@goauthentik/api 2023.8.3-1697642041 → 2023.8.3-1697813667

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -51,6 +51,12 @@ export interface PatchedRadiusProviderRequest {
51
51
  * @memberof PatchedRadiusProviderRequest
52
52
  */
53
53
  sharedSecret?: string;
54
+ /**
55
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
56
+ * @type {boolean}
57
+ * @memberof PatchedRadiusProviderRequest
58
+ */
59
+ mfaSupport?: boolean;
54
60
  }
55
61
  /**
56
62
  * Check if a given object implements the PatchedRadiusProviderRequest interface.
@@ -33,6 +33,7 @@ export function PatchedRadiusProviderRequestFromJSONTyped(json, ignoreDiscrimina
33
33
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
34
34
  'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
35
35
  'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
36
+ 'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
36
37
  };
37
38
  }
38
39
  export function PatchedRadiusProviderRequestToJSON(value) {
@@ -49,5 +50,6 @@ export function PatchedRadiusProviderRequestToJSON(value) {
49
50
  'property_mappings': value.propertyMappings,
50
51
  'client_networks': value.clientNetworks,
51
52
  'shared_secret': value.sharedSecret,
53
+ 'mfa_support': value.mfaSupport,
52
54
  };
53
55
  }
@@ -51,6 +51,12 @@ export interface RadiusOutpostConfig {
51
51
  * @memberof RadiusOutpostConfig
52
52
  */
53
53
  sharedSecret?: string;
54
+ /**
55
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
56
+ * @type {boolean}
57
+ * @memberof RadiusOutpostConfig
58
+ */
59
+ mfaSupport?: boolean;
54
60
  }
55
61
  /**
56
62
  * Check if a given object implements the RadiusOutpostConfig interface.
@@ -37,6 +37,7 @@ export function RadiusOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
37
37
  'authFlowSlug': json['auth_flow_slug'],
38
38
  'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
39
39
  'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
40
+ 'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
40
41
  };
41
42
  }
42
43
  export function RadiusOutpostConfigToJSON(value) {
@@ -52,5 +53,6 @@ export function RadiusOutpostConfigToJSON(value) {
52
53
  'auth_flow_slug': value.authFlowSlug,
53
54
  'client_networks': value.clientNetworks,
54
55
  'shared_secret': value.sharedSecret,
56
+ 'mfa_support': value.mfaSupport,
55
57
  };
56
58
  }
@@ -111,6 +111,12 @@ export interface RadiusProvider {
111
111
  * @memberof RadiusProvider
112
112
  */
113
113
  readonly outpostSet: Array<string>;
114
+ /**
115
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
116
+ * @type {boolean}
117
+ * @memberof RadiusProvider
118
+ */
119
+ mfaSupport?: boolean;
114
120
  }
115
121
  /**
116
122
  * Check if a given object implements the RadiusProvider interface.
@@ -55,6 +55,7 @@ export function RadiusProviderFromJSONTyped(json, ignoreDiscriminator) {
55
55
  'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
56
56
  'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
57
57
  'outpostSet': json['outpost_set'],
58
+ 'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
58
59
  };
59
60
  }
60
61
  export function RadiusProviderToJSON(value) {
@@ -71,5 +72,6 @@ export function RadiusProviderToJSON(value) {
71
72
  'property_mappings': value.propertyMappings,
72
73
  'client_networks': value.clientNetworks,
