ory-kratos-client 0.9.0.alpha2 → 0.9.0.alpha3

Sign up to get free protection for your applications and to get access to all the features.
Files changed (197) hide show
  1. checksums.yaml +4 -4
  2. data/Gemfile.lock +1 -1
  3. data/README.md +5 -5
  4. data/docs/V0alpha2Api.md +2 -2
  5. data/lib/ory-kratos-client/api/metadata_api.rb +1 -1
  6. data/lib/ory-kratos-client/api/v0alpha2_api.rb +5 -5
  7. data/lib/ory-kratos-client/api_client.rb +1 -1
  8. data/lib/ory-kratos-client/api_error.rb +1 -1
  9. data/lib/ory-kratos-client/configuration.rb +1 -1
  10. data/lib/ory-kratos-client/models/admin_create_identity_body.rb +1 -1
  11. data/lib/ory-kratos-client/models/admin_create_identity_import_credentials_oidc.rb +1 -1
  12. data/lib/ory-kratos-client/models/admin_create_identity_import_credentials_oidc_config.rb +1 -1
  13. data/lib/ory-kratos-client/models/admin_create_identity_import_credentials_oidc_provider.rb +1 -1
  14. data/lib/ory-kratos-client/models/admin_create_identity_import_credentials_password.rb +1 -1
  15. data/lib/ory-kratos-client/models/admin_create_identity_import_credentials_password_config.rb +1 -1
  16. data/lib/ory-kratos-client/models/admin_create_self_service_recovery_link_body.rb +1 -1
  17. data/lib/ory-kratos-client/models/admin_identity_import_credentials.rb +1 -1
  18. data/lib/ory-kratos-client/models/admin_update_identity_body.rb +1 -1
  19. data/lib/ory-kratos-client/models/authenticator_assurance_level.rb +1 -1
  20. data/lib/ory-kratos-client/models/error_authenticator_assurance_level_not_satisfied.rb +1 -1
  21. data/lib/ory-kratos-client/models/generic_error.rb +1 -1
  22. data/lib/ory-kratos-client/models/health_not_ready_status.rb +1 -1
  23. data/lib/ory-kratos-client/models/health_status.rb +1 -1
  24. data/lib/ory-kratos-client/models/identity.rb +1 -1
  25. data/lib/ory-kratos-client/models/identity_credentials.rb +1 -1
  26. data/lib/ory-kratos-client/models/identity_credentials_oidc.rb +1 -1
  27. data/lib/ory-kratos-client/models/identity_credentials_oidc_provider.rb +1 -1
  28. data/lib/ory-kratos-client/models/identity_credentials_password.rb +1 -1
  29. data/lib/ory-kratos-client/models/identity_credentials_type.rb +1 -1
  30. data/lib/ory-kratos-client/models/identity_schema.rb +1 -1
  31. data/lib/ory-kratos-client/models/identity_state.rb +1 -1
  32. data/lib/ory-kratos-client/models/inline_response200.rb +1 -1
  33. data/lib/ory-kratos-client/models/inline_response2001.rb +1 -1
  34. data/lib/ory-kratos-client/models/inline_response503.rb +1 -1
  35. data/lib/ory-kratos-client/models/json_error.rb +1 -1
  36. data/lib/ory-kratos-client/models/needs_privileged_session_error.rb +1 -1
  37. data/lib/ory-kratos-client/models/pagination.rb +1 -1
  38. data/lib/ory-kratos-client/models/recovery_address.rb +1 -1
  39. data/lib/ory-kratos-client/models/revoked_sessions.rb +1 -1
  40. data/lib/ory-kratos-client/models/self_service_browser_location_change_required_error.rb +1 -1
  41. data/lib/ory-kratos-client/models/self_service_error.rb +1 -1
  42. data/lib/ory-kratos-client/models/self_service_flow_expired_error.rb +1 -1
  43. data/lib/ory-kratos-client/models/self_service_login_flow.rb +1 -1
  44. data/lib/ory-kratos-client/models/self_service_logout_url.rb +1 -1
  45. data/lib/ory-kratos-client/models/self_service_recovery_flow.rb +1 -1
  46. data/lib/ory-kratos-client/models/self_service_recovery_flow_state.rb +1 -1
  47. data/lib/ory-kratos-client/models/self_service_recovery_link.rb +1 -1
  48. data/lib/ory-kratos-client/models/self_service_registration_flow.rb +1 -1
  49. data/lib/ory-kratos-client/models/self_service_settings_flow.rb +1 -1
  50. data/lib/ory-kratos-client/models/self_service_settings_flow_state.rb +1 -1
  51. data/lib/ory-kratos-client/models/self_service_verification_flow.rb +1 -1
  52. data/lib/ory-kratos-client/models/self_service_verification_flow_state.rb +1 -1
  53. data/lib/ory-kratos-client/models/session.rb +1 -1
  54. data/lib/ory-kratos-client/models/session_authentication_method.rb +1 -1
  55. data/lib/ory-kratos-client/models/session_device.rb +1 -1
  56. data/lib/ory-kratos-client/models/settings_profile_form_config.rb +1 -1
  57. data/lib/ory-kratos-client/models/submit_self_service_flow_with_web_authn_registration_method.rb +1 -1
  58. data/lib/ory-kratos-client/models/submit_self_service_login_flow_body.rb +1 -1
  59. data/lib/ory-kratos-client/models/submit_self_service_login_flow_with_lookup_secret_method_body.rb +1 -1
  60. data/lib/ory-kratos-client/models/submit_self_service_login_flow_with_oidc_method_body.rb +1 -1
  61. data/lib/ory-kratos-client/models/submit_self_service_login_flow_with_password_method_body.rb +1 -1
  62. data/lib/ory-kratos-client/models/submit_self_service_login_flow_with_totp_method_body.rb +1 -1
  63. data/lib/ory-kratos-client/models/submit_self_service_login_flow_with_web_authn_method_body.rb +1 -1
  64. data/lib/ory-kratos-client/models/submit_self_service_logout_flow_without_browser_body.rb +1 -1
  65. data/lib/ory-kratos-client/models/submit_self_service_recovery_flow_body.rb +1 -1
  66. data/lib/ory-kratos-client/models/submit_self_service_recovery_flow_with_link_method_body.rb +1 -1
  67. data/lib/ory-kratos-client/models/submit_self_service_registration_flow_body.rb +1 -1
  68. data/lib/ory-kratos-client/models/submit_self_service_registration_flow_with_oidc_method_body.rb +1 -1
