@fusionauth/typescript-client 1.53.0 → 1.54.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/build/src/FusionAuthClient.d.ts +3946 -3946
- package/build/src/FusionAuthClient.js +720 -720
- package/build/src/FusionAuthClient.js.map +1 -1
- package/dist/fusionauth-typescript-client.js +721 -721
- package/dist/fusionauth-typescript-client.min.js +1 -1
- package/dist/fusionauth-typescript-client.min.js.map +1 -1
- package/package.json +1 -1
|
@@ -15,7 +15,7 @@
|
|
|
15
15
|
* language governing permissions and limitations under the License.
|
|
16
16
|
*/
|
|
17
17
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
18
|
-
exports.
|
|
18
|
+
exports.Algorithm = exports.ClientAuthenticationMethod = exports.OAuthApplicationRelationship = exports.UnknownScopePolicy = exports.EventType = exports.CaptchaMethod = exports.SteamAPIMode = exports.AuthenticationThreats = exports.TOTPAlgorithm = exports.VerificationStrategy = exports.IdentityProviderType = exports.ObjectState = exports.OAuthScopeConsentMode = exports.KeyType = exports.KeyAlgorithm = exports.CoseEllipticCurve = exports.PublicKeyCredentialType = exports.AuthenticatorAttachmentPreference = exports.Sort = exports.XMLSignatureLocation = exports.SAMLLogoutBehavior = exports.RegistrationType = exports.LoginIdType = exports.SystemTrustedProxyConfigurationPolicy = exports.LambdaType = exports.UserActionPhase = exports.IPAccessControlEntryAction = exports.MultiFactorLoginPolicy = exports.IdentityProviderLinkingStrategy = exports.FormDataType = exports.SecureGeneratorType = exports.CanonicalizationMethod = exports.FormType = exports.ClientAuthenticationPolicy = exports.ExpiryUnit = exports.UserVerificationRequirement = exports.LambdaEngineType = exports.RateLimitedRequestType = exports.ApplicationMultiFactorTrustPolicy = exports.DeviceType = exports.OAuthErrorType = exports.OAuthErrorReason = exports.SAMLv2DestinationAssertionPolicy = exports.RefreshTokenUsagePolicy = exports.IdentityProviderLoginMethod = exports.AuthenticatorAttachment = exports.Oauth2AuthorizedURLValidationPolicy = exports.LDAPSecurityMethod = exports.ChangePasswordReason = exports.ResidentKeyRequirement = exports.MessageType = exports.ProofKeyForCodeExchangePolicy = exports.ConnectorType = exports.ThemeType = exports.CoseKeyType = exports.TransactionType = exports.EventLogType = exports.WebhookAttemptResult = exports.OAuthScopeHandlingPolicy = exports.FormControl = exports.BreachedPasswordStatus = exports.KeyUse = exports.RefreshTokenExpirationPolicy = exports.UserState = exports.HTTPMethod = exports.ConsentStatus = exports.WebAuthnWorkflow = exports.WebhookEventResult = exports.AttestationConveyancePreference = exports.FormFieldAdminPolicy = exports.BreachMatchMode = exports.BreachAction = exports.MessengerType = exports.UnverifiedBehavior = exports.ReactorFeatureStatus = exports.CoseAlgorithmIdentifier = exports.FamilyRole = exports.LogoutBehavior = exports.ContentStatus = exports.TokenType = exports.UniqueUsernameStrategy = exports.EmailSecurityType = exports.AttestationType = exports.GrantType = exports.FusionAuthClient = void 0;
|
|
19
19
|
const DefaultRESTClientBuilder_1 = require("./DefaultRESTClientBuilder");
|
|
20
20
|
const url_1 = require("url");
|
|
21
21
|
class FusionAuthClient {
|
|
@@ -5112,58 +5112,6 @@ class FusionAuthClient {
|
|
|
5112
5112
|
}
|
|
5113
5113
|
exports.FusionAuthClient = FusionAuthClient;
|
|
5114
5114
|
exports.default = FusionAuthClient;
|
|
5115
|
-
/**
|
|
5116
|
-
* @author Daniel DeGroff
|
|
5117
|
-
*/
|
|
5118
|
-
var FormDataType;
|
|
5119
|
-
(function (FormDataType) {
|
|
5120
|
-
FormDataType["bool"] = "bool";
|
|
5121
|
-
FormDataType["consent"] = "consent";
|
|
5122
|
-
FormDataType["date"] = "date";
|
|
5123
|
-
FormDataType["email"] = "email";
|
|
5124
|
-
FormDataType["number"] = "number";
|
|
5125
|
-
FormDataType["string"] = "string";
|
|
5126
|
-
})(FormDataType = exports.FormDataType || (exports.FormDataType = {}));
|
|
5127
|
-
/**
|
|
5128
|
-
* @author Daniel DeGroff
|
|
5129
|
-
*/
|
|
5130
|
-
var BreachedPasswordStatus;
|
|
5131
|
-
(function (BreachedPasswordStatus) {
|
|
5132
|
-
BreachedPasswordStatus["None"] = "None";
|
|
5133
|
-
BreachedPasswordStatus["ExactMatch"] = "ExactMatch";
|
|
5134
|
-
BreachedPasswordStatus["SubAddressMatch"] = "SubAddressMatch";
|
|
5135
|
-
BreachedPasswordStatus["PasswordOnly"] = "PasswordOnly";
|
|
5136
|
-
BreachedPasswordStatus["CommonPassword"] = "CommonPassword";
|
|
5137
|
-
})(BreachedPasswordStatus = exports.BreachedPasswordStatus || (exports.BreachedPasswordStatus = {}));
|
|
5138
|
-
/**
|
|
5139
|
-
* Models a consent.
|
|
5140
|
-
*
|
|
5141
|
-
* @author Daniel DeGroff
|
|
5142
|
-
*/
|
|
5143
|
-
var ConsentStatus;
|
|
5144
|
-
(function (ConsentStatus) {
|
|
5145
|
-
ConsentStatus["Active"] = "Active";
|
|
5146
|
-
ConsentStatus["Revoked"] = "Revoked";
|
|
5147
|
-
})(ConsentStatus = exports.ConsentStatus || (exports.ConsentStatus = {}));
|
|
5148
|
-
/**
|
|
5149
|
-
* @author Daniel DeGroff
|
|
5150
|
-
*/
|
|
5151
|
-
var ApplicationMultiFactorTrustPolicy;
|
|
5152
|
-
(function (ApplicationMultiFactorTrustPolicy) {
|
|
5153
|
-
ApplicationMultiFactorTrustPolicy["Any"] = "Any";
|
|
5154
|
-
ApplicationMultiFactorTrustPolicy["This"] = "This";
|
|
5155
|
-
ApplicationMultiFactorTrustPolicy["None"] = "None";
|
|
5156
|
-
})(ApplicationMultiFactorTrustPolicy = exports.ApplicationMultiFactorTrustPolicy || (exports.ApplicationMultiFactorTrustPolicy = {}));
|
|
5157
|
-
/**
|
|
5158
|
-
* @author Daniel DeGroff
|
|
5159
|
-
*/
|
|
5160
|
-
var UserState;
|
|
5161
|
-
(function (UserState) {
|
|
5162
|
-
UserState["Authenticated"] = "Authenticated";
|
|
5163
|
-
UserState["AuthenticatedNotRegistered"] = "AuthenticatedNotRegistered";
|
|
5164
|
-
UserState["AuthenticatedNotVerified"] = "AuthenticatedNotVerified";
|
|
5165
|
-
UserState["AuthenticatedRegistrationNotVerified"] = "AuthenticatedRegistrationNotVerified";
|
|
5166
|
-
})(UserState = exports.UserState || (exports.UserState = {}));
|
|
5167
5115
|
/**
|
|
5168
5116
|
* Authorization Grant types as defined by the <a href="https://tools.ietf.org/html/rfc6749">The OAuth 2.0 Authorization
|
|
5169
5117
|
* Framework - RFC 6749</a>.
|
|
@@ -5184,41 +5132,29 @@ var GrantType;
|
|
|
5184
5132
|
GrantType["device_code"] = "urn:ietf:params:oauth:grant-type:device_code";
|
|
5185
5133
|
})(GrantType = exports.GrantType || (exports.GrantType = {}));
|
|
5186
5134
|
/**
|
|
5187
|
-
*
|
|
5188
|
-
* Third-party applications will use the {@link OAuthScopeConsentMode} policy.
|
|
5135
|
+
* Used to indicate what type of attestation was included in the authenticator response for a given WebAuthn credential at the time it was created
|
|
5189
5136
|
*
|
|
5190
5137
|
* @author Spencer Witt
|
|
5191
5138
|
*/
|
|
5192
|
-
var
|
|
5193
|
-
(function (
|
|
5194
|
-
|
|
5195
|
-
|
|
5196
|
-
|
|
5197
|
-
|
|
5198
|
-
|
|
5199
|
-
|
|
5200
|
-
var
|
|
5201
|
-
(function (
|
|
5202
|
-
|
|
5203
|
-
|
|
5204
|
-
|
|
5205
|
-
|
|
5206
|
-
|
|
5207
|
-
|
|
5208
|
-
|
|
5209
|
-
|
|
5210
|
-
|
|
5211
|
-
ThemeType["simple"] = "simple";
|
|
5212
|
-
})(ThemeType = exports.ThemeType || (exports.ThemeType = {}));
|
|
5213
|
-
/**
|
|
5214
|
-
* @author Brett Guy
|
|
5215
|
-
*/
|
|
5216
|
-
var ProofKeyForCodeExchangePolicy;
|
|
5217
|
-
(function (ProofKeyForCodeExchangePolicy) {
|
|
5218
|
-
ProofKeyForCodeExchangePolicy["Required"] = "Required";
|
|
5219
|
-
ProofKeyForCodeExchangePolicy["NotRequired"] = "NotRequired";
|
|
5220
|
-
ProofKeyForCodeExchangePolicy["NotRequiredWhenUsingClientAuthentication"] = "NotRequiredWhenUsingClientAuthentication";
|
|
5221
|
-
})(ProofKeyForCodeExchangePolicy = exports.ProofKeyForCodeExchangePolicy || (exports.ProofKeyForCodeExchangePolicy = {}));
|
|
5139
|
+
var AttestationType;
|
|
5140
|
+
(function (AttestationType) {
|
|
5141
|
+
AttestationType["basic"] = "basic";
|
|
5142
|
+
AttestationType["self"] = "self";
|
|
5143
|
+
AttestationType["attestationCa"] = "attestationCa";
|
|
5144
|
+
AttestationType["anonymizationCa"] = "anonymizationCa";
|
|
5145
|
+
AttestationType["none"] = "none";
|
|
5146
|
+
})(AttestationType = exports.AttestationType || (exports.AttestationType = {}));
|
|
5147
|
+
var EmailSecurityType;
|
|
5148
|
+
(function (EmailSecurityType) {
|
|
5149
|
+
EmailSecurityType["NONE"] = "NONE";
|
|
5150
|
+
EmailSecurityType["SSL"] = "SSL";
|
|
5151
|
+
EmailSecurityType["TLS"] = "TLS";
|
|
5152
|
+
})(EmailSecurityType = exports.EmailSecurityType || (exports.EmailSecurityType = {}));
|
|
5153
|
+
var UniqueUsernameStrategy;
|
|
5154
|
+
(function (UniqueUsernameStrategy) {
|
|
5155
|
+
UniqueUsernameStrategy["Always"] = "Always";
|
|
5156
|
+
UniqueUsernameStrategy["OnCollision"] = "OnCollision";
|
|
5157
|
+
})(UniqueUsernameStrategy = exports.UniqueUsernameStrategy || (exports.UniqueUsernameStrategy = {}));
|
|
5222
5158
|
/**
|
|
5223
5159
|
* <ul>
|
|
5224
5160
|
* <li>Bearer Token type as defined by <a href="https://tools.ietf.org/html/rfc6750">RFC 6750</a>.</li>
|
|
@@ -5235,37 +5171,6 @@ var TokenType;
|
|
|
5235
5171
|
TokenType["Bearer"] = "Bearer";
|
|
5236
5172
|
TokenType["MAC"] = "MAC";
|
|
5237
5173
|
})(TokenType = exports.TokenType || (exports.TokenType = {}));
|
|
5238
|
-
var XMLSignatureLocation;
|
|
5239
|
-
(function (XMLSignatureLocation) {
|
|
5240
|
-
XMLSignatureLocation["Assertion"] = "Assertion";
|
|
5241
|
-
XMLSignatureLocation["Response"] = "Response";
|
|
5242
|
-
})(XMLSignatureLocation = exports.XMLSignatureLocation || (exports.XMLSignatureLocation = {}));
|
|
5243
|
-
/**
|
|
5244
|
-
* Describes the authenticator attachment modality preference for a WebAuthn workflow. See {@link AuthenticatorAttachment}
|
|
5245
|
-
*
|
|
5246
|
-
* @author Spencer Witt
|
|
5247
|
-
*/
|
|
5248
|
-
var AuthenticatorAttachmentPreference;
|
|
5249
|
-
(function (AuthenticatorAttachmentPreference) {
|
|
5250
|
-
AuthenticatorAttachmentPreference["any"] = "any";
|
|
5251
|
-
AuthenticatorAttachmentPreference["platform"] = "platform";
|
|
5252
|
-
AuthenticatorAttachmentPreference["crossPlatform"] = "crossPlatform";
|
|
5253
|
-
})(AuthenticatorAttachmentPreference = exports.AuthenticatorAttachmentPreference || (exports.AuthenticatorAttachmentPreference = {}));
|
|
5254
|
-
/**
|
|
5255
|
-
* @author Brett Guy
|
|
5256
|
-
*/
|
|
5257
|
-
var IPAccessControlEntryAction;
|
|
5258
|
-
(function (IPAccessControlEntryAction) {
|
|
5259
|
-
IPAccessControlEntryAction["Allow"] = "Allow";
|
|
5260
|
-
IPAccessControlEntryAction["Block"] = "Block";
|
|
5261
|
-
})(IPAccessControlEntryAction = exports.IPAccessControlEntryAction || (exports.IPAccessControlEntryAction = {}));
|
|
5262
|
-
/**
|
|
5263
|
-
* @author Mikey Sleevi
|
|
5264
|
-
*/
|
|
5265
|
-
var MessageType;
|
|
5266
|
-
(function (MessageType) {
|
|
5267
|
-
MessageType["SMS"] = "SMS";
|
|
5268
|
-
})(MessageType = exports.MessageType || (exports.MessageType = {}));
|
|
5269
5174
|
/**
|
|
5270
5175
|
* Status for content like usernames, profile attributes, etc.
