@fusionauth/typescript-client 1.49.1 → 1.50.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +8 -0
- package/build/src/FusionAuthClient.d.ts +3858 -3715
- package/build/src/FusionAuthClient.js +766 -627
- package/build/src/FusionAuthClient.js.map +1 -1
- package/dist/fusionauth-typescript-client.js +767 -628
- package/dist/fusionauth-typescript-client.min.js +1 -1
- package/dist/fusionauth-typescript-client.min.js.map +1 -1
- package/package.json +1 -1
|
@@ -15,7 +15,7 @@
|
|
|
15
15
|
* language governing permissions and limitations under the License.
|
|
16
16
|
*/
|
|
17
17
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
18
|
-
exports.OAuthErrorReason = exports.
|
|
18
|
+
exports.IdentityProviderLoginMethod = exports.OAuthScopeConsentMode = exports.ClientAuthenticationMethod = exports.OAuthErrorReason = exports.UnknownScopePolicy = exports.WebAuthnWorkflow = exports.Oauth2AuthorizedURLValidationPolicy = exports.LogoutBehavior = exports.OAuthScopeHandlingPolicy = exports.RateLimitedRequestType = exports.CanonicalizationMethod = exports.SecureGeneratorType = exports.VerificationStrategy = exports.UniqueUsernameStrategy = exports.LDAPSecurityMethod = exports.TOTPAlgorithm = exports.EventType = exports.SystemTrustedProxyConfigurationPolicy = exports.IdentityProviderType = exports.MessengerType = exports.ExpiryUnit = exports.EmailSecurityType = exports.ChangePasswordReason = exports.SteamAPIMode = exports.UserVerificationRequirement = exports.TransactionType = exports.FamilyRole = exports.KeyUse = exports.Algorithm = exports.EventLogType = exports.BreachAction = exports.IdentityProviderLinkingStrategy = exports.SAMLLogoutBehavior = exports.Sort = exports.OAuthErrorType = exports.LambdaEngineType = exports.UserActionPhase = exports.UnverifiedBehavior = exports.RefreshTokenExpirationPolicy = exports.RegistrationType = exports.LoginIdType = exports.CoseEllipticCurve = exports.AuthenticatorAttachment = exports.MultiFactorLoginPolicy = exports.ConnectorType = exports.KeyType = exports.AttestationType = exports.FormType = exports.KeyAlgorithm = exports.CaptchaMethod = exports.DeviceType = exports.RefreshTokenUsagePolicy = exports.ClientAuthenticationPolicy = exports.ResidentKeyRequirement = exports.AuthenticationThreats = exports.ObjectState = exports.AttestationConveyancePreference = exports.LambdaType = exports.CoseAlgorithmIdentifier = exports.HTTPMethod = exports.FormFieldAdminPolicy = exports.PublicKeyCredentialType = exports.SAMLv2DestinationAssertionPolicy = exports.CoseKeyType = exports.BreachMatchMode = exports.FormControl = exports.ContentStatus = exports.MessageType = exports.IPAccessControlEntryAction = exports.AuthenticatorAttachmentPreference = exports.XMLSignatureLocation = exports.TokenType = exports.ProofKeyForCodeExchangePolicy = exports.ReactorFeatureStatus = exports.OAuthApplicationRelationship = exports.GrantType = exports.UserState = exports.ApplicationMultiFactorTrustPolicy = exports.ConsentStatus = exports.BreachedPasswordStatus = exports.FormDataType = exports.FusionAuthClient = void 0;
|
|
19
19
|
const DefaultRESTClientBuilder_1 = require("./DefaultRESTClientBuilder");
|
|
20
20
|
const url_1 = require("url");
|
|
21
21
|
class FusionAuthClient {
|
|
@@ -235,7 +235,7 @@ class FusionAuthClient {
|
|
|
235
235
|
* Adds a comment to the user's account.
|
|
236
236
|
*
|
|
237
237
|
* @param {UserCommentRequest} request The request object that contains all the information used to create the user comment.
|
|
238
|
-
* @returns {Promise<ClientResponse<
|
|
238
|
+
* @returns {Promise<ClientResponse<UserCommentResponse>>}
|
|
239
239
|
*/
|
|
240
240
|
commentOnUser(request) {
|
|
241
241
|
return this.start()
|
|
@@ -594,6 +594,25 @@ class FusionAuthClient {
|
|
|
594
594
|
.withMethod("POST")
|
|
595
595
|
.go();
|
|
596
596
|
}
|
|
597
|
+
/**
|
|
598
|
+
* Creates a new custom OAuth scope for an application. You must specify the Id of the application you are creating the scope for.
|
|
599
|
+
* You can optionally specify an Id for the OAuth scope on the URL, if not provided one will be generated.
|
|
600
|
+
*
|
|
601
|
+
* @param {UUID} applicationId The Id of the application to create the OAuth scope on.
|
|
602
|
+
* @param {UUID} scopeId (Optional) The Id of the OAuth scope. If not provided a secure random UUID will be generated.
|
|
603
|
+
* @param {ApplicationOAuthScopeRequest} request The request object that contains all the information used to create the OAuth OAuth scope.
|
|
604
|
+
* @returns {Promise<ClientResponse<ApplicationOAuthScopeResponse>>}
|
|
605
|
+
*/
|
|
606
|
+
createOAuthScope(applicationId, scopeId, request) {
|
|
607
|
+
return this.start()
|
|
608
|
+
.withUri('/api/application')
|
|
609
|
+
.withUriSegment(applicationId)
|
|
610
|
+
.withUriSegment("scope")
|
|
611
|
+
.withUriSegment(scopeId)
|
|
612
|
+
.withJSONBody(request)
|
|
613
|
+
.withMethod("POST")
|
|
614
|
+
.go();
|
|
615
|
+
}
|
|
597
616
|
/**
|
|
598
617
|
* Creates a tenant. You can optionally specify an Id for the tenant, if not provided one will be generated.
|
|
599
618
|
*
|
|
@@ -830,7 +849,7 @@ class FusionAuthClient {
|
|
|
830
849
|
* Hard deletes an application role. This is a dangerous operation and should not be used in most circumstances. This
|
|
831
850
|
* permanently removes the given role from all users that had it.
|
|
832
851
|
*
|
|
833
|
-
* @param {UUID} applicationId The Id of the application to
|
|
852
|
+
* @param {UUID} applicationId The Id of the application that the role belongs to.
|
|
834
853
|
* @param {UUID} roleId The Id of the role to delete.
|
|
835
854
|
* @returns {Promise<ClientResponse<void>>}
|
|
836
855
|
*/
|
|
@@ -1073,6 +1092,23 @@ class FusionAuthClient {
|
|
|
1073
1092
|
.withMethod("DELETE")
|
|
1074
1093
|
.go();
|
|
1075
1094
|
}
|
|
1095
|
+
/**
|
|
1096
|
+
* Hard deletes a custom OAuth scope.
|
|
1097
|
+
* OAuth workflows that are still requesting the deleted OAuth scope may fail depending on the application's unknown scope policy.
|
|
1098
|
+
*
|
|
1099
|
+
* @param {UUID} applicationId The Id of the application that the OAuth scope belongs to.
|
|
1100
|
+
* @param {UUID} scopeId The Id of the OAuth scope to delete.
|
|
1101
|
+
* @returns {Promise<ClientResponse<void>>}
|
|
1102
|
+
*/
|
|
1103
|
+
deleteOAuthScope(applicationId, scopeId) {
|
|
1104
|
+
return this.start()
|
|
1105
|
+
.withUri('/api/application')
|
|
1106
|
+
.withUriSegment(applicationId)
|
|
1107
|
+
.withUriSegment("scope")
|
|
1108
|
+
.withUriSegment(scopeId)
|
|
1109
|
+
.withMethod("DELETE")
|
|
1110
|
+
.go();
|
|
1111
|
+
}
|
|
1076
1112
|
/**
|
|
1077
1113
|
* Deletes the user registration for the given user and application.
|
|
1078
1114
|
*
|
|
@@ -2030,6 +2066,24 @@ class FusionAuthClient {
|
|
|
2030
2066
|
.withMethod("PATCH")
|
|
2031
2067
|
.go();
|
|
2032
2068
|
}
|
|
2069
|
+
/**
|
|
2070
|
+
* Updates, via PATCH, the custom OAuth scope with the given Id for the application.
|
|
2071
|
+
*
|
|
2072
|
+
* @param {UUID} applicationId The Id of the application that the OAuth scope belongs to.
|
|
2073
|
+
* @param {UUID} scopeId The Id of the OAuth scope to update.
|
|
2074
|
+
* @param {ApplicationOAuthScopeRequest} request The request that contains just the new OAuth scope information.
|
|
2075
|
+
* @returns {Promise<ClientResponse<ApplicationOAuthScopeResponse>>}
|
|
2076
|
+
*/
|
|
2077
|
+
patchOAuthScope(applicationId, scopeId, request) {
|
|
2078
|
+
return this.start()
|
|
2079
|
+
.withUri('/api/application')
|
|
2080
|
+
.withUriSegment(applicationId)
|
|
2081
|
+
.withUriSegment("scope")
|
|
2082
|
+
.withUriSegment(scopeId)
|
|
2083
|
+
.withJSONBody(request)
|
|
2084
|
+
.withMethod("PATCH")
|
|
2085
|
+
.go();
|
|
2086
|
+
}
|
|
2033
2087
|
/**
|
|
2034
2088
|
* Updates, via PATCH, the registration for the user with the given Id and the application defined in the request.
|
|
2035
2089
|
*
|
|
@@ -3022,6 +3076,22 @@ class FusionAuthClient {
|
|
|
3022
3076
|
.withMethod("GET")
|
|
3023
3077
|
.go();
|
|
3024
3078
|
}
|
|
3079
|
+
/**
|
|
3080
|
+
* Retrieves a custom OAuth scope.
|
|
3081
|
+
*
|
|
3082
|
+
* @param {UUID} applicationId The Id of the application that the OAuth scope belongs to.
|
|
3083
|
+
* @param {UUID} scopeId The Id of the OAuth scope to retrieve.
|
|
3084
|
+
* @returns {Promise<ClientResponse<ApplicationOAuthScopeResponse>>}
|
|
3085
|
+
*/
|
|
3086
|
+
retrieveOAuthScope(applicationId, scopeId) {
|
|
3087
|
+
return this.start()
|
|
3088
|
+
.withUri('/api/application')
|
|
3089
|
+
.withUriSegment(applicationId)
|
|
3090
|
+
.withUriSegment("scope")
|
|
3091
|
+
.withUriSegment(scopeId)
|
|
3092
|
+
.withMethod("GET")
|
|
3093
|
+
.go();
|
|
3094
|
+
}
|
|
3025
3095
|
/**
|
|
3026
3096
|
* Retrieves the Oauth2 configuration for the application for the given Application Id.
|
|
3027
3097
|
*
|
|
@@ -4641,6 +4711,24 @@ class FusionAuthClient {
|
|
|
4641
4711
|
.withMethod("PUT")
|
|
4642
4712
|
.go();
|
|
4643
4713
|
}
|
|
4714
|
+
/**
|
|
4715
|
+
* Updates the OAuth scope with the given Id for the application.
|
|
4716
|
+
*
|
|
4717
|
+
* @param {UUID} applicationId The Id of the application that the OAuth scope belongs to.
|
|
4718
|
+
* @param {UUID} scopeId The Id of the OAuth scope to update.
|
|
4719
|
+
* @param {ApplicationOAuthScopeRequest} request The request that contains all the new OAuth scope information.
|
|
4720
|
+
* @returns {Promise<ClientResponse<ApplicationOAuthScopeResponse>>}
|
|
4721
|
+
*/
|
|
4722
|
+
updateOAuthScope(applicationId, scopeId, request) {
|
|
4723
|
+
return this.start()
|
|
4724
|
+
.withUri('/api/application')
|
|
4725
|
+
.withUriSegment(applicationId)
|
|
4726
|
+
.withUriSegment("scope")
|
|
4727
|
+
.withUriSegment(scopeId)
|
|
4728
|
+
.withJSONBody(request)
|
|
4729
|
+
.withMethod("PUT")
|
|
4730
|
+
.go();
|
|
4731
|
+
}
|
|
4644
4732
|
/**
|
|
4645
4733
|
* Updates the registration for the user with the given Id and the application defined in the request.
|
|
4646
4734
|
*
|
|
@@ -4953,38 +5041,57 @@ class FusionAuthClient {
|
|
|
4953
5041
|
exports.FusionAuthClient = FusionAuthClient;
|
|
4954
5042
|
exports.default = FusionAuthClient;
|
|
4955
5043
|
/**
|
|
4956
|
-
* @author
|
|
5044
|
+
* @author Daniel DeGroff
|
|
4957
5045
|
*/
|
|
4958
|
-
var
|
|
4959
|
-
(function (
|
|
4960
|
-
|
|
4961
|
-
|
|
4962
|
-
|
|
4963
|
-
|
|
4964
|
-
|
|
4965
|
-
|
|
4966
|
-
|
|
4967
|
-
})(UniqueUsernameStrategy = exports.UniqueUsernameStrategy || (exports.UniqueUsernameStrategy = {}));
|
|
5046
|
+
var FormDataType;
|
|
5047
|
+
(function (FormDataType) {
|
|
5048
|
+
FormDataType["bool"] = "bool";
|
|
5049
|
+
FormDataType["consent"] = "consent";
|
|
5050
|
+
FormDataType["date"] = "date";
|
|
5051
|
+
FormDataType["email"] = "email";
|
|
5052
|
+
FormDataType["number"] = "number";
|
|
5053
|
+
FormDataType["string"] = "string";
|
|
5054
|
+
})(FormDataType = exports.FormDataType || (exports.FormDataType = {}));
|
|
4968
5055
|
/**
|
|
4969
|
-
* @author
|
|
5056
|
+
* @author Daniel DeGroff
|
|
4970
5057
|
*/
|
|
4971
|
-
var
|
|
4972
|
-
(function (
|
|
4973
|
-
|
|
4974
|
-
|
|
4975
|
-
|
|
4976
|
-
|
|
4977
|
-
|
|
4978
|
-
})(
|
|
5058
|
+
var BreachedPasswordStatus;
|
|
5059
|
+
(function (BreachedPasswordStatus) {
|
|
5060
|
+
BreachedPasswordStatus["None"] = "None";
|
|
5061
|
+
BreachedPasswordStatus["ExactMatch"] = "ExactMatch";
|
|
5062
|
+
BreachedPasswordStatus["SubAddressMatch"] = "SubAddressMatch";
|
|
5063
|
+
BreachedPasswordStatus["PasswordOnly"] = "PasswordOnly";
|
|
5064
|
+
BreachedPasswordStatus["CommonPassword"] = "CommonPassword";
|
|
5065
|
+
})(BreachedPasswordStatus = exports.BreachedPasswordStatus || (exports.BreachedPasswordStatus = {}));
|
|
4979
5066
|
/**
|
|
4980
|
-
*
|
|
5067
|
+
* Models a consent.