  69. data/lib/ory-kratos-client/models/submit_self_service_registration_flow_with_password_method_body.rb +1 -1
  70. data/lib/ory-kratos-client/models/submit_self_service_registration_flow_with_web_authn_method_body.rb +1 -1
  71. data/lib/ory-kratos-client/models/submit_self_service_settings_flow_body.rb +1 -1
  72. data/lib/ory-kratos-client/models/submit_self_service_settings_flow_with_lookup_method_body.rb +1 -1
  73. data/lib/ory-kratos-client/models/submit_self_service_settings_flow_with_oidc_method_body.rb +1 -1
  74. data/lib/ory-kratos-client/models/submit_self_service_settings_flow_with_password_method_body.rb +1 -1
  75. data/lib/ory-kratos-client/models/submit_self_service_settings_flow_with_profile_method_body.rb +1 -1
  76. data/lib/ory-kratos-client/models/submit_self_service_settings_flow_with_totp_method_body.rb +1 -1
  77. data/lib/ory-kratos-client/models/submit_self_service_settings_flow_with_web_authn_method_body.rb +1 -1
  78. data/lib/ory-kratos-client/models/submit_self_service_verification_flow_body.rb +1 -1
  79. data/lib/ory-kratos-client/models/submit_self_service_verification_flow_with_link_method_body.rb +1 -1
  80. data/lib/ory-kratos-client/models/successful_self_service_login_without_browser.rb +1 -1
  81. data/lib/ory-kratos-client/models/successful_self_service_registration_without_browser.rb +1 -1
  82. data/lib/ory-kratos-client/models/ui_container.rb +1 -1
  83. data/lib/ory-kratos-client/models/ui_node.rb +1 -1
  84. data/lib/ory-kratos-client/models/ui_node_anchor_attributes.rb +1 -1
  85. data/lib/ory-kratos-client/models/ui_node_attributes.rb +1 -1
  86. data/lib/ory-kratos-client/models/ui_node_image_attributes.rb +1 -1
  87. data/lib/ory-kratos-client/models/ui_node_input_attributes.rb +1 -1
  88. data/lib/ory-kratos-client/models/ui_node_meta.rb +1 -1
  89. data/lib/ory-kratos-client/models/ui_node_script_attributes.rb +1 -1
  90. data/lib/ory-kratos-client/models/ui_node_text_attributes.rb +1 -1
  91. data/lib/ory-kratos-client/models/ui_text.rb +1 -1
  92. data/lib/ory-kratos-client/models/verifiable_identity_address.rb +1 -1
  93. data/lib/ory-kratos-client/models/version.rb +1 -1
  94. data/lib/ory-kratos-client/version.rb +2 -2
  95. data/lib/ory-kratos-client.rb +1 -1
  96. data/ory-kratos-client.gemspec +1 -1
  97. data/spec/api/metadata_api_spec.rb +1 -1
  98. data/spec/api/v0alpha2_api_spec.rb +3 -3
  99. data/spec/api_client_spec.rb +1 -1
  100. data/spec/configuration_spec.rb +1 -1
  101. data/spec/models/admin_create_identity_body_spec.rb +1 -1
  102. data/spec/models/admin_create_identity_import_credentials_oidc_config_spec.rb +1 -1
  103. data/spec/models/admin_create_identity_import_credentials_oidc_provider_spec.rb +1 -1
  104. data/spec/models/admin_create_identity_import_credentials_oidc_spec.rb +1 -1
  105. data/spec/models/admin_create_identity_import_credentials_password_config_spec.rb +1 -1
  106. data/spec/models/admin_create_identity_import_credentials_password_spec.rb +1 -1
  107. data/spec/models/admin_create_self_service_recovery_link_body_spec.rb +1 -1
  108. data/spec/models/admin_identity_import_credentials_spec.rb +1 -1
  109. data/spec/models/admin_update_identity_body_spec.rb +1 -1
  110. data/spec/models/authenticator_assurance_level_spec.rb +1 -1
  111. data/spec/models/error_authenticator_assurance_level_not_satisfied_spec.rb +1 -1
  112. data/spec/models/generic_error_spec.rb +1 -1
  113. data/spec/models/health_not_ready_status_spec.rb +1 -1
  114. data/spec/models/health_status_spec.rb +1 -1
  115. data/spec/models/identity_credentials_oidc_provider_spec.rb +1 -1
  116. data/spec/models/identity_credentials_oidc_spec.rb +1 -1
  117. data/spec/models/identity_credentials_password_spec.rb +1 -1
  118. data/spec/models/identity_credentials_spec.rb +1 -1
  119. data/spec/models/identity_credentials_type_spec.rb +1 -1
  120. data/spec/models/identity_schema_spec.rb +1 -1
  121. data/spec/models/identity_spec.rb +1 -1
  122. data/spec/models/identity_state_spec.rb +1 -1
  123. data/spec/models/inline_response2001_spec.rb +1 -1
  124. data/spec/models/inline_response200_spec.rb +1 -1
  125. data/spec/models/inline_response503_spec.rb +1 -1
  126. data/spec/models/json_error_spec.rb +1 -1
  127. data/spec/models/needs_privileged_session_error_spec.rb +1 -1
  128. data/spec/models/pagination_spec.rb +1 -1
  129. data/spec/models/recovery_address_spec.rb +1 -1
  130. data/spec/models/revoked_sessions_spec.rb +1 -1
  131. data/spec/models/self_service_browser_location_change_required_error_spec.rb +1 -1
  132. data/spec/models/self_service_error_spec.rb +1 -1
  133. data/spec/models/self_service_flow_expired_error_spec.rb +1 -1
  134. data/spec/models/self_service_login_flow_spec.rb +1 -1
  135. data/spec/models/self_service_logout_url_spec.rb +1 -1
  136. data/spec/models/self_service_recovery_flow_spec.rb +1 -1
  137. data/spec/models/self_service_recovery_flow_state_spec.rb +1 -1
  138. data/spec/models/self_service_recovery_link_spec.rb +1 -1
  139. data/spec/models/self_service_registration_flow_spec.rb +1 -1
  140. data/spec/models/self_service_settings_flow_spec.rb +1 -1
  141. data/spec/models/self_service_settings_flow_state_spec.rb +1 -1
  142. data/spec/models/self_service_verification_flow_spec.rb +1 -1
  143. data/spec/models/self_service_verification_flow_state_spec.rb +1 -1
  144. data/spec/models/session_authentication_method_spec.rb +1 -1
