workos 7.0.0 → 7.1.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/.github/workflows/ci.yml +1 -1
- data/.github/workflows/lint.yml +1 -1
- data/.github/workflows/release-please.yml +30 -2
- data/.github/workflows/release.yml +1 -1
- data/.last-synced-sha +1 -0
- data/.oagen-manifest.json +739 -4
- data/.release-please-manifest.json +1 -1
- data/CHANGELOG.md +23 -0
- data/Gemfile.lock +2 -2
- data/README.md +0 -1
- data/lib/workos/admin_portal/domain_verification_intent_options.rb +18 -0
- data/lib/workos/admin_portal/generate_link.rb +3 -3
- data/lib/workos/admin_portal/intent_options.rb +6 -2
- data/lib/workos/admin_portal.rb +3 -3
- data/lib/workos/authorization.rb +61 -67
- data/lib/workos/client.rb +8 -0
- data/lib/workos/directory_sync/directory_user_with_groups.rb +10 -2
- data/lib/workos/groups/create_group.rb +22 -0
- data/lib/workos/groups/create_group_membership.rb +18 -0
- data/lib/workos/groups/update_group.rb +7 -0
- data/lib/workos/groups.rb +256 -0
- data/lib/workos/session.rb +16 -5
- data/lib/workos/shared/waitlist_user.rb +37 -0
- data/lib/workos/shared/waitlist_user_approved.rb +34 -0
- data/lib/workos/shared/waitlist_user_created.rb +34 -0
- data/lib/workos/shared/waitlist_user_denied.rb +34 -0
- data/lib/workos/types/create_webhook_endpoint_events.rb +4 -1
- data/lib/workos/types/groups_order.rb +9 -0
- data/lib/workos/types/sso_provider.rb +10 -1
- data/lib/workos/types/user_management_authentication_provider.rb +10 -1
- data/lib/workos/types/user_management_organization_membership_groups_order.rb +9 -0
- data/lib/workos/types/waitlist_user_state.rb +14 -0
- data/lib/workos/user_management/invitation.rb +3 -0
- data/lib/workos/user_management/invitation_accepted_data.rb +3 -0
- data/lib/workos/user_management/invitation_created_data.rb +3 -0
- data/lib/workos/user_management/invitation_resent_data.rb +3 -0
- data/lib/workos/user_management/invitation_revoked_data.rb +3 -0
- data/lib/workos/user_management/user_invite.rb +3 -0
- data/lib/workos/user_management.rb +32 -40
- data/lib/workos/user_management_organization_membership_groups.rb +60 -0
- data/lib/workos/version.rb +1 -1
- data/lib/workos.rb +4 -0
- data/rbi/workos/admin_portal.rbi +2 -2
- data/rbi/workos/authorization.rbi +13 -12
- data/rbi/workos/client.rbi +6 -0
- data/rbi/workos/create_group.rbi +30 -0
- data/rbi/workos/create_group_membership.rbi +24 -0
- data/rbi/workos/domain_verification_intent_options.rbi +24 -0
- data/rbi/workos/generate_link.rbi +2 -2
- data/rbi/workos/groups.rbi +97 -0
- data/rbi/workos/intent_options.rbi +8 -2
- data/rbi/workos/invitation.rbi +6 -0
- data/rbi/workos/invitation_accepted_data.rbi +6 -0
- data/rbi/workos/invitation_created_data.rbi +6 -0
- data/rbi/workos/invitation_resent_data.rbi +6 -0
- data/rbi/workos/invitation_revoked_data.rbi +6 -0
- data/rbi/workos/update_group.rbi +30 -0
- data/rbi/workos/user_invite.rbi +6 -0
- data/rbi/workos/user_management_organization_membership_groups.rbi +25 -0
- data/rbi/workos/waitlist_user.rbi +60 -0
- data/rbi/workos/waitlist_user_approved.rbi +54 -0
- data/rbi/workos/waitlist_user_created.rbi +54 -0
- data/rbi/workos/waitlist_user_denied.rbi +54 -0
- data/test/workos/test_authorization.rb +33 -33
- data/test/workos/test_groups.rb +89 -0
- data/test/workos/test_model_round_trip.rb +153 -24
- data/test/workos/test_session.rb +125 -0
- data/test/workos/test_user_management_organization_membership_groups.rb +33 -0
- metadata +29 -8
- data/lib/workos/user_management/urn_ietf_params_oauth_grant_type_device_code_session_authenticate_request.rb +0 -8
- data/lib/workos/user_management/urn_workos_oauth_grant_type_email_verification_code_session_authenticate_request.rb +0 -8
- data/lib/workos/user_management/urn_workos_oauth_grant_type_magic_auth_code_session_authenticate_request.rb +0 -8
- data/lib/workos/user_management/urn_workos_oauth_grant_type_mfa_totp_session_authenticate_request.rb +0 -8
- data/lib/workos/user_management/urn_workos_oauth_grant_type_organization_selection_session_authenticate_request.rb +0 -8
- /data/lib/workos/{shared → groups}/group.rb +0 -0
|
@@ -459,6 +459,40 @@ class ModelRoundTripTest < Minitest::Test
|
|
|
459
459
|
fixture.each_key { |k| assert json.key?(k.to_sym) || json.key?(k), "Expected to_h to include key #{k}" }
|
|
460
460
|
end
|
|
461
461
|
|
|
462
|
+
def test_create_group_membership_round_trip
|
|
463
|
+
fixture = {
|
|
464
|
+
"organization_membership_id" => "stub"
|
|
465
|
+
}
|
|
466
|
+
model = WorkOS::CreateGroupMembership.new(fixture.to_json)
