@goauthentik/api 2022.12.2-1673612527 → 2022.12.2-1673623344

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (30) hide show
  1. package/dist/apis/SourcesApi.d.ts +1 -0
  2. package/dist/apis/SourcesApi.js +3 -0
  3. package/dist/esm/apis/SourcesApi.d.ts +1 -0
  4. package/dist/esm/apis/SourcesApi.js +3 -0
  5. package/dist/esm/models/PatchedProxyProviderRequest.d.ts +6 -0
  6. package/dist/esm/models/PatchedProxyProviderRequest.js +2 -0
  7. package/dist/esm/models/PatchedScopeMappingRequest.d.ts +1 -1
  8. package/dist/esm/models/ProxyProvider.d.ts +12 -0
  9. package/dist/esm/models/ProxyProvider.js +3 -0
  10. package/dist/esm/models/ProxyProviderRequest.d.ts +6 -0
  11. package/dist/esm/models/ProxyProviderRequest.js +2 -0
  12. package/dist/esm/models/ScopeMapping.d.ts +1 -1
  13. package/dist/esm/models/ScopeMappingRequest.d.ts +1 -1
  14. package/dist/models/PatchedProxyProviderRequest.d.ts +6 -0
  15. package/dist/models/PatchedProxyProviderRequest.js +2 -0
  16. package/dist/models/PatchedScopeMappingRequest.d.ts +1 -1
  17. package/dist/models/ProxyProvider.d.ts +12 -0
  18. package/dist/models/ProxyProvider.js +3 -0
  19. package/dist/models/ProxyProviderRequest.d.ts +6 -0
  20. package/dist/models/ProxyProviderRequest.js +2 -0
  21. package/dist/models/ScopeMapping.d.ts +1 -1
  22. package/dist/models/ScopeMappingRequest.d.ts +1 -1
  23. package/package.json +1 -1
  24. package/src/apis/SourcesApi.ts +5 -0
  25. package/src/models/PatchedProxyProviderRequest.ts +8 -0
  26. package/src/models/PatchedScopeMappingRequest.ts +1 -1
  27. package/src/models/ProxyProvider.ts +15 -0
  28. package/src/models/ProxyProviderRequest.ts +8 -0
  29. package/src/models/ScopeMapping.ts +1 -1
  30. package/src/models/ScopeMappingRequest.ts +1 -1
@@ -101,6 +101,7 @@ export interface SourcesOauthListRequest {
101
101
  consumerKey?: string;
102
102
  enabled?: boolean;
103
103
  enrollmentFlow?: string;
104
+ hasJwks?: boolean;
104
105
  name?: string;
105
106
  ordering?: string;
106
107
  page?: number;
@@ -728,6 +728,9 @@ class SourcesApi extends runtime.BaseAPI {
728
728
  if (requestParameters.enrollmentFlow !== undefined) {
729
729
  queryParameters['enrollment_flow'] = requestParameters.enrollmentFlow;
730
730
  }
731
+ if (requestParameters.hasJwks !== undefined) {
732
+ queryParameters['has_jwks'] = requestParameters.hasJwks;
733
+ }
731
734
  if (requestParameters.name !== undefined) {
732
735
  queryParameters['name'] = requestParameters.name;
733
736
  }
@@ -101,6 +101,7 @@ export interface SourcesOauthListRequest {
101
101
  consumerKey?: string;
102
102
  enabled?: boolean;
103
103
  enrollmentFlow?: string;
104
+ hasJwks?: boolean;
104
105
  name?: string;
105
106
  ordering?: string;
106
107
  page?: number;
@@ -725,6 +725,9 @@ export class SourcesApi extends runtime.BaseAPI {
725
725
  if (requestParameters.enrollmentFlow !== undefined) {
726
726
  queryParameters['enrollment_flow'] = requestParameters.enrollmentFlow;
727
727
  }
728
+ if (requestParameters.hasJwks !== undefined) {
729
+ queryParameters['has_jwks'] = requestParameters.hasJwks;
730
+ }
728
731
  if (requestParameters.name !== undefined) {
729
732
  queryParameters['name'] = requestParameters.name;
730
733
  }
@@ -94,6 +94,12 @@ export interface PatchedProxyProviderRequest {
94
94
  * @memberof PatchedProxyProviderRequest
95
95
  */
96
96
  cookieDomain?: string;
97
+ /**
98
+ *
99
+ * @type {Array<string>}
100
+ * @memberof PatchedProxyProviderRequest
101
+ */
102
+ jwksSources?: Array<string>;
97
103
  /**
98
104
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
99
105
  * @type {string}
@@ -34,6 +34,7 @@ export function PatchedProxyProviderRequestFromJSONTyped(json, ignoreDiscriminat
34
34
  'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
35
35
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
36
36
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
37
+ 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
