@goauthentik/api 2022.12.2-1673623274 → 2022.12.2-1673978239

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -101,6 +101,7 @@ export interface SourcesOauthListRequest {
101
101
  consumerKey?: string;
102
102
  enabled?: boolean;
103
103
  enrollmentFlow?: string;
104
+ hasJwks?: boolean;
104
105
  name?: string;
105
106
  ordering?: string;
106
107
  page?: number;
@@ -728,6 +728,9 @@ class SourcesApi extends runtime.BaseAPI {
728
728
  if (requestParameters.enrollmentFlow !== undefined) {
729
729
  queryParameters['enrollment_flow'] = requestParameters.enrollmentFlow;
730
730
  }
731
+ if (requestParameters.hasJwks !== undefined) {
732
+ queryParameters['has_jwks'] = requestParameters.hasJwks;
733
+ }
731
734
  if (requestParameters.name !== undefined) {
732
735
  queryParameters['name'] = requestParameters.name;
733
736
  }
@@ -101,6 +101,7 @@ export interface SourcesOauthListRequest {
101
101
  consumerKey?: string;
102
102
  enabled?: boolean;
103
103
  enrollmentFlow?: string;
104
+ hasJwks?: boolean;
104
105
  name?: string;
105
106
  ordering?: string;
106
107
  page?: number;
@@ -725,6 +725,9 @@ export class SourcesApi extends runtime.BaseAPI {
725
725
  if (requestParameters.enrollmentFlow !== undefined) {
726
726
  queryParameters['enrollment_flow'] = requestParameters.enrollmentFlow;
727
727
  }
728
+ if (requestParameters.hasJwks !== undefined) {
729
+ queryParameters['has_jwks'] = requestParameters.hasJwks;
730
+ }
728
731
  if (requestParameters.name !== undefined) {
729
732
  queryParameters['name'] = requestParameters.name;
730
733
  }
@@ -88,12 +88,24 @@ export interface PatchedProxyProviderRequest {
88
88
  * @memberof PatchedProxyProviderRequest
89
89
  */
90
90
  mode?: ProxyMode | null;
91
+ /**
92
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
93
+ * @type {boolean}
94
+ * @memberof PatchedProxyProviderRequest
95
+ */
96
+ interceptHeaderAuth?: boolean;
91
97
  /**
92
98
  *
93
99
  * @type {string}
94
100
  * @memberof PatchedProxyProviderRequest
95
101
  */
96
102
  cookieDomain?: string;
103
+ /**
104
+ *
105
+ * @type {Array<string>}
106
+ * @memberof PatchedProxyProviderRequest
107
+ */
108
+ jwksSources?: Array<string>;
97
109
  /**
98
110
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
99
111
  * @type {string}
@@ -33,7 +33,9 @@ export function PatchedProxyProviderRequestFromJSONTyped(json, ignoreDiscriminat
33
33
  'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
34
34
  'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
35
35
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
36
+ 'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
36
37
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
38
+ 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
37
39
  'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
38
40
  };
39
41
  }
@@ -57,7 +59,9 @@ export function PatchedProxyProviderRequestToJSON(value) {
57
59
  'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
58
60
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
59
61
  'mode': ProxyModeToJSON(value.mode),
62
+ 'intercept_header_auth': value.interceptHeaderAuth,
60
63
  'cookie_domain': value.cookieDomain,
64
+ 'jwks_sources': value.jwksSources,
61
65
  'token_validity': value.tokenValidity,
62
66
  };
63
67
  }
@@ -119,6 +119,12 @@ export interface ProxyOutpostConfig {
119
119
  * @memberof ProxyOutpostConfig
120
120
  */
121
121
  readonly tokenValidity: number | null;
122
+ /**
123
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
124
+ * @type {boolean}
125
+ * @memberof ProxyOutpostConfig
126
+ */
127
+ interceptHeaderAuth?: boolean;
122
128
  /**
123
129
  *
124
130
  * @type {Array<string>}
@@ -39,6 +39,7 @@ export function ProxyOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
39
39
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
40
40
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
41
41
  'tokenValidity': json['token_validity'],
42
+ 'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
42
43
  'scopesToRequest': json['scopes_to_request'],
43
44
  'assignedApplicationSlug': json['assigned_application_slug'],
44
45
  'assignedApplicationName': json['assigned_application_name'],