  145. data/spec/models/session_device_spec.rb +1 -1
  146. data/spec/models/session_spec.rb +1 -1
  147. data/spec/models/settings_profile_form_config_spec.rb +1 -1
  148. data/spec/models/submit_self_service_flow_with_web_authn_registration_method_spec.rb +1 -1
  149. data/spec/models/submit_self_service_login_flow_body_spec.rb +1 -1
  150. data/spec/models/submit_self_service_login_flow_with_lookup_secret_method_body_spec.rb +1 -1
  151. data/spec/models/submit_self_service_login_flow_with_oidc_method_body_spec.rb +1 -1
  152. data/spec/models/submit_self_service_login_flow_with_password_method_body_spec.rb +1 -1
  153. data/spec/models/submit_self_service_login_flow_with_totp_method_body_spec.rb +1 -1
  154. data/spec/models/submit_self_service_login_flow_with_web_authn_method_body_spec.rb +1 -1
  155. data/spec/models/submit_self_service_logout_flow_without_browser_body_spec.rb +1 -1
  156. data/spec/models/submit_self_service_recovery_flow_body_spec.rb +1 -1
  157. data/spec/models/submit_self_service_recovery_flow_with_link_method_body_spec.rb +1 -1
  158. data/spec/models/submit_self_service_registration_flow_body_spec.rb +1 -1
  159. data/spec/models/submit_self_service_registration_flow_with_oidc_method_body_spec.rb +1 -1
  160. data/spec/models/submit_self_service_registration_flow_with_password_method_body_spec.rb +1 -1
  161. data/spec/models/submit_self_service_registration_flow_with_web_authn_method_body_spec.rb +1 -1
  162. data/spec/models/submit_self_service_settings_flow_body_spec.rb +1 -1
  163. data/spec/models/submit_self_service_settings_flow_with_lookup_method_body_spec.rb +1 -1
  164. data/spec/models/submit_self_service_settings_flow_with_oidc_method_body_spec.rb +1 -1
  165. data/spec/models/submit_self_service_settings_flow_with_password_method_body_spec.rb +1 -1
  166. data/spec/models/submit_self_service_settings_flow_with_profile_method_body_spec.rb +1 -1
  167. data/spec/models/submit_self_service_settings_flow_with_totp_method_body_spec.rb +1 -1
  168. data/spec/models/submit_self_service_settings_flow_with_web_authn_method_body_spec.rb +1 -1
  169. data/spec/models/submit_self_service_verification_flow_body_spec.rb +1 -1
  170. data/spec/models/submit_self_service_verification_flow_with_link_method_body_spec.rb +1 -1
  171. data/spec/models/successful_self_service_login_without_browser_spec.rb +1 -1
  172. data/spec/models/successful_self_service_registration_without_browser_spec.rb +1 -1
  173. data/spec/models/ui_container_spec.rb +1 -1
  174. data/spec/models/ui_node_anchor_attributes_spec.rb +1 -1
  175. data/spec/models/ui_node_attributes_spec.rb +1 -1
  176. data/spec/models/ui_node_image_attributes_spec.rb +1 -1
  177. data/spec/models/ui_node_input_attributes_spec.rb +1 -1
  178. data/spec/models/ui_node_meta_spec.rb +1 -1
  179. data/spec/models/ui_node_script_attributes_spec.rb +1 -1
  180. data/spec/models/ui_node_spec.rb +1 -1
  181. data/spec/models/ui_node_text_attributes_spec.rb +1 -1
  182. data/spec/models/ui_text_spec.rb +1 -1
  183. data/spec/models/verifiable_identity_address_spec.rb +1 -1
  184. data/spec/models/version_spec.rb +1 -1
  185. data/spec/spec_helper.rb +1 -1
  186. data/vendor/bundle/ruby/2.5.0/extensions/x86_64-linux/2.5.0/byebug-11.1.3/gem_make.out +2 -2
  187. data/vendor/bundle/ruby/2.5.0/extensions/x86_64-linux/2.5.0/ffi-1.15.5/gem_make.out +2 -2
  188. data/vendor/bundle/ruby/2.5.0/extensions/x86_64-linux/2.5.0/jaro_winkler-1.5.4/gem_make.out +2 -2
  189. data/vendor/bundle/ruby/2.5.0/extensions/x86_64-linux/2.5.0/psych-4.0.3/gem_make.out +2 -2
  190. data/vendor/bundle/ruby/2.5.0/extensions/x86_64-linux/2.5.0/stringio-3.0.1/gem_make.out +2 -2
  191. data/vendor/bundle/ruby/2.5.0/extensions/x86_64-linux/2.5.0/stringio-3.0.1/mkmf.log +1 -1
  192. data/vendor/bundle/ruby/2.5.0/gems/byebug-11.1.3/ext/byebug/Makefile +2 -2
  193. data/vendor/bundle/ruby/2.5.0/gems/ffi-1.15.5/ext/ffi_c/Makefile +2 -2
  194. data/vendor/bundle/ruby/2.5.0/gems/jaro_winkler-1.5.4/ext/jaro_winkler/Makefile +2 -2
  195. data/vendor/bundle/ruby/2.5.0/gems/psych-4.0.3/ext/psych/Makefile +2 -2
  196. data/vendor/bundle/ruby/2.5.0/gems/stringio-3.0.1/ext/stringio/Makefile +2 -2
  197. metadata +2 -2
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 0625f2c166f80ec5650907544192ad17dc5e25c0bbf8ad81705b4d5df8a6639a
4
- data.tar.gz: cf20af8a9e6d01ee2c1d05fcbb176701dffe0696c08e55a56046524c3f8c1121
3
+ metadata.gz: 80004bea374963a3b0f63224f7a0122f9d6e29ba6b03dfead7100857c636f919
4
+ data.tar.gz: 12440b65478309923ca86c06590f8998780a9083212a428393b374a2ec746126
5
5
  SHA512:
6
- metadata.gz: b056c5129f704dc2158ec84ec775b0eb67a5bb6f814fa68eaf1728dd798f181f0e9fe5063781ac2d3565ceb65fdd0598c11db6d47d84f1682c6d81fe619f6385
7
- data.tar.gz: 4f4c4eb1b67cf61ea02b961f1947bff87007a91cce082d0295c4a478d12b021c63b4306ca50c271db56f8b13d62a183db2db2a11efc6c9181de51be385b87359
6
+ metadata.gz: 3dfc7d30cd43b70dae906fb2fcb7f6bba875319e1b6243cb5490a6184170c842eded65ee5d2d4cd520333400352f084677b5a92e234ee1d27a6047746dd9b3e7
7
+ data.tar.gz: 384363a6d4dadb4e722036302f39acda953344bdbdbf69d793e7dd27d564a767b5fc86ec6860d6c4c778ce3ac7b28a48a89284ac3c42a9ba14651fc6ef8698d7
data/Gemfile.lock CHANGED
@@ -1,7 +1,7 @@
1
1
  PATH
2
2
  remote: .
3
3
  specs:
4
- ory-kratos-client (0.9.0.alpha2)
4
+ ory-kratos-client (0.9.0.alpha3)
5
5
  typhoeus (~> 1.0, >= 1.0.1)
6
6
 
