@goauthentik/api 2022.12.2-1673623274 → 2022.12.2-1673978239
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/apis/SourcesApi.d.ts +1 -0
- package/dist/apis/SourcesApi.js +3 -0
- package/dist/esm/apis/SourcesApi.d.ts +1 -0
- package/dist/esm/apis/SourcesApi.js +3 -0
- package/dist/esm/models/PatchedProxyProviderRequest.d.ts +12 -0
- package/dist/esm/models/PatchedProxyProviderRequest.js +4 -0
- package/dist/esm/models/ProxyOutpostConfig.d.ts +6 -0
- package/dist/esm/models/ProxyOutpostConfig.js +2 -0
- package/dist/esm/models/ProxyProvider.d.ts +18 -0
- package/dist/esm/models/ProxyProvider.js +5 -0
- package/dist/esm/models/ProxyProviderRequest.d.ts +12 -0
- package/dist/esm/models/ProxyProviderRequest.js +4 -0
- package/dist/models/PatchedProxyProviderRequest.d.ts +12 -0
- package/dist/models/PatchedProxyProviderRequest.js +4 -0
- package/dist/models/ProxyOutpostConfig.d.ts +6 -0
- package/dist/models/ProxyOutpostConfig.js +2 -0
- package/dist/models/ProxyProvider.d.ts +18 -0
- package/dist/models/ProxyProvider.js +5 -0
- package/dist/models/ProxyProviderRequest.d.ts +12 -0
- package/dist/models/ProxyProviderRequest.js +4 -0
- package/package.json +1 -1
- package/src/apis/SourcesApi.ts +5 -0
- package/src/models/PatchedProxyProviderRequest.ts +16 -0
- package/src/models/ProxyOutpostConfig.ts +8 -0
- package/src/models/ProxyProvider.ts +23 -0
- package/src/models/ProxyProviderRequest.ts +16 -0
package/dist/apis/SourcesApi.js
CHANGED
|
@@ -728,6 +728,9 @@ class SourcesApi extends runtime.BaseAPI {
|
|
|
728
728
|
if (requestParameters.enrollmentFlow !== undefined) {
|
|
729
729
|
queryParameters['enrollment_flow'] = requestParameters.enrollmentFlow;
|
|
730
730
|
}
|
|
731
|
+
if (requestParameters.hasJwks !== undefined) {
|
|
732
|
+
queryParameters['has_jwks'] = requestParameters.hasJwks;
|
|
733
|
+
}
|
|
731
734
|
if (requestParameters.name !== undefined) {
|
|
732
735
|
queryParameters['name'] = requestParameters.name;
|
|
733
736
|
}
|
|
@@ -725,6 +725,9 @@ export class SourcesApi extends runtime.BaseAPI {
|
|
|
725
725
|
if (requestParameters.enrollmentFlow !== undefined) {
|
|
726
726
|
queryParameters['enrollment_flow'] = requestParameters.enrollmentFlow;
|
|
727
727
|
}
|
|
728
|
+
if (requestParameters.hasJwks !== undefined) {
|
|
729
|
+
queryParameters['has_jwks'] = requestParameters.hasJwks;
|
|
730
|
+
}
|
|
728
731
|
if (requestParameters.name !== undefined) {
|
|
729
732
|
queryParameters['name'] = requestParameters.name;
|
|
730
733
|
}
|
|
@@ -88,12 +88,24 @@ export interface PatchedProxyProviderRequest {
|
|
|
88
88
|
* @memberof PatchedProxyProviderRequest
|
|
89
89
|
*/
|
|
90
90
|
mode?: ProxyMode | null;
|
|
91
|
+
/**
|
|
92
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
93
|
+
* @type {boolean}
|
|
94
|
+
* @memberof PatchedProxyProviderRequest
|
|
95
|
+
*/
|
|
96
|
+
interceptHeaderAuth?: boolean;
|
|
91
97
|
/**
|
|
92
98
|
*
|
|
93
99
|
* @type {string}
|
|
94
100
|
* @memberof PatchedProxyProviderRequest
|
|
95
101
|
*/
|
|
96
102
|
cookieDomain?: string;
|
|
103
|
+
/**
|
|
104
|
+
*
|
|
105
|
+
* @type {Array<string>}
|
|
106
|
+
* @memberof PatchedProxyProviderRequest
|
|
107
|
+
*/
|
|
108
|
+
jwksSources?: Array<string>;
|
|
97
109
|
/**
|
|
98
110
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
|
99
111
|
* @type {string}
|
|
@@ -33,7 +33,9 @@ export function PatchedProxyProviderRequestFromJSONTyped(json, ignoreDiscriminat
|
|
|
33
33
|
'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
|
|
34
34
|