@@ -67,5 +68,6 @@ export function ProxyOutpostConfigToJSON(value) {
67
68
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
68
69
  'mode': ProxyModeToJSON(value.mode),
69
70
  'cookie_domain': value.cookieDomain,
71
+ 'intercept_header_auth': value.interceptHeaderAuth,
70
72
  };
71
73
  }
@@ -76,6 +76,12 @@ export interface ProxyProvider {
76
76
  * @memberof ProxyProvider
77
77
  */
78
78
  readonly metaModelName: string;
79
+ /**
80
+ *
81
+ * @type {string}
82
+ * @memberof ProxyProvider
83
+ */
84
+ readonly clientId: string;
79
85
  /**
80
86
  *
81
87
  * @type {string}
@@ -130,6 +136,12 @@ export interface ProxyProvider {
130
136
  * @memberof ProxyProvider
131
137
  */
132
138
  mode?: ProxyMode | null;
139
+ /**
140
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
141
+ * @type {boolean}
142
+ * @memberof ProxyProvider
143
+ */
144
+ interceptHeaderAuth?: boolean;
133
145
  /**
134
146
  *
135
147
  * @type {string}
@@ -142,6 +154,12 @@ export interface ProxyProvider {
142
154
  * @memberof ProxyProvider
143
155
  */
144
156
  cookieDomain?: string;
157
+ /**
158
+ *
159
+ * @type {Array<string>}
160
+ * @memberof ProxyProvider
161
+ */
162
+ jwksSources?: Array<string>;
145
163
  /**
146
164
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
147
165
  * @type {string}
@@ -31,6 +31,7 @@ export function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
31
31
  'verboseName': json['verbose_name'],
32
32
  'verboseNamePlural': json['verbose_name_plural'],
33
33
  'metaModelName': json['meta_model_name'],
34
+ 'clientId': json['client_id'],
34
35
  'internalHost': !exists(json, 'internal_host') ? undefined : json['internal_host'],
35
36
  'externalHost': json['external_host'],
36
37
  'internalHostSslValidation': !exists(json, 'internal_host_ssl_validation') ? undefined : json['internal_host_ssl_validation'],
@@ -40,8 +41,10 @@ export function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
40
41
  'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
41
42
  'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
42
43
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
44
+ 'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
43
45
  'redirectUris': json['redirect_uris'],
44
46
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
47
+ 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
45
48
  'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
46
49
  'outpostSet': json['outpost_set'],
47
50
  };
@@ -66,7 +69,9 @@ export function ProxyProviderToJSON(value) {
66
69
  'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
67
70
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
68
71
  'mode': ProxyModeToJSON(value.mode),
72
+ 'intercept_header_auth': value.interceptHeaderAuth,
69
73
  'cookie_domain': value.cookieDomain,
74
+ 'jwks_sources': value.jwksSources,
70
75
  'token_validity': value.tokenValidity,
71
76
  };
72
77
  }
@@ -88,12 +88,24 @@ export interface ProxyProviderRequest {
88
88
  * @memberof ProxyProviderRequest
89
89
  */
90
90
  mode?: ProxyMode | null;
91
+ /**
92
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
93
+ * @type {boolean}
94
+ * @memberof ProxyProviderRequest
95
+ */
96
+ interceptHeaderAuth?: boolean;
91
97
  /**
92
98
  *
93
99
  * @type {string}
94
100
  * @memberof ProxyProviderRequest
95
101
  */
96
102
  cookieDomain?: string;
103
+ /**
104
+ *
105
+ * @type {Array<string>}
106
+ * @memberof ProxyProviderRequest
107
+ */
108
+ jwksSources?: Array<string>;
97
109
  /**
98
110
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
99
111
  * @type {string}
@@ -33,7 +33,9 @@ export function ProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
33
33
  'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
34
34
  'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
35
35
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
36
+ 'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
36
37
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
38
+ 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
37
39
  'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
38
40
  };
39
41
  }