|
|
5068
|
+
*
|
|
5069
|
+
* @author Daniel DeGroff
|
|
4981
5070
|
*/
|
|
4982
|
-
var
|
|
4983
|
-
(function (
|
|
4984
|
-
|
|
4985
|
-
|
|
4986
|
-
|
|
4987
|
-
|
|
5071
|
+
var ConsentStatus;
|
|
5072
|
+
(function (ConsentStatus) {
|
|
5073
|
+
ConsentStatus["Active"] = "Active";
|
|
5074
|
+
ConsentStatus["Revoked"] = "Revoked";
|
|
5075
|
+
})(ConsentStatus = exports.ConsentStatus || (exports.ConsentStatus = {}));
|
|
5076
|
+
/**
|
|
5077
|
+
* @author Daniel DeGroff
|
|
5078
|
+
*/
|
|
5079
|
+
var ApplicationMultiFactorTrustPolicy;
|
|
5080
|
+
(function (ApplicationMultiFactorTrustPolicy) {
|
|
5081
|
+
ApplicationMultiFactorTrustPolicy["Any"] = "Any";
|
|
5082
|
+
ApplicationMultiFactorTrustPolicy["This"] = "This";
|
|
5083
|
+
ApplicationMultiFactorTrustPolicy["None"] = "None";
|
|
5084
|
+
})(ApplicationMultiFactorTrustPolicy = exports.ApplicationMultiFactorTrustPolicy || (exports.ApplicationMultiFactorTrustPolicy = {}));
|
|
5085
|
+
/**
|
|
5086
|
+
* @author Daniel DeGroff
|
|
5087
|
+
*/
|
|
5088
|
+
var UserState;
|
|
5089
|
+
(function (UserState) {
|
|
5090
|
+
UserState["Authenticated"] = "Authenticated";
|
|
5091
|
+
UserState["AuthenticatedNotRegistered"] = "AuthenticatedNotRegistered";
|
|
5092
|
+
UserState["AuthenticatedNotVerified"] = "AuthenticatedNotVerified";
|
|
5093
|
+
UserState["AuthenticatedRegistrationNotVerified"] = "AuthenticatedRegistrationNotVerified";
|
|
5094
|
+
})(UserState = exports.UserState || (exports.UserState = {}));
|
|
4988
5095
|
/**
|
|
4989
5096
|
* Authorization Grant types as defined by the <a href="https://tools.ietf.org/html/rfc6749">The OAuth 2.0 Authorization
|
|
4990
5097
|
* Framework - RFC 6749</a>.
|
|
@@ -5004,6 +5111,37 @@ var GrantType;
|
|
|
5004
5111
|
GrantType["unknown"] = "unknown";
|
|
5005
5112
|
GrantType["device_code"] = "urn:ietf:params:oauth:grant-type:device_code";
|
|
5006
5113
|
})(GrantType = exports.GrantType || (exports.GrantType = {}));
|
|
5114
|
+
/**
|
|
5115
|
+
* The application's relationship to the authorization server. First-party applications will be granted implicit permission for requested scopes.
|
|
5116
|
+
* Third-party applications will use the {@link OAuthScopeConsentMode} policy.
|
|
5117
|
+
*
|
|
5118
|
+
* @author Spencer Witt
|
|
5119
|
+
*/
|
|
5120
|
+
var OAuthApplicationRelationship;
|
|
5121
|
+
(function (OAuthApplicationRelationship) {
|
|
5122
|
+
OAuthApplicationRelationship["FirstParty"] = "FirstParty";
|
|
5123
|
+
OAuthApplicationRelationship["ThirdParty"] = "ThirdParty";
|
|
5124
|
+
})(OAuthApplicationRelationship = exports.OAuthApplicationRelationship || (exports.OAuthApplicationRelationship = {}));
|
|
5125
|
+
/**
|
|
5126
|
+
* @author Brian Pontarelli
|
|
5127
|
+
*/
|
|
5128
|
+
var ReactorFeatureStatus;
|
|
5129
|
+
(function (ReactorFeatureStatus) {
|
|
5130
|
+
ReactorFeatureStatus["ACTIVE"] = "ACTIVE";
|
|
5131
|
+
ReactorFeatureStatus["DISCONNECTED"] = "DISCONNECTED";
|
|
5132
|
+
ReactorFeatureStatus["PENDING"] = "PENDING";
|
|
5133
|
+
ReactorFeatureStatus["DISABLED"] = "DISABLED";
|
|
5134
|
+
ReactorFeatureStatus["UNKNOWN"] = "UNKNOWN";
|
|
5135
|
+
})(ReactorFeatureStatus = exports.ReactorFeatureStatus || (exports.ReactorFeatureStatus = {}));
|
|
5136
|
+
/**
|
|
5137
|
+
* @author Brett Guy
|
|
5138
|
+
*/
|
|
5139
|
+
var ProofKeyForCodeExchangePolicy;
|
|
5140
|
+
(function (ProofKeyForCodeExchangePolicy) {
|
|
5141
|
+
ProofKeyForCodeExchangePolicy["Required"] = "Required";
|
|
5142
|
+
ProofKeyForCodeExchangePolicy["NotRequired"] = "NotRequired";
|
|
5143
|
+
ProofKeyForCodeExchangePolicy["NotRequiredWhenUsingClientAuthentication"] = "NotRequiredWhenUsingClientAuthentication";
|
|
5144
|
+
})(ProofKeyForCodeExchangePolicy = exports.ProofKeyForCodeExchangePolicy || (exports.ProofKeyForCodeExchangePolicy = {}));
|
|
5007
5145
|
/**
|
|
5008
5146
|
* <ul>
|
|
5009
5147
|
* <li>Bearer Token type as defined by <a href="https://tools.ietf.org/html/rfc6750">RFC 6750</a>.</li>
|
|
@@ -5020,37 +5158,48 @@ var TokenType;
|
|
|
5020
5158
|
TokenType["Bearer"] = "Bearer";
|
|
5021
5159
|
TokenType["MAC"] = "MAC";
|
|
5022
5160
|
})(TokenType = exports.TokenType || (exports.TokenType = {}));
|
|
5161
|
+
var XMLSignatureLocation;
|
|
5162
|
+
(function (XMLSignatureLocation) {
|
|
5163
|
+
XMLSignatureLocation["Assertion"] = "Assertion";
|
|
5164
|
+
XMLSignatureLocation["Response"] = "Response";
|
|
5165
|
+
})(XMLSignatureLocation = exports.XMLSignatureLocation || (exports.XMLSignatureLocation = {}));
|
|
5023
5166
|
/**
|
|
5024
|
-
* @
|
|
5167
|
+
* Describes the authenticator attachment modality preference for a WebAuthn workflow. See {@link AuthenticatorAttachment}
|
|
5168
|
+
*
|
|
5169
|
+
* @author Spencer Witt
|
|
5025
5170
|
*/
|
|
5026
|
-
var
|
|
5027
|
-
(function (
|
|
5028
|
-
|
|
5029
|
-
|
|
5030
|
-
|
|
5031
|
-
|
|
5032
|
-
HTTPMethod["HEAD"] = "HEAD";
|
|
5033
|
-
HTTPMethod["OPTIONS"] = "OPTIONS";
|
|
5034
|
-
HTTPMethod["PATCH"] = "PATCH";
|
|
5035
|
-
})(HTTPMethod = exports.HTTPMethod || (exports.HTTPMethod = {}));
|
|
5171
|
+
var AuthenticatorAttachmentPreference;
|
|
5172
|
+
(function (AuthenticatorAttachmentPreference) {
|
|
5173
|
+
AuthenticatorAttachmentPreference["any"] = "any";
|
|
5174
|
+
AuthenticatorAttachmentPreference["platform"] = "platform";
|
|
5175
|
+
AuthenticatorAttachmentPreference["crossPlatform"] = "crossPlatform";
|
|
5176
|
+
})(AuthenticatorAttachmentPreference = exports.AuthenticatorAttachmentPreference || (exports.AuthenticatorAttachmentPreference = {}));
|
|
5036
5177
|
/**
|
|
5037
|
-
* @author
|
|
5178
|
+
* @author Brett Guy
|
|
5038
5179
|
*/
|
|
5039
|
-
var
|
|
5040
|
-
(function (
|
|
5041
|
-
|
|
5042
|
-
|
|
5043
|
-
})(
|
|
5180
|
+
var IPAccessControlEntryAction;
|
|
5181
|
+
(function (IPAccessControlEntryAction) {
|
|
5182
|
+
IPAccessControlEntryAction["Allow"] = "Allow";
|
|
5183
|
+
IPAccessControlEntryAction["Block"] = "Block";
|
|
5184
|
+
})(IPAccessControlEntryAction = exports.IPAccessControlEntryAction || (exports.IPAccessControlEntryAction = {}));
|
|
5044
5185
|
/**
|
|
5045
|
-
* @author
|
|
5186
|
+
* @author Mikey Sleevi
|
|
5046
5187
|
*/
|
|
5047
|
-
var
|
|
5048
|
-
(function (
|
|
5049
|
-
|
|
5050
|
-
|
|
5051
|
-
|
|
5052
|
-
|
|
5053
|
-
|
|
5188
|
+
var MessageType;
|
|
5189
|
+
(function (MessageType) {
|
|
5190
|
+
MessageType["SMS"] = "SMS";
|
|
5191
|
+
})(MessageType = exports.MessageType || (exports.MessageType = {}));
|
|
5192
|
+
/**
|
|
5193
|
+
* Status for content like usernames, profile attributes, etc.
|
|
5194
|
+
*
|
|
5195
|
+
* @author Brian Pontarelli
|
|
5196
|
+
*/
|
|
5197
|
+
var ContentStatus;
|
|
5198
|
+
(function (ContentStatus) {
|
|
5199
|
+
ContentStatus["ACTIVE"] = "ACTIVE";
|
|
5200
|
+
ContentStatus["PENDING"] = "PENDING";
|
|
5201
|
+
ContentStatus["REJECTED"] = "REJECTED";
|
|
5202
|
+
})(ContentStatus = exports.ContentStatus || (exports.ContentStatus = {}));
|
|
5054
5203
|
/**
|
|
5055
5204
|
* @author Daniel DeGroff
|
|
5056
5205
|
*/
|
|
@@ -5064,17 +5213,6 @@ var FormControl;
|
|
|
5064
5213
|
FormControl["textarea"] = "textarea";
|
|
5065
5214
|
FormControl["text"] = "text";
|
|
5066
5215
|
})(FormControl = exports.FormControl || (exports.FormControl = {}));
|
|
5067
|
-
/**
|
|
5068
|
-
* The types of connectors. This enum is stored as an ordinal on the <code>identities</code> table, order must be maintained.
|
|
5069
|
-
*
|
|
5070
|
-
* @author Trevor Smith
|
|
5071
|
-
*/
|
|
5072
|
-
var ConnectorType;
|
|
5073
|
-
(function (ConnectorType) {
|
|
5074
|
-
ConnectorType["FusionAuth"] = "FusionAuth";
|
|
5075
|
-
ConnectorType["Generic"] = "Generic";
|
|
5076
|
-
ConnectorType["LDAP"] = "LDAP";
|
|
5077
|
-
})(ConnectorType = exports.ConnectorType || (exports.ConnectorType = {}));
|
|
5078
5216
|
var BreachMatchMode;
|
|
5079
5217
|
(function (BreachMatchMode) {
|
|
5080
5218
|
BreachMatchMode["Low"] = "Low";
|
|
@@ -5082,48 +5220,157 @@ var BreachMatchMode;
|
|
|
5082
5220
|
BreachMatchMode["High"] = "High";
|
|
5083
5221
|
})(BreachMatchMode = exports.BreachMatchMode || (exports.BreachMatchMode = {}));
|
|
5084
5222
|
/**
|
|
5085
|
-
*
|
|
5223
|
+
* COSE key type
|
|
5224
|
+
*
|
|
5225
|
+
* @author Spencer Witt
|
|
5086
5226
|
*/
|
|
5087
|
-
var
|
|
5088
|
-
(function (
|
|
5089
|
-
|
|
5090
|
-
|
|
5091
|
-
|
|
5092
|
-
|
|
5227
|
+
var CoseKeyType;
|
|
5228
|
+
(function (CoseKeyType) {
|
|
5229
|
+
CoseKeyType["Reserved"] = "0";
|
|
5230
|
+
CoseKeyType["OKP"] = "1";
|
|
5231
|
+
CoseKeyType["EC2"] = "2";
|
|
5232
|
+
CoseKeyType["RSA"] = "3";
|
|
5233
|
+
CoseKeyType["Symmetric"] = "4";
|
|
5234
|
+
})(CoseKeyType = exports.CoseKeyType || (exports.CoseKeyType = {}));
|
|
5093
5235
|
/**
|
|
5094
|
-
* @author
|
|
5236
|
+
* @author Lyle Schemmerling
|
|
5095
5237
|
*/
|
|
5096
|
-
var
|
|
5097
|
-
(function (
|
|
5098
|
-
|
|
5099
|
-
|
|
5100
|
-
|
|
5101
|
-
(
|
|
5102
|
-
|
|
5103
|
-
|
|
5104
|
-
|
|
5105
|
-
|
|
5106
|
-
/**
|
|
5107
|
-
* The transaction types for Webhooks and other event systems within FusionAuth.