|
|
5271
5176
|
*
|
|
@@ -5278,76 +5183,19 @@ var ContentStatus;
|
|
|
5278
5183
|
ContentStatus["REJECTED"] = "REJECTED";
|
|
5279
5184
|
})(ContentStatus = exports.ContentStatus || (exports.ContentStatus = {}));
|
|
5280
5185
|
/**
|
|
5281
|
-
* @author
|
|
5282
|
-
*/
|
|
5283
|
-
var FormControl;
|
|
5284
|
-
(function (FormControl) {
|
|
5285
|
-
FormControl["checkbox"] = "checkbox";
|
|
5286
|
-
FormControl["number"] = "number";
|
|
5287
|
-
FormControl["password"] = "password";
|
|
5288
|
-
FormControl["radio"] = "radio";
|
|
5289
|
-
FormControl["select"] = "select";
|
|
5290
|
-
FormControl["textarea"] = "textarea";
|
|
5291
|
-
FormControl["text"] = "text";
|
|
5292
|
-
})(FormControl = exports.FormControl || (exports.FormControl = {}));
|
|
5293
|
-
var BreachMatchMode;
|
|
5294
|
-
(function (BreachMatchMode) {
|
|
5295
|
-
BreachMatchMode["Low"] = "Low";
|
|
5296
|
-
BreachMatchMode["Medium"] = "Medium";
|
|
5297
|
-
BreachMatchMode["High"] = "High";
|
|
5298
|
-
})(BreachMatchMode = exports.BreachMatchMode || (exports.BreachMatchMode = {}));
|
|
5299
|
-
/**
|
|
5300
|
-
* COSE key type
|
|
5301
|
-
*
|
|
5302
|
-
* @author Spencer Witt
|
|
5303
|
-
*/
|
|
5304
|
-
var CoseKeyType;
|
|
5305
|
-
(function (CoseKeyType) {
|
|
5306
|
-
CoseKeyType["Reserved"] = "0";
|
|
5307
|
-
CoseKeyType["OKP"] = "1";
|
|
5308
|
-
CoseKeyType["EC2"] = "2";
|
|
5309
|
-
CoseKeyType["RSA"] = "3";
|
|
5310
|
-
CoseKeyType["Symmetric"] = "4";
|
|
5311
|
-
})(CoseKeyType = exports.CoseKeyType || (exports.CoseKeyType = {}));
|
|
5312
|
-
/**
|
|
5313
|
-
* @author Lyle Schemmerling
|
|
5314
|
-
*/
|
|
5315
|
-
var SAMLv2DestinationAssertionPolicy;
|
|
5316
|
-
(function (SAMLv2DestinationAssertionPolicy) {
|
|
5317
|
-
SAMLv2DestinationAssertionPolicy["Enabled"] = "Enabled";
|
|
5318
|
-
SAMLv2DestinationAssertionPolicy["Disabled"] = "Disabled";
|
|
5319
|
-
SAMLv2DestinationAssertionPolicy["AllowAlternates"] = "AllowAlternates";
|
|
5320
|
-
})(SAMLv2DestinationAssertionPolicy = exports.SAMLv2DestinationAssertionPolicy || (exports.SAMLv2DestinationAssertionPolicy = {}));
|
|
5321
|
-
/**
|
|
5322
|
-
* Defines valid credential types. This is an extension point in the WebAuthn spec. The only defined value at this time is "public-key"
|
|
5323
|
-
*
|
|
5324
|
-
* @author Spencer Witt
|
|
5325
|
-
*/
|
|
5326
|
-
var PublicKeyCredentialType;
|
|
5327
|
-
(function (PublicKeyCredentialType) {
|
|
5328
|
-
PublicKeyCredentialType["publicKey"] = "public-key";
|
|
5329
|
-
})(PublicKeyCredentialType = exports.PublicKeyCredentialType || (exports.PublicKeyCredentialType = {}));
|
|
5330
|
-
/**
|
|
5331
|
-
* @author Daniel DeGroff
|
|
5332
|
-
*/
|
|
5333
|
-
var FormFieldAdminPolicy;
|
|
5334
|
-
(function (FormFieldAdminPolicy) {
|
|
5335
|
-
FormFieldAdminPolicy["Edit"] = "Edit";
|
|
5336
|
-
FormFieldAdminPolicy["View"] = "View";
|
|
5337
|
-
})(FormFieldAdminPolicy = exports.FormFieldAdminPolicy || (exports.FormFieldAdminPolicy = {}));
|
|
5338
|
-
/**
|
|
5339
|
-
* @author Daniel DeGroff
|
|
5186
|
+
* @author Matthew Altman
|
|
5340
5187
|
*/
|
|
5341
|
-
var
|
|
5342
|
-
(function (
|
|
5343
|
-
|
|
5344
|
-
|
|
5345
|
-
|
|
5346
|
-
|
|
5347
|
-
|
|
5348
|
-
|
|
5349
|
-
|
|
5350
|
-
|
|
5188
|
+
var LogoutBehavior;
|
|
5189
|
+
(function (LogoutBehavior) {
|
|
5190
|
+
LogoutBehavior["RedirectOnly"] = "RedirectOnly";
|
|
5191
|
+
LogoutBehavior["AllApplications"] = "AllApplications";
|
|
5192
|
+
})(LogoutBehavior = exports.LogoutBehavior || (exports.LogoutBehavior = {}));
|
|
5193
|
+
var FamilyRole;
|
|
5194
|
+
(function (FamilyRole) {
|
|
5195
|
+
FamilyRole["Child"] = "Child";
|
|
5196
|
+
FamilyRole["Teen"] = "Teen";
|
|
5197
|
+
FamilyRole["Adult"] = "Adult";
|
|
5198
|
+
})(FamilyRole = exports.FamilyRole || (exports.FamilyRole = {}));
|
|
5351
5199
|
/**
|
|
5352
5200
|
* A number identifying a cryptographic algorithm. Values should be registered with the <a
|
|
5353
5201
|
* href="https://www.iana.org/assignments/cose/cose.xhtml#algorithms">IANA COSE Algorithms registry</a>
|
|
@@ -5367,41 +5215,56 @@ var CoseAlgorithmIdentifier;
|
|
|
5367
5215
|
CoseAlgorithmIdentifier["PS512"] = "SHA-512";
|
|
5368
5216
|
})(CoseAlgorithmIdentifier = exports.CoseAlgorithmIdentifier || (exports.CoseAlgorithmIdentifier = {}));
|
|
5369
5217
|
/**
|
|
5370
|
-
* The types of lambdas that indicate how they are invoked by FusionAuth.
|
|
5371
|
-
*
|
|
5372
5218
|
* @author Brian Pontarelli
|
|
5373
5219
|
*/
|
|
5374
|
-
var
|
|
5375
|
-
(function (
|
|
5376
|
-
|
|
5377
|
-
|
|
5378
|
-
|
|
5379
|
-
|
|
5380
|
-
|
|
5381
|
-
|
|
5382
|
-
LambdaType["FacebookReconcile"] = "FacebookReconcile";
|
|
5383
|
-
LambdaType["GoogleReconcile"] = "GoogleReconcile";
|
|
5384
|
-
LambdaType["HYPRReconcile"] = "HYPRReconcile";
|
|
5385
|
-
LambdaType["TwitterReconcile"] = "TwitterReconcile";
|
|
5386
|
-
LambdaType["LDAPConnectorReconcile"] = "LDAPConnectorReconcile";
|
|
5387
|
-
LambdaType["LinkedInReconcile"] = "LinkedInReconcile";
|
|
5388
|
-
LambdaType["EpicGamesReconcile"] = "EpicGamesReconcile";
|
|
5389
|
-
LambdaType["NintendoReconcile"] = "NintendoReconcile";
|
|
5390
|
-
LambdaType["SonyPSNReconcile"] = "SonyPSNReconcile";
|
|
5391
|
-
LambdaType["SteamReconcile"] = "SteamReconcile";
|
|
5392
|
-
LambdaType["TwitchReconcile"] = "TwitchReconcile";
|
|
5393
|
-
LambdaType["XboxReconcile"] = "XboxReconcile";
|
|
5394
|
-
LambdaType["ClientCredentialsJWTPopulate"] = "ClientCredentialsJWTPopulate";
|
|
5395
|
-
LambdaType["SCIMServerGroupRequestConverter"] = "SCIMServerGroupRequestConverter";
|
|
5396
|
-
LambdaType["SCIMServerGroupResponseConverter"] = "SCIMServerGroupResponseConverter";
|
|
5397
|
-
LambdaType["SCIMServerUserRequestConverter"] = "SCIMServerUserRequestConverter";
|
|
5398
|
-
LambdaType["SCIMServerUserResponseConverter"] = "SCIMServerUserResponseConverter";
|
|
5399
|
-
LambdaType["SelfServiceRegistrationValidation"] = "SelfServiceRegistrationValidation";
|
|
5400
|
-
LambdaType["UserInfoPopulate"] = "UserInfoPopulate";
|
|
5401
|
-
LambdaType["LoginValidation"] = "LoginValidation";
|
|
5402
|
-
})(LambdaType = exports.LambdaType || (exports.LambdaType = {}));
|
|
5220
|
+
var ReactorFeatureStatus;
|
|
5221
|
+
(function (ReactorFeatureStatus) {
|
|
5222
|
+
ReactorFeatureStatus["ACTIVE"] = "ACTIVE";
|
|
5223
|
+
ReactorFeatureStatus["DISCONNECTED"] = "DISCONNECTED";
|
|
5224
|
+
ReactorFeatureStatus["PENDING"] = "PENDING";
|
|
5225
|
+
ReactorFeatureStatus["DISABLED"] = "DISABLED";
|
|
5226
|
+
ReactorFeatureStatus["UNKNOWN"] = "UNKNOWN";
|
|
5227
|
+
})(ReactorFeatureStatus = exports.ReactorFeatureStatus || (exports.ReactorFeatureStatus = {}));
|
|
5403
5228
|
/**
|
|
5404
|
-
*
|
|
5229
|
+
* @author Daniel DeGroff
|
|
5230
|
+
*/
|
|
5231
|
+
var UnverifiedBehavior;
|
|
5232
|
+
(function (UnverifiedBehavior) {
|
|
5233
|
+
UnverifiedBehavior["Allow"] = "Allow";
|
|
5234
|
+
UnverifiedBehavior["Gated"] = "Gated";
|
|
5235
|
+
})(UnverifiedBehavior = exports.UnverifiedBehavior || (exports.UnverifiedBehavior = {}));
|
|
5236
|
+
/**
|
|
5237
|
+
* @author Brett Guy
|
|
5238
|
+
*/
|
|
5239
|
+
var MessengerType;
|
|
5240
|
+
(function (MessengerType) {
|
|
5241
|
+
MessengerType["Generic"] = "Generic";
|
|
5242
|
+
MessengerType["Kafka"] = "Kafka";
|
|
5243
|
+
MessengerType["Twilio"] = "Twilio";
|
|
5244
|
+
})(MessengerType = exports.MessengerType || (exports.MessengerType = {}));
|
|
5245
|
+
var BreachAction;
|
|
5246
|
+
(function (BreachAction) {
|
|
5247
|
+
BreachAction["Off"] = "Off";
|
|
5248
|
+
BreachAction["RecordOnly"] = "RecordOnly";
|
|
5249
|
+
BreachAction["NotifyUser"] = "NotifyUser";
|
|
5250
|
+
BreachAction["RequireChange"] = "RequireChange";
|
|
5251
|
+
})(BreachAction = exports.BreachAction || (exports.BreachAction = {}));
|
|
5252
|
+
var BreachMatchMode;
|
|
5253
|
+
(function (BreachMatchMode) {
|
|
5254
|
+
BreachMatchMode["Low"] = "Low";
|
|
5255
|
+
BreachMatchMode["Medium"] = "Medium";
|
|
5256
|
+
BreachMatchMode["High"] = "High";
|
|
5257
|
+
})(BreachMatchMode = exports.BreachMatchMode || (exports.BreachMatchMode = {}));
|
|
5258
|
+
/**
|
|
5259
|
+
* @author Daniel DeGroff
|
|
5260
|
+
*/
|
|
5261
|
+
var FormFieldAdminPolicy;
|
|
5262
|
+
(function (FormFieldAdminPolicy) {
|
|
5263
|
+
FormFieldAdminPolicy["Edit"] = "Edit";
|
|
5264
|
+
FormFieldAdminPolicy["View"] = "View";
|
|
5265
|
+
})(FormFieldAdminPolicy = exports.FormFieldAdminPolicy || (exports.FormFieldAdminPolicy = {}));
|
|
5266
|
+
/**
|
|
5267
|
+
* Used to communicate whether and how authenticator attestation should be delivered to the Relying Party
|
|
5405
5268
|
*
|
|
5406
5269
|
* @author Spencer Witt
|
|
5407
5270
|
*/
|
|
@@ -5412,34 +5275,418 @@ var AttestationConveyancePreference;
|
|
|
5412
5275
|
AttestationConveyancePreference["direct"] = "direct";
|
|
5413
5276
|
AttestationConveyancePreference["enterprise"] = "enterprise";
|
|
5414
5277
|
})(AttestationConveyancePreference = exports.AttestationConveyancePreference || (exports.AttestationConveyancePreference = {}));
|
|
5278
|
+
/**
|
|
5279
|
+
* The possible result states of a webhook event. This tracks the success of the overall webhook transaction according to the {@link TransactionType}
|
|
5280
|
+
* and configured webhooks.
|
|
5281
|
+
*
|
|
5282
|
+
* @author Spencer Witt
|
|
5283
|
+
*/
|
|
5284
|
+
var WebhookEventResult;
|
|
5285
|
+
(function (WebhookEventResult) {
|
|
5286
|
+
WebhookEventResult["Failed"] = "Failed";
|
|
5287
|
+
WebhookEventResult["Running"] = "Running";
|
|
5288
|
+
WebhookEventResult["Succeeded"] = "Succeeded";
|
|
5289
|
+
})(WebhookEventResult = exports.WebhookEventResult || (exports.WebhookEventResult = {}));
|
|
5290
|
+
/**
|
|
5291
|
+
* Identifies the WebAuthn workflow. This will affect the parameters used for credential creation
|
|
5292
|
+
* and request based on the Tenant configuration.
|
|
5293
|
+
*
|
|
5294
|
+
* @author Spencer Witt
|
|
5295
|
+
*/
|
|
5296
|
+
var WebAuthnWorkflow;
|
|
5297
|
+
(function (WebAuthnWorkflow) {
|
|
5298
|
+
WebAuthnWorkflow["bootstrap"] = "bootstrap";
|
|
5299
|
+
WebAuthnWorkflow["general"] = "general";
|
|
5300
|
+
WebAuthnWorkflow["reauthentication"] = "reauthentication";
|
|
5301
|
+
})(WebAuthnWorkflow = exports.WebAuthnWorkflow || (exports.WebAuthnWorkflow = {}));
|
|
5302
|
+
/**
|
|
5303
|
+
* Models a consent.
