audience** | **Array<String>** | RequestedScope contains the access token audience as requested by the OAuth 2.0 Client. | [optional]
16
- **requested_scope** | **Array<String>** | RequestedScope contains the OAuth 2.0 Scope requested by the OAuth 2.0 Client. | [optional]
15
+ **requested_access_token_audience** | **Array<String>** | | [optional]
16
+ **requested_scope** | **Array<String>** | | [optional]
17
17
  **skip** | **Boolean** | Skip, if true, implies that the client has requested the same scopes from the same user previously. If true, you must not ask the user to grant the requested scopes. You must however either allow or deny the consent request using the usual API call. | [optional]
18
18
  **subject** | **String** | Subject is the user ID of the end-user that authenticated. Now, that end user needs to grant or deny the scope requested by the OAuth 2.0 client. | [optional]
19
19
 
data/docs/LoginRequest.md CHANGED
@@ -8,8 +8,8 @@ Name | Type | Description | Notes
8
8
  **client** | [**OAuth2Client**](OAuth2Client.md) | | [optional]
9
9
  **oidc_context** | [**OpenIDConnectContext**](OpenIDConnectContext.md) | | [optional]
10
10
  **request_url** | **String** | RequestURL is the original OAuth 2.0 Authorization URL requested by the OAuth 2.0 client. It is the URL which initiates the OAuth 2.0 Authorization Code or OAuth 2.0 Implicit flow. This URL is typically not needed, but might come in handy if you want to deal with additional request parameters. | [optional]
11
- **requested_access_token_audience** | **Array<String>** | RequestedScope contains the access token audience as requested by the OAuth 2.0 Client. | [optional]
12
- **requested_scope** | **Array<String>** | RequestedScope contains the OAuth 2.0 Scope requested by the OAuth 2.0 Client. | [optional]
11
+ **requested_access_token_audience** | **Array<String>** | | [optional]
12
+ **requested_scope** | **Array<String>** | | [optional]
13
13
  **session_id** | **String** | SessionID is the login session ID. If the user-agent reuses a login session (via cookie / remember flag) this ID will remain the same. If the user-agent did not have an existing authentication session (e.g. remember is false) this will be a new random value. This value is used as the \"sid\" parameter in the ID Token and in OIDC Front-/Back- channel logout. It's value can generally be used to associate consecutive login requests by a certain user. | [optional]
14
14
  **skip** | **Boolean** | Skip, if true, implies that the client has requested the same scopes from the same user previously. If true, you can skip asking the user to grant the requested scopes, and simply forward the user to the redirect URL. This feature allows you to update / set session information. | [optional]
15
15
  **subject** | **String** | Subject is the user ID of the end-user that authenticated. Now, that end user needs to grant or deny the scope requested by the OAuth 2.0 client. If this value is set and `skip` is true, you MUST include this subject type when accepting the login request, or the request will fail. | [optional]
data/docs/OAuth2Client.md CHANGED
@@ -4,8 +4,8 @@
4
4
 
