@fusionauth/typescript-client 1.57.0 → 1.58.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/build/src/FusionAuthClient.d.ts +4129 -4094
- package/build/src/FusionAuthClient.js +800 -760
- package/build/src/FusionAuthClient.js.map +1 -1
- package/dist/fusionauth-typescript-client.js +801 -761
- package/dist/fusionauth-typescript-client.min.js +1 -1
- package/dist/fusionauth-typescript-client.min.js.map +1 -1
- package/package.json +1 -1
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
/*
|
|
3
|
-
* Copyright (c) 2019-
|
|
3
|
+
* Copyright (c) 2019-2025, FusionAuth, All Rights Reserved
|
|
4
4
|
*
|
|
5
5
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
6
6
|
* you may not use this file except in compliance with the License.
|
|
@@ -15,7 +15,7 @@
|
|
|
15
15
|
* language governing permissions and limitations under the License.
|
|
16
16
|
*/
|
|
17
17
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
18
|
-
exports.
|
|
18
|
+
exports.WebhookEventResult = exports.WebhookAttemptResult = exports.WebAuthnWorkflow = exports.VerificationStrategy = exports.UserVerificationRequirement = exports.UserState = exports.UserActionPhase = exports.UnverifiedBehavior = exports.UnknownScopePolicy = exports.TransactionType = exports.TokenType = exports.ThemeType = exports.UniqueUsernameStrategy = exports.SystemTrustedProxyConfigurationPolicy = exports.SteamAPIMode = exports.Sort = exports.SecureGeneratorType = exports.SAMLv2DestinationAssertionPolicy = exports.ResidentKeyRequirement = exports.RefreshTokenUsagePolicy = exports.RefreshTokenExpirationPolicy = exports.ReactorFeatureStatus = exports.RateLimitedRequestType = exports.PublicKeyCredentialType = exports.ProofKeyForCodeExchangePolicy = exports.BreachMatchMode = exports.BreachAction = exports.ObjectState = exports.Oauth2AuthorizedURLValidationPolicy = exports.OAuthScopeHandlingPolicy = exports.OAuthScopeConsentMode = exports.OAuthErrorType = exports.OAuthErrorReason = exports.OAuthApplicationRelationship = exports.MultiFactorLoginPolicy = exports.MessengerType = exports.MessageType = exports.LogoutBehavior = exports.LambdaType = exports.LambdaEngineType = exports.LDAPSecurityMethod = exports.KeyUse = exports.KeyType = exports.KeyAlgorithm = exports.IdentityProviderType = exports.ClientAuthenticationMethod = exports.IdentityProviderLoginMethod = exports.IdentityProviderLinkingStrategy = exports.IPAccessControlEntryAction = exports.HTTPMethod = exports.GrantType = exports.FormType = exports.FormFieldAdminPolicy = exports.FormDataType = exports.FormControl = exports.FamilyRole = exports.ExpiryUnit = exports.EventType = exports.EventLogType = exports.EmailSecurityType = exports.DeviceType = exports.CoseKeyType = exports.CoseEllipticCurve = exports.CoseAlgorithmIdentifier = exports.ContentStatus = exports.ConsentStatus = exports.ConnectorType = exports.ClientAuthenticationPolicy = exports.ChangePasswordReason = exports.CaptchaMethod = exports.CanonicalizationMethod = exports.BreachedPasswordStatus = exports.TOTPAlgorithm = exports.AuthenticatorAttachmentPreference = exports.AuthenticatorAttachment = exports.AuthenticationThreats = exports.AttestationType = exports.AttestationConveyancePreference = exports.ApplicationMultiFactorTrustPolicy = exports.XMLSignatureLocation = exports.SAMLLogoutBehavior = exports.RegistrationType = exports.LoginIdType = exports.Algorithm = exports.FusionAuthClient = void 0;
|
|
19
19
|
const DefaultRESTClientBuilder_1 = require("./DefaultRESTClientBuilder");
|
|
20
20
|
const url_1 = require("url");
|
|
21
21
|
class FusionAuthClient {
|
|
@@ -143,6 +143,26 @@ class FusionAuthClient {
|
|
|
143
143
|
.withMethod("POST")
|
|
144
144
|
.go();
|
|
145
145
|
}
|
|
146
|
+
/**
|
|
147
|
+
* Changes a user's password using their access token (JWT) instead of the changePasswordId
|
|
148
|
+
* A common use case for this method will be if you want to allow the user to change their own password.
|
|
149
|
+
*
|
|
150
|
+
* Remember to send refreshToken in the request body if you want to get a new refresh token when login using the returned oneTimePassword.
|
|
151
|
+
*
|
|
152
|
+
* @param {string} encodedJWT The encoded JWT (access token).
|
|
153
|
+
* @param {ChangePasswordRequest} request The change password request that contains all the information used to change the password.
|
|
154
|
+
* @returns {Promise<ClientResponse<ChangePasswordResponse>>}
|
|
155
|
+
*
|
|
156
|
+
* @deprecated This method has been renamed to changePasswordUsingJWT, use that method instead.
|
|
157
|
+
*/
|
|
158
|
+
changePasswordByJWT(encodedJWT, request) {
|
|
159
|
+
return this.startAnonymous()
|
|
160
|
+
.withUri('/api/user/change-password')
|
|
161
|
+
.withAuthorization('Bearer ' + encodedJWT)
|
|
162
|
+
.withJSONBody(request)
|
|
163
|
+
.withMethod("POST")
|
|
164
|
+
.go();
|
|
165
|
+
}
|
|
146
166
|
/**
|
|
147
167
|
* Changes a user's password using their identity (loginId and password). Using a loginId instead of the changePasswordId
|
|
148
168
|
* bypasses the email verification and allows a password to be changed directly without first calling the #forgotPassword
|
|
@@ -158,6 +178,24 @@ class FusionAuthClient {
|
|
|
158
178
|
.withMethod("POST")
|
|
159
179
|
.go();
|
|
160
180
|
}
|
|
181
|
+
/**
|
|
182
|
+
* Changes a user's password using their access token (JWT) instead of the changePasswordId
|
|
183
|
+
* A common use case for this method will be if you want to allow the user to change their own password.
|
|
184
|
+
*
|
|
185
|
+
* Remember to send refreshToken in the request body if you want to get a new refresh token when login using the returned oneTimePassword.
|
|
186
|
+
*
|
|
187
|
+
* @param {string} encodedJWT The encoded JWT (access token).
|
|
188
|
+
* @param {ChangePasswordRequest} request The change password request that contains all the information used to change the password.
|
|
189
|
+
* @returns {Promise<ClientResponse<ChangePasswordResponse>>}
|
|
190
|
+
*/
|
|
191
|
+
changePasswordUsingJWT(encodedJWT, request) {
|
|
192
|
+
return this.startAnonymous()
|
|
193
|
+
.withUri('/api/user/change-password')
|
|
194
|
+
.withAuthorization('Bearer ' + encodedJWT)
|
|
195
|
+
.withJSONBody(request)
|
|
196
|
+
.withMethod("POST")
|
|
197
|
+
.go();
|
|
198
|
+
}
|
|
161
199
|
/**
|
|
162
200
|
* Check to see if the user must obtain a Trust Token Id in order to complete a change password request.
|
|
163
201
|
* When a user has enabled Two-Factor authentication, before you are allowed to use the Change Password API to change
|
|
@@ -784,7 +822,7 @@ class FusionAuthClient {
|
|
|
784
822
|
.go();
|
|
785
823
|
}
|
|
786
824
|
/**
|
|
787
|
-
* Deactivates the users with the given
|
|
825
|
+
* Deactivates the users with the given Ids.
|
|
788
826
|
*
|
|
789
827
|
* @param {Array<string>} userIds The ids of the users to deactivate.
|
|
790
828
|
* @returns {Promise<ClientResponse<UserDeleteResponse>>}
|
|
@@ -801,7 +839,7 @@ class FusionAuthClient {
|
|
|
801
839
|
.go();
|
|
802
840
|
}
|
|
803
841
|
/**
|
|
804
|
-
* Deactivates the users with the given
|
|
842
|
+
* Deactivates the users with the given Ids.
|
|
805
843
|
*
|
|
806
844
|
* @param {Array<string>} userIds The ids of the users to deactivate.
|
|
807
845
|
* @returns {Promise<ClientResponse<UserDeleteResponse>>}
|
|
@@ -1276,8 +1314,8 @@ class FusionAuthClient {
|
|
|
1276
1314
|
.go();
|
|
1277
1315
|
}
|
|
1278
1316
|
/**
|
|
1279
|
-
* Deletes the users with the given
|
|
1280
|
-
* The order of preference is
|
|
1317
|
+
* Deletes the users with the given Ids, or users matching the provided JSON query or queryString.
|
|
1318
|
+
* The order of preference is Ids, query and then queryString, it is recommended to only provide one of the three for the request.
|
|
1281
1319
|
*
|
|
1282
1320
|
* This method can be used to deactivate or permanently delete (hard-delete) users based upon the hardDelete boolean in the request body.
|
|
1283
1321
|
* Using the dryRun parameter you may also request the result of the action without actually deleting or deactivating any users.
|
|
@@ -1295,8 +1333,8 @@ class FusionAuthClient {
|
|
|
1295
1333
|
.go();
|
|
1296
1334
|
}
|
|
1297
1335
|
/**
|
|
1298
|
-
* Deletes the users with the given
|
|
1299
|
-
* The order of preference is
|
|
1336
|
+
* Deletes the users with the given Ids, or users matching the provided JSON query or queryString.
|
|
1337
|
+
* The order of preference is Ids, query and then queryString, it is recommended to only provide one of the three for the request.
|
|
1300
1338
|
*
|
|
1301
1339
|
* This method can be used to deactivate or permanently delete (hard-delete) users based upon the hardDelete boolean in the request body.
|
|
1302
1340
|
* Using the dryRun parameter you may also request the result of the action without actually deleting or deactivating any users.
|
|
@@ -1845,7 +1883,7 @@ class FusionAuthClient {
|
|
|
1845
1883
|
* Modifies a temporal user action by changing the expiration of the action and optionally adding a comment to the
|
|
1846
1884
|
* action.
|
|
1847
1885
|
*
|
|
1848
|
-
* @param {UUID} actionId The Id of the action to modify. This is technically the user action log
|
|
1886
|
+
* @param {UUID} actionId The Id of the action to modify. This is technically the user action log Id.
|
|
1849
1887
|
* @param {ActionRequest} request The request that contains all the information about the modification.
|
|
1850
1888
|
* @returns {Promise<ClientResponse<ActionResponse>>}
|
|
1851
1889
|
*/
|
|
@@ -1871,10 +1909,10 @@ class FusionAuthClient {
|
|
|
1871
1909
|
.go();
|
|
1872
1910
|
}
|
|
1873
1911
|
/**
|
|
1874
|
-
* Updates an
|
|
1912
|
+
* Updates an API key with the given Id.
|
|
1875
1913
|
*
|
|
1876
|
-
* @param {UUID} keyId The Id of the
|
|
1877
|
-
* @param {APIKeyRequest} request The request object that contains all the information needed to create the
|
|
1914
|
+
* @param {UUID} keyId The Id of the API key. If not provided a secure random api key will be generated.
|
|
1915
|
+
* @param {APIKeyRequest} request The request object that contains all the information needed to create the API key.
|
|
1878
1916
|
* @returns {Promise<ClientResponse<APIKeyResponse>>}
|
|
1879
1917
|
*/
|
|
1880
1918
|
patchAPIKey(keyId, request) {
|
|
@@ -1882,7 +1920,7 @@ class FusionAuthClient {
|
|
|
1882
1920
|
.withUri('/api/api-key')
|
|
1883
1921
|
.withUriSegment(keyId)
|
|
1884
1922
|
.withJSONBody(request)
|
|
1885
|
-
.withMethod("
|
|
1923
|
+
.withMethod("PATCH")
|
|
1886
1924
|
.go();
|
|
1887
1925
|
}
|
|
1888
1926
|
/**
|
|
@@ -2426,7 +2464,7 @@ class FusionAuthClient {
|
|
|
2426
2464
|
.go();
|
|
2427
2465
|
}
|
|
2428
2466
|
/**
|
|
2429
|
-
* Removes a user from the family with the given
|
|
2467
|
+
* Removes a user from the family with the given Id.
|
|
2430
2468
|
*
|
|
2431
2469
|
* @param {UUID} familyId The Id of the family to remove the user from.
|
|
2432
2470
|
* @param {UUID} userId The Id of the user to remove from the family.
|
|
@@ -2485,7 +2523,7 @@ class FusionAuthClient {
|
|
|
2485
2523
|
.go();
|
|
2486
2524
|
}
|
|
2487
2525
|
/**
|
|
2488
|
-
* Retrieves an authentication API key for the given
|
|
2526
|
+
* Retrieves an authentication API key for the given Id.
|
|
2489
2527
|
*
|
|
2490
2528
|
* @param {UUID} keyId The Id of the API key to retrieve.
|
|
2491
2529
|
* @returns {Promise<ClientResponse<APIKeyResponse>>}
|
|
@@ -2556,7 +2594,7 @@ class FusionAuthClient {
|
|
|
2556
2594
|
/**
|
|
2557
2595
|
* Retrieves the application for the given Id or all the applications if the Id is null.
|
|
2558
2596
|
*
|
|
2559
|
-
* @param {UUID} applicationId (Optional) The application
|
|
2597
|
+
* @param {UUID} applicationId (Optional) The application Id.
|
|
2560
2598
|
* @returns {Promise<ClientResponse<ApplicationResponse>>}
|
|
2561
2599
|
*/
|
|
2562
2600
|
retrieveApplication(applicationId) {
|
|
@@ -2639,10 +2677,10 @@ class FusionAuthClient {
|
|
|
2639
2677
|
.go();
|
|
2640
2678
|
}
|
|
2641
2679
|
/**
|
|
2642
|
-
* Retrieves the daily active user report between the two instants. If you specify an application
|
|
2680
|
+
* Retrieves the daily active user report between the two instants. If you specify an application Id, it will only
|
|
2643
2681
|
* return the daily active counts for that application.
|
|
2644
2682
|
*
|
|
2645
|
-
* @param {UUID} applicationId (Optional) The application
|
|
2683
|
+
* @param {UUID} applicationId (Optional) The application Id.
|
|
2646
2684
|
* @param {number} start The start instant as UTC milliseconds since Epoch.
|
|
2647
2685
|
* @param {number} end The end instant as UTC milliseconds since Epoch.
|
|
2648
2686
|
* @returns {Promise<ClientResponse<DailyActiveUserReportResponse>>}
|
|
@@ -2657,7 +2695,7 @@ class FusionAuthClient {
|
|
|
2657
2695
|
.go();
|
|
2658
2696
|
}
|
|
2659
2697
|
/**
|
|
2660
|
-
* Retrieves the email template for the given Id. If you don't specify the
|
|
2698
|
+
* Retrieves the email template for the given Id. If you don't specify the Id, this will return all the email templates.
|
|
2661
2699
|
*
|
|
2662
2700
|
* @param {UUID} emailTemplateId (Optional) The Id of the email template.
|
|
2663
2701
|
* @returns {Promise<ClientResponse<EmailTemplateResponse>>}
|
|
@@ -3073,10 +3111,10 @@ class FusionAuthClient {
|
|
|
3073
3111
|
.go();
|
|
3074
3112
|
}
|
|
3075
3113
|
/**
|
|
3076
|
-
* Retrieves the login report between the two instants. If you specify an application
|
|
3114
|
+
* Retrieves the login report between the two instants. If you specify an application Id, it will only return the
|
|
3077
3115
|
* login counts for that application.
|
|
3078
3116
|
*
|
|
3079
|
-
* @param {UUID} applicationId (Optional) The application
|
|
3117
|
+
* @param {UUID} applicationId (Optional) The application Id.
|
|
3080
3118
|
* @param {number} start The start instant as UTC milliseconds since Epoch.
|
|
3081
3119
|
* @param {number} end The end instant as UTC milliseconds since Epoch.
|
|
3082
3120
|
* @returns {Promise<ClientResponse<LoginReportResponse>>}
|
|
@@ -3091,7 +3129,7 @@ class FusionAuthClient {
|
|
|
3091
3129
|
.go();
|
|
3092
3130
|
}
|
|
3093
3131
|
/**
|
|
3094
|
-
* Retrieves the message template for the given Id. If you don't specify the
|
|
3132
|
+
* Retrieves the message template for the given Id. If you don't specify the Id, this will return all the message templates.
|
|
3095
3133
|
*
|
|
3096
3134
|
* @param {UUID} messageTemplateId (Optional) The Id of the message template.
|
|
3097
3135
|
* @returns {Promise<ClientResponse<MessageTemplateResponse>>}
|
|
@@ -3152,10 +3190,10 @@ class FusionAuthClient {
|
|
|
3152
3190
|
.go();
|
|
3153
3191
|
}
|
|
3154
3192
|
/**
|
|
3155
|
-
* Retrieves the monthly active user report between the two instants. If you specify an application
|
|
3193
|
+
* Retrieves the monthly active user report between the two instants. If you specify an application Id, it will only
|
|
3156
3194
|
* return the monthly active counts for that application.
|
|
3157
3195
|
*
|
|
3158
|
-
* @param {UUID} applicationId (Optional) The application
|
|
3196
|
+
* @param {UUID} applicationId (Optional) The application Id.
|
|
3159
3197
|
* @param {number} start The start instant as UTC milliseconds since Epoch.
