@goauthentik/api 2022.12.2-1673623344 → 2022.12.2-1673978239
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/esm/models/PatchedProxyProviderRequest.d.ts +6 -0
- package/dist/esm/models/PatchedProxyProviderRequest.js +2 -0
- package/dist/esm/models/ProxyOutpostConfig.d.ts +6 -0
- package/dist/esm/models/ProxyOutpostConfig.js +2 -0
- package/dist/esm/models/ProxyProvider.d.ts +6 -0
- package/dist/esm/models/ProxyProvider.js +2 -0
- package/dist/esm/models/ProxyProviderRequest.d.ts +6 -0
- package/dist/esm/models/ProxyProviderRequest.js +2 -0
- package/dist/models/PatchedProxyProviderRequest.d.ts +6 -0
- package/dist/models/PatchedProxyProviderRequest.js +2 -0
- package/dist/models/ProxyOutpostConfig.d.ts +6 -0
- package/dist/models/ProxyOutpostConfig.js +2 -0
- package/dist/models/ProxyProvider.d.ts +6 -0
- package/dist/models/ProxyProvider.js +2 -0
- package/dist/models/ProxyProviderRequest.d.ts +6 -0
- package/dist/models/ProxyProviderRequest.js +2 -0
- package/package.json +1 -1
- package/src/models/PatchedProxyProviderRequest.ts +8 -0
- package/src/models/ProxyOutpostConfig.ts +8 -0
- package/src/models/ProxyProvider.ts +8 -0
- package/src/models/ProxyProviderRequest.ts +8 -0
|
@@ -88,6 +88,12 @@ export interface PatchedProxyProviderRequest {
|
|
|
88
88
|
* @memberof PatchedProxyProviderRequest
|
|
89
89
|
*/
|
|
90
90
|
mode?: ProxyMode | null;
|
|
91
|
+
/**
|
|
92
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
93
|
+
* @type {boolean}
|
|
94
|
+
* @memberof PatchedProxyProviderRequest
|
|
95
|
+
*/
|
|
96
|
+
interceptHeaderAuth?: boolean;
|
|
91
97
|
/**
|
|
92
98
|
*
|
|
93
99
|
* @type {string}
|
|
@@ -33,6 +33,7 @@ export function PatchedProxyProviderRequestFromJSONTyped(json, ignoreDiscriminat
|
|
|
33
33
|
'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
|
|
34
34
|
'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
|
|
35
35
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
|
36
|
+
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
36
37
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
37
38
|
'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
|
|
38
39
|
'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
|
|
@@ -58,6 +59,7 @@ export function PatchedProxyProviderRequestToJSON(value) {
|
|
|
58
59
|
'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
|
|
59
60
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
60
61
|
'mode': ProxyModeToJSON(value.mode),
|
|
62
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
61
63
|
'cookie_domain': value.cookieDomain,
|
|
62
64
|
'jwks_sources': value.jwksSources,
|
|
63
65
|
'token_validity': value.tokenValidity,
|
|
@@ -119,6 +119,12 @@ export interface ProxyOutpostConfig {
|
|
|
119
119
|
* @memberof ProxyOutpostConfig
|
|
120
120
|
*/
|
|
121
121
|
readonly tokenValidity: number | null;
|
|
122
|
+
/**
|
|
123
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
124
|
+
* @type {boolean}
|
|
125
|
+
* @memberof ProxyOutpostConfig
|
|
126
|
+
*/
|
|
127
|
+
interceptHeaderAuth?: boolean;
|
|
122
128
|
/**
|
|
123
129
|
*
|
|
124
130
|
* @type {Array<string>}
|
|
@@ -39,6 +39,7 @@ export function ProxyOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
39
39
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
|
40
40
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
41
41
|
'tokenValidity': json['token_validity'],
|
|
42
|
+
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
42
43
|
'scopesToRequest': json['scopes_to_request'],
|
|
43
44
|
'assignedApplicationSlug': json['assigned_application_slug'],
|
|
44
45
|
'assignedApplicationName': json['assigned_application_name'],
|
|
@@ -67,5 +68,6 @@ export function ProxyOutpostConfigToJSON(value) {
|
|
|
67
68
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
68
69
|
'mode': ProxyModeToJSON(value.mode),
|
|
69
70
|
'cookie_domain': value.cookieDomain,
|
|
71
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
70
72
|
};
|
|
71
73
|
}
|
|
@@ -136,6 +136,12 @@ export interface ProxyProvider {
|
|
|
136
136
|
* @memberof ProxyProvider
|
|
137
137
|
*/
|
|
138
138
|
mode?: ProxyMode | null;
|
|
139
|
+
/**
|
|
140
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
141
|
+
* @type {boolean}
|
|
142
|
+
* @memberof ProxyProvider
|
|
143
|
+
*/
|
|
144
|
+
interceptHeaderAuth?: boolean;
|
|
139
145
|
/**
|
|
140
146
|
*
|
|
141
147
|
* @type {string}
|
|
@@ -41,6 +41,7 @@ export function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
41
41
|
'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
|
|
42
42
|
'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
|
|
43
43
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
|
44
|
+