|
|
5108
|
-
*
|
|
5109
|
-
* @author Brian Pontarelli
|
|
5238
|
+
var SAMLv2DestinationAssertionPolicy;
|
|
5239
|
+
(function (SAMLv2DestinationAssertionPolicy) {
|
|
5240
|
+
SAMLv2DestinationAssertionPolicy["Enabled"] = "Enabled";
|
|
5241
|
+
SAMLv2DestinationAssertionPolicy["Disabled"] = "Disabled";
|
|
5242
|
+
SAMLv2DestinationAssertionPolicy["AllowAlternates"] = "AllowAlternates";
|
|
5243
|
+
})(SAMLv2DestinationAssertionPolicy = exports.SAMLv2DestinationAssertionPolicy || (exports.SAMLv2DestinationAssertionPolicy = {}));
|
|
5244
|
+
/**
|
|
5245
|
+
* Defines valid credential types. This is an extension point in the WebAuthn spec. The only defined value at this time is "public-key"
|
|
5246
|
+
*
|
|
5247
|
+
* @author Spencer Witt
|
|
5110
5248
|
*/
|
|
5111
|
-
var
|
|
5112
|
-
(function (
|
|
5113
|
-
|
|
5114
|
-
|
|
5115
|
-
TransactionType["SimpleMajority"] = "SimpleMajority";
|
|
5116
|
-
TransactionType["SuperMajority"] = "SuperMajority";
|
|
5117
|
-
TransactionType["AbsoluteMajority"] = "AbsoluteMajority";
|
|
5118
|
-
})(TransactionType = exports.TransactionType || (exports.TransactionType = {}));
|
|
5249
|
+
var PublicKeyCredentialType;
|
|
5250
|
+
(function (PublicKeyCredentialType) {
|
|
5251
|
+
PublicKeyCredentialType["publicKey"] = "public-key";
|
|
5252
|
+
})(PublicKeyCredentialType = exports.PublicKeyCredentialType || (exports.PublicKeyCredentialType = {}));
|
|
5119
5253
|
/**
|
|
5120
5254
|
* @author Daniel DeGroff
|
|
5121
5255
|
*/
|
|
5122
|
-
var
|
|
5123
|
-
(function (
|
|
5124
|
-
|
|
5125
|
-
|
|
5126
|
-
})(
|
|
5256
|
+
var FormFieldAdminPolicy;
|
|
5257
|
+
(function (FormFieldAdminPolicy) {
|
|
5258
|
+
FormFieldAdminPolicy["Edit"] = "Edit";
|
|
5259
|
+
FormFieldAdminPolicy["View"] = "View";
|
|
5260
|
+
})(FormFieldAdminPolicy = exports.FormFieldAdminPolicy || (exports.FormFieldAdminPolicy = {}));
|
|
5261
|
+
/**
|
|
5262
|
+
* @author Daniel DeGroff
|
|
5263
|
+
*/
|
|
5264
|
+
var HTTPMethod;
|
|
5265
|
+
(function (HTTPMethod) {
|
|
5266
|
+
HTTPMethod["GET"] = "GET";
|
|
5267
|
+
HTTPMethod["POST"] = "POST";
|
|
5268
|
+
HTTPMethod["PUT"] = "PUT";
|
|
5269
|
+
HTTPMethod["DELETE"] = "DELETE";
|
|
5270
|
+
HTTPMethod["HEAD"] = "HEAD";
|
|
5271
|
+
HTTPMethod["OPTIONS"] = "OPTIONS";
|
|
5272
|
+
HTTPMethod["PATCH"] = "PATCH";
|
|
5273
|
+
})(HTTPMethod = exports.HTTPMethod || (exports.HTTPMethod = {}));
|
|
5274
|
+
/**
|
|
5275
|
+
* A number identifying a cryptographic algorithm. Values should be registered with the <a
|
|
5276
|
+
* href="https://www.iana.org/assignments/cose/cose.xhtml#algorithms">IANA COSE Algorithms registry</a>
|
|
5277
|
+
*
|
|
5278
|
+
* @author Spencer Witt
|
|
5279
|
+
*/
|
|
5280
|
+
var CoseAlgorithmIdentifier;
|
|
5281
|
+
(function (CoseAlgorithmIdentifier) {
|
|
5282
|
+
CoseAlgorithmIdentifier["ES256"] = "SHA256withECDSA";
|
|
5283
|
+
CoseAlgorithmIdentifier["ES384"] = "SHA384withECDSA";
|
|
5284
|
+
CoseAlgorithmIdentifier["ES512"] = "SHA512withECDSA";
|
|
5285
|
+
CoseAlgorithmIdentifier["RS256"] = "SHA256withRSA";
|
|
5286
|
+
CoseAlgorithmIdentifier["RS384"] = "SHA384withRSA";
|
|
5287
|
+
CoseAlgorithmIdentifier["RS512"] = "SHA512withRSA";
|
|
5288
|
+
CoseAlgorithmIdentifier["PS256"] = "SHA-256";
|
|
5289
|
+
CoseAlgorithmIdentifier["PS384"] = "SHA-384";
|
|
5290
|
+
CoseAlgorithmIdentifier["PS512"] = "SHA-512";
|
|
5291
|
+
})(CoseAlgorithmIdentifier = exports.CoseAlgorithmIdentifier || (exports.CoseAlgorithmIdentifier = {}));
|
|
5292
|
+
/**
|
|
5293
|
+
* The types of lambdas that indicate how they are invoked by FusionAuth.
|
|
5294
|
+
*
|
|
5295
|
+
* @author Brian Pontarelli
|
|
5296
|
+
*/
|
|
5297
|
+
var LambdaType;
|
|
5298
|
+
(function (LambdaType) {
|
|
5299
|
+
LambdaType["JWTPopulate"] = "JWTPopulate";
|
|
5300
|
+
LambdaType["OpenIDReconcile"] = "OpenIDReconcile";
|
|
5301
|
+
LambdaType["SAMLv2Reconcile"] = "SAMLv2Reconcile";
|
|
5302
|
+
LambdaType["SAMLv2Populate"] = "SAMLv2Populate";
|
|
5303
|
+
LambdaType["AppleReconcile"] = "AppleReconcile";
|
|
5304
|
+
LambdaType["ExternalJWTReconcile"] = "ExternalJWTReconcile";
|
|
5305
|
+
LambdaType["FacebookReconcile"] = "FacebookReconcile";
|
|
5306
|
+
LambdaType["GoogleReconcile"] = "GoogleReconcile";
|
|
5307
|
+
LambdaType["HYPRReconcile"] = "HYPRReconcile";
|
|
5308
|
+
LambdaType["TwitterReconcile"] = "TwitterReconcile";
|
|
5309
|
+
LambdaType["LDAPConnectorReconcile"] = "LDAPConnectorReconcile";
|
|
5310
|
+
LambdaType["LinkedInReconcile"] = "LinkedInReconcile";
|
|
5311
|
+
LambdaType["EpicGamesReconcile"] = "EpicGamesReconcile";
|
|
5312
|
+
LambdaType["NintendoReconcile"] = "NintendoReconcile";
|
|
5313
|
+
LambdaType["SonyPSNReconcile"] = "SonyPSNReconcile";
|
|
5314
|
+
LambdaType["SteamReconcile"] = "SteamReconcile";
|
|
5315
|
+
LambdaType["TwitchReconcile"] = "TwitchReconcile";
|
|
5316
|
+
LambdaType["XboxReconcile"] = "XboxReconcile";
|
|
5317
|
+
LambdaType["ClientCredentialsJWTPopulate"] = "ClientCredentialsJWTPopulate";
|
|
5318
|
+
LambdaType["SCIMServerGroupRequestConverter"] = "SCIMServerGroupRequestConverter";
|
|
5319
|
+
LambdaType["SCIMServerGroupResponseConverter"] = "SCIMServerGroupResponseConverter";
|
|
5320
|
+
LambdaType["SCIMServerUserRequestConverter"] = "SCIMServerUserRequestConverter";
|
|
5321
|
+
LambdaType["SCIMServerUserResponseConverter"] = "SCIMServerUserResponseConverter";
|
|
5322
|
+
LambdaType["SelfServiceRegistrationValidation"] = "SelfServiceRegistrationValidation";
|
|
5323
|
+
LambdaType["UserInfoPopulate"] = "UserInfoPopulate";
|
|
5324
|
+
})(LambdaType = exports.LambdaType || (exports.LambdaType = {}));
|
|
5325
|
+
/**
|
|
5326
|
+
* Used to communicate whether and how authenticator attestation should be delivered to the Relying Party
|
|
5327
|
+
*
|
|
5328
|
+
* @author Spencer Witt
|
|
5329
|
+
*/
|
|
5330
|
+
var AttestationConveyancePreference;
|
|
5331
|
+
(function (AttestationConveyancePreference) {
|
|
5332
|
+
AttestationConveyancePreference["none"] = "none";
|
|
5333
|
+
AttestationConveyancePreference["indirect"] = "indirect";
|
|
5334
|
+
AttestationConveyancePreference["direct"] = "direct";
|
|
5335
|
+
AttestationConveyancePreference["enterprise"] = "enterprise";
|
|
5336
|
+
})(AttestationConveyancePreference = exports.AttestationConveyancePreference || (exports.AttestationConveyancePreference = {}));
|
|
5337
|
+
/**
|
|
5338
|
+
* @author Daniel DeGroff
|
|
5339
|
+
*/
|
|
5340
|
+
var ObjectState;
|
|
5341
|
+
(function (ObjectState) {
|
|
5342
|
+
ObjectState["Active"] = "Active";
|
|
5343
|
+
ObjectState["Inactive"] = "Inactive";
|
|
5344
|
+
ObjectState["PendingDelete"] = "PendingDelete";
|
|
5345
|
+
})(ObjectState = exports.ObjectState || (exports.ObjectState = {}));
|
|
5346
|
+
/**
|
|
5347
|
+
* @author Brett Pontarelli
|
|
5348
|
+
*/
|
|
5349
|
+
var AuthenticationThreats;
|
|
5350
|
+
(function (AuthenticationThreats) {
|
|
5351
|
+
AuthenticationThreats["ImpossibleTravel"] = "ImpossibleTravel";
|
|
5352
|
+
})(AuthenticationThreats = exports.AuthenticationThreats || (exports.AuthenticationThreats = {}));
|
|
5353
|
+
/**
|
|
5354
|
+
* Describes the Relying Party's requirements for <a href="https://www.w3.org/TR/webauthn-2/#client-side-discoverable-credential">client-side
|
|
5355
|
+
* discoverable credentials</a> (formerly known as "resident keys")
|
|
5356
|
+
*
|
|
5357
|
+
* @author Spencer Witt
|
|
5358
|
+
*/
|
|
5359
|
+
var ResidentKeyRequirement;
|
|
5360
|
+
(function (ResidentKeyRequirement) {
|
|
5361
|
+
ResidentKeyRequirement["discouraged"] = "discouraged";
|
|
5362
|
+
ResidentKeyRequirement["preferred"] = "preferred";
|
|
5363
|
+
ResidentKeyRequirement["required"] = "required";
|
|
5364
|
+
})(ResidentKeyRequirement = exports.ResidentKeyRequirement || (exports.ResidentKeyRequirement = {}));
|
|
5365
|
+
/**
|
|
5366
|
+
* @author Brett Guy
|
|
5367
|
+
*/
|
|
5368
|
+
var ClientAuthenticationPolicy;
|
|
5369
|
+
(function (ClientAuthenticationPolicy) {
|
|
5370
|
+
ClientAuthenticationPolicy["Required"] = "Required";
|
|
5371
|
+
ClientAuthenticationPolicy["NotRequired"] = "NotRequired";
|
|
5372
|
+
ClientAuthenticationPolicy["NotRequiredWhenUsingPKCE"] = "NotRequiredWhenUsingPKCE";
|
|
5373
|
+
})(ClientAuthenticationPolicy = exports.ClientAuthenticationPolicy || (exports.ClientAuthenticationPolicy = {}));
|
|
5127
5374
|
/**
|
|
5128
5375
|
* @author Daniel DeGroff
|
|
5129
5376
|
*/
|
|
@@ -5132,6 +5379,163 @@ var RefreshTokenUsagePolicy;
|
|
|
5132
5379
|
RefreshTokenUsagePolicy["Reusable"] = "Reusable";
|
|
5133
5380
|
RefreshTokenUsagePolicy["OneTimeUse"] = "OneTimeUse";
|
|
5134
5381
|
})(RefreshTokenUsagePolicy = exports.RefreshTokenUsagePolicy || (exports.RefreshTokenUsagePolicy = {}));
|
|
5382
|
+
var DeviceType;
|
|
5383
|
+
(function (DeviceType) {
|
|
5384
|
+
DeviceType["BROWSER"] = "BROWSER";
|
|
5385
|
+
DeviceType["DESKTOP"] = "DESKTOP";
|
|
5386
|
+
DeviceType["LAPTOP"] = "LAPTOP";
|
|
5387
|
+
DeviceType["MOBILE"] = "MOBILE";
|
|
5388
|
+
DeviceType["OTHER"] = "OTHER";
|
|
5389
|
+
DeviceType["SERVER"] = "SERVER";
|
|
5390
|
+
DeviceType["TABLET"] = "TABLET";
|
|
5391
|
+
DeviceType["TV"] = "TV";
|
|
5392
|
+
DeviceType["UNKNOWN"] = "UNKNOWN";
|
|
5393
|
+
})(DeviceType = exports.DeviceType || (exports.DeviceType = {}));
|
|
5394
|
+
/**
|
|
5395
|
+
* @author Brett Pontarelli
|
|
5396
|
+
*/
|
|
5397
|
+
var CaptchaMethod;
|
|
5398
|
+
(function (CaptchaMethod) {
|
|
5399
|
+
CaptchaMethod["GoogleRecaptchaV2"] = "GoogleRecaptchaV2";
|
|
5400
|
+
CaptchaMethod["GoogleRecaptchaV3"] = "GoogleRecaptchaV3";
|
|
5401
|
+
CaptchaMethod["HCaptcha"] = "HCaptcha";
|
|
5402
|
+
CaptchaMethod["HCaptchaEnterprise"] = "HCaptchaEnterprise";
|
|
5403
|
+
})(CaptchaMethod = exports.CaptchaMethod || (exports.CaptchaMethod = {}));
|
|
5404
|
+
var KeyAlgorithm;
|
|
5405
|
+
(function (KeyAlgorithm) {
|
|
5406
|
+
KeyAlgorithm["ES256"] = "ES256";
|
|
5407
|
+
KeyAlgorithm["ES384"] = "ES384";
|
|
5408
|
+
KeyAlgorithm["ES512"] = "ES512";
|
|
5409
|
+
KeyAlgorithm["HS256"] = "HS256";
|
|
5410
|
+
KeyAlgorithm["HS384"] = "HS384";
|
|
5411
|
+
KeyAlgorithm["HS512"] = "HS512";
|
|
5412
|
+
KeyAlgorithm["RS256"] = "RS256";
|
|
5413
|
+
KeyAlgorithm["RS384"] = "RS384";
|
|
5414
|
+
KeyAlgorithm["RS512"] = "RS512";
|
|
5415
|
+
})(KeyAlgorithm = exports.KeyAlgorithm || (exports.KeyAlgorithm = {}));
|
|
5416
|
+
/**
|
|
5417
|
+
* @author Daniel DeGroff
|
|
5418
|
+
*/
|
|
5419
|
+
var FormType;
|
|
5420
|
+
(function (FormType) {
|
|
5421
|
+
FormType["registration"] = "registration";
|
|
5422
|
+
FormType["adminRegistration"] = "adminRegistration";
|
|
5423
|
+
FormType["adminUser"] = "adminUser";
|
|
5424
|
+
FormType["selfServiceUser"] = "selfServiceUser";
|
|
5425
|
+
})(FormType = exports.FormType || (exports.FormType = {}));
|
|
5426
|
+
/**
|
|
5427
|
+
* Used to indicate what type of attestation was included in the authenticator response for a given WebAuthn credential at the time it was created
|
|
5428
|
+
*
|
|
5429
|
+
* @author Spencer Witt
|
|
5430
|
+
*/
|
|
5431
|
+
var AttestationType;
|
|
5432
|
+
(function (AttestationType) {
|
|
5433
|
+
AttestationType["basic"] = "basic";
|
|
5434
|
+
AttestationType["self"] = "self";
|
|
5435
|
+
AttestationType["attestationCa"] = "attestationCa";
|
|
5436
|
+
AttestationType["anonymizationCa"] = "anonymizationCa";
|
|
5437
|
+
AttestationType["none"] = "none";
|
|
5438
|
+
})(AttestationType = exports.AttestationType || (exports.AttestationType = {}));
|
|
5439
|
+
var KeyType;
|
|
5440
|
+
(function (KeyType) {
|
|
5441
|
+
KeyType["EC"] = "EC";
|
|
5442
|
+
KeyType["RSA"] = "RSA";
|
|
5443
|
+
KeyType["HMAC"] = "HMAC";
|
|
5444
|
+
})(KeyType = exports.KeyType || (exports.KeyType = {}));
|
|
5445
|
+
/**
|
|
5446
|
+
* The types of connectors. This enum is stored as an ordinal on the <code>identities</code> table, order must be maintained.