'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
|
|
35
35
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
|
36
|
+
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
36
37
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
38
|
+
'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
|
|
37
39
|
'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
|
|
38
40
|
};
|
|
39
41
|
}
|
|
@@ -57,7 +59,9 @@ export function PatchedProxyProviderRequestToJSON(value) {
|
|
|
57
59
|
'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
|
|
58
60
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
59
61
|
'mode': ProxyModeToJSON(value.mode),
|
|
62
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
60
63
|
'cookie_domain': value.cookieDomain,
|
|
64
|
+
'jwks_sources': value.jwksSources,
|
|
61
65
|
'token_validity': value.tokenValidity,
|
|
62
66
|
};
|
|
63
67
|
}
|
|
@@ -119,6 +119,12 @@ export interface ProxyOutpostConfig {
|
|
|
119
119
|
* @memberof ProxyOutpostConfig
|
|
120
120
|
*/
|
|
121
121
|
readonly tokenValidity: number | null;
|
|
122
|
+
/**
|
|
123
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
124
|
+
* @type {boolean}
|
|
125
|
+
* @memberof ProxyOutpostConfig
|
|
126
|
+
*/
|
|
127
|
+
interceptHeaderAuth?: boolean;
|
|
122
128
|
/**
|
|
123
129
|
*
|
|
124
130
|
* @type {Array<string>}
|
|
@@ -39,6 +39,7 @@ export function ProxyOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
39
39
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
|
40
40
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
41
41
|
'tokenValidity': json['token_validity'],
|
|
42
|
+
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
42
43
|
'scopesToRequest': json['scopes_to_request'],
|
|
43
44
|
'assignedApplicationSlug': json['assigned_application_slug'],
|
|
44
45
|
'assignedApplicationName': json['assigned_application_name'],
|
|
@@ -67,5 +68,6 @@ export function ProxyOutpostConfigToJSON(value) {
|
|
|
67
68
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
68
69
|
'mode': ProxyModeToJSON(value.mode),
|
|
69
70
|
'cookie_domain': value.cookieDomain,
|
|
71
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
70
72
|
};
|
|
71
73
|
}
|
|
@@ -76,6 +76,12 @@ export interface ProxyProvider {
|
|
|
76
76
|
* @memberof ProxyProvider
|
|
77
77
|
*/
|
|
78
78
|
readonly metaModelName: string;
|
|
79
|
+
/**
|
|
80
|
+
*
|
|
81
|
+
* @type {string}
|
|
82
|
+
* @memberof ProxyProvider
|
|
83
|
+
*/
|
|
84
|
+
readonly clientId: string;
|
|
79
85
|
/**
|
|
80
86
|
*
|
|
81
87
|
* @type {string}
|
|
@@ -130,6 +136,12 @@ export interface ProxyProvider {
|
|
|
130
136
|
* @memberof ProxyProvider
|
|
131
137
|
*/
|
|
132
138
|
mode?: ProxyMode | null;
|
|
139
|
+
/**
|
|
140
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
141
|
+
* @type {boolean}
|
|
142
|
+
* @memberof ProxyProvider
|
|
143
|
+
*/
|
|
144
|
+
interceptHeaderAuth?: boolean;
|
|
133
145
|
/**
|
|
134
146
|
*
|
|
135
147
|
* @type {string}
|
|
@@ -142,6 +154,12 @@ export interface ProxyProvider {
|
|
|
142
154
|
* @memberof ProxyProvider
|
|
143
155
|
*/
|
|
144
156
|
cookieDomain?: string;
|
|
157
|
+
/**
|
|
158
|
+
*
|
|
159
|
+
* @type {Array<string>}
|
|
160
|
+
* @memberof ProxyProvider
|
|
161
|
+
*/
|
|
162
|
+
jwksSources?: Array<string>;
|
|
145
163
|
/**
|
|
146
164
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
|
147
165
|
* @type {string}
|
|
@@ -31,6 +31,7 @@ export function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
31
31
|
'verboseName': json['verbose_name'],
|
|
32
