@fusionauth/typescript-client 1.57.0 → 1.58.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,6 +1,6 @@
1
1
  "use strict";
2
2
  /*
3
- * Copyright (c) 2019-2023, FusionAuth, All Rights Reserved
3
+ * Copyright (c) 2019-2025, FusionAuth, All Rights Reserved
4
4
  *
5
5
  * Licensed under the Apache License, Version 2.0 (the "License");
6
6
  * you may not use this file except in compliance with the License.
@@ -15,7 +15,7 @@
15
15
  * language governing permissions and limitations under the License.
16
16
  */
17
17
  Object.defineProperty(exports, "__esModule", { value: true });
18
- exports.Algorithm = exports.ClientAuthenticationMethod = exports.OAuthApplicationRelationship = exports.UnknownScopePolicy = exports.EventType = exports.CaptchaMethod = exports.SteamAPIMode = exports.AuthenticationThreats = exports.TOTPAlgorithm = exports.VerificationStrategy = exports.IdentityProviderType = exports.ObjectState = exports.OAuthScopeConsentMode = exports.KeyType = exports.KeyAlgorithm = exports.CoseEllipticCurve = exports.PublicKeyCredentialType = exports.AuthenticatorAttachmentPreference = exports.Sort = exports.XMLSignatureLocation = exports.SAMLLogoutBehavior = exports.RegistrationType = exports.LoginIdType = exports.SystemTrustedProxyConfigurationPolicy = exports.LambdaType = exports.UserActionPhase = exports.IPAccessControlEntryAction = exports.MultiFactorLoginPolicy = exports.IdentityProviderLinkingStrategy = exports.FormDataType = exports.SecureGeneratorType = exports.ExpiryUnit = exports.CanonicalizationMethod = exports.FormType = exports.ClientAuthenticationPolicy = exports.UserVerificationRequirement = exports.LambdaEngineType = exports.RateLimitedRequestType = exports.ApplicationMultiFactorTrustPolicy = exports.DeviceType = exports.OAuthErrorType = exports.OAuthErrorReason = exports.SAMLv2DestinationAssertionPolicy = exports.RefreshTokenUsagePolicy = exports.IdentityProviderLoginMethod = exports.AuthenticatorAttachment = exports.Oauth2AuthorizedURLValidationPolicy = exports.LDAPSecurityMethod = exports.ChangePasswordReason = exports.ResidentKeyRequirement = exports.MessageType = exports.ProofKeyForCodeExchangePolicy = exports.ConnectorType = exports.ThemeType = exports.CoseKeyType = exports.TransactionType = exports.EventLogType = exports.WebhookAttemptResult = exports.OAuthScopeHandlingPolicy = exports.FormControl = exports.BreachedPasswordStatus = exports.KeyUse = exports.RefreshTokenExpirationPolicy = exports.UserState = exports.HTTPMethod = exports.ConsentStatus = exports.WebAuthnWorkflow = exports.WebhookEventResult = exports.AttestationConveyancePreference = exports.FormFieldAdminPolicy = exports.BreachMatchMode = exports.BreachAction = exports.MessengerType = exports.UnverifiedBehavior = exports.ReactorFeatureStatus = exports.CoseAlgorithmIdentifier = exports.FamilyRole = exports.LogoutBehavior = exports.ContentStatus = exports.TokenType = exports.UniqueUsernameStrategy = exports.EmailSecurityType = exports.AttestationType = exports.GrantType = exports.FusionAuthClient = void 0;
18
+ exports.WebhookEventResult = exports.WebhookAttemptResult = exports.WebAuthnWorkflow = exports.VerificationStrategy = exports.UserVerificationRequirement = exports.UserState = exports.UserActionPhase = exports.UnverifiedBehavior = exports.UnknownScopePolicy = exports.TransactionType = exports.TokenType = exports.ThemeType = exports.UniqueUsernameStrategy = exports.SystemTrustedProxyConfigurationPolicy = exports.SteamAPIMode = exports.Sort = exports.SecureGeneratorType = exports.SAMLv2DestinationAssertionPolicy = exports.ResidentKeyRequirement = exports.RefreshTokenUsagePolicy = exports.RefreshTokenExpirationPolicy = exports.ReactorFeatureStatus = exports.RateLimitedRequestType = exports.PublicKeyCredentialType = exports.ProofKeyForCodeExchangePolicy = exports.BreachMatchMode = exports.BreachAction = exports.ObjectState = exports.Oauth2AuthorizedURLValidationPolicy = exports.OAuthScopeHandlingPolicy = exports.OAuthScopeConsentMode = exports.OAuthErrorType = exports.OAuthErrorReason = exports.OAuthApplicationRelationship = exports.MultiFactorLoginPolicy = exports.MessengerType = exports.MessageType = exports.LogoutBehavior = exports.LambdaType = exports.LambdaEngineType = exports.LDAPSecurityMethod = exports.KeyUse = exports.KeyType = exports.KeyAlgorithm = exports.IdentityProviderType = exports.ClientAuthenticationMethod = exports.IdentityProviderLoginMethod = exports.IdentityProviderLinkingStrategy = exports.IPAccessControlEntryAction = exports.HTTPMethod = exports.GrantType = exports.FormType = exports.FormFieldAdminPolicy = exports.FormDataType = exports.FormControl = exports.FamilyRole = exports.ExpiryUnit = exports.EventType = exports.EventLogType = exports.EmailSecurityType = exports.DeviceType = exports.CoseKeyType = exports.CoseEllipticCurve = exports.CoseAlgorithmIdentifier = exports.ContentStatus = exports.ConsentStatus = exports.ConnectorType = exports.ClientAuthenticationPolicy = exports.ChangePasswordReason = exports.CaptchaMethod = exports.CanonicalizationMethod = exports.BreachedPasswordStatus = exports.TOTPAlgorithm = exports.AuthenticatorAttachmentPreference = exports.AuthenticatorAttachment = exports.AuthenticationThreats = exports.AttestationType = exports.AttestationConveyancePreference = exports.ApplicationMultiFactorTrustPolicy = exports.XMLSignatureLocation = exports.SAMLLogoutBehavior = exports.RegistrationType = exports.LoginIdType = exports.Algorithm = exports.FusionAuthClient = void 0;
19
19
  const DefaultRESTClientBuilder_1 = require("./DefaultRESTClientBuilder");
20
20
  const url_1 = require("url");
21
21
  class FusionAuthClient {
@@ -143,6 +143,24 @@ class FusionAuthClient {
143
143
  .withMethod("POST")
144
144
  .go();
145
145
  }
146
+ /**
147
+ * Changes a user's password using their access token (JWT) instead of the changePasswordId
148
+ * A common use case for this method will be if you want to allow the user to change their own password.
149
+ *
150
+ * Remember to send refreshToken in the request body if you want to get a new refresh token when login using the returned oneTimePassword.
151
+ *
152
+ * @param {string} encodedJWT The encoded JWT (access token).
153
+ * @param {ChangePasswordRequest} request The change password request that contains all the information used to change the password.
154
+ * @returns {Promise<ClientResponse<ChangePasswordResponse>>}
155
+ */
156
+ changePasswordByJWT(encodedJWT, request) {
157
+ return this.startAnonymous()
158
+ .withUri('/api/user/change-password')
159
+ .withAuthorization('Bearer ' + encodedJWT)
160
+ .withJSONBody(request)
161
+ .withMethod("POST")
162
+ .go();
163
+ }
146
164
  /**
147
165
  * Changes a user's password using their identity (loginId and password). Using a loginId instead of the changePasswordId
148
166
  * bypasses the email verification and allows a password to be changed directly without first calling the #forgotPassword
@@ -784,7 +802,7 @@ class FusionAuthClient {
784
802
  .go();
785
803
  }
786
804
  /**
787
- * Deactivates the users with the given ids.
805
+ * Deactivates the users with the given Ids.
788
806
  *
789
807
  * @param {Array<string>} userIds The ids of the users to deactivate.
790
808
  * @returns {Promise<ClientResponse<UserDeleteResponse>>}
@@ -801,7 +819,7 @@ class FusionAuthClient {
801
819
  .go();
802
820
  }
803
821
  /**
804
- * Deactivates the users with the given ids.
822
+ * Deactivates the users with the given Ids.
805
823
  *
806
824
  * @param {Array<string>} userIds The ids of the users to deactivate.
807
825
  * @returns {Promise<ClientResponse<UserDeleteResponse>>}
@@ -1276,8 +1294,8 @@ class FusionAuthClient {
1276
1294
  .go();
1277
1295
  }
1278
1296
  /**
1279
- * Deletes the users with the given ids, or users matching the provided JSON query or queryString.
1280
- * The order of preference is ids, query and then queryString, it is recommended to only provide one of the three for the request.
1297
+ * Deletes the users with the given Ids, or users matching the provided JSON query or queryString.
1298
+ * The order of preference is Ids, query and then queryString, it is recommended to only provide one of the three for the request.
1281
1299
  *
1282
1300
  * This method can be used to deactivate or permanently delete (hard-delete) users based upon the hardDelete boolean in the request body.
1283
1301
  * Using the dryRun parameter you may also request the result of the action without actually deleting or deactivating any users.
@@ -1295,8 +1313,8 @@ class FusionAuthClient {
1295
1313
  .go();
1296
1314
  }
1297
1315
  /**
1298
- * Deletes the users with the given ids, or users matching the provided JSON query or queryString.
1299
- * The order of preference is ids, query and then queryString, it is recommended to only provide one of the three for the request.
1316
+ * Deletes the users with the given Ids, or users matching the provided JSON query or queryString.
1317
+ * The order of preference is Ids, query and then queryString, it is recommended to only provide one of the three for the request.
1300
1318
  *
1301
1319
  * This method can be used to deactivate or permanently delete (hard-delete) users based upon the hardDelete boolean in the request body.
1302
1320
  * Using the dryRun parameter you may also request the result of the action without actually deleting or deactivating any users.
@@ -1845,7 +1863,7 @@ class FusionAuthClient {
1845
1863
  * Modifies a temporal user action by changing the expiration of the action and optionally adding a comment to the
1846
1864
  * action.
1847
1865
  *
1848
- * @param {UUID} actionId The Id of the action to modify. This is technically the user action log id.
1866
+ * @param {UUID} actionId The Id of the action to modify. This is technically the user action log Id.
1849
1867
  * @param {ActionRequest} request The request that contains all the information about the modification.
1850
1868
  * @returns {Promise<ClientResponse<ActionResponse>>}
1851
1869
  */
@@ -1871,10 +1889,10 @@ class FusionAuthClient {
1871
1889
  .go();
1872
1890
  }
1873
1891
  /**
1874
- * Updates an authentication API key by given id
1892
+ * Updates an API key with the given Id.
1875
1893
  *
1876
- * @param {UUID} keyId The Id of the authentication key. If not provided a secure random api key will be generated.
1877
- * @param {APIKeyRequest} request The request object that contains all the information needed to create the APIKey.
1894
+ * @param {UUID} keyId The Id of the API key. If not provided a secure random api key will be generated.
1895
+ * @param {APIKeyRequest} request The request object that contains all the information needed to create the API key.
1878
1896
  * @returns {Promise<ClientResponse<APIKeyResponse>>}
1879
1897
  */
1880
1898
  patchAPIKey(keyId, request) {
@@ -1882,7 +1900,7 @@ class FusionAuthClient {
1882
1900
  .withUri('/api/api-key')
1883
1901
  .withUriSegment(keyId)
1884
1902
  .withJSONBody(request)
1885
- .withMethod("POST")
1903
+ .withMethod("PATCH")
1886
1904
  .go();
1887
1905
  }
1888
1906
  /**
@@ -2426,7 +2444,7 @@ class FusionAuthClient {
2426
2444
  .go();
2427
2445
  }
2428
2446
  /**
2429
- * Removes a user from the family with the given id.
2447
+ * Removes a user from the family with the given Id.
2430
2448
  *
2431
2449
  * @param {UUID} familyId The Id of the family to remove the user from.
2432
2450
  * @param {UUID} userId The Id of the user to remove from the family.
@@ -2485,7 +2503,7 @@ class FusionAuthClient {
2485
2503
  .go();
2486
2504
  }
2487
2505
  /**
2488
- * Retrieves an authentication API key for the given id
2506
+ * Retrieves an authentication API key for the given Id.
2489
2507
  *
2490
2508
  * @param {UUID} keyId The Id of the API key to retrieve.
2491
2509
  * @returns {Promise<ClientResponse<APIKeyResponse>>}
@@ -2556,7 +2574,7 @@ class FusionAuthClient {
2556
2574
  /**
2557
2575
  * Retrieves the application for the given Id or all the applications if the Id is null.
2558
2576
  *
2559
- * @param {UUID} applicationId (Optional) The application id.
2577
+ * @param {UUID} applicationId (Optional) The application Id.
2560
2578
  * @returns {Promise<ClientResponse<ApplicationResponse>>}
2561
2579
  */
2562
2580
  retrieveApplication(applicationId) {
@@ -2639,10 +2657,10 @@ class FusionAuthClient {
2639
2657
  .go();
2640
2658
  }
2641
2659
  /**
2642
- * Retrieves the daily active user report between the two instants. If you specify an application id, it will only
2660
+ * Retrieves the daily active user report between the two instants. If you specify an application Id, it will only
2643
2661
  * return the daily active counts for that application.
2644
2662
  *
2645
- * @param {UUID} applicationId (Optional) The application id.
2663
+ * @param {UUID} applicationId (Optional) The application Id.
2646
2664
  * @param {number} start The start instant as UTC milliseconds since Epoch.
2647
2665
  * @param {number} end The end instant as UTC milliseconds since Epoch.
2648
2666
  * @returns {Promise<ClientResponse<DailyActiveUserReportResponse>>}
@@ -2657,7 +2675,7 @@ class FusionAuthClient {
2657
2675
  .go();
2658
2676
  }
2659
2677
  /**
2660
- * Retrieves the email template for the given Id. If you don't specify the id, this will return all the email templates.
2678
+ * Retrieves the email template for the given Id. If you don't specify the Id, this will return all the email templates.
2661
2679
  *
2662
2680
  * @param {UUID} emailTemplateId (Optional) The Id of the email template.
2663
2681
  * @returns {Promise<ClientResponse<EmailTemplateResponse>>}
@@ -3073,10 +3091,10 @@ class FusionAuthClient {
3073
3091
  .go();
3074
3092
  }
3075
3093
  /**
3076
- * Retrieves the login report between the two instants. If you specify an application id, it will only return the
3094
+ * Retrieves the login report between the two instants. If you specify an application Id, it will only return the
3077
3095
  * login counts for that application.
3078
3096
  *
3079
- * @param {UUID} applicationId (Optional) The application id.
3097
+ * @param {UUID} applicationId (Optional) The application Id.
3080
3098
  * @param {number} start The start instant as UTC milliseconds since Epoch.
3081
3099
  * @param {number} end The end instant as UTC milliseconds since Epoch.
3082
3100
  * @returns {Promise<ClientResponse<LoginReportResponse>>}
@@ -3091,7 +3109,7 @@ class FusionAuthClient {
3091
3109
  .go();
3092
3110
  }
3093
3111
  /**
3094
- * Retrieves the message template for the given Id. If you don't specify the id, this will return all the message templates.
3112
+ * Retrieves the message template for the given Id. If you don't specify the Id, this will return all the message templates.
3095
3113
  *
3096
3114
  * @param {UUID} messageTemplateId (Optional) The Id of the message template.
3097
3115
  * @returns {Promise<ClientResponse<MessageTemplateResponse>>}
@@ -3152,10 +3170,10 @@ class FusionAuthClient {
3152
3170
  .go();
3153
3171
  }
3154
3172
  /**
3155
- * Retrieves the monthly active user report between the two instants. If you specify an application id, it will only
3173
+ * Retrieves the monthly active user report between the two instants. If you specify an application Id, it will only
3156
3174
  * return the monthly active counts for that application.
3157
3175
  *
3158
- * @param {UUID} applicationId (Optional) The application id.
3176
+ * @param {UUID} applicationId (Optional) The application Id.
3159
3177
  * @param {number} start The start instant as UTC milliseconds since Epoch.
3160
3178
  * @param {number} end The end instant as UTC milliseconds since Epoch.