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
44
45
|
'redirectUris': json['redirect_uris'],
|
|
45
46
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
46
47
|
'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
|
|
@@ -68,6 +69,7 @@ export function ProxyProviderToJSON(value) {
|
|
|
68
69
|
'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
|
|
69
70
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
70
71
|
'mode': ProxyModeToJSON(value.mode),
|
|
72
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
71
73
|
'cookie_domain': value.cookieDomain,
|
|
72
74
|
'jwks_sources': value.jwksSources,
|
|
73
75
|
'token_validity': value.tokenValidity,
|
|
@@ -88,6 +88,12 @@ export interface ProxyProviderRequest {
|
|
|
88
88
|
* @memberof ProxyProviderRequest
|
|
89
89
|
*/
|
|
90
90
|
mode?: ProxyMode | null;
|
|
91
|
+
/**
|
|
92
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
93
|
+
* @type {boolean}
|
|
94
|
+
* @memberof ProxyProviderRequest
|
|
95
|
+
*/
|
|
96
|
+
interceptHeaderAuth?: boolean;
|
|
91
97
|
/**
|
|
92
98
|
*
|
|
93
99
|
* @type {string}
|
|
@@ -33,6 +33,7 @@ export function ProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
33
33
|
'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
|
|
34
34
|
'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
|
|
35
35
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
|
36
|
+
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
36
37
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
37
38
|
'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
|
|
38
39
|
'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
|
|
@@ -58,6 +59,7 @@ export function ProxyProviderRequestToJSON(value) {
|
|
|
58
59
|
'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
|
|
59
60
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
60
61
|
'mode': ProxyModeToJSON(value.mode),
|
|
62
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
61
63
|
'cookie_domain': value.cookieDomain,
|
|
62
64
|
'jwks_sources': value.jwksSources,
|
|
63
65
|
'token_validity': value.tokenValidity,
|
|
@@ -88,6 +88,12 @@ export interface PatchedProxyProviderRequest {
|
|
|
88
88
|
* @memberof PatchedProxyProviderRequest
|
|
89
89
|
*/
|
|
90
90
|
mode?: ProxyMode | null;
|
|
91
|
+
/**
|
|
92
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
93
|
+
* @type {boolean}
|
|
94
|
+
* @memberof PatchedProxyProviderRequest
|
|
95
|
+
*/
|
|
96
|
+
interceptHeaderAuth?: boolean;
|
|
91
97
|
/**
|
|
92
98
|
*
|
|
93
99
|
* @type {string}
|
|
@@ -37,6 +37,7 @@ function PatchedProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
37
37
|
'basicAuthPasswordAttribute': !(0, runtime_1.exists)(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
|
|
38
38
|
'basicAuthUserAttribute': !(0, runtime_1.exists)(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
|
|
39
39
|
'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
|
|
40
|
+
'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
40
41
|
'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
41
42
|
'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
|
|
42
43
|
'tokenValidity': !(0, runtime_1.exists)(json, 'token_validity') ? undefined : json['token_validity'],
|
|
@@ -63,6 +64,7 @@ function PatchedProxyProviderRequestToJSON(value) {
|
|
|
63
64
|
'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
|
|
64
65
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
65
66
|
'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
|
|
67
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
66
68
|
'cookie_domain': value.cookieDomain,
|
|
67
69
|
'jwks_sources': value.jwksSources,
|
|
68
70
|
'token_validity': value.tokenValidity,
|
|
@@ -119,6 +119,12 @@ export interface ProxyOutpostConfig {
|
|
|
119
119
|
* @memberof ProxyOutpostConfig
|
|
120
120
|
*/
|
|
121
121
|
readonly tokenValidity: number | null;
|
|
122
|
+
/**
|
|
123
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
124
|
+
* @type {boolean}
|
|
125
|
+
* @memberof ProxyOutpostConfig
|
|
126
|
+
*/
|
|
127
|
+
interceptHeaderAuth?: boolean;
|
|
122
128
|
/**
|
|
123
129
|
*
|
|
124
130
|
* @type {Array<string>}
|
|
@@ -43,6 +43,7 @@ function ProxyOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
43
43
|
'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
|
|
44
44
|
'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
45
45
|
'tokenValidity': json['token_validity'],
|
|
46
|
+
'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
46
47
|
'scopesToRequest': json['scopes_to_request'],
|
|
47
48
|
'assignedApplicationSlug': json['assigned_application_slug'],
|
|
48
49
|
'assignedApplicationName': json['assigned_application_name'],
|
|