|
|
5447
|
+
*
|
|
5448
|
+
* @author Trevor Smith
|
|
5449
|
+
*/
|
|
5450
|
+
var ConnectorType;
|
|
5451
|
+
(function (ConnectorType) {
|
|
5452
|
+
ConnectorType["FusionAuth"] = "FusionAuth";
|
|
5453
|
+
ConnectorType["Generic"] = "Generic";
|
|
5454
|
+
ConnectorType["LDAP"] = "LDAP";
|
|
5455
|
+
})(ConnectorType = exports.ConnectorType || (exports.ConnectorType = {}));
|
|
5456
|
+
/**
|
|
5457
|
+
* @author Daniel DeGroff
|
|
5458
|
+
*/
|
|
5459
|
+
var MultiFactorLoginPolicy;
|
|
5460
|
+
(function (MultiFactorLoginPolicy) {
|
|
5461
|
+
MultiFactorLoginPolicy["Disabled"] = "Disabled";
|
|
5462
|
+
MultiFactorLoginPolicy["Enabled"] = "Enabled";
|
|
5463
|
+
MultiFactorLoginPolicy["Required"] = "Required";
|
|
5464
|
+
})(MultiFactorLoginPolicy = exports.MultiFactorLoginPolicy || (exports.MultiFactorLoginPolicy = {}));
|
|
5465
|
+
/**
|
|
5466
|
+
* Describes the <a href="https://www.w3.org/TR/webauthn-2/#authenticator-attachment-modality">authenticator attachment modality</a>.
|
|
5467
|
+
*
|
|
5468
|
+
* @author Spencer Witt
|
|
5469
|
+
*/
|
|
5470
|
+
var AuthenticatorAttachment;
|
|
5471
|
+
(function (AuthenticatorAttachment) {
|
|
5472
|
+
AuthenticatorAttachment["platform"] = "platform";
|
|
5473
|
+
AuthenticatorAttachment["crossPlatform"] = "crossPlatform";
|
|
5474
|
+
})(AuthenticatorAttachment = exports.AuthenticatorAttachment || (exports.AuthenticatorAttachment = {}));
|
|
5475
|
+
/**
|
|
5476
|
+
* COSE Elliptic Curve identifier to determine which elliptic curve to use with a given key
|
|
5477
|
+
*
|
|
5478
|
+
* @author Spencer Witt
|
|
5479
|
+
*/
|
|
5480
|
+
var CoseEllipticCurve;
|
|
5481
|
+
(function (CoseEllipticCurve) {
|
|
5482
|
+
CoseEllipticCurve["Reserved"] = "Reserved";
|
|
5483
|
+
CoseEllipticCurve["P256"] = "P256";
|
|
5484
|
+
CoseEllipticCurve["P384"] = "P384";
|
|
5485
|
+
CoseEllipticCurve["P521"] = "P521";
|
|
5486
|
+
CoseEllipticCurve["X25519"] = "X25519";
|
|
5487
|
+
CoseEllipticCurve["X448"] = "X448";
|
|
5488
|
+
CoseEllipticCurve["Ed25519"] = "Ed25519";
|
|
5489
|
+
CoseEllipticCurve["Ed448"] = "Ed448";
|
|
5490
|
+
CoseEllipticCurve["Secp256k1"] = "Secp256k1";
|
|
5491
|
+
})(CoseEllipticCurve = exports.CoseEllipticCurve || (exports.CoseEllipticCurve = {}));
|
|
5492
|
+
var LoginIdType;
|
|
5493
|
+
(function (LoginIdType) {
|
|
5494
|
+
LoginIdType["email"] = "email";
|
|
5495
|
+
LoginIdType["username"] = "username";
|
|
5496
|
+
})(LoginIdType = exports.LoginIdType || (exports.LoginIdType = {}));
|
|
5497
|
+
var RegistrationType;
|
|
5498
|
+
(function (RegistrationType) {
|
|
5499
|
+
RegistrationType["basic"] = "basic";
|
|
5500
|
+
RegistrationType["advanced"] = "advanced";
|
|
5501
|
+
})(RegistrationType = exports.RegistrationType || (exports.RegistrationType = {}));
|
|
5502
|
+
/**
|
|
5503
|
+
* @author Daniel DeGroff
|
|
5504
|
+
*/
|
|
5505
|
+
var RefreshTokenExpirationPolicy;
|
|
5506
|
+
(function (RefreshTokenExpirationPolicy) {
|
|
5507
|
+
RefreshTokenExpirationPolicy["Fixed"] = "Fixed";
|
|
5508
|
+
RefreshTokenExpirationPolicy["SlidingWindow"] = "SlidingWindow";
|
|
5509
|
+
RefreshTokenExpirationPolicy["SlidingWindowWithMaximumLifetime"] = "SlidingWindowWithMaximumLifetime";
|
|
5510
|
+
})(RefreshTokenExpirationPolicy = exports.RefreshTokenExpirationPolicy || (exports.RefreshTokenExpirationPolicy = {}));
|
|
5511
|
+
/**
|
|
5512
|
+
* @author Daniel DeGroff
|
|
5513
|
+
*/
|
|
5514
|
+
var UnverifiedBehavior;
|
|
5515
|
+
(function (UnverifiedBehavior) {
|
|
5516
|
+
UnverifiedBehavior["Allow"] = "Allow";
|
|
5517
|
+
UnverifiedBehavior["Gated"] = "Gated";
|
|
5518
|
+
})(UnverifiedBehavior = exports.UnverifiedBehavior || (exports.UnverifiedBehavior = {}));
|
|
5519
|
+
/**
|
|
5520
|
+
* The phases of a time-based user action.
|
|
5521
|
+
*
|
|
5522
|
+
* @author Brian Pontarelli
|
|
5523
|
+
*/
|
|
5524
|
+
var UserActionPhase;
|
|
5525
|
+
(function (UserActionPhase) {
|
|
5526
|
+
UserActionPhase["start"] = "start";
|
|
5527
|
+
UserActionPhase["modify"] = "modify";
|
|
5528
|
+
UserActionPhase["cancel"] = "cancel";
|
|
5529
|
+
UserActionPhase["end"] = "end";
|
|
5530
|
+
})(UserActionPhase = exports.UserActionPhase || (exports.UserActionPhase = {}));
|
|
5531
|
+
/**
|
|
5532
|
+
* @author Daniel DeGroff
|
|
5533
|
+
*/
|
|
5534
|
+
var LambdaEngineType;
|
|
5535
|
+
(function (LambdaEngineType) {
|
|
5536
|
+
LambdaEngineType["GraalJS"] = "GraalJS";
|
|
5537
|
+
LambdaEngineType["Nashorn"] = "Nashorn";
|
|
5538
|
+
})(LambdaEngineType = exports.LambdaEngineType || (exports.LambdaEngineType = {}));
|
|
5135
5539
|
var OAuthErrorType;
|
|
5136
5540
|
(function (OAuthErrorType) {
|
|
5137
5541
|
OAuthErrorType["invalid_request"] = "invalid_request";
|
|
@@ -5143,6 +5547,7 @@ var OAuthErrorType;
|
|
|
5143
5547
|
OAuthErrorType["server_error"] = "server_error";
|
|
5144
5548
|
OAuthErrorType["unsupported_grant_type"] = "unsupported_grant_type";
|
|
5145
5549
|
OAuthErrorType["unsupported_response_type"] = "unsupported_response_type";
|
|
5550
|
+
OAuthErrorType["access_denied"] = "access_denied";
|
|
5146
5551
|
OAuthErrorType["change_password_required"] = "change_password_required";
|
|
5147
5552
|
OAuthErrorType["not_licensed"] = "not_licensed";
|
|
5148
5553
|
OAuthErrorType["two_factor_required"] = "two_factor_required";
|
|
@@ -5150,97 +5555,19 @@ var OAuthErrorType;
|
|
|
5150
5555
|
OAuthErrorType["expired_token"] = "expired_token";
|
|
5151
5556
|
OAuthErrorType["unsupported_token_type"] = "unsupported_token_type";
|
|
5152
5557
|
})(OAuthErrorType = exports.OAuthErrorType || (exports.OAuthErrorType = {}));
|
|
5153
|
-
var DeviceType;
|
|
5154
|
-
(function (DeviceType) {
|
|
5155
|
-
DeviceType["BROWSER"] = "BROWSER";
|
|
5156
|
-
DeviceType["DESKTOP"] = "DESKTOP";
|
|
5157
|
-
DeviceType["LAPTOP"] = "LAPTOP";
|
|
5158
|
-
DeviceType["MOBILE"] = "MOBILE";
|
|
5159
|
-
DeviceType["OTHER"] = "OTHER";
|
|
5160
|
-
DeviceType["SERVER"] = "SERVER";
|
|
5161
|
-
DeviceType["TABLET"] = "TABLET";
|
|
5162
|
-
DeviceType["TV"] = "TV";
|
|
5163
|
-
DeviceType["UNKNOWN"] = "UNKNOWN";
|
|
5164
|
-
})(DeviceType = exports.DeviceType || (exports.DeviceType = {}));
|
|
5165
|
-
/**
|
|
5166
|
-
* @author Daniel DeGroff
|
|
5167
|
-
*/
|
|
5168
|
-
var RateLimitedRequestType;
|
|
5169
|
-
(function (RateLimitedRequestType) {
|
|
5170
|
-
RateLimitedRequestType["FailedLogin"] = "FailedLogin";
|
|
5171
|
-
RateLimitedRequestType["ForgotPassword"] = "ForgotPassword";
|
|
5172
|
-
RateLimitedRequestType["SendEmailVerification"] = "SendEmailVerification";
|
|
5173
|
-
RateLimitedRequestType["SendPasswordless"] = "SendPasswordless";
|
|
5174
|
-
RateLimitedRequestType["SendRegistrationVerification"] = "SendRegistrationVerification";
|
|
5175
|
-
RateLimitedRequestType["SendTwoFactor"] = "SendTwoFactor";
|
|
5176
|
-
})(RateLimitedRequestType = exports.RateLimitedRequestType || (exports.RateLimitedRequestType = {}));
|
|
5177
|
-
/**
|
|
5178
|
-
* The use type of a key.
