@fusionauth/typescript-client 1.56.0 → 1.58.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,6 +1,6 @@
1
1
  "use strict";
2
2
  /*
3
- * Copyright (c) 2019-2023, FusionAuth, All Rights Reserved
3
+ * Copyright (c) 2019-2025, FusionAuth, All Rights Reserved
4
4
  *
5
5
  * Licensed under the Apache License, Version 2.0 (the "License");
6
6
  * you may not use this file except in compliance with the License.
@@ -15,7 +15,7 @@
15
15
  * language governing permissions and limitations under the License.
16
16
  */
17
17
  Object.defineProperty(exports, "__esModule", { value: true });
18
- exports.Algorithm = exports.ClientAuthenticationMethod = exports.OAuthApplicationRelationship = exports.UnknownScopePolicy = exports.EventType = exports.CaptchaMethod = exports.SteamAPIMode = exports.AuthenticationThreats = exports.TOTPAlgorithm = exports.VerificationStrategy = exports.IdentityProviderType = exports.ObjectState = exports.OAuthScopeConsentMode = exports.KeyType = exports.KeyAlgorithm = exports.CoseEllipticCurve = exports.PublicKeyCredentialType = exports.AuthenticatorAttachmentPreference = exports.Sort = exports.XMLSignatureLocation = exports.SAMLLogoutBehavior = exports.RegistrationType = exports.LoginIdType = exports.SystemTrustedProxyConfigurationPolicy = exports.LambdaType = exports.UserActionPhase = exports.IPAccessControlEntryAction = exports.MultiFactorLoginPolicy = exports.IdentityProviderLinkingStrategy = exports.FormDataType = exports.SecureGeneratorType = exports.ExpiryUnit = exports.CanonicalizationMethod = exports.FormType = exports.ClientAuthenticationPolicy = exports.UserVerificationRequirement = exports.LambdaEngineType = exports.RateLimitedRequestType = exports.ApplicationMultiFactorTrustPolicy = exports.DeviceType = exports.OAuthErrorType = exports.OAuthErrorReason = exports.SAMLv2DestinationAssertionPolicy = exports.RefreshTokenUsagePolicy = exports.IdentityProviderLoginMethod = exports.AuthenticatorAttachment = exports.Oauth2AuthorizedURLValidationPolicy = exports.LDAPSecurityMethod = exports.ChangePasswordReason = exports.ResidentKeyRequirement = exports.MessageType = exports.ProofKeyForCodeExchangePolicy = exports.ConnectorType = exports.ThemeType = exports.CoseKeyType = exports.TransactionType = exports.EventLogType = exports.WebhookAttemptResult = exports.OAuthScopeHandlingPolicy = exports.FormControl = exports.BreachedPasswordStatus = exports.KeyUse = exports.RefreshTokenExpirationPolicy = exports.UserState = exports.HTTPMethod = exports.ConsentStatus = exports.WebAuthnWorkflow = exports.WebhookEventResult = exports.AttestationConveyancePreference = exports.FormFieldAdminPolicy = exports.BreachMatchMode = exports.BreachAction = exports.MessengerType = exports.UnverifiedBehavior = exports.ReactorFeatureStatus = exports.CoseAlgorithmIdentifier = exports.FamilyRole = exports.LogoutBehavior = exports.ContentStatus = exports.TokenType = exports.UniqueUsernameStrategy = exports.EmailSecurityType = exports.AttestationType = exports.GrantType = exports.FusionAuthClient = void 0;
18
+ exports.WebhookEventResult = exports.WebhookAttemptResult = exports.WebAuthnWorkflow = exports.VerificationStrategy = exports.UserVerificationRequirement = exports.UserState = exports.UserActionPhase = exports.UnverifiedBehavior = exports.UnknownScopePolicy = exports.TransactionType = exports.TokenType = exports.ThemeType = exports.UniqueUsernameStrategy = exports.SystemTrustedProxyConfigurationPolicy = exports.SteamAPIMode = exports.Sort = exports.SecureGeneratorType = exports.SAMLv2DestinationAssertionPolicy = exports.ResidentKeyRequirement = exports.RefreshTokenUsagePolicy = exports.RefreshTokenExpirationPolicy = exports.ReactorFeatureStatus = exports.RateLimitedRequestType = exports.PublicKeyCredentialType = exports.ProofKeyForCodeExchangePolicy = exports.BreachMatchMode = exports.BreachAction = exports.ObjectState = exports.Oauth2AuthorizedURLValidationPolicy = exports.OAuthScopeHandlingPolicy = exports.OAuthScopeConsentMode = exports.OAuthErrorType = exports.OAuthErrorReason = exports.OAuthApplicationRelationship = exports.MultiFactorLoginPolicy = exports.MessengerType = exports.MessageType = exports.LogoutBehavior = exports.LambdaType = exports.LambdaEngineType = exports.LDAPSecurityMethod = exports.KeyUse = exports.KeyType = exports.KeyAlgorithm = exports.IdentityProviderType = exports.ClientAuthenticationMethod = exports.IdentityProviderLoginMethod = exports.IdentityProviderLinkingStrategy = exports.IPAccessControlEntryAction = exports.HTTPMethod = exports.GrantType = exports.FormType = exports.FormFieldAdminPolicy = exports.FormDataType = exports.FormControl = exports.FamilyRole = exports.ExpiryUnit = exports.EventType = exports.EventLogType = exports.EmailSecurityType = exports.DeviceType = exports.CoseKeyType = exports.CoseEllipticCurve = exports.CoseAlgorithmIdentifier = exports.ContentStatus = exports.ConsentStatus = exports.ConnectorType = exports.ClientAuthenticationPolicy = exports.ChangePasswordReason = exports.CaptchaMethod = exports.CanonicalizationMethod = exports.BreachedPasswordStatus = exports.TOTPAlgorithm = exports.AuthenticatorAttachmentPreference = exports.AuthenticatorAttachment = exports.AuthenticationThreats = exports.AttestationType = exports.AttestationConveyancePreference = exports.ApplicationMultiFactorTrustPolicy = exports.XMLSignatureLocation = exports.SAMLLogoutBehavior = exports.RegistrationType = exports.LoginIdType = exports.Algorithm = exports.FusionAuthClient = void 0;
19
19
  const DefaultRESTClientBuilder_1 = require("./DefaultRESTClientBuilder");
20
20
  const url_1 = require("url");
21
21
  class FusionAuthClient {
@@ -143,6 +143,24 @@ class FusionAuthClient {
143
143
  .withMethod("POST")
144
144
  .go();
145
145
  }
146
+ /**
147
+ * Changes a user's password using their access token (JWT) instead of the changePasswordId
148
+ * A common use case for this method will be if you want to allow the user to change their own password.
149
+ *
150
+ * Remember to send refreshToken in the request body if you want to get a new refresh token when login using the returned oneTimePassword.
151
+ *
152
+ * @param {string} encodedJWT The encoded JWT (access token).
153
+ * @param {ChangePasswordRequest} request The change password request that contains all the information used to change the password.
154
+ * @returns {Promise<ClientResponse<ChangePasswordResponse>>}
155
+ */
156
+ changePasswordByJWT(encodedJWT, request) {
157
+ return this.startAnonymous()
158
+ .withUri('/api/user/change-password')
159
+ .withAuthorization('Bearer ' + encodedJWT)
160
+ .withJSONBody(request)
161
+ .withMethod("POST")
162
+ .go();
163
+ }
146
164
  /**
147
165
  * Changes a user's password using their identity (loginId and password). Using a loginId instead of the changePasswordId
148
166
  * bypasses the email verification and allows a password to be changed directly without first calling the #forgotPassword
@@ -784,7 +802,7 @@ class FusionAuthClient {
784
802
  .go();
785
803
  }
786
804
  /**
787
- * Deactivates the users with the given ids.
805
+ * Deactivates the users with the given Ids.
788
806
  *
789
807
  * @param {Array<string>} userIds The ids of the users to deactivate.
790
808
  * @returns {Promise<ClientResponse<UserDeleteResponse>>}
@@ -801,7 +819,7 @@ class FusionAuthClient {
801
819
  .go();
802
820
  }
803
821
  /**
804
- * Deactivates the users with the given ids.
822
+ * Deactivates the users with the given Ids.
805
823
  *
806
824
  * @param {Array<string>} userIds The ids of the users to deactivate.
807
825
  * @returns {Promise<ClientResponse<UserDeleteResponse>>}
@@ -1276,8 +1294,8 @@ class FusionAuthClient {
1276
1294
  .go();
1277
1295
  }
1278
1296
  /**
1279
- * Deletes the users with the given ids, or users matching the provided JSON query or queryString.
1280
- * The order of preference is ids, query and then queryString, it is recommended to only provide one of the three for the request.
1297
+ * Deletes the users with the given Ids, or users matching the provided JSON query or queryString.
1298
+ * The order of preference is Ids, query and then queryString, it is recommended to only provide one of the three for the request.
1281
1299
  *
1282
1300
  * This method can be used to deactivate or permanently delete (hard-delete) users based upon the hardDelete boolean in the request body.
1283
1301
  * Using the dryRun parameter you may also request the result of the action without actually deleting or deactivating any users.
@@ -1295,8 +1313,8 @@ class FusionAuthClient {
1295
1313
  .go();
1296
1314
  }
1297
1315
  /**
1298
- * Deletes the users with the given ids, or users matching the provided JSON query or queryString.
1299
- * The order of preference is ids, query and then queryString, it is recommended to only provide one of the three for the request.
1316
+ * Deletes the users with the given Ids, or users matching the provided JSON query or queryString.
1317
+ * The order of preference is Ids, query and then queryString, it is recommended to only provide one of the three for the request.
1300
1318
  *
1301
1319
  * This method can be used to deactivate or permanently delete (hard-delete) users based upon the hardDelete boolean in the request body.
1302
1320
  * Using the dryRun parameter you may also request the result of the action without actually deleting or deactivating any users.
@@ -1845,7 +1863,7 @@ class FusionAuthClient {
1845
1863
  * Modifies a temporal user action by changing the expiration of the action and optionally adding a comment to the
1846
1864
  * action.
1847
1865
  *
1848
- * @param {UUID} actionId The Id of the action to modify. This is technically the user action log id.
1866
+ * @param {UUID} actionId The Id of the action to modify. This is technically the user action log Id.
1849
1867
  * @param {ActionRequest} request The request that contains all the information about the modification.
1850
1868
  * @returns {Promise<ClientResponse<ActionResponse>>}
1851
1869
  */
@@ -1871,10 +1889,10 @@ class FusionAuthClient {
1871
1889
  .go();
1872
1890
  }
1873
1891
  /**
1874
- * Updates an authentication API key by given id
1892
+ * Updates an API key with the given Id.
1875
1893
  *
1876
- * @param {UUID} keyId The Id of the authentication key. If not provided a secure random api key will be generated.
1877
- * @param {APIKeyRequest} request The request object that contains all the information needed to create the APIKey.
1894
+ * @param {UUID} keyId The Id of the API key. If not provided a secure random api key will be generated.
1895
+ * @param {APIKeyRequest} request The request object that contains all the information needed to create the API key.
1878
1896
  * @returns {Promise<ClientResponse<APIKeyResponse>>}
1879
1897
  */
1880
1898
  patchAPIKey(keyId, request) {
@@ -1882,7 +1900,7 @@ class FusionAuthClient {
1882
1900
  .withUri('/api/api-key')
1883
1901
  .withUriSegment(keyId)
1884
1902
  .withJSONBody(request)
1885
- .withMethod("POST")
1903
+ .withMethod("PATCH")
1886
1904
  .go();
1887
1905
  }
1888
1906
  /**
@@ -1963,6 +1981,21 @@ class FusionAuthClient {
1963
1981
  .withMethod("PATCH")
1964
1982
  .go();
1965
1983
  }
1984
+ /**
1985
+ * Updates, via PATCH, the Entity with the given Id.
1986
+ *
1987
+ * @param {UUID} entityId The Id of the Entity Type to update.
1988
+ * @param {EntityRequest} request The request that contains just the new Entity information.
1989
+ * @returns {Promise<ClientResponse<EntityResponse>>}
1990
+ */
1991
+ patchEntity(entityId, request) {
1992
+ return this.start()
1993
+ .withUri('/api/entity')
1994
+ .withUriSegment(entityId)
1995
+ .withJSONBody(request)
1996
+ .withMethod("PATCH")
1997
+ .go();
1998
+ }
1966
1999
  /**
1967
2000
  * Updates, via PATCH, the Entity Type with the given Id.
1968
2001
  *
@@ -1978,6 +2011,54 @@ class FusionAuthClient {
1978
2011
  .withMethod("PATCH")
1979
2012
  .go();
1980
2013
  }
2014
+ /**
2015
+ * Patches the permission with the given Id for the entity type.
2016
+ *
2017
+ * @param {UUID} entityTypeId The Id of the entityType that the permission belongs to.
2018
+ * @param {UUID} permissionId The Id of the permission to patch.
2019
+ * @param {EntityTypeRequest} request The request that contains the new permission information.
2020
+ * @returns {Promise<ClientResponse<EntityTypeResponse>>}
2021
+ */
2022
+ patchEntityTypePermission(entityTypeId, permissionId, request) {
2023
+ return this.start()
2024
+ .withUri('/api/entity/type')
2025
+ .withUriSegment(entityTypeId)
2026
+ .withUriSegment("permission")
2027
+ .withUriSegment(permissionId)
2028
+ .withJSONBody(request)
2029
+ .withMethod("PATCH")
2030
+ .go();
2031
+ }
2032
+ /**
2033
+ * Patches the form with the given Id.
2034
+ *
2035
+ * @param {UUID} formId The Id of the form to patch.
2036
+ * @param {FormRequest} request The request object that contains the new form information.
2037
+ * @returns {Promise<ClientResponse<FormResponse>>}
2038
+ */
2039
+ patchForm(formId, request) {
2040
+ return this.start()
2041
+ .withUri('/api/form')
2042
+ .withUriSegment(formId)
2043
+ .withJSONBody(request)
2044
+ .withMethod("PATCH")
2045
+ .go();
2046
+ }
2047
+ /**
2048
+ * Patches the form field with the given Id.
2049
+ *
2050
+ * @param {UUID} fieldId The Id of the form field to patch.
2051
+ * @param {FormFieldRequest} request The request object that contains the new form field information.
2052
+ * @returns {Promise<ClientResponse<FormFieldResponse>>}
2053
+ */
2054
+ patchFormField(fieldId, request) {
2055
+ return this.start()
2056
+ .withUri('/api/form/field')
2057
+ .withUriSegment(fieldId)
2058
+ .withJSONBody(request)
2059
+ .withMethod("PATCH")
2060
+ .go();
2061
+ }
1981
2062
  /**
1982
2063
  * Updates, via PATCH, the group with the given Id.
1983
2064
  *
@@ -1993,6 +2074,21 @@ class FusionAuthClient {
1993
2074
  .withMethod("PATCH")
1994
2075
  .go();
1995
2076
  }
2077
+ /**
2078
+ * Update the IP Access Control List with the given Id.
2079
+ *
2080
+ * @param {UUID} accessControlListId The Id of the IP Access Control List to patch.
2081
+ * @param {IPAccessControlListRequest} request The request that contains the new IP Access Control List information.
2082
+ * @returns {Promise<ClientResponse<IPAccessControlListResponse>>}
2083
+ */
2084
+ patchIPAccessControlList(accessControlListId, request) {
2085
+ return this.start()
2086
+ .withUri('/api/ip-acl')
2087
+ .withUriSegment(accessControlListId)
2088
+ .withJSONBody(request)
2089
+ .withMethod("PATCH")
2090
+ .go();
2091
+ }
1996
2092
  /**
1997
2093
  * Updates, via PATCH, the identity provider with the given Id.
1998
2094
  *
@@ -2202,6 +2298,21 @@ class FusionAuthClient {
2202
2298
  .withMethod("PATCH")
2203
2299
  .go();
2204
2300
  }
2301
+ /**
2302
+ * Patches the webhook with the given Id.
2303
+ *
2304
+ * @param {UUID} webhookId The Id of the webhook to update.
2305
+ * @param {WebhookRequest} request The request that contains the new webhook information.
2306
+ * @returns {Promise<ClientResponse<WebhookResponse>>}
2307
+ */
2308
+ patchWebhook(webhookId, request) {
2309
+ return this.start()
2310
+ .withUri('/api/webhook')
2311
+ .withUriSegment(webhookId)
2312
+ .withJSONBody(request)
2313
+ .withMethod("PATCH")
2314
+ .go();
2315
+ }
2205
2316
  /**
2206
2317
  * Reactivates the application with the given Id.