|
|
3160
3198
|
* @param {number} end The end instant as UTC milliseconds since Epoch.
|
|
3161
3199
|
* @returns {Promise<ClientResponse<MonthlyActiveUserReportResponse>>}
|
|
@@ -3331,7 +3369,7 @@ class FusionAuthClient {
|
|
|
3331
3369
|
.go();
|
|
3332
3370
|
}
|
|
3333
3371
|
/**
|
|
3334
|
-
* Retrieves the user registration for the user with the given Id and the given application
|
|
3372
|
+
* Retrieves the user registration for the user with the given Id and the given application Id.
|
|
3335
3373
|
*
|
|
3336
3374
|
* @param {UUID} userId The Id of the user.
|
|
3337
3375
|
* @param {UUID} applicationId The Id of the application.
|
|
@@ -3346,10 +3384,10 @@ class FusionAuthClient {
|
|
|
3346
3384
|
.go();
|
|
3347
3385
|
}
|
|
3348
3386
|
/**
|
|
3349
|
-
* Retrieves the registration report between the two instants. If you specify an application
|
|
3387
|
+
* Retrieves the registration report between the two instants. If you specify an application Id, it will only return
|
|
3350
3388
|
* the registration counts for that application.
|
|
3351
3389
|
*
|
|
3352
|
-
* @param {UUID} applicationId (Optional) The application
|
|
3390
|
+
* @param {UUID} applicationId (Optional) The application Id.
|
|
3353
3391
|
* @param {number} start The start instant as UTC milliseconds since Epoch.
|
|
3354
3392
|
* @param {number} end The end instant as UTC milliseconds since Epoch.
|
|
3355
3393
|
* @returns {Promise<ClientResponse<RegistrationReportResponse>>}
|
|
@@ -3526,7 +3564,7 @@ class FusionAuthClient {
|
|
|
3526
3564
|
.go();
|
|
3527
3565
|
}
|
|
3528
3566
|
/**
|
|
3529
|
-
* Retrieves the user action for the given Id. If you pass in null for the
|
|
3567
|
+
* Retrieves the user action for the given Id. If you pass in null for the Id, this will return all the user
|
|
3530
3568
|
* actions.
|
|
3531
3569
|
*
|
|
3532
3570
|
* @param {UUID} userActionId (Optional) The Id of the user action.
|
|
@@ -3540,7 +3578,7 @@ class FusionAuthClient {
|
|
|
3540
3578
|
.go();
|
|
3541
3579
|
}
|
|
3542
3580
|
/**
|
|
3543
|
-
* Retrieves the user action reason for the given Id. If you pass in null for the
|
|
3581
|
+
* Retrieves the user action reason for the given Id. If you pass in null for the Id, this will return all the user
|
|
3544
3582
|
* action reasons.
|
|
3545
3583
|
*
|
|
3546
3584
|
* @param {UUID} userActionReasonId (Optional) The Id of the user action reason.
|
|
@@ -3647,8 +3685,8 @@ class FusionAuthClient {
|
|
|
3647
3685
|
*
|
|
3648
3686
|
* This API is useful if you want to build your own login workflow to complete a device grant.
|
|
3649
3687
|
*
|
|
3650
|
-
* @param {string} client_id The client
|
|
3651
|
-
* @param {string} client_secret The client
|
|
3688
|
+
* @param {string} client_id The client Id.
|
|
3689
|
+
* @param {string} client_secret The client Id.
|
|
3652
3690
|
* @param {string} user_code The end-user verification code.
|
|
3653
3691
|
* @returns {Promise<ClientResponse<void>>}
|
|
3654
3692
|
*/
|
|
@@ -3767,11 +3805,11 @@ class FusionAuthClient {
|
|
|
3767
3805
|
.go();
|
|
3768
3806
|
}
|
|
3769
3807
|
/**
|
|
3770
|
-
* Retrieves the login report between the two instants for a particular user by Id. If you specify an application
|
|
3808
|
+
* Retrieves the login report between the two instants for a particular user by Id. If you specify an application Id, it will only return the
|
|
3771
3809
|
* login counts for that application.
|
|
3772
3810
|
*
|
|
3773
|
-
* @param {UUID} applicationId (Optional) The application
|
|
3774
|
-
* @param {UUID} userId The userId
|
|
3811
|
+
* @param {UUID} applicationId (Optional) The application Id.
|
|
3812
|
+
* @param {UUID} userId The userId Id.
|
|
3775
3813
|
* @param {number} start The start instant as UTC milliseconds since Epoch.
|
|
3776
3814
|
* @param {number} end The end instant as UTC milliseconds since Epoch.
|
|
3777
3815
|
* @returns {Promise<ClientResponse<LoginReportResponse>>}
|
|
@@ -3787,11 +3825,11 @@ class FusionAuthClient {
|
|
|
3787
3825
|
.go();
|
|
3788
3826
|
}
|
|
3789
3827
|
/**
|
|
3790
|
-
* Retrieves the login report between the two instants for a particular user by login Id. If you specify an application
|
|
3828
|
+
* Retrieves the login report between the two instants for a particular user by login Id. If you specify an application Id, it will only return the
|
|
3791
3829
|
* login counts for that application.
|
|
3792
3830
|
*
|
|
3793
|
-
* @param {UUID} applicationId (Optional) The application
|
|
3794
|
-
* @param {string} loginId The userId
|
|
3831
|
+
* @param {UUID} applicationId (Optional) The application Id.
|
|
3832
|
+
* @param {string} loginId The userId Id.
|
|
3795
3833
|
* @param {number} start The start instant as UTC milliseconds since Epoch.
|
|
3796
3834
|
* @param {number} end The end instant as UTC milliseconds since Epoch.
|
|
3797
3835
|
* @returns {Promise<ClientResponse<LoginReportResponse>>}
|
|
@@ -3874,7 +3912,7 @@ class FusionAuthClient {
|
|
|
3874
3912
|
.go();
|
|
3875
3913
|
}
|
|
3876
3914
|
/**
|
|
3877
|
-
* Retrieves the webhook for the given Id. If you pass in null for the
|
|
3915
|
+
* Retrieves the webhook for the given Id. If you pass in null for the Id, this will return all the webhooks.
|
|
3878
3916
|
*
|
|
3879
3917
|
* @param {UUID} webhookId (Optional) The Id of the webhook.
|
|
3880
3918
|
* @returns {Promise<ClientResponse<WebhookResponse>>}
|
|
@@ -4123,7 +4161,7 @@ class FusionAuthClient {
|
|
|
4123
4161
|
.go();
|
|
4124
4162
|
}
|
|
4125
4163
|
/**
|
|
4126
|
-
* Retrieves the entities for the given
|
|
4164
|
+
* Retrieves the entities for the given Ids. If any Id is invalid, it is ignored.
|
|
4127
4165
|
*
|
|
4128
4166
|
* @param {Array<string>} ids The entity ids to search for.
|
|
4129
4167
|
* @returns {Promise<ClientResponse<EntitySearchResponse>>}
|
|
@@ -4305,7 +4343,7 @@ class FusionAuthClient {
|
|
|
4305
4343
|
.go();
|
|
4306
4344
|
}
|
|
4307
4345
|
/**
|
|
4308
|
-
* Retrieves the users for the given
|
|
4346
|
+
* Retrieves the users for the given Ids. If any Id is invalid, it is ignored.
|
|
4309
4347
|
*
|
|
4310
4348
|
* @param {Array<string>} ids The user ids to search for.
|
|
4311
4349
|
* @returns {Promise<ClientResponse<SearchResponse>>}
|
|
@@ -4320,9 +4358,9 @@ class FusionAuthClient {
|
|
|
4320
4358
|
.go();
|
|
4321
4359
|
}
|
|
4322
4360
|
/**
|
|
4323
|
-
* Retrieves the users for the given
|
|
4361
|
+
* Retrieves the users for the given Ids. If any Id is invalid, it is ignored.
|
|
4324
4362
|
*
|
|
4325
|
-
* @param {Array<string>} ids The user
|
|
4363
|
+
* @param {Array<string>} ids The user Ids to search for.
|
|
4326
4364
|
* @returns {Promise<ClientResponse<SearchResponse>>}
|
|
4327
4365
|
*/
|
|
4328
4366
|
searchUsersByIds(ids) {
|
|
@@ -4389,7 +4427,7 @@ class FusionAuthClient {
|
|
|
4389
4427
|
.go();
|
|
4390
4428
|
}
|
|
4391
4429
|
/**
|
|
4392
|
-
* Send an email using an email template
|
|
4430
|
+
* Send an email using an email template Id. You can optionally provide <code>requestData</code> to access key value
|
|
4393
4431
|
* pairs in the email template.
|
|
4394
4432
|
*
|
|
4395
4433
|
* @param {UUID} emailTemplateId The Id for the template.
|
|
@@ -4575,16 +4613,16 @@ class FusionAuthClient {
|
|
|
4575
4613
|
.go();
|
|
4576
4614
|
}
|
|
4577
4615
|
/**
|
|
4578
|
-
* Updates an API key
|
|
4616
|
+
* Updates an API key with the given Id.
|
|
4579
4617
|
*
|
|
4580
|
-
* @param {UUID}
|
|
4581
|
-
* @param {APIKeyRequest} request The request
|
|
4618
|
+
* @param {UUID} keyId The Id of the API key to update.
|
|
4619
|
+
* @param {APIKeyRequest} request The request that contains all the new API key information.
|
|
4582
4620
|
* @returns {Promise<ClientResponse<APIKeyResponse>>}
|
|
4583
4621
|
*/
|
|
4584
|
-
updateAPIKey(
|
|
4622
|
+
updateAPIKey(keyId, request) {
|
|
4585
4623
|
return this.start()
|
|
4586
4624
|
.withUri('/api/api-key')
|
|
4587
|
-
.withUriSegment(
|
|
4625
|
+
.withUriSegment(keyId)
|
|
4588
4626
|
.withJSONBody(request)
|
|
4589
4627
|
.withMethod("PUT")
|
|
4590
4628
|
.go();
|
|
@@ -5063,7 +5101,7 @@ class FusionAuthClient {
|
|
|
5063
5101
|
* If you build your own activation form you should validate the user provided code prior to beginning the Authorization grant.
|
|
5064
5102
|
*
|
|
5065
5103
|
* @param {string} user_code The end-user verification code.
|
|
5066
|
-
* @param {string} client_id The client
|
|
5104
|
+
* @param {string} client_id The client Id.
|
|
5067
5105
|
* @returns {Promise<ClientResponse<void>>}
|
|
5068
5106
|
*/
|
|
5069
5107
|
validateDevice(user_code, client_id) {
|
|
@@ -5221,24 +5259,67 @@ class FusionAuthClient {
|
|
|
5221
5259
|
exports.FusionAuthClient = FusionAuthClient;
|
|
5222
5260
|
exports.default = FusionAuthClient;
|
|
5223
5261
|
/**
|
|
5224
|
-
*
|
|
5225
|
-
* Framework - RFC 6749</a>.
|
|
5226
|
-
* <p>
|
|
5227
|
-
* Specific names as defined by <a href="https://tools.ietf.org/html/rfc7591#section-4.1">
|
|
5228
|
-
* OAuth 2.0 Dynamic Client Registration Protocol - RFC 7591 Section 4.1</a>
|
|
5262
|
+
* Available JSON Web Algorithms (JWA) as described in RFC 7518 available for this JWT implementation.
|
|
5229
5263
|
*
|
|
5230
5264
|
* @author Daniel DeGroff
|
|
5231
5265
|
*/
|
|
5232
|
-
var
|
|
5233
|
-
(function (
|
|
5234
|
-
|
|
5235
|
-
|
|
5236
|
-
|
|
5237
|
-
|
|
5238
|
-
|
|
5239
|
-
|
|
5240
|
-
|
|
5241
|
-
|
|
5266
|
+
var Algorithm;
|
|
5267
|
+
(function (Algorithm) {
|
|
5268
|
+
Algorithm["ES256"] = "ES256";
|
|
5269
|
+
Algorithm["ES384"] = "ES384";
|
|
5270
|
+
Algorithm["ES512"] = "ES512";
|
|
5271
|
+
Algorithm["HS256"] = "HS256";
|
|
5272
|
+
Algorithm["HS384"] = "HS384";
|
|
5273
|
+
Algorithm["HS512"] = "HS512";
|
|
5274
|
+
Algorithm["PS256"] = "PS256";
|
|
5275
|
+
Algorithm["PS384"] = "PS384";
|
|
5276
|
+
Algorithm["PS512"] = "PS512";
|
|
5277
|
+
Algorithm["RS256"] = "RS256";
|
|
5278
|
+
Algorithm["RS384"] = "RS384";
|
|
5279
|
+
Algorithm["RS512"] = "RS512";
|
|
5280
|
+
Algorithm["none"] = "none";
|
|
5281
|
+
})(Algorithm = exports.Algorithm || (exports.Algorithm = {}));
|
|
5282
|
+
var LoginIdType;
|
|
5283
|
+
(function (LoginIdType) {
|
|
5284
|
+
LoginIdType["email"] = "email";
|
|
5285
|
+
LoginIdType["username"] = "username";
|
|
5286
|
+
})(LoginIdType = exports.LoginIdType || (exports.LoginIdType = {}));
|
|
5287
|
+
var RegistrationType;
|
|
5288
|
+
(function (RegistrationType) {
|
|
5289
|
+
RegistrationType["basic"] = "basic";
|
|
5290
|
+
RegistrationType["advanced"] = "advanced";
|
|
5291
|
+
})(RegistrationType = exports.RegistrationType || (exports.RegistrationType = {}));
|
|
5292
|
+
var SAMLLogoutBehavior;
|
|
5293
|
+
(function (SAMLLogoutBehavior) {
|
|
5294
|
+
SAMLLogoutBehavior["AllParticipants"] = "AllParticipants";
|
|
5295
|
+
SAMLLogoutBehavior["OnlyOriginator"] = "OnlyOriginator";
|
|
5296
|
+
})(SAMLLogoutBehavior = exports.SAMLLogoutBehavior || (exports.SAMLLogoutBehavior = {}));
|
|
5297
|
+
var XMLSignatureLocation;
|
|
5298
|
+
(function (XMLSignatureLocation) {
|
|
5299
|
+
XMLSignatureLocation["Assertion"] = "Assertion";
|
|
5300
|
+
XMLSignatureLocation["Response"] = "Response";
|
|
5301
|
+
})(XMLSignatureLocation = exports.XMLSignatureLocation || (exports.XMLSignatureLocation = {}));
|
|
5302
|
+
/**
|
|
5303
|
+
* @author Daniel DeGroff
|
|
5304
|
+
*/
|
|
5305
|
+
var ApplicationMultiFactorTrustPolicy;
|
|
5306
|
+
(function (ApplicationMultiFactorTrustPolicy) {
|
|
5307
|
+
ApplicationMultiFactorTrustPolicy["Any"] = "Any";
|
|
5308
|
+
ApplicationMultiFactorTrustPolicy["This"] = "This";
|
|
5309
|
+
ApplicationMultiFactorTrustPolicy["None"] = "None";
|
|
5310
|
+
})(ApplicationMultiFactorTrustPolicy = exports.ApplicationMultiFactorTrustPolicy || (exports.ApplicationMultiFactorTrustPolicy = {}));
|
|
5311
|
+
/**
|
|
5312
|
+
* Used to communicate whether and how authenticator attestation should be delivered to the Relying Party
|
|
5313
|
+
*
|
|
5314
|
+
* @author Spencer Witt
|
|
5315
|
+
*/
|
|
5316
|
+
var AttestationConveyancePreference;
|
|
5317
|
+
(function (AttestationConveyancePreference) {
|
|
5318
|
+
AttestationConveyancePreference["none"] = "none";
|
|
5319
|
+
AttestationConveyancePreference["indirect"] = "indirect";
|
|
5320
|
+
AttestationConveyancePreference["direct"] = "direct";
|
|
5321
|
+
AttestationConveyancePreference["enterprise"] = "enterprise";
|
|
5322
|
+
})(AttestationConveyancePreference = exports.AttestationConveyancePreference || (exports.AttestationConveyancePreference = {}));
|
|
5242
5323
|
/**
|
|
5243
5324
|
* Used to indicate what type of attestation was included in the authenticator response for a given WebAuthn credential at the time it was created
|
|
5244
5325
|
*
|
|
@@ -5252,33 +5333,113 @@ var AttestationType;
|
|
|
5252
5333
|
AttestationType["anonymizationCa"] = "anonymizationCa";
|
|
5253
5334
|
AttestationType["none"] = "none";
|
|
5254
5335
|
})(AttestationType = exports.AttestationType || (exports.AttestationType = {}));
|
|
5255
|
-
var EmailSecurityType;
|
|
5256
|
-
(function (EmailSecurityType) {
|
|
5257
|
-
EmailSecurityType["NONE"] = "NONE";
|
|
5258
|
-
EmailSecurityType["SSL"] = "SSL";
|
|
5259
|
-
EmailSecurityType["TLS"] = "TLS";
|
|
5260
|
-
})(EmailSecurityType = exports.EmailSecurityType || (exports.EmailSecurityType = {}));
|
|
5261
|
-
var UniqueUsernameStrategy;
|
|
5262
|
-
(function (UniqueUsernameStrategy) {
|
|
5263
|
-
UniqueUsernameStrategy["Always"] = "Always";
|
|
5264
|
-
UniqueUsernameStrategy["OnCollision"] = "OnCollision";
|
|
5265
|
-
})(UniqueUsernameStrategy = exports.UniqueUsernameStrategy || (exports.UniqueUsernameStrategy = {}));
|
|
5266
5336
|
/**
|
|
5267
|
-
*
|
|
5268
|
-
|
|
5269
|
-
|
|
5270
|
-
|
|
5271
|
-
|
|
5272
|
-
|
|
5273
|
-
|
|
5337
|
+
* @author Brett Pontarelli
|
|
5338
|
+
*/
|
|
5339
|
+
var AuthenticationThreats;
|
|
5340
|
+
(function (AuthenticationThreats) {
|
|
5341
|
+
AuthenticationThreats["ImpossibleTravel"] = "ImpossibleTravel";
|
|
5342
|
+
})(AuthenticationThreats = exports.AuthenticationThreats || (exports.AuthenticationThreats = {}));
|
|
5343
|
+
/**
|
|
5344
|
+
* Describes the <a href="https://www.w3.org/TR/webauthn-2/#authenticator-attachment-modality">authenticator attachment modality</a>.
