@fusionauth/typescript-client 1.56.0 → 1.58.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/build/src/FusionAuthClient.d.ts +4142 -4063
- package/build/src/FusionAuthClient.js +910 -782
- package/build/src/FusionAuthClient.js.map +1 -1
- package/dist/fusionauth-typescript-client.js +911 -783
- package/dist/fusionauth-typescript-client.min.js +1 -1
- package/dist/fusionauth-typescript-client.min.js.map +1 -1
- package/package.json +2 -2
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
/*
|
|
3
|
-
* Copyright (c) 2019-
|
|
3
|
+
* Copyright (c) 2019-2025, FusionAuth, All Rights Reserved
|
|
4
4
|
*
|
|
5
5
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
6
6
|
* you may not use this file except in compliance with the License.
|
|
@@ -15,7 +15,7 @@
|
|
|
15
15
|
* language governing permissions and limitations under the License.
|
|
16
16
|
*/
|
|
17
17
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
18
|
-
exports.
|
|
18
|
+
exports.WebhookEventResult = exports.WebhookAttemptResult = exports.WebAuthnWorkflow = exports.VerificationStrategy = exports.UserVerificationRequirement = exports.UserState = exports.UserActionPhase = exports.UnverifiedBehavior = exports.UnknownScopePolicy = exports.TransactionType = exports.TokenType = exports.ThemeType = exports.UniqueUsernameStrategy = exports.SystemTrustedProxyConfigurationPolicy = exports.SteamAPIMode = exports.Sort = exports.SecureGeneratorType = exports.SAMLv2DestinationAssertionPolicy = exports.ResidentKeyRequirement = exports.RefreshTokenUsagePolicy = exports.RefreshTokenExpirationPolicy = exports.ReactorFeatureStatus = exports.RateLimitedRequestType = exports.PublicKeyCredentialType = exports.ProofKeyForCodeExchangePolicy = exports.BreachMatchMode = exports.BreachAction = exports.ObjectState = exports.Oauth2AuthorizedURLValidationPolicy = exports.OAuthScopeHandlingPolicy = exports.OAuthScopeConsentMode = exports.OAuthErrorType = exports.OAuthErrorReason = exports.OAuthApplicationRelationship = exports.MultiFactorLoginPolicy = exports.MessengerType = exports.MessageType = exports.LogoutBehavior = exports.LambdaType = exports.LambdaEngineType = exports.LDAPSecurityMethod = exports.KeyUse = exports.KeyType = exports.KeyAlgorithm = exports.IdentityProviderType = exports.ClientAuthenticationMethod = exports.IdentityProviderLoginMethod = exports.IdentityProviderLinkingStrategy = exports.IPAccessControlEntryAction = exports.HTTPMethod = exports.GrantType = exports.FormType = exports.FormFieldAdminPolicy = exports.FormDataType = exports.FormControl = exports.FamilyRole = exports.ExpiryUnit = exports.EventType = exports.EventLogType = exports.EmailSecurityType = exports.DeviceType = exports.CoseKeyType = exports.CoseEllipticCurve = exports.CoseAlgorithmIdentifier = exports.ContentStatus = exports.ConsentStatus = exports.ConnectorType = exports.ClientAuthenticationPolicy = exports.ChangePasswordReason = exports.CaptchaMethod = exports.CanonicalizationMethod = exports.BreachedPasswordStatus = exports.TOTPAlgorithm = exports.AuthenticatorAttachmentPreference = exports.AuthenticatorAttachment = exports.AuthenticationThreats = exports.AttestationType = exports.AttestationConveyancePreference = exports.ApplicationMultiFactorTrustPolicy = exports.XMLSignatureLocation = exports.SAMLLogoutBehavior = exports.RegistrationType = exports.LoginIdType = exports.Algorithm = exports.FusionAuthClient = void 0;
|
|
19
19
|
const DefaultRESTClientBuilder_1 = require("./DefaultRESTClientBuilder");
|
|
20
20
|
const url_1 = require("url");
|
|
21
21
|
class FusionAuthClient {
|
|
@@ -143,6 +143,24 @@ class FusionAuthClient {
|
|
|
143
143
|
.withMethod("POST")
|
|
144
144
|
.go();
|
|
145
145
|
}
|
|
146
|
+
/**
|
|
147
|
+
* Changes a user's password using their access token (JWT) instead of the changePasswordId
|
|
148
|
+
* A common use case for this method will be if you want to allow the user to change their own password.
|
|
149
|
+
*
|
|
150
|
+
* Remember to send refreshToken in the request body if you want to get a new refresh token when login using the returned oneTimePassword.
|
|
151
|
+
*
|
|
152
|
+
* @param {string} encodedJWT The encoded JWT (access token).
|
|
153
|
+
* @param {ChangePasswordRequest} request The change password request that contains all the information used to change the password.
|
|
154
|
+
* @returns {Promise<ClientResponse<ChangePasswordResponse>>}
|
|
155
|
+
*/
|
|
156
|
+
changePasswordByJWT(encodedJWT, request) {
|
|
157
|
+
return this.startAnonymous()
|
|
158
|
+
.withUri('/api/user/change-password')
|
|
159
|
+
.withAuthorization('Bearer ' + encodedJWT)
|
|
160
|
+
.withJSONBody(request)
|
|
161
|
+
.withMethod("POST")
|
|
162
|
+
.go();
|
|
163
|
+
}
|
|
146
164
|
/**
|
|
147
165
|
* Changes a user's password using their identity (loginId and password). Using a loginId instead of the changePasswordId
|
|
148
166
|
* bypasses the email verification and allows a password to be changed directly without first calling the #forgotPassword
|
|
@@ -784,7 +802,7 @@ class FusionAuthClient {
|
|
|
784
802
|
.go();
|
|
785
803
|
}
|
|
786
804
|
/**
|
|
787
|
-
* Deactivates the users with the given
|
|
805
|
+
* Deactivates the users with the given Ids.
|
|
788
806
|
*
|
|
789
807
|
* @param {Array<string>} userIds The ids of the users to deactivate.
|
|
790
808
|
* @returns {Promise<ClientResponse<UserDeleteResponse>>}
|
|
@@ -801,7 +819,7 @@ class FusionAuthClient {
|
|
|
801
819
|
.go();
|
|
802
820
|
}
|
|
803
821
|
/**
|
|
804
|
-
* Deactivates the users with the given
|
|
822
|
+
* Deactivates the users with the given Ids.
|
|
805
823
|
*
|
|
806
824
|
* @param {Array<string>} userIds The ids of the users to deactivate.
|
|
807
825
|
* @returns {Promise<ClientResponse<UserDeleteResponse>>}
|
|
@@ -1276,8 +1294,8 @@ class FusionAuthClient {
|
|
|
1276
1294
|
.go();
|
|
1277
1295
|
}
|
|
1278
1296
|
/**
|
|
1279
|
-
* Deletes the users with the given
|
|
1280
|
-
* The order of preference is
|
|
1297
|
+
* Deletes the users with the given Ids, or users matching the provided JSON query or queryString.
|
|
1298
|
+
* The order of preference is Ids, query and then queryString, it is recommended to only provide one of the three for the request.
|
|
1281
1299
|
*
|
|
1282
1300
|
* This method can be used to deactivate or permanently delete (hard-delete) users based upon the hardDelete boolean in the request body.
|
|
1283
1301
|
* Using the dryRun parameter you may also request the result of the action without actually deleting or deactivating any users.
|
|
@@ -1295,8 +1313,8 @@ class FusionAuthClient {
|
|
|
1295
1313
|
.go();
|
|
1296
1314
|
}
|
|
1297
1315
|
/**
|
|
1298
|
-
* Deletes the users with the given
|
|
1299
|
-
* The order of preference is
|
|
1316
|
+
* Deletes the users with the given Ids, or users matching the provided JSON query or queryString.
|
|
1317
|
+
* The order of preference is Ids, query and then queryString, it is recommended to only provide one of the three for the request.
|
|
1300
1318
|
*
|
|
1301
1319
|
* This method can be used to deactivate or permanently delete (hard-delete) users based upon the hardDelete boolean in the request body.
|
|
1302
1320
|
* Using the dryRun parameter you may also request the result of the action without actually deleting or deactivating any users.
|
|
@@ -1845,7 +1863,7 @@ class FusionAuthClient {
|
|
|
1845
1863
|
* Modifies a temporal user action by changing the expiration of the action and optionally adding a comment to the
|
|
1846
1864
|
* action.
|
|
1847
1865
|
*
|
|
1848
|
-
* @param {UUID} actionId The Id of the action to modify. This is technically the user action log
|
|
1866
|
+
* @param {UUID} actionId The Id of the action to modify. This is technically the user action log Id.
|
|
1849
1867
|
* @param {ActionRequest} request The request that contains all the information about the modification.
|
|
1850
1868
|
* @returns {Promise<ClientResponse<ActionResponse>>}
|
|
1851
1869
|
*/
|
|
@@ -1871,10 +1889,10 @@ class FusionAuthClient {
|
|
|
1871
1889
|
.go();
|
|
1872
1890
|
}
|
|
1873
1891
|
/**
|
|
1874
|
-
* Updates an
|
|
1892
|
+
* Updates an API key with the given Id.
|
|
1875
1893
|
*
|
|
1876
|
-
* @param {UUID} keyId The Id of the
|
|
1877
|
-
* @param {APIKeyRequest} request The request object that contains all the information needed to create the
|
|
1894
|
+
* @param {UUID} keyId The Id of the API key. If not provided a secure random api key will be generated.
|
|
1895
|
+
* @param {APIKeyRequest} request The request object that contains all the information needed to create the API key.
|
|
1878
1896
|
* @returns {Promise<ClientResponse<APIKeyResponse>>}
|
|
1879
1897
|
*/
|
|
1880
1898
|
patchAPIKey(keyId, request) {
|
|
@@ -1882,7 +1900,7 @@ class FusionAuthClient {
|
|
|
1882
1900
|
.withUri('/api/api-key')
|
|
1883
1901
|
.withUriSegment(keyId)
|
|
1884
1902
|
.withJSONBody(request)
|
|
1885
|
-
.withMethod("
|
|
1903
|
+
.withMethod("PATCH")
|
|
1886
1904
|
.go();
|
|
1887
1905
|
}
|
|
1888
1906
|
/**
|
|
@@ -1963,6 +1981,21 @@ class FusionAuthClient {
|
|
|
1963
1981
|
.withMethod("PATCH")
|
|
1964
1982
|
.go();
|
|
1965
1983
|
}
|
|
1984
|
+
/**
|
|
1985
|
+
* Updates, via PATCH, the Entity with the given Id.
|
|
1986
|
+
*
|
|
1987
|
+
* @param {UUID} entityId The Id of the Entity Type to update.
|
|
1988
|
+
* @param {EntityRequest} request The request that contains just the new Entity information.
|
|
1989
|
+
* @returns {Promise<ClientResponse<EntityResponse>>}
|
|
1990
|
+
*/
|
|
1991
|
+
patchEntity(entityId, request) {
|
|
1992
|
+
return this.start()
|
|
1993
|
+
.withUri('/api/entity')
|
|
1994
|
+
.withUriSegment(entityId)
|
|
1995
|
+
.withJSONBody(request)
|
|
1996
|
+
.withMethod("PATCH")
|
|
1997
|
+
.go();
|
|
1998
|
+
}
|
|
1966
1999
|
/**
|
|
1967
2000
|
* Updates, via PATCH, the Entity Type with the given Id.
|
|
1968
2001
|
*
|
|
@@ -1978,6 +2011,54 @@ class FusionAuthClient {
|
|
|
1978
2011
|
.withMethod("PATCH")
|
|
1979
2012
|
.go();
|
|
1980
2013
|
}
|
|
2014
|
+
/**
|
|
2015
|
+
* Patches the permission with the given Id for the entity type.
|
|
2016
|
+
*
|
|
2017
|
+
* @param {UUID} entityTypeId The Id of the entityType that the permission belongs to.
|
|
2018
|
+
* @param {UUID} permissionId The Id of the permission to patch.
|
|
2019
|
+
* @param {EntityTypeRequest} request The request that contains the new permission information.
|
|
2020
|
+
* @returns {Promise<ClientResponse<EntityTypeResponse>>}
|
|
2021
|
+
*/
|
|
2022
|
+
patchEntityTypePermission(entityTypeId, permissionId, request) {
|
|
2023
|
+
return this.start()
|
|
2024
|
+
.withUri('/api/entity/type')
|
|
2025
|
+
.withUriSegment(entityTypeId)
|
|
2026
|
+
.withUriSegment("permission")
|
|
2027
|
+
.withUriSegment(permissionId)
|
|
2028
|
+
.withJSONBody(request)
|
|
2029
|
+
.withMethod("PATCH")
|
|
2030
|
+
.go();
|
|
2031
|
+
}
|
|
2032
|
+
/**
|
|
2033
|
+
* Patches the form with the given Id.
|
|
2034
|
+
*
|
|
2035
|
+
* @param {UUID} formId The Id of the form to patch.
|
|
2036
|
+
* @param {FormRequest} request The request object that contains the new form information.
|
|
2037
|
+
* @returns {Promise<ClientResponse<FormResponse>>}
|
|
2038
|
+
*/
|
|
2039
|
+
patchForm(formId, request) {
|
|
2040
|
+
return this.start()
|
|
2041
|
+
.withUri('/api/form')
|
|
2042
|
+
.withUriSegment(formId)
|
|
2043
|
+
.withJSONBody(request)
|
|
2044
|
+
.withMethod("PATCH")
|
|
2045
|
+
.go();
|
|
2046
|
+
}
|
|
2047
|
+
/**
|
|
2048
|
+
* Patches the form field with the given Id.
|
|
2049
|
+
*
|
|
2050
|
+
* @param {UUID} fieldId The Id of the form field to patch.
|
|
2051
|
+
* @param {FormFieldRequest} request The request object that contains the new form field information.
|
|
2052
|
+
* @returns {Promise<ClientResponse<FormFieldResponse>>}
|
|
2053
|
+
*/
|
|
2054
|
+
patchFormField(fieldId, request) {
|
|
2055
|
+
return this.start()
|
|
2056
|
+
.withUri('/api/form/field')
|
|
2057
|
+
.withUriSegment(fieldId)
|
|
2058
|
+
.withJSONBody(request)
|
|
2059
|
+
.withMethod("PATCH")
|
|
2060
|
+
.go();
|
|
2061
|
+
}
|
|
1981
2062
|
/**
|
|
1982
2063
|
* Updates, via PATCH, the group with the given Id.
|
|
1983
2064
|
*
|
|
@@ -1993,6 +2074,21 @@ class FusionAuthClient {
|
|
|
1993
2074
|
.withMethod("PATCH")
|
|
1994
2075
|
.go();
|
|
1995
2076
|
}
|
|
2077
|
+
/**
|
|
2078
|
+
* Update the IP Access Control List with the given Id.
|
|
2079
|
+
*
|
|
2080
|
+
* @param {UUID} accessControlListId The Id of the IP Access Control List to patch.
|
|
2081
|
+
* @param {IPAccessControlListRequest} request The request that contains the new IP Access Control List information.
|
|
2082
|
+
* @returns {Promise<ClientResponse<IPAccessControlListResponse>>}
|
|
2083
|
+
*/
|
|
2084
|
+
patchIPAccessControlList(accessControlListId, request) {
|
|
2085
|
+
return this.start()
|
|
2086
|
+
.withUri('/api/ip-acl')
|
|
2087
|
+
.withUriSegment(accessControlListId)
|
|
2088
|
+
.withJSONBody(request)
|
|
2089
|
+
.withMethod("PATCH")
|
|
2090
|
+
.go();
|
|
2091
|
+
}
|
|
1996
2092
|
/**
|
|
1997
2093
|
* Updates, via PATCH, the identity provider with the given Id.
|
|
1998
2094
|
*
|
|
@@ -2202,6 +2298,21 @@ class FusionAuthClient {
|
|
|
2202
2298
|
.withMethod("PATCH")
|
|
2203
2299
|
.go();
|
|
2204
2300
|
}
|
|
2301
|
+
/**
|
|
2302
|
+
* Patches the webhook with the given Id.
|
|
2303
|
+
*
|
|
2304
|
+
* @param {UUID} webhookId The Id of the webhook to update.
|
|
2305
|
+
* @param {WebhookRequest} request The request that contains the new webhook information.
|
|
2306
|
+
* @returns {Promise<ClientResponse<WebhookResponse>>}
|
|
2307
|
+
*/
|
|
2308
|
+
patchWebhook(webhookId, request) {
|
|
2309
|
+
return this.start()
|
|
2310
|
+
.withUri('/api/webhook')
|
|
2311
|
+
.withUriSegment(webhookId)
|
|
2312
|
+
.withJSONBody(request)
|
|
2313
|
+
.withMethod("PATCH")
|
|
2314
|
+
.go();
|
|
2315
|
+
}
|
|
2205
2316
|
/**
|
|
2206
2317
|
* Reactivates the application with the given Id.
|
|
2207
2318
|
*
|
|
@@ -2333,7 +2444,7 @@ class FusionAuthClient {
|
|
|
2333
2444
|
.go();
|
|
2334
2445
|
}
|
|
2335
2446
|
/**
|
|
2336
|
-
* Removes a user from the family with the given
|
|
2447
|
+
* Removes a user from the family with the given Id.
|
|
2337
2448
|
*
|
|
2338
2449
|
* @param {UUID} familyId The Id of the family to remove the user from.
|
|
2339
2450
|
* @param {UUID} userId The Id of the user to remove from the family.
|
|
@@ -2392,7 +2503,7 @@ class FusionAuthClient {
|
|
|
2392
2503
|
.go();
|
|
2393
2504
|
}
|
|
2394
2505
|
/**
|
|
2395
|
-
* Retrieves an authentication API key for the given
|
|
2506
|
+
* Retrieves an authentication API key for the given Id.
|
|
2396
2507
|
*
|
|
2397
2508
|
* @param {UUID} keyId The Id of the API key to retrieve.
|
|
2398
2509
|
* @returns {Promise<ClientResponse<APIKeyResponse>>}
|
|
@@ -2463,7 +2574,7 @@ class FusionAuthClient {
|
|
|
2463
2574
|
/**
|
|
2464
2575
|
* Retrieves the application for the given Id or all the applications if the Id is null.
|
|
2465
2576
|
*
|
|
2466
|
-
* @param {UUID} applicationId (Optional) The application
|
|
2577
|
+
* @param {UUID} applicationId (Optional) The application Id.