32
|
'verboseNamePlural': json['verbose_name_plural'],
|
|
33
33
|
'metaModelName': json['meta_model_name'],
|
|
34
|
+
'clientId': json['client_id'],
|
|
34
35
|
'internalHost': !exists(json, 'internal_host') ? undefined : json['internal_host'],
|
|
35
36
|
'externalHost': json['external_host'],
|
|
36
37
|
'internalHostSslValidation': !exists(json, 'internal_host_ssl_validation') ? undefined : json['internal_host_ssl_validation'],
|
|
@@ -40,8 +41,10 @@ export function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
40
41
|
'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
|
|
41
42
|
'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
|
|
42
43
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
|
44
|
+
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
43
45
|
'redirectUris': json['redirect_uris'],
|
|
44
46
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
47
|
+
'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
|
|
45
48
|
'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
|
|
46
49
|
'outpostSet': json['outpost_set'],
|
|
47
50
|
};
|
|
@@ -66,7 +69,9 @@ export function ProxyProviderToJSON(value) {
|
|
|
66
69
|
'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
|
|
67
70
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
68
71
|
'mode': ProxyModeToJSON(value.mode),
|
|
72
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
69
73
|
'cookie_domain': value.cookieDomain,
|
|
74
|
+
'jwks_sources': value.jwksSources,
|
|
70
75
|
'token_validity': value.tokenValidity,
|
|
71
76
|
};
|
|
72
77
|
}
|
|
@@ -88,12 +88,24 @@ export interface ProxyProviderRequest {
|
|
|
88
88
|
* @memberof ProxyProviderRequest
|
|
89
89
|
*/
|
|
90
90
|
mode?: ProxyMode | null;
|
|
91
|
+
/**
|
|
92
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
93
|
+
* @type {boolean}
|
|
94
|
+
* @memberof ProxyProviderRequest
|
|
95
|
+
*/
|
|
96
|
+
interceptHeaderAuth?: boolean;
|
|
91
97
|
/**
|
|
92
98
|
*
|
|
93
99
|
* @type {string}
|
|
94
100
|
* @memberof ProxyProviderRequest
|
|
95
101
|
*/
|
|
96
102
|
cookieDomain?: string;
|
|
103
|
+
/**
|
|
104
|
+
*
|
|
105
|
+
* @type {Array<string>}
|
|
106
|
+
* @memberof ProxyProviderRequest
|
|
107
|
+
*/
|
|
108
|
+
jwksSources?: Array<string>;
|
|
97
109
|
/**
|
|
98
110
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
|
99
111
|
* @type {string}
|
|
@@ -33,7 +33,9 @@ export function ProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
33
33
|
'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
|
|
34
34
|
'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
|
|
35
35
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
|
36
|
+
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
36
37
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
38
|
+
'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
|
|
37
39
|
'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
|
|
38
40
|
};
|
|
39
41
|
}
|
|
@@ -57,7 +59,9 @@ export function ProxyProviderRequestToJSON(value) {
|
|
|
57
59
|
'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
|
|
58
60
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
59
61
|
'mode': ProxyModeToJSON(value.mode),
|
|
62
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
60
63
|
'cookie_domain': value.cookieDomain,
|
|
64
|
+
'jwks_sources': value.jwksSources,
|
|
61
65
|
'token_validity': value.tokenValidity,
|
|
62
66
|
};
|
|
63
67
|
}
|
|
@@ -88,12 +88,24 @@ export interface PatchedProxyProviderRequest {
|
|
|
88
88
|
* @memberof PatchedProxyProviderRequest