5
5
  Name | Type | Description | Notes
6
6
  ------------ | ------------- | ------------- | -------------
7
- **allowed_cors_origins** | **Array<String>** | AllowedCORSOrigins are one or more URLs (scheme://host[:port]) which are allowed to make CORS requests to the /oauth/token endpoint. If this array is empty, the sever's CORS origin configuration (`CORS_ALLOWED_ORIGINS`) will be used instead. If this array is set, the allowed origins are appended to the server's CORS origin configuration. Be aware that environment variable `CORS_ENABLED` MUST be set to `true` for this to work. | [optional]
8
- **audience** | **Array<String>** | Audience is a whitelist defining the audiences this client is allowed to request tokens for. An audience limits the applicability of an OAuth 2.0 Access Token to, for example, certain API endpoints. The value is a list of URLs. URLs MUST NOT contain whitespaces. | [optional]
7
+ **allowed_cors_origins** | **Array<String>** | | [optional]
8
+ **audience** | **Array<String>** | | [optional]
9
9
  **backchannel_logout_session_required** | **Boolean** | Boolean value specifying whether the RP requires that a sid (session ID) Claim be included in the Logout Token to identify the RP session with the OP when the backchannel_logout_uri is used. If omitted, the default value is false. | [optional]
10
10
  **backchannel_logout_uri** | **String** | RP URL that will cause the RP to log itself out when sent a Logout Token by the OP. | [optional]
11
11
  **client_id** | **String** | ClientID is the id for this client. | [optional]
@@ -13,28 +13,28 @@ Name | Type | Description | Notes
13
13
  **client_secret** | **String** | Secret is the client's secret. The secret will be included in the create request as cleartext, and then never again. The secret is stored using BCrypt so it is impossible to recover it. Tell your users that they need to write the secret down as it will not be made available again. | [optional]
14
14
  **client_secret_expires_at** | **Integer** | SecretExpiresAt is an integer holding the time at which the client secret will expire or 0 if it will not expire. The time is represented as the number of seconds from 1970-01-01T00:00:00Z as measured in UTC until the date/time of expiration. This feature is currently not supported and it's value will always be set to 0. | [optional]
15
15
  **client_uri** | **String** | ClientURI is an URL string of a web page providing information about the client. If present, the server SHOULD display this URL to the end-user in a clickable fashion. | [optional]
16
- **contacts** | **Array<String>** | Contacts is a array of strings representing ways to contact people responsible for this client, typically email addresses. | [optional]
17
- **created_at** | **DateTime** | CreatedAt returns the timestamp of the client's creation. | [optional]
16
+ **contacts** | **Array<String>** | | [optional]
17
+ **created_at** | **DateTime** | CreatedAt returns the timestamp of the client's creation. Format: date-time | [optional]
18
18
  **frontchannel_logout_session_required** | **Boolean** | Boolean value specifying whether the RP requires that iss (issuer) and sid (session ID) query parameters be included to identify the RP session with the OP when the frontchannel_logout_uri is used. If omitted, the default value is false. | [optional]
19
19
  **frontchannel_logout_uri** | **String** | RP URL that will cause the RP to log itself out when rendered in an iframe by the OP. An iss (issuer) query parameter and a sid (session ID) query parameter MAY be included by the OP to enable the RP to validate the request and to determine which of the potentially multiple sessions is to be logged out; if either is included, both MUST be. | [optional]
20
- **grant_types** | **Array<String>** | GrantTypes is an array of grant types the client is allowed to use. | [optional]
21
- **jwks** | [**JSONWebKeySet**](JSONWebKeySet.md) | | [optional]
20
+ **grant_types** | **Array<String>** | | [optional]
21
+ **jwks** | [**Object**](.md) | | [optional]
22
22
  **jwks_uri** | **String** | URL for the Client's JSON Web Key Set [JWK] document. If the Client signs requests to the Server, it contains the signing key(s) the Server uses to validate signatures from the Client. The JWK Set MAY also contain the Client's encryption keys(s), which are used by the Server to encrypt responses to the Client. When both signing and encryption keys are made available, a use (Key Use) parameter value is REQUIRED for all keys in the referenced JWK Set to indicate each key's intended usage. Although some algorithms allow the same key to be used for both signatures and encryption, doing so is NOT RECOMMENDED, as it is less secure. The JWK x5c parameter MAY be used to provide X.509 representations of keys provided. When used, the bare key values MUST still be present and MUST match those in the certificate. | [optional]
23
23
  **logo_uri** | **String** | LogoURI is an URL string that references a logo for the client. | [optional]
24
- **metadata** | [**Object**](.md) | Metadata is arbitrary data. | [optional]
24
+ **metadata** | [**Object**](.md) | | [optional]
25
25
  **owner** | **String** | Owner is a string identifying the owner of the OAuth 2.0 Client. | [optional]
26
26
  **policy_uri** | **String** | PolicyURI is a URL string that points to a human-readable privacy policy document that describes how the deployment organization collects, uses, retains, and discloses personal data. | [optional]
27
- **post_logout_redirect_uris** | **Array<String>** | Array of URLs supplied by the RP to which it MAY request that the End-User's User Agent be redirected using the post_logout_redirect_uri parameter after a logout has been performed. | [optional]
28
- **redirect_uris** | **Array<String>** | RedirectURIs is an array of allowed redirect urls for the client, for example http://mydomain/oauth/callback . | [optional]
27
+ **post_logout_redirect_uris** | **Array<String>** | | [optional]
28
+ **redirect_uris** | **Array<String>** | | [optional]
29
29
  **request_object_signing_alg** | **String** | JWS [JWS] alg algorithm [JWA] that MUST be used for signing Request Objects sent to the OP. All Request Objects from this Client MUST be rejected, if not signed with this algorithm. | [optional]
30
- **request_uris** | **Array<String>** | Array of request_uri values that are pre-registered by the RP for use at the OP. Servers MAY cache the contents of the files referenced by these URIs and not retrieve them at the time they are used in a request. OPs can require that request_uri values used be pre-registered with the require_request_uri_registration discovery parameter. | [optional]
31
- **response_types** | **Array<String>** | ResponseTypes is an array of the OAuth 2.0 response type strings that the client can use at the authorization endpoint. | [optional]
30
+ **request_uris** | **Array<String>** | | [optional]
31
+ **response_types** | **Array<String>** | | [optional]
32
32
  **scope** | **String** | Scope is a string containing a space-separated list of scope values (as described in Section 3.3 of OAuth 2.0 [RFC6749]) that the client can use when requesting access tokens. | [optional]
33
33
  **sector_identifier_uri** | **String** | URL using the https scheme to be used in calculating Pseudonymous Identifiers by the OP. The URL references a file with a single JSON array of redirect_uri values. | [optional]
34
34
  **subject_type** | **String** | SubjectType requested for responses to this Client. The subject_types_supported Discovery parameter contains a list of the supported subject_type values for this server. Valid types include `pairwise` and `public`. | [optional]
35
35
  **token_endpoint_auth_method** | **String** | Requested Client Authentication method for the Token Endpoint. The options are client_secret_post, client_secret_basic, private_key_jwt, and none. | [optional]
36
36
  **tos_uri** | **String** | TermsOfServiceURI is a URL string that points to a human-readable terms of service document for the client that describes a contractual relationship between the end-user and the client that the end-user accepts when authorizing the client. | [optional]
37
- **updated_at** | **DateTime** | UpdatedAt returns the timestamp of the last update. | [optional]
37
+ **updated_at** | **DateTime** | UpdatedAt returns the timestamp of the last update. Format: date-time | [optional]
38
38
  **userinfo_signed_response_alg** | **String** | JWS alg algorithm [JWA] REQUIRED for signing UserInfo Responses. If this is specified, the response will be JWT [JWT] serialized, and signed using JWS. The default, if omitted, is for the UserInfo Response to return the Claims as a UTF-8 encoded JSON object using the application/json content-type. | [optional]
39
39
 