@@ -57,7 +59,9 @@ export function ProxyProviderRequestToJSON(value) {
57
59
  'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
58
60
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
59
61
  'mode': ProxyModeToJSON(value.mode),
62
+ 'intercept_header_auth': value.interceptHeaderAuth,
60
63
  'cookie_domain': value.cookieDomain,
64
+ 'jwks_sources': value.jwksSources,
61
65
  'token_validity': value.tokenValidity,
62
66
  };
63
67
  }
@@ -88,12 +88,24 @@ export interface PatchedProxyProviderRequest {
88
88
  * @memberof PatchedProxyProviderRequest
89
89
  */
90
90
  mode?: ProxyMode | null;
91
+ /**
92
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
93
+ * @type {boolean}
94
+ * @memberof PatchedProxyProviderRequest
95
+ */
96
+ interceptHeaderAuth?: boolean;
91
97
  /**
92
98
  *
93
99
  * @type {string}
94
100
  * @memberof PatchedProxyProviderRequest
95
101
  */
96
102
  cookieDomain?: string;
103
+ /**
104
+ *
105
+ * @type {Array<string>}
106
+ * @memberof PatchedProxyProviderRequest
107
+ */
108
+ jwksSources?: Array<string>;
97
109
  /**
98
110
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
99
111
  * @type {string}
@@ -37,7 +37,9 @@ function PatchedProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
37
37
  'basicAuthPasswordAttribute': !(0, runtime_1.exists)(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
38
38
  'basicAuthUserAttribute': !(0, runtime_1.exists)(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
39
39
  'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
40
+ 'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
40
41
  'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
42
+ 'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
41
43
  'tokenValidity': !(0, runtime_1.exists)(json, 'token_validity') ? undefined : json['token_validity'],
42
44
  };
43
45
  }
@@ -62,7 +64,9 @@ function PatchedProxyProviderRequestToJSON(value) {
62
64
  'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
63
65
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
64
66
  'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
67
+ 'intercept_header_auth': value.interceptHeaderAuth,
65
68
  'cookie_domain': value.cookieDomain,
69
+ 'jwks_sources': value.jwksSources,
66
70
  'token_validity': value.tokenValidity,
67
71
  };
68
72
  }
@@ -119,6 +119,12 @@ export interface ProxyOutpostConfig {
119
119
  * @memberof ProxyOutpostConfig
120
120
  */
121
121
  readonly tokenValidity: number | null;
122
+ /**
123
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
124
+ * @type {boolean}
125
+ * @memberof ProxyOutpostConfig
126
+ */
127
+ interceptHeaderAuth?: boolean;
122
128
  /**
123
129
  *
124
130
  * @type {Array<string>}
@@ -43,6 +43,7 @@ function ProxyOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
43
43
  'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
44
44
  'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
45
45
  'tokenValidity': json['token_validity'],
46
+ 'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
46
47
  'scopesToRequest': json['scopes_to_request'],
47
48
  'assignedApplicationSlug': json['assigned_application_slug'],
48
49
  'assignedApplicationName': json['assigned_application_name'],
@@ -72,6 +73,7 @@ function ProxyOutpostConfigToJSON(value) {
72
73
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
73
74
  'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
74
75
  'cookie_domain': value.cookieDomain,
76
+ 'intercept_header_auth': value.interceptHeaderAuth,
75
77
  };
76
78
  }
77
79
  exports.ProxyOutpostConfigToJSON = ProxyOutpostConfigToJSON;
@@ -76,6 +76,12 @@ export interface ProxyProvider {
76
76
  * @memberof ProxyProvider
77
77
  */
78
78
  readonly metaModelName: string;
79
+ /**
80
+ *
81
+ * @type {string}
82
+ * @memberof ProxyProvider
83
+ */
84
+ readonly clientId: string;
79
85
  /**
80
86
  *
81
87
  * @type {string}
@@ -130,6 +136,12 @@ export interface ProxyProvider {
130
136
  * @memberof ProxyProvider
131
137
  */
132
138
  mode?: ProxyMode | null;
139
+ /**
140
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
141
+ * @type {boolean}
142
+ * @memberof ProxyProvider
143
+ */
144
+ interceptHeaderAuth?: boolean;
133