|
|
89
89
|
*/
|
|
90
90
|
mode?: ProxyMode | null;
|
|
91
|
+
/**
|
|
92
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
93
|
+
* @type {boolean}
|
|
94
|
+
* @memberof PatchedProxyProviderRequest
|
|
95
|
+
*/
|
|
96
|
+
interceptHeaderAuth?: boolean;
|
|
91
97
|
/**
|
|
92
98
|
*
|
|
93
99
|
* @type {string}
|
|
94
100
|
* @memberof PatchedProxyProviderRequest
|
|
95
101
|
*/
|
|
96
102
|
cookieDomain?: string;
|
|
103
|
+
/**
|
|
104
|
+
*
|
|
105
|
+
* @type {Array<string>}
|
|
106
|
+
* @memberof PatchedProxyProviderRequest
|
|
107
|
+
*/
|
|
108
|
+
jwksSources?: Array<string>;
|
|
97
109
|
/**
|
|
98
110
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
|
99
111
|
* @type {string}
|
|
@@ -37,7 +37,9 @@ function PatchedProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
37
37
|
'basicAuthPasswordAttribute': !(0, runtime_1.exists)(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
|
|
38
38
|
'basicAuthUserAttribute': !(0, runtime_1.exists)(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
|
|
39
39
|
'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
|
|
40
|
+
'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
40
41
|
'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
42
|
+
'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
|
|
41
43
|
'tokenValidity': !(0, runtime_1.exists)(json, 'token_validity') ? undefined : json['token_validity'],
|
|
42
44
|
};
|
|
43
45
|
}
|
|
@@ -62,7 +64,9 @@ function PatchedProxyProviderRequestToJSON(value) {
|
|
|
62
64
|
'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
|
|
63
65
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
64
66
|
'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
|
|
67
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
65
68
|
'cookie_domain': value.cookieDomain,
|
|
69
|
+
'jwks_sources': value.jwksSources,
|
|
66
70
|
'token_validity': value.tokenValidity,
|
|
67
71
|
};
|
|
68
72
|
}
|
|
@@ -119,6 +119,12 @@ export interface ProxyOutpostConfig {
|
|
|
119
119
|
* @memberof ProxyOutpostConfig
|
|
120
120
|
*/
|
|
121
121
|
readonly tokenValidity: number | null;
|
|
122
|
+
/**
|
|
123
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
124
|
+
* @type {boolean}
|
|
125
|
+
* @memberof ProxyOutpostConfig
|
|
126
|
+
*/
|
|
127
|
+
interceptHeaderAuth?: boolean;
|
|
122
128
|
/**
|
|
123
129
|
*
|
|
124
130
|
* @type {Array<string>}
|
|
@@ -43,6 +43,7 @@ function ProxyOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
43
43
|
'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
|
|
44
44
|
'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
45
45
|
'tokenValidity': json['token_validity'],
|
|
46
|
+
'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
46
47
|
'scopesToRequest': json['scopes_to_request'],
|
|
47
48
|
'assignedApplicationSlug': json['assigned_application_slug'],
|
|
48
49
|
'assignedApplicationName': json['assigned_application_name'],
|
|
@@ -72,6 +73,7 @@ function ProxyOutpostConfigToJSON(value) {
|
|
|
72
73
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
73
74
|
'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
|
|
74
75
|
'cookie_domain': value.cookieDomain,
|
|
76
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
75
77
|
};
|
|
76
78
|
}
|
|
77
79
|
exports.ProxyOutpostConfigToJSON = ProxyOutpostConfigToJSON;
|
|
@@ -76,6 +76,12 @@ export interface ProxyProvider {
|
|
|
76
76
|
* @memberof ProxyProvider
|
|
77
77
|
*/
|
|
78
78
|
readonly metaModelName: string;
|
|
79
|
+
/**
|
|
80
|
+
*
|
|
81
|
+
