@fusionauth/typescript-client 1.49.1 → 1.51.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +8 -0
- package/build/src/FusionAuthClient.d.ts +3875 -3686
- package/build/src/FusionAuthClient.js +771 -627
- package/build/src/FusionAuthClient.js.map +1 -1
- package/dist/fusionauth-typescript-client.js +772 -628
- package/dist/fusionauth-typescript-client.min.js +1 -1
- package/dist/fusionauth-typescript-client.min.js.map +1 -1
- package/package.json +1 -1
|
@@ -15,7 +15,7 @@
|
|
|
15
15
|
* language governing permissions and limitations under the License.
|
|
16
16
|
*/
|
|
17
17
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
18
|
-
exports.OAuthErrorReason = exports.
|
|
18
|
+
exports.IdentityProviderLoginMethod = exports.OAuthScopeConsentMode = exports.ClientAuthenticationMethod = exports.OAuthErrorReason = exports.UnknownScopePolicy = exports.WebAuthnWorkflow = exports.Oauth2AuthorizedURLValidationPolicy = exports.LogoutBehavior = exports.OAuthScopeHandlingPolicy = exports.RateLimitedRequestType = exports.CanonicalizationMethod = exports.SecureGeneratorType = exports.VerificationStrategy = exports.UniqueUsernameStrategy = exports.LDAPSecurityMethod = exports.TOTPAlgorithm = exports.EventType = exports.SystemTrustedProxyConfigurationPolicy = exports.IdentityProviderType = exports.MessengerType = exports.ExpiryUnit = exports.EmailSecurityType = exports.ChangePasswordReason = exports.SteamAPIMode = exports.UserVerificationRequirement = exports.TransactionType = exports.FamilyRole = exports.KeyUse = exports.Algorithm = exports.EventLogType = exports.BreachAction = exports.IdentityProviderLinkingStrategy = exports.SAMLLogoutBehavior = exports.Sort = exports.OAuthErrorType = exports.LambdaEngineType = exports.UserActionPhase = exports.UnverifiedBehavior = exports.RefreshTokenExpirationPolicy = exports.RegistrationType = exports.LoginIdType = exports.CoseEllipticCurve = exports.AuthenticatorAttachment = exports.MultiFactorLoginPolicy = exports.ConnectorType = exports.KeyType = exports.AttestationType = exports.FormType = exports.KeyAlgorithm = exports.CaptchaMethod = exports.DeviceType = exports.RefreshTokenUsagePolicy = exports.ClientAuthenticationPolicy = exports.ResidentKeyRequirement = exports.AuthenticationThreats = exports.ObjectState = exports.AttestationConveyancePreference = exports.LambdaType = exports.CoseAlgorithmIdentifier = exports.HTTPMethod = exports.FormFieldAdminPolicy = exports.PublicKeyCredentialType = exports.SAMLv2DestinationAssertionPolicy = exports.CoseKeyType = exports.BreachMatchMode = exports.FormControl = exports.ContentStatus = exports.MessageType = exports.IPAccessControlEntryAction = exports.AuthenticatorAttachmentPreference = exports.XMLSignatureLocation = exports.TokenType = exports.ProofKeyForCodeExchangePolicy = exports.ThemeType = exports.ReactorFeatureStatus = exports.OAuthApplicationRelationship = exports.GrantType = exports.UserState = exports.ApplicationMultiFactorTrustPolicy = exports.ConsentStatus = exports.BreachedPasswordStatus = exports.FormDataType = exports.FusionAuthClient = void 0;
|
|
19
19
|
const DefaultRESTClientBuilder_1 = require("./DefaultRESTClientBuilder");
|
|
20
20
|
const url_1 = require("url");
|
|
21
21
|
class FusionAuthClient {
|
|
@@ -235,7 +235,7 @@ class FusionAuthClient {
|
|
|
235
235
|
* Adds a comment to the user's account.
|
|
236
236
|
*
|
|
237
237
|
* @param {UserCommentRequest} request The request object that contains all the information used to create the user comment.
|
|
238
|
-
* @returns {Promise<ClientResponse<
|
|
238
|
+
* @returns {Promise<ClientResponse<UserCommentResponse>>}
|
|
239
239
|
*/
|
|
240
240
|
commentOnUser(request) {
|
|
241
241
|
return this.start()
|
|
@@ -594,6 +594,25 @@ class FusionAuthClient {
|
|
|
594
594
|
.withMethod("POST")
|
|
595
595
|
.go();
|
|
596
596
|
}
|
|
597
|
+
/**
|
|
598
|
+
* Creates a new custom OAuth scope for an application. You must specify the Id of the application you are creating the scope for.
|
|
599
|
+
* You can optionally specify an Id for the OAuth scope on the URL, if not provided one will be generated.
|
|
600
|
+
*
|
|
601
|
+
* @param {UUID} applicationId The Id of the application to create the OAuth scope on.
|
|
602
|
+
* @param {UUID} scopeId (Optional) The Id of the OAuth scope. If not provided a secure random UUID will be generated.
|
|
603
|
+
* @param {ApplicationOAuthScopeRequest} request The request object that contains all the information used to create the OAuth OAuth scope.
|
|
604
|
+
* @returns {Promise<ClientResponse<ApplicationOAuthScopeResponse>>}
|
|
605
|
+
*/
|
|
606
|
+
createOAuthScope(applicationId, scopeId, request) {
|
|
607
|
+
return this.start()
|
|
608
|
+
.withUri('/api/application')
|
|
609
|
+
.withUriSegment(applicationId)
|
|
610
|
+
.withUriSegment("scope")
|
|
611
|
+
.withUriSegment(scopeId)
|
|
612
|
+
.withJSONBody(request)
|
|
613
|
+
.withMethod("POST")
|
|
614
|
+
.go();
|
|
615
|
+
}
|
|
597
616
|
/**
|
|
598
617
|
* Creates a tenant. You can optionally specify an Id for the tenant, if not provided one will be generated.
|
|
599
618
|
*
|
|
@@ -830,7 +849,7 @@ class FusionAuthClient {
|
|
|
830
849
|
* Hard deletes an application role. This is a dangerous operation and should not be used in most circumstances. This
|
|
831
850
|
* permanently removes the given role from all users that had it.
|
|
832
851
|
*
|
|
833
|
-
* @param {UUID} applicationId The Id of the application to
|
|
852
|
+
* @param {UUID} applicationId The Id of the application that the role belongs to.
|
|
834
853
|
* @param {UUID} roleId The Id of the role to delete.
|
|
835
854
|
* @returns {Promise<ClientResponse<void>>}
|
|
836
855
|
*/
|
|
@@ -1073,6 +1092,23 @@ class FusionAuthClient {
|
|
|
1073
1092
|
.withMethod("DELETE")
|
|
1074
1093
|
.go();
|
|
1075
1094
|
}
|
|
1095
|
+
/**
|
|
1096
|
+
* Hard deletes a custom OAuth scope.
|
|
1097
|
+
* OAuth workflows that are still requesting the deleted OAuth scope may fail depending on the application's unknown scope policy.
|
|
1098
|
+
*
|
|
1099
|
+
* @param {UUID} applicationId The Id of the application that the OAuth scope belongs to.
|
|
1100
|
+
* @param {UUID} scopeId The Id of the OAuth scope to delete.
|
|
1101
|
+
* @returns {Promise<ClientResponse<void>>}
|
|
1102
|
+
*/
|
|
1103
|
+
deleteOAuthScope(applicationId, scopeId) {
|
|
1104
|
+
return this.start()
|
|
1105
|
+
.withUri('/api/application')
|
|
1106
|
+
.withUriSegment(applicationId)
|
|
1107
|
+
.withUriSegment("scope")
|
|
1108
|
+
.withUriSegment(scopeId)
|
|
1109
|
+
.withMethod("DELETE")
|
|
1110
|
+
.go();
|
|
1111
|
+
}
|
|
1076
1112
|
/**
|
|
1077
1113
|
* Deletes the user registration for the given user and application.
|
|
1078
1114
|
*
|
|
@@ -2030,6 +2066,24 @@ class FusionAuthClient {
|
|
|
2030
2066
|
.withMethod("PATCH")
|
|
2031
2067
|
.go();
|
|
2032
2068
|
}
|
|
2069
|
+
/**
|
|
2070
|
+
* Updates, via PATCH, the custom OAuth scope with the given Id for the application.
|
|
2071
|
+
*
|
|
2072
|
+
* @param {UUID} applicationId The Id of the application that the OAuth scope belongs to.
|
|
2073
|
+
* @param {UUID} scopeId The Id of the OAuth scope to update.
|
|
2074
|
+
* @param {ApplicationOAuthScopeRequest} request The request that contains just the new OAuth scope information.
|
|
2075
|
+
* @returns {Promise<ClientResponse<ApplicationOAuthScopeResponse>>}
|
|
2076
|
+
*/
|
|
2077
|
+
patchOAuthScope(applicationId, scopeId, request) {
|
|
2078
|
+
return this.start()
|
|
2079
|
+
.withUri('/api/application')
|
|
2080
|
+
.withUriSegment(applicationId)
|
|
2081
|
+
.withUriSegment("scope")
|
|
2082
|
+
.withUriSegment(scopeId)
|
|
2083
|
+
.withJSONBody(request)
|
|
2084
|
+
.withMethod("PATCH")
|
|
2085
|
+
.go();
|
|
2086
|
+
}
|
|
2033
2087
|
/**
|
|
2034
2088
|
* Updates, via PATCH, the registration for the user with the given Id and the application defined in the request.
|
|
2035
2089
|
*
|
|
@@ -3022,6 +3076,22 @@ class FusionAuthClient {
|
|
|
3022
3076
|
.withMethod("GET")
|
|
3023
3077
|
.go();
|
|
3024
3078
|
}
|
|
3079
|
+
/**
|
|
3080
|
+
* Retrieves a custom OAuth scope.
|
|
3081
|
+
*
|
|
3082
|
+
* @param {UUID} applicationId The Id of the application that the OAuth scope belongs to.
|
|
3083
|
+
* @param {UUID} scopeId The Id of the OAuth scope to retrieve.
|
|
3084
|
+
* @returns {Promise<ClientResponse<ApplicationOAuthScopeResponse>>}
|
|
3085
|
+
*/
|
|
3086
|
+
retrieveOAuthScope(applicationId, scopeId) {
|
|
3087
|
+
return this.start()
|
|
3088
|
+
.withUri('/api/application')
|
|
3089
|
+
.withUriSegment(applicationId)
|
|
3090
|
+
.withUriSegment("scope")
|
|
3091
|
+
.withUriSegment(scopeId)
|
|
3092
|
+
.withMethod("GET")
|
|
3093
|
+
.go();
|
|
3094
|
+
}
|
|
3025
3095
|
/**
|
|
3026
3096
|
* Retrieves the Oauth2 configuration for the application for the given Application Id.
|
|
3027
3097
|
*
|
|
@@ -4641,6 +4711,24 @@ class FusionAuthClient {
|
|
|
4641
4711
|
.withMethod("PUT")
|
|
4642
4712
|
.go();
|
|
4643
4713
|
}
|
|
4714
|
+
/**
|
|
4715
|
+
* Updates the OAuth scope with the given Id for the application.
|
|
4716
|
+
*
|
|
4717
|
+
* @param {UUID} applicationId The Id of the application that the OAuth scope belongs to.
|
|
4718
|
+
* @param {UUID} scopeId The Id of the OAuth scope to update.
|
|
4719
|
+
* @param {ApplicationOAuthScopeRequest} request The request that contains all the new OAuth scope information.
|
|
4720
|
+
* @returns {Promise<ClientResponse<ApplicationOAuthScopeResponse>>}
|
|
4721
|
+
*/
|
|
4722
|
+
updateOAuthScope(applicationId, scopeId, request) {
|
|
4723
|
+
return this.start()
|
|
4724
|
+
.withUri('/api/application')
|
|
4725
|
+
.withUriSegment(applicationId)
|
|
4726
|
+
.withUriSegment("scope")
|
|
4727
|
+
.withUriSegment(scopeId)
|
|
4728
|
+
.withJSONBody(request)
|
|
4729
|
+
.withMethod("PUT")
|
|
4730
|
+
.go();
|
|
4731
|
+
}
|
|
4644
4732
|
/**
|
|
4645
4733
|
* Updates the registration for the user with the given Id and the application defined in the request.
|
|
4646
4734
|
*
|
|
@@ -4953,38 +5041,57 @@ class FusionAuthClient {
|
|
|
4953
5041
|
exports.FusionAuthClient = FusionAuthClient;
|
|
4954
5042
|
exports.default = FusionAuthClient;
|
|
4955
5043
|
/**
|
|
4956
|
-
* @author
|
|
5044
|
+
* @author Daniel DeGroff
|
|
4957
5045
|
*/
|
|
4958
|
-
var
|
|
4959
|
-
(function (
|
|
4960
|
-
|
|
4961
|
-
|
|
4962
|
-
|
|
4963
|
-
|
|
4964
|
-
|
|
4965
|
-
|
|
4966
|
-
|
|
4967
|
-
})(UniqueUsernameStrategy = exports.UniqueUsernameStrategy || (exports.UniqueUsernameStrategy = {}));
|
|
5046
|
+
var FormDataType;
|
|
5047
|
+
(function (FormDataType) {
|
|
5048
|
+
FormDataType["bool"] = "bool";
|
|
5049
|
+
FormDataType["consent"] = "consent";
|
|
5050
|
+
FormDataType["date"] = "date";
|
|
5051
|
+
FormDataType["email"] = "email";
|
|
5052
|
+
FormDataType["number"] = "number";
|
|
5053
|
+
FormDataType["string"] = "string";
|
|
5054
|
+
})(FormDataType = exports.FormDataType || (exports.FormDataType = {}));
|
|
4968
5055
|
/**
|
|
4969
|
-
* @author
|
|
5056
|
+
* @author Daniel DeGroff
|
|
4970
5057
|
*/
|
|
4971
|
-
var
|
|
4972
|
-
(function (
|
|
4973
|
-
|
|
4974
|
-
|
|
4975
|
-
|
|
4976
|
-
|
|
4977
|
-
|
|
4978
|
-
})(
|
|
5058
|
+
var BreachedPasswordStatus;
|
|
5059
|
+
(function (BreachedPasswordStatus) {
|
|
5060
|
+
BreachedPasswordStatus["None"] = "None";
|
|
5061
|
+
BreachedPasswordStatus["ExactMatch"] = "ExactMatch";
|
|
5062
|
+
BreachedPasswordStatus["SubAddressMatch"] = "SubAddressMatch";
|
|
5063
|
+
BreachedPasswordStatus["PasswordOnly"] = "PasswordOnly";
|
|
5064
|
+
BreachedPasswordStatus["CommonPassword"] = "CommonPassword";
|
|
5065
|
+
})(BreachedPasswordStatus = exports.BreachedPasswordStatus || (exports.BreachedPasswordStatus = {}));
|
|
4979
5066
|
/**
|
|
4980
|
-
*
|
|
5067
|
+
* Models a consent.