73
74
  'shared_secret': value.sharedSecret,
75
+ 'mfa_support': value.mfaSupport,
74
76
  };
75
77
  }
@@ -51,6 +51,12 @@ export interface RadiusProviderRequest {
51
51
  * @memberof RadiusProviderRequest
52
52
  */
53
53
  sharedSecret?: string;
54
+ /**
55
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
56
+ * @type {boolean}
57
+ * @memberof RadiusProviderRequest
58
+ */
59
+ mfaSupport?: boolean;
54
60
  }
55
61
  /**
56
62
  * Check if a given object implements the RadiusProviderRequest interface.
@@ -35,6 +35,7 @@ export function RadiusProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
35
35
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
36
36
  'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
37
37
  'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
38
+ 'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
38
39
  };
39
40
  }
40
41
  export function RadiusProviderRequestToJSON(value) {
@@ -51,5 +52,6 @@ export function RadiusProviderRequestToJSON(value) {
51
52
  'property_mappings': value.propertyMappings,
52
53
  'client_networks': value.clientNetworks,
53
54
  'shared_secret': value.sharedSecret,
55
+ 'mfa_support': value.mfaSupport,
54
56
  };
55
57
  }
@@ -57,6 +57,18 @@ export interface SourceType {
57
57
  * @memberof SourceType
58
58
  */
59
59
  readonly profileUrl: string | null;
60
+ /**
61
+ *
62
+ * @type {string}
63
+ * @memberof SourceType
64
+ */
65
+ readonly oidcWellKnownUrl: string | null;
66
+ /**
67
+ *
68
+ * @type {string}
69
+ * @memberof SourceType
70
+ */
71
+ readonly oidcJwksUrl: string | null;
60
72
  }
61
73
  /**
62
74
  * Check if a given object implements the SourceType interface.
@@ -23,6 +23,8 @@ export function instanceOfSourceType(value) {
23
23
  isInstance = isInstance && "authorizationUrl" in value;
24
24
  isInstance = isInstance && "accessTokenUrl" in value;
25
25
  isInstance = isInstance && "profileUrl" in value;
26
+ isInstance = isInstance && "oidcWellKnownUrl" in value;
27
+ isInstance = isInstance && "oidcJwksUrl" in value;
26
28
  return isInstance;
27
29
  }
28
30
  export function SourceTypeFromJSON(json) {
@@ -40,6 +42,8 @@ export function SourceTypeFromJSONTyped(json, ignoreDiscriminator) {
40
42
  'authorizationUrl': json['authorization_url'],
41
43
  'accessTokenUrl': json['access_token_url'],
42
44
  'profileUrl': json['profile_url'],
45
+ 'oidcWellKnownUrl': json['oidc_well_known_url'],
46
+ 'oidcJwksUrl': json['oidc_jwks_url'],
43
47
  };
44
48
  }
45
49
  export function SourceTypeToJSON(value) {
@@ -51,6 +51,12 @@ export interface PatchedRadiusProviderRequest {
51
51
  * @memberof PatchedRadiusProviderRequest
52
52
  */
53
53
  sharedSecret?: string;
54
+ /**
55
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
56
+ * @type {boolean}
57
+ * @memberof PatchedRadiusProviderRequest
58
+ */
59
+ mfaSupport?: boolean;
54
60
  }
55
61
  /**
56
62
  * Check if a given object implements the PatchedRadiusProviderRequest interface.
@@ -38,6 +38,7 @@ function PatchedRadiusProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
38
38
  'propertyMappings': !(0, runtime_1.exists)(json, 'property_mappings') ? undefined : json['property_mappings'],
39
39
  'clientNetworks': !(0, runtime_1.exists)(json, 'client_networks') ? undefined : json['client_networks'],