* @type {string}
|
|
82
|
+
* @memberof ProxyProvider
|
|
83
|
+
*/
|
|
84
|
+
readonly clientId: string;
|
|
79
85
|
/**
|
|
80
86
|
*
|
|
81
87
|
* @type {string}
|
|
@@ -130,6 +136,12 @@ export interface ProxyProvider {
|
|
|
130
136
|
* @memberof ProxyProvider
|
|
131
137
|
*/
|
|
132
138
|
mode?: ProxyMode | null;
|
|
139
|
+
/**
|
|
140
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
141
|
+
* @type {boolean}
|
|
142
|
+
* @memberof ProxyProvider
|
|
143
|
+
*/
|
|
144
|
+
interceptHeaderAuth?: boolean;
|
|
133
145
|
/**
|
|
134
146
|
*
|
|
135
147
|
* @type {string}
|
|
@@ -142,6 +154,12 @@ export interface ProxyProvider {
|
|
|
142
154
|
* @memberof ProxyProvider
|
|
143
155
|
*/
|
|
144
156
|
cookieDomain?: string;
|
|
157
|
+
/**
|
|
158
|
+
*
|
|
159
|
+
* @type {Array<string>}
|
|
160
|
+
* @memberof ProxyProvider
|
|
161
|
+
*/
|
|
162
|
+
jwksSources?: Array<string>;
|
|
145
163
|
/**
|
|
146
164
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
|
147
165
|
* @type {string}
|
|
@@ -35,6 +35,7 @@ function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
35
35
|
'verboseName': json['verbose_name'],
|
|
36
36
|
'verboseNamePlural': json['verbose_name_plural'],
|
|
37
37
|
'metaModelName': json['meta_model_name'],
|
|
38
|
+
'clientId': json['client_id'],
|
|
38
39
|
'internalHost': !(0, runtime_1.exists)(json, 'internal_host') ? undefined : json['internal_host'],
|
|
39
40
|
'externalHost': json['external_host'],
|
|
40
41
|
'internalHostSslValidation': !(0, runtime_1.exists)(json, 'internal_host_ssl_validation') ? undefined : json['internal_host_ssl_validation'],
|
|
@@ -44,8 +45,10 @@ function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
44
45
|
'basicAuthPasswordAttribute': !(0, runtime_1.exists)(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
|
|
45
46
|
'basicAuthUserAttribute': !(0, runtime_1.exists)(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
|
|
46
47
|
'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
|
|
48
|
+
'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
47
49
|
'redirectUris': json['redirect_uris'],
|
|
48
50
|
'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
51
|
+
'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
|
|
49
52
|
'tokenValidity': !(0, runtime_1.exists)(json, 'token_validity') ? undefined : json['token_validity'],
|
|
50
53
|
'outpostSet': json['outpost_set'],
|
|
51
54
|
};
|
|
@@ -71,7 +74,9 @@ function ProxyProviderToJSON(value) {
|
|
|
71
74
|
'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
|
|
72
75
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
73
76
|
'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
|
|
77
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
74
78
|
'cookie_domain': value.cookieDomain,
|
|
79
|
+
'jwks_sources': value.jwksSources,
|
|
75
80
|
'token_validity': value.tokenValidity,
|
|
76
81
|
};
|
|
77
82
|
}
|
|
@@ -88,12 +88,24 @@ export interface ProxyProviderRequest {
|
|
|
88
88
|
* @memberof ProxyProviderRequest
|
|
89
89
|
*/
|
|
90
90
|
mode?: ProxyMode | null;
|
|
91
|
+
/**
|
|
92
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
93
|
+
* @type {boolean}
|
|
94
|
+
* @memberof ProxyProviderRequest
|
|
95
|
+
*/
|
|
96
|
+
interceptHeaderAuth?: boolean;
|
|
91
97
|
/**
|
|
92
98
|
*
|
|
93
99
|
* @type {string}
|
|
94
100
|
* @memberof ProxyProviderRequest
|
|
95
101
|
*/
|
|
96
102
|
cookieDomain?: string;
|
|
103
|
+
/**
|
|
104
|
+
*
|
|
105
|
+
* @type {Array<string>}
|
|
106
|
+
* @memberof ProxyProviderRequest
|
|