|
|
467
|
+
json = model.to_h
|
|
468
|
+
assert_kind_of Hash, json
|
|
469
|
+
assert_equal fixture["organization_membership_id"], json[:organization_membership_id]
|
|
470
|
+
fixture.each_key { |k| assert json.key?(k.to_sym) || json.key?(k), "Expected to_h to include key #{k}" }
|
|
471
|
+
end
|
|
472
|
+
|
|
473
|
+
def test_create_group_round_trip
|
|
474
|
+
fixture = {
|
|
475
|
+
"name" => "stub",
|
|
476
|
+
"description" => nil
|
|
477
|
+
}
|
|
478
|
+
model = WorkOS::CreateGroup.new(fixture.to_json)
|
|
479
|
+
json = model.to_h
|
|
480
|
+
assert_kind_of Hash, json
|
|
481
|
+
assert_equal fixture["name"], json[:name]
|
|
482
|
+
fixture.each_key { |k| assert json.key?(k.to_sym) || json.key?(k), "Expected to_h to include key #{k}" }
|
|
483
|
+
end
|
|
484
|
+
|
|
485
|
+
def test_update_group_round_trip
|
|
486
|
+
fixture = {
|
|
487
|
+
"name" => "stub",
|
|
488
|
+
"description" => nil
|
|
489
|
+
}
|
|
490
|
+
model = WorkOS::UpdateGroup.new(fixture.to_json)
|
|
491
|
+
json = model.to_h
|
|
492
|
+
assert_kind_of Hash, json
|
|
493
|
+
fixture.each_key { |k| assert json.key?(k.to_sym) || json.key?(k), "Expected to_h to include key #{k}" }
|
|
494
|
+
end
|
|
495
|
+
|
|
462
496
|
def test_update_jwt_template_round_trip
|
|
463
497
|
fixture = {
|
|
464
498
|
"content" => "stub"
|
|
@@ -550,9 +584,20 @@ class ModelRoundTripTest < Minitest::Test
|
|
|
550
584
|
fixture.each_key { |k| assert json.key?(k.to_sym) || json.key?(k), "Expected to_h to include key #{k}" }
|
|
551
585
|
end
|
|
552
586
|
|
|
587
|
+
def test_domain_verification_intent_options_round_trip
|
|
588
|
+
fixture = {
|
|
589
|
+
"domain_name" => "stub"
|
|
590
|
+
}
|
|
591
|
+
model = WorkOS::DomainVerificationIntentOptions.new(fixture.to_json)
|
|
592
|
+
json = model.to_h
|
|
593
|
+
assert_kind_of Hash, json
|
|
594
|
+
fixture.each_key { |k| assert json.key?(k.to_sym) || json.key?(k), "Expected to_h to include key #{k}" }
|
|
595
|
+
end
|
|
596
|
+
|
|
553
597
|
def test_intent_options_round_trip
|
|
554
598
|
fixture = {
|
|
555
|
-
"sso" => {}
|
|
599
|
+
"sso" => {},
|
|
600
|
+
"domain_verification" => {}
|
|
556
601
|
}
|
|
557
602
|
model = WorkOS::IntentOptions.new(fixture.to_json)
|
|
558
603
|
json = model.to_h
|
|
@@ -567,7 +612,7 @@ class ModelRoundTripTest < Minitest::Test
|
|
|
567
612
|
"organization" => "stub",
|
|
568
613
|
"intent" => "stub",
|
|
569
614
|
"intent_options" => {},
|
|
570
|
-
"
|
|
615
|
+
"it_contact_emails" => []
|
|
571
616
|
}
|
|
572
617
|
model = WorkOS::GenerateLink.new(fixture.to_json)
|
|
573
618
|
json = model.to_h
|
|
@@ -1321,6 +1366,28 @@ class ModelRoundTripTest < Minitest::Test
|
|
|
1321
1366
|
fixture.each_key { |k| assert json.key?(k.to_sym) || json.key?(k), "Expected to_h to include key #{k}" }
|
|
1322
1367
|
end
|
|
1323
1368
|
|
|
1369
|
+
def test_group_round_trip
|
|
1370
|
+
fixture = {
|
|
1371
|
+
"object" => "group",
|
|
1372
|
+
"id" => "stub",
|
|
1373
|
+
"organization_id" => "stub",
|
|
1374
|
+
"name" => "stub",
|
|
1375
|
+
"description" => nil,
|
|
1376
|
+
"created_at" => "stub",
|
|
1377
|
+
"updated_at" => "stub"
|
|
1378
|
+
}
|
|
1379
|
+
model = WorkOS::Group.new(fixture.to_json)
|
|
1380
|
+
json = model.to_h
|
|
1381
|
+
assert_kind_of Hash, json
|
|
1382
|
+
assert_equal fixture["id"], json[:id]
|
|
1383
|
+
assert_equal fixture["organization_id"], json[:organization_id]
|
|
1384
|
+
assert_equal fixture["name"], json[:name]
|
|
1385
|
+
assert_nil json[:description]
|
|
1386
|
+
assert_equal fixture["created_at"], json[:created_at]
|
|
1387
|
+
assert_equal fixture["updated_at"], json[:updated_at]
|
|
1388
|
+
fixture.each_key { |k| assert json.key?(k.to_sym) || json.key?(k), "Expected to_h to include key #{k}" }
|
|
1389
|
+
end
|
|
1390
|
+
|
|
1324
1391
|
def test_event_context_actor_round_trip
|
|
1325
1392
|
fixture = {
|
|
1326
1393
|
"id" => "stub",
|
|
@@ -1384,28 +1451,6 @@ class ModelRoundTripTest < Minitest::Test
|
|
|
1384
1451
|
fixture.each_key { |k| assert json.key?(k.to_sym) || json.key?(k), "Expected to_h to include key #{k}" }
|
|
1385
1452
|
end
|
|
1386
1453
|
|
|
1387
|
-
def test_group_round_trip
|
|
1388
|
-
fixture = {
|
|
1389
|
-
"object" => "group",
|
|
1390
|
-
"id" => "stub",
|
|
1391
|
-
"organization_id" => "stub",
|
|
1392
|
-
"name" => "stub",
|
|
1393
|
-
"description" => nil,
|
|
1394
|
-
"created_at" => "stub",
|
|
1395
|
-
"updated_at" => "stub"
|
|
1396
|
-
}
|
|
1397
|
-
model = WorkOS::Group.new(fixture.to_json)
|
|
1398
|
-