40
40
  ## Code Sample
@@ -4,12 +4,12 @@
4
4
 
5
5
  Name | Type | Description | Notes
6
6
  ------------ | ------------- | ------------- | -------------
7
- **access_token** | **String** | | [optional]
8
- **expires_in** | **Integer** | | [optional]
9
- **id_token** | **String** | | [optional]
10
- **refresh_token** | **String** | | [optional]
11
- **scope** | **String** | | [optional]
12
- **token_type** | **String** | | [optional]
7
+ **access_token** | **String** | access token | [optional]
8
+ **expires_in** | **Integer** | expires in | [optional]
9
+ **id_token** | **String** | id token | [optional]
10
+ **refresh_token** | **String** | refresh token | [optional]
11
+ **scope** | **String** | scope | [optional]
12
+ **token_type** | **String** | token type | [optional]
13
13
 
14
14
  ## Code Sample
15
15
 
@@ -7,7 +7,7 @@ Name | Type | Description | Notes
7
7
  **consent_request** | [**ConsentRequest**](ConsentRequest.md) | | [optional]
8
8
  **grant_access_token_audience** | **Array<String>** | GrantedAudience sets the audience the user authorized the client to use. Should be a subset of `requested_access_token_audience`. | [optional]
9
9
  **grant_scope** | **Array<String>** | GrantScope sets the scope the user authorized the client to use. Should be a subset of `requested_scope` | [optional]
10
- **handled_at** | **DateTime** | | [optional]
10
+ **handled_at** | **DateTime** | handled at Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time | [optional]
11
11
  **remember** | **Boolean** | Remember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same client asks the same user for the same, or a subset of, scope. | [optional]
12
12
  **remember_for** | **Integer** | RememberFor sets how long the consent authorization should be remembered for in seconds. If set to `0`, the authorization will be remembered indefinitely. | [optional]
13
13
  **session** | [**ConsentRequestSession**](ConsentRequestSession.md) | | [optional]
@@ -4,11 +4,11 @@
4
4
 
