@fusionauth/typescript-client 1.57.0 → 1.58.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/build/src/FusionAuthClient.d.ts +4065 -4043
- package/build/src/FusionAuthClient.js +805 -785
- package/build/src/FusionAuthClient.js.map +1 -1
- package/dist/fusionauth-typescript-client.js +806 -786
- package/dist/fusionauth-typescript-client.min.js +1 -1
- package/dist/fusionauth-typescript-client.min.js.map +1 -1
- package/package.json +1 -1
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
/*
|
|
3
|
-
* Copyright (c) 2019-
|
|
3
|
+
* Copyright (c) 2019-2025, FusionAuth, All Rights Reserved
|
|
4
4
|
*
|
|
5
5
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
6
6
|
* you may not use this file except in compliance with the License.
|
|
@@ -15,7 +15,7 @@
|
|
|
15
15
|
* language governing permissions and limitations under the License.
|
|
16
16
|
*/
|
|
17
17
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
18
|
-
exports.
|
|
18
|
+
exports.WebhookEventResult = exports.WebhookAttemptResult = exports.WebAuthnWorkflow = exports.VerificationStrategy = exports.UserVerificationRequirement = exports.UserState = exports.UserActionPhase = exports.UnverifiedBehavior = exports.UnknownScopePolicy = exports.TransactionType = exports.TokenType = exports.ThemeType = exports.UniqueUsernameStrategy = exports.SystemTrustedProxyConfigurationPolicy = exports.SteamAPIMode = exports.Sort = exports.SecureGeneratorType = exports.SAMLv2DestinationAssertionPolicy = exports.ResidentKeyRequirement = exports.RefreshTokenUsagePolicy = exports.RefreshTokenExpirationPolicy = exports.ReactorFeatureStatus = exports.RateLimitedRequestType = exports.PublicKeyCredentialType = exports.ProofKeyForCodeExchangePolicy = exports.BreachMatchMode = exports.BreachAction = exports.ObjectState = exports.Oauth2AuthorizedURLValidationPolicy = exports.OAuthScopeHandlingPolicy = exports.OAuthScopeConsentMode = exports.OAuthErrorType = exports.OAuthErrorReason = exports.OAuthApplicationRelationship = exports.MultiFactorLoginPolicy = exports.MessengerType = exports.MessageType = exports.LogoutBehavior = exports.LambdaType = exports.LambdaEngineType = exports.LDAPSecurityMethod = exports.KeyUse = exports.KeyType = exports.KeyAlgorithm = exports.IdentityProviderType = exports.ClientAuthenticationMethod = exports.IdentityProviderLoginMethod = exports.IdentityProviderLinkingStrategy = exports.IPAccessControlEntryAction = exports.HTTPMethod = exports.GrantType = exports.FormType = exports.FormFieldAdminPolicy = exports.FormDataType = exports.FormControl = exports.FamilyRole = exports.ExpiryUnit = exports.EventType = exports.EventLogType = exports.EmailSecurityType = exports.DeviceType = exports.CoseKeyType = exports.CoseEllipticCurve = exports.CoseAlgorithmIdentifier = exports.ContentStatus = exports.ConsentStatus = exports.ConnectorType = exports.ClientAuthenticationPolicy = exports.ChangePasswordReason = exports.CaptchaMethod = exports.CanonicalizationMethod = exports.BreachedPasswordStatus = exports.TOTPAlgorithm = exports.AuthenticatorAttachmentPreference = exports.AuthenticatorAttachment = exports.AuthenticationThreats = exports.AttestationType = exports.AttestationConveyancePreference = exports.ApplicationMultiFactorTrustPolicy = exports.XMLSignatureLocation = exports.SAMLLogoutBehavior = exports.RegistrationType = exports.LoginIdType = exports.Algorithm = exports.FusionAuthClient = void 0;
|
|
19
19
|
const DefaultRESTClientBuilder_1 = require("./DefaultRESTClientBuilder");
|
|
20
20
|
const url_1 = require("url");
|
|
21
21
|
class FusionAuthClient {
|
|
@@ -143,6 +143,24 @@ class FusionAuthClient {
|
|
|
143
143
|
.withMethod("POST")
|
|
144
144
|
.go();
|
|
145
145
|
}
|
|
146
|
+
/**
|
|
147
|
+
* Changes a user's password using their access token (JWT) instead of the changePasswordId
|
|
148
|
+
* A common use case for this method will be if you want to allow the user to change their own password.
|
|
149
|
+
*
|
|
150
|
+
* Remember to send refreshToken in the request body if you want to get a new refresh token when login using the returned oneTimePassword.
|
|
151
|
+
*
|
|
152
|
+
* @param {string} encodedJWT The encoded JWT (access token).
|
|
153
|
+
* @param {ChangePasswordRequest} request The change password request that contains all the information used to change the password.
|
|
154
|
+
* @returns {Promise<ClientResponse<ChangePasswordResponse>>}
|
|
155
|
+
*/
|
|
156
|
+
changePasswordByJWT(encodedJWT, request) {
|
|
157
|
+
return this.startAnonymous()
|
|
158
|
+
.withUri('/api/user/change-password')
|
|
159
|
+
.withAuthorization('Bearer ' + encodedJWT)
|
|
160
|
+
.withJSONBody(request)
|
|
161
|
+
.withMethod("POST")
|
|
162
|
+
.go();
|
|
163
|
+
}
|
|
146
164
|
/**
|
|
147
165
|
* Changes a user's password using their identity (loginId and password). Using a loginId instead of the changePasswordId
|
|
148
166
|
* bypasses the email verification and allows a password to be changed directly without first calling the #forgotPassword
|
|
@@ -784,7 +802,7 @@ class FusionAuthClient {
|
|
|
784
802
|
.go();
|
|
785
803
|
}
|
|
786
804
|
/**
|
|
787
|
-
* Deactivates the users with the given
|
|
805
|
+
* Deactivates the users with the given Ids.
|
|
788
806
|
*
|
|
789
807
|
* @param {Array<string>} userIds The ids of the users to deactivate.
|
|
790
808
|
* @returns {Promise<ClientResponse<UserDeleteResponse>>}
|
|
@@ -801,7 +819,7 @@ class FusionAuthClient {
|
|
|
801
819
|
.go();
|
|
802
820
|
}
|
|
803
821
|
/**
|
|
804
|
-
* Deactivates the users with the given
|
|
822
|
+
* Deactivates the users with the given Ids.
|
|
805
823
|
*
|
|
806
824
|
* @param {Array<string>} userIds The ids of the users to deactivate.
|
|
807
825
|
* @returns {Promise<ClientResponse<UserDeleteResponse>>}
|
|
@@ -1276,8 +1294,8 @@ class FusionAuthClient {
|
|
|
1276
1294
|
.go();
|
|
1277
1295
|
}
|
|
1278
1296
|
/**
|
|
1279
|
-
* Deletes the users with the given
|
|
1280
|
-
* The order of preference is
|
|
1297
|
+
* Deletes the users with the given Ids, or users matching the provided JSON query or queryString.
|
|
1298
|
+
* The order of preference is Ids, query and then queryString, it is recommended to only provide one of the three for the request.
|
|
1281
1299
|
*
|
|
1282
1300
|
* This method can be used to deactivate or permanently delete (hard-delete) users based upon the hardDelete boolean in the request body.
|
|
1283
1301
|
* Using the dryRun parameter you may also request the result of the action without actually deleting or deactivating any users.
|
|
@@ -1295,8 +1313,8 @@ class FusionAuthClient {
|
|
|
1295
1313
|
.go();
|
|
1296
1314
|
}
|
|
1297
1315
|
/**
|
|
1298
|
-
* Deletes the users with the given
|
|
1299
|
-
* The order of preference is
|
|
1316
|
+
* Deletes the users with the given Ids, or users matching the provided JSON query or queryString.
|
|
1317
|
+
* The order of preference is Ids, query and then queryString, it is recommended to only provide one of the three for the request.
|
|
1300
1318
|
*
|
|
1301
1319
|
* This method can be used to deactivate or permanently delete (hard-delete) users based upon the hardDelete boolean in the request body.
|
|
1302
1320
|
* Using the dryRun parameter you may also request the result of the action without actually deleting or deactivating any users.
|
|
@@ -1845,7 +1863,7 @@ class FusionAuthClient {
|
|
|
1845
1863
|
* Modifies a temporal user action by changing the expiration of the action and optionally adding a comment to the
|
|
1846
1864
|
* action.
|
|
1847
1865
|
*
|
|
1848
|
-
* @param {UUID} actionId The Id of the action to modify. This is technically the user action log
|
|
1866
|
+
* @param {UUID} actionId The Id of the action to modify. This is technically the user action log Id.
|
|
1849
1867
|
* @param {ActionRequest} request The request that contains all the information about the modification.
|
|
1850
1868
|
* @returns {Promise<ClientResponse<ActionResponse>>}
|
|
1851
1869
|
*/
|
|
@@ -1871,10 +1889,10 @@ class FusionAuthClient {
|
|
|
1871
1889
|
.go();
|
|
1872
1890
|
}
|
|
1873
1891
|
/**
|
|
1874
|
-
* Updates an
|
|
1892
|
+
* Updates an API key with the given Id.
|
|
1875
1893
|
*
|
|
1876
|
-
* @param {UUID} keyId The Id of the
|
|
1877
|
-
* @param {APIKeyRequest} request The request object that contains all the information needed to create the
|
|
1894
|
+
* @param {UUID} keyId The Id of the API key. If not provided a secure random api key will be generated.
|
|
1895
|
+
* @param {APIKeyRequest} request The request object that contains all the information needed to create the API key.
|
|
1878
1896
|
* @returns {Promise<ClientResponse<APIKeyResponse>>}
|
|
1879
1897
|
*/
|
|
1880
1898
|
patchAPIKey(keyId, request) {
|
|
@@ -1882,7 +1900,7 @@ class FusionAuthClient {
|
|
|
1882
1900
|
.withUri('/api/api-key')
|
|
1883
1901
|
.withUriSegment(keyId)
|
|
1884
1902
|
.withJSONBody(request)
|
|
1885
|
-
.withMethod("
|
|
1903
|
+
.withMethod("PATCH")
|
|
1886
1904
|
.go();
|
|
1887
1905
|
}
|
|
1888
1906
|
/**
|
|
@@ -2426,7 +2444,7 @@ class FusionAuthClient {
|
|
|
2426
2444
|
.go();
|
|
2427
2445
|
}
|
|
2428
2446
|
/**
|
|
2429
|
-
* Removes a user from the family with the given
|
|
2447
|
+
* Removes a user from the family with the given Id.
|
|
2430
2448
|
*
|
|
2431
2449
|
* @param {UUID} familyId The Id of the family to remove the user from.
|
|
2432
2450
|
* @param {UUID} userId The Id of the user to remove from the family.
|
|
@@ -2485,7 +2503,7 @@ class FusionAuthClient {
|
|
|
2485
2503
|
.go();
|
|
2486
2504
|
}
|
|
2487
2505
|
/**
|
|
2488
|
-
* Retrieves an authentication API key for the given
|
|
2506
|
+
* Retrieves an authentication API key for the given Id.
|
|
2489
2507
|
*
|
|
2490
2508
|
* @param {UUID} keyId The Id of the API key to retrieve.
|
|
2491
2509
|
* @returns {Promise<ClientResponse<APIKeyResponse>>}
|
|
@@ -2556,7 +2574,7 @@ class FusionAuthClient {
|
|
|
2556
2574
|
/**
|
|
2557
2575
|
* Retrieves the application for the given Id or all the applications if the Id is null.
|
|
2558
2576
|
*
|
|
2559
|
-
* @param {UUID} applicationId (Optional) The application
|
|
2577
|
+
* @param {UUID} applicationId (Optional) The application Id.
|
|
2560
2578
|
* @returns {Promise<ClientResponse<ApplicationResponse>>}
|
|
2561
2579
|
*/
|
|
2562
2580
|
retrieveApplication(applicationId) {
|
|
@@ -2639,10 +2657,10 @@ class FusionAuthClient {
|
|
|
2639
2657
|
.go();
|
|
2640
2658
|
}
|
|
2641
2659
|
/**
|
|
2642
|
-
* Retrieves the daily active user report between the two instants. If you specify an application
|
|
2660
|
+
* Retrieves the daily active user report between the two instants. If you specify an application Id, it will only
|
|
2643
2661
|
* return the daily active counts for that application.
|
|
2644
2662
|
*
|
|
2645
|
-
* @param {UUID} applicationId (Optional) The application
|
|
2663
|
+
* @param {UUID} applicationId (Optional) The application Id.
|
|
2646
2664
|
* @param {number} start The start instant as UTC milliseconds since Epoch.
|
|
2647
2665
|
* @param {number} end The end instant as UTC milliseconds since Epoch.
|
|
2648
2666
|
* @returns {Promise<ClientResponse<DailyActiveUserReportResponse>>}
|
|
@@ -2657,7 +2675,7 @@ class FusionAuthClient {
|
|
|
2657
2675
|
.go();
|
|
2658
2676
|
}
|
|
2659
2677
|
/**
|
|
2660
|
-
* Retrieves the email template for the given Id. If you don't specify the
|
|
2678
|
+
* Retrieves the email template for the given Id. If you don't specify the Id, this will return all the email templates.
|
|
2661
2679
|
*
|
|
2662
2680
|
* @param {UUID} emailTemplateId (Optional) The Id of the email template.
|
|
2663
2681
|
* @returns {Promise<ClientResponse<EmailTemplateResponse>>}
|
|
@@ -3073,10 +3091,10 @@ class FusionAuthClient {
|
|
|
3073
3091
|
.go();
|
|
3074
3092
|
}
|
|
3075
3093
|
/**
|
|
3076
|
-
* Retrieves the login report between the two instants. If you specify an application
|
|
3094
|
+
* Retrieves the login report between the two instants. If you specify an application Id, it will only return the
|
|
3077
3095
|
* login counts for that application.
|
|
3078
3096
|
*
|
|
3079
|
-
* @param {UUID} applicationId (Optional) The application
|
|
3097
|
+
* @param {UUID} applicationId (Optional) The application Id.
|
|
3080
3098
|
* @param {number} start The start instant as UTC milliseconds since Epoch.
|
|
3081
3099
|
* @param {number} end The end instant as UTC milliseconds since Epoch.
|
|
3082
3100
|
* @returns {Promise<ClientResponse<LoginReportResponse>>}
|
|
@@ -3091,7 +3109,7 @@ class FusionAuthClient {
|
|
|
3091
3109
|
.go();
|
|
3092
3110
|
}
|
|
3093
3111
|
/**
|
|
3094
|
-
* Retrieves the message template for the given Id. If you don't specify the
|
|
3112
|
+
* Retrieves the message template for the given Id. If you don't specify the Id, this will return all the message templates.
|
|
3095
3113
|
*
|
|
3096
3114
|
* @param {UUID} messageTemplateId (Optional) The Id of the message template.
|
|
3097
3115
|
* @returns {Promise<ClientResponse<MessageTemplateResponse>>}
|
|
@@ -3152,10 +3170,10 @@ class FusionAuthClient {
|
|
|
3152
3170
|
.go();
|
|
3153
3171
|
}
|
|
3154
3172
|
/**
|
|
3155
|
-
* Retrieves the monthly active user report between the two instants. If you specify an application
|
|
3173
|
+
* Retrieves the monthly active user report between the two instants. If you specify an application Id, it will only
|
|
3156
3174
|
* return the monthly active counts for that application.
|
|
3157
3175
|
*
|
|
3158
|
-
* @param {UUID} applicationId (Optional) The application
|
|
3176
|
+
* @param {UUID} applicationId (Optional) The application Id.
|
|
3159
3177
|
* @param {number} start The start instant as UTC milliseconds since Epoch.
|
|
3160
3178
|
* @param {number} end The end instant as UTC milliseconds since Epoch.
|
|
3161
3179
|
* @returns {Promise<ClientResponse<MonthlyActiveUserReportResponse>>}
|
|
@@ -3331,7 +3349,7 @@ class FusionAuthClient {
|
|
|
3331
3349
|
.go();
|
|
3332
3350
|
}
|
|
3333
3351
|
/**
|
|
3334
|
-
* Retrieves the user registration for the user with the given Id and the given application
|
|
3352
|
+
* Retrieves the user registration for the user with the given Id and the given application Id.
|
|
3335
3353
|
*
|
|
3336
3354
|
* @param {UUID} userId The Id of the user.
|
|
3337
3355
|
* @param {UUID} applicationId The Id of the application.
|
|
@@ -3346,10 +3364,10 @@ class FusionAuthClient {
|
|
|
3346
3364
|
.go();
|
|
3347
3365
|
}
|
|
3348
3366
|
/**
|
|
3349
|
-
* Retrieves the registration report between the two instants. If you specify an application
|
|
3367
|
+
* Retrieves the registration report between the two instants. If you specify an application Id, it will only return
|
|
3350
3368
|
* the registration counts for that application.
|
|
3351
3369
|
*
|
|
3352
|
-
* @param {UUID} applicationId (Optional) The application
|
|
3370
|
+
* @param {UUID} applicationId (Optional) The application Id.
|
|
3353
3371
|
* @param {number} start The start instant as UTC milliseconds since Epoch.
|
|
3354
3372
|
* @param {number} end The end instant as UTC milliseconds since Epoch.
|
|
3355
3373
|
* @returns {Promise<ClientResponse<RegistrationReportResponse>>}
|
|
@@ -3526,7 +3544,7 @@ class FusionAuthClient {
|
|
|
3526
3544
|
.go();
|
|
3527
3545
|
}
|
|
3528
3546
|
/**
|
|
3529
|
-
* Retrieves the user action for the given Id. If you pass in null for the
|
|
3547
|
+
* Retrieves the user action for the given Id. If you pass in null for the Id, this will return all the user
|
|
3530
3548
|
* actions.