json = model.to_h
|
|
1399
|
-
assert_kind_of Hash, json
|
|
1400
|
-
assert_equal fixture["id"], json[:id]
|
|
1401
|
-
assert_equal fixture["organization_id"], json[:organization_id]
|
|
1402
|
-
assert_equal fixture["name"], json[:name]
|
|
1403
|
-
assert_nil json[:description]
|
|
1404
|
-
assert_equal fixture["created_at"], json[:created_at]
|
|
1405
|
-
assert_equal fixture["updated_at"], json[:updated_at]
|
|
1406
|
-
fixture.each_key { |k| assert json.key?(k.to_sym) || json.key?(k), "Expected to_h to include key #{k}" }
|
|
1407
|
-
end
|
|
1408
|
-
|
|
1409
1454
|
def test_user_round_trip
|
|
1410
1455
|
fixture = {
|
|
1411
1456
|
"object" => "user",
|
|
@@ -1438,6 +1483,27 @@ class ModelRoundTripTest < Minitest::Test
|
|
|
1438
1483
|
fixture.each_key { |k| assert json.key?(k.to_sym) || json.key?(k), "Expected to_h to include key #{k}" }
|
|
1439
1484
|
end
|
|
1440
1485
|
|
|
1486
|
+
def test_waitlist_user_round_trip
|
|
1487
|
+
fixture = {
|
|
1488
|
+
"object" => "waitlist_user",
|
|
1489
|
+
"id" => "stub",
|
|
1490
|
+
"email" => "stub",
|
|
1491
|
+
"state" => "stub",
|
|
1492
|
+
"approved_at" => nil,
|
|
1493
|
+
"created_at" => "stub",
|
|
1494
|
+
"updated_at" => "stub"
|
|
1495
|
+
}
|
|
1496
|
+
model = WorkOS::WaitlistUser.new(fixture.to_json)
|
|
1497
|
+
json = model.to_h
|
|
1498
|
+
assert_kind_of Hash, json
|
|
1499
|
+
assert_equal fixture["id"], json[:id]
|
|
1500
|
+
assert_equal fixture["email"], json[:email]
|
|
1501
|
+
assert_nil json[:approved_at]
|
|
1502
|
+
assert_equal fixture["created_at"], json[:created_at]
|
|
1503
|
+
assert_equal fixture["updated_at"], json[:updated_at]
|
|
1504
|
+
fixture.each_key { |k| assert json.key?(k.to_sym) || json.key?(k), "Expected to_h to include key #{k}" }
|
|
1505
|
+
end
|
|
1506
|
+
|
|
1441
1507
|
def test_event_schema_round_trip
|
|
1442
1508
|
fixture = {
|
|
1443
1509
|
"object" => "event",
|
|
@@ -3746,6 +3812,7 @@ class ModelRoundTripTest < Minitest::Test
|
|
|
3746
3812
|
"organization_id" => nil,
|
|
3747
3813
|
"inviter_user_id" => nil,
|
|
3748
3814
|
"accepted_user_id" => nil,
|
|
3815
|
+
"role_slug" => nil,
|
|
3749
3816
|
"created_at" => "stub",
|
|
3750
3817
|
"updated_at" => "stub"
|
|
3751
3818
|
}
|
|
@@ -3760,6 +3827,7 @@ class ModelRoundTripTest < Minitest::Test
|
|
|
3760
3827
|
assert_nil json[:organization_id]
|
|
3761
3828
|
assert_nil json[:inviter_user_id]
|
|
3762
3829
|
assert_nil json[:accepted_user_id]
|
|
3830
|
+
assert_nil json[:role_slug]
|
|
3763
3831
|
assert_equal fixture["created_at"], json[:created_at]
|
|
3764
3832
|
assert_equal fixture["updated_at"], json[:updated_at]
|
|
3765
3833
|
fixture.each_key { |k| assert json.key?(k.to_sym) || json.key?(k), "Expected to_h to include key #{k}" }
|
|
@@ -3794,6 +3862,7 @@ class ModelRoundTripTest < Minitest::Test
|
|
|
3794
3862
|
"organization_id" => nil,
|
|
3795
3863
|
"inviter_user_id" => nil,
|
|
3796
3864
|
"accepted_user_id" => nil,
|
|
3865
|
+
"role_slug" => nil,
|
|
3797
3866
|
"created_at" => "stub",
|
|
3798
3867
|
"updated_at" => "stub"
|
|
3799
3868
|
}
|
|
@@ -3808,6 +3877,7 @@ class ModelRoundTripTest < Minitest::Test
|
|
|
3808
3877
|
assert_nil json[:organization_id]
|
|
3809
3878
|
assert_nil json[:inviter_user_id]
|
|
3810
3879
|
assert_nil json[:accepted_user_id]
|
|
3880
|
+
assert_nil json[:role_slug]
|
|
3811
3881
|
assert_equal fixture["created_at"], json[:created_at]
|
|
3812
3882
|
assert_equal fixture["updated_at"], json[:updated_at]
|
|
3813
3883
|
fixture.each_key { |k| assert json.key?(k.to_sym) || json.key?(k), "Expected to_h to include key #{k}" }
|
|
@@ -3842,6 +3912,7 @@ class ModelRoundTripTest < Minitest::Test
|
|
|
3842
3912
|
"organization_id" => nil,
|
|
3843
3913
|
"inviter_user_id" => nil,
|
|
3844
3914
|
"accepted_user_id" => nil,
|
|
3915
|
+
"role_slug" => nil,
|
|
3845
3916
|
"created_at" => "stub",
|
|
3846
3917
|
"updated_at" => "stub"
|
|
3847
3918
|
}
|
|
@@ -3856,6 +3927,7 @@ class ModelRoundTripTest < Minitest::Test
|
|
|
3856
3927
|
assert_nil json[:organization_id]
|
|
3857
3928
|
assert_nil json[:inviter_user_id]
|
|
3858
3929
|
assert_nil json[:accepted_user_id]
|
|
3930
|
+
assert_nil json[:role_slug]
|
|
3859
3931
|
assert_equal fixture["created_at"], json[:created_at]
|
|
3860
3932
|
assert_equal fixture["updated_at"], json[:updated_at]
|
|
3861
3933
|
fixture.each_key { |k| assert json.key?(k.to_sym) || json.key?(k), "Expected to_h to include key #{k}" }
|
|
@@ -3890,6 +3962,7 @@ class ModelRoundTripTest < Minitest::Test