5
5
  Name | Type | Description | Notes
6
6
  ------------ | ------------- | ------------- | -------------
7
- **error** | **String** | | [optional]
8
- **error_debug** | **String** | | [optional]
9
- **error_description** | **String** | | [optional]
10
- **error_hint** | **String** | | [optional]
11
- **status_code** | **Integer** | | [optional]
7
+ **error** | **String** | error | [optional]
8
+ **error_debug** | **String** | error debug | [optional]
9
+ **error_description** | **String** | error description | [optional]
10
+ **error_hint** | **String** | error hint | [optional]
11
+ **status_code** | **Integer** | status code | [optional]
12
12
 
13
13
  ## Code Sample
14
14
 
data/docs/WellKnown.md CHANGED
@@ -55,7 +55,7 @@ instance = OryHydraClient::WellKnown.new(authorization_endpoint: https://playgro
55
55
  response_types_supported: null,
56
56
  revocation_endpoint: null,
57
57
  scopes_supported: null,
58
- subject_types_supported: public, pairwise,
58
+ subject_types_supported: null,
59
59
  token_endpoint: https://playground.ory.sh/ory-hydra/public/oauth2/token,
60
60
  token_endpoint_auth_methods_supported: null,
61
61
  userinfo_endpoint: null,
@@ -14,13 +14,10 @@ require 'date'
14
14
 
15
15
  module OryHydraClient
16
16
  class AcceptConsentRequest
17
- # GrantedAudience sets the audience the user authorized the client to use. Should be a subset of `requested_access_token_audience`.
18
17
  attr_accessor :grant_access_token_audience
19
18
 
20
- # GrantScope sets the scope the user authorized the client to use. Should be a subset of `requested_scope`.
21
19
  attr_accessor :grant_scope
22
20
 
23
- # HandledAt contains the timestamp the consent request was handled.
24
21
  attr_accessor :handled_at
25
22
 
26
23
  # Remember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same client asks the same user for the same, or a subset of, scope.
@@ -17,7 +17,6 @@ module OryHydraClient
17
17
  # ACR sets the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it to express that, for example, a user authenticated using two factor authentication.
18
18
  attr_accessor :acr
19
19
 
20
- # Context is an optional object which can hold arbitrary data. The data will be made available when fetching the consent request under the \"context\" field. This is useful in scenarios where login and consent endpoints share data.
21
20
  attr_accessor :context
22
21
 
23
22
  # ForceSubjectIdentifier forces the \"pairwise\" user ID of the end-user that authenticated. The \"pairwise\" user ID refers to the (Pairwise Identifier Algorithm)[http://openid.net/specs/openid-connect-core-1_0.html#PairwiseAlg] of the OpenID Connect specification. It allows you to set an obfuscated subject (\"user\") identifier that is unique to the client. Please note that this changes the user ID on endpoint /userinfo and sub claim of the ID Token. It does not change the sub claim in the OAuth 2.0 Introspection. Per default, ORY Hydra handles this value with its own algorithm. In case you want to set this yourself you can use this field. Please note that setting this field has no effect if `pairwise` is not configured in ORY Hydra or the OAuth 2.0 Client does not expect a pairwise identifier (set via `subject_type` key in the client's configuration). Please also be aware that ORY Hydra is unable to properly compute this value during authentication. This implies that you have to compute this value on every authentication process (probably depending on the client ID or some other unique value). If you fail to compute the proper value, then authentication processes which have id_token_hint set might fail.
@@ -48,7 +47,7 @@ module OryHydraClient
48
47
  def self.openapi_types
49
48
  {
50
49
  :'acr' => :'String',
51
- :'context' => :'Hash<String, Object>',
50
+ :'context' => :'Object',
52
51
  :'force_subject_identifier' => :'String',
53
52
  :'remember' => :'Boolean',
54
53
  :'remember_for' => :'Integer',
@@ -82,9 +81,7 @@ module OryHydraClient
82
81
  end
83
82
 
84
83
  if attributes.key?(:'context')
85
- if (value = attributes[:'context']).is_a?(Hash)
86
- self.context = value
87
- end
84
+ self.context = attributes[:'context']
88
85
  end
89
86
 
90
87
  if attributes.key?(:'force_subject_identifier')
@@ -22,7 +22,6 @@ module OryHydraClient
22
22
 
23
23
  attr_accessor :client
24
24
 
25
- # Context contains arbitrary information set by the login endpoint or is empty if not set.
26
25
  attr_accessor :context
27
26
 