3161
3179
  * @returns {Promise<ClientResponse<MonthlyActiveUserReportResponse>>}
@@ -3331,7 +3349,7 @@ class FusionAuthClient {
3331
3349
  .go();
3332
3350
  }
3333
3351
  /**
3334
- * Retrieves the user registration for the user with the given Id and the given application id.
3352
+ * Retrieves the user registration for the user with the given Id and the given application Id.
3335
3353
  *
3336
3354
  * @param {UUID} userId The Id of the user.
3337
3355
  * @param {UUID} applicationId The Id of the application.
@@ -3346,10 +3364,10 @@ class FusionAuthClient {
3346
3364
  .go();
3347
3365
  }
3348
3366
  /**
3349
- * Retrieves the registration report between the two instants. If you specify an application id, it will only return
3367
+ * Retrieves the registration report between the two instants. If you specify an application Id, it will only return
3350
3368
  * the registration counts for that application.
3351
3369
  *
3352
- * @param {UUID} applicationId (Optional) The application id.
3370
+ * @param {UUID} applicationId (Optional) The application Id.
3353
3371
  * @param {number} start The start instant as UTC milliseconds since Epoch.
3354
3372
  * @param {number} end The end instant as UTC milliseconds since Epoch.
3355
3373
  * @returns {Promise<ClientResponse<RegistrationReportResponse>>}
@@ -3526,7 +3544,7 @@ class FusionAuthClient {
3526
3544
  .go();
3527
3545
  }
3528
3546
  /**
3529
- * Retrieves the user action for the given Id. If you pass in null for the id, this will return all the user
3547
+ * Retrieves the user action for the given Id. If you pass in null for the Id, this will return all the user
3530
3548
  * actions.
3531
3549
  *
3532
3550
  * @param {UUID} userActionId (Optional) The Id of the user action.
@@ -3540,7 +3558,7 @@ class FusionAuthClient {
3540
3558
  .go();
3541
3559
  }
3542
3560
  /**
3543
- * Retrieves the user action reason for the given Id. If you pass in null for the id, this will return all the user
3561
+ * Retrieves the user action reason for the given Id. If you pass in null for the Id, this will return all the user
3544
3562
  * action reasons.
3545
3563
  *
3546
3564
  * @param {UUID} userActionReasonId (Optional) The Id of the user action reason.
@@ -3647,8 +3665,8 @@ class FusionAuthClient {
3647
3665
  *
3648
3666
  * This API is useful if you want to build your own login workflow to complete a device grant.
3649
3667
  *
3650
- * @param {string} client_id The client id.
3651
- * @param {string} client_secret The client id.
3668
+ * @param {string} client_id The client Id.
3669
+ * @param {string} client_secret The client Id.
3652
3670
  * @param {string} user_code The end-user verification code.
3653
3671
  * @returns {Promise<ClientResponse<void>>}
3654
3672
  */
@@ -3767,11 +3785,11 @@ class FusionAuthClient {
3767
3785
  .go();
3768
3786
  }
3769
3787
  /**
3770
- * Retrieves the login report between the two instants for a particular user by Id. If you specify an application id, it will only return the
3788
+ * Retrieves the login report between the two instants for a particular user by Id. If you specify an application Id, it will only return the
3771
3789
  * login counts for that application.
3772
3790
  *
3773
- * @param {UUID} applicationId (Optional) The application id.
3774
- * @param {UUID} userId The userId id.
3791
+ * @param {UUID} applicationId (Optional) The application Id.
3792
+ * @param {UUID} userId The userId Id.
3775
3793
  * @param {number} start The start instant as UTC milliseconds since Epoch.
3776
3794
  * @param {number} end The end instant as UTC milliseconds since Epoch.
3777
3795
  * @returns {Promise<ClientResponse<LoginReportResponse>>}
@@ -3787,11 +3805,11 @@ class FusionAuthClient {
3787
3805
  .go();
3788
3806
  }
3789
3807
  /**
3790
- * Retrieves the login report between the two instants for a particular user by login Id. If you specify an application id, it will only return the
3808
+ * Retrieves the login report between the two instants for a particular user by login Id. If you specify an application Id, it will only return the
3791
3809
  * login counts for that application.
3792
3810
  *
3793
- * @param {UUID} applicationId (Optional) The application id.
3794
- * @param {string} loginId The userId id.
3811
+ * @param {UUID} applicationId (Optional) The application Id.
3812
+ * @param {string} loginId The userId Id.
3795
3813
  * @param {number} start The start instant as UTC milliseconds since Epoch.
3796
3814
  * @param {number} end The end instant as UTC milliseconds since Epoch.
3797
3815
  * @returns {Promise<ClientResponse<LoginReportResponse>>}
@@ -3874,7 +3892,7 @@ class FusionAuthClient {
3874
3892
  .go();
3875
3893
  }
3876
3894
  /**
3877
- * Retrieves the webhook for the given Id. If you pass in null for the id, this will return all the webhooks.
3895
+ * Retrieves the webhook for the given Id. If you pass in null for the Id, this will return all the webhooks.
3878
3896
  *
3879
3897
  * @param {UUID} webhookId (Optional) The Id of the webhook.
3880
3898
  * @returns {Promise<ClientResponse<WebhookResponse>>}
@@ -4123,7 +4141,7 @@ class FusionAuthClient {
4123
4141
  .go();
4124
4142
  }
4125
4143
  /**
4126
- * Retrieves the entities for the given ids. If any Id is invalid, it is ignored.
4144
+ * Retrieves the entities for the given Ids. If any Id is invalid, it is ignored.
4127
4145
  *
4128
4146
  * @param {Array<string>} ids The entity ids to search for.
4129
4147
  * @returns {Promise<ClientResponse<EntitySearchResponse>>}
@@ -4305,7 +4323,7 @@ class FusionAuthClient {
4305
4323
  .go();
4306
4324
  }
4307
4325
  /**
4308
- * Retrieves the users for the given ids. If any Id is invalid, it is ignored.
4326
+ * Retrieves the users for the given Ids. If any Id is invalid, it is ignored.
4309
4327
  *
4310
4328
  * @param {Array<string>} ids The user ids to search for.
4311
4329
  * @returns {Promise<ClientResponse<SearchResponse>>}
@@ -4320,9 +4338,9 @@ class FusionAuthClient {
4320
4338
  .go();
4321
4339
  }
4322
4340
  /**
4323
- * Retrieves the users for the given ids. If any Id is invalid, it is ignored.
4341
+ * Retrieves the users for the given Ids. If any Id is invalid, it is ignored.
4324
4342
  *
4325
- * @param {Array<string>} ids The user ids to search for.
4343
+ * @param {Array<string>} ids The user Ids to search for.
4326
4344
  * @returns {Promise<ClientResponse<SearchResponse>>}
4327
4345
  */
4328
4346
  searchUsersByIds(ids) {
@@ -4389,7 +4407,7 @@ class FusionAuthClient {
4389
4407
  .go();
4390
4408
  }
4391
4409
  /**
4392
- * Send an email using an email template id. You can optionally provide <code>requestData</code> to access key value
4410
+ * Send an email using an email template Id. You can optionally provide <code>requestData</code> to access key value
4393
4411
  * pairs in the email template.
4394
4412
  *
4395
4413
  * @param {UUID} emailTemplateId The Id for the template.
@@ -4575,16 +4593,16 @@ class FusionAuthClient {
4575
4593
  .go();
4576
4594
  }
4577
4595
  /**
4578
- * Updates an API key by given id
4596
+ * Updates an API key with the given Id.
4579
4597
  *
4580
- * @param {UUID} apiKeyId The Id of the API key to update.
4581
- * @param {APIKeyRequest} request The request object that contains all the information used to create the API Key.
4598
+ * @param {UUID} keyId The Id of the API key to update.
4599
+ * @param {APIKeyRequest} request The request that contains all the new API key information.
4582
4600
  * @returns {Promise<ClientResponse<APIKeyResponse>>}
4583
4601
  */
4584
- updateAPIKey(apiKeyId, request) {
4602
+ updateAPIKey(keyId, request) {
4585
4603
  return this.start()
4586
4604
  .withUri('/api/api-key')
4587
- .withUriSegment(apiKeyId)
4605
+ .withUriSegment(keyId)
4588
4606
  .withJSONBody(request)
4589
4607
  .withMethod("PUT")
4590
4608
  .go();
@@ -5063,7 +5081,7 @@ class FusionAuthClient {
5063
5081
  * If you build your own activation form you should validate the user provided code prior to beginning the Authorization grant.
5064
5082
  *
5065
5083
  * @param {string} user_code The end-user verification code.
5066
- * @param {string} client_id The client id.
5084
+ * @param {string} client_id The client Id.
5067
5085
  * @returns {Promise<ClientResponse<void>>}
5068
5086
  */
5069
5087
  validateDevice(user_code, client_id) {
@@ -5221,24 +5239,67 @@ class FusionAuthClient {
5221
5239
  exports.FusionAuthClient = FusionAuthClient;
5222
5240
  exports.default = FusionAuthClient;
5223
5241
  /**
5224
- * Authorization Grant types as defined by the <a href="https://tools.ietf.org/html/rfc6749">The OAuth 2.0 Authorization
5225
- * Framework - RFC 6749</a>.
5226
- * <p>
5227
- * Specific names as defined by <a href="https://tools.ietf.org/html/rfc7591#section-4.1">
5228
- * OAuth 2.0 Dynamic Client Registration Protocol - RFC 7591 Section 4.1</a>
5242
+ * Available JSON Web Algorithms (JWA) as described in RFC 7518 available for this JWT implementation.
5229
5243
  *
5230
5244
  * @author Daniel DeGroff
5231
5245
  */
5232
- var GrantType;
5233
- (function (GrantType) {
5234
- GrantType["authorization_code"] = "authorization_code";
5235
- GrantType["implicit"] = "implicit";
5236
- GrantType["password"] = "password";
5237
- GrantType["client_credentials"] = "client_credentials";
5238
- GrantType["refresh_token"] = "refresh_token";
5239
- GrantType["unknown"] = "unknown";
5240
- GrantType["device_code"] = "urn:ietf:params:oauth:grant-type:device_code";
5241
- })(GrantType = exports.GrantType || (exports.GrantType = {}));
5246
+ var Algorithm;
5247
+ (function (Algorithm) {
5248
+ Algorithm["ES256"] = "ES256";
5249
+ Algorithm["ES384"] = "ES384";
5250
+ Algorithm["ES512"] = "ES512";
5251
+ Algorithm["HS256"] = "HS256";
5252
+ Algorithm["HS384"] = "HS384";
5253
+ Algorithm["HS512"] = "HS512";
5254
+ Algorithm["PS256"] = "PS256";
5255
+ Algorithm["PS384"] = "PS384";
5256
+ Algorithm["PS512"] = "PS512";
5257
+ Algorithm["RS256"] = "RS256";
5258
+ Algorithm["RS384"] = "RS384";
5259
+ Algorithm["RS512"] = "RS512";
5260
+ Algorithm["none"] = "none";
5261
+ })(Algorithm = exports.Algorithm || (exports.Algorithm = {}));
5262
+ var LoginIdType;
5263
+ (function (LoginIdType) {
5264
+ LoginIdType["email"] = "email";
5265
+ LoginIdType["username"] = "username";
5266
+ })(LoginIdType = exports.LoginIdType || (exports.LoginIdType = {}));
5267
+ var RegistrationType;
5268
+ (function (RegistrationType) {
5269
+ RegistrationType["basic"] = "basic";
5270
+ RegistrationType["advanced"] = "advanced";
5271
+ })(RegistrationType = exports.RegistrationType || (exports.RegistrationType = {}));
5272
+ var SAMLLogoutBehavior;
5273
+ (function (SAMLLogoutBehavior) {
5274
+ SAMLLogoutBehavior["AllParticipants"] = "AllParticipants";
5275
+ SAMLLogoutBehavior["OnlyOriginator"] = "OnlyOriginator";
5276
+ })(SAMLLogoutBehavior = exports.SAMLLogoutBehavior || (exports.SAMLLogoutBehavior = {}));
5277
+ var XMLSignatureLocation;
5278
+ (function (XMLSignatureLocation) {
5279
+ XMLSignatureLocation["Assertion"] = "Assertion";
5280
+ XMLSignatureLocation["Response"] = "Response";
5281
+ })(XMLSignatureLocation = exports.XMLSignatureLocation || (exports.XMLSignatureLocation = {}));
5282
+ /**
5283
+ * @author Daniel DeGroff
5284
+ */
5285
+ var ApplicationMultiFactorTrustPolicy;
5286
+ (function (ApplicationMultiFactorTrustPolicy) {
5287
+ ApplicationMultiFactorTrustPolicy["Any"] = "Any";
5288
+ ApplicationMultiFactorTrustPolicy["This"] = "This";
5289
+ ApplicationMultiFactorTrustPolicy["None"] = "None";
5290
+ })(ApplicationMultiFactorTrustPolicy = exports.ApplicationMultiFactorTrustPolicy || (exports.ApplicationMultiFactorTrustPolicy = {}));
5291
+ /**
5292
+ * Used to communicate whether and how authenticator attestation should be delivered to the Relying Party
5293
+ *
5294
+ * @author Spencer Witt
5295
+ */
5296
+ var AttestationConveyancePreference;
5297
+ (function (AttestationConveyancePreference) {
5298
+ AttestationConveyancePreference["none"] = "none";
5299
+ AttestationConveyancePreference["indirect"] = "indirect";
5300
+ AttestationConveyancePreference["direct"] = "direct";
5301
+ AttestationConveyancePreference["enterprise"] = "enterprise";
5302
+ })(AttestationConveyancePreference = exports.AttestationConveyancePreference || (exports.AttestationConveyancePreference = {}));
5242
5303
  /**
5243
5304
  * Used to indicate what type of attestation was included in the authenticator response for a given WebAuthn credential at the time it was created
5244
5305
  *
@@ -5252,33 +5313,113 @@ var AttestationType;
5252
5313
  AttestationType["anonymizationCa"] = "anonymizationCa";
5253
5314
  AttestationType["none"] = "none";
5254
5315
  })(AttestationType = exports.AttestationType || (exports.AttestationType = {}));
5255
- var EmailSecurityType;
5256
- (function (EmailSecurityType) {
5257
- EmailSecurityType["NONE"] = "NONE";
5258
- EmailSecurityType["SSL"] = "SSL";
5259
- EmailSecurityType["TLS"] = "TLS";
5260
- })(EmailSecurityType = exports.EmailSecurityType || (exports.EmailSecurityType = {}));
5261
- var UniqueUsernameStrategy;
5262
- (function (UniqueUsernameStrategy) {
5263
- UniqueUsernameStrategy["Always"] = "Always";
5264
- UniqueUsernameStrategy["OnCollision"] = "OnCollision";
5265
- })(UniqueUsernameStrategy = exports.UniqueUsernameStrategy || (exports.UniqueUsernameStrategy = {}));
5266
5316
  /**
5267
- * <ul>
5268
- * <li>Bearer Token type as defined by <a href="https://tools.ietf.org/html/rfc6750">RFC 6750</a>.</li>
5269
- * <li>MAC Token type as referenced by <a href="https://tools.ietf.org/html/rfc6749">RFC 6749</a> and
5270
- * <a href="https://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-05">
5271
- * Draft RFC on OAuth 2.0 Message Authentication Code (MAC) Tokens</a>
5272
- * </li>
5273
- * </ul>
5317
+ * @author Brett Pontarelli
5318
+ */
5319
+ var AuthenticationThreats;
5320
+ (function (AuthenticationThreats) {
5321
+ AuthenticationThreats["ImpossibleTravel"] = "ImpossibleTravel";
5322
+ })(AuthenticationThreats = exports.AuthenticationThreats || (exports.AuthenticationThreats = {}));
5323
+ /**
5324
+ * Describes the <a href="https://www.w3.org/TR/webauthn-2/#authenticator-attachment-modality">authenticator attachment modality</a>.