@@ -72,6 +73,7 @@ function ProxyOutpostConfigToJSON(value) {
|
|
|
72
73
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
73
74
|
'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
|
|
74
75
|
'cookie_domain': value.cookieDomain,
|
|
76
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
75
77
|
};
|
|
76
78
|
}
|
|
77
79
|
exports.ProxyOutpostConfigToJSON = ProxyOutpostConfigToJSON;
|
|
@@ -136,6 +136,12 @@ export interface ProxyProvider {
|
|
|
136
136
|
* @memberof ProxyProvider
|
|
137
137
|
*/
|
|
138
138
|
mode?: ProxyMode | null;
|
|
139
|
+
/**
|
|
140
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
141
|
+
* @type {boolean}
|
|
142
|
+
* @memberof ProxyProvider
|
|
143
|
+
*/
|
|
144
|
+
interceptHeaderAuth?: boolean;
|
|
139
145
|
/**
|
|
140
146
|
*
|
|
141
147
|
* @type {string}
|
|
@@ -45,6 +45,7 @@ function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
45
45
|
'basicAuthPasswordAttribute': !(0, runtime_1.exists)(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
|
|
46
46
|
'basicAuthUserAttribute': !(0, runtime_1.exists)(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
|
|
47
47
|
'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
|
|
48
|
+
'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
48
49
|
'redirectUris': json['redirect_uris'],
|
|
49
50
|
'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
50
51
|
'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
|
|
@@ -73,6 +74,7 @@ function ProxyProviderToJSON(value) {
|
|
|
73
74
|
'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
|
|
74
75
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
75
76
|
'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
|
|
77
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
76
78
|
'cookie_domain': value.cookieDomain,
|
|
77
79
|
'jwks_sources': value.jwksSources,
|
|
78
80
|
'token_validity': value.tokenValidity,
|
|
@@ -88,6 +88,12 @@ export interface ProxyProviderRequest {
|
|
|
88
88
|
* @memberof ProxyProviderRequest
|
|
89
89
|
*/
|
|
90
90
|
mode?: ProxyMode | null;
|
|
91
|
+
/**
|
|
92
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
93
|
+
* @type {boolean}
|
|
94
|
+
* @memberof ProxyProviderRequest
|
|
95
|
+
*/
|
|
96
|
+
interceptHeaderAuth?: boolean;
|
|
91
97
|
/**
|
|
92
98
|
*
|
|
93
99
|
* @type {string}
|
|
@@ -37,6 +37,7 @@ function ProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
37
37
|
'basicAuthPasswordAttribute': !(0, runtime_1.exists)(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
|
|
38
38
|
'basicAuthUserAttribute': !(0, runtime_1.exists)(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
|
|
39
39
|
'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
|
|
40
|
+
'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
40
41
|
'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
41
42
|
'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
|
|
42
43
|
'tokenValidity': !(0, runtime_1.exists)(json, 'token_validity') ? undefined : json['token_validity'],
|
|
@@ -63,6 +64,7 @@ function ProxyProviderRequestToJSON(value) {
|
|
|
63
64
|
'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
|
|
64
65
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
65
66
|
'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
|
|
67
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
66
68
|
'cookie_domain': value.cookieDomain,
|
|
67
69
|
'jwks_sources': value.jwksSources,
|
|
68
70
|
'token_validity': value.tokenValidity,
|
package/package.json
CHANGED
|
@@ -98,6 +98,12 @@ export interface PatchedProxyProviderRequest {
|
|
|
98
98
|
* @memberof PatchedProxyProviderRequest
|
|
99
99
|
*/
|
|
100
100
|
mode?: ProxyMode | null;
|
|
101
|
+
/**
|
|
102
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
103
|
+
* @type {boolean}
|
|
104
|
+
* @memberof PatchedProxyProviderRequest
|
|
105
|
+
*/
|
|
106
|
+
interceptHeaderAuth?: boolean;
|
|
101
107
|
/**
|
|
102
108
|
*
|
|
103
109
|
* @type {string}
|
|
@@ -140,6 +146,7 @@ export function PatchedProxyProviderRequestFromJSONTyped(json: any, ignoreDiscri
|
|
|
140
146
|
'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
|
|
141
147
|
'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
|
|
142
148
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
|
149
|
+
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
143
150
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
144
151
|
'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
|
|
145
152
|
'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
|
|
@@ -167,6 +174,7 @@ export function PatchedProxyProviderRequestToJSON(value?: PatchedProxyProviderRe
|
|
|
167
174
|
'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
|
|
168
175