28
27
  # LoginChallenge is the login challenge this consent challenge belongs to. It can be used to associate a login and consent request in the login & consent app.
@@ -36,10 +35,8 @@ module OryHydraClient
36
35
  # RequestURL is the original OAuth 2.0 Authorization URL requested by the OAuth 2.0 client. It is the URL which initiates the OAuth 2.0 Authorization Code or OAuth 2.0 Implicit flow. This URL is typically not needed, but might come in handy if you want to deal with additional request parameters.
37
36
  attr_accessor :request_url
38
37
 
39
- # RequestedScope contains the access token audience as requested by the OAuth 2.0 Client.
40
38
  attr_accessor :requested_access_token_audience
41
39
 
42
- # RequestedScope contains the OAuth 2.0 Scope requested by the OAuth 2.0 Client.
43
40
  attr_accessor :requested_scope
44
41
 
45
42
  # Skip, if true, implies that the client has requested the same scopes from the same user previously. If true, you must not ask the user to grant the requested scopes. You must however either allow or deny the consent request using the usual API call.
@@ -72,7 +69,7 @@ module OryHydraClient
72
69
  :'acr' => :'String',
73
70
  :'challenge' => :'String',
74
71
  :'client' => :'OAuth2Client',
75
- :'context' => :'Hash<String, Object>',
72
+ :'context' => :'Object',
76
73
  :'login_challenge' => :'String',
77
74
  :'login_session_id' => :'String',
78
75
  :'oidc_context' => :'OpenIDConnectContext',
@@ -118,9 +115,7 @@ module OryHydraClient
118
115
  end
119
116
 
120
117
  if attributes.key?(:'context')
121
- if (value = attributes[:'context']).is_a?(Hash)
122
- self.context = value
123
- end
118
+ self.context = attributes[:'context']
124
119
  end
125
120
 
126
121
  if attributes.key?(:'login_challenge')
@@ -13,6 +13,7 @@ OpenAPI Generator version: 4.2.3
13
13
  require 'date'
14
14
 
15
15
  module OryHydraClient
16
+ # HealthNotReadyStatus health not ready status
16
17
  class HealthNotReadyStatus
17
18
  # Errors contains a list of errors that caused the not ready status.
18
19
  attr_accessor :errors
@@ -13,6 +13,7 @@ OpenAPI Generator version: 4.2.3
13
13
  require 'date'
14
14
 
15
15
  module OryHydraClient
16
+ # It is important that this model object is named JSONWebKey for \"swagger generate spec\" to generate only on definition of a JSONWebKey.
16
17
  class JSONWebKey
17
18
  # The \"alg\" (algorithm) parameter identifies the algorithm intended for use with the key. The values used should either be registered in the IANA \"JSON Web Signature and Encryption Algorithms\" registry established by [JWA] or be a value that contains a Collision- Resistant Name.
18
19
  attr_accessor :alg
@@ -13,6 +13,7 @@ OpenAPI Generator version: 4.2.3
13
13
  require 'date'
14
14
 
15
15
  module OryHydraClient
16
+ # It is important that this model object is named JSONWebKeySet for \"swagger generate spec\" to generate only on definition of a JSONWebKeySet. Since one with the same name is previously defined as client.Client.JSONWebKeys and this one is last, this one will be effectively written in the swagger spec.
16
17
  class JSONWebKeySet
17
18
  # The value of the \"keys\" parameter is an array of JWK values. By default, the order of the JWK values within the array does not imply an order of preference among them, although applications of JWK Sets can choose to assign a meaning to the order for their purposes, if desired.
18
19
  attr_accessor :keys
@@ -13,6 +13,7 @@ OpenAPI Generator version: 4.2.3
13
13
  require 'date'
14
14
 
15
15
  module OryHydraClient
16
+ # JSONWebKeySetGeneratorRequest JSONWebKeySetGeneratorRequest JSONWebKeySetGeneratorRequest JSONWebKeySetGeneratorRequest json web key set generator request
16
17
  class JsonWebKeySetGeneratorRequest
17
18
  # The algorithm to be used for creating the key. Supports \"RS256\", \"ES512\", \"HS512\", and \"HS256\"
18
19
  attr_accessor :alg
@@ -24,10 +24,8 @@ module OryHydraClient
24
24
  # RequestURL is the original OAuth 2.0 Authorization URL requested by the OAuth 2.0 client. It is the URL which initiates the OAuth 2.0 Authorization Code or OAuth 2.0 Implicit flow. This URL is typically not needed, but might come in handy if you want to deal with additional request parameters.
25
25
  attr_accessor :request_url
26
26
 