7
7
  GEM
data/README.md CHANGED
@@ -11,8 +11,8 @@ technology capable of authorizing incoming requests.
11
11
 
12
12
  This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
13
13
 
14
- - API version: v0.9.0-alpha.2
15
- - Package version: v0.9.0-alpha.2
14
+ - API version: v0.9.0-alpha.3
15
+ - Package version: v0.9.0-alpha.3
16
16
  - Build package: org.openapitools.codegen.languages.RubyClientCodegen
17
17
 
18
18
  ## Installation
@@ -28,16 +28,16 @@ gem build ory-kratos-client.gemspec
28
28
  Then either install the gem locally:
29
29
 
30
30
  ```shell
31
- gem install ./ory-kratos-client-v0.9.0-alpha.2.gem
31
+ gem install ./ory-kratos-client-v0.9.0-alpha.3.gem
32
32
  ```
33
33
 
34
- (for development, run `gem install --dev ./ory-kratos-client-v0.9.0-alpha.2.gem` to install the development dependencies)
34
+ (for development, run `gem install --dev ./ory-kratos-client-v0.9.0-alpha.3.gem` to install the development dependencies)
35
35
 
36
36
  or publish the gem to a gem hosting service, e.g. [RubyGems](https://rubygems.org/).
37
37
 
38
38
  Finally add this to the Gemfile:
39
39
 
40
- gem 'ory-kratos-client', '~> v0.9.0-alpha.2'
40
+ gem 'ory-kratos-client', '~> v0.9.0-alpha.3'
41
41
 
42
42
  ### Install from Git
43
43
 
data/docs/V0alpha2Api.md CHANGED
@@ -2155,7 +2155,7 @@ No authorization required
2155
2155
 