|
|
5345
|
+
*
|
|
5346
|
+
* @author Spencer Witt
|
|
5347
|
+
*/
|
|
5348
|
+
var AuthenticatorAttachment;
|
|
5349
|
+
(function (AuthenticatorAttachment) {
|
|
5350
|
+
AuthenticatorAttachment["platform"] = "platform";
|
|
5351
|
+
AuthenticatorAttachment["crossPlatform"] = "crossPlatform";
|
|
5352
|
+
})(AuthenticatorAttachment = exports.AuthenticatorAttachment || (exports.AuthenticatorAttachment = {}));
|
|
5353
|
+
/**
|
|
5354
|
+
* Describes the authenticator attachment modality preference for a WebAuthn workflow. See {@link AuthenticatorAttachment}
|
|
5274
5355
|
*
|
|
5356
|
+
* @author Spencer Witt
|
|
5357
|
+
*/
|
|
5358
|
+
var AuthenticatorAttachmentPreference;
|
|
5359
|
+
(function (AuthenticatorAttachmentPreference) {
|
|
5360
|
+
AuthenticatorAttachmentPreference["any"] = "any";
|
|
5361
|
+
AuthenticatorAttachmentPreference["platform"] = "platform";
|
|
5362
|
+
AuthenticatorAttachmentPreference["crossPlatform"] = "crossPlatform";
|
|
5363
|
+
})(AuthenticatorAttachmentPreference = exports.AuthenticatorAttachmentPreference || (exports.AuthenticatorAttachmentPreference = {}));
|
|
5364
|
+
var TOTPAlgorithm;
|
|
5365
|
+
(function (TOTPAlgorithm) {
|
|
5366
|
+
TOTPAlgorithm["HmacSHA1"] = "HmacSHA1";
|
|
5367
|
+
TOTPAlgorithm["HmacSHA256"] = "HmacSHA256";
|
|
5368
|
+
TOTPAlgorithm["HmacSHA512"] = "HmacSHA512";
|
|
5369
|
+
})(TOTPAlgorithm = exports.TOTPAlgorithm || (exports.TOTPAlgorithm = {}));
|
|
5370
|
+
/**
|
|
5275
5371
|
* @author Daniel DeGroff
|
|
5276
5372
|
*/
|
|
5277
|
-
var
|
|
5278
|
-
(function (
|
|
5279
|
-
|
|
5280
|
-
|
|
5281
|
-
|
|
5373
|
+
var BreachedPasswordStatus;
|
|
5374
|
+
(function (BreachedPasswordStatus) {
|
|
5375
|
+
BreachedPasswordStatus["None"] = "None";
|
|
5376
|
+
BreachedPasswordStatus["ExactMatch"] = "ExactMatch";
|
|
5377
|
+
BreachedPasswordStatus["SubAddressMatch"] = "SubAddressMatch";
|
|
5378
|
+
BreachedPasswordStatus["PasswordOnly"] = "PasswordOnly";
|
|
5379
|
+
BreachedPasswordStatus["CommonPassword"] = "CommonPassword";
|
|
5380
|
+
})(BreachedPasswordStatus = exports.BreachedPasswordStatus || (exports.BreachedPasswordStatus = {}));
|
|
5381
|
+
/**
|
|
5382
|
+
* XML canonicalization method enumeration. This is used for the IdP and SP side of FusionAuth SAML.
|
|
5383
|
+
*
|
|
5384
|
+
* @author Brian Pontarelli
|
|
5385
|
+
*/
|
|
5386
|
+
var CanonicalizationMethod;
|
|
5387
|
+
(function (CanonicalizationMethod) {
|
|
5388
|
+
CanonicalizationMethod["exclusive"] = "exclusive";
|
|
5389
|
+
CanonicalizationMethod["exclusive_with_comments"] = "exclusive_with_comments";
|
|
5390
|
+
CanonicalizationMethod["inclusive"] = "inclusive";
|
|
5391
|
+
CanonicalizationMethod["inclusive_with_comments"] = "inclusive_with_comments";
|
|
5392
|
+
})(CanonicalizationMethod = exports.CanonicalizationMethod || (exports.CanonicalizationMethod = {}));
|
|
5393
|
+
/**
|
|
5394
|
+
* @author Brett Pontarelli
|
|
5395
|
+
*/
|
|
5396
|
+
var CaptchaMethod;
|
|
5397
|
+
(function (CaptchaMethod) {
|
|
5398
|
+
CaptchaMethod["GoogleRecaptchaV2"] = "GoogleRecaptchaV2";
|
|
5399
|
+
CaptchaMethod["GoogleRecaptchaV3"] = "GoogleRecaptchaV3";
|
|
5400
|
+
CaptchaMethod["HCaptcha"] = "HCaptcha";
|
|
5401
|
+
CaptchaMethod["HCaptchaEnterprise"] = "HCaptchaEnterprise";
|
|
5402
|
+
})(CaptchaMethod = exports.CaptchaMethod || (exports.CaptchaMethod = {}));
|
|
5403
|
+
/**
|
|
5404
|
+
* @author Trevor Smith
|
|
5405
|
+
*/
|
|
5406
|
+
var ChangePasswordReason;
|
|
5407
|
+
(function (ChangePasswordReason) {
|
|
5408
|
+
ChangePasswordReason["Administrative"] = "Administrative";
|
|
5409
|
+
ChangePasswordReason["Breached"] = "Breached";
|
|
5410
|
+
ChangePasswordReason["Expired"] = "Expired";
|
|
5411
|
+
ChangePasswordReason["Validation"] = "Validation";
|
|
5412
|
+
})(ChangePasswordReason = exports.ChangePasswordReason || (exports.ChangePasswordReason = {}));
|
|
5413
|
+
/**
|
|
5414
|
+
* @author Brett Guy
|
|
5415
|
+
*/
|
|
5416
|
+
var ClientAuthenticationPolicy;
|
|
5417
|
+
(function (ClientAuthenticationPolicy) {
|
|
5418
|
+
ClientAuthenticationPolicy["Required"] = "Required";
|
|
5419
|
+
ClientAuthenticationPolicy["NotRequired"] = "NotRequired";
|
|
5420
|
+
ClientAuthenticationPolicy["NotRequiredWhenUsingPKCE"] = "NotRequiredWhenUsingPKCE";
|
|
5421
|
+
})(ClientAuthenticationPolicy = exports.ClientAuthenticationPolicy || (exports.ClientAuthenticationPolicy = {}));
|
|
5422
|
+
/**
|
|
5423
|
+
* The types of connectors. This enum is stored as an ordinal on the <code>identities</code> table, order must be maintained.
|
|
5424
|
+
*
|
|
5425
|
+
* @author Trevor Smith
|
|
5426
|
+
*/
|
|
5427
|
+
var ConnectorType;
|
|
5428
|
+
(function (ConnectorType) {
|
|
5429
|
+
ConnectorType["FusionAuth"] = "FusionAuth";
|
|
5430
|
+
ConnectorType["Generic"] = "Generic";
|
|
5431
|
+
ConnectorType["LDAP"] = "LDAP";
|
|
5432
|
+
})(ConnectorType = exports.ConnectorType || (exports.ConnectorType = {}));
|
|
5433
|
+
/**
|
|
5434
|
+
* Models a consent.
|
|
5435
|
+
*
|
|
5436
|
+
* @author Daniel DeGroff
|
|
5437
|
+
*/
|
|
5438
|
+
var ConsentStatus;
|
|
5439
|
+
(function (ConsentStatus) {
|
|
5440
|
+
ConsentStatus["Active"] = "Active";
|
|
5441
|
+
ConsentStatus["Revoked"] = "Revoked";
|
|
5442
|
+
})(ConsentStatus = exports.ConsentStatus || (exports.ConsentStatus = {}));
|
|
5282
5443
|
/**
|
|
5283
5444
|
* Status for content like usernames, profile attributes, etc.
|
|
5284
5445
|
*
|
|
@@ -5290,20 +5451,6 @@ var ContentStatus;
|
|
|
5290
5451
|
ContentStatus["PENDING"] = "PENDING";
|
|
5291
5452
|
ContentStatus["REJECTED"] = "REJECTED";
|
|
5292
5453
|
})(ContentStatus = exports.ContentStatus || (exports.ContentStatus = {}));
|
|
5293
|
-
/**
|
|
5294
|
-
* @author Matthew Altman
|
|
5295
|
-
*/
|
|
5296
|
-
var LogoutBehavior;
|
|
5297
|
-
(function (LogoutBehavior) {
|
|
5298
|
-
LogoutBehavior["RedirectOnly"] = "RedirectOnly";
|
|
5299
|
-
LogoutBehavior["AllApplications"] = "AllApplications";
|
|
5300
|
-
})(LogoutBehavior = exports.LogoutBehavior || (exports.LogoutBehavior = {}));
|
|
5301
|
-
var FamilyRole;
|
|
5302
|
-
(function (FamilyRole) {
|
|
5303
|
-
FamilyRole["Child"] = "Child";
|
|
5304
|
-
FamilyRole["Teen"] = "Teen";
|
|
5305
|
-
FamilyRole["Adult"] = "Adult";
|
|
5306
|
-
})(FamilyRole = exports.FamilyRole || (exports.FamilyRole = {}));
|
|
5307
5454
|
/**
|
|
5308
5455
|
* A number identifying a cryptographic algorithm. Values should be registered with the <a
|
|
5309
5456
|
* href="https://www.iana.org/assignments/cose/cose.xhtml#algorithms">IANA COSE Algorithms registry</a>
|
|
@@ -5323,46 +5470,168 @@ var CoseAlgorithmIdentifier;
|
|
|
5323
5470
|
CoseAlgorithmIdentifier["PS512"] = "SHA-512";
|
|
5324
5471
|
})(CoseAlgorithmIdentifier = exports.CoseAlgorithmIdentifier || (exports.CoseAlgorithmIdentifier = {}));
|
|
5325
5472
|
/**
|
|
5326
|
-
*
|
|
5473
|
+
* COSE Elliptic Curve identifier to determine which elliptic curve to use with a given key
|
|
5474
|
+
*
|
|
5475
|
+
* @author Spencer Witt
|
|
5327
5476
|
*/
|
|
5328
|
-
var
|
|
5329
|
-
(function (
|
|
5330
|
-
|
|
5331
|
-
|
|
5332
|
-
|
|
5333
|
-
|
|
5334
|
-
|
|
5335
|
-
|
|
5477
|
+
var CoseEllipticCurve;
|
|
5478
|
+
(function (CoseEllipticCurve) {
|
|
5479
|
+
CoseEllipticCurve["Reserved"] = "Reserved";
|
|
5480
|
+
CoseEllipticCurve["P256"] = "P256";
|
|
5481
|
+
CoseEllipticCurve["P384"] = "P384";
|
|
5482
|
+
CoseEllipticCurve["P521"] = "P521";
|
|
5483
|
+
CoseEllipticCurve["X25519"] = "X25519";
|
|
5484
|
+
CoseEllipticCurve["X448"] = "X448";
|
|
5485
|
+
CoseEllipticCurve["Ed25519"] = "Ed25519";
|
|
5486
|
+
CoseEllipticCurve["Ed448"] = "Ed448";
|
|
5487
|
+
CoseEllipticCurve["Secp256k1"] = "Secp256k1";
|
|
5488
|
+
})(CoseEllipticCurve = exports.CoseEllipticCurve || (exports.CoseEllipticCurve = {}));
|
|
5489
|
+
/**
|
|
5490
|
+
* COSE key type
|
|
5491
|
+
*
|
|
5492
|
+
* @author Spencer Witt
|
|
5493
|
+
*/
|
|
5494
|
+
var CoseKeyType;
|
|
5495
|
+
(function (CoseKeyType) {
|
|
5496
|
+
CoseKeyType["Reserved"] = "0";
|
|
5497
|
+
CoseKeyType["OKP"] = "1";
|
|
5498
|
+
CoseKeyType["EC2"] = "2";
|
|
5499
|
+
CoseKeyType["RSA"] = "3";
|
|
5500
|
+
CoseKeyType["Symmetric"] = "4";
|
|
5501
|
+
})(CoseKeyType = exports.CoseKeyType || (exports.CoseKeyType = {}));
|
|
5502
|
+
var DeviceType;
|
|
5503
|
+
(function (DeviceType) {
|
|
5504
|
+
DeviceType["BROWSER"] = "BROWSER";
|
|
5505
|
+
DeviceType["DESKTOP"] = "DESKTOP";
|
|
5506
|
+
DeviceType["LAPTOP"] = "LAPTOP";
|
|
5507
|
+
DeviceType["MOBILE"] = "MOBILE";
|
|
5508
|
+
DeviceType["OTHER"] = "OTHER";
|
|
5509
|
+
DeviceType["SERVER"] = "SERVER";
|
|
5510
|
+
DeviceType["TABLET"] = "TABLET";
|
|
5511
|
+
DeviceType["TV"] = "TV";
|
|
5512
|
+
DeviceType["UNKNOWN"] = "UNKNOWN";
|
|
5513
|
+
})(DeviceType = exports.DeviceType || (exports.DeviceType = {}));
|
|
5514
|
+
var EmailSecurityType;
|
|
5515
|
+
(function (EmailSecurityType) {
|
|
5516
|
+
EmailSecurityType["NONE"] = "NONE";
|
|
5517
|
+
EmailSecurityType["SSL"] = "SSL";
|
|
5518
|
+
EmailSecurityType["TLS"] = "TLS";
|
|
5519
|
+
})(EmailSecurityType = exports.EmailSecurityType || (exports.EmailSecurityType = {}));
|
|
5336
5520
|
/**
|
|
5521
|
+
* Event Log Type
|
|
5522
|
+
*
|
|
5337
5523
|
* @author Daniel DeGroff
|
|
5338
5524
|
*/
|
|
5339
|
-
var
|
|
5340
|
-
(function (
|
|
5341
|
-
|
|
5342
|
-
|
|
5343
|
-
|
|
5525
|
+
var EventLogType;
|
|
5526
|
+
(function (EventLogType) {
|
|
5527
|
+
EventLogType["Information"] = "Information";
|
|
5528
|
+
EventLogType["Debug"] = "Debug";
|
|
5529
|
+
EventLogType["Error"] = "Error";
|
|
5530
|
+
})(EventLogType = exports.EventLogType || (exports.EventLogType = {}));
|
|
5344
5531
|
/**
|
|
5345
|
-
*
|
|
5532
|
+
* Models the event types that FusionAuth produces.