27
- # RequestedScope contains the access token audience as requested by the OAuth 2.0 Client.
28
27
  attr_accessor :requested_access_token_audience
29
28
 
30
- # RequestedScope contains the OAuth 2.0 Scope requested by the OAuth 2.0 Client.
31
29
  attr_accessor :requested_scope
32
30
 
33
31
  # SessionID is the login session ID. If the user-agent reuses a login session (via cookie / remember flag) this ID will remain the same. If the user-agent did not have an existing authentication session (e.g. remember is false) this will be a new random value. This value is used as the \"sid\" parameter in the ID Token and in OIDC Front-/Back- channel logout. It's value can generally be used to associate consecutive login requests by a certain user.
@@ -14,10 +14,8 @@ require 'date'
14
14
 
15
15
  module OryHydraClient
16
16
  class OAuth2Client
17
- # AllowedCORSOrigins are one or more URLs (scheme://host[:port]) which are allowed to make CORS requests to the /oauth/token endpoint. If this array is empty, the sever's CORS origin configuration (`CORS_ALLOWED_ORIGINS`) will be used instead. If this array is set, the allowed origins are appended to the server's CORS origin configuration. Be aware that environment variable `CORS_ENABLED` MUST be set to `true` for this to work.
18
17
  attr_accessor :allowed_cors_origins
19
18
 
20
- # Audience is a whitelist defining the audiences this client is allowed to request tokens for. An audience limits the applicability of an OAuth 2.0 Access Token to, for example, certain API endpoints. The value is a list of URLs. URLs MUST NOT contain whitespaces.
21
19
  attr_accessor :audience
22
20
 
23
21
  # Boolean value specifying whether the RP requires that a sid (session ID) Claim be included in the Logout Token to identify the RP session with the OP when the backchannel_logout_uri is used. If omitted, the default value is false.
@@ -41,10 +39,9 @@ module OryHydraClient
41
39
  # ClientURI is an URL string of a web page providing information about the client. If present, the server SHOULD display this URL to the end-user in a clickable fashion.
42
40
  attr_accessor :client_uri
43
41
 
44
- # Contacts is a array of strings representing ways to contact people responsible for this client, typically email addresses.
45
42
  attr_accessor :contacts
46
43
 
47
- # CreatedAt returns the timestamp of the client's creation.
44
+ # CreatedAt returns the timestamp of the client's creation. Format: date-time
48
45
  attr_accessor :created_at
49
46
 
50
47
  # Boolean value specifying whether the RP requires that iss (issuer) and sid (session ID) query parameters be included to identify the RP session with the OP when the frontchannel_logout_uri is used. If omitted, the default value is false.
@@ -53,7 +50,6 @@ module OryHydraClient
53
50
  # RP URL that will cause the RP to log itself out when rendered in an iframe by the OP. An iss (issuer) query parameter and a sid (session ID) query parameter MAY be included by the OP to enable the RP to validate the request and to determine which of the potentially multiple sessions is to be logged out; if either is included, both MUST be.
54
51
  attr_accessor :frontchannel_logout_uri
55
52
 
56
- # GrantTypes is an array of grant types the client is allowed to use.
57
53
  attr_accessor :grant_types
58
54
 
59
55
  attr_accessor :jwks
@@ -64,7 +60,6 @@ module OryHydraClient
64
60
  # LogoURI is an URL string that references a logo for the client.
65
61
  attr_accessor :logo_uri
66
62
 
67
- # Metadata is arbitrary data.
68
63
  attr_accessor :metadata
69
64
 
70
65
  # Owner is a string identifying the owner of the OAuth 2.0 Client.
@@ -73,19 +68,15 @@ module OryHydraClient
73
68
  # PolicyURI is a URL string that points to a human-readable privacy policy document that describes how the deployment organization collects, uses, retains, and discloses personal data.
74
69
  attr_accessor :policy_uri
75
70
 
76
- # Array of URLs supplied by the RP to which it MAY request that the End-User's User Agent be redirected using the post_logout_redirect_uri parameter after a logout has been performed.
77
71
  attr_accessor :post_logout_redirect_uris
78
72
 