2207
2318
  *
@@ -2333,7 +2444,7 @@ class FusionAuthClient {
2333
2444
  .go();
2334
2445
  }
2335
2446
  /**
2336
- * Removes a user from the family with the given id.
2447
+ * Removes a user from the family with the given Id.
2337
2448
  *
2338
2449
  * @param {UUID} familyId The Id of the family to remove the user from.
2339
2450
  * @param {UUID} userId The Id of the user to remove from the family.
@@ -2392,7 +2503,7 @@ class FusionAuthClient {
2392
2503
  .go();
2393
2504
  }
2394
2505
  /**
2395
- * Retrieves an authentication API key for the given id
2506
+ * Retrieves an authentication API key for the given Id.
2396
2507
  *
2397
2508
  * @param {UUID} keyId The Id of the API key to retrieve.
2398
2509
  * @returns {Promise<ClientResponse<APIKeyResponse>>}
@@ -2463,7 +2574,7 @@ class FusionAuthClient {
2463
2574
  /**
2464
2575
  * Retrieves the application for the given Id or all the applications if the Id is null.
2465
2576
  *
2466
- * @param {UUID} applicationId (Optional) The application id.
2577
+ * @param {UUID} applicationId (Optional) The application Id.
2467
2578
  * @returns {Promise<ClientResponse<ApplicationResponse>>}
2468
2579
  */
2469
2580
  retrieveApplication(applicationId) {
@@ -2546,10 +2657,10 @@ class FusionAuthClient {
2546
2657
  .go();
2547
2658
  }
2548
2659
  /**
2549
- * Retrieves the daily active user report between the two instants. If you specify an application id, it will only
2660
+ * Retrieves the daily active user report between the two instants. If you specify an application Id, it will only
2550
2661
  * return the daily active counts for that application.
2551
2662
  *
2552
- * @param {UUID} applicationId (Optional) The application id.
2663
+ * @param {UUID} applicationId (Optional) The application Id.
2553
2664
  * @param {number} start The start instant as UTC milliseconds since Epoch.
2554
2665
  * @param {number} end The end instant as UTC milliseconds since Epoch.
2555
2666
  * @returns {Promise<ClientResponse<DailyActiveUserReportResponse>>}
@@ -2564,7 +2675,7 @@ class FusionAuthClient {
2564
2675
  .go();
2565
2676
  }
2566
2677
  /**
2567
- * Retrieves the email template for the given Id. If you don't specify the id, this will return all the email templates.
2678
+ * Retrieves the email template for the given Id. If you don't specify the Id, this will return all the email templates.
2568
2679
  *
2569
2680
  * @param {UUID} emailTemplateId (Optional) The Id of the email template.
2570
2681
  * @returns {Promise<ClientResponse<EmailTemplateResponse>>}
@@ -2980,10 +3091,10 @@ class FusionAuthClient {
2980
3091
  .go();
2981
3092
  }
2982
3093
  /**
2983
- * Retrieves the login report between the two instants. If you specify an application id, it will only return the
3094
+ * Retrieves the login report between the two instants. If you specify an application Id, it will only return the
2984
3095
  * login counts for that application.
2985
3096
  *
2986
- * @param {UUID} applicationId (Optional) The application id.
3097
+ * @param {UUID} applicationId (Optional) The application Id.
2987
3098
  * @param {number} start The start instant as UTC milliseconds since Epoch.
2988
3099
  * @param {number} end The end instant as UTC milliseconds since Epoch.
2989
3100
  * @returns {Promise<ClientResponse<LoginReportResponse>>}
@@ -2998,7 +3109,7 @@ class FusionAuthClient {
2998
3109
  .go();
2999
3110
  }
3000
3111
  /**
3001
- * Retrieves the message template for the given Id. If you don't specify the id, this will return all the message templates.
3112
+ * Retrieves the message template for the given Id. If you don't specify the Id, this will return all the message templates.
3002
3113
  *
3003
3114
  * @param {UUID} messageTemplateId (Optional) The Id of the message template.
3004
3115
  * @returns {Promise<ClientResponse<MessageTemplateResponse>>}
@@ -3059,10 +3170,10 @@ class FusionAuthClient {
3059
3170
  .go();
3060
3171
  }
3061
3172
  /**
3062
- * Retrieves the monthly active user report between the two instants. If you specify an application id, it will only
3173
+ * Retrieves the monthly active user report between the two instants. If you specify an application Id, it will only
3063
3174
  * return the monthly active counts for that application.
3064
3175
  *
3065
- * @param {UUID} applicationId (Optional) The application id.
3176
+ * @param {UUID} applicationId (Optional) The application Id.
3066
3177
  * @param {number} start The start instant as UTC milliseconds since Epoch.
3067
3178
  * @param {number} end The end instant as UTC milliseconds since Epoch.
3068
3179
  * @returns {Promise<ClientResponse<MonthlyActiveUserReportResponse>>}
@@ -3238,7 +3349,7 @@ class FusionAuthClient {
3238
3349
  .go();
3239
3350
  }
3240
3351
  /**
3241
- * Retrieves the user registration for the user with the given Id and the given application id.
3352
+ * Retrieves the user registration for the user with the given Id and the given application Id.
3242
3353
  *
3243
3354
  * @param {UUID} userId The Id of the user.
3244
3355
  * @param {UUID} applicationId The Id of the application.
@@ -3253,10 +3364,10 @@ class FusionAuthClient {
3253
3364
  .go();
3254
3365
  }
3255
3366
  /**
3256
- * Retrieves the registration report between the two instants. If you specify an application id, it will only return
3367
+ * Retrieves the registration report between the two instants. If you specify an application Id, it will only return
3257
3368
  * the registration counts for that application.
3258
3369
  *
3259
- * @param {UUID} applicationId (Optional) The application id.
3370
+ * @param {UUID} applicationId (Optional) The application Id.
3260
3371
  * @param {number} start The start instant as UTC milliseconds since Epoch.
3261
3372
  * @param {number} end The end instant as UTC milliseconds since Epoch.
3262
3373
  * @returns {Promise<ClientResponse<RegistrationReportResponse>>}
@@ -3433,7 +3544,7 @@ class FusionAuthClient {
3433
3544
  .go();
3434
3545
  }
3435
3546
  /**
3436
- * Retrieves the user action for the given Id. If you pass in null for the id, this will return all the user
3547
+ * Retrieves the user action for the given Id. If you pass in null for the Id, this will return all the user
3437
3548
  * actions.
3438
3549
  *
3439
3550
  * @param {UUID} userActionId (Optional) The Id of the user action.
@@ -3447,7 +3558,7 @@ class FusionAuthClient {
3447
3558
  .go();
3448
3559
  }
3449
3560
  /**
3450
- * Retrieves the user action reason for the given Id. If you pass in null for the id, this will return all the user
3561
+ * Retrieves the user action reason for the given Id. If you pass in null for the Id, this will return all the user
3451
3562
  * action reasons.
3452
3563
  *
3453
3564
  * @param {UUID} userActionReasonId (Optional) The Id of the user action reason.
@@ -3554,8 +3665,8 @@ class FusionAuthClient {
3554
3665
  *
3555
3666
  * This API is useful if you want to build your own login workflow to complete a device grant.
3556
3667
  *
3557
- * @param {string} client_id The client id.
3558
- * @param {string} client_secret The client id.
3668
+ * @param {string} client_id The client Id.
3669
+ * @param {string} client_secret The client Id.
3559
3670
  * @param {string} user_code The end-user verification code.
3560
3671
  * @returns {Promise<ClientResponse<void>>}
3561
3672
  */
@@ -3674,11 +3785,11 @@ class FusionAuthClient {
3674
3785
  .go();
3675
3786
  }
3676
3787
  /**
3677
- * Retrieves the login report between the two instants for a particular user by Id. If you specify an application id, it will only return the
3788
+ * Retrieves the login report between the two instants for a particular user by Id. If you specify an application Id, it will only return the
3678
3789
  * login counts for that application.
3679
3790
  *
3680
- * @param {UUID} applicationId (Optional) The application id.
3681
- * @param {UUID} userId The userId id.
3791
+ * @param {UUID} applicationId (Optional) The application Id.
3792
+ * @param {UUID} userId The userId Id.
3682
3793
  * @param {number} start The start instant as UTC milliseconds since Epoch.
3683
3794
  * @param {number} end The end instant as UTC milliseconds since Epoch.
3684
3795
  * @returns {Promise<ClientResponse<LoginReportResponse>>}
@@ -3694,11 +3805,11 @@ class FusionAuthClient {
3694
3805
  .go();
3695
3806
  }
3696
3807
  /**
3697
- * Retrieves the login report between the two instants for a particular user by login Id. If you specify an application id, it will only return the
3808
+ * Retrieves the login report between the two instants for a particular user by login Id. If you specify an application Id, it will only return the
3698
3809
  * login counts for that application.
3699
3810
  *
3700
- * @param {UUID} applicationId (Optional) The application id.
3701
- * @param {string} loginId The userId id.
3811
+ * @param {UUID} applicationId (Optional) The application Id.
3812
+ * @param {string} loginId The userId Id.
3702
3813
  * @param {number} start The start instant as UTC milliseconds since Epoch.
3703
3814
  * @param {number} end The end instant as UTC milliseconds since Epoch.
3704
3815
  * @returns {Promise<ClientResponse<LoginReportResponse>>}
@@ -3781,7 +3892,7 @@ class FusionAuthClient {
3781
3892
  .go();
3782
3893
  }
3783
3894
  /**
3784
- * Retrieves the webhook for the given Id. If you pass in null for the id, this will return all the webhooks.
3895
+ * Retrieves the webhook for the given Id. If you pass in null for the Id, this will return all the webhooks.
3785
3896
  *
3786
3897
  * @param {UUID} webhookId (Optional) The Id of the webhook.
3787
3898
  * @returns {Promise<ClientResponse<WebhookResponse>>}
@@ -4030,7 +4141,7 @@ class FusionAuthClient {
4030
4141
  .go();
4031
4142
  }
4032
4143
  /**
4033
- * Retrieves the entities for the given ids. If any Id is invalid, it is ignored.
4144
+ * Retrieves the entities for the given Ids. If any Id is invalid, it is ignored.
4034
4145
  *
4035
4146
  * @param {Array<string>} ids The entity ids to search for.
4036
4147
  * @returns {Promise<ClientResponse<EntitySearchResponse>>}
@@ -4212,7 +4323,7 @@ class FusionAuthClient {
4212
4323
  .go();
4213
4324
  }
4214
4325
  /**
4215
- * Retrieves the users for the given ids. If any Id is invalid, it is ignored.
4326
+ * Retrieves the users for the given Ids. If any Id is invalid, it is ignored.
4216
4327
  *
4217
4328
  * @param {Array<string>} ids The user ids to search for.
4218
4329
  * @returns {Promise<ClientResponse<SearchResponse>>}
@@ -4227,9 +4338,9 @@ class FusionAuthClient {
4227
4338
  .go();
4228
4339
  }
4229
4340
  /**
4230
- * Retrieves the users for the given ids. If any Id is invalid, it is ignored.
4341
+ * Retrieves the users for the given Ids. If any Id is invalid, it is ignored.
4231
4342
  *
4232
- * @param {Array<string>} ids The user ids to search for.
4343
+ * @param {Array<string>} ids The user Ids to search for.
4233
4344
  * @returns {Promise<ClientResponse<SearchResponse>>}
4234
4345
  */
4235
4346
  searchUsersByIds(ids) {
@@ -4296,7 +4407,7 @@ class FusionAuthClient {
4296
4407
  .go();
4297
4408
  }
4298
4409
  /**
4299
- * Send an email using an email template id. You can optionally provide <code>requestData</code> to access key value
4410
+ * Send an email using an email template Id. You can optionally provide <code>requestData</code> to access key value
4300
4411
  * pairs in the email template.
4301
4412
  *
4302
4413
  * @param {UUID} emailTemplateId The Id for the template.
@@ -4482,16 +4593,16 @@ class FusionAuthClient {
4482
4593
  .go();
4483
4594
  }
4484
4595
  /**
4485
- * Updates an API key by given id
4596
+ * Updates an API key with the given Id.
4486
4597
  *
4487
- * @param {UUID} apiKeyId The Id of the API key to update.
4488
- * @param {APIKeyRequest} request The request object that contains all the information used to create the API Key.
4598
+ * @param {UUID} keyId The Id of the API key to update.
4599
+ * @param {APIKeyRequest} request The request that contains all the new API key information.
4489
4600
  * @returns {Promise<ClientResponse<APIKeyResponse>>}
4490
4601
  */
4491
- updateAPIKey(apiKeyId, request) {
4602
+ updateAPIKey(keyId, request) {
4492
4603
  return this.start()
4493
4604
  .withUri('/api/api-key')
4494
- .withUriSegment(apiKeyId)
4605
+ .withUriSegment(keyId)
4495
4606
  .withJSONBody(request)
4496
4607
  .withMethod("PUT")
4497
4608
  .go();
@@ -4622,6 +4733,21 @@ class FusionAuthClient {
4622
4733
  .withMethod("PUT")
4623
4734
  .go();
4624
4735
  }
4736
+ /**
4737
+ * Updates a family with a given Id.
4738
+ *
4739
+ * @param {UUID} familyId The Id of the family to update.
4740
+ * @param {FamilyRequest} request The request object that contains all the new family information.
4741
+ * @returns {Promise<ClientResponse<FamilyResponse>>}
4742
+ */
4743
+ updateFamily(familyId, request) {
4744
+ return this.start()
4745
+ .withUri('/api/user/family')
4746
+ .withUriSegment(familyId)
4747
+ .withJSONBody(request)
4748
+ .withMethod("PUT")
4749
+ .go();
4750
+ }
4625
4751
  /**
4626
4752
  * Updates the form with the given Id.
4627
4753
  *
@@ -4955,7 +5081,7 @@ class FusionAuthClient {
4955
5081
  * If you build your own activation form you should validate the user provided code prior to beginning the Authorization grant.
4956
5082
  *
4957
5083
  * @param {string} user_code The end-user verification code.
4958
- * @param {string} client_id The client id.
5084
+ * @param {string} client_id The client Id.
4959
5085
  * @returns {Promise<ClientResponse<void>>}
4960
5086
  */
4961
5087
  validateDevice(user_code, client_id) {
@@ -5113,24 +5239,67 @@ class FusionAuthClient {
5113
5239
  exports.FusionAuthClient = FusionAuthClient;
5114
5240
  exports.default = FusionAuthClient;
5115
5241
  /**
5116
- * Authorization Grant types as defined by the <a href="https://tools.ietf.org/html/rfc6749">The OAuth 2.0 Authorization
5117
- * Framework - RFC 6749</a>.
5118
- * <p>
5119
- * Specific names as defined by <a href="https://tools.ietf.org/html/rfc7591#section-4.1">
5120
- * OAuth 2.0 Dynamic Client Registration Protocol - RFC 7591 Section 4.1</a>
5242
+ * Available JSON Web Algorithms (JWA) as described in RFC 7518 available for this JWT implementation.