|
|
2467
2578
|
* @returns {Promise<ClientResponse<ApplicationResponse>>}
|
|
2468
2579
|
*/
|
|
2469
2580
|
retrieveApplication(applicationId) {
|
|
@@ -2546,10 +2657,10 @@ class FusionAuthClient {
|
|
|
2546
2657
|
.go();
|
|
2547
2658
|
}
|
|
2548
2659
|
/**
|
|
2549
|
-
* Retrieves the daily active user report between the two instants. If you specify an application
|
|
2660
|
+
* Retrieves the daily active user report between the two instants. If you specify an application Id, it will only
|
|
2550
2661
|
* return the daily active counts for that application.
|
|
2551
2662
|
*
|
|
2552
|
-
* @param {UUID} applicationId (Optional) The application
|
|
2663
|
+
* @param {UUID} applicationId (Optional) The application Id.
|
|
2553
2664
|
* @param {number} start The start instant as UTC milliseconds since Epoch.
|
|
2554
2665
|
* @param {number} end The end instant as UTC milliseconds since Epoch.
|
|
2555
2666
|
* @returns {Promise<ClientResponse<DailyActiveUserReportResponse>>}
|
|
@@ -2564,7 +2675,7 @@ class FusionAuthClient {
|
|
|
2564
2675
|
.go();
|
|
2565
2676
|
}
|
|
2566
2677
|
/**
|
|
2567
|
-
* Retrieves the email template for the given Id. If you don't specify the
|
|
2678
|
+
* Retrieves the email template for the given Id. If you don't specify the Id, this will return all the email templates.
|
|
2568
2679
|
*
|
|
2569
2680
|
* @param {UUID} emailTemplateId (Optional) The Id of the email template.
|
|
2570
2681
|
* @returns {Promise<ClientResponse<EmailTemplateResponse>>}
|
|
@@ -2980,10 +3091,10 @@ class FusionAuthClient {
|
|
|
2980
3091
|
.go();
|
|
2981
3092
|
}
|
|
2982
3093
|
/**
|
|
2983
|
-
* Retrieves the login report between the two instants. If you specify an application
|
|
3094
|
+
* Retrieves the login report between the two instants. If you specify an application Id, it will only return the
|
|
2984
3095
|
* login counts for that application.
|
|
2985
3096
|
*
|
|
2986
|
-
* @param {UUID} applicationId (Optional) The application
|
|
3097
|
+
* @param {UUID} applicationId (Optional) The application Id.
|
|
2987
3098
|
* @param {number} start The start instant as UTC milliseconds since Epoch.
|
|
2988
3099
|
* @param {number} end The end instant as UTC milliseconds since Epoch.
|
|
2989
3100
|
* @returns {Promise<ClientResponse<LoginReportResponse>>}
|
|
@@ -2998,7 +3109,7 @@ class FusionAuthClient {
|
|
|
2998
3109
|
.go();
|
|
2999
3110
|
}
|
|
3000
3111
|
/**
|
|
3001
|
-
* Retrieves the message template for the given Id. If you don't specify the
|
|
3112
|
+
* Retrieves the message template for the given Id. If you don't specify the Id, this will return all the message templates.
|
|
3002
3113
|
*
|
|
3003
3114
|
* @param {UUID} messageTemplateId (Optional) The Id of the message template.
|
|
3004
3115
|
* @returns {Promise<ClientResponse<MessageTemplateResponse>>}
|
|
@@ -3059,10 +3170,10 @@ class FusionAuthClient {
|
|
|
3059
3170
|
.go();
|
|
3060
3171
|
}
|
|
3061
3172
|
/**
|
|
3062
|
-
* Retrieves the monthly active user report between the two instants. If you specify an application
|
|
3173
|
+
* Retrieves the monthly active user report between the two instants. If you specify an application Id, it will only
|
|
3063
3174
|
* return the monthly active counts for that application.
|
|
3064
3175
|
*
|
|
3065
|
-
* @param {UUID} applicationId (Optional) The application
|
|
3176
|
+
* @param {UUID} applicationId (Optional) The application Id.
|
|
3066
3177
|
* @param {number} start The start instant as UTC milliseconds since Epoch.
|
|
3067
3178
|
* @param {number} end The end instant as UTC milliseconds since Epoch.
|
|
3068
3179
|
* @returns {Promise<ClientResponse<MonthlyActiveUserReportResponse>>}
|
|
@@ -3238,7 +3349,7 @@ class FusionAuthClient {
|
|
|
3238
3349
|
.go();
|
|
3239
3350
|
}
|
|
3240
3351
|
/**
|
|
3241
|
-
* Retrieves the user registration for the user with the given Id and the given application
|
|
3352
|
+
* Retrieves the user registration for the user with the given Id and the given application Id.
|
|
3242
3353
|
*
|
|
3243
3354
|
* @param {UUID} userId The Id of the user.
|
|
3244
3355
|
* @param {UUID} applicationId The Id of the application.
|
|
@@ -3253,10 +3364,10 @@ class FusionAuthClient {
|
|
|
3253
3364
|
.go();
|
|
3254
3365
|
}
|
|
3255
3366
|
/**
|
|
3256
|
-
* Retrieves the registration report between the two instants. If you specify an application
|
|
3367
|
+
* Retrieves the registration report between the two instants. If you specify an application Id, it will only return
|
|
3257
3368
|
* the registration counts for that application.
|
|
3258
3369
|
*
|
|
3259
|
-
* @param {UUID} applicationId (Optional) The application
|
|
3370
|
+
* @param {UUID} applicationId (Optional) The application Id.
|
|
3260
3371
|
* @param {number} start The start instant as UTC milliseconds since Epoch.
|
|
3261
3372
|
* @param {number} end The end instant as UTC milliseconds since Epoch.
|
|
3262
3373
|
* @returns {Promise<ClientResponse<RegistrationReportResponse>>}
|
|
@@ -3433,7 +3544,7 @@ class FusionAuthClient {
|
|
|
3433
3544
|
.go();
|
|
3434
3545
|
}
|
|
3435
3546
|
/**
|
|
3436
|
-
* Retrieves the user action for the given Id. If you pass in null for the
|
|
3547
|
+
* Retrieves the user action for the given Id. If you pass in null for the Id, this will return all the user
|
|
3437
3548
|
* actions.
|
|
3438
3549
|
*
|
|
3439
3550
|
* @param {UUID} userActionId (Optional) The Id of the user action.
|
|
@@ -3447,7 +3558,7 @@ class FusionAuthClient {
|
|
|
3447
3558
|
.go();
|
|
3448
3559
|
}
|
|
3449
3560
|
/**
|
|
3450
|
-
* Retrieves the user action reason for the given Id. If you pass in null for the
|
|
3561
|
+
* Retrieves the user action reason for the given Id. If you pass in null for the Id, this will return all the user
|
|
3451
3562
|
* action reasons.
|
|
3452
3563
|
*
|
|
3453
3564
|
* @param {UUID} userActionReasonId (Optional) The Id of the user action reason.
|
|
@@ -3554,8 +3665,8 @@ class FusionAuthClient {
|
|
|
3554
3665
|
*
|
|
3555
3666
|
* This API is useful if you want to build your own login workflow to complete a device grant.
|
|
3556
3667
|
*
|
|
3557
|
-
* @param {string} client_id The client
|
|
3558
|
-
* @param {string} client_secret The client
|
|
3668
|
+
* @param {string} client_id The client Id.
|
|
3669
|
+
* @param {string} client_secret The client Id.
|
|
3559
3670
|
* @param {string} user_code The end-user verification code.
|
|
3560
3671
|
* @returns {Promise<ClientResponse<void>>}
|
|
3561
3672
|
*/
|
|
@@ -3674,11 +3785,11 @@ class FusionAuthClient {
|
|
|
3674
3785
|
.go();
|
|
3675
3786
|
}
|
|
3676
3787
|
/**
|
|
3677
|
-
* Retrieves the login report between the two instants for a particular user by Id. If you specify an application
|
|
3788
|
+
* Retrieves the login report between the two instants for a particular user by Id. If you specify an application Id, it will only return the
|
|
3678
3789
|
* login counts for that application.
|
|
3679
3790
|
*
|
|
3680
|
-
* @param {UUID} applicationId (Optional) The application
|
|
3681
|
-
* @param {UUID} userId The userId
|
|
3791
|
+
* @param {UUID} applicationId (Optional) The application Id.
|
|
3792
|
+
* @param {UUID} userId The userId Id.
|
|
3682
3793
|
* @param {number} start The start instant as UTC milliseconds since Epoch.
|
|
3683
3794
|
* @param {number} end The end instant as UTC milliseconds since Epoch.
|
|
3684
3795
|
* @returns {Promise<ClientResponse<LoginReportResponse>>}
|
|
@@ -3694,11 +3805,11 @@ class FusionAuthClient {
|
|
|
3694
3805
|
.go();
|
|
3695
3806
|
}
|
|
3696
3807
|
/**
|
|
3697
|
-
* Retrieves the login report between the two instants for a particular user by login Id. If you specify an application
|
|
3808
|
+
* Retrieves the login report between the two instants for a particular user by login Id. If you specify an application Id, it will only return the
|
|
3698
3809
|
* login counts for that application.
|
|
3699
3810
|
*
|
|
3700
|
-
* @param {UUID} applicationId (Optional) The application
|
|
3701
|
-
* @param {string} loginId The userId
|
|
3811
|
+
* @param {UUID} applicationId (Optional) The application Id.
|
|
3812
|
+
* @param {string} loginId The userId Id.
|
|
3702
3813
|
* @param {number} start The start instant as UTC milliseconds since Epoch.
|
|
3703
3814
|
* @param {number} end The end instant as UTC milliseconds since Epoch.
|
|
3704
3815
|
* @returns {Promise<ClientResponse<LoginReportResponse>>}
|
|
@@ -3781,7 +3892,7 @@ class FusionAuthClient {
|
|
|
3781
3892
|
.go();
|
|
3782
3893
|
}
|
|
3783
3894
|
/**
|
|
3784
|
-
* Retrieves the webhook for the given Id. If you pass in null for the
|
|
3895
|
+
* Retrieves the webhook for the given Id. If you pass in null for the Id, this will return all the webhooks.
|
|
3785
3896
|
*
|
|
3786
3897
|
* @param {UUID} webhookId (Optional) The Id of the webhook.
|
|
3787
3898
|
* @returns {Promise<ClientResponse<WebhookResponse>>}
|
|
@@ -4030,7 +4141,7 @@ class FusionAuthClient {
|
|
|
4030
4141
|
.go();
|
|
4031
4142
|
}
|
|
4032
4143
|
/**
|
|
4033
|
-
* Retrieves the entities for the given
|
|
4144
|
+
* Retrieves the entities for the given Ids. If any Id is invalid, it is ignored.
|
|
4034
4145
|
*
|
|
4035
4146
|
* @param {Array<string>} ids The entity ids to search for.
|
|
4036
4147
|
* @returns {Promise<ClientResponse<EntitySearchResponse>>}
|
|
@@ -4212,7 +4323,7 @@ class FusionAuthClient {
|
|
|
4212
4323
|
.go();
|
|
4213
4324
|
}
|
|
4214
4325
|
/**
|
|
4215
|
-
* Retrieves the users for the given
|
|
4326
|
+
* Retrieves the users for the given Ids. If any Id is invalid, it is ignored.
|
|
4216
4327
|
*
|
|
4217
4328
|
* @param {Array<string>} ids The user ids to search for.
|
|
4218
4329
|
* @returns {Promise<ClientResponse<SearchResponse>>}
|
|
@@ -4227,9 +4338,9 @@ class FusionAuthClient {
|
|
|
4227
4338
|
.go();
|
|
4228
4339
|
}
|
|
4229
4340
|
/**
|
|
4230
|
-
* Retrieves the users for the given
|
|
4341
|
+
* Retrieves the users for the given Ids. If any Id is invalid, it is ignored.
|
|
4231
4342
|
*
|
|
4232
|
-
* @param {Array<string>} ids The user
|
|
4343
|
+
* @param {Array<string>} ids The user Ids to search for.
|
|
4233
4344
|
* @returns {Promise<ClientResponse<SearchResponse>>}
|
|
4234
4345
|
*/
|
|
4235
4346
|
searchUsersByIds(ids) {
|
|
@@ -4296,7 +4407,7 @@ class FusionAuthClient {
|
|
|
4296
4407
|
.go();
|
|
4297
4408
|
}
|
|
4298
4409
|
/**
|
|
4299
|
-
* Send an email using an email template
|
|
4410
|
+
* Send an email using an email template Id. You can optionally provide <code>requestData</code> to access key value
|
|
4300
4411
|
* pairs in the email template.
|
|
4301
4412
|
*
|
|
4302
4413
|
* @param {UUID} emailTemplateId The Id for the template.
|
|
@@ -4482,16 +4593,16 @@ class FusionAuthClient {
|
|
|
4482
4593
|
.go();
|
|
4483
4594
|
}
|
|
4484
4595
|
/**
|
|
4485
|
-
* Updates an API key
|
|
4596
|
+
* Updates an API key with the given Id.
|
|
4486
4597
|
*
|
|
4487
|
-
* @param {UUID}
|
|
4488
|
-
* @param {APIKeyRequest} request The request
|
|
4598
|
+
* @param {UUID} keyId The Id of the API key to update.
|
|
4599
|
+
* @param {APIKeyRequest} request The request that contains all the new API key information.
|
|
4489
4600
|
* @returns {Promise<ClientResponse<APIKeyResponse>>}
|
|
4490
4601
|
*/
|
|
4491
|
-
updateAPIKey(
|
|
4602
|
+
updateAPIKey(keyId, request) {
|
|
4492
4603
|
return this.start()
|
|
4493
4604
|
.withUri('/api/api-key')
|
|
4494
|
-
.withUriSegment(
|
|
4605
|
+
.withUriSegment(keyId)
|
|
4495
4606
|
.withJSONBody(request)
|
|
4496
4607
|
.withMethod("PUT")
|
|
4497
4608
|
.go();
|
|
@@ -4622,6 +4733,21 @@ class FusionAuthClient {
|
|
|
4622
4733
|
.withMethod("PUT")
|
|
4623
4734
|
.go();
|
|
4624
4735
|
}
|
|
4736
|
+
/**
|
|
4737
|
+
* Updates a family with a given Id.
|
|
4738
|
+
*
|
|
4739
|
+
* @param {UUID} familyId The Id of the family to update.
|
|
4740
|
+
* @param {FamilyRequest} request The request object that contains all the new family information.
|
|
4741
|
+
* @returns {Promise<ClientResponse<FamilyResponse>>}
|
|
4742
|
+
*/
|
|
4743
|
+
updateFamily(familyId, request) {
|
|
4744
|
+
return this.start()
|
|
4745
|
+
.withUri('/api/user/family')
|
|
4746
|
+
.withUriSegment(familyId)
|
|
4747
|
+
.withJSONBody(request)
|
|
4748
|
+
.withMethod("PUT")
|
|
4749
|
+
.go();
|
|
4750
|
+
}
|
|
4625
4751
|
/**
|
|
4626
4752
|
* Updates the form with the given Id.
|
|
4627
4753
|
*
|
|
@@ -4955,7 +5081,7 @@ class FusionAuthClient {
|
|
|
4955
5081
|
* If you build your own activation form you should validate the user provided code prior to beginning the Authorization grant.
|
|
4956
5082
|
*
|
|
4957
5083
|
* @param {string} user_code The end-user verification code.
|
|
4958
|
-
* @param {string} client_id The client
|
|
5084
|
+
* @param {string} client_id The client Id.
|
|
4959
5085
|
* @returns {Promise<ClientResponse<void>>}
|
|
4960
5086
|
*/
|
|
4961
5087
|
validateDevice(user_code, client_id) {
|
|
@@ -5113,24 +5239,67 @@ class FusionAuthClient {
|
|
|
5113
5239
|
exports.FusionAuthClient = FusionAuthClient;
|
|
5114
5240
|
exports.default = FusionAuthClient;
|
|
5115
5241
|
/**
|
|
5116
|
-
*
|
|
5117
|
-
* Framework - RFC 6749</a>.
|
|
5118
|
-
* <p>
|
|
5119
|
-
* Specific names as defined by <a href="https://tools.ietf.org/html/rfc7591#section-4.1">
|
|
5120
|
-
* OAuth 2.0 Dynamic Client Registration Protocol - RFC 7591 Section 4.1</a>
|
|
5242
|
+
* Available JSON Web Algorithms (JWA) as described in RFC 7518 available for this JWT implementation.
