@fusionauth/typescript-client 1.52.0 → 1.54.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/build/src/FusionAuthClient.d.ts +4056 -3919
- package/build/src/FusionAuthClient.js +765 -702
- package/build/src/FusionAuthClient.js.map +1 -1
- package/dist/fusionauth-typescript-client.js +766 -703
- package/dist/fusionauth-typescript-client.min.js +1 -1
- package/dist/fusionauth-typescript-client.min.js.map +1 -1
- package/package.json +1 -1
|
@@ -15,7 +15,7 @@
|
|
|
15
15
|
* language governing permissions and limitations under the License.
|
|
16
16
|
*/
|
|
17
17
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
18
|
-
exports.
|
|
18
|
+
exports.Algorithm = exports.ClientAuthenticationMethod = exports.OAuthApplicationRelationship = exports.UnknownScopePolicy = exports.EventType = exports.CaptchaMethod = exports.SteamAPIMode = exports.AuthenticationThreats = exports.TOTPAlgorithm = exports.VerificationStrategy = exports.IdentityProviderType = exports.ObjectState = exports.OAuthScopeConsentMode = exports.KeyType = exports.KeyAlgorithm = exports.CoseEllipticCurve = exports.PublicKeyCredentialType = exports.AuthenticatorAttachmentPreference = exports.Sort = exports.XMLSignatureLocation = exports.SAMLLogoutBehavior = exports.RegistrationType = exports.LoginIdType = exports.SystemTrustedProxyConfigurationPolicy = exports.LambdaType = exports.UserActionPhase = exports.IPAccessControlEntryAction = exports.MultiFactorLoginPolicy = exports.IdentityProviderLinkingStrategy = exports.FormDataType = exports.SecureGeneratorType = exports.CanonicalizationMethod = exports.FormType = exports.ClientAuthenticationPolicy = exports.ExpiryUnit = exports.UserVerificationRequirement = exports.LambdaEngineType = exports.RateLimitedRequestType = exports.ApplicationMultiFactorTrustPolicy = exports.DeviceType = exports.OAuthErrorType = exports.OAuthErrorReason = exports.SAMLv2DestinationAssertionPolicy = exports.RefreshTokenUsagePolicy = exports.IdentityProviderLoginMethod = exports.AuthenticatorAttachment = exports.Oauth2AuthorizedURLValidationPolicy = exports.LDAPSecurityMethod = exports.ChangePasswordReason = exports.ResidentKeyRequirement = exports.MessageType = exports.ProofKeyForCodeExchangePolicy = exports.ConnectorType = exports.ThemeType = exports.CoseKeyType = exports.TransactionType = exports.EventLogType = exports.WebhookAttemptResult = exports.OAuthScopeHandlingPolicy = exports.FormControl = exports.BreachedPasswordStatus = exports.KeyUse = exports.RefreshTokenExpirationPolicy = exports.UserState = exports.HTTPMethod = exports.ConsentStatus = exports.WebAuthnWorkflow = exports.WebhookEventResult = exports.AttestationConveyancePreference = exports.FormFieldAdminPolicy = exports.BreachMatchMode = exports.BreachAction = exports.MessengerType = exports.UnverifiedBehavior = exports.ReactorFeatureStatus = exports.CoseAlgorithmIdentifier = exports.FamilyRole = exports.LogoutBehavior = exports.ContentStatus = exports.TokenType = exports.UniqueUsernameStrategy = exports.EmailSecurityType = exports.AttestationType = exports.GrantType = exports.FusionAuthClient = void 0;
|
|
19
19
|
const DefaultRESTClientBuilder_1 = require("./DefaultRESTClientBuilder");
|
|
20
20
|
const url_1 = require("url");
|
|
21
21
|
class FusionAuthClient {
|
|
@@ -3793,6 +3793,32 @@ class FusionAuthClient {
|
|
|
3793
3793
|
.withMethod("GET")
|
|
3794
3794
|
.go();
|
|
3795
3795
|
}
|
|
3796
|
+
/**
|
|
3797
|
+
* Retrieves a single webhook attempt log for the given Id.
|
|
3798
|
+
*
|
|
3799
|
+
* @param {UUID} webhookAttemptLogId The Id of the webhook attempt log to retrieve.
|
|
3800
|
+
* @returns {Promise<ClientResponse<WebhookAttemptLogResponse>>}
|
|
3801
|
+
*/
|
|
3802
|
+
retrieveWebhookAttemptLog(webhookAttemptLogId) {
|
|
3803
|
+
return this.start()
|
|
3804
|
+
.withUri('/api/system/webhook-attempt-log')
|
|
3805
|
+
.withUriSegment(webhookAttemptLogId)
|
|
3806
|
+
.withMethod("GET")
|
|
3807
|
+
.go();
|
|
3808
|
+
}
|
|
3809
|
+
/**
|
|
3810
|
+
* Retrieves a single webhook event log for the given Id.
|
|
3811
|
+
*
|
|
3812
|
+
* @param {UUID} webhookEventLogId The Id of the webhook event log to retrieve.
|
|
3813
|
+
* @returns {Promise<ClientResponse<WebhookEventLogResponse>>}
|
|
3814
|
+
*/
|
|
3815
|
+
retrieveWebhookEventLog(webhookEventLogId) {
|
|
3816
|
+
return this.start()
|
|
3817
|
+
.withUri('/api/system/webhook-event-log')
|
|
3818
|
+
.withUriSegment(webhookEventLogId)
|
|
3819
|
+
.withMethod("GET")
|
|
3820
|
+
.go();
|
|
3821
|
+
}
|
|
3796
3822
|
/**
|
|
3797
3823
|
* Retrieves all the webhooks.
|
|
3798
3824
|
*
|
|
@@ -4243,6 +4269,19 @@ class FusionAuthClient {
|
|
|
4243
4269
|
.withMethod("POST")
|
|
4244
4270
|
.go();
|
|
4245
4271
|
}
|
|
4272
|
+
/**
|
|
4273
|
+
* Searches the webhook event logs with the specified criteria and pagination.
|
|
4274
|
+
*
|
|
4275
|
+
* @param {WebhookEventLogSearchRequest} request The search criteria and pagination information.
|
|
4276
|
+
* @returns {Promise<ClientResponse<WebhookEventLogSearchResponse>>}
|
|
4277
|
+
*/
|
|
4278
|
+
searchWebhookEventLogs(request) {
|
|
4279
|
+
return this.start()
|
|
4280
|
+
.withUri('/api/system/webhook-event-log/search')
|
|
4281
|
+
.withJSONBody(request)
|
|
4282
|
+
.withMethod("POST")
|
|
4283
|
+
.go();
|
|
4284
|
+
}
|
|
4246
4285
|
/**
|
|
4247
4286
|
* Searches webhooks with the specified criteria and pagination.
|
|
4248
4287
|
*
|
|
@@ -5073,58 +5112,6 @@ class FusionAuthClient {
|
|
|
5073
5112
|
}
|
|
5074
5113
|
exports.FusionAuthClient = FusionAuthClient;
|
|
5075
5114
|
exports.default = FusionAuthClient;
|
|
5076
|
-
/**
|
|
5077
|
-
* @author Daniel DeGroff
|
|
5078
|
-
*/
|
|
5079
|
-
var FormDataType;
|
|
5080
|
-
(function (FormDataType) {
|
|
5081
|
-
FormDataType["bool"] = "bool";
|
|
5082
|
-
FormDataType["consent"] = "consent";
|
|
5083
|
-
FormDataType["date"] = "date";
|
|
5084
|
-
FormDataType["email"] = "email";
|
|
5085
|
-
FormDataType["number"] = "number";
|
|
5086
|
-
FormDataType["string"] = "string";
|
|
5087
|
-
})(FormDataType = exports.FormDataType || (exports.FormDataType = {}));
|
|
5088
|
-
/**
|
|
5089
|
-
* @author Daniel DeGroff
|
|
5090
|
-
*/
|
|
5091
|
-
var BreachedPasswordStatus;
|
|
5092
|
-
(function (BreachedPasswordStatus) {
|
|
5093
|
-
BreachedPasswordStatus["None"] = "None";
|
|
5094
|
-
BreachedPasswordStatus["ExactMatch"] = "ExactMatch";
|
|
5095
|
-
BreachedPasswordStatus["SubAddressMatch"] = "SubAddressMatch";
|
|
5096
|
-
BreachedPasswordStatus["PasswordOnly"] = "PasswordOnly";
|
|
5097
|
-
BreachedPasswordStatus["CommonPassword"] = "CommonPassword";
|
|
5098
|
-
})(BreachedPasswordStatus = exports.BreachedPasswordStatus || (exports.BreachedPasswordStatus = {}));
|
|
5099
|
-
/**
|
|
5100
|
-
* Models a consent.
|
|
5101
|
-
*
|
|
5102
|
-
* @author Daniel DeGroff
|
|
5103
|
-
*/
|
|
5104
|
-
var ConsentStatus;
|
|
5105
|
-
(function (ConsentStatus) {
|
|
5106
|
-
ConsentStatus["Active"] = "Active";
|
|
5107
|
-
ConsentStatus["Revoked"] = "Revoked";
|
|
5108
|
-
})(ConsentStatus = exports.ConsentStatus || (exports.ConsentStatus = {}));
|
|
5109
|
-
/**
|
|
5110
|
-
* @author Daniel DeGroff
|
|
5111
|
-
*/
|
|
5112
|
-
var ApplicationMultiFactorTrustPolicy;
|
|
5113
|
-
(function (ApplicationMultiFactorTrustPolicy) {
|
|
5114
|
-
ApplicationMultiFactorTrustPolicy["Any"] = "Any";
|
|
5115
|
-
ApplicationMultiFactorTrustPolicy["This"] = "This";
|
|
5116
|
-
ApplicationMultiFactorTrustPolicy["None"] = "None";
|
|
5117
|
-
})(ApplicationMultiFactorTrustPolicy = exports.ApplicationMultiFactorTrustPolicy || (exports.ApplicationMultiFactorTrustPolicy = {}));
|
|
5118
|
-
/**
|
|
5119
|
-
* @author Daniel DeGroff
|
|
5120
|
-
*/
|
|
5121
|
-
var UserState;
|
|
5122
|
-
(function (UserState) {
|
|
5123
|
-
UserState["Authenticated"] = "Authenticated";
|
|
5124
|
-
UserState["AuthenticatedNotRegistered"] = "AuthenticatedNotRegistered";
|
|
5125
|
-
UserState["AuthenticatedNotVerified"] = "AuthenticatedNotVerified";
|
|
5126
|
-
UserState["AuthenticatedRegistrationNotVerified"] = "AuthenticatedRegistrationNotVerified";
|
|
5127
|
-
})(UserState = exports.UserState || (exports.UserState = {}));
|
|
5128
5115
|
/**
|
|
5129
5116
|
* Authorization Grant types as defined by the <a href="https://tools.ietf.org/html/rfc6749">The OAuth 2.0 Authorization
|
|
5130
5117
|
* Framework - RFC 6749</a>.
|
|
@@ -5145,41 +5132,29 @@ var GrantType;
|
|
|
5145
5132
|
GrantType["device_code"] = "urn:ietf:params:oauth:grant-type:device_code";
|
|
5146
5133
|
})(GrantType = exports.GrantType || (exports.GrantType = {}));
|
|
5147
5134
|
/**
|
|
5148
|
-
*
|
|
5149
|
-
* Third-party applications will use the {@link OAuthScopeConsentMode} policy.
|
|
5135
|
+
* Used to indicate what type of attestation was included in the authenticator response for a given WebAuthn credential at the time it was created
|
|
5150
5136
|
*
|
|
5151
5137
|
* @author Spencer Witt
|
|
5152
5138
|
*/
|
|
5153
|
-
var
|
|
5154
|
-
(function (
|
|
5155
|
-
|
|
5156
|
-
|
|
5157
|
-
|
|
5158
|
-
|
|
5159
|
-
|
|
5160
|
-
|
|
5161
|
-
var
|
|
5162
|
-
(function (
|
|
5163
|
-
|
|
5164
|
-
|
|
5165
|
-
|
|
5166
|
-
|
|
5167
|
-
|
|
5168
|
-
|
|
5169
|
-
|
|
5170
|
-
|
|
5171
|
-
|
|
5172
|
-
ThemeType["simple"] = "simple";
|
|
5173
|
-
})(ThemeType = exports.ThemeType || (exports.ThemeType = {}));
|
|
5174
|
-
/**
|
|
5175
|
-
* @author Brett Guy
|
|
5176
|
-
*/
|
|
5177
|
-
var ProofKeyForCodeExchangePolicy;
|
|
5178
|
-
(function (ProofKeyForCodeExchangePolicy) {
|
|
5179
|
-
ProofKeyForCodeExchangePolicy["Required"] = "Required";
|
|
5180
|
-
ProofKeyForCodeExchangePolicy["NotRequired"] = "NotRequired";
|
|
5181
|
-
ProofKeyForCodeExchangePolicy["NotRequiredWhenUsingClientAuthentication"] = "NotRequiredWhenUsingClientAuthentication";
|
|
5182
|
-
})(ProofKeyForCodeExchangePolicy = exports.ProofKeyForCodeExchangePolicy || (exports.ProofKeyForCodeExchangePolicy = {}));
|
|
5139
|
+
var AttestationType;
|
|
5140
|
+
(function (AttestationType) {
|
|
5141
|
+
AttestationType["basic"] = "basic";
|
|
5142
|
+
AttestationType["self"] = "self";
|
|
5143
|
+
AttestationType["attestationCa"] = "attestationCa";
|
|
5144
|
+
AttestationType["anonymizationCa"] = "anonymizationCa";
|
|
5145
|
+
AttestationType["none"] = "none";
|
|
5146
|
+
})(AttestationType = exports.AttestationType || (exports.AttestationType = {}));
|
|
5147
|
+
var EmailSecurityType;
|
|
5148
|
+
(function (EmailSecurityType) {
|
|
5149
|
+
EmailSecurityType["NONE"] = "NONE";
|
|
5150
|
+
EmailSecurityType["SSL"] = "SSL";
|
|
5151
|
+
EmailSecurityType["TLS"] = "TLS";
|
|
5152
|
+
})(EmailSecurityType = exports.EmailSecurityType || (exports.EmailSecurityType = {}));
|
|
5153
|
+
var UniqueUsernameStrategy;
|
|
5154
|
+
(function (UniqueUsernameStrategy) {
|
|
5155
|
+
UniqueUsernameStrategy["Always"] = "Always";
|
|
5156
|
+
UniqueUsernameStrategy["OnCollision"] = "OnCollision";
|
|
5157
|
+
})(UniqueUsernameStrategy = exports.UniqueUsernameStrategy || (exports.UniqueUsernameStrategy = {}));
|
|
5183
5158
|
/**
|
|
5184
5159
|
* <ul>
|
|
5185
5160
|
* <li>Bearer Token type as defined by <a href="https://tools.ietf.org/html/rfc6750">RFC 6750</a>.</li>
|
|
@@ -5196,37 +5171,6 @@ var TokenType;
|
|
|
5196
5171
|
TokenType["Bearer"] = "Bearer";
|
|
5197
5172
|
TokenType["MAC"] = "MAC";
|
|
5198
5173
|
})(TokenType = exports.TokenType || (exports.TokenType = {}));
|
|
5199
|
-
var XMLSignatureLocation;
|
|
5200
|
-
(function (XMLSignatureLocation) {
|
|
5201
|
-
XMLSignatureLocation["Assertion"] = "Assertion";
|
|
5202
|
-
XMLSignatureLocation["Response"] = "Response";
|
|
5203
|
-
})(XMLSignatureLocation = exports.XMLSignatureLocation || (exports.XMLSignatureLocation = {}));
|
|
5204
|
-
/**
|
|
5205
|
-
* Describes the authenticator attachment modality preference for a WebAuthn workflow. See {@link AuthenticatorAttachment}
|
|
5206
|
-
*
|
|
5207
|
-
* @author Spencer Witt
|
|
5208
|
-
*/
|
|
5209
|
-
var AuthenticatorAttachmentPreference;
|
|
5210
|
-
(function (AuthenticatorAttachmentPreference) {
|
|
5211
|
-
AuthenticatorAttachmentPreference["any"] = "any";
|
|
5212
|
-
AuthenticatorAttachmentPreference["platform"] = "platform";
|
|
5213
|
-
AuthenticatorAttachmentPreference["crossPlatform"] = "crossPlatform";
|
|
5214
|
-
})(AuthenticatorAttachmentPreference = exports.AuthenticatorAttachmentPreference || (exports.AuthenticatorAttachmentPreference = {}));
|
|
5215
|
-
/**
|
|
5216
|
-
* @author Brett Guy
|
|
5217
|
-
*/
|
|
5218
|
-
var IPAccessControlEntryAction;
|
|
5219
|
-
(function (IPAccessControlEntryAction) {
|
|
5220
|
-
IPAccessControlEntryAction["Allow"] = "Allow";
|
|
5221
|
-
IPAccessControlEntryAction["Block"] = "Block";
|
|
5222
|
-
})(IPAccessControlEntryAction = exports.IPAccessControlEntryAction || (exports.IPAccessControlEntryAction = {}));
|
|
5223
|
-
/**
|
|
5224
|
-
* @author Mikey Sleevi
|
|
5225
|
-
*/
|
|
5226
|
-
var MessageType;
|
|
5227
|
-
(function (MessageType) {
|
|
5228
|
-
MessageType["SMS"] = "SMS";
|
|
5229
|
-
})(MessageType = exports.MessageType || (exports.MessageType = {}));
|
|
5230
5174
|
/**
|
|
5231
5175
|
* Status for content like usernames, profile attributes, etc.