|
|
5068
|
+
*
|
|
5069
|
+
* @author Daniel DeGroff
|
|
4981
5070
|
*/
|
|
4982
|
-
var
|
|
4983
|
-
(function (
|
|
4984
|
-
|
|
4985
|
-
|
|
4986
|
-
|
|
4987
|
-
|
|
5071
|
+
var ConsentStatus;
|
|
5072
|
+
(function (ConsentStatus) {
|
|
5073
|
+
ConsentStatus["Active"] = "Active";
|
|
5074
|
+
ConsentStatus["Revoked"] = "Revoked";
|
|
5075
|
+
})(ConsentStatus = exports.ConsentStatus || (exports.ConsentStatus = {}));
|
|
5076
|
+
/**
|
|
5077
|
+
* @author Daniel DeGroff
|
|
5078
|
+
*/
|
|
5079
|
+
var ApplicationMultiFactorTrustPolicy;
|
|
5080
|
+
(function (ApplicationMultiFactorTrustPolicy) {
|
|
5081
|
+
ApplicationMultiFactorTrustPolicy["Any"] = "Any";
|
|
5082
|
+
ApplicationMultiFactorTrustPolicy["This"] = "This";
|
|
5083
|
+
ApplicationMultiFactorTrustPolicy["None"] = "None";
|
|
5084
|
+
})(ApplicationMultiFactorTrustPolicy = exports.ApplicationMultiFactorTrustPolicy || (exports.ApplicationMultiFactorTrustPolicy = {}));
|
|
5085
|
+
/**
|
|
5086
|
+
* @author Daniel DeGroff
|
|
5087
|
+
*/
|
|
5088
|
+
var UserState;
|
|
5089
|
+
(function (UserState) {
|
|
5090
|
+
UserState["Authenticated"] = "Authenticated";
|
|
5091
|
+
UserState["AuthenticatedNotRegistered"] = "AuthenticatedNotRegistered";
|
|
5092
|
+
UserState["AuthenticatedNotVerified"] = "AuthenticatedNotVerified";
|
|
5093
|
+
UserState["AuthenticatedRegistrationNotVerified"] = "AuthenticatedRegistrationNotVerified";
|
|
5094
|
+
})(UserState = exports.UserState || (exports.UserState = {}));
|
|
4988
5095
|
/**
|
|
4989
5096
|
* Authorization Grant types as defined by the <a href="https://tools.ietf.org/html/rfc6749">The OAuth 2.0 Authorization
|
|
4990
5097
|
* Framework - RFC 6749</a>.
|
|
@@ -5004,6 +5111,42 @@ var GrantType;
|
|
|
5004
5111
|
GrantType["unknown"] = "unknown";
|
|
5005
5112
|
GrantType["device_code"] = "urn:ietf:params:oauth:grant-type:device_code";
|
|
5006
5113
|
})(GrantType = exports.GrantType || (exports.GrantType = {}));
|
|
5114
|
+
/**
|
|
5115
|
+
* The application's relationship to the authorization server. First-party applications will be granted implicit permission for requested scopes.
|
|
5116
|
+
* Third-party applications will use the {@link OAuthScopeConsentMode} policy.
|
|
5117
|
+
*
|
|
5118
|
+
* @author Spencer Witt
|
|
5119
|
+
*/
|
|
5120
|
+
var OAuthApplicationRelationship;
|
|
5121
|
+
(function (OAuthApplicationRelationship) {
|
|
5122
|
+
OAuthApplicationRelationship["FirstParty"] = "FirstParty";
|
|
5123
|
+
OAuthApplicationRelationship["ThirdParty"] = "ThirdParty";
|
|
5124
|
+
})(OAuthApplicationRelationship = exports.OAuthApplicationRelationship || (exports.OAuthApplicationRelationship = {}));
|
|
5125
|
+
/**
|
|
5126
|
+
* @author Brian Pontarelli
|
|
5127
|
+
*/
|
|
5128
|
+
var ReactorFeatureStatus;
|
|
5129
|
+
(function (ReactorFeatureStatus) {
|
|
5130
|
+
ReactorFeatureStatus["ACTIVE"] = "ACTIVE";
|
|
5131
|
+
ReactorFeatureStatus["DISCONNECTED"] = "DISCONNECTED";
|
|
5132
|
+
ReactorFeatureStatus["PENDING"] = "PENDING";
|
|
5133
|
+
ReactorFeatureStatus["DISABLED"] = "DISABLED";
|
|
5134
|
+
ReactorFeatureStatus["UNKNOWN"] = "UNKNOWN";
|
|
5135
|
+
})(ReactorFeatureStatus = exports.ReactorFeatureStatus || (exports.ReactorFeatureStatus = {}));
|
|
5136
|
+
var ThemeType;
|
|
5137
|
+
(function (ThemeType) {
|
|
5138
|
+
ThemeType["advanced"] = "advanced";
|
|
5139
|
+
ThemeType["simple"] = "simple";
|
|
5140
|
+
})(ThemeType = exports.ThemeType || (exports.ThemeType = {}));
|
|
5141
|
+
/**
|
|
5142
|
+
* @author Brett Guy
|
|
5143
|
+
*/
|
|
5144
|
+
var ProofKeyForCodeExchangePolicy;
|
|
5145
|
+
(function (ProofKeyForCodeExchangePolicy) {
|
|
5146
|
+
ProofKeyForCodeExchangePolicy["Required"] = "Required";
|
|
5147
|
+
ProofKeyForCodeExchangePolicy["NotRequired"] = "NotRequired";
|
|
5148
|
+
ProofKeyForCodeExchangePolicy["NotRequiredWhenUsingClientAuthentication"] = "NotRequiredWhenUsingClientAuthentication";
|
|
5149
|
+
})(ProofKeyForCodeExchangePolicy = exports.ProofKeyForCodeExchangePolicy || (exports.ProofKeyForCodeExchangePolicy = {}));
|
|
5007
5150
|
/**
|
|
5008
5151
|
* <ul>
|
|
5009
5152
|
* <li>Bearer Token type as defined by <a href="https://tools.ietf.org/html/rfc6750">RFC 6750</a>.</li>
|
|
@@ -5020,37 +5163,48 @@ var TokenType;
|
|
|
5020
5163
|
TokenType["Bearer"] = "Bearer";
|
|
5021
5164
|
TokenType["MAC"] = "MAC";
|
|
5022
5165
|
})(TokenType = exports.TokenType || (exports.TokenType = {}));
|
|
5166
|
+
var XMLSignatureLocation;
|
|
5167
|
+
(function (XMLSignatureLocation) {
|
|
5168
|
+
XMLSignatureLocation["Assertion"] = "Assertion";
|
|
5169
|
+
XMLSignatureLocation["Response"] = "Response";
|
|
5170
|
+
})(XMLSignatureLocation = exports.XMLSignatureLocation || (exports.XMLSignatureLocation = {}));
|
|
5023
5171
|
/**
|
|
5024
|
-
* @
|
|
5172
|
+
* Describes the authenticator attachment modality preference for a WebAuthn workflow. See {@link AuthenticatorAttachment}
|
|
5173
|
+
*
|
|
5174
|
+
* @author Spencer Witt
|
|
5025
5175
|
*/
|
|
5026
|
-
var
|
|
5027
|
-
(function (
|
|
5028
|
-
|
|
5029
|
-
|
|
5030
|
-
|
|
5031
|
-
|
|
5032
|
-
HTTPMethod["HEAD"] = "HEAD";
|
|
5033
|
-
HTTPMethod["OPTIONS"] = "OPTIONS";
|
|
5034
|
-
HTTPMethod["PATCH"] = "PATCH";
|
|
5035
|
-
})(HTTPMethod = exports.HTTPMethod || (exports.HTTPMethod = {}));
|
|
5176
|
+
var AuthenticatorAttachmentPreference;
|
|
5177
|
+
(function (AuthenticatorAttachmentPreference) {
|
|
5178
|
+
AuthenticatorAttachmentPreference["any"] = "any";
|
|
5179
|
+
AuthenticatorAttachmentPreference["platform"] = "platform";
|
|
5180
|
+
AuthenticatorAttachmentPreference["crossPlatform"] = "crossPlatform";
|
|
5181
|
+
})(AuthenticatorAttachmentPreference = exports.AuthenticatorAttachmentPreference || (exports.AuthenticatorAttachmentPreference = {}));
|
|
5036
5182
|
/**
|
|
5037
|
-
* @author
|
|
5183
|
+
* @author Brett Guy
|
|
5038
5184
|
*/
|
|
5039
|
-
var
|
|
5040
|
-
(function (
|
|
5041
|
-
|
|
5042
|
-
|
|
5043
|
-
})(
|
|
5185
|
+
var IPAccessControlEntryAction;
|
|
5186
|
+
(function (IPAccessControlEntryAction) {
|
|
5187
|
+
IPAccessControlEntryAction["Allow"] = "Allow";
|
|
5188
|
+
IPAccessControlEntryAction["Block"] = "Block";
|
|
5189
|
+
})(IPAccessControlEntryAction = exports.IPAccessControlEntryAction || (exports.IPAccessControlEntryAction = {}));
|
|
5044
5190
|
/**
|
|
5045
|
-
* @author
|
|
5191
|
+
* @author Mikey Sleevi
|
|
5046
5192
|
*/
|
|
5047
|
-
var
|
|
5048
|
-
(function (
|
|
5049
|
-
|
|
5050
|
-
|
|
5051
|
-
|
|
5052
|
-
|
|
5053
|
-
|
|
5193
|
+
var MessageType;
|
|
5194
|
+
(function (MessageType) {
|
|
5195
|
+
MessageType["SMS"] = "SMS";
|
|
5196
|
+
})(MessageType = exports.MessageType || (exports.MessageType = {}));
|
|
5197
|
+
/**
|
|
5198
|
+
* Status for content like usernames, profile attributes, etc.
|
|
5199
|
+
*
|
|
5200
|
+
* @author Brian Pontarelli
|
|
5201
|
+
*/
|
|
5202
|
+
var ContentStatus;
|
|
5203
|
+
(function (ContentStatus) {
|
|
5204
|
+
ContentStatus["ACTIVE"] = "ACTIVE";
|
|
5205
|
+
ContentStatus["PENDING"] = "PENDING";
|
|
5206
|
+
ContentStatus["REJECTED"] = "REJECTED";
|
|
5207
|
+
})(ContentStatus = exports.ContentStatus || (exports.ContentStatus = {}));
|
|
5054
5208
|
/**
|
|
5055
5209
|
* @author Daniel DeGroff
|
|
5056
5210
|
*/
|
|
@@ -5064,17 +5218,6 @@ var FormControl;
|
|
|
5064
5218
|
FormControl["textarea"] = "textarea";
|
|
5065
5219
|
FormControl["text"] = "text";
|
|
5066
5220
|
})(FormControl = exports.FormControl || (exports.FormControl = {}));
|
|
5067
|
-
/**
|
|
5068
|
-
* The types of connectors. This enum is stored as an ordinal on the <code>identities</code> table, order must be maintained.
|
|
5069
|
-
*
|
|
5070
|
-
* @author Trevor Smith
|
|
5071
|
-
*/
|
|
5072
|
-
var ConnectorType;
|
|
5073
|
-
(function (ConnectorType) {
|
|
5074
|
-
ConnectorType["FusionAuth"] = "FusionAuth";
|
|
5075
|
-
ConnectorType["Generic"] = "Generic";
|
|
5076
|
-
ConnectorType["LDAP"] = "LDAP";
|
|
5077
|
-
})(ConnectorType = exports.ConnectorType || (exports.ConnectorType = {}));
|
|
5078
5221
|
var BreachMatchMode;
|
|
5079
5222
|
(function (BreachMatchMode) {
|
|
5080
5223
|
BreachMatchMode["Low"] = "Low";
|
|
@@ -5082,48 +5225,157 @@ var BreachMatchMode;
|
|
|
5082
5225
|
BreachMatchMode["High"] = "High";
|
|
5083
5226
|
})(BreachMatchMode = exports.BreachMatchMode || (exports.BreachMatchMode = {}));
|
|
5084
5227
|
/**
|
|
5085
|
-
*
|
|
5228
|
+
* COSE key type
|
|
5229
|
+
*
|
|
5230
|
+
* @author Spencer Witt
|
|
5086
5231
|
*/
|
|
5087
|
-
var
|
|
5088
|
-
(function (
|
|
5089
|
-
|
|
5090
|
-
|
|
5091
|
-
|
|
5092
|
-
|
|
5232
|
+
var CoseKeyType;
|
|
5233
|
+
(function (CoseKeyType) {
|
|
5234
|
+
CoseKeyType["Reserved"] = "0";
|
|
5235
|
+
CoseKeyType["OKP"] = "1";
|
|
5236
|
+
CoseKeyType["EC2"] = "2";
|
|
5237
|
+
CoseKeyType["RSA"] = "3";
|
|
5238
|
+
CoseKeyType["Symmetric"] = "4";
|
|
5239
|
+
})(CoseKeyType = exports.CoseKeyType || (exports.CoseKeyType = {}));
|
|
5093
5240
|
/**
|
|
5094
|
-
* @author
|
|
5241
|
+
* @author Lyle Schemmerling
|
|
5095
5242
|
*/
|
|
5096
|
-
var
|
|
5097
|
-
(function (
|
|
5098
|
-
|
|
5099
|
-
|
|
5100
|
-
|
|
5101
|
-
(
|
|
5102
|
-
|
|
5103
|
-
|
|
5104
|
-
|
|
5105
|
-
|
|
5106
|
-
/**
|
|
5107
|
-
* The transaction types for Webhooks and other event systems within FusionAuth.