|
|
5121
5243
|
*
|
|
5122
5244
|
* @author Daniel DeGroff
|
|
5123
5245
|
*/
|
|
5124
|
-
var
|
|
5125
|
-
(function (
|
|
5126
|
-
|
|
5127
|
-
|
|
5128
|
-
|
|
5129
|
-
|
|
5130
|
-
|
|
5131
|
-
|
|
5132
|
-
|
|
5133
|
-
|
|
5246
|
+
var Algorithm;
|
|
5247
|
+
(function (Algorithm) {
|
|
5248
|
+
Algorithm["ES256"] = "ES256";
|
|
5249
|
+
Algorithm["ES384"] = "ES384";
|
|
5250
|
+
Algorithm["ES512"] = "ES512";
|
|
5251
|
+
Algorithm["HS256"] = "HS256";
|
|
5252
|
+
Algorithm["HS384"] = "HS384";
|
|
5253
|
+
Algorithm["HS512"] = "HS512";
|
|
5254
|
+
Algorithm["PS256"] = "PS256";
|
|
5255
|
+
Algorithm["PS384"] = "PS384";
|
|
5256
|
+
Algorithm["PS512"] = "PS512";
|
|
5257
|
+
Algorithm["RS256"] = "RS256";
|
|
5258
|
+
Algorithm["RS384"] = "RS384";
|
|
5259
|
+
Algorithm["RS512"] = "RS512";
|
|
5260
|
+
Algorithm["none"] = "none";
|
|
5261
|
+
})(Algorithm = exports.Algorithm || (exports.Algorithm = {}));
|
|
5262
|
+
var LoginIdType;
|
|
5263
|
+
(function (LoginIdType) {
|
|
5264
|
+
LoginIdType["email"] = "email";
|
|
5265
|
+
LoginIdType["username"] = "username";
|
|
5266
|
+
})(LoginIdType = exports.LoginIdType || (exports.LoginIdType = {}));
|
|
5267
|
+
var RegistrationType;
|
|
5268
|
+
(function (RegistrationType) {
|
|
5269
|
+
RegistrationType["basic"] = "basic";
|
|
5270
|
+
RegistrationType["advanced"] = "advanced";
|
|
5271
|
+
})(RegistrationType = exports.RegistrationType || (exports.RegistrationType = {}));
|
|
5272
|
+
var SAMLLogoutBehavior;
|
|
5273
|
+
(function (SAMLLogoutBehavior) {
|
|
5274
|
+
SAMLLogoutBehavior["AllParticipants"] = "AllParticipants";
|
|
5275
|
+
SAMLLogoutBehavior["OnlyOriginator"] = "OnlyOriginator";
|
|
5276
|
+
})(SAMLLogoutBehavior = exports.SAMLLogoutBehavior || (exports.SAMLLogoutBehavior = {}));
|
|
5277
|
+
var XMLSignatureLocation;
|
|
5278
|
+
(function (XMLSignatureLocation) {
|
|
5279
|
+
XMLSignatureLocation["Assertion"] = "Assertion";
|
|
5280
|
+
XMLSignatureLocation["Response"] = "Response";
|
|
5281
|
+
})(XMLSignatureLocation = exports.XMLSignatureLocation || (exports.XMLSignatureLocation = {}));
|
|
5282
|
+
/**
|
|
5283
|
+
* @author Daniel DeGroff
|
|
5284
|
+
*/
|
|
5285
|
+
var ApplicationMultiFactorTrustPolicy;
|
|
5286
|
+
(function (ApplicationMultiFactorTrustPolicy) {
|
|
5287
|
+
ApplicationMultiFactorTrustPolicy["Any"] = "Any";
|
|
5288
|
+
ApplicationMultiFactorTrustPolicy["This"] = "This";
|
|
5289
|
+
ApplicationMultiFactorTrustPolicy["None"] = "None";
|
|
5290
|
+
})(ApplicationMultiFactorTrustPolicy = exports.ApplicationMultiFactorTrustPolicy || (exports.ApplicationMultiFactorTrustPolicy = {}));
|
|
5291
|
+
/**
|
|
5292
|
+
* Used to communicate whether and how authenticator attestation should be delivered to the Relying Party
|
|
5293
|
+
*
|
|
5294
|
+
* @author Spencer Witt
|
|
5295
|
+
*/
|
|
5296
|
+
var AttestationConveyancePreference;
|
|
5297
|
+
(function (AttestationConveyancePreference) {
|
|
5298
|
+
AttestationConveyancePreference["none"] = "none";
|
|
5299
|
+
AttestationConveyancePreference["indirect"] = "indirect";
|
|
5300
|
+
AttestationConveyancePreference["direct"] = "direct";
|
|
5301
|
+
AttestationConveyancePreference["enterprise"] = "enterprise";
|
|
5302
|
+
})(AttestationConveyancePreference = exports.AttestationConveyancePreference || (exports.AttestationConveyancePreference = {}));
|
|
5134
5303
|
/**
|
|
5135
5304
|
* Used to indicate what type of attestation was included in the authenticator response for a given WebAuthn credential at the time it was created
|
|
5136
5305
|
*
|
|
@@ -5144,58 +5313,124 @@ var AttestationType;
|
|
|
5144
5313
|
AttestationType["anonymizationCa"] = "anonymizationCa";
|
|
5145
5314
|
AttestationType["none"] = "none";
|
|
5146
5315
|
})(AttestationType = exports.AttestationType || (exports.AttestationType = {}));
|
|
5147
|
-
var EmailSecurityType;
|
|
5148
|
-
(function (EmailSecurityType) {
|
|
5149
|
-
EmailSecurityType["NONE"] = "NONE";
|
|
5150
|
-
EmailSecurityType["SSL"] = "SSL";
|
|
5151
|
-
EmailSecurityType["TLS"] = "TLS";
|
|
5152
|
-
})(EmailSecurityType = exports.EmailSecurityType || (exports.EmailSecurityType = {}));
|
|
5153
|
-
var UniqueUsernameStrategy;
|
|
5154
|
-
(function (UniqueUsernameStrategy) {
|
|
5155
|
-
UniqueUsernameStrategy["Always"] = "Always";
|
|
5156
|
-
UniqueUsernameStrategy["OnCollision"] = "OnCollision";
|
|
5157
|
-
})(UniqueUsernameStrategy = exports.UniqueUsernameStrategy || (exports.UniqueUsernameStrategy = {}));
|
|
5158
5316
|
/**
|
|
5159
|
-
*
|
|
5160
|
-
|
|
5161
|
-
|
|
5162
|
-
|
|
5163
|
-
|
|
5164
|
-
|
|
5165
|
-
|
|
5317
|
+
* @author Brett Pontarelli
|
|
5318
|
+
*/
|
|
5319
|
+
var AuthenticationThreats;
|
|
5320
|
+
(function (AuthenticationThreats) {
|
|
5321
|
+
AuthenticationThreats["ImpossibleTravel"] = "ImpossibleTravel";
|
|
5322
|
+
})(AuthenticationThreats = exports.AuthenticationThreats || (exports.AuthenticationThreats = {}));
|
|
5323
|
+
/**
|
|
5324
|
+
* Describes the <a href="https://www.w3.org/TR/webauthn-2/#authenticator-attachment-modality">authenticator attachment modality</a>.
|
|
5325
|
+
*
|
|
5326
|
+
* @author Spencer Witt
|
|
5327
|
+
*/
|
|
5328
|
+
var AuthenticatorAttachment;
|
|
5329
|
+
(function (AuthenticatorAttachment) {
|
|
5330
|
+
AuthenticatorAttachment["platform"] = "platform";
|
|
5331
|
+
AuthenticatorAttachment["crossPlatform"] = "crossPlatform";
|
|
5332
|
+
})(AuthenticatorAttachment = exports.AuthenticatorAttachment || (exports.AuthenticatorAttachment = {}));
|
|
5333
|
+
/**
|
|
5334
|
+
* Describes the authenticator attachment modality preference for a WebAuthn workflow. See {@link AuthenticatorAttachment}
|
|
5166
5335
|
*
|
|
5336
|
+
* @author Spencer Witt
|
|
5337
|
+
*/
|
|
5338
|
+
var AuthenticatorAttachmentPreference;
|
|
5339
|
+
(function (AuthenticatorAttachmentPreference) {
|
|
5340
|
+
AuthenticatorAttachmentPreference["any"] = "any";
|
|
5341
|
+
AuthenticatorAttachmentPreference["platform"] = "platform";
|
|
5342
|
+
AuthenticatorAttachmentPreference["crossPlatform"] = "crossPlatform";
|
|
5343
|
+
})(AuthenticatorAttachmentPreference = exports.AuthenticatorAttachmentPreference || (exports.AuthenticatorAttachmentPreference = {}));
|
|
5344
|
+
var TOTPAlgorithm;
|
|
5345
|
+
(function (TOTPAlgorithm) {
|
|
5346
|
+
TOTPAlgorithm["HmacSHA1"] = "HmacSHA1";
|
|
5347
|
+
TOTPAlgorithm["HmacSHA256"] = "HmacSHA256";
|
|
5348
|
+
TOTPAlgorithm["HmacSHA512"] = "HmacSHA512";
|
|
5349
|
+
})(TOTPAlgorithm = exports.TOTPAlgorithm || (exports.TOTPAlgorithm = {}));
|
|
5350
|
+
/**
|
|
5167
5351
|
* @author Daniel DeGroff
|
|
5168
5352
|
*/
|
|
5169
|
-
var
|
|
5170
|
-
(function (
|
|
5171
|
-
|
|
5172
|
-
|
|
5173
|
-
|
|
5353
|
+
var BreachedPasswordStatus;
|
|
5354
|
+
(function (BreachedPasswordStatus) {
|
|
5355
|
+
BreachedPasswordStatus["None"] = "None";
|
|
5356
|
+
BreachedPasswordStatus["ExactMatch"] = "ExactMatch";
|
|
5357
|
+
BreachedPasswordStatus["SubAddressMatch"] = "SubAddressMatch";
|
|
5358
|
+
BreachedPasswordStatus["PasswordOnly"] = "PasswordOnly";
|
|
5359
|
+
BreachedPasswordStatus["CommonPassword"] = "CommonPassword";
|
|
5360
|
+
})(BreachedPasswordStatus = exports.BreachedPasswordStatus || (exports.BreachedPasswordStatus = {}));
|
|
5174
5361
|
/**
|
|
5175
|
-
*
|
|
5362
|
+
* XML canonicalization method enumeration. This is used for the IdP and SP side of FusionAuth SAML.
|
|
5176
5363
|
*
|
|
5177
5364
|
* @author Brian Pontarelli
|
|
5178
5365
|
*/
|
|
5179
|
-
var
|
|
5180
|
-
(function (
|
|
5181
|
-
|
|
5182
|
-
|
|
5183
|
-
|
|
5184
|
-
|
|
5366
|
+
var CanonicalizationMethod;
|
|
5367
|
+
(function (CanonicalizationMethod) {
|
|
5368
|
+
CanonicalizationMethod["exclusive"] = "exclusive";
|
|
5369
|
+
CanonicalizationMethod["exclusive_with_comments"] = "exclusive_with_comments";
|
|
5370
|
+
CanonicalizationMethod["inclusive"] = "inclusive";
|
|
5371
|
+
CanonicalizationMethod["inclusive_with_comments"] = "inclusive_with_comments";
|
|
5372
|
+
})(CanonicalizationMethod = exports.CanonicalizationMethod || (exports.CanonicalizationMethod = {}));
|
|
5185
5373
|
/**
|
|
5186
|
-
* @author
|
|
5374
|
+
* @author Brett Pontarelli
|
|
5187
5375
|
*/
|
|
5188
|
-
var
|
|
5189
|
-
(function (
|
|
5190
|
-
|
|
5191
|
-
|
|
5192
|
-
|
|
5193
|
-
|
|
5194
|
-
(
|
|
5195
|
-
|
|
5196
|
-
|
|
5197
|
-
|
|
5198
|
-
|
|
5376
|
+
var CaptchaMethod;
|
|
5377
|
+
(function (CaptchaMethod) {
|
|
5378
|
+
CaptchaMethod["GoogleRecaptchaV2"] = "GoogleRecaptchaV2";
|
|
5379
|
+
CaptchaMethod["GoogleRecaptchaV3"] = "GoogleRecaptchaV3";
|
|
5380
|
+
CaptchaMethod["HCaptcha"] = "HCaptcha";
|
|
5381
|
+
CaptchaMethod["HCaptchaEnterprise"] = "HCaptchaEnterprise";
|
|
5382
|
+
})(CaptchaMethod = exports.CaptchaMethod || (exports.CaptchaMethod = {}));
|
|
5383
|
+
/**
|
|
5384
|
+
* @author Trevor Smith
|
|
5385
|
+
*/
|
|
5386
|
+
var ChangePasswordReason;
|
|
5387
|
+
(function (ChangePasswordReason) {
|
|
5388
|
+
ChangePasswordReason["Administrative"] = "Administrative";
|
|
5389
|
+
ChangePasswordReason["Breached"] = "Breached";
|
|
5390
|
+
ChangePasswordReason["Expired"] = "Expired";
|
|
5391
|
+
ChangePasswordReason["Validation"] = "Validation";
|
|
5392
|
+
})(ChangePasswordReason = exports.ChangePasswordReason || (exports.ChangePasswordReason = {}));
|
|
5393
|
+
/**
|
|
5394
|
+
* @author Brett Guy
|
|
5395
|
+
*/
|
|
5396
|
+
var ClientAuthenticationPolicy;
|
|
5397
|
+
(function (ClientAuthenticationPolicy) {
|
|
5398
|
+
ClientAuthenticationPolicy["Required"] = "Required";
|
|
5399
|
+
ClientAuthenticationPolicy["NotRequired"] = "NotRequired";
|
|
5400
|
+
ClientAuthenticationPolicy["NotRequiredWhenUsingPKCE"] = "NotRequiredWhenUsingPKCE";
|
|
5401
|
+
})(ClientAuthenticationPolicy = exports.ClientAuthenticationPolicy || (exports.ClientAuthenticationPolicy = {}));
|
|
5402
|
+
/**
|
|
5403
|
+
* The types of connectors. This enum is stored as an ordinal on the <code>identities</code> table, order must be maintained.
|
|
5404
|
+
*
|
|
5405
|
+
* @author Trevor Smith
|
|
5406
|
+
*/
|
|
5407
|
+
var ConnectorType;
|
|
5408
|
+
(function (ConnectorType) {
|
|
5409
|
+
ConnectorType["FusionAuth"] = "FusionAuth";
|
|
5410
|
+
ConnectorType["Generic"] = "Generic";
|
|
5411
|
+
ConnectorType["LDAP"] = "LDAP";
|
|
5412
|
+
})(ConnectorType = exports.ConnectorType || (exports.ConnectorType = {}));
|
|
5413
|
+
/**
|
|
5414
|
+
* Models a consent.
|
|
5415
|
+
*
|
|
5416
|
+
* @author Daniel DeGroff
|
|
5417
|
+
*/
|
|
5418
|
+
var ConsentStatus;
|
|
5419
|
+
(function (ConsentStatus) {
|
|
5420
|
+
ConsentStatus["Active"] = "Active";
|
|
5421
|
+
ConsentStatus["Revoked"] = "Revoked";
|
|
5422
|
+
})(ConsentStatus = exports.ConsentStatus || (exports.ConsentStatus = {}));
|
|
5423
|
+
/**
|
|
5424
|
+
* Status for content like usernames, profile attributes, etc.
|
|
5425
|
+
*
|
|
5426
|
+
* @author Brian Pontarelli
|
|
5427
|
+
*/
|
|
5428
|
+
var ContentStatus;
|
|
5429
|
+
(function (ContentStatus) {
|
|
5430
|
+
ContentStatus["ACTIVE"] = "ACTIVE";
|
|
5431
|
+
ContentStatus["PENDING"] = "PENDING";
|
|
5432
|
+
ContentStatus["REJECTED"] = "REJECTED";
|
|
5433
|
+
})(ContentStatus = exports.ContentStatus || (exports.ContentStatus = {}));
|
|
5199
5434
|
/**
|
|
5200
5435
|
* A number identifying a cryptographic algorithm. Values should be registered with the <a
|
|
5201
5436
|
* href="https://www.iana.org/assignments/cose/cose.xhtml#algorithms">IANA COSE Algorithms registry</a>
|
|
@@ -5214,47 +5449,169 @@ var CoseAlgorithmIdentifier;
|
|
|
5214
5449
|
CoseAlgorithmIdentifier["PS384"] = "SHA-384";
|
|
5215
5450
|
CoseAlgorithmIdentifier["PS512"] = "SHA-512";
|
|
5216
5451
|
})(CoseAlgorithmIdentifier = exports.CoseAlgorithmIdentifier || (exports.CoseAlgorithmIdentifier = {}));
|
|
5452
|
+
/**
|
|
5453
|
+
* COSE Elliptic Curve identifier to determine which elliptic curve to use with a given key
|
|
5454
|
+
*
|
|
5455
|
+
* @author Spencer Witt
|
|
5456
|
+
*/
|
|
5457
|
+
var CoseEllipticCurve;
|
|
5458
|
+
(function (CoseEllipticCurve) {
|
|
5459
|
+
CoseEllipticCurve["Reserved"] = "Reserved";
|
|
5460
|
+
CoseEllipticCurve["P256"] = "P256";
|
|
5461
|
+
CoseEllipticCurve["P384"] = "P384";
|
|
5462
|
+
CoseEllipticCurve["P521"] = "P521";
|
|
5463
|
+
CoseEllipticCurve["X25519"] = "X25519";
|
|
5464
|
+
CoseEllipticCurve["X448"] = "X448";
|
|
5465
|
+
CoseEllipticCurve["Ed25519"] = "Ed25519";
|
|
5466
|
+
CoseEllipticCurve["Ed448"] = "Ed448";
|
|
5467
|
+
CoseEllipticCurve["Secp256k1"] = "Secp256k1";
|
|
5468
|
+
})(CoseEllipticCurve = exports.CoseEllipticCurve || (exports.CoseEllipticCurve = {}));
|
|
5469
|
+
/**
|
|
5470
|
+
* COSE key type
|
|
5471
|
+
*
|
|
5472
|
+
* @author Spencer Witt
|
|
5473
|
+
*/
|
|
5474
|
+
var CoseKeyType;
|
|
5475
|
+
(function (CoseKeyType) {
|
|
5476
|
+
CoseKeyType["Reserved"] = "0";
|
|
5477
|
+
CoseKeyType["OKP"] = "1";
|
|
5478
|
+
CoseKeyType["EC2"] = "2";
|
|
5479
|
+
CoseKeyType["RSA"] = "3";
|
|
5480
|
+
CoseKeyType["Symmetric"] = "4";
|
|
5481
|
+
})(CoseKeyType = exports.CoseKeyType || (exports.CoseKeyType = {}));
|
|
5482
|
+
var DeviceType;
|
|
5483
|
+
(function (DeviceType) {
|
|
5484
|
+
DeviceType["BROWSER"] = "BROWSER";
|
|
5485
|
+
DeviceType["DESKTOP"] = "DESKTOP";
|
|
5486
|
+
DeviceType["LAPTOP"] = "LAPTOP";
|
|
5487
|
+
DeviceType["MOBILE"] = "MOBILE";
|
|
5488
|
+
DeviceType["OTHER"] = "OTHER";
|
|
5489
|
+
DeviceType["SERVER"] = "SERVER";
|
|
5490
|
+
DeviceType["TABLET"] = "TABLET";
|
|
5491
|
+
DeviceType["TV"] = "TV";
|
|
5492
|
+
DeviceType["UNKNOWN"] = "UNKNOWN";
|
|
5493
|
+
})(DeviceType = exports.DeviceType || (exports.DeviceType = {}));
|
|
5494
|
+
var EmailSecurityType;
|
|
5495
|
+
(function (EmailSecurityType) {
|
|
5496
|
+
EmailSecurityType["NONE"] = "NONE";
|
|
5497
|
+
EmailSecurityType["SSL"] = "SSL";
|
|
5498
|
+
EmailSecurityType["TLS"] = "TLS";
|
|
5499
|
+
})(EmailSecurityType = exports.EmailSecurityType || (exports.EmailSecurityType = {}));
|
|
5500
|
+
/**
|
|
5501
|
+
* Event Log Type
|
|
5502
|
+
*
|
|
5503
|
+
* @author Daniel DeGroff
|
|
5504
|
+
*/
|
|
5505
|
+
var EventLogType;
|
|
5506
|
+
(function (EventLogType) {
|
|
5507
|
+
EventLogType["Information"] = "Information";
|
|
5508
|
+
EventLogType["Debug"] = "Debug";
|
|
5509
|
+
EventLogType["Error"] = "Error";
|
|
5510
|
+
})(EventLogType = exports.EventLogType || (exports.EventLogType = {}));
|
|
5511
|
+
/**
|
|
5512
|
+
* Models the event types that FusionAuth produces.