|
|
|
3890
3962
|
"organization_id" => nil,
|
|
3891
3963
|
"inviter_user_id" => nil,
|
|
3892
3964
|
"accepted_user_id" => nil,
|
|
3965
|
+
"role_slug" => nil,
|
|
3893
3966
|
"created_at" => "stub",
|
|
3894
3967
|
"updated_at" => "stub"
|
|
3895
3968
|
}
|
|
@@ -3904,6 +3977,7 @@ class ModelRoundTripTest < Minitest::Test
|
|
|
3904
3977
|
assert_nil json[:organization_id]
|
|
3905
3978
|
assert_nil json[:inviter_user_id]
|
|
3906
3979
|
assert_nil json[:accepted_user_id]
|
|
3980
|
+
assert_nil json[:role_slug]
|
|
3907
3981
|
assert_equal fixture["created_at"], json[:created_at]
|
|
3908
3982
|
assert_equal fixture["updated_at"], json[:updated_at]
|
|
3909
3983
|
fixture.each_key { |k| assert json.key?(k.to_sym) || json.key?(k), "Expected to_h to include key #{k}" }
|
|
@@ -5423,6 +5497,57 @@ class ModelRoundTripTest < Minitest::Test
|
|
|
5423
5497
|
fixture.each_key { |k| assert json.key?(k.to_sym) || json.key?(k), "Expected to_h to include key #{k}" }
|
|
5424
5498
|
end
|
|
5425
5499
|
|
|
5500
|
+
def test_waitlist_user_approved_round_trip
|
|
5501
|
+
fixture = {
|
|
5502
|
+
"id" => "stub",
|
|
5503
|
+
"event" => "waitlist_user.approved",
|
|
5504
|
+
"data" => {},
|
|
5505
|
+
"created_at" => "stub",
|
|
5506
|
+
"context" => {},
|
|
5507
|
+
"object" => "event"
|
|
5508
|
+
}
|
|
5509
|
+
model = WorkOS::WaitlistUserApproved.new(fixture.to_json)
|
|
5510
|
+
json = model.to_h
|
|
5511
|
+
assert_kind_of Hash, json
|
|
5512
|
+
assert_equal fixture["id"], json[:id]
|
|
5513
|
+
assert_equal fixture["created_at"], json[:created_at]
|
|
5514
|
+
fixture.each_key { |k| assert json.key?(k.to_sym) || json.key?(k), "Expected to_h to include key #{k}" }
|
|
5515
|
+
end
|
|
5516
|
+
|
|
5517
|
+
def test_waitlist_user_created_round_trip
|
|
5518
|
+
fixture = {
|
|
5519
|
+
"id" => "stub",
|
|
5520
|
+
"event" => "waitlist_user.created",
|
|
5521
|
+
"data" => {},
|
|
5522
|
+
"created_at" => "stub",
|
|
5523
|
+
"context" => {},
|
|
5524
|
+
"object" => "event"
|
|
5525
|
+
}
|
|
5526
|
+
model = WorkOS::WaitlistUserCreated.new(fixture.to_json)
|
|
5527
|
+
json = model.to_h
|
|
5528
|
+
assert_kind_of Hash, json
|
|
5529
|
+
assert_equal fixture["id"], json[:id]
|
|
5530
|
+
assert_equal fixture["created_at"], json[:created_at]
|
|
5531
|
+
fixture.each_key { |k| assert json.key?(k.to_sym) || json.key?(k), "Expected to_h to include key #{k}" }
|
|
5532
|
+
end
|
|
5533
|
+
|
|
5534
|
+
def test_waitlist_user_denied_round_trip
|
|
5535
|
+
fixture = {
|
|
5536
|
+
"id" => "stub",
|
|
5537
|
+
"event" => "waitlist_user.denied",
|
|
5538
|
+
"data" => {},
|
|
5539
|
+
"created_at" => "stub",
|
|
5540
|
+
"context" => {},
|
|
5541
|
+
"object" => "event"
|
|
5542
|
+
}
|
|
5543
|
+
model = WorkOS::WaitlistUserDenied.new(fixture.to_json)
|
|
5544
|
+
json = model.to_h
|
|
5545
|
+
assert_kind_of Hash, json
|
|
5546
|
+
assert_equal fixture["id"], json[:id]
|
|
5547
|
+
assert_equal fixture["created_at"], json[:created_at]
|
|
5548
|
+
fixture.each_key { |k| assert json.key?(k.to_sym) || json.key?(k), "Expected to_h to include key #{k}" }
|
|
5549
|
+
end
|
|
5550
|
+
|
|
5426
5551
|
def test_jwt_template_response_round_trip
|
|
5427
5552
|
fixture = {
|
|
5428
5553
|
"object" => "jwt_template",
|
|
@@ -5717,6 +5842,7 @@ class ModelRoundTripTest < Minitest::Test
|
|
|
5717
5842
|
"organization_id" => nil,
|
|
5718
5843
|
"inviter_user_id" => nil,
|
|
5719
5844
|
"accepted_user_id" => nil,
|
|
5845
|
+
"role_slug" => nil,
|
|
5720
5846
|
"created_at" => "stub",
|
|
5721
5847
|
"updated_at" => "stub",
|
|
5722
5848
|
"token" => "stub",
|
|
@@ -5733,6 +5859,7 @@ class ModelRoundTripTest < Minitest::Test
|
|
|
5733
5859
|
assert_nil json[:organization_id]
|
|
5734
5860
|
assert_nil json[:inviter_user_id]
|
|
5735
5861
|
assert_nil json[:accepted_user_id]
|
|
5862
|
+
assert_nil json[:role_slug]
|
|
5736
5863
|
assert_equal fixture["created_at"], json[:created_at]
|
|
5737
5864
|
assert_equal fixture["updated_at"], json[:updated_at]
|
|
5738
5865
|
assert_equal fixture["token"], json[:token]
|
|
@@ -6826,6 +6953,7 @@ class ModelRoundTripTest < Minitest::Test
|
|
|
6826
6953
|
"organization_id" => nil,
|
|
6827
6954
|
"inviter_user_id" => nil,
|
|
6828
6955
|
"accepted_user_id" => nil,
|
|
6956
|
+
"role_slug" => nil,
|
|
6829
6957
|
"created_at" => "stub",
|
|
6830
6958
|
"updated_at" => "stub",
|
|
6831
6959
|
"token" => "stub",
|
|
@@ -6842,6 +6970,7 @@ class ModelRoundTripTest < Minitest::Test
|
|
|
6842
6970
|
assert_nil json[:organization_id]