5325
+ *
5326
+ * @author Spencer Witt
5327
+ */
5328
+ var AuthenticatorAttachment;
5329
+ (function (AuthenticatorAttachment) {
5330
+ AuthenticatorAttachment["platform"] = "platform";
5331
+ AuthenticatorAttachment["crossPlatform"] = "crossPlatform";
5332
+ })(AuthenticatorAttachment = exports.AuthenticatorAttachment || (exports.AuthenticatorAttachment = {}));
5333
+ /**
5334
+ * Describes the authenticator attachment modality preference for a WebAuthn workflow. See {@link AuthenticatorAttachment}
5274
5335
  *
5336
+ * @author Spencer Witt
5337
+ */
5338
+ var AuthenticatorAttachmentPreference;
5339
+ (function (AuthenticatorAttachmentPreference) {
5340
+ AuthenticatorAttachmentPreference["any"] = "any";
5341
+ AuthenticatorAttachmentPreference["platform"] = "platform";
5342
+ AuthenticatorAttachmentPreference["crossPlatform"] = "crossPlatform";
5343
+ })(AuthenticatorAttachmentPreference = exports.AuthenticatorAttachmentPreference || (exports.AuthenticatorAttachmentPreference = {}));
5344
+ var TOTPAlgorithm;
5345
+ (function (TOTPAlgorithm) {
5346
+ TOTPAlgorithm["HmacSHA1"] = "HmacSHA1";
5347
+ TOTPAlgorithm["HmacSHA256"] = "HmacSHA256";
5348
+ TOTPAlgorithm["HmacSHA512"] = "HmacSHA512";
5349
+ })(TOTPAlgorithm = exports.TOTPAlgorithm || (exports.TOTPAlgorithm = {}));
5350
+ /**
5275
5351
  * @author Daniel DeGroff
5276
5352
  */
5277
- var TokenType;
5278
- (function (TokenType) {
5279
- TokenType["Bearer"] = "Bearer";
5280
- TokenType["MAC"] = "MAC";
5281
- })(TokenType = exports.TokenType || (exports.TokenType = {}));
5353
+ var BreachedPasswordStatus;
5354
+ (function (BreachedPasswordStatus) {
5355
+ BreachedPasswordStatus["None"] = "None";
5356
+ BreachedPasswordStatus["ExactMatch"] = "ExactMatch";
5357
+ BreachedPasswordStatus["SubAddressMatch"] = "SubAddressMatch";
5358
+ BreachedPasswordStatus["PasswordOnly"] = "PasswordOnly";
5359
+ BreachedPasswordStatus["CommonPassword"] = "CommonPassword";
5360
+ })(BreachedPasswordStatus = exports.BreachedPasswordStatus || (exports.BreachedPasswordStatus = {}));
5361
+ /**
5362
+ * XML canonicalization method enumeration. This is used for the IdP and SP side of FusionAuth SAML.
5363
+ *
5364
+ * @author Brian Pontarelli
5365
+ */
5366
+ var CanonicalizationMethod;
5367
+ (function (CanonicalizationMethod) {
5368
+ CanonicalizationMethod["exclusive"] = "exclusive";
5369
+ CanonicalizationMethod["exclusive_with_comments"] = "exclusive_with_comments";
5370
+ CanonicalizationMethod["inclusive"] = "inclusive";
5371
+ CanonicalizationMethod["inclusive_with_comments"] = "inclusive_with_comments";
5372
+ })(CanonicalizationMethod = exports.CanonicalizationMethod || (exports.CanonicalizationMethod = {}));
5373
+ /**
5374
+ * @author Brett Pontarelli
5375
+ */
5376
+ var CaptchaMethod;
5377
+ (function (CaptchaMethod) {
5378
+ CaptchaMethod["GoogleRecaptchaV2"] = "GoogleRecaptchaV2";
5379
+ CaptchaMethod["GoogleRecaptchaV3"] = "GoogleRecaptchaV3";
5380
+ CaptchaMethod["HCaptcha"] = "HCaptcha";
5381
+ CaptchaMethod["HCaptchaEnterprise"] = "HCaptchaEnterprise";
5382
+ })(CaptchaMethod = exports.CaptchaMethod || (exports.CaptchaMethod = {}));
5383
+ /**
5384
+ * @author Trevor Smith
5385
+ */
5386
+ var ChangePasswordReason;
5387
+ (function (ChangePasswordReason) {
5388
+ ChangePasswordReason["Administrative"] = "Administrative";
5389
+ ChangePasswordReason["Breached"] = "Breached";
5390
+ ChangePasswordReason["Expired"] = "Expired";
5391
+ ChangePasswordReason["Validation"] = "Validation";
5392
+ })(ChangePasswordReason = exports.ChangePasswordReason || (exports.ChangePasswordReason = {}));
5393
+ /**
5394
+ * @author Brett Guy
5395
+ */
5396
+ var ClientAuthenticationPolicy;
5397
+ (function (ClientAuthenticationPolicy) {
5398
+ ClientAuthenticationPolicy["Required"] = "Required";
5399
+ ClientAuthenticationPolicy["NotRequired"] = "NotRequired";
5400
+ ClientAuthenticationPolicy["NotRequiredWhenUsingPKCE"] = "NotRequiredWhenUsingPKCE";
5401
+ })(ClientAuthenticationPolicy = exports.ClientAuthenticationPolicy || (exports.ClientAuthenticationPolicy = {}));
5402
+ /**
5403
+ * The types of connectors. This enum is stored as an ordinal on the <code>identities</code> table, order must be maintained.
5404
+ *
5405
+ * @author Trevor Smith
5406
+ */
5407
+ var ConnectorType;
5408
+ (function (ConnectorType) {
5409
+ ConnectorType["FusionAuth"] = "FusionAuth";
5410
+ ConnectorType["Generic"] = "Generic";
5411
+ ConnectorType["LDAP"] = "LDAP";
5412
+ })(ConnectorType = exports.ConnectorType || (exports.ConnectorType = {}));
5413
+ /**
5414
+ * Models a consent.
5415
+ *
5416
+ * @author Daniel DeGroff
5417
+ */
5418
+ var ConsentStatus;
5419
+ (function (ConsentStatus) {
5420
+ ConsentStatus["Active"] = "Active";
5421
+ ConsentStatus["Revoked"] = "Revoked";
5422
+ })(ConsentStatus = exports.ConsentStatus || (exports.ConsentStatus = {}));
5282
5423
  /**
5283
5424
  * Status for content like usernames, profile attributes, etc.
5284
5425
  *
@@ -5290,20 +5431,6 @@ var ContentStatus;
5290
5431
  ContentStatus["PENDING"] = "PENDING";
5291
5432
  ContentStatus["REJECTED"] = "REJECTED";
5292
5433
  })(ContentStatus = exports.ContentStatus || (exports.ContentStatus = {}));
5293
- /**
5294
- * @author Matthew Altman
5295
- */
5296
- var LogoutBehavior;
5297
- (function (LogoutBehavior) {
5298
- LogoutBehavior["RedirectOnly"] = "RedirectOnly";
5299
- LogoutBehavior["AllApplications"] = "AllApplications";
5300
- })(LogoutBehavior = exports.LogoutBehavior || (exports.LogoutBehavior = {}));
5301
- var FamilyRole;
5302
- (function (FamilyRole) {
5303
- FamilyRole["Child"] = "Child";
5304
- FamilyRole["Teen"] = "Teen";
5305
- FamilyRole["Adult"] = "Adult";
5306
- })(FamilyRole = exports.FamilyRole || (exports.FamilyRole = {}));
5307
5434
  /**
5308
5435
  * A number identifying a cryptographic algorithm. Values should be registered with the <a
5309
5436
  * href="https://www.iana.org/assignments/cose/cose.xhtml#algorithms">IANA COSE Algorithms registry</a>
@@ -5323,46 +5450,168 @@ var CoseAlgorithmIdentifier;
5323
5450
  CoseAlgorithmIdentifier["PS512"] = "SHA-512";
5324
5451
  })(CoseAlgorithmIdentifier = exports.CoseAlgorithmIdentifier || (exports.CoseAlgorithmIdentifier = {}));
5325
5452
  /**
5326
- * @author Brian Pontarelli
5453
+ * COSE Elliptic Curve identifier to determine which elliptic curve to use with a given key
5454
+ *
5455
+ * @author Spencer Witt
5327
5456
  */
5328
- var ReactorFeatureStatus;
5329
- (function (ReactorFeatureStatus) {
5330
- ReactorFeatureStatus["ACTIVE"] = "ACTIVE";
5331
- ReactorFeatureStatus["DISCONNECTED"] = "DISCONNECTED";
5332
- ReactorFeatureStatus["PENDING"] = "PENDING";
5333
- ReactorFeatureStatus["DISABLED"] = "DISABLED";
5334
- ReactorFeatureStatus["UNKNOWN"] = "UNKNOWN";
5335
- })(ReactorFeatureStatus = exports.ReactorFeatureStatus || (exports.ReactorFeatureStatus = {}));
5457
+ var CoseEllipticCurve;
5458
+ (function (CoseEllipticCurve) {
5459
+ CoseEllipticCurve["Reserved"] = "Reserved";
5460
+ CoseEllipticCurve["P256"] = "P256";
5461
+ CoseEllipticCurve["P384"] = "P384";
5462
+ CoseEllipticCurve["P521"] = "P521";
5463
+ CoseEllipticCurve["X25519"] = "X25519";
5464
+ CoseEllipticCurve["X448"] = "X448";
5465
+ CoseEllipticCurve["Ed25519"] = "Ed25519";
5466
+ CoseEllipticCurve["Ed448"] = "Ed448";
5467
+ CoseEllipticCurve["Secp256k1"] = "Secp256k1";
5468
+ })(CoseEllipticCurve = exports.CoseEllipticCurve || (exports.CoseEllipticCurve = {}));
5336
5469
  /**
5470
+ * COSE key type
5471
+ *
5472
+ * @author Spencer Witt
5473
+ */
5474
+ var CoseKeyType;
5475
+ (function (CoseKeyType) {
5476
+ CoseKeyType["Reserved"] = "0";
5477
+ CoseKeyType["OKP"] = "1";
5478
+ CoseKeyType["EC2"] = "2";
5479
+ CoseKeyType["RSA"] = "3";
5480
+ CoseKeyType["Symmetric"] = "4";
5481
+ })(CoseKeyType = exports.CoseKeyType || (exports.CoseKeyType = {}));
5482
+ var DeviceType;
5483
+ (function (DeviceType) {
5484
+ DeviceType["BROWSER"] = "BROWSER";
5485
+ DeviceType["DESKTOP"] = "DESKTOP";
5486
+ DeviceType["LAPTOP"] = "LAPTOP";
5487
+ DeviceType["MOBILE"] = "MOBILE";
5488
+ DeviceType["OTHER"] = "OTHER";
5489
+ DeviceType["SERVER"] = "SERVER";
5490
+ DeviceType["TABLET"] = "TABLET";
5491
+ DeviceType["TV"] = "TV";
5492
+ DeviceType["UNKNOWN"] = "UNKNOWN";
5493
+ })(DeviceType = exports.DeviceType || (exports.DeviceType = {}));
5494
+ var EmailSecurityType;
5495
+ (function (EmailSecurityType) {
5496
+ EmailSecurityType["NONE"] = "NONE";
5497
+ EmailSecurityType["SSL"] = "SSL";
5498
+ EmailSecurityType["TLS"] = "TLS";
5499
+ })(EmailSecurityType = exports.EmailSecurityType || (exports.EmailSecurityType = {}));
5500
+ /**
5501
+ * Event Log Type
5502
+ *
5337
5503
  * @author Daniel DeGroff
5338
5504
  */
5339
- var UnverifiedBehavior;
5340
- (function (UnverifiedBehavior) {
5341
- UnverifiedBehavior["Allow"] = "Allow";
5342
- UnverifiedBehavior["Gated"] = "Gated";
5343
- })(UnverifiedBehavior = exports.UnverifiedBehavior || (exports.UnverifiedBehavior = {}));
5505
+ var EventLogType;
5506
+ (function (EventLogType) {
5507
+ EventLogType["Information"] = "Information";
5508
+ EventLogType["Debug"] = "Debug";
5509
+ EventLogType["Error"] = "Error";
5510
+ })(EventLogType = exports.EventLogType || (exports.EventLogType = {}));
5344
5511
  /**
5345
- * @author Brett Guy
5512
+ * Models the event types that FusionAuth produces.