145
  /**
134
146
  *
135
147
  * @type {string}
@@ -142,6 +154,12 @@ export interface ProxyProvider {
142
154
  * @memberof ProxyProvider
143
155
  */
144
156
  cookieDomain?: string;
157
+ /**
158
+ *
159
+ * @type {Array<string>}
160
+ * @memberof ProxyProvider
161
+ */
162
+ jwksSources?: Array<string>;
145
163
  /**
146
164
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
147
165
  * @type {string}
@@ -35,6 +35,7 @@ function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
35
35
  'verboseName': json['verbose_name'],
36
36
  'verboseNamePlural': json['verbose_name_plural'],
37
37
  'metaModelName': json['meta_model_name'],
38
+ 'clientId': json['client_id'],
38
39
  'internalHost': !(0, runtime_1.exists)(json, 'internal_host') ? undefined : json['internal_host'],
39
40
  'externalHost': json['external_host'],
40
41
  'internalHostSslValidation': !(0, runtime_1.exists)(json, 'internal_host_ssl_validation') ? undefined : json['internal_host_ssl_validation'],
@@ -44,8 +45,10 @@ function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
44
45
  'basicAuthPasswordAttribute': !(0, runtime_1.exists)(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
45
46
  'basicAuthUserAttribute': !(0, runtime_1.exists)(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
46
47
  'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
48
+ 'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
47
49
  'redirectUris': json['redirect_uris'],
48
50
  'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
51
+ 'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
49
52
  'tokenValidity': !(0, runtime_1.exists)(json, 'token_validity') ? undefined : json['token_validity'],
50
53
  'outpostSet': json['outpost_set'],
51
54
  };
@@ -71,7 +74,9 @@ function ProxyProviderToJSON(value) {
71
74
  'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
72
75
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
73
76
  'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
77
+ 'intercept_header_auth': value.interceptHeaderAuth,
74
78
  'cookie_domain': value.cookieDomain,
79
+ 'jwks_sources': value.jwksSources,
75
80
  'token_validity': value.tokenValidity,
76
81
  };
77
82
  }
@@ -88,12 +88,24 @@ export interface ProxyProviderRequest {
88
88
  * @memberof ProxyProviderRequest
89
89
  */
90
90
  mode?: ProxyMode | null;
91
+ /**
92
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
93
+ * @type {boolean}
94
+ * @memberof ProxyProviderRequest
95
+ */
96
+ interceptHeaderAuth?: boolean;
91
97
  /**
92
98
  *
93
99
  * @type {string}
94
100
  * @memberof ProxyProviderRequest
95
101
  */
96
102
  cookieDomain?: string;
103
+ /**
104
+ *
105
+ * @type {Array<string>}
106
+ * @memberof ProxyProviderRequest
107
+ */
108
+ jwksSources?: Array<string>;
97
109
  /**
98
110
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
99
111
  * @type {string}
@@ -37,7 +37,9 @@ function ProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
37
37
  'basicAuthPasswordAttribute': !(0, runtime_1.exists)(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
38
38
  'basicAuthUserAttribute': !(0, runtime_1.exists)(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
39
39
  'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
40
+ 'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
40
41
  'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
42
+ 'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
41
43
  'tokenValidity': !(0, runtime_1.exists)(json, 'token_validity') ? undefined : json['token_validity'],
42
44
  };
43
45
  }
@@ -62,7 +64,9 @@ function ProxyProviderRequestToJSON(value) {
62
64
  'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
63
65
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
64
66
  'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
67
+ 'intercept_header_auth': value.interceptHeaderAuth,
65
68
  'cookie_domain': value.cookieDomain,
69
+ 'jwks_sources': value.jwksSources,
66
70
  'token_validity': value.tokenValidity,
67
71
  };
68
72
  }
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goauthentik/api",
3
- "version": "2022.12.2-1673623274",
3
+ "version": "2022.12.2-1673978239",
4
4