|
|
6843
6971
|
assert_nil json[:inviter_user_id]
|
|
6844
6972
|
assert_nil json[:accepted_user_id]
|
|
6973
|
+
assert_nil json[:role_slug]
|
|
6845
6974
|
assert_equal fixture["created_at"], json[:created_at]
|
|
6846
6975
|
assert_equal fixture["updated_at"], json[:updated_at]
|
|
6847
6976
|
assert_equal fixture["token"], json[:token]
|
data/test/workos/test_session.rb
CHANGED
|
@@ -206,6 +206,131 @@ class SessionTest < Minitest::Test
|
|
|
206
206
|
assert_equal "https://app/cb", params["return_to"]
|
|
207
207
|
end
|
|
208
208
|
|
|
209
|
+
# --- Session#refresh -------------------------------------------------------
|
|
210
|
+
|
|
211
|
+
def test_refresh_seals_session_client_side_and_returns_refresh_success
|
|
212
|
+
rsa, pub = signing_key_pair
|
|
213
|
+
old_access = make_jwt({"sid" => "session_old", "exp" => Time.now.to_i - 60}, rsa)
|
|
214
|
+
sealed = @sm.seal_data({"access_token" => old_access, "refresh_token" => "rt_old", "user" => {"id" => "u_1"}}, PASSWORD)
|
|
215
|
+
|
|
216
|
+
new_access = make_jwt({"sid" => "session_new", "org_id" => "org_1", "role" => "admin", "exp" => Time.now.to_i + 300}, rsa)
|
|
217
|
+
api_response = {
|
|
218
|
+
"access_token" => new_access,
|
|
219
|
+
"refresh_token" => "rt_new",
|
|
220
|
+
"user" => {"id" => "u_1", "email" => "a@b.com"},
|
|
221
|
+
"impersonator" => nil
|
|
222
|
+
}
|
|
223
|
+
|
|
224
|
+
stub_request(:post, "https://api.workos.com/user_management/authenticate")
|
|
225
|
+
.with(body: hash_including("grant_type" => "refresh_token", "refresh_token" => "rt_old"))
|
|
226
|
+
.to_return(status: 200, body: api_response.to_json)
|
|
227
|
+
stub_request(:get, "https://api.workos.com/sso/jwks/client_001")
|
|
228
|
+
.to_return(status: 200, body: jwks_payload(pub).to_json)
|
|
229
|
+
|
|
230
|
+
session = @sm.load(seal_data: sealed, cookie_password: PASSWORD)
|
|
231
|
+
result = session.refresh
|
|
232
|
+
|
|
233
|
+
assert_kind_of WorkOS::SessionManager::RefreshSuccess, result
|
|
234
|
+
assert result.authenticated
|
|
235
|
+
assert_equal "session_new", result.session_id
|
|
236
|
+
assert_equal "org_1", result.organization_id
|
|
237
|
+
assert_equal "admin", result.role
|
|
238
|
+
assert_equal "u_1", result.user["id"]
|
|
239
|
+
|
|
240
|
+
# sealed_session should be a non-empty string that round-trips
|
|
241
|
+
refute_empty result.sealed_session
|
|
242
|
+
unsealed = @sm.unseal_data(result.sealed_session, PASSWORD)
|
|
243
|
+
assert_equal new_access, unsealed["access_token"]
|
|
244
|
+
assert_equal "rt_new", unsealed["refresh_token"]
|
|
245
|
+
end
|
|
246
|
+
|
|
247
|
+
def test_refresh_updates_internal_seal_data_for_subsequent_authenticate
|
|
248
|
+
rsa, pub = signing_key_pair
|
|
249
|
+
old_access = make_jwt({"sid" => "session_old", "exp" => Time.now.to_i - 60}, rsa)
|
|
250
|
+
sealed = @sm.seal_data({"access_token" => old_access, "refresh_token" => "rt_old", "user" => {"id" => "u_1"}}, PASSWORD)
|
|
251
|
+
|
|
252
|
+
new_access = make_jwt({"sid" => "session_refreshed", "org_id" => "org_2", "exp" => Time.now.to_i + 300}, rsa)
|
|
253
|
+
api_response = {
|
|
254
|
+
"access_token" => new_access,
|
|
255
|
+
"refresh_token" => "rt_new",
|
|
256
|
+
"user" => {"id" => "u_1"}
|
|
257
|
+
}
|
|
258
|
+
|
|
259
|
+
stub_request(:post, "https://api.workos.com/user_management/authenticate")
|
|
260
|
+
.to_return(status: 200, body: api_response.to_json)
|
|
261
|
+
stub_request(:get, "https://api.workos.com/sso/jwks/client_001")
|
|
262
|
+
.to_return(status: 200, body: jwks_payload(pub).to_json)
|
|
263
|
+
|
|
264
|
+
session = @sm.load(seal_data: sealed, cookie_password: PASSWORD)
|
|
265
|
+
session.refresh
|
|
266
|
+
|
|
267
|
+
# A subsequent authenticate should use the refreshed token
|
|
268
|
+
auth = session.authenticate
|
|
269
|
+
assert_kind_of WorkOS::SessionManager::AuthSuccess, auth
|
|
270
|
+
assert auth.authenticated
|
|
271
|
+
assert_equal "session_refreshed", auth.session_id
|
|
272
|
+
end
|
|
273
|
+
|
|
274
|
+
def test_refresh_returns_error_on_invalid_cookie
|
|
275
|
+
result = @sm.refresh(seal_data: "garbage", cookie_password: PASSWORD)
|
|
276
|
+
assert_kind_of WorkOS::SessionManager::RefreshError, result
|
|
277
|
+
refute result.authenticated
|
|
278
|
+
assert_equal WorkOS::SessionManager::INVALID_SESSION_COOKIE, result.reason
|
|
279
|
+
end
|
|
280
|
+
|
|
281
|
+
def test_refresh_returns_error_when_no_refresh_token
|
|
282
|
+
sealed = @sm.seal_data({"access_token" => "at_only"}, PASSWORD)
|
|
283
|
+