5513
+ *
5514
+ * @author Brian Pontarelli
5346
5515
  */
5347
- var MessengerType;
5348
- (function (MessengerType) {
5349
- MessengerType["Generic"] = "Generic";
5350
- MessengerType["Kafka"] = "Kafka";
5351
- MessengerType["Twilio"] = "Twilio";
5352
- })(MessengerType = exports.MessengerType || (exports.MessengerType = {}));
5353
- var BreachAction;
5354
- (function (BreachAction) {
5355
- BreachAction["Off"] = "Off";
5356
- BreachAction["RecordOnly"] = "RecordOnly";
5357
- BreachAction["NotifyUser"] = "NotifyUser";
5358
- BreachAction["RequireChange"] = "RequireChange";
5359
- })(BreachAction = exports.BreachAction || (exports.BreachAction = {}));
5360
- var BreachMatchMode;
5361
- (function (BreachMatchMode) {
5362
- BreachMatchMode["Low"] = "Low";
5363
- BreachMatchMode["Medium"] = "Medium";
5364
- BreachMatchMode["High"] = "High";
5365
- })(BreachMatchMode = exports.BreachMatchMode || (exports.BreachMatchMode = {}));
5516
+ var EventType;
5517
+ (function (EventType) {
5518
+ EventType["JWTPublicKeyUpdate"] = "jwt.public-key.update";
5519
+ EventType["JWTRefreshTokenRevoke"] = "jwt.refresh-token.revoke";
5520
+ EventType["JWTRefresh"] = "jwt.refresh";
5521
+ EventType["AuditLogCreate"] = "audit-log.create";
5522
+ EventType["EventLogCreate"] = "event-log.create";
5523
+ EventType["KickstartSuccess"] = "kickstart.success";
5524
+ EventType["GroupCreate"] = "group.create";
5525
+ EventType["GroupCreateComplete"] = "group.create.complete";
5526
+ EventType["GroupDelete"] = "group.delete";
5527
+ EventType["GroupDeleteComplete"] = "group.delete.complete";
5528
+ EventType["GroupMemberAdd"] = "group.member.add";
5529
+ EventType["GroupMemberAddComplete"] = "group.member.add.complete";
5530
+ EventType["GroupMemberRemove"] = "group.member.remove";
5531
+ EventType["GroupMemberRemoveComplete"] = "group.member.remove.complete";
5532
+ EventType["GroupMemberUpdate"] = "group.member.update";
5533
+ EventType["GroupMemberUpdateComplete"] = "group.member.update.complete";
5534
+ EventType["GroupUpdate"] = "group.update";
5535
+ EventType["GroupUpdateComplete"] = "group.update.complete";
5536
+ EventType["UserAction"] = "user.action";
5537
+ EventType["UserBulkCreate"] = "user.bulk.create";
5538
+ EventType["UserCreate"] = "user.create";
5539
+ EventType["UserCreateComplete"] = "user.create.complete";
5540
+ EventType["UserDeactivate"] = "user.deactivate";
5541
+ EventType["UserDelete"] = "user.delete";
5542
+ EventType["UserDeleteComplete"] = "user.delete.complete";
5543
+ EventType["UserEmailUpdate"] = "user.email.update";
5544
+ EventType["UserEmailVerified"] = "user.email.verified";
5545
+ EventType["UserIdentityProviderLink"] = "user.identity-provider.link";
5546
+ EventType["UserIdentityProviderUnlink"] = "user.identity-provider.unlink";
5547
+ EventType["UserLoginIdDuplicateOnCreate"] = "user.loginId.duplicate.create";
5548
+ EventType["UserLoginIdDuplicateOnUpdate"] = "user.loginId.duplicate.update";
5549
+ EventType["UserLoginFailed"] = "user.login.failed";
5550
+ EventType["UserLoginNewDevice"] = "user.login.new-device";
5551
+ EventType["UserLoginSuccess"] = "user.login.success";
5552
+ EventType["UserLoginSuspicious"] = "user.login.suspicious";
5553
+ EventType["UserPasswordBreach"] = "user.password.breach";
5554
+ EventType["UserPasswordResetSend"] = "user.password.reset.send";
5555
+ EventType["UserPasswordResetStart"] = "user.password.reset.start";
5556
+ EventType["UserPasswordResetSuccess"] = "user.password.reset.success";
5557
+ EventType["UserPasswordUpdate"] = "user.password.update";
5558
+ EventType["UserReactivate"] = "user.reactivate";
5559
+ EventType["UserRegistrationCreate"] = "user.registration.create";
5560
+ EventType["UserRegistrationCreateComplete"] = "user.registration.create.complete";
5561
+ EventType["UserRegistrationDelete"] = "user.registration.delete";
5562
+ EventType["UserRegistrationDeleteComplete"] = "user.registration.delete.complete";
5563
+ EventType["UserRegistrationUpdate"] = "user.registration.update";
5564
+ EventType["UserRegistrationUpdateComplete"] = "user.registration.update.complete";
5565
+ EventType["UserRegistrationVerified"] = "user.registration.verified";
5566
+ EventType["UserTwoFactorMethodAdd"] = "user.two-factor.method.add";
5567
+ EventType["UserTwoFactorMethodRemove"] = "user.two-factor.method.remove";
5568
+ EventType["UserUpdate"] = "user.update";
5569
+ EventType["UserUpdateComplete"] = "user.update.complete";
5570
+ EventType["Test"] = "test";
5571
+ })(EventType = exports.EventType || (exports.EventType = {}));
5572
+ /**
5573
+ * @author Brian Pontarelli
5574
+ */
5575
+ var ExpiryUnit;
5576
+ (function (ExpiryUnit) {
5577
+ ExpiryUnit["MINUTES"] = "MINUTES";
5578
+ ExpiryUnit["HOURS"] = "HOURS";
5579
+ ExpiryUnit["DAYS"] = "DAYS";
5580
+ ExpiryUnit["WEEKS"] = "WEEKS";
5581
+ ExpiryUnit["MONTHS"] = "MONTHS";
5582
+ ExpiryUnit["YEARS"] = "YEARS";
5583
+ })(ExpiryUnit = exports.ExpiryUnit || (exports.ExpiryUnit = {}));
5584
+ var FamilyRole;
5585
+ (function (FamilyRole) {
5586
+ FamilyRole["Child"] = "Child";
5587
+ FamilyRole["Teen"] = "Teen";
5588
+ FamilyRole["Adult"] = "Adult";
5589
+ })(FamilyRole = exports.FamilyRole || (exports.FamilyRole = {}));
5590
+ /**
5591
+ * @author Daniel DeGroff
5592
+ */
5593
+ var FormControl;
5594
+ (function (FormControl) {
5595
+ FormControl["checkbox"] = "checkbox";
5596
+ FormControl["number"] = "number";
5597
+ FormControl["password"] = "password";
5598
+ FormControl["radio"] = "radio";
5599
+ FormControl["select"] = "select";
5600
+ FormControl["textarea"] = "textarea";
5601
+ FormControl["text"] = "text";
5602
+ })(FormControl = exports.FormControl || (exports.FormControl = {}));
5603
+ /**
5604
+ * @author Daniel DeGroff
5605
+ */
5606
+ var FormDataType;
5607
+ (function (FormDataType) {
5608
+ FormDataType["bool"] = "bool";
5609
+ FormDataType["consent"] = "consent";
5610
+ FormDataType["date"] = "date";
5611
+ FormDataType["email"] = "email";
5612
+ FormDataType["number"] = "number";
5613
+ FormDataType["string"] = "string";
5614
+ })(FormDataType = exports.FormDataType || (exports.FormDataType = {}));
5366
5615
  /**
5367
5616
  * @author Daniel DeGroff
5368
5617
  */
@@ -5372,51 +5621,34 @@ var FormFieldAdminPolicy;
5372
5621
  FormFieldAdminPolicy["View"] = "View";
5373
5622
  })(FormFieldAdminPolicy = exports.FormFieldAdminPolicy || (exports.FormFieldAdminPolicy = {}));
5374
5623
  /**
5375
- * Used to communicate whether and how authenticator attestation should be delivered to the Relying Party
5376
- *
5377
- * @author Spencer Witt
5378
- */
5379
- var AttestationConveyancePreference;
5380
- (function (AttestationConveyancePreference) {
5381
- AttestationConveyancePreference["none"] = "none";
5382
- AttestationConveyancePreference["indirect"] = "indirect";
5383
- AttestationConveyancePreference["direct"] = "direct";
5384
- AttestationConveyancePreference["enterprise"] = "enterprise";
5385
- })(AttestationConveyancePreference = exports.AttestationConveyancePreference || (exports.AttestationConveyancePreference = {}));
5386
- /**
5387
- * The possible result states of a webhook event. This tracks the success of the overall webhook transaction according to the {@link TransactionType}
5388
- * and configured webhooks.
5389
- *
5390
- * @author Spencer Witt
5391
- */
5392
- var WebhookEventResult;
5393
- (function (WebhookEventResult) {
5394
- WebhookEventResult["Failed"] = "Failed";
5395
- WebhookEventResult["Running"] = "Running";
5396
- WebhookEventResult["Succeeded"] = "Succeeded";
5397
- })(WebhookEventResult = exports.WebhookEventResult || (exports.WebhookEventResult = {}));
5398
- /**
5399
- * Identifies the WebAuthn workflow. This will affect the parameters used for credential creation
5400
- * and request based on the Tenant configuration.
5401
- *
5402
- * @author Spencer Witt
5624
+ * @author Daniel DeGroff
5403
5625
  */
5404
- var WebAuthnWorkflow;
5405
- (function (WebAuthnWorkflow) {
5406
- WebAuthnWorkflow["bootstrap"] = "bootstrap";
5407
- WebAuthnWorkflow["general"] = "general";
5408
- WebAuthnWorkflow["reauthentication"] = "reauthentication";
5409
- })(WebAuthnWorkflow = exports.WebAuthnWorkflow || (exports.WebAuthnWorkflow = {}));
5626
+ var FormType;
5627
+ (function (FormType) {
5628
+ FormType["registration"] = "registration";
5629
+ FormType["adminRegistration"] = "adminRegistration";
5630
+ FormType["adminUser"] = "adminUser";
5631
+ FormType["selfServiceUser"] = "selfServiceUser";
5632
+ })(FormType = exports.FormType || (exports.FormType = {}));
5410
5633
  /**
5411
- * Models a consent.
5634
+ * Authorization Grant types as defined by the <a href="https://tools.ietf.org/html/rfc6749">The OAuth 2.0 Authorization
5635
+ * Framework - RFC 6749</a>.
5636
+ * <p>
5637
+ * Specific names as defined by <a href="https://tools.ietf.org/html/rfc7591#section-4.1">
5638
+ * OAuth 2.0 Dynamic Client Registration Protocol - RFC 7591 Section 4.1</a>
5412
5639
  *
5413
5640
  * @author Daniel DeGroff
5414
5641
  */
5415
- var ConsentStatus;
5416
- (function (ConsentStatus) {
5417
- ConsentStatus["Active"] = "Active";
5418
- ConsentStatus["Revoked"] = "Revoked";
5419
- })(ConsentStatus = exports.ConsentStatus || (exports.ConsentStatus = {}));
5642
+ var GrantType;
5643
+ (function (GrantType) {
5644
+ GrantType["authorization_code"] = "authorization_code";
5645
+ GrantType["implicit"] = "implicit";
5646
+ GrantType["password"] = "password";
5647
+ GrantType["client_credentials"] = "client_credentials";
5648
+ GrantType["refresh_token"] = "refresh_token";
5649
+ GrantType["unknown"] = "unknown";
5650
+ GrantType["device_code"] = "urn:ietf:params:oauth:grant-type:device_code";
5651
+ })(GrantType = exports.GrantType || (exports.GrantType = {}));
5420
5652
  /**
5421
5653
  * @author Daniel DeGroff
5422
5654
  */
@@ -5431,143 +5663,151 @@ var HTTPMethod;
5431
5663
  HTTPMethod["PATCH"] = "PATCH";
5432
5664
  })(HTTPMethod = exports.HTTPMethod || (exports.HTTPMethod = {}));
5433
5665
  /**
5434
- * @author Daniel DeGroff
5435
- */
5436
- var UserState;
5437
- (function (UserState) {
5438
- UserState["Authenticated"] = "Authenticated";
5439
- UserState["AuthenticatedNotRegistered"] = "AuthenticatedNotRegistered";
5440
- UserState["AuthenticatedNotVerified"] = "AuthenticatedNotVerified";
5441
- UserState["AuthenticatedRegistrationNotVerified"] = "AuthenticatedRegistrationNotVerified";
5442
- })(UserState = exports.UserState || (exports.UserState = {}));
5443
- /**
5444
- * @author Daniel DeGroff
5666
+ * @author Brett Guy
5445
5667
  */
5446
- var RefreshTokenExpirationPolicy;
5447
- (function (RefreshTokenExpirationPolicy) {
5448
- RefreshTokenExpirationPolicy["Fixed"] = "Fixed";
5449
- RefreshTokenExpirationPolicy["SlidingWindow"] = "SlidingWindow";
5450
- RefreshTokenExpirationPolicy["SlidingWindowWithMaximumLifetime"] = "SlidingWindowWithMaximumLifetime";
5451
- })(RefreshTokenExpirationPolicy = exports.RefreshTokenExpirationPolicy || (exports.RefreshTokenExpirationPolicy = {}));
5668
+ var IPAccessControlEntryAction;
5669
+ (function (IPAccessControlEntryAction) {
5670
+ IPAccessControlEntryAction["Allow"] = "Allow";
5671
+ IPAccessControlEntryAction["Block"] = "Block";
5672
+ })(IPAccessControlEntryAction = exports.IPAccessControlEntryAction || (exports.IPAccessControlEntryAction = {}));
5452
5673
  /**
5453
- * The use type of a key.
5674
+ * The IdP behavior when no user link has been made yet.
5454
5675
  *
5455
5676
  * @author Daniel DeGroff
5456
5677
  */
5457
- var KeyUse;
5458
- (function (KeyUse) {
5459
- KeyUse["SignOnly"] = "SignOnly";
5460
- KeyUse["SignAndVerify"] = "SignAndVerify";
5461
- KeyUse["VerifyOnly"] = "VerifyOnly";
5462
- })(KeyUse = exports.KeyUse || (exports.KeyUse = {}));
5678
+ var IdentityProviderLinkingStrategy;
5679
+ (function (IdentityProviderLinkingStrategy) {
5680
+ IdentityProviderLinkingStrategy["CreatePendingLink"] = "CreatePendingLink";
5681
+ IdentityProviderLinkingStrategy["Disabled"] = "Disabled";
5682
+ IdentityProviderLinkingStrategy["LinkAnonymously"] = "LinkAnonymously";
5683
+ IdentityProviderLinkingStrategy["LinkByEmail"] = "LinkByEmail";
5684
+ IdentityProviderLinkingStrategy["LinkByEmailForExistingUser"] = "LinkByEmailForExistingUser";
5685
+ IdentityProviderLinkingStrategy["LinkByUsername"] = "LinkByUsername";
5686
+ IdentityProviderLinkingStrategy["LinkByUsernameForExistingUser"] = "LinkByUsernameForExistingUser";
5687
+ IdentityProviderLinkingStrategy["Unsupported"] = "Unsupported";
5688
+ })(IdentityProviderLinkingStrategy = exports.IdentityProviderLinkingStrategy || (exports.IdentityProviderLinkingStrategy = {}));
5463
5689
  /**
5464
- * @author Daniel DeGroff
5690
+ * @author Brett Pontarelli
5465
5691
  */
5466
- var BreachedPasswordStatus;
5467
- (function (BreachedPasswordStatus) {
5468
- BreachedPasswordStatus["None"] = "None";
5469
- BreachedPasswordStatus["ExactMatch"] = "ExactMatch";
5470
- BreachedPasswordStatus["SubAddressMatch"] = "SubAddressMatch";
5471
- BreachedPasswordStatus["PasswordOnly"] = "PasswordOnly";
5472
- BreachedPasswordStatus["CommonPassword"] = "CommonPassword";
5473
- })(BreachedPasswordStatus = exports.BreachedPasswordStatus || (exports.BreachedPasswordStatus = {}));
5692
+ var IdentityProviderLoginMethod;
5693
+ (function (IdentityProviderLoginMethod) {
5694
+ IdentityProviderLoginMethod["UsePopup"] = "UsePopup";
5695
+ IdentityProviderLoginMethod["UseRedirect"] = "UseRedirect";
5696
+ IdentityProviderLoginMethod["UseVendorJavaScript"] = "UseVendorJavaScript";
5697
+ })(IdentityProviderLoginMethod = exports.IdentityProviderLoginMethod || (exports.IdentityProviderLoginMethod = {}));
5698
+ var ClientAuthenticationMethod;
5699
+ (function (ClientAuthenticationMethod) {
5700
+ ClientAuthenticationMethod["none"] = "none";
5701
+ ClientAuthenticationMethod["client_secret_basic"] = "client_secret_basic";
5702
+ ClientAuthenticationMethod["client_secret_post"] = "client_secret_post";
5703
+ })(ClientAuthenticationMethod = exports.ClientAuthenticationMethod || (exports.ClientAuthenticationMethod = {}));
5474
5704
  /**
5475
5705
  * @author Daniel DeGroff
5476
5706
  */
5477
- var FormControl;
5478
- (function (FormControl) {
5479
- FormControl["checkbox"] = "checkbox";
5480
- FormControl["number"] = "number";
5481
- FormControl["password"] = "password";
5482
- FormControl["radio"] = "radio";
5483
- FormControl["select"] = "select";
5484
- FormControl["textarea"] = "textarea";
5485
- FormControl["text"] = "text";
5486
- })(FormControl = exports.FormControl || (exports.FormControl = {}));
5487
- /**
5488
- * Controls the policy for whether OAuth workflows will more strictly adhere to the OAuth and OIDC specification
5489
- * or run in backwards compatibility mode.
5490
- *
5491
- * @author David Charles
5492
- */
5493
- var OAuthScopeHandlingPolicy;
5494
- (function (OAuthScopeHandlingPolicy) {
5495
- OAuthScopeHandlingPolicy["Compatibility"] = "Compatibility";
5496
- OAuthScopeHandlingPolicy["Strict"] = "Strict";
5497
- })(OAuthScopeHandlingPolicy = exports.OAuthScopeHandlingPolicy || (exports.OAuthScopeHandlingPolicy = {}));
5707
+ var IdentityProviderType;
5708
+ (function (IdentityProviderType) {
5709
+ IdentityProviderType["Apple"] = "Apple";
5710
+ IdentityProviderType["EpicGames"] = "EpicGames";
5711
+ IdentityProviderType["ExternalJWT"] = "ExternalJWT";
5712
+ IdentityProviderType["Facebook"] = "Facebook";
5713
+ IdentityProviderType["Google"] = "Google";
5714
+ IdentityProviderType["HYPR"] = "HYPR";
5715
+ IdentityProviderType["LinkedIn"] = "LinkedIn";
5716
+ IdentityProviderType["Nintendo"] = "Nintendo";
5717
+ IdentityProviderType["OpenIDConnect"] = "OpenIDConnect";
5718
+ IdentityProviderType["SAMLv2"] = "SAMLv2";
5719
+ IdentityProviderType["SAMLv2IdPInitiated"] = "SAMLv2IdPInitiated";
5720
+ IdentityProviderType["SonyPSN"] = "SonyPSN";
5721
+ IdentityProviderType["Steam"] = "Steam";
5722
+ IdentityProviderType["Twitch"] = "Twitch";
5723
+ IdentityProviderType["Twitter"] = "Twitter";
5724
+ IdentityProviderType["Xbox"] = "Xbox";
5725
+ })(IdentityProviderType = exports.IdentityProviderType || (exports.IdentityProviderType = {}));
5726
+ var KeyAlgorithm;
5727
+ (function (KeyAlgorithm) {
5728
+ KeyAlgorithm["ES256"] = "ES256";
5729
+ KeyAlgorithm["ES384"] = "ES384";
5730
+ KeyAlgorithm["ES512"] = "ES512";
5731
+ KeyAlgorithm["HS256"] = "HS256";
5732
+ KeyAlgorithm["HS384"] = "HS384";
5733
+ KeyAlgorithm["HS512"] = "HS512";
5734
+ KeyAlgorithm["RS256"] = "RS256";
5735
+ KeyAlgorithm["RS384"] = "RS384";
5736
+ KeyAlgorithm["RS512"] = "RS512";
5737
+ })(KeyAlgorithm = exports.KeyAlgorithm || (exports.KeyAlgorithm = {}));
5738
+ var KeyType;
5739
+ (function (KeyType) {
5740
+ KeyType["EC"] = "EC";
5741
+ KeyType["RSA"] = "RSA";
5742
+ KeyType["HMAC"] = "HMAC";
5743
+ })(KeyType = exports.KeyType || (exports.KeyType = {}));
5498
5744
  /**
5499
- * The possible states of an individual webhook attempt to a single endpoint.