|
|
5513
|
+
*
|
|
5514
|
+
* @author Brian Pontarelli
|
|
5515
|
+
*/
|
|
5516
|
+
var EventType;
|
|
5517
|
+
(function (EventType) {
|
|
5518
|
+
EventType["JWTPublicKeyUpdate"] = "jwt.public-key.update";
|
|
5519
|
+
EventType["JWTRefreshTokenRevoke"] = "jwt.refresh-token.revoke";
|
|
5520
|
+
EventType["JWTRefresh"] = "jwt.refresh";
|
|
5521
|
+
EventType["AuditLogCreate"] = "audit-log.create";
|
|
5522
|
+
EventType["EventLogCreate"] = "event-log.create";
|
|
5523
|
+
EventType["KickstartSuccess"] = "kickstart.success";
|
|
5524
|
+
EventType["GroupCreate"] = "group.create";
|
|
5525
|
+
EventType["GroupCreateComplete"] = "group.create.complete";
|
|
5526
|
+
EventType["GroupDelete"] = "group.delete";
|
|
5527
|
+
EventType["GroupDeleteComplete"] = "group.delete.complete";
|
|
5528
|
+
EventType["GroupMemberAdd"] = "group.member.add";
|
|
5529
|
+
EventType["GroupMemberAddComplete"] = "group.member.add.complete";
|
|
5530
|
+
EventType["GroupMemberRemove"] = "group.member.remove";
|
|
5531
|
+
EventType["GroupMemberRemoveComplete"] = "group.member.remove.complete";
|
|
5532
|
+
EventType["GroupMemberUpdate"] = "group.member.update";
|
|
5533
|
+
EventType["GroupMemberUpdateComplete"] = "group.member.update.complete";
|
|
5534
|
+
EventType["GroupUpdate"] = "group.update";
|
|
5535
|
+
EventType["GroupUpdateComplete"] = "group.update.complete";
|
|
5536
|
+
EventType["UserAction"] = "user.action";
|
|
5537
|
+
EventType["UserBulkCreate"] = "user.bulk.create";
|
|
5538
|
+
EventType["UserCreate"] = "user.create";
|
|
5539
|
+
EventType["UserCreateComplete"] = "user.create.complete";
|
|
5540
|
+
EventType["UserDeactivate"] = "user.deactivate";
|
|
5541
|
+
EventType["UserDelete"] = "user.delete";
|
|
5542
|
+
EventType["UserDeleteComplete"] = "user.delete.complete";
|
|
5543
|
+
EventType["UserEmailUpdate"] = "user.email.update";
|
|
5544
|
+
EventType["UserEmailVerified"] = "user.email.verified";
|
|
5545
|
+
EventType["UserIdentityProviderLink"] = "user.identity-provider.link";
|
|
5546
|
+
EventType["UserIdentityProviderUnlink"] = "user.identity-provider.unlink";
|
|
5547
|
+
EventType["UserLoginIdDuplicateOnCreate"] = "user.loginId.duplicate.create";
|
|
5548
|
+
EventType["UserLoginIdDuplicateOnUpdate"] = "user.loginId.duplicate.update";
|
|
5549
|
+
EventType["UserLoginFailed"] = "user.login.failed";
|
|
5550
|
+
EventType["UserLoginNewDevice"] = "user.login.new-device";
|
|
5551
|
+
EventType["UserLoginSuccess"] = "user.login.success";
|
|
5552
|
+
EventType["UserLoginSuspicious"] = "user.login.suspicious";
|
|
5553
|
+
EventType["UserPasswordBreach"] = "user.password.breach";
|
|
5554
|
+
EventType["UserPasswordResetSend"] = "user.password.reset.send";
|
|
5555
|
+
EventType["UserPasswordResetStart"] = "user.password.reset.start";
|
|
5556
|
+
EventType["UserPasswordResetSuccess"] = "user.password.reset.success";
|
|
5557
|
+
EventType["UserPasswordUpdate"] = "user.password.update";
|
|
5558
|
+
EventType["UserReactivate"] = "user.reactivate";
|
|
5559
|
+
EventType["UserRegistrationCreate"] = "user.registration.create";
|
|
5560
|
+
EventType["UserRegistrationCreateComplete"] = "user.registration.create.complete";
|
|
5561
|
+
EventType["UserRegistrationDelete"] = "user.registration.delete";
|
|
5562
|
+
EventType["UserRegistrationDeleteComplete"] = "user.registration.delete.complete";
|
|
5563
|
+
EventType["UserRegistrationUpdate"] = "user.registration.update";
|
|
5564
|
+
EventType["UserRegistrationUpdateComplete"] = "user.registration.update.complete";
|
|
5565
|
+
EventType["UserRegistrationVerified"] = "user.registration.verified";
|
|
5566
|
+
EventType["UserTwoFactorMethodAdd"] = "user.two-factor.method.add";
|
|
5567
|
+
EventType["UserTwoFactorMethodRemove"] = "user.two-factor.method.remove";
|
|
5568
|
+
EventType["UserUpdate"] = "user.update";
|
|
5569
|
+
EventType["UserUpdateComplete"] = "user.update.complete";
|
|
5570
|
+
EventType["Test"] = "test";
|
|
5571
|
+
})(EventType = exports.EventType || (exports.EventType = {}));
|
|
5217
5572
|
/**
|
|
5218
5573
|
* @author Brian Pontarelli
|
|
5219
5574
|
*/
|
|
5220
|
-
var
|
|
5221
|
-
(function (
|
|
5222
|
-
|
|
5223
|
-
|
|
5224
|
-
|
|
5225
|
-
|
|
5226
|
-
|
|
5227
|
-
|
|
5575
|
+
var ExpiryUnit;
|
|
5576
|
+
(function (ExpiryUnit) {
|
|
5577
|
+
ExpiryUnit["MINUTES"] = "MINUTES";
|
|
5578
|
+
ExpiryUnit["HOURS"] = "HOURS";
|
|
5579
|
+
ExpiryUnit["DAYS"] = "DAYS";
|
|
5580
|
+
ExpiryUnit["WEEKS"] = "WEEKS";
|
|
5581
|
+
ExpiryUnit["MONTHS"] = "MONTHS";
|
|
5582
|
+
ExpiryUnit["YEARS"] = "YEARS";
|
|
5583
|
+
})(ExpiryUnit = exports.ExpiryUnit || (exports.ExpiryUnit = {}));
|
|
5584
|
+
var FamilyRole;
|
|
5585
|
+
(function (FamilyRole) {
|
|
5586
|
+
FamilyRole["Child"] = "Child";
|
|
5587
|
+
FamilyRole["Teen"] = "Teen";
|
|
5588
|
+
FamilyRole["Adult"] = "Adult";
|
|
5589
|
+
})(FamilyRole = exports.FamilyRole || (exports.FamilyRole = {}));
|
|
5228
5590
|
/**
|
|
5229
5591
|
* @author Daniel DeGroff
|
|
5230
5592
|
*/
|
|
5231
|
-
var
|
|
5232
|
-
(function (
|
|
5233
|
-
|
|
5234
|
-
|
|
5235
|
-
|
|
5593
|
+
var FormControl;
|
|
5594
|
+
(function (FormControl) {
|
|
5595
|
+
FormControl["checkbox"] = "checkbox";
|
|
5596
|
+
FormControl["number"] = "number";
|
|
5597
|
+
FormControl["password"] = "password";
|
|
5598
|
+
FormControl["radio"] = "radio";
|
|
5599
|
+
FormControl["select"] = "select";
|
|
5600
|
+
FormControl["textarea"] = "textarea";
|
|
5601
|
+
FormControl["text"] = "text";
|
|
5602
|
+
})(FormControl = exports.FormControl || (exports.FormControl = {}));
|
|
5236
5603
|
/**
|
|
5237
|
-
* @author
|
|
5604
|
+
* @author Daniel DeGroff
|
|
5238
5605
|
*/
|
|
5239
|
-
var
|
|
5240
|
-
(function (
|
|
5241
|
-
|
|
5242
|
-
|
|
5243
|
-
|
|
5244
|
-
|
|
5245
|
-
|
|
5246
|
-
|
|
5247
|
-
|
|
5248
|
-
BreachAction["RecordOnly"] = "RecordOnly";
|
|
5249
|
-
BreachAction["NotifyUser"] = "NotifyUser";
|
|
5250
|
-
BreachAction["RequireChange"] = "RequireChange";
|
|
5251
|
-
})(BreachAction = exports.BreachAction || (exports.BreachAction = {}));
|
|
5252
|
-
var BreachMatchMode;
|
|
5253
|
-
(function (BreachMatchMode) {
|
|
5254
|
-
BreachMatchMode["Low"] = "Low";
|
|
5255
|
-
BreachMatchMode["Medium"] = "Medium";
|
|
5256
|
-
BreachMatchMode["High"] = "High";
|
|
5257
|
-
})(BreachMatchMode = exports.BreachMatchMode || (exports.BreachMatchMode = {}));
|
|
5606
|
+
var FormDataType;
|
|
5607
|
+
(function (FormDataType) {
|
|
5608
|
+
FormDataType["bool"] = "bool";
|
|
5609
|
+
FormDataType["consent"] = "consent";
|
|
5610
|
+
FormDataType["date"] = "date";
|
|
5611
|
+
FormDataType["email"] = "email";
|
|
5612
|
+
FormDataType["number"] = "number";
|
|
5613
|
+
FormDataType["string"] = "string";
|
|
5614
|
+
})(FormDataType = exports.FormDataType || (exports.FormDataType = {}));
|
|
5258
5615
|
/**
|
|
5259
5616
|
* @author Daniel DeGroff
|
|
5260
5617
|
*/
|
|
@@ -5264,51 +5621,34 @@ var FormFieldAdminPolicy;
|
|
|
5264
5621
|
FormFieldAdminPolicy["View"] = "View";
|
|
5265
5622
|
})(FormFieldAdminPolicy = exports.FormFieldAdminPolicy || (exports.FormFieldAdminPolicy = {}));
|
|
5266
5623
|
/**
|
|
5267
|
-
*
|
|
5268
|
-
*
|
|
5269
|
-
* @author Spencer Witt
|
|
5270
|
-
*/
|
|
5271
|
-
var AttestationConveyancePreference;
|
|
5272
|
-
(function (AttestationConveyancePreference) {
|
|
5273
|
-
AttestationConveyancePreference["none"] = "none";
|
|
5274
|
-
AttestationConveyancePreference["indirect"] = "indirect";
|
|
5275
|
-
AttestationConveyancePreference["direct"] = "direct";
|
|
5276
|
-
AttestationConveyancePreference["enterprise"] = "enterprise";
|
|
5277
|
-
})(AttestationConveyancePreference = exports.AttestationConveyancePreference || (exports.AttestationConveyancePreference = {}));
|
|
5278
|
-
/**
|
|
5279
|
-
* The possible result states of a webhook event. This tracks the success of the overall webhook transaction according to the {@link TransactionType}
|
|
5280
|
-
* and configured webhooks.
|
|
5281
|
-
*
|
|
5282
|
-
* @author Spencer Witt
|
|
5283
|
-
*/
|
|
5284
|
-
var WebhookEventResult;
|
|
5285
|
-
(function (WebhookEventResult) {
|
|
5286
|
-
WebhookEventResult["Failed"] = "Failed";
|
|
5287
|
-
WebhookEventResult["Running"] = "Running";
|
|
5288
|
-
WebhookEventResult["Succeeded"] = "Succeeded";
|
|
5289
|
-
})(WebhookEventResult = exports.WebhookEventResult || (exports.WebhookEventResult = {}));
|
|
5290
|
-
/**
|
|
5291
|
-
* Identifies the WebAuthn workflow. This will affect the parameters used for credential creation
|
|
5292
|
-
* and request based on the Tenant configuration.
|
|
5293
|
-
*
|
|
5294
|
-
* @author Spencer Witt
|
|
5624
|
+
* @author Daniel DeGroff
|
|
5295
5625
|
*/
|
|
5296
|
-
var
|
|
5297
|
-
(function (
|
|
5298
|
-
|
|
5299
|
-
|
|
5300
|
-
|
|
5301
|
-
|
|
5626
|
+
var FormType;
|
|
5627
|
+
(function (FormType) {
|
|
5628
|
+
FormType["registration"] = "registration";
|
|
5629
|
+
FormType["adminRegistration"] = "adminRegistration";
|
|
5630
|
+
FormType["adminUser"] = "adminUser";
|
|
5631
|
+
FormType["selfServiceUser"] = "selfServiceUser";
|
|
5632
|
+
})(FormType = exports.FormType || (exports.FormType = {}));
|
|
5302
5633
|
/**
|
|
5303
|
-
*
|
|
5634
|
+
* Authorization Grant types as defined by the <a href="https://tools.ietf.org/html/rfc6749">The OAuth 2.0 Authorization
|
|
5635
|
+
* Framework - RFC 6749</a>.
|
|
5636
|
+
* <p>
|
|
5637
|
+
* Specific names as defined by <a href="https://tools.ietf.org/html/rfc7591#section-4.1">
|
|
5638
|
+
* OAuth 2.0 Dynamic Client Registration Protocol - RFC 7591 Section 4.1</a>
|
|
5304
5639
|
*
|
|
5305
5640
|
* @author Daniel DeGroff
|
|
5306
5641
|
*/
|
|
5307
|
-
var
|
|
5308
|
-
(function (
|
|
5309
|
-
|
|
5310
|
-
|
|
5311
|
-
|
|
5642
|
+
var GrantType;
|
|
5643
|
+
(function (GrantType) {
|
|
5644
|
+
GrantType["authorization_code"] = "authorization_code";
|
|
5645
|
+
GrantType["implicit"] = "implicit";
|
|
5646
|
+
GrantType["password"] = "password";
|
|
5647
|
+
GrantType["client_credentials"] = "client_credentials";
|
|
5648
|
+
GrantType["refresh_token"] = "refresh_token";
|
|
5649
|
+
GrantType["unknown"] = "unknown";
|
|
5650
|
+
GrantType["device_code"] = "urn:ietf:params:oauth:grant-type:device_code";
|
|
5651
|
+
})(GrantType = exports.GrantType || (exports.GrantType = {}));
|
|
5312
5652
|
/**
|
|
5313
5653
|
* @author Daniel DeGroff
|
|
5314
5654
|
*/
|
|
@@ -5323,24 +5663,84 @@ var HTTPMethod;
|
|
|
5323
5663
|
HTTPMethod["PATCH"] = "PATCH";
|
|
5324
5664
|
})(HTTPMethod = exports.HTTPMethod || (exports.HTTPMethod = {}));
|
|
5325
5665
|
/**
|
|
5666
|
+
* @author Brett Guy
|
|
5667
|
+
*/
|
|
5668
|
+
var IPAccessControlEntryAction;
|
|
5669
|
+
(function (IPAccessControlEntryAction) {
|
|
5670
|
+
IPAccessControlEntryAction["Allow"] = "Allow";
|
|
5671
|
+
IPAccessControlEntryAction["Block"] = "Block";
|
|
5672
|
+
})(IPAccessControlEntryAction = exports.IPAccessControlEntryAction || (exports.IPAccessControlEntryAction = {}));
|
|
5673
|
+
/**
|
|
5674
|
+
* The IdP behavior when no user link has been made yet.
|
|
5675
|
+
*
|
|
5326
5676
|
* @author Daniel DeGroff
|
|
5327
5677
|
*/
|
|
5328
|
-
var
|
|
5329
|
-
(function (
|
|
5330
|
-
|
|
5331
|
-
|
|
5332
|
-
|
|
5333
|
-
|
|
5334
|
-
|
|
5678
|
+
var IdentityProviderLinkingStrategy;
|
|
5679
|
+
(function (IdentityProviderLinkingStrategy) {
|
|
5680
|
+
IdentityProviderLinkingStrategy["CreatePendingLink"] = "CreatePendingLink";
|
|
5681
|
+
IdentityProviderLinkingStrategy["Disabled"] = "Disabled";
|
|
5682
|
+
IdentityProviderLinkingStrategy["LinkAnonymously"] = "LinkAnonymously";
|
|
5683
|
+
IdentityProviderLinkingStrategy["LinkByEmail"] = "LinkByEmail";
|
|
5684
|
+
IdentityProviderLinkingStrategy["LinkByEmailForExistingUser"] = "LinkByEmailForExistingUser";
|
|
5685
|
+
IdentityProviderLinkingStrategy["LinkByUsername"] = "LinkByUsername";
|
|
5686
|
+
IdentityProviderLinkingStrategy["LinkByUsernameForExistingUser"] = "LinkByUsernameForExistingUser";
|
|
5687
|
+
IdentityProviderLinkingStrategy["Unsupported"] = "Unsupported";
|
|
5688
|
+
})(IdentityProviderLinkingStrategy = exports.IdentityProviderLinkingStrategy || (exports.IdentityProviderLinkingStrategy = {}));
|
|
5689
|
+
/**
|
|
5690
|
+
* @author Brett Pontarelli
|
|
5691
|
+
*/
|
|
5692
|
+
var IdentityProviderLoginMethod;
|
|
5693
|
+
(function (IdentityProviderLoginMethod) {
|
|
5694
|
+
IdentityProviderLoginMethod["UsePopup"] = "UsePopup";
|
|
5695
|
+
IdentityProviderLoginMethod["UseRedirect"] = "UseRedirect";
|
|
5696
|
+
IdentityProviderLoginMethod["UseVendorJavaScript"] = "UseVendorJavaScript";
|
|
5697
|
+
})(IdentityProviderLoginMethod = exports.IdentityProviderLoginMethod || (exports.IdentityProviderLoginMethod = {}));
|
|
5698
|
+
var ClientAuthenticationMethod;
|
|
5699
|
+
(function (ClientAuthenticationMethod) {
|
|
5700
|
+
ClientAuthenticationMethod["none"] = "none";
|
|
5701
|
+
ClientAuthenticationMethod["client_secret_basic"] = "client_secret_basic";
|
|
5702
|
+
ClientAuthenticationMethod["client_secret_post"] = "client_secret_post";
|
|
5703
|
+
})(ClientAuthenticationMethod = exports.ClientAuthenticationMethod || (exports.ClientAuthenticationMethod = {}));
|
|
5335
5704
|
/**
|
|
5336
5705
|
* @author Daniel DeGroff
|
|
5337
5706
|
*/
|
|
5338
|
-
var
|
|
5339
|
-
(function (
|
|
5340
|
-
|
|
5341
|
-
|
|
5342
|
-
|
|
5343
|
-
|
|
5707
|
+
var IdentityProviderType;
|
|
5708
|
+
(function (IdentityProviderType) {
|
|
5709
|
+
IdentityProviderType["Apple"] = "Apple";
|
|
5710
|
+
IdentityProviderType["EpicGames"] = "EpicGames";
|
|
5711
|
+
IdentityProviderType["ExternalJWT"] = "ExternalJWT";
|
|
5712
|
+
IdentityProviderType["Facebook"] = "Facebook";
|
|
5713
|
+
IdentityProviderType["Google"] = "Google";
|
|
5714
|
+
IdentityProviderType["HYPR"] = "HYPR";
|
|
5715
|
+
IdentityProviderType["LinkedIn"] = "LinkedIn";
|
|
5716
|
+
IdentityProviderType["Nintendo"] = "Nintendo";
|
|
5717
|
+
IdentityProviderType["OpenIDConnect"] = "OpenIDConnect";
|
|
5718
|
+
IdentityProviderType["SAMLv2"] = "SAMLv2";
|
|
5719
|
+
IdentityProviderType["SAMLv2IdPInitiated"] = "SAMLv2IdPInitiated";
|
|
5720
|
+
IdentityProviderType["SonyPSN"] = "SonyPSN";
|
|
5721
|
+
IdentityProviderType["Steam"] = "Steam";
|
|
5722
|
+
IdentityProviderType["Twitch"] = "Twitch";
|
|
5723
|
+
IdentityProviderType["Twitter"] = "Twitter";
|
|
5724
|
+
IdentityProviderType["Xbox"] = "Xbox";
|
|
5725
|
+
})(IdentityProviderType = exports.IdentityProviderType || (exports.IdentityProviderType = {}));
|
|
5726
|
+
var KeyAlgorithm;
|
|
5727
|
+
(function (KeyAlgorithm) {
|
|
5728
|
+
KeyAlgorithm["ES256"] = "ES256";
|
|
5729
|
+
KeyAlgorithm["ES384"] = "ES384";
|
|
5730
|
+
KeyAlgorithm["ES512"] = "ES512";
|
|
5731
|
+
KeyAlgorithm["HS256"] = "HS256";
|
|
5732
|
+
KeyAlgorithm["HS384"] = "HS384";
|
|
5733
|
+
KeyAlgorithm["HS512"] = "HS512";
|
|
5734
|
+
KeyAlgorithm["RS256"] = "RS256";
|
|
5735
|
+
KeyAlgorithm["RS384"] = "RS384";
|
|
5736
|
+
KeyAlgorithm["RS512"] = "RS512";
|
|
5737
|
+
})(KeyAlgorithm = exports.KeyAlgorithm || (exports.KeyAlgorithm = {}));
|
|
5738
|
+
var KeyType;
|
|
5739
|
+
(function (KeyType) {
|
|
5740
|
+
KeyType["EC"] = "EC";
|
|
5741
|
+
KeyType["RSA"] = "RSA";
|
|
5742
|
+
KeyType["HMAC"] = "HMAC";
|
|
5743
|
+
})(KeyType = exports.KeyType || (exports.KeyType = {}));
|
|
5344
5744
|
/**
|
|
5345
5745
|
* The use type of a key.