37
38
  'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
38
39
  };
39
40
  }
@@ -58,6 +59,7 @@ export function PatchedProxyProviderRequestToJSON(value) {
58
59
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
59
60
  'mode': ProxyModeToJSON(value.mode),
60
61
  'cookie_domain': value.cookieDomain,
62
+ 'jwks_sources': value.jwksSources,
61
63
  'token_validity': value.tokenValidity,
62
64
  };
63
65
  }
@@ -34,7 +34,7 @@ export interface PatchedScopeMappingRequest {
34
34
  */
35
35
  expression?: string;
36
36
  /**
37
- * Scope used by the client
37
+ * Scope name requested by the client
38
38
  * @type {string}
39
39
  * @memberof PatchedScopeMappingRequest
40
40
  */
@@ -76,6 +76,12 @@ export interface ProxyProvider {
76
76
  * @memberof ProxyProvider
77
77
  */
78
78
  readonly metaModelName: string;
79
+ /**
80
+ *
81
+ * @type {string}
82
+ * @memberof ProxyProvider
83
+ */
84
+ readonly clientId: string;
79
85
  /**
80
86
  *
81
87
  * @type {string}
@@ -142,6 +148,12 @@ export interface ProxyProvider {
142
148
  * @memberof ProxyProvider
143
149
  */
144
150
  cookieDomain?: string;
151
+ /**
152
+ *
153
+ * @type {Array<string>}
154
+ * @memberof ProxyProvider
155
+ */
156
+ jwksSources?: Array<string>;
145
157
  /**
146
158
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
147
159
  * @type {string}
@@ -31,6 +31,7 @@ export function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
31
31
  'verboseName': json['verbose_name'],
32
32
  'verboseNamePlural': json['verbose_name_plural'],
33
33
  'metaModelName': json['meta_model_name'],
34
+ 'clientId': json['client_id'],
34
35
  'internalHost': !exists(json, 'internal_host') ? undefined : json['internal_host'],
35
36
  'externalHost': json['external_host'],
36
37
  'internalHostSslValidation': !exists(json, 'internal_host_ssl_validation') ? undefined : json['internal_host_ssl_validation'],
@@ -42,6 +43,7 @@ export function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
42
43
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
43
44
  'redirectUris': json['redirect_uris'],
44
45
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
46
+ 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
45
47
  'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
46
48
  'outpostSet': json['outpost_set'],
47
49
  };
@@ -67,6 +69,7 @@ export function ProxyProviderToJSON(value) {
67
69
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
68
70
  'mode': ProxyModeToJSON(value.mode),
69
71
  'cookie_domain': value.cookieDomain,
72
+ 'jwks_sources': value.jwksSources,
70
73
  'token_validity': value.tokenValidity,
71
74
  };
72
75
  }
@@ -94,6 +94,12 @@ export interface ProxyProviderRequest {
94
94
  * @memberof ProxyProviderRequest
95
95
  */
96
96
  cookieDomain?: string;
97
+ /**
98
+ *
99
+ * @type {Array<string>}
100
+ * @memberof ProxyProviderRequest
101
+ */
102
+ jwksSources?: Array<string>;
97
103
  /**
98
104
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
99
105
  * @type {string}
@@ -34,6 +34,7 @@ export function ProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
34
34
  'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
35
35
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
36
36
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
37
+ 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
37
38
  'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
38
39
  };
39
40
  }
@@ -58,6 +59,7 @@ export function ProxyProviderRequestToJSON(value) {
58
59
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
59
60
  'mode': ProxyModeToJSON(value.mode),
60
61
  'cookie_domain': value.cookieDomain,
62
+ 'jwks_sources': value.jwksSources,
61
63
  'token_validity': value.tokenValidity,
62
64
  };
63
65
  }
@@ -64,7 +64,7 @@ export interface ScopeMapping {
64
64
  */
65
65
  readonly metaModelName: string;
66
66
  /**
67
- * Scope used by the client
67
+ * Scope name requested by the client