|
|
5179
|
-
*
|
|
5180
|
-
* @author Daniel DeGroff
|
|
5181
|
-
*/
|
|
5182
|
-
var KeyUse;
|
|
5183
|
-
(function (KeyUse) {
|
|
5184
|
-
KeyUse["SignOnly"] = "SignOnly";
|
|
5185
|
-
KeyUse["SignAndVerify"] = "SignAndVerify";
|
|
5186
|
-
KeyUse["VerifyOnly"] = "VerifyOnly";
|
|
5187
|
-
})(KeyUse = exports.KeyUse || (exports.KeyUse = {}));
|
|
5188
|
-
/**
|
|
5189
|
-
* @author Daniel DeGroff
|
|
5190
|
-
*/
|
|
5191
|
-
var LambdaEngineType;
|
|
5192
|
-
(function (LambdaEngineType) {
|
|
5193
|
-
LambdaEngineType["GraalJS"] = "GraalJS";
|
|
5194
|
-
LambdaEngineType["Nashorn"] = "Nashorn";
|
|
5195
|
-
})(LambdaEngineType = exports.LambdaEngineType || (exports.LambdaEngineType = {}));
|
|
5196
|
-
/**
|
|
5197
|
-
* @author Brett Guy
|
|
5198
|
-
*/
|
|
5199
|
-
var ClientAuthenticationPolicy;
|
|
5200
|
-
(function (ClientAuthenticationPolicy) {
|
|
5201
|
-
ClientAuthenticationPolicy["Required"] = "Required";
|
|
5202
|
-
ClientAuthenticationPolicy["NotRequired"] = "NotRequired";
|
|
5203
|
-
ClientAuthenticationPolicy["NotRequiredWhenUsingPKCE"] = "NotRequiredWhenUsingPKCE";
|
|
5204
|
-
})(ClientAuthenticationPolicy = exports.ClientAuthenticationPolicy || (exports.ClientAuthenticationPolicy = {}));
|
|
5205
|
-
var BreachAction;
|
|
5206
|
-
(function (BreachAction) {
|
|
5207
|
-
BreachAction["Off"] = "Off";
|
|
5208
|
-
BreachAction["RecordOnly"] = "RecordOnly";
|
|
5209
|
-
BreachAction["NotifyUser"] = "NotifyUser";
|
|
5210
|
-
BreachAction["RequireChange"] = "RequireChange";
|
|
5211
|
-
})(BreachAction = exports.BreachAction || (exports.BreachAction = {}));
|
|
5212
|
-
/**
|
|
5213
|
-
* @author Daniel DeGroff
|
|
5214
|
-
*/
|
|
5215
|
-
var FormType;
|
|
5216
|
-
(function (FormType) {
|
|
5217
|
-
FormType["registration"] = "registration";
|
|
5218
|
-
FormType["adminRegistration"] = "adminRegistration";
|
|
5219
|
-
FormType["adminUser"] = "adminUser";
|
|
5220
|
-
FormType["selfServiceUser"] = "selfServiceUser";
|
|
5221
|
-
})(FormType = exports.FormType || (exports.FormType = {}));
|
|
5222
|
-
/**
|
|
5223
|
-
* @author Daniel DeGroff
|
|
5224
|
-
*/
|
|
5225
|
-
var SecureGeneratorType;
|
|
5226
|
-
(function (SecureGeneratorType) {
|
|
5227
|
-
SecureGeneratorType["randomDigits"] = "randomDigits";
|
|
5228
|
-
SecureGeneratorType["randomBytes"] = "randomBytes";
|
|
5229
|
-
SecureGeneratorType["randomAlpha"] = "randomAlpha";
|
|
5230
|
-
SecureGeneratorType["randomAlphaNumeric"] = "randomAlphaNumeric";
|
|
5231
|
-
})(SecureGeneratorType = exports.SecureGeneratorType || (exports.SecureGeneratorType = {}));
|
|
5232
5558
|
/**
|
|
5233
5559
|
* @author Daniel DeGroff
|
|
5234
5560
|
*/
|
|
5235
|
-
var
|
|
5236
|
-
(function (
|
|
5237
|
-
|
|
5238
|
-
|
|
5239
|
-
|
|
5240
|
-
|
|
5241
|
-
|
|
5242
|
-
|
|
5243
|
-
|
|
5561
|
+
var Sort;
|
|
5562
|
+
(function (Sort) {
|
|
5563
|
+
Sort["asc"] = "asc";
|
|
5564
|
+
Sort["desc"] = "desc";
|
|
5565
|
+
})(Sort = exports.Sort || (exports.Sort = {}));
|
|
5566
|
+
var SAMLLogoutBehavior;
|
|
5567
|
+
(function (SAMLLogoutBehavior) {
|
|
5568
|
+
SAMLLogoutBehavior["AllParticipants"] = "AllParticipants";
|
|
5569
|
+
SAMLLogoutBehavior["OnlyOriginator"] = "OnlyOriginator";
|
|
5570
|
+
})(SAMLLogoutBehavior = exports.SAMLLogoutBehavior || (exports.SAMLLogoutBehavior = {}));
|
|
5244
5571
|
/**
|
|
5245
5572
|
* The IdP behavior when no user link has been made yet.
|
|
5246
5573
|
*
|
|
@@ -5257,32 +5584,13 @@ var IdentityProviderLinkingStrategy;
|
|
|
5257
5584
|
IdentityProviderLinkingStrategy["LinkByUsernameForExistingUser"] = "LinkByUsernameForExistingUser";
|
|
5258
5585
|
IdentityProviderLinkingStrategy["Unsupported"] = "Unsupported";
|
|
5259
5586
|
})(IdentityProviderLinkingStrategy = exports.IdentityProviderLinkingStrategy || (exports.IdentityProviderLinkingStrategy = {}));
|
|
5260
|
-
|
|
5261
|
-
|
|
5262
|
-
|
|
5263
|
-
|
|
5264
|
-
|
|
5265
|
-
|
|
5266
|
-
|
|
5267
|
-
})(IPAccessControlEntryAction = exports.IPAccessControlEntryAction || (exports.IPAccessControlEntryAction = {}));
|
|
5268
|
-
/**
|
|
5269
|
-
* The phases of a time-based user action.
|
|
5270
|
-
*
|
|
5271
|
-
* @author Brian Pontarelli
|
|
5272
|
-
*/
|
|
5273
|
-
var UserActionPhase;
|
|
5274
|
-
(function (UserActionPhase) {
|
|
5275
|
-
UserActionPhase["start"] = "start";
|
|
5276
|
-
UserActionPhase["modify"] = "modify";
|
|
5277
|
-
UserActionPhase["cancel"] = "cancel";
|
|
5278
|
-
UserActionPhase["end"] = "end";
|
|
5279
|
-
})(UserActionPhase = exports.UserActionPhase || (exports.UserActionPhase = {}));
|
|
5280
|
-
var EmailSecurityType;
|
|
5281
|
-
(function (EmailSecurityType) {
|
|
5282
|
-
EmailSecurityType["NONE"] = "NONE";
|
|
5283
|
-
EmailSecurityType["SSL"] = "SSL";
|
|
5284
|
-
EmailSecurityType["TLS"] = "TLS";
|
|
5285
|
-
})(EmailSecurityType = exports.EmailSecurityType || (exports.EmailSecurityType = {}));
|
|
5587
|
+
var BreachAction;
|
|
5588
|
+
(function (BreachAction) {
|
|
5589
|
+
BreachAction["Off"] = "Off";
|
|
5590
|
+
BreachAction["RecordOnly"] = "RecordOnly";
|
|
5591
|
+
BreachAction["NotifyUser"] = "NotifyUser";
|
|
5592
|
+
BreachAction["RequireChange"] = "RequireChange";
|
|
5593
|
+
})(BreachAction = exports.BreachAction || (exports.BreachAction = {}));
|
|
5286
5594
|
/**
|
|
5287
5595
|
* Event Log Type
|
|
5288
5596
|
*
|
|
@@ -5295,17 +5603,37 @@ var EventLogType;
|
|
|
5295
5603
|
EventLogType["Error"] = "Error";
|
|
5296
5604
|
})(EventLogType = exports.EventLogType || (exports.EventLogType = {}));
|
|
5297
5605
|
/**
|
|
5298
|
-
*
|
|
5606
|
+
* Available JSON Web Algorithms (JWA) as described in RFC 7518 available for this JWT implementation.
|
|
5607
|
+
*
|
|
5608
|
+
* @author Daniel DeGroff
|
|
5299
5609
|
*/
|
|
5300
|
-
var
|
|
5301
|
-
(function (
|
|
5302
|
-
|
|
5303
|
-
|
|
5304
|
-
|
|
5305
|
-
|
|
5306
|
-
|
|
5307
|
-
|
|
5308
|
-
|
|
5610
|
+
var Algorithm;
|
|
5611
|
+
(function (Algorithm) {
|
|
5612
|
+
Algorithm["ES256"] = "ES256";
|
|
5613
|
+
Algorithm["ES384"] = "ES384";
|
|
5614
|
+
Algorithm["ES512"] = "ES512";
|
|
5615
|
+
Algorithm["HS256"] = "HS256";
|
|
5616
|
+
Algorithm["HS384"] = "HS384";
|
|
5617
|
+
Algorithm["HS512"] = "HS512";
|
|
5618
|
+
Algorithm["PS256"] = "PS256";
|
|
5619
|
+
Algorithm["PS384"] = "PS384";
|
|
5620
|
+
Algorithm["PS512"] = "PS512";
|
|
5621
|
+
Algorithm["RS256"] = "RS256";
|
|
5622
|
+
Algorithm["RS384"] = "RS384";
|
|
5623
|
+
Algorithm["RS512"] = "RS512";
|
|
5624
|
+
Algorithm["none"] = "none";
|
|
5625
|
+
})(Algorithm = exports.Algorithm || (exports.Algorithm = {}));
|
|
5626
|
+
/**
|
|
5627
|
+
* The use type of a key.
|
|
5628
|
+
*
|
|
5629
|
+
* @author Daniel DeGroff
|
|
5630
|
+
*/
|
|
5631
|
+
var KeyUse;
|
|
5632
|
+
(function (KeyUse) {
|
|
5633
|
+
KeyUse["SignOnly"] = "SignOnly";
|
|
5634
|
+
KeyUse["SignAndVerify"] = "SignAndVerify";
|
|
5635
|
+
KeyUse["VerifyOnly"] = "VerifyOnly";
|
|
5636
|
+
})(KeyUse = exports.KeyUse || (exports.KeyUse = {}));
|
|
5309
5637
|
var FamilyRole;
|
|
5310
5638
|
(function (FamilyRole) {
|
|
5311
5639
|
FamilyRole["Child"] = "Child";
|
|
@@ -5313,50 +5641,77 @@ var FamilyRole;
|
|
|
5313
5641
|
FamilyRole["Adult"] = "Adult";
|
|
5314
5642
|
})(FamilyRole = exports.FamilyRole || (exports.FamilyRole = {}));
|
|
5315
5643
|
/**
|
|
5316
|
-
*
|
|
5644
|
+
* The transaction types for Webhooks and other event systems within FusionAuth.
|
|
5645
|
+
*
|
|
5646
|
+
* @author Brian Pontarelli
|
|
5317
5647
|
*/
|
|
5318
|
-
var
|
|
5319
|
-
(function (
|
|
5320
|
-
|
|
5321
|
-
|
|
5322
|
-
|
|
5323
|
-
|
|
5324
|
-
|
|
5325
|
-
|
|
5326
|
-
|
|
5327
|
-
|
|
5328
|
-
|
|
5329
|
-
|
|
5330
|
-
|
|
5331
|
-
|
|
5332
|
-
|
|
5333
|
-
|
|
5334
|
-
|
|
5335
|
-
|
|
5336
|
-
|
|
5337
|
-
|
|
5338
|
-
KeyType["RSA"] = "RSA";
|
|
5339
|
-
KeyType["HMAC"] = "HMAC";
|
|
5340
|
-
})(KeyType = exports.KeyType || (exports.KeyType = {}));
|
|
5648
|
+
var TransactionType;
|
|
5649
|
+
(function (TransactionType) {
|
|
5650
|
+
TransactionType["None"] = "None";
|
|
5651
|
+
TransactionType["Any"] = "Any";
|
|
5652
|
+
TransactionType["SimpleMajority"] = "SimpleMajority";
|
|
5653
|
+
TransactionType["SuperMajority"] = "SuperMajority";
|
|
5654
|
+
TransactionType["AbsoluteMajority"] = "AbsoluteMajority";
|
|
5655
|
+
})(TransactionType = exports.TransactionType || (exports.TransactionType = {}));
|
|
5656
|
+
/**
|
|
5657
|
+
* Used to express whether the Relying Party requires <a href="https://www.w3.org/TR/webauthn-2/#user-verification">user verification</a> for the
|
|
5658
|
+
* current operation.
|
|
5659
|
+
*
|
|
5660
|
+
* @author Spencer Witt
|
|
5661
|
+
*/
|
|
5662
|
+
var UserVerificationRequirement;
|
|
5663
|
+
(function (UserVerificationRequirement) {
|
|
5664
|
+
UserVerificationRequirement["required"] = "required";
|
|
5665
|
+
UserVerificationRequirement["preferred"] = "preferred";
|
|
5666
|
+
UserVerificationRequirement["discouraged"] = "discouraged";
|
|
5667
|
+
})(UserVerificationRequirement = exports.UserVerificationRequirement || (exports.UserVerificationRequirement = {}));
|
|
5341
5668
|
/**
|
|
5669
|
+
* Steam API modes.
|
|
5670
|
+
*
|
|
5342
5671
|
* @author Daniel DeGroff
|
|
5343
5672
|
*/
|
|
5344
|
-
var
|
|
5345
|
-
(function (
|
|
5346
|
-
|
|
5347
|
-
|
|
5348
|
-
|
|
5349
|
-
|
|
5673
|
+
var SteamAPIMode;
|
|
5674
|
+
(function (SteamAPIMode) {
|
|
5675
|
+
SteamAPIMode["Public"] = "Public";
|
|
5676
|
+
SteamAPIMode["Partner"] = "Partner";
|
|
5677
|
+
})(SteamAPIMode = exports.SteamAPIMode || (exports.SteamAPIMode = {}));
|
|
5678
|
+
/**
|
|
5679
|
+
* @author Trevor Smith
|
|
5680
|
+
*/
|
|
5681
|
+
var ChangePasswordReason;
|
|
5682
|
+
(function (ChangePasswordReason) {
|
|
5683
|
+
ChangePasswordReason["Administrative"] = "Administrative";
|
|
5684
|
+
ChangePasswordReason["Breached"] = "Breached";
|
|
5685
|
+
ChangePasswordReason["Expired"] = "Expired";
|
|
5686
|
+
ChangePasswordReason["Validation"] = "Validation";
|
|
5687
|
+
})(ChangePasswordReason = exports.ChangePasswordReason || (exports.ChangePasswordReason = {}));
|
|
5688
|
+
var EmailSecurityType;
|
|
5689
|
+
(function (EmailSecurityType) {
|
|
5690
|
+
EmailSecurityType["NONE"] = "NONE";
|
|
5691
|
+
EmailSecurityType["SSL"] = "SSL";
|
|
5692
|
+
EmailSecurityType["TLS"] = "TLS";
|
|
5693
|
+
})(EmailSecurityType = exports.EmailSecurityType || (exports.EmailSecurityType = {}));
|
|
5350
5694
|
/**
|
|
5351
|
-
*
|
|
5352
|
-
*
|
|
5353
|
-
* @author Daniel DeGroff
|
|
5695
|
+
* @author Brian Pontarelli
|
|
5354
5696
|
*/
|
|
5355
|
-
var
|
|
5356
|
-
(function (
|
|
5357
|
-
|
|
5358
|
-
|
|
5359
|
-
|
|
5697
|
+
var ExpiryUnit;
|
|
5698
|
+
(function (ExpiryUnit) {
|
|
5699
|
+
ExpiryUnit["MINUTES"] = "MINUTES";
|
|
5700
|
+
ExpiryUnit["HOURS"] = "HOURS";
|
|
5701
|
+
ExpiryUnit["DAYS"] = "DAYS";
|
|
5702
|
+
ExpiryUnit["WEEKS"] = "WEEKS";
|
|
5703
|
+
ExpiryUnit["MONTHS"] = "MONTHS";
|
|
5704
|
+
ExpiryUnit["YEARS"] = "YEARS";
|
|
5705
|
+
})(ExpiryUnit = exports.ExpiryUnit || (exports.ExpiryUnit = {}));
|
|
5706
|
+
/**
|
|
5707
|
+
* @author Brett Guy
|
|
5708
|
+
*/
|
|
5709
|
+
var MessengerType;
|
|
5710
|
+
(function (MessengerType) {
|
|
5711
|
+
MessengerType["Generic"] = "Generic";
|
|
5712
|
+
MessengerType["Kafka"] = "Kafka";
|
|
5713
|
+
MessengerType["Twilio"] = "Twilio";
|
|
5714
|
+
})(MessengerType = exports.MessengerType || (exports.MessengerType = {}));
|
|
5360
5715
|
/**
|
|
5361
5716
|
* @author Daniel DeGroff
|
|
5362
5717
|
*/
|
|
@@ -5382,50 +5737,11 @@ var IdentityProviderType;
|
|
|
5382
5737
|
/**
|
|
5383
5738
|
* @author Daniel DeGroff
|
|
5384
5739
|
*/
|
|
5385
|
-
var
|
|
5386
|
-
(function (
|
|
5387
|
-
|
|
5388
|
-
|
|
5389
|
-
})(
|
|
5390
|
-
/**
|
|
5391
|
-
* @author Daniel DeGroff
|
|
5392
|
-
*/
|
|
5393
|
-
var BreachedPasswordStatus;
|
|
5394
|
-
(function (BreachedPasswordStatus) {
|
|
5395
|
-
BreachedPasswordStatus["None"] = "None";
|
|
5396
|
-
BreachedPasswordStatus["ExactMatch"] = "ExactMatch";
|
|
5397
|
-
BreachedPasswordStatus["SubAddressMatch"] = "SubAddressMatch";
|
|
5398
|
-
BreachedPasswordStatus["PasswordOnly"] = "PasswordOnly";
|
|
5399
|
-
BreachedPasswordStatus["CommonPassword"] = "CommonPassword";
|
|
5400
|
-
})(BreachedPasswordStatus = exports.BreachedPasswordStatus || (exports.BreachedPasswordStatus = {}));
|
|
5401
|
-
var TOTPAlgorithm;
|
|
5402
|
-
(function (TOTPAlgorithm) {
|
|
5403
|
-
TOTPAlgorithm["HmacSHA1"] = "HmacSHA1";
|
|
5404
|
-
TOTPAlgorithm["HmacSHA256"] = "HmacSHA256";
|
|
5405
|
-
TOTPAlgorithm["HmacSHA512"] = "HmacSHA512";
|
|
5406
|
-
})(TOTPAlgorithm = exports.TOTPAlgorithm || (exports.TOTPAlgorithm = {}));
|
|
5407
|
-
/**
|
|
5408
|
-
* XML canonicalization method enumeration. This is used for the IdP and SP side of FusionAuth SAML.