5121
5243
  *
5122
5244
  * @author Daniel DeGroff
5123
5245
  */
5124
- var GrantType;
5125
- (function (GrantType) {
5126
- GrantType["authorization_code"] = "authorization_code";
5127
- GrantType["implicit"] = "implicit";
5128
- GrantType["password"] = "password";
5129
- GrantType["client_credentials"] = "client_credentials";
5130
- GrantType["refresh_token"] = "refresh_token";
5131
- GrantType["unknown"] = "unknown";
5132
- GrantType["device_code"] = "urn:ietf:params:oauth:grant-type:device_code";
5133
- })(GrantType = exports.GrantType || (exports.GrantType = {}));
5246
+ var Algorithm;
5247
+ (function (Algorithm) {
5248
+ Algorithm["ES256"] = "ES256";
5249
+ Algorithm["ES384"] = "ES384";
5250
+ Algorithm["ES512"] = "ES512";
5251
+ Algorithm["HS256"] = "HS256";
5252
+ Algorithm["HS384"] = "HS384";
5253
+ Algorithm["HS512"] = "HS512";
5254
+ Algorithm["PS256"] = "PS256";
5255
+ Algorithm["PS384"] = "PS384";
5256
+ Algorithm["PS512"] = "PS512";
5257
+ Algorithm["RS256"] = "RS256";
5258
+ Algorithm["RS384"] = "RS384";
5259
+ Algorithm["RS512"] = "RS512";
5260
+ Algorithm["none"] = "none";
5261
+ })(Algorithm = exports.Algorithm || (exports.Algorithm = {}));
5262
+ var LoginIdType;
5263
+ (function (LoginIdType) {
5264
+ LoginIdType["email"] = "email";
5265
+ LoginIdType["username"] = "username";
5266
+ })(LoginIdType = exports.LoginIdType || (exports.LoginIdType = {}));
5267
+ var RegistrationType;
5268
+ (function (RegistrationType) {
5269
+ RegistrationType["basic"] = "basic";
5270
+ RegistrationType["advanced"] = "advanced";
5271
+ })(RegistrationType = exports.RegistrationType || (exports.RegistrationType = {}));
5272
+ var SAMLLogoutBehavior;
5273
+ (function (SAMLLogoutBehavior) {
5274
+ SAMLLogoutBehavior["AllParticipants"] = "AllParticipants";
5275
+ SAMLLogoutBehavior["OnlyOriginator"] = "OnlyOriginator";
5276
+ })(SAMLLogoutBehavior = exports.SAMLLogoutBehavior || (exports.SAMLLogoutBehavior = {}));
5277
+ var XMLSignatureLocation;
5278
+ (function (XMLSignatureLocation) {
5279
+ XMLSignatureLocation["Assertion"] = "Assertion";
5280
+ XMLSignatureLocation["Response"] = "Response";
5281
+ })(XMLSignatureLocation = exports.XMLSignatureLocation || (exports.XMLSignatureLocation = {}));
5282
+ /**
5283
+ * @author Daniel DeGroff
5284
+ */
5285
+ var ApplicationMultiFactorTrustPolicy;
5286
+ (function (ApplicationMultiFactorTrustPolicy) {
5287
+ ApplicationMultiFactorTrustPolicy["Any"] = "Any";
5288
+ ApplicationMultiFactorTrustPolicy["This"] = "This";
5289
+ ApplicationMultiFactorTrustPolicy["None"] = "None";
5290
+ })(ApplicationMultiFactorTrustPolicy = exports.ApplicationMultiFactorTrustPolicy || (exports.ApplicationMultiFactorTrustPolicy = {}));
5291
+ /**
5292
+ * Used to communicate whether and how authenticator attestation should be delivered to the Relying Party
5293
+ *
5294
+ * @author Spencer Witt
5295
+ */
5296
+ var AttestationConveyancePreference;
5297
+ (function (AttestationConveyancePreference) {
5298
+ AttestationConveyancePreference["none"] = "none";
5299
+ AttestationConveyancePreference["indirect"] = "indirect";
5300
+ AttestationConveyancePreference["direct"] = "direct";
5301
+ AttestationConveyancePreference["enterprise"] = "enterprise";
5302
+ })(AttestationConveyancePreference = exports.AttestationConveyancePreference || (exports.AttestationConveyancePreference = {}));
5134
5303
  /**
5135
5304
  * Used to indicate what type of attestation was included in the authenticator response for a given WebAuthn credential at the time it was created
5136
5305
  *
@@ -5144,58 +5313,124 @@ var AttestationType;
5144
5313
  AttestationType["anonymizationCa"] = "anonymizationCa";
5145
5314
  AttestationType["none"] = "none";
5146
5315
  })(AttestationType = exports.AttestationType || (exports.AttestationType = {}));
5147
- var EmailSecurityType;
5148
- (function (EmailSecurityType) {
5149
- EmailSecurityType["NONE"] = "NONE";
5150
- EmailSecurityType["SSL"] = "SSL";
5151
- EmailSecurityType["TLS"] = "TLS";
5152
- })(EmailSecurityType = exports.EmailSecurityType || (exports.EmailSecurityType = {}));
5153
- var UniqueUsernameStrategy;
5154
- (function (UniqueUsernameStrategy) {
5155
- UniqueUsernameStrategy["Always"] = "Always";
5156
- UniqueUsernameStrategy["OnCollision"] = "OnCollision";
5157
- })(UniqueUsernameStrategy = exports.UniqueUsernameStrategy || (exports.UniqueUsernameStrategy = {}));
5158
5316
  /**
5159
- * <ul>
5160
- * <li>Bearer Token type as defined by <a href="https://tools.ietf.org/html/rfc6750">RFC 6750</a>.</li>
5161
- * <li>MAC Token type as referenced by <a href="https://tools.ietf.org/html/rfc6749">RFC 6749</a> and
5162
- * <a href="https://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-05">
5163
- * Draft RFC on OAuth 2.0 Message Authentication Code (MAC) Tokens</a>
5164
- * </li>
5165
- * </ul>
5317
+ * @author Brett Pontarelli
5318
+ */
5319
+ var AuthenticationThreats;
5320
+ (function (AuthenticationThreats) {
5321
+ AuthenticationThreats["ImpossibleTravel"] = "ImpossibleTravel";
5322
+ })(AuthenticationThreats = exports.AuthenticationThreats || (exports.AuthenticationThreats = {}));
5323
+ /**
5324
+ * Describes the <a href="https://www.w3.org/TR/webauthn-2/#authenticator-attachment-modality">authenticator attachment modality</a>.
5325
+ *
5326
+ * @author Spencer Witt
5327
+ */
5328
+ var AuthenticatorAttachment;
5329
+ (function (AuthenticatorAttachment) {
5330
+ AuthenticatorAttachment["platform"] = "platform";
5331
+ AuthenticatorAttachment["crossPlatform"] = "crossPlatform";
5332
+ })(AuthenticatorAttachment = exports.AuthenticatorAttachment || (exports.AuthenticatorAttachment = {}));
5333
+ /**
5334
+ * Describes the authenticator attachment modality preference for a WebAuthn workflow. See {@link AuthenticatorAttachment}
5166
5335
  *
5336
+ * @author Spencer Witt
5337
+ */
5338
+ var AuthenticatorAttachmentPreference;
5339
+ (function (AuthenticatorAttachmentPreference) {
5340
+ AuthenticatorAttachmentPreference["any"] = "any";
5341
+ AuthenticatorAttachmentPreference["platform"] = "platform";
5342
+ AuthenticatorAttachmentPreference["crossPlatform"] = "crossPlatform";
5343
+ })(AuthenticatorAttachmentPreference = exports.AuthenticatorAttachmentPreference || (exports.AuthenticatorAttachmentPreference = {}));
5344
+ var TOTPAlgorithm;
5345
+ (function (TOTPAlgorithm) {
5346
+ TOTPAlgorithm["HmacSHA1"] = "HmacSHA1";
5347
+ TOTPAlgorithm["HmacSHA256"] = "HmacSHA256";
5348
+ TOTPAlgorithm["HmacSHA512"] = "HmacSHA512";
5349
+ })(TOTPAlgorithm = exports.TOTPAlgorithm || (exports.TOTPAlgorithm = {}));
5350
+ /**
5167
5351
  * @author Daniel DeGroff
5168
5352
  */
5169
- var TokenType;
5170
- (function (TokenType) {
5171
- TokenType["Bearer"] = "Bearer";
5172
- TokenType["MAC"] = "MAC";
5173
- })(TokenType = exports.TokenType || (exports.TokenType = {}));
5353
+ var BreachedPasswordStatus;
5354
+ (function (BreachedPasswordStatus) {
5355
+ BreachedPasswordStatus["None"] = "None";
5356
+ BreachedPasswordStatus["ExactMatch"] = "ExactMatch";
5357
+ BreachedPasswordStatus["SubAddressMatch"] = "SubAddressMatch";
5358
+ BreachedPasswordStatus["PasswordOnly"] = "PasswordOnly";
5359
+ BreachedPasswordStatus["CommonPassword"] = "CommonPassword";
5360
+ })(BreachedPasswordStatus = exports.BreachedPasswordStatus || (exports.BreachedPasswordStatus = {}));
5174
5361
  /**
5175
- * Status for content like usernames, profile attributes, etc.
5362
+ * XML canonicalization method enumeration. This is used for the IdP and SP side of FusionAuth SAML.
5176
5363
  *
5177
5364
  * @author Brian Pontarelli
5178
5365
  */
5179
- var ContentStatus;
5180
- (function (ContentStatus) {
5181
- ContentStatus["ACTIVE"] = "ACTIVE";
5182
- ContentStatus["PENDING"] = "PENDING";
5183
- ContentStatus["REJECTED"] = "REJECTED";
5184
- })(ContentStatus = exports.ContentStatus || (exports.ContentStatus = {}));
5366
+ var CanonicalizationMethod;
5367
+ (function (CanonicalizationMethod) {
5368
+ CanonicalizationMethod["exclusive"] = "exclusive";
5369
+ CanonicalizationMethod["exclusive_with_comments"] = "exclusive_with_comments";
5370
+ CanonicalizationMethod["inclusive"] = "inclusive";
5371
+ CanonicalizationMethod["inclusive_with_comments"] = "inclusive_with_comments";
5372
+ })(CanonicalizationMethod = exports.CanonicalizationMethod || (exports.CanonicalizationMethod = {}));
5185
5373
  /**
5186
- * @author Matthew Altman
5374
+ * @author Brett Pontarelli
5187
5375
  */
5188
- var LogoutBehavior;
5189
- (function (LogoutBehavior) {
5190
- LogoutBehavior["RedirectOnly"] = "RedirectOnly";
5191
- LogoutBehavior["AllApplications"] = "AllApplications";
5192
- })(LogoutBehavior = exports.LogoutBehavior || (exports.LogoutBehavior = {}));
5193
- var FamilyRole;
5194
- (function (FamilyRole) {
5195
- FamilyRole["Child"] = "Child";
5196
- FamilyRole["Teen"] = "Teen";
5197
- FamilyRole["Adult"] = "Adult";
5198
- })(FamilyRole = exports.FamilyRole || (exports.FamilyRole = {}));
5376
+ var CaptchaMethod;
5377
+ (function (CaptchaMethod) {
5378
+ CaptchaMethod["GoogleRecaptchaV2"] = "GoogleRecaptchaV2";
5379
+ CaptchaMethod["GoogleRecaptchaV3"] = "GoogleRecaptchaV3";
5380
+ CaptchaMethod["HCaptcha"] = "HCaptcha";
5381
+ CaptchaMethod["HCaptchaEnterprise"] = "HCaptchaEnterprise";
5382
+ })(CaptchaMethod = exports.CaptchaMethod || (exports.CaptchaMethod = {}));
5383
+ /**
5384
+ * @author Trevor Smith
5385
+ */
5386
+ var ChangePasswordReason;
5387
+ (function (ChangePasswordReason) {
5388
+ ChangePasswordReason["Administrative"] = "Administrative";
5389
+ ChangePasswordReason["Breached"] = "Breached";
5390
+ ChangePasswordReason["Expired"] = "Expired";
5391
+ ChangePasswordReason["Validation"] = "Validation";
5392
+ })(ChangePasswordReason = exports.ChangePasswordReason || (exports.ChangePasswordReason = {}));
5393
+ /**
5394
+ * @author Brett Guy
5395
+ */
5396
+ var ClientAuthenticationPolicy;
5397
+ (function (ClientAuthenticationPolicy) {
5398
+ ClientAuthenticationPolicy["Required"] = "Required";
5399
+ ClientAuthenticationPolicy["NotRequired"] = "NotRequired";
5400
+ ClientAuthenticationPolicy["NotRequiredWhenUsingPKCE"] = "NotRequiredWhenUsingPKCE";
5401
+ })(ClientAuthenticationPolicy = exports.ClientAuthenticationPolicy || (exports.ClientAuthenticationPolicy = {}));
5402
+ /**
5403
+ * The types of connectors. This enum is stored as an ordinal on the <code>identities</code> table, order must be maintained.
5404
+ *
5405
+ * @author Trevor Smith
5406
+ */
5407
+ var ConnectorType;
5408
+ (function (ConnectorType) {
5409
+ ConnectorType["FusionAuth"] = "FusionAuth";
5410
+ ConnectorType["Generic"] = "Generic";
5411
+ ConnectorType["LDAP"] = "LDAP";
5412
+ })(ConnectorType = exports.ConnectorType || (exports.ConnectorType = {}));
5413
+ /**
5414
+ * Models a consent.
5415
+ *
5416
+ * @author Daniel DeGroff
5417
+ */
5418
+ var ConsentStatus;
5419
+ (function (ConsentStatus) {
5420
+ ConsentStatus["Active"] = "Active";
5421
+ ConsentStatus["Revoked"] = "Revoked";
5422
+ })(ConsentStatus = exports.ConsentStatus || (exports.ConsentStatus = {}));
5423
+ /**
5424
+ * Status for content like usernames, profile attributes, etc.
5425
+ *
5426
+ * @author Brian Pontarelli
5427
+ */
5428
+ var ContentStatus;
5429
+ (function (ContentStatus) {
5430
+ ContentStatus["ACTIVE"] = "ACTIVE";
5431
+ ContentStatus["PENDING"] = "PENDING";
5432
+ ContentStatus["REJECTED"] = "REJECTED";
5433
+ })(ContentStatus = exports.ContentStatus || (exports.ContentStatus = {}));
5199
5434
  /**
5200
5435
  * A number identifying a cryptographic algorithm. Values should be registered with the <a
5201
5436
  * href="https://www.iana.org/assignments/cose/cose.xhtml#algorithms">IANA COSE Algorithms registry</a>
@@ -5214,47 +5449,169 @@ var CoseAlgorithmIdentifier;
5214
5449
  CoseAlgorithmIdentifier["PS384"] = "SHA-384";
5215
5450
  CoseAlgorithmIdentifier["PS512"] = "SHA-512";
5216
5451
  })(CoseAlgorithmIdentifier = exports.CoseAlgorithmIdentifier || (exports.CoseAlgorithmIdentifier = {}));
5452
+ /**
5453
+ * COSE Elliptic Curve identifier to determine which elliptic curve to use with a given key
5454
+ *
5455
+ * @author Spencer Witt
5456
+ */
5457
+ var CoseEllipticCurve;
5458
+ (function (CoseEllipticCurve) {
5459
+ CoseEllipticCurve["Reserved"] = "Reserved";
5460
+ CoseEllipticCurve["P256"] = "P256";
5461
+ CoseEllipticCurve["P384"] = "P384";
5462
+ CoseEllipticCurve["P521"] = "P521";
5463
+ CoseEllipticCurve["X25519"] = "X25519";
5464
+ CoseEllipticCurve["X448"] = "X448";
5465
+ CoseEllipticCurve["Ed25519"] = "Ed25519";
5466
+ CoseEllipticCurve["Ed448"] = "Ed448";
5467
+ CoseEllipticCurve["Secp256k1"] = "Secp256k1";
5468
+ })(CoseEllipticCurve = exports.CoseEllipticCurve || (exports.CoseEllipticCurve = {}));
5469
+ /**
5470
+ * COSE key type
5471
+ *
5472
+ * @author Spencer Witt
5473
+ */
5474
+ var CoseKeyType;
5475
+ (function (CoseKeyType) {
5476
+ CoseKeyType["Reserved"] = "0";
5477
+ CoseKeyType["OKP"] = "1";
5478
+ CoseKeyType["EC2"] = "2";
5479
+ CoseKeyType["RSA"] = "3";
5480
+ CoseKeyType["Symmetric"] = "4";
5481
+ })(CoseKeyType = exports.CoseKeyType || (exports.CoseKeyType = {}));
5482
+ var DeviceType;
5483
+ (function (DeviceType) {
5484
+ DeviceType["BROWSER"] = "BROWSER";
5485
+ DeviceType["DESKTOP"] = "DESKTOP";
5486
+ DeviceType["LAPTOP"] = "LAPTOP";
5487
+ DeviceType["MOBILE"] = "MOBILE";
5488
+ DeviceType["OTHER"] = "OTHER";
5489
+ DeviceType["SERVER"] = "SERVER";
5490
+ DeviceType["TABLET"] = "TABLET";
5491
+ DeviceType["TV"] = "TV";
5492
+ DeviceType["UNKNOWN"] = "UNKNOWN";
5493
+ })(DeviceType = exports.DeviceType || (exports.DeviceType = {}));
5494
+ var EmailSecurityType;
5495
+ (function (EmailSecurityType) {
5496
+ EmailSecurityType["NONE"] = "NONE";
5497
+ EmailSecurityType["SSL"] = "SSL";
5498
+ EmailSecurityType["TLS"] = "TLS";
5499
+ })(EmailSecurityType = exports.EmailSecurityType || (exports.EmailSecurityType = {}));
5500
+ /**
5501
+ * Event Log Type
5502
+ *
5503
+ * @author Daniel DeGroff
5504
+ */
5505
+ var EventLogType;
5506
+ (function (EventLogType) {
5507
+ EventLogType["Information"] = "Information";
5508
+ EventLogType["Debug"] = "Debug";
5509
+ EventLogType["Error"] = "Error";
5510
+ })(EventLogType = exports.EventLogType || (exports.EventLogType = {}));
5511
+ /**
5512
+ * Models the event types that FusionAuth produces.