|
|
5232
5176
|
*
|
|
@@ -5239,76 +5183,19 @@ var ContentStatus;
|
|
|
5239
5183
|
ContentStatus["REJECTED"] = "REJECTED";
|
|
5240
5184
|
})(ContentStatus = exports.ContentStatus || (exports.ContentStatus = {}));
|
|
5241
5185
|
/**
|
|
5242
|
-
* @author
|
|
5243
|
-
*/
|
|
5244
|
-
var FormControl;
|
|
5245
|
-
(function (FormControl) {
|
|
5246
|
-
FormControl["checkbox"] = "checkbox";
|
|
5247
|
-
FormControl["number"] = "number";
|
|
5248
|
-
FormControl["password"] = "password";
|
|
5249
|
-
FormControl["radio"] = "radio";
|
|
5250
|
-
FormControl["select"] = "select";
|
|
5251
|
-
FormControl["textarea"] = "textarea";
|
|
5252
|
-
FormControl["text"] = "text";
|
|
5253
|
-
})(FormControl = exports.FormControl || (exports.FormControl = {}));
|
|
5254
|
-
var BreachMatchMode;
|
|
5255
|
-
(function (BreachMatchMode) {
|
|
5256
|
-
BreachMatchMode["Low"] = "Low";
|
|
5257
|
-
BreachMatchMode["Medium"] = "Medium";
|
|
5258
|
-
BreachMatchMode["High"] = "High";
|
|
5259
|
-
})(BreachMatchMode = exports.BreachMatchMode || (exports.BreachMatchMode = {}));
|
|
5260
|
-
/**
|
|
5261
|
-
* COSE key type
|
|
5262
|
-
*
|
|
5263
|
-
* @author Spencer Witt
|
|
5264
|
-
*/
|
|
5265
|
-
var CoseKeyType;
|
|
5266
|
-
(function (CoseKeyType) {
|
|
5267
|
-
CoseKeyType["Reserved"] = "0";
|
|
5268
|
-
CoseKeyType["OKP"] = "1";
|
|
5269
|
-
CoseKeyType["EC2"] = "2";
|
|
5270
|
-
CoseKeyType["RSA"] = "3";
|
|
5271
|
-
CoseKeyType["Symmetric"] = "4";
|
|
5272
|
-
})(CoseKeyType = exports.CoseKeyType || (exports.CoseKeyType = {}));
|
|
5273
|
-
/**
|
|
5274
|
-
* @author Lyle Schemmerling
|
|
5275
|
-
*/
|
|
5276
|
-
var SAMLv2DestinationAssertionPolicy;
|
|
5277
|
-
(function (SAMLv2DestinationAssertionPolicy) {
|
|
5278
|
-
SAMLv2DestinationAssertionPolicy["Enabled"] = "Enabled";
|
|
5279
|
-
SAMLv2DestinationAssertionPolicy["Disabled"] = "Disabled";
|
|
5280
|
-
SAMLv2DestinationAssertionPolicy["AllowAlternates"] = "AllowAlternates";
|
|
5281
|
-
})(SAMLv2DestinationAssertionPolicy = exports.SAMLv2DestinationAssertionPolicy || (exports.SAMLv2DestinationAssertionPolicy = {}));
|
|
5282
|
-
/**
|
|
5283
|
-
* Defines valid credential types. This is an extension point in the WebAuthn spec. The only defined value at this time is "public-key"
|
|
5284
|
-
*
|
|
5285
|
-
* @author Spencer Witt
|
|
5286
|
-
*/
|
|
5287
|
-
var PublicKeyCredentialType;
|
|
5288
|
-
(function (PublicKeyCredentialType) {
|
|
5289
|
-
PublicKeyCredentialType["publicKey"] = "public-key";
|
|
5290
|
-
})(PublicKeyCredentialType = exports.PublicKeyCredentialType || (exports.PublicKeyCredentialType = {}));
|
|
5291
|
-
/**
|
|
5292
|
-
* @author Daniel DeGroff
|
|
5293
|
-
*/
|
|
5294
|
-
var FormFieldAdminPolicy;
|
|
5295
|
-
(function (FormFieldAdminPolicy) {
|
|
5296
|
-
FormFieldAdminPolicy["Edit"] = "Edit";
|
|
5297
|
-
FormFieldAdminPolicy["View"] = "View";
|
|
5298
|
-
})(FormFieldAdminPolicy = exports.FormFieldAdminPolicy || (exports.FormFieldAdminPolicy = {}));
|
|
5299
|
-
/**
|
|
5300
|
-
* @author Daniel DeGroff
|
|
5186
|
+
* @author Matthew Altman
|
|
5301
5187
|
*/
|
|
5302
|
-
var
|
|
5303
|
-
(function (
|
|
5304
|
-
|
|
5305
|
-
|
|
5306
|
-
|
|
5307
|
-
|
|
5308
|
-
|
|
5309
|
-
|
|
5310
|
-
|
|
5311
|
-
|
|
5188
|
+
var LogoutBehavior;
|
|
5189
|
+
(function (LogoutBehavior) {
|
|
5190
|
+
LogoutBehavior["RedirectOnly"] = "RedirectOnly";
|
|
5191
|
+
LogoutBehavior["AllApplications"] = "AllApplications";
|
|
5192
|
+
})(LogoutBehavior = exports.LogoutBehavior || (exports.LogoutBehavior = {}));
|
|
5193
|
+
var FamilyRole;
|
|
5194
|
+
(function (FamilyRole) {
|
|
5195
|
+
FamilyRole["Child"] = "Child";
|
|
5196
|
+
FamilyRole["Teen"] = "Teen";
|
|
5197
|
+
FamilyRole["Adult"] = "Adult";
|
|
5198
|
+
})(FamilyRole = exports.FamilyRole || (exports.FamilyRole = {}));
|
|
5312
5199
|
/**
|
|
5313
5200
|
* A number identifying a cryptographic algorithm. Values should be registered with the <a
|
|
5314
5201
|
* href="https://www.iana.org/assignments/cose/cose.xhtml#algorithms">IANA COSE Algorithms registry</a>
|
|
@@ -5328,38 +5215,54 @@ var CoseAlgorithmIdentifier;
|
|
|
5328
5215
|
CoseAlgorithmIdentifier["PS512"] = "SHA-512";
|
|
5329
5216
|
})(CoseAlgorithmIdentifier = exports.CoseAlgorithmIdentifier || (exports.CoseAlgorithmIdentifier = {}));
|
|
5330
5217
|
/**
|
|
5331
|
-
* The types of lambdas that indicate how they are invoked by FusionAuth.
|
|
5332
|
-
*
|
|
5333
5218
|
* @author Brian Pontarelli
|
|
5334
5219
|
*/
|
|
5335
|
-
var
|
|
5336
|
-
(function (
|
|
5337
|
-
|
|
5338
|
-
|
|
5339
|
-
|
|
5340
|
-
|
|
5341
|
-
|
|
5342
|
-
|
|
5343
|
-
|
|
5344
|
-
|
|
5345
|
-
|
|
5346
|
-
|
|
5347
|
-
|
|
5348
|
-
|
|
5349
|
-
|
|
5350
|
-
|
|
5351
|
-
|
|
5352
|
-
|
|
5353
|
-
|
|
5354
|
-
|
|
5355
|
-
|
|
5356
|
-
|
|
5357
|
-
|
|
5358
|
-
|
|
5359
|
-
|
|
5360
|
-
|
|
5361
|
-
|
|
5362
|
-
|
|
5220
|
+
var ReactorFeatureStatus;
|
|
5221
|
+
(function (ReactorFeatureStatus) {
|
|
5222
|
+
ReactorFeatureStatus["ACTIVE"] = "ACTIVE";
|
|
5223
|
+
ReactorFeatureStatus["DISCONNECTED"] = "DISCONNECTED";
|
|
5224
|
+
ReactorFeatureStatus["PENDING"] = "PENDING";
|
|
5225
|
+
ReactorFeatureStatus["DISABLED"] = "DISABLED";
|
|
5226
|
+
ReactorFeatureStatus["UNKNOWN"] = "UNKNOWN";
|
|
5227
|
+
})(ReactorFeatureStatus = exports.ReactorFeatureStatus || (exports.ReactorFeatureStatus = {}));
|
|
5228
|
+
/**
|
|
5229
|
+
* @author Daniel DeGroff
|
|
5230
|
+
*/
|
|
5231
|
+
var UnverifiedBehavior;
|
|
5232
|
+
(function (UnverifiedBehavior) {
|
|
5233
|
+
UnverifiedBehavior["Allow"] = "Allow";
|
|
5234
|
+
UnverifiedBehavior["Gated"] = "Gated";
|
|
5235
|
+
})(UnverifiedBehavior = exports.UnverifiedBehavior || (exports.UnverifiedBehavior = {}));
|
|
5236
|
+
/**
|
|
5237
|
+
* @author Brett Guy
|
|
5238
|
+
*/
|
|
5239
|
+
var MessengerType;
|
|
5240
|
+
(function (MessengerType) {
|
|
5241
|
+
MessengerType["Generic"] = "Generic";
|
|
5242
|
+
MessengerType["Kafka"] = "Kafka";
|
|
5243
|
+
MessengerType["Twilio"] = "Twilio";
|
|
5244
|
+
})(MessengerType = exports.MessengerType || (exports.MessengerType = {}));
|
|
5245
|
+
var BreachAction;
|
|
5246
|
+
(function (BreachAction) {
|
|
5247
|
+
BreachAction["Off"] = "Off";
|
|
5248
|
+
BreachAction["RecordOnly"] = "RecordOnly";
|
|
5249
|
+
BreachAction["NotifyUser"] = "NotifyUser";
|
|
5250
|
+
BreachAction["RequireChange"] = "RequireChange";
|
|
5251
|
+
})(BreachAction = exports.BreachAction || (exports.BreachAction = {}));
|
|
5252
|
+
var BreachMatchMode;
|
|
5253
|
+
(function (BreachMatchMode) {
|
|
5254
|
+
BreachMatchMode["Low"] = "Low";
|
|
5255
|
+
BreachMatchMode["Medium"] = "Medium";
|
|
5256
|
+
BreachMatchMode["High"] = "High";
|
|
5257
|
+
})(BreachMatchMode = exports.BreachMatchMode || (exports.BreachMatchMode = {}));
|
|
5258
|
+
/**
|
|
5259
|
+
* @author Daniel DeGroff
|
|
5260
|
+
*/
|
|
5261
|
+
var FormFieldAdminPolicy;
|
|
5262
|
+
(function (FormFieldAdminPolicy) {
|
|
5263
|
+
FormFieldAdminPolicy["Edit"] = "Edit";
|
|
5264
|
+
FormFieldAdminPolicy["View"] = "View";
|
|
5265
|
+
})(FormFieldAdminPolicy = exports.FormFieldAdminPolicy || (exports.FormFieldAdminPolicy = {}));
|
|
5363
5266
|
/**
|
|
5364
5267
|
* Used to communicate whether and how authenticator attestation should be delivered to the Relying Party
|
|
5365
5268
|
*
|
|
@@ -5373,262 +5276,128 @@ var AttestationConveyancePreference;
|
|
|
5373
5276
|
AttestationConveyancePreference["enterprise"] = "enterprise";
|
|
5374
5277
|
})(AttestationConveyancePreference = exports.AttestationConveyancePreference || (exports.AttestationConveyancePreference = {}));
|
|
5375
5278
|
/**
|
|
5376
|
-
* @
|
|
5377
|
-
|
|
5378
|
-
|
|
5379
|
-
|
|
5380
|
-
ObjectState["Active"] = "Active";
|
|
5381
|
-
ObjectState["Inactive"] = "Inactive";
|
|
5382
|
-
ObjectState["PendingDelete"] = "PendingDelete";
|
|
5383
|
-
})(ObjectState = exports.ObjectState || (exports.ObjectState = {}));
|
|
5384
|
-
/**
|
|
5385
|
-
* @author Brett Pontarelli
|
|
5279
|
+
* The possible result states of a webhook event. This tracks the success of the overall webhook transaction according to the {@link TransactionType}
|
|
5280
|
+
* and configured webhooks.