result = @sm.refresh(seal_data: sealed, cookie_password: PASSWORD)
|
|
284
|
+
assert_kind_of WorkOS::SessionManager::RefreshError, result
|
|
285
|
+
assert_equal WorkOS::SessionManager::INVALID_SESSION_COOKIE, result.reason
|
|
286
|
+
end
|
|
287
|
+
|
|
288
|
+
def test_refresh_does_not_send_session_param_to_api
|
|
289
|
+
rsa, pub = signing_key_pair
|
|
290
|
+
old_access = make_jwt({"sid" => "s", "exp" => Time.now.to_i - 60}, rsa)
|
|
291
|
+
sealed = @sm.seal_data({"access_token" => old_access, "refresh_token" => "rt_x", "user" => {"id" => "u"}}, PASSWORD)
|
|
292
|
+
|
|
293
|
+
new_access = make_jwt({"sid" => "s2", "exp" => Time.now.to_i + 300}, rsa)
|
|
294
|
+
api_response = {"access_token" => new_access, "refresh_token" => "rt_y", "user" => {"id" => "u"}}
|
|
295
|
+
|
|
296
|
+
stub = stub_request(:post, "https://api.workos.com/user_management/authenticate")
|
|
297
|
+
.with { |req| !req.body.include?("seal_session") }
|
|
298
|
+
.to_return(status: 200, body: api_response.to_json)
|
|
299
|
+
stub_request(:get, "https://api.workos.com/sso/jwks/client_001")
|
|
300
|
+
.to_return(status: 200, body: jwks_payload(pub).to_json)
|
|
301
|
+
|
|
302
|
+
session = @sm.load(seal_data: sealed, cookie_password: PASSWORD)
|
|
303
|
+
session.refresh
|
|
304
|
+
|
|
305
|
+
assert_requested(stub)
|
|
306
|
+
end
|
|
307
|
+
|
|
308
|
+
def test_refresh_returns_error_on_malformed_access_token_without_mutating_state
|
|
309
|
+
rsa, pub = signing_key_pair
|
|
310
|
+
old_access = make_jwt({"sid" => "session_old", "exp" => Time.now.to_i - 60}, rsa)
|
|
311
|
+
sealed = @sm.seal_data({"access_token" => old_access, "refresh_token" => "rt_old", "user" => {"id" => "u_1"}}, PASSWORD)
|
|
312
|
+
|
|
313
|
+
api_response = {
|
|
314
|
+
"access_token" => "not-a-valid-jwt",
|
|
315
|
+
"refresh_token" => "rt_new",
|
|
316
|
+
"user" => {"id" => "u_1"}
|
|
317
|
+
}
|
|
318
|
+
|
|
319
|
+
stub_request(:post, "https://api.workos.com/user_management/authenticate")
|
|
320
|
+
.to_return(status: 200, body: api_response.to_json)
|
|
321
|
+
stub_request(:get, "https://api.workos.com/sso/jwks/client_001")
|
|
322
|
+
.to_return(status: 200, body: jwks_payload(pub).to_json)
|
|
323
|
+
|
|
324
|
+
session = @sm.load(seal_data: sealed, cookie_password: PASSWORD)
|
|
325
|
+
result = session.refresh
|
|
326
|
+
|
|
327
|
+
assert_kind_of WorkOS::SessionManager::RefreshError, result
|
|
328
|
+
refute result.authenticated
|
|
329
|
+
|
|
330
|
+
# Session state should not have been mutated
|
|
331
|
+
assert_equal sealed, session.seal_data
|
|
332
|
+
end
|
|
333
|
+
|
|
209
334
|
# --- Session constructor validation ---------------------------------------
|
|
210
335
|
|
|
211
336
|
def test_session_load_requires_cookie_password
|
|
@@ -0,0 +1,33 @@
|
|
|
1
|
+
# frozen_string_literal: true
|
|
2
|
+
|
|
3
|
+
# This file is auto-generated by oagen. Do not edit.
|
|
4
|
+
|
|
5
|
+
require "test_helper"
|
|
6
|
+
|
|
7
|
+
class UserManagementOrganizationMembershipGroupsTest < Minitest::Test
|
|
8
|
+
include FixtureHelper
|
|
9
|
+
|
|
10
|
+
def setup
|
|
11
|
+
@client = WorkOS::Client.new(api_key: "sk_test_123")
|
|
12
|
+
end
|
|
13
|
+
|
|
14
|
+
def test_list_organization_membership_groups_returns_expected_result
|
|
15
|
+
stub_request(:get, %r{\Ahttps://api\.workos\.com/user_management/organization_memberships/stub/groups(\?|\z)})
|
|
16
|
+
.to_return(body: '{"data": [], "list_metadata": {}}', status: 200)
|
|
17
|
+
result = @client.user_management_organization_membership_groups.list_organization_membership_groups(om_id: "stub")
|
|
18
|
+
assert_kind_of WorkOS::Types::ListStruct, result
|
|
19
|
+
end
|
|
20
|
+
|
|
21
|
+
# Parameterized authentication error tests (one per endpoint).
|
|
22
|
+
[
|
|
23
|
+
{name: :list_organization_membership_groups, verb: :get, url: %r{\Ahttps://api\.workos\.com/user_management/organization_memberships/stub/groups(\?|\z)}, args: {om_id: "stub"}}
|
|
24
|
+
].each do |spec|
|
|
25
|
+
define_method("test_#{spec[:name]}_raises_authentication_error_on_401") do
|
|
26
|
+
stub_request(spec[:verb], spec[:url])
|
|
27
|
+
.to_return(body: '{"message": "Unauthorized"}', status: 401)
|
|
28
|
+
assert_raises(WorkOS::AuthenticationError) do
|
|
29
|
+
@client.user_management_organization_membership_groups.send(spec[:name], **(spec[:args] || {}))
|
|
30
|
+
end
|
|
31
|
+
end
|
|
32
|
+
end
|
|
33
|
+
end
|
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: workos
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 7.