|
|
5108
|
-
*
|
|
5109
|
-
* @author Brian Pontarelli
|
|
5243
|
+
var SAMLv2DestinationAssertionPolicy;
|
|
5244
|
+
(function (SAMLv2DestinationAssertionPolicy) {
|
|
5245
|
+
SAMLv2DestinationAssertionPolicy["Enabled"] = "Enabled";
|
|
5246
|
+
SAMLv2DestinationAssertionPolicy["Disabled"] = "Disabled";
|
|
5247
|
+
SAMLv2DestinationAssertionPolicy["AllowAlternates"] = "AllowAlternates";
|
|
5248
|
+
})(SAMLv2DestinationAssertionPolicy = exports.SAMLv2DestinationAssertionPolicy || (exports.SAMLv2DestinationAssertionPolicy = {}));
|
|
5249
|
+
/**
|
|
5250
|
+
* Defines valid credential types. This is an extension point in the WebAuthn spec. The only defined value at this time is "public-key"
|
|
5251
|
+
*
|
|
5252
|
+
* @author Spencer Witt
|
|
5110
5253
|
*/
|
|
5111
|
-
var
|
|
5112
|
-
(function (
|
|
5113
|
-
|
|
5114
|
-
|
|
5115
|
-
TransactionType["SimpleMajority"] = "SimpleMajority";
|
|
5116
|
-
TransactionType["SuperMajority"] = "SuperMajority";
|
|
5117
|
-
TransactionType["AbsoluteMajority"] = "AbsoluteMajority";
|
|
5118
|
-
})(TransactionType = exports.TransactionType || (exports.TransactionType = {}));
|
|
5254
|
+
var PublicKeyCredentialType;
|
|
5255
|
+
(function (PublicKeyCredentialType) {
|
|
5256
|
+
PublicKeyCredentialType["publicKey"] = "public-key";
|
|
5257
|
+
})(PublicKeyCredentialType = exports.PublicKeyCredentialType || (exports.PublicKeyCredentialType = {}));
|
|
5119
5258
|
/**
|
|
5120
5259
|
* @author Daniel DeGroff
|
|
5121
5260
|
*/
|
|
5122
|
-
var
|
|
5123
|
-
(function (
|
|
5124
|
-
|
|
5125
|
-
|
|
5126
|
-
})(
|
|
5261
|
+
var FormFieldAdminPolicy;
|
|
5262
|
+
(function (FormFieldAdminPolicy) {
|
|
5263
|
+
FormFieldAdminPolicy["Edit"] = "Edit";
|
|
5264
|
+
FormFieldAdminPolicy["View"] = "View";
|
|
5265
|
+
})(FormFieldAdminPolicy = exports.FormFieldAdminPolicy || (exports.FormFieldAdminPolicy = {}));
|
|
5266
|
+
/**
|
|
5267
|
+
* @author Daniel DeGroff
|
|
5268
|
+
*/
|
|
5269
|
+
var HTTPMethod;
|
|
5270
|
+
(function (HTTPMethod) {
|
|
5271
|
+
HTTPMethod["GET"] = "GET";
|
|
5272
|
+
HTTPMethod["POST"] = "POST";
|
|
5273
|
+
HTTPMethod["PUT"] = "PUT";
|
|
5274
|
+
HTTPMethod["DELETE"] = "DELETE";
|
|
5275
|
+
HTTPMethod["HEAD"] = "HEAD";
|
|
5276
|
+
HTTPMethod["OPTIONS"] = "OPTIONS";
|
|
5277
|
+
HTTPMethod["PATCH"] = "PATCH";
|
|
5278
|
+
})(HTTPMethod = exports.HTTPMethod || (exports.HTTPMethod = {}));
|
|
5279
|
+
/**
|
|
5280
|
+
* A number identifying a cryptographic algorithm. Values should be registered with the <a
|
|
5281
|
+
* href="https://www.iana.org/assignments/cose/cose.xhtml#algorithms">IANA COSE Algorithms registry</a>
|
|
5282
|
+
*
|
|
5283
|
+
* @author Spencer Witt
|
|
5284
|
+
*/
|
|
5285
|
+
var CoseAlgorithmIdentifier;
|
|
5286
|
+
(function (CoseAlgorithmIdentifier) {
|
|
5287
|
+
CoseAlgorithmIdentifier["ES256"] = "SHA256withECDSA";
|
|
5288
|
+
CoseAlgorithmIdentifier["ES384"] = "SHA384withECDSA";
|
|
5289
|
+
CoseAlgorithmIdentifier["ES512"] = "SHA512withECDSA";
|
|
5290
|
+
CoseAlgorithmIdentifier["RS256"] = "SHA256withRSA";
|
|
5291
|
+
CoseAlgorithmIdentifier["RS384"] = "SHA384withRSA";
|
|
5292
|
+
CoseAlgorithmIdentifier["RS512"] = "SHA512withRSA";
|
|
5293
|
+
CoseAlgorithmIdentifier["PS256"] = "SHA-256";
|
|
5294
|
+
CoseAlgorithmIdentifier["PS384"] = "SHA-384";
|
|
5295
|
+
CoseAlgorithmIdentifier["PS512"] = "SHA-512";
|
|
5296
|
+
})(CoseAlgorithmIdentifier = exports.CoseAlgorithmIdentifier || (exports.CoseAlgorithmIdentifier = {}));
|
|
5297
|
+
/**
|
|
5298
|
+
* The types of lambdas that indicate how they are invoked by FusionAuth.
|
|
5299
|
+
*
|
|
5300
|
+
* @author Brian Pontarelli
|
|
5301
|
+
*/
|
|
5302
|
+
var LambdaType;
|
|
5303
|
+
(function (LambdaType) {
|
|
5304
|
+
LambdaType["JWTPopulate"] = "JWTPopulate";
|
|
5305
|
+
LambdaType["OpenIDReconcile"] = "OpenIDReconcile";
|
|
5306
|
+
LambdaType["SAMLv2Reconcile"] = "SAMLv2Reconcile";
|
|
5307
|
+
LambdaType["SAMLv2Populate"] = "SAMLv2Populate";
|
|
5308
|
+
LambdaType["AppleReconcile"] = "AppleReconcile";
|
|
5309
|
+
LambdaType["ExternalJWTReconcile"] = "ExternalJWTReconcile";
|
|
5310
|
+
LambdaType["FacebookReconcile"] = "FacebookReconcile";
|
|
5311
|
+
LambdaType["GoogleReconcile"] = "GoogleReconcile";
|
|
5312
|
+
LambdaType["HYPRReconcile"] = "HYPRReconcile";
|
|
5313
|
+
LambdaType["TwitterReconcile"] = "TwitterReconcile";
|
|
5314
|
+
LambdaType["LDAPConnectorReconcile"] = "LDAPConnectorReconcile";
|
|
5315
|
+
LambdaType["LinkedInReconcile"] = "LinkedInReconcile";
|
|
5316
|
+
LambdaType["EpicGamesReconcile"] = "EpicGamesReconcile";
|
|
5317
|
+
LambdaType["NintendoReconcile"] = "NintendoReconcile";
|
|
5318
|
+
LambdaType["SonyPSNReconcile"] = "SonyPSNReconcile";
|
|
5319
|
+
LambdaType["SteamReconcile"] = "SteamReconcile";
|
|
5320
|
+
LambdaType["TwitchReconcile"] = "TwitchReconcile";
|
|
5321
|
+
LambdaType["XboxReconcile"] = "XboxReconcile";
|
|
5322
|
+
LambdaType["ClientCredentialsJWTPopulate"] = "ClientCredentialsJWTPopulate";
|
|
5323
|
+
LambdaType["SCIMServerGroupRequestConverter"] = "SCIMServerGroupRequestConverter";
|
|
5324
|
+
LambdaType["SCIMServerGroupResponseConverter"] = "SCIMServerGroupResponseConverter";
|
|
5325
|
+
LambdaType["SCIMServerUserRequestConverter"] = "SCIMServerUserRequestConverter";
|
|
5326
|
+
LambdaType["SCIMServerUserResponseConverter"] = "SCIMServerUserResponseConverter";
|
|
5327
|
+
LambdaType["SelfServiceRegistrationValidation"] = "SelfServiceRegistrationValidation";
|
|
5328
|
+
LambdaType["UserInfoPopulate"] = "UserInfoPopulate";
|
|
5329
|
+
})(LambdaType = exports.LambdaType || (exports.LambdaType = {}));
|
|
5330
|
+
/**
|
|
5331
|
+
* Used to communicate whether and how authenticator attestation should be delivered to the Relying Party
|
|
5332
|
+
*
|
|
5333
|
+
* @author Spencer Witt
|
|
5334
|
+
*/
|
|
5335
|
+
var AttestationConveyancePreference;
|
|
5336
|
+
(function (AttestationConveyancePreference) {
|
|
5337
|
+
AttestationConveyancePreference["none"] = "none";
|
|
5338
|
+
AttestationConveyancePreference["indirect"] = "indirect";
|
|
5339
|
+
AttestationConveyancePreference["direct"] = "direct";
|
|
5340
|
+
AttestationConveyancePreference["enterprise"] = "enterprise";
|
|
5341
|
+
})(AttestationConveyancePreference = exports.AttestationConveyancePreference || (exports.AttestationConveyancePreference = {}));
|
|
5342
|
+
/**
|
|
5343
|
+
* @author Daniel DeGroff
|
|
5344
|
+
*/
|
|
5345
|
+
var ObjectState;
|
|
5346
|
+
(function (ObjectState) {
|
|
5347
|
+
ObjectState["Active"] = "Active";
|
|
5348
|
+
ObjectState["Inactive"] = "Inactive";
|
|
5349
|
+
ObjectState["PendingDelete"] = "PendingDelete";
|
|
5350
|
+
})(ObjectState = exports.ObjectState || (exports.ObjectState = {}));
|
|
5351
|
+
/**
|
|
5352
|
+
* @author Brett Pontarelli
|
|
5353
|
+
*/
|
|
5354
|
+
var AuthenticationThreats;
|
|
5355
|
+
(function (AuthenticationThreats) {
|
|
5356
|
+
AuthenticationThreats["ImpossibleTravel"] = "ImpossibleTravel";
|
|
5357
|
+
})(AuthenticationThreats = exports.AuthenticationThreats || (exports.AuthenticationThreats = {}));
|
|
5358
|
+
/**
|
|
5359
|
+
* Describes the Relying Party's requirements for <a href="https://www.w3.org/TR/webauthn-2/#client-side-discoverable-credential">client-side
|
|
5360
|
+
* discoverable credentials</a> (formerly known as "resident keys")
|
|
5361
|
+
*
|
|
5362
|
+
* @author Spencer Witt
|
|
5363
|
+
*/
|
|
5364
|
+
var ResidentKeyRequirement;
|
|
5365
|
+
(function (ResidentKeyRequirement) {
|
|
5366
|
+
ResidentKeyRequirement["discouraged"] = "discouraged";
|
|
5367
|
+
ResidentKeyRequirement["preferred"] = "preferred";
|
|
5368
|
+
ResidentKeyRequirement["required"] = "required";
|
|
5369
|
+
})(ResidentKeyRequirement = exports.ResidentKeyRequirement || (exports.ResidentKeyRequirement = {}));
|
|
5370
|
+
/**
|
|
5371
|
+
* @author Brett Guy
|
|
5372
|
+
*/
|
|
5373
|
+
var ClientAuthenticationPolicy;
|
|
5374
|
+
(function (ClientAuthenticationPolicy) {
|
|
5375
|
+
ClientAuthenticationPolicy["Required"] = "Required";
|
|
5376
|
+
ClientAuthenticationPolicy["NotRequired"] = "NotRequired";
|
|
5377
|
+
ClientAuthenticationPolicy["NotRequiredWhenUsingPKCE"] = "NotRequiredWhenUsingPKCE";
|
|
5378
|
+
})(ClientAuthenticationPolicy = exports.ClientAuthenticationPolicy || (exports.ClientAuthenticationPolicy = {}));
|
|
5127
5379
|
/**
|
|
5128
5380
|
* @author Daniel DeGroff
|
|
5129
5381
|
*/
|
|
@@ -5132,6 +5384,163 @@ var RefreshTokenUsagePolicy;
|
|
|
5132
5384
|
RefreshTokenUsagePolicy["Reusable"] = "Reusable";
|
|
5133
5385
|
RefreshTokenUsagePolicy["OneTimeUse"] = "OneTimeUse";
|
|
5134
5386
|
})(RefreshTokenUsagePolicy = exports.RefreshTokenUsagePolicy || (exports.RefreshTokenUsagePolicy = {}));
|
|
5387
|
+
var DeviceType;
|
|
5388
|
+
(function (DeviceType) {
|
|
5389
|
+
DeviceType["BROWSER"] = "BROWSER";
|
|
5390
|
+
DeviceType["DESKTOP"] = "DESKTOP";
|
|
5391
|
+
DeviceType["LAPTOP"] = "LAPTOP";
|
|
5392
|
+
DeviceType["MOBILE"] = "MOBILE";
|
|
5393
|
+
DeviceType["OTHER"] = "OTHER";
|
|
5394
|
+
DeviceType["SERVER"] = "SERVER";
|
|
5395
|
+
DeviceType["TABLET"] = "TABLET";
|
|
5396
|
+
DeviceType["TV"] = "TV";
|
|
5397
|
+
DeviceType["UNKNOWN"] = "UNKNOWN";
|
|
5398
|
+
})(DeviceType = exports.DeviceType || (exports.DeviceType = {}));
|
|
5399
|
+
/**
|
|
5400
|
+
* @author Brett Pontarelli
|
|
5401
|
+
*/
|
|
5402
|
+
var CaptchaMethod;
|
|
5403
|
+
(function (CaptchaMethod) {
|
|
5404
|
+
CaptchaMethod["GoogleRecaptchaV2"] = "GoogleRecaptchaV2";
|
|
5405
|
+
CaptchaMethod["GoogleRecaptchaV3"] = "GoogleRecaptchaV3";
|
|
5406
|
+
CaptchaMethod["HCaptcha"] = "HCaptcha";
|
|
5407
|
+
CaptchaMethod["HCaptchaEnterprise"] = "HCaptchaEnterprise";
|
|
5408
|
+
})(CaptchaMethod = exports.CaptchaMethod || (exports.CaptchaMethod = {}));
|
|
5409
|
+
var KeyAlgorithm;
|
|
5410
|
+
(function (KeyAlgorithm) {
|
|
5411
|
+
KeyAlgorithm["ES256"] = "ES256";
|
|
5412
|
+
KeyAlgorithm["ES384"] = "ES384";
|
|
5413
|
+
KeyAlgorithm["ES512"] = "ES512";
|
|
5414
|
+
KeyAlgorithm["HS256"] = "HS256";
|
|
5415
|
+
KeyAlgorithm["HS384"] = "HS384";
|
|
5416
|
+
KeyAlgorithm["HS512"] = "HS512";
|
|
5417
|
+
KeyAlgorithm["RS256"] = "RS256";
|
|
5418
|
+
KeyAlgorithm["RS384"] = "RS384";
|
|
5419
|
+
KeyAlgorithm["RS512"] = "RS512";
|
|
5420
|
+
})(KeyAlgorithm = exports.KeyAlgorithm || (exports.KeyAlgorithm = {}));
|
|
5421
|
+
/**
|
|
5422
|
+
* @author Daniel DeGroff
|
|
5423
|
+
*/
|
|
5424
|
+
var FormType;
|
|
5425
|
+
(function (FormType) {
|
|
5426
|
+
FormType["registration"] = "registration";
|
|
5427
|
+
FormType["adminRegistration"] = "adminRegistration";
|
|
5428
|
+
FormType["adminUser"] = "adminUser";
|
|
5429
|
+
FormType["selfServiceUser"] = "selfServiceUser";
|
|
5430
|
+
})(FormType = exports.FormType || (exports.FormType = {}));
|
|
5431
|
+
/**
|
|
5432
|
+
* Used to indicate what type of attestation was included in the authenticator response for a given WebAuthn credential at the time it was created
|
|
5433
|
+
*
|
|
5434
|
+
* @author Spencer Witt
|
|
5435
|
+
*/
|
|
5436
|
+
var AttestationType;
|
|
5437
|
+
(function (AttestationType) {
|
|
5438
|
+
AttestationType["basic"] = "basic";
|
|
5439
|
+
AttestationType["self"] = "self";
|
|
5440
|
+
AttestationType["attestationCa"] = "attestationCa";
|
|
5441
|
+
AttestationType["anonymizationCa"] = "anonymizationCa";
|
|
5442
|
+
AttestationType["none"] = "none";
|
|
5443
|
+
})(AttestationType = exports.AttestationType || (exports.AttestationType = {}));
|
|
5444
|
+
var KeyType;
|
|
5445
|
+
(function (KeyType) {
|
|
5446
|
+
KeyType["EC"] = "EC";
|
|
5447
|
+
KeyType["RSA"] = "RSA";
|
|
5448
|
+
KeyType["HMAC"] = "HMAC";
|
|
5449
|
+
})(KeyType = exports.KeyType || (exports.KeyType = {}));
|
|
5450
|
+
/**
|
|
5451
|
+
* The types of connectors. This enum is stored as an ordinal on the <code>identities</code> table, order must be maintained.