|
|
3531
3549
|
*
|
|
3532
3550
|
* @param {UUID} userActionId (Optional) The Id of the user action.
|
|
@@ -3540,7 +3558,7 @@ class FusionAuthClient {
|
|
|
3540
3558
|
.go();
|
|
3541
3559
|
}
|
|
3542
3560
|
/**
|
|
3543
|
-
* Retrieves the user action reason for the given Id. If you pass in null for the
|
|
3561
|
+
* Retrieves the user action reason for the given Id. If you pass in null for the Id, this will return all the user
|
|
3544
3562
|
* action reasons.
|
|
3545
3563
|
*
|
|
3546
3564
|
* @param {UUID} userActionReasonId (Optional) The Id of the user action reason.
|
|
@@ -3647,8 +3665,8 @@ class FusionAuthClient {
|
|
|
3647
3665
|
*
|
|
3648
3666
|
* This API is useful if you want to build your own login workflow to complete a device grant.
|
|
3649
3667
|
*
|
|
3650
|
-
* @param {string} client_id The client
|
|
3651
|
-
* @param {string} client_secret The client
|
|
3668
|
+
* @param {string} client_id The client Id.
|
|
3669
|
+
* @param {string} client_secret The client Id.
|
|
3652
3670
|
* @param {string} user_code The end-user verification code.
|
|
3653
3671
|
* @returns {Promise<ClientResponse<void>>}
|
|
3654
3672
|
*/
|
|
@@ -3767,11 +3785,11 @@ class FusionAuthClient {
|
|
|
3767
3785
|
.go();
|
|
3768
3786
|
}
|
|
3769
3787
|
/**
|
|
3770
|
-
* Retrieves the login report between the two instants for a particular user by Id. If you specify an application
|
|
3788
|
+
* Retrieves the login report between the two instants for a particular user by Id. If you specify an application Id, it will only return the
|
|
3771
3789
|
* login counts for that application.
|
|
3772
3790
|
*
|
|
3773
|
-
* @param {UUID} applicationId (Optional) The application
|
|
3774
|
-
* @param {UUID} userId The userId
|
|
3791
|
+
* @param {UUID} applicationId (Optional) The application Id.
|
|
3792
|
+
* @param {UUID} userId The userId Id.
|
|
3775
3793
|
* @param {number} start The start instant as UTC milliseconds since Epoch.
|
|
3776
3794
|
* @param {number} end The end instant as UTC milliseconds since Epoch.
|
|
3777
3795
|
* @returns {Promise<ClientResponse<LoginReportResponse>>}
|
|
@@ -3787,11 +3805,11 @@ class FusionAuthClient {
|
|
|
3787
3805
|
.go();
|
|
3788
3806
|
}
|
|
3789
3807
|
/**
|
|
3790
|
-
* Retrieves the login report between the two instants for a particular user by login Id. If you specify an application
|
|
3808
|
+
* Retrieves the login report between the two instants for a particular user by login Id. If you specify an application Id, it will only return the
|
|
3791
3809
|
* login counts for that application.
|
|
3792
3810
|
*
|
|
3793
|
-
* @param {UUID} applicationId (Optional) The application
|
|
3794
|
-
* @param {string} loginId The userId
|
|
3811
|
+
* @param {UUID} applicationId (Optional) The application Id.
|
|
3812
|
+
* @param {string} loginId The userId Id.
|
|
3795
3813
|
* @param {number} start The start instant as UTC milliseconds since Epoch.
|
|
3796
3814
|
* @param {number} end The end instant as UTC milliseconds since Epoch.
|
|
3797
3815
|
* @returns {Promise<ClientResponse<LoginReportResponse>>}
|
|
@@ -3874,7 +3892,7 @@ class FusionAuthClient {
|
|
|
3874
3892
|
.go();
|
|
3875
3893
|
}
|
|
3876
3894
|
/**
|
|
3877
|
-
* Retrieves the webhook for the given Id. If you pass in null for the
|
|
3895
|
+
* Retrieves the webhook for the given Id. If you pass in null for the Id, this will return all the webhooks.
|
|
3878
3896
|
*
|
|
3879
3897
|
* @param {UUID} webhookId (Optional) The Id of the webhook.
|
|
3880
3898
|
* @returns {Promise<ClientResponse<WebhookResponse>>}
|
|
@@ -4123,7 +4141,7 @@ class FusionAuthClient {
|
|
|
4123
4141
|
.go();
|
|
4124
4142
|
}
|
|
4125
4143
|
/**
|
|
4126
|
-
* Retrieves the entities for the given
|
|
4144
|
+
* Retrieves the entities for the given Ids. If any Id is invalid, it is ignored.
|
|
4127
4145
|
*
|
|
4128
4146
|
* @param {Array<string>} ids The entity ids to search for.
|
|
4129
4147
|
* @returns {Promise<ClientResponse<EntitySearchResponse>>}
|
|
@@ -4305,7 +4323,7 @@ class FusionAuthClient {
|
|
|
4305
4323
|
.go();
|
|
4306
4324
|
}
|
|
4307
4325
|
/**
|
|
4308
|
-
* Retrieves the users for the given
|
|
4326
|
+
* Retrieves the users for the given Ids. If any Id is invalid, it is ignored.
|
|
4309
4327
|
*
|
|
4310
4328
|
* @param {Array<string>} ids The user ids to search for.
|
|
4311
4329
|
* @returns {Promise<ClientResponse<SearchResponse>>}
|
|
@@ -4320,9 +4338,9 @@ class FusionAuthClient {
|
|
|
4320
4338
|
.go();
|
|
4321
4339
|
}
|
|
4322
4340
|
/**
|
|
4323
|
-
* Retrieves the users for the given
|
|
4341
|
+
* Retrieves the users for the given Ids. If any Id is invalid, it is ignored.
|
|
4324
4342
|
*
|
|
4325
|
-
* @param {Array<string>} ids The user
|
|
4343
|
+
* @param {Array<string>} ids The user Ids to search for.
|
|
4326
4344
|
* @returns {Promise<ClientResponse<SearchResponse>>}
|
|
4327
4345
|
*/
|
|
4328
4346
|
searchUsersByIds(ids) {
|
|
@@ -4389,7 +4407,7 @@ class FusionAuthClient {
|
|
|
4389
4407
|
.go();
|
|
4390
4408
|
}
|
|
4391
4409
|
/**
|
|
4392
|
-
* Send an email using an email template
|
|
4410
|
+
* Send an email using an email template Id. You can optionally provide <code>requestData</code> to access key value
|
|
4393
4411
|
* pairs in the email template.
|
|
4394
4412
|
*
|
|
4395
4413
|
* @param {UUID} emailTemplateId The Id for the template.
|
|
@@ -4575,16 +4593,16 @@ class FusionAuthClient {
|
|
|
4575
4593
|
.go();
|
|
4576
4594
|
}
|
|
4577
4595
|
/**
|
|
4578
|
-
* Updates an API key
|
|
4596
|
+
* Updates an API key with the given Id.
|
|
4579
4597
|
*
|
|
4580
|
-
* @param {UUID}
|
|
4581
|
-
* @param {APIKeyRequest} request The request
|
|
4598
|
+
* @param {UUID} keyId The Id of the API key to update.
|
|
4599
|
+
* @param {APIKeyRequest} request The request that contains all the new API key information.
|
|
4582
4600
|
* @returns {Promise<ClientResponse<APIKeyResponse>>}
|
|
4583
4601
|
*/
|
|
4584
|
-
updateAPIKey(
|
|
4602
|
+
updateAPIKey(keyId, request) {
|
|
4585
4603
|
return this.start()
|
|
4586
4604
|
.withUri('/api/api-key')
|
|
4587
|
-
.withUriSegment(
|
|
4605
|
+
.withUriSegment(keyId)
|
|
4588
4606
|
.withJSONBody(request)
|
|
4589
4607
|
.withMethod("PUT")
|
|
4590
4608
|
.go();
|
|
@@ -5063,7 +5081,7 @@ class FusionAuthClient {
|
|
|
5063
5081
|
* If you build your own activation form you should validate the user provided code prior to beginning the Authorization grant.
|
|
5064
5082
|
*
|
|
5065
5083
|
* @param {string} user_code The end-user verification code.
|
|
5066
|
-
* @param {string} client_id The client
|
|
5084
|
+
* @param {string} client_id The client Id.
|
|
5067
5085
|
* @returns {Promise<ClientResponse<void>>}
|
|
5068
5086
|
*/
|
|
5069
5087
|
validateDevice(user_code, client_id) {
|
|
@@ -5221,24 +5239,67 @@ class FusionAuthClient {
|
|
|
5221
5239
|
exports.FusionAuthClient = FusionAuthClient;
|
|
5222
5240
|
exports.default = FusionAuthClient;
|
|
5223
5241
|
/**
|
|
5224
|
-
*
|
|
5225
|
-
* Framework - RFC 6749</a>.
|
|
5226
|
-
* <p>
|
|
5227
|
-
* Specific names as defined by <a href="https://tools.ietf.org/html/rfc7591#section-4.1">
|
|
5228
|
-
* OAuth 2.0 Dynamic Client Registration Protocol - RFC 7591 Section 4.1</a>
|
|
5242
|
+
* Available JSON Web Algorithms (JWA) as described in RFC 7518 available for this JWT implementation.
|
|
5229
5243
|
*
|
|
5230
5244
|
* @author Daniel DeGroff
|
|
5231
5245
|
*/
|
|
5232
|
-
var
|
|
5233
|
-
(function (
|
|
5234
|
-
|
|
5235
|
-
|
|
5236
|
-
|
|
5237
|
-
|
|
5238
|
-
|
|
5239
|
-
|
|
5240
|
-
|
|
5241
|
-
|
|
5246
|
+
var Algorithm;
|
|
5247
|
+
(function (Algorithm) {
|
|
5248
|
+
Algorithm["ES256"] = "ES256";
|
|
5249
|
+
Algorithm["ES384"] = "ES384";
|
|
5250
|
+
Algorithm["ES512"] = "ES512";
|
|
5251
|
+
Algorithm["HS256"] = "HS256";
|
|
5252
|
+
Algorithm["HS384"] = "HS384";
|
|
5253
|
+
Algorithm["HS512"] = "HS512";
|
|
5254
|
+
Algorithm["PS256"] = "PS256";
|
|
5255
|
+
Algorithm["PS384"] = "PS384";
|
|
5256
|
+
Algorithm["PS512"] = "PS512";
|
|
5257
|
+
Algorithm["RS256"] = "RS256";
|
|
5258
|
+
Algorithm["RS384"] = "RS384";
|
|
5259
|
+
Algorithm["RS512"] = "RS512";
|
|
5260
|
+
Algorithm["none"] = "none";
|
|
5261
|
+
})(Algorithm = exports.Algorithm || (exports.Algorithm = {}));
|
|
5262
|
+
var LoginIdType;
|
|
5263
|
+
(function (LoginIdType) {
|
|
5264
|
+
LoginIdType["email"] = "email";
|
|
5265
|
+
LoginIdType["username"] = "username";
|
|
5266
|
+
})(LoginIdType = exports.LoginIdType || (exports.LoginIdType = {}));
|
|
5267
|
+
var RegistrationType;
|
|
5268
|
+
(function (RegistrationType) {
|
|
5269
|
+
RegistrationType["basic"] = "basic";
|
|
5270
|
+
RegistrationType["advanced"] = "advanced";
|
|
5271
|
+
})(RegistrationType = exports.RegistrationType || (exports.RegistrationType = {}));
|
|
5272
|
+
var SAMLLogoutBehavior;
|
|
5273
|
+
(function (SAMLLogoutBehavior) {
|
|
5274
|
+
SAMLLogoutBehavior["AllParticipants"] = "AllParticipants";
|
|
5275
|
+
SAMLLogoutBehavior["OnlyOriginator"] = "OnlyOriginator";
|
|
5276
|
+
})(SAMLLogoutBehavior = exports.SAMLLogoutBehavior || (exports.SAMLLogoutBehavior = {}));
|
|
5277
|
+
var XMLSignatureLocation;
|
|
5278
|
+
(function (XMLSignatureLocation) {
|
|
5279
|
+
XMLSignatureLocation["Assertion"] = "Assertion";
|
|
5280
|
+
XMLSignatureLocation["Response"] = "Response";
|
|
5281
|
+
})(XMLSignatureLocation = exports.XMLSignatureLocation || (exports.XMLSignatureLocation = {}));
|
|
5282
|
+
/**
|
|
5283
|
+
* @author Daniel DeGroff
|
|
5284
|
+
*/
|
|
5285
|
+
var ApplicationMultiFactorTrustPolicy;
|
|
5286
|
+
(function (ApplicationMultiFactorTrustPolicy) {
|
|
5287
|
+
ApplicationMultiFactorTrustPolicy["Any"] = "Any";
|
|
5288
|
+
ApplicationMultiFactorTrustPolicy["This"] = "This";
|
|
5289
|
+
ApplicationMultiFactorTrustPolicy["None"] = "None";
|
|
5290
|
+
})(ApplicationMultiFactorTrustPolicy = exports.ApplicationMultiFactorTrustPolicy || (exports.ApplicationMultiFactorTrustPolicy = {}));
|
|
5291
|
+
/**
|
|
5292
|
+
* Used to communicate whether and how authenticator attestation should be delivered to the Relying Party
|
|
5293
|
+
*
|
|
5294
|
+
* @author Spencer Witt
|
|
5295
|
+
*/
|
|
5296
|
+
var AttestationConveyancePreference;
|
|
5297
|
+
(function (AttestationConveyancePreference) {
|
|
5298
|
+
AttestationConveyancePreference["none"] = "none";
|
|
5299
|
+
AttestationConveyancePreference["indirect"] = "indirect";
|
|
5300
|
+
AttestationConveyancePreference["direct"] = "direct";
|
|
5301
|
+
AttestationConveyancePreference["enterprise"] = "enterprise";
|
|
5302
|
+
})(AttestationConveyancePreference = exports.AttestationConveyancePreference || (exports.AttestationConveyancePreference = {}));
|
|
5242
5303
|
/**
|
|
5243
5304
|
* Used to indicate what type of attestation was included in the authenticator response for a given WebAuthn credential at the time it was created
|
|
5244
5305
|
*
|
|
@@ -5252,33 +5313,113 @@ var AttestationType;
|
|
|
5252
5313
|
AttestationType["anonymizationCa"] = "anonymizationCa";
|
|
5253
5314
|
AttestationType["none"] = "none";
|
|
5254
5315
|
})(AttestationType = exports.AttestationType || (exports.AttestationType = {}));
|
|
5255
|
-
var EmailSecurityType;
|
|
5256
|
-
(function (EmailSecurityType) {
|
|
5257
|
-
EmailSecurityType["NONE"] = "NONE";
|
|
5258
|
-
EmailSecurityType["SSL"] = "SSL";
|
|
5259
|
-
EmailSecurityType["TLS"] = "TLS";
|
|
5260
|
-
})(EmailSecurityType = exports.EmailSecurityType || (exports.EmailSecurityType = {}));
|
|
5261
|
-
var UniqueUsernameStrategy;
|
|
5262
|
-
(function (UniqueUsernameStrategy) {
|
|
5263
|
-
UniqueUsernameStrategy["Always"] = "Always";
|
|
5264
|
-
UniqueUsernameStrategy["OnCollision"] = "OnCollision";
|
|
5265
|
-
})(UniqueUsernameStrategy = exports.UniqueUsernameStrategy || (exports.UniqueUsernameStrategy = {}));
|
|
5266
5316
|
/**
|
|
5267
|
-
*
|
|
5268
|
-
|
|
5269
|
-
|
|
5270
|
-
|
|
5271
|
-
|
|
5272
|
-
|
|
5273
|
-
|
|
5317
|
+
* @author Brett Pontarelli
|
|
5318
|
+
*/
|
|
5319
|
+
var AuthenticationThreats;
|
|
5320
|
+
(function (AuthenticationThreats) {
|
|
5321
|
+
AuthenticationThreats["ImpossibleTravel"] = "ImpossibleTravel";
|
|
5322
|
+
})(AuthenticationThreats = exports.AuthenticationThreats || (exports.AuthenticationThreats = {}));
|
|
5323
|
+
/**
|
|
5324
|
+
* Describes the <a href="https://www.w3.org/TR/webauthn-2/#authenticator-attachment-modality">authenticator attachment modality</a>.