|
|
5281
|
+
*
|
|
5282
|
+
* @author Spencer Witt
|
|
5386
5283
|
*/
|
|
5387
|
-
var
|
|
5388
|
-
(function (
|
|
5389
|
-
|
|
5390
|
-
|
|
5284
|
+
var WebhookEventResult;
|
|
5285
|
+
(function (WebhookEventResult) {
|
|
5286
|
+
WebhookEventResult["Failed"] = "Failed";
|
|
5287
|
+
WebhookEventResult["Running"] = "Running";
|
|
5288
|
+
WebhookEventResult["Succeeded"] = "Succeeded";
|
|
5289
|
+
})(WebhookEventResult = exports.WebhookEventResult || (exports.WebhookEventResult = {}));
|
|
5391
5290
|
/**
|
|
5392
|
-
*
|
|
5393
|
-
*
|
|
5291
|
+
* Identifies the WebAuthn workflow. This will affect the parameters used for credential creation
|
|
5292
|
+
* and request based on the Tenant configuration.
|
|
5394
5293
|
*
|
|
5395
5294
|
* @author Spencer Witt
|
|
5396
5295
|
*/
|
|
5397
|
-
var
|
|
5398
|
-
(function (
|
|
5399
|
-
|
|
5400
|
-
|
|
5401
|
-
|
|
5402
|
-
})(
|
|
5296
|
+
var WebAuthnWorkflow;
|
|
5297
|
+
(function (WebAuthnWorkflow) {
|
|
5298
|
+
WebAuthnWorkflow["bootstrap"] = "bootstrap";
|
|
5299
|
+
WebAuthnWorkflow["general"] = "general";
|
|
5300
|
+
WebAuthnWorkflow["reauthentication"] = "reauthentication";
|
|
5301
|
+
})(WebAuthnWorkflow = exports.WebAuthnWorkflow || (exports.WebAuthnWorkflow = {}));
|
|
5403
5302
|
/**
|
|
5404
|
-
*
|
|
5303
|
+
* Models a consent.
|
|
5304
|
+
*
|
|
5305
|
+
* @author Daniel DeGroff
|
|
5405
5306
|
*/
|
|
5406
|
-
var
|
|
5407
|
-
(function (
|
|
5408
|
-
|
|
5409
|
-
|
|
5410
|
-
|
|
5411
|
-
})(ClientAuthenticationPolicy = exports.ClientAuthenticationPolicy || (exports.ClientAuthenticationPolicy = {}));
|
|
5307
|
+
var ConsentStatus;
|
|
5308
|
+
(function (ConsentStatus) {
|
|
5309
|
+
ConsentStatus["Active"] = "Active";
|
|
5310
|
+
ConsentStatus["Revoked"] = "Revoked";
|
|
5311
|
+
})(ConsentStatus = exports.ConsentStatus || (exports.ConsentStatus = {}));
|
|
5412
5312
|
/**
|
|
5413
5313
|
* @author Daniel DeGroff
|
|
5414
5314
|
*/
|
|
5415
|
-
var
|
|
5416
|
-
(function (
|
|
5417
|
-
|
|
5418
|
-
|
|
5419
|
-
|
|
5420
|
-
|
|
5421
|
-
|
|
5422
|
-
|
|
5423
|
-
|
|
5424
|
-
|
|
5425
|
-
DeviceType["MOBILE"] = "MOBILE";
|
|
5426
|
-
DeviceType["OTHER"] = "OTHER";
|
|
5427
|
-
DeviceType["SERVER"] = "SERVER";
|
|
5428
|
-
DeviceType["TABLET"] = "TABLET";
|
|
5429
|
-
DeviceType["TV"] = "TV";
|
|
5430
|
-
DeviceType["UNKNOWN"] = "UNKNOWN";
|
|
5431
|
-
})(DeviceType = exports.DeviceType || (exports.DeviceType = {}));
|
|
5315
|
+
var HTTPMethod;
|
|
5316
|
+
(function (HTTPMethod) {
|
|
5317
|
+
HTTPMethod["GET"] = "GET";
|
|
5318
|
+
HTTPMethod["POST"] = "POST";
|
|
5319
|
+
HTTPMethod["PUT"] = "PUT";
|
|
5320
|
+
HTTPMethod["DELETE"] = "DELETE";
|
|
5321
|
+
HTTPMethod["HEAD"] = "HEAD";
|
|
5322
|
+
HTTPMethod["OPTIONS"] = "OPTIONS";
|
|
5323
|
+
HTTPMethod["PATCH"] = "PATCH";
|
|
5324
|
+
})(HTTPMethod = exports.HTTPMethod || (exports.HTTPMethod = {}));
|
|
5432
5325
|
/**
|
|
5433
|
-
* @author
|
|
5326
|
+
* @author Daniel DeGroff
|
|
5434
5327
|
*/
|
|
5435
|
-
var
|
|
5436
|
-
(function (
|
|
5437
|
-
|
|
5438
|
-
|
|
5439
|
-
|
|
5440
|
-
|
|
5441
|
-
})(
|
|
5442
|
-
var KeyAlgorithm;
|
|
5443
|
-
(function (KeyAlgorithm) {
|
|
5444
|
-
KeyAlgorithm["ES256"] = "ES256";
|
|
5445
|
-
KeyAlgorithm["ES384"] = "ES384";
|
|
5446
|
-
KeyAlgorithm["ES512"] = "ES512";
|
|
5447
|
-
KeyAlgorithm["HS256"] = "HS256";
|
|
5448
|
-
KeyAlgorithm["HS384"] = "HS384";
|
|
5449
|
-
KeyAlgorithm["HS512"] = "HS512";
|
|
5450
|
-
KeyAlgorithm["RS256"] = "RS256";
|
|
5451
|
-
KeyAlgorithm["RS384"] = "RS384";
|
|
5452
|
-
KeyAlgorithm["RS512"] = "RS512";
|
|
5453
|
-
})(KeyAlgorithm = exports.KeyAlgorithm || (exports.KeyAlgorithm = {}));
|
|
5328
|
+
var UserState;
|
|
5329
|
+
(function (UserState) {
|
|
5330
|
+
UserState["Authenticated"] = "Authenticated";
|
|
5331
|
+
UserState["AuthenticatedNotRegistered"] = "AuthenticatedNotRegistered";
|
|
5332
|
+
UserState["AuthenticatedNotVerified"] = "AuthenticatedNotVerified";
|
|
5333
|
+
UserState["AuthenticatedRegistrationNotVerified"] = "AuthenticatedRegistrationNotVerified";
|
|
5334
|
+
})(UserState = exports.UserState || (exports.UserState = {}));
|
|
5454
5335
|
/**
|
|
5455
5336
|
* @author Daniel DeGroff
|
|
5456
5337
|
*/
|
|
5457
|
-
var
|
|
5458
|
-
(function (
|
|
5459
|
-
|
|
5460
|
-
|
|
5461
|
-
|
|
5462
|
-
|
|
5463
|
-
})(FormType = exports.FormType || (exports.FormType = {}));
|
|
5338
|
+
var RefreshTokenExpirationPolicy;
|
|
5339
|
+
(function (RefreshTokenExpirationPolicy) {
|
|
5340
|
+
RefreshTokenExpirationPolicy["Fixed"] = "Fixed";
|
|
5341
|
+
RefreshTokenExpirationPolicy["SlidingWindow"] = "SlidingWindow";
|
|
5342
|
+
RefreshTokenExpirationPolicy["SlidingWindowWithMaximumLifetime"] = "SlidingWindowWithMaximumLifetime";
|
|
5343
|
+
})(RefreshTokenExpirationPolicy = exports.RefreshTokenExpirationPolicy || (exports.RefreshTokenExpirationPolicy = {}));
|
|
5464
5344
|
/**
|
|
5465
|
-
*
|
|
5345
|
+
* The use type of a key.
|
|
5466
5346
|
*
|
|
5467
|
-
* @author
|
|
5347
|
+
* @author Daniel DeGroff
|
|
5468
5348
|
*/
|
|
5469
|
-
var
|
|
5470
|
-
(function (
|
|
5471
|
-
|
|
5472
|
-
|
|
5473
|
-
|
|
5474
|
-
|
|
5475
|
-
AttestationType["none"] = "none";
|
|
5476
|
-
})(AttestationType = exports.AttestationType || (exports.AttestationType = {}));
|
|
5477
|
-
var KeyType;
|
|
5478
|
-
(function (KeyType) {
|
|
5479
|
-
KeyType["EC"] = "EC";
|
|
5480
|
-
KeyType["RSA"] = "RSA";
|
|
5481
|
-
KeyType["HMAC"] = "HMAC";
|
|
5482
|
-
})(KeyType = exports.KeyType || (exports.KeyType = {}));
|
|
5349
|
+
var KeyUse;
|
|
5350
|
+
(function (KeyUse) {
|
|
5351
|
+
KeyUse["SignOnly"] = "SignOnly";
|
|
5352
|
+
KeyUse["SignAndVerify"] = "SignAndVerify";
|
|
5353
|
+
KeyUse["VerifyOnly"] = "VerifyOnly";
|
|
5354
|
+
})(KeyUse = exports.KeyUse || (exports.KeyUse = {}));
|
|
5483
5355
|
/**
|
|
5484
|
-
*
|
|
5485
|
-
*
|
|
5486
|
-
* @author Trevor Smith
|
|
5356
|
+
* @author Daniel DeGroff
|
|
5487
5357
|
*/
|
|
5488
|
-
var
|
|
5489
|
-
(function (
|
|
5490
|
-
|
|
5491
|
-
|
|
5492
|
-
|
|
5493
|
-
|
|
5358
|
+
var BreachedPasswordStatus;
|
|
5359
|
+
(function (BreachedPasswordStatus) {
|
|
5360
|
+
BreachedPasswordStatus["None"] = "None";
|
|
5361
|
+
BreachedPasswordStatus["ExactMatch"] = "ExactMatch";
|
|
5362
|
+
BreachedPasswordStatus["SubAddressMatch"] = "SubAddressMatch";
|
|
5363
|
+
BreachedPasswordStatus["PasswordOnly"] = "PasswordOnly";
|
|
5364
|
+
BreachedPasswordStatus["CommonPassword"] = "CommonPassword";
|
|
5365
|
+
})(BreachedPasswordStatus = exports.BreachedPasswordStatus || (exports.BreachedPasswordStatus = {}));
|
|
5494
5366
|
/**
|
|
5495
5367
|
* @author Daniel DeGroff
|
|
5496
5368
|
*/
|
|
5497
|
-
var
|
|
5498
|
-
(function (
|
|
5499
|
-
|
|
5500
|
-
|
|
5501
|
-
|
|
5502
|
-
|
|
5369
|
+
var FormControl;
|
|
5370
|
+
(function (FormControl) {
|
|
5371
|
+
FormControl["checkbox"] = "checkbox";
|
|
5372
|
+
FormControl["number"] = "number";
|
|
5373
|
+
FormControl["password"] = "password";
|
|
5374
|
+
FormControl["radio"] = "radio";
|
|
5375
|
+
FormControl["select"] = "select";
|
|
5376
|
+
FormControl["textarea"] = "textarea";
|
|
5377
|
+
FormControl["text"] = "text";
|
|
5378
|
+
})(FormControl = exports.FormControl || (exports.FormControl = {}));
|
|
5503
5379
|
/**
|
|
5504
|
-
*
|
|
5380
|
+
* Controls the policy for whether OAuth workflows will more strictly adhere to the OAuth and OIDC specification
|
|
5381
|
+
* or run in backwards compatibility mode.
|
|
5505
5382
|
*
|
|
5506
|
-
* @author
|
|
5383
|
+
* @author David Charles
|
|
5507
5384
|
*/
|
|
5508
|
-
var
|
|
5509
|
-
(function (
|
|
5510
|
-
|
|
5511
|
-
|
|
5512
|
-
})(
|
|
5385
|
+
var OAuthScopeHandlingPolicy;
|
|
5386
|
+
(function (OAuthScopeHandlingPolicy) {
|
|
5387
|
+
OAuthScopeHandlingPolicy["Compatibility"] = "Compatibility";
|
|
5388
|
+
OAuthScopeHandlingPolicy["Strict"] = "Strict";
|
|
5389
|
+
})(OAuthScopeHandlingPolicy = exports.OAuthScopeHandlingPolicy || (exports.OAuthScopeHandlingPolicy = {}));
|
|
5513
5390
|
/**
|
|
5514
|
-
*
|
|
5391
|
+
* The possible states of an individual webhook attempt to a single endpoint.
|
|
5515
5392
|
*
|
|
5516
5393
|
* @author Spencer Witt
|
|
5517
5394
|
*/
|
|
5518
|
-
var
|
|
5519
|
-
(function (
|
|
5520
|
-
|
|
5521
|
-
|
|
5522
|
-
|
|
5523
|
-
|
|
5524
|
-
CoseEllipticCurve["X25519"] = "X25519";
|
|
5525
|
-
CoseEllipticCurve["X448"] = "X448";
|
|
5526
|
-
CoseEllipticCurve["Ed25519"] = "Ed25519";
|
|
5527
|
-
CoseEllipticCurve["Ed448"] = "Ed448";
|
|
5528
|
-
CoseEllipticCurve["Secp256k1"] = "Secp256k1";
|
|
5529
|
-
})(CoseEllipticCurve = exports.CoseEllipticCurve || (exports.CoseEllipticCurve = {}));
|
|
5530
|
-
var LoginIdType;
|
|
5531
|
-
(function (LoginIdType) {
|
|
5532
|
-
LoginIdType["email"] = "email";
|
|
5533
|
-
LoginIdType["username"] = "username";
|
|
5534
|
-
})(LoginIdType = exports.LoginIdType || (exports.LoginIdType = {}));
|
|
5535
|
-
var RegistrationType;
|
|
5536
|
-
(function (RegistrationType) {
|
|
5537
|
-
RegistrationType["basic"] = "basic";
|
|
5538
|
-
RegistrationType["advanced"] = "advanced";
|
|
5539
|
-
})(RegistrationType = exports.RegistrationType || (exports.RegistrationType = {}));
|
|
5540
|
-
/**
|
|
5541
|
-
* @author Daniel DeGroff
|
|
5542
|
-
*/
|
|
5543
|
-
var RefreshTokenExpirationPolicy;
|
|
5544
|
-
(function (RefreshTokenExpirationPolicy) {
|
|
5545
|
-
RefreshTokenExpirationPolicy["Fixed"] = "Fixed";
|
|
5546
|
-
RefreshTokenExpirationPolicy["SlidingWindow"] = "SlidingWindow";
|
|
5547
|
-
RefreshTokenExpirationPolicy["SlidingWindowWithMaximumLifetime"] = "SlidingWindowWithMaximumLifetime";
|
|
5548
|
-
})(RefreshTokenExpirationPolicy = exports.RefreshTokenExpirationPolicy || (exports.RefreshTokenExpirationPolicy = {}));
|
|
5549
|
-
/**
|
|
5550
|
-
* @author Daniel DeGroff
|
|
5551
|
-
*/
|
|
5552
|
-
var UnverifiedBehavior;
|
|
5553
|
-
(function (UnverifiedBehavior) {
|
|
5554
|
-
UnverifiedBehavior["Allow"] = "Allow";
|
|
5555
|
-
UnverifiedBehavior["Gated"] = "Gated";
|
|
5556
|
-
})(UnverifiedBehavior = exports.UnverifiedBehavior || (exports.UnverifiedBehavior = {}));
|
|
5557
|
-
/**
|
|
5558
|
-
* The phases of a time-based user action.