|
|
5452
|
+
*
|
|
5453
|
+
* @author Trevor Smith
|
|
5454
|
+
*/
|
|
5455
|
+
var ConnectorType;
|
|
5456
|
+
(function (ConnectorType) {
|
|
5457
|
+
ConnectorType["FusionAuth"] = "FusionAuth";
|
|
5458
|
+
ConnectorType["Generic"] = "Generic";
|
|
5459
|
+
ConnectorType["LDAP"] = "LDAP";
|
|
5460
|
+
})(ConnectorType = exports.ConnectorType || (exports.ConnectorType = {}));
|
|
5461
|
+
/**
|
|
5462
|
+
* @author Daniel DeGroff
|
|
5463
|
+
*/
|
|
5464
|
+
var MultiFactorLoginPolicy;
|
|
5465
|
+
(function (MultiFactorLoginPolicy) {
|
|
5466
|
+
MultiFactorLoginPolicy["Disabled"] = "Disabled";
|
|
5467
|
+
MultiFactorLoginPolicy["Enabled"] = "Enabled";
|
|
5468
|
+
MultiFactorLoginPolicy["Required"] = "Required";
|
|
5469
|
+
})(MultiFactorLoginPolicy = exports.MultiFactorLoginPolicy || (exports.MultiFactorLoginPolicy = {}));
|
|
5470
|
+
/**
|
|
5471
|
+
* Describes the <a href="https://www.w3.org/TR/webauthn-2/#authenticator-attachment-modality">authenticator attachment modality</a>.
|
|
5472
|
+
*
|
|
5473
|
+
* @author Spencer Witt
|
|
5474
|
+
*/
|
|
5475
|
+
var AuthenticatorAttachment;
|
|
5476
|
+
(function (AuthenticatorAttachment) {
|
|
5477
|
+
AuthenticatorAttachment["platform"] = "platform";
|
|
5478
|
+
AuthenticatorAttachment["crossPlatform"] = "crossPlatform";
|
|
5479
|
+
})(AuthenticatorAttachment = exports.AuthenticatorAttachment || (exports.AuthenticatorAttachment = {}));
|
|
5480
|
+
/**
|
|
5481
|
+
* COSE Elliptic Curve identifier to determine which elliptic curve to use with a given key
|
|
5482
|
+
*
|
|
5483
|
+
* @author Spencer Witt
|
|
5484
|
+
*/
|
|
5485
|
+
var CoseEllipticCurve;
|
|
5486
|
+
(function (CoseEllipticCurve) {
|
|
5487
|
+
CoseEllipticCurve["Reserved"] = "Reserved";
|
|
5488
|
+
CoseEllipticCurve["P256"] = "P256";
|
|
5489
|
+
CoseEllipticCurve["P384"] = "P384";
|
|
5490
|
+
CoseEllipticCurve["P521"] = "P521";
|
|
5491
|
+
CoseEllipticCurve["X25519"] = "X25519";
|
|
5492
|
+
CoseEllipticCurve["X448"] = "X448";
|
|
5493
|
+
CoseEllipticCurve["Ed25519"] = "Ed25519";
|
|
5494
|
+
CoseEllipticCurve["Ed448"] = "Ed448";
|
|
5495
|
+
CoseEllipticCurve["Secp256k1"] = "Secp256k1";
|
|
5496
|
+
})(CoseEllipticCurve = exports.CoseEllipticCurve || (exports.CoseEllipticCurve = {}));
|
|
5497
|
+
var LoginIdType;
|
|
5498
|
+
(function (LoginIdType) {
|
|
5499
|
+
LoginIdType["email"] = "email";
|
|
5500
|
+
LoginIdType["username"] = "username";
|
|
5501
|
+
})(LoginIdType = exports.LoginIdType || (exports.LoginIdType = {}));
|
|
5502
|
+
var RegistrationType;
|
|
5503
|
+
(function (RegistrationType) {
|
|
5504
|
+
RegistrationType["basic"] = "basic";
|
|
5505
|
+
RegistrationType["advanced"] = "advanced";
|
|
5506
|
+
})(RegistrationType = exports.RegistrationType || (exports.RegistrationType = {}));
|
|
5507
|
+
/**
|
|
5508
|
+
* @author Daniel DeGroff
|
|
5509
|
+
*/
|
|
5510
|
+
var RefreshTokenExpirationPolicy;
|
|
5511
|
+
(function (RefreshTokenExpirationPolicy) {
|
|
5512
|
+
RefreshTokenExpirationPolicy["Fixed"] = "Fixed";
|
|
5513
|
+
RefreshTokenExpirationPolicy["SlidingWindow"] = "SlidingWindow";
|
|
5514
|
+
RefreshTokenExpirationPolicy["SlidingWindowWithMaximumLifetime"] = "SlidingWindowWithMaximumLifetime";
|
|
5515
|
+
})(RefreshTokenExpirationPolicy = exports.RefreshTokenExpirationPolicy || (exports.RefreshTokenExpirationPolicy = {}));
|
|
5516
|
+
/**
|
|
5517
|
+
* @author Daniel DeGroff
|
|
5518
|
+
*/
|
|
5519
|
+
var UnverifiedBehavior;
|
|
5520
|
+
(function (UnverifiedBehavior) {
|
|
5521
|
+
UnverifiedBehavior["Allow"] = "Allow";
|
|
5522
|
+
UnverifiedBehavior["Gated"] = "Gated";
|
|
5523
|
+
})(UnverifiedBehavior = exports.UnverifiedBehavior || (exports.UnverifiedBehavior = {}));
|
|
5524
|
+
/**
|
|
5525
|
+
* The phases of a time-based user action.
|
|
5526
|
+
*
|
|
5527
|
+
* @author Brian Pontarelli
|
|
5528
|
+
*/
|
|
5529
|
+
var UserActionPhase;
|
|
5530
|
+
(function (UserActionPhase) {
|
|
5531
|
+
UserActionPhase["start"] = "start";
|
|
5532
|
+
UserActionPhase["modify"] = "modify";
|
|
5533
|
+
UserActionPhase["cancel"] = "cancel";
|
|
5534
|
+
UserActionPhase["end"] = "end";
|
|
5535
|
+
})(UserActionPhase = exports.UserActionPhase || (exports.UserActionPhase = {}));
|
|
5536
|
+
/**
|
|
5537
|
+
* @author Daniel DeGroff
|
|
5538
|
+
*/
|
|
5539
|
+
var LambdaEngineType;
|
|
5540
|
+
(function (LambdaEngineType) {
|
|
5541
|
+
LambdaEngineType["GraalJS"] = "GraalJS";
|
|
5542
|
+
LambdaEngineType["Nashorn"] = "Nashorn";
|
|
5543
|
+
})(LambdaEngineType = exports.LambdaEngineType || (exports.LambdaEngineType = {}));
|
|
5135
5544
|
var OAuthErrorType;
|
|
5136
5545
|
(function (OAuthErrorType) {
|
|
5137
5546
|
OAuthErrorType["invalid_request"] = "invalid_request";
|
|
@@ -5143,6 +5552,7 @@ var OAuthErrorType;
|
|
|
5143
5552
|
OAuthErrorType["server_error"] = "server_error";
|
|
5144
5553
|
OAuthErrorType["unsupported_grant_type"] = "unsupported_grant_type";
|
|
5145
5554
|
OAuthErrorType["unsupported_response_type"] = "unsupported_response_type";
|
|
5555
|
+
OAuthErrorType["access_denied"] = "access_denied";
|
|
5146
5556
|
OAuthErrorType["change_password_required"] = "change_password_required";
|
|
5147
5557
|
OAuthErrorType["not_licensed"] = "not_licensed";
|
|
5148
5558
|
OAuthErrorType["two_factor_required"] = "two_factor_required";
|
|
@@ -5150,97 +5560,19 @@ var OAuthErrorType;
|
|
|
5150
5560
|
OAuthErrorType["expired_token"] = "expired_token";
|
|
5151
5561
|
OAuthErrorType["unsupported_token_type"] = "unsupported_token_type";
|
|
5152
5562
|
})(OAuthErrorType = exports.OAuthErrorType || (exports.OAuthErrorType = {}));
|
|
5153
|
-
var DeviceType;
|
|
5154
|
-
(function (DeviceType) {
|
|
5155
|
-
DeviceType["BROWSER"] = "BROWSER";
|
|
5156
|
-
DeviceType["DESKTOP"] = "DESKTOP";
|
|
5157
|
-
DeviceType["LAPTOP"] = "LAPTOP";
|
|
5158
|
-
DeviceType["MOBILE"] = "MOBILE";
|
|
5159
|
-
DeviceType["OTHER"] = "OTHER";
|
|
5160
|
-
DeviceType["SERVER"] = "SERVER";
|
|
5161
|
-
DeviceType["TABLET"] = "TABLET";
|
|
5162
|
-
DeviceType["TV"] = "TV";
|
|
5163
|
-
DeviceType["UNKNOWN"] = "UNKNOWN";
|
|
5164
|
-
})(DeviceType = exports.DeviceType || (exports.DeviceType = {}));
|
|
5165
|
-
/**
|
|
5166
|
-
* @author Daniel DeGroff
|
|
5167
|
-
*/
|
|
5168
|
-
var RateLimitedRequestType;
|
|
5169
|
-
(function (RateLimitedRequestType) {
|
|
5170
|
-
RateLimitedRequestType["FailedLogin"] = "FailedLogin";
|
|
5171
|
-
RateLimitedRequestType["ForgotPassword"] = "ForgotPassword";
|
|
5172
|
-
RateLimitedRequestType["SendEmailVerification"] = "SendEmailVerification";
|
|
5173
|
-
RateLimitedRequestType["SendPasswordless"] = "SendPasswordless";
|
|
5174
|
-
RateLimitedRequestType["SendRegistrationVerification"] = "SendRegistrationVerification";
|
|
5175
|
-
RateLimitedRequestType["SendTwoFactor"] = "SendTwoFactor";
|
|
5176
|
-
})(RateLimitedRequestType = exports.RateLimitedRequestType || (exports.RateLimitedRequestType = {}));
|
|
5177
|
-
/**
|
|
5178
|
-
* The use type of a key.