|
|
5325
|
+
*
|
|
5326
|
+
* @author Spencer Witt
|
|
5327
|
+
*/
|
|
5328
|
+
var AuthenticatorAttachment;
|
|
5329
|
+
(function (AuthenticatorAttachment) {
|
|
5330
|
+
AuthenticatorAttachment["platform"] = "platform";
|
|
5331
|
+
AuthenticatorAttachment["crossPlatform"] = "crossPlatform";
|
|
5332
|
+
})(AuthenticatorAttachment = exports.AuthenticatorAttachment || (exports.AuthenticatorAttachment = {}));
|
|
5333
|
+
/**
|
|
5334
|
+
* Describes the authenticator attachment modality preference for a WebAuthn workflow. See {@link AuthenticatorAttachment}
|
|
5274
5335
|
*
|
|
5336
|
+
* @author Spencer Witt
|
|
5337
|
+
*/
|
|
5338
|
+
var AuthenticatorAttachmentPreference;
|
|
5339
|
+
(function (AuthenticatorAttachmentPreference) {
|
|
5340
|
+
AuthenticatorAttachmentPreference["any"] = "any";
|
|
5341
|
+
AuthenticatorAttachmentPreference["platform"] = "platform";
|
|
5342
|
+
AuthenticatorAttachmentPreference["crossPlatform"] = "crossPlatform";
|
|
5343
|
+
})(AuthenticatorAttachmentPreference = exports.AuthenticatorAttachmentPreference || (exports.AuthenticatorAttachmentPreference = {}));
|
|
5344
|
+
var TOTPAlgorithm;
|
|
5345
|
+
(function (TOTPAlgorithm) {
|
|
5346
|
+
TOTPAlgorithm["HmacSHA1"] = "HmacSHA1";
|
|
5347
|
+
TOTPAlgorithm["HmacSHA256"] = "HmacSHA256";
|
|
5348
|
+
TOTPAlgorithm["HmacSHA512"] = "HmacSHA512";
|
|
5349
|
+
})(TOTPAlgorithm = exports.TOTPAlgorithm || (exports.TOTPAlgorithm = {}));
|
|
5350
|
+
/**
|
|
5275
5351
|
* @author Daniel DeGroff
|
|
5276
5352
|
*/
|
|
5277
|
-
var
|
|
5278
|
-
(function (
|
|
5279
|
-
|
|
5280
|
-
|
|
5281
|
-
|
|
5353
|
+
var BreachedPasswordStatus;
|
|
5354
|
+
(function (BreachedPasswordStatus) {
|
|
5355
|
+
BreachedPasswordStatus["None"] = "None";
|
|
5356
|
+
BreachedPasswordStatus["ExactMatch"] = "ExactMatch";
|
|
5357
|
+
BreachedPasswordStatus["SubAddressMatch"] = "SubAddressMatch";
|
|
5358
|
+
BreachedPasswordStatus["PasswordOnly"] = "PasswordOnly";
|
|
5359
|
+
BreachedPasswordStatus["CommonPassword"] = "CommonPassword";
|
|
5360
|
+
})(BreachedPasswordStatus = exports.BreachedPasswordStatus || (exports.BreachedPasswordStatus = {}));
|
|
5361
|
+
/**
|
|
5362
|
+
* XML canonicalization method enumeration. This is used for the IdP and SP side of FusionAuth SAML.
|
|
5363
|
+
*
|
|
5364
|
+
* @author Brian Pontarelli
|
|
5365
|
+
*/
|
|
5366
|
+
var CanonicalizationMethod;
|
|
5367
|
+
(function (CanonicalizationMethod) {
|
|
5368
|
+
CanonicalizationMethod["exclusive"] = "exclusive";
|
|
5369
|
+
CanonicalizationMethod["exclusive_with_comments"] = "exclusive_with_comments";
|
|
5370
|
+
CanonicalizationMethod["inclusive"] = "inclusive";
|
|
5371
|
+
CanonicalizationMethod["inclusive_with_comments"] = "inclusive_with_comments";
|
|
5372
|
+
})(CanonicalizationMethod = exports.CanonicalizationMethod || (exports.CanonicalizationMethod = {}));
|
|
5373
|
+
/**
|
|
5374
|
+
* @author Brett Pontarelli
|
|
5375
|
+
*/
|
|
5376
|
+
var CaptchaMethod;
|
|
5377
|
+
(function (CaptchaMethod) {
|
|
5378
|
+
CaptchaMethod["GoogleRecaptchaV2"] = "GoogleRecaptchaV2";
|
|
5379
|
+
CaptchaMethod["GoogleRecaptchaV3"] = "GoogleRecaptchaV3";
|
|
5380
|
+
CaptchaMethod["HCaptcha"] = "HCaptcha";
|
|
5381
|
+
CaptchaMethod["HCaptchaEnterprise"] = "HCaptchaEnterprise";
|
|
5382
|
+
})(CaptchaMethod = exports.CaptchaMethod || (exports.CaptchaMethod = {}));
|
|
5383
|
+
/**
|
|
5384
|
+
* @author Trevor Smith
|
|
5385
|
+
*/
|
|
5386
|
+
var ChangePasswordReason;
|
|
5387
|
+
(function (ChangePasswordReason) {
|
|
5388
|
+
ChangePasswordReason["Administrative"] = "Administrative";
|
|
5389
|
+
ChangePasswordReason["Breached"] = "Breached";
|
|
5390
|
+
ChangePasswordReason["Expired"] = "Expired";
|
|
5391
|
+
ChangePasswordReason["Validation"] = "Validation";
|
|
5392
|
+
})(ChangePasswordReason = exports.ChangePasswordReason || (exports.ChangePasswordReason = {}));
|
|
5393
|
+
/**
|
|
5394
|
+
* @author Brett Guy
|
|
5395
|
+
*/
|
|
5396
|
+
var ClientAuthenticationPolicy;
|
|
5397
|
+
(function (ClientAuthenticationPolicy) {
|
|
5398
|
+
ClientAuthenticationPolicy["Required"] = "Required";
|
|
5399
|
+
ClientAuthenticationPolicy["NotRequired"] = "NotRequired";
|
|
5400
|
+
ClientAuthenticationPolicy["NotRequiredWhenUsingPKCE"] = "NotRequiredWhenUsingPKCE";
|
|
5401
|
+
})(ClientAuthenticationPolicy = exports.ClientAuthenticationPolicy || (exports.ClientAuthenticationPolicy = {}));
|
|
5402
|
+
/**
|
|
5403
|
+
* The types of connectors. This enum is stored as an ordinal on the <code>identities</code> table, order must be maintained.
|
|
5404
|
+
*
|
|
5405
|
+
* @author Trevor Smith
|
|
5406
|
+
*/
|
|
5407
|
+
var ConnectorType;
|
|
5408
|
+
(function (ConnectorType) {
|
|
5409
|
+
ConnectorType["FusionAuth"] = "FusionAuth";
|
|
5410
|
+
ConnectorType["Generic"] = "Generic";
|
|
5411
|
+
ConnectorType["LDAP"] = "LDAP";
|
|
5412
|
+
})(ConnectorType = exports.ConnectorType || (exports.ConnectorType = {}));
|
|
5413
|
+
/**
|
|
5414
|
+
* Models a consent.
|
|
5415
|
+
*
|
|
5416
|
+
* @author Daniel DeGroff
|
|
5417
|
+
*/
|
|
5418
|
+
var ConsentStatus;
|
|
5419
|
+
(function (ConsentStatus) {
|
|
5420
|
+
ConsentStatus["Active"] = "Active";
|
|
5421
|
+
ConsentStatus["Revoked"] = "Revoked";
|
|
5422
|
+
})(ConsentStatus = exports.ConsentStatus || (exports.ConsentStatus = {}));
|
|
5282
5423
|
/**
|
|
5283
5424
|
* Status for content like usernames, profile attributes, etc.
|
|
5284
5425
|
*
|
|
@@ -5290,20 +5431,6 @@ var ContentStatus;
|
|
|
5290
5431
|
ContentStatus["PENDING"] = "PENDING";
|
|
5291
5432
|
ContentStatus["REJECTED"] = "REJECTED";
|
|
5292
5433
|
})(ContentStatus = exports.ContentStatus || (exports.ContentStatus = {}));
|
|
5293
|
-
/**
|
|
5294
|
-
* @author Matthew Altman
|
|
5295
|
-
*/
|
|
5296
|
-
var LogoutBehavior;
|
|
5297
|
-
(function (LogoutBehavior) {
|
|
5298
|
-
LogoutBehavior["RedirectOnly"] = "RedirectOnly";
|
|
5299
|
-
LogoutBehavior["AllApplications"] = "AllApplications";
|
|
5300
|
-
})(LogoutBehavior = exports.LogoutBehavior || (exports.LogoutBehavior = {}));
|
|
5301
|
-
var FamilyRole;
|
|
5302
|
-
(function (FamilyRole) {
|
|
5303
|
-
FamilyRole["Child"] = "Child";
|
|
5304
|
-
FamilyRole["Teen"] = "Teen";
|
|
5305
|
-
FamilyRole["Adult"] = "Adult";
|
|
5306
|
-
})(FamilyRole = exports.FamilyRole || (exports.FamilyRole = {}));
|
|
5307
5434
|
/**
|
|
5308
5435
|
* A number identifying a cryptographic algorithm. Values should be registered with the <a
|
|
5309
5436
|
* href="https://www.iana.org/assignments/cose/cose.xhtml#algorithms">IANA COSE Algorithms registry</a>
|
|
@@ -5323,46 +5450,168 @@ var CoseAlgorithmIdentifier;
|
|
|
5323
5450
|
CoseAlgorithmIdentifier["PS512"] = "SHA-512";
|
|
5324
5451
|
})(CoseAlgorithmIdentifier = exports.CoseAlgorithmIdentifier || (exports.CoseAlgorithmIdentifier = {}));
|
|
5325
5452
|
/**
|
|
5326
|
-
*
|
|
5453
|
+
* COSE Elliptic Curve identifier to determine which elliptic curve to use with a given key
|
|
5454
|
+
*
|
|
5455
|
+
* @author Spencer Witt
|
|
5327
5456
|
*/
|
|
5328
|
-
var
|
|
5329
|
-
(function (
|
|
5330
|
-
|
|
5331
|
-
|
|
5332
|
-
|
|
5333
|
-
|
|
5334
|
-
|
|
5335
|
-
|
|
5457
|
+
var CoseEllipticCurve;
|
|
5458
|
+
(function (CoseEllipticCurve) {
|
|
5459
|
+
CoseEllipticCurve["Reserved"] = "Reserved";
|
|
5460
|
+
CoseEllipticCurve["P256"] = "P256";
|
|
5461
|
+
CoseEllipticCurve["P384"] = "P384";
|
|
5462
|
+
CoseEllipticCurve["P521"] = "P521";
|
|
5463
|
+
CoseEllipticCurve["X25519"] = "X25519";
|
|
5464
|
+
CoseEllipticCurve["X448"] = "X448";
|
|
5465
|
+
CoseEllipticCurve["Ed25519"] = "Ed25519";
|
|
5466
|
+
CoseEllipticCurve["Ed448"] = "Ed448";
|
|
5467
|
+
CoseEllipticCurve["Secp256k1"] = "Secp256k1";
|
|
5468
|
+
})(CoseEllipticCurve = exports.CoseEllipticCurve || (exports.CoseEllipticCurve = {}));
|
|
5336
5469
|
/**
|
|
5470
|
+
* COSE key type
|
|
5471
|
+
*
|
|
5472
|
+
* @author Spencer Witt
|
|
5473
|
+
*/
|
|
5474
|
+
var CoseKeyType;
|
|
5475
|
+
(function (CoseKeyType) {
|
|
5476
|
+
CoseKeyType["Reserved"] = "0";
|
|
5477
|
+
CoseKeyType["OKP"] = "1";
|
|
5478
|
+
CoseKeyType["EC2"] = "2";
|
|
5479
|
+
CoseKeyType["RSA"] = "3";
|
|
5480
|
+
CoseKeyType["Symmetric"] = "4";
|
|
5481
|
+
})(CoseKeyType = exports.CoseKeyType || (exports.CoseKeyType = {}));
|
|
5482
|
+
var DeviceType;
|
|
5483
|
+
(function (DeviceType) {
|
|
5484
|
+
DeviceType["BROWSER"] = "BROWSER";
|
|
5485
|
+
DeviceType["DESKTOP"] = "DESKTOP";
|
|
5486
|
+
DeviceType["LAPTOP"] = "LAPTOP";
|
|
5487
|
+
DeviceType["MOBILE"] = "MOBILE";
|
|
5488
|
+
DeviceType["OTHER"] = "OTHER";
|
|
5489
|
+
DeviceType["SERVER"] = "SERVER";
|
|
5490
|
+
DeviceType["TABLET"] = "TABLET";
|
|
5491
|
+
DeviceType["TV"] = "TV";
|
|
5492
|
+
DeviceType["UNKNOWN"] = "UNKNOWN";
|
|
5493
|
+
})(DeviceType = exports.DeviceType || (exports.DeviceType = {}));
|
|
5494
|
+
var EmailSecurityType;
|
|
5495
|
+
(function (EmailSecurityType) {
|
|
5496
|
+
EmailSecurityType["NONE"] = "NONE";
|
|
5497
|
+
EmailSecurityType["SSL"] = "SSL";
|
|
5498
|
+
EmailSecurityType["TLS"] = "TLS";
|
|
5499
|
+
})(EmailSecurityType = exports.EmailSecurityType || (exports.EmailSecurityType = {}));
|
|
5500
|
+
/**
|
|
5501
|
+
* Event Log Type
|
|
5502
|
+
*
|
|
5337
5503
|
* @author Daniel DeGroff
|
|
5338
5504
|
*/
|
|
5339
|
-
var
|
|
5340
|
-
(function (
|
|
5341
|
-
|
|
5342
|
-
|
|
5343
|
-
|
|
5505
|
+
var EventLogType;
|
|
5506
|
+
(function (EventLogType) {
|
|
5507
|
+
EventLogType["Information"] = "Information";
|
|
5508
|
+
EventLogType["Debug"] = "Debug";
|
|
5509
|
+
EventLogType["Error"] = "Error";
|
|
5510
|
+
})(EventLogType = exports.EventLogType || (exports.EventLogType = {}));
|
|
5344
5511
|
/**
|
|
5345
|
-
*
|
|
5512
|
+
* Models the event types that FusionAuth produces.