|
|
5559
|
-
*
|
|
5560
|
-
* @author Brian Pontarelli
|
|
5561
|
-
*/
|
|
5562
|
-
var UserActionPhase;
|
|
5563
|
-
(function (UserActionPhase) {
|
|
5564
|
-
UserActionPhase["start"] = "start";
|
|
5565
|
-
UserActionPhase["modify"] = "modify";
|
|
5566
|
-
UserActionPhase["cancel"] = "cancel";
|
|
5567
|
-
UserActionPhase["end"] = "end";
|
|
5568
|
-
})(UserActionPhase = exports.UserActionPhase || (exports.UserActionPhase = {}));
|
|
5569
|
-
/**
|
|
5570
|
-
* @author Daniel DeGroff
|
|
5571
|
-
*/
|
|
5572
|
-
var LambdaEngineType;
|
|
5573
|
-
(function (LambdaEngineType) {
|
|
5574
|
-
LambdaEngineType["GraalJS"] = "GraalJS";
|
|
5575
|
-
LambdaEngineType["Nashorn"] = "Nashorn";
|
|
5576
|
-
})(LambdaEngineType = exports.LambdaEngineType || (exports.LambdaEngineType = {}));
|
|
5577
|
-
var OAuthErrorType;
|
|
5578
|
-
(function (OAuthErrorType) {
|
|
5579
|
-
OAuthErrorType["invalid_request"] = "invalid_request";
|
|
5580
|
-
OAuthErrorType["invalid_client"] = "invalid_client";
|
|
5581
|
-
OAuthErrorType["invalid_grant"] = "invalid_grant";
|
|
5582
|
-
OAuthErrorType["invalid_token"] = "invalid_token";
|
|
5583
|
-
OAuthErrorType["unauthorized_client"] = "unauthorized_client";
|
|
5584
|
-
OAuthErrorType["invalid_scope"] = "invalid_scope";
|
|
5585
|
-
OAuthErrorType["server_error"] = "server_error";
|
|
5586
|
-
OAuthErrorType["unsupported_grant_type"] = "unsupported_grant_type";
|
|
5587
|
-
OAuthErrorType["unsupported_response_type"] = "unsupported_response_type";
|
|
5588
|
-
OAuthErrorType["access_denied"] = "access_denied";
|
|
5589
|
-
OAuthErrorType["change_password_required"] = "change_password_required";
|
|
5590
|
-
OAuthErrorType["not_licensed"] = "not_licensed";
|
|
5591
|
-
OAuthErrorType["two_factor_required"] = "two_factor_required";
|
|
5592
|
-
OAuthErrorType["authorization_pending"] = "authorization_pending";
|
|
5593
|
-
OAuthErrorType["expired_token"] = "expired_token";
|
|
5594
|
-
OAuthErrorType["unsupported_token_type"] = "unsupported_token_type";
|
|
5595
|
-
})(OAuthErrorType = exports.OAuthErrorType || (exports.OAuthErrorType = {}));
|
|
5596
|
-
/**
|
|
5597
|
-
* @author Daniel DeGroff
|
|
5598
|
-
*/
|
|
5599
|
-
var Sort;
|
|
5600
|
-
(function (Sort) {
|
|
5601
|
-
Sort["asc"] = "asc";
|
|
5602
|
-
Sort["desc"] = "desc";
|
|
5603
|
-
})(Sort = exports.Sort || (exports.Sort = {}));
|
|
5604
|
-
var SAMLLogoutBehavior;
|
|
5605
|
-
(function (SAMLLogoutBehavior) {
|
|
5606
|
-
SAMLLogoutBehavior["AllParticipants"] = "AllParticipants";
|
|
5607
|
-
SAMLLogoutBehavior["OnlyOriginator"] = "OnlyOriginator";
|
|
5608
|
-
})(SAMLLogoutBehavior = exports.SAMLLogoutBehavior || (exports.SAMLLogoutBehavior = {}));
|
|
5609
|
-
/**
|
|
5610
|
-
* The IdP behavior when no user link has been made yet.
|
|
5611
|
-
*
|
|
5612
|
-
* @author Daniel DeGroff
|
|
5613
|
-
*/
|
|
5614
|
-
var IdentityProviderLinkingStrategy;
|
|
5615
|
-
(function (IdentityProviderLinkingStrategy) {
|
|
5616
|
-
IdentityProviderLinkingStrategy["CreatePendingLink"] = "CreatePendingLink";
|
|
5617
|
-
IdentityProviderLinkingStrategy["Disabled"] = "Disabled";
|
|
5618
|
-
IdentityProviderLinkingStrategy["LinkAnonymously"] = "LinkAnonymously";
|
|
5619
|
-
IdentityProviderLinkingStrategy["LinkByEmail"] = "LinkByEmail";
|
|
5620
|
-
IdentityProviderLinkingStrategy["LinkByEmailForExistingUser"] = "LinkByEmailForExistingUser";
|
|
5621
|
-
IdentityProviderLinkingStrategy["LinkByUsername"] = "LinkByUsername";
|
|
5622
|
-
IdentityProviderLinkingStrategy["LinkByUsernameForExistingUser"] = "LinkByUsernameForExistingUser";
|
|
5623
|
-
IdentityProviderLinkingStrategy["Unsupported"] = "Unsupported";
|
|
5624
|
-
})(IdentityProviderLinkingStrategy = exports.IdentityProviderLinkingStrategy || (exports.IdentityProviderLinkingStrategy = {}));
|
|
5625
|
-
var BreachAction;
|
|
5626
|
-
(function (BreachAction) {
|
|
5627
|
-
BreachAction["Off"] = "Off";
|
|
5628
|
-
BreachAction["RecordOnly"] = "RecordOnly";
|
|
5629
|
-
BreachAction["NotifyUser"] = "NotifyUser";
|
|
5630
|
-
BreachAction["RequireChange"] = "RequireChange";
|
|
5631
|
-
})(BreachAction = exports.BreachAction || (exports.BreachAction = {}));
|
|
5395
|
+
var WebhookAttemptResult;
|
|
5396
|
+
(function (WebhookAttemptResult) {
|
|
5397
|
+
WebhookAttemptResult["Success"] = "Success";
|
|
5398
|
+
WebhookAttemptResult["Failure"] = "Failure";
|
|
5399
|
+
WebhookAttemptResult["Unknown"] = "Unknown";
|
|
5400
|
+
})(WebhookAttemptResult = exports.WebhookAttemptResult || (exports.WebhookAttemptResult = {}));
|
|
5632
5401
|
/**
|
|
5633
5402
|
* Event Log Type
|
|
5634
5403
|
*
|
|
@@ -5640,44 +5409,6 @@ var EventLogType;
|
|
|
5640
5409
|
EventLogType["Debug"] = "Debug";
|
|
5641
5410
|
EventLogType["Error"] = "Error";
|
|
5642
5411
|
})(EventLogType = exports.EventLogType || (exports.EventLogType = {}));
|
|
5643
|
-
/**
|
|
5644
|
-
* Available JSON Web Algorithms (JWA) as described in RFC 7518 available for this JWT implementation.
|
|
5645
|
-
*
|
|
5646
|
-
* @author Daniel DeGroff
|
|
5647
|
-
*/
|
|
5648
|
-
var Algorithm;
|
|
5649
|
-
(function (Algorithm) {
|
|
5650
|
-
Algorithm["ES256"] = "ES256";
|
|
5651
|
-
Algorithm["ES384"] = "ES384";
|
|
5652
|
-
Algorithm["ES512"] = "ES512";
|
|
5653
|
-
Algorithm["HS256"] = "HS256";
|
|
5654
|
-
Algorithm["HS384"] = "HS384";
|
|
5655
|
-
Algorithm["HS512"] = "HS512";
|
|
5656
|
-
Algorithm["PS256"] = "PS256";
|
|
5657
|
-
Algorithm["PS384"] = "PS384";
|
|
5658
|
-
Algorithm["PS512"] = "PS512";
|
|
5659
|
-
Algorithm["RS256"] = "RS256";
|
|
5660
|
-
Algorithm["RS384"] = "RS384";
|
|
5661
|
-
Algorithm["RS512"] = "RS512";
|
|
5662
|
-
Algorithm["none"] = "none";
|
|
5663
|
-
})(Algorithm = exports.Algorithm || (exports.Algorithm = {}));
|
|
5664
|
-
/**
|
|
5665
|
-
* The use type of a key.
|
|
5666
|
-
*
|
|
5667
|
-
* @author Daniel DeGroff
|
|
5668
|
-
*/
|
|
5669
|
-
var KeyUse;
|
|
5670
|
-
(function (KeyUse) {
|
|
5671
|
-
KeyUse["SignOnly"] = "SignOnly";
|
|
5672
|
-
KeyUse["SignAndVerify"] = "SignAndVerify";
|
|
5673
|
-
KeyUse["VerifyOnly"] = "VerifyOnly";
|
|
5674
|
-
})(KeyUse = exports.KeyUse || (exports.KeyUse = {}));
|
|
5675
|
-
var FamilyRole;
|
|
5676
|
-
(function (FamilyRole) {
|
|
5677
|
-
FamilyRole["Child"] = "Child";
|
|
5678
|
-
FamilyRole["Teen"] = "Teen";
|
|
5679
|
-
FamilyRole["Adult"] = "Adult";
|
|
5680
|
-
})(FamilyRole = exports.FamilyRole || (exports.FamilyRole = {}));
|
|
5681
5412
|
/**
|
|
5682
5413
|
* The transaction types for Webhooks and other event systems within FusionAuth.
|
|
5683
5414
|
*
|
|
@@ -5692,27 +5423,62 @@ var TransactionType;
|
|
|
5692
5423
|
TransactionType["AbsoluteMajority"] = "AbsoluteMajority";
|
|
5693
5424
|
})(TransactionType = exports.TransactionType || (exports.TransactionType = {}));
|
|
5694
5425
|
/**
|
|
5695
|
-
*
|
|
5696
|
-
* current operation.
|
|
5426
|
+
* COSE key type
|
|
5697
5427
|
*
|
|
5698
5428
|
* @author Spencer Witt
|
|
5699
5429
|
*/
|
|
5700
|
-
var
|
|
5701
|
-
(function (
|
|
5702
|
-
|
|
5703
|
-
|
|
5704
|
-
|
|
5705
|
-
|
|
5430
|
+
var CoseKeyType;
|
|
5431
|
+
(function (CoseKeyType) {
|
|
5432
|
+
CoseKeyType["Reserved"] = "0";
|
|
5433
|
+
CoseKeyType["OKP"] = "1";
|
|
5434
|
+
CoseKeyType["EC2"] = "2";
|
|
5435
|
+
CoseKeyType["RSA"] = "3";
|
|
5436
|
+
CoseKeyType["Symmetric"] = "4";
|
|
5437
|
+
})(CoseKeyType = exports.CoseKeyType || (exports.CoseKeyType = {}));
|
|
5438
|
+
var ThemeType;
|
|
5439
|
+
(function (ThemeType) {
|
|
5440
|
+
ThemeType["advanced"] = "advanced";
|
|
5441
|
+
ThemeType["simple"] = "simple";
|
|
5442
|
+
})(ThemeType = exports.ThemeType || (exports.ThemeType = {}));
|
|
5706
5443
|
/**
|
|
5707
|
-
*
|
|
5444
|
+
* The types of connectors. This enum is stored as an ordinal on the <code>identities</code> table, order must be maintained.
|
|
5708
5445
|
*
|
|
5709
|
-
* @author
|
|
5446
|
+
* @author Trevor Smith
|
|
5710
5447
|
*/
|
|
5711
|
-
var
|
|
5712
|
-
(function (
|
|
5713
|
-
|
|
5714
|
-
|
|
5715
|
-
|
|
5448
|
+
var ConnectorType;
|
|
5449
|
+
(function (ConnectorType) {
|
|
5450
|
+
ConnectorType["FusionAuth"] = "FusionAuth";
|
|
5451
|
+
ConnectorType["Generic"] = "Generic";
|
|
5452
|
+
ConnectorType["LDAP"] = "LDAP";
|
|
5453
|
+
})(ConnectorType = exports.ConnectorType || (exports.ConnectorType = {}));
|
|
5454
|
+
/**
|
|
5455
|
+
* @author Brett Guy
|
|
5456
|
+
*/
|
|
5457
|
+
var ProofKeyForCodeExchangePolicy;
|
|
5458
|
+
(function (ProofKeyForCodeExchangePolicy) {
|
|
5459
|
+
ProofKeyForCodeExchangePolicy["Required"] = "Required";
|
|
5460
|
+
ProofKeyForCodeExchangePolicy["NotRequired"] = "NotRequired";
|
|
5461
|
+
ProofKeyForCodeExchangePolicy["NotRequiredWhenUsingClientAuthentication"] = "NotRequiredWhenUsingClientAuthentication";
|
|
5462
|
+
})(ProofKeyForCodeExchangePolicy = exports.ProofKeyForCodeExchangePolicy || (exports.ProofKeyForCodeExchangePolicy = {}));
|
|
5463
|
+
/**
|
|
5464
|
+
* @author Mikey Sleevi
|
|
5465
|
+
*/
|
|
5466
|
+
var MessageType;
|
|
5467
|
+
(function (MessageType) {
|
|
5468
|
+
MessageType["SMS"] = "SMS";
|
|
5469
|
+
})(MessageType = exports.MessageType || (exports.MessageType = {}));
|
|
5470
|
+
/**
|
|
5471
|
+
* Describes the Relying Party's requirements for <a href="https://www.w3.org/TR/webauthn-2/#client-side-discoverable-credential">client-side
|
|
5472
|
+
* discoverable credentials</a> (formerly known as "resident keys")
|
|
5473
|
+
*
|
|
5474
|
+
* @author Spencer Witt
|
|
5475
|
+
*/
|
|
5476
|
+
var ResidentKeyRequirement;
|
|
5477
|
+
(function (ResidentKeyRequirement) {
|
|
5478
|
+
ResidentKeyRequirement["discouraged"] = "discouraged";
|
|
5479
|
+
ResidentKeyRequirement["preferred"] = "preferred";
|
|
5480
|
+
ResidentKeyRequirement["required"] = "required";
|
|
5481
|
+
})(ResidentKeyRequirement = exports.ResidentKeyRequirement || (exports.ResidentKeyRequirement = {}));
|
|
5716
5482
|
/**
|
|
5717
5483
|
* @author Trevor Smith
|
|
5718
5484
|
*/
|
|
@@ -5723,33 +5489,448 @@ var ChangePasswordReason;
|
|
|
5723
5489
|
ChangePasswordReason["Expired"] = "Expired";
|
|
5724
5490
|
ChangePasswordReason["Validation"] = "Validation";
|
|
5725
5491
|
})(ChangePasswordReason = exports.ChangePasswordReason || (exports.ChangePasswordReason = {}));
|
|
5726
|
-
var
|
|
5727
|
-
(function (
|
|
5728
|
-
|
|
5729
|
-
|
|
5730
|
-
|
|
5731
|
-
})(
|
|
5492
|
+
var LDAPSecurityMethod;
|
|
5493
|
+
(function (LDAPSecurityMethod) {
|
|
5494
|
+
LDAPSecurityMethod["None"] = "None";
|
|
5495
|
+
LDAPSecurityMethod["LDAPS"] = "LDAPS";
|
|
5496
|
+
LDAPSecurityMethod["StartTLS"] = "StartTLS";
|
|
5497
|
+
})(LDAPSecurityMethod = exports.LDAPSecurityMethod || (exports.LDAPSecurityMethod = {}));
|
|
5732
5498
|
/**
|
|
5733
|
-
* @author
|
|
5499
|
+
* @author Johnathon Wood
|
|
5734
5500
|
*/
|
|
5735
|
-
var
|
|
5736
|
-
(function (
|
|
5737
|
-
|
|
5738
|
-
|
|
5739
|
-
|
|
5740
|
-
ExpiryUnit["WEEKS"] = "WEEKS";
|
|
5741
|
-
ExpiryUnit["MONTHS"] = "MONTHS";
|
|
5742
|
-
ExpiryUnit["YEARS"] = "YEARS";
|
|
5743
|
-
})(ExpiryUnit = exports.ExpiryUnit || (exports.ExpiryUnit = {}));
|
|
5501
|
+
var Oauth2AuthorizedURLValidationPolicy;
|
|
5502
|
+
(function (Oauth2AuthorizedURLValidationPolicy) {
|
|
5503
|
+
Oauth2AuthorizedURLValidationPolicy["AllowWildcards"] = "AllowWildcards";
|
|
5504
|
+
Oauth2AuthorizedURLValidationPolicy["ExactMatch"] = "ExactMatch";
|
|
5505
|
+
})(Oauth2AuthorizedURLValidationPolicy = exports.Oauth2AuthorizedURLValidationPolicy || (exports.Oauth2AuthorizedURLValidationPolicy = {}));
|
|
5744
5506
|
/**
|
|
5745
|
-
*
|
|
5507
|
+
* Describes the <a href="https://www.w3.org/TR/webauthn-2/#authenticator-attachment-modality">authenticator attachment modality</a>.