|
|
5346
5746
|
*
|
|
@@ -5352,193 +5752,98 @@ var KeyUse;
|
|
|
5352
5752
|
KeyUse["SignAndVerify"] = "SignAndVerify";
|
|
5353
5753
|
KeyUse["VerifyOnly"] = "VerifyOnly";
|
|
5354
5754
|
})(KeyUse = exports.KeyUse || (exports.KeyUse = {}));
|
|
5755
|
+
var LDAPSecurityMethod;
|
|
5756
|
+
(function (LDAPSecurityMethod) {
|
|
5757
|
+
LDAPSecurityMethod["None"] = "None";
|
|
5758
|
+
LDAPSecurityMethod["LDAPS"] = "LDAPS";
|
|
5759
|
+
LDAPSecurityMethod["StartTLS"] = "StartTLS";
|
|
5760
|
+
})(LDAPSecurityMethod = exports.LDAPSecurityMethod || (exports.LDAPSecurityMethod = {}));
|
|
5355
5761
|
/**
|
|
5356
5762
|
* @author Daniel DeGroff
|
|
5357
5763
|
*/
|
|
5358
|
-
var
|
|
5359
|
-
(function (
|
|
5360
|
-
|
|
5361
|
-
|
|
5362
|
-
|
|
5363
|
-
BreachedPasswordStatus["PasswordOnly"] = "PasswordOnly";
|
|
5364
|
-
BreachedPasswordStatus["CommonPassword"] = "CommonPassword";
|
|
5365
|
-
})(BreachedPasswordStatus = exports.BreachedPasswordStatus || (exports.BreachedPasswordStatus = {}));
|
|
5366
|
-
/**
|
|
5367
|
-
* @author Daniel DeGroff
|
|
5368
|
-
*/
|
|
5369
|
-
var FormControl;
|
|
5370
|
-
(function (FormControl) {
|
|
5371
|
-
FormControl["checkbox"] = "checkbox";
|
|
5372
|
-
FormControl["number"] = "number";
|
|
5373
|
-
FormControl["password"] = "password";
|
|
5374
|
-
FormControl["radio"] = "radio";
|
|
5375
|
-
FormControl["select"] = "select";
|
|
5376
|
-
FormControl["textarea"] = "textarea";
|
|
5377
|
-
FormControl["text"] = "text";
|
|
5378
|
-
})(FormControl = exports.FormControl || (exports.FormControl = {}));
|
|
5764
|
+
var LambdaEngineType;
|
|
5765
|
+
(function (LambdaEngineType) {
|
|
5766
|
+
LambdaEngineType["GraalJS"] = "GraalJS";
|
|
5767
|
+
LambdaEngineType["Nashorn"] = "Nashorn";
|
|
5768
|
+
})(LambdaEngineType = exports.LambdaEngineType || (exports.LambdaEngineType = {}));
|
|
5379
5769
|
/**
|
|
5380
|
-
*
|
|
5381
|
-
* or run in backwards compatibility mode.
|
|
5770
|
+
* The types of lambdas that indicate how they are invoked by FusionAuth.
|
|
5382
5771
|
*
|
|
5383
|
-
* @author
|
|
5772
|
+
* @author Brian Pontarelli
|
|
5384
5773
|
*/
|
|
5385
|
-
var
|
|
5386
|
-
(function (
|
|
5387
|
-
|
|
5388
|
-
|
|
5389
|
-
|
|
5774
|
+
var LambdaType;
|
|
5775
|
+
(function (LambdaType) {
|
|
5776
|
+
LambdaType["JWTPopulate"] = "JWTPopulate";
|
|
5777
|
+
LambdaType["OpenIDReconcile"] = "OpenIDReconcile";
|
|
5778
|
+
LambdaType["SAMLv2Reconcile"] = "SAMLv2Reconcile";
|
|
5779
|
+
LambdaType["SAMLv2Populate"] = "SAMLv2Populate";
|
|
5780
|
+
LambdaType["AppleReconcile"] = "AppleReconcile";
|
|
5781
|
+
LambdaType["ExternalJWTReconcile"] = "ExternalJWTReconcile";
|
|
5782
|
+
LambdaType["FacebookReconcile"] = "FacebookReconcile";
|
|
5783
|
+
LambdaType["GoogleReconcile"] = "GoogleReconcile";
|
|
5784
|
+
LambdaType["HYPRReconcile"] = "HYPRReconcile";
|
|
5785
|
+
LambdaType["TwitterReconcile"] = "TwitterReconcile";
|
|
5786
|
+
LambdaType["LDAPConnectorReconcile"] = "LDAPConnectorReconcile";
|
|
5787
|
+
LambdaType["LinkedInReconcile"] = "LinkedInReconcile";
|
|
5788
|
+
LambdaType["EpicGamesReconcile"] = "EpicGamesReconcile";
|
|
5789
|
+
LambdaType["NintendoReconcile"] = "NintendoReconcile";
|
|
5790
|
+
LambdaType["SonyPSNReconcile"] = "SonyPSNReconcile";
|
|
5791
|
+
LambdaType["SteamReconcile"] = "SteamReconcile";
|
|
5792
|
+
LambdaType["TwitchReconcile"] = "TwitchReconcile";
|
|
5793
|
+
LambdaType["XboxReconcile"] = "XboxReconcile";
|
|
5794
|
+
LambdaType["ClientCredentialsJWTPopulate"] = "ClientCredentialsJWTPopulate";
|
|
5795
|
+
LambdaType["SCIMServerGroupRequestConverter"] = "SCIMServerGroupRequestConverter";
|
|
5796
|
+
LambdaType["SCIMServerGroupResponseConverter"] = "SCIMServerGroupResponseConverter";
|
|
5797
|
+
LambdaType["SCIMServerUserRequestConverter"] = "SCIMServerUserRequestConverter";
|
|
5798
|
+
LambdaType["SCIMServerUserResponseConverter"] = "SCIMServerUserResponseConverter";
|
|
5799
|
+
LambdaType["SelfServiceRegistrationValidation"] = "SelfServiceRegistrationValidation";
|
|
5800
|
+
LambdaType["UserInfoPopulate"] = "UserInfoPopulate";
|
|
5801
|
+
LambdaType["LoginValidation"] = "LoginValidation";
|
|
5802
|
+
})(LambdaType = exports.LambdaType || (exports.LambdaType = {}));
|
|
5390
5803
|
/**
|
|
5391
|
-
*
|
|
5392
|
-
*
|
|
5393
|
-
* @author Spencer Witt
|
|
5804
|
+
* @author Matthew Altman
|
|
5394
5805
|
*/
|
|
5395
|
-
var
|
|
5396
|
-
(function (
|
|
5397
|
-
|
|
5398
|
-
|
|
5399
|
-
|
|
5400
|
-
})(WebhookAttemptResult = exports.WebhookAttemptResult || (exports.WebhookAttemptResult = {}));
|
|
5806
|
+
var LogoutBehavior;
|
|
5807
|
+
(function (LogoutBehavior) {
|
|
5808
|
+
LogoutBehavior["RedirectOnly"] = "RedirectOnly";
|
|
5809
|
+
LogoutBehavior["AllApplications"] = "AllApplications";
|
|
5810
|
+
})(LogoutBehavior = exports.LogoutBehavior || (exports.LogoutBehavior = {}));
|
|
5401
5811
|
/**
|
|
5402
|
-
*
|
|
5403
|
-
*
|
|
5404
|
-
* @author Daniel DeGroff
|
|
5812
|
+
* @author Mikey Sleevi
|
|
5405
5813
|
*/
|
|
5406
|
-
var
|
|
5407
|
-
(function (
|
|
5408
|
-
|
|
5409
|
-
|
|
5410
|
-
EventLogType["Error"] = "Error";
|
|
5411
|
-
})(EventLogType = exports.EventLogType || (exports.EventLogType = {}));
|
|
5814
|
+
var MessageType;
|
|
5815
|
+
(function (MessageType) {
|
|
5816
|
+
MessageType["SMS"] = "SMS";
|
|
5817
|
+
})(MessageType = exports.MessageType || (exports.MessageType = {}));
|
|
5412
5818
|
/**
|
|
5413
|
-
*
|
|
5414
|
-
*
|
|
5415
|
-
* @author Brian Pontarelli
|
|
5819
|
+
* @author Brett Guy
|
|
5416
5820
|
*/
|
|
5417
|
-
var
|
|
5418
|
-
(function (
|
|
5419
|
-
|
|
5420
|
-
|
|
5421
|
-
|
|
5422
|
-
|
|
5423
|
-
TransactionType["AbsoluteMajority"] = "AbsoluteMajority";
|
|
5424
|
-
})(TransactionType = exports.TransactionType || (exports.TransactionType = {}));
|
|
5425
|
-
/**
|
|
5426
|
-
* COSE key type
|
|
5427
|
-
*
|
|
5428
|
-
* @author Spencer Witt
|
|
5429
|
-
*/
|
|
5430
|
-
var CoseKeyType;
|
|
5431
|
-
(function (CoseKeyType) {
|
|
5432
|
-
CoseKeyType["Reserved"] = "0";
|
|
5433
|
-
CoseKeyType["OKP"] = "1";
|
|
5434
|
-
CoseKeyType["EC2"] = "2";
|
|
5435
|
-
CoseKeyType["RSA"] = "3";
|
|
5436
|
-
CoseKeyType["Symmetric"] = "4";
|
|
5437
|
-
})(CoseKeyType = exports.CoseKeyType || (exports.CoseKeyType = {}));
|
|
5438
|
-
var ThemeType;
|
|
5439
|
-
(function (ThemeType) {
|
|
5440
|
-
ThemeType["advanced"] = "advanced";
|
|
5441
|
-
ThemeType["simple"] = "simple";
|
|
5442
|
-
})(ThemeType = exports.ThemeType || (exports.ThemeType = {}));
|
|
5443
|
-
/**
|
|
5444
|
-
* The types of connectors. This enum is stored as an ordinal on the <code>identities</code> table, order must be maintained.
|
|
5445
|
-
*
|
|
5446
|
-
* @author Trevor Smith
|
|
5447
|
-
*/
|
|
5448
|
-
var ConnectorType;
|
|
5449
|
-
(function (ConnectorType) {
|
|
5450
|
-
ConnectorType["FusionAuth"] = "FusionAuth";
|
|
5451
|
-
ConnectorType["Generic"] = "Generic";
|
|
5452
|
-
ConnectorType["LDAP"] = "LDAP";
|
|
5453
|
-
})(ConnectorType = exports.ConnectorType || (exports.ConnectorType = {}));
|
|
5454
|
-
/**
|
|
5455
|
-
* @author Brett Guy
|
|
5456
|
-
*/
|
|
5457
|
-
var ProofKeyForCodeExchangePolicy;
|
|
5458
|
-
(function (ProofKeyForCodeExchangePolicy) {
|
|
5459
|
-
ProofKeyForCodeExchangePolicy["Required"] = "Required";
|
|
5460
|
-
ProofKeyForCodeExchangePolicy["NotRequired"] = "NotRequired";
|
|
5461
|
-
ProofKeyForCodeExchangePolicy["NotRequiredWhenUsingClientAuthentication"] = "NotRequiredWhenUsingClientAuthentication";
|
|
5462
|
-
})(ProofKeyForCodeExchangePolicy = exports.ProofKeyForCodeExchangePolicy || (exports.ProofKeyForCodeExchangePolicy = {}));
|
|
5463
|
-
/**
|
|
5464
|
-
* @author Mikey Sleevi
|
|
5465
|
-
*/
|
|
5466
|
-
var MessageType;
|
|
5467
|
-
(function (MessageType) {
|
|
5468
|
-
MessageType["SMS"] = "SMS";
|
|
5469
|
-
})(MessageType = exports.MessageType || (exports.MessageType = {}));
|
|
5470
|
-
/**
|
|
5471
|
-
* Describes the Relying Party's requirements for <a href="https://www.w3.org/TR/webauthn-2/#client-side-discoverable-credential">client-side
|
|
5472
|
-
* discoverable credentials</a> (formerly known as "resident keys")
|
|
5473
|
-
*
|
|
5474
|
-
* @author Spencer Witt
|
|
5475
|
-
*/
|
|
5476
|
-
var ResidentKeyRequirement;
|
|
5477
|
-
(function (ResidentKeyRequirement) {
|
|
5478
|
-
ResidentKeyRequirement["discouraged"] = "discouraged";
|
|
5479
|
-
ResidentKeyRequirement["preferred"] = "preferred";
|
|
5480
|
-
ResidentKeyRequirement["required"] = "required";
|
|
5481
|
-
})(ResidentKeyRequirement = exports.ResidentKeyRequirement || (exports.ResidentKeyRequirement = {}));
|
|
5482
|
-
/**
|
|
5483
|
-
* @author Trevor Smith
|
|
5484
|
-
*/
|
|
5485
|
-
var ChangePasswordReason;
|
|
5486
|
-
(function (ChangePasswordReason) {
|
|
5487
|
-
ChangePasswordReason["Administrative"] = "Administrative";
|
|
5488
|
-
ChangePasswordReason["Breached"] = "Breached";
|
|
5489
|
-
ChangePasswordReason["Expired"] = "Expired";
|
|
5490
|
-
ChangePasswordReason["Validation"] = "Validation";
|
|
5491
|
-
})(ChangePasswordReason = exports.ChangePasswordReason || (exports.ChangePasswordReason = {}));
|
|
5492
|
-
var LDAPSecurityMethod;
|
|
5493
|
-
(function (LDAPSecurityMethod) {
|
|
5494
|
-
LDAPSecurityMethod["None"] = "None";
|
|
5495
|
-
LDAPSecurityMethod["LDAPS"] = "LDAPS";
|
|
5496
|
-
LDAPSecurityMethod["StartTLS"] = "StartTLS";
|
|
5497
|
-
})(LDAPSecurityMethod = exports.LDAPSecurityMethod || (exports.LDAPSecurityMethod = {}));
|
|
5821
|
+
var MessengerType;
|
|
5822
|
+
(function (MessengerType) {
|
|
5823
|
+
MessengerType["Generic"] = "Generic";
|
|
5824
|
+
MessengerType["Kafka"] = "Kafka";
|
|
5825
|
+
MessengerType["Twilio"] = "Twilio";
|
|
5826
|
+
})(MessengerType = exports.MessengerType || (exports.MessengerType = {}));
|
|
5498
5827
|
/**
|
|
5499
|
-
* @author
|
|
5828
|
+
* @author Daniel DeGroff
|
|
5500
5829
|
*/
|
|
5501
|
-
var
|
|
5502
|
-
(function (
|
|
5503
|
-
|
|
5504
|
-
|
|
5505
|
-
|
|
5830
|
+
var MultiFactorLoginPolicy;
|
|
5831
|
+
(function (MultiFactorLoginPolicy) {
|
|
5832
|
+
MultiFactorLoginPolicy["Disabled"] = "Disabled";
|
|
5833
|
+
MultiFactorLoginPolicy["Enabled"] = "Enabled";
|
|
5834
|
+
MultiFactorLoginPolicy["Required"] = "Required";
|
|
5835
|
+
})(MultiFactorLoginPolicy = exports.MultiFactorLoginPolicy || (exports.MultiFactorLoginPolicy = {}));
|
|
5506
5836
|
/**
|
|
5507
|
-
*
|
|
5837
|
+
* The application's relationship to the authorization server. First-party applications will be granted implicit permission for requested scopes.
|
|
5838
|
+
* Third-party applications will use the {@link OAuthScopeConsentMode} policy.