|
|
5409
|
-
*
|
|
5410
|
-
* @author Brian Pontarelli
|
|
5411
|
-
*/
|
|
5412
|
-
var CanonicalizationMethod;
|
|
5413
|
-
(function (CanonicalizationMethod) {
|
|
5414
|
-
CanonicalizationMethod["exclusive"] = "exclusive";
|
|
5415
|
-
CanonicalizationMethod["exclusive_with_comments"] = "exclusive_with_comments";
|
|
5416
|
-
CanonicalizationMethod["inclusive"] = "inclusive";
|
|
5417
|
-
CanonicalizationMethod["inclusive_with_comments"] = "inclusive_with_comments";
|
|
5418
|
-
})(CanonicalizationMethod = exports.CanonicalizationMethod || (exports.CanonicalizationMethod = {}));
|
|
5419
|
-
/**
|
|
5420
|
-
* @author Trevor Smith
|
|
5421
|
-
*/
|
|
5422
|
-
var ChangePasswordReason;
|
|
5423
|
-
(function (ChangePasswordReason) {
|
|
5424
|
-
ChangePasswordReason["Administrative"] = "Administrative";
|
|
5425
|
-
ChangePasswordReason["Breached"] = "Breached";
|
|
5426
|
-
ChangePasswordReason["Expired"] = "Expired";
|
|
5427
|
-
ChangePasswordReason["Validation"] = "Validation";
|
|
5428
|
-
})(ChangePasswordReason = exports.ChangePasswordReason || (exports.ChangePasswordReason = {}));
|
|
5740
|
+
var SystemTrustedProxyConfigurationPolicy;
|
|
5741
|
+
(function (SystemTrustedProxyConfigurationPolicy) {
|
|
5742
|
+
SystemTrustedProxyConfigurationPolicy["All"] = "All";
|
|
5743
|
+
SystemTrustedProxyConfigurationPolicy["OnlyConfigured"] = "OnlyConfigured";
|
|
5744
|
+
})(SystemTrustedProxyConfigurationPolicy = exports.SystemTrustedProxyConfigurationPolicy || (exports.SystemTrustedProxyConfigurationPolicy = {}));
|
|
5429
5745
|
/**
|
|
5430
5746
|
* Models the event types that FusionAuth produces.
|
|
5431
5747
|
*
|
|
@@ -5453,278 +5769,126 @@ var EventType;
|
|
|
5453
5769
|
EventType["GroupUpdateComplete"] = "group.update.complete";
|
|
5454
5770
|
EventType["UserAction"] = "user.action";
|
|
5455
5771
|
EventType["UserBulkCreate"] = "user.bulk.create";
|
|
5456
|
-
EventType["UserCreate"] = "user.create";
|
|
5457
|
-
EventType["UserCreateComplete"] = "user.create.complete";
|
|
5458
|
-
EventType["UserDeactivate"] = "user.deactivate";
|
|
5459
|
-
EventType["UserDelete"] = "user.delete";
|
|
5460
|
-
EventType["UserDeleteComplete"] = "user.delete.complete";
|
|
5461
|
-
EventType["UserEmailUpdate"] = "user.email.update";
|
|
5462
|
-
EventType["UserEmailVerified"] = "user.email.verified";
|
|
5463
|
-
EventType["UserIdentityProviderLink"] = "user.identity-provider.link";
|
|
5464
|
-
EventType["UserIdentityProviderUnlink"] = "user.identity-provider.unlink";
|
|
5465
|
-
EventType["UserLoginIdDuplicateOnCreate"] = "user.loginId.duplicate.create";
|
|
5466
|
-
EventType["UserLoginIdDuplicateOnUpdate"] = "user.loginId.duplicate.update";
|
|
5467
|
-
EventType["UserLoginFailed"] = "user.login.failed";
|
|
5468
|
-
EventType["UserLoginNewDevice"] = "user.login.new-device";
|
|
5469
|
-
EventType["UserLoginSuccess"] = "user.login.success";
|
|
5470
|
-
EventType["UserLoginSuspicious"] = "user.login.suspicious";
|
|
5471
|
-
EventType["UserPasswordBreach"] = "user.password.breach";
|
|
5472
|
-
EventType["UserPasswordResetSend"] = "user.password.reset.send";
|
|
5473
|
-
EventType["UserPasswordResetStart"] = "user.password.reset.start";
|
|
5474
|
-
EventType["UserPasswordResetSuccess"] = "user.password.reset.success";
|
|
5475
|
-
EventType["UserPasswordUpdate"] = "user.password.update";
|
|
5476
|
-
EventType["UserReactivate"] = "user.reactivate";
|
|
5477
|
-
EventType["UserRegistrationCreate"] = "user.registration.create";
|
|
5478
|
-
EventType["UserRegistrationCreateComplete"] = "user.registration.create.complete";
|
|
5479
|
-
EventType["UserRegistrationDelete"] = "user.registration.delete";
|
|
5480
|
-
EventType["UserRegistrationDeleteComplete"] = "user.registration.delete.complete";
|
|
5481
|
-
EventType["UserRegistrationUpdate"] = "user.registration.update";
|
|
5482
|
-
EventType["UserRegistrationUpdateComplete"] = "user.registration.update.complete";
|
|
5483
|
-
EventType["UserRegistrationVerified"] = "user.registration.verified";
|
|
5484
|
-
EventType["UserTwoFactorMethodAdd"] = "user.two-factor.method.add";
|
|
5485
|
-
EventType["UserTwoFactorMethodRemove"] = "user.two-factor.method.remove";
|
|
5486
|
-
EventType["UserUpdate"] = "user.update";
|
|
5487
|
-
EventType["UserUpdateComplete"] = "user.update.complete";
|
|
5488
|
-
EventType["Test"] = "test";
|
|
5489
|
-
})(EventType = exports.EventType || (exports.EventType = {}));
|
|
5490
|
-
|
|
5491
|
-
|
|
5492
|
-
|
|
5493
|
-
|
|
5494
|
-
|
|
5495
|
-
|
|
5496
|
-
|
|
5497
|
-
|
|
5498
|
-
|
|
5499
|
-
|
|
5500
|
-
|
|
5501
|
-
|
|
5502
|
-
var
|
|
5503
|
-
(function (
|
|
5504
|
-
|
|
5505
|
-
|
|
5506
|
-
|
|
5507
|
-
* @author Daniel DeGroff
|
|
5508
|
-
*/
|
|
5509
|
-
var SystemTrustedProxyConfigurationPolicy;
|
|
5510
|
-
(function (SystemTrustedProxyConfigurationPolicy) {
|
|
5511
|
-
SystemTrustedProxyConfigurationPolicy["All"] = "All";
|
|
5512
|
-
SystemTrustedProxyConfigurationPolicy["OnlyConfigured"] = "OnlyConfigured";
|
|
5513
|
-
})(SystemTrustedProxyConfigurationPolicy = exports.SystemTrustedProxyConfigurationPolicy || (exports.SystemTrustedProxyConfigurationPolicy = {}));
|
|
5514
|
-
var ClientAuthenticationMethod;
|
|
5515
|
-
(function (ClientAuthenticationMethod) {
|
|
5516
|
-
ClientAuthenticationMethod["none"] = "none";
|
|
5517
|
-
ClientAuthenticationMethod["client_secret_basic"] = "client_secret_basic";
|
|
5518
|
-
ClientAuthenticationMethod["client_secret_post"] = "client_secret_post";
|
|
5519
|
-
})(ClientAuthenticationMethod = exports.ClientAuthenticationMethod || (exports.ClientAuthenticationMethod = {}));
|
|
5520
|
-
/**
|
|
5521
|
-
* Models a consent.
|
|
5522
|
-
*
|
|
5523
|
-
* @author Daniel DeGroff
|
|
5524
|
-
*/
|
|
5525
|
-
var ConsentStatus;
|
|
5526
|
-
(function (ConsentStatus) {
|
|
5527
|
-
ConsentStatus["Active"] = "Active";
|
|
5528
|
-
ConsentStatus["Revoked"] = "Revoked";
|
|
5529
|
-
})(ConsentStatus = exports.ConsentStatus || (exports.ConsentStatus = {}));
|
|
5530
|
-
/**
|
|
5531
|
-
* @author Daniel DeGroff
|
|
5532
|
-
*/
|
|
5533
|
-
var ApplicationMultiFactorTrustPolicy;
|
|
5534
|
-
(function (ApplicationMultiFactorTrustPolicy) {
|
|
5535
|
-
ApplicationMultiFactorTrustPolicy["Any"] = "Any";
|
|
5536
|
-
ApplicationMultiFactorTrustPolicy["This"] = "This";
|
|
5537
|
-
ApplicationMultiFactorTrustPolicy["None"] = "None";
|
|
5538
|
-
})(ApplicationMultiFactorTrustPolicy = exports.ApplicationMultiFactorTrustPolicy || (exports.ApplicationMultiFactorTrustPolicy = {}));
|
|
5539
|
-
/**
|
|
5540
|
-
* @author Brett Pontarelli
|
|
5541
|
-
*/
|
|
5542
|
-
var CaptchaMethod;
|
|
5543
|
-
(function (CaptchaMethod) {
|
|
5544
|
-
CaptchaMethod["GoogleRecaptchaV2"] = "GoogleRecaptchaV2";
|
|
5545
|
-
CaptchaMethod["GoogleRecaptchaV3"] = "GoogleRecaptchaV3";
|
|
5546
|
-
CaptchaMethod["HCaptcha"] = "HCaptcha";
|
|
5547
|
-
CaptchaMethod["HCaptchaEnterprise"] = "HCaptchaEnterprise";
|
|
5548
|
-
})(CaptchaMethod = exports.CaptchaMethod || (exports.CaptchaMethod = {}));
|
|
5549
|
-
/**
|
|
5550
|
-
* Available JSON Web Algorithms (JWA) as described in RFC 7518 available for this JWT implementation.
|
|
5551
|
-
*
|
|
5552
|
-
* @author Daniel DeGroff
|
|
5553
|
-
*/
|
|
5554
|
-
var Algorithm;
|
|
5555
|
-
(function (Algorithm) {
|
|
5556
|
-
Algorithm["ES256"] = "ES256";
|
|
5557
|
-
Algorithm["ES384"] = "ES384";
|
|
5558
|
-
Algorithm["ES512"] = "ES512";
|
|
5559
|
-
Algorithm["HS256"] = "HS256";
|
|
5560
|
-
Algorithm["HS384"] = "HS384";
|
|
5561
|
-
Algorithm["HS512"] = "HS512";
|
|
5562
|
-
Algorithm["PS256"] = "PS256";
|
|
5563
|
-
Algorithm["PS384"] = "PS384";
|
|
5564
|
-
Algorithm["PS512"] = "PS512";
|
|
5565
|
-
Algorithm["RS256"] = "RS256";
|
|
5566
|
-
Algorithm["RS384"] = "RS384";
|
|
5567
|
-
Algorithm["RS512"] = "RS512";
|
|
5568
|
-
Algorithm["none"] = "none";
|
|
5569
|
-
})(Algorithm = exports.Algorithm || (exports.Algorithm = {}));
|
|
5570
|
-
/**
|
|
5571
|
-
* Status for content like usernames, profile attributes, etc.