|
|
5533
|
+
*
|
|
5534
|
+
* @author Brian Pontarelli
|
|
5346
5535
|
*/
|
|
5347
|
-
var
|
|
5348
|
-
(function (
|
|
5349
|
-
|
|
5350
|
-
|
|
5351
|
-
|
|
5352
|
-
|
|
5353
|
-
|
|
5354
|
-
|
|
5355
|
-
|
|
5356
|
-
|
|
5357
|
-
|
|
5358
|
-
|
|
5359
|
-
|
|
5360
|
-
|
|
5361
|
-
|
|
5362
|
-
|
|
5363
|
-
|
|
5364
|
-
|
|
5365
|
-
|
|
5536
|
+
var EventType;
|
|
5537
|
+
(function (EventType) {
|
|
5538
|
+
EventType["JWTPublicKeyUpdate"] = "jwt.public-key.update";
|
|
5539
|
+
EventType["JWTRefreshTokenRevoke"] = "jwt.refresh-token.revoke";
|
|
5540
|
+
EventType["JWTRefresh"] = "jwt.refresh";
|
|
5541
|
+
EventType["AuditLogCreate"] = "audit-log.create";
|
|
5542
|
+
EventType["EventLogCreate"] = "event-log.create";
|
|
5543
|
+
EventType["KickstartSuccess"] = "kickstart.success";
|
|
5544
|
+
EventType["GroupCreate"] = "group.create";
|
|
5545
|
+
EventType["GroupCreateComplete"] = "group.create.complete";
|
|
5546
|
+
EventType["GroupDelete"] = "group.delete";
|
|
5547
|
+
EventType["GroupDeleteComplete"] = "group.delete.complete";
|
|
5548
|
+
EventType["GroupMemberAdd"] = "group.member.add";
|
|
5549
|
+
EventType["GroupMemberAddComplete"] = "group.member.add.complete";
|
|
5550
|
+
EventType["GroupMemberRemove"] = "group.member.remove";
|
|
5551
|
+
EventType["GroupMemberRemoveComplete"] = "group.member.remove.complete";
|
|
5552
|
+
EventType["GroupMemberUpdate"] = "group.member.update";
|
|
5553
|
+
EventType["GroupMemberUpdateComplete"] = "group.member.update.complete";
|
|
5554
|
+
EventType["GroupUpdate"] = "group.update";
|
|
5555
|
+
EventType["GroupUpdateComplete"] = "group.update.complete";
|
|
5556
|
+
EventType["UserAction"] = "user.action";
|
|
5557
|
+
EventType["UserBulkCreate"] = "user.bulk.create";
|
|
5558
|
+
EventType["UserCreate"] = "user.create";
|
|
5559
|
+
EventType["UserCreateComplete"] = "user.create.complete";
|
|
5560
|
+
EventType["UserDeactivate"] = "user.deactivate";
|
|
5561
|
+
EventType["UserDelete"] = "user.delete";
|
|
5562
|
+
EventType["UserDeleteComplete"] = "user.delete.complete";
|
|
5563
|
+
EventType["UserEmailUpdate"] = "user.email.update";
|
|
5564
|
+
EventType["UserEmailVerified"] = "user.email.verified";
|
|
5565
|
+
EventType["UserIdentityProviderLink"] = "user.identity-provider.link";
|
|
5566
|
+
EventType["UserIdentityProviderUnlink"] = "user.identity-provider.unlink";
|
|
5567
|
+
EventType["UserLoginIdDuplicateOnCreate"] = "user.loginId.duplicate.create";
|
|
5568
|
+
EventType["UserLoginIdDuplicateOnUpdate"] = "user.loginId.duplicate.update";
|
|
5569
|
+
EventType["UserLoginFailed"] = "user.login.failed";
|
|
5570
|
+
EventType["UserLoginNewDevice"] = "user.login.new-device";
|
|
5571
|
+
EventType["UserLoginSuccess"] = "user.login.success";
|
|
5572
|
+
EventType["UserLoginSuspicious"] = "user.login.suspicious";
|
|
5573
|
+
EventType["UserPasswordBreach"] = "user.password.breach";
|
|
5574
|
+
EventType["UserPasswordResetSend"] = "user.password.reset.send";
|
|
5575
|
+
EventType["UserPasswordResetStart"] = "user.password.reset.start";
|
|
5576
|
+
EventType["UserPasswordResetSuccess"] = "user.password.reset.success";
|
|
5577
|
+
EventType["UserPasswordUpdate"] = "user.password.update";
|
|
5578
|
+
EventType["UserReactivate"] = "user.reactivate";
|
|
5579
|
+
EventType["UserRegistrationCreate"] = "user.registration.create";
|
|
5580
|
+
EventType["UserRegistrationCreateComplete"] = "user.registration.create.complete";
|
|
5581
|
+
EventType["UserRegistrationDelete"] = "user.registration.delete";
|
|
5582
|
+
EventType["UserRegistrationDeleteComplete"] = "user.registration.delete.complete";
|
|
5583
|
+
EventType["UserRegistrationUpdate"] = "user.registration.update";
|
|
5584
|
+
EventType["UserRegistrationUpdateComplete"] = "user.registration.update.complete";
|
|
5585
|
+
EventType["UserRegistrationVerified"] = "user.registration.verified";
|
|
5586
|
+
EventType["UserTwoFactorMethodAdd"] = "user.two-factor.method.add";
|
|
5587
|
+
EventType["UserTwoFactorMethodRemove"] = "user.two-factor.method.remove";
|
|
5588
|
+
EventType["UserUpdate"] = "user.update";
|
|
5589
|
+
EventType["UserUpdateComplete"] = "user.update.complete";
|
|
5590
|
+
EventType["Test"] = "test";
|
|
5591
|
+
})(EventType = exports.EventType || (exports.EventType = {}));
|
|
5592
|
+
/**
|
|
5593
|
+
* @author Brian Pontarelli
|
|
5594
|
+
*/
|
|
5595
|
+
var ExpiryUnit;
|
|
5596
|
+
(function (ExpiryUnit) {
|
|
5597
|
+
ExpiryUnit["MINUTES"] = "MINUTES";
|
|
5598
|
+
ExpiryUnit["HOURS"] = "HOURS";
|
|
5599
|
+
ExpiryUnit["DAYS"] = "DAYS";
|
|
5600
|
+
ExpiryUnit["WEEKS"] = "WEEKS";
|
|
5601
|
+
ExpiryUnit["MONTHS"] = "MONTHS";
|
|
5602
|
+
ExpiryUnit["YEARS"] = "YEARS";
|
|
5603
|
+
})(ExpiryUnit = exports.ExpiryUnit || (exports.ExpiryUnit = {}));
|
|
5604
|
+
var FamilyRole;
|
|
5605
|
+
(function (FamilyRole) {
|
|
5606
|
+
FamilyRole["Child"] = "Child";
|
|
5607
|
+
FamilyRole["Teen"] = "Teen";
|
|
5608
|
+
FamilyRole["Adult"] = "Adult";
|
|
5609
|
+
})(FamilyRole = exports.FamilyRole || (exports.FamilyRole = {}));
|
|
5610
|
+
/**
|
|
5611
|
+
* @author Daniel DeGroff
|
|
5612
|
+
*/
|
|
5613
|
+
var FormControl;
|
|
5614
|
+
(function (FormControl) {
|
|
5615
|
+
FormControl["checkbox"] = "checkbox";
|
|
5616
|
+
FormControl["number"] = "number";
|
|
5617
|
+
FormControl["password"] = "password";
|
|
5618
|
+
FormControl["radio"] = "radio";
|
|
5619
|
+
FormControl["select"] = "select";
|
|
5620
|
+
FormControl["textarea"] = "textarea";
|
|
5621
|
+
FormControl["text"] = "text";
|
|
5622
|
+
})(FormControl = exports.FormControl || (exports.FormControl = {}));
|
|
5623
|
+
/**
|
|
5624
|
+
* @author Daniel DeGroff
|
|
5625
|
+
*/
|
|
5626
|
+
var FormDataType;
|
|
5627
|
+
(function (FormDataType) {
|
|
5628
|
+
FormDataType["bool"] = "bool";
|
|
5629
|
+
FormDataType["consent"] = "consent";
|
|
5630
|
+
FormDataType["date"] = "date";
|
|
5631
|
+
FormDataType["email"] = "email";
|
|
5632
|
+
FormDataType["number"] = "number";
|
|
5633
|
+
FormDataType["string"] = "string";
|
|
5634
|
+
})(FormDataType = exports.FormDataType || (exports.FormDataType = {}));
|
|
5366
5635
|
/**
|
|
5367
5636
|
* @author Daniel DeGroff
|
|
5368
5637
|
*/
|
|
@@ -5372,51 +5641,34 @@ var FormFieldAdminPolicy;
|
|
|
5372
5641
|
FormFieldAdminPolicy["View"] = "View";
|
|
5373
5642
|
})(FormFieldAdminPolicy = exports.FormFieldAdminPolicy || (exports.FormFieldAdminPolicy = {}));
|
|
5374
5643
|
/**
|
|
5375
|
-
*
|
|
5376
|
-
*
|
|
5377
|
-
* @author Spencer Witt
|
|
5378
|
-
*/
|
|
5379
|
-
var AttestationConveyancePreference;
|
|
5380
|
-
(function (AttestationConveyancePreference) {
|
|
5381
|
-
AttestationConveyancePreference["none"] = "none";
|
|
5382
|
-
AttestationConveyancePreference["indirect"] = "indirect";
|
|
5383
|
-
AttestationConveyancePreference["direct"] = "direct";
|
|
5384
|
-
AttestationConveyancePreference["enterprise"] = "enterprise";
|
|
5385
|
-
})(AttestationConveyancePreference = exports.AttestationConveyancePreference || (exports.AttestationConveyancePreference = {}));
|
|
5386
|
-
/**
|
|
5387
|
-
* The possible result states of a webhook event. This tracks the success of the overall webhook transaction according to the {@link TransactionType}
|
|
5388
|
-
* and configured webhooks.
|
|
5389
|
-
*
|
|
5390
|
-
* @author Spencer Witt
|
|
5391
|
-
*/
|
|
5392
|
-
var WebhookEventResult;
|
|
5393
|
-
(function (WebhookEventResult) {
|
|
5394
|
-
WebhookEventResult["Failed"] = "Failed";
|
|
5395
|
-
WebhookEventResult["Running"] = "Running";
|
|
5396
|
-
WebhookEventResult["Succeeded"] = "Succeeded";
|
|
5397
|
-
})(WebhookEventResult = exports.WebhookEventResult || (exports.WebhookEventResult = {}));
|
|
5398
|
-
/**
|
|
5399
|
-
* Identifies the WebAuthn workflow. This will affect the parameters used for credential creation
|
|
5400
|
-
* and request based on the Tenant configuration.
|
|
5401
|
-
*
|
|
5402
|
-
* @author Spencer Witt
|
|
5644
|
+
* @author Daniel DeGroff
|
|
5403
5645
|
*/
|
|
5404
|
-
var
|
|
5405
|
-
(function (
|
|
5406
|
-
|
|
5407
|
-
|
|
5408
|
-
|
|
5409
|
-
|
|
5646
|
+
var FormType;
|
|
5647
|
+
(function (FormType) {
|
|
5648
|
+
FormType["registration"] = "registration";
|
|
5649
|
+
FormType["adminRegistration"] = "adminRegistration";
|
|
5650
|
+
FormType["adminUser"] = "adminUser";
|
|
5651
|
+
FormType["selfServiceUser"] = "selfServiceUser";
|
|
5652
|
+
})(FormType = exports.FormType || (exports.FormType = {}));
|
|
5410
5653
|
/**
|
|
5411
|
-
*
|
|
5654
|
+
* Authorization Grant types as defined by the <a href="https://tools.ietf.org/html/rfc6749">The OAuth 2.0 Authorization
|
|
5655
|
+
* Framework - RFC 6749</a>.
|
|
5656
|
+
* <p>
|
|
5657
|
+
* Specific names as defined by <a href="https://tools.ietf.org/html/rfc7591#section-4.1">
|
|
5658
|
+
* OAuth 2.0 Dynamic Client Registration Protocol - RFC 7591 Section 4.1</a>
|
|
5412
5659
|
*
|
|
5413
5660
|
* @author Daniel DeGroff
|
|
5414
5661
|
*/
|
|
5415
|
-
var
|
|
5416
|
-
(function (
|
|
5417
|
-
|
|
5418
|
-
|
|
5419
|
-
|
|
5662
|
+
var GrantType;
|
|
5663
|
+
(function (GrantType) {
|
|
5664
|
+
GrantType["authorization_code"] = "authorization_code";
|
|
5665
|
+
GrantType["implicit"] = "implicit";
|
|
5666
|
+
GrantType["password"] = "password";
|
|
5667
|
+
GrantType["client_credentials"] = "client_credentials";
|
|
5668
|
+
GrantType["refresh_token"] = "refresh_token";
|
|
5669
|
+
GrantType["unknown"] = "unknown";
|
|
5670
|
+
GrantType["device_code"] = "urn:ietf:params:oauth:grant-type:device_code";
|
|
5671
|
+
})(GrantType = exports.GrantType || (exports.GrantType = {}));
|
|
5420
5672
|
/**
|
|
5421
5673
|
* @author Daniel DeGroff
|
|
5422
5674
|
*/
|
|
@@ -5431,24 +5683,84 @@ var HTTPMethod;
|
|
|
5431
5683
|
HTTPMethod["PATCH"] = "PATCH";
|
|
5432
5684
|
})(HTTPMethod = exports.HTTPMethod || (exports.HTTPMethod = {}));
|
|
5433
5685
|
/**
|
|
5686
|
+
* @author Brett Guy
|
|
5687
|
+
*/
|
|
5688
|
+
var IPAccessControlEntryAction;
|
|
5689
|
+
(function (IPAccessControlEntryAction) {
|
|
5690
|
+
IPAccessControlEntryAction["Allow"] = "Allow";
|
|
5691
|
+
IPAccessControlEntryAction["Block"] = "Block";
|
|
5692
|
+
})(IPAccessControlEntryAction = exports.IPAccessControlEntryAction || (exports.IPAccessControlEntryAction = {}));
|
|
5693
|
+
/**
|
|
5694
|
+
* The IdP behavior when no user link has been made yet.
|
|
5695
|
+
*
|
|
5434
5696
|
* @author Daniel DeGroff
|
|
5435
5697
|
*/
|
|
5436
|
-
var
|
|
5437
|
-
(function (
|
|
5438
|
-
|
|
5439
|
-
|
|
5440
|
-
|
|
5441
|
-
|
|
5442
|
-
|
|
5698
|
+
var IdentityProviderLinkingStrategy;
|
|
5699
|
+
(function (IdentityProviderLinkingStrategy) {
|
|
5700
|
+
IdentityProviderLinkingStrategy["CreatePendingLink"] = "CreatePendingLink";
|
|
5701
|
+
IdentityProviderLinkingStrategy["Disabled"] = "Disabled";
|
|
5702
|
+
IdentityProviderLinkingStrategy["LinkAnonymously"] = "LinkAnonymously";
|
|
5703
|
+
IdentityProviderLinkingStrategy["LinkByEmail"] = "LinkByEmail";
|
|
5704
|
+
IdentityProviderLinkingStrategy["LinkByEmailForExistingUser"] = "LinkByEmailForExistingUser";
|
|
5705
|
+
IdentityProviderLinkingStrategy["LinkByUsername"] = "LinkByUsername";
|
|
5706
|
+
IdentityProviderLinkingStrategy["LinkByUsernameForExistingUser"] = "LinkByUsernameForExistingUser";
|
|
5707
|
+
IdentityProviderLinkingStrategy["Unsupported"] = "Unsupported";
|
|
5708
|
+
})(IdentityProviderLinkingStrategy = exports.IdentityProviderLinkingStrategy || (exports.IdentityProviderLinkingStrategy = {}));
|
|
5709
|
+
/**
|
|
5710
|
+
* @author Brett Pontarelli
|
|
5711
|
+
*/
|
|
5712
|
+
var IdentityProviderLoginMethod;
|
|
5713
|
+
(function (IdentityProviderLoginMethod) {
|
|
5714
|
+
IdentityProviderLoginMethod["UsePopup"] = "UsePopup";
|
|
5715
|
+
IdentityProviderLoginMethod["UseRedirect"] = "UseRedirect";
|
|
5716
|
+
IdentityProviderLoginMethod["UseVendorJavaScript"] = "UseVendorJavaScript";
|
|
5717
|
+
})(IdentityProviderLoginMethod = exports.IdentityProviderLoginMethod || (exports.IdentityProviderLoginMethod = {}));
|
|
5718
|
+
var ClientAuthenticationMethod;
|
|
5719
|
+
(function (ClientAuthenticationMethod) {
|
|
5720
|
+
ClientAuthenticationMethod["none"] = "none";
|
|
5721
|
+
ClientAuthenticationMethod["client_secret_basic"] = "client_secret_basic";
|
|
5722
|
+
ClientAuthenticationMethod["client_secret_post"] = "client_secret_post";
|
|
5723
|
+
})(ClientAuthenticationMethod = exports.ClientAuthenticationMethod || (exports.ClientAuthenticationMethod = {}));
|
|
5443
5724
|
/**
|
|
5444
5725
|
* @author Daniel DeGroff
|
|
5445
5726
|
*/
|
|
5446
|
-
var
|
|
5447
|
-
(function (
|
|
5448
|
-
|
|
5449
|
-
|
|
5450
|
-
|
|
5451
|
-
|
|
5727
|
+
var IdentityProviderType;
|
|
5728
|
+
(function (IdentityProviderType) {
|
|
5729
|
+
IdentityProviderType["Apple"] = "Apple";
|
|
5730
|
+
IdentityProviderType["EpicGames"] = "EpicGames";
|
|
5731
|
+
IdentityProviderType["ExternalJWT"] = "ExternalJWT";
|
|
5732
|
+
IdentityProviderType["Facebook"] = "Facebook";
|
|
5733
|
+
IdentityProviderType["Google"] = "Google";
|
|
5734
|
+
IdentityProviderType["HYPR"] = "HYPR";
|
|
5735
|
+
IdentityProviderType["LinkedIn"] = "LinkedIn";
|
|
5736
|
+
IdentityProviderType["Nintendo"] = "Nintendo";
|
|
5737
|
+
IdentityProviderType["OpenIDConnect"] = "OpenIDConnect";
|
|
5738
|
+
IdentityProviderType["SAMLv2"] = "SAMLv2";
|
|
5739
|
+
IdentityProviderType["SAMLv2IdPInitiated"] = "SAMLv2IdPInitiated";
|
|
5740
|
+
IdentityProviderType["SonyPSN"] = "SonyPSN";
|
|
5741
|
+
IdentityProviderType["Steam"] = "Steam";
|
|
5742
|
+
IdentityProviderType["Twitch"] = "Twitch";
|
|
5743
|
+
IdentityProviderType["Twitter"] = "Twitter";
|
|
5744
|
+
IdentityProviderType["Xbox"] = "Xbox";
|
|
5745
|
+
})(IdentityProviderType = exports.IdentityProviderType || (exports.IdentityProviderType = {}));
|
|
5746
|
+
var KeyAlgorithm;
|
|
5747
|
+
(function (KeyAlgorithm) {
|
|
5748
|
+
KeyAlgorithm["ES256"] = "ES256";
|
|
5749
|
+
KeyAlgorithm["ES384"] = "ES384";
|
|
5750
|
+
KeyAlgorithm["ES512"] = "ES512";
|
|
5751
|
+
KeyAlgorithm["HS256"] = "HS256";
|
|
5752
|
+
KeyAlgorithm["HS384"] = "HS384";
|
|
5753
|
+
KeyAlgorithm["HS512"] = "HS512";
|
|
5754
|
+
KeyAlgorithm["RS256"] = "RS256";
|
|
5755
|
+
KeyAlgorithm["RS384"] = "RS384";
|
|
5756
|
+
KeyAlgorithm["RS512"] = "RS512";
|
|
5757
|
+
})(KeyAlgorithm = exports.KeyAlgorithm || (exports.KeyAlgorithm = {}));
|
|
5758
|
+
var KeyType;
|
|
5759
|
+
(function (KeyType) {
|
|
5760
|
+
KeyType["EC"] = "EC";
|
|
5761
|
+
KeyType["RSA"] = "RSA";
|
|
5762
|
+
KeyType["HMAC"] = "HMAC";
|
|
5763
|
+
})(KeyType = exports.KeyType || (exports.KeyType = {}));
|
|
5452
5764
|
/**
|
|
5453
5765
|
* The use type of a key.