|
|
5508
5839
|
*
|
|
5509
5840
|
* @author Spencer Witt
|
|
5510
5841
|
*/
|
|
5511
|
-
var
|
|
5512
|
-
(function (
|
|
5513
|
-
|
|
5514
|
-
|
|
5515
|
-
})(
|
|
5516
|
-
/**
|
|
5517
|
-
* @author Brett Pontarelli
|
|
5518
|
-
*/
|
|
5519
|
-
var IdentityProviderLoginMethod;
|
|
5520
|
-
(function (IdentityProviderLoginMethod) {
|
|
5521
|
-
IdentityProviderLoginMethod["UsePopup"] = "UsePopup";
|
|
5522
|
-
IdentityProviderLoginMethod["UseRedirect"] = "UseRedirect";
|
|
5523
|
-
IdentityProviderLoginMethod["UseVendorJavaScript"] = "UseVendorJavaScript";
|
|
5524
|
-
})(IdentityProviderLoginMethod = exports.IdentityProviderLoginMethod || (exports.IdentityProviderLoginMethod = {}));
|
|
5525
|
-
/**
|
|
5526
|
-
* @author Daniel DeGroff
|
|
5527
|
-
*/
|
|
5528
|
-
var RefreshTokenUsagePolicy;
|
|
5529
|
-
(function (RefreshTokenUsagePolicy) {
|
|
5530
|
-
RefreshTokenUsagePolicy["Reusable"] = "Reusable";
|
|
5531
|
-
RefreshTokenUsagePolicy["OneTimeUse"] = "OneTimeUse";
|
|
5532
|
-
})(RefreshTokenUsagePolicy = exports.RefreshTokenUsagePolicy || (exports.RefreshTokenUsagePolicy = {}));
|
|
5533
|
-
/**
|
|
5534
|
-
* @author Lyle Schemmerling
|
|
5535
|
-
*/
|
|
5536
|
-
var SAMLv2DestinationAssertionPolicy;
|
|
5537
|
-
(function (SAMLv2DestinationAssertionPolicy) {
|
|
5538
|
-
SAMLv2DestinationAssertionPolicy["Enabled"] = "Enabled";
|
|
5539
|
-
SAMLv2DestinationAssertionPolicy["Disabled"] = "Disabled";
|
|
5540
|
-
SAMLv2DestinationAssertionPolicy["AllowAlternates"] = "AllowAlternates";
|
|
5541
|
-
})(SAMLv2DestinationAssertionPolicy = exports.SAMLv2DestinationAssertionPolicy || (exports.SAMLv2DestinationAssertionPolicy = {}));
|
|
5842
|
+
var OAuthApplicationRelationship;
|
|
5843
|
+
(function (OAuthApplicationRelationship) {
|
|
5844
|
+
OAuthApplicationRelationship["FirstParty"] = "FirstParty";
|
|
5845
|
+
OAuthApplicationRelationship["ThirdParty"] = "ThirdParty";
|
|
5846
|
+
})(OAuthApplicationRelationship = exports.OAuthApplicationRelationship || (exports.OAuthApplicationRelationship = {}));
|
|
5542
5847
|
var OAuthErrorReason;
|
|
5543
5848
|
(function (OAuthErrorReason) {
|
|
5544
5849
|
OAuthErrorReason["auth_code_not_found"] = "auth_code_not_found";
|
|
@@ -5569,6 +5874,7 @@ var OAuthErrorReason;
|
|
|
5569
5874
|
OAuthErrorReason["invalid_target_entity_scope"] = "invalid_target_entity_scope";
|
|
5570
5875
|
OAuthErrorReason["invalid_entity_permission_scope"] = "invalid_entity_permission_scope";
|
|
5571
5876
|
OAuthErrorReason["invalid_user_id"] = "invalid_user_id";
|
|
5877
|
+
OAuthErrorReason["invalid_tenant_id"] = "invalid_tenant_id";
|
|
5572
5878
|
OAuthErrorReason["grant_type_disabled"] = "grant_type_disabled";
|
|
5573
5879
|
OAuthErrorReason["missing_client_id"] = "missing_client_id";
|
|
5574
5880
|
OAuthErrorReason["missing_client_secret"] = "missing_client_secret";
|
|
@@ -5584,6 +5890,7 @@ var OAuthErrorReason;
|
|
|
5584
5890
|
OAuthErrorReason["missing_user_code"] = "missing_user_code";
|
|
5585
5891
|
OAuthErrorReason["missing_user_id"] = "missing_user_id";
|
|
5586
5892
|
OAuthErrorReason["missing_verification_uri"] = "missing_verification_uri";
|
|
5893
|
+
OAuthErrorReason["missing_tenant_id"] = "missing_tenant_id";
|
|
5587
5894
|
OAuthErrorReason["login_prevented"] = "login_prevented";
|
|
5588
5895
|
OAuthErrorReason["not_licensed"] = "not_licensed";
|
|
5589
5896
|
OAuthErrorReason["user_code_expired"] = "user_code_expired";
|
|
@@ -5622,27 +5929,77 @@ var OAuthErrorType;
|
|
|
5622
5929
|
OAuthErrorType["expired_token"] = "expired_token";
|
|
5623
5930
|
OAuthErrorType["unsupported_token_type"] = "unsupported_token_type";
|
|
5624
5931
|
})(OAuthErrorType = exports.OAuthErrorType || (exports.OAuthErrorType = {}));
|
|
5625
|
-
|
|
5626
|
-
|
|
5627
|
-
|
|
5628
|
-
|
|
5629
|
-
|
|
5630
|
-
|
|
5631
|
-
|
|
5632
|
-
|
|
5633
|
-
|
|
5634
|
-
|
|
5635
|
-
|
|
5636
|
-
})(
|
|
5932
|
+
/**
|
|
5933
|
+
* Controls the policy for requesting user permission to grant access to requested scopes during an OAuth workflow
|
|
5934
|
+
* for a third-party application.
|
|
5935
|
+
*
|
|
5936
|
+
* @author Spencer Witt
|
|
5937
|
+
*/
|
|
5938
|
+
var OAuthScopeConsentMode;
|
|
5939
|
+
(function (OAuthScopeConsentMode) {
|
|
5940
|
+
OAuthScopeConsentMode["AlwaysPrompt"] = "AlwaysPrompt";
|
|
5941
|
+
OAuthScopeConsentMode["RememberDecision"] = "RememberDecision";
|
|
5942
|
+
OAuthScopeConsentMode["NeverPrompt"] = "NeverPrompt";
|
|
5943
|
+
})(OAuthScopeConsentMode = exports.OAuthScopeConsentMode || (exports.OAuthScopeConsentMode = {}));
|
|
5944
|
+
/**
|
|
5945
|
+
* Controls the policy for whether OAuth workflows will more strictly adhere to the OAuth and OIDC specification
|
|
5946
|
+
* or run in backwards compatibility mode.
|
|
5947
|
+
*
|
|
5948
|
+
* @author David Charles
|
|
5949
|
+
*/
|
|
5950
|
+
var OAuthScopeHandlingPolicy;
|
|
5951
|
+
(function (OAuthScopeHandlingPolicy) {
|
|
5952
|
+
OAuthScopeHandlingPolicy["Compatibility"] = "Compatibility";
|
|
5953
|
+
OAuthScopeHandlingPolicy["Strict"] = "Strict";
|
|
5954
|
+
})(OAuthScopeHandlingPolicy = exports.OAuthScopeHandlingPolicy || (exports.OAuthScopeHandlingPolicy = {}));
|
|
5955
|
+
/**
|
|
5956
|
+
* @author Johnathon Wood
|
|
5957
|
+
*/
|
|
5958
|
+
var Oauth2AuthorizedURLValidationPolicy;
|
|
5959
|
+
(function (Oauth2AuthorizedURLValidationPolicy) {
|
|
5960
|
+
Oauth2AuthorizedURLValidationPolicy["AllowWildcards"] = "AllowWildcards";
|
|
5961
|
+
Oauth2AuthorizedURLValidationPolicy["ExactMatch"] = "ExactMatch";
|
|
5962
|
+
})(Oauth2AuthorizedURLValidationPolicy = exports.Oauth2AuthorizedURLValidationPolicy || (exports.Oauth2AuthorizedURLValidationPolicy = {}));
|
|
5637
5963
|
/**
|
|
5638
5964
|
* @author Daniel DeGroff
|
|
5639
5965
|
*/
|
|
5640
|
-
var
|
|
5641
|
-
(function (
|
|
5642
|
-
|
|
5643
|
-
|
|
5644
|
-
|
|
5645
|
-
})(
|
|
5966
|
+
var ObjectState;
|
|
5967
|
+
(function (ObjectState) {
|
|
5968
|
+
ObjectState["Active"] = "Active";
|
|
5969
|
+
ObjectState["Inactive"] = "Inactive";
|
|
5970
|
+
ObjectState["PendingDelete"] = "PendingDelete";
|
|
5971
|
+
})(ObjectState = exports.ObjectState || (exports.ObjectState = {}));
|
|
5972
|
+
var BreachAction;
|
|
5973
|
+
(function (BreachAction) {
|
|
5974
|
+
BreachAction["Off"] = "Off";
|
|
5975
|
+
BreachAction["RecordOnly"] = "RecordOnly";
|
|
5976
|
+
BreachAction["NotifyUser"] = "NotifyUser";
|
|
5977
|
+
BreachAction["RequireChange"] = "RequireChange";
|
|
5978
|
+
})(BreachAction = exports.BreachAction || (exports.BreachAction = {}));
|
|
5979
|
+
var BreachMatchMode;
|
|
5980
|
+
(function (BreachMatchMode) {
|
|
5981
|
+
BreachMatchMode["Low"] = "Low";
|
|
5982
|
+
BreachMatchMode["Medium"] = "Medium";
|
|
5983
|
+
BreachMatchMode["High"] = "High";
|
|
5984
|
+
})(BreachMatchMode = exports.BreachMatchMode || (exports.BreachMatchMode = {}));
|
|
5985
|
+
/**
|
|
5986
|
+
* @author Brett Guy
|
|
5987
|
+
*/
|
|
5988
|
+
var ProofKeyForCodeExchangePolicy;
|
|
5989
|
+
(function (ProofKeyForCodeExchangePolicy) {
|
|
5990
|
+
ProofKeyForCodeExchangePolicy["Required"] = "Required";
|
|
5991
|
+
ProofKeyForCodeExchangePolicy["NotRequired"] = "NotRequired";
|
|
5992
|
+
ProofKeyForCodeExchangePolicy["NotRequiredWhenUsingClientAuthentication"] = "NotRequiredWhenUsingClientAuthentication";
|
|
5993
|
+
})(ProofKeyForCodeExchangePolicy = exports.ProofKeyForCodeExchangePolicy || (exports.ProofKeyForCodeExchangePolicy = {}));
|
|
5994
|
+
/**
|
|
5995
|
+
* Defines valid credential types. This is an extension point in the WebAuthn spec. The only defined value at this time is "public-key"
|
|
5996
|
+
*
|
|
5997
|
+
* @author Spencer Witt
|
|
5998
|
+
*/
|
|
5999
|
+
var PublicKeyCredentialType;
|
|
6000
|
+
(function (PublicKeyCredentialType) {
|
|
6001
|
+
PublicKeyCredentialType["publicKey"] = "public-key";
|
|
6002
|
+
})(PublicKeyCredentialType = exports.PublicKeyCredentialType || (exports.PublicKeyCredentialType = {}));
|
|
5646
6003
|
/**
|
|
5647
6004
|
* @author Daniel DeGroff
|
|
5648
6005
|
*/
|
|
@@ -5655,325 +6012,73 @@ var RateLimitedRequestType;
|
|
|
5655
6012
|
RateLimitedRequestType["SendRegistrationVerification"] = "SendRegistrationVerification";
|
|
5656
6013
|
RateLimitedRequestType["SendTwoFactor"] = "SendTwoFactor";
|
|
5657
6014
|
})(RateLimitedRequestType = exports.RateLimitedRequestType || (exports.RateLimitedRequestType = {}));
|
|
6015
|
+
/**
|
|
6016
|
+
* @author Brian Pontarelli
|
|
6017
|
+
*/
|
|
6018
|
+
var ReactorFeatureStatus;
|
|
6019
|
+
(function (ReactorFeatureStatus) {
|
|
6020
|
+
ReactorFeatureStatus["ACTIVE"] = "ACTIVE";
|
|
6021
|
+
ReactorFeatureStatus["DISCONNECTED"] = "DISCONNECTED";
|
|
6022
|
+
ReactorFeatureStatus["PENDING"] = "PENDING";
|
|
6023
|
+
ReactorFeatureStatus["DISABLED"] = "DISABLED";
|
|
6024
|
+
ReactorFeatureStatus["UNKNOWN"] = "UNKNOWN";
|
|
6025
|
+
})(ReactorFeatureStatus = exports.ReactorFeatureStatus || (exports.ReactorFeatureStatus = {}));
|
|
5658
6026
|
/**
|
|
5659
6027
|
* @author Daniel DeGroff
|
|
5660
6028
|
*/
|
|
5661
|
-
var
|
|
5662
|
-
(function (
|
|
5663
|
-
|
|
5664
|
-
|
|
5665
|
-
|
|
6029
|
+
var RefreshTokenExpirationPolicy;
|
|
6030
|
+
(function (RefreshTokenExpirationPolicy) {
|
|
6031
|
+
RefreshTokenExpirationPolicy["Fixed"] = "Fixed";
|
|
6032
|
+
RefreshTokenExpirationPolicy["SlidingWindow"] = "SlidingWindow";
|
|
6033
|
+
RefreshTokenExpirationPolicy["SlidingWindowWithMaximumLifetime"] = "SlidingWindowWithMaximumLifetime";
|
|
6034
|
+
})(RefreshTokenExpirationPolicy = exports.RefreshTokenExpirationPolicy || (exports.RefreshTokenExpirationPolicy = {}));
|
|
5666
6035
|
/**
|
|
5667
|
-
*
|
|
5668
|
-
|
|
6036
|
+
* @author Daniel DeGroff
|
|
6037
|
+
*/
|
|
6038
|
+
var RefreshTokenUsagePolicy;
|
|
6039
|
+
(function (RefreshTokenUsagePolicy) {
|
|
6040
|
+
RefreshTokenUsagePolicy["Reusable"] = "Reusable";
|
|
6041
|
+
RefreshTokenUsagePolicy["OneTimeUse"] = "OneTimeUse";
|
|
6042
|
+
})(RefreshTokenUsagePolicy = exports.RefreshTokenUsagePolicy || (exports.RefreshTokenUsagePolicy = {}));
|
|
6043
|
+
/**
|
|
6044
|
+
* Describes the Relying Party's requirements for <a href="https://www.w3.org/TR/webauthn-2/#client-side-discoverable-credential">client-side
|
|
6045
|
+
* discoverable credentials</a> (formerly known as "resident keys")
|
|
5669
6046
|
*
|
|
5670
6047
|
* @author Spencer Witt
|
|
5671
6048
|
*/
|
|
5672
|
-
var
|
|
5673
|
-
(function (
|
|
5674
|
-
|
|
5675
|
-
|
|
5676
|
-
|
|
5677
|
-
})(
|
|
5678
|
-
/**
|
|
5679
|
-
* @author
|
|
5680
|
-
*/
|
|
5681
|
-
var
|
|
5682
|
-
(function (
|
|
5683
|
-
|
|
5684
|
-
|
|
5685
|
-
|
|
5686
|
-
})(
|
|
5687
|
-
/**
|
|
5688
|
-
* @author Daniel DeGroff
|
|
5689
|
-
*/
|
|
5690
|
-
var FormType;
|
|
5691
|
-
(function (FormType) {
|
|
5692
|
-
FormType["registration"] = "registration";
|
|
5693
|
-
FormType["adminRegistration"] = "adminRegistration";
|
|
5694
|
-
FormType["adminUser"] = "adminUser";
|
|
5695
|
-
FormType["selfServiceUser"] = "selfServiceUser";
|
|
5696
|
-
})(FormType = exports.FormType || (exports.FormType = {}));
|
|
5697
|
-
/**
|
|
5698
|
-
* XML canonicalization method enumeration. This is used for the IdP and SP side of FusionAuth SAML.
|
|
5699
|
-
*
|
|
5700
|
-
* @author Brian Pontarelli
|
|
5701
|
-
*/
|
|
5702
|
-
var CanonicalizationMethod;
|
|
5703
|
-
(function (CanonicalizationMethod) {
|
|
5704
|
-
CanonicalizationMethod["exclusive"] = "exclusive";
|
|
5705
|
-
CanonicalizationMethod["exclusive_with_comments"] = "exclusive_with_comments";
|
|
5706
|
-
CanonicalizationMethod["inclusive"] = "inclusive";
|
|
5707
|
-
CanonicalizationMethod["inclusive_with_comments"] = "inclusive_with_comments";
|
|
5708
|
-
})(CanonicalizationMethod = exports.CanonicalizationMethod || (exports.CanonicalizationMethod = {}));
|
|
5709
|
-
/**
|
|
5710
|
-
* @author Brian Pontarelli
|
|
5711
|
-
*/
|
|
5712
|
-
var ExpiryUnit;
|
|
5713
|
-
(function (ExpiryUnit) {
|
|
5714
|
-
ExpiryUnit["MINUTES"] = "MINUTES";
|
|
5715
|
-
ExpiryUnit["HOURS"] = "HOURS";
|
|
5716
|
-
ExpiryUnit["DAYS"] = "DAYS";
|
|
5717
|
-
ExpiryUnit["WEEKS"] = "WEEKS";
|
|
5718
|
-
ExpiryUnit["MONTHS"] = "MONTHS";
|
|
5719
|
-
ExpiryUnit["YEARS"] = "YEARS";
|
|
5720
|
-
})(ExpiryUnit = exports.ExpiryUnit || (exports.ExpiryUnit = {}));
|
|
5721
|
-
/**
|
|
5722
|
-
* @author Daniel DeGroff
|
|
5723
|
-
*/
|
|
5724
|
-
var SecureGeneratorType;
|
|
5725
|
-
(function (SecureGeneratorType) {
|
|
5726
|
-
SecureGeneratorType["randomDigits"] = "randomDigits";
|
|
5727
|
-
SecureGeneratorType["randomBytes"] = "randomBytes";
|
|
5728
|
-
SecureGeneratorType["randomAlpha"] = "randomAlpha";
|
|
5729
|
-
SecureGeneratorType["randomAlphaNumeric"] = "randomAlphaNumeric";
|
|
5730
|
-
})(SecureGeneratorType = exports.SecureGeneratorType || (exports.SecureGeneratorType = {}));
|
|
5731
|
-
/**
|
|
5732
|
-
* @author Daniel DeGroff
|
|
5733
|
-
*/
|
|
5734
|
-
var FormDataType;
|
|
5735
|
-
(function (FormDataType) {
|
|
5736
|
-
FormDataType["bool"] = "bool";
|
|
5737
|
-
FormDataType["consent"] = "consent";
|
|
5738
|
-
FormDataType["date"] = "date";
|
|
5739
|
-
FormDataType["email"] = "email";
|
|
5740
|
-
FormDataType["number"] = "number";
|
|
5741
|
-
FormDataType["string"] = "string";
|
|
5742
|
-
})(FormDataType = exports.FormDataType || (exports.FormDataType = {}));
|
|
5743
|
-
/**
|
|
5744
|
-
* The IdP behavior when no user link has been made yet.