|
|
5179
|
-
*
|
|
5180
|
-
* @author Daniel DeGroff
|
|
5181
|
-
*/
|
|
5182
|
-
var KeyUse;
|
|
5183
|
-
(function (KeyUse) {
|
|
5184
|
-
KeyUse["SignOnly"] = "SignOnly";
|
|
5185
|
-
KeyUse["SignAndVerify"] = "SignAndVerify";
|
|
5186
|
-
KeyUse["VerifyOnly"] = "VerifyOnly";
|
|
5187
|
-
})(KeyUse = exports.KeyUse || (exports.KeyUse = {}));
|
|
5188
|
-
/**
|
|
5189
|
-
* @author Daniel DeGroff
|
|
5190
|
-
*/
|
|
5191
|
-
var LambdaEngineType;
|
|
5192
|
-
(function (LambdaEngineType) {
|
|
5193
|
-
LambdaEngineType["GraalJS"] = "GraalJS";
|
|
5194
|
-
LambdaEngineType["Nashorn"] = "Nashorn";
|
|
5195
|
-
})(LambdaEngineType = exports.LambdaEngineType || (exports.LambdaEngineType = {}));
|
|
5196
|
-
/**
|
|
5197
|
-
* @author Brett Guy
|
|
5198
|
-
*/
|
|
5199
|
-
var ClientAuthenticationPolicy;
|
|
5200
|
-
(function (ClientAuthenticationPolicy) {
|
|
5201
|
-
ClientAuthenticationPolicy["Required"] = "Required";
|
|
5202
|
-
ClientAuthenticationPolicy["NotRequired"] = "NotRequired";
|
|
5203
|
-
ClientAuthenticationPolicy["NotRequiredWhenUsingPKCE"] = "NotRequiredWhenUsingPKCE";
|
|
5204
|
-
})(ClientAuthenticationPolicy = exports.ClientAuthenticationPolicy || (exports.ClientAuthenticationPolicy = {}));
|
|
5205
|
-
var BreachAction;
|
|
5206
|
-
(function (BreachAction) {
|
|
5207
|
-
BreachAction["Off"] = "Off";
|
|
5208
|
-
BreachAction["RecordOnly"] = "RecordOnly";
|
|
5209
|
-
BreachAction["NotifyUser"] = "NotifyUser";
|
|
5210
|
-
BreachAction["RequireChange"] = "RequireChange";
|
|
5211
|
-
})(BreachAction = exports.BreachAction || (exports.BreachAction = {}));
|
|
5212
|
-
/**
|
|
5213
|
-
* @author Daniel DeGroff
|
|
5214
|
-
*/
|
|
5215
|
-
var FormType;
|
|
5216
|
-
(function (FormType) {
|
|
5217
|
-
FormType["registration"] = "registration";
|
|
5218
|
-
FormType["adminRegistration"] = "adminRegistration";
|
|
5219
|
-
FormType["adminUser"] = "adminUser";
|
|
5220
|
-
FormType["selfServiceUser"] = "selfServiceUser";
|
|
5221
|
-
})(FormType = exports.FormType || (exports.FormType = {}));
|
|
5222
|
-
/**
|
|
5223
|
-
* @author Daniel DeGroff
|
|
5224
|
-
*/
|
|
5225
|
-
var SecureGeneratorType;
|
|
5226
|
-
(function (SecureGeneratorType) {
|
|
5227
|
-
SecureGeneratorType["randomDigits"] = "randomDigits";
|
|
5228
|
-
SecureGeneratorType["randomBytes"] = "randomBytes";
|
|
5229
|
-
SecureGeneratorType["randomAlpha"] = "randomAlpha";
|
|
5230
|
-
SecureGeneratorType["randomAlphaNumeric"] = "randomAlphaNumeric";
|
|
5231
|
-
})(SecureGeneratorType = exports.SecureGeneratorType || (exports.SecureGeneratorType = {}));
|
|
5232
5563
|
/**
|
|
5233
5564
|
* @author Daniel DeGroff
|
|
5234
5565
|
*/
|
|
5235
|
-
var
|
|
5236
|
-
(function (
|
|
5237
|
-
|
|
5238
|
-
|
|
5239
|
-
|
|
5240
|
-
|
|
5241
|
-
|
|
5242
|
-
|
|
5243
|
-
|
|
5566
|
+
var Sort;
|
|
5567
|
+
(function (Sort) {
|
|
5568
|
+
Sort["asc"] = "asc";
|
|
5569
|
+
Sort["desc"] = "desc";
|
|
5570
|
+
})(Sort = exports.Sort || (exports.Sort = {}));
|
|
5571
|
+
var SAMLLogoutBehavior;
|
|
5572
|
+
(function (SAMLLogoutBehavior) {
|
|
5573
|
+
SAMLLogoutBehavior["AllParticipants"] = "AllParticipants";
|
|
5574
|
+
SAMLLogoutBehavior["OnlyOriginator"] = "OnlyOriginator";
|
|
5575
|
+
})(SAMLLogoutBehavior = exports.SAMLLogoutBehavior || (exports.SAMLLogoutBehavior = {}));
|
|
5244
5576
|
/**
|
|
5245
5577
|
* The IdP behavior when no user link has been made yet.
|
|
5246
5578
|
*
|
|
@@ -5257,32 +5589,13 @@ var IdentityProviderLinkingStrategy;
|
|
|
5257
5589
|
IdentityProviderLinkingStrategy["LinkByUsernameForExistingUser"] = "LinkByUsernameForExistingUser";
|
|
5258
5590
|
IdentityProviderLinkingStrategy["Unsupported"] = "Unsupported";
|
|
5259
5591
|
})(IdentityProviderLinkingStrategy = exports.IdentityProviderLinkingStrategy || (exports.IdentityProviderLinkingStrategy = {}));
|
|
5260
|
-
|
|
5261
|
-
|
|
5262
|
-
|
|
5263
|
-
|
|
5264
|
-
|
|
5265
|
-
|
|
5266
|
-
|
|
5267
|
-
})(IPAccessControlEntryAction = exports.IPAccessControlEntryAction || (exports.IPAccessControlEntryAction = {}));
|
|
5268
|
-
/**
|
|
5269
|
-
* The phases of a time-based user action.
|
|
5270
|
-
*
|
|
5271
|
-
* @author Brian Pontarelli
|
|
5272
|
-
*/
|
|
5273
|
-
var UserActionPhase;
|
|
5274
|
-
(function (UserActionPhase) {
|
|
5275
|
-
UserActionPhase["start"] = "start";
|
|
5276
|
-
UserActionPhase["modify"] = "modify";
|
|
5277
|
-
UserActionPhase["cancel"] = "cancel";
|
|
5278
|
-
UserActionPhase["end"] = "end";
|
|
5279
|
-
})(UserActionPhase = exports.UserActionPhase || (exports.UserActionPhase = {}));
|
|
5280
|
-
var EmailSecurityType;
|
|
5281
|
-
(function (EmailSecurityType) {
|
|
5282
|
-
EmailSecurityType["NONE"] = "NONE";
|
|
5283
|
-
EmailSecurityType["SSL"] = "SSL";
|
|
5284
|
-
EmailSecurityType["TLS"] = "TLS";
|
|
5285
|
-
})(EmailSecurityType = exports.EmailSecurityType || (exports.EmailSecurityType = {}));
|
|
5592
|
+
var BreachAction;
|
|
5593
|
+
(function (BreachAction) {
|
|
5594
|
+
BreachAction["Off"] = "Off";
|
|
5595
|
+
BreachAction["RecordOnly"] = "RecordOnly";
|
|
5596
|
+
BreachAction["NotifyUser"] = "NotifyUser";
|
|
5597
|
+
BreachAction["RequireChange"] = "RequireChange";
|
|
5598
|
+
})(BreachAction = exports.BreachAction || (exports.BreachAction = {}));
|
|
5286
5599
|
/**
|
|
5287
5600
|
* Event Log Type
|
|
5288
5601
|
*
|
|
@@ -5295,17 +5608,37 @@ var EventLogType;
|
|
|
5295
5608
|
EventLogType["Error"] = "Error";
|
|
5296
5609
|
})(EventLogType = exports.EventLogType || (exports.EventLogType = {}));
|
|
5297
5610
|
/**
|
|
5298
|
-
*
|
|
5611
|
+
* Available JSON Web Algorithms (JWA) as described in RFC 7518 available for this JWT implementation.
|
|
5612
|
+
*
|
|
5613
|
+
* @author Daniel DeGroff
|
|
5299
5614
|
*/
|
|
5300
|
-
var
|
|
5301
|
-
(function (
|
|
5302
|
-
|
|
5303
|
-
|
|
5304
|
-
|
|
5305
|
-
|
|
5306
|
-
|
|
5307
|
-
|
|
5308
|
-
|
|
5615
|
+
var Algorithm;
|
|
5616
|
+
(function (Algorithm) {
|
|
5617
|
+
Algorithm["ES256"] = "ES256";
|
|
5618
|
+
Algorithm["ES384"] = "ES384";
|
|
5619
|
+
Algorithm["ES512"] = "ES512";
|
|
5620
|
+
Algorithm["HS256"] = "HS256";
|
|
5621
|
+
Algorithm["HS384"] = "HS384";
|
|
5622
|
+
Algorithm["HS512"] = "HS512";
|
|
5623
|
+
Algorithm["PS256"] = "PS256";
|
|
5624
|
+
Algorithm["PS384"] = "PS384";
|
|
5625
|
+
Algorithm["PS512"] = "PS512";
|
|
5626
|
+
Algorithm["RS256"] = "RS256";
|
|
5627
|
+
Algorithm["RS384"] = "RS384";
|
|
5628
|
+
Algorithm["RS512"] = "RS512";
|
|
5629
|
+
Algorithm["none"] = "none";
|
|
5630
|
+
})(Algorithm = exports.Algorithm || (exports.Algorithm = {}));
|
|
5631
|
+
/**
|
|
5632
|
+
* The use type of a key.
|
|
5633
|
+
*
|
|
5634
|
+
* @author Daniel DeGroff
|
|
5635
|
+
*/
|
|
5636
|
+
var KeyUse;
|
|
5637
|
+
(function (KeyUse) {
|
|
5638
|
+
KeyUse["SignOnly"] = "SignOnly";
|
|
5639
|
+
KeyUse["SignAndVerify"] = "SignAndVerify";
|
|
5640
|
+
KeyUse["VerifyOnly"] = "VerifyOnly";
|
|
5641
|
+
})(KeyUse = exports.KeyUse || (exports.KeyUse = {}));
|
|
5309
5642
|
var FamilyRole;
|
|
5310
5643
|
(function (FamilyRole) {
|
|
5311
5644
|
FamilyRole["Child"] = "Child";
|
|
@@ -5313,50 +5646,77 @@ var FamilyRole;
|
|
|
5313
5646
|
FamilyRole["Adult"] = "Adult";
|
|
5314
5647
|
})(FamilyRole = exports.FamilyRole || (exports.FamilyRole = {}));
|
|
5315
5648
|
/**
|
|
5316
|
-
*
|
|
5649
|
+
* The transaction types for Webhooks and other event systems within FusionAuth.
|
|
5650
|
+
*
|
|
5651
|
+
* @author Brian Pontarelli
|
|
5317
5652
|
*/
|
|
5318
|
-
var
|
|
5319
|
-
(function (
|
|
5320
|
-
|
|
5321
|
-
|
|
5322
|
-
|
|
5323
|
-
|
|
5324
|
-
|
|
5325
|
-
|
|
5326
|
-
|
|
5327
|
-
|
|
5328
|
-
|
|
5329
|
-
|
|
5330
|
-
|
|
5331
|
-
|
|
5332
|
-
|
|
5333
|
-
|
|
5334
|
-
|
|
5335
|
-
|
|
5336
|
-
|
|
5337
|
-
|
|
5338
|
-
KeyType["RSA"] = "RSA";
|
|
5339
|
-
KeyType["HMAC"] = "HMAC";
|
|
5340
|
-
})(KeyType = exports.KeyType || (exports.KeyType = {}));
|
|
5653
|
+
var TransactionType;
|
|
5654
|
+
(function (TransactionType) {
|
|
5655
|
+
TransactionType["None"] = "None";
|
|
5656
|
+
TransactionType["Any"] = "Any";
|
|
5657
|
+
TransactionType["SimpleMajority"] = "SimpleMajority";
|
|
5658
|
+
TransactionType["SuperMajority"] = "SuperMajority";
|
|
5659
|
+
TransactionType["AbsoluteMajority"] = "AbsoluteMajority";
|
|
5660
|
+
})(TransactionType = exports.TransactionType || (exports.TransactionType = {}));
|
|
5661
|
+
/**
|
|
5662
|
+
* Used to express whether the Relying Party requires <a href="https://www.w3.org/TR/webauthn-2/#user-verification">user verification</a> for the
|
|
5663
|
+
* current operation.
|
|
5664
|
+
*
|
|
5665
|
+
* @author Spencer Witt
|
|
5666
|
+
*/
|
|
5667
|
+
var UserVerificationRequirement;
|
|
5668
|
+
(function (UserVerificationRequirement) {
|
|
5669
|
+
UserVerificationRequirement["required"] = "required";
|
|
5670
|
+
UserVerificationRequirement["preferred"] = "preferred";
|
|
5671
|
+
UserVerificationRequirement["discouraged"] = "discouraged";
|
|
5672
|
+
})(UserVerificationRequirement = exports.UserVerificationRequirement || (exports.UserVerificationRequirement = {}));
|
|
5341
5673
|
/**
|
|
5674
|
+
* Steam API modes.
|
|
5675
|
+
*
|
|
5342
5676
|
* @author Daniel DeGroff
|
|
5343
5677
|
*/
|
|
5344
|
-
var
|
|
5345
|
-
(function (
|
|
5346
|
-
|
|
5347
|
-
|
|
5348
|
-
|
|
5349
|
-
|
|
5678
|
+
var SteamAPIMode;
|
|
5679
|
+
(function (SteamAPIMode) {
|
|
5680
|
+
SteamAPIMode["Public"] = "Public";
|
|
5681
|
+
SteamAPIMode["Partner"] = "Partner";
|
|
5682
|
+
})(SteamAPIMode = exports.SteamAPIMode || (exports.SteamAPIMode = {}));
|
|
5683
|
+
/**
|
|
5684
|
+
* @author Trevor Smith
|
|
5685
|
+
*/
|
|
5686
|
+
var ChangePasswordReason;
|
|
5687
|
+
(function (ChangePasswordReason) {
|
|
5688
|
+
ChangePasswordReason["Administrative"] = "Administrative";
|
|
5689
|
+
ChangePasswordReason["Breached"] = "Breached";
|
|
5690
|
+
ChangePasswordReason["Expired"] = "Expired";
|
|
5691
|
+
ChangePasswordReason["Validation"] = "Validation";
|
|
5692
|
+
})(ChangePasswordReason = exports.ChangePasswordReason || (exports.ChangePasswordReason = {}));
|
|
5693
|
+
var EmailSecurityType;
|
|
5694
|
+
(function (EmailSecurityType) {
|
|
5695
|
+
EmailSecurityType["NONE"] = "NONE";
|
|
5696
|
+
EmailSecurityType["SSL"] = "SSL";
|
|
5697
|
+
EmailSecurityType["TLS"] = "TLS";
|
|
5698
|
+
})(EmailSecurityType = exports.EmailSecurityType || (exports.EmailSecurityType = {}));
|
|
5350
5699
|
/**
|
|
5351
|
-
*
|
|
5352
|
-
*
|
|
5353
|
-
* @author Daniel DeGroff
|
|
5700
|
+
* @author Brian Pontarelli
|
|
5354
5701
|
*/
|
|
5355
|
-
var
|
|
5356
|
-
(function (
|
|
5357
|
-
|
|
5358
|
-
|
|
5359
|
-
|
|
5702
|
+
var ExpiryUnit;
|
|
5703
|
+
(function (ExpiryUnit) {
|
|
5704
|
+
ExpiryUnit["MINUTES"] = "MINUTES";
|
|
5705
|
+
ExpiryUnit["HOURS"] = "HOURS";
|
|
5706
|
+
ExpiryUnit["DAYS"] = "DAYS";
|
|
5707
|
+
ExpiryUnit["WEEKS"] = "WEEKS";
|
|
5708
|
+
ExpiryUnit["MONTHS"] = "MONTHS";
|
|
5709
|
+
ExpiryUnit["YEARS"] = "YEARS";
|
|
5710
|
+
})(ExpiryUnit = exports.ExpiryUnit || (exports.ExpiryUnit = {}));
|
|
5711
|
+
/**
|
|
5712
|
+
* @author Brett Guy
|
|
5713
|
+
*/
|
|
5714
|
+
var MessengerType;
|
|
5715
|
+
(function (MessengerType) {
|
|
5716
|
+
MessengerType["Generic"] = "Generic";
|
|
5717
|
+
MessengerType["Kafka"] = "Kafka";
|
|
5718
|
+
MessengerType["Twilio"] = "Twilio";
|
|
5719
|
+
})(MessengerType = exports.MessengerType || (exports.MessengerType = {}));
|
|
5360
5720
|
/**
|
|
5361
5721
|
* @author Daniel DeGroff
|
|
5362
5722
|
*/
|
|
@@ -5382,50 +5742,11 @@ var IdentityProviderType;
|
|
|
5382
5742
|
/**
|
|
5383
5743
|
* @author Daniel DeGroff
|
|
5384
5744
|
*/
|
|
5385
|
-
var
|
|
5386
|
-
(function (
|
|
5387
|
-
|
|
5388
|
-
|
|
5389
|
-
})(
|
|
5390
|
-
/**
|
|
5391
|
-
* @author Daniel DeGroff
|
|
5392
|
-
*/
|
|
5393
|
-
var BreachedPasswordStatus;
|
|
5394
|
-
(function (BreachedPasswordStatus) {
|
|
5395
|
-
BreachedPasswordStatus["None"] = "None";
|
|
5396
|
-
BreachedPasswordStatus["ExactMatch"] = "ExactMatch";
|
|
5397
|
-
BreachedPasswordStatus["SubAddressMatch"] = "SubAddressMatch";
|
|
5398
|
-
BreachedPasswordStatus["PasswordOnly"] = "PasswordOnly";
|
|
5399
|
-
BreachedPasswordStatus["CommonPassword"] = "CommonPassword";
|
|
5400
|
-
})(BreachedPasswordStatus = exports.BreachedPasswordStatus || (exports.BreachedPasswordStatus = {}));
|
|
5401
|
-
var TOTPAlgorithm;
|
|
5402
|
-
(function (TOTPAlgorithm) {
|
|
5403
|
-
TOTPAlgorithm["HmacSHA1"] = "HmacSHA1";
|
|
5404
|
-
TOTPAlgorithm["HmacSHA256"] = "HmacSHA256";
|
|
5405
|
-
TOTPAlgorithm["HmacSHA512"] = "HmacSHA512";
|
|
5406
|
-
})(TOTPAlgorithm = exports.TOTPAlgorithm || (exports.TOTPAlgorithm = {}));
|
|
5407
|
-
/**
|
|
5408
|
-
* XML canonicalization method enumeration. This is used for the IdP and SP side of FusionAuth SAML.