|
|
5304
|
+
*
|
|
5305
|
+
* @author Daniel DeGroff
|
|
5306
|
+
*/
|
|
5307
|
+
var ConsentStatus;
|
|
5308
|
+
(function (ConsentStatus) {
|
|
5309
|
+
ConsentStatus["Active"] = "Active";
|
|
5310
|
+
ConsentStatus["Revoked"] = "Revoked";
|
|
5311
|
+
})(ConsentStatus = exports.ConsentStatus || (exports.ConsentStatus = {}));
|
|
5312
|
+
/**
|
|
5313
|
+
* @author Daniel DeGroff
|
|
5314
|
+
*/
|
|
5315
|
+
var HTTPMethod;
|
|
5316
|
+
(function (HTTPMethod) {
|
|
5317
|
+
HTTPMethod["GET"] = "GET";
|
|
5318
|
+
HTTPMethod["POST"] = "POST";
|
|
5319
|
+
HTTPMethod["PUT"] = "PUT";
|
|
5320
|
+
HTTPMethod["DELETE"] = "DELETE";
|
|
5321
|
+
HTTPMethod["HEAD"] = "HEAD";
|
|
5322
|
+
HTTPMethod["OPTIONS"] = "OPTIONS";
|
|
5323
|
+
HTTPMethod["PATCH"] = "PATCH";
|
|
5324
|
+
})(HTTPMethod = exports.HTTPMethod || (exports.HTTPMethod = {}));
|
|
5325
|
+
/**
|
|
5326
|
+
* @author Daniel DeGroff
|
|
5327
|
+
*/
|
|
5328
|
+
var UserState;
|
|
5329
|
+
(function (UserState) {
|
|
5330
|
+
UserState["Authenticated"] = "Authenticated";
|
|
5331
|
+
UserState["AuthenticatedNotRegistered"] = "AuthenticatedNotRegistered";
|
|
5332
|
+
UserState["AuthenticatedNotVerified"] = "AuthenticatedNotVerified";
|
|
5333
|
+
UserState["AuthenticatedRegistrationNotVerified"] = "AuthenticatedRegistrationNotVerified";
|
|
5334
|
+
})(UserState = exports.UserState || (exports.UserState = {}));
|
|
5335
|
+
/**
|
|
5336
|
+
* @author Daniel DeGroff
|
|
5337
|
+
*/
|
|
5338
|
+
var RefreshTokenExpirationPolicy;
|
|
5339
|
+
(function (RefreshTokenExpirationPolicy) {
|
|
5340
|
+
RefreshTokenExpirationPolicy["Fixed"] = "Fixed";
|
|
5341
|
+
RefreshTokenExpirationPolicy["SlidingWindow"] = "SlidingWindow";
|
|
5342
|
+
RefreshTokenExpirationPolicy["SlidingWindowWithMaximumLifetime"] = "SlidingWindowWithMaximumLifetime";
|
|
5343
|
+
})(RefreshTokenExpirationPolicy = exports.RefreshTokenExpirationPolicy || (exports.RefreshTokenExpirationPolicy = {}));
|
|
5344
|
+
/**
|
|
5345
|
+
* The use type of a key.
|
|
5346
|
+
*
|
|
5347
|
+
* @author Daniel DeGroff
|
|
5348
|
+
*/
|
|
5349
|
+
var KeyUse;
|
|
5350
|
+
(function (KeyUse) {
|
|
5351
|
+
KeyUse["SignOnly"] = "SignOnly";
|
|
5352
|
+
KeyUse["SignAndVerify"] = "SignAndVerify";
|
|
5353
|
+
KeyUse["VerifyOnly"] = "VerifyOnly";
|
|
5354
|
+
})(KeyUse = exports.KeyUse || (exports.KeyUse = {}));
|
|
5355
|
+
/**
|
|
5356
|
+
* @author Daniel DeGroff
|
|
5357
|
+
*/
|
|
5358
|
+
var BreachedPasswordStatus;
|
|
5359
|
+
(function (BreachedPasswordStatus) {
|
|
5360
|
+
BreachedPasswordStatus["None"] = "None";
|
|
5361
|
+
BreachedPasswordStatus["ExactMatch"] = "ExactMatch";
|
|
5362
|
+
BreachedPasswordStatus["SubAddressMatch"] = "SubAddressMatch";
|
|
5363
|
+
BreachedPasswordStatus["PasswordOnly"] = "PasswordOnly";
|
|
5364
|
+
BreachedPasswordStatus["CommonPassword"] = "CommonPassword";
|
|
5365
|
+
})(BreachedPasswordStatus = exports.BreachedPasswordStatus || (exports.BreachedPasswordStatus = {}));
|
|
5366
|
+
/**
|
|
5367
|
+
* @author Daniel DeGroff
|
|
5368
|
+
*/
|
|
5369
|
+
var FormControl;
|
|
5370
|
+
(function (FormControl) {
|
|
5371
|
+
FormControl["checkbox"] = "checkbox";
|
|
5372
|
+
FormControl["number"] = "number";
|
|
5373
|
+
FormControl["password"] = "password";
|
|
5374
|
+
FormControl["radio"] = "radio";
|
|
5375
|
+
FormControl["select"] = "select";
|
|
5376
|
+
FormControl["textarea"] = "textarea";
|
|
5377
|
+
FormControl["text"] = "text";
|
|
5378
|
+
})(FormControl = exports.FormControl || (exports.FormControl = {}));
|
|
5379
|
+
/**
|
|
5380
|
+
* Controls the policy for whether OAuth workflows will more strictly adhere to the OAuth and OIDC specification
|
|
5381
|
+
* or run in backwards compatibility mode.
|
|
5382
|
+
*
|
|
5383
|
+
* @author David Charles
|
|
5384
|
+
*/
|
|
5385
|
+
var OAuthScopeHandlingPolicy;
|
|
5386
|
+
(function (OAuthScopeHandlingPolicy) {
|
|
5387
|
+
OAuthScopeHandlingPolicy["Compatibility"] = "Compatibility";
|
|
5388
|
+
OAuthScopeHandlingPolicy["Strict"] = "Strict";
|
|
5389
|
+
})(OAuthScopeHandlingPolicy = exports.OAuthScopeHandlingPolicy || (exports.OAuthScopeHandlingPolicy = {}));
|
|
5390
|
+
/**
|
|
5391
|
+
* The possible states of an individual webhook attempt to a single endpoint.
|
|
5392
|
+
*
|
|
5393
|
+
* @author Spencer Witt
|
|
5394
|
+
*/
|
|
5395
|
+
var WebhookAttemptResult;
|
|
5396
|
+
(function (WebhookAttemptResult) {
|
|
5397
|
+
WebhookAttemptResult["Success"] = "Success";
|
|
5398
|
+
WebhookAttemptResult["Failure"] = "Failure";
|
|
5399
|
+
WebhookAttemptResult["Unknown"] = "Unknown";
|
|
5400
|
+
})(WebhookAttemptResult = exports.WebhookAttemptResult || (exports.WebhookAttemptResult = {}));
|
|
5401
|
+
/**
|
|
5402
|
+
* Event Log Type
|
|
5403
|
+
*
|
|
5404
|
+
* @author Daniel DeGroff
|
|
5405
|
+
*/
|
|
5406
|
+
var EventLogType;
|
|
5407
|
+
(function (EventLogType) {
|
|
5408
|
+
EventLogType["Information"] = "Information";
|
|
5409
|
+
EventLogType["Debug"] = "Debug";
|
|
5410
|
+
EventLogType["Error"] = "Error";
|
|
5411
|
+
})(EventLogType = exports.EventLogType || (exports.EventLogType = {}));
|
|
5412
|
+
/**
|
|
5413
|
+
* The transaction types for Webhooks and other event systems within FusionAuth.
|
|
5414
|
+
*
|
|
5415
|
+
* @author Brian Pontarelli
|
|
5416
|
+
*/
|
|
5417
|
+
var TransactionType;
|
|
5418
|
+
(function (TransactionType) {
|
|
5419
|
+
TransactionType["None"] = "None";
|
|
5420
|
+
TransactionType["Any"] = "Any";
|
|
5421
|
+
TransactionType["SimpleMajority"] = "SimpleMajority";
|
|
5422
|
+
TransactionType["SuperMajority"] = "SuperMajority";
|
|
5423
|
+
TransactionType["AbsoluteMajority"] = "AbsoluteMajority";
|
|
5424
|
+
})(TransactionType = exports.TransactionType || (exports.TransactionType = {}));
|
|
5425
|
+
/**
|
|
5426
|
+
* COSE key type
|
|
5427
|
+
*
|
|
5428
|
+
* @author Spencer Witt
|
|
5429
|
+
*/
|
|
5430
|
+
var CoseKeyType;
|
|
5431
|
+
(function (CoseKeyType) {
|
|
5432
|
+
CoseKeyType["Reserved"] = "0";
|
|
5433
|
+
CoseKeyType["OKP"] = "1";
|
|
5434
|
+
CoseKeyType["EC2"] = "2";
|
|
5435
|
+
CoseKeyType["RSA"] = "3";
|
|
5436
|
+
CoseKeyType["Symmetric"] = "4";
|
|
5437
|
+
})(CoseKeyType = exports.CoseKeyType || (exports.CoseKeyType = {}));
|
|
5438
|
+
var ThemeType;
|
|
5439
|
+
(function (ThemeType) {
|
|
5440
|
+
ThemeType["advanced"] = "advanced";
|
|
5441
|
+
ThemeType["simple"] = "simple";
|
|
5442
|
+
})(ThemeType = exports.ThemeType || (exports.ThemeType = {}));
|
|
5443
|
+
/**
|
|
5444
|
+
* The types of connectors. This enum is stored as an ordinal on the <code>identities</code> table, order must be maintained.
|
|
5445
|
+
*
|
|
5446
|
+
* @author Trevor Smith
|
|
5447
|
+
*/
|
|
5448
|
+
var ConnectorType;
|
|
5449
|
+
(function (ConnectorType) {
|
|
5450
|
+
ConnectorType["FusionAuth"] = "FusionAuth";
|
|
5451
|
+
ConnectorType["Generic"] = "Generic";
|
|
5452
|
+
ConnectorType["LDAP"] = "LDAP";
|
|
5453
|
+
})(ConnectorType = exports.ConnectorType || (exports.ConnectorType = {}));
|
|
5454
|
+
/**
|
|
5455
|
+
* @author Brett Guy
|
|
5456
|
+
*/
|
|
5457
|
+
var ProofKeyForCodeExchangePolicy;
|
|
5458
|
+
(function (ProofKeyForCodeExchangePolicy) {
|
|
5459
|
+
ProofKeyForCodeExchangePolicy["Required"] = "Required";
|
|
5460
|
+
ProofKeyForCodeExchangePolicy["NotRequired"] = "NotRequired";
|
|
5461
|
+
ProofKeyForCodeExchangePolicy["NotRequiredWhenUsingClientAuthentication"] = "NotRequiredWhenUsingClientAuthentication";
|
|
5462
|
+
})(ProofKeyForCodeExchangePolicy = exports.ProofKeyForCodeExchangePolicy || (exports.ProofKeyForCodeExchangePolicy = {}));
|
|
5463
|
+
/**
|
|
5464
|
+
* @author Mikey Sleevi
|
|
5465
|
+
*/
|
|
5466
|
+
var MessageType;
|
|
5467
|
+
(function (MessageType) {
|
|
5468
|
+
MessageType["SMS"] = "SMS";
|
|
5469
|
+
})(MessageType = exports.MessageType || (exports.MessageType = {}));
|
|
5470
|
+
/**
|
|
5471
|
+
* Describes the Relying Party's requirements for <a href="https://www.w3.org/TR/webauthn-2/#client-side-discoverable-credential">client-side
|
|
5472
|
+
* discoverable credentials</a> (formerly known as "resident keys")
|
|
5473
|
+
*
|
|
5474
|
+
* @author Spencer Witt
|
|
5475
|
+
*/
|
|
5476
|
+
var ResidentKeyRequirement;
|
|
5477
|
+
(function (ResidentKeyRequirement) {
|
|
5478
|
+
ResidentKeyRequirement["discouraged"] = "discouraged";
|
|
5479
|
+
ResidentKeyRequirement["preferred"] = "preferred";
|
|
5480
|
+
ResidentKeyRequirement["required"] = "required";
|
|
5481
|
+
})(ResidentKeyRequirement = exports.ResidentKeyRequirement || (exports.ResidentKeyRequirement = {}));
|
|
5482
|
+
/**
|
|
5483
|
+
* @author Trevor Smith
|
|
5484
|
+
*/
|
|
5485
|
+
var ChangePasswordReason;
|
|
5486
|
+
(function (ChangePasswordReason) {
|
|
5487
|
+
ChangePasswordReason["Administrative"] = "Administrative";
|
|
5488
|
+
ChangePasswordReason["Breached"] = "Breached";
|
|
5489
|
+
ChangePasswordReason["Expired"] = "Expired";
|
|
5490
|
+
ChangePasswordReason["Validation"] = "Validation";
|
|
5491
|
+
})(ChangePasswordReason = exports.ChangePasswordReason || (exports.ChangePasswordReason = {}));
|
|
5492
|
+
var LDAPSecurityMethod;
|
|
5493
|
+
(function (LDAPSecurityMethod) {
|
|
5494
|
+
LDAPSecurityMethod["None"] = "None";
|
|
5495
|
+
LDAPSecurityMethod["LDAPS"] = "LDAPS";
|
|
5496
|
+
LDAPSecurityMethod["StartTLS"] = "StartTLS";
|
|
5497
|
+
})(LDAPSecurityMethod = exports.LDAPSecurityMethod || (exports.LDAPSecurityMethod = {}));
|
|
5498
|
+
/**
|
|
5499
|
+
* @author Johnathon Wood
|
|
5500
|
+
*/
|
|
5501
|
+
var Oauth2AuthorizedURLValidationPolicy;
|
|
5502
|
+
(function (Oauth2AuthorizedURLValidationPolicy) {
|
|
5503
|
+
Oauth2AuthorizedURLValidationPolicy["AllowWildcards"] = "AllowWildcards";
|
|
5504
|
+
Oauth2AuthorizedURLValidationPolicy["ExactMatch"] = "ExactMatch";
|
|
5505
|
+
})(Oauth2AuthorizedURLValidationPolicy = exports.Oauth2AuthorizedURLValidationPolicy || (exports.Oauth2AuthorizedURLValidationPolicy = {}));
|
|
5506
|
+
/**
|
|
5507
|
+
* Describes the <a href="https://www.w3.org/TR/webauthn-2/#authenticator-attachment-modality">authenticator attachment modality</a>.