|
|
4
|
+
version: 7.1.1
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- WorkOS
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2026-04-
|
|
11
|
+
date: 2026-04-29 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: jwt
|
|
@@ -137,6 +137,7 @@ files:
|
|
|
137
137
|
- ".github/workflows/release-please.yml"
|
|
138
138
|
- ".github/workflows/release.yml"
|
|
139
139
|
- ".gitignore"
|
|
140
|
+
- ".last-synced-sha"
|
|
140
141
|
- ".oagen-manifest.json"
|
|
141
142
|
- ".release-please-manifest.json"
|
|
142
143
|
- ".ruby-version"
|
|
@@ -155,6 +156,7 @@ files:
|
|
|
155
156
|
- lib/workos.rb
|
|
156
157
|
- lib/workos/actions.rb
|
|
157
158
|
- lib/workos/admin_portal.rb
|
|
159
|
+
- lib/workos/admin_portal/domain_verification_intent_options.rb
|
|
158
160
|
- lib/workos/admin_portal/generate_link.rb
|
|
159
161
|
- lib/workos/admin_portal/intent_options.rb
|
|
160
162
|
- lib/workos/admin_portal/portal_link_response.rb
|
|
@@ -316,6 +318,11 @@ files:
|
|
|
316
318
|
- lib/workos/feature_flags/flag_updated_context_previous_attribute_data.rb
|
|
317
319
|
- lib/workos/feature_flags/flag_updated_data.rb
|
|
318
320
|
- lib/workos/feature_flags/flag_updated_data_owner.rb
|
|
321
|
+
- lib/workos/groups.rb
|
|
322
|
+
- lib/workos/groups/create_group.rb
|
|
323
|
+
- lib/workos/groups/create_group_membership.rb
|
|
324
|
+
- lib/workos/groups/group.rb
|
|
325
|
+
- lib/workos/groups/update_group.rb
|
|
319
326
|
- lib/workos/hash_provider.rb
|
|
320
327
|
- lib/workos/inflections.rb
|
|
321
328
|
- lib/workos/multi_factor_auth.rb
|
|
@@ -403,7 +410,6 @@ files:
|
|
|
403
410
|
- lib/workos/shared/event_context.rb
|
|
404
411
|
- lib/workos/shared/event_context_actor.rb
|
|
405
412
|
- lib/workos/shared/event_context_google_analytics_session.rb
|
|
406
|
-
- lib/workos/shared/group.rb
|
|
407
413
|
- lib/workos/shared/group_created.rb
|
|
408
414
|
- lib/workos/shared/group_deleted.rb
|
|
409
415
|
- lib/workos/shared/group_member_added.rb
|
|
@@ -411,6 +417,10 @@ files:
|
|
|
411
417
|
- lib/workos/shared/group_member_removed.rb
|
|
412
418
|
- lib/workos/shared/group_member_removed_data.rb
|
|
413
419
|
- lib/workos/shared/group_updated.rb
|
|
420
|
+
- lib/workos/shared/waitlist_user.rb
|
|
421
|
+
- lib/workos/shared/waitlist_user_approved.rb
|
|
422
|
+
- lib/workos/shared/waitlist_user_created.rb
|
|
423
|
+
- lib/workos/shared/waitlist_user_denied.rb
|
|
414
424
|
- lib/workos/sso.rb
|
|
415
425
|
- lib/workos/sso/connection.rb
|
|
416
426
|
- lib/workos/sso/connection_activated.rb
|
|
@@ -500,6 +510,7 @@ files:
|
|
|
500
510
|
- lib/workos/types/flag_rule_updated_context_previous_attribute_context_access_type.rb
|
|
501
511
|
- lib/workos/types/flag_updated_context_actor_source.rb
|
|
502
512
|
- lib/workos/types/generate_link_intent.rb
|
|
513
|
+
- lib/workos/types/groups_order.rb
|
|
503
514
|
- lib/workos/types/invitation_accepted_data_state.rb
|
|
504
515
|
- lib/workos/types/invitation_created_data_state.rb
|
|
505
516
|
- lib/workos/types/invitation_resent_data_state.rb
|
|
@@ -561,6 +572,7 @@ files:
|
|
|
561
572
|
- lib/workos/types/user_management_authentication_screen_hint.rb
|
|
562
573
|
- lib/workos/types/user_management_invitations_order.rb
|
|
563
574
|
- lib/workos/types/user_management_multi_factor_authentication_order.rb
|
|
575
|
+
- lib/workos/types/user_management_organization_membership_groups_order.rb
|
|
564
576
|
- lib/workos/types/user_management_organization_membership_order.rb
|
|
565
577
|
- lib/workos/types/user_management_organization_membership_statuses.rb
|
|
566
578
|
- lib/workos/types/user_management_users_authorized_applications_order.rb
|
|
@@ -580,6 +592,7 @@ files:
|
|
|
580
592
|
- lib/workos/types/vault_kek_created_data_actor_source.rb
|
|
581
593
|
- lib/workos/types/vault_metadata_read_data_actor_source.rb
|
|
582
594
|
- lib/workos/types/vault_names_listed_data_actor_source.rb
|
|
595
|
+
- lib/workos/types/waitlist_user_state.rb
|
|
583
596
|
- lib/workos/types/webhook_endpoint_json_status.rb
|
|
584
597
|
- lib/workos/types/webhook_endpoint_status.rb
|
|
585
598
|
- lib/workos/types/webhooks_order.rb
|
|
@@ -701,11 +714,6 @@ files:
|
|
|
701
714
|
- lib/workos/user_management/update_jwt_template.rb
|
|
702
715
|
- lib/workos/user_management/update_user.rb
|
|
703
716
|
- lib/workos/user_management/update_user_organization_membership.rb
|
|
704
|
-
- lib/workos/user_management/urn_ietf_params_oauth_grant_type_device_code_session_authenticate_request.rb
|
|
705
|
-
- lib/workos/user_management/urn_workos_oauth_grant_type_email_verification_code_session_authenticate_request.rb
|
|
706
|
-
- lib/workos/user_management/urn_workos_oauth_grant_type_magic_auth_code_session_authenticate_request.rb
|
|
707
|
-
- lib/workos/user_management/urn_workos_oauth_grant_type_mfa_totp_session_authenticate_request.rb
|
|
708
|
-
- lib/workos/user_management/urn_workos_oauth_grant_type_organization_selection_session_authenticate_request.rb
|
|
709
717
|
- lib/workos/user_management/user.rb
|
|
710
718
|
- lib/workos/user_management/user_created.rb
|
|
711
719
|
- lib/workos/user_management/user_deleted.rb
|
|
@@ -717,6 +725,7 @@ files:
|
|
|
717
725
|
- lib/workos/user_management/user_updated.rb
|
|
718
726
|
- lib/workos/user_management/verify_email_address.rb
|
|
719
727
|
- lib/workos/user_management/verify_email_response.rb