40
40
  'sharedSecret': !(0, runtime_1.exists)(json, 'shared_secret') ? undefined : json['shared_secret'],
41
+ 'mfaSupport': !(0, runtime_1.exists)(json, 'mfa_support') ? undefined : json['mfa_support'],
41
42
  };
42
43
  }
43
44
  exports.PatchedRadiusProviderRequestFromJSONTyped = PatchedRadiusProviderRequestFromJSONTyped;
@@ -55,6 +56,7 @@ function PatchedRadiusProviderRequestToJSON(value) {
55
56
  'property_mappings': value.propertyMappings,
56
57
  'client_networks': value.clientNetworks,
57
58
  'shared_secret': value.sharedSecret,
59
+ 'mfa_support': value.mfaSupport,
58
60
  };
59
61
  }
60
62
  exports.PatchedRadiusProviderRequestToJSON = PatchedRadiusProviderRequestToJSON;
@@ -51,6 +51,12 @@ export interface RadiusOutpostConfig {
51
51
  * @memberof RadiusOutpostConfig
52
52
  */
53
53
  sharedSecret?: string;
54
+ /**
55
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
56
+ * @type {boolean}
57
+ * @memberof RadiusOutpostConfig
58
+ */
59
+ mfaSupport?: boolean;
54
60
  }
55
61
  /**
56
62
  * Check if a given object implements the RadiusOutpostConfig interface.
@@ -42,6 +42,7 @@ function RadiusOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
42
42
  'authFlowSlug': json['auth_flow_slug'],
43
43
  'clientNetworks': !(0, runtime_1.exists)(json, 'client_networks') ? undefined : json['client_networks'],
44
44
  'sharedSecret': !(0, runtime_1.exists)(json, 'shared_secret') ? undefined : json['shared_secret'],
45
+ 'mfaSupport': !(0, runtime_1.exists)(json, 'mfa_support') ? undefined : json['mfa_support'],
45
46
  };
46
47
  }
47
48
  exports.RadiusOutpostConfigFromJSONTyped = RadiusOutpostConfigFromJSONTyped;
@@ -58,6 +59,7 @@ function RadiusOutpostConfigToJSON(value) {
58
59
  'auth_flow_slug': value.authFlowSlug,
59
60
  'client_networks': value.clientNetworks,
60
61
  'shared_secret': value.sharedSecret,
62
+ 'mfa_support': value.mfaSupport,
61
63
  };
62
64
  }
63
65
  exports.RadiusOutpostConfigToJSON = RadiusOutpostConfigToJSON;
@@ -111,6 +111,12 @@ export interface RadiusProvider {
111
111
  * @memberof RadiusProvider
112
112
  */
113
113
  readonly outpostSet: Array<string>;
114
+ /**
115
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
116
+ * @type {boolean}
117
+ * @memberof RadiusProvider
118
+ */
119
+ mfaSupport?: boolean;
114
120
  }
115
121
  /**
116
122
  * Check if a given object implements the RadiusProvider interface.
@@ -60,6 +60,7 @@ function RadiusProviderFromJSONTyped(json, ignoreDiscriminator) {
60
60
  'clientNetworks': !(0, runtime_1.exists)(json, 'client_networks') ? undefined : json['client_networks'],
61
61
  'sharedSecret': !(0, runtime_1.exists)(json, 'shared_secret') ? undefined : json['shared_secret'],
62
62
  'outpostSet': json['outpost_set'],
63
+ 'mfaSupport': !(0, runtime_1.exists)(json, 'mfa_support') ? undefined : json['mfa_support'],
63
64
  };
64
65
  }
65
66
  exports.RadiusProviderFromJSONTyped = RadiusProviderFromJSONTyped;
@@ -77,6 +78,7 @@ function RadiusProviderToJSON(value) {
77
78
  'property_mappings': value.propertyMappings,
78
79
  'client_networks': value.clientNetworks,
79
80
  'shared_secret': value.sharedSecret,
81
+ 'mfa_support': value.mfaSupport,
80
82
  };
81
83
  }
82
84
  exports.RadiusProviderToJSON = RadiusProviderToJSON;