5745
+ * The use type of a key.
5500
5746
  *
5501
- * @author Spencer Witt
5747
+ * @author Daniel DeGroff
5502
5748
  */
5503
- var WebhookAttemptResult;
5504
- (function (WebhookAttemptResult) {
5505
- WebhookAttemptResult["Success"] = "Success";
5506
- WebhookAttemptResult["Failure"] = "Failure";
5507
- WebhookAttemptResult["Unknown"] = "Unknown";
5508
- })(WebhookAttemptResult = exports.WebhookAttemptResult || (exports.WebhookAttemptResult = {}));
5749
+ var KeyUse;
5750
+ (function (KeyUse) {
5751
+ KeyUse["SignOnly"] = "SignOnly";
5752
+ KeyUse["SignAndVerify"] = "SignAndVerify";
5753
+ KeyUse["VerifyOnly"] = "VerifyOnly";
5754
+ })(KeyUse = exports.KeyUse || (exports.KeyUse = {}));
5755
+ var LDAPSecurityMethod;
5756
+ (function (LDAPSecurityMethod) {
5757
+ LDAPSecurityMethod["None"] = "None";
5758
+ LDAPSecurityMethod["LDAPS"] = "LDAPS";
5759
+ LDAPSecurityMethod["StartTLS"] = "StartTLS";
5760
+ })(LDAPSecurityMethod = exports.LDAPSecurityMethod || (exports.LDAPSecurityMethod = {}));
5509
5761
  /**
5510
- * Event Log Type
5511
- *
5512
5762
  * @author Daniel DeGroff
5513
5763
  */
5514
- var EventLogType;
5515
- (function (EventLogType) {
5516
- EventLogType["Information"] = "Information";
5517
- EventLogType["Debug"] = "Debug";
5518
- EventLogType["Error"] = "Error";
5519
- })(EventLogType = exports.EventLogType || (exports.EventLogType = {}));
5764
+ var LambdaEngineType;
5765
+ (function (LambdaEngineType) {
5766
+ LambdaEngineType["GraalJS"] = "GraalJS";
5767
+ LambdaEngineType["Nashorn"] = "Nashorn";
5768
+ })(LambdaEngineType = exports.LambdaEngineType || (exports.LambdaEngineType = {}));
5520
5769
  /**
5521
- * The transaction types for Webhooks and other event systems within FusionAuth.
5770
+ * The types of lambdas that indicate how they are invoked by FusionAuth.
5522
5771
  *
5523
5772
  * @author Brian Pontarelli
5524
5773
  */
5525
- var TransactionType;
5526
- (function (TransactionType) {
5527
- TransactionType["None"] = "None";
5528
- TransactionType["Any"] = "Any";
5529
- TransactionType["SimpleMajority"] = "SimpleMajority";
5530
- TransactionType["SuperMajority"] = "SuperMajority";
5531
- TransactionType["AbsoluteMajority"] = "AbsoluteMajority";
5532
- })(TransactionType = exports.TransactionType || (exports.TransactionType = {}));
5533
- /**
5534
- * COSE key type
5535
- *
5536
- * @author Spencer Witt
5537
- */
5538
- var CoseKeyType;
5539
- (function (CoseKeyType) {
5540
- CoseKeyType["Reserved"] = "0";
5541
- CoseKeyType["OKP"] = "1";
5542
- CoseKeyType["EC2"] = "2";
5543
- CoseKeyType["RSA"] = "3";
5544
- CoseKeyType["Symmetric"] = "4";
5545
- })(CoseKeyType = exports.CoseKeyType || (exports.CoseKeyType = {}));
5546
- var ThemeType;
5547
- (function (ThemeType) {
5548
- ThemeType["advanced"] = "advanced";
5549
- ThemeType["simple"] = "simple";
5550
- })(ThemeType = exports.ThemeType || (exports.ThemeType = {}));
5551
- /**
5552
- * The types of connectors. This enum is stored as an ordinal on the <code>identities</code> table, order must be maintained.
5553
- *
5554
- * @author Trevor Smith
5555
- */
5556
- var ConnectorType;
5557
- (function (ConnectorType) {
5558
- ConnectorType["FusionAuth"] = "FusionAuth";
5559
- ConnectorType["Generic"] = "Generic";
5560
- ConnectorType["LDAP"] = "LDAP";
5561
- })(ConnectorType = exports.ConnectorType || (exports.ConnectorType = {}));
5774
+ var LambdaType;
5775
+ (function (LambdaType) {
5776
+ LambdaType["JWTPopulate"] = "JWTPopulate";
5777
+ LambdaType["OpenIDReconcile"] = "OpenIDReconcile";
5778
+ LambdaType["SAMLv2Reconcile"] = "SAMLv2Reconcile";
5779
+ LambdaType["SAMLv2Populate"] = "SAMLv2Populate";
5780
+ LambdaType["AppleReconcile"] = "AppleReconcile";
5781
+ LambdaType["ExternalJWTReconcile"] = "ExternalJWTReconcile";
5782
+ LambdaType["FacebookReconcile"] = "FacebookReconcile";
5783
+ LambdaType["GoogleReconcile"] = "GoogleReconcile";
5784
+ LambdaType["HYPRReconcile"] = "HYPRReconcile";
5785
+ LambdaType["TwitterReconcile"] = "TwitterReconcile";
5786
+ LambdaType["LDAPConnectorReconcile"] = "LDAPConnectorReconcile";
5787
+ LambdaType["LinkedInReconcile"] = "LinkedInReconcile";
5788
+ LambdaType["EpicGamesReconcile"] = "EpicGamesReconcile";
5789
+ LambdaType["NintendoReconcile"] = "NintendoReconcile";
5790
+ LambdaType["SonyPSNReconcile"] = "SonyPSNReconcile";
5791
+ LambdaType["SteamReconcile"] = "SteamReconcile";
5792
+ LambdaType["TwitchReconcile"] = "TwitchReconcile";
5793
+ LambdaType["XboxReconcile"] = "XboxReconcile";
5794
+ LambdaType["ClientCredentialsJWTPopulate"] = "ClientCredentialsJWTPopulate";
5795
+ LambdaType["SCIMServerGroupRequestConverter"] = "SCIMServerGroupRequestConverter";
5796
+ LambdaType["SCIMServerGroupResponseConverter"] = "SCIMServerGroupResponseConverter";
5797
+ LambdaType["SCIMServerUserRequestConverter"] = "SCIMServerUserRequestConverter";
5798
+ LambdaType["SCIMServerUserResponseConverter"] = "SCIMServerUserResponseConverter";
5799
+ LambdaType["SelfServiceRegistrationValidation"] = "SelfServiceRegistrationValidation";
5800
+ LambdaType["UserInfoPopulate"] = "UserInfoPopulate";
5801
+ LambdaType["LoginValidation"] = "LoginValidation";
5802
+ })(LambdaType = exports.LambdaType || (exports.LambdaType = {}));
5562
5803
  /**
5563
- * @author Brett Guy
5804
+ * @author Matthew Altman
5564
5805
  */
5565
- var ProofKeyForCodeExchangePolicy;
5566
- (function (ProofKeyForCodeExchangePolicy) {
5567
- ProofKeyForCodeExchangePolicy["Required"] = "Required";
5568
- ProofKeyForCodeExchangePolicy["NotRequired"] = "NotRequired";
5569
- ProofKeyForCodeExchangePolicy["NotRequiredWhenUsingClientAuthentication"] = "NotRequiredWhenUsingClientAuthentication";
5570
- })(ProofKeyForCodeExchangePolicy = exports.ProofKeyForCodeExchangePolicy || (exports.ProofKeyForCodeExchangePolicy = {}));
5806
+ var LogoutBehavior;
5807
+ (function (LogoutBehavior) {
5808
+ LogoutBehavior["RedirectOnly"] = "RedirectOnly";
5809
+ LogoutBehavior["AllApplications"] = "AllApplications";
5810
+ })(LogoutBehavior = exports.LogoutBehavior || (exports.LogoutBehavior = {}));
5571
5811
  /**
5572
5812
  * @author Mikey Sleevi
5573
5813
  */
@@ -5576,77 +5816,34 @@ var MessageType;
5576
5816
  MessageType["SMS"] = "SMS";
5577
5817
  })(MessageType = exports.MessageType || (exports.MessageType = {}));
5578
5818
  /**
5579
- * Describes the Relying Party's requirements for <a href="https://www.w3.org/TR/webauthn-2/#client-side-discoverable-credential">client-side
5580
- * discoverable credentials</a> (formerly known as "resident keys")
5581
- *
5582
- * @author Spencer Witt
5583
- */
5584
- var ResidentKeyRequirement;
5585
- (function (ResidentKeyRequirement) {
5586
- ResidentKeyRequirement["discouraged"] = "discouraged";
5587
- ResidentKeyRequirement["preferred"] = "preferred";
5588
- ResidentKeyRequirement["required"] = "required";
5589
- })(ResidentKeyRequirement = exports.ResidentKeyRequirement || (exports.ResidentKeyRequirement = {}));
5590
- /**
5591
- * @author Trevor Smith
5819
+ * @author Brett Guy
5592
5820
  */
5593
- var ChangePasswordReason;
5594
- (function (ChangePasswordReason) {
5595
- ChangePasswordReason["Administrative"] = "Administrative";
5596
- ChangePasswordReason["Breached"] = "Breached";
5597
- ChangePasswordReason["Expired"] = "Expired";
5598
- ChangePasswordReason["Validation"] = "Validation";
5599
- })(ChangePasswordReason = exports.ChangePasswordReason || (exports.ChangePasswordReason = {}));
5600
- var LDAPSecurityMethod;
5601
- (function (LDAPSecurityMethod) {
5602
- LDAPSecurityMethod["None"] = "None";
5603
- LDAPSecurityMethod["LDAPS"] = "LDAPS";
5604
- LDAPSecurityMethod["StartTLS"] = "StartTLS";
5605
- })(LDAPSecurityMethod = exports.LDAPSecurityMethod || (exports.LDAPSecurityMethod = {}));
5821
+ var MessengerType;
5822
+ (function (MessengerType) {
5823
+ MessengerType["Generic"] = "Generic";
5824
+ MessengerType["Kafka"] = "Kafka";
5825
+ MessengerType["Twilio"] = "Twilio";
5826
+ })(MessengerType = exports.MessengerType || (exports.MessengerType = {}));
5606
5827
  /**
5607
- * @author Johnathon Wood
5828
+ * @author Daniel DeGroff
5608
5829
  */
5609
- var Oauth2AuthorizedURLValidationPolicy;
5610
- (function (Oauth2AuthorizedURLValidationPolicy) {
5611
- Oauth2AuthorizedURLValidationPolicy["AllowWildcards"] = "AllowWildcards";
5612
- Oauth2AuthorizedURLValidationPolicy["ExactMatch"] = "ExactMatch";
5613
- })(Oauth2AuthorizedURLValidationPolicy = exports.Oauth2AuthorizedURLValidationPolicy || (exports.Oauth2AuthorizedURLValidationPolicy = {}));
5830
+ var MultiFactorLoginPolicy;
5831
+ (function (MultiFactorLoginPolicy) {
5832
+ MultiFactorLoginPolicy["Disabled"] = "Disabled";
5833
+ MultiFactorLoginPolicy["Enabled"] = "Enabled";
5834
+ MultiFactorLoginPolicy["Required"] = "Required";
5835
+ })(MultiFactorLoginPolicy = exports.MultiFactorLoginPolicy || (exports.MultiFactorLoginPolicy = {}));
5614
5836
  /**
5615
- * Describes the <a href="https://www.w3.org/TR/webauthn-2/#authenticator-attachment-modality">authenticator attachment modality</a>.
5837
+ * The application's relationship to the authorization server. First-party applications will be granted implicit permission for requested scopes.
5838
+ * Third-party applications will use the {@link OAuthScopeConsentMode} policy.