|
|
5745
|
-
*
|
|
5746
|
-
* @author Daniel DeGroff
|
|
5747
|
-
*/
|
|
5748
|
-
var IdentityProviderLinkingStrategy;
|
|
5749
|
-
(function (IdentityProviderLinkingStrategy) {
|
|
5750
|
-
IdentityProviderLinkingStrategy["CreatePendingLink"] = "CreatePendingLink";
|
|
5751
|
-
IdentityProviderLinkingStrategy["Disabled"] = "Disabled";
|
|
5752
|
-
IdentityProviderLinkingStrategy["LinkAnonymously"] = "LinkAnonymously";
|
|
5753
|
-
IdentityProviderLinkingStrategy["LinkByEmail"] = "LinkByEmail";
|
|
5754
|
-
IdentityProviderLinkingStrategy["LinkByEmailForExistingUser"] = "LinkByEmailForExistingUser";
|
|
5755
|
-
IdentityProviderLinkingStrategy["LinkByUsername"] = "LinkByUsername";
|
|
5756
|
-
IdentityProviderLinkingStrategy["LinkByUsernameForExistingUser"] = "LinkByUsernameForExistingUser";
|
|
5757
|
-
IdentityProviderLinkingStrategy["Unsupported"] = "Unsupported";
|
|
5758
|
-
})(IdentityProviderLinkingStrategy = exports.IdentityProviderLinkingStrategy || (exports.IdentityProviderLinkingStrategy = {}));
|
|
5759
|
-
/**
|
|
5760
|
-
* @author Daniel DeGroff
|
|
5761
|
-
*/
|
|
5762
|
-
var MultiFactorLoginPolicy;
|
|
5763
|
-
(function (MultiFactorLoginPolicy) {
|
|
5764
|
-
MultiFactorLoginPolicy["Disabled"] = "Disabled";
|
|
5765
|
-
MultiFactorLoginPolicy["Enabled"] = "Enabled";
|
|
5766
|
-
MultiFactorLoginPolicy["Required"] = "Required";
|
|
5767
|
-
})(MultiFactorLoginPolicy = exports.MultiFactorLoginPolicy || (exports.MultiFactorLoginPolicy = {}));
|
|
5768
|
-
/**
|
|
5769
|
-
* @author Brett Guy
|
|
5770
|
-
*/
|
|
5771
|
-
var IPAccessControlEntryAction;
|
|
5772
|
-
(function (IPAccessControlEntryAction) {
|
|
5773
|
-
IPAccessControlEntryAction["Allow"] = "Allow";
|
|
5774
|
-
IPAccessControlEntryAction["Block"] = "Block";
|
|
5775
|
-
})(IPAccessControlEntryAction = exports.IPAccessControlEntryAction || (exports.IPAccessControlEntryAction = {}));
|
|
5776
|
-
/**
|
|
5777
|
-
* The phases of a time-based user action.
|
|
5778
|
-
*
|
|
5779
|
-
* @author Brian Pontarelli
|
|
5780
|
-
*/
|
|
5781
|
-
var UserActionPhase;
|
|
5782
|
-
(function (UserActionPhase) {
|
|
5783
|
-
UserActionPhase["start"] = "start";
|
|
5784
|
-
UserActionPhase["modify"] = "modify";
|
|
5785
|
-
UserActionPhase["cancel"] = "cancel";
|
|
5786
|
-
UserActionPhase["end"] = "end";
|
|
5787
|
-
})(UserActionPhase = exports.UserActionPhase || (exports.UserActionPhase = {}));
|
|
5788
|
-
/**
|
|
5789
|
-
* The types of lambdas that indicate how they are invoked by FusionAuth.
|
|
5790
|
-
*
|
|
5791
|
-
* @author Brian Pontarelli
|
|
5792
|
-
*/
|
|
5793
|
-
var LambdaType;
|
|
5794
|
-
(function (LambdaType) {
|
|
5795
|
-
LambdaType["JWTPopulate"] = "JWTPopulate";
|
|
5796
|
-
LambdaType["OpenIDReconcile"] = "OpenIDReconcile";
|
|
5797
|
-
LambdaType["SAMLv2Reconcile"] = "SAMLv2Reconcile";
|
|
5798
|
-
LambdaType["SAMLv2Populate"] = "SAMLv2Populate";
|
|
5799
|
-
LambdaType["AppleReconcile"] = "AppleReconcile";
|
|
5800
|
-
LambdaType["ExternalJWTReconcile"] = "ExternalJWTReconcile";
|
|
5801
|
-
LambdaType["FacebookReconcile"] = "FacebookReconcile";
|
|
5802
|
-
LambdaType["GoogleReconcile"] = "GoogleReconcile";
|
|
5803
|
-
LambdaType["HYPRReconcile"] = "HYPRReconcile";
|
|
5804
|
-
LambdaType["TwitterReconcile"] = "TwitterReconcile";
|
|
5805
|
-
LambdaType["LDAPConnectorReconcile"] = "LDAPConnectorReconcile";
|
|
5806
|
-
LambdaType["LinkedInReconcile"] = "LinkedInReconcile";
|
|
5807
|
-
LambdaType["EpicGamesReconcile"] = "EpicGamesReconcile";
|
|
5808
|
-
LambdaType["NintendoReconcile"] = "NintendoReconcile";
|
|
5809
|
-
LambdaType["SonyPSNReconcile"] = "SonyPSNReconcile";
|
|
5810
|
-
LambdaType["SteamReconcile"] = "SteamReconcile";
|
|
5811
|
-
LambdaType["TwitchReconcile"] = "TwitchReconcile";
|
|
5812
|
-
LambdaType["XboxReconcile"] = "XboxReconcile";
|
|
5813
|
-
LambdaType["ClientCredentialsJWTPopulate"] = "ClientCredentialsJWTPopulate";
|
|
5814
|
-
LambdaType["SCIMServerGroupRequestConverter"] = "SCIMServerGroupRequestConverter";
|
|
5815
|
-
LambdaType["SCIMServerGroupResponseConverter"] = "SCIMServerGroupResponseConverter";
|
|
5816
|
-
LambdaType["SCIMServerUserRequestConverter"] = "SCIMServerUserRequestConverter";
|
|
5817
|
-
LambdaType["SCIMServerUserResponseConverter"] = "SCIMServerUserResponseConverter";
|
|
5818
|
-
LambdaType["SelfServiceRegistrationValidation"] = "SelfServiceRegistrationValidation";
|
|
5819
|
-
LambdaType["UserInfoPopulate"] = "UserInfoPopulate";
|
|
5820
|
-
LambdaType["LoginValidation"] = "LoginValidation";
|
|
5821
|
-
})(LambdaType = exports.LambdaType || (exports.LambdaType = {}));
|
|
5822
|
-
/**
|
|
5823
|
-
* @author Daniel DeGroff
|
|
5824
|
-
*/
|
|
5825
|
-
var SystemTrustedProxyConfigurationPolicy;
|
|
5826
|
-
(function (SystemTrustedProxyConfigurationPolicy) {
|
|
5827
|
-
SystemTrustedProxyConfigurationPolicy["All"] = "All";
|
|
5828
|
-
SystemTrustedProxyConfigurationPolicy["OnlyConfigured"] = "OnlyConfigured";
|
|
5829
|
-
})(SystemTrustedProxyConfigurationPolicy = exports.SystemTrustedProxyConfigurationPolicy || (exports.SystemTrustedProxyConfigurationPolicy = {}));
|
|
5830
|
-
var LoginIdType;
|
|
5831
|
-
(function (LoginIdType) {
|
|
5832
|
-
LoginIdType["email"] = "email";
|
|
5833
|
-
LoginIdType["username"] = "username";
|
|
5834
|
-
})(LoginIdType = exports.LoginIdType || (exports.LoginIdType = {}));
|
|
5835
|
-
var RegistrationType;
|
|
5836
|
-
(function (RegistrationType) {
|
|
5837
|
-
RegistrationType["basic"] = "basic";
|
|
5838
|
-
RegistrationType["advanced"] = "advanced";
|
|
5839
|
-
})(RegistrationType = exports.RegistrationType || (exports.RegistrationType = {}));
|
|
5840
|
-
var SAMLLogoutBehavior;
|
|
5841
|
-
(function (SAMLLogoutBehavior) {
|
|
5842
|
-
SAMLLogoutBehavior["AllParticipants"] = "AllParticipants";
|
|
5843
|
-
SAMLLogoutBehavior["OnlyOriginator"] = "OnlyOriginator";
|
|
5844
|
-
})(SAMLLogoutBehavior = exports.SAMLLogoutBehavior || (exports.SAMLLogoutBehavior = {}));
|
|
5845
|
-
var XMLSignatureLocation;
|
|
5846
|
-
(function (XMLSignatureLocation) {
|
|
5847
|
-
XMLSignatureLocation["Assertion"] = "Assertion";
|
|
5848
|
-
XMLSignatureLocation["Response"] = "Response";
|
|
5849
|
-
})(XMLSignatureLocation = exports.XMLSignatureLocation || (exports.XMLSignatureLocation = {}));
|
|
5850
|
-
/**
|
|
5851
|
-
* @author Daniel DeGroff
|
|
5852
|
-
*/
|
|
5853
|
-
var Sort;
|
|
5854
|
-
(function (Sort) {
|
|
5855
|
-
Sort["asc"] = "asc";
|
|
5856
|
-
Sort["desc"] = "desc";
|
|
5857
|
-
})(Sort = exports.Sort || (exports.Sort = {}));
|
|
5858
|
-
/**
|
|
5859
|
-
* Describes the authenticator attachment modality preference for a WebAuthn workflow. See {@link AuthenticatorAttachment}
|
|
5860
|
-
*
|
|
5861
|
-
* @author Spencer Witt
|
|
5862
|
-
*/
|
|
5863
|
-
var AuthenticatorAttachmentPreference;
|
|
5864
|
-
(function (AuthenticatorAttachmentPreference) {
|
|
5865
|
-
AuthenticatorAttachmentPreference["any"] = "any";
|
|
5866
|
-
AuthenticatorAttachmentPreference["platform"] = "platform";
|
|
5867
|
-
AuthenticatorAttachmentPreference["crossPlatform"] = "crossPlatform";
|
|
5868
|
-
})(AuthenticatorAttachmentPreference = exports.AuthenticatorAttachmentPreference || (exports.AuthenticatorAttachmentPreference = {}));
|
|
5869
|
-
/**
|
|
5870
|
-
* Defines valid credential types. This is an extension point in the WebAuthn spec. The only defined value at this time is "public-key"
|
|
5871
|
-
*
|
|
5872
|
-
* @author Spencer Witt
|
|
5873
|
-
*/
|
|
5874
|
-
var PublicKeyCredentialType;
|
|
5875
|
-
(function (PublicKeyCredentialType) {
|
|
5876
|
-
PublicKeyCredentialType["publicKey"] = "public-key";
|
|
5877
|
-
})(PublicKeyCredentialType = exports.PublicKeyCredentialType || (exports.PublicKeyCredentialType = {}));
|
|
5878
|
-
/**
|
|
5879
|
-
* COSE Elliptic Curve identifier to determine which elliptic curve to use with a given key
|
|
5880
|
-
*
|
|
5881
|
-
* @author Spencer Witt
|
|
5882
|
-
*/
|
|
5883
|
-
var CoseEllipticCurve;
|
|
5884
|
-
(function (CoseEllipticCurve) {
|
|
5885
|
-
CoseEllipticCurve["Reserved"] = "Reserved";
|
|
5886
|
-
CoseEllipticCurve["P256"] = "P256";
|
|
5887
|
-
CoseEllipticCurve["P384"] = "P384";
|
|
5888
|
-
CoseEllipticCurve["P521"] = "P521";
|
|
5889
|
-
CoseEllipticCurve["X25519"] = "X25519";
|
|
5890
|
-
CoseEllipticCurve["X448"] = "X448";
|
|
5891
|
-
CoseEllipticCurve["Ed25519"] = "Ed25519";
|
|
5892
|
-
CoseEllipticCurve["Ed448"] = "Ed448";
|
|
5893
|
-
CoseEllipticCurve["Secp256k1"] = "Secp256k1";
|
|
5894
|
-
})(CoseEllipticCurve = exports.CoseEllipticCurve || (exports.CoseEllipticCurve = {}));
|
|
5895
|
-
var KeyAlgorithm;
|
|
5896
|
-
(function (KeyAlgorithm) {
|
|
5897
|
-
KeyAlgorithm["ES256"] = "ES256";
|
|
5898
|
-
KeyAlgorithm["ES384"] = "ES384";
|
|
5899
|
-
KeyAlgorithm["ES512"] = "ES512";
|
|
5900
|
-
KeyAlgorithm["HS256"] = "HS256";
|
|
5901
|
-
KeyAlgorithm["HS384"] = "HS384";
|
|
5902
|
-
KeyAlgorithm["HS512"] = "HS512";
|
|
5903
|
-
KeyAlgorithm["RS256"] = "RS256";
|
|
5904
|
-
KeyAlgorithm["RS384"] = "RS384";
|
|
5905
|
-
KeyAlgorithm["RS512"] = "RS512";
|
|
5906
|
-
})(KeyAlgorithm = exports.KeyAlgorithm || (exports.KeyAlgorithm = {}));
|
|
5907
|
-
var KeyType;
|
|
5908
|
-
(function (KeyType) {
|
|
5909
|
-
KeyType["EC"] = "EC";
|
|
5910
|
-
KeyType["RSA"] = "RSA";
|
|
5911
|
-
KeyType["HMAC"] = "HMAC";
|
|
5912
|
-
})(KeyType = exports.KeyType || (exports.KeyType = {}));
|
|
5913
|
-
/**
|
|
5914
|
-
* Controls the policy for requesting user permission to grant access to requested scopes during an OAuth workflow
|
|
5915
|
-
* for a third-party application.
|
|
5916
|
-
*
|
|
5917
|
-
* @author Spencer Witt
|
|
5918
|
-
*/
|
|
5919
|
-
var OAuthScopeConsentMode;
|
|
5920
|
-
(function (OAuthScopeConsentMode) {
|
|
5921
|
-
OAuthScopeConsentMode["AlwaysPrompt"] = "AlwaysPrompt";
|
|
5922
|
-
OAuthScopeConsentMode["RememberDecision"] = "RememberDecision";
|
|
5923
|
-
OAuthScopeConsentMode["NeverPrompt"] = "NeverPrompt";
|
|
5924
|
-
})(OAuthScopeConsentMode = exports.OAuthScopeConsentMode || (exports.OAuthScopeConsentMode = {}));
|
|
5925
|
-
/**
|
|
5926
|
-
* @author Daniel DeGroff
|
|
5927
|
-
*/
|
|
5928
|
-
var ObjectState;
|
|
5929
|
-
(function (ObjectState) {
|
|
5930
|
-
ObjectState["Active"] = "Active";
|
|
5931
|
-
ObjectState["Inactive"] = "Inactive";
|
|
5932
|
-
ObjectState["PendingDelete"] = "PendingDelete";
|
|
5933
|
-
})(ObjectState = exports.ObjectState || (exports.ObjectState = {}));
|
|
5934
|
-
/**
|
|
5935
|
-
* @author Daniel DeGroff
|
|
5936
|
-
*/
|
|
5937
|
-
var IdentityProviderType;
|
|
5938
|
-
(function (IdentityProviderType) {
|
|
5939
|
-
IdentityProviderType["Apple"] = "Apple";
|
|
5940
|
-
IdentityProviderType["EpicGames"] = "EpicGames";
|
|
5941
|
-
IdentityProviderType["ExternalJWT"] = "ExternalJWT";
|
|
5942
|
-
IdentityProviderType["Facebook"] = "Facebook";
|
|
5943
|
-
IdentityProviderType["Google"] = "Google";
|
|
5944
|
-
IdentityProviderType["HYPR"] = "HYPR";
|
|
5945
|
-
IdentityProviderType["LinkedIn"] = "LinkedIn";
|
|
5946
|
-
IdentityProviderType["Nintendo"] = "Nintendo";
|
|
5947
|
-
IdentityProviderType["OpenIDConnect"] = "OpenIDConnect";
|
|
5948
|
-
IdentityProviderType["SAMLv2"] = "SAMLv2";
|
|
5949
|
-
IdentityProviderType["SAMLv2IdPInitiated"] = "SAMLv2IdPInitiated";
|
|
5950
|
-
IdentityProviderType["SonyPSN"] = "SonyPSN";
|
|
5951
|
-
IdentityProviderType["Steam"] = "Steam";
|
|
5952
|
-
IdentityProviderType["Twitch"] = "Twitch";
|
|
5953
|
-
IdentityProviderType["Twitter"] = "Twitter";
|
|
5954
|
-
IdentityProviderType["Xbox"] = "Xbox";
|
|
5955
|
-
})(IdentityProviderType = exports.IdentityProviderType || (exports.IdentityProviderType = {}));
|
|
6049
|
+
var ResidentKeyRequirement;
|
|
6050
|
+
(function (ResidentKeyRequirement) {
|
|
6051
|
+
ResidentKeyRequirement["discouraged"] = "discouraged";
|
|
6052
|
+
ResidentKeyRequirement["preferred"] = "preferred";
|
|
6053
|
+
ResidentKeyRequirement["required"] = "required";
|
|
6054
|
+
})(ResidentKeyRequirement = exports.ResidentKeyRequirement || (exports.ResidentKeyRequirement = {}));
|
|
6055
|
+
/**
|
|
6056
|
+
* @author Lyle Schemmerling
|
|
6057
|
+
*/
|
|
6058
|
+
var SAMLv2DestinationAssertionPolicy;
|
|
6059
|
+
(function (SAMLv2DestinationAssertionPolicy) {
|
|
6060
|
+
SAMLv2DestinationAssertionPolicy["Enabled"] = "Enabled";
|
|
6061
|
+
SAMLv2DestinationAssertionPolicy["Disabled"] = "Disabled";
|
|
6062
|
+
SAMLv2DestinationAssertionPolicy["AllowAlternates"] = "AllowAlternates";
|
|
6063
|
+
})(SAMLv2DestinationAssertionPolicy = exports.SAMLv2DestinationAssertionPolicy || (exports.SAMLv2DestinationAssertionPolicy = {}));
|
|
5956
6064
|
/**
|
|
5957
6065
|
* @author Daniel DeGroff
|
|
5958
6066
|
*/
|
|
5959
|
-
var
|
|
5960
|
-
(function (
|
|
5961
|
-
|
|
5962
|
-
|
|
5963
|
-
|
|
5964
|
-
|
|
5965
|
-
(
|
|
5966
|
-
TOTPAlgorithm["HmacSHA1"] = "HmacSHA1";
|
|
5967
|
-
TOTPAlgorithm["HmacSHA256"] = "HmacSHA256";
|
|
5968
|
-
TOTPAlgorithm["HmacSHA512"] = "HmacSHA512";
|
|
5969
|
-
})(TOTPAlgorithm = exports.TOTPAlgorithm || (exports.TOTPAlgorithm = {}));
|
|
6067
|
+
var SecureGeneratorType;
|
|
6068
|
+
(function (SecureGeneratorType) {
|
|
6069
|
+
SecureGeneratorType["randomDigits"] = "randomDigits";
|
|
6070
|
+
SecureGeneratorType["randomBytes"] = "randomBytes";
|
|
6071
|
+
SecureGeneratorType["randomAlpha"] = "randomAlpha";
|
|
6072
|
+
SecureGeneratorType["randomAlphaNumeric"] = "randomAlphaNumeric";
|
|
6073
|
+
})(SecureGeneratorType = exports.SecureGeneratorType || (exports.SecureGeneratorType = {}));
|
|
5970
6074
|
/**
|
|
5971
|
-
* @author
|
|
6075
|
+
* @author Daniel DeGroff
|
|
5972
6076
|
*/
|
|
5973
|
-
var
|
|
5974
|
-
(function (
|
|
5975
|
-
|
|
5976
|
-
|
|
6077
|
+
var Sort;
|
|
6078
|
+
(function (Sort) {
|
|
6079
|
+
Sort["asc"] = "asc";
|
|
6080
|
+
Sort["desc"] = "desc";
|
|
6081
|
+
})(Sort = exports.Sort || (exports.Sort = {}));
|
|
5977
6082
|
/**
|
|
5978
6083
|
* Steam API modes.