@@ -51,6 +51,12 @@ export interface RadiusProviderRequest {
51
51
  * @memberof RadiusProviderRequest
52
52
  */
53
53
  sharedSecret?: string;
54
+ /**
55
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
56
+ * @type {boolean}
57
+ * @memberof RadiusProviderRequest
58
+ */
59
+ mfaSupport?: boolean;
54
60
  }
55
61
  /**
56
62
  * Check if a given object implements the RadiusProviderRequest interface.
@@ -40,6 +40,7 @@ function RadiusProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
40
40
  'propertyMappings': !(0, runtime_1.exists)(json, 'property_mappings') ? undefined : json['property_mappings'],
41
41
  'clientNetworks': !(0, runtime_1.exists)(json, 'client_networks') ? undefined : json['client_networks'],
42
42
  'sharedSecret': !(0, runtime_1.exists)(json, 'shared_secret') ? undefined : json['shared_secret'],
43
+ 'mfaSupport': !(0, runtime_1.exists)(json, 'mfa_support') ? undefined : json['mfa_support'],
43
44
  };
44
45
  }
45
46
  exports.RadiusProviderRequestFromJSONTyped = RadiusProviderRequestFromJSONTyped;
@@ -57,6 +58,7 @@ function RadiusProviderRequestToJSON(value) {
57
58
  'property_mappings': value.propertyMappings,
58
59
  'client_networks': value.clientNetworks,
59
60
  'shared_secret': value.sharedSecret,
61
+ 'mfa_support': value.mfaSupport,
60
62
  };
61
63
  }
62
64
  exports.RadiusProviderRequestToJSON = RadiusProviderRequestToJSON;
@@ -57,6 +57,18 @@ export interface SourceType {
57
57
  * @memberof SourceType
58
58
  */
59
59
  readonly profileUrl: string | null;
60
+ /**
61
+ *
62
+ * @type {string}
63
+ * @memberof SourceType
64
+ */
65
+ readonly oidcWellKnownUrl: string | null;
66
+ /**
67
+ *
68
+ * @type {string}
69
+ * @memberof SourceType
70
+ */
71
+ readonly oidcJwksUrl: string | null;
60
72
  }
61
73
  /**
62
74
  * Check if a given object implements the SourceType interface.
@@ -26,6 +26,8 @@ function instanceOfSourceType(value) {
26
26
  isInstance = isInstance && "authorizationUrl" in value;
27
27
  isInstance = isInstance && "accessTokenUrl" in value;
28
28
  isInstance = isInstance && "profileUrl" in value;
29
+ isInstance = isInstance && "oidcWellKnownUrl" in value;
30
+ isInstance = isInstance && "oidcJwksUrl" in value;
29
31
  return isInstance;
30
32
  }
31
33
  exports.instanceOfSourceType = instanceOfSourceType;
@@ -45,6 +47,8 @@ function SourceTypeFromJSONTyped(json, ignoreDiscriminator) {
45
47
  'authorizationUrl': json['authorization_url'],
46
48
  'accessTokenUrl': json['access_token_url'],
47
49
  'profileUrl': json['profile_url'],
50
+ 'oidcWellKnownUrl': json['oidc_well_known_url'],
51
+ 'oidcJwksUrl': json['oidc_jwks_url'],
48
52
  };
49
53
  }
50
54
  exports.SourceTypeFromJSONTyped = SourceTypeFromJSONTyped;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goauthentik/api",
3
- "version": "2023.8.3-1697642041",
3
+ "version": "2023.8.3-1697813667",
4
4
  "description": "OpenAPI client for @goauthentik/api",
5
5
  "author": "OpenAPI-Generator",
6
6
  "repository": {
@@ -55,6 +55,12 @@ export interface PatchedRadiusProviderRequest {
55
55
  * @memberof PatchedRadiusProviderRequest
56
56
  */
57
57
  sharedSecret?: string;
58
+ /**
59
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
60
+ * @type {boolean}
61
+ * @memberof PatchedRadiusProviderRequest
62
+ */
63
+ mfaSupport?: boolean;
58
64
  }
59
65
 