|
|
5508
|
+
*
|
|
5509
|
+
* @author Spencer Witt
|
|
5510
|
+
*/
|
|
5511
|
+
var AuthenticatorAttachment;
|
|
5512
|
+
(function (AuthenticatorAttachment) {
|
|
5513
|
+
AuthenticatorAttachment["platform"] = "platform";
|
|
5514
|
+
AuthenticatorAttachment["crossPlatform"] = "crossPlatform";
|
|
5515
|
+
})(AuthenticatorAttachment = exports.AuthenticatorAttachment || (exports.AuthenticatorAttachment = {}));
|
|
5516
|
+
/**
|
|
5517
|
+
* @author Brett Pontarelli
|
|
5518
|
+
*/
|
|
5519
|
+
var IdentityProviderLoginMethod;
|
|
5520
|
+
(function (IdentityProviderLoginMethod) {
|
|
5521
|
+
IdentityProviderLoginMethod["UsePopup"] = "UsePopup";
|
|
5522
|
+
IdentityProviderLoginMethod["UseRedirect"] = "UseRedirect";
|
|
5523
|
+
IdentityProviderLoginMethod["UseVendorJavaScript"] = "UseVendorJavaScript";
|
|
5524
|
+
})(IdentityProviderLoginMethod = exports.IdentityProviderLoginMethod || (exports.IdentityProviderLoginMethod = {}));
|
|
5525
|
+
/**
|
|
5526
|
+
* @author Daniel DeGroff
|
|
5527
|
+
*/
|
|
5528
|
+
var RefreshTokenUsagePolicy;
|
|
5529
|
+
(function (RefreshTokenUsagePolicy) {
|
|
5530
|
+
RefreshTokenUsagePolicy["Reusable"] = "Reusable";
|
|
5531
|
+
RefreshTokenUsagePolicy["OneTimeUse"] = "OneTimeUse";
|
|
5532
|
+
})(RefreshTokenUsagePolicy = exports.RefreshTokenUsagePolicy || (exports.RefreshTokenUsagePolicy = {}));
|
|
5533
|
+
/**
|
|
5534
|
+
* @author Lyle Schemmerling
|
|
5535
|
+
*/
|
|
5536
|
+
var SAMLv2DestinationAssertionPolicy;
|
|
5537
|
+
(function (SAMLv2DestinationAssertionPolicy) {
|
|
5538
|
+
SAMLv2DestinationAssertionPolicy["Enabled"] = "Enabled";
|
|
5539
|
+
SAMLv2DestinationAssertionPolicy["Disabled"] = "Disabled";
|
|
5540
|
+
SAMLv2DestinationAssertionPolicy["AllowAlternates"] = "AllowAlternates";
|
|
5541
|
+
})(SAMLv2DestinationAssertionPolicy = exports.SAMLv2DestinationAssertionPolicy || (exports.SAMLv2DestinationAssertionPolicy = {}));
|
|
5542
|
+
var OAuthErrorReason;
|
|
5543
|
+
(function (OAuthErrorReason) {
|
|
5544
|
+
OAuthErrorReason["auth_code_not_found"] = "auth_code_not_found";
|
|
5545
|
+
OAuthErrorReason["access_token_malformed"] = "access_token_malformed";
|
|
5546
|
+
OAuthErrorReason["access_token_expired"] = "access_token_expired";
|
|
5547
|
+
OAuthErrorReason["access_token_unavailable_for_processing"] = "access_token_unavailable_for_processing";
|
|
5548
|
+
OAuthErrorReason["access_token_failed_processing"] = "access_token_failed_processing";
|
|
5549
|
+
OAuthErrorReason["access_token_invalid"] = "access_token_invalid";
|
|
5550
|
+
OAuthErrorReason["access_token_required"] = "access_token_required";
|
|
5551
|
+
OAuthErrorReason["refresh_token_not_found"] = "refresh_token_not_found";
|
|
5552
|
+
OAuthErrorReason["refresh_token_type_not_supported"] = "refresh_token_type_not_supported";
|
|
5553
|
+
OAuthErrorReason["invalid_client_id"] = "invalid_client_id";
|
|
5554
|
+
OAuthErrorReason["invalid_user_credentials"] = "invalid_user_credentials";
|
|
5555
|
+
OAuthErrorReason["invalid_grant_type"] = "invalid_grant_type";
|
|
5556
|
+
OAuthErrorReason["invalid_origin"] = "invalid_origin";
|
|
5557
|
+
OAuthErrorReason["invalid_origin_opaque"] = "invalid_origin_opaque";
|
|
5558
|
+
OAuthErrorReason["invalid_pkce_code_verifier"] = "invalid_pkce_code_verifier";
|
|
5559
|
+
OAuthErrorReason["invalid_pkce_code_challenge"] = "invalid_pkce_code_challenge";
|
|
5560
|
+
OAuthErrorReason["invalid_pkce_code_challenge_method"] = "invalid_pkce_code_challenge_method";
|
|
5561
|
+
OAuthErrorReason["invalid_redirect_uri"] = "invalid_redirect_uri";
|
|
5562
|
+
OAuthErrorReason["invalid_response_mode"] = "invalid_response_mode";
|
|
5563
|
+
OAuthErrorReason["invalid_response_type"] = "invalid_response_type";
|
|
5564
|
+
OAuthErrorReason["invalid_id_token_hint"] = "invalid_id_token_hint";
|
|
5565
|
+
OAuthErrorReason["invalid_post_logout_redirect_uri"] = "invalid_post_logout_redirect_uri";
|
|
5566
|
+
OAuthErrorReason["invalid_device_code"] = "invalid_device_code";
|
|
5567
|
+
OAuthErrorReason["invalid_user_code"] = "invalid_user_code";
|
|
5568
|
+
OAuthErrorReason["invalid_additional_client_id"] = "invalid_additional_client_id";
|
|
5569
|
+
OAuthErrorReason["invalid_target_entity_scope"] = "invalid_target_entity_scope";
|
|
5570
|
+
OAuthErrorReason["invalid_entity_permission_scope"] = "invalid_entity_permission_scope";
|
|
5571
|
+
OAuthErrorReason["invalid_user_id"] = "invalid_user_id";
|
|
5572
|
+
OAuthErrorReason["grant_type_disabled"] = "grant_type_disabled";
|
|
5573
|
+
OAuthErrorReason["missing_client_id"] = "missing_client_id";
|
|
5574
|
+
OAuthErrorReason["missing_client_secret"] = "missing_client_secret";
|
|
5575
|
+
OAuthErrorReason["missing_code"] = "missing_code";
|
|
5576
|
+
OAuthErrorReason["missing_code_challenge"] = "missing_code_challenge";
|
|
5577
|
+
OAuthErrorReason["missing_code_verifier"] = "missing_code_verifier";
|
|
5578
|
+
OAuthErrorReason["missing_device_code"] = "missing_device_code";
|
|
5579
|
+
OAuthErrorReason["missing_grant_type"] = "missing_grant_type";
|
|
5580
|
+
OAuthErrorReason["missing_redirect_uri"] = "missing_redirect_uri";
|
|
5581
|
+
OAuthErrorReason["missing_refresh_token"] = "missing_refresh_token";
|
|
5582
|
+
OAuthErrorReason["missing_response_type"] = "missing_response_type";
|
|
5583
|
+
OAuthErrorReason["missing_token"] = "missing_token";
|
|
5584
|
+
OAuthErrorReason["missing_user_code"] = "missing_user_code";
|
|
5585
|
+
OAuthErrorReason["missing_user_id"] = "missing_user_id";
|
|
5586
|
+
OAuthErrorReason["missing_verification_uri"] = "missing_verification_uri";
|
|
5587
|
+
OAuthErrorReason["login_prevented"] = "login_prevented";
|
|
5588
|
+
OAuthErrorReason["not_licensed"] = "not_licensed";
|
|
5589
|
+
OAuthErrorReason["user_code_expired"] = "user_code_expired";
|
|
5590
|
+
OAuthErrorReason["user_expired"] = "user_expired";
|
|
5591
|
+
OAuthErrorReason["user_locked"] = "user_locked";
|
|
5592
|
+
OAuthErrorReason["user_not_found"] = "user_not_found";
|
|
5593
|
+
OAuthErrorReason["client_authentication_missing"] = "client_authentication_missing";
|
|
5594
|
+
OAuthErrorReason["invalid_client_authentication_scheme"] = "invalid_client_authentication_scheme";
|
|
5595
|
+
OAuthErrorReason["invalid_client_authentication"] = "invalid_client_authentication";
|
|
5596
|
+
OAuthErrorReason["client_id_mismatch"] = "client_id_mismatch";
|
|
5597
|
+
OAuthErrorReason["change_password_administrative"] = "change_password_administrative";
|
|
5598
|
+
OAuthErrorReason["change_password_breached"] = "change_password_breached";
|
|
5599
|
+
OAuthErrorReason["change_password_expired"] = "change_password_expired";
|
|
5600
|
+
OAuthErrorReason["change_password_validation"] = "change_password_validation";
|
|
5601
|
+
OAuthErrorReason["unknown"] = "unknown";
|
|
5602
|
+
OAuthErrorReason["missing_required_scope"] = "missing_required_scope";
|
|
5603
|
+
OAuthErrorReason["unknown_scope"] = "unknown_scope";
|
|
5604
|
+
OAuthErrorReason["consent_canceled"] = "consent_canceled";
|
|
5605
|
+
})(OAuthErrorReason = exports.OAuthErrorReason || (exports.OAuthErrorReason = {}));
|
|
5606
|
+
var OAuthErrorType;
|
|
5607
|
+
(function (OAuthErrorType) {
|
|
5608
|
+
OAuthErrorType["invalid_request"] = "invalid_request";
|
|
5609
|
+
OAuthErrorType["invalid_client"] = "invalid_client";
|
|
5610
|
+
OAuthErrorType["invalid_grant"] = "invalid_grant";
|
|
5611
|
+
OAuthErrorType["invalid_token"] = "invalid_token";
|
|
5612
|
+
OAuthErrorType["unauthorized_client"] = "unauthorized_client";
|
|
5613
|
+
OAuthErrorType["invalid_scope"] = "invalid_scope";
|
|
5614
|
+
OAuthErrorType["server_error"] = "server_error";
|
|
5615
|
+
OAuthErrorType["unsupported_grant_type"] = "unsupported_grant_type";
|
|
5616
|
+
OAuthErrorType["unsupported_response_type"] = "unsupported_response_type";
|
|
5617
|
+
OAuthErrorType["access_denied"] = "access_denied";
|
|
5618
|
+
OAuthErrorType["change_password_required"] = "change_password_required";
|
|
5619
|
+
OAuthErrorType["not_licensed"] = "not_licensed";
|
|
5620
|
+
OAuthErrorType["two_factor_required"] = "two_factor_required";
|
|
5621
|
+
OAuthErrorType["authorization_pending"] = "authorization_pending";
|
|
5622
|
+
OAuthErrorType["expired_token"] = "expired_token";
|
|
5623
|
+
OAuthErrorType["unsupported_token_type"] = "unsupported_token_type";
|
|
5624
|
+
})(OAuthErrorType = exports.OAuthErrorType || (exports.OAuthErrorType = {}));
|
|
5625
|
+
var DeviceType;
|
|
5626
|
+
(function (DeviceType) {
|
|
5627
|
+
DeviceType["BROWSER"] = "BROWSER";
|
|
5628
|
+
DeviceType["DESKTOP"] = "DESKTOP";
|
|
5629
|
+
DeviceType["LAPTOP"] = "LAPTOP";
|
|
5630
|
+
DeviceType["MOBILE"] = "MOBILE";
|
|
5631
|
+
DeviceType["OTHER"] = "OTHER";
|
|
5632
|
+
DeviceType["SERVER"] = "SERVER";
|
|
5633
|
+
DeviceType["TABLET"] = "TABLET";
|
|
5634
|
+
DeviceType["TV"] = "TV";
|
|
5635
|
+
DeviceType["UNKNOWN"] = "UNKNOWN";
|
|
5636
|
+
})(DeviceType = exports.DeviceType || (exports.DeviceType = {}));
|
|
5637
|
+
/**
|
|
5638
|
+
* @author Daniel DeGroff
|
|
5639
|
+
*/
|
|
5640
|
+
var ApplicationMultiFactorTrustPolicy;
|
|
5641
|
+
(function (ApplicationMultiFactorTrustPolicy) {
|
|
5642
|
+
ApplicationMultiFactorTrustPolicy["Any"] = "Any";
|
|
5643
|
+
ApplicationMultiFactorTrustPolicy["This"] = "This";
|
|
5644
|
+
ApplicationMultiFactorTrustPolicy["None"] = "None";
|
|
5645
|
+
})(ApplicationMultiFactorTrustPolicy = exports.ApplicationMultiFactorTrustPolicy || (exports.ApplicationMultiFactorTrustPolicy = {}));
|
|
5646
|
+
/**
|
|
5647
|
+
* @author Daniel DeGroff
|
|
5648
|
+
*/
|
|
5649
|
+
var RateLimitedRequestType;
|
|
5650
|
+
(function (RateLimitedRequestType) {
|
|
5651
|
+
RateLimitedRequestType["FailedLogin"] = "FailedLogin";
|
|
5652
|
+
RateLimitedRequestType["ForgotPassword"] = "ForgotPassword";
|
|
5653
|
+
RateLimitedRequestType["SendEmailVerification"] = "SendEmailVerification";
|
|
5654
|
+
RateLimitedRequestType["SendPasswordless"] = "SendPasswordless";
|
|
5655
|
+
RateLimitedRequestType["SendRegistrationVerification"] = "SendRegistrationVerification";
|
|
5656
|
+
RateLimitedRequestType["SendTwoFactor"] = "SendTwoFactor";
|
|
5657
|
+
})(RateLimitedRequestType = exports.RateLimitedRequestType || (exports.RateLimitedRequestType = {}));
|
|
5415
5658
|
/**
|
|
5416
5659
|
* @author Daniel DeGroff
|
|
5417
5660
|
*/
|
|
5418
|
-
var
|
|
5419
|
-
(function (
|
|
5420
|
-
|
|
5421
|
-
|
|
5422
|
-
|
|
5423
|
-
})(ObjectState = exports.ObjectState || (exports.ObjectState = {}));
|
|
5424
|
-
/**
|
|
5425
|
-
* @author Brett Pontarelli
|
|
5426
|
-
*/
|
|
5427
|
-
var AuthenticationThreats;
|
|
5428
|
-
(function (AuthenticationThreats) {
|
|
5429
|
-
AuthenticationThreats["ImpossibleTravel"] = "ImpossibleTravel";
|
|
5430
|
-
})(AuthenticationThreats = exports.AuthenticationThreats || (exports.AuthenticationThreats = {}));
|
|
5661
|
+
var LambdaEngineType;
|
|
5662
|
+
(function (LambdaEngineType) {
|
|
5663
|
+
LambdaEngineType["GraalJS"] = "GraalJS";
|
|
5664
|
+
LambdaEngineType["Nashorn"] = "Nashorn";
|
|
5665
|
+
})(LambdaEngineType = exports.LambdaEngineType || (exports.LambdaEngineType = {}));
|
|
5431
5666
|
/**
|
|
5432
|
-
*
|
|
5433
|
-
*
|
|
5667
|
+
* Used to express whether the Relying Party requires <a href="https://www.w3.org/TR/webauthn-2/#user-verification">user verification</a> for the
|
|
5668
|
+
* current operation.