|
|
5979
6084
|
*
|
|
@@ -5985,76 +6090,52 @@ var SteamAPIMode;
|
|
|
5985
6090
|
SteamAPIMode["Partner"] = "Partner";
|
|
5986
6091
|
})(SteamAPIMode = exports.SteamAPIMode || (exports.SteamAPIMode = {}));
|
|
5987
6092
|
/**
|
|
5988
|
-
* @author
|
|
6093
|
+
* @author Daniel DeGroff
|
|
5989
6094
|
*/
|
|
5990
|
-
var
|
|
5991
|
-
(function (
|
|
5992
|
-
|
|
5993
|
-
|
|
5994
|
-
|
|
5995
|
-
|
|
5996
|
-
|
|
6095
|
+
var SystemTrustedProxyConfigurationPolicy;
|
|
6096
|
+
(function (SystemTrustedProxyConfigurationPolicy) {
|
|
6097
|
+
SystemTrustedProxyConfigurationPolicy["All"] = "All";
|
|
6098
|
+
SystemTrustedProxyConfigurationPolicy["OnlyConfigured"] = "OnlyConfigured";
|
|
6099
|
+
})(SystemTrustedProxyConfigurationPolicy = exports.SystemTrustedProxyConfigurationPolicy || (exports.SystemTrustedProxyConfigurationPolicy = {}));
|
|
6100
|
+
var UniqueUsernameStrategy;
|
|
6101
|
+
(function (UniqueUsernameStrategy) {
|
|
6102
|
+
UniqueUsernameStrategy["Always"] = "Always";
|
|
6103
|
+
UniqueUsernameStrategy["OnCollision"] = "OnCollision";
|
|
6104
|
+
})(UniqueUsernameStrategy = exports.UniqueUsernameStrategy || (exports.UniqueUsernameStrategy = {}));
|
|
6105
|
+
var ThemeType;
|
|
6106
|
+
(function (ThemeType) {
|
|
6107
|
+
ThemeType["advanced"] = "advanced";
|
|
6108
|
+
ThemeType["simple"] = "simple";
|
|
6109
|
+
})(ThemeType = exports.ThemeType || (exports.ThemeType = {}));
|
|
5997
6110
|
/**
|
|
5998
|
-
*
|
|
6111
|
+
* <ul>
|
|
6112
|
+
* <li>Bearer Token type as defined by <a href="https://tools.ietf.org/html/rfc6750">RFC 6750</a>.</li>
|
|
6113
|
+
* <li>MAC Token type as referenced by <a href="https://tools.ietf.org/html/rfc6749">RFC 6749</a> and
|
|
6114
|
+
* <a href="https://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-05">
|
|
6115
|
+
* Draft RFC on OAuth 2.0 Message Authentication Code (MAC) Tokens</a>
|
|
6116
|
+
* </li>
|
|
6117
|
+
* </ul>
|
|
6118
|
+
*
|
|
6119
|
+
* @author Daniel DeGroff
|
|
6120
|
+
*/
|
|
6121
|
+
var TokenType;
|
|
6122
|
+
(function (TokenType) {
|
|
6123
|
+
TokenType["Bearer"] = "Bearer";
|
|
6124
|
+
TokenType["MAC"] = "MAC";
|
|
6125
|
+
})(TokenType = exports.TokenType || (exports.TokenType = {}));
|
|
6126
|
+
/**
|
|
6127
|
+
* The transaction types for Webhooks and other event systems within FusionAuth.
|
|
5999
6128
|
*
|
|
6000
6129
|
* @author Brian Pontarelli
|
|
6001
6130
|
*/
|
|
6002
|
-
var
|
|
6003
|
-
(function (
|
|
6004
|
-
|
|
6005
|
-
|
|
6006
|
-
|
|
6007
|
-
|
|
6008
|
-
|
|
6009
|
-
|
|
6010
|
-
EventType["GroupCreate"] = "group.create";
|
|
6011
|
-
EventType["GroupCreateComplete"] = "group.create.complete";
|
|
6012
|
-
EventType["GroupDelete"] = "group.delete";
|
|
6013
|
-
EventType["GroupDeleteComplete"] = "group.delete.complete";
|
|
6014
|
-
EventType["GroupMemberAdd"] = "group.member.add";
|
|
6015
|
-
EventType["GroupMemberAddComplete"] = "group.member.add.complete";
|
|
6016
|
-
EventType["GroupMemberRemove"] = "group.member.remove";
|
|
6017
|
-
EventType["GroupMemberRemoveComplete"] = "group.member.remove.complete";
|
|
6018
|
-
EventType["GroupMemberUpdate"] = "group.member.update";
|
|
6019
|
-
EventType["GroupMemberUpdateComplete"] = "group.member.update.complete";
|
|
6020
|
-
EventType["GroupUpdate"] = "group.update";
|
|
6021
|
-
EventType["GroupUpdateComplete"] = "group.update.complete";
|
|
6022
|
-
EventType["UserAction"] = "user.action";
|
|
6023
|
-
EventType["UserBulkCreate"] = "user.bulk.create";
|
|
6024
|
-
EventType["UserCreate"] = "user.create";
|
|
6025
|
-
EventType["UserCreateComplete"] = "user.create.complete";
|
|
6026
|
-
EventType["UserDeactivate"] = "user.deactivate";
|
|
6027
|
-
EventType["UserDelete"] = "user.delete";
|
|
6028
|
-
EventType["UserDeleteComplete"] = "user.delete.complete";
|
|
6029
|
-
EventType["UserEmailUpdate"] = "user.email.update";
|
|
6030
|
-
EventType["UserEmailVerified"] = "user.email.verified";
|
|
6031
|
-
EventType["UserIdentityProviderLink"] = "user.identity-provider.link";
|
|
6032
|
-
EventType["UserIdentityProviderUnlink"] = "user.identity-provider.unlink";
|
|
6033
|
-
EventType["UserLoginIdDuplicateOnCreate"] = "user.loginId.duplicate.create";
|
|
6034
|
-
EventType["UserLoginIdDuplicateOnUpdate"] = "user.loginId.duplicate.update";
|
|
6035
|
-
EventType["UserLoginFailed"] = "user.login.failed";
|
|
6036
|
-
EventType["UserLoginNewDevice"] = "user.login.new-device";
|
|
6037
|
-
EventType["UserLoginSuccess"] = "user.login.success";
|
|
6038
|
-
EventType["UserLoginSuspicious"] = "user.login.suspicious";
|
|
6039
|
-
EventType["UserPasswordBreach"] = "user.password.breach";
|
|
6040
|
-
EventType["UserPasswordResetSend"] = "user.password.reset.send";
|
|
6041
|
-
EventType["UserPasswordResetStart"] = "user.password.reset.start";
|
|
6042
|
-
EventType["UserPasswordResetSuccess"] = "user.password.reset.success";
|
|
6043
|
-
EventType["UserPasswordUpdate"] = "user.password.update";
|
|
6044
|
-
EventType["UserReactivate"] = "user.reactivate";
|
|
6045
|
-
EventType["UserRegistrationCreate"] = "user.registration.create";
|
|
6046
|
-
EventType["UserRegistrationCreateComplete"] = "user.registration.create.complete";
|
|
6047
|
-
EventType["UserRegistrationDelete"] = "user.registration.delete";
|
|
6048
|
-
EventType["UserRegistrationDeleteComplete"] = "user.registration.delete.complete";
|
|
6049
|
-
EventType["UserRegistrationUpdate"] = "user.registration.update";
|
|
6050
|
-
EventType["UserRegistrationUpdateComplete"] = "user.registration.update.complete";
|
|
6051
|
-
EventType["UserRegistrationVerified"] = "user.registration.verified";
|
|
6052
|
-
EventType["UserTwoFactorMethodAdd"] = "user.two-factor.method.add";
|
|
6053
|
-
EventType["UserTwoFactorMethodRemove"] = "user.two-factor.method.remove";
|
|
6054
|
-
EventType["UserUpdate"] = "user.update";
|
|
6055
|
-
EventType["UserUpdateComplete"] = "user.update.complete";
|
|
6056
|
-
EventType["Test"] = "test";
|
|
6057
|
-
})(EventType = exports.EventType || (exports.EventType = {}));
|
|
6131
|
+
var TransactionType;
|
|
6132
|
+
(function (TransactionType) {
|
|
6133
|
+
TransactionType["None"] = "None";
|
|
6134
|
+
TransactionType["Any"] = "Any";
|
|
6135
|
+
TransactionType["SimpleMajority"] = "SimpleMajority";
|
|
6136
|
+
TransactionType["SuperMajority"] = "SuperMajority";
|
|
6137
|
+
TransactionType["AbsoluteMajority"] = "AbsoluteMajority";
|
|
6138
|
+
})(TransactionType = exports.TransactionType || (exports.TransactionType = {}));
|
|
6058
6139
|
/**
|
|
6059
6140
|
* Policy for handling unknown OAuth scopes in the request
|
|
6060
6141
|
*
|
|
@@ -6067,41 +6148,88 @@ var UnknownScopePolicy;
|
|
|
6067
6148
|
UnknownScopePolicy["Reject"] = "Reject";
|
|
6068
6149
|
})(UnknownScopePolicy = exports.UnknownScopePolicy || (exports.UnknownScopePolicy = {}));
|
|
6069
6150
|
/**
|
|
6070
|
-
*
|
|
6071
|
-
|
|
6151
|
+
* @author Daniel DeGroff
|
|
6152
|
+
*/
|
|
6153
|
+
var UnverifiedBehavior;
|
|
6154
|
+
(function (UnverifiedBehavior) {
|
|
6155
|
+
UnverifiedBehavior["Allow"] = "Allow";
|
|
6156
|
+
UnverifiedBehavior["Gated"] = "Gated";
|
|
6157
|
+
})(UnverifiedBehavior = exports.UnverifiedBehavior || (exports.UnverifiedBehavior = {}));
|
|
6158
|
+
/**
|
|
6159
|
+
* The phases of a time-based user action.
|
|
6072
6160
|
*
|
|
6073
|
-
* @author
|
|
6161
|
+
* @author Brian Pontarelli
|
|
6074
6162
|
*/
|
|
6075
|
-
var
|
|
6076
|
-
(function (
|
|
6077
|
-
|
|
6078
|
-
|
|
6079
|
-
|
|
6080
|
-
|
|
6081
|
-
(
|
|
6082
|
-
ClientAuthenticationMethod["none"] = "none";
|
|
6083
|
-
ClientAuthenticationMethod["client_secret_basic"] = "client_secret_basic";
|
|
6084
|
-
ClientAuthenticationMethod["client_secret_post"] = "client_secret_post";
|
|
6085
|
-
})(ClientAuthenticationMethod = exports.ClientAuthenticationMethod || (exports.ClientAuthenticationMethod = {}));
|
|
6163
|
+
var UserActionPhase;
|
|
6164
|
+
(function (UserActionPhase) {
|
|
6165
|
+
UserActionPhase["start"] = "start";
|
|
6166
|
+
UserActionPhase["modify"] = "modify";
|
|
6167
|
+
UserActionPhase["cancel"] = "cancel";
|
|
6168
|
+
UserActionPhase["end"] = "end";
|
|
6169
|
+
})(UserActionPhase = exports.UserActionPhase || (exports.UserActionPhase = {}));
|
|
6086
6170
|
/**
|
|
6087
|
-
*
|
|
6171
|
+
* @author Daniel DeGroff
|
|
6172
|
+
*/
|
|
6173
|
+
var UserState;
|
|
6174
|
+
(function (UserState) {
|
|
6175
|
+
UserState["Authenticated"] = "Authenticated";
|
|
6176
|
+
UserState["AuthenticatedNotRegistered"] = "AuthenticatedNotRegistered";
|
|
6177
|
+
UserState["AuthenticatedNotVerified"] = "AuthenticatedNotVerified";
|
|
6178
|
+
UserState["AuthenticatedRegistrationNotVerified"] = "AuthenticatedRegistrationNotVerified";
|
|
6179
|
+
})(UserState = exports.UserState || (exports.UserState = {}));
|
|
6180
|
+
/**
|
|
6181
|
+
* Used to express whether the Relying Party requires <a href="https://www.w3.org/TR/webauthn-2/#user-verification">user verification</a> for the
|
|
6182
|
+
* current operation.
|
|
6088
6183
|
*
|
|
6184
|
+
* @author Spencer Witt
|
|
6185
|
+
*/
|
|
6186
|
+
var UserVerificationRequirement;
|
|
6187
|
+
(function (UserVerificationRequirement) {
|
|
6188
|
+
UserVerificationRequirement["required"] = "required";
|
|
6189
|
+
UserVerificationRequirement["preferred"] = "preferred";
|
|
6190
|
+
UserVerificationRequirement["discouraged"] = "discouraged";
|
|
6191
|
+
})(UserVerificationRequirement = exports.UserVerificationRequirement || (exports.UserVerificationRequirement = {}));
|
|
6192
|
+
/**
|
|
6089
6193
|
* @author Daniel DeGroff
|
|
6090
6194
|
*/
|
|
6091
|
-
var
|
|
6092
|
-
(function (
|
|
6093
|
-
|
|
6094
|
-
|
|
6095
|
-
|
|
6096
|
-
|
|
6097
|
-
|
|
6098
|
-
|
|
6099
|
-
|
|
6100
|
-
|
|
6101
|
-
|
|
6102
|
-
|
|
6103
|
-
|
|
6104
|
-
|
|
6105
|
-
|
|
6106
|
-
|
|
6195
|
+
var VerificationStrategy;
|
|
6196
|
+
(function (VerificationStrategy) {
|
|
6197
|
+
VerificationStrategy["ClickableLink"] = "ClickableLink";
|
|
6198
|
+
VerificationStrategy["FormField"] = "FormField";
|
|
6199
|
+
})(VerificationStrategy = exports.VerificationStrategy || (exports.VerificationStrategy = {}));
|
|
6200
|
+
/**
|
|
6201
|
+
* Identifies the WebAuthn workflow. This will affect the parameters used for credential creation
|
|
6202
|
+
* and request based on the Tenant configuration.
|
|
6203
|
+
*
|
|
6204
|
+
* @author Spencer Witt
|
|
6205
|
+
*/
|
|
6206
|
+
var WebAuthnWorkflow;
|
|
6207
|
+
(function (WebAuthnWorkflow) {
|
|
6208
|
+
WebAuthnWorkflow["bootstrap"] = "bootstrap";
|
|
6209
|
+
WebAuthnWorkflow["general"] = "general";
|
|
6210
|
+
WebAuthnWorkflow["reauthentication"] = "reauthentication";
|
|
6211
|
+
})(WebAuthnWorkflow = exports.WebAuthnWorkflow || (exports.WebAuthnWorkflow = {}));
|
|
6212
|
+
/**
|
|
6213
|
+
* The possible states of an individual webhook attempt to a single endpoint.
|
|
6214
|
+
*
|
|
6215
|
+
* @author Spencer Witt
|
|
6216
|
+
*/
|
|
6217
|
+
var WebhookAttemptResult;
|
|
6218
|
+
(function (WebhookAttemptResult) {
|
|
6219
|
+
WebhookAttemptResult["Success"] = "Success";
|
|
6220
|
+
WebhookAttemptResult["Failure"] = "Failure";
|
|
6221
|
+
WebhookAttemptResult["Unknown"] = "Unknown";
|
|
6222
|
+
})(WebhookAttemptResult = exports.WebhookAttemptResult || (exports.WebhookAttemptResult = {}));
|
|
6223
|
+
/**
|
|
6224
|
+
* The possible result states of a webhook event. This tracks the success of the overall webhook transaction according to the {@link TransactionType}
|
|
6225
|
+
* and configured webhooks.
|
|
6226
|
+
*
|
|
6227
|
+
* @author Spencer Witt
|
|
6228
|
+
*/
|
|
6229
|
+
var WebhookEventResult;
|
|
6230
|
+
(function (WebhookEventResult) {
|
|
6231
|
+
WebhookEventResult["Failed"] = "Failed";
|
|
6232
|
+
WebhookEventResult["Running"] = "Running";
|
|
6233
|
+
WebhookEventResult["Succeeded"] = "Succeeded";
|
|
6234
|
+
})(WebhookEventResult = exports.WebhookEventResult || (exports.WebhookEventResult = {}));
|
|
6107
6235
|
//# sourceMappingURL=FusionAuthClient.js.map
|