5616
5839
  *
5617
5840
  * @author Spencer Witt
5618
5841
  */
5619
- var AuthenticatorAttachment;
5620
- (function (AuthenticatorAttachment) {
5621
- AuthenticatorAttachment["platform"] = "platform";
5622
- AuthenticatorAttachment["crossPlatform"] = "crossPlatform";
5623
- })(AuthenticatorAttachment = exports.AuthenticatorAttachment || (exports.AuthenticatorAttachment = {}));
5624
- /**
5625
- * @author Brett Pontarelli
5626
- */
5627
- var IdentityProviderLoginMethod;
5628
- (function (IdentityProviderLoginMethod) {
5629
- IdentityProviderLoginMethod["UsePopup"] = "UsePopup";
5630
- IdentityProviderLoginMethod["UseRedirect"] = "UseRedirect";
5631
- IdentityProviderLoginMethod["UseVendorJavaScript"] = "UseVendorJavaScript";
5632
- })(IdentityProviderLoginMethod = exports.IdentityProviderLoginMethod || (exports.IdentityProviderLoginMethod = {}));
5633
- /**
5634
- * @author Daniel DeGroff
5635
- */
5636
- var RefreshTokenUsagePolicy;
5637
- (function (RefreshTokenUsagePolicy) {
5638
- RefreshTokenUsagePolicy["Reusable"] = "Reusable";
5639
- RefreshTokenUsagePolicy["OneTimeUse"] = "OneTimeUse";
5640
- })(RefreshTokenUsagePolicy = exports.RefreshTokenUsagePolicy || (exports.RefreshTokenUsagePolicy = {}));
5641
- /**
5642
- * @author Lyle Schemmerling
5643
- */
5644
- var SAMLv2DestinationAssertionPolicy;
5645
- (function (SAMLv2DestinationAssertionPolicy) {
5646
- SAMLv2DestinationAssertionPolicy["Enabled"] = "Enabled";
5647
- SAMLv2DestinationAssertionPolicy["Disabled"] = "Disabled";
5648
- SAMLv2DestinationAssertionPolicy["AllowAlternates"] = "AllowAlternates";
5649
- })(SAMLv2DestinationAssertionPolicy = exports.SAMLv2DestinationAssertionPolicy || (exports.SAMLv2DestinationAssertionPolicy = {}));
5842
+ var OAuthApplicationRelationship;
5843
+ (function (OAuthApplicationRelationship) {
5844
+ OAuthApplicationRelationship["FirstParty"] = "FirstParty";
5845
+ OAuthApplicationRelationship["ThirdParty"] = "ThirdParty";
5846
+ })(OAuthApplicationRelationship = exports.OAuthApplicationRelationship || (exports.OAuthApplicationRelationship = {}));
5650
5847
  var OAuthErrorReason;
5651
5848
  (function (OAuthErrorReason) {
5652
5849
  OAuthErrorReason["auth_code_not_found"] = "auth_code_not_found";
@@ -5677,6 +5874,7 @@ var OAuthErrorReason;
5677
5874
  OAuthErrorReason["invalid_target_entity_scope"] = "invalid_target_entity_scope";
5678
5875
  OAuthErrorReason["invalid_entity_permission_scope"] = "invalid_entity_permission_scope";
5679
5876
  OAuthErrorReason["invalid_user_id"] = "invalid_user_id";
5877
+ OAuthErrorReason["invalid_tenant_id"] = "invalid_tenant_id";
5680
5878
  OAuthErrorReason["grant_type_disabled"] = "grant_type_disabled";
5681
5879
  OAuthErrorReason["missing_client_id"] = "missing_client_id";
5682
5880
  OAuthErrorReason["missing_client_secret"] = "missing_client_secret";
@@ -5692,6 +5890,7 @@ var OAuthErrorReason;
5692
5890
  OAuthErrorReason["missing_user_code"] = "missing_user_code";
5693
5891
  OAuthErrorReason["missing_user_id"] = "missing_user_id";
5694
5892
  OAuthErrorReason["missing_verification_uri"] = "missing_verification_uri";
5893
+ OAuthErrorReason["missing_tenant_id"] = "missing_tenant_id";
5695
5894
  OAuthErrorReason["login_prevented"] = "login_prevented";
5696
5895
  OAuthErrorReason["not_licensed"] = "not_licensed";
5697
5896
  OAuthErrorReason["user_code_expired"] = "user_code_expired";
@@ -5710,270 +5909,88 @@ var OAuthErrorReason;
5710
5909
  OAuthErrorReason["missing_required_scope"] = "missing_required_scope";
5711
5910
  OAuthErrorReason["unknown_scope"] = "unknown_scope";
5712
5911
  OAuthErrorReason["consent_canceled"] = "consent_canceled";
5713
- })(OAuthErrorReason = exports.OAuthErrorReason || (exports.OAuthErrorReason = {}));
5714
- var OAuthErrorType;
5715
- (function (OAuthErrorType) {
5716
- OAuthErrorType["invalid_request"] = "invalid_request";
5717
- OAuthErrorType["invalid_client"] = "invalid_client";
5718
- OAuthErrorType["invalid_grant"] = "invalid_grant";
5719
- OAuthErrorType["invalid_token"] = "invalid_token";
5720
- OAuthErrorType["unauthorized_client"] = "unauthorized_client";
5721
- OAuthErrorType["invalid_scope"] = "invalid_scope";
5722
- OAuthErrorType["server_error"] = "server_error";
5723
- OAuthErrorType["unsupported_grant_type"] = "unsupported_grant_type";
5724
- OAuthErrorType["unsupported_response_type"] = "unsupported_response_type";
5725
- OAuthErrorType["access_denied"] = "access_denied";
5726
- OAuthErrorType["change_password_required"] = "change_password_required";
5727
- OAuthErrorType["not_licensed"] = "not_licensed";
5728
- OAuthErrorType["two_factor_required"] = "two_factor_required";
5729
- OAuthErrorType["authorization_pending"] = "authorization_pending";
5730
- OAuthErrorType["expired_token"] = "expired_token";
5731
- OAuthErrorType["unsupported_token_type"] = "unsupported_token_type";
5732
- })(OAuthErrorType = exports.OAuthErrorType || (exports.OAuthErrorType = {}));
5733
- var DeviceType;
5734
- (function (DeviceType) {
5735
- DeviceType["BROWSER"] = "BROWSER";
5736
- DeviceType["DESKTOP"] = "DESKTOP";
5737
- DeviceType["LAPTOP"] = "LAPTOP";
5738
- DeviceType["MOBILE"] = "MOBILE";
5739
- DeviceType["OTHER"] = "OTHER";
5740
- DeviceType["SERVER"] = "SERVER";
5741
- DeviceType["TABLET"] = "TABLET";
5742
- DeviceType["TV"] = "TV";
5743
- DeviceType["UNKNOWN"] = "UNKNOWN";
5744
- })(DeviceType = exports.DeviceType || (exports.DeviceType = {}));
5745
- /**
5746
- * @author Daniel DeGroff
5747
- */
5748
- var ApplicationMultiFactorTrustPolicy;
5749
- (function (ApplicationMultiFactorTrustPolicy) {
5750
- ApplicationMultiFactorTrustPolicy["Any"] = "Any";
5751
- ApplicationMultiFactorTrustPolicy["This"] = "This";
5752
- ApplicationMultiFactorTrustPolicy["None"] = "None";
5753
- })(ApplicationMultiFactorTrustPolicy = exports.ApplicationMultiFactorTrustPolicy || (exports.ApplicationMultiFactorTrustPolicy = {}));
5754
- /**
5755
- * @author Daniel DeGroff
5756
- */
5757
- var RateLimitedRequestType;
5758
- (function (RateLimitedRequestType) {
5759
- RateLimitedRequestType["FailedLogin"] = "FailedLogin";
5760
- RateLimitedRequestType["ForgotPassword"] = "ForgotPassword";
5761
- RateLimitedRequestType["SendEmailVerification"] = "SendEmailVerification";
5762
- RateLimitedRequestType["SendPasswordless"] = "SendPasswordless";
5763
- RateLimitedRequestType["SendRegistrationVerification"] = "SendRegistrationVerification";
5764
- RateLimitedRequestType["SendTwoFactor"] = "SendTwoFactor";
5765
- })(RateLimitedRequestType = exports.RateLimitedRequestType || (exports.RateLimitedRequestType = {}));
5766
- /**
5767
- * @author Daniel DeGroff
5768
- */
5769
- var LambdaEngineType;
5770
- (function (LambdaEngineType) {
5771
- LambdaEngineType["GraalJS"] = "GraalJS";
5772
- LambdaEngineType["Nashorn"] = "Nashorn";
5773
- })(LambdaEngineType = exports.LambdaEngineType || (exports.LambdaEngineType = {}));
5774
- /**
5775
- * Used to express whether the Relying Party requires <a href="https://www.w3.org/TR/webauthn-2/#user-verification">user verification</a> for the
5776
- * current operation.
5777
- *
5778
- * @author Spencer Witt
5779
- */
5780
- var UserVerificationRequirement;
5781
- (function (UserVerificationRequirement) {
5782
- UserVerificationRequirement["required"] = "required";
5783
- UserVerificationRequirement["preferred"] = "preferred";
5784
- UserVerificationRequirement["discouraged"] = "discouraged";
5785
- })(UserVerificationRequirement = exports.UserVerificationRequirement || (exports.UserVerificationRequirement = {}));
5786
- /**
5787
- * @author Brett Guy
5788
- */
5789
- var ClientAuthenticationPolicy;
5790
- (function (ClientAuthenticationPolicy) {
5791
- ClientAuthenticationPolicy["Required"] = "Required";
5792
- ClientAuthenticationPolicy["NotRequired"] = "NotRequired";
5793
- ClientAuthenticationPolicy["NotRequiredWhenUsingPKCE"] = "NotRequiredWhenUsingPKCE";
5794
- })(ClientAuthenticationPolicy = exports.ClientAuthenticationPolicy || (exports.ClientAuthenticationPolicy = {}));
5795
- /**
5796
- * @author Daniel DeGroff
5797
- */
5798
- var FormType;
5799
- (function (FormType) {
5800
- FormType["registration"] = "registration";
5801
- FormType["adminRegistration"] = "adminRegistration";
5802
- FormType["adminUser"] = "adminUser";
5803
- FormType["selfServiceUser"] = "selfServiceUser";
5804
- })(FormType = exports.FormType || (exports.FormType = {}));
5805
- /**
5806
- * XML canonicalization method enumeration. This is used for the IdP and SP side of FusionAuth SAML.
5807
- *
5808
- * @author Brian Pontarelli
5809
- */
5810
- var CanonicalizationMethod;
5811
- (function (CanonicalizationMethod) {
5812
- CanonicalizationMethod["exclusive"] = "exclusive";
5813
- CanonicalizationMethod["exclusive_with_comments"] = "exclusive_with_comments";
5814
- CanonicalizationMethod["inclusive"] = "inclusive";
5815
- CanonicalizationMethod["inclusive_with_comments"] = "inclusive_with_comments";
5816
- })(CanonicalizationMethod = exports.CanonicalizationMethod || (exports.CanonicalizationMethod = {}));
5817
- /**
5818
- * @author Brian Pontarelli
5819
- */
5820
- var ExpiryUnit;
5821
- (function (ExpiryUnit) {
5822
- ExpiryUnit["MINUTES"] = "MINUTES";
5823
- ExpiryUnit["HOURS"] = "HOURS";
5824
- ExpiryUnit["DAYS"] = "DAYS";
5825
- ExpiryUnit["WEEKS"] = "WEEKS";
5826
- ExpiryUnit["MONTHS"] = "MONTHS";
5827
- ExpiryUnit["YEARS"] = "YEARS";
5828
- })(ExpiryUnit = exports.ExpiryUnit || (exports.ExpiryUnit = {}));
5829
- /**
5830
- * @author Daniel DeGroff
5831
- */
5832
- var SecureGeneratorType;
5833
- (function (SecureGeneratorType) {
5834
- SecureGeneratorType["randomDigits"] = "randomDigits";
5835
- SecureGeneratorType["randomBytes"] = "randomBytes";
5836
- SecureGeneratorType["randomAlpha"] = "randomAlpha";
5837
- SecureGeneratorType["randomAlphaNumeric"] = "randomAlphaNumeric";
5838
- })(SecureGeneratorType = exports.SecureGeneratorType || (exports.SecureGeneratorType = {}));
5839
- /**
5840
- * @author Daniel DeGroff
5841
- */
5842
- var FormDataType;
5843
- (function (FormDataType) {
5844
- FormDataType["bool"] = "bool";
5845
- FormDataType["consent"] = "consent";
5846
- FormDataType["date"] = "date";
5847
- FormDataType["email"] = "email";
5848
- FormDataType["number"] = "number";
5849
- FormDataType["string"] = "string";
5850
- })(FormDataType = exports.FormDataType || (exports.FormDataType = {}));
5851
- /**
5852
- * The IdP behavior when no user link has been made yet.
5853
- *
5854
- * @author Daniel DeGroff
5855
- */
5856
- var IdentityProviderLinkingStrategy;
5857
- (function (IdentityProviderLinkingStrategy) {
5858
- IdentityProviderLinkingStrategy["CreatePendingLink"] = "CreatePendingLink";
5859
- IdentityProviderLinkingStrategy["Disabled"] = "Disabled";
5860
- IdentityProviderLinkingStrategy["LinkAnonymously"] = "LinkAnonymously";
5861
- IdentityProviderLinkingStrategy["LinkByEmail"] = "LinkByEmail";
5862
- IdentityProviderLinkingStrategy["LinkByEmailForExistingUser"] = "LinkByEmailForExistingUser";
5863
- IdentityProviderLinkingStrategy["LinkByUsername"] = "LinkByUsername";
5864
- IdentityProviderLinkingStrategy["LinkByUsernameForExistingUser"] = "LinkByUsernameForExistingUser";
5865
- IdentityProviderLinkingStrategy["Unsupported"] = "Unsupported";
5866
- })(IdentityProviderLinkingStrategy = exports.IdentityProviderLinkingStrategy || (exports.IdentityProviderLinkingStrategy = {}));
5867
- /**
5868
- * @author Daniel DeGroff
5869
- */
5870
- var MultiFactorLoginPolicy;
5871
- (function (MultiFactorLoginPolicy) {
5872
- MultiFactorLoginPolicy["Disabled"] = "Disabled";
5873
- MultiFactorLoginPolicy["Enabled"] = "Enabled";
5874
- MultiFactorLoginPolicy["Required"] = "Required";
5875
- })(MultiFactorLoginPolicy = exports.MultiFactorLoginPolicy || (exports.MultiFactorLoginPolicy = {}));
5876
- /**
5877
- * @author Brett Guy
5878
- */
5879
- var IPAccessControlEntryAction;
5880
- (function (IPAccessControlEntryAction) {
5881
- IPAccessControlEntryAction["Allow"] = "Allow";
5882
- IPAccessControlEntryAction["Block"] = "Block";
5883
- })(IPAccessControlEntryAction = exports.IPAccessControlEntryAction || (exports.IPAccessControlEntryAction = {}));
5912
+ })(OAuthErrorReason = exports.OAuthErrorReason || (exports.OAuthErrorReason = {}));
5913
+ var OAuthErrorType;
5914
+ (function (OAuthErrorType) {
5915
+ OAuthErrorType["invalid_request"] = "invalid_request";
5916
+ OAuthErrorType["invalid_client"] = "invalid_client";
5917
+ OAuthErrorType["invalid_grant"] = "invalid_grant";
5918
+ OAuthErrorType["invalid_token"] = "invalid_token";
5919
+ OAuthErrorType["unauthorized_client"] = "unauthorized_client";
5920
+ OAuthErrorType["invalid_scope"] = "invalid_scope";
5921
+ OAuthErrorType["server_error"] = "server_error";
5922
+ OAuthErrorType["unsupported_grant_type"] = "unsupported_grant_type";
5923
+ OAuthErrorType["unsupported_response_type"] = "unsupported_response_type";
5924
+ OAuthErrorType["access_denied"] = "access_denied";
5925
+ OAuthErrorType["change_password_required"] = "change_password_required";
5926
+ OAuthErrorType["not_licensed"] = "not_licensed";
5927
+ OAuthErrorType["two_factor_required"] = "two_factor_required";
5928
+ OAuthErrorType["authorization_pending"] = "authorization_pending";
5929
+ OAuthErrorType["expired_token"] = "expired_token";
5930
+ OAuthErrorType["unsupported_token_type"] = "unsupported_token_type";
5931
+ })(OAuthErrorType = exports.OAuthErrorType || (exports.OAuthErrorType = {}));
5884
5932
  /**
5885
- * The phases of a time-based user action.
5933
+ * Controls the policy for requesting user permission to grant access to requested scopes during an OAuth workflow
5934
+ * for a third-party application.
5886
5935
  *
5887
- * @author Brian Pontarelli
5936
+ * @author Spencer Witt
5888
5937
  */
5889
- var UserActionPhase;
5890
- (function (UserActionPhase) {
5891
- UserActionPhase["start"] = "start";
5892
- UserActionPhase["modify"] = "modify";
5893
- UserActionPhase["cancel"] = "cancel";
5894
- UserActionPhase["end"] = "end";
5895
- })(UserActionPhase = exports.UserActionPhase || (exports.UserActionPhase = {}));
5938
+ var OAuthScopeConsentMode;
5939
+ (function (OAuthScopeConsentMode) {
5940
+ OAuthScopeConsentMode["AlwaysPrompt"] = "AlwaysPrompt";
5941
+ OAuthScopeConsentMode["RememberDecision"] = "RememberDecision";
5942
+ OAuthScopeConsentMode["NeverPrompt"] = "NeverPrompt";
5943
+ })(OAuthScopeConsentMode = exports.OAuthScopeConsentMode || (exports.OAuthScopeConsentMode = {}));
5896
5944
  /**
5897
- * The types of lambdas that indicate how they are invoked by FusionAuth.
5945
+ * Controls the policy for whether OAuth workflows will more strictly adhere to the OAuth and OIDC specification
5946
+ * or run in backwards compatibility mode.