  "description": "OpenAPI client for @goauthentik/api",
5
5
  "author": "OpenAPI-Generator",
6
6
  "repository": {
@@ -252,6 +252,7 @@ export interface SourcesOauthListRequest {
252
252
  consumerKey?: string;
253
253
  enabled?: boolean;
254
254
  enrollmentFlow?: string;
255
+ hasJwks?: boolean;
255
256
  name?: string;
256
257
  ordering?: string;
257
258
  page?: number;
@@ -1326,6 +1327,10 @@ export class SourcesApi extends runtime.BaseAPI {
1326
1327
  queryParameters['enrollment_flow'] = requestParameters.enrollmentFlow;
1327
1328
  }
1328
1329
 
1330
+ if (requestParameters.hasJwks !== undefined) {
1331
+ queryParameters['has_jwks'] = requestParameters.hasJwks;
1332
+ }
1333
+
1329
1334
  if (requestParameters.name !== undefined) {
1330
1335
  queryParameters['name'] = requestParameters.name;
1331
1336
  }
@@ -98,12 +98,24 @@ export interface PatchedProxyProviderRequest {
98
98
  * @memberof PatchedProxyProviderRequest
99
99
  */
100
100
  mode?: ProxyMode | null;
101
+ /**
102
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
103
+ * @type {boolean}
104
+ * @memberof PatchedProxyProviderRequest
105
+ */
106
+ interceptHeaderAuth?: boolean;
101
107
  /**
102
108
  *
103
109
  * @type {string}
104
110
  * @memberof PatchedProxyProviderRequest
105
111
  */
106
112
  cookieDomain?: string;
113
+ /**
114
+ *
115
+ * @type {Array<string>}
116
+ * @memberof PatchedProxyProviderRequest
117
+ */
118
+ jwksSources?: Array<string>;
107
119
  /**
108
120
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
109
121
  * @type {string}
@@ -134,7 +146,9 @@ export function PatchedProxyProviderRequestFromJSONTyped(json: any, ignoreDiscri
134
146
  'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
135
147
  'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
136
148
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
149
+ 'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
137
150
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
151
+ 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
138
152
  'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
139
153
  };
140
154
  }
@@ -160,7 +174,9 @@ export function PatchedProxyProviderRequestToJSON(value?: PatchedProxyProviderRe
160
174
  'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
161
175
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
162
176
  'mode': ProxyModeToJSON(value.mode),
177
+ 'intercept_header_auth': value.interceptHeaderAuth,
163
178
  'cookie_domain': value.cookieDomain,
179
+ 'jwks_sources': value.jwksSources,
164
180
  'token_validity': value.tokenValidity,
165
181
  };
166
182
  }
@@ -134,6 +134,12 @@ export interface ProxyOutpostConfig {
134
134
  * @memberof ProxyOutpostConfig
135
135
  */
136
136
  readonly tokenValidity: number | null;
137
+ /**
138
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
139
+ * @type {boolean}
140
+ * @memberof ProxyOutpostConfig
141
+ */
142
+ interceptHeaderAuth?: boolean;
137
143
  /**
138
144
  *
139
145
  * @type {Array<string>}
@@ -181,6 +187,7 @@ export function ProxyOutpostConfigFromJSONTyped(json: any, ignoreDiscriminator:
181
187
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
182
188
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
183
189
  'tokenValidity': json['token_validity'],
190
+ 'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
184
191
  'scopesToRequest': json['scopes_to_request'],
185
192
  'assignedApplicationSlug': json['assigned_application_slug'],
186
193
  'assignedApplicationName': json['assigned_application_name'],
@@ -211,6 +218,7 @@ export function ProxyOutpostConfigToJSON(value?: ProxyOutpostConfig | null): any
211
218
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
212
219
  'mode': ProxyModeToJSON(value.mode),
213
220
  'cookie_domain': value.cookieDomain,
221
+ 'intercept_header_auth': value.interceptHeaderAuth,
214
222
  };
215
223
  }
216
224
 
@@ -86,6 +86,12 @@ export interface ProxyProvider {
86
86
  * @memberof ProxyProvider
87
87
  */
88
88
  readonly metaModelName: string;
89
+ /**
90
+ *
91
+ * @type {string}
92
+ * @memberof ProxyProvider
93
+ */
94
+ readonly clientId: string;
89
95
  /**
90
96
  *
91
97
  * @type {string}