68
68
  * @type {string}
69
69
  * @memberof ScopeMapping
70
70
  */
@@ -34,7 +34,7 @@ export interface ScopeMappingRequest {
34
34
  */
35
35
  expression: string;
36
36
  /**
37
- * Scope used by the client
37
+ * Scope name requested by the client
38
38
  * @type {string}
39
39
  * @memberof ScopeMappingRequest
40
40
  */
@@ -94,6 +94,12 @@ export interface PatchedProxyProviderRequest {
94
94
  * @memberof PatchedProxyProviderRequest
95
95
  */
96
96
  cookieDomain?: string;
97
+ /**
98
+ *
99
+ * @type {Array<string>}
100
+ * @memberof PatchedProxyProviderRequest
101
+ */
102
+ jwksSources?: Array<string>;
97
103
  /**
98
104
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
99
105
  * @type {string}
@@ -38,6 +38,7 @@ function PatchedProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
38
38
  'basicAuthUserAttribute': !(0, runtime_1.exists)(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
39
39
  'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
40
40
  'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
41
+ 'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
41
42
  'tokenValidity': !(0, runtime_1.exists)(json, 'token_validity') ? undefined : json['token_validity'],
42
43
  };
43
44
  }
@@ -63,6 +64,7 @@ function PatchedProxyProviderRequestToJSON(value) {
63
64
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
64
65
  'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
65
66
  'cookie_domain': value.cookieDomain,
67
+ 'jwks_sources': value.jwksSources,
66
68
  'token_validity': value.tokenValidity,
67
69
  };
68
70
  }
@@ -34,7 +34,7 @@ export interface PatchedScopeMappingRequest {
34
34
  */
35
35
  expression?: string;
36
36
  /**
37
- * Scope used by the client
37
+ * Scope name requested by the client
38
38
  * @type {string}
39
39
  * @memberof PatchedScopeMappingRequest
40
40
  */
@@ -76,6 +76,12 @@ export interface ProxyProvider {
76
76
  * @memberof ProxyProvider
77
77
  */
78
78
  readonly metaModelName: string;
79
+ /**
80
+ *
81
+ * @type {string}
82
+ * @memberof ProxyProvider
83
+ */
84
+ readonly clientId: string;
79
85
  /**
80
86
  *
81
87
  * @type {string}
@@ -142,6 +148,12 @@ export interface ProxyProvider {
142
148
  * @memberof ProxyProvider
143
149
  */
144
150
  cookieDomain?: string;
151
+ /**
152
+ *
153
+ * @type {Array<string>}
154
+ * @memberof ProxyProvider
155
+ */
156
+ jwksSources?: Array<string>;
145
157
  /**
146
158
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
147
159
  * @type {string}
@@ -35,6 +35,7 @@ function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
35
35
  'verboseName': json['verbose_name'],
36
36
  'verboseNamePlural': json['verbose_name_plural'],
37
37
  'metaModelName': json['meta_model_name'],
38
+ 'clientId': json['client_id'],
38
39
  'internalHost': !(0, runtime_1.exists)(json, 'internal_host') ? undefined : json['internal_host'],
39
40
  'externalHost': json['external_host'],
40
41
  'internalHostSslValidation': !(0, runtime_1.exists)(json, 'internal_host_ssl_validation') ? undefined : json['internal_host_ssl_validation'],
@@ -46,6 +47,7 @@ function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
46
47
  'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
47
48
  'redirectUris': json['redirect_uris'],
48
49
  'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
50
+ 'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
49
51
  'tokenValidity': !(0, runtime_1.exists)(json, 'token_validity') ? undefined : json['token_validity'],
50
52
  'outpostSet': json['outpost_set'],
51
53
  };
@@ -72,6 +74,7 @@ function ProxyProviderToJSON(value) {
72
74
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
73
75
  'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
74
76
  'cookie_domain': value.cookieDomain,
77
+ 'jwks_sources': value.jwksSources,
75
78
  'token_validity': value.tokenValidity,
76
79
  };
77
80
  }
@@ -94,6 +94,12 @@ export interface ProxyProviderRequest {