|
|
5513
|
+
*
|
|
5514
|
+
* @author Brian Pontarelli
|
|
5346
5515
|
*/
|
|
5347
|
-
var
|
|
5348
|
-
(function (
|
|
5349
|
-
|
|
5350
|
-
|
|
5351
|
-
|
|
5352
|
-
|
|
5353
|
-
|
|
5354
|
-
|
|
5355
|
-
|
|
5356
|
-
|
|
5357
|
-
|
|
5358
|
-
|
|
5359
|
-
|
|
5360
|
-
|
|
5361
|
-
|
|
5362
|
-
|
|
5363
|
-
|
|
5364
|
-
|
|
5365
|
-
|
|
5516
|
+
var EventType;
|
|
5517
|
+
(function (EventType) {
|
|
5518
|
+
EventType["JWTPublicKeyUpdate"] = "jwt.public-key.update";
|
|
5519
|
+
EventType["JWTRefreshTokenRevoke"] = "jwt.refresh-token.revoke";
|
|
5520
|
+
EventType["JWTRefresh"] = "jwt.refresh";
|
|
5521
|
+
EventType["AuditLogCreate"] = "audit-log.create";
|
|
5522
|
+
EventType["EventLogCreate"] = "event-log.create";
|
|
5523
|
+
EventType["KickstartSuccess"] = "kickstart.success";
|
|
5524
|
+
EventType["GroupCreate"] = "group.create";
|
|
5525
|
+
EventType["GroupCreateComplete"] = "group.create.complete";
|
|
5526
|
+
EventType["GroupDelete"] = "group.delete";
|
|
5527
|
+
EventType["GroupDeleteComplete"] = "group.delete.complete";
|
|
5528
|
+
EventType["GroupMemberAdd"] = "group.member.add";
|
|
5529
|
+
EventType["GroupMemberAddComplete"] = "group.member.add.complete";
|
|
5530
|
+
EventType["GroupMemberRemove"] = "group.member.remove";
|
|
5531
|
+
EventType["GroupMemberRemoveComplete"] = "group.member.remove.complete";
|
|
5532
|
+
EventType["GroupMemberUpdate"] = "group.member.update";
|
|
5533
|
+
EventType["GroupMemberUpdateComplete"] = "group.member.update.complete";
|
|
5534
|
+
EventType["GroupUpdate"] = "group.update";
|
|
5535
|
+
EventType["GroupUpdateComplete"] = "group.update.complete";
|
|
5536
|
+
EventType["UserAction"] = "user.action";
|
|
5537
|
+
EventType["UserBulkCreate"] = "user.bulk.create";
|
|
5538
|
+
EventType["UserCreate"] = "user.create";
|
|
5539
|
+
EventType["UserCreateComplete"] = "user.create.complete";
|
|
5540
|
+
EventType["UserDeactivate"] = "user.deactivate";
|
|
5541
|
+
EventType["UserDelete"] = "user.delete";
|
|
5542
|
+
EventType["UserDeleteComplete"] = "user.delete.complete";
|
|
5543
|
+
EventType["UserEmailUpdate"] = "user.email.update";
|
|
5544
|
+
EventType["UserEmailVerified"] = "user.email.verified";
|
|
5545
|
+
EventType["UserIdentityProviderLink"] = "user.identity-provider.link";
|
|
5546
|
+
EventType["UserIdentityProviderUnlink"] = "user.identity-provider.unlink";
|
|
5547
|
+
EventType["UserLoginIdDuplicateOnCreate"] = "user.loginId.duplicate.create";
|
|
5548
|
+
EventType["UserLoginIdDuplicateOnUpdate"] = "user.loginId.duplicate.update";
|
|
5549
|
+
EventType["UserLoginFailed"] = "user.login.failed";
|
|
5550
|
+
EventType["UserLoginNewDevice"] = "user.login.new-device";
|
|
5551
|
+
EventType["UserLoginSuccess"] = "user.login.success";
|
|
5552
|
+
EventType["UserLoginSuspicious"] = "user.login.suspicious";
|
|
5553
|
+
EventType["UserPasswordBreach"] = "user.password.breach";
|
|
5554
|
+
EventType["UserPasswordResetSend"] = "user.password.reset.send";
|
|
5555
|
+
EventType["UserPasswordResetStart"] = "user.password.reset.start";
|
|
5556
|
+
EventType["UserPasswordResetSuccess"] = "user.password.reset.success";
|
|
5557
|
+
EventType["UserPasswordUpdate"] = "user.password.update";
|
|
5558
|
+
EventType["UserReactivate"] = "user.reactivate";
|
|
5559
|
+
EventType["UserRegistrationCreate"] = "user.registration.create";
|
|
5560
|
+
EventType["UserRegistrationCreateComplete"] = "user.registration.create.complete";
|
|
5561
|
+
EventType["UserRegistrationDelete"] = "user.registration.delete";
|
|
5562
|
+
EventType["UserRegistrationDeleteComplete"] = "user.registration.delete.complete";
|
|
5563
|
+
EventType["UserRegistrationUpdate"] = "user.registration.update";
|
|
5564
|
+
EventType["UserRegistrationUpdateComplete"] = "user.registration.update.complete";
|
|
5565
|
+
EventType["UserRegistrationVerified"] = "user.registration.verified";
|
|
5566
|
+
EventType["UserTwoFactorMethodAdd"] = "user.two-factor.method.add";
|
|
5567
|
+
EventType["UserTwoFactorMethodRemove"] = "user.two-factor.method.remove";
|
|
5568
|
+
EventType["UserUpdate"] = "user.update";
|
|
5569
|
+
EventType["UserUpdateComplete"] = "user.update.complete";
|
|
5570
|
+
EventType["Test"] = "test";
|
|
5571
|
+
})(EventType = exports.EventType || (exports.EventType = {}));
|
|
5572
|
+
/**
|
|
5573
|
+
* @author Brian Pontarelli
|
|
5574
|
+
*/
|
|
5575
|
+
var ExpiryUnit;
|
|
5576
|
+
(function (ExpiryUnit) {
|
|
5577
|
+
ExpiryUnit["MINUTES"] = "MINUTES";
|
|
5578
|
+
ExpiryUnit["HOURS"] = "HOURS";
|
|
5579
|
+
ExpiryUnit["DAYS"] = "DAYS";
|
|
5580
|
+
ExpiryUnit["WEEKS"] = "WEEKS";
|
|
5581
|
+
ExpiryUnit["MONTHS"] = "MONTHS";
|
|
5582
|
+
ExpiryUnit["YEARS"] = "YEARS";
|
|
5583
|
+
})(ExpiryUnit = exports.ExpiryUnit || (exports.ExpiryUnit = {}));
|
|
5584
|
+
var FamilyRole;
|
|
5585
|
+
(function (FamilyRole) {
|
|
5586
|
+
FamilyRole["Child"] = "Child";
|
|
5587
|
+
FamilyRole["Teen"] = "Teen";
|
|
5588
|
+
FamilyRole["Adult"] = "Adult";
|
|
5589
|
+
})(FamilyRole = exports.FamilyRole || (exports.FamilyRole = {}));
|
|
5590
|
+
/**
|
|
5591
|
+
* @author Daniel DeGroff
|
|
5592
|
+
*/
|
|
5593
|
+
var FormControl;
|
|
5594
|
+
(function (FormControl) {
|
|
5595
|
+
FormControl["checkbox"] = "checkbox";
|
|
5596
|
+
FormControl["number"] = "number";
|
|
5597
|
+
FormControl["password"] = "password";
|
|
5598
|
+
FormControl["radio"] = "radio";
|
|
5599
|
+
FormControl["select"] = "select";
|
|
5600
|
+
FormControl["textarea"] = "textarea";
|
|
5601
|
+
FormControl["text"] = "text";
|
|
5602
|
+
})(FormControl = exports.FormControl || (exports.FormControl = {}));
|
|
5603
|
+
/**
|
|
5604
|
+
* @author Daniel DeGroff
|
|
5605
|
+
*/
|
|
5606
|
+
var FormDataType;
|
|
5607
|
+
(function (FormDataType) {
|
|
5608
|
+
FormDataType["bool"] = "bool";
|
|
5609
|
+
FormDataType["consent"] = "consent";
|
|
5610
|
+
FormDataType["date"] = "date";
|
|
5611
|
+
FormDataType["email"] = "email";
|
|
5612
|
+
FormDataType["number"] = "number";
|
|
5613
|
+
FormDataType["string"] = "string";
|
|
5614
|
+
})(FormDataType = exports.FormDataType || (exports.FormDataType = {}));
|
|
5366
5615
|
/**
|
|
5367
5616
|
* @author Daniel DeGroff
|
|
5368
5617
|
*/
|
|
@@ -5372,51 +5621,34 @@ var FormFieldAdminPolicy;
|
|
|
5372
5621
|
FormFieldAdminPolicy["View"] = "View";
|
|
5373
5622
|
})(FormFieldAdminPolicy = exports.FormFieldAdminPolicy || (exports.FormFieldAdminPolicy = {}));
|
|
5374
5623
|
/**
|
|
5375
|
-
*
|
|
5376
|
-
*
|
|
5377
|
-
* @author Spencer Witt
|
|
5378
|
-
*/
|
|
5379
|
-
var AttestationConveyancePreference;
|
|
5380
|
-
(function (AttestationConveyancePreference) {
|
|
5381
|
-
AttestationConveyancePreference["none"] = "none";
|
|
5382
|
-
AttestationConveyancePreference["indirect"] = "indirect";
|
|
5383
|
-
AttestationConveyancePreference["direct"] = "direct";
|
|
5384
|
-
AttestationConveyancePreference["enterprise"] = "enterprise";
|
|
5385
|
-
})(AttestationConveyancePreference = exports.AttestationConveyancePreference || (exports.AttestationConveyancePreference = {}));
|
|
5386
|
-
/**
|
|
5387
|
-
* The possible result states of a webhook event. This tracks the success of the overall webhook transaction according to the {@link TransactionType}
|
|
5388
|
-
* and configured webhooks.
|
|
5389
|
-
*
|
|
5390
|
-
* @author Spencer Witt
|
|
5391
|
-
*/
|
|
5392
|
-
var WebhookEventResult;
|
|
5393
|
-
(function (WebhookEventResult) {
|
|
5394
|
-
WebhookEventResult["Failed"] = "Failed";
|
|
5395
|
-
WebhookEventResult["Running"] = "Running";
|
|
5396
|
-
WebhookEventResult["Succeeded"] = "Succeeded";
|
|
5397
|
-
})(WebhookEventResult = exports.WebhookEventResult || (exports.WebhookEventResult = {}));
|
|
5398
|
-
/**
|
|
5399
|
-
* Identifies the WebAuthn workflow. This will affect the parameters used for credential creation
|
|
5400
|
-
* and request based on the Tenant configuration.
|
|
5401
|
-
*
|
|
5402
|
-
* @author Spencer Witt
|
|
5624
|
+
* @author Daniel DeGroff
|
|
5403
5625
|
*/
|
|
5404
|
-
var
|
|
5405
|
-
(function (
|
|
5406
|
-
|
|
5407
|
-
|
|
5408
|
-
|
|
5409
|
-
|
|
5626
|
+
var FormType;
|
|
5627
|
+
(function (FormType) {
|
|
5628
|
+
FormType["registration"] = "registration";
|
|
5629
|
+
FormType["adminRegistration"] = "adminRegistration";
|
|
5630
|
+
FormType["adminUser"] = "adminUser";
|
|
5631
|
+
FormType["selfServiceUser"] = "selfServiceUser";
|
|
5632
|
+
})(FormType = exports.FormType || (exports.FormType = {}));
|
|
5410
5633
|
/**
|
|
5411
|
-
*
|
|
5634
|
+
* Authorization Grant types as defined by the <a href="https://tools.ietf.org/html/rfc6749">The OAuth 2.0 Authorization
|
|
5635
|
+
* Framework - RFC 6749</a>.
|
|
5636
|
+
* <p>
|
|
5637
|
+
* Specific names as defined by <a href="https://tools.ietf.org/html/rfc7591#section-4.1">
|
|
5638
|
+
* OAuth 2.0 Dynamic Client Registration Protocol - RFC 7591 Section 4.1</a>
|
|
5412
5639
|
*
|
|
5413
5640
|
* @author Daniel DeGroff
|
|
5414
5641
|
*/
|
|
5415
|
-
var
|
|
5416
|
-
(function (
|
|
5417
|
-
|
|
5418
|
-
|
|
5419
|
-
|
|
5642
|
+
var GrantType;
|
|
5643
|
+
(function (GrantType) {
|
|
5644
|
+
GrantType["authorization_code"] = "authorization_code";
|
|
5645
|
+
GrantType["implicit"] = "implicit";
|
|
5646
|
+
GrantType["password"] = "password";
|
|
5647
|
+
GrantType["client_credentials"] = "client_credentials";
|
|
5648
|
+
GrantType["refresh_token"] = "refresh_token";
|
|
5649
|
+
GrantType["unknown"] = "unknown";
|
|
5650
|
+
GrantType["device_code"] = "urn:ietf:params:oauth:grant-type:device_code";
|
|
5651
|
+
})(GrantType = exports.GrantType || (exports.GrantType = {}));
|
|
5420
5652
|
/**
|
|
5421
5653
|
* @author Daniel DeGroff
|
|
5422
5654
|
*/
|
|
@@ -5431,143 +5663,151 @@ var HTTPMethod;
|
|
|
5431
5663
|
HTTPMethod["PATCH"] = "PATCH";
|
|
5432
5664
|
})(HTTPMethod = exports.HTTPMethod || (exports.HTTPMethod = {}));
|
|
5433
5665
|
/**
|
|
5434
|
-
* @author
|
|
5435
|
-
*/
|
|
5436
|
-
var UserState;
|
|
5437
|
-
(function (UserState) {
|
|
5438
|
-
UserState["Authenticated"] = "Authenticated";
|
|
5439
|
-
UserState["AuthenticatedNotRegistered"] = "AuthenticatedNotRegistered";
|
|
5440
|
-
UserState["AuthenticatedNotVerified"] = "AuthenticatedNotVerified";
|
|
5441
|
-
UserState["AuthenticatedRegistrationNotVerified"] = "AuthenticatedRegistrationNotVerified";
|
|
5442
|
-
})(UserState = exports.UserState || (exports.UserState = {}));
|
|
5443
|
-
/**
|
|
5444
|
-
* @author Daniel DeGroff
|
|
5666
|
+
* @author Brett Guy
|
|
5445
5667
|
*/
|
|
5446
|
-
var
|
|
5447
|
-
(function (
|
|
5448
|
-
|
|
5449
|
-
|
|
5450
|
-
|
|
5451
|
-
})(RefreshTokenExpirationPolicy = exports.RefreshTokenExpirationPolicy || (exports.RefreshTokenExpirationPolicy = {}));
|
|
5668
|
+
var IPAccessControlEntryAction;
|
|
5669
|
+
(function (IPAccessControlEntryAction) {
|
|
5670
|
+
IPAccessControlEntryAction["Allow"] = "Allow";
|
|
5671
|
+
IPAccessControlEntryAction["Block"] = "Block";
|
|
5672
|
+
})(IPAccessControlEntryAction = exports.IPAccessControlEntryAction || (exports.IPAccessControlEntryAction = {}));
|
|
5452
5673
|
/**
|
|
5453
|
-
* The
|
|
5674
|
+
* The IdP behavior when no user link has been made yet.
|
|
5454
5675
|
*
|
|
5455
5676
|
* @author Daniel DeGroff
|
|
5456
5677
|
*/
|
|
5457
|
-
var
|
|
5458
|
-
(function (
|
|
5459
|
-
|
|
5460
|
-
|
|
5461
|
-
|
|
5462
|
-
|
|
5678
|
+
var IdentityProviderLinkingStrategy;
|
|
5679
|
+
(function (IdentityProviderLinkingStrategy) {
|
|
5680
|
+
IdentityProviderLinkingStrategy["CreatePendingLink"] = "CreatePendingLink";
|
|
5681
|
+
IdentityProviderLinkingStrategy["Disabled"] = "Disabled";
|
|
5682
|
+
IdentityProviderLinkingStrategy["LinkAnonymously"] = "LinkAnonymously";
|
|
5683
|
+
IdentityProviderLinkingStrategy["LinkByEmail"] = "LinkByEmail";
|
|
5684
|
+
IdentityProviderLinkingStrategy["LinkByEmailForExistingUser"] = "LinkByEmailForExistingUser";
|
|
5685
|
+
IdentityProviderLinkingStrategy["LinkByUsername"] = "LinkByUsername";
|
|
5686
|
+
IdentityProviderLinkingStrategy["LinkByUsernameForExistingUser"] = "LinkByUsernameForExistingUser";
|
|
5687
|
+
IdentityProviderLinkingStrategy["Unsupported"] = "Unsupported";
|
|
5688
|
+
})(IdentityProviderLinkingStrategy = exports.IdentityProviderLinkingStrategy || (exports.IdentityProviderLinkingStrategy = {}));
|
|
5463
5689
|
/**
|
|
5464
|
-
* @author
|
|
5690
|
+
* @author Brett Pontarelli
|
|
5465
5691
|
*/
|
|
5466
|
-
var
|
|
5467
|
-
(function (
|
|
5468
|
-
|
|
5469
|
-
|
|
5470
|
-
|
|
5471
|
-
|
|
5472
|
-
|
|
5473
|
-
|
|
5692
|
+
var IdentityProviderLoginMethod;
|
|
5693
|
+
(function (IdentityProviderLoginMethod) {
|
|
5694
|
+
IdentityProviderLoginMethod["UsePopup"] = "UsePopup";
|
|
5695
|
+
IdentityProviderLoginMethod["UseRedirect"] = "UseRedirect";
|
|
5696
|
+
IdentityProviderLoginMethod["UseVendorJavaScript"] = "UseVendorJavaScript";
|
|
5697
|
+
})(IdentityProviderLoginMethod = exports.IdentityProviderLoginMethod || (exports.IdentityProviderLoginMethod = {}));
|
|
5698
|
+
var ClientAuthenticationMethod;
|
|
5699
|
+
(function (ClientAuthenticationMethod) {
|
|
5700
|
+
ClientAuthenticationMethod["none"] = "none";
|
|
5701
|
+
ClientAuthenticationMethod["client_secret_basic"] = "client_secret_basic";
|
|
5702
|
+
ClientAuthenticationMethod["client_secret_post"] = "client_secret_post";
|
|
5703
|
+
})(ClientAuthenticationMethod = exports.ClientAuthenticationMethod || (exports.ClientAuthenticationMethod = {}));
|
|
5474
5704
|
/**
|
|
5475
5705
|
* @author Daniel DeGroff
|
|
5476
5706
|
*/
|
|
5477
|
-
var
|
|
5478
|
-
(function (
|
|
5479
|
-
|
|
5480
|
-
|
|
5481
|
-
|
|
5482
|
-
|
|
5483
|
-
|
|
5484
|
-
|
|
5485
|
-
|
|
5486
|
-
|
|
5487
|
-
|
|
5488
|
-
|
|
5489
|
-
|
|
5490
|
-
|
|
5491
|
-
|
|
5492
|
-
|
|
5493
|
-
|
|
5494
|
-
|
|
5495
|
-
|
|
5496
|
-
|
|
5497
|
-
|
|
5707
|
+
var IdentityProviderType;
|
|
5708
|
+
(function (IdentityProviderType) {
|
|
5709
|
+
IdentityProviderType["Apple"] = "Apple";
|
|
5710
|
+
IdentityProviderType["EpicGames"] = "EpicGames";
|
|
5711
|
+
IdentityProviderType["ExternalJWT"] = "ExternalJWT";
|
|
5712
|
+
IdentityProviderType["Facebook"] = "Facebook";
|
|
5713
|
+
IdentityProviderType["Google"] = "Google";
|
|
5714
|
+
IdentityProviderType["HYPR"] = "HYPR";
|
|
5715
|
+
IdentityProviderType["LinkedIn"] = "LinkedIn";
|
|
5716
|
+
IdentityProviderType["Nintendo"] = "Nintendo";
|
|
5717
|
+
IdentityProviderType["OpenIDConnect"] = "OpenIDConnect";
|
|
5718
|
+
IdentityProviderType["SAMLv2"] = "SAMLv2";
|
|
5719
|
+
IdentityProviderType["SAMLv2IdPInitiated"] = "SAMLv2IdPInitiated";
|
|
5720
|
+
IdentityProviderType["SonyPSN"] = "SonyPSN";
|
|
5721
|
+
IdentityProviderType["Steam"] = "Steam";
|
|
5722
|
+
IdentityProviderType["Twitch"] = "Twitch";
|
|
5723
|
+
IdentityProviderType["Twitter"] = "Twitter";
|
|
5724
|
+
IdentityProviderType["Xbox"] = "Xbox";
|
|
5725
|
+
})(IdentityProviderType = exports.IdentityProviderType || (exports.IdentityProviderType = {}));
|
|
5726
|
+
var KeyAlgorithm;
|
|
5727
|
+
(function (KeyAlgorithm) {
|
|
5728
|
+
KeyAlgorithm["ES256"] = "ES256";
|
|
5729
|
+
KeyAlgorithm["ES384"] = "ES384";
|
|
5730
|
+
KeyAlgorithm["ES512"] = "ES512";
|
|
5731
|
+
KeyAlgorithm["HS256"] = "HS256";
|
|
5732
|
+
KeyAlgorithm["HS384"] = "HS384";
|
|
5733
|
+
KeyAlgorithm["HS512"] = "HS512";
|
|
5734
|
+
KeyAlgorithm["RS256"] = "RS256";
|
|
5735
|
+
KeyAlgorithm["RS384"] = "RS384";
|
|
5736
|
+
KeyAlgorithm["RS512"] = "RS512";
|
|
5737
|
+
})(KeyAlgorithm = exports.KeyAlgorithm || (exports.KeyAlgorithm = {}));
|
|
5738
|
+
var KeyType;
|
|
5739
|
+
(function (KeyType) {
|
|
5740
|
+
KeyType["EC"] = "EC";
|
|
5741
|
+
KeyType["RSA"] = "RSA";
|
|
5742
|
+
KeyType["HMAC"] = "HMAC";
|
|
5743
|
+
})(KeyType = exports.KeyType || (exports.KeyType = {}));
|
|
5498
5744
|
/**
|
|
5499
|
-
* The
|
|
5745
|
+
* The use type of a key.