|
|
5434
5669
|
*
|
|
5435
5670
|
* @author Spencer Witt
|
|
5436
5671
|
*/
|
|
5437
|
-
var
|
|
5438
|
-
(function (
|
|
5439
|
-
|
|
5440
|
-
|
|
5441
|
-
|
|
5442
|
-
})(
|
|
5672
|
+
var UserVerificationRequirement;
|
|
5673
|
+
(function (UserVerificationRequirement) {
|
|
5674
|
+
UserVerificationRequirement["required"] = "required";
|
|
5675
|
+
UserVerificationRequirement["preferred"] = "preferred";
|
|
5676
|
+
UserVerificationRequirement["discouraged"] = "discouraged";
|
|
5677
|
+
})(UserVerificationRequirement = exports.UserVerificationRequirement || (exports.UserVerificationRequirement = {}));
|
|
5678
|
+
/**
|
|
5679
|
+
* @author Brian Pontarelli
|
|
5680
|
+
*/
|
|
5681
|
+
var ExpiryUnit;
|
|
5682
|
+
(function (ExpiryUnit) {
|
|
5683
|
+
ExpiryUnit["MINUTES"] = "MINUTES";
|
|
5684
|
+
ExpiryUnit["HOURS"] = "HOURS";
|
|
5685
|
+
ExpiryUnit["DAYS"] = "DAYS";
|
|
5686
|
+
ExpiryUnit["WEEKS"] = "WEEKS";
|
|
5687
|
+
ExpiryUnit["MONTHS"] = "MONTHS";
|
|
5688
|
+
ExpiryUnit["YEARS"] = "YEARS";
|
|
5689
|
+
})(ExpiryUnit = exports.ExpiryUnit || (exports.ExpiryUnit = {}));
|
|
5443
5690
|
/**
|
|
5444
5691
|
* @author Brett Guy
|
|
5445
5692
|
*/
|
|
@@ -5449,59 +5696,6 @@ var ClientAuthenticationPolicy;
|
|
|
5449
5696
|
ClientAuthenticationPolicy["NotRequired"] = "NotRequired";
|
|
5450
5697
|
ClientAuthenticationPolicy["NotRequiredWhenUsingPKCE"] = "NotRequiredWhenUsingPKCE";
|
|
5451
5698
|
})(ClientAuthenticationPolicy = exports.ClientAuthenticationPolicy || (exports.ClientAuthenticationPolicy = {}));
|
|
5452
|
-
/**
|
|
5453
|
-
* @author Daniel DeGroff
|
|
5454
|
-
*/
|
|
5455
|
-
var RefreshTokenUsagePolicy;
|
|
5456
|
-
(function (RefreshTokenUsagePolicy) {
|
|
5457
|
-
RefreshTokenUsagePolicy["Reusable"] = "Reusable";
|
|
5458
|
-
RefreshTokenUsagePolicy["OneTimeUse"] = "OneTimeUse";
|
|
5459
|
-
})(RefreshTokenUsagePolicy = exports.RefreshTokenUsagePolicy || (exports.RefreshTokenUsagePolicy = {}));
|
|
5460
|
-
/**
|
|
5461
|
-
* The possible states of an individual webhook attempt to a single endpoint.
|
|
5462
|
-
*
|
|
5463
|
-
* @author Spencer Witt
|
|
5464
|
-
*/
|
|
5465
|
-
var WebhookAttemptResult;
|
|
5466
|
-
(function (WebhookAttemptResult) {
|
|
5467
|
-
WebhookAttemptResult["Success"] = "Success";
|
|
5468
|
-
WebhookAttemptResult["Failure"] = "Failure";
|
|
5469
|
-
WebhookAttemptResult["Unknown"] = "Unknown";
|
|
5470
|
-
})(WebhookAttemptResult = exports.WebhookAttemptResult || (exports.WebhookAttemptResult = {}));
|
|
5471
|
-
var DeviceType;
|
|
5472
|
-
(function (DeviceType) {
|
|
5473
|
-
DeviceType["BROWSER"] = "BROWSER";
|
|
5474
|
-
DeviceType["DESKTOP"] = "DESKTOP";
|
|
5475
|
-
DeviceType["LAPTOP"] = "LAPTOP";
|
|
5476
|
-
DeviceType["MOBILE"] = "MOBILE";
|
|
5477
|
-
DeviceType["OTHER"] = "OTHER";
|
|
5478
|
-
DeviceType["SERVER"] = "SERVER";
|
|
5479
|
-
DeviceType["TABLET"] = "TABLET";
|
|
5480
|
-
DeviceType["TV"] = "TV";
|
|
5481
|
-
DeviceType["UNKNOWN"] = "UNKNOWN";
|
|
5482
|
-
})(DeviceType = exports.DeviceType || (exports.DeviceType = {}));
|
|
5483
|
-
/**
|
|
5484
|
-
* @author Brett Pontarelli
|
|
5485
|
-
*/
|
|
5486
|
-
var CaptchaMethod;
|
|
5487
|
-
(function (CaptchaMethod) {
|
|
5488
|
-
CaptchaMethod["GoogleRecaptchaV2"] = "GoogleRecaptchaV2";
|
|
5489
|
-
CaptchaMethod["GoogleRecaptchaV3"] = "GoogleRecaptchaV3";
|
|
5490
|
-
CaptchaMethod["HCaptcha"] = "HCaptcha";
|
|
5491
|
-
CaptchaMethod["HCaptchaEnterprise"] = "HCaptchaEnterprise";
|
|
5492
|
-
})(CaptchaMethod = exports.CaptchaMethod || (exports.CaptchaMethod = {}));
|
|
5493
|
-
var KeyAlgorithm;
|
|
5494
|
-
(function (KeyAlgorithm) {
|
|
5495
|
-
KeyAlgorithm["ES256"] = "ES256";
|
|
5496
|
-
KeyAlgorithm["ES384"] = "ES384";
|
|
5497
|
-
KeyAlgorithm["ES512"] = "ES512";
|
|
5498
|
-
KeyAlgorithm["HS256"] = "HS256";
|
|
5499
|
-
KeyAlgorithm["HS384"] = "HS384";
|
|
5500
|
-
KeyAlgorithm["HS512"] = "HS512";
|
|
5501
|
-
KeyAlgorithm["RS256"] = "RS256";
|
|
5502
|
-
KeyAlgorithm["RS384"] = "RS384";
|
|
5503
|
-
KeyAlgorithm["RS512"] = "RS512";
|
|
5504
|
-
})(KeyAlgorithm = exports.KeyAlgorithm || (exports.KeyAlgorithm = {}));
|
|
5505
5699
|
/**
|
|
5506
5700
|
* @author Daniel DeGroff
|
|
5507
5701
|
*/
|
|
@@ -5513,35 +5707,55 @@ var FormType;
|
|
|
5513
5707
|
FormType["selfServiceUser"] = "selfServiceUser";
|
|
5514
5708
|
})(FormType = exports.FormType || (exports.FormType = {}));
|
|
5515
5709
|
/**
|
|
5516
|
-
*
|
|
5710
|
+
* XML canonicalization method enumeration. This is used for the IdP and SP side of FusionAuth SAML.
|
|
5517
5711
|
*
|
|
5518
|
-
* @author
|
|
5712
|
+
* @author Brian Pontarelli
|
|
5519
5713
|
*/
|
|
5520
|
-
var
|
|
5521
|
-
(function (
|
|
5522
|
-
|
|
5523
|
-
|
|
5524
|
-
|
|
5525
|
-
|
|
5526
|
-
|
|
5527
|
-
})(AttestationType = exports.AttestationType || (exports.AttestationType = {}));
|
|
5528
|
-
var KeyType;
|
|
5529
|
-
(function (KeyType) {
|
|
5530
|
-
KeyType["EC"] = "EC";
|
|
5531
|
-
KeyType["RSA"] = "RSA";
|
|
5532
|
-
KeyType["HMAC"] = "HMAC";
|
|
5533
|
-
})(KeyType = exports.KeyType || (exports.KeyType = {}));
|
|
5714
|
+
var CanonicalizationMethod;
|
|
5715
|
+
(function (CanonicalizationMethod) {
|
|
5716
|
+
CanonicalizationMethod["exclusive"] = "exclusive";
|
|
5717
|
+
CanonicalizationMethod["exclusive_with_comments"] = "exclusive_with_comments";
|
|
5718
|
+
CanonicalizationMethod["inclusive"] = "inclusive";
|
|
5719
|
+
CanonicalizationMethod["inclusive_with_comments"] = "inclusive_with_comments";
|
|
5720
|
+
})(CanonicalizationMethod = exports.CanonicalizationMethod || (exports.CanonicalizationMethod = {}));
|
|
5534
5721
|
/**
|
|
5535
|
-
*
|
|
5722
|
+
* @author Daniel DeGroff
|
|
5723
|
+
*/
|
|
5724
|
+
var SecureGeneratorType;
|
|
5725
|
+
(function (SecureGeneratorType) {
|
|
5726
|
+
SecureGeneratorType["randomDigits"] = "randomDigits";
|
|
5727
|
+
SecureGeneratorType["randomBytes"] = "randomBytes";
|
|
5728
|
+
SecureGeneratorType["randomAlpha"] = "randomAlpha";
|
|
5729
|
+
SecureGeneratorType["randomAlphaNumeric"] = "randomAlphaNumeric";
|
|
5730
|
+
})(SecureGeneratorType = exports.SecureGeneratorType || (exports.SecureGeneratorType = {}));
|
|
5731
|
+
/**
|
|
5732
|
+
* @author Daniel DeGroff
|
|
5733
|
+
*/
|
|
5734
|
+
var FormDataType;
|
|
5735
|
+
(function (FormDataType) {
|
|
5736
|
+
FormDataType["bool"] = "bool";
|
|
5737
|
+
FormDataType["consent"] = "consent";
|
|
5738
|
+
FormDataType["date"] = "date";
|
|
5739
|
+
FormDataType["email"] = "email";
|
|
5740
|
+
FormDataType["number"] = "number";
|
|
5741
|
+
FormDataType["string"] = "string";
|
|
5742
|
+
})(FormDataType = exports.FormDataType || (exports.FormDataType = {}));
|
|
5743
|
+
/**
|
|
5744
|
+
* The IdP behavior when no user link has been made yet.
|
|
5536
5745
|
*
|
|
5537
|
-
* @author
|
|
5746
|
+
* @author Daniel DeGroff
|
|
5538
5747
|
*/
|
|
5539
|
-
var
|
|
5540
|
-
(function (
|
|
5541
|
-
|
|
5542
|
-
|
|
5543
|
-
|
|
5544
|
-
|
|
5748
|
+
var IdentityProviderLinkingStrategy;
|
|
5749
|
+
(function (IdentityProviderLinkingStrategy) {
|
|
5750
|
+
IdentityProviderLinkingStrategy["CreatePendingLink"] = "CreatePendingLink";
|
|
5751
|
+
IdentityProviderLinkingStrategy["Disabled"] = "Disabled";
|
|
5752
|
+
IdentityProviderLinkingStrategy["LinkAnonymously"] = "LinkAnonymously";
|
|
5753
|
+
IdentityProviderLinkingStrategy["LinkByEmail"] = "LinkByEmail";
|
|
5754
|
+
IdentityProviderLinkingStrategy["LinkByEmailForExistingUser"] = "LinkByEmailForExistingUser";
|
|
5755
|
+
IdentityProviderLinkingStrategy["LinkByUsername"] = "LinkByUsername";
|
|
5756
|
+
IdentityProviderLinkingStrategy["LinkByUsernameForExistingUser"] = "LinkByUsernameForExistingUser";
|
|
5757
|
+
IdentityProviderLinkingStrategy["Unsupported"] = "Unsupported";
|
|
5758
|
+
})(IdentityProviderLinkingStrategy = exports.IdentityProviderLinkingStrategy || (exports.IdentityProviderLinkingStrategy = {}));
|
|
5545
5759
|
/**
|
|
5546
5760
|
* @author Daniel DeGroff
|
|
5547
5761
|
*/
|
|
@@ -5552,59 +5766,13 @@ var MultiFactorLoginPolicy;
|
|
|
5552
5766
|
MultiFactorLoginPolicy["Required"] = "Required";
|
|
5553
5767
|
})(MultiFactorLoginPolicy = exports.MultiFactorLoginPolicy || (exports.MultiFactorLoginPolicy = {}));
|
|
5554
5768
|
/**
|
|
5555
|
-
*
|
|
5556
|
-
*
|
|
5557
|
-
* @author Spencer Witt
|
|
5558
|
-
*/
|
|
5559
|
-
var AuthenticatorAttachment;
|
|
5560
|
-
(function (AuthenticatorAttachment) {
|
|
5561
|
-
AuthenticatorAttachment["platform"] = "platform";
|
|
5562
|
-
AuthenticatorAttachment["crossPlatform"] = "crossPlatform";
|
|
5563
|
-
})(AuthenticatorAttachment = exports.AuthenticatorAttachment || (exports.AuthenticatorAttachment = {}));
|
|
5564
|
-
/**
|
|
5565
|
-
* COSE Elliptic Curve identifier to determine which elliptic curve to use with a given key
|
|
5566
|
-
*
|
|
5567
|
-
* @author Spencer Witt
|
|
5568
|
-
*/
|
|
5569
|
-
var CoseEllipticCurve;
|
|
5570
|
-
(function (CoseEllipticCurve) {
|
|
5571
|
-
CoseEllipticCurve["Reserved"] = "Reserved";
|
|
5572
|
-
CoseEllipticCurve["P256"] = "P256";
|
|
5573
|
-
CoseEllipticCurve["P384"] = "P384";
|
|
5574
|
-
CoseEllipticCurve["P521"] = "P521";
|
|
5575
|
-
CoseEllipticCurve["X25519"] = "X25519";
|
|
5576
|
-
CoseEllipticCurve["X448"] = "X448";
|
|
5577
|
-
CoseEllipticCurve["Ed25519"] = "Ed25519";
|
|
5578
|
-
CoseEllipticCurve["Ed448"] = "Ed448";
|
|
5579
|
-
CoseEllipticCurve["Secp256k1"] = "Secp256k1";
|
|
5580
|
-
})(CoseEllipticCurve = exports.CoseEllipticCurve || (exports.CoseEllipticCurve = {}));
|
|
5581
|
-
var LoginIdType;
|
|
5582
|
-
(function (LoginIdType) {
|
|
5583
|
-
LoginIdType["email"] = "email";
|
|
5584
|
-
LoginIdType["username"] = "username";
|
|
5585
|
-
})(LoginIdType = exports.LoginIdType || (exports.LoginIdType = {}));
|
|
5586
|
-
var RegistrationType;
|
|
5587
|
-
(function (RegistrationType) {
|
|
5588
|
-
RegistrationType["basic"] = "basic";
|
|
5589
|
-
RegistrationType["advanced"] = "advanced";
|
|
5590
|
-
})(RegistrationType = exports.RegistrationType || (exports.RegistrationType = {}));
|
|
5591
|
-
/**
|
|
5592
|
-
* @author Daniel DeGroff
|
|
5593
|
-
*/
|
|
5594
|
-
var RefreshTokenExpirationPolicy;
|
|
5595
|
-
(function (RefreshTokenExpirationPolicy) {
|
|
5596
|
-
RefreshTokenExpirationPolicy["Fixed"] = "Fixed";
|
|
5597
|
-
RefreshTokenExpirationPolicy["SlidingWindow"] = "SlidingWindow";
|
|
5598
|
-
RefreshTokenExpirationPolicy["SlidingWindowWithMaximumLifetime"] = "SlidingWindowWithMaximumLifetime";
|
|
5599
|
-
})(RefreshTokenExpirationPolicy = exports.RefreshTokenExpirationPolicy || (exports.RefreshTokenExpirationPolicy = {}));
|
|
5600
|
-
/**
|
|
5601
|
-
* @author Daniel DeGroff
|
|
5769
|
+
* @author Brett Guy
|
|
5602
5770
|
*/
|
|
5603
|
-
var
|
|
5604
|
-
(function (
|
|
5605
|
-
|
|
5606
|
-
|
|
5607
|
-
})(
|
|
5771
|
+
var IPAccessControlEntryAction;
|
|
5772
|
+
(function (IPAccessControlEntryAction) {
|
|
5773
|
+
IPAccessControlEntryAction["Allow"] = "Allow";
|
|
5774
|
+
IPAccessControlEntryAction["Block"] = "Block";
|
|
5775
|
+
})(IPAccessControlEntryAction = exports.IPAccessControlEntryAction || (exports.IPAccessControlEntryAction = {}));
|
|
5608
5776
|
/**
|
|
5609
5777
|
* The phases of a time-based user action.