107
|
+
*/
|
|
108
|
+
jwksSources?: Array<string>;
|
|
97
109
|
/**
|
|
98
110
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
|
99
111
|
* @type {string}
|
|
@@ -37,7 +37,9 @@ function ProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
37
37
|
'basicAuthPasswordAttribute': !(0, runtime_1.exists)(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
|
|
38
38
|
'basicAuthUserAttribute': !(0, runtime_1.exists)(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
|
|
39
39
|
'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
|
|
40
|
+
'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
40
41
|
'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
42
|
+
'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
|
|
41
43
|
'tokenValidity': !(0, runtime_1.exists)(json, 'token_validity') ? undefined : json['token_validity'],
|
|
42
44
|
};
|
|
43
45
|
}
|
|
@@ -62,7 +64,9 @@ function ProxyProviderRequestToJSON(value) {
|
|
|
62
64
|
'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
|
|
63
65
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
64
66
|
'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
|
|
67
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
65
68
|
'cookie_domain': value.cookieDomain,
|
|
69
|
+
'jwks_sources': value.jwksSources,
|
|
66
70
|
'token_validity': value.tokenValidity,
|
|
67
71
|
};
|
|
68
72
|
}
|
package/package.json
CHANGED
package/src/apis/SourcesApi.ts
CHANGED
|
@@ -252,6 +252,7 @@ export interface SourcesOauthListRequest {
|
|
|
252
252
|
consumerKey?: string;
|
|
253
253
|
enabled?: boolean;
|
|
254
254
|
enrollmentFlow?: string;
|
|
255
|
+
hasJwks?: boolean;
|
|
255
256
|
name?: string;
|
|
256
257
|
ordering?: string;
|
|
257
258
|
page?: number;
|
|
@@ -1326,6 +1327,10 @@ export class SourcesApi extends runtime.BaseAPI {
|
|
|
1326
1327
|
queryParameters['enrollment_flow'] = requestParameters.enrollmentFlow;
|
|
1327
1328
|
}
|
|
1328
1329
|
|
|
1330
|
+
if (requestParameters.hasJwks !== undefined) {
|
|
1331
|
+
queryParameters['has_jwks'] = requestParameters.hasJwks;
|
|
1332
|
+
}
|
|
1333
|
+
|
|
1329
1334
|
if (requestParameters.name !== undefined) {
|
|
1330
1335
|
queryParameters['name'] = requestParameters.name;
|
|
1331
1336
|
}
|
|
@@ -98,12 +98,24 @@ export interface PatchedProxyProviderRequest {
|
|
|
98
98
|
* @memberof PatchedProxyProviderRequest
|
|
99
99
|
*/
|
|
100
100
|
mode?: ProxyMode | null;
|
|
101
|
+
/**
|
|
102
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
103
|
+
* @type {boolean}
|
|
104
|
+
* @memberof PatchedProxyProviderRequest
|
|
105
|
+
*/
|
|
106
|
+
interceptHeaderAuth?: boolean;
|
|
101
107
|
/**
|
|
102
108
|
*
|
|
103
109
|
* @type {string}
|
|
104
110
|
* @memberof PatchedProxyProviderRequest
|
|
105
111
|
*/
|
|
106
112
|
cookieDomain?: string;
|
|
113
|
+
/**
|
|
114
|
+
*
|
|
115
|
+
* @type {Array<string>}
|
|
116
|
+
* @memberof PatchedProxyProviderRequest
|
|
117
|
+
*/
|
|
118
|
+
jwksSources?: Array<string>;
|
|
107
119
|
/**
|
|
108
120
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
|
109
121
|
* @type {string}
|
|
@@ -134,7 +146,9 @@ export function PatchedProxyProviderRequestFromJSONTyped(json: any, ignoreDiscri
|
|
|
134
146
|
'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
|
|
135
147
|
'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
|
|
136
148
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
|
149
|
+
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
137
150
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