|
|
5500
5746
|
*
|
|
5501
|
-
* @author
|
|
5747
|
+
* @author Daniel DeGroff
|
|
5502
5748
|
*/
|
|
5503
|
-
var
|
|
5504
|
-
(function (
|
|
5505
|
-
|
|
5506
|
-
|
|
5507
|
-
|
|
5508
|
-
})(
|
|
5749
|
+
var KeyUse;
|
|
5750
|
+
(function (KeyUse) {
|
|
5751
|
+
KeyUse["SignOnly"] = "SignOnly";
|
|
5752
|
+
KeyUse["SignAndVerify"] = "SignAndVerify";
|
|
5753
|
+
KeyUse["VerifyOnly"] = "VerifyOnly";
|
|
5754
|
+
})(KeyUse = exports.KeyUse || (exports.KeyUse = {}));
|
|
5755
|
+
var LDAPSecurityMethod;
|
|
5756
|
+
(function (LDAPSecurityMethod) {
|
|
5757
|
+
LDAPSecurityMethod["None"] = "None";
|
|
5758
|
+
LDAPSecurityMethod["LDAPS"] = "LDAPS";
|
|
5759
|
+
LDAPSecurityMethod["StartTLS"] = "StartTLS";
|
|
5760
|
+
})(LDAPSecurityMethod = exports.LDAPSecurityMethod || (exports.LDAPSecurityMethod = {}));
|
|
5509
5761
|
/**
|
|
5510
|
-
* Event Log Type
|
|
5511
|
-
*
|
|
5512
5762
|
* @author Daniel DeGroff
|
|
5513
5763
|
*/
|
|
5514
|
-
var
|
|
5515
|
-
(function (
|
|
5516
|
-
|
|
5517
|
-
|
|
5518
|
-
|
|
5519
|
-
})(EventLogType = exports.EventLogType || (exports.EventLogType = {}));
|
|
5764
|
+
var LambdaEngineType;
|
|
5765
|
+
(function (LambdaEngineType) {
|
|
5766
|
+
LambdaEngineType["GraalJS"] = "GraalJS";
|
|
5767
|
+
LambdaEngineType["Nashorn"] = "Nashorn";
|
|
5768
|
+
})(LambdaEngineType = exports.LambdaEngineType || (exports.LambdaEngineType = {}));
|
|
5520
5769
|
/**
|
|
5521
|
-
* The
|
|
5770
|
+
* The types of lambdas that indicate how they are invoked by FusionAuth.
|
|
5522
5771
|
*
|
|
5523
5772
|
* @author Brian Pontarelli
|
|
5524
5773
|
*/
|
|
5525
|
-
var
|
|
5526
|
-
(function (
|
|
5527
|
-
|
|
5528
|
-
|
|
5529
|
-
|
|
5530
|
-
|
|
5531
|
-
|
|
5532
|
-
|
|
5533
|
-
|
|
5534
|
-
|
|
5535
|
-
|
|
5536
|
-
|
|
5537
|
-
|
|
5538
|
-
|
|
5539
|
-
|
|
5540
|
-
|
|
5541
|
-
|
|
5542
|
-
|
|
5543
|
-
|
|
5544
|
-
|
|
5545
|
-
|
|
5546
|
-
|
|
5547
|
-
|
|
5548
|
-
|
|
5549
|
-
|
|
5550
|
-
|
|
5551
|
-
|
|
5552
|
-
|
|
5553
|
-
|
|
5554
|
-
* @author Trevor Smith
|
|
5555
|
-
*/
|
|
5556
|
-
var ConnectorType;
|
|
5557
|
-
(function (ConnectorType) {
|
|
5558
|
-
ConnectorType["FusionAuth"] = "FusionAuth";
|
|
5559
|
-
ConnectorType["Generic"] = "Generic";
|
|
5560
|
-
ConnectorType["LDAP"] = "LDAP";
|
|
5561
|
-
})(ConnectorType = exports.ConnectorType || (exports.ConnectorType = {}));
|
|
5774
|
+
var LambdaType;
|
|
5775
|
+
(function (LambdaType) {
|
|
5776
|
+
LambdaType["JWTPopulate"] = "JWTPopulate";
|
|
5777
|
+
LambdaType["OpenIDReconcile"] = "OpenIDReconcile";
|
|
5778
|
+
LambdaType["SAMLv2Reconcile"] = "SAMLv2Reconcile";
|
|
5779
|
+
LambdaType["SAMLv2Populate"] = "SAMLv2Populate";
|
|
5780
|
+
LambdaType["AppleReconcile"] = "AppleReconcile";
|
|
5781
|
+
LambdaType["ExternalJWTReconcile"] = "ExternalJWTReconcile";
|
|
5782
|
+
LambdaType["FacebookReconcile"] = "FacebookReconcile";
|
|
5783
|
+
LambdaType["GoogleReconcile"] = "GoogleReconcile";
|
|
5784
|
+
LambdaType["HYPRReconcile"] = "HYPRReconcile";
|
|
5785
|
+
LambdaType["TwitterReconcile"] = "TwitterReconcile";
|
|
5786
|
+
LambdaType["LDAPConnectorReconcile"] = "LDAPConnectorReconcile";
|
|
5787
|
+
LambdaType["LinkedInReconcile"] = "LinkedInReconcile";
|
|
5788
|
+
LambdaType["EpicGamesReconcile"] = "EpicGamesReconcile";
|
|
5789
|
+
LambdaType["NintendoReconcile"] = "NintendoReconcile";
|
|
5790
|
+
LambdaType["SonyPSNReconcile"] = "SonyPSNReconcile";
|
|
5791
|
+
LambdaType["SteamReconcile"] = "SteamReconcile";
|
|
5792
|
+
LambdaType["TwitchReconcile"] = "TwitchReconcile";
|
|
5793
|
+
LambdaType["XboxReconcile"] = "XboxReconcile";
|
|
5794
|
+
LambdaType["ClientCredentialsJWTPopulate"] = "ClientCredentialsJWTPopulate";
|
|
5795
|
+
LambdaType["SCIMServerGroupRequestConverter"] = "SCIMServerGroupRequestConverter";
|
|
5796
|
+
LambdaType["SCIMServerGroupResponseConverter"] = "SCIMServerGroupResponseConverter";
|
|
5797
|
+
LambdaType["SCIMServerUserRequestConverter"] = "SCIMServerUserRequestConverter";
|
|
5798
|
+
LambdaType["SCIMServerUserResponseConverter"] = "SCIMServerUserResponseConverter";
|
|
5799
|
+
LambdaType["SelfServiceRegistrationValidation"] = "SelfServiceRegistrationValidation";
|
|
5800
|
+
LambdaType["UserInfoPopulate"] = "UserInfoPopulate";
|
|
5801
|
+
LambdaType["LoginValidation"] = "LoginValidation";
|
|
5802
|
+
})(LambdaType = exports.LambdaType || (exports.LambdaType = {}));
|
|
5562
5803
|
/**
|
|
5563
|
-
* @author
|
|
5804
|
+
* @author Matthew Altman
|
|
5564
5805
|
*/
|
|
5565
|
-
var
|
|
5566
|
-
(function (
|
|
5567
|
-
|
|
5568
|
-
|
|
5569
|
-
|
|
5570
|
-
})(ProofKeyForCodeExchangePolicy = exports.ProofKeyForCodeExchangePolicy || (exports.ProofKeyForCodeExchangePolicy = {}));
|
|
5806
|
+
var LogoutBehavior;
|
|
5807
|
+
(function (LogoutBehavior) {
|
|
5808
|
+
LogoutBehavior["RedirectOnly"] = "RedirectOnly";
|
|
5809
|
+
LogoutBehavior["AllApplications"] = "AllApplications";
|
|
5810
|
+
})(LogoutBehavior = exports.LogoutBehavior || (exports.LogoutBehavior = {}));
|
|
5571
5811
|
/**
|
|
5572
5812
|
* @author Mikey Sleevi
|
|
5573
5813
|
*/
|
|
@@ -5576,77 +5816,34 @@ var MessageType;
|
|
|
5576
5816
|
MessageType["SMS"] = "SMS";
|
|
5577
5817
|
})(MessageType = exports.MessageType || (exports.MessageType = {}));
|
|
5578
5818
|
/**
|
|
5579
|
-
*
|
|
5580
|
-
* discoverable credentials</a> (formerly known as "resident keys")
|
|
5581
|
-
*
|
|
5582
|
-
* @author Spencer Witt
|
|
5583
|
-
*/
|
|
5584
|
-
var ResidentKeyRequirement;
|
|
5585
|
-
(function (ResidentKeyRequirement) {
|
|
5586
|
-
ResidentKeyRequirement["discouraged"] = "discouraged";
|
|
5587
|
-
ResidentKeyRequirement["preferred"] = "preferred";
|
|
5588
|
-
ResidentKeyRequirement["required"] = "required";
|
|
5589
|
-
})(ResidentKeyRequirement = exports.ResidentKeyRequirement || (exports.ResidentKeyRequirement = {}));
|
|
5590
|
-
/**
|
|
5591
|
-
* @author Trevor Smith
|
|
5819
|
+
* @author Brett Guy
|
|
5592
5820
|
*/
|
|
5593
|
-
var
|
|
5594
|
-
(function (
|
|
5595
|
-
|
|
5596
|
-
|
|
5597
|
-
|
|
5598
|
-
|
|
5599
|
-
})(ChangePasswordReason = exports.ChangePasswordReason || (exports.ChangePasswordReason = {}));
|
|
5600
|
-
var LDAPSecurityMethod;
|
|
5601
|
-
(function (LDAPSecurityMethod) {
|
|
5602
|
-
LDAPSecurityMethod["None"] = "None";
|
|
5603
|
-
LDAPSecurityMethod["LDAPS"] = "LDAPS";
|
|
5604
|
-
LDAPSecurityMethod["StartTLS"] = "StartTLS";
|
|
5605
|
-
})(LDAPSecurityMethod = exports.LDAPSecurityMethod || (exports.LDAPSecurityMethod = {}));
|
|
5821
|
+
var MessengerType;
|
|
5822
|
+
(function (MessengerType) {
|
|
5823
|
+
MessengerType["Generic"] = "Generic";
|
|
5824
|
+
MessengerType["Kafka"] = "Kafka";
|
|
5825
|
+
MessengerType["Twilio"] = "Twilio";
|
|
5826
|
+
})(MessengerType = exports.MessengerType || (exports.MessengerType = {}));
|
|
5606
5827
|
/**
|
|
5607
|
-
* @author
|
|
5828
|
+
* @author Daniel DeGroff
|
|
5608
5829
|
*/
|
|
5609
|
-
var
|
|
5610
|
-
(function (
|
|
5611
|
-
|
|
5612
|
-
|
|
5613
|
-
|
|
5830
|
+
var MultiFactorLoginPolicy;
|
|
5831
|
+
(function (MultiFactorLoginPolicy) {
|
|
5832
|
+
MultiFactorLoginPolicy["Disabled"] = "Disabled";
|
|
5833
|
+
MultiFactorLoginPolicy["Enabled"] = "Enabled";
|
|
5834
|
+
MultiFactorLoginPolicy["Required"] = "Required";
|
|
5835
|
+
})(MultiFactorLoginPolicy = exports.MultiFactorLoginPolicy || (exports.MultiFactorLoginPolicy = {}));
|
|
5614
5836
|
/**
|
|
5615
|
-
*
|
|
5837
|
+
* The application's relationship to the authorization server. First-party applications will be granted implicit permission for requested scopes.
|
|
5838
|
+
* Third-party applications will use the {@link OAuthScopeConsentMode} policy.
|
|
5616
5839
|
*
|
|
5617
5840
|
* @author Spencer Witt
|
|
5618
5841
|
*/
|
|
5619
|
-
var
|
|
5620
|
-
(function (
|
|
5621
|
-
|
|
5622
|
-
|
|
5623
|
-
})(
|
|
5624
|
-
/**
|
|
5625
|
-
* @author Brett Pontarelli
|
|
5626
|
-
*/
|
|
5627
|
-
var IdentityProviderLoginMethod;
|
|
5628
|
-
(function (IdentityProviderLoginMethod) {
|
|
5629
|
-
IdentityProviderLoginMethod["UsePopup"] = "UsePopup";
|
|
5630
|
-
IdentityProviderLoginMethod["UseRedirect"] = "UseRedirect";
|
|
5631
|
-
IdentityProviderLoginMethod["UseVendorJavaScript"] = "UseVendorJavaScript";
|
|
5632
|
-
})(IdentityProviderLoginMethod = exports.IdentityProviderLoginMethod || (exports.IdentityProviderLoginMethod = {}));
|
|
5633
|
-
/**
|
|
5634
|
-
* @author Daniel DeGroff
|
|
5635
|
-
*/
|
|
5636
|
-
var RefreshTokenUsagePolicy;
|
|
5637
|
-
(function (RefreshTokenUsagePolicy) {
|
|
5638
|
-
RefreshTokenUsagePolicy["Reusable"] = "Reusable";
|
|
5639
|
-
RefreshTokenUsagePolicy["OneTimeUse"] = "OneTimeUse";
|
|
5640
|
-
})(RefreshTokenUsagePolicy = exports.RefreshTokenUsagePolicy || (exports.RefreshTokenUsagePolicy = {}));
|
|
5641
|
-
/**
|
|
5642
|
-
* @author Lyle Schemmerling
|
|
5643
|
-
*/
|
|
5644
|
-
var SAMLv2DestinationAssertionPolicy;
|
|
5645
|
-
(function (SAMLv2DestinationAssertionPolicy) {
|
|
5646
|
-
SAMLv2DestinationAssertionPolicy["Enabled"] = "Enabled";
|
|
5647
|
-
SAMLv2DestinationAssertionPolicy["Disabled"] = "Disabled";
|
|
5648
|
-
SAMLv2DestinationAssertionPolicy["AllowAlternates"] = "AllowAlternates";
|
|
5649
|
-
})(SAMLv2DestinationAssertionPolicy = exports.SAMLv2DestinationAssertionPolicy || (exports.SAMLv2DestinationAssertionPolicy = {}));
|
|
5842
|
+
var OAuthApplicationRelationship;
|
|
5843
|
+
(function (OAuthApplicationRelationship) {
|
|
5844
|
+
OAuthApplicationRelationship["FirstParty"] = "FirstParty";
|
|
5845
|
+
OAuthApplicationRelationship["ThirdParty"] = "ThirdParty";
|
|
5846
|
+
})(OAuthApplicationRelationship = exports.OAuthApplicationRelationship || (exports.OAuthApplicationRelationship = {}));
|
|
5650
5847
|
var OAuthErrorReason;
|
|
5651
5848
|
(function (OAuthErrorReason) {
|
|
5652
5849
|
OAuthErrorReason["auth_code_not_found"] = "auth_code_not_found";
|
|
@@ -5677,6 +5874,7 @@ var OAuthErrorReason;
|
|
|
5677
5874
|
OAuthErrorReason["invalid_target_entity_scope"] = "invalid_target_entity_scope";
|
|
5678
5875
|
OAuthErrorReason["invalid_entity_permission_scope"] = "invalid_entity_permission_scope";
|
|
5679
5876
|
OAuthErrorReason["invalid_user_id"] = "invalid_user_id";
|
|
5877
|
+
OAuthErrorReason["invalid_tenant_id"] = "invalid_tenant_id";
|
|
5680
5878
|
OAuthErrorReason["grant_type_disabled"] = "grant_type_disabled";
|
|
5681
5879
|
OAuthErrorReason["missing_client_id"] = "missing_client_id";
|
|
5682
5880
|
OAuthErrorReason["missing_client_secret"] = "missing_client_secret";
|
|
@@ -5692,6 +5890,7 @@ var OAuthErrorReason;
|
|
|
5692
5890
|
OAuthErrorReason["missing_user_code"] = "missing_user_code";
|
|
5693
5891
|
OAuthErrorReason["missing_user_id"] = "missing_user_id";
|
|
5694
5892
|
OAuthErrorReason["missing_verification_uri"] = "missing_verification_uri";
|
|
5893
|
+
OAuthErrorReason["missing_tenant_id"] = "missing_tenant_id";
|
|
5695
5894
|
OAuthErrorReason["login_prevented"] = "login_prevented";
|
|
5696
5895
|
OAuthErrorReason["not_licensed"] = "not_licensed";
|
|
5697
5896
|
OAuthErrorReason["user_code_expired"] = "user_code_expired";
|
|
@@ -5710,270 +5909,88 @@ var OAuthErrorReason;
|
|
|
5710
5909
|
OAuthErrorReason["missing_required_scope"] = "missing_required_scope";
|
|
5711
5910
|
OAuthErrorReason["unknown_scope"] = "unknown_scope";
|
|
5712
5911
|
OAuthErrorReason["consent_canceled"] = "consent_canceled";
|
|
5713
|
-
})(OAuthErrorReason = exports.OAuthErrorReason || (exports.OAuthErrorReason = {}));
|
|
5714
|
-
var OAuthErrorType;
|
|
5715
|
-
(function (OAuthErrorType) {
|
|
5716
|
-
OAuthErrorType["invalid_request"] = "invalid_request";
|
|
5717
|
-
OAuthErrorType["invalid_client"] = "invalid_client";
|
|
5718
|
-
OAuthErrorType["invalid_grant"] = "invalid_grant";
|
|
5719
|
-
OAuthErrorType["invalid_token"] = "invalid_token";
|
|
5720
|
-
OAuthErrorType["unauthorized_client"] = "unauthorized_client";
|
|
5721
|
-
OAuthErrorType["invalid_scope"] = "invalid_scope";
|
|
5722
|
-
OAuthErrorType["server_error"] = "server_error";
|
|
5723
|
-
OAuthErrorType["unsupported_grant_type"] = "unsupported_grant_type";
|
|
5724
|
-
OAuthErrorType["unsupported_response_type"] = "unsupported_response_type";
|
|
5725
|
-
OAuthErrorType["access_denied"] = "access_denied";
|
|
5726
|
-
OAuthErrorType["change_password_required"] = "change_password_required";
|
|
5727
|
-
OAuthErrorType["not_licensed"] = "not_licensed";
|
|
5728
|
-
OAuthErrorType["two_factor_required"] = "two_factor_required";
|
|
5729
|
-
OAuthErrorType["authorization_pending"] = "authorization_pending";
|
|
5730
|
-
OAuthErrorType["expired_token"] = "expired_token";
|
|
5731
|
-
OAuthErrorType["unsupported_token_type"] = "unsupported_token_type";
|
|
5732
|
-
})(OAuthErrorType = exports.OAuthErrorType || (exports.OAuthErrorType = {}));
|
|
5733
|
-
var DeviceType;
|
|
5734
|
-
(function (DeviceType) {
|
|
5735
|
-
DeviceType["BROWSER"] = "BROWSER";
|
|
5736
|
-
DeviceType["DESKTOP"] = "DESKTOP";
|
|
5737
|
-
DeviceType["LAPTOP"] = "LAPTOP";
|
|
5738
|
-
DeviceType["MOBILE"] = "MOBILE";
|
|
5739
|
-
DeviceType["OTHER"] = "OTHER";
|
|
5740
|
-
DeviceType["SERVER"] = "SERVER";
|
|
5741
|
-
DeviceType["TABLET"] = "TABLET";
|
|
5742
|
-
DeviceType["TV"] = "TV";
|
|
5743
|
-
DeviceType["UNKNOWN"] = "UNKNOWN";
|
|
5744
|
-
})(DeviceType = exports.DeviceType || (exports.DeviceType = {}));
|
|
5745
|
-
/**
|
|
5746
|
-
* @author Daniel DeGroff
|
|
5747
|
-
*/
|
|
5748
|
-
var ApplicationMultiFactorTrustPolicy;
|
|
5749
|
-
(function (ApplicationMultiFactorTrustPolicy) {
|
|
5750
|
-
ApplicationMultiFactorTrustPolicy["Any"] = "Any";
|
|
5751
|
-
ApplicationMultiFactorTrustPolicy["This"] = "This";
|
|
5752
|
-
ApplicationMultiFactorTrustPolicy["None"] = "None";
|
|
5753
|
-
})(ApplicationMultiFactorTrustPolicy = exports.ApplicationMultiFactorTrustPolicy || (exports.ApplicationMultiFactorTrustPolicy = {}));
|
|
5754
|
-
/**
|
|
5755
|
-
* @author Daniel DeGroff
|
|
5756
|
-
*/
|
|
5757
|
-
var RateLimitedRequestType;
|
|
5758
|
-
(function (RateLimitedRequestType) {
|
|
5759
|
-
RateLimitedRequestType["FailedLogin"] = "FailedLogin";
|
|
5760
|
-
RateLimitedRequestType["ForgotPassword"] = "ForgotPassword";
|
|
5761
|
-
RateLimitedRequestType["SendEmailVerification"] = "SendEmailVerification";
|
|
5762
|
-
RateLimitedRequestType["SendPasswordless"] = "SendPasswordless";
|
|
5763
|
-
RateLimitedRequestType["SendRegistrationVerification"] = "SendRegistrationVerification";
|
|
5764
|
-
RateLimitedRequestType["SendTwoFactor"] = "SendTwoFactor";
|
|
5765
|
-
})(RateLimitedRequestType = exports.RateLimitedRequestType || (exports.RateLimitedRequestType = {}));
|
|
5766
|
-
/**
|
|
5767
|
-
* @author Daniel DeGroff
|
|
5768
|
-
*/
|
|
5769
|
-
var LambdaEngineType;
|
|
5770
|
-
(function (LambdaEngineType) {
|
|
5771
|
-
LambdaEngineType["GraalJS"] = "GraalJS";
|
|
5772
|
-
LambdaEngineType["Nashorn"] = "Nashorn";
|
|
5773
|
-
})(LambdaEngineType = exports.LambdaEngineType || (exports.LambdaEngineType = {}));
|
|
5774
|
-
/**
|
|
5775
|
-
* Used to express whether the Relying Party requires <a href="https://www.w3.org/TR/webauthn-2/#user-verification">user verification</a> for the
|
|
5776
|
-
* current operation.