|
|
5610
5778
|
*
|
|
@@ -5618,189 +5786,151 @@ var UserActionPhase;
|
|
|
5618
5786
|
UserActionPhase["end"] = "end";
|
|
5619
5787
|
})(UserActionPhase = exports.UserActionPhase || (exports.UserActionPhase = {}));
|
|
5620
5788
|
/**
|
|
5621
|
-
*
|
|
5622
|
-
|
|
5623
|
-
|
|
5624
|
-
|
|
5625
|
-
|
|
5626
|
-
|
|
5627
|
-
|
|
5628
|
-
|
|
5629
|
-
|
|
5630
|
-
|
|
5631
|
-
|
|
5632
|
-
|
|
5633
|
-
|
|
5634
|
-
|
|
5635
|
-
|
|
5636
|
-
|
|
5637
|
-
|
|
5638
|
-
|
|
5639
|
-
|
|
5640
|
-
|
|
5641
|
-
|
|
5642
|
-
|
|
5643
|
-
|
|
5644
|
-
|
|
5645
|
-
|
|
5646
|
-
|
|
5789
|
+
* The types of lambdas that indicate how they are invoked by FusionAuth.
|
|
5790
|
+
*
|
|
5791
|
+
* @author Brian Pontarelli
|
|
5792
|
+
*/
|
|
5793
|
+
var LambdaType;
|
|
5794
|
+
(function (LambdaType) {
|
|
5795
|
+
LambdaType["JWTPopulate"] = "JWTPopulate";
|
|
5796
|
+
LambdaType["OpenIDReconcile"] = "OpenIDReconcile";
|
|
5797
|
+
LambdaType["SAMLv2Reconcile"] = "SAMLv2Reconcile";
|
|
5798
|
+
LambdaType["SAMLv2Populate"] = "SAMLv2Populate";
|
|
5799
|
+
LambdaType["AppleReconcile"] = "AppleReconcile";
|
|
5800
|
+
LambdaType["ExternalJWTReconcile"] = "ExternalJWTReconcile";
|
|
5801
|
+
LambdaType["FacebookReconcile"] = "FacebookReconcile";
|
|
5802
|
+
LambdaType["GoogleReconcile"] = "GoogleReconcile";
|
|
5803
|
+
LambdaType["HYPRReconcile"] = "HYPRReconcile";
|
|
5804
|
+
LambdaType["TwitterReconcile"] = "TwitterReconcile";
|
|
5805
|
+
LambdaType["LDAPConnectorReconcile"] = "LDAPConnectorReconcile";
|
|
5806
|
+
LambdaType["LinkedInReconcile"] = "LinkedInReconcile";
|
|
5807
|
+
LambdaType["EpicGamesReconcile"] = "EpicGamesReconcile";
|
|
5808
|
+
LambdaType["NintendoReconcile"] = "NintendoReconcile";
|
|
5809
|
+
LambdaType["SonyPSNReconcile"] = "SonyPSNReconcile";
|
|
5810
|
+
LambdaType["SteamReconcile"] = "SteamReconcile";
|
|
5811
|
+
LambdaType["TwitchReconcile"] = "TwitchReconcile";
|
|
5812
|
+
LambdaType["XboxReconcile"] = "XboxReconcile";
|
|
5813
|
+
LambdaType["ClientCredentialsJWTPopulate"] = "ClientCredentialsJWTPopulate";
|
|
5814
|
+
LambdaType["SCIMServerGroupRequestConverter"] = "SCIMServerGroupRequestConverter";
|
|
5815
|
+
LambdaType["SCIMServerGroupResponseConverter"] = "SCIMServerGroupResponseConverter";
|
|
5816
|
+
LambdaType["SCIMServerUserRequestConverter"] = "SCIMServerUserRequestConverter";
|
|
5817
|
+
LambdaType["SCIMServerUserResponseConverter"] = "SCIMServerUserResponseConverter";
|
|
5818
|
+
LambdaType["SelfServiceRegistrationValidation"] = "SelfServiceRegistrationValidation";
|
|
5819
|
+
LambdaType["UserInfoPopulate"] = "UserInfoPopulate";
|
|
5820
|
+
LambdaType["LoginValidation"] = "LoginValidation";
|
|
5821
|
+
})(LambdaType = exports.LambdaType || (exports.LambdaType = {}));
|
|
5647
5822
|
/**
|
|
5648
5823
|
* @author Daniel DeGroff
|
|
5649
5824
|
*/
|
|
5650
|
-
var
|
|
5651
|
-
(function (
|
|
5652
|
-
|
|
5653
|
-
|
|
5654
|
-
})(
|
|
5825
|
+
var SystemTrustedProxyConfigurationPolicy;
|
|
5826
|
+
(function (SystemTrustedProxyConfigurationPolicy) {
|
|
5827
|
+
SystemTrustedProxyConfigurationPolicy["All"] = "All";
|
|
5828
|
+
SystemTrustedProxyConfigurationPolicy["OnlyConfigured"] = "OnlyConfigured";
|
|
5829
|
+
})(SystemTrustedProxyConfigurationPolicy = exports.SystemTrustedProxyConfigurationPolicy || (exports.SystemTrustedProxyConfigurationPolicy = {}));
|
|
5830
|
+
var LoginIdType;
|
|
5831
|
+
(function (LoginIdType) {
|
|
5832
|
+
LoginIdType["email"] = "email";
|
|
5833
|
+
LoginIdType["username"] = "username";
|
|
5834
|
+
})(LoginIdType = exports.LoginIdType || (exports.LoginIdType = {}));
|
|
5835
|
+
var RegistrationType;
|
|
5836
|
+
(function (RegistrationType) {
|
|
5837
|
+
RegistrationType["basic"] = "basic";
|
|
5838
|
+
RegistrationType["advanced"] = "advanced";
|
|
5839
|
+
})(RegistrationType = exports.RegistrationType || (exports.RegistrationType = {}));
|
|
5655
5840
|
var SAMLLogoutBehavior;
|
|
5656
5841
|
(function (SAMLLogoutBehavior) {
|
|
5657
5842
|
SAMLLogoutBehavior["AllParticipants"] = "AllParticipants";
|
|
5658
5843
|
SAMLLogoutBehavior["OnlyOriginator"] = "OnlyOriginator";
|
|
5659
5844
|
})(SAMLLogoutBehavior = exports.SAMLLogoutBehavior || (exports.SAMLLogoutBehavior = {}));
|
|
5845
|
+
var XMLSignatureLocation;
|
|
5846
|
+
(function (XMLSignatureLocation) {
|
|
5847
|
+
XMLSignatureLocation["Assertion"] = "Assertion";
|
|
5848
|
+
XMLSignatureLocation["Response"] = "Response";
|
|
5849
|
+
})(XMLSignatureLocation = exports.XMLSignatureLocation || (exports.XMLSignatureLocation = {}));
|
|
5660
5850
|
/**
|
|
5661
|
-
* The IdP behavior when no user link has been made yet.
|
|
5662
|
-
*
|
|
5663
|
-
* @author Daniel DeGroff
|
|
5664
|
-
*/
|
|
5665
|
-
var IdentityProviderLinkingStrategy;
|
|
5666
|
-
(function (IdentityProviderLinkingStrategy) {
|
|
5667
|
-
IdentityProviderLinkingStrategy["CreatePendingLink"] = "CreatePendingLink";
|
|
5668
|
-
IdentityProviderLinkingStrategy["Disabled"] = "Disabled";
|
|
5669
|
-
IdentityProviderLinkingStrategy["LinkAnonymously"] = "LinkAnonymously";
|
|
5670
|
-
IdentityProviderLinkingStrategy["LinkByEmail"] = "LinkByEmail";
|
|
5671
|
-
IdentityProviderLinkingStrategy["LinkByEmailForExistingUser"] = "LinkByEmailForExistingUser";
|
|
5672
|
-
IdentityProviderLinkingStrategy["LinkByUsername"] = "LinkByUsername";
|
|
5673
|
-
IdentityProviderLinkingStrategy["LinkByUsernameForExistingUser"] = "LinkByUsernameForExistingUser";
|
|
5674
|
-
IdentityProviderLinkingStrategy["Unsupported"] = "Unsupported";
|
|
5675
|
-
})(IdentityProviderLinkingStrategy = exports.IdentityProviderLinkingStrategy || (exports.IdentityProviderLinkingStrategy = {}));
|
|
5676
|
-
var BreachAction;
|
|
5677
|
-
(function (BreachAction) {
|
|
5678
|
-
BreachAction["Off"] = "Off";
|
|
5679
|
-
BreachAction["RecordOnly"] = "RecordOnly";
|
|
5680
|
-
BreachAction["NotifyUser"] = "NotifyUser";
|
|
5681
|
-
BreachAction["RequireChange"] = "RequireChange";
|
|
5682
|
-
})(BreachAction = exports.BreachAction || (exports.BreachAction = {}));
|
|
5683
|
-
/**
|
|
5684
|
-
* Event Log Type
|
|
5685
|
-
*
|
|
5686
5851
|
* @author Daniel DeGroff
|
|
5687
5852
|
*/
|
|
5688
|
-
var
|
|
5689
|
-
(function (
|
|
5690
|
-
|
|
5691
|
-
|
|
5692
|
-
|
|
5693
|
-
})(EventLogType = exports.EventLogType || (exports.EventLogType = {}));
|
|
5853
|
+
var Sort;
|
|
5854
|
+
(function (Sort) {
|
|
5855
|
+
Sort["asc"] = "asc";
|
|
5856
|
+
Sort["desc"] = "desc";
|
|
5857
|
+
})(Sort = exports.Sort || (exports.Sort = {}));
|
|
5694
5858
|
/**
|
|
5695
|
-
*
|
|
5859
|
+
* Describes the authenticator attachment modality preference for a WebAuthn workflow. See {@link AuthenticatorAttachment}
|
|
5696
5860
|
*
|
|
5697
|
-
* @author
|
|
5861
|
+
* @author Spencer Witt
|
|
5698
5862
|
*/
|
|
5699
|
-
var
|
|
5700
|
-
(function (
|
|
5701
|
-
|
|
5702
|
-
|
|
5703
|
-
|
|
5704
|
-
|
|
5705
|
-
Algorithm["HS384"] = "HS384";
|
|
5706
|
-
Algorithm["HS512"] = "HS512";
|
|
5707
|
-
Algorithm["PS256"] = "PS256";
|
|
5708
|
-
Algorithm["PS384"] = "PS384";
|
|
5709
|
-
Algorithm["PS512"] = "PS512";
|
|
5710
|
-
Algorithm["RS256"] = "RS256";
|
|
5711
|
-
Algorithm["RS384"] = "RS384";
|
|
5712
|
-
Algorithm["RS512"] = "RS512";
|
|
5713
|
-
Algorithm["none"] = "none";
|
|
5714
|
-
})(Algorithm = exports.Algorithm || (exports.Algorithm = {}));
|
|
5863
|
+
var AuthenticatorAttachmentPreference;
|
|
5864
|
+
(function (AuthenticatorAttachmentPreference) {
|
|
5865
|
+
AuthenticatorAttachmentPreference["any"] = "any";
|
|
5866
|
+
AuthenticatorAttachmentPreference["platform"] = "platform";
|
|
5867
|
+
AuthenticatorAttachmentPreference["crossPlatform"] = "crossPlatform";
|
|
5868
|
+
})(AuthenticatorAttachmentPreference = exports.AuthenticatorAttachmentPreference || (exports.AuthenticatorAttachmentPreference = {}));
|
|
5715
5869
|
/**
|
|
5716
|
-
* The
|
|
5870
|
+
* Defines valid credential types. This is an extension point in the WebAuthn spec. The only defined value at this time is "public-key"
|
|
5717
5871
|
*
|
|
5718
|
-
* @author
|
|
5872
|
+
* @author Spencer Witt
|
|
5719
5873
|
*/
|
|
5720
|
-
var
|
|
5721
|
-
(function (
|
|
5722
|
-
|
|
5723
|
-
|
|
5724
|
-
KeyUse["VerifyOnly"] = "VerifyOnly";
|
|
5725
|
-
})(KeyUse = exports.KeyUse || (exports.KeyUse = {}));
|
|
5726
|
-
var FamilyRole;
|
|
5727
|
-
(function (FamilyRole) {
|
|
5728
|
-
FamilyRole["Child"] = "Child";
|
|
5729
|
-
FamilyRole["Teen"] = "Teen";
|
|
5730
|
-
FamilyRole["Adult"] = "Adult";
|
|
5731
|
-
})(FamilyRole = exports.FamilyRole || (exports.FamilyRole = {}));
|
|
5874
|
+
var PublicKeyCredentialType;
|
|
5875
|
+
(function (PublicKeyCredentialType) {
|
|
5876
|
+
PublicKeyCredentialType["publicKey"] = "public-key";
|
|
5877
|
+
})(PublicKeyCredentialType = exports.PublicKeyCredentialType || (exports.PublicKeyCredentialType = {}));
|
|
5732
5878
|
/**
|
|
5733
|
-
*
|
|
5879
|
+
* COSE Elliptic Curve identifier to determine which elliptic curve to use with a given key
|
|
5734
5880
|
*
|
|
5735
|
-
* @author
|
|
5881
|
+
* @author Spencer Witt
|
|
5736
5882
|
*/
|
|
5737
|
-
var
|
|
5738
|
-
(function (
|
|
5739
|
-
|
|
5740
|
-
|
|
5741
|
-
|
|
5742
|
-
|
|
5743
|
-
|
|
5744
|
-
|
|
5883
|
+
var CoseEllipticCurve;
|
|
5884
|
+
(function (CoseEllipticCurve) {
|
|
5885
|
+
CoseEllipticCurve["Reserved"] = "Reserved";
|
|
5886
|
+
CoseEllipticCurve["P256"] = "P256";
|
|
5887
|
+
CoseEllipticCurve["P384"] = "P384";
|
|
5888
|
+
CoseEllipticCurve["P521"] = "P521";
|
|
5889
|
+
CoseEllipticCurve["X25519"] = "X25519";
|
|
5890
|
+
CoseEllipticCurve["X448"] = "X448";
|
|
5891
|
+
CoseEllipticCurve["Ed25519"] = "Ed25519";
|
|
5892
|
+
CoseEllipticCurve["Ed448"] = "Ed448";
|
|
5893
|
+
CoseEllipticCurve["Secp256k1"] = "Secp256k1";
|
|
5894
|
+
})(CoseEllipticCurve = exports.CoseEllipticCurve || (exports.CoseEllipticCurve = {}));
|
|
5895
|
+
var KeyAlgorithm;
|
|
5896
|
+
(function (KeyAlgorithm) {
|
|
5897
|
+
KeyAlgorithm["ES256"] = "ES256";
|
|
5898
|
+
KeyAlgorithm["ES384"] = "ES384";
|
|
5899
|
+
KeyAlgorithm["ES512"] = "ES512";
|
|
5900
|
+
KeyAlgorithm["HS256"] = "HS256";
|
|
5901
|
+
KeyAlgorithm["HS384"] = "HS384";
|
|
5902
|
+
KeyAlgorithm["HS512"] = "HS512";
|
|
5903
|
+
KeyAlgorithm["RS256"] = "RS256";
|
|
5904
|
+
KeyAlgorithm["RS384"] = "RS384";
|
|
5905
|
+
KeyAlgorithm["RS512"] = "RS512";
|
|
5906
|
+
})(KeyAlgorithm = exports.KeyAlgorithm || (exports.KeyAlgorithm = {}));
|
|
5907
|
+
var KeyType;
|
|
5908
|
+
(function (KeyType) {
|
|
5909
|
+
KeyType["EC"] = "EC";
|
|
5910
|
+
KeyType["RSA"] = "RSA";
|
|
5911
|
+
KeyType["HMAC"] = "HMAC";
|
|
5912
|
+
})(KeyType = exports.KeyType || (exports.KeyType = {}));
|
|
5745
5913
|
/**
|
|
5746
|
-
*
|
|
5747
|
-
*
|
|
5914
|
+
* Controls the policy for requesting user permission to grant access to requested scopes during an OAuth workflow
|
|
5915
|
+
* for a third-party application.