5513
+ *
5514
+ * @author Brian Pontarelli
5515
+ */
5516
+ var EventType;
5517
+ (function (EventType) {
5518
+ EventType["JWTPublicKeyUpdate"] = "jwt.public-key.update";
5519
+ EventType["JWTRefreshTokenRevoke"] = "jwt.refresh-token.revoke";
5520
+ EventType["JWTRefresh"] = "jwt.refresh";
5521
+ EventType["AuditLogCreate"] = "audit-log.create";
5522
+ EventType["EventLogCreate"] = "event-log.create";
5523
+ EventType["KickstartSuccess"] = "kickstart.success";
5524
+ EventType["GroupCreate"] = "group.create";
5525
+ EventType["GroupCreateComplete"] = "group.create.complete";
5526
+ EventType["GroupDelete"] = "group.delete";
5527
+ EventType["GroupDeleteComplete"] = "group.delete.complete";
5528
+ EventType["GroupMemberAdd"] = "group.member.add";
5529
+ EventType["GroupMemberAddComplete"] = "group.member.add.complete";
5530
+ EventType["GroupMemberRemove"] = "group.member.remove";
5531
+ EventType["GroupMemberRemoveComplete"] = "group.member.remove.complete";
5532
+ EventType["GroupMemberUpdate"] = "group.member.update";
5533
+ EventType["GroupMemberUpdateComplete"] = "group.member.update.complete";
5534
+ EventType["GroupUpdate"] = "group.update";
5535
+ EventType["GroupUpdateComplete"] = "group.update.complete";
5536
+ EventType["UserAction"] = "user.action";
5537
+ EventType["UserBulkCreate"] = "user.bulk.create";
5538
+ EventType["UserCreate"] = "user.create";
5539
+ EventType["UserCreateComplete"] = "user.create.complete";
5540
+ EventType["UserDeactivate"] = "user.deactivate";
5541
+ EventType["UserDelete"] = "user.delete";
5542
+ EventType["UserDeleteComplete"] = "user.delete.complete";
5543
+ EventType["UserEmailUpdate"] = "user.email.update";
5544
+ EventType["UserEmailVerified"] = "user.email.verified";
5545
+ EventType["UserIdentityProviderLink"] = "user.identity-provider.link";
5546
+ EventType["UserIdentityProviderUnlink"] = "user.identity-provider.unlink";
5547
+ EventType["UserLoginIdDuplicateOnCreate"] = "user.loginId.duplicate.create";
5548
+ EventType["UserLoginIdDuplicateOnUpdate"] = "user.loginId.duplicate.update";
5549
+ EventType["UserLoginFailed"] = "user.login.failed";
5550
+ EventType["UserLoginNewDevice"] = "user.login.new-device";
5551
+ EventType["UserLoginSuccess"] = "user.login.success";
5552
+ EventType["UserLoginSuspicious"] = "user.login.suspicious";
5553
+ EventType["UserPasswordBreach"] = "user.password.breach";
5554
+ EventType["UserPasswordResetSend"] = "user.password.reset.send";
5555
+ EventType["UserPasswordResetStart"] = "user.password.reset.start";
5556
+ EventType["UserPasswordResetSuccess"] = "user.password.reset.success";
5557
+ EventType["UserPasswordUpdate"] = "user.password.update";
5558
+ EventType["UserReactivate"] = "user.reactivate";
5559
+ EventType["UserRegistrationCreate"] = "user.registration.create";
5560
+ EventType["UserRegistrationCreateComplete"] = "user.registration.create.complete";
5561
+ EventType["UserRegistrationDelete"] = "user.registration.delete";
5562
+ EventType["UserRegistrationDeleteComplete"] = "user.registration.delete.complete";
5563
+ EventType["UserRegistrationUpdate"] = "user.registration.update";
5564
+ EventType["UserRegistrationUpdateComplete"] = "user.registration.update.complete";
5565
+ EventType["UserRegistrationVerified"] = "user.registration.verified";
5566
+ EventType["UserTwoFactorMethodAdd"] = "user.two-factor.method.add";
5567
+ EventType["UserTwoFactorMethodRemove"] = "user.two-factor.method.remove";
5568
+ EventType["UserUpdate"] = "user.update";
5569
+ EventType["UserUpdateComplete"] = "user.update.complete";
5570
+ EventType["Test"] = "test";
5571
+ })(EventType = exports.EventType || (exports.EventType = {}));
5217
5572
  /**
5218
5573
  * @author Brian Pontarelli
5219
5574
  */
5220
- var ReactorFeatureStatus;
5221
- (function (ReactorFeatureStatus) {
5222
- ReactorFeatureStatus["ACTIVE"] = "ACTIVE";
5223
- ReactorFeatureStatus["DISCONNECTED"] = "DISCONNECTED";
5224
- ReactorFeatureStatus["PENDING"] = "PENDING";
5225
- ReactorFeatureStatus["DISABLED"] = "DISABLED";
5226
- ReactorFeatureStatus["UNKNOWN"] = "UNKNOWN";
5227
- })(ReactorFeatureStatus = exports.ReactorFeatureStatus || (exports.ReactorFeatureStatus = {}));
5575
+ var ExpiryUnit;
5576
+ (function (ExpiryUnit) {
5577
+ ExpiryUnit["MINUTES"] = "MINUTES";
5578
+ ExpiryUnit["HOURS"] = "HOURS";
5579
+ ExpiryUnit["DAYS"] = "DAYS";
5580
+ ExpiryUnit["WEEKS"] = "WEEKS";
5581
+ ExpiryUnit["MONTHS"] = "MONTHS";
5582
+ ExpiryUnit["YEARS"] = "YEARS";
5583
+ })(ExpiryUnit = exports.ExpiryUnit || (exports.ExpiryUnit = {}));
5584
+ var FamilyRole;
5585
+ (function (FamilyRole) {
5586
+ FamilyRole["Child"] = "Child";
5587
+ FamilyRole["Teen"] = "Teen";
5588
+ FamilyRole["Adult"] = "Adult";
5589
+ })(FamilyRole = exports.FamilyRole || (exports.FamilyRole = {}));
5228
5590
  /**
5229
5591
  * @author Daniel DeGroff
5230
5592
  */
5231
- var UnverifiedBehavior;
5232
- (function (UnverifiedBehavior) {
5233
- UnverifiedBehavior["Allow"] = "Allow";
5234
- UnverifiedBehavior["Gated"] = "Gated";
5235
- })(UnverifiedBehavior = exports.UnverifiedBehavior || (exports.UnverifiedBehavior = {}));
5593
+ var FormControl;
5594
+ (function (FormControl) {
5595
+ FormControl["checkbox"] = "checkbox";
5596
+ FormControl["number"] = "number";
5597
+ FormControl["password"] = "password";
5598
+ FormControl["radio"] = "radio";
5599
+ FormControl["select"] = "select";
5600
+ FormControl["textarea"] = "textarea";
5601
+ FormControl["text"] = "text";
5602
+ })(FormControl = exports.FormControl || (exports.FormControl = {}));
5236
5603
  /**
5237
- * @author Brett Guy
5604
+ * @author Daniel DeGroff
5238
5605
  */
5239
- var MessengerType;
5240
- (function (MessengerType) {
5241
- MessengerType["Generic"] = "Generic";
5242
- MessengerType["Kafka"] = "Kafka";
5243
- MessengerType["Twilio"] = "Twilio";
5244
- })(MessengerType = exports.MessengerType || (exports.MessengerType = {}));
5245
- var BreachAction;
5246
- (function (BreachAction) {
5247
- BreachAction["Off"] = "Off";
5248
- BreachAction["RecordOnly"] = "RecordOnly";
5249
- BreachAction["NotifyUser"] = "NotifyUser";
5250
- BreachAction["RequireChange"] = "RequireChange";
5251
- })(BreachAction = exports.BreachAction || (exports.BreachAction = {}));
5252
- var BreachMatchMode;
5253
- (function (BreachMatchMode) {
5254
- BreachMatchMode["Low"] = "Low";
5255
- BreachMatchMode["Medium"] = "Medium";
5256
- BreachMatchMode["High"] = "High";
5257
- })(BreachMatchMode = exports.BreachMatchMode || (exports.BreachMatchMode = {}));
5606
+ var FormDataType;
5607
+ (function (FormDataType) {
5608
+ FormDataType["bool"] = "bool";
5609
+ FormDataType["consent"] = "consent";
5610
+ FormDataType["date"] = "date";
5611
+ FormDataType["email"] = "email";
5612
+ FormDataType["number"] = "number";
5613
+ FormDataType["string"] = "string";
5614
+ })(FormDataType = exports.FormDataType || (exports.FormDataType = {}));
5258
5615
  /**
5259
5616
  * @author Daniel DeGroff
5260
5617
  */
@@ -5264,51 +5621,34 @@ var FormFieldAdminPolicy;
5264
5621
  FormFieldAdminPolicy["View"] = "View";
5265
5622
  })(FormFieldAdminPolicy = exports.FormFieldAdminPolicy || (exports.FormFieldAdminPolicy = {}));
5266
5623
  /**
5267
- * Used to communicate whether and how authenticator attestation should be delivered to the Relying Party
5268
- *
5269
- * @author Spencer Witt
5270
- */
5271
- var AttestationConveyancePreference;
5272
- (function (AttestationConveyancePreference) {
5273
- AttestationConveyancePreference["none"] = "none";
5274
- AttestationConveyancePreference["indirect"] = "indirect";
5275
- AttestationConveyancePreference["direct"] = "direct";
5276
- AttestationConveyancePreference["enterprise"] = "enterprise";
5277
- })(AttestationConveyancePreference = exports.AttestationConveyancePreference || (exports.AttestationConveyancePreference = {}));
5278
- /**
5279
- * The possible result states of a webhook event. This tracks the success of the overall webhook transaction according to the {@link TransactionType}
5280
- * and configured webhooks.
5281
- *
5282
- * @author Spencer Witt
5283
- */
5284
- var WebhookEventResult;
5285
- (function (WebhookEventResult) {
5286
- WebhookEventResult["Failed"] = "Failed";
5287
- WebhookEventResult["Running"] = "Running";
5288
- WebhookEventResult["Succeeded"] = "Succeeded";
5289
- })(WebhookEventResult = exports.WebhookEventResult || (exports.WebhookEventResult = {}));
5290
- /**
5291
- * Identifies the WebAuthn workflow. This will affect the parameters used for credential creation
5292
- * and request based on the Tenant configuration.
5293
- *
5294
- * @author Spencer Witt
5624
+ * @author Daniel DeGroff
5295
5625
  */
5296
- var WebAuthnWorkflow;
5297
- (function (WebAuthnWorkflow) {
5298
- WebAuthnWorkflow["bootstrap"] = "bootstrap";
5299
- WebAuthnWorkflow["general"] = "general";
5300
- WebAuthnWorkflow["reauthentication"] = "reauthentication";
5301
- })(WebAuthnWorkflow = exports.WebAuthnWorkflow || (exports.WebAuthnWorkflow = {}));
5626
+ var FormType;
5627
+ (function (FormType) {
5628
+ FormType["registration"] = "registration";
5629
+ FormType["adminRegistration"] = "adminRegistration";
5630
+ FormType["adminUser"] = "adminUser";
5631
+ FormType["selfServiceUser"] = "selfServiceUser";
5632
+ })(FormType = exports.FormType || (exports.FormType = {}));
5302
5633
  /**
5303
- * Models a consent.
5634
+ * Authorization Grant types as defined by the <a href="https://tools.ietf.org/html/rfc6749">The OAuth 2.0 Authorization
5635
+ * Framework - RFC 6749</a>.
5636
+ * <p>
5637
+ * Specific names as defined by <a href="https://tools.ietf.org/html/rfc7591#section-4.1">
5638
+ * OAuth 2.0 Dynamic Client Registration Protocol - RFC 7591 Section 4.1</a>
5304
5639
  *
5305
5640
  * @author Daniel DeGroff
5306
5641
  */
5307
- var ConsentStatus;
5308
- (function (ConsentStatus) {
5309
- ConsentStatus["Active"] = "Active";
5310
- ConsentStatus["Revoked"] = "Revoked";
5311
- })(ConsentStatus = exports.ConsentStatus || (exports.ConsentStatus = {}));
5642
+ var GrantType;
5643
+ (function (GrantType) {
5644
+ GrantType["authorization_code"] = "authorization_code";
5645
+ GrantType["implicit"] = "implicit";
5646
+ GrantType["password"] = "password";
5647
+ GrantType["client_credentials"] = "client_credentials";
5648
+ GrantType["refresh_token"] = "refresh_token";
5649
+ GrantType["unknown"] = "unknown";
5650
+ GrantType["device_code"] = "urn:ietf:params:oauth:grant-type:device_code";
5651
+ })(GrantType = exports.GrantType || (exports.GrantType = {}));
5312
5652
  /**
5313
5653
  * @author Daniel DeGroff
5314
5654
  */
@@ -5323,24 +5663,84 @@ var HTTPMethod;
5323
5663
  HTTPMethod["PATCH"] = "PATCH";
5324
5664
  })(HTTPMethod = exports.HTTPMethod || (exports.HTTPMethod = {}));
5325
5665
  /**
5666
+ * @author Brett Guy
5667
+ */
5668
+ var IPAccessControlEntryAction;
5669
+ (function (IPAccessControlEntryAction) {
5670
+ IPAccessControlEntryAction["Allow"] = "Allow";
5671
+ IPAccessControlEntryAction["Block"] = "Block";
5672
+ })(IPAccessControlEntryAction = exports.IPAccessControlEntryAction || (exports.IPAccessControlEntryAction = {}));
5673
+ /**
5674
+ * The IdP behavior when no user link has been made yet.