5898
5947
  *
5899
- * @author Brian Pontarelli
5948
+ * @author David Charles
5900
5949
  */
5901
- var LambdaType;
5902
- (function (LambdaType) {
5903
- LambdaType["JWTPopulate"] = "JWTPopulate";
5904
- LambdaType["OpenIDReconcile"] = "OpenIDReconcile";
5905
- LambdaType["SAMLv2Reconcile"] = "SAMLv2Reconcile";
5906
- LambdaType["SAMLv2Populate"] = "SAMLv2Populate";
5907
- LambdaType["AppleReconcile"] = "AppleReconcile";
5908
- LambdaType["ExternalJWTReconcile"] = "ExternalJWTReconcile";
5909
- LambdaType["FacebookReconcile"] = "FacebookReconcile";
5910
- LambdaType["GoogleReconcile"] = "GoogleReconcile";
5911
- LambdaType["HYPRReconcile"] = "HYPRReconcile";
5912
- LambdaType["TwitterReconcile"] = "TwitterReconcile";
5913
- LambdaType["LDAPConnectorReconcile"] = "LDAPConnectorReconcile";
5914
- LambdaType["LinkedInReconcile"] = "LinkedInReconcile";
5915
- LambdaType["EpicGamesReconcile"] = "EpicGamesReconcile";
5916
- LambdaType["NintendoReconcile"] = "NintendoReconcile";
5917
- LambdaType["SonyPSNReconcile"] = "SonyPSNReconcile";
5918
- LambdaType["SteamReconcile"] = "SteamReconcile";
5919
- LambdaType["TwitchReconcile"] = "TwitchReconcile";
5920
- LambdaType["XboxReconcile"] = "XboxReconcile";
5921
- LambdaType["ClientCredentialsJWTPopulate"] = "ClientCredentialsJWTPopulate";
5922
- LambdaType["SCIMServerGroupRequestConverter"] = "SCIMServerGroupRequestConverter";
5923
- LambdaType["SCIMServerGroupResponseConverter"] = "SCIMServerGroupResponseConverter";
5924
- LambdaType["SCIMServerUserRequestConverter"] = "SCIMServerUserRequestConverter";
5925
- LambdaType["SCIMServerUserResponseConverter"] = "SCIMServerUserResponseConverter";
5926
- LambdaType["SelfServiceRegistrationValidation"] = "SelfServiceRegistrationValidation";
5927
- LambdaType["UserInfoPopulate"] = "UserInfoPopulate";
5928
- LambdaType["LoginValidation"] = "LoginValidation";
5929
- })(LambdaType = exports.LambdaType || (exports.LambdaType = {}));
5950
+ var OAuthScopeHandlingPolicy;
5951
+ (function (OAuthScopeHandlingPolicy) {
5952
+ OAuthScopeHandlingPolicy["Compatibility"] = "Compatibility";
5953
+ OAuthScopeHandlingPolicy["Strict"] = "Strict";
5954
+ })(OAuthScopeHandlingPolicy = exports.OAuthScopeHandlingPolicy || (exports.OAuthScopeHandlingPolicy = {}));
5930
5955
  /**
5931
- * @author Daniel DeGroff
5956
+ * @author Johnathon Wood
5932
5957
  */
5933
- var SystemTrustedProxyConfigurationPolicy;
5934
- (function (SystemTrustedProxyConfigurationPolicy) {
5935
- SystemTrustedProxyConfigurationPolicy["All"] = "All";
5936
- SystemTrustedProxyConfigurationPolicy["OnlyConfigured"] = "OnlyConfigured";
5937
- })(SystemTrustedProxyConfigurationPolicy = exports.SystemTrustedProxyConfigurationPolicy || (exports.SystemTrustedProxyConfigurationPolicy = {}));
5938
- var LoginIdType;
5939
- (function (LoginIdType) {
5940
- LoginIdType["email"] = "email";
5941
- LoginIdType["username"] = "username";
5942
- })(LoginIdType = exports.LoginIdType || (exports.LoginIdType = {}));
5943
- var RegistrationType;
5944
- (function (RegistrationType) {
5945
- RegistrationType["basic"] = "basic";
5946
- RegistrationType["advanced"] = "advanced";
5947
- })(RegistrationType = exports.RegistrationType || (exports.RegistrationType = {}));
5948
- var SAMLLogoutBehavior;
5949
- (function (SAMLLogoutBehavior) {
5950
- SAMLLogoutBehavior["AllParticipants"] = "AllParticipants";
5951
- SAMLLogoutBehavior["OnlyOriginator"] = "OnlyOriginator";
5952
- })(SAMLLogoutBehavior = exports.SAMLLogoutBehavior || (exports.SAMLLogoutBehavior = {}));
5953
- var XMLSignatureLocation;
5954
- (function (XMLSignatureLocation) {
5955
- XMLSignatureLocation["Assertion"] = "Assertion";
5956
- XMLSignatureLocation["Response"] = "Response";
5957
- })(XMLSignatureLocation = exports.XMLSignatureLocation || (exports.XMLSignatureLocation = {}));
5958
+ var Oauth2AuthorizedURLValidationPolicy;
5959
+ (function (Oauth2AuthorizedURLValidationPolicy) {
5960
+ Oauth2AuthorizedURLValidationPolicy["AllowWildcards"] = "AllowWildcards";
5961
+ Oauth2AuthorizedURLValidationPolicy["ExactMatch"] = "ExactMatch";
5962
+ })(Oauth2AuthorizedURLValidationPolicy = exports.Oauth2AuthorizedURLValidationPolicy || (exports.Oauth2AuthorizedURLValidationPolicy = {}));
5958
5963
  /**
5959
5964
  * @author Daniel DeGroff
5960
5965
  */
5961
- var Sort;
5962
- (function (Sort) {
5963
- Sort["asc"] = "asc";
5964
- Sort["desc"] = "desc";
5965
- })(Sort = exports.Sort || (exports.Sort = {}));
5966
+ var ObjectState;
5967
+ (function (ObjectState) {
5968
+ ObjectState["Active"] = "Active";
5969
+ ObjectState["Inactive"] = "Inactive";
5970
+ ObjectState["PendingDelete"] = "PendingDelete";
5971
+ })(ObjectState = exports.ObjectState || (exports.ObjectState = {}));
5972
+ var BreachAction;
5973
+ (function (BreachAction) {
5974
+ BreachAction["Off"] = "Off";
5975
+ BreachAction["RecordOnly"] = "RecordOnly";
5976
+ BreachAction["NotifyUser"] = "NotifyUser";
5977
+ BreachAction["RequireChange"] = "RequireChange";
5978
+ })(BreachAction = exports.BreachAction || (exports.BreachAction = {}));
5979
+ var BreachMatchMode;
5980
+ (function (BreachMatchMode) {
5981
+ BreachMatchMode["Low"] = "Low";
5982
+ BreachMatchMode["Medium"] = "Medium";
5983
+ BreachMatchMode["High"] = "High";
5984
+ })(BreachMatchMode = exports.BreachMatchMode || (exports.BreachMatchMode = {}));
5966
5985
  /**
5967
- * Describes the authenticator attachment modality preference for a WebAuthn workflow. See {@link AuthenticatorAttachment}
5968
- *
5969
- * @author Spencer Witt
5986
+ * @author Brett Guy
5970
5987
  */
5971
- var AuthenticatorAttachmentPreference;
5972
- (function (AuthenticatorAttachmentPreference) {
5973
- AuthenticatorAttachmentPreference["any"] = "any";
5974
- AuthenticatorAttachmentPreference["platform"] = "platform";
5975
- AuthenticatorAttachmentPreference["crossPlatform"] = "crossPlatform";
5976
- })(AuthenticatorAttachmentPreference = exports.AuthenticatorAttachmentPreference || (exports.AuthenticatorAttachmentPreference = {}));
5988
+ var ProofKeyForCodeExchangePolicy;
5989
+ (function (ProofKeyForCodeExchangePolicy) {
5990
+ ProofKeyForCodeExchangePolicy["Required"] = "Required";
5991
+ ProofKeyForCodeExchangePolicy["NotRequired"] = "NotRequired";
5992
+ ProofKeyForCodeExchangePolicy["NotRequiredWhenUsingClientAuthentication"] = "NotRequiredWhenUsingClientAuthentication";
5993
+ })(ProofKeyForCodeExchangePolicy = exports.ProofKeyForCodeExchangePolicy || (exports.ProofKeyForCodeExchangePolicy = {}));
5977
5994
  /**
5978
5995
  * Defines valid credential types. This is an extension point in the WebAuthn spec. The only defined value at this time is "public-key"
5979
5996
  *
@@ -5984,104 +6001,84 @@ var PublicKeyCredentialType;
5984
6001
  PublicKeyCredentialType["publicKey"] = "public-key";
5985
6002
  })(PublicKeyCredentialType = exports.PublicKeyCredentialType || (exports.PublicKeyCredentialType = {}));
5986
6003
  /**
5987
- * COSE Elliptic Curve identifier to determine which elliptic curve to use with a given key
5988
- *
5989
- * @author Spencer Witt
6004
+ * @author Daniel DeGroff
5990
6005
  */
5991
- var CoseEllipticCurve;
5992
- (function (CoseEllipticCurve) {
5993
- CoseEllipticCurve["Reserved"] = "Reserved";
5994
- CoseEllipticCurve["P256"] = "P256";
5995
- CoseEllipticCurve["P384"] = "P384";
5996
- CoseEllipticCurve["P521"] = "P521";
5997
- CoseEllipticCurve["X25519"] = "X25519";
5998
- CoseEllipticCurve["X448"] = "X448";
5999
- CoseEllipticCurve["Ed25519"] = "Ed25519";
6000
- CoseEllipticCurve["Ed448"] = "Ed448";
6001
- CoseEllipticCurve["Secp256k1"] = "Secp256k1";
6002
- })(CoseEllipticCurve = exports.CoseEllipticCurve || (exports.CoseEllipticCurve = {}));
6003
- var KeyAlgorithm;
6004
- (function (KeyAlgorithm) {
6005
- KeyAlgorithm["ES256"] = "ES256";
6006
- KeyAlgorithm["ES384"] = "ES384";
6007
- KeyAlgorithm["ES512"] = "ES512";
6008
- KeyAlgorithm["HS256"] = "HS256";
6009
- KeyAlgorithm["HS384"] = "HS384";
6010
- KeyAlgorithm["HS512"] = "HS512";
6011
- KeyAlgorithm["RS256"] = "RS256";
6012
- KeyAlgorithm["RS384"] = "RS384";
6013
- KeyAlgorithm["RS512"] = "RS512";
6014
- })(KeyAlgorithm = exports.KeyAlgorithm || (exports.KeyAlgorithm = {}));
6015
- var KeyType;
6016
- (function (KeyType) {
6017
- KeyType["EC"] = "EC";
6018
- KeyType["RSA"] = "RSA";
6019
- KeyType["HMAC"] = "HMAC";
6020
- })(KeyType = exports.KeyType || (exports.KeyType = {}));
6006
+ var RateLimitedRequestType;
6007
+ (function (RateLimitedRequestType) {
6008
+ RateLimitedRequestType["FailedLogin"] = "FailedLogin";
6009
+ RateLimitedRequestType["ForgotPassword"] = "ForgotPassword";
6010
+ RateLimitedRequestType["SendEmailVerification"] = "SendEmailVerification";
6011
+ RateLimitedRequestType["SendPasswordless"] = "SendPasswordless";
6012
+ RateLimitedRequestType["SendRegistrationVerification"] = "SendRegistrationVerification";
6013
+ RateLimitedRequestType["SendTwoFactor"] = "SendTwoFactor";
6014
+ })(RateLimitedRequestType = exports.RateLimitedRequestType || (exports.RateLimitedRequestType = {}));
6021
6015
  /**
6022
- * Controls the policy for requesting user permission to grant access to requested scopes during an OAuth workflow
6023
- * for a third-party application.
6024
- *
6025
- * @author Spencer Witt
6016
+ * @author Brian Pontarelli
6026
6017
  */
6027
- var OAuthScopeConsentMode;
6028
- (function (OAuthScopeConsentMode) {
6029
- OAuthScopeConsentMode["AlwaysPrompt"] = "AlwaysPrompt";
6030
- OAuthScopeConsentMode["RememberDecision"] = "RememberDecision";
6031
- OAuthScopeConsentMode["NeverPrompt"] = "NeverPrompt";
6032
- })(OAuthScopeConsentMode = exports.OAuthScopeConsentMode || (exports.OAuthScopeConsentMode = {}));
6018
+ var ReactorFeatureStatus;
6019
+ (function (ReactorFeatureStatus) {
6020
+ ReactorFeatureStatus["ACTIVE"] = "ACTIVE";
6021
+ ReactorFeatureStatus["DISCONNECTED"] = "DISCONNECTED";
6022
+ ReactorFeatureStatus["PENDING"] = "PENDING";
6023
+ ReactorFeatureStatus["DISABLED"] = "DISABLED";
6024
+ ReactorFeatureStatus["UNKNOWN"] = "UNKNOWN";
6025
+ })(ReactorFeatureStatus = exports.ReactorFeatureStatus || (exports.ReactorFeatureStatus = {}));
6033
6026
  /**
6034
6027
  * @author Daniel DeGroff
6035
6028
  */
6036
- var ObjectState;
6037
- (function (ObjectState) {
6038
- ObjectState["Active"] = "Active";
6039
- ObjectState["Inactive"] = "Inactive";
6040
- ObjectState["PendingDelete"] = "PendingDelete";
6041
- })(ObjectState = exports.ObjectState || (exports.ObjectState = {}));
6029
+ var RefreshTokenExpirationPolicy;
6030
+ (function (RefreshTokenExpirationPolicy) {
6031
+ RefreshTokenExpirationPolicy["Fixed"] = "Fixed";
6032
+ RefreshTokenExpirationPolicy["SlidingWindow"] = "SlidingWindow";
6033
+ RefreshTokenExpirationPolicy["SlidingWindowWithMaximumLifetime"] = "SlidingWindowWithMaximumLifetime";
6034
+ })(RefreshTokenExpirationPolicy = exports.RefreshTokenExpirationPolicy || (exports.RefreshTokenExpirationPolicy = {}));
6042
6035
  /**
6043
6036
  * @author Daniel DeGroff
6044
6037
  */
6045
- var IdentityProviderType;
6046
- (function (IdentityProviderType) {
6047
- IdentityProviderType["Apple"] = "Apple";
6048
- IdentityProviderType["EpicGames"] = "EpicGames";
6049
- IdentityProviderType["ExternalJWT"] = "ExternalJWT";
6050
- IdentityProviderType["Facebook"] = "Facebook";
6051
- IdentityProviderType["Google"] = "Google";
6052
- IdentityProviderType["HYPR"] = "HYPR";
6053
- IdentityProviderType["LinkedIn"] = "LinkedIn";
6054
- IdentityProviderType["Nintendo"] = "Nintendo";
6055
- IdentityProviderType["OpenIDConnect"] = "OpenIDConnect";
6056
- IdentityProviderType["SAMLv2"] = "SAMLv2";
6057
- IdentityProviderType["SAMLv2IdPInitiated"] = "SAMLv2IdPInitiated";
6058
- IdentityProviderType["SonyPSN"] = "SonyPSN";
6059
- IdentityProviderType["Steam"] = "Steam";
6060
- IdentityProviderType["Twitch"] = "Twitch";
6061
- IdentityProviderType["Twitter"] = "Twitter";
6062
- IdentityProviderType["Xbox"] = "Xbox";
6063
- })(IdentityProviderType = exports.IdentityProviderType || (exports.IdentityProviderType = {}));
6038
+ var RefreshTokenUsagePolicy;
6039
+ (function (RefreshTokenUsagePolicy) {
6040
+ RefreshTokenUsagePolicy["Reusable"] = "Reusable";
6041
+ RefreshTokenUsagePolicy["OneTimeUse"] = "OneTimeUse";
6042
+ })(RefreshTokenUsagePolicy = exports.RefreshTokenUsagePolicy || (exports.RefreshTokenUsagePolicy = {}));
6043
+ /**
6044
+ * Describes the Relying Party's requirements for <a href="https://www.w3.org/TR/webauthn-2/#client-side-discoverable-credential">client-side
6045
+ * discoverable credentials</a> (formerly known as "resident keys")
6046
+ *
6047
+ * @author Spencer Witt
6048
+ */
6049
+ var ResidentKeyRequirement;
6050
+ (function (ResidentKeyRequirement) {
6051
+ ResidentKeyRequirement["discouraged"] = "discouraged";
6052
+ ResidentKeyRequirement["preferred"] = "preferred";
6053
+ ResidentKeyRequirement["required"] = "required";
6054
+ })(ResidentKeyRequirement = exports.ResidentKeyRequirement || (exports.ResidentKeyRequirement = {}));
6055
+ /**
6056
+ * @author Lyle Schemmerling
6057
+ */
6058
+ var SAMLv2DestinationAssertionPolicy;
6059
+ (function (SAMLv2DestinationAssertionPolicy) {
6060
+ SAMLv2DestinationAssertionPolicy["Enabled"] = "Enabled";
6061
+ SAMLv2DestinationAssertionPolicy["Disabled"] = "Disabled";
6062
+ SAMLv2DestinationAssertionPolicy["AllowAlternates"] = "AllowAlternates";
6063
+ })(SAMLv2DestinationAssertionPolicy = exports.SAMLv2DestinationAssertionPolicy || (exports.SAMLv2DestinationAssertionPolicy = {}));
6064
6064
  /**
6065
6065
  * @author Daniel DeGroff
6066
6066
  */
6067
- var VerificationStrategy;
6068
- (function (VerificationStrategy) {
6069
- VerificationStrategy["ClickableLink"] = "ClickableLink";
6070
- VerificationStrategy["FormField"] = "FormField";
6071
- })(VerificationStrategy = exports.VerificationStrategy || (exports.VerificationStrategy = {}));
6072
- var TOTPAlgorithm;
6073
- (function (TOTPAlgorithm) {
6074
- TOTPAlgorithm["HmacSHA1"] = "HmacSHA1";
6075
- TOTPAlgorithm["HmacSHA256"] = "HmacSHA256";
6076
- TOTPAlgorithm["HmacSHA512"] = "HmacSHA512";
6077
- })(TOTPAlgorithm = exports.TOTPAlgorithm || (exports.TOTPAlgorithm = {}));
6067
+ var SecureGeneratorType;
6068
+ (function (SecureGeneratorType) {
6069
+ SecureGeneratorType["randomDigits"] = "randomDigits";
6070
+ SecureGeneratorType["randomBytes"] = "randomBytes";
6071
+ SecureGeneratorType["randomAlpha"] = "randomAlpha";
6072
+ SecureGeneratorType["randomAlphaNumeric"] = "randomAlphaNumeric";
6073
+ })(SecureGeneratorType = exports.SecureGeneratorType || (exports.SecureGeneratorType = {}));
6078
6074
  /**
6079
- * @author Brett Pontarelli
6075
+ * @author Daniel DeGroff
6080
6076
  */
6081
- var AuthenticationThreats;
6082
- (function (AuthenticationThreats) {
6083
- AuthenticationThreats["ImpossibleTravel"] = "ImpossibleTravel";
6084
- })(AuthenticationThreats = exports.AuthenticationThreats || (exports.AuthenticationThreats = {}));
6077
+ var Sort;
6078
+ (function (Sort) {
6079
+ Sort["asc"] = "asc";
6080
+ Sort["desc"] = "desc";
6081
+ })(Sort = exports.Sort || (exports.Sort = {}));
6085
6082
  /**
6086
6083
  * Steam API modes.