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
169
176
|
'mode': ProxyModeToJSON(value.mode),
|
|
177
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
170
178
|
'cookie_domain': value.cookieDomain,
|
|
171
179
|
'jwks_sources': value.jwksSources,
|
|
172
180
|
'token_validity': value.tokenValidity,
|
|
@@ -134,6 +134,12 @@ export interface ProxyOutpostConfig {
|
|
|
134
134
|
* @memberof ProxyOutpostConfig
|
|
135
135
|
*/
|
|
136
136
|
readonly tokenValidity: number | null;
|
|
137
|
+
/**
|
|
138
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
139
|
+
* @type {boolean}
|
|
140
|
+
* @memberof ProxyOutpostConfig
|
|
141
|
+
*/
|
|
142
|
+
interceptHeaderAuth?: boolean;
|
|
137
143
|
/**
|
|
138
144
|
*
|
|
139
145
|
* @type {Array<string>}
|
|
@@ -181,6 +187,7 @@ export function ProxyOutpostConfigFromJSONTyped(json: any, ignoreDiscriminator:
|
|
|
181
187
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
|
182
188
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
183
189
|
'tokenValidity': json['token_validity'],
|
|
190
|
+
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
184
191
|
'scopesToRequest': json['scopes_to_request'],
|
|
185
192
|
'assignedApplicationSlug': json['assigned_application_slug'],
|
|
186
193
|
'assignedApplicationName': json['assigned_application_name'],
|
|
@@ -211,6 +218,7 @@ export function ProxyOutpostConfigToJSON(value?: ProxyOutpostConfig | null): any
|
|
|
211
218
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
212
219
|
'mode': ProxyModeToJSON(value.mode),
|
|
213
220
|
'cookie_domain': value.cookieDomain,
|
|
221
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
214
222
|
};
|
|
215
223
|
}
|
|
216
224
|
|
|
@@ -146,6 +146,12 @@ export interface ProxyProvider {
|
|
|
146
146
|
* @memberof ProxyProvider
|
|
147
147
|
*/
|
|
148
148
|
mode?: ProxyMode | null;
|
|
149
|
+
/**
|
|
150
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
151
|
+
* @type {boolean}
|
|
152
|
+
* @memberof ProxyProvider
|
|
153
|
+
*/
|
|
154
|
+
interceptHeaderAuth?: boolean;
|
|
149
155
|
/**
|
|
150
156
|
*
|
|
151
157
|
* @type {string}
|
|
@@ -208,6 +214,7 @@ export function ProxyProviderFromJSONTyped(json: any, ignoreDiscriminator: boole
|
|
|
208
214
|
'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
|
|
209
215
|
'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
|
|
210
216
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
|
217
|
+
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
211
218
|
'redirectUris': json['redirect_uris'],
|
|
212
219
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
213
220
|
'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
|
|
@@ -237,6 +244,7 @@ export function ProxyProviderToJSON(value?: ProxyProvider | null): any {
|
|
|
237
244
|
'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
|
|
238
245
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
239
246
|
'mode': ProxyModeToJSON(value.mode),
|
|
247
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
240
248
|
'cookie_domain': value.cookieDomain,
|
|
241
249
|
'jwks_sources': value.jwksSources,
|
|
242
250
|
'token_validity': value.tokenValidity,
|
|
@@ -98,6 +98,12 @@ export interface ProxyProviderRequest {
|
|
|
98
98
|
* @memberof ProxyProviderRequest
|
|
99
99
|
*/
|
|
100
100
|
mode?: ProxyMode | null;
|
|
101
|
+
/**
|
|
102
|
+
* When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
|
|
103
|
+
* @type {boolean}
|
|
104
|
+
* @memberof ProxyProviderRequest
|
|
105
|
+
*/
|
|
106
|
+
interceptHeaderAuth?: boolean;
|
|
101
107
|
/**
|
|
102
108
|
*
|
|
103
109
|
* @type {string}
|
|
@@ -140,6 +146,7 @@ export function ProxyProviderRequestFromJSONTyped(json: any, ignoreDiscriminator
|
|
|
140
146
|
'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
|
|
141
147
|
'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
|
|
142
148
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
|
149
|
+
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
143
150
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
144
151
|
'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
|
|
145
152
|
'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
|
|
@@ -167,6 +174,7 @@ export function ProxyProviderRequestToJSON(value?: ProxyProviderRequest | null):
|
|
|
167
174
|
'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
|
|
168
175
|
'basic_auth_user_attribute': value.basicAuthUserAttribute,
|
|
169
176
|
'mode': ProxyModeToJSON(value.mode),
|
|
177
|
+
'intercept_header_auth': value.interceptHeaderAuth,
|
|
170
178
|
'cookie_domain': value.cookieDomain,
|
|
171
179
|
'jwks_sources': value.jwksSources,
|
|
172
180
|
'token_validity': value.tokenValidity,
|