5675
+ *
5326
5676
  * @author Daniel DeGroff
5327
5677
  */
5328
- var UserState;
5329
- (function (UserState) {
5330
- UserState["Authenticated"] = "Authenticated";
5331
- UserState["AuthenticatedNotRegistered"] = "AuthenticatedNotRegistered";
5332
- UserState["AuthenticatedNotVerified"] = "AuthenticatedNotVerified";
5333
- UserState["AuthenticatedRegistrationNotVerified"] = "AuthenticatedRegistrationNotVerified";
5334
- })(UserState = exports.UserState || (exports.UserState = {}));
5678
+ var IdentityProviderLinkingStrategy;
5679
+ (function (IdentityProviderLinkingStrategy) {
5680
+ IdentityProviderLinkingStrategy["CreatePendingLink"] = "CreatePendingLink";
5681
+ IdentityProviderLinkingStrategy["Disabled"] = "Disabled";
5682
+ IdentityProviderLinkingStrategy["LinkAnonymously"] = "LinkAnonymously";
5683
+ IdentityProviderLinkingStrategy["LinkByEmail"] = "LinkByEmail";
5684
+ IdentityProviderLinkingStrategy["LinkByEmailForExistingUser"] = "LinkByEmailForExistingUser";
5685
+ IdentityProviderLinkingStrategy["LinkByUsername"] = "LinkByUsername";
5686
+ IdentityProviderLinkingStrategy["LinkByUsernameForExistingUser"] = "LinkByUsernameForExistingUser";
5687
+ IdentityProviderLinkingStrategy["Unsupported"] = "Unsupported";
5688
+ })(IdentityProviderLinkingStrategy = exports.IdentityProviderLinkingStrategy || (exports.IdentityProviderLinkingStrategy = {}));
5689
+ /**
5690
+ * @author Brett Pontarelli
5691
+ */
5692
+ var IdentityProviderLoginMethod;
5693
+ (function (IdentityProviderLoginMethod) {
5694
+ IdentityProviderLoginMethod["UsePopup"] = "UsePopup";
5695
+ IdentityProviderLoginMethod["UseRedirect"] = "UseRedirect";
5696
+ IdentityProviderLoginMethod["UseVendorJavaScript"] = "UseVendorJavaScript";
5697
+ })(IdentityProviderLoginMethod = exports.IdentityProviderLoginMethod || (exports.IdentityProviderLoginMethod = {}));
5698
+ var ClientAuthenticationMethod;
5699
+ (function (ClientAuthenticationMethod) {
5700
+ ClientAuthenticationMethod["none"] = "none";
5701
+ ClientAuthenticationMethod["client_secret_basic"] = "client_secret_basic";
5702
+ ClientAuthenticationMethod["client_secret_post"] = "client_secret_post";
5703
+ })(ClientAuthenticationMethod = exports.ClientAuthenticationMethod || (exports.ClientAuthenticationMethod = {}));
5335
5704
  /**
5336
5705
  * @author Daniel DeGroff
5337
5706
  */
5338
- var RefreshTokenExpirationPolicy;
5339
- (function (RefreshTokenExpirationPolicy) {
5340
- RefreshTokenExpirationPolicy["Fixed"] = "Fixed";
5341
- RefreshTokenExpirationPolicy["SlidingWindow"] = "SlidingWindow";
5342
- RefreshTokenExpirationPolicy["SlidingWindowWithMaximumLifetime"] = "SlidingWindowWithMaximumLifetime";
5343
- })(RefreshTokenExpirationPolicy = exports.RefreshTokenExpirationPolicy || (exports.RefreshTokenExpirationPolicy = {}));
5707
+ var IdentityProviderType;
5708
+ (function (IdentityProviderType) {
5709
+ IdentityProviderType["Apple"] = "Apple";
5710
+ IdentityProviderType["EpicGames"] = "EpicGames";
5711
+ IdentityProviderType["ExternalJWT"] = "ExternalJWT";
5712
+ IdentityProviderType["Facebook"] = "Facebook";
5713
+ IdentityProviderType["Google"] = "Google";
5714
+ IdentityProviderType["HYPR"] = "HYPR";
5715
+ IdentityProviderType["LinkedIn"] = "LinkedIn";
5716
+ IdentityProviderType["Nintendo"] = "Nintendo";
5717
+ IdentityProviderType["OpenIDConnect"] = "OpenIDConnect";
5718
+ IdentityProviderType["SAMLv2"] = "SAMLv2";
5719
+ IdentityProviderType["SAMLv2IdPInitiated"] = "SAMLv2IdPInitiated";
5720
+ IdentityProviderType["SonyPSN"] = "SonyPSN";
5721
+ IdentityProviderType["Steam"] = "Steam";
5722
+ IdentityProviderType["Twitch"] = "Twitch";
5723
+ IdentityProviderType["Twitter"] = "Twitter";
5724
+ IdentityProviderType["Xbox"] = "Xbox";
5725
+ })(IdentityProviderType = exports.IdentityProviderType || (exports.IdentityProviderType = {}));
5726
+ var KeyAlgorithm;
5727
+ (function (KeyAlgorithm) {
5728
+ KeyAlgorithm["ES256"] = "ES256";
5729
+ KeyAlgorithm["ES384"] = "ES384";
5730
+ KeyAlgorithm["ES512"] = "ES512";
5731
+ KeyAlgorithm["HS256"] = "HS256";
5732
+ KeyAlgorithm["HS384"] = "HS384";
5733
+ KeyAlgorithm["HS512"] = "HS512";
5734
+ KeyAlgorithm["RS256"] = "RS256";
5735
+ KeyAlgorithm["RS384"] = "RS384";
5736
+ KeyAlgorithm["RS512"] = "RS512";
5737
+ })(KeyAlgorithm = exports.KeyAlgorithm || (exports.KeyAlgorithm = {}));
5738
+ var KeyType;
5739
+ (function (KeyType) {
5740
+ KeyType["EC"] = "EC";
5741
+ KeyType["RSA"] = "RSA";
5742
+ KeyType["HMAC"] = "HMAC";
5743
+ })(KeyType = exports.KeyType || (exports.KeyType = {}));
5344
5744
  /**
5345
5745
  * The use type of a key.
5346
5746
  *
@@ -5352,193 +5752,98 @@ var KeyUse;
5352
5752
  KeyUse["SignAndVerify"] = "SignAndVerify";
5353
5753
  KeyUse["VerifyOnly"] = "VerifyOnly";
5354
5754
  })(KeyUse = exports.KeyUse || (exports.KeyUse = {}));
5755
+ var LDAPSecurityMethod;
5756
+ (function (LDAPSecurityMethod) {
5757
+ LDAPSecurityMethod["None"] = "None";
5758
+ LDAPSecurityMethod["LDAPS"] = "LDAPS";
5759
+ LDAPSecurityMethod["StartTLS"] = "StartTLS";
5760
+ })(LDAPSecurityMethod = exports.LDAPSecurityMethod || (exports.LDAPSecurityMethod = {}));
5355
5761
  /**
5356
5762
  * @author Daniel DeGroff
5357
5763
  */
5358
- var BreachedPasswordStatus;
5359
- (function (BreachedPasswordStatus) {
5360
- BreachedPasswordStatus["None"] = "None";
5361
- BreachedPasswordStatus["ExactMatch"] = "ExactMatch";
5362
- BreachedPasswordStatus["SubAddressMatch"] = "SubAddressMatch";
5363
- BreachedPasswordStatus["PasswordOnly"] = "PasswordOnly";
5364
- BreachedPasswordStatus["CommonPassword"] = "CommonPassword";
5365
- })(BreachedPasswordStatus = exports.BreachedPasswordStatus || (exports.BreachedPasswordStatus = {}));
5366
- /**
5367
- * @author Daniel DeGroff
5368
- */
5369
- var FormControl;
5370
- (function (FormControl) {
5371
- FormControl["checkbox"] = "checkbox";
5372
- FormControl["number"] = "number";
5373
- FormControl["password"] = "password";
5374
- FormControl["radio"] = "radio";
5375
- FormControl["select"] = "select";
5376
- FormControl["textarea"] = "textarea";
5377
- FormControl["text"] = "text";
5378
- })(FormControl = exports.FormControl || (exports.FormControl = {}));
5764
+ var LambdaEngineType;
5765
+ (function (LambdaEngineType) {
5766
+ LambdaEngineType["GraalJS"] = "GraalJS";
5767
+ LambdaEngineType["Nashorn"] = "Nashorn";
5768
+ })(LambdaEngineType = exports.LambdaEngineType || (exports.LambdaEngineType = {}));
5379
5769
  /**
5380
- * Controls the policy for whether OAuth workflows will more strictly adhere to the OAuth and OIDC specification
5381
- * or run in backwards compatibility mode.
5770
+ * The types of lambdas that indicate how they are invoked by FusionAuth.
5382
5771
  *
5383
- * @author David Charles
5772
+ * @author Brian Pontarelli
5384
5773
  */
5385
- var OAuthScopeHandlingPolicy;
5386
- (function (OAuthScopeHandlingPolicy) {
5387
- OAuthScopeHandlingPolicy["Compatibility"] = "Compatibility";
5388
- OAuthScopeHandlingPolicy["Strict"] = "Strict";
5389
- })(OAuthScopeHandlingPolicy = exports.OAuthScopeHandlingPolicy || (exports.OAuthScopeHandlingPolicy = {}));
5774
+ var LambdaType;
5775
+ (function (LambdaType) {
5776
+ LambdaType["JWTPopulate"] = "JWTPopulate";
5777
+ LambdaType["OpenIDReconcile"] = "OpenIDReconcile";
5778
+ LambdaType["SAMLv2Reconcile"] = "SAMLv2Reconcile";
5779
+ LambdaType["SAMLv2Populate"] = "SAMLv2Populate";
5780
+ LambdaType["AppleReconcile"] = "AppleReconcile";
5781
+ LambdaType["ExternalJWTReconcile"] = "ExternalJWTReconcile";
5782
+ LambdaType["FacebookReconcile"] = "FacebookReconcile";
5783
+ LambdaType["GoogleReconcile"] = "GoogleReconcile";
5784
+ LambdaType["HYPRReconcile"] = "HYPRReconcile";
5785
+ LambdaType["TwitterReconcile"] = "TwitterReconcile";
5786
+ LambdaType["LDAPConnectorReconcile"] = "LDAPConnectorReconcile";
5787
+ LambdaType["LinkedInReconcile"] = "LinkedInReconcile";
5788
+ LambdaType["EpicGamesReconcile"] = "EpicGamesReconcile";
5789
+ LambdaType["NintendoReconcile"] = "NintendoReconcile";
5790
+ LambdaType["SonyPSNReconcile"] = "SonyPSNReconcile";
5791
+ LambdaType["SteamReconcile"] = "SteamReconcile";
5792
+ LambdaType["TwitchReconcile"] = "TwitchReconcile";
5793
+ LambdaType["XboxReconcile"] = "XboxReconcile";
5794
+ LambdaType["ClientCredentialsJWTPopulate"] = "ClientCredentialsJWTPopulate";
5795
+ LambdaType["SCIMServerGroupRequestConverter"] = "SCIMServerGroupRequestConverter";
5796
+ LambdaType["SCIMServerGroupResponseConverter"] = "SCIMServerGroupResponseConverter";
5797
+ LambdaType["SCIMServerUserRequestConverter"] = "SCIMServerUserRequestConverter";
5798
+ LambdaType["SCIMServerUserResponseConverter"] = "SCIMServerUserResponseConverter";
5799
+ LambdaType["SelfServiceRegistrationValidation"] = "SelfServiceRegistrationValidation";
5800
+ LambdaType["UserInfoPopulate"] = "UserInfoPopulate";
5801
+ LambdaType["LoginValidation"] = "LoginValidation";
5802
+ })(LambdaType = exports.LambdaType || (exports.LambdaType = {}));
5390
5803
  /**
5391
- * The possible states of an individual webhook attempt to a single endpoint.
5392
- *
5393
- * @author Spencer Witt
5804
+ * @author Matthew Altman
5394
5805
  */
5395
- var WebhookAttemptResult;
5396
- (function (WebhookAttemptResult) {
5397
- WebhookAttemptResult["Success"] = "Success";
5398
- WebhookAttemptResult["Failure"] = "Failure";
5399
- WebhookAttemptResult["Unknown"] = "Unknown";
5400
- })(WebhookAttemptResult = exports.WebhookAttemptResult || (exports.WebhookAttemptResult = {}));
5806
+ var LogoutBehavior;
5807
+ (function (LogoutBehavior) {
5808
+ LogoutBehavior["RedirectOnly"] = "RedirectOnly";
5809
+ LogoutBehavior["AllApplications"] = "AllApplications";
5810
+ })(LogoutBehavior = exports.LogoutBehavior || (exports.LogoutBehavior = {}));
5401
5811
  /**
5402
- * Event Log Type
5403
- *
5404
- * @author Daniel DeGroff
5812
+ * @author Mikey Sleevi
5405
5813
  */
5406
- var EventLogType;
5407
- (function (EventLogType) {
5408
- EventLogType["Information"] = "Information";
5409
- EventLogType["Debug"] = "Debug";
5410
- EventLogType["Error"] = "Error";
5411
- })(EventLogType = exports.EventLogType || (exports.EventLogType = {}));
5814
+ var MessageType;
5815
+ (function (MessageType) {
5816
+ MessageType["SMS"] = "SMS";
5817
+ })(MessageType = exports.MessageType || (exports.MessageType = {}));
5412
5818
  /**
5413
- * The transaction types for Webhooks and other event systems within FusionAuth.
5414
- *
5415
- * @author Brian Pontarelli
5819
+ * @author Brett Guy
5416
5820
  */
5417
- var TransactionType;
5418
- (function (TransactionType) {
5419
- TransactionType["None"] = "None";
5420
- TransactionType["Any"] = "Any";
5421
- TransactionType["SimpleMajority"] = "SimpleMajority";
5422
- TransactionType["SuperMajority"] = "SuperMajority";
5423
- TransactionType["AbsoluteMajority"] = "AbsoluteMajority";
5424
- })(TransactionType = exports.TransactionType || (exports.TransactionType = {}));
5425
- /**
5426
- * COSE key type
5427
- *
5428
- * @author Spencer Witt
5429
- */
5430
- var CoseKeyType;
5431
- (function (CoseKeyType) {
5432
- CoseKeyType["Reserved"] = "0";
5433
- CoseKeyType["OKP"] = "1";
5434
- CoseKeyType["EC2"] = "2";
5435
- CoseKeyType["RSA"] = "3";
5436
- CoseKeyType["Symmetric"] = "4";
5437
- })(CoseKeyType = exports.CoseKeyType || (exports.CoseKeyType = {}));
5438
- var ThemeType;
5439
- (function (ThemeType) {
5440
- ThemeType["advanced"] = "advanced";
5441
- ThemeType["simple"] = "simple";
5442
- })(ThemeType = exports.ThemeType || (exports.ThemeType = {}));
5443
- /**
5444
- * The types of connectors. This enum is stored as an ordinal on the <code>identities</code> table, order must be maintained.
5445
- *
5446
- * @author Trevor Smith
5447
- */
5448
- var ConnectorType;
5449
- (function (ConnectorType) {
5450
- ConnectorType["FusionAuth"] = "FusionAuth";
5451
- ConnectorType["Generic"] = "Generic";
5452
- ConnectorType["LDAP"] = "LDAP";
5453
- })(ConnectorType = exports.ConnectorType || (exports.ConnectorType = {}));
5454
- /**
5455
- * @author Brett Guy
5456
- */
5457
- var ProofKeyForCodeExchangePolicy;
5458
- (function (ProofKeyForCodeExchangePolicy) {
5459
- ProofKeyForCodeExchangePolicy["Required"] = "Required";
5460
- ProofKeyForCodeExchangePolicy["NotRequired"] = "NotRequired";
5461
- ProofKeyForCodeExchangePolicy["NotRequiredWhenUsingClientAuthentication"] = "NotRequiredWhenUsingClientAuthentication";
5462
- })(ProofKeyForCodeExchangePolicy = exports.ProofKeyForCodeExchangePolicy || (exports.ProofKeyForCodeExchangePolicy = {}));
5463
- /**
5464
- * @author Mikey Sleevi
5465
- */
5466
- var MessageType;
5467
- (function (MessageType) {
5468
- MessageType["SMS"] = "SMS";
5469
- })(MessageType = exports.MessageType || (exports.MessageType = {}));
5470
- /**
5471
- * Describes the Relying Party's requirements for <a href="https://www.w3.org/TR/webauthn-2/#client-side-discoverable-credential">client-side
5472
- * discoverable credentials</a> (formerly known as "resident keys")
5473
- *
5474
- * @author Spencer Witt
5475
- */
5476
- var ResidentKeyRequirement;
5477
- (function (ResidentKeyRequirement) {
5478
- ResidentKeyRequirement["discouraged"] = "discouraged";
5479
- ResidentKeyRequirement["preferred"] = "preferred";
5480
- ResidentKeyRequirement["required"] = "required";
5481
- })(ResidentKeyRequirement = exports.ResidentKeyRequirement || (exports.ResidentKeyRequirement = {}));
5482
- /**
5483
- * @author Trevor Smith
5484
- */
5485
- var ChangePasswordReason;
5486
- (function (ChangePasswordReason) {
5487
- ChangePasswordReason["Administrative"] = "Administrative";
5488
- ChangePasswordReason["Breached"] = "Breached";
5489
- ChangePasswordReason["Expired"] = "Expired";
5490
- ChangePasswordReason["Validation"] = "Validation";
5491
- })(ChangePasswordReason = exports.ChangePasswordReason || (exports.ChangePasswordReason = {}));
5492
- var LDAPSecurityMethod;
5493
- (function (LDAPSecurityMethod) {
5494
- LDAPSecurityMethod["None"] = "None";
5495
- LDAPSecurityMethod["LDAPS"] = "LDAPS";
5496
- LDAPSecurityMethod["StartTLS"] = "StartTLS";
5497
- })(LDAPSecurityMethod = exports.LDAPSecurityMethod || (exports.LDAPSecurityMethod = {}));
5821
+ var MessengerType;
5822
+ (function (MessengerType) {
5823
+ MessengerType["Generic"] = "Generic";
5824
+ MessengerType["Kafka"] = "Kafka";
5825
+ MessengerType["Twilio"] = "Twilio";
5826
+ })(MessengerType = exports.MessengerType || (exports.MessengerType = {}));
5498
5827
  /**
5499
- * @author Johnathon Wood
5828
+ * @author Daniel DeGroff
5500
5829
  */
5501
- var Oauth2AuthorizedURLValidationPolicy;
5502
- (function (Oauth2AuthorizedURLValidationPolicy) {
5503
- Oauth2AuthorizedURLValidationPolicy["AllowWildcards"] = "AllowWildcards";
5504
- Oauth2AuthorizedURLValidationPolicy["ExactMatch"] = "ExactMatch";
5505
- })(Oauth2AuthorizedURLValidationPolicy = exports.Oauth2AuthorizedURLValidationPolicy || (exports.Oauth2AuthorizedURLValidationPolicy = {}));
5830
+ var MultiFactorLoginPolicy;
5831
+ (function (MultiFactorLoginPolicy) {
5832
+ MultiFactorLoginPolicy["Disabled"] = "Disabled";
5833
+ MultiFactorLoginPolicy["Enabled"] = "Enabled";
5834
+ MultiFactorLoginPolicy["Required"] = "Required";
5835
+ })(MultiFactorLoginPolicy = exports.MultiFactorLoginPolicy || (exports.MultiFactorLoginPolicy = {}));
5506
5836
  /**
5507
- * Describes the <a href="https://www.w3.org/TR/webauthn-2/#authenticator-attachment-modality">authenticator attachment modality</a>.