|
|
5508
|
+
*
|
|
5509
|
+
* @author Spencer Witt
|
|
5746
5510
|
*/
|
|
5747
|
-
var
|
|
5748
|
-
(function (
|
|
5749
|
-
|
|
5750
|
-
|
|
5751
|
-
|
|
5752
|
-
|
|
5511
|
+
var AuthenticatorAttachment;
|
|
5512
|
+
(function (AuthenticatorAttachment) {
|
|
5513
|
+
AuthenticatorAttachment["platform"] = "platform";
|
|
5514
|
+
AuthenticatorAttachment["crossPlatform"] = "crossPlatform";
|
|
5515
|
+
})(AuthenticatorAttachment = exports.AuthenticatorAttachment || (exports.AuthenticatorAttachment = {}));
|
|
5516
|
+
/**
|
|
5517
|
+
* @author Brett Pontarelli
|
|
5518
|
+
*/
|
|
5519
|
+
var IdentityProviderLoginMethod;
|
|
5520
|
+
(function (IdentityProviderLoginMethod) {
|
|
5521
|
+
IdentityProviderLoginMethod["UsePopup"] = "UsePopup";
|
|
5522
|
+
IdentityProviderLoginMethod["UseRedirect"] = "UseRedirect";
|
|
5523
|
+
IdentityProviderLoginMethod["UseVendorJavaScript"] = "UseVendorJavaScript";
|
|
5524
|
+
})(IdentityProviderLoginMethod = exports.IdentityProviderLoginMethod || (exports.IdentityProviderLoginMethod = {}));
|
|
5525
|
+
/**
|
|
5526
|
+
* @author Daniel DeGroff
|
|
5527
|
+
*/
|
|
5528
|
+
var RefreshTokenUsagePolicy;
|
|
5529
|
+
(function (RefreshTokenUsagePolicy) {
|
|
5530
|
+
RefreshTokenUsagePolicy["Reusable"] = "Reusable";
|
|
5531
|
+
RefreshTokenUsagePolicy["OneTimeUse"] = "OneTimeUse";
|
|
5532
|
+
})(RefreshTokenUsagePolicy = exports.RefreshTokenUsagePolicy || (exports.RefreshTokenUsagePolicy = {}));
|
|
5533
|
+
/**
|
|
5534
|
+
* @author Lyle Schemmerling
|
|
5535
|
+
*/
|
|
5536
|
+
var SAMLv2DestinationAssertionPolicy;
|
|
5537
|
+
(function (SAMLv2DestinationAssertionPolicy) {
|
|
5538
|
+
SAMLv2DestinationAssertionPolicy["Enabled"] = "Enabled";
|
|
5539
|
+
SAMLv2DestinationAssertionPolicy["Disabled"] = "Disabled";
|
|
5540
|
+
SAMLv2DestinationAssertionPolicy["AllowAlternates"] = "AllowAlternates";
|
|
5541
|
+
})(SAMLv2DestinationAssertionPolicy = exports.SAMLv2DestinationAssertionPolicy || (exports.SAMLv2DestinationAssertionPolicy = {}));
|
|
5542
|
+
var OAuthErrorReason;
|
|
5543
|
+
(function (OAuthErrorReason) {
|
|
5544
|
+
OAuthErrorReason["auth_code_not_found"] = "auth_code_not_found";
|
|
5545
|
+
OAuthErrorReason["access_token_malformed"] = "access_token_malformed";
|
|
5546
|
+
OAuthErrorReason["access_token_expired"] = "access_token_expired";
|
|
5547
|
+
OAuthErrorReason["access_token_unavailable_for_processing"] = "access_token_unavailable_for_processing";
|
|
5548
|
+
OAuthErrorReason["access_token_failed_processing"] = "access_token_failed_processing";
|
|
5549
|
+
OAuthErrorReason["access_token_invalid"] = "access_token_invalid";
|
|
5550
|
+
OAuthErrorReason["access_token_required"] = "access_token_required";
|
|
5551
|
+
OAuthErrorReason["refresh_token_not_found"] = "refresh_token_not_found";
|
|
5552
|
+
OAuthErrorReason["refresh_token_type_not_supported"] = "refresh_token_type_not_supported";
|
|
5553
|
+
OAuthErrorReason["invalid_client_id"] = "invalid_client_id";
|
|
5554
|
+
OAuthErrorReason["invalid_user_credentials"] = "invalid_user_credentials";
|
|
5555
|
+
OAuthErrorReason["invalid_grant_type"] = "invalid_grant_type";
|
|
5556
|
+
OAuthErrorReason["invalid_origin"] = "invalid_origin";
|
|
5557
|
+
OAuthErrorReason["invalid_origin_opaque"] = "invalid_origin_opaque";
|
|
5558
|
+
OAuthErrorReason["invalid_pkce_code_verifier"] = "invalid_pkce_code_verifier";
|
|
5559
|
+
OAuthErrorReason["invalid_pkce_code_challenge"] = "invalid_pkce_code_challenge";
|
|
5560
|
+
OAuthErrorReason["invalid_pkce_code_challenge_method"] = "invalid_pkce_code_challenge_method";
|
|
5561
|
+
OAuthErrorReason["invalid_redirect_uri"] = "invalid_redirect_uri";
|
|
5562
|
+
OAuthErrorReason["invalid_response_mode"] = "invalid_response_mode";
|
|
5563
|
+
OAuthErrorReason["invalid_response_type"] = "invalid_response_type";
|
|
5564
|
+
OAuthErrorReason["invalid_id_token_hint"] = "invalid_id_token_hint";
|
|
5565
|
+
OAuthErrorReason["invalid_post_logout_redirect_uri"] = "invalid_post_logout_redirect_uri";
|
|
5566
|
+
OAuthErrorReason["invalid_device_code"] = "invalid_device_code";
|
|
5567
|
+
OAuthErrorReason["invalid_user_code"] = "invalid_user_code";
|
|
5568
|
+
OAuthErrorReason["invalid_additional_client_id"] = "invalid_additional_client_id";
|
|
5569
|
+
OAuthErrorReason["invalid_target_entity_scope"] = "invalid_target_entity_scope";
|
|
5570
|
+
OAuthErrorReason["invalid_entity_permission_scope"] = "invalid_entity_permission_scope";
|
|
5571
|
+
OAuthErrorReason["invalid_user_id"] = "invalid_user_id";
|
|
5572
|
+
OAuthErrorReason["grant_type_disabled"] = "grant_type_disabled";
|
|
5573
|
+
OAuthErrorReason["missing_client_id"] = "missing_client_id";
|
|
5574
|
+
OAuthErrorReason["missing_client_secret"] = "missing_client_secret";
|
|
5575
|
+
OAuthErrorReason["missing_code"] = "missing_code";
|
|
5576
|
+
OAuthErrorReason["missing_code_challenge"] = "missing_code_challenge";
|
|
5577
|
+
OAuthErrorReason["missing_code_verifier"] = "missing_code_verifier";
|
|
5578
|
+
OAuthErrorReason["missing_device_code"] = "missing_device_code";
|
|
5579
|
+
OAuthErrorReason["missing_grant_type"] = "missing_grant_type";
|
|
5580
|
+
OAuthErrorReason["missing_redirect_uri"] = "missing_redirect_uri";
|
|
5581
|
+
OAuthErrorReason["missing_refresh_token"] = "missing_refresh_token";
|
|
5582
|
+
OAuthErrorReason["missing_response_type"] = "missing_response_type";
|
|
5583
|
+
OAuthErrorReason["missing_token"] = "missing_token";
|
|
5584
|
+
OAuthErrorReason["missing_user_code"] = "missing_user_code";
|
|
5585
|
+
OAuthErrorReason["missing_user_id"] = "missing_user_id";
|
|
5586
|
+
OAuthErrorReason["missing_verification_uri"] = "missing_verification_uri";
|
|
5587
|
+
OAuthErrorReason["login_prevented"] = "login_prevented";
|
|
5588
|
+
OAuthErrorReason["not_licensed"] = "not_licensed";
|
|
5589
|
+
OAuthErrorReason["user_code_expired"] = "user_code_expired";
|
|
5590
|
+
OAuthErrorReason["user_expired"] = "user_expired";
|
|
5591
|
+
OAuthErrorReason["user_locked"] = "user_locked";
|
|
5592
|
+
OAuthErrorReason["user_not_found"] = "user_not_found";
|
|
5593
|
+
OAuthErrorReason["client_authentication_missing"] = "client_authentication_missing";
|
|
5594
|
+
OAuthErrorReason["invalid_client_authentication_scheme"] = "invalid_client_authentication_scheme";
|
|
5595
|
+
OAuthErrorReason["invalid_client_authentication"] = "invalid_client_authentication";
|
|
5596
|
+
OAuthErrorReason["client_id_mismatch"] = "client_id_mismatch";
|
|
5597
|
+
OAuthErrorReason["change_password_administrative"] = "change_password_administrative";
|
|
5598
|
+
OAuthErrorReason["change_password_breached"] = "change_password_breached";
|
|
5599
|
+
OAuthErrorReason["change_password_expired"] = "change_password_expired";
|
|
5600
|
+
OAuthErrorReason["change_password_validation"] = "change_password_validation";
|
|
5601
|
+
OAuthErrorReason["unknown"] = "unknown";
|
|
5602
|
+
OAuthErrorReason["missing_required_scope"] = "missing_required_scope";
|
|
5603
|
+
OAuthErrorReason["unknown_scope"] = "unknown_scope";
|
|
5604
|
+
OAuthErrorReason["consent_canceled"] = "consent_canceled";
|
|
5605
|
+
})(OAuthErrorReason = exports.OAuthErrorReason || (exports.OAuthErrorReason = {}));
|
|
5606
|
+
var OAuthErrorType;
|
|
5607
|
+
(function (OAuthErrorType) {
|
|
5608
|
+
OAuthErrorType["invalid_request"] = "invalid_request";
|
|
5609
|
+
OAuthErrorType["invalid_client"] = "invalid_client";
|
|
5610
|
+
OAuthErrorType["invalid_grant"] = "invalid_grant";
|
|
5611
|
+
OAuthErrorType["invalid_token"] = "invalid_token";
|
|
5612
|
+
OAuthErrorType["unauthorized_client"] = "unauthorized_client";
|
|
5613
|
+
OAuthErrorType["invalid_scope"] = "invalid_scope";
|
|
5614
|
+
OAuthErrorType["server_error"] = "server_error";
|
|
5615
|
+
OAuthErrorType["unsupported_grant_type"] = "unsupported_grant_type";
|
|
5616
|
+
OAuthErrorType["unsupported_response_type"] = "unsupported_response_type";
|
|
5617
|
+
OAuthErrorType["access_denied"] = "access_denied";
|
|
5618
|
+
OAuthErrorType["change_password_required"] = "change_password_required";
|
|
5619
|
+
OAuthErrorType["not_licensed"] = "not_licensed";
|
|
5620
|
+
OAuthErrorType["two_factor_required"] = "two_factor_required";
|
|
5621
|
+
OAuthErrorType["authorization_pending"] = "authorization_pending";
|
|
5622
|
+
OAuthErrorType["expired_token"] = "expired_token";
|
|
5623
|
+
OAuthErrorType["unsupported_token_type"] = "unsupported_token_type";
|
|
5624
|
+
})(OAuthErrorType = exports.OAuthErrorType || (exports.OAuthErrorType = {}));
|
|
5625
|
+
var DeviceType;
|
|
5626
|
+
(function (DeviceType) {
|
|
5627
|
+
DeviceType["BROWSER"] = "BROWSER";
|
|
5628
|
+
DeviceType["DESKTOP"] = "DESKTOP";
|
|
5629
|
+
DeviceType["LAPTOP"] = "LAPTOP";
|
|
5630
|
+
DeviceType["MOBILE"] = "MOBILE";
|
|
5631
|
+
DeviceType["OTHER"] = "OTHER";
|
|
5632
|
+
DeviceType["SERVER"] = "SERVER";
|
|
5633
|
+
DeviceType["TABLET"] = "TABLET";
|
|
5634
|
+
DeviceType["TV"] = "TV";
|
|
5635
|
+
DeviceType["UNKNOWN"] = "UNKNOWN";
|
|
5636
|
+
})(DeviceType = exports.DeviceType || (exports.DeviceType = {}));
|
|
5637
|
+
/**
|
|
5638
|
+
* @author Daniel DeGroff
|
|
5639
|
+
*/
|
|
5640
|
+
var ApplicationMultiFactorTrustPolicy;
|
|
5641
|
+
(function (ApplicationMultiFactorTrustPolicy) {
|
|
5642
|
+
ApplicationMultiFactorTrustPolicy["Any"] = "Any";
|
|
5643
|
+
ApplicationMultiFactorTrustPolicy["This"] = "This";
|
|
5644
|
+
ApplicationMultiFactorTrustPolicy["None"] = "None";
|
|
5645
|
+
})(ApplicationMultiFactorTrustPolicy = exports.ApplicationMultiFactorTrustPolicy || (exports.ApplicationMultiFactorTrustPolicy = {}));
|
|
5646
|
+
/**
|
|
5647
|
+
* @author Daniel DeGroff
|
|
5648
|
+
*/
|
|
5649
|
+
var RateLimitedRequestType;
|
|
5650
|
+
(function (RateLimitedRequestType) {
|
|
5651
|
+
RateLimitedRequestType["FailedLogin"] = "FailedLogin";
|
|
5652
|
+
RateLimitedRequestType["ForgotPassword"] = "ForgotPassword";
|
|
5653
|
+
RateLimitedRequestType["SendEmailVerification"] = "SendEmailVerification";
|
|
5654
|
+
RateLimitedRequestType["SendPasswordless"] = "SendPasswordless";
|
|
5655
|
+
RateLimitedRequestType["SendRegistrationVerification"] = "SendRegistrationVerification";
|
|
5656
|
+
RateLimitedRequestType["SendTwoFactor"] = "SendTwoFactor";
|
|
5657
|
+
})(RateLimitedRequestType = exports.RateLimitedRequestType || (exports.RateLimitedRequestType = {}));
|
|
5658
|
+
/**
|
|
5659
|
+
* @author Daniel DeGroff
|
|
5660
|
+
*/
|
|
5661
|
+
var LambdaEngineType;
|
|
5662
|
+
(function (LambdaEngineType) {
|
|
5663
|
+
LambdaEngineType["GraalJS"] = "GraalJS";
|
|
5664
|
+
LambdaEngineType["Nashorn"] = "Nashorn";
|
|
5665
|
+
})(LambdaEngineType = exports.LambdaEngineType || (exports.LambdaEngineType = {}));
|
|
5666
|
+
/**
|
|
5667
|
+
* Used to express whether the Relying Party requires <a href="https://www.w3.org/TR/webauthn-2/#user-verification">user verification</a> for the
|
|
5668
|
+
* current operation.