|
|
5409
|
-
*
|
|
5410
|
-
* @author Brian Pontarelli
|
|
5411
|
-
*/
|
|
5412
|
-
var CanonicalizationMethod;
|
|
5413
|
-
(function (CanonicalizationMethod) {
|
|
5414
|
-
CanonicalizationMethod["exclusive"] = "exclusive";
|
|
5415
|
-
CanonicalizationMethod["exclusive_with_comments"] = "exclusive_with_comments";
|
|
5416
|
-
CanonicalizationMethod["inclusive"] = "inclusive";
|
|
5417
|
-
CanonicalizationMethod["inclusive_with_comments"] = "inclusive_with_comments";
|
|
5418
|
-
})(CanonicalizationMethod = exports.CanonicalizationMethod || (exports.CanonicalizationMethod = {}));
|
|
5419
|
-
/**
|
|
5420
|
-
* @author Trevor Smith
|
|
5421
|
-
*/
|
|
5422
|
-
var ChangePasswordReason;
|
|
5423
|
-
(function (ChangePasswordReason) {
|
|
5424
|
-
ChangePasswordReason["Administrative"] = "Administrative";
|
|
5425
|
-
ChangePasswordReason["Breached"] = "Breached";
|
|
5426
|
-
ChangePasswordReason["Expired"] = "Expired";
|
|
5427
|
-
ChangePasswordReason["Validation"] = "Validation";
|
|
5428
|
-
})(ChangePasswordReason = exports.ChangePasswordReason || (exports.ChangePasswordReason = {}));
|
|
5745
|
+
var SystemTrustedProxyConfigurationPolicy;
|
|
5746
|
+
(function (SystemTrustedProxyConfigurationPolicy) {
|
|
5747
|
+
SystemTrustedProxyConfigurationPolicy["All"] = "All";
|
|
5748
|
+
SystemTrustedProxyConfigurationPolicy["OnlyConfigured"] = "OnlyConfigured";
|
|
5749
|
+
})(SystemTrustedProxyConfigurationPolicy = exports.SystemTrustedProxyConfigurationPolicy || (exports.SystemTrustedProxyConfigurationPolicy = {}));
|
|
5429
5750
|
/**
|
|
5430
5751
|
* Models the event types that FusionAuth produces.
|
|
5431
5752
|
*
|
|
@@ -5453,278 +5774,126 @@ var EventType;
|
|
|
5453
5774
|
EventType["GroupUpdateComplete"] = "group.update.complete";
|
|
5454
5775
|
EventType["UserAction"] = "user.action";
|
|
5455
5776
|
EventType["UserBulkCreate"] = "user.bulk.create";
|
|
5456
|
-
EventType["UserCreate"] = "user.create";
|
|
5457
|
-
EventType["UserCreateComplete"] = "user.create.complete";
|
|
5458
|
-
EventType["UserDeactivate"] = "user.deactivate";
|
|
5459
|
-
EventType["UserDelete"] = "user.delete";
|
|
5460
|
-
EventType["UserDeleteComplete"] = "user.delete.complete";
|
|
5461
|
-
EventType["UserEmailUpdate"] = "user.email.update";
|
|
5462
|
-
EventType["UserEmailVerified"] = "user.email.verified";
|
|
5463
|
-
EventType["UserIdentityProviderLink"] = "user.identity-provider.link";
|
|
5464
|
-
EventType["UserIdentityProviderUnlink"] = "user.identity-provider.unlink";
|
|
5465
|
-
EventType["UserLoginIdDuplicateOnCreate"] = "user.loginId.duplicate.create";
|
|
5466
|
-
EventType["UserLoginIdDuplicateOnUpdate"] = "user.loginId.duplicate.update";
|
|
5467
|
-
EventType["UserLoginFailed"] = "user.login.failed";
|
|
5468
|
-
EventType["UserLoginNewDevice"] = "user.login.new-device";
|
|
5469
|
-
EventType["UserLoginSuccess"] = "user.login.success";
|
|
5470
|
-
EventType["UserLoginSuspicious"] = "user.login.suspicious";
|
|
5471
|
-
EventType["UserPasswordBreach"] = "user.password.breach";
|
|
5472
|
-
EventType["UserPasswordResetSend"] = "user.password.reset.send";
|
|
5473
|
-
EventType["UserPasswordResetStart"] = "user.password.reset.start";
|
|
5474
|
-
EventType["UserPasswordResetSuccess"] = "user.password.reset.success";
|
|
5475
|
-
EventType["UserPasswordUpdate"] = "user.password.update";
|
|
5476
|
-
EventType["UserReactivate"] = "user.reactivate";
|
|
5477
|
-
EventType["UserRegistrationCreate"] = "user.registration.create";
|
|
5478
|
-
EventType["UserRegistrationCreateComplete"] = "user.registration.create.complete";
|
|
5479
|
-
EventType["UserRegistrationDelete"] = "user.registration.delete";
|
|
5480
|
-
EventType["UserRegistrationDeleteComplete"] = "user.registration.delete.complete";
|
|
5481
|
-
EventType["UserRegistrationUpdate"] = "user.registration.update";
|
|
5482
|
-
EventType["UserRegistrationUpdateComplete"] = "user.registration.update.complete";
|
|
5483
|
-
EventType["UserRegistrationVerified"] = "user.registration.verified";
|
|
5484
|
-
EventType["UserTwoFactorMethodAdd"] = "user.two-factor.method.add";
|
|
5485
|
-
EventType["UserTwoFactorMethodRemove"] = "user.two-factor.method.remove";
|
|
5486
|
-
EventType["UserUpdate"] = "user.update";
|
|
5487
|
-
EventType["UserUpdateComplete"] = "user.update.complete";
|
|
5488
|
-
EventType["Test"] = "test";
|
|
5489
|
-
})(EventType = exports.EventType || (exports.EventType = {}));
|
|
5490
|
-
|
|
5491
|
-
|
|
5492
|
-
|
|
5493
|
-
|
|
5494
|
-
|
|
5495
|
-
|
|
5496
|
-
|
|
5497
|
-
|
|
5498
|
-
|
|
5499
|
-
|
|
5500
|
-
|
|
5501
|
-
|
|
5502
|
-
var
|
|
5503
|
-
(function (
|
|
5504
|
-
|
|
5505
|
-
|
|
5506
|
-
|
|
5507
|
-
* @author Daniel DeGroff
|
|
5508
|
-
*/
|
|
5509
|
-
var SystemTrustedProxyConfigurationPolicy;
|
|
5510
|
-
(function (SystemTrustedProxyConfigurationPolicy) {
|
|
5511
|
-
SystemTrustedProxyConfigurationPolicy["All"] = "All";
|
|
5512
|
-
SystemTrustedProxyConfigurationPolicy["OnlyConfigured"] = "OnlyConfigured";
|
|
5513
|
-
})(SystemTrustedProxyConfigurationPolicy = exports.SystemTrustedProxyConfigurationPolicy || (exports.SystemTrustedProxyConfigurationPolicy = {}));
|
|
5514
|
-
var ClientAuthenticationMethod;
|
|
5515
|
-
(function (ClientAuthenticationMethod) {
|
|
5516
|
-
ClientAuthenticationMethod["none"] = "none";
|
|
5517
|
-
ClientAuthenticationMethod["client_secret_basic"] = "client_secret_basic";
|
|
5518
|
-
ClientAuthenticationMethod["client_secret_post"] = "client_secret_post";
|
|
5519
|
-
})(ClientAuthenticationMethod = exports.ClientAuthenticationMethod || (exports.ClientAuthenticationMethod = {}));
|
|
5520
|
-
/**
|
|
5521
|
-
* Models a consent.
|
|
5522
|
-
*
|
|
5523
|
-
* @author Daniel DeGroff
|
|
5524
|
-
*/
|
|
5525
|
-
var ConsentStatus;
|
|
5526
|
-
(function (ConsentStatus) {
|
|
5527
|
-
ConsentStatus["Active"] = "Active";
|
|
5528
|
-
ConsentStatus["Revoked"] = "Revoked";
|
|
5529
|
-
})(ConsentStatus = exports.ConsentStatus || (exports.ConsentStatus = {}));
|
|
5530
|
-
/**
|
|
5531
|
-
* @author Daniel DeGroff
|
|
5532
|
-
*/
|
|
5533
|
-
var ApplicationMultiFactorTrustPolicy;
|
|
5534
|
-
(function (ApplicationMultiFactorTrustPolicy) {
|
|
5535
|
-
ApplicationMultiFactorTrustPolicy["Any"] = "Any";
|
|
5536
|
-
ApplicationMultiFactorTrustPolicy["This"] = "This";
|
|
5537
|
-
ApplicationMultiFactorTrustPolicy["None"] = "None";
|
|
5538
|
-
})(ApplicationMultiFactorTrustPolicy = exports.ApplicationMultiFactorTrustPolicy || (exports.ApplicationMultiFactorTrustPolicy = {}));
|
|
5539
|
-
/**
|
|
5540
|
-
* @author Brett Pontarelli
|
|
5541
|
-
*/
|
|
5542
|
-
var CaptchaMethod;
|
|
5543
|
-
(function (CaptchaMethod) {
|
|
5544
|
-
CaptchaMethod["GoogleRecaptchaV2"] = "GoogleRecaptchaV2";
|
|
5545
|
-
CaptchaMethod["GoogleRecaptchaV3"] = "GoogleRecaptchaV3";
|
|
5546
|
-
CaptchaMethod["HCaptcha"] = "HCaptcha";
|
|
5547
|
-
CaptchaMethod["HCaptchaEnterprise"] = "HCaptchaEnterprise";
|
|
5548
|
-
})(CaptchaMethod = exports.CaptchaMethod || (exports.CaptchaMethod = {}));
|
|
5549
|
-
/**
|
|
5550
|
-
* Available JSON Web Algorithms (JWA) as described in RFC 7518 available for this JWT implementation.
|
|
5551
|
-
*
|
|
5552
|
-
* @author Daniel DeGroff
|
|
5553
|
-
*/
|
|
5554
|
-
var Algorithm;
|
|
5555
|
-
(function (Algorithm) {
|
|
5556
|
-
Algorithm["ES256"] = "ES256";
|
|
5557
|
-
Algorithm["ES384"] = "ES384";
|
|
5558
|
-
Algorithm["ES512"] = "ES512";
|
|
5559
|
-
Algorithm["HS256"] = "HS256";
|
|
5560
|
-
Algorithm["HS384"] = "HS384";
|
|
5561
|
-
Algorithm["HS512"] = "HS512";
|
|
5562
|
-
Algorithm["PS256"] = "PS256";
|
|
5563
|
-
Algorithm["PS384"] = "PS384";
|
|
5564
|
-
Algorithm["PS512"] = "PS512";
|
|
5565
|
-
Algorithm["RS256"] = "RS256";
|
|
5566
|
-
Algorithm["RS384"] = "RS384";
|
|
5567
|
-
Algorithm["RS512"] = "RS512";
|
|
5568
|
-
Algorithm["none"] = "none";
|
|
5569
|
-
})(Algorithm = exports.Algorithm || (exports.Algorithm = {}));
|
|
5570
|
-
/**
|
|
5571
|
-
* Status for content like usernames, profile attributes, etc.