6087
6084
  *
@@ -6093,76 +6090,52 @@ var SteamAPIMode;
6093
6090
  SteamAPIMode["Partner"] = "Partner";
6094
6091
  })(SteamAPIMode = exports.SteamAPIMode || (exports.SteamAPIMode = {}));
6095
6092
  /**
6096
- * @author Brett Pontarelli
6093
+ * @author Daniel DeGroff
6097
6094
  */
6098
- var CaptchaMethod;
6099
- (function (CaptchaMethod) {
6100
- CaptchaMethod["GoogleRecaptchaV2"] = "GoogleRecaptchaV2";
6101
- CaptchaMethod["GoogleRecaptchaV3"] = "GoogleRecaptchaV3";
6102
- CaptchaMethod["HCaptcha"] = "HCaptcha";
6103
- CaptchaMethod["HCaptchaEnterprise"] = "HCaptchaEnterprise";
6104
- })(CaptchaMethod = exports.CaptchaMethod || (exports.CaptchaMethod = {}));
6095
+ var SystemTrustedProxyConfigurationPolicy;
6096
+ (function (SystemTrustedProxyConfigurationPolicy) {
6097
+ SystemTrustedProxyConfigurationPolicy["All"] = "All";
6098
+ SystemTrustedProxyConfigurationPolicy["OnlyConfigured"] = "OnlyConfigured";
6099
+ })(SystemTrustedProxyConfigurationPolicy = exports.SystemTrustedProxyConfigurationPolicy || (exports.SystemTrustedProxyConfigurationPolicy = {}));
6100
+ var UniqueUsernameStrategy;
6101
+ (function (UniqueUsernameStrategy) {
6102
+ UniqueUsernameStrategy["Always"] = "Always";
6103
+ UniqueUsernameStrategy["OnCollision"] = "OnCollision";
6104
+ })(UniqueUsernameStrategy = exports.UniqueUsernameStrategy || (exports.UniqueUsernameStrategy = {}));
6105
+ var ThemeType;
6106
+ (function (ThemeType) {
6107
+ ThemeType["advanced"] = "advanced";
6108
+ ThemeType["simple"] = "simple";
6109
+ })(ThemeType = exports.ThemeType || (exports.ThemeType = {}));
6105
6110
  /**
6106
- * Models the event types that FusionAuth produces.
6111
+ * <ul>
6112
+ * <li>Bearer Token type as defined by <a href="https://tools.ietf.org/html/rfc6750">RFC 6750</a>.</li>
6113
+ * <li>MAC Token type as referenced by <a href="https://tools.ietf.org/html/rfc6749">RFC 6749</a> and
6114
+ * <a href="https://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-05">
6115
+ * Draft RFC on OAuth 2.0 Message Authentication Code (MAC) Tokens</a>
6116
+ * </li>
6117
+ * </ul>
6118
+ *
6119
+ * @author Daniel DeGroff
6120
+ */
6121
+ var TokenType;
6122
+ (function (TokenType) {
6123
+ TokenType["Bearer"] = "Bearer";
6124
+ TokenType["MAC"] = "MAC";
6125
+ })(TokenType = exports.TokenType || (exports.TokenType = {}));
6126
+ /**
6127
+ * The transaction types for Webhooks and other event systems within FusionAuth.
6107
6128
  *
6108
6129
  * @author Brian Pontarelli
6109
6130
  */
6110
- var EventType;
6111
- (function (EventType) {
6112
- EventType["JWTPublicKeyUpdate"] = "jwt.public-key.update";
6113
- EventType["JWTRefreshTokenRevoke"] = "jwt.refresh-token.revoke";
6114
- EventType["JWTRefresh"] = "jwt.refresh";
6115
- EventType["AuditLogCreate"] = "audit-log.create";
6116
- EventType["EventLogCreate"] = "event-log.create";
6117
- EventType["KickstartSuccess"] = "kickstart.success";
6118
- EventType["GroupCreate"] = "group.create";
6119
- EventType["GroupCreateComplete"] = "group.create.complete";
6120
- EventType["GroupDelete"] = "group.delete";
6121
- EventType["GroupDeleteComplete"] = "group.delete.complete";
6122
- EventType["GroupMemberAdd"] = "group.member.add";
6123
- EventType["GroupMemberAddComplete"] = "group.member.add.complete";
6124
- EventType["GroupMemberRemove"] = "group.member.remove";
6125
- EventType["GroupMemberRemoveComplete"] = "group.member.remove.complete";
6126
- EventType["GroupMemberUpdate"] = "group.member.update";
6127
- EventType["GroupMemberUpdateComplete"] = "group.member.update.complete";
6128
- EventType["GroupUpdate"] = "group.update";
6129
- EventType["GroupUpdateComplete"] = "group.update.complete";
6130
- EventType["UserAction"] = "user.action";
6131
- EventType["UserBulkCreate"] = "user.bulk.create";
6132
- EventType["UserCreate"] = "user.create";
6133
- EventType["UserCreateComplete"] = "user.create.complete";
6134
- EventType["UserDeactivate"] = "user.deactivate";
6135
- EventType["UserDelete"] = "user.delete";
6136
- EventType["UserDeleteComplete"] = "user.delete.complete";
6137
- EventType["UserEmailUpdate"] = "user.email.update";
6138
- EventType["UserEmailVerified"] = "user.email.verified";
6139
- EventType["UserIdentityProviderLink"] = "user.identity-provider.link";
6140
- EventType["UserIdentityProviderUnlink"] = "user.identity-provider.unlink";
6141
- EventType["UserLoginIdDuplicateOnCreate"] = "user.loginId.duplicate.create";
6142
- EventType["UserLoginIdDuplicateOnUpdate"] = "user.loginId.duplicate.update";
6143
- EventType["UserLoginFailed"] = "user.login.failed";
6144
- EventType["UserLoginNewDevice"] = "user.login.new-device";
6145
- EventType["UserLoginSuccess"] = "user.login.success";
6146
- EventType["UserLoginSuspicious"] = "user.login.suspicious";
6147
- EventType["UserPasswordBreach"] = "user.password.breach";
6148
- EventType["UserPasswordResetSend"] = "user.password.reset.send";
6149
- EventType["UserPasswordResetStart"] = "user.password.reset.start";
6150
- EventType["UserPasswordResetSuccess"] = "user.password.reset.success";
6151
- EventType["UserPasswordUpdate"] = "user.password.update";
6152
- EventType["UserReactivate"] = "user.reactivate";
6153
- EventType["UserRegistrationCreate"] = "user.registration.create";
6154
- EventType["UserRegistrationCreateComplete"] = "user.registration.create.complete";
6155
- EventType["UserRegistrationDelete"] = "user.registration.delete";
6156
- EventType["UserRegistrationDeleteComplete"] = "user.registration.delete.complete";
6157
- EventType["UserRegistrationUpdate"] = "user.registration.update";
6158
- EventType["UserRegistrationUpdateComplete"] = "user.registration.update.complete";
6159
- EventType["UserRegistrationVerified"] = "user.registration.verified";
6160
- EventType["UserTwoFactorMethodAdd"] = "user.two-factor.method.add";
6161
- EventType["UserTwoFactorMethodRemove"] = "user.two-factor.method.remove";
6162
- EventType["UserUpdate"] = "user.update";
6163
- EventType["UserUpdateComplete"] = "user.update.complete";
6164
- EventType["Test"] = "test";
6165
- })(EventType = exports.EventType || (exports.EventType = {}));
6131
+ var TransactionType;
6132
+ (function (TransactionType) {
6133
+ TransactionType["None"] = "None";
6134
+ TransactionType["Any"] = "Any";
6135
+ TransactionType["SimpleMajority"] = "SimpleMajority";
6136
+ TransactionType["SuperMajority"] = "SuperMajority";
6137
+ TransactionType["AbsoluteMajority"] = "AbsoluteMajority";
6138
+ })(TransactionType = exports.TransactionType || (exports.TransactionType = {}));
6166
6139
  /**
6167
6140
  * Policy for handling unknown OAuth scopes in the request
6168
6141
  *
@@ -6175,41 +6148,88 @@ var UnknownScopePolicy;
6175
6148
  UnknownScopePolicy["Reject"] = "Reject";
6176
6149
  })(UnknownScopePolicy = exports.UnknownScopePolicy || (exports.UnknownScopePolicy = {}));
6177
6150
  /**
6178
- * The application's relationship to the authorization server. First-party applications will be granted implicit permission for requested scopes.
6179
- * Third-party applications will use the {@link OAuthScopeConsentMode} policy.
6151
+ * @author Daniel DeGroff
6152
+ */
6153
+ var UnverifiedBehavior;
6154
+ (function (UnverifiedBehavior) {
6155
+ UnverifiedBehavior["Allow"] = "Allow";
6156
+ UnverifiedBehavior["Gated"] = "Gated";
6157
+ })(UnverifiedBehavior = exports.UnverifiedBehavior || (exports.UnverifiedBehavior = {}));
6158
+ /**
6159
+ * The phases of a time-based user action.
6180
6160
  *
6181
- * @author Spencer Witt
6161
+ * @author Brian Pontarelli
6182
6162
  */
6183
- var OAuthApplicationRelationship;
6184
- (function (OAuthApplicationRelationship) {
6185
- OAuthApplicationRelationship["FirstParty"] = "FirstParty";
6186
- OAuthApplicationRelationship["ThirdParty"] = "ThirdParty";
6187
- })(OAuthApplicationRelationship = exports.OAuthApplicationRelationship || (exports.OAuthApplicationRelationship = {}));
6188
- var ClientAuthenticationMethod;
6189
- (function (ClientAuthenticationMethod) {
6190
- ClientAuthenticationMethod["none"] = "none";
6191
- ClientAuthenticationMethod["client_secret_basic"] = "client_secret_basic";
6192
- ClientAuthenticationMethod["client_secret_post"] = "client_secret_post";
6193
- })(ClientAuthenticationMethod = exports.ClientAuthenticationMethod || (exports.ClientAuthenticationMethod = {}));
6163
+ var UserActionPhase;
6164
+ (function (UserActionPhase) {
6165
+ UserActionPhase["start"] = "start";
6166
+ UserActionPhase["modify"] = "modify";
6167
+ UserActionPhase["cancel"] = "cancel";
6168
+ UserActionPhase["end"] = "end";
6169
+ })(UserActionPhase = exports.UserActionPhase || (exports.UserActionPhase = {}));
6194
6170
  /**
6195
- * Available JSON Web Algorithms (JWA) as described in RFC 7518 available for this JWT implementation.
6171
+ * @author Daniel DeGroff
6172
+ */
6173
+ var UserState;
6174
+ (function (UserState) {
6175
+ UserState["Authenticated"] = "Authenticated";
6176
+ UserState["AuthenticatedNotRegistered"] = "AuthenticatedNotRegistered";
6177
+ UserState["AuthenticatedNotVerified"] = "AuthenticatedNotVerified";
6178
+ UserState["AuthenticatedRegistrationNotVerified"] = "AuthenticatedRegistrationNotVerified";
6179
+ })(UserState = exports.UserState || (exports.UserState = {}));
6180
+ /**
6181
+ * Used to express whether the Relying Party requires <a href="https://www.w3.org/TR/webauthn-2/#user-verification">user verification</a> for the
6182
+ * current operation.
6196
6183
  *
6184
+ * @author Spencer Witt
6185
+ */
6186
+ var UserVerificationRequirement;
6187
+ (function (UserVerificationRequirement) {
6188
+ UserVerificationRequirement["required"] = "required";
6189
+ UserVerificationRequirement["preferred"] = "preferred";
6190
+ UserVerificationRequirement["discouraged"] = "discouraged";
6191
+ })(UserVerificationRequirement = exports.UserVerificationRequirement || (exports.UserVerificationRequirement = {}));
6192
+ /**
6197
6193
  * @author Daniel DeGroff
6198
6194
  */
6199
- var Algorithm;
6200
- (function (Algorithm) {
6201
- Algorithm["ES256"] = "ES256";
6202
- Algorithm["ES384"] = "ES384";
6203
- Algorithm["ES512"] = "ES512";
6204
- Algorithm["HS256"] = "HS256";
6205
- Algorithm["HS384"] = "HS384";
6206
- Algorithm["HS512"] = "HS512";
6207
- Algorithm["PS256"] = "PS256";
6208
- Algorithm["PS384"] = "PS384";
6209
- Algorithm["PS512"] = "PS512";
6210
- Algorithm["RS256"] = "RS256";
6211
- Algorithm["RS384"] = "RS384";
6212
- Algorithm["RS512"] = "RS512";
6213
- Algorithm["none"] = "none";
6214
- })(Algorithm = exports.Algorithm || (exports.Algorithm = {}));
6195
+ var VerificationStrategy;
6196
+ (function (VerificationStrategy) {
6197
+ VerificationStrategy["ClickableLink"] = "ClickableLink";
6198
+ VerificationStrategy["FormField"] = "FormField";
6199
+ })(VerificationStrategy = exports.VerificationStrategy || (exports.VerificationStrategy = {}));
6200
+ /**
6201
+ * Identifies the WebAuthn workflow. This will affect the parameters used for credential creation
6202
+ * and request based on the Tenant configuration.
6203
+ *
6204
+ * @author Spencer Witt
6205
+ */
6206
+ var WebAuthnWorkflow;
6207
+ (function (WebAuthnWorkflow) {
6208
+ WebAuthnWorkflow["bootstrap"] = "bootstrap";
6209
+ WebAuthnWorkflow["general"] = "general";
6210
+ WebAuthnWorkflow["reauthentication"] = "reauthentication";
6211
+ })(WebAuthnWorkflow = exports.WebAuthnWorkflow || (exports.WebAuthnWorkflow = {}));
6212
+ /**
6213
+ * The possible states of an individual webhook attempt to a single endpoint.
6214
+ *
6215
+ * @author Spencer Witt
6216
+ */
6217
+ var WebhookAttemptResult;
6218
+ (function (WebhookAttemptResult) {
6219
+ WebhookAttemptResult["Success"] = "Success";
6220
+ WebhookAttemptResult["Failure"] = "Failure";
6221
+ WebhookAttemptResult["Unknown"] = "Unknown";
6222
+ })(WebhookAttemptResult = exports.WebhookAttemptResult || (exports.WebhookAttemptResult = {}));
6223
+ /**
6224
+ * The possible result states of a webhook event. This tracks the success of the overall webhook transaction according to the {@link TransactionType}
6225
+ * and configured webhooks.
6226
+ *
6227
+ * @author Spencer Witt
6228
+ */
6229
+ var WebhookEventResult;
6230
+ (function (WebhookEventResult) {
6231
+ WebhookEventResult["Failed"] = "Failed";
6232
+ WebhookEventResult["Running"] = "Running";
6233
+ WebhookEventResult["Succeeded"] = "Succeeded";
6234
+ })(WebhookEventResult = exports.WebhookEventResult || (exports.WebhookEventResult = {}));
6215
6235
  //# sourceMappingURL=FusionAuthClient.js.map