94
94
  * @memberof ProxyProviderRequest
95
95
  */
96
96
  cookieDomain?: string;
97
+ /**
98
+ *
99
+ * @type {Array<string>}
100
+ * @memberof ProxyProviderRequest
101
+ */
102
+ jwksSources?: Array<string>;
97
103
  /**
98
104
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
99
105
  * @type {string}
@@ -38,6 +38,7 @@ function ProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
38
38
  'basicAuthUserAttribute': !(0, runtime_1.exists)(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
39
39
  'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
40
40
  'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
41
+ 'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
41
42
  'tokenValidity': !(0, runtime_1.exists)(json, 'token_validity') ? undefined : json['token_validity'],
42
43
  };
43
44
  }
@@ -63,6 +64,7 @@ function ProxyProviderRequestToJSON(value) {
63
64
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
64
65
  'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
65
66
  'cookie_domain': value.cookieDomain,
67
+ 'jwks_sources': value.jwksSources,
66
68
  'token_validity': value.tokenValidity,
67
69
  };
68
70
  }
@@ -64,7 +64,7 @@ export interface ScopeMapping {
64
64
  */
65
65
  readonly metaModelName: string;
66
66
  /**
67
- * Scope used by the client
67
+ * Scope name requested by the client
68
68
  * @type {string}
69
69
  * @memberof ScopeMapping
70
70
  */
@@ -34,7 +34,7 @@ export interface ScopeMappingRequest {
34
34
  */
35
35
  expression: string;
36
36
  /**
37
- * Scope used by the client
37
+ * Scope name requested by the client
38
38
  * @type {string}
39
39
  * @memberof ScopeMappingRequest
40
40
  */
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goauthentik/api",
3
- "version": "2022.12.2-1673612527",
3
+ "version": "2022.12.2-1673623344",
4
4
  "description": "OpenAPI client for @goauthentik/api",
5
5
  "author": "OpenAPI-Generator",
6
6
  "repository": {
@@ -252,6 +252,7 @@ export interface SourcesOauthListRequest {
252
252
  consumerKey?: string;
253
253
  enabled?: boolean;
254
254
  enrollmentFlow?: string;
255
+ hasJwks?: boolean;
255
256
  name?: string;
256
257
  ordering?: string;
257
258
  page?: number;
@@ -1326,6 +1327,10 @@ export class SourcesApi extends runtime.BaseAPI {
1326
1327
  queryParameters['enrollment_flow'] = requestParameters.enrollmentFlow;
1327
1328
  }
1328
1329
 
1330
+ if (requestParameters.hasJwks !== undefined) {
1331
+ queryParameters['has_jwks'] = requestParameters.hasJwks;
1332
+ }
1333
+
1329
1334
  if (requestParameters.name !== undefined) {
1330
1335
  queryParameters['name'] = requestParameters.name;
1331
1336
  }
@@ -104,6 +104,12 @@ export interface PatchedProxyProviderRequest {
104
104
  * @memberof PatchedProxyProviderRequest
105
105
  */
106
106
  cookieDomain?: string;
107
+ /**
108
+ *
109
+ * @type {Array<string>}
110
+ * @memberof PatchedProxyProviderRequest
111
+ */
112
+ jwksSources?: Array<string>;
107
113
  /**
108
114
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
109
115
  * @type {string}
@@ -135,6 +141,7 @@ export function PatchedProxyProviderRequestFromJSONTyped(json: any, ignoreDiscri
135
141
  'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
136
142
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
137
143
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
144
+ 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
138
145
  'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
139
146
  };
140
147
  }
@@ -161,6 +168,7 @@ export function PatchedProxyProviderRequestToJSON(value?: PatchedProxyProviderRe
161
168
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
162
169
  'mode': ProxyModeToJSON(value.mode),
163
170
  'cookie_domain': value.cookieDomain,
171
+ 'jwks_sources': value.jwksSources,
164
172
  'token_validity': value.tokenValidity,
165
173
  };
166
174
  }
@@ -38,7 +38,7 @@ export interface PatchedScopeMappingRequest {
38
38
  */
39