|
|
5572
|
-
*
|
|
5573
|
-
* @author Brian Pontarelli
|
|
5574
|
-
*/
|
|
5575
|
-
var ContentStatus;
|
|
5576
|
-
(function (ContentStatus) {
|
|
5577
|
-
ContentStatus["ACTIVE"] = "ACTIVE";
|
|
5578
|
-
ContentStatus["PENDING"] = "PENDING";
|
|
5579
|
-
ContentStatus["REJECTED"] = "REJECTED";
|
|
5580
|
-
})(ContentStatus = exports.ContentStatus || (exports.ContentStatus = {}));
|
|
5581
|
-
var LoginIdType;
|
|
5582
|
-
(function (LoginIdType) {
|
|
5583
|
-
LoginIdType["email"] = "email";
|
|
5584
|
-
LoginIdType["username"] = "username";
|
|
5585
|
-
})(LoginIdType = exports.LoginIdType || (exports.LoginIdType = {}));
|
|
5586
|
-
var RegistrationType;
|
|
5587
|
-
(function (RegistrationType) {
|
|
5588
|
-
RegistrationType["basic"] = "basic";
|
|
5589
|
-
RegistrationType["advanced"] = "advanced";
|
|
5590
|
-
})(RegistrationType = exports.RegistrationType || (exports.RegistrationType = {}));
|
|
5591
|
-
var SAMLLogoutBehavior;
|
|
5592
|
-
(function (SAMLLogoutBehavior) {
|
|
5593
|
-
SAMLLogoutBehavior["AllParticipants"] = "AllParticipants";
|
|
5594
|
-
SAMLLogoutBehavior["OnlyOriginator"] = "OnlyOriginator";
|
|
5595
|
-
})(SAMLLogoutBehavior = exports.SAMLLogoutBehavior || (exports.SAMLLogoutBehavior = {}));
|
|
5596
|
-
var XMLSignatureLocation;
|
|
5597
|
-
(function (XMLSignatureLocation) {
|
|
5598
|
-
XMLSignatureLocation["Assertion"] = "Assertion";
|
|
5599
|
-
XMLSignatureLocation["Response"] = "Response";
|
|
5600
|
-
})(XMLSignatureLocation = exports.XMLSignatureLocation || (exports.XMLSignatureLocation = {}));
|
|
5601
|
-
/**
|
|
5602
|
-
* Used to communicate whether and how authenticator attestation should be delivered to the Relying Party
|
|
5603
|
-
*
|
|
5604
|
-
* @author Spencer Witt
|
|
5605
|
-
*/
|
|
5606
|
-
var AttestationConveyancePreference;
|
|
5607
|
-
(function (AttestationConveyancePreference) {
|
|
5608
|
-
AttestationConveyancePreference["none"] = "none";
|
|
5609
|
-
AttestationConveyancePreference["indirect"] = "indirect";
|
|
5610
|
-
AttestationConveyancePreference["direct"] = "direct";
|
|
5611
|
-
AttestationConveyancePreference["enterprise"] = "enterprise";
|
|
5612
|
-
})(AttestationConveyancePreference = exports.AttestationConveyancePreference || (exports.AttestationConveyancePreference = {}));
|
|
5613
|
-
/**
|
|
5614
|
-
* Used to indicate what type of attestation was included in the authenticator response for a given WebAuthn credential at the time it was created
|
|
5615
|
-
*
|
|
5616
|
-
* @author Spencer Witt
|
|
5617
|
-
*/
|
|
5618
|
-
var AttestationType;
|
|
5619
|
-
(function (AttestationType) {
|
|
5620
|
-
AttestationType["basic"] = "basic";
|
|
5621
|
-
AttestationType["self"] = "self";
|
|
5622
|
-
AttestationType["attestationCa"] = "attestationCa";
|
|
5623
|
-
AttestationType["anonymizationCa"] = "anonymizationCa";
|
|
5624
|
-
AttestationType["none"] = "none";
|
|
5625
|
-
})(AttestationType = exports.AttestationType || (exports.AttestationType = {}));
|
|
5626
|
-
/**
|
|
5627
|
-
* Describes the <a href="https://www.w3.org/TR/webauthn-2/#authenticator-attachment-modality">authenticator attachment modality</a>.
|
|
5628
|
-
*
|
|
5629
|
-
* @author Spencer Witt
|
|
5630
|
-
*/
|
|
5631
|
-
var AuthenticatorAttachment;
|
|
5632
|
-
(function (AuthenticatorAttachment) {
|
|
5633
|
-
AuthenticatorAttachment["platform"] = "platform";
|
|
5634
|
-
AuthenticatorAttachment["crossPlatform"] = "crossPlatform";
|
|
5635
|
-
})(AuthenticatorAttachment = exports.AuthenticatorAttachment || (exports.AuthenticatorAttachment = {}));
|
|
5777
|
+
EventType["UserCreate"] = "user.create";
|
|
5778
|
+
EventType["UserCreateComplete"] = "user.create.complete";
|
|
5779
|
+
EventType["UserDeactivate"] = "user.deactivate";
|
|
5780
|
+
EventType["UserDelete"] = "user.delete";
|
|
5781
|
+
EventType["UserDeleteComplete"] = "user.delete.complete";
|
|
5782
|
+
EventType["UserEmailUpdate"] = "user.email.update";
|
|
5783
|
+
EventType["UserEmailVerified"] = "user.email.verified";
|
|
5784
|
+
EventType["UserIdentityProviderLink"] = "user.identity-provider.link";
|
|
5785
|
+
EventType["UserIdentityProviderUnlink"] = "user.identity-provider.unlink";
|
|
5786
|
+
EventType["UserLoginIdDuplicateOnCreate"] = "user.loginId.duplicate.create";
|
|
5787
|
+
EventType["UserLoginIdDuplicateOnUpdate"] = "user.loginId.duplicate.update";
|
|
5788
|
+
EventType["UserLoginFailed"] = "user.login.failed";
|
|
5789
|
+
EventType["UserLoginNewDevice"] = "user.login.new-device";
|
|
5790
|
+
EventType["UserLoginSuccess"] = "user.login.success";
|
|
5791
|
+
EventType["UserLoginSuspicious"] = "user.login.suspicious";
|
|
5792
|
+
EventType["UserPasswordBreach"] = "user.password.breach";
|
|
5793
|
+
EventType["UserPasswordResetSend"] = "user.password.reset.send";
|
|
5794
|
+
EventType["UserPasswordResetStart"] = "user.password.reset.start";
|
|
5795
|
+
EventType["UserPasswordResetSuccess"] = "user.password.reset.success";
|
|
5796
|
+
EventType["UserPasswordUpdate"] = "user.password.update";
|
|
5797
|
+
EventType["UserReactivate"] = "user.reactivate";
|
|
5798
|
+
EventType["UserRegistrationCreate"] = "user.registration.create";
|
|
5799
|
+
EventType["UserRegistrationCreateComplete"] = "user.registration.create.complete";
|
|
5800
|
+
EventType["UserRegistrationDelete"] = "user.registration.delete";
|
|
5801
|
+
EventType["UserRegistrationDeleteComplete"] = "user.registration.delete.complete";
|
|
5802
|
+
EventType["UserRegistrationUpdate"] = "user.registration.update";
|
|
5803
|
+
EventType["UserRegistrationUpdateComplete"] = "user.registration.update.complete";
|
|
5804
|
+
EventType["UserRegistrationVerified"] = "user.registration.verified";
|
|
5805
|
+
EventType["UserTwoFactorMethodAdd"] = "user.two-factor.method.add";
|
|
5806
|
+
EventType["UserTwoFactorMethodRemove"] = "user.two-factor.method.remove";
|
|
5807
|
+
EventType["UserUpdate"] = "user.update";
|
|
5808
|
+
EventType["UserUpdateComplete"] = "user.update.complete";
|
|
5809
|
+
EventType["Test"] = "test";
|
|
5810
|
+
})(EventType = exports.EventType || (exports.EventType = {}));
|
|
5811
|
+
var TOTPAlgorithm;
|
|
5812
|
+
(function (TOTPAlgorithm) {
|
|
5813
|
+
TOTPAlgorithm["HmacSHA1"] = "HmacSHA1";
|
|
5814
|
+
TOTPAlgorithm["HmacSHA256"] = "HmacSHA256";
|
|
5815
|
+
TOTPAlgorithm["HmacSHA512"] = "HmacSHA512";
|
|
5816
|
+
})(TOTPAlgorithm = exports.TOTPAlgorithm || (exports.TOTPAlgorithm = {}));
|
|
5817
|
+
var LDAPSecurityMethod;
|
|
5818
|
+
(function (LDAPSecurityMethod) {
|
|
5819
|
+
LDAPSecurityMethod["None"] = "None";
|
|
5820
|
+
LDAPSecurityMethod["LDAPS"] = "LDAPS";
|
|
5821
|
+
LDAPSecurityMethod["StartTLS"] = "StartTLS";
|
|
5822
|
+
})(LDAPSecurityMethod = exports.LDAPSecurityMethod || (exports.LDAPSecurityMethod = {}));
|
|
5823
|
+
var UniqueUsernameStrategy;
|
|
5824
|
+
(function (UniqueUsernameStrategy) {
|
|
5825
|
+
UniqueUsernameStrategy["Always"] = "Always";
|
|
5826
|
+
UniqueUsernameStrategy["OnCollision"] = "OnCollision";
|
|
5827
|
+
})(UniqueUsernameStrategy = exports.UniqueUsernameStrategy || (exports.UniqueUsernameStrategy = {}));
|
|
5636
5828
|
/**
|
|
5637
|
-
*
|
|
5638
|
-
*
|
|
5639
|
-
* @author Spencer Witt
|
|
5829
|
+
* @author Daniel DeGroff
|
|
5640
5830
|
*/
|
|
5641
|
-
var
|
|
5642
|
-
(function (
|
|
5643
|
-
|
|
5644
|
-
|
|
5645
|
-
|
|
5646
|
-
})(AuthenticatorAttachmentPreference = exports.AuthenticatorAttachmentPreference || (exports.AuthenticatorAttachmentPreference = {}));
|
|
5831
|
+
var VerificationStrategy;
|
|
5832
|
+
(function (VerificationStrategy) {
|
|
5833
|
+
VerificationStrategy["ClickableLink"] = "ClickableLink";
|
|
5834
|
+
VerificationStrategy["FormField"] = "FormField";
|
|
5835
|
+
})(VerificationStrategy = exports.VerificationStrategy || (exports.VerificationStrategy = {}));
|
|
5647
5836
|
/**
|
|
5648
|
-
*
|
|
5649
|
-
* href="https://www.iana.org/assignments/cose/cose.xhtml#algorithms">IANA COSE Algorithms registry</a>
|
|
5650
|
-
*
|
|
5651
|
-
* @author Spencer Witt
|
|
5837
|
+
* @author Daniel DeGroff
|
|
5652
5838
|
*/
|
|
5653
|
-
var
|
|
5654
|
-
(function (
|
|
5655
|
-
|
|
5656
|
-
|
|
5657
|
-
|
|
5658
|
-
|
|
5659
|
-
|
|
5660
|
-
CoseAlgorithmIdentifier["RS512"] = "SHA512withRSA";
|
|
5661
|
-
CoseAlgorithmIdentifier["PS256"] = "SHA-256";
|
|
5662
|
-
CoseAlgorithmIdentifier["PS384"] = "SHA-384";
|
|
5663
|
-
CoseAlgorithmIdentifier["PS512"] = "SHA-512";
|
|
5664
|
-
})(CoseAlgorithmIdentifier = exports.CoseAlgorithmIdentifier || (exports.CoseAlgorithmIdentifier = {}));
|
|
5839
|
+
var SecureGeneratorType;
|
|
5840
|
+
(function (SecureGeneratorType) {
|
|
5841
|
+
SecureGeneratorType["randomDigits"] = "randomDigits";
|
|
5842
|
+
SecureGeneratorType["randomBytes"] = "randomBytes";
|
|
5843
|
+
SecureGeneratorType["randomAlpha"] = "randomAlpha";
|
|
5844
|
+
SecureGeneratorType["randomAlphaNumeric"] = "randomAlphaNumeric";
|
|
5845
|
+
})(SecureGeneratorType = exports.SecureGeneratorType || (exports.SecureGeneratorType = {}));
|
|
5665
5846
|
/**
|
|
5666
|
-
*
|
|
5847
|
+
* XML canonicalization method enumeration. This is used for the IdP and SP side of FusionAuth SAML.
|
|
5667
5848
|
*
|
|
5668
|
-
* @author
|
|
5849
|
+
* @author Brian Pontarelli
|
|
5669
5850
|
*/
|
|
5670
|
-
var
|
|
5671
|
-
(function (
|
|
5672
|
-
|
|
5673
|
-
|
|
5674
|
-
|
|
5675
|
-
|
|
5676
|
-
|
|
5677
|
-
CoseEllipticCurve["X448"] = "X448";
|
|
5678
|
-
CoseEllipticCurve["Ed25519"] = "Ed25519";
|
|
5679
|
-
CoseEllipticCurve["Ed448"] = "Ed448";
|
|
5680
|
-
CoseEllipticCurve["Secp256k1"] = "Secp256k1";
|
|
5681
|
-
})(CoseEllipticCurve = exports.CoseEllipticCurve || (exports.CoseEllipticCurve = {}));
|
|
5851
|
+
var CanonicalizationMethod;
|
|
5852
|
+
(function (CanonicalizationMethod) {
|
|
5853
|
+
CanonicalizationMethod["exclusive"] = "exclusive";
|
|
5854
|
+
CanonicalizationMethod["exclusive_with_comments"] = "exclusive_with_comments";
|
|
5855
|
+
CanonicalizationMethod["inclusive"] = "inclusive";
|
|
5856
|
+
CanonicalizationMethod["inclusive_with_comments"] = "inclusive_with_comments";
|
|
5857
|
+
})(CanonicalizationMethod = exports.CanonicalizationMethod || (exports.CanonicalizationMethod = {}));
|
|
5682
5858
|
/**
|
|
5683
|
-
*
|
|
5684
|
-
*
|
|
5685
|
-
* @author Spencer Witt
|
|
5859
|
+
* @author Daniel DeGroff
|
|
5686
5860
|
*/
|
|
5687
|
-
var
|
|
5688
|
-
(function (
|
|
5689
|
-
|
|
5690
|
-
|
|
5691
|
-
|
|
5692
|
-
|
|
5693
|
-
|
|
5694
|
-
|
|
5861
|
+
var RateLimitedRequestType;
|
|
5862
|
+
(function (RateLimitedRequestType) {
|
|
5863
|
+
RateLimitedRequestType["FailedLogin"] = "FailedLogin";
|
|
5864
|
+
RateLimitedRequestType["ForgotPassword"] = "ForgotPassword";
|
|
5865
|
+
RateLimitedRequestType["SendEmailVerification"] = "SendEmailVerification";
|
|
5866
|
+
RateLimitedRequestType["SendPasswordless"] = "SendPasswordless";
|
|
5867
|
+
RateLimitedRequestType["SendRegistrationVerification"] = "SendRegistrationVerification";
|
|
5868
|
+
RateLimitedRequestType["SendTwoFactor"] = "SendTwoFactor";
|
|
5869
|
+
})(RateLimitedRequestType = exports.RateLimitedRequestType || (exports.RateLimitedRequestType = {}));
|
|
5695
5870
|
/**
|
|
5696
|
-
*
|
|
5871
|
+
* Controls the policy for whether OAuth workflows will more strictly adhere to the OAuth and OIDC specification
|
|
5872
|
+
* or run in backwards compatibility mode.