2156
2156
  Submit a Login Flow
2157
2157
 
2158
- :::info This endpoint is EXPERIMENTAL and subject to potential breaking changes in the future. ::: Use this endpoint to complete a login flow. This endpoint behaves differently for API and browser flows. API flows expect `application/json` to be sent in the body and responds with HTTP 200 and a application/json body with the session token on success; HTTP 303 redirect to a fresh login flow if the original flow expired with the appropriate error messages set; HTTP 400 on form validation errors. Browser flows expect a Content-Type of `application/x-www-form-urlencoded` or `application/json` to be sent in the body and respond with a HTTP 303 redirect to the post/after login URL or the `return_to` value if it was set and if the login succeeded; a HTTP 303 redirect to the login UI URL with the flow ID containing the validation errors otherwise. Browser flows with an accept header of `application/json` will not redirect but instead respond with HTTP 200 and a application/json body with the signed in identity and a `Set-Cookie` header on success; HTTP 303 redirect to a fresh login flow if the original flow expired with the appropriate error messages set; HTTP 400 on form validation errors. If this endpoint is called with `Accept: application/json` in the header, the response contains the flow without a redirect. In the case of an error, the `error.id` of the JSON response body can be one of: `session_already_available`: The user is already signed in. `security_csrf_violation`: Unable to fetch the flow because a CSRF violation occurred. `security_identity_mismatch`: The requested `?return_to` address is not allowed to be used. Adjust this in the configuration! `browser_location_change_required`: Usually sent when an AJAX request indicates that the browser needs to open a specific URL. Most likely used in Social Sign In flows. More information can be found at [Ory Kratos User Login](https://www.ory.sh/docs/kratos/self-service/flows/user-login) and [User Registration Documentation](https://www.ory.sh/docs/kratos/self-service/flows/user-registration).
2158
+ :::info This endpoint is EXPERIMENTAL and subject to potential breaking changes in the future. ::: Use this endpoint to complete a login flow. This endpoint behaves differently for API and browser flows. API flows expect `application/json` to be sent in the body and responds with HTTP 200 and a application/json body with the session token on success; HTTP 410 if the original flow expired with the appropriate error messages set and optionally a `use_flow_id` parameter in the body; HTTP 400 on form validation errors. Browser flows expect a Content-Type of `application/x-www-form-urlencoded` or `application/json` to be sent in the body and respond with a HTTP 303 redirect to the post/after login URL or the `return_to` value if it was set and if the login succeeded; a HTTP 303 redirect to the login UI URL with the flow ID containing the validation errors otherwise. Browser flows with an accept header of `application/json` will not redirect but instead respond with HTTP 200 and a application/json body with the signed in identity and a `Set-Cookie` header on success; HTTP 303 redirect to a fresh login flow if the original flow expired with the appropriate error messages set; HTTP 400 on form validation errors. If this endpoint is called with `Accept: application/json` in the header, the response contains the flow without a redirect. In the case of an error, the `error.id` of the JSON response body can be one of: `session_already_available`: The user is already signed in. `security_csrf_violation`: Unable to fetch the flow because a CSRF violation occurred. `security_identity_mismatch`: The requested `?return_to` address is not allowed to be used. Adjust this in the configuration! `browser_location_change_required`: Usually sent when an AJAX request indicates that the browser needs to open a specific URL. Most likely used in Social Sign In flows. More information can be found at [Ory Kratos User Login](https://www.ory.sh/docs/kratos/self-service/flows/user-login) and [User Registration Documentation](https://www.ory.sh/docs/kratos/self-service/flows/user-registration).
2159
2159
 
2160
2160
  ### Examples
2161
2161
 
@@ -2425,7 +2425,7 @@ No authorization required
2425
2425
 
2426
2426
  Submit a Registration Flow
2427
2427
 
2428
- Use this endpoint to complete a registration flow by sending an identity's traits and password. This endpoint behaves differently for API and browser flows. API flows expect `application/json` to be sent in the body and respond with HTTP 200 and a application/json body with the created identity success - if the session hook is configured the `session` and `session_token` will also be included; HTTP 303 redirect to a fresh registration flow if the original flow expired with the appropriate error messages set; HTTP 400 on form validation errors. Browser flows expect a Content-Type of `application/x-www-form-urlencoded` or `application/json` to be sent in the body and respond with a HTTP 303 redirect to the post/after registration URL or the `return_to` value if it was set and if the registration succeeded; a HTTP 303 redirect to the registration UI URL with the flow ID containing the validation errors otherwise. Browser flows with an accept header of `application/json` will not redirect but instead respond with HTTP 200 and a application/json body with the signed in identity and a `Set-Cookie` header on success; HTTP 303 redirect to a fresh login flow if the original flow expired with the appropriate error messages set; HTTP 400 on form validation errors. If this endpoint is called with `Accept: application/json` in the header, the response contains the flow without a redirect. In the case of an error, the `error.id` of the JSON response body can be one of: `session_already_available`: The user is already signed in. `security_csrf_violation`: Unable to fetch the flow because a CSRF violation occurred. `security_identity_mismatch`: The requested `?return_to` address is not allowed to be used. Adjust this in the configuration! `browser_location_change_required`: Usually sent when an AJAX request indicates that the browser needs to open a specific URL. Most likely used in Social Sign In flows. More information can be found at [Ory Kratos User Login](https://www.ory.sh/docs/kratos/self-service/flows/user-login) and [User Registration Documentation](https://www.ory.sh/docs/kratos/self-service/flows/user-registration).
2428
+ Use this endpoint to complete a registration flow by sending an identity's traits and password. This endpoint behaves differently for API and browser flows. API flows expect `application/json` to be sent in the body and respond with HTTP 200 and a application/json body with the created identity success - if the session hook is configured the `session` and `session_token` will also be included; HTTP 410 if the original flow expired with the appropriate error messages set and optionally a `use_flow_id` parameter in the body; HTTP 400 on form validation errors. Browser flows expect a Content-Type of `application/x-www-form-urlencoded` or `application/json` to be sent in the body and respond with a HTTP 303 redirect to the post/after registration URL or the `return_to` value if it was set and if the registration succeeded; a HTTP 303 redirect to the registration UI URL with the flow ID containing the validation errors otherwise. Browser flows with an accept header of `application/json` will not redirect but instead respond with HTTP 200 and a application/json body with the signed in identity and a `Set-Cookie` header on success; HTTP 303 redirect to a fresh login flow if the original flow expired with the appropriate error messages set; HTTP 400 on form validation errors. If this endpoint is called with `Accept: application/json` in the header, the response contains the flow without a redirect. In the case of an error, the `error.id` of the JSON response body can be one of: `session_already_available`: The user is already signed in. `security_csrf_violation`: Unable to fetch the flow because a CSRF violation occurred. `security_identity_mismatch`: The requested `?return_to` address is not allowed to be used. Adjust this in the configuration! `browser_location_change_required`: Usually sent when an AJAX request indicates that the browser needs to open a specific URL. Most likely used in Social Sign In flows. More information can be found at [Ory Kratos User Login](https://www.ory.sh/docs/kratos/self-service/flows/user-login) and [User Registration Documentation](https://www.ory.sh/docs/kratos/self-service/flows/user-registration).
2429
2429
 