|
|
5669
|
+
*
|
|
5670
|
+
* @author Spencer Witt
|
|
5671
|
+
*/
|
|
5672
|
+
var UserVerificationRequirement;
|
|
5673
|
+
(function (UserVerificationRequirement) {
|
|
5674
|
+
UserVerificationRequirement["required"] = "required";
|
|
5675
|
+
UserVerificationRequirement["preferred"] = "preferred";
|
|
5676
|
+
UserVerificationRequirement["discouraged"] = "discouraged";
|
|
5677
|
+
})(UserVerificationRequirement = exports.UserVerificationRequirement || (exports.UserVerificationRequirement = {}));
|
|
5678
|
+
/**
|
|
5679
|
+
* @author Brian Pontarelli
|
|
5680
|
+
*/
|
|
5681
|
+
var ExpiryUnit;
|
|
5682
|
+
(function (ExpiryUnit) {
|
|
5683
|
+
ExpiryUnit["MINUTES"] = "MINUTES";
|
|
5684
|
+
ExpiryUnit["HOURS"] = "HOURS";
|
|
5685
|
+
ExpiryUnit["DAYS"] = "DAYS";
|
|
5686
|
+
ExpiryUnit["WEEKS"] = "WEEKS";
|
|
5687
|
+
ExpiryUnit["MONTHS"] = "MONTHS";
|
|
5688
|
+
ExpiryUnit["YEARS"] = "YEARS";
|
|
5689
|
+
})(ExpiryUnit = exports.ExpiryUnit || (exports.ExpiryUnit = {}));
|
|
5690
|
+
/**
|
|
5691
|
+
* @author Brett Guy
|
|
5692
|
+
*/
|
|
5693
|
+
var ClientAuthenticationPolicy;
|
|
5694
|
+
(function (ClientAuthenticationPolicy) {
|
|
5695
|
+
ClientAuthenticationPolicy["Required"] = "Required";
|
|
5696
|
+
ClientAuthenticationPolicy["NotRequired"] = "NotRequired";
|
|
5697
|
+
ClientAuthenticationPolicy["NotRequiredWhenUsingPKCE"] = "NotRequiredWhenUsingPKCE";
|
|
5698
|
+
})(ClientAuthenticationPolicy = exports.ClientAuthenticationPolicy || (exports.ClientAuthenticationPolicy = {}));
|
|
5699
|
+
/**
|
|
5700
|
+
* @author Daniel DeGroff
|
|
5701
|
+
*/
|
|
5702
|
+
var FormType;
|
|
5703
|
+
(function (FormType) {
|
|
5704
|
+
FormType["registration"] = "registration";
|
|
5705
|
+
FormType["adminRegistration"] = "adminRegistration";
|
|
5706
|
+
FormType["adminUser"] = "adminUser";
|
|
5707
|
+
FormType["selfServiceUser"] = "selfServiceUser";
|
|
5708
|
+
})(FormType = exports.FormType || (exports.FormType = {}));
|
|
5709
|
+
/**
|
|
5710
|
+
* XML canonicalization method enumeration. This is used for the IdP and SP side of FusionAuth SAML.
|
|
5711
|
+
*
|
|
5712
|
+
* @author Brian Pontarelli
|
|
5713
|
+
*/
|
|
5714
|
+
var CanonicalizationMethod;
|
|
5715
|
+
(function (CanonicalizationMethod) {
|
|
5716
|
+
CanonicalizationMethod["exclusive"] = "exclusive";
|
|
5717
|
+
CanonicalizationMethod["exclusive_with_comments"] = "exclusive_with_comments";
|
|
5718
|
+
CanonicalizationMethod["inclusive"] = "inclusive";
|
|
5719
|
+
CanonicalizationMethod["inclusive_with_comments"] = "inclusive_with_comments";
|
|
5720
|
+
})(CanonicalizationMethod = exports.CanonicalizationMethod || (exports.CanonicalizationMethod = {}));
|
|
5721
|
+
/**
|
|
5722
|
+
* @author Daniel DeGroff
|
|
5723
|
+
*/
|
|
5724
|
+
var SecureGeneratorType;
|
|
5725
|
+
(function (SecureGeneratorType) {
|
|
5726
|
+
SecureGeneratorType["randomDigits"] = "randomDigits";
|
|
5727
|
+
SecureGeneratorType["randomBytes"] = "randomBytes";
|
|
5728
|
+
SecureGeneratorType["randomAlpha"] = "randomAlpha";
|
|
5729
|
+
SecureGeneratorType["randomAlphaNumeric"] = "randomAlphaNumeric";
|
|
5730
|
+
})(SecureGeneratorType = exports.SecureGeneratorType || (exports.SecureGeneratorType = {}));
|
|
5731
|
+
/**
|
|
5732
|
+
* @author Daniel DeGroff
|
|
5733
|
+
*/
|
|
5734
|
+
var FormDataType;
|
|
5735
|
+
(function (FormDataType) {
|
|
5736
|
+
FormDataType["bool"] = "bool";
|
|
5737
|
+
FormDataType["consent"] = "consent";
|
|
5738
|
+
FormDataType["date"] = "date";
|
|
5739
|
+
FormDataType["email"] = "email";
|
|
5740
|
+
FormDataType["number"] = "number";
|
|
5741
|
+
FormDataType["string"] = "string";
|
|
5742
|
+
})(FormDataType = exports.FormDataType || (exports.FormDataType = {}));
|
|
5743
|
+
/**
|
|
5744
|
+
* The IdP behavior when no user link has been made yet.
|
|
5745
|
+
*
|
|
5746
|
+
* @author Daniel DeGroff
|
|
5747
|
+
*/
|
|
5748
|
+
var IdentityProviderLinkingStrategy;
|
|
5749
|
+
(function (IdentityProviderLinkingStrategy) {
|
|
5750
|
+
IdentityProviderLinkingStrategy["CreatePendingLink"] = "CreatePendingLink";
|
|
5751
|
+
IdentityProviderLinkingStrategy["Disabled"] = "Disabled";
|
|
5752
|
+
IdentityProviderLinkingStrategy["LinkAnonymously"] = "LinkAnonymously";
|
|
5753
|
+
IdentityProviderLinkingStrategy["LinkByEmail"] = "LinkByEmail";
|
|
5754
|
+
IdentityProviderLinkingStrategy["LinkByEmailForExistingUser"] = "LinkByEmailForExistingUser";
|
|
5755
|
+
IdentityProviderLinkingStrategy["LinkByUsername"] = "LinkByUsername";
|
|
5756
|
+
IdentityProviderLinkingStrategy["LinkByUsernameForExistingUser"] = "LinkByUsernameForExistingUser";
|
|
5757
|
+
IdentityProviderLinkingStrategy["Unsupported"] = "Unsupported";
|
|
5758
|
+
})(IdentityProviderLinkingStrategy = exports.IdentityProviderLinkingStrategy || (exports.IdentityProviderLinkingStrategy = {}));
|
|
5759
|
+
/**
|
|
5760
|
+
* @author Daniel DeGroff
|
|
5761
|
+
*/
|
|
5762
|
+
var MultiFactorLoginPolicy;
|
|
5763
|
+
(function (MultiFactorLoginPolicy) {
|
|
5764
|
+
MultiFactorLoginPolicy["Disabled"] = "Disabled";
|
|
5765
|
+
MultiFactorLoginPolicy["Enabled"] = "Enabled";
|
|
5766
|
+
MultiFactorLoginPolicy["Required"] = "Required";
|
|
5767
|
+
})(MultiFactorLoginPolicy = exports.MultiFactorLoginPolicy || (exports.MultiFactorLoginPolicy = {}));
|
|
5768
|
+
/**
|
|
5769
|
+
* @author Brett Guy
|
|
5770
|
+
*/
|
|
5771
|
+
var IPAccessControlEntryAction;
|
|
5772
|
+
(function (IPAccessControlEntryAction) {
|
|
5773
|
+
IPAccessControlEntryAction["Allow"] = "Allow";
|
|
5774
|
+
IPAccessControlEntryAction["Block"] = "Block";
|
|
5775
|
+
})(IPAccessControlEntryAction = exports.IPAccessControlEntryAction || (exports.IPAccessControlEntryAction = {}));
|
|
5776
|
+
/**
|
|
5777
|
+
* The phases of a time-based user action.
|
|
5778
|
+
*
|
|
5779
|
+
* @author Brian Pontarelli
|
|
5780
|
+
*/
|
|
5781
|
+
var UserActionPhase;
|
|
5782
|
+
(function (UserActionPhase) {
|
|
5783
|
+
UserActionPhase["start"] = "start";
|
|
5784
|
+
UserActionPhase["modify"] = "modify";
|
|
5785
|
+
UserActionPhase["cancel"] = "cancel";
|
|
5786
|
+
UserActionPhase["end"] = "end";
|
|
5787
|
+
})(UserActionPhase = exports.UserActionPhase || (exports.UserActionPhase = {}));
|
|
5788
|
+
/**
|
|
5789
|
+
* The types of lambdas that indicate how they are invoked by FusionAuth.