|
|
5697
5873
|
*
|
|
5698
|
-
* @author
|
|
5874
|
+
* @author David Charles
|
|
5699
5875
|
*/
|
|
5700
|
-
var
|
|
5701
|
-
(function (
|
|
5702
|
-
|
|
5703
|
-
|
|
5876
|
+
var OAuthScopeHandlingPolicy;
|
|
5877
|
+
(function (OAuthScopeHandlingPolicy) {
|
|
5878
|
+
OAuthScopeHandlingPolicy["Compatibility"] = "Compatibility";
|
|
5879
|
+
OAuthScopeHandlingPolicy["Strict"] = "Strict";
|
|
5880
|
+
})(OAuthScopeHandlingPolicy = exports.OAuthScopeHandlingPolicy || (exports.OAuthScopeHandlingPolicy = {}));
|
|
5704
5881
|
/**
|
|
5705
|
-
*
|
|
5706
|
-
* discoverable credentials</a> (formerly known as "resident keys")
|
|
5707
|
-
*
|
|
5708
|
-
* @author Spencer Witt
|
|
5882
|
+
* @author Matthew Altman
|
|
5709
5883
|
*/
|
|
5710
|
-
var
|
|
5711
|
-
(function (
|
|
5712
|
-
|
|
5713
|
-
|
|
5714
|
-
|
|
5715
|
-
})(ResidentKeyRequirement = exports.ResidentKeyRequirement || (exports.ResidentKeyRequirement = {}));
|
|
5884
|
+
var LogoutBehavior;
|
|
5885
|
+
(function (LogoutBehavior) {
|
|
5886
|
+
LogoutBehavior["RedirectOnly"] = "RedirectOnly";
|
|
5887
|
+
LogoutBehavior["AllApplications"] = "AllApplications";
|
|
5888
|
+
})(LogoutBehavior = exports.LogoutBehavior || (exports.LogoutBehavior = {}));
|
|
5716
5889
|
/**
|
|
5717
|
-
*
|
|
5718
|
-
* current operation.
|
|
5719
|
-
*
|
|
5720
|
-
* @author Spencer Witt
|
|
5890
|
+
* @author Johnathon Wood
|
|
5721
5891
|
*/
|
|
5722
|
-
var
|
|
5723
|
-
(function (
|
|
5724
|
-
|
|
5725
|
-
|
|
5726
|
-
|
|
5727
|
-
})(UserVerificationRequirement = exports.UserVerificationRequirement || (exports.UserVerificationRequirement = {}));
|
|
5892
|
+
var Oauth2AuthorizedURLValidationPolicy;
|
|
5893
|
+
(function (Oauth2AuthorizedURLValidationPolicy) {
|
|
5894
|
+
Oauth2AuthorizedURLValidationPolicy["AllowWildcards"] = "AllowWildcards";
|
|
5895
|
+
Oauth2AuthorizedURLValidationPolicy["ExactMatch"] = "ExactMatch";
|
|
5896
|
+
})(Oauth2AuthorizedURLValidationPolicy = exports.Oauth2AuthorizedURLValidationPolicy || (exports.Oauth2AuthorizedURLValidationPolicy = {}));
|
|
5728
5897
|
/**
|
|
5729
5898
|
* Identifies the WebAuthn workflow. This will affect the parameters used for credential creation
|
|
5730
5899
|
* and request based on the Tenant configuration.
|
|
@@ -5738,72 +5907,16 @@ var WebAuthnWorkflow;
|
|
|
5738
5907
|
WebAuthnWorkflow["reauthentication"] = "reauthentication";
|
|
5739
5908
|
})(WebAuthnWorkflow = exports.WebAuthnWorkflow || (exports.WebAuthnWorkflow = {}));
|
|
5740
5909
|
/**
|
|
5741
|
-
*
|
|
5742
|
-
*/
|
|
5743
|
-
var MultiFactorLoginPolicy;
|
|
5744
|
-
(function (MultiFactorLoginPolicy) {
|
|
5745
|
-
MultiFactorLoginPolicy["Disabled"] = "Disabled";
|
|
5746
|
-
MultiFactorLoginPolicy["Enabled"] = "Enabled";
|
|
5747
|
-
MultiFactorLoginPolicy["Required"] = "Required";
|
|
5748
|
-
})(MultiFactorLoginPolicy = exports.MultiFactorLoginPolicy || (exports.MultiFactorLoginPolicy = {}));
|
|
5749
|
-
/**
|
|
5750
|
-
* The types of lambdas that indicate how they are invoked by FusionAuth.
|
|
5910
|
+
* Policy for handling unknown OAuth scopes in the request
|
|
5751
5911
|
*
|
|
5752
|
-
* @author
|
|
5753
|
-
*/
|
|
5754
|
-
var LambdaType;
|
|
5755
|
-
(function (LambdaType) {
|
|
5756
|
-
LambdaType["JWTPopulate"] = "JWTPopulate";
|
|
5757
|
-
LambdaType["OpenIDReconcile"] = "OpenIDReconcile";
|
|
5758
|
-
LambdaType["SAMLv2Reconcile"] = "SAMLv2Reconcile";
|
|
5759
|
-
LambdaType["SAMLv2Populate"] = "SAMLv2Populate";
|
|
5760
|
-
LambdaType["AppleReconcile"] = "AppleReconcile";
|
|
5761
|
-
LambdaType["ExternalJWTReconcile"] = "ExternalJWTReconcile";
|
|
5762
|
-
LambdaType["FacebookReconcile"] = "FacebookReconcile";
|
|
5763
|
-
LambdaType["GoogleReconcile"] = "GoogleReconcile";
|
|
5764
|
-
LambdaType["HYPRReconcile"] = "HYPRReconcile";
|
|
5765
|
-
LambdaType["TwitterReconcile"] = "TwitterReconcile";
|
|
5766
|
-
LambdaType["LDAPConnectorReconcile"] = "LDAPConnectorReconcile";
|
|
5767
|
-
LambdaType["LinkedInReconcile"] = "LinkedInReconcile";
|
|
5768
|
-
LambdaType["EpicGamesReconcile"] = "EpicGamesReconcile";
|
|
5769
|
-
LambdaType["NintendoReconcile"] = "NintendoReconcile";
|
|
5770
|
-
LambdaType["SonyPSNReconcile"] = "SonyPSNReconcile";
|
|
5771
|
-
LambdaType["SteamReconcile"] = "SteamReconcile";
|
|
5772
|
-
LambdaType["TwitchReconcile"] = "TwitchReconcile";
|
|
5773
|
-
LambdaType["XboxReconcile"] = "XboxReconcile";
|
|
5774
|
-
LambdaType["ClientCredentialsJWTPopulate"] = "ClientCredentialsJWTPopulate";
|
|
5775
|
-
LambdaType["SCIMServerGroupRequestConverter"] = "SCIMServerGroupRequestConverter";
|
|
5776
|
-
LambdaType["SCIMServerGroupResponseConverter"] = "SCIMServerGroupResponseConverter";
|
|
5777
|
-
LambdaType["SCIMServerUserRequestConverter"] = "SCIMServerUserRequestConverter";
|
|
5778
|
-
LambdaType["SCIMServerUserResponseConverter"] = "SCIMServerUserResponseConverter";
|
|
5779
|
-
LambdaType["SelfServiceRegistrationValidation"] = "SelfServiceRegistrationValidation";
|
|
5780
|
-
})(LambdaType = exports.LambdaType || (exports.LambdaType = {}));
|
|
5781
|
-
/**
|
|
5782
|
-
* @author Lyle Schemmerling
|
|
5783
|
-
*/
|
|
5784
|
-
var SAMLv2DestinationAssertionPolicy;
|
|
5785
|
-
(function (SAMLv2DestinationAssertionPolicy) {
|
|
5786
|
-
SAMLv2DestinationAssertionPolicy["Enabled"] = "Enabled";
|
|
5787
|
-
SAMLv2DestinationAssertionPolicy["Disabled"] = "Disabled";
|
|
5788
|
-
SAMLv2DestinationAssertionPolicy["AllowAlternates"] = "AllowAlternates";
|
|
5789
|
-
})(SAMLv2DestinationAssertionPolicy = exports.SAMLv2DestinationAssertionPolicy || (exports.SAMLv2DestinationAssertionPolicy = {}));
|
|
5790
|
-
/**
|
|
5791
|
-
* @author Johnathon Wood
|
|
5792
|
-
*/
|
|
5793
|
-
var Oauth2AuthorizedURLValidationPolicy;
|
|
5794
|
-
(function (Oauth2AuthorizedURLValidationPolicy) {
|
|
5795
|
-
Oauth2AuthorizedURLValidationPolicy["AllowWildcards"] = "AllowWildcards";
|
|
5796
|
-
Oauth2AuthorizedURLValidationPolicy["ExactMatch"] = "ExactMatch";
|
|
5797
|
-
})(Oauth2AuthorizedURLValidationPolicy = exports.Oauth2AuthorizedURLValidationPolicy || (exports.Oauth2AuthorizedURLValidationPolicy = {}));
|
|
5798
|
-
/**
|
|
5799
|
-
* @author Daniel DeGroff
|
|
5912
|
+
* @author Spencer Witt
|
|
5800
5913
|
*/
|
|
5801
|
-
var
|
|
5802
|
-
(function (
|
|
5803
|
-
|
|
5804
|
-
|
|
5805
|
-
|
|
5806
|
-
})(
|
|
5914
|
+
var UnknownScopePolicy;
|
|
5915
|
+
(function (UnknownScopePolicy) {
|
|
5916
|
+
UnknownScopePolicy["Allow"] = "Allow";
|
|
5917
|
+
UnknownScopePolicy["Remove"] = "Remove";
|
|
5918
|
+
UnknownScopePolicy["Reject"] = "Reject";
|
|
5919
|
+
})(UnknownScopePolicy = exports.UnknownScopePolicy || (exports.UnknownScopePolicy = {}));
|
|
5807
5920
|
var OAuthErrorReason;
|
|
5808
5921
|
(function (OAuthErrorReason) {
|
|
5809
5922
|
OAuthErrorReason["auth_code_not_found"] = "auth_code_not_found";
|
|
@@ -5812,6 +5925,7 @@ var OAuthErrorReason;
|
|
|
5812
5925
|
OAuthErrorReason["access_token_unavailable_for_processing"] = "access_token_unavailable_for_processing";
|
|
5813
5926
|
OAuthErrorReason["access_token_failed_processing"] = "access_token_failed_processing";
|
|
5814
5927
|
OAuthErrorReason["access_token_invalid"] = "access_token_invalid";
|
|
5928
|
+
OAuthErrorReason["access_token_required"] = "access_token_required";
|
|
5815
5929
|
OAuthErrorReason["refresh_token_not_found"] = "refresh_token_not_found";
|
|
5816
5930
|
OAuthErrorReason["refresh_token_type_not_supported"] = "refresh_token_type_not_supported";
|
|
5817
5931
|
OAuthErrorReason["invalid_client_id"] = "invalid_client_id";
|
|
@@ -5863,5 +5977,35 @@ var OAuthErrorReason;
|
|
|
5863
5977
|
OAuthErrorReason["change_password_expired"] = "change_password_expired";
|
|
5864
5978
|
OAuthErrorReason["change_password_validation"] = "change_password_validation";
|
|
5865
5979
|
OAuthErrorReason["unknown"] = "unknown";
|
|
5980
|
+
OAuthErrorReason["missing_required_scope"] = "missing_required_scope";
|
|
5981
|
+
OAuthErrorReason["unknown_scope"] = "unknown_scope";
|
|
5982
|
+
OAuthErrorReason["consent_canceled"] = "consent_canceled";
|
|
5866
5983
|
})(OAuthErrorReason = exports.OAuthErrorReason || (exports.OAuthErrorReason = {}));
|
|
5984
|
+
var ClientAuthenticationMethod;
|
|
5985
|
+
(function (ClientAuthenticationMethod) {
|
|
5986
|
+
ClientAuthenticationMethod["none"] = "none";
|
|
5987
|
+
ClientAuthenticationMethod["client_secret_basic"] = "client_secret_basic";
|
|
5988
|
+
ClientAuthenticationMethod["client_secret_post"] = "client_secret_post";
|
|
5989
|
+
})(ClientAuthenticationMethod = exports.ClientAuthenticationMethod || (exports.ClientAuthenticationMethod = {}));
|
|
5990
|
+
/**
|
|
5991
|
+
* Controls the policy for requesting user permission to grant access to requested scopes during an OAuth workflow
|
|
5992
|
+
* for a third-party application.
|
|
5993
|
+
*
|
|
5994
|
+
* @author Spencer Witt
|
|
5995
|
+
*/
|
|
5996
|
+
var OAuthScopeConsentMode;
|
|
5997
|
+
(function (OAuthScopeConsentMode) {
|
|
5998
|
+
OAuthScopeConsentMode["AlwaysPrompt"] = "AlwaysPrompt";
|
|
5999
|
+
OAuthScopeConsentMode["RememberDecision"] = "RememberDecision";
|
|
6000
|
+
OAuthScopeConsentMode["NeverPrompt"] = "NeverPrompt";
|
|
6001
|
+
})(OAuthScopeConsentMode = exports.OAuthScopeConsentMode || (exports.OAuthScopeConsentMode = {}));
|
|
6002
|
+
/**
|
|
6003
|
+
* @author Brett Pontarelli
|
|
6004
|
+
*/
|
|
6005
|
+
var IdentityProviderLoginMethod;
|
|
6006
|
+
(function (IdentityProviderLoginMethod) {
|
|
6007
|
+
IdentityProviderLoginMethod["UsePopup"] = "UsePopup";
|
|
6008
|
+
IdentityProviderLoginMethod["UseRedirect"] = "UseRedirect";
|
|
6009
|
+
IdentityProviderLoginMethod["UseVendorJavaScript"] = "UseVendorJavaScript";
|
|
6010
|
+
})(IdentityProviderLoginMethod = exports.IdentityProviderLoginMethod || (exports.IdentityProviderLoginMethod = {}));
|
|
5867
6011
|
//# sourceMappingURL=FusionAuthClient.js.map
|