79
- # RedirectURIs is an array of allowed redirect urls for the client, for example http://mydomain/oauth/callback .
80
73
  attr_accessor :redirect_uris
81
74
 
82
75
  # JWS [JWS] alg algorithm [JWA] that MUST be used for signing Request Objects sent to the OP. All Request Objects from this Client MUST be rejected, if not signed with this algorithm.
83
76
  attr_accessor :request_object_signing_alg
84
77
 
85
- # Array of request_uri values that are pre-registered by the RP for use at the OP. Servers MAY cache the contents of the files referenced by these URIs and not retrieve them at the time they are used in a request. OPs can require that request_uri values used be pre-registered with the require_request_uri_registration discovery parameter.
86
78
  attr_accessor :request_uris
87
79
 
88
- # ResponseTypes is an array of the OAuth 2.0 response type strings that the client can use at the authorization endpoint.
89
80
  attr_accessor :response_types
90
81
 
91
82
  # Scope is a string containing a space-separated list of scope values (as described in Section 3.3 of OAuth 2.0 [RFC6749]) that the client can use when requesting access tokens.
@@ -103,7 +94,7 @@ module OryHydraClient
103
94
  # TermsOfServiceURI is a URL string that points to a human-readable terms of service document for the client that describes a contractual relationship between the end-user and the client that the end-user accepts when authorizing the client.
104
95
  attr_accessor :tos_uri
105
96
 
106
- # UpdatedAt returns the timestamp of the last update.
97
+ # UpdatedAt returns the timestamp of the last update. Format: date-time
107
98
  attr_accessor :updated_at
108
99
 
109
100
  # JWS alg algorithm [JWA] REQUIRED for signing UserInfo Responses. If this is specified, the response will be JWT [JWT] serialized, and signed using JWS. The default, if omitted, is for the UserInfo Response to return the Claims as a UTF-8 encoded JSON object using the application/json content-type.
@@ -164,7 +155,7 @@ module OryHydraClient
164
155
  :'frontchannel_logout_session_required' => :'Boolean',
165
156
  :'frontchannel_logout_uri' => :'String',
166
157
  :'grant_types' => :'Array<String>',
167
- :'jwks' => :'JSONWebKeySet',
158
+ :'jwks' => :'Object',
168
159
  :'jwks_uri' => :'String',
169
160
  :'logo_uri' => :'String',
170
161
  :'metadata' => :'Object',
@@ -15,16 +15,22 @@ require 'date'
15
15
  module OryHydraClient
16
16
  # The Access Token Response
17
17
  class Oauth2TokenResponse
18
+ # access token
18
19
  attr_accessor :access_token
19
20
 
21
+ # expires in
20
22
  attr_accessor :expires_in
21
23
 
24
+ # id token
22
25
  attr_accessor :id_token
23
26
 
27
+ # refresh token
24
28
  attr_accessor :refresh_token
25
29
 
30
+ # scope
26
31
  attr_accessor :scope
27
32
 
33
+ # token type
28
34
  attr_accessor :token_type
29
35
 
30
36
  # Attribute mapping from ruby-style variable name to JSON key.
@@ -13,7 +13,7 @@ OpenAPI Generator version: 4.2.3
13
13
  require 'date'
14
14
 
15
15
  module OryHydraClient
16
- # The response used to return used consent requests same as HandledLoginRequest, just with consent_request exposed as json
16
+ # PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession PreviousConsentSession The response used to return used consent requests same as HandledLoginRequest, just with consent_request exposed as json
17
17
  class PreviousConsentSession
18
18
  attr_accessor :consent_request
19
19
 
@@ -23,6 +23,7 @@ module OryHydraClient
23
23
  # GrantScope sets the scope the user authorized the client to use. Should be a subset of `requested_scope`
24
24
  attr_accessor :grant_scope
25
25
 
26
+ # handled at Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time Format: date-time
26
27
  attr_accessor :handled_at
27
28
 
28
29
  # Remember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same client asks the same user for the same, or a subset of, scope.
@@ -14,14 +14,19 @@ require 'date'
14
14
 
15
15
  module OryHydraClient
16
16
  class RejectRequest
17
+ # error
17
18
  attr_accessor :error
18
19
 