|
|
5790
|
+
*
|
|
5791
|
+
* @author Brian Pontarelli
|
|
5792
|
+
*/
|
|
5793
|
+
var LambdaType;
|
|
5794
|
+
(function (LambdaType) {
|
|
5795
|
+
LambdaType["JWTPopulate"] = "JWTPopulate";
|
|
5796
|
+
LambdaType["OpenIDReconcile"] = "OpenIDReconcile";
|
|
5797
|
+
LambdaType["SAMLv2Reconcile"] = "SAMLv2Reconcile";
|
|
5798
|
+
LambdaType["SAMLv2Populate"] = "SAMLv2Populate";
|
|
5799
|
+
LambdaType["AppleReconcile"] = "AppleReconcile";
|
|
5800
|
+
LambdaType["ExternalJWTReconcile"] = "ExternalJWTReconcile";
|
|
5801
|
+
LambdaType["FacebookReconcile"] = "FacebookReconcile";
|
|
5802
|
+
LambdaType["GoogleReconcile"] = "GoogleReconcile";
|
|
5803
|
+
LambdaType["HYPRReconcile"] = "HYPRReconcile";
|
|
5804
|
+
LambdaType["TwitterReconcile"] = "TwitterReconcile";
|
|
5805
|
+
LambdaType["LDAPConnectorReconcile"] = "LDAPConnectorReconcile";
|
|
5806
|
+
LambdaType["LinkedInReconcile"] = "LinkedInReconcile";
|
|
5807
|
+
LambdaType["EpicGamesReconcile"] = "EpicGamesReconcile";
|
|
5808
|
+
LambdaType["NintendoReconcile"] = "NintendoReconcile";
|
|
5809
|
+
LambdaType["SonyPSNReconcile"] = "SonyPSNReconcile";
|
|
5810
|
+
LambdaType["SteamReconcile"] = "SteamReconcile";
|
|
5811
|
+
LambdaType["TwitchReconcile"] = "TwitchReconcile";
|
|
5812
|
+
LambdaType["XboxReconcile"] = "XboxReconcile";
|
|
5813
|
+
LambdaType["ClientCredentialsJWTPopulate"] = "ClientCredentialsJWTPopulate";
|
|
5814
|
+
LambdaType["SCIMServerGroupRequestConverter"] = "SCIMServerGroupRequestConverter";
|
|
5815
|
+
LambdaType["SCIMServerGroupResponseConverter"] = "SCIMServerGroupResponseConverter";
|
|
5816
|
+
LambdaType["SCIMServerUserRequestConverter"] = "SCIMServerUserRequestConverter";
|
|
5817
|
+
LambdaType["SCIMServerUserResponseConverter"] = "SCIMServerUserResponseConverter";
|
|
5818
|
+
LambdaType["SelfServiceRegistrationValidation"] = "SelfServiceRegistrationValidation";
|
|
5819
|
+
LambdaType["UserInfoPopulate"] = "UserInfoPopulate";
|
|
5820
|
+
LambdaType["LoginValidation"] = "LoginValidation";
|
|
5821
|
+
})(LambdaType = exports.LambdaType || (exports.LambdaType = {}));
|
|
5822
|
+
/**
|
|
5823
|
+
* @author Daniel DeGroff
|
|
5824
|
+
*/
|
|
5825
|
+
var SystemTrustedProxyConfigurationPolicy;
|
|
5826
|
+
(function (SystemTrustedProxyConfigurationPolicy) {
|
|
5827
|
+
SystemTrustedProxyConfigurationPolicy["All"] = "All";
|
|
5828
|
+
SystemTrustedProxyConfigurationPolicy["OnlyConfigured"] = "OnlyConfigured";
|
|
5829
|
+
})(SystemTrustedProxyConfigurationPolicy = exports.SystemTrustedProxyConfigurationPolicy || (exports.SystemTrustedProxyConfigurationPolicy = {}));
|
|
5830
|
+
var LoginIdType;
|
|
5831
|
+
(function (LoginIdType) {
|
|
5832
|
+
LoginIdType["email"] = "email";
|
|
5833
|
+
LoginIdType["username"] = "username";
|
|
5834
|
+
})(LoginIdType = exports.LoginIdType || (exports.LoginIdType = {}));
|
|
5835
|
+
var RegistrationType;
|
|
5836
|
+
(function (RegistrationType) {
|
|
5837
|
+
RegistrationType["basic"] = "basic";
|
|
5838
|
+
RegistrationType["advanced"] = "advanced";
|
|
5839
|
+
})(RegistrationType = exports.RegistrationType || (exports.RegistrationType = {}));
|
|
5840
|
+
var SAMLLogoutBehavior;
|
|
5841
|
+
(function (SAMLLogoutBehavior) {
|
|
5842
|
+
SAMLLogoutBehavior["AllParticipants"] = "AllParticipants";
|
|
5843
|
+
SAMLLogoutBehavior["OnlyOriginator"] = "OnlyOriginator";
|
|
5844
|
+
})(SAMLLogoutBehavior = exports.SAMLLogoutBehavior || (exports.SAMLLogoutBehavior = {}));
|
|
5845
|
+
var XMLSignatureLocation;
|
|
5846
|
+
(function (XMLSignatureLocation) {
|
|
5847
|
+
XMLSignatureLocation["Assertion"] = "Assertion";
|
|
5848
|
+
XMLSignatureLocation["Response"] = "Response";
|
|
5849
|
+
})(XMLSignatureLocation = exports.XMLSignatureLocation || (exports.XMLSignatureLocation = {}));
|
|
5850
|
+
/**
|
|
5851
|
+
* @author Daniel DeGroff
|
|
5852
|
+
*/
|
|
5853
|
+
var Sort;
|
|
5854
|
+
(function (Sort) {
|
|
5855
|
+
Sort["asc"] = "asc";
|
|
5856
|
+
Sort["desc"] = "desc";
|
|
5857
|
+
})(Sort = exports.Sort || (exports.Sort = {}));
|
|
5858
|
+
/**
|
|
5859
|
+
* Describes the authenticator attachment modality preference for a WebAuthn workflow. See {@link AuthenticatorAttachment}
|
|
5860
|
+
*
|
|
5861
|
+
* @author Spencer Witt
|
|
5862
|
+
*/
|
|
5863
|
+
var AuthenticatorAttachmentPreference;
|
|
5864
|
+
(function (AuthenticatorAttachmentPreference) {
|
|
5865
|
+
AuthenticatorAttachmentPreference["any"] = "any";
|
|
5866
|
+
AuthenticatorAttachmentPreference["platform"] = "platform";
|
|
5867
|
+
AuthenticatorAttachmentPreference["crossPlatform"] = "crossPlatform";
|
|
5868
|
+
})(AuthenticatorAttachmentPreference = exports.AuthenticatorAttachmentPreference || (exports.AuthenticatorAttachmentPreference = {}));
|
|
5869
|
+
/**
|
|
5870
|
+
* Defines valid credential types. This is an extension point in the WebAuthn spec. The only defined value at this time is "public-key"
|
|
5871
|
+
*
|
|
5872
|
+
* @author Spencer Witt
|
|
5873
|
+
*/
|
|
5874
|
+
var PublicKeyCredentialType;
|
|
5875
|
+
(function (PublicKeyCredentialType) {
|
|
5876
|
+
PublicKeyCredentialType["publicKey"] = "public-key";
|
|
5877
|
+
})(PublicKeyCredentialType = exports.PublicKeyCredentialType || (exports.PublicKeyCredentialType = {}));
|
|
5878
|
+
/**
|
|
5879
|
+
* COSE Elliptic Curve identifier to determine which elliptic curve to use with a given key
|
|
5880
|
+
*
|
|
5881
|
+
* @author Spencer Witt
|
|
5882
|
+
*/
|
|
5883
|
+
var CoseEllipticCurve;
|
|
5884
|
+
(function (CoseEllipticCurve) {
|
|
5885
|
+
CoseEllipticCurve["Reserved"] = "Reserved";
|
|
5886
|
+
CoseEllipticCurve["P256"] = "P256";
|
|
5887
|
+
CoseEllipticCurve["P384"] = "P384";
|
|
5888
|
+
CoseEllipticCurve["P521"] = "P521";
|
|
5889
|
+
CoseEllipticCurve["X25519"] = "X25519";
|
|
5890
|
+
CoseEllipticCurve["X448"] = "X448";
|
|
5891
|
+
CoseEllipticCurve["Ed25519"] = "Ed25519";
|
|
5892
|
+
CoseEllipticCurve["Ed448"] = "Ed448";
|
|
5893
|
+
CoseEllipticCurve["Secp256k1"] = "Secp256k1";
|
|
5894
|
+
})(CoseEllipticCurve = exports.CoseEllipticCurve || (exports.CoseEllipticCurve = {}));
|
|
5895
|
+
var KeyAlgorithm;
|
|
5896
|
+
(function (KeyAlgorithm) {
|
|
5897
|
+
KeyAlgorithm["ES256"] = "ES256";
|
|
5898
|
+
KeyAlgorithm["ES384"] = "ES384";
|
|
5899
|
+
KeyAlgorithm["ES512"] = "ES512";
|
|
5900
|
+
KeyAlgorithm["HS256"] = "HS256";
|
|
5901
|
+
KeyAlgorithm["HS384"] = "HS384";
|
|
5902
|
+
KeyAlgorithm["HS512"] = "HS512";
|
|
5903
|
+
KeyAlgorithm["RS256"] = "RS256";
|
|
5904
|
+
KeyAlgorithm["RS384"] = "RS384";
|
|
5905
|
+
KeyAlgorithm["RS512"] = "RS512";
|
|
5906
|
+
})(KeyAlgorithm = exports.KeyAlgorithm || (exports.KeyAlgorithm = {}));
|
|
5907
|
+
var KeyType;
|
|
5908
|
+
(function (KeyType) {
|
|
5909
|
+
KeyType["EC"] = "EC";
|
|
5910
|
+
KeyType["RSA"] = "RSA";
|
|
5911
|
+
KeyType["HMAC"] = "HMAC";
|
|
5912
|
+
})(KeyType = exports.KeyType || (exports.KeyType = {}));
|
|
5913
|
+
/**
|
|
5914
|
+
* Controls the policy for requesting user permission to grant access to requested scopes during an OAuth workflow
|
|
5915
|
+
* for a third-party application.
|
|
5916
|
+
*
|
|
5917
|
+
* @author Spencer Witt
|
|
5918
|
+
*/
|
|
5919
|
+
var OAuthScopeConsentMode;
|
|
5920
|
+
(function (OAuthScopeConsentMode) {
|
|
5921
|
+
OAuthScopeConsentMode["AlwaysPrompt"] = "AlwaysPrompt";
|
|
5922
|
+
OAuthScopeConsentMode["RememberDecision"] = "RememberDecision";
|
|
5923
|
+
OAuthScopeConsentMode["NeverPrompt"] = "NeverPrompt";
|
|
5924
|
+
})(OAuthScopeConsentMode = exports.OAuthScopeConsentMode || (exports.OAuthScopeConsentMode = {}));
|
|
5925
|
+
/**
|
|
5926
|
+
* @author Daniel DeGroff
|
|
5927
|
+
*/
|
|
5928
|
+
var ObjectState;
|
|
5929
|
+
(function (ObjectState) {
|
|
5930
|
+
ObjectState["Active"] = "Active";
|
|
5931
|
+
ObjectState["Inactive"] = "Inactive";
|
|
5932
|
+
ObjectState["PendingDelete"] = "PendingDelete";
|
|
5933
|
+
})(ObjectState = exports.ObjectState || (exports.ObjectState = {}));
|
|
5753
5934
|
/**
|
|
5754
5935
|
* @author Daniel DeGroff
|
|
5755
5936
|
*/
|
|
@@ -5775,11 +5956,44 @@ var IdentityProviderType;
|
|
|
5775
5956
|
/**
|
|
5776
5957
|
* @author Daniel DeGroff
|
|
5777
5958
|
*/
|
|
5778
|
-
var
|
|
5779
|
-
(function (
|
|
5780
|
-
|
|
5781
|
-
|
|
5782
|
-
})(
|
|
5959
|
+
var VerificationStrategy;
|
|
5960
|
+
(function (VerificationStrategy) {
|
|
5961
|
+
VerificationStrategy["ClickableLink"] = "ClickableLink";
|
|
5962
|
+
VerificationStrategy["FormField"] = "FormField";
|
|
5963
|
+
})(VerificationStrategy = exports.VerificationStrategy || (exports.VerificationStrategy = {}));
|
|
5964
|
+
var TOTPAlgorithm;
|
|
5965
|
+
(function (TOTPAlgorithm) {
|
|
5966
|
+
TOTPAlgorithm["HmacSHA1"] = "HmacSHA1";
|
|
5967
|
+
TOTPAlgorithm["HmacSHA256"] = "HmacSHA256";
|
|
5968
|
+
TOTPAlgorithm["HmacSHA512"] = "HmacSHA512";
|
|
5969
|
+
})(TOTPAlgorithm = exports.TOTPAlgorithm || (exports.TOTPAlgorithm = {}));
|
|
5970
|
+
/**
|
|
5971
|
+
* @author Brett Pontarelli
|
|
5972
|
+
*/
|
|
5973
|
+
var AuthenticationThreats;
|
|
5974
|
+
(function (AuthenticationThreats) {
|
|
5975
|
+
AuthenticationThreats["ImpossibleTravel"] = "ImpossibleTravel";
|
|
5976
|
+
})(AuthenticationThreats = exports.AuthenticationThreats || (exports.AuthenticationThreats = {}));
|
|
5977
|
+
/**
|
|
5978
|
+
* Steam API modes.
|
|
5979
|
+
*
|
|
5980
|
+
* @author Daniel DeGroff
|
|
5981
|
+
*/
|
|
5982
|
+
var SteamAPIMode;
|
|
5983
|
+
(function (SteamAPIMode) {
|
|
5984
|
+
SteamAPIMode["Public"] = "Public";
|
|
5985
|
+
SteamAPIMode["Partner"] = "Partner";
|
|
5986
|
+
})(SteamAPIMode = exports.SteamAPIMode || (exports.SteamAPIMode = {}));
|
|
5987
|
+
/**
|
|
5988
|
+
* @author Brett Pontarelli
|
|
5989
|
+
*/
|
|
5990
|
+
var CaptchaMethod;
|
|
5991
|
+
(function (CaptchaMethod) {
|
|
5992
|
+
CaptchaMethod["GoogleRecaptchaV2"] = "GoogleRecaptchaV2";
|
|
5993
|
+
CaptchaMethod["GoogleRecaptchaV3"] = "GoogleRecaptchaV3";
|
|
5994
|
+
CaptchaMethod["HCaptcha"] = "HCaptcha";
|
|
5995
|
+
CaptchaMethod["HCaptchaEnterprise"] = "HCaptchaEnterprise";
|
|
5996
|
+
})(CaptchaMethod = exports.CaptchaMethod || (exports.CaptchaMethod = {}));
|
|
5783
5997
|
/**
|
|
5784
5998
|
* Models the event types that FusionAuth produces.
|
|
5785
5999
|
*
|
|
@@ -5841,104 +6055,6 @@ var EventType;
|
|
|
5841
6055
|
EventType["UserUpdateComplete"] = "user.update.complete";
|
|
5842
6056
|
EventType["Test"] = "test";
|
|
5843
6057
|
})(EventType = exports.EventType || (exports.EventType = {}));
|
|
5844
|
-
var TOTPAlgorithm;
|
|
5845
|
-
(function (TOTPAlgorithm) {
|
|
5846
|
-
TOTPAlgorithm["HmacSHA1"] = "HmacSHA1";
|
|
5847
|
-
TOTPAlgorithm["HmacSHA256"] = "HmacSHA256";
|
|
5848
|
-
TOTPAlgorithm["HmacSHA512"] = "HmacSHA512";
|
|
5849
|
-
})(TOTPAlgorithm = exports.TOTPAlgorithm || (exports.TOTPAlgorithm = {}));
|
|
5850
|
-
var LDAPSecurityMethod;
|
|
5851
|
-
(function (LDAPSecurityMethod) {
|
|
5852
|
-
LDAPSecurityMethod["None"] = "None";
|
|
5853
|
-
LDAPSecurityMethod["LDAPS"] = "LDAPS";
|
|
5854
|
-
LDAPSecurityMethod["StartTLS"] = "StartTLS";
|
|
5855
|
-
})(LDAPSecurityMethod = exports.LDAPSecurityMethod || (exports.LDAPSecurityMethod = {}));
|
|
5856
|
-
var UniqueUsernameStrategy;
|
|
5857
|
-
(function (UniqueUsernameStrategy) {
|
|
5858
|
-
UniqueUsernameStrategy["Always"] = "Always";
|
|
5859
|
-
UniqueUsernameStrategy["OnCollision"] = "OnCollision";
|
|
5860
|
-
})(UniqueUsernameStrategy = exports.UniqueUsernameStrategy || (exports.UniqueUsernameStrategy = {}));
|
|
5861
|
-
/**
|
|
5862
|
-
* @author Daniel DeGroff
|
|
5863
|
-
*/
|
|
5864
|
-
var VerificationStrategy;
|
|
5865
|
-
(function (VerificationStrategy) {
|
|
5866
|
-
VerificationStrategy["ClickableLink"] = "ClickableLink";
|
|
5867
|
-
VerificationStrategy["FormField"] = "FormField";
|
|
5868
|
-
})(VerificationStrategy = exports.VerificationStrategy || (exports.VerificationStrategy = {}));
|
|
5869
|
-
/**
|
|
5870
|
-
* @author Daniel DeGroff
|
|
5871
|
-
*/
|
|
5872
|
-
var SecureGeneratorType;
|
|
5873
|
-
(function (SecureGeneratorType) {
|
|
5874
|
-
SecureGeneratorType["randomDigits"] = "randomDigits";
|
|
5875
|
-
SecureGeneratorType["randomBytes"] = "randomBytes";
|
|
5876
|
-
SecureGeneratorType["randomAlpha"] = "randomAlpha";
|
|
5877
|
-
SecureGeneratorType["randomAlphaNumeric"] = "randomAlphaNumeric";
|
|
5878
|
-
})(SecureGeneratorType = exports.SecureGeneratorType || (exports.SecureGeneratorType = {}));
|
|
5879
|
-
/**
|
|
5880
|
-
* XML canonicalization method enumeration. This is used for the IdP and SP side of FusionAuth SAML.