2430
2430
  ### Examples
2431
2431
 
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -2032,7 +2032,7 @@ module OryKratosClient
2032
2032
  end
2033
2033
 
2034
2034
  # Submit a Login Flow
2035
- # :::info This endpoint is EXPERIMENTAL and subject to potential breaking changes in the future. ::: Use this endpoint to complete a login flow. This endpoint behaves differently for API and browser flows. API flows expect `application/json` to be sent in the body and responds with HTTP 200 and a application/json body with the session token on success; HTTP 303 redirect to a fresh login flow if the original flow expired with the appropriate error messages set; HTTP 400 on form validation errors. Browser flows expect a Content-Type of `application/x-www-form-urlencoded` or `application/json` to be sent in the body and respond with a HTTP 303 redirect to the post/after login URL or the `return_to` value if it was set and if the login succeeded; a HTTP 303 redirect to the login UI URL with the flow ID containing the validation errors otherwise. Browser flows with an accept header of `application/json` will not redirect but instead respond with HTTP 200 and a application/json body with the signed in identity and a `Set-Cookie` header on success; HTTP 303 redirect to a fresh login flow if the original flow expired with the appropriate error messages set; HTTP 400 on form validation errors. If this endpoint is called with `Accept: application/json` in the header, the response contains the flow without a redirect. In the case of an error, the `error.id` of the JSON response body can be one of: `session_already_available`: The user is already signed in. `security_csrf_violation`: Unable to fetch the flow because a CSRF violation occurred. `security_identity_mismatch`: The requested `?return_to` address is not allowed to be used. Adjust this in the configuration! `browser_location_change_required`: Usually sent when an AJAX request indicates that the browser needs to open a specific URL. Most likely used in Social Sign In flows. More information can be found at [Ory Kratos User Login](https://www.ory.sh/docs/kratos/self-service/flows/user-login) and [User Registration Documentation](https://www.ory.sh/docs/kratos/self-service/flows/user-registration).
2035
+ # :::info This endpoint is EXPERIMENTAL and subject to potential breaking changes in the future. ::: Use this endpoint to complete a login flow. This endpoint behaves differently for API and browser flows. API flows expect `application/json` to be sent in the body and responds with HTTP 200 and a application/json body with the session token on success; HTTP 410 if the original flow expired with the appropriate error messages set and optionally a `use_flow_id` parameter in the body; HTTP 400 on form validation errors. Browser flows expect a Content-Type of `application/x-www-form-urlencoded` or `application/json` to be sent in the body and respond with a HTTP 303 redirect to the post/after login URL or the `return_to` value if it was set and if the login succeeded; a HTTP 303 redirect to the login UI URL with the flow ID containing the validation errors otherwise. Browser flows with an accept header of `application/json` will not redirect but instead respond with HTTP 200 and a application/json body with the signed in identity and a `Set-Cookie` header on success; HTTP 303 redirect to a fresh login flow if the original flow expired with the appropriate error messages set; HTTP 400 on form validation errors. If this endpoint is called with `Accept: application/json` in the header, the response contains the flow without a redirect. In the case of an error, the `error.id` of the JSON response body can be one of: `session_already_available`: The user is already signed in. `security_csrf_violation`: Unable to fetch the flow because a CSRF violation occurred. `security_identity_mismatch`: The requested `?return_to` address is not allowed to be used. Adjust this in the configuration! `browser_location_change_required`: Usually sent when an AJAX request indicates that the browser needs to open a specific URL. Most likely used in Social Sign In flows. More information can be found at [Ory Kratos User Login](https://www.ory.sh/docs/kratos/self-service/flows/user-login) and [User Registration Documentation](https://www.ory.sh/docs/kratos/self-service/flows/user-registration).
2036
2036
  # @param flow [String] The Login Flow ID The value for this parameter comes from `flow` URL Query parameter sent to your application (e.g. `/login?flow=abcde`).
2037
2037
  # @param [Hash] opts the optional parameters
2038
2038
  # @option opts [String] :x_session_token The Session Token of the Identity performing the settings flow.
@@ -2044,7 +2044,7 @@ module OryKratosClient
2044
2044
  end
2045
2045
 