|
|
5572
|
-
*
|
|
5573
|
-
* @author Brian Pontarelli
|
|
5574
|
-
*/
|
|
5575
|
-
var ContentStatus;
|
|
5576
|
-
(function (ContentStatus) {
|
|
5577
|
-
ContentStatus["ACTIVE"] = "ACTIVE";
|
|
5578
|
-
ContentStatus["PENDING"] = "PENDING";
|
|
5579
|
-
ContentStatus["REJECTED"] = "REJECTED";
|
|
5580
|
-
})(ContentStatus = exports.ContentStatus || (exports.ContentStatus = {}));
|
|
5581
|
-
var LoginIdType;
|
|
5582
|
-
(function (LoginIdType) {
|
|
5583
|
-
LoginIdType["email"] = "email";
|
|
5584
|
-
LoginIdType["username"] = "username";
|
|
5585
|
-
})(LoginIdType = exports.LoginIdType || (exports.LoginIdType = {}));
|
|
5586
|
-
var RegistrationType;
|
|
5587
|
-
(function (RegistrationType) {
|
|
5588
|
-
RegistrationType["basic"] = "basic";
|
|
5589
|
-
RegistrationType["advanced"] = "advanced";
|
|
5590
|
-
})(RegistrationType = exports.RegistrationType || (exports.RegistrationType = {}));
|
|
5591
|
-
var SAMLLogoutBehavior;
|
|
5592
|
-
(function (SAMLLogoutBehavior) {
|
|
5593
|
-
SAMLLogoutBehavior["AllParticipants"] = "AllParticipants";
|
|
5594
|
-
SAMLLogoutBehavior["OnlyOriginator"] = "OnlyOriginator";
|
|
5595
|
-
})(SAMLLogoutBehavior = exports.SAMLLogoutBehavior || (exports.SAMLLogoutBehavior = {}));
|
|
5596
|
-
var XMLSignatureLocation;
|
|
5597
|
-
(function (XMLSignatureLocation) {
|
|
5598
|
-
XMLSignatureLocation["Assertion"] = "Assertion";
|
|
5599
|
-
XMLSignatureLocation["Response"] = "Response";
|
|
5600
|
-
})(XMLSignatureLocation = exports.XMLSignatureLocation || (exports.XMLSignatureLocation = {}));
|
|
5601
|
-
/**
|
|
5602
|
-
* Used to communicate whether and how authenticator attestation should be delivered to the Relying Party
|
|
5603
|
-
*
|
|
5604
|
-
* @author Spencer Witt
|
|
5605
|
-
*/
|
|
5606
|
-
var AttestationConveyancePreference;
|
|
5607
|
-
(function (AttestationConveyancePreference) {
|
|
5608
|
-
AttestationConveyancePreference["none"] = "none";
|
|
5609
|
-
AttestationConveyancePreference["indirect"] = "indirect";
|
|
5610
|
-
AttestationConveyancePreference["direct"] = "direct";
|
|
5611
|
-
AttestationConveyancePreference["enterprise"] = "enterprise";
|
|
5612
|
-
})(AttestationConveyancePreference = exports.AttestationConveyancePreference || (exports.AttestationConveyancePreference = {}));
|
|
5613
|
-
/**
|
|
5614
|
-
* Used to indicate what type of attestation was included in the authenticator response for a given WebAuthn credential at the time it was created
|
|
5615
|
-
*
|
|
5616
|
-
* @author Spencer Witt
|
|
5617
|
-
*/
|
|
5618
|
-
var AttestationType;
|
|
5619
|
-
(function (AttestationType) {
|
|
5620
|
-
AttestationType["basic"] = "basic";
|
|
5621
|
-
AttestationType["self"] = "self";
|
|
5622
|
-
AttestationType["attestationCa"] = "attestationCa";
|
|
5623
|
-
AttestationType["anonymizationCa"] = "anonymizationCa";
|
|
5624
|
-
AttestationType["none"] = "none";
|
|
5625
|
-
})(AttestationType = exports.AttestationType || (exports.AttestationType = {}));
|
|
5626
|
-
/**
|
|
5627
|
-
* Describes the <a href="https://www.w3.org/TR/webauthn-2/#authenticator-attachment-modality">authenticator attachment modality</a>.
|
|
5628
|
-
*
|
|
5629
|
-
* @author Spencer Witt
|
|
5630
|
-
*/
|
|
5631
|
-
var AuthenticatorAttachment;
|
|
5632
|
-
(function (AuthenticatorAttachment) {
|
|
5633
|
-
AuthenticatorAttachment["platform"] = "platform";
|
|
5634
|
-
AuthenticatorAttachment["crossPlatform"] = "crossPlatform";
|
|
5635
|
-
})(AuthenticatorAttachment = exports.AuthenticatorAttachment || (exports.AuthenticatorAttachment = {}));
|
|
5772
|
+
EventType["UserCreate"] = "user.create";
|
|
5773
|
+
EventType["UserCreateComplete"] = "user.create.complete";
|
|
5774
|
+
EventType["UserDeactivate"] = "user.deactivate";
|
|
5775
|
+
EventType["UserDelete"] = "user.delete";
|
|
5776
|
+
EventType["UserDeleteComplete"] = "user.delete.complete";
|
|
5777
|
+
EventType["UserEmailUpdate"] = "user.email.update";
|
|
5778
|
+
EventType["UserEmailVerified"] = "user.email.verified";
|
|
5779
|
+
EventType["UserIdentityProviderLink"] = "user.identity-provider.link";
|
|
5780
|
+
EventType["UserIdentityProviderUnlink"] = "user.identity-provider.unlink";
|
|
5781
|
+
EventType["UserLoginIdDuplicateOnCreate"] = "user.loginId.duplicate.create";
|
|
5782
|
+
EventType["UserLoginIdDuplicateOnUpdate"] = "user.loginId.duplicate.update";
|
|
5783
|
+
EventType["UserLoginFailed"] = "user.login.failed";
|
|
5784
|
+
EventType["UserLoginNewDevice"] = "user.login.new-device";
|
|
5785
|
+
EventType["UserLoginSuccess"] = "user.login.success";
|
|
5786
|
+
EventType["UserLoginSuspicious"] = "user.login.suspicious";
|
|
5787
|
+
EventType["UserPasswordBreach"] = "user.password.breach";
|
|
5788
|
+
EventType["UserPasswordResetSend"] = "user.password.reset.send";
|
|
5789
|
+
EventType["UserPasswordResetStart"] = "user.password.reset.start";
|
|
5790
|
+
EventType["UserPasswordResetSuccess"] = "user.password.reset.success";
|
|
5791
|
+
EventType["UserPasswordUpdate"] = "user.password.update";
|
|
5792
|
+
EventType["UserReactivate"] = "user.reactivate";
|
|
5793
|
+
EventType["UserRegistrationCreate"] = "user.registration.create";
|
|
5794
|
+
EventType["UserRegistrationCreateComplete"] = "user.registration.create.complete";
|
|
5795
|
+
EventType["UserRegistrationDelete"] = "user.registration.delete";
|
|
5796
|
+
EventType["UserRegistrationDeleteComplete"] = "user.registration.delete.complete";
|
|
5797
|
+
EventType["UserRegistrationUpdate"] = "user.registration.update";
|
|
5798
|
+
EventType["UserRegistrationUpdateComplete"] = "user.registration.update.complete";
|
|
5799
|
+
EventType["UserRegistrationVerified"] = "user.registration.verified";
|
|
5800
|
+
EventType["UserTwoFactorMethodAdd"] = "user.two-factor.method.add";
|
|
5801
|
+
EventType["UserTwoFactorMethodRemove"] = "user.two-factor.method.remove";
|
|
5802
|
+
EventType["UserUpdate"] = "user.update";
|
|
5803
|
+
EventType["UserUpdateComplete"] = "user.update.complete";
|
|
5804
|
+
EventType["Test"] = "test";
|
|
5805
|
+
})(EventType = exports.EventType || (exports.EventType = {}));
|
|
5806
|
+
var TOTPAlgorithm;
|
|
5807
|
+
(function (TOTPAlgorithm) {
|
|
5808
|
+
TOTPAlgorithm["HmacSHA1"] = "HmacSHA1";
|
|
5809
|
+
TOTPAlgorithm["HmacSHA256"] = "HmacSHA256";
|
|
5810
|
+
TOTPAlgorithm["HmacSHA512"] = "HmacSHA512";
|
|
5811
|
+
})(TOTPAlgorithm = exports.TOTPAlgorithm || (exports.TOTPAlgorithm = {}));
|
|
5812
|
+
var LDAPSecurityMethod;
|
|
5813
|
+
(function (LDAPSecurityMethod) {
|
|
5814
|
+
LDAPSecurityMethod["None"] = "None";
|
|
5815
|
+
LDAPSecurityMethod["LDAPS"] = "LDAPS";
|
|
5816
|
+
LDAPSecurityMethod["StartTLS"] = "StartTLS";
|
|
5817
|
+
})(LDAPSecurityMethod = exports.LDAPSecurityMethod || (exports.LDAPSecurityMethod = {}));
|
|
5818
|
+
var UniqueUsernameStrategy;
|
|
5819
|
+
(function (UniqueUsernameStrategy) {
|
|
5820
|
+
UniqueUsernameStrategy["Always"] = "Always";
|
|
5821
|
+
UniqueUsernameStrategy["OnCollision"] = "OnCollision";
|
|
5822
|
+
})(UniqueUsernameStrategy = exports.UniqueUsernameStrategy || (exports.UniqueUsernameStrategy = {}));
|
|
5636
5823
|
/**
|
|
5637
|
-
*
|
|
5638
|
-
*
|
|
5639
|
-
* @author Spencer Witt
|
|
5824
|
+
* @author Daniel DeGroff
|
|
5640
5825
|
*/
|
|
5641
|
-
var
|
|
5642
|
-
(function (
|
|
5643
|
-
|
|
5644
|
-
|
|
5645
|
-
|
|
5646
|
-
})(AuthenticatorAttachmentPreference = exports.AuthenticatorAttachmentPreference || (exports.AuthenticatorAttachmentPreference = {}));
|
|
5826
|
+
var VerificationStrategy;
|
|
5827
|
+
(function (VerificationStrategy) {
|
|
5828
|
+
VerificationStrategy["ClickableLink"] = "ClickableLink";
|
|
5829
|
+
VerificationStrategy["FormField"] = "FormField";
|
|
5830
|
+
})(VerificationStrategy = exports.VerificationStrategy || (exports.VerificationStrategy = {}));
|
|
5647
5831
|
/**
|
|
5648
|
-
*
|
|
5649
|
-
* href="https://www.iana.org/assignments/cose/cose.xhtml#algorithms">IANA COSE Algorithms registry</a>
|
|
5650
|
-
*
|
|
5651
|
-
* @author Spencer Witt
|
|
5832
|
+
* @author Daniel DeGroff
|
|
5652
5833
|
*/
|
|
5653
|
-
var
|
|
5654
|
-
(function (
|
|
5655
|
-
|
|
5656
|
-
|
|
5657
|
-
|
|
5658
|
-
|
|
5659
|
-
|
|
5660
|
-
CoseAlgorithmIdentifier["RS512"] = "SHA512withRSA";
|
|
5661
|
-
CoseAlgorithmIdentifier["PS256"] = "SHA-256";
|
|
5662
|
-
CoseAlgorithmIdentifier["PS384"] = "SHA-384";
|
|
5663
|
-
CoseAlgorithmIdentifier["PS512"] = "SHA-512";
|
|
5664
|
-
})(CoseAlgorithmIdentifier = exports.CoseAlgorithmIdentifier || (exports.CoseAlgorithmIdentifier = {}));
|
|
5834
|
+
var SecureGeneratorType;
|
|
5835
|
+
(function (SecureGeneratorType) {
|
|
5836
|
+
SecureGeneratorType["randomDigits"] = "randomDigits";
|
|
5837
|
+
SecureGeneratorType["randomBytes"] = "randomBytes";
|
|
5838
|
+
SecureGeneratorType["randomAlpha"] = "randomAlpha";
|
|
5839
|
+
SecureGeneratorType["randomAlphaNumeric"] = "randomAlphaNumeric";
|
|
5840
|
+
})(SecureGeneratorType = exports.SecureGeneratorType || (exports.SecureGeneratorType = {}));
|
|
5665
5841
|
/**
|
|
5666
|
-
*
|
|
5842
|
+
* XML canonicalization method enumeration. This is used for the IdP and SP side of FusionAuth SAML.
|
|
5667
5843
|
*
|
|
5668
|
-
* @author
|
|
5844
|
+
* @author Brian Pontarelli
|
|
5669
5845
|
*/
|
|
5670
|
-
var
|
|
5671
|
-
(function (
|
|
5672
|
-
|
|
5673
|
-
|
|
5674
|
-
|
|
5675
|
-
|
|
5676
|
-
|
|
5677
|
-
CoseEllipticCurve["X448"] = "X448";
|
|
5678
|
-
CoseEllipticCurve["Ed25519"] = "Ed25519";
|
|
5679
|
-
CoseEllipticCurve["Ed448"] = "Ed448";
|
|
5680
|
-
CoseEllipticCurve["Secp256k1"] = "Secp256k1";
|
|
5681
|
-
})(CoseEllipticCurve = exports.CoseEllipticCurve || (exports.CoseEllipticCurve = {}));
|
|
5846
|
+
var CanonicalizationMethod;
|
|
5847
|
+
(function (CanonicalizationMethod) {
|
|
5848
|
+
CanonicalizationMethod["exclusive"] = "exclusive";
|
|
5849
|
+
CanonicalizationMethod["exclusive_with_comments"] = "exclusive_with_comments";
|
|
5850
|
+
CanonicalizationMethod["inclusive"] = "inclusive";
|
|
5851
|
+
CanonicalizationMethod["inclusive_with_comments"] = "inclusive_with_comments";
|
|
5852
|
+
})(CanonicalizationMethod = exports.CanonicalizationMethod || (exports.CanonicalizationMethod = {}));
|
|
5682
5853
|
/**
|
|
5683
|
-
*
|
|
5684
|
-
*
|
|
5685
|
-
* @author Spencer Witt
|
|
5854
|
+
* @author Daniel DeGroff
|
|
5686
5855
|
*/
|
|
5687
|
-
var
|
|
5688
|
-
(function (
|
|
5689
|
-
|
|
5690
|
-
|
|
5691
|
-
|
|
5692
|
-
|
|
5693
|
-
|
|
5694
|
-
|
|
5856
|
+
var RateLimitedRequestType;
|
|
5857
|
+
(function (RateLimitedRequestType) {
|
|
5858
|
+
RateLimitedRequestType["FailedLogin"] = "FailedLogin";
|
|
5859
|
+
RateLimitedRequestType["ForgotPassword"] = "ForgotPassword";
|
|
5860
|
+
RateLimitedRequestType["SendEmailVerification"] = "SendEmailVerification";
|
|
5861
|
+
RateLimitedRequestType["SendPasswordless"] = "SendPasswordless";
|
|
5862
|
+
RateLimitedRequestType["SendRegistrationVerification"] = "SendRegistrationVerification";
|
|
5863
|
+
RateLimitedRequestType["SendTwoFactor"] = "SendTwoFactor";
|
|
5864
|
+
})(RateLimitedRequestType = exports.RateLimitedRequestType || (exports.RateLimitedRequestType = {}));
|
|
5695
5865
|
/**
|
|
5696
|
-
*
|
|
5866
|
+
* Controls the policy for whether OAuth workflows will more strictly adhere to the OAuth and OIDC specification
|
|
5867
|
+
* or run in backwards compatibility mode.