|
|
5454
5766
|
*
|
|
@@ -5460,114 +5772,62 @@ var KeyUse;
|
|
|
5460
5772
|
KeyUse["SignAndVerify"] = "SignAndVerify";
|
|
5461
5773
|
KeyUse["VerifyOnly"] = "VerifyOnly";
|
|
5462
5774
|
})(KeyUse = exports.KeyUse || (exports.KeyUse = {}));
|
|
5775
|
+
var LDAPSecurityMethod;
|
|
5776
|
+
(function (LDAPSecurityMethod) {
|
|
5777
|
+
LDAPSecurityMethod["None"] = "None";
|
|
5778
|
+
LDAPSecurityMethod["LDAPS"] = "LDAPS";
|
|
5779
|
+
LDAPSecurityMethod["StartTLS"] = "StartTLS";
|
|
5780
|
+
})(LDAPSecurityMethod = exports.LDAPSecurityMethod || (exports.LDAPSecurityMethod = {}));
|
|
5463
5781
|
/**
|
|
5464
5782
|
* @author Daniel DeGroff
|
|
5465
5783
|
*/
|
|
5466
|
-
var
|
|
5467
|
-
(function (
|
|
5468
|
-
|
|
5469
|
-
|
|
5470
|
-
|
|
5471
|
-
BreachedPasswordStatus["PasswordOnly"] = "PasswordOnly";
|
|
5472
|
-
BreachedPasswordStatus["CommonPassword"] = "CommonPassword";
|
|
5473
|
-
})(BreachedPasswordStatus = exports.BreachedPasswordStatus || (exports.BreachedPasswordStatus = {}));
|
|
5474
|
-
/**
|
|
5475
|
-
* @author Daniel DeGroff
|
|
5476
|
-
*/
|
|
5477
|
-
var FormControl;
|
|
5478
|
-
(function (FormControl) {
|
|
5479
|
-
FormControl["checkbox"] = "checkbox";
|
|
5480
|
-
FormControl["number"] = "number";
|
|
5481
|
-
FormControl["password"] = "password";
|
|
5482
|
-
FormControl["radio"] = "radio";
|
|
5483
|
-
FormControl["select"] = "select";
|
|
5484
|
-
FormControl["textarea"] = "textarea";
|
|
5485
|
-
FormControl["text"] = "text";
|
|
5486
|
-
})(FormControl = exports.FormControl || (exports.FormControl = {}));
|
|
5487
|
-
/**
|
|
5488
|
-
* Controls the policy for whether OAuth workflows will more strictly adhere to the OAuth and OIDC specification
|
|
5489
|
-
* or run in backwards compatibility mode.
|
|
5490
|
-
*
|
|
5491
|
-
* @author David Charles
|
|
5492
|
-
*/
|
|
5493
|
-
var OAuthScopeHandlingPolicy;
|
|
5494
|
-
(function (OAuthScopeHandlingPolicy) {
|
|
5495
|
-
OAuthScopeHandlingPolicy["Compatibility"] = "Compatibility";
|
|
5496
|
-
OAuthScopeHandlingPolicy["Strict"] = "Strict";
|
|
5497
|
-
})(OAuthScopeHandlingPolicy = exports.OAuthScopeHandlingPolicy || (exports.OAuthScopeHandlingPolicy = {}));
|
|
5498
|
-
/**
|
|
5499
|
-
* The possible states of an individual webhook attempt to a single endpoint.
|
|
5500
|
-
*
|
|
5501
|
-
* @author Spencer Witt
|
|
5502
|
-
*/
|
|
5503
|
-
var WebhookAttemptResult;
|
|
5504
|
-
(function (WebhookAttemptResult) {
|
|
5505
|
-
WebhookAttemptResult["Success"] = "Success";
|
|
5506
|
-
WebhookAttemptResult["Failure"] = "Failure";
|
|
5507
|
-
WebhookAttemptResult["Unknown"] = "Unknown";
|
|
5508
|
-
})(WebhookAttemptResult = exports.WebhookAttemptResult || (exports.WebhookAttemptResult = {}));
|
|
5509
|
-
/**
|
|
5510
|
-
* Event Log Type
|
|
5511
|
-
*
|
|
5512
|
-
* @author Daniel DeGroff
|
|
5513
|
-
*/
|
|
5514
|
-
var EventLogType;
|
|
5515
|
-
(function (EventLogType) {
|
|
5516
|
-
EventLogType["Information"] = "Information";
|
|
5517
|
-
EventLogType["Debug"] = "Debug";
|
|
5518
|
-
EventLogType["Error"] = "Error";
|
|
5519
|
-
})(EventLogType = exports.EventLogType || (exports.EventLogType = {}));
|
|
5784
|
+
var LambdaEngineType;
|
|
5785
|
+
(function (LambdaEngineType) {
|
|
5786
|
+
LambdaEngineType["GraalJS"] = "GraalJS";
|
|
5787
|
+
LambdaEngineType["Nashorn"] = "Nashorn";
|
|
5788
|
+
})(LambdaEngineType = exports.LambdaEngineType || (exports.LambdaEngineType = {}));
|
|
5520
5789
|
/**
|
|
5521
|
-
* The
|
|
5790
|
+
* The types of lambdas that indicate how they are invoked by FusionAuth.
|
|
5522
5791
|
*
|
|
5523
5792
|
* @author Brian Pontarelli
|
|
5524
5793
|
*/
|
|
5525
|
-
var
|
|
5526
|
-
(function (
|
|
5527
|
-
|
|
5528
|
-
|
|
5529
|
-
|
|
5530
|
-
|
|
5531
|
-
|
|
5532
|
-
|
|
5533
|
-
|
|
5534
|
-
|
|
5535
|
-
|
|
5536
|
-
|
|
5537
|
-
|
|
5538
|
-
|
|
5539
|
-
|
|
5540
|
-
|
|
5541
|
-
|
|
5542
|
-
|
|
5543
|
-
|
|
5544
|
-
|
|
5545
|
-
|
|
5546
|
-
|
|
5547
|
-
|
|
5548
|
-
|
|
5549
|
-
|
|
5550
|
-
|
|
5551
|
-
|
|
5552
|
-
|
|
5553
|
-
|
|
5554
|
-
* @author Trevor Smith
|
|
5555
|
-
*/
|
|
5556
|
-
var ConnectorType;
|
|
5557
|
-
(function (ConnectorType) {
|
|
5558
|
-
ConnectorType["FusionAuth"] = "FusionAuth";
|
|
5559
|
-
ConnectorType["Generic"] = "Generic";
|
|
5560
|
-
ConnectorType["LDAP"] = "LDAP";
|
|
5561
|
-
})(ConnectorType = exports.ConnectorType || (exports.ConnectorType = {}));
|
|
5794
|
+
var LambdaType;
|
|
5795
|
+
(function (LambdaType) {
|
|
5796
|
+
LambdaType["JWTPopulate"] = "JWTPopulate";
|
|
5797
|
+
LambdaType["OpenIDReconcile"] = "OpenIDReconcile";
|
|
5798
|
+
LambdaType["SAMLv2Reconcile"] = "SAMLv2Reconcile";
|
|
5799
|
+
LambdaType["SAMLv2Populate"] = "SAMLv2Populate";
|
|
5800
|
+
LambdaType["AppleReconcile"] = "AppleReconcile";
|
|
5801
|
+
LambdaType["ExternalJWTReconcile"] = "ExternalJWTReconcile";
|
|
5802
|
+
LambdaType["FacebookReconcile"] = "FacebookReconcile";
|
|
5803
|
+
LambdaType["GoogleReconcile"] = "GoogleReconcile";
|
|
5804
|
+
LambdaType["HYPRReconcile"] = "HYPRReconcile";
|
|
5805
|
+
LambdaType["TwitterReconcile"] = "TwitterReconcile";
|
|
5806
|
+
LambdaType["LDAPConnectorReconcile"] = "LDAPConnectorReconcile";
|
|
5807
|
+
LambdaType["LinkedInReconcile"] = "LinkedInReconcile";
|
|
5808
|
+
LambdaType["EpicGamesReconcile"] = "EpicGamesReconcile";
|
|
5809
|
+
LambdaType["NintendoReconcile"] = "NintendoReconcile";
|
|
5810
|
+
LambdaType["SonyPSNReconcile"] = "SonyPSNReconcile";
|
|
5811
|
+
LambdaType["SteamReconcile"] = "SteamReconcile";
|
|
5812
|
+
LambdaType["TwitchReconcile"] = "TwitchReconcile";
|
|
5813
|
+
LambdaType["XboxReconcile"] = "XboxReconcile";
|
|
5814
|
+
LambdaType["ClientCredentialsJWTPopulate"] = "ClientCredentialsJWTPopulate";
|
|
5815
|
+
LambdaType["SCIMServerGroupRequestConverter"] = "SCIMServerGroupRequestConverter";
|
|
5816
|
+
LambdaType["SCIMServerGroupResponseConverter"] = "SCIMServerGroupResponseConverter";
|
|
5817
|
+
LambdaType["SCIMServerUserRequestConverter"] = "SCIMServerUserRequestConverter";
|
|
5818
|
+
LambdaType["SCIMServerUserResponseConverter"] = "SCIMServerUserResponseConverter";
|
|
5819
|
+
LambdaType["SelfServiceRegistrationValidation"] = "SelfServiceRegistrationValidation";
|
|
5820
|
+
LambdaType["UserInfoPopulate"] = "UserInfoPopulate";
|
|
5821
|
+
LambdaType["LoginValidation"] = "LoginValidation";
|
|
5822
|
+
})(LambdaType = exports.LambdaType || (exports.LambdaType = {}));
|
|
5562
5823
|
/**
|
|
5563
|
-
* @author
|
|
5824
|
+
* @author Matthew Altman
|
|
5564
5825
|
*/
|
|
5565
|
-
var
|
|
5566
|
-
(function (
|
|
5567
|
-
|
|
5568
|
-
|
|
5569
|
-
|
|
5570
|
-
})(ProofKeyForCodeExchangePolicy = exports.ProofKeyForCodeExchangePolicy || (exports.ProofKeyForCodeExchangePolicy = {}));
|
|
5826
|
+
var LogoutBehavior;
|
|
5827
|
+
(function (LogoutBehavior) {
|
|
5828
|
+
LogoutBehavior["RedirectOnly"] = "RedirectOnly";
|
|
5829
|
+
LogoutBehavior["AllApplications"] = "AllApplications";
|
|
5830
|
+
})(LogoutBehavior = exports.LogoutBehavior || (exports.LogoutBehavior = {}));
|
|
5571
5831
|
/**
|
|
5572
5832
|
* @author Mikey Sleevi
|
|
5573
5833
|
*/
|
|
@@ -5576,77 +5836,34 @@ var MessageType;
|
|
|
5576
5836
|
MessageType["SMS"] = "SMS";
|
|
5577
5837
|
})(MessageType = exports.MessageType || (exports.MessageType = {}));
|
|
5578
5838
|
/**
|
|
5579
|
-
*
|
|
5580
|
-
* discoverable credentials</a> (formerly known as "resident keys")
|
|
5581
|
-
*
|
|
5582
|
-
* @author Spencer Witt
|
|
5583
|
-
*/
|
|
5584
|
-
var ResidentKeyRequirement;
|
|
5585
|
-
(function (ResidentKeyRequirement) {
|
|
5586
|
-
ResidentKeyRequirement["discouraged"] = "discouraged";
|
|
5587
|
-
ResidentKeyRequirement["preferred"] = "preferred";
|
|
5588
|
-
ResidentKeyRequirement["required"] = "required";
|
|
5589
|
-
})(ResidentKeyRequirement = exports.ResidentKeyRequirement || (exports.ResidentKeyRequirement = {}));
|
|
5590
|
-
/**
|
|
5591
|
-
* @author Trevor Smith
|
|
5839
|
+
* @author Brett Guy
|
|
5592
5840
|
*/
|
|
5593
|
-
var
|
|
5594
|
-
(function (
|
|
5595
|
-
|
|
5596
|
-
|
|
5597
|
-
|
|
5598
|
-
|
|
5599
|
-
})(ChangePasswordReason = exports.ChangePasswordReason || (exports.ChangePasswordReason = {}));
|
|
5600
|
-
var LDAPSecurityMethod;
|
|
5601
|
-
(function (LDAPSecurityMethod) {
|
|
5602
|
-
LDAPSecurityMethod["None"] = "None";
|
|
5603
|
-
LDAPSecurityMethod["LDAPS"] = "LDAPS";
|
|
5604
|
-
LDAPSecurityMethod["StartTLS"] = "StartTLS";
|
|
5605
|
-
})(LDAPSecurityMethod = exports.LDAPSecurityMethod || (exports.LDAPSecurityMethod = {}));
|
|
5841
|
+
var MessengerType;
|
|
5842
|
+
(function (MessengerType) {
|
|
5843
|
+
MessengerType["Generic"] = "Generic";
|
|
5844
|
+
MessengerType["Kafka"] = "Kafka";
|
|
5845
|
+
MessengerType["Twilio"] = "Twilio";
|
|
5846
|
+
})(MessengerType = exports.MessengerType || (exports.MessengerType = {}));
|
|
5606
5847
|
/**
|
|
5607
|
-
* @author
|
|
5848
|
+
* @author Daniel DeGroff
|
|
5608
5849
|
*/
|
|
5609
|
-
var
|
|
5610
|
-
(function (
|
|
5611
|
-
|
|
5612
|
-
|
|
5613
|
-
|
|
5850
|
+
var MultiFactorLoginPolicy;
|
|
5851
|
+
(function (MultiFactorLoginPolicy) {
|
|
5852
|
+
MultiFactorLoginPolicy["Disabled"] = "Disabled";
|
|
5853
|
+
MultiFactorLoginPolicy["Enabled"] = "Enabled";
|
|
5854
|
+
MultiFactorLoginPolicy["Required"] = "Required";
|
|
5855
|
+
})(MultiFactorLoginPolicy = exports.MultiFactorLoginPolicy || (exports.MultiFactorLoginPolicy = {}));
|
|
5614
5856
|
/**
|
|
5615
|
-
*
|
|
5857
|
+
* The application's relationship to the authorization server. First-party applications will be granted implicit permission for requested scopes.
|
|
5858
|
+
* Third-party applications will use the {@link OAuthScopeConsentMode} policy.