|
|
5777
|
-
*
|
|
5778
|
-
* @author Spencer Witt
|
|
5779
|
-
*/
|
|
5780
|
-
var UserVerificationRequirement;
|
|
5781
|
-
(function (UserVerificationRequirement) {
|
|
5782
|
-
UserVerificationRequirement["required"] = "required";
|
|
5783
|
-
UserVerificationRequirement["preferred"] = "preferred";
|
|
5784
|
-
UserVerificationRequirement["discouraged"] = "discouraged";
|
|
5785
|
-
})(UserVerificationRequirement = exports.UserVerificationRequirement || (exports.UserVerificationRequirement = {}));
|
|
5786
|
-
/**
|
|
5787
|
-
* @author Brett Guy
|
|
5788
|
-
*/
|
|
5789
|
-
var ClientAuthenticationPolicy;
|
|
5790
|
-
(function (ClientAuthenticationPolicy) {
|
|
5791
|
-
ClientAuthenticationPolicy["Required"] = "Required";
|
|
5792
|
-
ClientAuthenticationPolicy["NotRequired"] = "NotRequired";
|
|
5793
|
-
ClientAuthenticationPolicy["NotRequiredWhenUsingPKCE"] = "NotRequiredWhenUsingPKCE";
|
|
5794
|
-
})(ClientAuthenticationPolicy = exports.ClientAuthenticationPolicy || (exports.ClientAuthenticationPolicy = {}));
|
|
5795
|
-
/**
|
|
5796
|
-
* @author Daniel DeGroff
|
|
5797
|
-
*/
|
|
5798
|
-
var FormType;
|
|
5799
|
-
(function (FormType) {
|
|
5800
|
-
FormType["registration"] = "registration";
|
|
5801
|
-
FormType["adminRegistration"] = "adminRegistration";
|
|
5802
|
-
FormType["adminUser"] = "adminUser";
|
|
5803
|
-
FormType["selfServiceUser"] = "selfServiceUser";
|
|
5804
|
-
})(FormType = exports.FormType || (exports.FormType = {}));
|
|
5805
|
-
/**
|
|
5806
|
-
* XML canonicalization method enumeration. This is used for the IdP and SP side of FusionAuth SAML.
|
|
5807
|
-
*
|
|
5808
|
-
* @author Brian Pontarelli
|
|
5809
|
-
*/
|
|
5810
|
-
var CanonicalizationMethod;
|
|
5811
|
-
(function (CanonicalizationMethod) {
|
|
5812
|
-
CanonicalizationMethod["exclusive"] = "exclusive";
|
|
5813
|
-
CanonicalizationMethod["exclusive_with_comments"] = "exclusive_with_comments";
|
|
5814
|
-
CanonicalizationMethod["inclusive"] = "inclusive";
|
|
5815
|
-
CanonicalizationMethod["inclusive_with_comments"] = "inclusive_with_comments";
|
|
5816
|
-
})(CanonicalizationMethod = exports.CanonicalizationMethod || (exports.CanonicalizationMethod = {}));
|
|
5817
|
-
/**
|
|
5818
|
-
* @author Brian Pontarelli
|
|
5819
|
-
*/
|
|
5820
|
-
var ExpiryUnit;
|
|
5821
|
-
(function (ExpiryUnit) {
|
|
5822
|
-
ExpiryUnit["MINUTES"] = "MINUTES";
|
|
5823
|
-
ExpiryUnit["HOURS"] = "HOURS";
|
|
5824
|
-
ExpiryUnit["DAYS"] = "DAYS";
|
|
5825
|
-
ExpiryUnit["WEEKS"] = "WEEKS";
|
|
5826
|
-
ExpiryUnit["MONTHS"] = "MONTHS";
|
|
5827
|
-
ExpiryUnit["YEARS"] = "YEARS";
|
|
5828
|
-
})(ExpiryUnit = exports.ExpiryUnit || (exports.ExpiryUnit = {}));
|
|
5829
|
-
/**
|
|
5830
|
-
* @author Daniel DeGroff
|
|
5831
|
-
*/
|
|
5832
|
-
var SecureGeneratorType;
|
|
5833
|
-
(function (SecureGeneratorType) {
|
|
5834
|
-
SecureGeneratorType["randomDigits"] = "randomDigits";
|
|
5835
|
-
SecureGeneratorType["randomBytes"] = "randomBytes";
|
|
5836
|
-
SecureGeneratorType["randomAlpha"] = "randomAlpha";
|
|
5837
|
-
SecureGeneratorType["randomAlphaNumeric"] = "randomAlphaNumeric";
|
|
5838
|
-
})(SecureGeneratorType = exports.SecureGeneratorType || (exports.SecureGeneratorType = {}));
|
|
5839
|
-
/**
|
|
5840
|
-
* @author Daniel DeGroff
|
|
5841
|
-
*/
|
|
5842
|
-
var FormDataType;
|
|
5843
|
-
(function (FormDataType) {
|
|
5844
|
-
FormDataType["bool"] = "bool";
|
|
5845
|
-
FormDataType["consent"] = "consent";
|
|
5846
|
-
FormDataType["date"] = "date";
|
|
5847
|
-
FormDataType["email"] = "email";
|
|
5848
|
-
FormDataType["number"] = "number";
|
|
5849
|
-
FormDataType["string"] = "string";
|
|
5850
|
-
})(FormDataType = exports.FormDataType || (exports.FormDataType = {}));
|
|
5851
|
-
/**
|
|
5852
|
-
* The IdP behavior when no user link has been made yet.
|
|
5853
|
-
*
|
|
5854
|
-
* @author Daniel DeGroff
|
|
5855
|
-
*/
|
|
5856
|
-
var IdentityProviderLinkingStrategy;
|
|
5857
|
-
(function (IdentityProviderLinkingStrategy) {
|
|
5858
|
-
IdentityProviderLinkingStrategy["CreatePendingLink"] = "CreatePendingLink";
|
|
5859
|
-
IdentityProviderLinkingStrategy["Disabled"] = "Disabled";
|
|
5860
|
-
IdentityProviderLinkingStrategy["LinkAnonymously"] = "LinkAnonymously";
|
|
5861
|
-
IdentityProviderLinkingStrategy["LinkByEmail"] = "LinkByEmail";
|
|
5862
|
-
IdentityProviderLinkingStrategy["LinkByEmailForExistingUser"] = "LinkByEmailForExistingUser";
|
|
5863
|
-
IdentityProviderLinkingStrategy["LinkByUsername"] = "LinkByUsername";
|
|
5864
|
-
IdentityProviderLinkingStrategy["LinkByUsernameForExistingUser"] = "LinkByUsernameForExistingUser";
|
|
5865
|
-
IdentityProviderLinkingStrategy["Unsupported"] = "Unsupported";
|
|
5866
|
-
})(IdentityProviderLinkingStrategy = exports.IdentityProviderLinkingStrategy || (exports.IdentityProviderLinkingStrategy = {}));
|
|
5867
|
-
/**
|
|
5868
|
-
* @author Daniel DeGroff
|
|
5869
|
-
*/
|
|
5870
|
-
var MultiFactorLoginPolicy;
|
|
5871
|
-
(function (MultiFactorLoginPolicy) {
|
|
5872
|
-
MultiFactorLoginPolicy["Disabled"] = "Disabled";
|
|
5873
|
-
MultiFactorLoginPolicy["Enabled"] = "Enabled";
|
|
5874
|
-
MultiFactorLoginPolicy["Required"] = "Required";
|
|
5875
|
-
})(MultiFactorLoginPolicy = exports.MultiFactorLoginPolicy || (exports.MultiFactorLoginPolicy = {}));
|
|
5876
|
-
/**
|
|
5877
|
-
* @author Brett Guy
|
|
5878
|
-
*/
|
|
5879
|
-
var IPAccessControlEntryAction;
|
|
5880
|
-
(function (IPAccessControlEntryAction) {
|
|
5881
|
-
IPAccessControlEntryAction["Allow"] = "Allow";
|
|
5882
|
-
IPAccessControlEntryAction["Block"] = "Block";
|
|
5883
|
-
})(IPAccessControlEntryAction = exports.IPAccessControlEntryAction || (exports.IPAccessControlEntryAction = {}));
|
|
5912
|
+
})(OAuthErrorReason = exports.OAuthErrorReason || (exports.OAuthErrorReason = {}));
|
|
5913
|
+
var OAuthErrorType;
|
|
5914
|
+
(function (OAuthErrorType) {
|
|
5915
|
+
OAuthErrorType["invalid_request"] = "invalid_request";
|
|
5916
|
+
OAuthErrorType["invalid_client"] = "invalid_client";
|
|
5917
|
+
OAuthErrorType["invalid_grant"] = "invalid_grant";
|
|
5918
|
+
OAuthErrorType["invalid_token"] = "invalid_token";
|
|
5919
|
+
OAuthErrorType["unauthorized_client"] = "unauthorized_client";
|
|
5920
|
+
OAuthErrorType["invalid_scope"] = "invalid_scope";
|
|
5921
|
+
OAuthErrorType["server_error"] = "server_error";
|
|
5922
|
+
OAuthErrorType["unsupported_grant_type"] = "unsupported_grant_type";
|
|
5923
|
+
OAuthErrorType["unsupported_response_type"] = "unsupported_response_type";
|
|
5924
|
+
OAuthErrorType["access_denied"] = "access_denied";
|
|
5925
|
+
OAuthErrorType["change_password_required"] = "change_password_required";
|
|
5926
|
+
OAuthErrorType["not_licensed"] = "not_licensed";
|
|
5927
|
+
OAuthErrorType["two_factor_required"] = "two_factor_required";
|
|
5928
|
+
OAuthErrorType["authorization_pending"] = "authorization_pending";
|
|
5929
|
+
OAuthErrorType["expired_token"] = "expired_token";
|
|
5930
|
+
OAuthErrorType["unsupported_token_type"] = "unsupported_token_type";
|
|
5931
|
+
})(OAuthErrorType = exports.OAuthErrorType || (exports.OAuthErrorType = {}));
|
|
5884
5932
|
/**
|
|
5885
|
-
*
|
|
5933
|
+
* Controls the policy for requesting user permission to grant access to requested scopes during an OAuth workflow
|
|
5934
|
+
* for a third-party application.
|
|
5886
5935
|
*
|
|
5887
|
-
* @author
|
|
5936
|
+
* @author Spencer Witt
|
|
5888
5937
|
*/
|
|
5889
|
-
var
|
|
5890
|
-
(function (
|
|
5891
|
-
|
|
5892
|
-
|
|
5893
|
-
|
|
5894
|
-
|
|
5895
|
-
})(UserActionPhase = exports.UserActionPhase || (exports.UserActionPhase = {}));
|
|
5938
|
+
var OAuthScopeConsentMode;
|
|
5939
|
+
(function (OAuthScopeConsentMode) {
|
|
5940
|
+
OAuthScopeConsentMode["AlwaysPrompt"] = "AlwaysPrompt";
|
|
5941
|
+
OAuthScopeConsentMode["RememberDecision"] = "RememberDecision";
|
|
5942
|
+
OAuthScopeConsentMode["NeverPrompt"] = "NeverPrompt";
|
|
5943
|
+
})(OAuthScopeConsentMode = exports.OAuthScopeConsentMode || (exports.OAuthScopeConsentMode = {}));
|
|
5896
5944
|
/**
|
|
5897
|
-
*
|
|
5945
|
+
* Controls the policy for whether OAuth workflows will more strictly adhere to the OAuth and OIDC specification
|
|
5946
|
+
* or run in backwards compatibility mode.