5837
+ * The application's relationship to the authorization server. First-party applications will be granted implicit permission for requested scopes.
5838
+ * Third-party applications will use the {@link OAuthScopeConsentMode} policy.
5508
5839
  *
5509
5840
  * @author Spencer Witt
5510
5841
  */
5511
- var AuthenticatorAttachment;
5512
- (function (AuthenticatorAttachment) {
5513
- AuthenticatorAttachment["platform"] = "platform";
5514
- AuthenticatorAttachment["crossPlatform"] = "crossPlatform";
5515
- })(AuthenticatorAttachment = exports.AuthenticatorAttachment || (exports.AuthenticatorAttachment = {}));
5516
- /**
5517
- * @author Brett Pontarelli
5518
- */
5519
- var IdentityProviderLoginMethod;
5520
- (function (IdentityProviderLoginMethod) {
5521
- IdentityProviderLoginMethod["UsePopup"] = "UsePopup";
5522
- IdentityProviderLoginMethod["UseRedirect"] = "UseRedirect";
5523
- IdentityProviderLoginMethod["UseVendorJavaScript"] = "UseVendorJavaScript";
5524
- })(IdentityProviderLoginMethod = exports.IdentityProviderLoginMethod || (exports.IdentityProviderLoginMethod = {}));
5525
- /**
5526
- * @author Daniel DeGroff
5527
- */
5528
- var RefreshTokenUsagePolicy;
5529
- (function (RefreshTokenUsagePolicy) {
5530
- RefreshTokenUsagePolicy["Reusable"] = "Reusable";
5531
- RefreshTokenUsagePolicy["OneTimeUse"] = "OneTimeUse";
5532
- })(RefreshTokenUsagePolicy = exports.RefreshTokenUsagePolicy || (exports.RefreshTokenUsagePolicy = {}));
5533
- /**
5534
- * @author Lyle Schemmerling
5535
- */
5536
- var SAMLv2DestinationAssertionPolicy;
5537
- (function (SAMLv2DestinationAssertionPolicy) {
5538
- SAMLv2DestinationAssertionPolicy["Enabled"] = "Enabled";
5539
- SAMLv2DestinationAssertionPolicy["Disabled"] = "Disabled";
5540
- SAMLv2DestinationAssertionPolicy["AllowAlternates"] = "AllowAlternates";
5541
- })(SAMLv2DestinationAssertionPolicy = exports.SAMLv2DestinationAssertionPolicy || (exports.SAMLv2DestinationAssertionPolicy = {}));
5842
+ var OAuthApplicationRelationship;
5843
+ (function (OAuthApplicationRelationship) {
5844
+ OAuthApplicationRelationship["FirstParty"] = "FirstParty";
5845
+ OAuthApplicationRelationship["ThirdParty"] = "ThirdParty";
5846
+ })(OAuthApplicationRelationship = exports.OAuthApplicationRelationship || (exports.OAuthApplicationRelationship = {}));
5542
5847
  var OAuthErrorReason;
5543
5848
  (function (OAuthErrorReason) {
5544
5849
  OAuthErrorReason["auth_code_not_found"] = "auth_code_not_found";
@@ -5569,6 +5874,7 @@ var OAuthErrorReason;
5569
5874
  OAuthErrorReason["invalid_target_entity_scope"] = "invalid_target_entity_scope";
5570
5875
  OAuthErrorReason["invalid_entity_permission_scope"] = "invalid_entity_permission_scope";
5571
5876
  OAuthErrorReason["invalid_user_id"] = "invalid_user_id";
5877
+ OAuthErrorReason["invalid_tenant_id"] = "invalid_tenant_id";
5572
5878
  OAuthErrorReason["grant_type_disabled"] = "grant_type_disabled";
5573
5879
  OAuthErrorReason["missing_client_id"] = "missing_client_id";
5574
5880
  OAuthErrorReason["missing_client_secret"] = "missing_client_secret";
@@ -5584,6 +5890,7 @@ var OAuthErrorReason;
5584
5890
  OAuthErrorReason["missing_user_code"] = "missing_user_code";
5585
5891
  OAuthErrorReason["missing_user_id"] = "missing_user_id";
5586
5892
  OAuthErrorReason["missing_verification_uri"] = "missing_verification_uri";
5893
+ OAuthErrorReason["missing_tenant_id"] = "missing_tenant_id";
5587
5894
  OAuthErrorReason["login_prevented"] = "login_prevented";
5588
5895
  OAuthErrorReason["not_licensed"] = "not_licensed";
5589
5896
  OAuthErrorReason["user_code_expired"] = "user_code_expired";
@@ -5622,27 +5929,77 @@ var OAuthErrorType;
5622
5929
  OAuthErrorType["expired_token"] = "expired_token";
5623
5930
  OAuthErrorType["unsupported_token_type"] = "unsupported_token_type";
5624
5931
  })(OAuthErrorType = exports.OAuthErrorType || (exports.OAuthErrorType = {}));
5625
- var DeviceType;
5626
- (function (DeviceType) {
5627
- DeviceType["BROWSER"] = "BROWSER";
5628
- DeviceType["DESKTOP"] = "DESKTOP";
5629
- DeviceType["LAPTOP"] = "LAPTOP";
5630
- DeviceType["MOBILE"] = "MOBILE";
5631
- DeviceType["OTHER"] = "OTHER";
5632
- DeviceType["SERVER"] = "SERVER";
5633
- DeviceType["TABLET"] = "TABLET";
5634
- DeviceType["TV"] = "TV";
5635
- DeviceType["UNKNOWN"] = "UNKNOWN";
5636
- })(DeviceType = exports.DeviceType || (exports.DeviceType = {}));
5932
+ /**
5933
+ * Controls the policy for requesting user permission to grant access to requested scopes during an OAuth workflow
5934
+ * for a third-party application.
5935
+ *
5936
+ * @author Spencer Witt
5937
+ */
5938
+ var OAuthScopeConsentMode;
5939
+ (function (OAuthScopeConsentMode) {
5940
+ OAuthScopeConsentMode["AlwaysPrompt"] = "AlwaysPrompt";
5941
+ OAuthScopeConsentMode["RememberDecision"] = "RememberDecision";
5942
+ OAuthScopeConsentMode["NeverPrompt"] = "NeverPrompt";
5943
+ })(OAuthScopeConsentMode = exports.OAuthScopeConsentMode || (exports.OAuthScopeConsentMode = {}));
5944
+ /**
5945
+ * Controls the policy for whether OAuth workflows will more strictly adhere to the OAuth and OIDC specification
5946
+ * or run in backwards compatibility mode.
5947
+ *
5948
+ * @author David Charles
5949
+ */
5950
+ var OAuthScopeHandlingPolicy;
5951
+ (function (OAuthScopeHandlingPolicy) {
5952
+ OAuthScopeHandlingPolicy["Compatibility"] = "Compatibility";
5953
+ OAuthScopeHandlingPolicy["Strict"] = "Strict";
5954
+ })(OAuthScopeHandlingPolicy = exports.OAuthScopeHandlingPolicy || (exports.OAuthScopeHandlingPolicy = {}));
5955
+ /**
5956
+ * @author Johnathon Wood
5957
+ */
5958
+ var Oauth2AuthorizedURLValidationPolicy;
5959
+ (function (Oauth2AuthorizedURLValidationPolicy) {
5960
+ Oauth2AuthorizedURLValidationPolicy["AllowWildcards"] = "AllowWildcards";
5961
+ Oauth2AuthorizedURLValidationPolicy["ExactMatch"] = "ExactMatch";
5962
+ })(Oauth2AuthorizedURLValidationPolicy = exports.Oauth2AuthorizedURLValidationPolicy || (exports.Oauth2AuthorizedURLValidationPolicy = {}));
5637
5963
  /**
5638
5964
  * @author Daniel DeGroff
5639
5965
  */
5640
- var ApplicationMultiFactorTrustPolicy;
5641
- (function (ApplicationMultiFactorTrustPolicy) {
5642
- ApplicationMultiFactorTrustPolicy["Any"] = "Any";
5643
- ApplicationMultiFactorTrustPolicy["This"] = "This";
5644
- ApplicationMultiFactorTrustPolicy["None"] = "None";
5645
- })(ApplicationMultiFactorTrustPolicy = exports.ApplicationMultiFactorTrustPolicy || (exports.ApplicationMultiFactorTrustPolicy = {}));
5966
+ var ObjectState;
5967
+ (function (ObjectState) {
5968
+ ObjectState["Active"] = "Active";
5969
+ ObjectState["Inactive"] = "Inactive";
5970
+ ObjectState["PendingDelete"] = "PendingDelete";
5971
+ })(ObjectState = exports.ObjectState || (exports.ObjectState = {}));
5972
+ var BreachAction;
5973
+ (function (BreachAction) {
5974
+ BreachAction["Off"] = "Off";
5975
+ BreachAction["RecordOnly"] = "RecordOnly";
5976
+ BreachAction["NotifyUser"] = "NotifyUser";
5977
+ BreachAction["RequireChange"] = "RequireChange";
5978
+ })(BreachAction = exports.BreachAction || (exports.BreachAction = {}));
5979
+ var BreachMatchMode;
5980
+ (function (BreachMatchMode) {
5981
+ BreachMatchMode["Low"] = "Low";
5982
+ BreachMatchMode["Medium"] = "Medium";
5983
+ BreachMatchMode["High"] = "High";
5984
+ })(BreachMatchMode = exports.BreachMatchMode || (exports.BreachMatchMode = {}));
5985
+ /**
5986
+ * @author Brett Guy
5987
+ */
5988
+ var ProofKeyForCodeExchangePolicy;
5989
+ (function (ProofKeyForCodeExchangePolicy) {
5990
+ ProofKeyForCodeExchangePolicy["Required"] = "Required";
5991
+ ProofKeyForCodeExchangePolicy["NotRequired"] = "NotRequired";
5992
+ ProofKeyForCodeExchangePolicy["NotRequiredWhenUsingClientAuthentication"] = "NotRequiredWhenUsingClientAuthentication";
5993
+ })(ProofKeyForCodeExchangePolicy = exports.ProofKeyForCodeExchangePolicy || (exports.ProofKeyForCodeExchangePolicy = {}));
5994
+ /**
5995
+ * Defines valid credential types. This is an extension point in the WebAuthn spec. The only defined value at this time is "public-key"
5996
+ *
5997
+ * @author Spencer Witt
5998
+ */
5999
+ var PublicKeyCredentialType;
6000
+ (function (PublicKeyCredentialType) {
6001
+ PublicKeyCredentialType["publicKey"] = "public-key";
6002
+ })(PublicKeyCredentialType = exports.PublicKeyCredentialType || (exports.PublicKeyCredentialType = {}));
5646
6003
  /**
5647
6004
  * @author Daniel DeGroff
5648
6005
  */
@@ -5655,325 +6012,73 @@ var RateLimitedRequestType;
5655
6012
  RateLimitedRequestType["SendRegistrationVerification"] = "SendRegistrationVerification";
5656
6013
  RateLimitedRequestType["SendTwoFactor"] = "SendTwoFactor";
5657
6014
  })(RateLimitedRequestType = exports.RateLimitedRequestType || (exports.RateLimitedRequestType = {}));
6015
+ /**
6016
+ * @author Brian Pontarelli
6017
+ */
6018
+ var ReactorFeatureStatus;
6019
+ (function (ReactorFeatureStatus) {
6020
+ ReactorFeatureStatus["ACTIVE"] = "ACTIVE";
6021
+ ReactorFeatureStatus["DISCONNECTED"] = "DISCONNECTED";
6022
+ ReactorFeatureStatus["PENDING"] = "PENDING";
6023
+ ReactorFeatureStatus["DISABLED"] = "DISABLED";
6024
+ ReactorFeatureStatus["UNKNOWN"] = "UNKNOWN";
6025
+ })(ReactorFeatureStatus = exports.ReactorFeatureStatus || (exports.ReactorFeatureStatus = {}));
5658
6026
  /**
5659
6027
  * @author Daniel DeGroff
5660
6028
  */
5661
- var LambdaEngineType;
5662
- (function (LambdaEngineType) {
5663
- LambdaEngineType["GraalJS"] = "GraalJS";
5664
- LambdaEngineType["Nashorn"] = "Nashorn";
5665
- })(LambdaEngineType = exports.LambdaEngineType || (exports.LambdaEngineType = {}));
6029
+ var RefreshTokenExpirationPolicy;
6030
+ (function (RefreshTokenExpirationPolicy) {
6031
+ RefreshTokenExpirationPolicy["Fixed"] = "Fixed";
6032
+ RefreshTokenExpirationPolicy["SlidingWindow"] = "SlidingWindow";
6033
+ RefreshTokenExpirationPolicy["SlidingWindowWithMaximumLifetime"] = "SlidingWindowWithMaximumLifetime";
6034
+ })(RefreshTokenExpirationPolicy = exports.RefreshTokenExpirationPolicy || (exports.RefreshTokenExpirationPolicy = {}));
5666
6035
  /**
5667
- * Used to express whether the Relying Party requires <a href="https://www.w3.org/TR/webauthn-2/#user-verification">user verification</a> for the
5668
- * current operation.
6036
+ * @author Daniel DeGroff
6037
+ */
6038
+ var RefreshTokenUsagePolicy;
6039
+ (function (RefreshTokenUsagePolicy) {
6040
+ RefreshTokenUsagePolicy["Reusable"] = "Reusable";
6041
+ RefreshTokenUsagePolicy["OneTimeUse"] = "OneTimeUse";
6042
+ })(RefreshTokenUsagePolicy = exports.RefreshTokenUsagePolicy || (exports.RefreshTokenUsagePolicy = {}));
6043
+ /**
6044
+ * Describes the Relying Party's requirements for <a href="https://www.w3.org/TR/webauthn-2/#client-side-discoverable-credential">client-side
6045
+ * discoverable credentials</a> (formerly known as "resident keys")
5669
6046
  *
5670
6047
  * @author Spencer Witt
5671
6048
  */
5672
- var UserVerificationRequirement;
5673
- (function (UserVerificationRequirement) {
5674
- UserVerificationRequirement["required"] = "required";
5675
- UserVerificationRequirement["preferred"] = "preferred";
5676
- UserVerificationRequirement["discouraged"] = "discouraged";
5677
- })(UserVerificationRequirement = exports.UserVerificationRequirement || (exports.UserVerificationRequirement = {}));
5678
- /**
5679
- * @author Brett Guy
5680
- */
5681
- var ClientAuthenticationPolicy;
5682
- (function (ClientAuthenticationPolicy) {
5683
- ClientAuthenticationPolicy["Required"] = "Required";
5684
- ClientAuthenticationPolicy["NotRequired"] = "NotRequired";
5685
- ClientAuthenticationPolicy["NotRequiredWhenUsingPKCE"] = "NotRequiredWhenUsingPKCE";
5686
- })(ClientAuthenticationPolicy = exports.ClientAuthenticationPolicy || (exports.ClientAuthenticationPolicy = {}));
5687
- /**
5688
- * @author Daniel DeGroff
5689
- */
5690
- var FormType;
5691
- (function (FormType) {
5692
- FormType["registration"] = "registration";
5693
- FormType["adminRegistration"] = "adminRegistration";
5694
- FormType["adminUser"] = "adminUser";
5695
- FormType["selfServiceUser"] = "selfServiceUser";
5696
- })(FormType = exports.FormType || (exports.FormType = {}));
5697
- /**
5698
- * XML canonicalization method enumeration. This is used for the IdP and SP side of FusionAuth SAML.