151
|
+
'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
|
|
138
152
|
'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
|
|
139
153
|
};
|
|
140
154
|
}
|
|
@@ -160,7 +174,9 @@ export function PatchedProxyProviderRequestToJSON(value?: PatchedProxyProviderRe
|
|
|
160
174
|
'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
|
|
161
175
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
162
176
|
'mode': ProxyModeToJSON(value.mode),
|
|
177
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
163
178
|
'cookie_domain': value.cookieDomain,
|
|
179
|
+
'jwks_sources': value.jwksSources,
|
|
164
180
|
'token_validity': value.tokenValidity,
|
|
165
181
|
};
|
|
166
182
|
}
|
|
@@ -134,6 +134,12 @@ export interface ProxyOutpostConfig {
|
|
|
134
134
|
* @memberof ProxyOutpostConfig
|
|
135
135
|
*/
|
|
136
136
|
readonly tokenValidity: number | null;
|
|
137
|
+
/**
|
|
138
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
139
|
+
* @type {boolean}
|
|
140
|
+
* @memberof ProxyOutpostConfig
|
|
141
|
+
*/
|
|
142
|
+
interceptHeaderAuth?: boolean;
|
|
137
143
|
/**
|
|
138
144
|
*
|
|
139
145
|
* @type {Array<string>}
|
|
@@ -181,6 +187,7 @@ export function ProxyOutpostConfigFromJSONTyped(json: any, ignoreDiscriminator:
|
|
|
181
187
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
|
182
188
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
183
189
|
'tokenValidity': json['token_validity'],
|
|
190
|
+
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
184
191
|
'scopesToRequest': json['scopes_to_request'],
|
|
185
192
|
'assignedApplicationSlug': json['assigned_application_slug'],
|
|
186
193
|
'assignedApplicationName': json['assigned_application_name'],
|
|
@@ -211,6 +218,7 @@ export function ProxyOutpostConfigToJSON(value?: ProxyOutpostConfig | null): any
|
|
|
211
218
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
212
219
|
'mode': ProxyModeToJSON(value.mode),
|
|
213
220
|
'cookie_domain': value.cookieDomain,
|
|
221
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
214
222
|
};
|
|
215
223
|
}
|
|
216
224
|
|
|
@@ -86,6 +86,12 @@ export interface ProxyProvider {
|
|
|
86
86
|
* @memberof ProxyProvider
|
|
87
87
|
*/
|
|
88
88
|
readonly metaModelName: string;
|
|
89
|
+
/**
|
|
90
|
+
*
|
|
91
|
+
* @type {string}
|
|
92
|
+
* @memberof ProxyProvider
|
|
93
|
+
*/
|
|
94
|
+
readonly clientId: string;
|
|
89
95
|
/**
|
|
90
96
|
*
|
|
91
97
|
* @type {string}
|
|
@@ -140,6 +146,12 @@ export interface ProxyProvider {
|
|
|
140
146
|
* @memberof ProxyProvider
|
|
141
147
|
*/
|
|
142
148
|
mode?: ProxyMode | null;
|
|
149
|
+
/**
|
|
150
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
151
|
+
* @type {boolean}
|
|
152
|
+
* @memberof ProxyProvider
|
|
153
|
+
*/
|
|
154
|
+
interceptHeaderAuth?: boolean;
|
|
143
155
|
/**
|
|
144
156
|
*
|
|
145
157
|
* @type {string}
|
|
@@ -152,6 +164,12 @@ export interface ProxyProvider {
|
|
|
152
164
|
* @memberof ProxyProvider
|
|
153
165
|
*/
|
|
154
166
|
cookieDomain?: string;
|
|
167
|
+
/**
|
|
168
|
+
*
|
|
169
|
+
* @type {Array<string>}
|
|
170
|
+
* @memberof ProxyProvider
|
|
171
|
+
*/
|
|
172
|
+
jwksSources?: Array<string>;
|
|
155
173
|
/**
|
|
156
174
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
|
157
175
|
* @type {string}
|
|
@@ -186,6 +204,7 @@ export function ProxyProviderFromJSONTyped(json: any, ignoreDiscriminator: boole
|
|
|
186
204
|
'verboseName': json['verbose_name'],
|
|
187
205
|
'verboseNamePlural': json['verbose_name_plural'],
|
|
188
206
|