|
|
5898
5947
|
*
|
|
5899
|
-
* @author
|
|
5948
|
+
* @author David Charles
|
|
5900
5949
|
*/
|
|
5901
|
-
var
|
|
5902
|
-
(function (
|
|
5903
|
-
|
|
5904
|
-
|
|
5905
|
-
|
|
5906
|
-
LambdaType["SAMLv2Populate"] = "SAMLv2Populate";
|
|
5907
|
-
LambdaType["AppleReconcile"] = "AppleReconcile";
|
|
5908
|
-
LambdaType["ExternalJWTReconcile"] = "ExternalJWTReconcile";
|
|
5909
|
-
LambdaType["FacebookReconcile"] = "FacebookReconcile";
|
|
5910
|
-
LambdaType["GoogleReconcile"] = "GoogleReconcile";
|
|
5911
|
-
LambdaType["HYPRReconcile"] = "HYPRReconcile";
|
|
5912
|
-
LambdaType["TwitterReconcile"] = "TwitterReconcile";
|
|
5913
|
-
LambdaType["LDAPConnectorReconcile"] = "LDAPConnectorReconcile";
|
|
5914
|
-
LambdaType["LinkedInReconcile"] = "LinkedInReconcile";
|
|
5915
|
-
LambdaType["EpicGamesReconcile"] = "EpicGamesReconcile";
|
|
5916
|
-
LambdaType["NintendoReconcile"] = "NintendoReconcile";
|
|
5917
|
-
LambdaType["SonyPSNReconcile"] = "SonyPSNReconcile";
|
|
5918
|
-
LambdaType["SteamReconcile"] = "SteamReconcile";
|
|
5919
|
-
LambdaType["TwitchReconcile"] = "TwitchReconcile";
|
|
5920
|
-
LambdaType["XboxReconcile"] = "XboxReconcile";
|
|
5921
|
-
LambdaType["ClientCredentialsJWTPopulate"] = "ClientCredentialsJWTPopulate";
|
|
5922
|
-
LambdaType["SCIMServerGroupRequestConverter"] = "SCIMServerGroupRequestConverter";
|
|
5923
|
-
LambdaType["SCIMServerGroupResponseConverter"] = "SCIMServerGroupResponseConverter";
|
|
5924
|
-
LambdaType["SCIMServerUserRequestConverter"] = "SCIMServerUserRequestConverter";
|
|
5925
|
-
LambdaType["SCIMServerUserResponseConverter"] = "SCIMServerUserResponseConverter";
|
|
5926
|
-
LambdaType["SelfServiceRegistrationValidation"] = "SelfServiceRegistrationValidation";
|
|
5927
|
-
LambdaType["UserInfoPopulate"] = "UserInfoPopulate";
|
|
5928
|
-
LambdaType["LoginValidation"] = "LoginValidation";
|
|
5929
|
-
})(LambdaType = exports.LambdaType || (exports.LambdaType = {}));
|
|
5950
|
+
var OAuthScopeHandlingPolicy;
|
|
5951
|
+
(function (OAuthScopeHandlingPolicy) {
|
|
5952
|
+
OAuthScopeHandlingPolicy["Compatibility"] = "Compatibility";
|
|
5953
|
+
OAuthScopeHandlingPolicy["Strict"] = "Strict";
|
|
5954
|
+
})(OAuthScopeHandlingPolicy = exports.OAuthScopeHandlingPolicy || (exports.OAuthScopeHandlingPolicy = {}));
|
|
5930
5955
|
/**
|
|
5931
|
-
* @author
|
|
5956
|
+
* @author Johnathon Wood
|
|
5932
5957
|
*/
|
|
5933
|
-
var
|
|
5934
|
-
(function (
|
|
5935
|
-
|
|
5936
|
-
|
|
5937
|
-
})(
|
|
5938
|
-
var LoginIdType;
|
|
5939
|
-
(function (LoginIdType) {
|
|
5940
|
-
LoginIdType["email"] = "email";
|
|
5941
|
-
LoginIdType["username"] = "username";
|
|
5942
|
-
})(LoginIdType = exports.LoginIdType || (exports.LoginIdType = {}));
|
|
5943
|
-
var RegistrationType;
|
|
5944
|
-
(function (RegistrationType) {
|
|
5945
|
-
RegistrationType["basic"] = "basic";
|
|
5946
|
-
RegistrationType["advanced"] = "advanced";
|
|
5947
|
-
})(RegistrationType = exports.RegistrationType || (exports.RegistrationType = {}));
|
|
5948
|
-
var SAMLLogoutBehavior;
|
|
5949
|
-
(function (SAMLLogoutBehavior) {
|
|
5950
|
-
SAMLLogoutBehavior["AllParticipants"] = "AllParticipants";
|
|
5951
|
-
SAMLLogoutBehavior["OnlyOriginator"] = "OnlyOriginator";
|
|
5952
|
-
})(SAMLLogoutBehavior = exports.SAMLLogoutBehavior || (exports.SAMLLogoutBehavior = {}));
|
|
5953
|
-
var XMLSignatureLocation;
|
|
5954
|
-
(function (XMLSignatureLocation) {
|
|
5955
|
-
XMLSignatureLocation["Assertion"] = "Assertion";
|
|
5956
|
-
XMLSignatureLocation["Response"] = "Response";
|
|
5957
|
-
})(XMLSignatureLocation = exports.XMLSignatureLocation || (exports.XMLSignatureLocation = {}));
|
|
5958
|
+
var Oauth2AuthorizedURLValidationPolicy;
|
|
5959
|
+
(function (Oauth2AuthorizedURLValidationPolicy) {
|
|
5960
|
+
Oauth2AuthorizedURLValidationPolicy["AllowWildcards"] = "AllowWildcards";
|
|
5961
|
+
Oauth2AuthorizedURLValidationPolicy["ExactMatch"] = "ExactMatch";
|
|
5962
|
+
})(Oauth2AuthorizedURLValidationPolicy = exports.Oauth2AuthorizedURLValidationPolicy || (exports.Oauth2AuthorizedURLValidationPolicy = {}));
|
|
5958
5963
|
/**
|
|
5959
5964
|
* @author Daniel DeGroff
|
|
5960
5965
|
*/
|
|
5961
|
-
var
|
|
5962
|
-
(function (
|
|
5963
|
-
|
|
5964
|
-
|
|
5965
|
-
|
|
5966
|
+
var ObjectState;
|
|
5967
|
+
(function (ObjectState) {
|
|
5968
|
+
ObjectState["Active"] = "Active";
|
|
5969
|
+
ObjectState["Inactive"] = "Inactive";
|
|
5970
|
+
ObjectState["PendingDelete"] = "PendingDelete";
|
|
5971
|
+
})(ObjectState = exports.ObjectState || (exports.ObjectState = {}));
|
|
5972
|
+
var BreachAction;
|
|
5973
|
+
(function (BreachAction) {
|
|
5974
|
+
BreachAction["Off"] = "Off";
|
|
5975
|
+
BreachAction["RecordOnly"] = "RecordOnly";
|
|
5976
|
+
BreachAction["NotifyUser"] = "NotifyUser";
|
|
5977
|
+
BreachAction["RequireChange"] = "RequireChange";
|
|
5978
|
+
})(BreachAction = exports.BreachAction || (exports.BreachAction = {}));
|
|
5979
|
+
var BreachMatchMode;
|
|
5980
|
+
(function (BreachMatchMode) {
|
|
5981
|
+
BreachMatchMode["Low"] = "Low";
|
|
5982
|
+
BreachMatchMode["Medium"] = "Medium";
|
|
5983
|
+
BreachMatchMode["High"] = "High";
|
|
5984
|
+
})(BreachMatchMode = exports.BreachMatchMode || (exports.BreachMatchMode = {}));
|
|
5966
5985
|
/**
|
|
5967
|
-
*
|
|
5968
|
-
*
|
|
5969
|
-
* @author Spencer Witt
|
|
5986
|
+
* @author Brett Guy
|
|
5970
5987
|
*/
|
|
5971
|
-
var
|
|
5972
|
-
(function (
|
|
5973
|
-
|
|
5974
|
-
|
|
5975
|
-
|
|
5976
|
-
})(
|
|
5988
|
+
var ProofKeyForCodeExchangePolicy;
|
|
5989
|
+
(function (ProofKeyForCodeExchangePolicy) {
|
|
5990
|
+
ProofKeyForCodeExchangePolicy["Required"] = "Required";
|
|
5991
|
+
ProofKeyForCodeExchangePolicy["NotRequired"] = "NotRequired";
|
|
5992
|
+
ProofKeyForCodeExchangePolicy["NotRequiredWhenUsingClientAuthentication"] = "NotRequiredWhenUsingClientAuthentication";
|
|
5993
|
+
})(ProofKeyForCodeExchangePolicy = exports.ProofKeyForCodeExchangePolicy || (exports.ProofKeyForCodeExchangePolicy = {}));
|
|
5977
5994
|
/**
|
|
5978
5995
|
* Defines valid credential types. This is an extension point in the WebAuthn spec. The only defined value at this time is "public-key"
|
|
5979
5996
|
*
|
|
@@ -5984,104 +6001,84 @@ var PublicKeyCredentialType;
|
|
|
5984
6001
|
PublicKeyCredentialType["publicKey"] = "public-key";
|
|
5985
6002
|
})(PublicKeyCredentialType = exports.PublicKeyCredentialType || (exports.PublicKeyCredentialType = {}));
|
|
5986
6003
|
/**
|
|
5987
|
-
*
|
|
5988
|
-
*
|
|
5989
|
-
* @author Spencer Witt
|
|
6004
|
+
* @author Daniel DeGroff
|
|
5990
6005
|
*/
|
|
5991
|
-
var
|
|
5992
|
-
(function (
|
|
5993
|
-
|
|
5994
|
-
|
|
5995
|
-
|
|
5996
|
-
|
|
5997
|
-
|
|
5998
|
-
|
|
5999
|
-
|
|
6000
|
-
CoseEllipticCurve["Ed448"] = "Ed448";
|
|
6001
|
-
CoseEllipticCurve["Secp256k1"] = "Secp256k1";
|
|
6002
|
-
})(CoseEllipticCurve = exports.CoseEllipticCurve || (exports.CoseEllipticCurve = {}));
|
|
6003
|
-
var KeyAlgorithm;
|
|
6004
|
-
(function (KeyAlgorithm) {
|
|
6005
|
-
KeyAlgorithm["ES256"] = "ES256";
|
|
6006
|
-
KeyAlgorithm["ES384"] = "ES384";
|
|
6007
|
-
KeyAlgorithm["ES512"] = "ES512";
|
|
6008
|
-
KeyAlgorithm["HS256"] = "HS256";
|
|
6009
|
-
KeyAlgorithm["HS384"] = "HS384";
|
|
6010
|
-
KeyAlgorithm["HS512"] = "HS512";
|
|
6011
|
-
KeyAlgorithm["RS256"] = "RS256";
|
|
6012
|
-
KeyAlgorithm["RS384"] = "RS384";
|
|
6013
|
-
KeyAlgorithm["RS512"] = "RS512";
|
|
6014
|
-
})(KeyAlgorithm = exports.KeyAlgorithm || (exports.KeyAlgorithm = {}));
|
|
6015
|
-
var KeyType;
|
|
6016
|
-
(function (KeyType) {
|
|
6017
|
-
KeyType["EC"] = "EC";
|
|
6018
|
-
KeyType["RSA"] = "RSA";
|
|
6019
|
-
KeyType["HMAC"] = "HMAC";
|
|
6020
|
-
})(KeyType = exports.KeyType || (exports.KeyType = {}));
|
|
6006
|
+
var RateLimitedRequestType;
|
|
6007
|
+
(function (RateLimitedRequestType) {
|
|
6008
|
+
RateLimitedRequestType["FailedLogin"] = "FailedLogin";
|
|
6009
|
+
RateLimitedRequestType["ForgotPassword"] = "ForgotPassword";
|
|
6010
|
+
RateLimitedRequestType["SendEmailVerification"] = "SendEmailVerification";
|
|
6011
|
+
RateLimitedRequestType["SendPasswordless"] = "SendPasswordless";
|
|
6012
|
+
RateLimitedRequestType["SendRegistrationVerification"] = "SendRegistrationVerification";
|
|
6013
|
+
RateLimitedRequestType["SendTwoFactor"] = "SendTwoFactor";
|
|
6014
|
+
})(RateLimitedRequestType = exports.RateLimitedRequestType || (exports.RateLimitedRequestType = {}));
|
|
6021
6015
|
/**
|
|
6022
|
-
*
|
|
6023
|
-
* for a third-party application.
|
|
6024
|
-
*
|
|
6025
|
-
* @author Spencer Witt
|
|
6016
|
+
* @author Brian Pontarelli
|
|
6026
6017
|
*/
|
|
6027
|
-
var
|
|
6028
|
-
(function (
|
|
6029
|
-
|
|
6030
|
-
|
|
6031
|
-
|
|
6032
|
-
|
|
6018
|
+
var ReactorFeatureStatus;
|
|
6019
|
+
(function (ReactorFeatureStatus) {
|
|
6020
|
+
ReactorFeatureStatus["ACTIVE"] = "ACTIVE";
|
|
6021
|
+
ReactorFeatureStatus["DISCONNECTED"] = "DISCONNECTED";
|
|
6022
|
+
ReactorFeatureStatus["PENDING"] = "PENDING";
|
|
6023
|
+
ReactorFeatureStatus["DISABLED"] = "DISABLED";
|
|
6024
|
+
ReactorFeatureStatus["UNKNOWN"] = "UNKNOWN";
|
|
6025
|
+
})(ReactorFeatureStatus = exports.ReactorFeatureStatus || (exports.ReactorFeatureStatus = {}));
|
|
6033
6026
|
/**
|
|
6034
6027
|
* @author Daniel DeGroff
|
|
6035
6028
|
*/
|
|
6036
|
-
var
|
|
6037
|
-
(function (
|
|
6038
|
-
|
|
6039
|
-
|
|
6040
|
-
|
|
6041
|
-
})(
|
|
6029
|
+
var RefreshTokenExpirationPolicy;
|
|
6030
|
+
(function (RefreshTokenExpirationPolicy) {
|
|
6031
|
+
RefreshTokenExpirationPolicy["Fixed"] = "Fixed";
|
|
6032
|
+
RefreshTokenExpirationPolicy["SlidingWindow"] = "SlidingWindow";
|
|
6033
|
+
RefreshTokenExpirationPolicy["SlidingWindowWithMaximumLifetime"] = "SlidingWindowWithMaximumLifetime";
|
|
6034
|
+
})(RefreshTokenExpirationPolicy = exports.RefreshTokenExpirationPolicy || (exports.RefreshTokenExpirationPolicy = {}));
|
|
6042
6035
|
/**
|
|
6043
6036
|
* @author Daniel DeGroff
|
|
6044
6037
|
*/
|
|
6045
|
-
var
|
|
6046
|
-
(function (
|
|
6047
|
-
|
|
6048
|
-
|
|
6049
|
-
|
|
6050
|
-
|
|
6051
|
-
|
|
6052
|
-
|
|
6053
|
-
|
|
6054
|
-
|
|
6055
|
-
|
|
6056
|
-
|
|
6057
|
-
|
|
6058
|
-
|
|
6059
|
-
|
|
6060
|
-
|
|
6061
|
-
|
|
6062
|
-
|
|
6063
|
-
|
|
6038
|
+
var RefreshTokenUsagePolicy;
|
|
6039
|
+
(function (RefreshTokenUsagePolicy) {
|
|
6040
|
+
RefreshTokenUsagePolicy["Reusable"] = "Reusable";
|
|
6041
|
+
RefreshTokenUsagePolicy["OneTimeUse"] = "OneTimeUse";
|
|
6042
|
+
})(RefreshTokenUsagePolicy = exports.RefreshTokenUsagePolicy || (exports.RefreshTokenUsagePolicy = {}));
|
|
6043
|
+
/**
|
|
6044
|
+
* Describes the Relying Party's requirements for <a href="https://www.w3.org/TR/webauthn-2/#client-side-discoverable-credential">client-side
|
|
6045
|
+
* discoverable credentials</a> (formerly known as "resident keys")
|
|
6046
|
+
*
|
|
6047
|
+
* @author Spencer Witt
|
|
6048
|
+
*/
|
|
6049
|
+
var ResidentKeyRequirement;
|
|
6050
|
+
(function (ResidentKeyRequirement) {
|
|
6051
|
+
ResidentKeyRequirement["discouraged"] = "discouraged";
|
|
6052
|
+
ResidentKeyRequirement["preferred"] = "preferred";
|
|
6053
|
+
ResidentKeyRequirement["required"] = "required";
|
|
6054
|
+
})(ResidentKeyRequirement = exports.ResidentKeyRequirement || (exports.ResidentKeyRequirement = {}));
|
|
6055
|
+
/**
|
|
6056
|
+
* @author Lyle Schemmerling
|
|
6057
|
+
*/
|
|
6058
|
+
var SAMLv2DestinationAssertionPolicy;
|
|
6059
|
+
(function (SAMLv2DestinationAssertionPolicy) {
|
|
6060
|
+
SAMLv2DestinationAssertionPolicy["Enabled"] = "Enabled";
|
|
6061
|
+
SAMLv2DestinationAssertionPolicy["Disabled"] = "Disabled";
|
|
6062
|
+
SAMLv2DestinationAssertionPolicy["AllowAlternates"] = "AllowAlternates";
|
|
6063
|
+
})(SAMLv2DestinationAssertionPolicy = exports.SAMLv2DestinationAssertionPolicy || (exports.SAMLv2DestinationAssertionPolicy = {}));
|
|
6064
6064
|
/**
|
|
6065
6065
|
* @author Daniel DeGroff
|
|
6066
6066
|
*/
|
|
6067
|
-
var
|
|
6068
|
-
(function (
|
|
6069
|
-
|
|
6070
|
-
|
|
6071
|
-
|
|
6072
|
-
|
|
6073
|
-
(
|
|
6074
|
-
TOTPAlgorithm["HmacSHA1"] = "HmacSHA1";
|
|
6075
|
-
TOTPAlgorithm["HmacSHA256"] = "HmacSHA256";
|
|
6076
|
-
TOTPAlgorithm["HmacSHA512"] = "HmacSHA512";
|
|
6077
|
-
})(TOTPAlgorithm = exports.TOTPAlgorithm || (exports.TOTPAlgorithm = {}));
|
|
6067
|
+
var SecureGeneratorType;
|
|
6068
|
+
(function (SecureGeneratorType) {
|
|
6069
|
+
SecureGeneratorType["randomDigits"] = "randomDigits";
|
|
6070
|
+
SecureGeneratorType["randomBytes"] = "randomBytes";
|
|
6071
|
+
SecureGeneratorType["randomAlpha"] = "randomAlpha";
|
|
6072
|
+
SecureGeneratorType["randomAlphaNumeric"] = "randomAlphaNumeric";
|
|
6073
|
+
})(SecureGeneratorType = exports.SecureGeneratorType || (exports.SecureGeneratorType = {}));
|
|
6078
6074
|
/**
|
|
6079
|
-
* @author
|
|
6075
|
+
* @author Daniel DeGroff
|
|
6080
6076
|
*/
|
|
6081
|
-
var
|
|
6082
|
-
(function (
|
|
6083
|
-
|
|
6084
|
-
|
|
6077
|
+
var Sort;
|
|
6078
|
+
(function (Sort) {
|
|
6079
|
+
Sort["asc"] = "asc";
|
|
6080
|
+
Sort["desc"] = "desc";
|
|
6081
|
+
})(Sort = exports.Sort || (exports.Sort = {}));
|
|
6085
6082
|
/**
|
|
6086
6083
|
* Steam API modes.