@@ -140,6 +146,12 @@ export interface ProxyProvider {
140
146
  * @memberof ProxyProvider
141
147
  */
142
148
  mode?: ProxyMode | null;
149
+ /**
150
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
151
+ * @type {boolean}
152
+ * @memberof ProxyProvider
153
+ */
154
+ interceptHeaderAuth?: boolean;
143
155
  /**
144
156
  *
145
157
  * @type {string}
@@ -152,6 +164,12 @@ export interface ProxyProvider {
152
164
  * @memberof ProxyProvider
153
165
  */
154
166
  cookieDomain?: string;
167
+ /**
168
+ *
169
+ * @type {Array<string>}
170
+ * @memberof ProxyProvider
171
+ */
172
+ jwksSources?: Array<string>;
155
173
  /**
156
174
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
157
175
  * @type {string}
@@ -186,6 +204,7 @@ export function ProxyProviderFromJSONTyped(json: any, ignoreDiscriminator: boole
186
204
  'verboseName': json['verbose_name'],
187
205
  'verboseNamePlural': json['verbose_name_plural'],
188
206
  'metaModelName': json['meta_model_name'],
207
+ 'clientId': json['client_id'],
189
208
  'internalHost': !exists(json, 'internal_host') ? undefined : json['internal_host'],
190
209
  'externalHost': json['external_host'],
191
210
  'internalHostSslValidation': !exists(json, 'internal_host_ssl_validation') ? undefined : json['internal_host_ssl_validation'],
@@ -195,8 +214,10 @@ export function ProxyProviderFromJSONTyped(json: any, ignoreDiscriminator: boole
195
214
  'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
196
215
  'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
197
216
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
217
+ 'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
198
218
  'redirectUris': json['redirect_uris'],
199
219
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
220
+ 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
200
221
  'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
201
222
  'outpostSet': json['outpost_set'],
202
223
  };
@@ -223,7 +244,9 @@ export function ProxyProviderToJSON(value?: ProxyProvider | null): any {
223
244
  'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
224
245
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
225
246
  'mode': ProxyModeToJSON(value.mode),
247
+ 'intercept_header_auth': value.interceptHeaderAuth,
226
248
  'cookie_domain': value.cookieDomain,
249
+ 'jwks_sources': value.jwksSources,
227
250
  'token_validity': value.tokenValidity,
228
251
  };
229
252
  }
@@ -98,12 +98,24 @@ export interface ProxyProviderRequest {
98
98
  * @memberof ProxyProviderRequest
99
99
  */
100
100
  mode?: ProxyMode | null;
101
+ /**
102
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
103
+ * @type {boolean}
104
+ * @memberof ProxyProviderRequest
105
+ */
106
+ interceptHeaderAuth?: boolean;
101
107
  /**
102
108
  *
103
109
  * @type {string}
104
110
  * @memberof ProxyProviderRequest
105
111
  */
106
112
  cookieDomain?: string;
113
+ /**
114
+ *
115
+ * @type {Array<string>}
116
+ * @memberof ProxyProviderRequest
117
+ */
118
+ jwksSources?: Array<string>;
107
119
  /**
108
120
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
109
121
  * @type {string}
@@ -134,7 +146,9 @@ export function ProxyProviderRequestFromJSONTyped(json: any, ignoreDiscriminator
134
146
  'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
135
147
  'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
136
148
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
149
+ 'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
137
150
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
151
+ 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
138
152
  'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
139
153
  };
140
154
  }
@@ -160,7 +174,9 @@ export function ProxyProviderRequestToJSON(value?: ProxyProviderRequest | null):
160
174
  'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
161
175
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
162
176
  'mode': ProxyModeToJSON(value.mode),
177
+ 'intercept_header_auth': value.interceptHeaderAuth,
163
178
  'cookie_domain': value.cookieDomain,
179
+ 'jwks_sources': value.jwksSources,
164
180
  'token_validity': value.tokenValidity,
165
181
  };
166
182
  }