20
+ # error debug
19
21
  attr_accessor :error_debug
20
22
 
23
+ # error description
21
24
  attr_accessor :error_description
22
25
 
26
+ # error hint
23
27
  attr_accessor :error_hint
24
28
 
29
+ # status code
25
30
  attr_accessor :status_code
26
31
 
27
32
  # Attribute mapping from ruby-style variable name to JSON key.
@@ -13,7 +13,7 @@ OpenAPI Generator version: 4.2.3
13
13
  require 'date'
14
14
 
15
15
  module OryHydraClient
16
- # The userinfo response
16
+ # UserinfoResponse UserinfoResponse The userinfo response
17
17
  class UserinfoResponse
18
18
  # End-User's birthday, represented as an ISO 8601:2004 [ISO8601‑2004] YYYY-MM-DD format. The year MAY be 0000, indicating that it is omitted. To represent only the year, YYYY format is allowed. Note that depending on the underlying platform's date related function, providing just year can result in varying month and day, so the implementers need to take this factor into account to correctly process the dates.
19
19
  attr_accessor :birthdate
@@ -13,6 +13,7 @@ OpenAPI Generator version: 4.2.3
13
13
  require 'date'
14
14
 
15
15
  module OryHydraClient
16
+ # Version version
16
17
  class Version
17
18
  # Version is the service's version.
18
19
  attr_accessor :version
@@ -11,5 +11,5 @@ OpenAPI Generator version: 4.2.3
11
11
  =end
12
12
 
13
13
  module OryHydraClient
14
- VERSION = '1.3.2'
14
+ VERSION = '1.4.1'
15
15
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: ory-hydra-client
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.3.2
4
+ version: 1.4.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - ORY GmbH
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2020-02-17 00:00:00.000000000 Z
11
+ date: 2020-04-02 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: typhoeus
@@ -193,32 +193,32 @@ signing_key:
193
193
  specification_version: 4
194
194
  summary: ORY Hydra Ruby Gem
195
195
  test_files:
196
- - spec/api/admin_api_spec.rb
197
196
  - spec/api/public_api_spec.rb
197
+ - spec/api/admin_api_spec.rb
198
198
  - spec/api_client_spec.rb
199
199
  - spec/configuration_spec.rb
200
- - spec/models/generic_error_spec.rb
201
- - spec/models/accept_login_request_spec.rb
202
- - spec/models/json_web_key_spec.rb
203
- - spec/models/consent_request_session_spec.rb
204
- - spec/models/json_web_key_set_spec.rb
205
- - spec/models/version_spec.rb
206
- - spec/models/open_id_connect_context_spec.rb
200
+ - spec/models/well_known_spec.rb
201
+ - spec/models/login_request_spec.rb
207
202
  - spec/models/previous_consent_session_spec.rb
208
203
  - spec/models/flush_inactive_o_auth2_tokens_request_spec.rb
209
- - spec/models/reject_request_spec.rb
204
+ - spec/models/accept_consent_request_spec.rb
205
+ - spec/models/version_spec.rb
206
+ - spec/models/open_id_connect_context_spec.rb
207
+ - spec/models/oauth2_token_response_spec.rb
210
208
  - spec/models/logout_request_spec.rb
211
- - spec/models/userinfo_response_spec.rb
209
+ - spec/models/o_auth2_client_spec.rb
212
210
  - spec/models/health_not_ready_status_spec.rb
213
- - spec/models/well_known_spec.rb
211
+ - spec/models/json_web_key_spec.rb
214
212
  - spec/models/json_web_key_set_generator_request_spec.rb
215
- - spec/models/consent_request_spec.rb
216
- - spec/models/completed_request_spec.rb
217
- - spec/models/oauth2_token_response_spec.rb
218
- - spec/models/oauth_token_response_spec.rb
219
- - spec/models/accept_consent_request_spec.rb
213
+ - spec/models/reject_request_spec.rb
214
+ - spec/models/consent_request_session_spec.rb
220
215
  - spec/models/o_auth2_token_introspection_spec.rb
221
- - spec/models/login_request_spec.rb
222
216
  - spec/models/health_status_spec.rb
223
- - spec/models/o_auth2_client_spec.rb
217
+ - spec/models/oauth_token_response_spec.rb
218
+ - spec/models/userinfo_response_spec.rb
219
+ - spec/models/json_web_key_set_spec.rb
220
+ - spec/models/consent_request_spec.rb
221
+ - spec/models/completed_request_spec.rb
222
+ - spec/models/generic_error_spec.rb
223
+ - spec/models/accept_login_request_spec.rb
224
224
  - spec/spec_helper.rb