|
|
728
|
+
- lib/workos/user_management_organization_membership_groups.rb
|
|
720
729
|
- lib/workos/util.rb
|
|
721
730
|
- lib/workos/util/signature.rb
|
|
722
731
|
- lib/workos/vault.rb
|
|
@@ -891,6 +900,8 @@ files:
|
|
|
891
900
|
- rbi/workos/create_authorization_permission.rbi
|
|
892
901
|
- rbi/workos/create_authorization_resource.rbi
|
|
893
902
|
- rbi/workos/create_cors_origin.rbi
|
|
903
|
+
- rbi/workos/create_group.rbi
|
|
904
|
+
- rbi/workos/create_group_membership.rbi
|
|
894
905
|
- rbi/workos/create_m2m_application.rbi
|
|
895
906
|
- rbi/workos/create_magic_code_and_return.rbi
|
|
896
907
|
- rbi/workos/create_oauth_application.rbi
|
|
@@ -924,6 +935,7 @@ files:
|
|
|
924
935
|
- rbi/workos/directory_user_email.rbi
|
|
925
936
|
- rbi/workos/directory_user_with_groups.rbi
|
|
926
937
|
- rbi/workos/directory_user_with_groups_email.rbi
|
|
938
|
+
- rbi/workos/domain_verification_intent_options.rbi
|
|
927
939
|
- rbi/workos/dsync_activated.rbi
|
|
928
940
|
- rbi/workos/dsync_activated_data.rbi
|
|
929
941
|
- rbi/workos/dsync_activated_data_domain.rbi
|
|
@@ -1007,6 +1019,7 @@ files:
|
|
|
1007
1019
|
- rbi/workos/group_member_removed.rbi
|
|
1008
1020
|
- rbi/workos/group_member_removed_data.rbi
|
|
1009
1021
|
- rbi/workos/group_updated.rbi
|
|
1022
|
+
- rbi/workos/groups.rbi
|
|
1010
1023
|
- rbi/workos/hash_provider.rbi
|
|
1011
1024
|
- rbi/workos/intent_options.rbi
|
|
1012
1025
|
- rbi/workos/invitation.rbi
|
|
@@ -1139,6 +1152,7 @@ files:
|
|
|
1139
1152
|
- rbi/workos/update_audit_logs_retention.rbi
|
|
1140
1153
|
- rbi/workos/update_authorization_permission.rbi
|
|
1141
1154
|
- rbi/workos/update_authorization_resource.rbi
|
|
1155
|
+
- rbi/workos/update_group.rbi
|
|
1142
1156
|
- rbi/workos/update_jwt_template.rbi
|
|
1143
1157
|
- rbi/workos/update_oauth_application.rbi
|
|
1144
1158
|
- rbi/workos/update_organization.rbi
|
|
@@ -1157,6 +1171,7 @@ files:
|
|
|
1157
1171
|
- rbi/workos/user_invite.rbi
|
|
1158
1172
|
- rbi/workos/user_management.rbi
|
|
1159
1173
|
- rbi/workos/user_management_login_request.rbi
|
|
1174
|
+
- rbi/workos/user_management_organization_membership_groups.rbi
|
|
1160
1175
|
- rbi/workos/user_object.rbi
|
|
1161
1176
|
- rbi/workos/user_organization_membership.rbi
|
|
1162
1177
|
- rbi/workos/user_organization_membership_base_list_data.rbi
|
|
@@ -1188,6 +1203,10 @@ files:
|
|
|
1188
1203
|
- rbi/workos/vault_names_listed_data.rbi
|
|
1189
1204
|
- rbi/workos/verify_email_address.rbi
|
|
1190
1205
|
- rbi/workos/verify_email_response.rbi
|
|
1206
|
+
- rbi/workos/waitlist_user.rbi
|
|
1207
|
+
- rbi/workos/waitlist_user_approved.rbi
|
|
1208
|
+
- rbi/workos/waitlist_user_created.rbi
|
|
1209
|
+
- rbi/workos/waitlist_user_denied.rbi
|
|
1191
1210
|
- rbi/workos/webhook_endpoint.rbi
|
|
1192
1211
|
- rbi/workos/webhook_endpoint_json.rbi
|
|
1193
1212
|
- rbi/workos/webhooks.rbi
|
|
@@ -1210,6 +1229,7 @@ files:
|
|
|
1210
1229
|
- test/workos/test_encryptors_aes_gcm.rb
|
|
1211
1230
|
- test/workos/test_events.rb
|
|
1212
1231
|
- test/workos/test_feature_flags.rb
|
|
1232
|
+
- test/workos/test_groups.rb
|
|
1213
1233
|
- test/workos/test_list_struct.rb
|
|
1214
1234
|
- test/workos/test_model_round_trip.rb
|
|
1215
1235
|
- test/workos/test_multi_factor_auth.rb
|
|
@@ -1225,6 +1245,7 @@ files:
|
|
|
1225
1245
|
- test/workos/test_sso_helpers.rb
|
|
1226
1246
|
- test/workos/test_sso_runtime.rb
|
|
1227
1247
|
- test/workos/test_user_management.rb
|
|
1248
|
+
- test/workos/test_user_management_organization_membership_groups.rb
|
|
1228
1249
|
- test/workos/test_vault.rb
|
|
1229
1250
|
- test/workos/test_webhook_verify.rb
|
|
1230
1251
|
- test/workos/test_webhooks.rb
|
|
@@ -1,8 +0,0 @@
|
|
|
1
|
-
# frozen_string_literal: true
|
|
2
|
-
|
|
3
|
-
# This file is auto-generated by oagen. Do not edit.
|
|
4
|
-
|
|
5
|
-
module WorkOS
|
|
6
|
-
# @deprecated Use WorkOS::DeviceCodeSessionAuthenticateRequest instead.
|
|
7
|
-
UrnIetfParamsOAuthGrantTypeDeviceCodeSessionAuthenticateRequest = DeviceCodeSessionAuthenticateRequest
|
|
8
|
-
end
|
|
@@ -1,8 +0,0 @@
|
|
|
1
|
-
# frozen_string_literal: true
|
|
2
|
-
|
|
3
|
-
# This file is auto-generated by oagen. Do not edit.
|
|
4
|
-
|
|
5
|
-
module WorkOS
|
|
6
|
-
# @deprecated Use WorkOS::EmailVerificationCodeSessionAuthenticateRequest instead.
|
|
7
|
-
UrnWorkosOAuthGrantTypeEmailVerificationCodeSessionAuthenticateRequest = EmailVerificationCodeSessionAuthenticateRequest
|
|
8
|
-
end
|
|
@@ -1,8 +0,0 @@
|
|
|
1
|
-
# frozen_string_literal: true
|
|
2
|
-
|
|
3
|
-
# This file is auto-generated by oagen. Do not edit.
|
|
4
|
-
|
|
5
|
-
module WorkOS
|
|
6
|
-
# @deprecated Use WorkOS::MagicAuthCodeSessionAuthenticateRequest instead.
|
|
7
|
-
UrnWorkosOAuthGrantTypeMagicAuthCodeSessionAuthenticateRequest = MagicAuthCodeSessionAuthenticateRequest
|
|
8
|
-
end
|
data/lib/workos/user_management/urn_workos_oauth_grant_type_mfa_totp_session_authenticate_request.rb
DELETED
|
@@ -1,8 +0,0 @@
|
|
|
1
|
-
# frozen_string_literal: true
|
|
2
|
-
|
|
3
|
-
# This file is auto-generated by oagen. Do not edit.
|
|
4
|
-
|
|
5
|
-
module WorkOS
|
|
6
|
-
# @deprecated Use WorkOS::MFATotpSessionAuthenticateRequest instead.
|
|
7
|
-
UrnWorkosOAuthGrantTypeMfaTotpSessionAuthenticateRequest = MFATotpSessionAuthenticateRequest
|
|
8
|
-
end
|