|
|
5697
5868
|
*
|
|
5698
|
-
* @author
|
|
5869
|
+
* @author David Charles
|
|
5699
5870
|
*/
|
|
5700
|
-
var
|
|
5701
|
-
(function (
|
|
5702
|
-
|
|
5703
|
-
|
|
5871
|
+
var OAuthScopeHandlingPolicy;
|
|
5872
|
+
(function (OAuthScopeHandlingPolicy) {
|
|
5873
|
+
OAuthScopeHandlingPolicy["Compatibility"] = "Compatibility";
|
|
5874
|
+
OAuthScopeHandlingPolicy["Strict"] = "Strict";
|
|
5875
|
+
})(OAuthScopeHandlingPolicy = exports.OAuthScopeHandlingPolicy || (exports.OAuthScopeHandlingPolicy = {}));
|
|
5704
5876
|
/**
|
|
5705
|
-
*
|
|
5706
|
-
* discoverable credentials</a> (formerly known as "resident keys")
|
|
5707
|
-
*
|
|
5708
|
-
* @author Spencer Witt
|
|
5877
|
+
* @author Matthew Altman
|
|
5709
5878
|
*/
|
|
5710
|
-
var
|
|
5711
|
-
(function (
|
|
5712
|
-
|
|
5713
|
-
|
|
5714
|
-
|
|
5715
|
-
})(ResidentKeyRequirement = exports.ResidentKeyRequirement || (exports.ResidentKeyRequirement = {}));
|
|
5879
|
+
var LogoutBehavior;
|
|
5880
|
+
(function (LogoutBehavior) {
|
|
5881
|
+
LogoutBehavior["RedirectOnly"] = "RedirectOnly";
|
|
5882
|
+
LogoutBehavior["AllApplications"] = "AllApplications";
|
|
5883
|
+
})(LogoutBehavior = exports.LogoutBehavior || (exports.LogoutBehavior = {}));
|
|
5716
5884
|
/**
|
|
5717
|
-
*
|
|
5718
|
-
* current operation.
|
|
5719
|
-
*
|
|
5720
|
-
* @author Spencer Witt
|
|
5885
|
+
* @author Johnathon Wood
|
|
5721
5886
|
*/
|
|
5722
|
-
var
|
|
5723
|
-
(function (
|
|
5724
|
-
|
|
5725
|
-
|
|
5726
|
-
|
|
5727
|
-
})(UserVerificationRequirement = exports.UserVerificationRequirement || (exports.UserVerificationRequirement = {}));
|
|
5887
|
+
var Oauth2AuthorizedURLValidationPolicy;
|
|
5888
|
+
(function (Oauth2AuthorizedURLValidationPolicy) {
|
|
5889
|
+
Oauth2AuthorizedURLValidationPolicy["AllowWildcards"] = "AllowWildcards";
|
|
5890
|
+
Oauth2AuthorizedURLValidationPolicy["ExactMatch"] = "ExactMatch";
|
|
5891
|
+
})(Oauth2AuthorizedURLValidationPolicy = exports.Oauth2AuthorizedURLValidationPolicy || (exports.Oauth2AuthorizedURLValidationPolicy = {}));
|
|
5728
5892
|
/**
|
|
5729
5893
|
* Identifies the WebAuthn workflow. This will affect the parameters used for credential creation
|
|
5730
5894
|
* and request based on the Tenant configuration.
|
|
@@ -5738,72 +5902,16 @@ var WebAuthnWorkflow;
|
|
|
5738
5902
|
WebAuthnWorkflow["reauthentication"] = "reauthentication";
|
|
5739
5903
|
})(WebAuthnWorkflow = exports.WebAuthnWorkflow || (exports.WebAuthnWorkflow = {}));
|
|
5740
5904
|
/**
|
|
5741
|
-
*
|
|
5742
|
-
*/
|
|
5743
|
-
var MultiFactorLoginPolicy;
|
|
5744
|
-
(function (MultiFactorLoginPolicy) {
|
|
5745
|
-
MultiFactorLoginPolicy["Disabled"] = "Disabled";
|
|
5746
|
-
MultiFactorLoginPolicy["Enabled"] = "Enabled";
|
|
5747
|
-
MultiFactorLoginPolicy["Required"] = "Required";
|
|
5748
|
-
})(MultiFactorLoginPolicy = exports.MultiFactorLoginPolicy || (exports.MultiFactorLoginPolicy = {}));
|
|
5749
|
-
/**
|
|
5750
|
-
* The types of lambdas that indicate how they are invoked by FusionAuth.
|
|
5905
|
+
* Policy for handling unknown OAuth scopes in the request
|
|
5751
5906
|
*
|
|
5752
|
-
* @author
|
|
5753
|
-
*/
|
|
5754
|
-
var LambdaType;
|
|
5755
|
-
(function (LambdaType) {
|
|
5756
|
-
LambdaType["JWTPopulate"] = "JWTPopulate";
|
|
5757
|
-
LambdaType["OpenIDReconcile"] = "OpenIDReconcile";
|
|
5758
|
-
LambdaType["SAMLv2Reconcile"] = "SAMLv2Reconcile";
|
|
5759
|
-
LambdaType["SAMLv2Populate"] = "SAMLv2Populate";
|
|
5760
|
-
LambdaType["AppleReconcile"] = "AppleReconcile";
|
|
5761
|
-
LambdaType["ExternalJWTReconcile"] = "ExternalJWTReconcile";
|
|
5762
|
-
LambdaType["FacebookReconcile"] = "FacebookReconcile";
|
|
5763
|
-
LambdaType["GoogleReconcile"] = "GoogleReconcile";
|
|
5764
|
-
LambdaType["HYPRReconcile"] = "HYPRReconcile";
|
|
5765
|
-
LambdaType["TwitterReconcile"] = "TwitterReconcile";
|
|
5766
|
-
LambdaType["LDAPConnectorReconcile"] = "LDAPConnectorReconcile";
|
|
5767
|
-
LambdaType["LinkedInReconcile"] = "LinkedInReconcile";
|
|
5768
|
-
LambdaType["EpicGamesReconcile"] = "EpicGamesReconcile";
|
|
5769
|
-
LambdaType["NintendoReconcile"] = "NintendoReconcile";
|
|
5770
|
-
LambdaType["SonyPSNReconcile"] = "SonyPSNReconcile";
|
|
5771
|
-
LambdaType["SteamReconcile"] = "SteamReconcile";
|
|
5772
|
-
LambdaType["TwitchReconcile"] = "TwitchReconcile";
|
|
5773
|
-
LambdaType["XboxReconcile"] = "XboxReconcile";
|
|
5774
|
-
LambdaType["ClientCredentialsJWTPopulate"] = "ClientCredentialsJWTPopulate";
|
|
5775
|
-
LambdaType["SCIMServerGroupRequestConverter"] = "SCIMServerGroupRequestConverter";
|
|
5776
|
-
LambdaType["SCIMServerGroupResponseConverter"] = "SCIMServerGroupResponseConverter";
|
|
5777
|
-
LambdaType["SCIMServerUserRequestConverter"] = "SCIMServerUserRequestConverter";
|
|
5778
|
-
LambdaType["SCIMServerUserResponseConverter"] = "SCIMServerUserResponseConverter";
|
|
5779
|
-
LambdaType["SelfServiceRegistrationValidation"] = "SelfServiceRegistrationValidation";
|
|
5780
|
-
})(LambdaType = exports.LambdaType || (exports.LambdaType = {}));
|
|
5781
|
-
/**
|
|
5782
|
-
* @author Lyle Schemmerling
|
|
5783
|
-
*/
|
|
5784
|
-
var SAMLv2DestinationAssertionPolicy;
|
|
5785
|
-
(function (SAMLv2DestinationAssertionPolicy) {
|
|
5786
|
-
SAMLv2DestinationAssertionPolicy["Enabled"] = "Enabled";
|
|
5787
|
-
SAMLv2DestinationAssertionPolicy["Disabled"] = "Disabled";
|
|
5788
|
-
SAMLv2DestinationAssertionPolicy["AllowAlternates"] = "AllowAlternates";
|
|
5789
|
-
})(SAMLv2DestinationAssertionPolicy = exports.SAMLv2DestinationAssertionPolicy || (exports.SAMLv2DestinationAssertionPolicy = {}));
|
|
5790
|
-
/**
|
|
5791
|
-
* @author Johnathon Wood
|
|
5792
|
-
*/
|
|
5793
|
-
var Oauth2AuthorizedURLValidationPolicy;
|
|
5794
|
-
(function (Oauth2AuthorizedURLValidationPolicy) {
|
|
5795
|
-
Oauth2AuthorizedURLValidationPolicy["AllowWildcards"] = "AllowWildcards";
|
|
5796
|
-
Oauth2AuthorizedURLValidationPolicy["ExactMatch"] = "ExactMatch";
|
|
5797
|
-
})(Oauth2AuthorizedURLValidationPolicy = exports.Oauth2AuthorizedURLValidationPolicy || (exports.Oauth2AuthorizedURLValidationPolicy = {}));
|
|
5798
|
-
/**
|
|
5799
|
-
* @author Daniel DeGroff
|
|
5907
|
+
* @author Spencer Witt
|
|
5800
5908
|
*/
|
|
5801
|
-
var
|
|
5802
|
-
(function (
|
|
5803
|
-
|
|
5804
|
-
|
|
5805
|
-
|
|
5806
|
-
})(
|
|
5909
|
+
var UnknownScopePolicy;
|
|
5910
|
+
(function (UnknownScopePolicy) {
|
|
5911
|
+
UnknownScopePolicy["Allow"] = "Allow";
|
|
5912
|
+
UnknownScopePolicy["Remove"] = "Remove";
|
|
5913
|
+
UnknownScopePolicy["Reject"] = "Reject";
|
|
5914
|
+
})(UnknownScopePolicy = exports.UnknownScopePolicy || (exports.UnknownScopePolicy = {}));
|
|
5807
5915
|
var OAuthErrorReason;
|
|
5808
5916
|
(function (OAuthErrorReason) {
|
|
5809
5917
|
OAuthErrorReason["auth_code_not_found"] = "auth_code_not_found";
|
|
@@ -5812,6 +5920,7 @@ var OAuthErrorReason;
|
|
|
5812
5920
|
OAuthErrorReason["access_token_unavailable_for_processing"] = "access_token_unavailable_for_processing";
|
|
5813
5921
|
OAuthErrorReason["access_token_failed_processing"] = "access_token_failed_processing";
|
|
5814
5922
|
OAuthErrorReason["access_token_invalid"] = "access_token_invalid";
|
|
5923
|
+
OAuthErrorReason["access_token_required"] = "access_token_required";
|
|
5815
5924
|
OAuthErrorReason["refresh_token_not_found"] = "refresh_token_not_found";
|
|
5816
5925
|
OAuthErrorReason["refresh_token_type_not_supported"] = "refresh_token_type_not_supported";
|
|
5817
5926
|
OAuthErrorReason["invalid_client_id"] = "invalid_client_id";
|
|
@@ -5863,5 +5972,35 @@ var OAuthErrorReason;
|
|
|
5863
5972
|
OAuthErrorReason["change_password_expired"] = "change_password_expired";
|
|
5864
5973
|
OAuthErrorReason["change_password_validation"] = "change_password_validation";
|
|
5865
5974
|
OAuthErrorReason["unknown"] = "unknown";
|
|
5975
|
+
OAuthErrorReason["missing_required_scope"] = "missing_required_scope";
|
|
5976
|
+
OAuthErrorReason["unknown_scope"] = "unknown_scope";
|
|
5977
|
+
OAuthErrorReason["consent_canceled"] = "consent_canceled";
|
|
5866
5978
|
})(OAuthErrorReason = exports.OAuthErrorReason || (exports.OAuthErrorReason = {}));
|
|
5979
|
+
var ClientAuthenticationMethod;
|
|
5980
|
+
(function (ClientAuthenticationMethod) {
|
|
5981
|
+
ClientAuthenticationMethod["none"] = "none";
|
|
5982
|
+
ClientAuthenticationMethod["client_secret_basic"] = "client_secret_basic";
|
|
5983
|
+
ClientAuthenticationMethod["client_secret_post"] = "client_secret_post";
|
|
5984
|
+
})(ClientAuthenticationMethod = exports.ClientAuthenticationMethod || (exports.ClientAuthenticationMethod = {}));
|
|
5985
|
+
/**
|
|
5986
|
+
* Controls the policy for requesting user permission to grant access to requested scopes during an OAuth workflow
|
|
5987
|
+
* for a third-party application.
|
|
5988
|
+
*
|
|
5989
|
+
* @author Spencer Witt
|
|
5990
|
+
*/
|
|
5991
|
+
var OAuthScopeConsentMode;
|
|
5992
|
+
(function (OAuthScopeConsentMode) {
|
|
5993
|
+
OAuthScopeConsentMode["AlwaysPrompt"] = "AlwaysPrompt";
|
|
5994
|
+
OAuthScopeConsentMode["RememberDecision"] = "RememberDecision";
|
|
5995
|
+
OAuthScopeConsentMode["NeverPrompt"] = "NeverPrompt";
|
|
5996
|
+
})(OAuthScopeConsentMode = exports.OAuthScopeConsentMode || (exports.OAuthScopeConsentMode = {}));
|
|
5997
|
+
/**
|
|
5998
|
+
* @author Brett Pontarelli
|
|
5999
|
+
*/
|
|
6000
|
+
var IdentityProviderLoginMethod;
|
|
6001
|
+
(function (IdentityProviderLoginMethod) {
|
|
6002
|
+
IdentityProviderLoginMethod["UsePopup"] = "UsePopup";
|
|
6003
|
+
IdentityProviderLoginMethod["UseRedirect"] = "UseRedirect";
|
|
6004
|
+
IdentityProviderLoginMethod["UseVendorJavaScript"] = "UseVendorJavaScript";
|
|
6005
|
+
})(IdentityProviderLoginMethod = exports.IdentityProviderLoginMethod || (exports.IdentityProviderLoginMethod = {}));
|
|
5867
6006
|
//# sourceMappingURL=FusionAuthClient.js.map
|