2046
2046
  # Submit a Login Flow
2047
- # :::info This endpoint is EXPERIMENTAL and subject to potential breaking changes in the future. ::: Use this endpoint to complete a login flow. This endpoint behaves differently for API and browser flows. API flows expect `application/json` to be sent in the body and responds with HTTP 200 and a application/json body with the session token on success; HTTP 303 redirect to a fresh login flow if the original flow expired with the appropriate error messages set; HTTP 400 on form validation errors. Browser flows expect a Content-Type of `application/x-www-form-urlencoded` or `application/json` to be sent in the body and respond with a HTTP 303 redirect to the post/after login URL or the `return_to` value if it was set and if the login succeeded; a HTTP 303 redirect to the login UI URL with the flow ID containing the validation errors otherwise. Browser flows with an accept header of `application/json` will not redirect but instead respond with HTTP 200 and a application/json body with the signed in identity and a `Set-Cookie` header on success; HTTP 303 redirect to a fresh login flow if the original flow expired with the appropriate error messages set; HTTP 400 on form validation errors. If this endpoint is called with `Accept: application/json` in the header, the response contains the flow without a redirect. In the case of an error, the `error.id` of the JSON response body can be one of: `session_already_available`: The user is already signed in. `security_csrf_violation`: Unable to fetch the flow because a CSRF violation occurred. `security_identity_mismatch`: The requested `?return_to` address is not allowed to be used. Adjust this in the configuration! `browser_location_change_required`: Usually sent when an AJAX request indicates that the browser needs to open a specific URL. Most likely used in Social Sign In flows. More information can be found at [Ory Kratos User Login](https://www.ory.sh/docs/kratos/self-service/flows/user-login) and [User Registration Documentation](https://www.ory.sh/docs/kratos/self-service/flows/user-registration).
2047
+ # :::info This endpoint is EXPERIMENTAL and subject to potential breaking changes in the future. ::: Use this endpoint to complete a login flow. This endpoint behaves differently for API and browser flows. API flows expect `application/json` to be sent in the body and responds with HTTP 200 and a application/json body with the session token on success; HTTP 410 if the original flow expired with the appropriate error messages set and optionally a `use_flow_id` parameter in the body; HTTP 400 on form validation errors. Browser flows expect a Content-Type of `application/x-www-form-urlencoded` or `application/json` to be sent in the body and respond with a HTTP 303 redirect to the post/after login URL or the `return_to` value if it was set and if the login succeeded; a HTTP 303 redirect to the login UI URL with the flow ID containing the validation errors otherwise. Browser flows with an accept header of `application/json` will not redirect but instead respond with HTTP 200 and a application/json body with the signed in identity and a `Set-Cookie` header on success; HTTP 303 redirect to a fresh login flow if the original flow expired with the appropriate error messages set; HTTP 400 on form validation errors. If this endpoint is called with `Accept: application/json` in the header, the response contains the flow without a redirect. In the case of an error, the `error.id` of the JSON response body can be one of: `session_already_available`: The user is already signed in. `security_csrf_violation`: Unable to fetch the flow because a CSRF violation occurred. `security_identity_mismatch`: The requested `?return_to` address is not allowed to be used. Adjust this in the configuration! `browser_location_change_required`: Usually sent when an AJAX request indicates that the browser needs to open a specific URL. Most likely used in Social Sign In flows. More information can be found at [Ory Kratos User Login](https://www.ory.sh/docs/kratos/self-service/flows/user-login) and [User Registration Documentation](https://www.ory.sh/docs/kratos/self-service/flows/user-registration).
2048
2048
  # @param flow [String] The Login Flow ID The value for this parameter comes from `flow` URL Query parameter sent to your application (e.g. `/login?flow=abcde`).
2049
2049
  # @param [Hash] opts the optional parameters
2050
2050
  # @option opts [String] :x_session_token The Session Token of the Identity performing the settings flow.
@@ -2311,7 +2311,7 @@ module OryKratosClient
2311
2311
  end
2312
2312
 
2313
2313
  # Submit a Registration Flow
2314
- # Use this endpoint to complete a registration flow by sending an identity's traits and password. This endpoint behaves differently for API and browser flows. API flows expect `application/json` to be sent in the body and respond with HTTP 200 and a application/json body with the created identity success - if the session hook is configured the `session` and `session_token` will also be included; HTTP 303 redirect to a fresh registration flow if the original flow expired with the appropriate error messages set; HTTP 400 on form validation errors. Browser flows expect a Content-Type of `application/x-www-form-urlencoded` or `application/json` to be sent in the body and respond with a HTTP 303 redirect to the post/after registration URL or the `return_to` value if it was set and if the registration succeeded; a HTTP 303 redirect to the registration UI URL with the flow ID containing the validation errors otherwise. Browser flows with an accept header of `application/json` will not redirect but instead respond with HTTP 200 and a application/json body with the signed in identity and a `Set-Cookie` header on success; HTTP 303 redirect to a fresh login flow if the original flow expired with the appropriate error messages set; HTTP 400 on form validation errors. If this endpoint is called with `Accept: application/json` in the header, the response contains the flow without a redirect. In the case of an error, the `error.id` of the JSON response body can be one of: `session_already_available`: The user is already signed in. `security_csrf_violation`: Unable to fetch the flow because a CSRF violation occurred. `security_identity_mismatch`: The requested `?return_to` address is not allowed to be used. Adjust this in the configuration! `browser_location_change_required`: Usually sent when an AJAX request indicates that the browser needs to open a specific URL. Most likely used in Social Sign In flows. More information can be found at [Ory Kratos User Login](https://www.ory.sh/docs/kratos/self-service/flows/user-login) and [User Registration Documentation](https://www.ory.sh/docs/kratos/self-service/flows/user-registration).
2314
+ # Use this endpoint to complete a registration flow by sending an identity's traits and password. This endpoint behaves differently for API and browser flows. API flows expect `application/json` to be sent in the body and respond with HTTP 200 and a application/json body with the created identity success - if the session hook is configured the `session` and `session_token` will also be included; HTTP 410 if the original flow expired with the appropriate error messages set and optionally a `use_flow_id` parameter in the body; HTTP 400 on form validation errors. Browser flows expect a Content-Type of `application/x-www-form-urlencoded` or `application/json` to be sent in the body and respond with a HTTP 303 redirect to the post/after registration URL or the `return_to` value if it was set and if the registration succeeded; a HTTP 303 redirect to the registration UI URL with the flow ID containing the validation errors otherwise. Browser flows with an accept header of `application/json` will not redirect but instead respond with HTTP 200 and a application/json body with the signed in identity and a `Set-Cookie` header on success; HTTP 303 redirect to a fresh login flow if the original flow expired with the appropriate error messages set; HTTP 400 on form validation errors. If this endpoint is called with `Accept: application/json` in the header, the response contains the flow without a redirect. In the case of an error, the `error.id` of the JSON response body can be one of: `session_already_available`: The user is already signed in. `security_csrf_violation`: Unable to fetch the flow because a CSRF violation occurred. `security_identity_mismatch`: The requested `?return_to` address is not allowed to be used. Adjust this in the configuration! `browser_location_change_required`: Usually sent when an AJAX request indicates that the browser needs to open a specific URL. Most likely used in Social Sign In flows. More information can be found at [Ory Kratos User Login](https://www.ory.sh/docs/kratos/self-service/flows/user-login) and [User Registration Documentation](https://www.ory.sh/docs/kratos/self-service/flows/user-registration).
2315
2315
  # @param flow [String] The Registration Flow ID The value for this parameter comes from `flow` URL Query parameter sent to your application (e.g. `/registration?flow=abcde`).
2316
2316
  # @param [Hash] opts the optional parameters
2317
2317
  # @option opts [SubmitSelfServiceRegistrationFlowBody] :submit_self_service_registration_flow_body
@@ -2322,7 +2322,7 @@ module OryKratosClient
2322
2322
  end
2323
2323
 