|
|
5881
|
-
*
|
|
5882
|
-
* @author Brian Pontarelli
|
|
5883
|
-
*/
|
|
5884
|
-
var CanonicalizationMethod;
|
|
5885
|
-
(function (CanonicalizationMethod) {
|
|
5886
|
-
CanonicalizationMethod["exclusive"] = "exclusive";
|
|
5887
|
-
CanonicalizationMethod["exclusive_with_comments"] = "exclusive_with_comments";
|
|
5888
|
-
CanonicalizationMethod["inclusive"] = "inclusive";
|
|
5889
|
-
CanonicalizationMethod["inclusive_with_comments"] = "inclusive_with_comments";
|
|
5890
|
-
})(CanonicalizationMethod = exports.CanonicalizationMethod || (exports.CanonicalizationMethod = {}));
|
|
5891
|
-
/**
|
|
5892
|
-
* @author Daniel DeGroff
|
|
5893
|
-
*/
|
|
5894
|
-
var RateLimitedRequestType;
|
|
5895
|
-
(function (RateLimitedRequestType) {
|
|
5896
|
-
RateLimitedRequestType["FailedLogin"] = "FailedLogin";
|
|
5897
|
-
RateLimitedRequestType["ForgotPassword"] = "ForgotPassword";
|
|
5898
|
-
RateLimitedRequestType["SendEmailVerification"] = "SendEmailVerification";
|
|
5899
|
-
RateLimitedRequestType["SendPasswordless"] = "SendPasswordless";
|
|
5900
|
-
RateLimitedRequestType["SendRegistrationVerification"] = "SendRegistrationVerification";
|
|
5901
|
-
RateLimitedRequestType["SendTwoFactor"] = "SendTwoFactor";
|
|
5902
|
-
})(RateLimitedRequestType = exports.RateLimitedRequestType || (exports.RateLimitedRequestType = {}));
|
|
5903
|
-
/**
|
|
5904
|
-
* Controls the policy for whether OAuth workflows will more strictly adhere to the OAuth and OIDC specification
|
|
5905
|
-
* or run in backwards compatibility mode.
|
|
5906
|
-
*
|
|
5907
|
-
* @author David Charles
|
|
5908
|
-
*/
|
|
5909
|
-
var OAuthScopeHandlingPolicy;
|
|
5910
|
-
(function (OAuthScopeHandlingPolicy) {
|
|
5911
|
-
OAuthScopeHandlingPolicy["Compatibility"] = "Compatibility";
|
|
5912
|
-
OAuthScopeHandlingPolicy["Strict"] = "Strict";
|
|
5913
|
-
})(OAuthScopeHandlingPolicy = exports.OAuthScopeHandlingPolicy || (exports.OAuthScopeHandlingPolicy = {}));
|
|
5914
|
-
/**
|
|
5915
|
-
* @author Matthew Altman
|
|
5916
|
-
*/
|
|
5917
|
-
var LogoutBehavior;
|
|
5918
|
-
(function (LogoutBehavior) {
|
|
5919
|
-
LogoutBehavior["RedirectOnly"] = "RedirectOnly";
|
|
5920
|
-
LogoutBehavior["AllApplications"] = "AllApplications";
|
|
5921
|
-
})(LogoutBehavior = exports.LogoutBehavior || (exports.LogoutBehavior = {}));
|
|
5922
|
-
/**
|
|
5923
|
-
* @author Johnathon Wood
|
|
5924
|
-
*/
|
|
5925
|
-
var Oauth2AuthorizedURLValidationPolicy;
|
|
5926
|
-
(function (Oauth2AuthorizedURLValidationPolicy) {
|
|
5927
|
-
Oauth2AuthorizedURLValidationPolicy["AllowWildcards"] = "AllowWildcards";
|
|
5928
|
-
Oauth2AuthorizedURLValidationPolicy["ExactMatch"] = "ExactMatch";
|
|
5929
|
-
})(Oauth2AuthorizedURLValidationPolicy = exports.Oauth2AuthorizedURLValidationPolicy || (exports.Oauth2AuthorizedURLValidationPolicy = {}));
|
|
5930
|
-
/**
|
|
5931
|
-
* Identifies the WebAuthn workflow. This will affect the parameters used for credential creation
|
|
5932
|
-
* and request based on the Tenant configuration.
|
|
5933
|
-
*
|
|
5934
|
-
* @author Spencer Witt
|
|
5935
|
-
*/
|
|
5936
|
-
var WebAuthnWorkflow;
|
|
5937
|
-
(function (WebAuthnWorkflow) {
|
|
5938
|
-
WebAuthnWorkflow["bootstrap"] = "bootstrap";
|
|
5939
|
-
WebAuthnWorkflow["general"] = "general";
|
|
5940
|
-
WebAuthnWorkflow["reauthentication"] = "reauthentication";
|
|
5941
|
-
})(WebAuthnWorkflow = exports.WebAuthnWorkflow || (exports.WebAuthnWorkflow = {}));
|
|
5942
6058
|
/**
|
|
5943
6059
|
* Policy for handling unknown OAuth scopes in the request
|
|
5944
6060
|
*
|
|
@@ -5950,70 +6066,17 @@ var UnknownScopePolicy;
|
|
|
5950
6066
|
UnknownScopePolicy["Remove"] = "Remove";
|
|
5951
6067
|
UnknownScopePolicy["Reject"] = "Reject";
|
|
5952
6068
|
})(UnknownScopePolicy = exports.UnknownScopePolicy || (exports.UnknownScopePolicy = {}));
|
|
5953
|
-
|
|
5954
|
-
|
|
5955
|
-
|
|
5956
|
-
|
|
5957
|
-
|
|
5958
|
-
|
|
5959
|
-
|
|
5960
|
-
|
|
5961
|
-
|
|
5962
|
-
|
|
5963
|
-
|
|
5964
|
-
OAuthErrorReason["invalid_client_id"] = "invalid_client_id";
|
|
5965
|
-
OAuthErrorReason["invalid_user_credentials"] = "invalid_user_credentials";
|
|
5966
|
-
OAuthErrorReason["invalid_grant_type"] = "invalid_grant_type";
|
|
5967
|
-
OAuthErrorReason["invalid_origin"] = "invalid_origin";
|
|
5968
|
-
OAuthErrorReason["invalid_origin_opaque"] = "invalid_origin_opaque";
|
|
5969
|
-
OAuthErrorReason["invalid_pkce_code_verifier"] = "invalid_pkce_code_verifier";
|
|
5970
|
-
OAuthErrorReason["invalid_pkce_code_challenge"] = "invalid_pkce_code_challenge";
|
|
5971
|
-
OAuthErrorReason["invalid_pkce_code_challenge_method"] = "invalid_pkce_code_challenge_method";
|
|
5972
|
-
OAuthErrorReason["invalid_redirect_uri"] = "invalid_redirect_uri";
|
|
5973
|
-
OAuthErrorReason["invalid_response_mode"] = "invalid_response_mode";
|
|
5974
|
-
OAuthErrorReason["invalid_response_type"] = "invalid_response_type";
|
|
5975
|
-
OAuthErrorReason["invalid_id_token_hint"] = "invalid_id_token_hint";
|
|
5976
|
-
OAuthErrorReason["invalid_post_logout_redirect_uri"] = "invalid_post_logout_redirect_uri";
|
|
5977
|
-
OAuthErrorReason["invalid_device_code"] = "invalid_device_code";
|
|
5978
|
-
OAuthErrorReason["invalid_user_code"] = "invalid_user_code";
|
|
5979
|
-
OAuthErrorReason["invalid_additional_client_id"] = "invalid_additional_client_id";
|
|
5980
|
-
OAuthErrorReason["invalid_target_entity_scope"] = "invalid_target_entity_scope";
|
|
5981
|
-
OAuthErrorReason["invalid_entity_permission_scope"] = "invalid_entity_permission_scope";
|
|
5982
|
-
OAuthErrorReason["invalid_user_id"] = "invalid_user_id";
|
|
5983
|
-
OAuthErrorReason["grant_type_disabled"] = "grant_type_disabled";
|
|
5984
|
-
OAuthErrorReason["missing_client_id"] = "missing_client_id";
|
|
5985
|
-
OAuthErrorReason["missing_client_secret"] = "missing_client_secret";
|
|
5986
|
-
OAuthErrorReason["missing_code"] = "missing_code";
|
|
5987
|
-
OAuthErrorReason["missing_code_challenge"] = "missing_code_challenge";
|
|
5988
|
-
OAuthErrorReason["missing_code_verifier"] = "missing_code_verifier";
|
|
5989
|
-
OAuthErrorReason["missing_device_code"] = "missing_device_code";
|
|
5990
|
-
OAuthErrorReason["missing_grant_type"] = "missing_grant_type";
|
|
5991
|
-
OAuthErrorReason["missing_redirect_uri"] = "missing_redirect_uri";
|
|
5992
|
-
OAuthErrorReason["missing_refresh_token"] = "missing_refresh_token";
|
|
5993
|
-
OAuthErrorReason["missing_response_type"] = "missing_response_type";
|
|
5994
|
-
OAuthErrorReason["missing_token"] = "missing_token";
|
|
5995
|
-
OAuthErrorReason["missing_user_code"] = "missing_user_code";
|
|
5996
|
-
OAuthErrorReason["missing_user_id"] = "missing_user_id";
|
|
5997
|
-
OAuthErrorReason["missing_verification_uri"] = "missing_verification_uri";
|
|
5998
|
-
OAuthErrorReason["login_prevented"] = "login_prevented";
|
|
5999
|
-
OAuthErrorReason["not_licensed"] = "not_licensed";
|
|
6000
|
-
OAuthErrorReason["user_code_expired"] = "user_code_expired";
|
|
6001
|
-
OAuthErrorReason["user_expired"] = "user_expired";
|
|
6002
|
-
OAuthErrorReason["user_locked"] = "user_locked";
|
|
6003
|
-
OAuthErrorReason["user_not_found"] = "user_not_found";
|
|
6004
|
-
OAuthErrorReason["client_authentication_missing"] = "client_authentication_missing";
|
|
6005
|
-
OAuthErrorReason["invalid_client_authentication_scheme"] = "invalid_client_authentication_scheme";
|
|
6006
|
-
OAuthErrorReason["invalid_client_authentication"] = "invalid_client_authentication";
|
|
6007
|
-
OAuthErrorReason["client_id_mismatch"] = "client_id_mismatch";
|
|
6008
|
-
OAuthErrorReason["change_password_administrative"] = "change_password_administrative";
|
|
6009
|
-
OAuthErrorReason["change_password_breached"] = "change_password_breached";
|
|
6010
|
-
OAuthErrorReason["change_password_expired"] = "change_password_expired";
|
|
6011
|
-
OAuthErrorReason["change_password_validation"] = "change_password_validation";
|
|
6012
|
-
OAuthErrorReason["unknown"] = "unknown";
|
|
6013
|
-
OAuthErrorReason["missing_required_scope"] = "missing_required_scope";
|
|
6014
|
-
OAuthErrorReason["unknown_scope"] = "unknown_scope";
|
|
6015
|
-
OAuthErrorReason["consent_canceled"] = "consent_canceled";
|
|
6016
|
-
})(OAuthErrorReason = exports.OAuthErrorReason || (exports.OAuthErrorReason = {}));
|
|
6069
|
+
/**
|
|
6070
|
+
* The application's relationship to the authorization server. First-party applications will be granted implicit permission for requested scopes.
|
|
6071
|
+
* Third-party applications will use the {@link OAuthScopeConsentMode} policy.
|
|
6072
|
+
*
|
|
6073
|
+
* @author Spencer Witt
|
|
6074
|
+
*/
|
|
6075
|
+
var OAuthApplicationRelationship;
|
|
6076
|
+
(function (OAuthApplicationRelationship) {
|
|
6077
|
+
OAuthApplicationRelationship["FirstParty"] = "FirstParty";
|
|
6078
|
+
OAuthApplicationRelationship["ThirdParty"] = "ThirdParty";
|
|
6079
|
+
})(OAuthApplicationRelationship = exports.OAuthApplicationRelationship || (exports.OAuthApplicationRelationship = {}));
|
|
6017
6080
|
var ClientAuthenticationMethod;
|
|
6018
6081
|
(function (ClientAuthenticationMethod) {
|
|
6019
6082
|
ClientAuthenticationMethod["none"] = "none";
|
|
@@ -6021,24 +6084,24 @@ var ClientAuthenticationMethod;
|
|
|
6021
6084
|
ClientAuthenticationMethod["client_secret_post"] = "client_secret_post";
|
|
6022
6085
|
})(ClientAuthenticationMethod = exports.ClientAuthenticationMethod || (exports.ClientAuthenticationMethod = {}));
|
|
6023
6086
|
/**
|
|
6024
|
-
*
|
|
6025
|
-
* for a third-party application.
|
|
6087
|
+
* Available JSON Web Algorithms (JWA) as described in RFC 7518 available for this JWT implementation.
|
|
6026
6088
|
*
|
|
6027
|
-
* @author
|
|
6028
|
-
*/
|
|
6029
|
-
var OAuthScopeConsentMode;
|
|
6030
|
-
(function (OAuthScopeConsentMode) {
|
|
6031
|
-
OAuthScopeConsentMode["AlwaysPrompt"] = "AlwaysPrompt";
|
|
6032
|
-
OAuthScopeConsentMode["RememberDecision"] = "RememberDecision";
|
|
6033
|
-
OAuthScopeConsentMode["NeverPrompt"] = "NeverPrompt";
|
|
6034
|
-
})(OAuthScopeConsentMode = exports.OAuthScopeConsentMode || (exports.OAuthScopeConsentMode = {}));
|
|
6035
|
-
/**
|
|
6036
|
-
* @author Brett Pontarelli
|
|
6089
|
+
* @author Daniel DeGroff
|
|
6037
6090
|
*/
|
|
6038
|
-
var
|
|
6039
|
-
(function (
|
|
6040
|
-
|
|
6041
|
-
|
|
6042
|
-
|
|
6043
|
-
|
|
6091
|
+
var Algorithm;
|
|
6092
|
+
(function (Algorithm) {
|
|
6093
|
+
Algorithm["ES256"] = "ES256";
|
|
6094
|
+
Algorithm["ES384"] = "ES384";
|
|
6095
|
+
Algorithm["ES512"] = "ES512";
|
|
6096
|
+
Algorithm["HS256"] = "HS256";
|
|
6097
|
+
Algorithm["HS384"] = "HS384";
|
|
6098
|
+
Algorithm["HS512"] = "HS512";
|
|
6099
|
+
Algorithm["PS256"] = "PS256";
|
|
6100
|
+
Algorithm["PS384"] = "PS384";
|
|
6101
|
+
Algorithm["PS512"] = "PS512";
|
|
6102
|
+
Algorithm["RS256"] = "RS256";
|
|
6103
|
+
Algorithm["RS384"] = "RS384";
|
|
6104
|
+
Algorithm["RS512"] = "RS512";
|
|
6105
|
+
Algorithm["none"] = "none";
|
|
6106
|
+
})(Algorithm = exports.Algorithm || (exports.Algorithm = {}));
|
|
6044
6107
|
//# sourceMappingURL=FusionAuthClient.js.map
|