|
|
5748
5916
|
*
|
|
5749
5917
|
* @author Spencer Witt
|
|
5750
5918
|
*/
|
|
5751
|
-
var
|
|
5752
|
-
(function (
|
|
5753
|
-
|
|
5754
|
-
|
|
5755
|
-
|
|
5756
|
-
})(
|
|
5919
|
+
var OAuthScopeConsentMode;
|
|
5920
|
+
(function (OAuthScopeConsentMode) {
|
|
5921
|
+
OAuthScopeConsentMode["AlwaysPrompt"] = "AlwaysPrompt";
|
|
5922
|
+
OAuthScopeConsentMode["RememberDecision"] = "RememberDecision";
|
|
5923
|
+
OAuthScopeConsentMode["NeverPrompt"] = "NeverPrompt";
|
|
5924
|
+
})(OAuthScopeConsentMode = exports.OAuthScopeConsentMode || (exports.OAuthScopeConsentMode = {}));
|
|
5757
5925
|
/**
|
|
5758
|
-
* Steam API modes.
|
|
5759
|
-
*
|
|
5760
5926
|
* @author Daniel DeGroff
|
|
5761
5927
|
*/
|
|
5762
|
-
var
|
|
5763
|
-
(function (
|
|
5764
|
-
|
|
5765
|
-
|
|
5766
|
-
|
|
5767
|
-
|
|
5768
|
-
* @author Trevor Smith
|
|
5769
|
-
*/
|
|
5770
|
-
var ChangePasswordReason;
|
|
5771
|
-
(function (ChangePasswordReason) {
|
|
5772
|
-
ChangePasswordReason["Administrative"] = "Administrative";
|
|
5773
|
-
ChangePasswordReason["Breached"] = "Breached";
|
|
5774
|
-
ChangePasswordReason["Expired"] = "Expired";
|
|
5775
|
-
ChangePasswordReason["Validation"] = "Validation";
|
|
5776
|
-
})(ChangePasswordReason = exports.ChangePasswordReason || (exports.ChangePasswordReason = {}));
|
|
5777
|
-
var EmailSecurityType;
|
|
5778
|
-
(function (EmailSecurityType) {
|
|
5779
|
-
EmailSecurityType["NONE"] = "NONE";
|
|
5780
|
-
EmailSecurityType["SSL"] = "SSL";
|
|
5781
|
-
EmailSecurityType["TLS"] = "TLS";
|
|
5782
|
-
})(EmailSecurityType = exports.EmailSecurityType || (exports.EmailSecurityType = {}));
|
|
5783
|
-
/**
|
|
5784
|
-
* @author Brian Pontarelli
|
|
5785
|
-
*/
|
|
5786
|
-
var ExpiryUnit;
|
|
5787
|
-
(function (ExpiryUnit) {
|
|
5788
|
-
ExpiryUnit["MINUTES"] = "MINUTES";
|
|
5789
|
-
ExpiryUnit["HOURS"] = "HOURS";
|
|
5790
|
-
ExpiryUnit["DAYS"] = "DAYS";
|
|
5791
|
-
ExpiryUnit["WEEKS"] = "WEEKS";
|
|
5792
|
-
ExpiryUnit["MONTHS"] = "MONTHS";
|
|
5793
|
-
ExpiryUnit["YEARS"] = "YEARS";
|
|
5794
|
-
})(ExpiryUnit = exports.ExpiryUnit || (exports.ExpiryUnit = {}));
|
|
5795
|
-
/**
|
|
5796
|
-
* @author Brett Guy
|
|
5797
|
-
*/
|
|
5798
|
-
var MessengerType;
|
|
5799
|
-
(function (MessengerType) {
|
|
5800
|
-
MessengerType["Generic"] = "Generic";
|
|
5801
|
-
MessengerType["Kafka"] = "Kafka";
|
|
5802
|
-
MessengerType["Twilio"] = "Twilio";
|
|
5803
|
-
})(MessengerType = exports.MessengerType || (exports.MessengerType = {}));
|
|
5928
|
+
var ObjectState;
|
|
5929
|
+
(function (ObjectState) {
|
|
5930
|
+
ObjectState["Active"] = "Active";
|
|
5931
|
+
ObjectState["Inactive"] = "Inactive";
|
|
5932
|
+
ObjectState["PendingDelete"] = "PendingDelete";
|
|
5933
|
+
})(ObjectState = exports.ObjectState || (exports.ObjectState = {}));
|
|
5804
5934
|
/**
|
|
5805
5935
|
* @author Daniel DeGroff
|
|
5806
5936
|
*/
|
|
@@ -5826,11 +5956,44 @@ var IdentityProviderType;
|
|
|
5826
5956
|
/**
|
|
5827
5957
|
* @author Daniel DeGroff
|
|
5828
5958
|
*/
|
|
5829
|
-
var
|
|
5830
|
-
(function (
|
|
5831
|
-
|
|
5832
|
-
|
|
5833
|
-
})(
|
|
5959
|
+
var VerificationStrategy;
|
|
5960
|
+
(function (VerificationStrategy) {
|
|
5961
|
+
VerificationStrategy["ClickableLink"] = "ClickableLink";
|
|
5962
|
+
VerificationStrategy["FormField"] = "FormField";
|
|
5963
|
+
})(VerificationStrategy = exports.VerificationStrategy || (exports.VerificationStrategy = {}));
|
|
5964
|
+
var TOTPAlgorithm;
|
|
5965
|
+
(function (TOTPAlgorithm) {
|
|
5966
|
+
TOTPAlgorithm["HmacSHA1"] = "HmacSHA1";
|
|
5967
|
+
TOTPAlgorithm["HmacSHA256"] = "HmacSHA256";
|
|
5968
|
+
TOTPAlgorithm["HmacSHA512"] = "HmacSHA512";
|
|
5969
|
+
})(TOTPAlgorithm = exports.TOTPAlgorithm || (exports.TOTPAlgorithm = {}));
|
|
5970
|
+
/**
|
|
5971
|
+
* @author Brett Pontarelli
|
|
5972
|
+
*/
|
|
5973
|
+
var AuthenticationThreats;
|
|
5974
|
+
(function (AuthenticationThreats) {
|
|
5975
|
+
AuthenticationThreats["ImpossibleTravel"] = "ImpossibleTravel";
|
|
5976
|
+
})(AuthenticationThreats = exports.AuthenticationThreats || (exports.AuthenticationThreats = {}));
|
|
5977
|
+
/**
|
|
5978
|
+
* Steam API modes.
|
|
5979
|
+
*
|
|
5980
|
+
* @author Daniel DeGroff
|
|
5981
|
+
*/
|
|
5982
|
+
var SteamAPIMode;
|
|
5983
|
+
(function (SteamAPIMode) {
|
|
5984
|
+
SteamAPIMode["Public"] = "Public";
|
|
5985
|
+
SteamAPIMode["Partner"] = "Partner";
|
|
5986
|
+
})(SteamAPIMode = exports.SteamAPIMode || (exports.SteamAPIMode = {}));
|
|
5987
|
+
/**
|
|
5988
|
+
* @author Brett Pontarelli
|
|
5989
|
+
*/
|
|
5990
|
+
var CaptchaMethod;
|
|
5991
|
+
(function (CaptchaMethod) {
|
|
5992
|
+
CaptchaMethod["GoogleRecaptchaV2"] = "GoogleRecaptchaV2";
|
|
5993
|
+
CaptchaMethod["GoogleRecaptchaV3"] = "GoogleRecaptchaV3";
|
|
5994
|
+
CaptchaMethod["HCaptcha"] = "HCaptcha";
|
|
5995
|
+
CaptchaMethod["HCaptchaEnterprise"] = "HCaptchaEnterprise";
|
|
5996
|
+
})(CaptchaMethod = exports.CaptchaMethod || (exports.CaptchaMethod = {}));
|
|
5834
5997
|
/**
|
|
5835
5998
|
* Models the event types that FusionAuth produces.
|
|
5836
5999
|
*
|
|
@@ -5892,104 +6055,6 @@ var EventType;
|
|
|
5892
6055
|
EventType["UserUpdateComplete"] = "user.update.complete";
|
|
5893
6056
|
EventType["Test"] = "test";
|
|
5894
6057
|
})(EventType = exports.EventType || (exports.EventType = {}));
|
|
5895
|
-
var TOTPAlgorithm;
|
|
5896
|
-
(function (TOTPAlgorithm) {
|
|
5897
|
-
TOTPAlgorithm["HmacSHA1"] = "HmacSHA1";
|
|
5898
|
-
TOTPAlgorithm["HmacSHA256"] = "HmacSHA256";
|
|
5899
|
-
TOTPAlgorithm["HmacSHA512"] = "HmacSHA512";
|
|
5900
|
-
})(TOTPAlgorithm = exports.TOTPAlgorithm || (exports.TOTPAlgorithm = {}));
|
|
5901
|
-
var LDAPSecurityMethod;
|
|
5902
|
-
(function (LDAPSecurityMethod) {
|
|
5903
|
-
LDAPSecurityMethod["None"] = "None";
|
|
5904
|
-
LDAPSecurityMethod["LDAPS"] = "LDAPS";
|
|
5905
|
-
LDAPSecurityMethod["StartTLS"] = "StartTLS";
|
|
5906
|
-
})(LDAPSecurityMethod = exports.LDAPSecurityMethod || (exports.LDAPSecurityMethod = {}));
|
|
5907
|
-
var UniqueUsernameStrategy;
|
|
5908
|
-
(function (UniqueUsernameStrategy) {
|
|
5909
|
-
UniqueUsernameStrategy["Always"] = "Always";
|
|
5910
|
-
UniqueUsernameStrategy["OnCollision"] = "OnCollision";
|
|
5911
|
-
})(UniqueUsernameStrategy = exports.UniqueUsernameStrategy || (exports.UniqueUsernameStrategy = {}));
|
|
5912
|
-
/**
|
|
5913
|
-
* @author Daniel DeGroff
|
|
5914
|
-
*/
|
|
5915
|
-
var VerificationStrategy;
|
|
5916
|
-
(function (VerificationStrategy) {
|
|
5917
|
-
VerificationStrategy["ClickableLink"] = "ClickableLink";
|
|
5918
|
-
VerificationStrategy["FormField"] = "FormField";
|
|
5919
|
-
})(VerificationStrategy = exports.VerificationStrategy || (exports.VerificationStrategy = {}));
|
|
5920
|
-
/**
|
|
5921
|
-
* @author Daniel DeGroff
|
|
5922
|
-
*/
|
|
5923
|
-
var SecureGeneratorType;
|
|
5924
|
-
(function (SecureGeneratorType) {
|
|
5925
|
-
SecureGeneratorType["randomDigits"] = "randomDigits";
|
|
5926
|
-
SecureGeneratorType["randomBytes"] = "randomBytes";
|
|
5927
|
-
SecureGeneratorType["randomAlpha"] = "randomAlpha";
|
|
5928
|
-
SecureGeneratorType["randomAlphaNumeric"] = "randomAlphaNumeric";
|
|
5929
|
-
})(SecureGeneratorType = exports.SecureGeneratorType || (exports.SecureGeneratorType = {}));
|
|
5930
|
-
/**
|
|
5931
|
-
* XML canonicalization method enumeration. This is used for the IdP and SP side of FusionAuth SAML.
|
|
5932
|
-
*
|
|
5933
|
-
* @author Brian Pontarelli
|
|
5934
|
-
*/
|
|
5935
|
-
var CanonicalizationMethod;
|
|
5936
|
-
(function (CanonicalizationMethod) {
|
|
5937
|
-
CanonicalizationMethod["exclusive"] = "exclusive";
|
|
5938
|
-
CanonicalizationMethod["exclusive_with_comments"] = "exclusive_with_comments";
|
|
5939
|
-
CanonicalizationMethod["inclusive"] = "inclusive";
|
|
5940
|
-
CanonicalizationMethod["inclusive_with_comments"] = "inclusive_with_comments";
|
|
5941
|
-
})(CanonicalizationMethod = exports.CanonicalizationMethod || (exports.CanonicalizationMethod = {}));
|
|
5942
|
-
/**
|
|
5943
|
-
* @author Daniel DeGroff
|
|
5944
|
-
*/
|
|
5945
|
-
var RateLimitedRequestType;
|
|
5946
|
-
(function (RateLimitedRequestType) {
|
|
5947
|
-
RateLimitedRequestType["FailedLogin"] = "FailedLogin";
|
|
5948
|
-
RateLimitedRequestType["ForgotPassword"] = "ForgotPassword";
|
|
5949
|
-
RateLimitedRequestType["SendEmailVerification"] = "SendEmailVerification";
|
|
5950
|
-
RateLimitedRequestType["SendPasswordless"] = "SendPasswordless";
|
|
5951
|
-
RateLimitedRequestType["SendRegistrationVerification"] = "SendRegistrationVerification";
|
|
5952
|
-
RateLimitedRequestType["SendTwoFactor"] = "SendTwoFactor";
|
|
5953
|
-
})(RateLimitedRequestType = exports.RateLimitedRequestType || (exports.RateLimitedRequestType = {}));
|
|
5954
|
-
/**
|
|
5955
|
-
* Controls the policy for whether OAuth workflows will more strictly adhere to the OAuth and OIDC specification
|
|
5956
|
-
* or run in backwards compatibility mode.