2324
2324
  # Submit a Registration Flow
2325
- # Use this endpoint to complete a registration flow by sending an identity's traits and password. This endpoint behaves differently for API and browser flows. API flows expect `application/json` to be sent in the body and respond with HTTP 200 and a application/json body with the created identity success - if the session hook is configured the `session` and `session_token` will also be included; HTTP 303 redirect to a fresh registration flow if the original flow expired with the appropriate error messages set; HTTP 400 on form validation errors. Browser flows expect a Content-Type of `application/x-www-form-urlencoded` or `application/json` to be sent in the body and respond with a HTTP 303 redirect to the post/after registration URL or the `return_to` value if it was set and if the registration succeeded; a HTTP 303 redirect to the registration UI URL with the flow ID containing the validation errors otherwise. Browser flows with an accept header of `application/json` will not redirect but instead respond with HTTP 200 and a application/json body with the signed in identity and a `Set-Cookie` header on success; HTTP 303 redirect to a fresh login flow if the original flow expired with the appropriate error messages set; HTTP 400 on form validation errors. If this endpoint is called with `Accept: application/json` in the header, the response contains the flow without a redirect. In the case of an error, the `error.id` of the JSON response body can be one of: `session_already_available`: The user is already signed in. `security_csrf_violation`: Unable to fetch the flow because a CSRF violation occurred. `security_identity_mismatch`: The requested `?return_to` address is not allowed to be used. Adjust this in the configuration! `browser_location_change_required`: Usually sent when an AJAX request indicates that the browser needs to open a specific URL. Most likely used in Social Sign In flows. More information can be found at [Ory Kratos User Login](https://www.ory.sh/docs/kratos/self-service/flows/user-login) and [User Registration Documentation](https://www.ory.sh/docs/kratos/self-service/flows/user-registration).
2325
+ # Use this endpoint to complete a registration flow by sending an identity's traits and password. This endpoint behaves differently for API and browser flows. API flows expect `application/json` to be sent in the body and respond with HTTP 200 and a application/json body with the created identity success - if the session hook is configured the `session` and `session_token` will also be included; HTTP 410 if the original flow expired with the appropriate error messages set and optionally a `use_flow_id` parameter in the body; HTTP 400 on form validation errors. Browser flows expect a Content-Type of `application/x-www-form-urlencoded` or `application/json` to be sent in the body and respond with a HTTP 303 redirect to the post/after registration URL or the `return_to` value if it was set and if the registration succeeded; a HTTP 303 redirect to the registration UI URL with the flow ID containing the validation errors otherwise. Browser flows with an accept header of `application/json` will not redirect but instead respond with HTTP 200 and a application/json body with the signed in identity and a `Set-Cookie` header on success; HTTP 303 redirect to a fresh login flow if the original flow expired with the appropriate error messages set; HTTP 400 on form validation errors. If this endpoint is called with `Accept: application/json` in the header, the response contains the flow without a redirect. In the case of an error, the `error.id` of the JSON response body can be one of: `session_already_available`: The user is already signed in. `security_csrf_violation`: Unable to fetch the flow because a CSRF violation occurred. `security_identity_mismatch`: The requested `?return_to` address is not allowed to be used. Adjust this in the configuration! `browser_location_change_required`: Usually sent when an AJAX request indicates that the browser needs to open a specific URL. Most likely used in Social Sign In flows. More information can be found at [Ory Kratos User Login](https://www.ory.sh/docs/kratos/self-service/flows/user-login) and [User Registration Documentation](https://www.ory.sh/docs/kratos/self-service/flows/user-registration).
2326
2326
  # @param flow [String] The Registration Flow ID The value for this parameter comes from `flow` URL Query parameter sent to your application (e.g. `/registration?flow=abcde`).
2327
2327
  # @param [Hash] opts the optional parameters
2328
2328
  # @option opts [SubmitSelfServiceRegistrationFlowBody] :submit_self_service_registration_flow_body
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0
@@ -3,7 +3,7 @@
3
3
 
4
4
  #Documentation for all public and administrative Ory Kratos APIs. Public and administrative APIs are exposed on different ports. Public APIs can face the public internet without any protection while administrative APIs should never be exposed without prior authorization. To protect the administative API port you should use something like Nginx, Ory Oathkeeper, or any other technology capable of authorizing incoming requests.
5
5
 
6
- The version of the OpenAPI document: v0.9.0-alpha.2
6
+ The version of the OpenAPI document: v0.9.0-alpha.3
7
7
  Contact: hi@ory.sh
8
8
  Generated by: https://openapi-generator.tech
9
9
  OpenAPI Generator version: 5.4.0