5699
- *
5700
- * @author Brian Pontarelli
5701
- */
5702
- var CanonicalizationMethod;
5703
- (function (CanonicalizationMethod) {
5704
- CanonicalizationMethod["exclusive"] = "exclusive";
5705
- CanonicalizationMethod["exclusive_with_comments"] = "exclusive_with_comments";
5706
- CanonicalizationMethod["inclusive"] = "inclusive";
5707
- CanonicalizationMethod["inclusive_with_comments"] = "inclusive_with_comments";
5708
- })(CanonicalizationMethod = exports.CanonicalizationMethod || (exports.CanonicalizationMethod = {}));
5709
- /**
5710
- * @author Brian Pontarelli
5711
- */
5712
- var ExpiryUnit;
5713
- (function (ExpiryUnit) {
5714
- ExpiryUnit["MINUTES"] = "MINUTES";
5715
- ExpiryUnit["HOURS"] = "HOURS";
5716
- ExpiryUnit["DAYS"] = "DAYS";
5717
- ExpiryUnit["WEEKS"] = "WEEKS";
5718
- ExpiryUnit["MONTHS"] = "MONTHS";
5719
- ExpiryUnit["YEARS"] = "YEARS";
5720
- })(ExpiryUnit = exports.ExpiryUnit || (exports.ExpiryUnit = {}));
5721
- /**
5722
- * @author Daniel DeGroff
5723
- */
5724
- var SecureGeneratorType;
5725
- (function (SecureGeneratorType) {
5726
- SecureGeneratorType["randomDigits"] = "randomDigits";
5727
- SecureGeneratorType["randomBytes"] = "randomBytes";
5728
- SecureGeneratorType["randomAlpha"] = "randomAlpha";
5729
- SecureGeneratorType["randomAlphaNumeric"] = "randomAlphaNumeric";
5730
- })(SecureGeneratorType = exports.SecureGeneratorType || (exports.SecureGeneratorType = {}));
5731
- /**
5732
- * @author Daniel DeGroff
5733
- */
5734
- var FormDataType;
5735
- (function (FormDataType) {
5736
- FormDataType["bool"] = "bool";
5737
- FormDataType["consent"] = "consent";
5738
- FormDataType["date"] = "date";
5739
- FormDataType["email"] = "email";
5740
- FormDataType["number"] = "number";
5741
- FormDataType["string"] = "string";
5742
- })(FormDataType = exports.FormDataType || (exports.FormDataType = {}));
5743
- /**
5744
- * The IdP behavior when no user link has been made yet.
5745
- *
5746
- * @author Daniel DeGroff
5747
- */
5748
- var IdentityProviderLinkingStrategy;
5749
- (function (IdentityProviderLinkingStrategy) {
5750
- IdentityProviderLinkingStrategy["CreatePendingLink"] = "CreatePendingLink";
5751
- IdentityProviderLinkingStrategy["Disabled"] = "Disabled";
5752
- IdentityProviderLinkingStrategy["LinkAnonymously"] = "LinkAnonymously";
5753
- IdentityProviderLinkingStrategy["LinkByEmail"] = "LinkByEmail";
5754
- IdentityProviderLinkingStrategy["LinkByEmailForExistingUser"] = "LinkByEmailForExistingUser";
5755
- IdentityProviderLinkingStrategy["LinkByUsername"] = "LinkByUsername";
5756
- IdentityProviderLinkingStrategy["LinkByUsernameForExistingUser"] = "LinkByUsernameForExistingUser";
5757
- IdentityProviderLinkingStrategy["Unsupported"] = "Unsupported";
5758
- })(IdentityProviderLinkingStrategy = exports.IdentityProviderLinkingStrategy || (exports.IdentityProviderLinkingStrategy = {}));
5759
- /**
5760
- * @author Daniel DeGroff
5761
- */
5762
- var MultiFactorLoginPolicy;
5763
- (function (MultiFactorLoginPolicy) {
5764
- MultiFactorLoginPolicy["Disabled"] = "Disabled";
5765
- MultiFactorLoginPolicy["Enabled"] = "Enabled";
5766
- MultiFactorLoginPolicy["Required"] = "Required";
5767
- })(MultiFactorLoginPolicy = exports.MultiFactorLoginPolicy || (exports.MultiFactorLoginPolicy = {}));
5768
- /**
5769
- * @author Brett Guy
5770
- */
5771
- var IPAccessControlEntryAction;
5772
- (function (IPAccessControlEntryAction) {
5773
- IPAccessControlEntryAction["Allow"] = "Allow";
5774
- IPAccessControlEntryAction["Block"] = "Block";
5775
- })(IPAccessControlEntryAction = exports.IPAccessControlEntryAction || (exports.IPAccessControlEntryAction = {}));
5776
- /**
5777
- * The phases of a time-based user action.
5778
- *
5779
- * @author Brian Pontarelli
5780
- */
5781
- var UserActionPhase;
5782
- (function (UserActionPhase) {
5783
- UserActionPhase["start"] = "start";
5784
- UserActionPhase["modify"] = "modify";
5785
- UserActionPhase["cancel"] = "cancel";
5786
- UserActionPhase["end"] = "end";
5787
- })(UserActionPhase = exports.UserActionPhase || (exports.UserActionPhase = {}));
5788
- /**
5789
- * The types of lambdas that indicate how they are invoked by FusionAuth.
5790
- *
5791
- * @author Brian Pontarelli
5792
- */
5793
- var LambdaType;
5794
- (function (LambdaType) {
5795
- LambdaType["JWTPopulate"] = "JWTPopulate";
5796
- LambdaType["OpenIDReconcile"] = "OpenIDReconcile";
5797
- LambdaType["SAMLv2Reconcile"] = "SAMLv2Reconcile";
5798
- LambdaType["SAMLv2Populate"] = "SAMLv2Populate";
5799
- LambdaType["AppleReconcile"] = "AppleReconcile";
5800
- LambdaType["ExternalJWTReconcile"] = "ExternalJWTReconcile";
5801
- LambdaType["FacebookReconcile"] = "FacebookReconcile";
5802
- LambdaType["GoogleReconcile"] = "GoogleReconcile";
5803
- LambdaType["HYPRReconcile"] = "HYPRReconcile";
5804
- LambdaType["TwitterReconcile"] = "TwitterReconcile";
5805
- LambdaType["LDAPConnectorReconcile"] = "LDAPConnectorReconcile";
5806
- LambdaType["LinkedInReconcile"] = "LinkedInReconcile";
5807
- LambdaType["EpicGamesReconcile"] = "EpicGamesReconcile";
5808
- LambdaType["NintendoReconcile"] = "NintendoReconcile";
5809
- LambdaType["SonyPSNReconcile"] = "SonyPSNReconcile";
5810
- LambdaType["SteamReconcile"] = "SteamReconcile";
5811
- LambdaType["TwitchReconcile"] = "TwitchReconcile";
5812
- LambdaType["XboxReconcile"] = "XboxReconcile";
5813
- LambdaType["ClientCredentialsJWTPopulate"] = "ClientCredentialsJWTPopulate";
5814
- LambdaType["SCIMServerGroupRequestConverter"] = "SCIMServerGroupRequestConverter";
5815
- LambdaType["SCIMServerGroupResponseConverter"] = "SCIMServerGroupResponseConverter";
5816
- LambdaType["SCIMServerUserRequestConverter"] = "SCIMServerUserRequestConverter";
5817
- LambdaType["SCIMServerUserResponseConverter"] = "SCIMServerUserResponseConverter";
5818
- LambdaType["SelfServiceRegistrationValidation"] = "SelfServiceRegistrationValidation";
5819
- LambdaType["UserInfoPopulate"] = "UserInfoPopulate";
5820
- LambdaType["LoginValidation"] = "LoginValidation";
5821
- })(LambdaType = exports.LambdaType || (exports.LambdaType = {}));
5822
- /**
5823
- * @author Daniel DeGroff
5824
- */
5825
- var SystemTrustedProxyConfigurationPolicy;
5826
- (function (SystemTrustedProxyConfigurationPolicy) {
5827
- SystemTrustedProxyConfigurationPolicy["All"] = "All";
5828
- SystemTrustedProxyConfigurationPolicy["OnlyConfigured"] = "OnlyConfigured";
5829
- })(SystemTrustedProxyConfigurationPolicy = exports.SystemTrustedProxyConfigurationPolicy || (exports.SystemTrustedProxyConfigurationPolicy = {}));
5830
- var LoginIdType;
5831
- (function (LoginIdType) {
5832
- LoginIdType["email"] = "email";
5833
- LoginIdType["username"] = "username";
5834
- })(LoginIdType = exports.LoginIdType || (exports.LoginIdType = {}));
5835
- var RegistrationType;
5836
- (function (RegistrationType) {
5837
- RegistrationType["basic"] = "basic";
5838
- RegistrationType["advanced"] = "advanced";
5839
- })(RegistrationType = exports.RegistrationType || (exports.RegistrationType = {}));
5840
- var SAMLLogoutBehavior;
5841
- (function (SAMLLogoutBehavior) {
5842
- SAMLLogoutBehavior["AllParticipants"] = "AllParticipants";
5843
- SAMLLogoutBehavior["OnlyOriginator"] = "OnlyOriginator";
5844
- })(SAMLLogoutBehavior = exports.SAMLLogoutBehavior || (exports.SAMLLogoutBehavior = {}));
5845
- var XMLSignatureLocation;
5846
- (function (XMLSignatureLocation) {
5847
- XMLSignatureLocation["Assertion"] = "Assertion";
5848
- XMLSignatureLocation["Response"] = "Response";
5849
- })(XMLSignatureLocation = exports.XMLSignatureLocation || (exports.XMLSignatureLocation = {}));
5850
- /**
5851
- * @author Daniel DeGroff
5852
- */
5853
- var Sort;
5854
- (function (Sort) {
5855
- Sort["asc"] = "asc";
5856
- Sort["desc"] = "desc";
5857
- })(Sort = exports.Sort || (exports.Sort = {}));
5858
- /**
5859
- * Describes the authenticator attachment modality preference for a WebAuthn workflow. See {@link AuthenticatorAttachment}
5860
- *
5861
- * @author Spencer Witt
5862
- */
5863
- var AuthenticatorAttachmentPreference;
5864
- (function (AuthenticatorAttachmentPreference) {
5865
- AuthenticatorAttachmentPreference["any"] = "any";
5866
- AuthenticatorAttachmentPreference["platform"] = "platform";
5867
- AuthenticatorAttachmentPreference["crossPlatform"] = "crossPlatform";
5868
- })(AuthenticatorAttachmentPreference = exports.AuthenticatorAttachmentPreference || (exports.AuthenticatorAttachmentPreference = {}));
5869
- /**
5870
- * Defines valid credential types. This is an extension point in the WebAuthn spec. The only defined value at this time is "public-key"
5871
- *
5872
- * @author Spencer Witt
5873
- */
5874
- var PublicKeyCredentialType;
5875
- (function (PublicKeyCredentialType) {
5876
- PublicKeyCredentialType["publicKey"] = "public-key";
5877
- })(PublicKeyCredentialType = exports.PublicKeyCredentialType || (exports.PublicKeyCredentialType = {}));
5878
- /**
5879
- * COSE Elliptic Curve identifier to determine which elliptic curve to use with a given key
5880
- *
5881
- * @author Spencer Witt
5882
- */
5883
- var CoseEllipticCurve;
5884
- (function (CoseEllipticCurve) {
5885
- CoseEllipticCurve["Reserved"] = "Reserved";
5886
- CoseEllipticCurve["P256"] = "P256";
5887
- CoseEllipticCurve["P384"] = "P384";
5888
- CoseEllipticCurve["P521"] = "P521";
5889
- CoseEllipticCurve["X25519"] = "X25519";
5890
- CoseEllipticCurve["X448"] = "X448";
5891
- CoseEllipticCurve["Ed25519"] = "Ed25519";
5892
- CoseEllipticCurve["Ed448"] = "Ed448";
5893
- CoseEllipticCurve["Secp256k1"] = "Secp256k1";
5894
- })(CoseEllipticCurve = exports.CoseEllipticCurve || (exports.CoseEllipticCurve = {}));
5895
- var KeyAlgorithm;
5896
- (function (KeyAlgorithm) {
5897
- KeyAlgorithm["ES256"] = "ES256";
5898
- KeyAlgorithm["ES384"] = "ES384";
5899
- KeyAlgorithm["ES512"] = "ES512";
5900
- KeyAlgorithm["HS256"] = "HS256";
5901
- KeyAlgorithm["HS384"] = "HS384";
5902
- KeyAlgorithm["HS512"] = "HS512";
5903
- KeyAlgorithm["RS256"] = "RS256";
5904
- KeyAlgorithm["RS384"] = "RS384";
5905
- KeyAlgorithm["RS512"] = "RS512";
5906
- })(KeyAlgorithm = exports.KeyAlgorithm || (exports.KeyAlgorithm = {}));
5907
- var KeyType;
5908
- (function (KeyType) {
5909
- KeyType["EC"] = "EC";
5910
- KeyType["RSA"] = "RSA";
5911
- KeyType["HMAC"] = "HMAC";
5912
- })(KeyType = exports.KeyType || (exports.KeyType = {}));
5913
- /**
5914
- * Controls the policy for requesting user permission to grant access to requested scopes during an OAuth workflow
5915
- * for a third-party application.
5916
- *
5917
- * @author Spencer Witt
5918
- */
5919
- var OAuthScopeConsentMode;
5920
- (function (OAuthScopeConsentMode) {
5921
- OAuthScopeConsentMode["AlwaysPrompt"] = "AlwaysPrompt";
5922
- OAuthScopeConsentMode["RememberDecision"] = "RememberDecision";
5923
- OAuthScopeConsentMode["NeverPrompt"] = "NeverPrompt";
5924
- })(OAuthScopeConsentMode = exports.OAuthScopeConsentMode || (exports.OAuthScopeConsentMode = {}));
5925
- /**
5926
- * @author Daniel DeGroff
5927
- */
5928
- var ObjectState;
5929
- (function (ObjectState) {
5930
- ObjectState["Active"] = "Active";
5931
- ObjectState["Inactive"] = "Inactive";
5932
- ObjectState["PendingDelete"] = "PendingDelete";
5933
- })(ObjectState = exports.ObjectState || (exports.ObjectState = {}));
5934
- /**
5935
- * @author Daniel DeGroff
5936
- */
5937
- var IdentityProviderType;
5938
- (function (IdentityProviderType) {
5939
- IdentityProviderType["Apple"] = "Apple";
5940
- IdentityProviderType["EpicGames"] = "EpicGames";
5941
- IdentityProviderType["ExternalJWT"] = "ExternalJWT";
5942
- IdentityProviderType["Facebook"] = "Facebook";
5943
- IdentityProviderType["Google"] = "Google";
5944
- IdentityProviderType["HYPR"] = "HYPR";
5945
- IdentityProviderType["LinkedIn"] = "LinkedIn";
5946
- IdentityProviderType["Nintendo"] = "Nintendo";
5947
- IdentityProviderType["OpenIDConnect"] = "OpenIDConnect";
5948
- IdentityProviderType["SAMLv2"] = "SAMLv2";
5949
- IdentityProviderType["SAMLv2IdPInitiated"] = "SAMLv2IdPInitiated";
5950
- IdentityProviderType["SonyPSN"] = "SonyPSN";
5951
- IdentityProviderType["Steam"] = "Steam";
5952
- IdentityProviderType["Twitch"] = "Twitch";
5953
- IdentityProviderType["Twitter"] = "Twitter";
5954
- IdentityProviderType["Xbox"] = "Xbox";
5955
- })(IdentityProviderType = exports.IdentityProviderType || (exports.IdentityProviderType = {}));
6049
+ var ResidentKeyRequirement;
6050
+ (function (ResidentKeyRequirement) {
6051
+ ResidentKeyRequirement["discouraged"] = "discouraged";
6052
+ ResidentKeyRequirement["preferred"] = "preferred";
6053
+ ResidentKeyRequirement["required"] = "required";
6054
+ })(ResidentKeyRequirement = exports.ResidentKeyRequirement || (exports.ResidentKeyRequirement = {}));
6055
+ /**
6056
+ * @author Lyle Schemmerling
6057
+ */
6058
+ var SAMLv2DestinationAssertionPolicy;
6059
+ (function (SAMLv2DestinationAssertionPolicy) {
6060
+ SAMLv2DestinationAssertionPolicy["Enabled"] = "Enabled";
6061
+ SAMLv2DestinationAssertionPolicy["Disabled"] = "Disabled";
6062
+ SAMLv2DestinationAssertionPolicy["AllowAlternates"] = "AllowAlternates";
6063
+ })(SAMLv2DestinationAssertionPolicy = exports.SAMLv2DestinationAssertionPolicy || (exports.SAMLv2DestinationAssertionPolicy = {}));
5956
6064
  /**
5957
6065
  * @author Daniel DeGroff
5958
6066
  */
5959
- var VerificationStrategy;
5960
- (function (VerificationStrategy) {
5961
- VerificationStrategy["ClickableLink"] = "ClickableLink";
5962
- VerificationStrategy["FormField"] = "FormField";
5963
- })(VerificationStrategy = exports.VerificationStrategy || (exports.VerificationStrategy = {}));
5964
- var TOTPAlgorithm;
5965
- (function (TOTPAlgorithm) {
5966
- TOTPAlgorithm["HmacSHA1"] = "HmacSHA1";
5967
- TOTPAlgorithm["HmacSHA256"] = "HmacSHA256";
5968
- TOTPAlgorithm["HmacSHA512"] = "HmacSHA512";
5969
- })(TOTPAlgorithm = exports.TOTPAlgorithm || (exports.TOTPAlgorithm = {}));
6067
+ var SecureGeneratorType;
6068
+ (function (SecureGeneratorType) {
6069
+ SecureGeneratorType["randomDigits"] = "randomDigits";
6070
+ SecureGeneratorType["randomBytes"] = "randomBytes";
6071
+ SecureGeneratorType["randomAlpha"] = "randomAlpha";
6072
+ SecureGeneratorType["randomAlphaNumeric"] = "randomAlphaNumeric";
6073
+ })(SecureGeneratorType = exports.SecureGeneratorType || (exports.SecureGeneratorType = {}));
5970
6074
  /**
5971
- * @author Brett Pontarelli
6075
+ * @author Daniel DeGroff
5972
6076
  */
5973
- var AuthenticationThreats;
5974
- (function (AuthenticationThreats) {
5975
- AuthenticationThreats["ImpossibleTravel"] = "ImpossibleTravel";
5976
- })(AuthenticationThreats = exports.AuthenticationThreats || (exports.AuthenticationThreats = {}));
6077
+ var Sort;
6078
+ (function (Sort) {
6079
+ Sort["asc"] = "asc";
6080
+ Sort["desc"] = "desc";
6081
+ })(Sort = exports.Sort || (exports.Sort = {}));
5977
6082
  /**
5978
6083
  * Steam API modes.