|
|
5616
5859
|
*
|
|
5617
5860
|
* @author Spencer Witt
|
|
5618
5861
|
*/
|
|
5619
|
-
var
|
|
5620
|
-
(function (
|
|
5621
|
-
|
|
5622
|
-
|
|
5623
|
-
})(
|
|
5624
|
-
/**
|
|
5625
|
-
* @author Brett Pontarelli
|
|
5626
|
-
*/
|
|
5627
|
-
var IdentityProviderLoginMethod;
|
|
5628
|
-
(function (IdentityProviderLoginMethod) {
|
|
5629
|
-
IdentityProviderLoginMethod["UsePopup"] = "UsePopup";
|
|
5630
|
-
IdentityProviderLoginMethod["UseRedirect"] = "UseRedirect";
|
|
5631
|
-
IdentityProviderLoginMethod["UseVendorJavaScript"] = "UseVendorJavaScript";
|
|
5632
|
-
})(IdentityProviderLoginMethod = exports.IdentityProviderLoginMethod || (exports.IdentityProviderLoginMethod = {}));
|
|
5633
|
-
/**
|
|
5634
|
-
* @author Daniel DeGroff
|
|
5635
|
-
*/
|
|
5636
|
-
var RefreshTokenUsagePolicy;
|
|
5637
|
-
(function (RefreshTokenUsagePolicy) {
|
|
5638
|
-
RefreshTokenUsagePolicy["Reusable"] = "Reusable";
|
|
5639
|
-
RefreshTokenUsagePolicy["OneTimeUse"] = "OneTimeUse";
|
|
5640
|
-
})(RefreshTokenUsagePolicy = exports.RefreshTokenUsagePolicy || (exports.RefreshTokenUsagePolicy = {}));
|
|
5641
|
-
/**
|
|
5642
|
-
* @author Lyle Schemmerling
|
|
5643
|
-
*/
|
|
5644
|
-
var SAMLv2DestinationAssertionPolicy;
|
|
5645
|
-
(function (SAMLv2DestinationAssertionPolicy) {
|
|
5646
|
-
SAMLv2DestinationAssertionPolicy["Enabled"] = "Enabled";
|
|
5647
|
-
SAMLv2DestinationAssertionPolicy["Disabled"] = "Disabled";
|
|
5648
|
-
SAMLv2DestinationAssertionPolicy["AllowAlternates"] = "AllowAlternates";
|
|
5649
|
-
})(SAMLv2DestinationAssertionPolicy = exports.SAMLv2DestinationAssertionPolicy || (exports.SAMLv2DestinationAssertionPolicy = {}));
|
|
5862
|
+
var OAuthApplicationRelationship;
|
|
5863
|
+
(function (OAuthApplicationRelationship) {
|
|
5864
|
+
OAuthApplicationRelationship["FirstParty"] = "FirstParty";
|
|
5865
|
+
OAuthApplicationRelationship["ThirdParty"] = "ThirdParty";
|
|
5866
|
+
})(OAuthApplicationRelationship = exports.OAuthApplicationRelationship || (exports.OAuthApplicationRelationship = {}));
|
|
5650
5867
|
var OAuthErrorReason;
|
|
5651
5868
|
(function (OAuthErrorReason) {
|
|
5652
5869
|
OAuthErrorReason["auth_code_not_found"] = "auth_code_not_found";
|
|
@@ -5677,6 +5894,7 @@ var OAuthErrorReason;
|
|
|
5677
5894
|
OAuthErrorReason["invalid_target_entity_scope"] = "invalid_target_entity_scope";
|
|
5678
5895
|
OAuthErrorReason["invalid_entity_permission_scope"] = "invalid_entity_permission_scope";
|
|
5679
5896
|
OAuthErrorReason["invalid_user_id"] = "invalid_user_id";
|
|
5897
|
+
OAuthErrorReason["invalid_tenant_id"] = "invalid_tenant_id";
|
|
5680
5898
|
OAuthErrorReason["grant_type_disabled"] = "grant_type_disabled";
|
|
5681
5899
|
OAuthErrorReason["missing_client_id"] = "missing_client_id";
|
|
5682
5900
|
OAuthErrorReason["missing_client_secret"] = "missing_client_secret";
|
|
@@ -5692,6 +5910,7 @@ var OAuthErrorReason;
|
|
|
5692
5910
|
OAuthErrorReason["missing_user_code"] = "missing_user_code";
|
|
5693
5911
|
OAuthErrorReason["missing_user_id"] = "missing_user_id";
|
|
5694
5912
|
OAuthErrorReason["missing_verification_uri"] = "missing_verification_uri";
|
|
5913
|
+
OAuthErrorReason["missing_tenant_id"] = "missing_tenant_id";
|
|
5695
5914
|
OAuthErrorReason["login_prevented"] = "login_prevented";
|
|
5696
5915
|
OAuthErrorReason["not_licensed"] = "not_licensed";
|
|
5697
5916
|
OAuthErrorReason["user_code_expired"] = "user_code_expired";
|
|
@@ -5730,250 +5949,68 @@ var OAuthErrorType;
|
|
|
5730
5949
|
OAuthErrorType["expired_token"] = "expired_token";
|
|
5731
5950
|
OAuthErrorType["unsupported_token_type"] = "unsupported_token_type";
|
|
5732
5951
|
})(OAuthErrorType = exports.OAuthErrorType || (exports.OAuthErrorType = {}));
|
|
5733
|
-
var DeviceType;
|
|
5734
|
-
(function (DeviceType) {
|
|
5735
|
-
DeviceType["BROWSER"] = "BROWSER";
|
|
5736
|
-
DeviceType["DESKTOP"] = "DESKTOP";
|
|
5737
|
-
DeviceType["LAPTOP"] = "LAPTOP";
|
|
5738
|
-
DeviceType["MOBILE"] = "MOBILE";
|
|
5739
|
-
DeviceType["OTHER"] = "OTHER";
|
|
5740
|
-
DeviceType["SERVER"] = "SERVER";
|
|
5741
|
-
DeviceType["TABLET"] = "TABLET";
|
|
5742
|
-
DeviceType["TV"] = "TV";
|
|
5743
|
-
DeviceType["UNKNOWN"] = "UNKNOWN";
|
|
5744
|
-
})(DeviceType = exports.DeviceType || (exports.DeviceType = {}));
|
|
5745
|
-
/**
|
|
5746
|
-
* @author Daniel DeGroff
|
|
5747
|
-
*/
|
|
5748
|
-
var ApplicationMultiFactorTrustPolicy;
|
|
5749
|
-
(function (ApplicationMultiFactorTrustPolicy) {
|
|
5750
|
-
ApplicationMultiFactorTrustPolicy["Any"] = "Any";
|
|
5751
|
-
ApplicationMultiFactorTrustPolicy["This"] = "This";
|
|
5752
|
-
ApplicationMultiFactorTrustPolicy["None"] = "None";
|
|
5753
|
-
})(ApplicationMultiFactorTrustPolicy = exports.ApplicationMultiFactorTrustPolicy || (exports.ApplicationMultiFactorTrustPolicy = {}));
|
|
5754
|
-
/**
|
|
5755
|
-
* @author Daniel DeGroff
|
|
5756
|
-
*/
|
|
5757
|
-
var RateLimitedRequestType;
|
|
5758
|
-
(function (RateLimitedRequestType) {
|
|
5759
|
-
RateLimitedRequestType["FailedLogin"] = "FailedLogin";
|
|
5760
|
-
RateLimitedRequestType["ForgotPassword"] = "ForgotPassword";
|
|
5761
|
-
RateLimitedRequestType["SendEmailVerification"] = "SendEmailVerification";
|
|
5762
|
-
RateLimitedRequestType["SendPasswordless"] = "SendPasswordless";
|
|
5763
|
-
RateLimitedRequestType["SendRegistrationVerification"] = "SendRegistrationVerification";
|
|
5764
|
-
RateLimitedRequestType["SendTwoFactor"] = "SendTwoFactor";
|
|
5765
|
-
})(RateLimitedRequestType = exports.RateLimitedRequestType || (exports.RateLimitedRequestType = {}));
|
|
5766
|
-
/**
|
|
5767
|
-
* @author Daniel DeGroff
|
|
5768
|
-
*/
|
|
5769
|
-
var LambdaEngineType;
|
|
5770
|
-
(function (LambdaEngineType) {
|
|
5771
|
-
LambdaEngineType["GraalJS"] = "GraalJS";
|
|
5772
|
-
LambdaEngineType["Nashorn"] = "Nashorn";
|
|
5773
|
-
})(LambdaEngineType = exports.LambdaEngineType || (exports.LambdaEngineType = {}));
|
|
5774
5952
|
/**
|
|
5775
|
-
*
|
|
5776
|
-
*
|
|
5953
|
+
* Controls the policy for requesting user permission to grant access to requested scopes during an OAuth workflow
|
|
5954
|
+
* for a third-party application.
|
|
5777
5955
|
*
|
|
5778
5956
|
* @author Spencer Witt
|
|
5779
5957
|
*/
|
|
5780
|
-
var
|
|
5781
|
-
(function (
|
|
5782
|
-
|
|
5783
|
-
|
|
5784
|
-
|
|
5785
|
-
})(
|
|
5786
|
-
/**
|
|
5787
|
-
* @author Brett Guy
|
|
5788
|
-
*/
|
|
5789
|
-
var ClientAuthenticationPolicy;
|
|
5790
|
-
(function (ClientAuthenticationPolicy) {
|
|
5791
|
-
ClientAuthenticationPolicy["Required"] = "Required";
|
|
5792
|
-
ClientAuthenticationPolicy["NotRequired"] = "NotRequired";
|
|
5793
|
-
ClientAuthenticationPolicy["NotRequiredWhenUsingPKCE"] = "NotRequiredWhenUsingPKCE";
|
|
5794
|
-
})(ClientAuthenticationPolicy = exports.ClientAuthenticationPolicy || (exports.ClientAuthenticationPolicy = {}));
|
|
5795
|
-
/**
|
|
5796
|
-
* @author Daniel DeGroff
|
|
5797
|
-
*/
|
|
5798
|
-
var FormType;
|
|
5799
|
-
(function (FormType) {
|
|
5800
|
-
FormType["registration"] = "registration";
|
|
5801
|
-
FormType["adminRegistration"] = "adminRegistration";
|
|
5802
|
-
FormType["adminUser"] = "adminUser";
|
|
5803
|
-
FormType["selfServiceUser"] = "selfServiceUser";
|
|
5804
|
-
})(FormType = exports.FormType || (exports.FormType = {}));
|
|
5958
|
+
var OAuthScopeConsentMode;
|
|
5959
|
+
(function (OAuthScopeConsentMode) {
|
|
5960
|
+
OAuthScopeConsentMode["AlwaysPrompt"] = "AlwaysPrompt";
|
|
5961
|
+
OAuthScopeConsentMode["RememberDecision"] = "RememberDecision";
|
|
5962
|
+
OAuthScopeConsentMode["NeverPrompt"] = "NeverPrompt";
|
|
5963
|
+
})(OAuthScopeConsentMode = exports.OAuthScopeConsentMode || (exports.OAuthScopeConsentMode = {}));
|
|
5805
5964
|
/**
|
|
5806
|
-
*
|
|
5965
|
+
* Controls the policy for whether OAuth workflows will more strictly adhere to the OAuth and OIDC specification
|
|
5966
|
+
* or run in backwards compatibility mode.
|
|
5807
5967
|
*
|
|
5808
|
-
* @author
|
|
5809
|
-
*/
|
|
5810
|
-
var CanonicalizationMethod;
|
|
5811
|
-
(function (CanonicalizationMethod) {
|
|
5812
|
-
CanonicalizationMethod["exclusive"] = "exclusive";
|
|
5813
|
-
CanonicalizationMethod["exclusive_with_comments"] = "exclusive_with_comments";
|
|
5814
|
-
CanonicalizationMethod["inclusive"] = "inclusive";
|
|
5815
|
-
CanonicalizationMethod["inclusive_with_comments"] = "inclusive_with_comments";
|
|
5816
|
-
})(CanonicalizationMethod = exports.CanonicalizationMethod || (exports.CanonicalizationMethod = {}));
|
|
5817
|
-
/**
|
|
5818
|
-
* @author Brian Pontarelli
|
|
5819
|
-
*/
|
|
5820
|
-
var ExpiryUnit;
|
|
5821
|
-
(function (ExpiryUnit) {
|
|
5822
|
-
ExpiryUnit["MINUTES"] = "MINUTES";
|
|
5823
|
-
ExpiryUnit["HOURS"] = "HOURS";
|
|
5824
|
-
ExpiryUnit["DAYS"] = "DAYS";
|
|
5825
|
-
ExpiryUnit["WEEKS"] = "WEEKS";
|
|
5826
|
-
ExpiryUnit["MONTHS"] = "MONTHS";
|
|
5827
|
-
ExpiryUnit["YEARS"] = "YEARS";
|
|
5828
|
-
})(ExpiryUnit = exports.ExpiryUnit || (exports.ExpiryUnit = {}));
|
|
5829
|
-
/**
|
|
5830
|
-
* @author Daniel DeGroff
|
|
5831
|
-
*/
|
|
5832
|
-
var SecureGeneratorType;
|
|
5833
|
-
(function (SecureGeneratorType) {
|
|
5834
|
-
SecureGeneratorType["randomDigits"] = "randomDigits";
|
|
5835
|
-
SecureGeneratorType["randomBytes"] = "randomBytes";
|
|
5836
|
-
SecureGeneratorType["randomAlpha"] = "randomAlpha";
|
|
5837
|
-
SecureGeneratorType["randomAlphaNumeric"] = "randomAlphaNumeric";
|
|
5838
|
-
})(SecureGeneratorType = exports.SecureGeneratorType || (exports.SecureGeneratorType = {}));
|
|
5839
|
-
/**
|
|
5840
|
-
* @author Daniel DeGroff
|
|
5968
|
+
* @author David Charles
|
|
5841
5969
|
*/
|
|
5842
|
-
var
|
|
5843
|
-
(function (
|
|
5844
|
-
|
|
5845
|
-
|
|
5846
|
-
|
|
5847
|
-
FormDataType["email"] = "email";
|
|
5848
|
-
FormDataType["number"] = "number";
|
|
5849
|
-
FormDataType["string"] = "string";
|
|
5850
|
-
})(FormDataType = exports.FormDataType || (exports.FormDataType = {}));
|
|
5970
|
+
var OAuthScopeHandlingPolicy;
|
|
5971
|
+
(function (OAuthScopeHandlingPolicy) {
|
|
5972
|
+
OAuthScopeHandlingPolicy["Compatibility"] = "Compatibility";
|
|
5973
|
+
OAuthScopeHandlingPolicy["Strict"] = "Strict";
|
|
5974
|
+
})(OAuthScopeHandlingPolicy = exports.OAuthScopeHandlingPolicy || (exports.OAuthScopeHandlingPolicy = {}));
|
|
5851
5975
|
/**
|
|
5852
|
-
*
|
|
5853
|
-
*
|
|
5854
|
-
* @author Daniel DeGroff
|
|
5976
|
+
* @author Johnathon Wood
|
|
5855
5977
|
*/
|
|
5856
|
-
var
|
|
5857
|
-
(function (
|
|
5858
|
-
|
|
5859
|
-
|
|
5860
|
-
|
|
5861
|
-
IdentityProviderLinkingStrategy["LinkByEmail"] = "LinkByEmail";
|
|
5862
|
-
IdentityProviderLinkingStrategy["LinkByEmailForExistingUser"] = "LinkByEmailForExistingUser";
|
|
5863
|
-
IdentityProviderLinkingStrategy["LinkByUsername"] = "LinkByUsername";
|
|
5864
|
-
IdentityProviderLinkingStrategy["LinkByUsernameForExistingUser"] = "LinkByUsernameForExistingUser";
|
|
5865
|
-
IdentityProviderLinkingStrategy["Unsupported"] = "Unsupported";
|
|
5866
|
-
})(IdentityProviderLinkingStrategy = exports.IdentityProviderLinkingStrategy || (exports.IdentityProviderLinkingStrategy = {}));
|
|
5978
|
+
var Oauth2AuthorizedURLValidationPolicy;
|
|
5979
|
+
(function (Oauth2AuthorizedURLValidationPolicy) {
|
|
5980
|
+
Oauth2AuthorizedURLValidationPolicy["AllowWildcards"] = "AllowWildcards";
|
|
5981
|
+
Oauth2AuthorizedURLValidationPolicy["ExactMatch"] = "ExactMatch";
|
|
5982
|
+
})(Oauth2AuthorizedURLValidationPolicy = exports.Oauth2AuthorizedURLValidationPolicy || (exports.Oauth2AuthorizedURLValidationPolicy = {}));
|
|
5867
5983
|
/**
|
|
5868
5984
|
* @author Daniel DeGroff
|
|
5869
5985
|
*/
|
|
5870
|
-
var
|
|
5871
|
-
(function (
|
|
5872
|
-
|
|
5873
|
-
|
|
5874
|
-
|
|
5875
|
-
})(
|
|
5986
|
+
var ObjectState;
|
|
5987
|
+
(function (ObjectState) {
|
|
5988
|
+
ObjectState["Active"] = "Active";
|
|
5989
|
+
ObjectState["Inactive"] = "Inactive";
|
|
5990
|
+
ObjectState["PendingDelete"] = "PendingDelete";
|
|
5991
|
+
})(ObjectState = exports.ObjectState || (exports.ObjectState = {}));
|
|
5992
|
+
var BreachAction;
|
|
5993
|
+
(function (BreachAction) {
|
|
5994
|
+
BreachAction["Off"] = "Off";
|
|
5995
|
+
BreachAction["RecordOnly"] = "RecordOnly";
|
|
5996
|
+
BreachAction["NotifyUser"] = "NotifyUser";
|
|
5997
|
+
BreachAction["RequireChange"] = "RequireChange";
|
|
5998
|
+
})(BreachAction = exports.BreachAction || (exports.BreachAction = {}));
|
|
5999
|
+
var BreachMatchMode;
|
|
6000
|
+
(function (BreachMatchMode) {
|
|
6001
|
+
BreachMatchMode["Low"] = "Low";
|
|
6002
|
+
BreachMatchMode["Medium"] = "Medium";
|
|
6003
|
+
BreachMatchMode["High"] = "High";
|
|
6004
|
+
})(BreachMatchMode = exports.BreachMatchMode || (exports.BreachMatchMode = {}));
|
|
5876
6005
|
/**
|
|
5877
6006
|
* @author Brett Guy
|
|
5878
6007
|
*/
|
|
5879
|
-
var
|
|
5880
|
-
(function (
|
|
5881
|
-
|
|
5882
|
-
|
|
5883
|
-
|
|
5884
|
-
|
|
5885
|
-
* The phases of a time-based user action.
|
|
5886
|
-
*
|
|
5887
|
-
* @author Brian Pontarelli
|
|
5888
|
-
*/
|
|
5889
|
-
var UserActionPhase;
|
|
5890
|
-
(function (UserActionPhase) {
|
|
5891
|
-
UserActionPhase["start"] = "start";
|
|
5892
|
-
UserActionPhase["modify"] = "modify";
|
|
5893
|
-
UserActionPhase["cancel"] = "cancel";
|
|
5894
|
-
UserActionPhase["end"] = "end";
|
|
5895
|
-
})(UserActionPhase = exports.UserActionPhase || (exports.UserActionPhase = {}));
|
|
5896
|
-
/**
|
|
5897
|
-
* The types of lambdas that indicate how they are invoked by FusionAuth.