|
|
5957
|
-
*
|
|
5958
|
-
* @author David Charles
|
|
5959
|
-
*/
|
|
5960
|
-
var OAuthScopeHandlingPolicy;
|
|
5961
|
-
(function (OAuthScopeHandlingPolicy) {
|
|
5962
|
-
OAuthScopeHandlingPolicy["Compatibility"] = "Compatibility";
|
|
5963
|
-
OAuthScopeHandlingPolicy["Strict"] = "Strict";
|
|
5964
|
-
})(OAuthScopeHandlingPolicy = exports.OAuthScopeHandlingPolicy || (exports.OAuthScopeHandlingPolicy = {}));
|
|
5965
|
-
/**
|
|
5966
|
-
* @author Matthew Altman
|
|
5967
|
-
*/
|
|
5968
|
-
var LogoutBehavior;
|
|
5969
|
-
(function (LogoutBehavior) {
|
|
5970
|
-
LogoutBehavior["RedirectOnly"] = "RedirectOnly";
|
|
5971
|
-
LogoutBehavior["AllApplications"] = "AllApplications";
|
|
5972
|
-
})(LogoutBehavior = exports.LogoutBehavior || (exports.LogoutBehavior = {}));
|
|
5973
|
-
/**
|
|
5974
|
-
* @author Johnathon Wood
|
|
5975
|
-
*/
|
|
5976
|
-
var Oauth2AuthorizedURLValidationPolicy;
|
|
5977
|
-
(function (Oauth2AuthorizedURLValidationPolicy) {
|
|
5978
|
-
Oauth2AuthorizedURLValidationPolicy["AllowWildcards"] = "AllowWildcards";
|
|
5979
|
-
Oauth2AuthorizedURLValidationPolicy["ExactMatch"] = "ExactMatch";
|
|
5980
|
-
})(Oauth2AuthorizedURLValidationPolicy = exports.Oauth2AuthorizedURLValidationPolicy || (exports.Oauth2AuthorizedURLValidationPolicy = {}));
|
|
5981
|
-
/**
|
|
5982
|
-
* Identifies the WebAuthn workflow. This will affect the parameters used for credential creation
|
|
5983
|
-
* and request based on the Tenant configuration.
|
|
5984
|
-
*
|
|
5985
|
-
* @author Spencer Witt
|
|
5986
|
-
*/
|
|
5987
|
-
var WebAuthnWorkflow;
|
|
5988
|
-
(function (WebAuthnWorkflow) {
|
|
5989
|
-
WebAuthnWorkflow["bootstrap"] = "bootstrap";
|
|
5990
|
-
WebAuthnWorkflow["general"] = "general";
|
|
5991
|
-
WebAuthnWorkflow["reauthentication"] = "reauthentication";
|
|
5992
|
-
})(WebAuthnWorkflow = exports.WebAuthnWorkflow || (exports.WebAuthnWorkflow = {}));
|
|
5993
6058
|
/**
|
|
5994
6059
|
* Policy for handling unknown OAuth scopes in the request
|
|
5995
6060
|
*
|
|
@@ -6001,70 +6066,17 @@ var UnknownScopePolicy;
|
|
|
6001
6066
|
UnknownScopePolicy["Remove"] = "Remove";
|
|
6002
6067
|
UnknownScopePolicy["Reject"] = "Reject";
|
|
6003
6068
|
})(UnknownScopePolicy = exports.UnknownScopePolicy || (exports.UnknownScopePolicy = {}));
|
|
6004
|
-
|
|
6005
|
-
|
|
6006
|
-
|
|
6007
|
-
|
|
6008
|
-
|
|
6009
|
-
|
|
6010
|
-
|
|
6011
|
-
|
|
6012
|
-
|
|
6013
|
-
|
|
6014
|
-
|
|
6015
|
-
OAuthErrorReason["invalid_client_id"] = "invalid_client_id";
|
|
6016
|
-
OAuthErrorReason["invalid_user_credentials"] = "invalid_user_credentials";
|
|
6017
|
-
OAuthErrorReason["invalid_grant_type"] = "invalid_grant_type";
|
|
6018
|
-
OAuthErrorReason["invalid_origin"] = "invalid_origin";
|
|
6019
|
-
OAuthErrorReason["invalid_origin_opaque"] = "invalid_origin_opaque";
|
|
6020
|
-
OAuthErrorReason["invalid_pkce_code_verifier"] = "invalid_pkce_code_verifier";
|
|
6021
|
-
OAuthErrorReason["invalid_pkce_code_challenge"] = "invalid_pkce_code_challenge";
|
|
6022
|
-
OAuthErrorReason["invalid_pkce_code_challenge_method"] = "invalid_pkce_code_challenge_method";
|
|
6023
|
-
OAuthErrorReason["invalid_redirect_uri"] = "invalid_redirect_uri";
|
|
6024
|
-
OAuthErrorReason["invalid_response_mode"] = "invalid_response_mode";
|
|
6025
|
-
OAuthErrorReason["invalid_response_type"] = "invalid_response_type";
|
|
6026
|
-
OAuthErrorReason["invalid_id_token_hint"] = "invalid_id_token_hint";
|
|
6027
|
-
OAuthErrorReason["invalid_post_logout_redirect_uri"] = "invalid_post_logout_redirect_uri";
|
|
6028
|
-
OAuthErrorReason["invalid_device_code"] = "invalid_device_code";
|
|
6029
|
-
OAuthErrorReason["invalid_user_code"] = "invalid_user_code";
|
|
6030
|
-
OAuthErrorReason["invalid_additional_client_id"] = "invalid_additional_client_id";
|
|
6031
|
-
OAuthErrorReason["invalid_target_entity_scope"] = "invalid_target_entity_scope";
|
|
6032
|
-
OAuthErrorReason["invalid_entity_permission_scope"] = "invalid_entity_permission_scope";
|
|
6033
|
-
OAuthErrorReason["invalid_user_id"] = "invalid_user_id";
|
|
6034
|
-
OAuthErrorReason["grant_type_disabled"] = "grant_type_disabled";
|
|
6035
|
-
OAuthErrorReason["missing_client_id"] = "missing_client_id";
|
|
6036
|
-
OAuthErrorReason["missing_client_secret"] = "missing_client_secret";
|
|
6037
|
-
OAuthErrorReason["missing_code"] = "missing_code";
|
|
6038
|
-
OAuthErrorReason["missing_code_challenge"] = "missing_code_challenge";
|
|
6039
|
-
OAuthErrorReason["missing_code_verifier"] = "missing_code_verifier";
|
|
6040
|
-
OAuthErrorReason["missing_device_code"] = "missing_device_code";
|
|
6041
|
-
OAuthErrorReason["missing_grant_type"] = "missing_grant_type";
|
|
6042
|
-
OAuthErrorReason["missing_redirect_uri"] = "missing_redirect_uri";
|
|
6043
|
-
OAuthErrorReason["missing_refresh_token"] = "missing_refresh_token";
|
|
6044
|
-
OAuthErrorReason["missing_response_type"] = "missing_response_type";
|
|
6045
|
-
OAuthErrorReason["missing_token"] = "missing_token";
|
|
6046
|
-
OAuthErrorReason["missing_user_code"] = "missing_user_code";
|
|
6047
|
-
OAuthErrorReason["missing_user_id"] = "missing_user_id";
|
|
6048
|
-
OAuthErrorReason["missing_verification_uri"] = "missing_verification_uri";
|
|
6049
|
-
OAuthErrorReason["login_prevented"] = "login_prevented";
|
|
6050
|
-
OAuthErrorReason["not_licensed"] = "not_licensed";
|
|
6051
|
-
OAuthErrorReason["user_code_expired"] = "user_code_expired";
|
|
6052
|
-
OAuthErrorReason["user_expired"] = "user_expired";
|
|
6053
|
-
OAuthErrorReason["user_locked"] = "user_locked";
|
|
6054
|
-
OAuthErrorReason["user_not_found"] = "user_not_found";
|
|
6055
|
-
OAuthErrorReason["client_authentication_missing"] = "client_authentication_missing";
|
|
6056
|
-
OAuthErrorReason["invalid_client_authentication_scheme"] = "invalid_client_authentication_scheme";
|
|
6057
|
-
OAuthErrorReason["invalid_client_authentication"] = "invalid_client_authentication";
|
|
6058
|
-
OAuthErrorReason["client_id_mismatch"] = "client_id_mismatch";
|
|
6059
|
-
OAuthErrorReason["change_password_administrative"] = "change_password_administrative";
|
|
6060
|
-
OAuthErrorReason["change_password_breached"] = "change_password_breached";
|
|
6061
|
-
OAuthErrorReason["change_password_expired"] = "change_password_expired";
|
|
6062
|
-
OAuthErrorReason["change_password_validation"] = "change_password_validation";
|
|
6063
|
-
OAuthErrorReason["unknown"] = "unknown";
|
|
6064
|
-
OAuthErrorReason["missing_required_scope"] = "missing_required_scope";
|
|
6065
|
-
OAuthErrorReason["unknown_scope"] = "unknown_scope";
|
|
6066
|
-
OAuthErrorReason["consent_canceled"] = "consent_canceled";
|
|
6067
|
-
})(OAuthErrorReason = exports.OAuthErrorReason || (exports.OAuthErrorReason = {}));
|
|
6069
|
+
/**
|
|
6070
|
+
* The application's relationship to the authorization server. First-party applications will be granted implicit permission for requested scopes.
|
|
6071
|
+
* Third-party applications will use the {@link OAuthScopeConsentMode} policy.
|
|
6072
|
+
*
|
|
6073
|
+
* @author Spencer Witt
|
|
6074
|
+
*/
|
|
6075
|
+
var OAuthApplicationRelationship;
|
|
6076
|
+
(function (OAuthApplicationRelationship) {
|
|
6077
|
+
OAuthApplicationRelationship["FirstParty"] = "FirstParty";
|
|
6078
|
+
OAuthApplicationRelationship["ThirdParty"] = "ThirdParty";
|
|
6079
|
+
})(OAuthApplicationRelationship = exports.OAuthApplicationRelationship || (exports.OAuthApplicationRelationship = {}));
|
|
6068
6080
|
var ClientAuthenticationMethod;
|
|
6069
6081
|
(function (ClientAuthenticationMethod) {
|
|
6070
6082
|
ClientAuthenticationMethod["none"] = "none";
|
|
@@ -6072,36 +6084,24 @@ var ClientAuthenticationMethod;
|
|
|
6072
6084
|
ClientAuthenticationMethod["client_secret_post"] = "client_secret_post";
|
|
6073
6085
|
})(ClientAuthenticationMethod = exports.ClientAuthenticationMethod || (exports.ClientAuthenticationMethod = {}));
|
|
6074
6086
|
/**
|
|
6075
|
-
*
|
|
6076
|
-
* for a third-party application.
|
|
6077
|
-
*
|
|
6078
|
-
* @author Spencer Witt
|
|
6079
|
-
*/
|
|
6080
|
-
var OAuthScopeConsentMode;
|
|
6081
|
-
(function (OAuthScopeConsentMode) {
|
|
6082
|
-
OAuthScopeConsentMode["AlwaysPrompt"] = "AlwaysPrompt";
|
|
6083
|
-
OAuthScopeConsentMode["RememberDecision"] = "RememberDecision";
|
|
6084
|
-
OAuthScopeConsentMode["NeverPrompt"] = "NeverPrompt";
|
|
6085
|
-
})(OAuthScopeConsentMode = exports.OAuthScopeConsentMode || (exports.OAuthScopeConsentMode = {}));
|
|
6086
|
-
/**
|
|
6087
|
-
* @author Brett Pontarelli
|
|
6088
|
-
*/
|
|
6089
|
-
var IdentityProviderLoginMethod;
|
|
6090
|
-
(function (IdentityProviderLoginMethod) {
|
|
6091
|
-
IdentityProviderLoginMethod["UsePopup"] = "UsePopup";
|
|
6092
|
-
IdentityProviderLoginMethod["UseRedirect"] = "UseRedirect";
|
|
6093
|
-
IdentityProviderLoginMethod["UseVendorJavaScript"] = "UseVendorJavaScript";
|
|
6094
|
-
})(IdentityProviderLoginMethod = exports.IdentityProviderLoginMethod || (exports.IdentityProviderLoginMethod = {}));
|
|
6095
|
-
/**
|
|
6096
|
-
* The possible result states of a webhook event. This tracks the success of the overall webhook transaction according to the {@link TransactionType}
|
|
6097
|
-
* and configured webhooks.
|
|
6087
|
+
* Available JSON Web Algorithms (JWA) as described in RFC 7518 available for this JWT implementation.
|
|
6098
6088
|
*
|
|
6099
|
-
* @author
|
|
6089
|
+
* @author Daniel DeGroff
|
|
6100
6090
|
*/
|
|
6101
|
-
var
|
|
6102
|
-
(function (
|
|
6103
|
-
|
|
6104
|
-
|
|
6105
|
-
|
|
6106
|
-
|
|
6091
|
+
var Algorithm;
|
|
6092
|
+
(function (Algorithm) {
|
|
6093
|
+
Algorithm["ES256"] = "ES256";
|
|
6094
|
+
Algorithm["ES384"] = "ES384";
|
|
6095
|
+
Algorithm["ES512"] = "ES512";
|
|
6096
|
+
Algorithm["HS256"] = "HS256";
|
|
6097
|
+
Algorithm["HS384"] = "HS384";
|
|
6098
|
+
Algorithm["HS512"] = "HS512";
|
|
6099
|
+
Algorithm["PS256"] = "PS256";
|
|
6100
|
+
Algorithm["PS384"] = "PS384";
|
|
6101
|
+
Algorithm["PS512"] = "PS512";
|
|
6102
|
+
Algorithm["RS256"] = "RS256";
|
|
6103
|
+
Algorithm["RS384"] = "RS384";
|
|
6104
|
+
Algorithm["RS512"] = "RS512";
|
|
6105
|
+
Algorithm["none"] = "none";
|
|
6106
|
+
})(Algorithm = exports.Algorithm || (exports.Algorithm = {}));
|
|
6107
6107
|
//# sourceMappingURL=FusionAuthClient.js.map
|