'metaModelName': json['meta_model_name'],
|
|
207
|
+
'clientId': json['client_id'],
|
|
189
208
|
'internalHost': !exists(json, 'internal_host') ? undefined : json['internal_host'],
|
|
190
209
|
'externalHost': json['external_host'],
|
|
191
210
|
'internalHostSslValidation': !exists(json, 'internal_host_ssl_validation') ? undefined : json['internal_host_ssl_validation'],
|
|
@@ -195,8 +214,10 @@ export function ProxyProviderFromJSONTyped(json: any, ignoreDiscriminator: boole
|
|
|
195
214
|
'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
|
|
196
215
|
'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
|
|
197
216
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
|
217
|
+
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
198
218
|
'redirectUris': json['redirect_uris'],
|
|
199
219
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
220
|
+
'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
|
|
200
221
|
'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
|
|
201
222
|
'outpostSet': json['outpost_set'],
|
|
202
223
|
};
|
|
@@ -223,7 +244,9 @@ export function ProxyProviderToJSON(value?: ProxyProvider | null): any {
|
|
|
223
244
|
'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
|
|
224
245
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
225
246
|
'mode': ProxyModeToJSON(value.mode),
|
|
247
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
226
248
|
'cookie_domain': value.cookieDomain,
|
|
249
|
+
'jwks_sources': value.jwksSources,
|
|
227
250
|
'token_validity': value.tokenValidity,
|
|
228
251
|
};
|
|
229
252
|
}
|
|
@@ -98,12 +98,24 @@ export interface ProxyProviderRequest {
|
|
|
98
98
|
* @memberof ProxyProviderRequest
|
|
99
99
|
*/
|
|
100
100
|
mode?: ProxyMode | null;
|
|
101
|
+
/**
|
|
102
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
103
|
+
* @type {boolean}
|
|
104
|
+
* @memberof ProxyProviderRequest
|
|
105
|
+
*/
|
|
106
|
+
interceptHeaderAuth?: boolean;
|
|
101
107
|
/**
|
|
102
108
|
*
|
|
103
109
|
* @type {string}
|
|
104
110
|
* @memberof ProxyProviderRequest
|
|
105
111
|
*/
|
|
106
112
|
cookieDomain?: string;
|
|
113
|
+
/**
|
|
114
|
+
*
|
|
115
|
+
* @type {Array<string>}
|
|
116
|
+
* @memberof ProxyProviderRequest
|
|
117
|
+
*/
|
|
118
|
+
jwksSources?: Array<string>;
|
|
107
119
|
/**
|
|
108
120
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
|
109
121
|
* @type {string}
|
|
@@ -134,7 +146,9 @@ export function ProxyProviderRequestFromJSONTyped(json: any, ignoreDiscriminator
|
|
|
134
146
|
'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
|
|
135
147
|
'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
|
|
136
148
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
|
149
|
+
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
137
150
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
151
|
+
'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
|
|
138
152
|
'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
|
|
139
153
|
};
|
|
140
154
|
}
|
|
@@ -160,7 +174,9 @@ export function ProxyProviderRequestToJSON(value?: ProxyProviderRequest | null):
|
|
|
160
174
|
'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
|
|
161
175
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
162
176
|
'mode': ProxyModeToJSON(value.mode),
|
|
177
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
163
178
|
'cookie_domain': value.cookieDomain,
|
|
179
|
+
'jwks_sources': value.jwksSources,
|
|
164
180
|
'token_validity': value.tokenValidity,
|
|
165
181
|
};
|
|
166
182
|
}
|