|
|
6087
6084
|
*
|
|
@@ -6093,76 +6090,52 @@ var SteamAPIMode;
|
|
|
6093
6090
|
SteamAPIMode["Partner"] = "Partner";
|
|
6094
6091
|
})(SteamAPIMode = exports.SteamAPIMode || (exports.SteamAPIMode = {}));
|
|
6095
6092
|
/**
|
|
6096
|
-
* @author
|
|
6093
|
+
* @author Daniel DeGroff
|
|
6097
6094
|
*/
|
|
6098
|
-
var
|
|
6099
|
-
(function (
|
|
6100
|
-
|
|
6101
|
-
|
|
6102
|
-
|
|
6103
|
-
|
|
6104
|
-
|
|
6095
|
+
var SystemTrustedProxyConfigurationPolicy;
|
|
6096
|
+
(function (SystemTrustedProxyConfigurationPolicy) {
|
|
6097
|
+
SystemTrustedProxyConfigurationPolicy["All"] = "All";
|
|
6098
|
+
SystemTrustedProxyConfigurationPolicy["OnlyConfigured"] = "OnlyConfigured";
|
|
6099
|
+
})(SystemTrustedProxyConfigurationPolicy = exports.SystemTrustedProxyConfigurationPolicy || (exports.SystemTrustedProxyConfigurationPolicy = {}));
|
|
6100
|
+
var UniqueUsernameStrategy;
|
|
6101
|
+
(function (UniqueUsernameStrategy) {
|
|
6102
|
+
UniqueUsernameStrategy["Always"] = "Always";
|
|
6103
|
+
UniqueUsernameStrategy["OnCollision"] = "OnCollision";
|
|
6104
|
+
})(UniqueUsernameStrategy = exports.UniqueUsernameStrategy || (exports.UniqueUsernameStrategy = {}));
|
|
6105
|
+
var ThemeType;
|
|
6106
|
+
(function (ThemeType) {
|
|
6107
|
+
ThemeType["advanced"] = "advanced";
|
|
6108
|
+
ThemeType["simple"] = "simple";
|
|
6109
|
+
})(ThemeType = exports.ThemeType || (exports.ThemeType = {}));
|
|
6105
6110
|
/**
|
|
6106
|
-
*
|
|
6111
|
+
* <ul>
|
|
6112
|
+
* <li>Bearer Token type as defined by <a href="https://tools.ietf.org/html/rfc6750">RFC 6750</a>.</li>
|
|
6113
|
+
* <li>MAC Token type as referenced by <a href="https://tools.ietf.org/html/rfc6749">RFC 6749</a> and
|
|
6114
|
+
* <a href="https://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-05">
|
|
6115
|
+
* Draft RFC on OAuth 2.0 Message Authentication Code (MAC) Tokens</a>
|
|
6116
|
+
* </li>
|
|
6117
|
+
* </ul>
|
|
6118
|
+
*
|
|
6119
|
+
* @author Daniel DeGroff
|
|
6120
|
+
*/
|
|
6121
|
+
var TokenType;
|
|
6122
|
+
(function (TokenType) {
|
|
6123
|
+
TokenType["Bearer"] = "Bearer";
|
|
6124
|
+
TokenType["MAC"] = "MAC";
|
|
6125
|
+
})(TokenType = exports.TokenType || (exports.TokenType = {}));
|
|
6126
|
+
/**
|
|
6127
|
+
* The transaction types for Webhooks and other event systems within FusionAuth.
|
|
6107
6128
|
*
|
|
6108
6129
|
* @author Brian Pontarelli
|
|
6109
6130
|
*/
|
|
6110
|
-
var
|
|
6111
|
-
(function (
|
|
6112
|
-
|
|
6113
|
-
|
|
6114
|
-
|
|
6115
|
-
|
|
6116
|
-
|
|
6117
|
-
|
|
6118
|
-
EventType["GroupCreate"] = "group.create";
|
|
6119
|
-
EventType["GroupCreateComplete"] = "group.create.complete";
|
|
6120
|
-
EventType["GroupDelete"] = "group.delete";
|
|
6121
|
-
EventType["GroupDeleteComplete"] = "group.delete.complete";
|
|
6122
|
-
EventType["GroupMemberAdd"] = "group.member.add";
|
|
6123
|
-
EventType["GroupMemberAddComplete"] = "group.member.add.complete";
|
|
6124
|
-
EventType["GroupMemberRemove"] = "group.member.remove";
|
|
6125
|
-
EventType["GroupMemberRemoveComplete"] = "group.member.remove.complete";
|
|
6126
|
-
EventType["GroupMemberUpdate"] = "group.member.update";
|
|
6127
|
-
EventType["GroupMemberUpdateComplete"] = "group.member.update.complete";
|
|
6128
|
-
EventType["GroupUpdate"] = "group.update";
|
|
6129
|
-
EventType["GroupUpdateComplete"] = "group.update.complete";
|
|
6130
|
-
EventType["UserAction"] = "user.action";
|
|
6131
|
-
EventType["UserBulkCreate"] = "user.bulk.create";
|
|
6132
|
-
EventType["UserCreate"] = "user.create";
|
|
6133
|
-
EventType["UserCreateComplete"] = "user.create.complete";
|
|
6134
|
-
EventType["UserDeactivate"] = "user.deactivate";
|
|
6135
|
-
EventType["UserDelete"] = "user.delete";
|
|
6136
|
-
EventType["UserDeleteComplete"] = "user.delete.complete";
|
|
6137
|
-
EventType["UserEmailUpdate"] = "user.email.update";
|
|
6138
|
-
EventType["UserEmailVerified"] = "user.email.verified";
|
|
6139
|
-
EventType["UserIdentityProviderLink"] = "user.identity-provider.link";
|
|
6140
|
-
EventType["UserIdentityProviderUnlink"] = "user.identity-provider.unlink";
|
|
6141
|
-
EventType["UserLoginIdDuplicateOnCreate"] = "user.loginId.duplicate.create";
|
|
6142
|
-
EventType["UserLoginIdDuplicateOnUpdate"] = "user.loginId.duplicate.update";
|
|
6143
|
-
EventType["UserLoginFailed"] = "user.login.failed";
|
|
6144
|
-
EventType["UserLoginNewDevice"] = "user.login.new-device";
|
|
6145
|
-
EventType["UserLoginSuccess"] = "user.login.success";
|
|
6146
|
-
EventType["UserLoginSuspicious"] = "user.login.suspicious";
|
|
6147
|
-
EventType["UserPasswordBreach"] = "user.password.breach";
|
|
6148
|
-
EventType["UserPasswordResetSend"] = "user.password.reset.send";
|
|
6149
|
-
EventType["UserPasswordResetStart"] = "user.password.reset.start";
|
|
6150
|
-
EventType["UserPasswordResetSuccess"] = "user.password.reset.success";
|
|
6151
|
-
EventType["UserPasswordUpdate"] = "user.password.update";
|
|
6152
|
-
EventType["UserReactivate"] = "user.reactivate";
|
|
6153
|
-
EventType["UserRegistrationCreate"] = "user.registration.create";
|
|
6154
|
-
EventType["UserRegistrationCreateComplete"] = "user.registration.create.complete";
|
|
6155
|
-
EventType["UserRegistrationDelete"] = "user.registration.delete";
|
|
6156
|
-
EventType["UserRegistrationDeleteComplete"] = "user.registration.delete.complete";
|
|
6157
|
-
EventType["UserRegistrationUpdate"] = "user.registration.update";
|
|
6158
|
-
EventType["UserRegistrationUpdateComplete"] = "user.registration.update.complete";
|
|
6159
|
-
EventType["UserRegistrationVerified"] = "user.registration.verified";
|
|
6160
|
-
EventType["UserTwoFactorMethodAdd"] = "user.two-factor.method.add";
|
|
6161
|
-
EventType["UserTwoFactorMethodRemove"] = "user.two-factor.method.remove";
|
|
6162
|
-
EventType["UserUpdate"] = "user.update";
|
|
6163
|
-
EventType["UserUpdateComplete"] = "user.update.complete";
|
|
6164
|
-
EventType["Test"] = "test";
|
|
6165
|
-
})(EventType = exports.EventType || (exports.EventType = {}));
|
|
6131
|
+
var TransactionType;
|
|
6132
|
+
(function (TransactionType) {
|
|
6133
|
+
TransactionType["None"] = "None";
|
|
6134
|
+
TransactionType["Any"] = "Any";
|
|
6135
|
+
TransactionType["SimpleMajority"] = "SimpleMajority";
|
|
6136
|
+
TransactionType["SuperMajority"] = "SuperMajority";
|
|
6137
|
+
TransactionType["AbsoluteMajority"] = "AbsoluteMajority";
|
|
6138
|
+
})(TransactionType = exports.TransactionType || (exports.TransactionType = {}));
|
|
6166
6139
|
/**
|
|
6167
6140
|
* Policy for handling unknown OAuth scopes in the request
|
|
6168
6141
|
*
|
|
@@ -6175,41 +6148,88 @@ var UnknownScopePolicy;
|
|
|
6175
6148
|
UnknownScopePolicy["Reject"] = "Reject";
|
|
6176
6149
|
})(UnknownScopePolicy = exports.UnknownScopePolicy || (exports.UnknownScopePolicy = {}));
|
|
6177
6150
|
/**
|
|
6178
|
-
*
|
|
6179
|
-
|
|
6151
|
+
* @author Daniel DeGroff
|
|
6152
|
+
*/
|
|
6153
|
+
var UnverifiedBehavior;
|
|
6154
|
+
(function (UnverifiedBehavior) {
|
|
6155
|
+
UnverifiedBehavior["Allow"] = "Allow";
|
|
6156
|
+
UnverifiedBehavior["Gated"] = "Gated";
|
|
6157
|
+
})(UnverifiedBehavior = exports.UnverifiedBehavior || (exports.UnverifiedBehavior = {}));
|
|
6158
|
+
/**
|
|
6159
|
+
* The phases of a time-based user action.
|
|
6180
6160
|
*
|
|
6181
|
-
* @author
|
|
6161
|
+
* @author Brian Pontarelli
|
|
6182
6162
|
*/
|
|
6183
|
-
var
|
|
6184
|
-
(function (
|
|
6185
|
-
|
|
6186
|
-
|
|
6187
|
-
|
|
6188
|
-
|
|
6189
|
-
(
|
|
6190
|
-
ClientAuthenticationMethod["none"] = "none";
|
|
6191
|
-
ClientAuthenticationMethod["client_secret_basic"] = "client_secret_basic";
|
|
6192
|
-
ClientAuthenticationMethod["client_secret_post"] = "client_secret_post";
|
|
6193
|
-
})(ClientAuthenticationMethod = exports.ClientAuthenticationMethod || (exports.ClientAuthenticationMethod = {}));
|
|
6163
|
+
var UserActionPhase;
|
|
6164
|
+
(function (UserActionPhase) {
|
|
6165
|
+
UserActionPhase["start"] = "start";
|
|
6166
|
+
UserActionPhase["modify"] = "modify";
|
|
6167
|
+
UserActionPhase["cancel"] = "cancel";
|
|
6168
|
+
UserActionPhase["end"] = "end";
|
|
6169
|
+
})(UserActionPhase = exports.UserActionPhase || (exports.UserActionPhase = {}));
|
|
6194
6170
|
/**
|
|
6195
|
-
*
|
|
6171
|
+
* @author Daniel DeGroff
|
|
6172
|
+
*/
|
|
6173
|
+
var UserState;
|
|
6174
|
+
(function (UserState) {
|
|
6175
|
+
UserState["Authenticated"] = "Authenticated";
|
|
6176
|
+
UserState["AuthenticatedNotRegistered"] = "AuthenticatedNotRegistered";
|
|
6177
|
+
UserState["AuthenticatedNotVerified"] = "AuthenticatedNotVerified";
|
|
6178
|
+
UserState["AuthenticatedRegistrationNotVerified"] = "AuthenticatedRegistrationNotVerified";
|
|
6179
|
+
})(UserState = exports.UserState || (exports.UserState = {}));
|
|
6180
|
+
/**
|
|
6181
|
+
* Used to express whether the Relying Party requires <a href="https://www.w3.org/TR/webauthn-2/#user-verification">user verification</a> for the
|
|
6182
|
+
* current operation.
|
|
6196
6183
|
*
|
|
6184
|
+
* @author Spencer Witt
|
|
6185
|
+
*/
|
|
6186
|
+
var UserVerificationRequirement;
|
|
6187
|
+
(function (UserVerificationRequirement) {
|
|
6188
|
+
UserVerificationRequirement["required"] = "required";
|
|
6189
|
+
UserVerificationRequirement["preferred"] = "preferred";
|
|
6190
|
+
UserVerificationRequirement["discouraged"] = "discouraged";
|
|
6191
|
+
})(UserVerificationRequirement = exports.UserVerificationRequirement || (exports.UserVerificationRequirement = {}));
|
|
6192
|
+
/**
|
|
6197
6193
|
* @author Daniel DeGroff
|
|
6198
6194
|
*/
|
|
6199
|
-
var
|
|
6200
|
-
(function (
|
|
6201
|
-
|
|
6202
|
-
|
|
6203
|
-
|
|
6204
|
-
|
|
6205
|
-
|
|
6206
|
-
|
|
6207
|
-
|
|
6208
|
-
|
|
6209
|
-
|
|
6210
|
-
|
|
6211
|
-
|
|
6212
|
-
|
|
6213
|
-
|
|
6214
|
-
|
|
6195
|
+
var VerificationStrategy;
|
|
6196
|
+
(function (VerificationStrategy) {
|
|
6197
|
+
VerificationStrategy["ClickableLink"] = "ClickableLink";
|
|
6198
|
+
VerificationStrategy["FormField"] = "FormField";
|
|
6199
|
+
})(VerificationStrategy = exports.VerificationStrategy || (exports.VerificationStrategy = {}));
|
|
6200
|
+
/**
|
|
6201
|
+
* Identifies the WebAuthn workflow. This will affect the parameters used for credential creation
|
|
6202
|
+
* and request based on the Tenant configuration.
|
|
6203
|
+
*
|
|
6204
|
+
* @author Spencer Witt
|
|
6205
|
+
*/
|
|
6206
|
+
var WebAuthnWorkflow;
|
|
6207
|
+
(function (WebAuthnWorkflow) {
|
|
6208
|
+
WebAuthnWorkflow["bootstrap"] = "bootstrap";
|
|
6209
|
+
WebAuthnWorkflow["general"] = "general";
|
|
6210
|
+
WebAuthnWorkflow["reauthentication"] = "reauthentication";
|
|
6211
|
+
})(WebAuthnWorkflow = exports.WebAuthnWorkflow || (exports.WebAuthnWorkflow = {}));
|
|
6212
|
+
/**
|
|
6213
|
+
* The possible states of an individual webhook attempt to a single endpoint.
|
|
6214
|
+
*
|
|
6215
|
+
* @author Spencer Witt
|
|
6216
|
+
*/
|
|
6217
|
+
var WebhookAttemptResult;
|
|
6218
|
+
(function (WebhookAttemptResult) {
|
|
6219
|
+
WebhookAttemptResult["Success"] = "Success";
|
|
6220
|
+
WebhookAttemptResult["Failure"] = "Failure";
|
|
6221
|
+
WebhookAttemptResult["Unknown"] = "Unknown";
|
|
6222
|
+
})(WebhookAttemptResult = exports.WebhookAttemptResult || (exports.WebhookAttemptResult = {}));
|
|
6223
|
+
/**
|
|
6224
|
+
* The possible result states of a webhook event. This tracks the success of the overall webhook transaction according to the {@link TransactionType}
|
|
6225
|
+
* and configured webhooks.
|
|
6226
|
+
*
|
|
6227
|
+
* @author Spencer Witt
|
|
6228
|
+
*/
|
|
6229
|
+
var WebhookEventResult;
|
|
6230
|
+
(function (WebhookEventResult) {
|
|
6231
|
+
WebhookEventResult["Failed"] = "Failed";
|
|
6232
|
+
WebhookEventResult["Running"] = "Running";
|
|
6233
|
+
WebhookEventResult["Succeeded"] = "Succeeded";
|
|
6234
|
+
})(WebhookEventResult = exports.WebhookEventResult || (exports.WebhookEventResult = {}));
|
|
6215
6235
|
//# sourceMappingURL=FusionAuthClient.js.map
|