5979
6084
  *
@@ -5985,76 +6090,52 @@ var SteamAPIMode;
5985
6090
  SteamAPIMode["Partner"] = "Partner";
5986
6091
  })(SteamAPIMode = exports.SteamAPIMode || (exports.SteamAPIMode = {}));
5987
6092
  /**
5988
- * @author Brett Pontarelli
6093
+ * @author Daniel DeGroff
5989
6094
  */
5990
- var CaptchaMethod;
5991
- (function (CaptchaMethod) {
5992
- CaptchaMethod["GoogleRecaptchaV2"] = "GoogleRecaptchaV2";
5993
- CaptchaMethod["GoogleRecaptchaV3"] = "GoogleRecaptchaV3";
5994
- CaptchaMethod["HCaptcha"] = "HCaptcha";
5995
- CaptchaMethod["HCaptchaEnterprise"] = "HCaptchaEnterprise";
5996
- })(CaptchaMethod = exports.CaptchaMethod || (exports.CaptchaMethod = {}));
6095
+ var SystemTrustedProxyConfigurationPolicy;
6096
+ (function (SystemTrustedProxyConfigurationPolicy) {
6097
+ SystemTrustedProxyConfigurationPolicy["All"] = "All";
6098
+ SystemTrustedProxyConfigurationPolicy["OnlyConfigured"] = "OnlyConfigured";
6099
+ })(SystemTrustedProxyConfigurationPolicy = exports.SystemTrustedProxyConfigurationPolicy || (exports.SystemTrustedProxyConfigurationPolicy = {}));
6100
+ var UniqueUsernameStrategy;
6101
+ (function (UniqueUsernameStrategy) {
6102
+ UniqueUsernameStrategy["Always"] = "Always";
6103
+ UniqueUsernameStrategy["OnCollision"] = "OnCollision";
6104
+ })(UniqueUsernameStrategy = exports.UniqueUsernameStrategy || (exports.UniqueUsernameStrategy = {}));
6105
+ var ThemeType;
6106
+ (function (ThemeType) {
6107
+ ThemeType["advanced"] = "advanced";
6108
+ ThemeType["simple"] = "simple";
6109
+ })(ThemeType = exports.ThemeType || (exports.ThemeType = {}));
5997
6110
  /**
5998
- * Models the event types that FusionAuth produces.
6111
+ * <ul>
6112
+ * <li>Bearer Token type as defined by <a href="https://tools.ietf.org/html/rfc6750">RFC 6750</a>.</li>
6113
+ * <li>MAC Token type as referenced by <a href="https://tools.ietf.org/html/rfc6749">RFC 6749</a> and
6114
+ * <a href="https://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-05">
6115
+ * Draft RFC on OAuth 2.0 Message Authentication Code (MAC) Tokens</a>
6116
+ * </li>
6117
+ * </ul>
6118
+ *
6119
+ * @author Daniel DeGroff
6120
+ */
6121
+ var TokenType;
6122
+ (function (TokenType) {
6123
+ TokenType["Bearer"] = "Bearer";
6124
+ TokenType["MAC"] = "MAC";
6125
+ })(TokenType = exports.TokenType || (exports.TokenType = {}));
6126
+ /**
6127
+ * The transaction types for Webhooks and other event systems within FusionAuth.
5999
6128
  *
6000
6129
  * @author Brian Pontarelli
6001
6130
  */
6002
- var EventType;
6003
- (function (EventType) {
6004
- EventType["JWTPublicKeyUpdate"] = "jwt.public-key.update";
6005
- EventType["JWTRefreshTokenRevoke"] = "jwt.refresh-token.revoke";
6006
- EventType["JWTRefresh"] = "jwt.refresh";
6007
- EventType["AuditLogCreate"] = "audit-log.create";
6008
- EventType["EventLogCreate"] = "event-log.create";
6009
- EventType["KickstartSuccess"] = "kickstart.success";
6010
- EventType["GroupCreate"] = "group.create";
6011
- EventType["GroupCreateComplete"] = "group.create.complete";
6012
- EventType["GroupDelete"] = "group.delete";
6013
- EventType["GroupDeleteComplete"] = "group.delete.complete";
6014
- EventType["GroupMemberAdd"] = "group.member.add";
6015
- EventType["GroupMemberAddComplete"] = "group.member.add.complete";
6016
- EventType["GroupMemberRemove"] = "group.member.remove";
6017
- EventType["GroupMemberRemoveComplete"] = "group.member.remove.complete";
6018
- EventType["GroupMemberUpdate"] = "group.member.update";
6019
- EventType["GroupMemberUpdateComplete"] = "group.member.update.complete";
6020
- EventType["GroupUpdate"] = "group.update";
6021
- EventType["GroupUpdateComplete"] = "group.update.complete";
6022
- EventType["UserAction"] = "user.action";
6023
- EventType["UserBulkCreate"] = "user.bulk.create";
6024
- EventType["UserCreate"] = "user.create";
6025
- EventType["UserCreateComplete"] = "user.create.complete";
6026
- EventType["UserDeactivate"] = "user.deactivate";
6027
- EventType["UserDelete"] = "user.delete";
6028
- EventType["UserDeleteComplete"] = "user.delete.complete";
6029
- EventType["UserEmailUpdate"] = "user.email.update";
6030
- EventType["UserEmailVerified"] = "user.email.verified";
6031
- EventType["UserIdentityProviderLink"] = "user.identity-provider.link";
6032
- EventType["UserIdentityProviderUnlink"] = "user.identity-provider.unlink";
6033
- EventType["UserLoginIdDuplicateOnCreate"] = "user.loginId.duplicate.create";
6034
- EventType["UserLoginIdDuplicateOnUpdate"] = "user.loginId.duplicate.update";
6035
- EventType["UserLoginFailed"] = "user.login.failed";
6036
- EventType["UserLoginNewDevice"] = "user.login.new-device";
6037
- EventType["UserLoginSuccess"] = "user.login.success";
6038
- EventType["UserLoginSuspicious"] = "user.login.suspicious";
6039
- EventType["UserPasswordBreach"] = "user.password.breach";
6040
- EventType["UserPasswordResetSend"] = "user.password.reset.send";
6041
- EventType["UserPasswordResetStart"] = "user.password.reset.start";
6042
- EventType["UserPasswordResetSuccess"] = "user.password.reset.success";
6043
- EventType["UserPasswordUpdate"] = "user.password.update";
6044
- EventType["UserReactivate"] = "user.reactivate";
6045
- EventType["UserRegistrationCreate"] = "user.registration.create";
6046
- EventType["UserRegistrationCreateComplete"] = "user.registration.create.complete";
6047
- EventType["UserRegistrationDelete"] = "user.registration.delete";
6048
- EventType["UserRegistrationDeleteComplete"] = "user.registration.delete.complete";
6049
- EventType["UserRegistrationUpdate"] = "user.registration.update";
6050
- EventType["UserRegistrationUpdateComplete"] = "user.registration.update.complete";
6051
- EventType["UserRegistrationVerified"] = "user.registration.verified";
6052
- EventType["UserTwoFactorMethodAdd"] = "user.two-factor.method.add";
6053
- EventType["UserTwoFactorMethodRemove"] = "user.two-factor.method.remove";
6054
- EventType["UserUpdate"] = "user.update";
6055
- EventType["UserUpdateComplete"] = "user.update.complete";
6056
- EventType["Test"] = "test";
6057
- })(EventType = exports.EventType || (exports.EventType = {}));
6131
+ var TransactionType;
6132
+ (function (TransactionType) {
6133
+ TransactionType["None"] = "None";
6134
+ TransactionType["Any"] = "Any";
6135
+ TransactionType["SimpleMajority"] = "SimpleMajority";
6136
+ TransactionType["SuperMajority"] = "SuperMajority";
6137
+ TransactionType["AbsoluteMajority"] = "AbsoluteMajority";
6138
+ })(TransactionType = exports.TransactionType || (exports.TransactionType = {}));
6058
6139
  /**
6059
6140
  * Policy for handling unknown OAuth scopes in the request
6060
6141
  *
@@ -6067,41 +6148,88 @@ var UnknownScopePolicy;
6067
6148
  UnknownScopePolicy["Reject"] = "Reject";
6068
6149
  })(UnknownScopePolicy = exports.UnknownScopePolicy || (exports.UnknownScopePolicy = {}));
6069
6150
  /**
6070
- * The application's relationship to the authorization server. First-party applications will be granted implicit permission for requested scopes.
6071
- * Third-party applications will use the {@link OAuthScopeConsentMode} policy.
6151
+ * @author Daniel DeGroff
6152
+ */
6153
+ var UnverifiedBehavior;
6154
+ (function (UnverifiedBehavior) {
6155
+ UnverifiedBehavior["Allow"] = "Allow";
6156
+ UnverifiedBehavior["Gated"] = "Gated";
6157
+ })(UnverifiedBehavior = exports.UnverifiedBehavior || (exports.UnverifiedBehavior = {}));
6158
+ /**
6159
+ * The phases of a time-based user action.
6072
6160
  *
6073
- * @author Spencer Witt
6161
+ * @author Brian Pontarelli
6074
6162
  */
6075
- var OAuthApplicationRelationship;
6076
- (function (OAuthApplicationRelationship) {
6077
- OAuthApplicationRelationship["FirstParty"] = "FirstParty";
6078
- OAuthApplicationRelationship["ThirdParty"] = "ThirdParty";
6079
- })(OAuthApplicationRelationship = exports.OAuthApplicationRelationship || (exports.OAuthApplicationRelationship = {}));
6080
- var ClientAuthenticationMethod;
6081
- (function (ClientAuthenticationMethod) {
6082
- ClientAuthenticationMethod["none"] = "none";
6083
- ClientAuthenticationMethod["client_secret_basic"] = "client_secret_basic";
6084
- ClientAuthenticationMethod["client_secret_post"] = "client_secret_post";
6085
- })(ClientAuthenticationMethod = exports.ClientAuthenticationMethod || (exports.ClientAuthenticationMethod = {}));
6163
+ var UserActionPhase;
6164
+ (function (UserActionPhase) {
6165
+ UserActionPhase["start"] = "start";
6166
+ UserActionPhase["modify"] = "modify";
6167
+ UserActionPhase["cancel"] = "cancel";
6168
+ UserActionPhase["end"] = "end";
6169
+ })(UserActionPhase = exports.UserActionPhase || (exports.UserActionPhase = {}));
6086
6170
  /**
6087
- * Available JSON Web Algorithms (JWA) as described in RFC 7518 available for this JWT implementation.
6171
+ * @author Daniel DeGroff
6172
+ */
6173
+ var UserState;
6174
+ (function (UserState) {
6175
+ UserState["Authenticated"] = "Authenticated";
6176
+ UserState["AuthenticatedNotRegistered"] = "AuthenticatedNotRegistered";
6177
+ UserState["AuthenticatedNotVerified"] = "AuthenticatedNotVerified";
6178
+ UserState["AuthenticatedRegistrationNotVerified"] = "AuthenticatedRegistrationNotVerified";
6179
+ })(UserState = exports.UserState || (exports.UserState = {}));
6180
+ /**
6181
+ * Used to express whether the Relying Party requires <a href="https://www.w3.org/TR/webauthn-2/#user-verification">user verification</a> for the
6182
+ * current operation.
6088
6183
  *
6184
+ * @author Spencer Witt
6185
+ */
6186
+ var UserVerificationRequirement;
6187
+ (function (UserVerificationRequirement) {
6188
+ UserVerificationRequirement["required"] = "required";
6189
+ UserVerificationRequirement["preferred"] = "preferred";
6190
+ UserVerificationRequirement["discouraged"] = "discouraged";
6191
+ })(UserVerificationRequirement = exports.UserVerificationRequirement || (exports.UserVerificationRequirement = {}));
6192
+ /**
6089
6193
  * @author Daniel DeGroff
6090
6194
  */
6091
- var Algorithm;
6092
- (function (Algorithm) {
6093
- Algorithm["ES256"] = "ES256";
6094
- Algorithm["ES384"] = "ES384";
6095
- Algorithm["ES512"] = "ES512";
6096
- Algorithm["HS256"] = "HS256";
6097
- Algorithm["HS384"] = "HS384";
6098
- Algorithm["HS512"] = "HS512";
6099
- Algorithm["PS256"] = "PS256";
6100
- Algorithm["PS384"] = "PS384";
6101
- Algorithm["PS512"] = "PS512";
6102
- Algorithm["RS256"] = "RS256";
6103
- Algorithm["RS384"] = "RS384";
6104
- Algorithm["RS512"] = "RS512";
6105
- Algorithm["none"] = "none";
6106
- })(Algorithm = exports.Algorithm || (exports.Algorithm = {}));
6195
+ var VerificationStrategy;
6196
+ (function (VerificationStrategy) {
6197
+ VerificationStrategy["ClickableLink"] = "ClickableLink";
6198
+ VerificationStrategy["FormField"] = "FormField";
6199
+ })(VerificationStrategy = exports.VerificationStrategy || (exports.VerificationStrategy = {}));
6200
+ /**
6201
+ * Identifies the WebAuthn workflow. This will affect the parameters used for credential creation
6202
+ * and request based on the Tenant configuration.
6203
+ *
6204
+ * @author Spencer Witt
6205
+ */
6206
+ var WebAuthnWorkflow;
6207
+ (function (WebAuthnWorkflow) {
6208
+ WebAuthnWorkflow["bootstrap"] = "bootstrap";
6209
+ WebAuthnWorkflow["general"] = "general";
6210
+ WebAuthnWorkflow["reauthentication"] = "reauthentication";
6211
+ })(WebAuthnWorkflow = exports.WebAuthnWorkflow || (exports.WebAuthnWorkflow = {}));
6212
+ /**
6213
+ * The possible states of an individual webhook attempt to a single endpoint.
6214
+ *
6215
+ * @author Spencer Witt
6216
+ */
6217
+ var WebhookAttemptResult;
6218
+ (function (WebhookAttemptResult) {
6219
+ WebhookAttemptResult["Success"] = "Success";
6220
+ WebhookAttemptResult["Failure"] = "Failure";
6221
+ WebhookAttemptResult["Unknown"] = "Unknown";
6222
+ })(WebhookAttemptResult = exports.WebhookAttemptResult || (exports.WebhookAttemptResult = {}));
6223
+ /**
6224
+ * The possible result states of a webhook event. This tracks the success of the overall webhook transaction according to the {@link TransactionType}
6225
+ * and configured webhooks.
6226
+ *
6227
+ * @author Spencer Witt
6228
+ */
6229
+ var WebhookEventResult;
6230
+ (function (WebhookEventResult) {
6231
+ WebhookEventResult["Failed"] = "Failed";
6232
+ WebhookEventResult["Running"] = "Running";
6233
+ WebhookEventResult["Succeeded"] = "Succeeded";
6234
+ })(WebhookEventResult = exports.WebhookEventResult || (exports.WebhookEventResult = {}));
6107
6235
  //# sourceMappingURL=FusionAuthClient.js.map