39
  expression?: string;
40
40
  /**
41
- * Scope used by the client
41
+ * Scope name requested by the client
42
42
  * @type {string}
43
43
  * @memberof PatchedScopeMappingRequest
44
44
  */
@@ -86,6 +86,12 @@ export interface ProxyProvider {
86
86
  * @memberof ProxyProvider
87
87
  */
88
88
  readonly metaModelName: string;
89
+ /**
90
+ *
91
+ * @type {string}
92
+ * @memberof ProxyProvider
93
+ */
94
+ readonly clientId: string;
89
95
  /**
90
96
  *
91
97
  * @type {string}
@@ -152,6 +158,12 @@ export interface ProxyProvider {
152
158
  * @memberof ProxyProvider
153
159
  */
154
160
  cookieDomain?: string;
161
+ /**
162
+ *
163
+ * @type {Array<string>}
164
+ * @memberof ProxyProvider
165
+ */
166
+ jwksSources?: Array<string>;
155
167
  /**
156
168
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
157
169
  * @type {string}
@@ -186,6 +198,7 @@ export function ProxyProviderFromJSONTyped(json: any, ignoreDiscriminator: boole
186
198
  'verboseName': json['verbose_name'],
187
199
  'verboseNamePlural': json['verbose_name_plural'],
188
200
  'metaModelName': json['meta_model_name'],
201
+ 'clientId': json['client_id'],
189
202
  'internalHost': !exists(json, 'internal_host') ? undefined : json['internal_host'],
190
203
  'externalHost': json['external_host'],
191
204
  'internalHostSslValidation': !exists(json, 'internal_host_ssl_validation') ? undefined : json['internal_host_ssl_validation'],
@@ -197,6 +210,7 @@ export function ProxyProviderFromJSONTyped(json: any, ignoreDiscriminator: boole
197
210
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
198
211
  'redirectUris': json['redirect_uris'],
199
212
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
213
+ 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
200
214
  'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
201
215
  'outpostSet': json['outpost_set'],
202
216
  };
@@ -224,6 +238,7 @@ export function ProxyProviderToJSON(value?: ProxyProvider | null): any {
224
238
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
225
239
  'mode': ProxyModeToJSON(value.mode),
226
240
  'cookie_domain': value.cookieDomain,
241
+ 'jwks_sources': value.jwksSources,
227
242
  'token_validity': value.tokenValidity,
228
243
  };
229
244
  }
@@ -104,6 +104,12 @@ export interface ProxyProviderRequest {
104
104
  * @memberof ProxyProviderRequest
105
105
  */
106
106
  cookieDomain?: string;
107
+ /**
108
+ *
109
+ * @type {Array<string>}
110
+ * @memberof ProxyProviderRequest
111
+ */
112
+ jwksSources?: Array<string>;
107
113
  /**
108
114
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
109
115
  * @type {string}
@@ -135,6 +141,7 @@ export function ProxyProviderRequestFromJSONTyped(json: any, ignoreDiscriminator
135
141
  'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
136
142
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
137
143
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
144
+ 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
138
145
  'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
139
146
  };
140
147
  }
@@ -161,6 +168,7 @@ export function ProxyProviderRequestToJSON(value?: ProxyProviderRequest | null):
161
168
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
162
169
  'mode': ProxyModeToJSON(value.mode),
163
170
  'cookie_domain': value.cookieDomain,
171
+ 'jwks_sources': value.jwksSources,
164
172
  'token_validity': value.tokenValidity,
165
173
  };
166
174
  }
@@ -68,7 +68,7 @@ export interface ScopeMapping {
68
68
  */
69
69
  readonly metaModelName: string;
70
70
  /**
71
- * Scope used by the client
71
+ * Scope name requested by the client
72
72
  * @type {string}
73
73
  * @memberof ScopeMapping
74
74
  */
@@ -38,7 +38,7 @@ export interface ScopeMappingRequest {
38
38
  */
39
39
  expression: string;
40
40
  /**
41
- * Scope used by the client
41
+ * Scope name requested by the client
42
42
  * @type {string}
43
43
  * @memberof ScopeMappingRequest
44
44
  */