|
|
5898
|
-
*
|
|
5899
|
-
* @author Brian Pontarelli
|
|
5900
|
-
*/
|
|
5901
|
-
var LambdaType;
|
|
5902
|
-
(function (LambdaType) {
|
|
5903
|
-
LambdaType["JWTPopulate"] = "JWTPopulate";
|
|
5904
|
-
LambdaType["OpenIDReconcile"] = "OpenIDReconcile";
|
|
5905
|
-
LambdaType["SAMLv2Reconcile"] = "SAMLv2Reconcile";
|
|
5906
|
-
LambdaType["SAMLv2Populate"] = "SAMLv2Populate";
|
|
5907
|
-
LambdaType["AppleReconcile"] = "AppleReconcile";
|
|
5908
|
-
LambdaType["ExternalJWTReconcile"] = "ExternalJWTReconcile";
|
|
5909
|
-
LambdaType["FacebookReconcile"] = "FacebookReconcile";
|
|
5910
|
-
LambdaType["GoogleReconcile"] = "GoogleReconcile";
|
|
5911
|
-
LambdaType["HYPRReconcile"] = "HYPRReconcile";
|
|
5912
|
-
LambdaType["TwitterReconcile"] = "TwitterReconcile";
|
|
5913
|
-
LambdaType["LDAPConnectorReconcile"] = "LDAPConnectorReconcile";
|
|
5914
|
-
LambdaType["LinkedInReconcile"] = "LinkedInReconcile";
|
|
5915
|
-
LambdaType["EpicGamesReconcile"] = "EpicGamesReconcile";
|
|
5916
|
-
LambdaType["NintendoReconcile"] = "NintendoReconcile";
|
|
5917
|
-
LambdaType["SonyPSNReconcile"] = "SonyPSNReconcile";
|
|
5918
|
-
LambdaType["SteamReconcile"] = "SteamReconcile";
|
|
5919
|
-
LambdaType["TwitchReconcile"] = "TwitchReconcile";
|
|
5920
|
-
LambdaType["XboxReconcile"] = "XboxReconcile";
|
|
5921
|
-
LambdaType["ClientCredentialsJWTPopulate"] = "ClientCredentialsJWTPopulate";
|
|
5922
|
-
LambdaType["SCIMServerGroupRequestConverter"] = "SCIMServerGroupRequestConverter";
|
|
5923
|
-
LambdaType["SCIMServerGroupResponseConverter"] = "SCIMServerGroupResponseConverter";
|
|
5924
|
-
LambdaType["SCIMServerUserRequestConverter"] = "SCIMServerUserRequestConverter";
|
|
5925
|
-
LambdaType["SCIMServerUserResponseConverter"] = "SCIMServerUserResponseConverter";
|
|
5926
|
-
LambdaType["SelfServiceRegistrationValidation"] = "SelfServiceRegistrationValidation";
|
|
5927
|
-
LambdaType["UserInfoPopulate"] = "UserInfoPopulate";
|
|
5928
|
-
LambdaType["LoginValidation"] = "LoginValidation";
|
|
5929
|
-
})(LambdaType = exports.LambdaType || (exports.LambdaType = {}));
|
|
5930
|
-
/**
|
|
5931
|
-
* @author Daniel DeGroff
|
|
5932
|
-
*/
|
|
5933
|
-
var SystemTrustedProxyConfigurationPolicy;
|
|
5934
|
-
(function (SystemTrustedProxyConfigurationPolicy) {
|
|
5935
|
-
SystemTrustedProxyConfigurationPolicy["All"] = "All";
|
|
5936
|
-
SystemTrustedProxyConfigurationPolicy["OnlyConfigured"] = "OnlyConfigured";
|
|
5937
|
-
})(SystemTrustedProxyConfigurationPolicy = exports.SystemTrustedProxyConfigurationPolicy || (exports.SystemTrustedProxyConfigurationPolicy = {}));
|
|
5938
|
-
var LoginIdType;
|
|
5939
|
-
(function (LoginIdType) {
|
|
5940
|
-
LoginIdType["email"] = "email";
|
|
5941
|
-
LoginIdType["username"] = "username";
|
|
5942
|
-
})(LoginIdType = exports.LoginIdType || (exports.LoginIdType = {}));
|
|
5943
|
-
var RegistrationType;
|
|
5944
|
-
(function (RegistrationType) {
|
|
5945
|
-
RegistrationType["basic"] = "basic";
|
|
5946
|
-
RegistrationType["advanced"] = "advanced";
|
|
5947
|
-
})(RegistrationType = exports.RegistrationType || (exports.RegistrationType = {}));
|
|
5948
|
-
var SAMLLogoutBehavior;
|
|
5949
|
-
(function (SAMLLogoutBehavior) {
|
|
5950
|
-
SAMLLogoutBehavior["AllParticipants"] = "AllParticipants";
|
|
5951
|
-
SAMLLogoutBehavior["OnlyOriginator"] = "OnlyOriginator";
|
|
5952
|
-
})(SAMLLogoutBehavior = exports.SAMLLogoutBehavior || (exports.SAMLLogoutBehavior = {}));
|
|
5953
|
-
var XMLSignatureLocation;
|
|
5954
|
-
(function (XMLSignatureLocation) {
|
|
5955
|
-
XMLSignatureLocation["Assertion"] = "Assertion";
|
|
5956
|
-
XMLSignatureLocation["Response"] = "Response";
|
|
5957
|
-
})(XMLSignatureLocation = exports.XMLSignatureLocation || (exports.XMLSignatureLocation = {}));
|
|
5958
|
-
/**
|
|
5959
|
-
* @author Daniel DeGroff
|
|
5960
|
-
*/
|
|
5961
|
-
var Sort;
|
|
5962
|
-
(function (Sort) {
|
|
5963
|
-
Sort["asc"] = "asc";
|
|
5964
|
-
Sort["desc"] = "desc";
|
|
5965
|
-
})(Sort = exports.Sort || (exports.Sort = {}));
|
|
5966
|
-
/**
|
|
5967
|
-
* Describes the authenticator attachment modality preference for a WebAuthn workflow. See {@link AuthenticatorAttachment}
|
|
5968
|
-
*
|
|
5969
|
-
* @author Spencer Witt
|
|
5970
|
-
*/
|
|
5971
|
-
var AuthenticatorAttachmentPreference;
|
|
5972
|
-
(function (AuthenticatorAttachmentPreference) {
|
|
5973
|
-
AuthenticatorAttachmentPreference["any"] = "any";
|
|
5974
|
-
AuthenticatorAttachmentPreference["platform"] = "platform";
|
|
5975
|
-
AuthenticatorAttachmentPreference["crossPlatform"] = "crossPlatform";
|
|
5976
|
-
})(AuthenticatorAttachmentPreference = exports.AuthenticatorAttachmentPreference || (exports.AuthenticatorAttachmentPreference = {}));
|
|
6008
|
+
var ProofKeyForCodeExchangePolicy;
|
|
6009
|
+
(function (ProofKeyForCodeExchangePolicy) {
|
|
6010
|
+
ProofKeyForCodeExchangePolicy["Required"] = "Required";
|
|
6011
|
+
ProofKeyForCodeExchangePolicy["NotRequired"] = "NotRequired";
|
|
6012
|
+
ProofKeyForCodeExchangePolicy["NotRequiredWhenUsingClientAuthentication"] = "NotRequiredWhenUsingClientAuthentication";
|
|
6013
|
+
})(ProofKeyForCodeExchangePolicy = exports.ProofKeyForCodeExchangePolicy || (exports.ProofKeyForCodeExchangePolicy = {}));
|
|
5977
6014
|
/**
|
|
5978
6015
|
* Defines valid credential types. This is an extension point in the WebAuthn spec. The only defined value at this time is "public-key"
|
|
5979
6016
|
*
|
|
@@ -5984,104 +6021,84 @@ var PublicKeyCredentialType;
|
|
|
5984
6021
|
PublicKeyCredentialType["publicKey"] = "public-key";
|
|
5985
6022
|
})(PublicKeyCredentialType = exports.PublicKeyCredentialType || (exports.PublicKeyCredentialType = {}));
|
|
5986
6023
|
/**
|
|
5987
|
-
*
|
|
5988
|
-
*
|
|
5989
|
-
* @author Spencer Witt
|
|
6024
|
+
* @author Daniel DeGroff
|
|
5990
6025
|
*/
|
|
5991
|
-
var
|
|
5992
|
-
(function (
|
|
5993
|
-
|
|
5994
|
-
|
|
5995
|
-
|
|
5996
|
-
|
|
5997
|
-
|
|
5998
|
-
|
|
5999
|
-
|
|
6000
|
-
CoseEllipticCurve["Ed448"] = "Ed448";
|
|
6001
|
-
CoseEllipticCurve["Secp256k1"] = "Secp256k1";
|
|
6002
|
-
})(CoseEllipticCurve = exports.CoseEllipticCurve || (exports.CoseEllipticCurve = {}));
|
|
6003
|
-
var KeyAlgorithm;
|
|
6004
|
-
(function (KeyAlgorithm) {
|
|
6005
|
-
KeyAlgorithm["ES256"] = "ES256";
|
|
6006
|
-
KeyAlgorithm["ES384"] = "ES384";
|
|
6007
|
-
KeyAlgorithm["ES512"] = "ES512";
|
|
6008
|
-
KeyAlgorithm["HS256"] = "HS256";
|
|
6009
|
-
KeyAlgorithm["HS384"] = "HS384";
|
|
6010
|
-
KeyAlgorithm["HS512"] = "HS512";
|
|
6011
|
-
KeyAlgorithm["RS256"] = "RS256";
|
|
6012
|
-
KeyAlgorithm["RS384"] = "RS384";
|
|
6013
|
-
KeyAlgorithm["RS512"] = "RS512";
|
|
6014
|
-
})(KeyAlgorithm = exports.KeyAlgorithm || (exports.KeyAlgorithm = {}));
|
|
6015
|
-
var KeyType;
|
|
6016
|
-
(function (KeyType) {
|
|
6017
|
-
KeyType["EC"] = "EC";
|
|
6018
|
-
KeyType["RSA"] = "RSA";
|
|
6019
|
-
KeyType["HMAC"] = "HMAC";
|
|
6020
|
-
})(KeyType = exports.KeyType || (exports.KeyType = {}));
|
|
6026
|
+
var RateLimitedRequestType;
|
|
6027
|
+
(function (RateLimitedRequestType) {
|
|
6028
|
+
RateLimitedRequestType["FailedLogin"] = "FailedLogin";
|
|
6029
|
+
RateLimitedRequestType["ForgotPassword"] = "ForgotPassword";
|
|
6030
|
+
RateLimitedRequestType["SendEmailVerification"] = "SendEmailVerification";
|
|
6031
|
+
RateLimitedRequestType["SendPasswordless"] = "SendPasswordless";
|
|
6032
|
+
RateLimitedRequestType["SendRegistrationVerification"] = "SendRegistrationVerification";
|
|
6033
|
+
RateLimitedRequestType["SendTwoFactor"] = "SendTwoFactor";
|
|
6034
|
+
})(RateLimitedRequestType = exports.RateLimitedRequestType || (exports.RateLimitedRequestType = {}));
|
|
6021
6035
|
/**
|
|
6022
|
-
*
|
|
6023
|
-
* for a third-party application.
|
|
6024
|
-
*
|
|
6025
|
-
* @author Spencer Witt
|
|
6036
|
+
* @author Brian Pontarelli
|
|
6026
6037
|
*/
|
|
6027
|
-
var
|
|
6028
|
-
(function (
|
|
6029
|
-
|
|
6030
|
-
|
|
6031
|
-
|
|
6032
|
-
|
|
6038
|
+
var ReactorFeatureStatus;
|
|
6039
|
+
(function (ReactorFeatureStatus) {
|
|
6040
|
+
ReactorFeatureStatus["ACTIVE"] = "ACTIVE";
|
|
6041
|
+
ReactorFeatureStatus["DISCONNECTED"] = "DISCONNECTED";
|
|
6042
|
+
ReactorFeatureStatus["PENDING"] = "PENDING";
|
|
6043
|
+
ReactorFeatureStatus["DISABLED"] = "DISABLED";
|
|
6044
|
+
ReactorFeatureStatus["UNKNOWN"] = "UNKNOWN";
|
|
6045
|
+
})(ReactorFeatureStatus = exports.ReactorFeatureStatus || (exports.ReactorFeatureStatus = {}));
|
|
6033
6046
|
/**
|
|
6034
6047
|
* @author Daniel DeGroff
|
|
6035
6048
|
*/
|
|
6036
|
-
var
|
|
6037
|
-
(function (
|
|
6038
|
-
|
|
6039
|
-
|
|
6040
|
-
|
|
6041
|
-
})(
|
|
6049
|
+
var RefreshTokenExpirationPolicy;
|
|
6050
|
+
(function (RefreshTokenExpirationPolicy) {
|
|
6051
|
+
RefreshTokenExpirationPolicy["Fixed"] = "Fixed";
|
|
6052
|
+
RefreshTokenExpirationPolicy["SlidingWindow"] = "SlidingWindow";
|
|
6053
|
+
RefreshTokenExpirationPolicy["SlidingWindowWithMaximumLifetime"] = "SlidingWindowWithMaximumLifetime";
|
|
6054
|
+
})(RefreshTokenExpirationPolicy = exports.RefreshTokenExpirationPolicy || (exports.RefreshTokenExpirationPolicy = {}));
|
|
6042
6055
|
/**
|
|
6043
6056
|
* @author Daniel DeGroff
|
|
6044
6057
|
*/
|
|
6045
|
-
var
|
|
6046
|
-
(function (
|
|
6047
|
-
|
|
6048
|
-
|
|
6049
|
-
|
|
6050
|
-
|
|
6051
|
-
|
|
6052
|
-
|
|
6053
|
-
|
|
6054
|
-
|
|
6055
|
-
|
|
6056
|
-
|
|
6057
|
-
|
|
6058
|
-
|
|
6059
|
-
|
|
6060
|
-
|
|
6061
|
-
|
|
6062
|
-
|
|
6063
|
-
|
|
6058
|
+
var RefreshTokenUsagePolicy;
|
|
6059
|
+
(function (RefreshTokenUsagePolicy) {
|
|
6060
|
+
RefreshTokenUsagePolicy["Reusable"] = "Reusable";
|
|
6061
|
+
RefreshTokenUsagePolicy["OneTimeUse"] = "OneTimeUse";
|
|
6062
|
+
})(RefreshTokenUsagePolicy = exports.RefreshTokenUsagePolicy || (exports.RefreshTokenUsagePolicy = {}));
|
|
6063
|
+
/**
|
|
6064
|
+
* Describes the Relying Party's requirements for <a href="https://www.w3.org/TR/webauthn-2/#client-side-discoverable-credential">client-side
|
|
6065
|
+
* discoverable credentials</a> (formerly known as "resident keys")
|
|
6066
|
+
*
|
|
6067
|
+
* @author Spencer Witt
|
|
6068
|
+
*/
|
|
6069
|
+
var ResidentKeyRequirement;
|
|
6070
|
+
(function (ResidentKeyRequirement) {
|
|
6071
|
+
ResidentKeyRequirement["discouraged"] = "discouraged";
|
|
6072
|
+
ResidentKeyRequirement["preferred"] = "preferred";
|
|
6073
|
+
ResidentKeyRequirement["required"] = "required";
|
|
6074
|
+
})(ResidentKeyRequirement = exports.ResidentKeyRequirement || (exports.ResidentKeyRequirement = {}));
|
|
6075
|
+
/**
|
|
6076
|
+
* @author Lyle Schemmerling
|
|
6077
|
+
*/
|
|
6078
|
+
var SAMLv2DestinationAssertionPolicy;
|
|
6079
|
+
(function (SAMLv2DestinationAssertionPolicy) {
|
|
6080
|
+
SAMLv2DestinationAssertionPolicy["Enabled"] = "Enabled";
|
|
6081
|
+
SAMLv2DestinationAssertionPolicy["Disabled"] = "Disabled";
|
|
6082
|
+
SAMLv2DestinationAssertionPolicy["AllowAlternates"] = "AllowAlternates";
|
|
6083
|
+
})(SAMLv2DestinationAssertionPolicy = exports.SAMLv2DestinationAssertionPolicy || (exports.SAMLv2DestinationAssertionPolicy = {}));
|
|
6064
6084
|
/**
|
|
6065
6085
|
* @author Daniel DeGroff
|
|
6066
6086
|
*/
|
|
6067
|
-
var
|
|
6068
|
-
(function (
|
|
6069
|
-
|
|
6070
|
-
|
|
6071
|
-
|
|
6072
|
-
|
|
6073
|
-
(
|
|
6074
|
-
TOTPAlgorithm["HmacSHA1"] = "HmacSHA1";
|
|
6075
|
-
TOTPAlgorithm["HmacSHA256"] = "HmacSHA256";
|
|
6076
|
-
TOTPAlgorithm["HmacSHA512"] = "HmacSHA512";
|
|
6077
|
-
})(TOTPAlgorithm = exports.TOTPAlgorithm || (exports.TOTPAlgorithm = {}));
|
|
6087
|
+
var SecureGeneratorType;
|
|
6088
|
+
(function (SecureGeneratorType) {
|
|
6089
|
+
SecureGeneratorType["randomDigits"] = "randomDigits";
|
|
6090
|
+
SecureGeneratorType["randomBytes"] = "randomBytes";
|
|
6091
|
+
SecureGeneratorType["randomAlpha"] = "randomAlpha";
|
|
6092
|
+
SecureGeneratorType["randomAlphaNumeric"] = "randomAlphaNumeric";
|
|
6093
|
+
})(SecureGeneratorType = exports.SecureGeneratorType || (exports.SecureGeneratorType = {}));
|
|
6078
6094
|
/**
|
|
6079
|
-
* @author
|
|
6095
|
+
* @author Daniel DeGroff
|
|
6080
6096
|
*/
|
|
6081
|
-
var
|
|
6082
|
-
(function (
|
|
6083
|
-
|
|
6084
|
-
|
|
6097
|
+
var Sort;
|
|
6098
|
+
(function (Sort) {
|
|
6099
|
+
Sort["asc"] = "asc";
|
|
6100
|
+
Sort["desc"] = "desc";
|
|
6101
|
+
})(Sort = exports.Sort || (exports.Sort = {}));
|
|
6085
6102
|
/**
|
|
6086
6103
|
* Steam API modes.
|
|
6087
6104
|
*
|
|
@@ -6093,76 +6110,52 @@ var SteamAPIMode;
|
|
|
6093
6110
|
SteamAPIMode["Partner"] = "Partner";
|
|
6094
6111
|
})(SteamAPIMode = exports.SteamAPIMode || (exports.SteamAPIMode = {}));
|
|
6095
6112
|
/**
|
|
6096
|
-
* @author
|
|
6113
|
+
* @author Daniel DeGroff
|
|
6097
6114
|
*/
|
|
6098
|
-
var
|
|
6099
|
-
(function (
|
|
6100
|
-
|
|
6101
|
-
|
|
6102
|
-
|
|
6103
|
-
|
|
6104
|
-
|
|
6115
|
+
var SystemTrustedProxyConfigurationPolicy;
|
|
6116
|
+
(function (SystemTrustedProxyConfigurationPolicy) {
|
|
6117
|
+
SystemTrustedProxyConfigurationPolicy["All"] = "All";
|
|
6118
|
+
SystemTrustedProxyConfigurationPolicy["OnlyConfigured"] = "OnlyConfigured";
|
|
6119
|
+
})(SystemTrustedProxyConfigurationPolicy = exports.SystemTrustedProxyConfigurationPolicy || (exports.SystemTrustedProxyConfigurationPolicy = {}));
|
|
6120
|
+
var UniqueUsernameStrategy;
|
|
6121
|
+
(function (UniqueUsernameStrategy) {
|
|
6122
|
+
UniqueUsernameStrategy["Always"] = "Always";
|
|
6123
|
+
UniqueUsernameStrategy["OnCollision"] = "OnCollision";
|
|
6124
|
+
})(UniqueUsernameStrategy = exports.UniqueUsernameStrategy || (exports.UniqueUsernameStrategy = {}));
|
|
6125
|
+
var ThemeType;
|
|
6126
|
+
(function (ThemeType) {
|
|
6127
|
+
ThemeType["advanced"] = "advanced";
|
|
6128
|
+
ThemeType["simple"] = "simple";
|
|
6129
|
+
})(ThemeType = exports.ThemeType || (exports.ThemeType = {}));
|
|
6105
6130
|
/**
|
|
6106
|
-
*
|
|
6131
|
+
* <ul>
|
|
6132
|
+
* <li>Bearer Token type as defined by <a href="https://tools.ietf.org/html/rfc6750">RFC 6750</a>.</li>
|
|
6133
|
+
* <li>MAC Token type as referenced by <a href="https://tools.ietf.org/html/rfc6749">RFC 6749</a> and
|
|
6134
|
+
* <a href="https://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-05">
|
|
6135
|
+
* Draft RFC on OAuth 2.0 Message Authentication Code (MAC) Tokens</a>
|
|
6136
|
+
* </li>
|
|
6137
|
+
* </ul>
|
|
6138
|
+
*
|
|
6139
|
+
* @author Daniel DeGroff
|
|
6140
|
+
*/
|
|
6141
|
+
var TokenType;
|
|
6142
|
+
(function (TokenType) {
|
|
6143
|
+
TokenType["Bearer"] = "Bearer";
|
|
6144
|
+
TokenType["MAC"] = "MAC";
|
|
6145
|
+
})(TokenType = exports.TokenType || (exports.TokenType = {}));
|
|
6146
|
+
/**
|
|
6147
|
+
* The transaction types for Webhooks and other event systems within FusionAuth.
|
|
6107
6148
|
*
|
|
6108
6149
|
* @author Brian Pontarelli
|
|
6109
6150
|
*/
|
|
6110
|
-
var
|
|
6111
|
-
(function (
|
|
6112
|
-
|
|
6113
|
-
|
|
6114
|
-
|
|
6115
|
-
|
|
6116
|
-
|
|
6117
|
-
|
|
6118
|
-
EventType["GroupCreate"] = "group.create";
|
|
6119
|
-
EventType["GroupCreateComplete"] = "group.create.complete";
|
|
6120
|
-
EventType["GroupDelete"] = "group.delete";
|
|
6121
|
-
EventType["GroupDeleteComplete"] = "group.delete.complete";
|
|
6122
|
-
EventType["GroupMemberAdd"] = "group.member.add";
|
|
6123
|
-
EventType["GroupMemberAddComplete"] = "group.member.add.complete";
|
|
6124
|
-
EventType["GroupMemberRemove"] = "group.member.remove";
|
|
6125
|
-
EventType["GroupMemberRemoveComplete"] = "group.member.remove.complete";
|
|
6126
|
-
EventType["GroupMemberUpdate"] = "group.member.update";
|
|
6127
|
-
EventType["GroupMemberUpdateComplete"] = "group.member.update.complete";
|
|
6128
|
-
EventType["GroupUpdate"] = "group.update";
|
|
6129
|
-
EventType["GroupUpdateComplete"] = "group.update.complete";
|
|
6130
|
-
EventType["UserAction"] = "user.action";
|
|
6131
|
-
EventType["UserBulkCreate"] = "user.bulk.create";
|
|
6132
|
-
EventType["UserCreate"] = "user.create";
|
|
6133
|
-
EventType["UserCreateComplete"] = "user.create.complete";
|
|
6134
|
-
EventType["UserDeactivate"] = "user.deactivate";
|
|
6135
|
-
EventType["UserDelete"] = "user.delete";
|
|
6136
|
-
EventType["UserDeleteComplete"] = "user.delete.complete";
|
|
6137
|
-
EventType["UserEmailUpdate"] = "user.email.update";
|
|
6138
|
-
EventType["UserEmailVerified"] = "user.email.verified";
|
|
6139
|
-
EventType["UserIdentityProviderLink"] = "user.identity-provider.link";
|
|
6140
|
-
EventType["UserIdentityProviderUnlink"] = "user.identity-provider.unlink";
|
|
6141
|
-
EventType["UserLoginIdDuplicateOnCreate"] = "user.loginId.duplicate.create";
|
|
6142
|
-
EventType["UserLoginIdDuplicateOnUpdate"] = "user.loginId.duplicate.update";
|
|
6143
|
-
EventType["UserLoginFailed"] = "user.login.failed";
|
|
6144
|
-
EventType["UserLoginNewDevice"] = "user.login.new-device";
|
|
6145
|
-
EventType["UserLoginSuccess"] = "user.login.success";
|
|
6146
|
-
EventType["UserLoginSuspicious"] = "user.login.suspicious";
|
|
6147
|
-
EventType["UserPasswordBreach"] = "user.password.breach";
|
|
6148
|
-
EventType["UserPasswordResetSend"] = "user.password.reset.send";
|
|
6149
|
-
EventType["UserPasswordResetStart"] = "user.password.reset.start";
|
|
6150
|
-
EventType["UserPasswordResetSuccess"] = "user.password.reset.success";
|
|
6151
|
-
EventType["UserPasswordUpdate"] = "user.password.update";
|
|
6152
|
-
EventType["UserReactivate"] = "user.reactivate";
|
|
6153
|
-
EventType["UserRegistrationCreate"] = "user.registration.create";
|
|
6154
|
-
EventType["UserRegistrationCreateComplete"] = "user.registration.create.complete";
|
|
6155
|
-
EventType["UserRegistrationDelete"] = "user.registration.delete";
|
|
6156
|
-
EventType["UserRegistrationDeleteComplete"] = "user.registration.delete.complete";
|
|
6157
|
-
EventType["UserRegistrationUpdate"] = "user.registration.update";
|
|
6158
|
-
EventType["UserRegistrationUpdateComplete"] = "user.registration.update.complete";
|
|
6159
|
-
EventType["UserRegistrationVerified"] = "user.registration.verified";
|
|
6160
|
-
EventType["UserTwoFactorMethodAdd"] = "user.two-factor.method.add";
|
|
6161
|
-
EventType["UserTwoFactorMethodRemove"] = "user.two-factor.method.remove";
|
|
6162
|
-
EventType["UserUpdate"] = "user.update";
|
|
6163
|
-
EventType["UserUpdateComplete"] = "user.update.complete";
|
|
6164
|
-
EventType["Test"] = "test";
|
|
6165
|
-
})(EventType = exports.EventType || (exports.EventType = {}));
|
|
6151
|
+
var TransactionType;
|
|
6152
|
+
(function (TransactionType) {
|
|
6153
|
+
TransactionType["None"] = "None";
|
|
6154
|
+
TransactionType["Any"] = "Any";
|
|
6155
|
+
TransactionType["SimpleMajority"] = "SimpleMajority";
|
|
6156
|
+
TransactionType["SuperMajority"] = "SuperMajority";
|
|
6157
|
+
TransactionType["AbsoluteMajority"] = "AbsoluteMajority";
|
|
6158
|
+
})(TransactionType = exports.TransactionType || (exports.TransactionType = {}));
|
|
6166
6159
|
/**
|
|
6167
6160
|
* Policy for handling unknown OAuth scopes in the request
|
|
6168
6161
|
*
|
|
@@ -6175,41 +6168,88 @@ var UnknownScopePolicy;
|
|
|
6175
6168
|
UnknownScopePolicy["Reject"] = "Reject";
|
|
6176
6169
|
})(UnknownScopePolicy = exports.UnknownScopePolicy || (exports.UnknownScopePolicy = {}));
|
|
6177
6170
|
/**
|
|
6178
|
-
*
|
|
6179
|
-
|
|
6171
|
+
* @author Daniel DeGroff
|
|
6172
|
+
*/
|
|
6173
|
+
var UnverifiedBehavior;
|
|
6174
|
+
(function (UnverifiedBehavior) {
|
|
6175
|
+
UnverifiedBehavior["Allow"] = "Allow";
|
|
6176
|
+
UnverifiedBehavior["Gated"] = "Gated";
|
|
6177
|
+
})(UnverifiedBehavior = exports.UnverifiedBehavior || (exports.UnverifiedBehavior = {}));
|
|
6178
|
+
/**
|
|
6179
|
+
* The phases of a time-based user action.
|
|
6180
6180
|
*
|
|
6181
|
-
* @author
|
|
6181
|
+
* @author Brian Pontarelli
|
|
6182
6182
|
*/
|
|
6183
|
-
var
|
|
6184
|
-
(function (
|
|
6185
|
-
|
|
6186
|
-
|
|
6187
|
-
|
|
6188
|
-
|
|
6189
|
-
(
|
|
6190
|
-
ClientAuthenticationMethod["none"] = "none";
|
|
6191
|
-
ClientAuthenticationMethod["client_secret_basic"] = "client_secret_basic";
|
|
6192
|
-
ClientAuthenticationMethod["client_secret_post"] = "client_secret_post";
|
|
6193
|
-
})(ClientAuthenticationMethod = exports.ClientAuthenticationMethod || (exports.ClientAuthenticationMethod = {}));
|
|
6183
|
+
var UserActionPhase;
|
|
6184
|
+
(function (UserActionPhase) {
|
|
6185
|
+
UserActionPhase["start"] = "start";
|
|
6186
|
+
UserActionPhase["modify"] = "modify";
|
|
6187
|
+
UserActionPhase["cancel"] = "cancel";
|
|
6188
|
+
UserActionPhase["end"] = "end";
|
|
6189
|
+
})(UserActionPhase = exports.UserActionPhase || (exports.UserActionPhase = {}));
|
|
6194
6190
|
/**
|
|
6195
|
-
*
|
|
6191
|
+
* @author Daniel DeGroff
|
|
6192
|
+
*/
|
|
6193
|
+
var UserState;
|
|
6194
|
+
(function (UserState) {
|
|
6195
|
+
UserState["Authenticated"] = "Authenticated";
|
|
6196
|
+
UserState["AuthenticatedNotRegistered"] = "AuthenticatedNotRegistered";
|
|
6197
|
+
UserState["AuthenticatedNotVerified"] = "AuthenticatedNotVerified";
|
|
6198
|
+
UserState["AuthenticatedRegistrationNotVerified"] = "AuthenticatedRegistrationNotVerified";
|
|
6199
|
+
})(UserState = exports.UserState || (exports.UserState = {}));
|
|
6200
|
+
/**
|
|
6201
|
+
* Used to express whether the Relying Party requires <a href="https://www.w3.org/TR/webauthn-2/#user-verification">user verification</a> for the
|
|
6202
|
+
* current operation.
|
|
6196
6203
|
*
|
|
6204
|
+
* @author Spencer Witt
|
|
6205
|
+
*/
|
|
6206
|
+
var UserVerificationRequirement;
|
|
6207
|
+
(function (UserVerificationRequirement) {
|
|
6208
|
+
UserVerificationRequirement["required"] = "required";
|
|
6209
|
+
UserVerificationRequirement["preferred"] = "preferred";
|
|
6210
|
+
UserVerificationRequirement["discouraged"] = "discouraged";
|
|
6211
|
+
})(UserVerificationRequirement = exports.UserVerificationRequirement || (exports.UserVerificationRequirement = {}));
|
|
6212
|
+
/**
|
|
6197
6213
|
* @author Daniel DeGroff
|
|
6198
6214
|
*/
|
|
6199
|
-
var
|
|
6200
|
-
(function (
|
|
6201
|
-
|
|
6202
|
-
|
|
6203
|
-
|
|
6204
|
-
|
|
6205
|
-
|
|
6206
|
-
|
|
6207
|
-
|
|
6208
|
-
|
|
6209
|
-
|
|
6210
|
-
|
|
6211
|
-
|
|
6212
|
-
|
|
6213
|
-
|
|
6214
|
-
|
|
6215
|
+
var VerificationStrategy;
|
|
6216
|
+
(function (VerificationStrategy) {
|
|
6217
|
+
VerificationStrategy["ClickableLink"] = "ClickableLink";
|
|
6218
|
+
VerificationStrategy["FormField"] = "FormField";
|
|
6219
|
+
})(VerificationStrategy = exports.VerificationStrategy || (exports.VerificationStrategy = {}));
|
|
6220
|
+
/**
|
|
6221
|
+
* Identifies the WebAuthn workflow. This will affect the parameters used for credential creation
|
|
6222
|
+
* and request based on the Tenant configuration.
|
|
6223
|
+
*
|
|
6224
|
+
* @author Spencer Witt
|
|
6225
|
+
*/
|
|
6226
|
+
var WebAuthnWorkflow;
|
|
6227
|
+
(function (WebAuthnWorkflow) {
|
|
6228
|
+
WebAuthnWorkflow["bootstrap"] = "bootstrap";
|
|
6229
|
+
WebAuthnWorkflow["general"] = "general";
|
|
6230
|
+
WebAuthnWorkflow["reauthentication"] = "reauthentication";
|
|
6231
|
+
})(WebAuthnWorkflow = exports.WebAuthnWorkflow || (exports.WebAuthnWorkflow = {}));
|
|
6232
|
+
/**
|
|
6233
|
+
* The possible states of an individual webhook attempt to a single endpoint.
|
|
6234
|
+
*
|
|
6235
|
+
* @author Spencer Witt
|
|
6236
|
+
*/
|
|
6237
|
+
var WebhookAttemptResult;
|
|
6238
|
+
(function (WebhookAttemptResult) {
|
|
6239
|
+
WebhookAttemptResult["Success"] = "Success";
|
|
6240
|
+
WebhookAttemptResult["Failure"] = "Failure";
|
|
6241
|
+
WebhookAttemptResult["Unknown"] = "Unknown";
|
|
6242
|
+
})(WebhookAttemptResult = exports.WebhookAttemptResult || (exports.WebhookAttemptResult = {}));
|
|
6243
|
+
/**
|
|
6244
|
+
* The possible result states of a webhook event. This tracks the success of the overall webhook transaction according to the {@link TransactionType}
|
|
6245
|
+
* and configured webhooks.
|
|
6246
|
+
*
|
|
6247
|
+
* @author Spencer Witt
|
|
6248
|
+
*/
|
|
6249
|
+
var WebhookEventResult;
|
|
6250
|
+
(function (WebhookEventResult) {
|
|
6251
|
+
WebhookEventResult["Failed"] = "Failed";
|
|
6252
|
+
WebhookEventResult["Running"] = "Running";
|
|
6253
|
+
WebhookEventResult["Succeeded"] = "Succeeded";
|
|
6254
|
+
})(WebhookEventResult = exports.WebhookEventResult || (exports.WebhookEventResult = {}));
|
|
6215
6255
|
//# sourceMappingURL=FusionAuthClient.js.map
|