60
66
  /**
@@ -82,6 +88,7 @@ export function PatchedRadiusProviderRequestFromJSONTyped(json: any, ignoreDiscr
82
88
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
83
89
  'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
84
90
  'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
91
+ 'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
85
92
  };
86
93
  }
87
94
 
@@ -100,6 +107,7 @@ export function PatchedRadiusProviderRequestToJSON(value?: PatchedRadiusProvider
100
107
  'property_mappings': value.propertyMappings,
101
108
  'client_networks': value.clientNetworks,
102
109
  'shared_secret': value.sharedSecret,
110
+ 'mfa_support': value.mfaSupport,
103
111
  };
104
112
  }
105
113
 
@@ -55,6 +55,12 @@ export interface RadiusOutpostConfig {
55
55
  * @memberof RadiusOutpostConfig
56
56
  */
57
57
  sharedSecret?: string;
58
+ /**
59
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
60
+ * @type {boolean}
61
+ * @memberof RadiusOutpostConfig
62
+ */
63
+ mfaSupport?: boolean;
58
64
  }
59
65
 
60
66
  /**
@@ -86,6 +92,7 @@ export function RadiusOutpostConfigFromJSONTyped(json: any, ignoreDiscriminator:
86
92
  'authFlowSlug': json['auth_flow_slug'],
87
93
  'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
88
94
  'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
95
+ 'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
89
96
  };
90
97
  }
91
98
 
@@ -103,6 +110,7 @@ export function RadiusOutpostConfigToJSON(value?: RadiusOutpostConfig | null): a
103
110
  'auth_flow_slug': value.authFlowSlug,
104
111
  'client_networks': value.clientNetworks,
105
112
  'shared_secret': value.sharedSecret,
113
+ 'mfa_support': value.mfaSupport,
106
114
  };
107
115
  }
108
116
 
@@ -115,6 +115,12 @@ export interface RadiusProvider {
115
115
  * @memberof RadiusProvider
116
116
  */
117
117
  readonly outpostSet: Array<string>;
118
+ /**
119
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
120
+ * @type {boolean}
121
+ * @memberof RadiusProvider
122
+ */
123
+ mfaSupport?: boolean;
118
124
  }
119
125
 
120
126
  /**
@@ -164,6 +170,7 @@ export function RadiusProviderFromJSONTyped(json: any, ignoreDiscriminator: bool
164
170
  'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
165
171
  'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
166
172
  'outpostSet': json['outpost_set'],
173
+ 'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
167
174
  };
168
175
  }
169
176
 
@@ -182,6 +189,7 @@ export function RadiusProviderToJSON(value?: RadiusProvider | null): any {
182
189
  'property_mappings': value.propertyMappings,
183
190
  'client_networks': value.clientNetworks,
184
191
  'shared_secret': value.sharedSecret,
192
+ 'mfa_support': value.mfaSupport,
185
193
  };
186
194
  }
187
195
 
@@ -55,6 +55,12 @@ export interface RadiusProviderRequest {
55
55
  * @memberof RadiusProviderRequest
56
56
  */
57
57
  sharedSecret?: string;
58
+ /**
59
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
60
+ * @type {boolean}
61
+ * @memberof RadiusProviderRequest
62
+ */
63
+ mfaSupport?: boolean;
58
64
  }
59
65
 
60
66
  /**
@@ -84,6 +90,7 @@ export function RadiusProviderRequestFromJSONTyped(json: any, ignoreDiscriminato
84
90
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
85
91
  'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
86
92
  'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
93
+ 'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
87
94
  };
88
95
  }
89
96
 
@@ -102,6 +109,7 @@ export function RadiusProviderRequestToJSON(value?: RadiusProviderRequest | null
102
109
  'property_mappings': value.propertyMappings,
103
110
  'client_networks': value.clientNetworks,
104
111
  'shared_secret': value.sharedSecret,
112
+ 'mfa_support': value.mfaSupport,
105
113
  };
106
114
  }
107
115
 
@@ -61,6 +61,18 @@ export interface SourceType {
61
61
  * @memberof SourceType
62
62
  */
63
63
  readonly profileUrl: string | null;
64
+ /**
65
+ *
66
+ * @type {string}
67
+ * @memberof SourceType
68
+ */
69
+ readonly oidcWellKnownUrl: string | null;
70
+ /**
71
+ *
72
+ * @type {string}
73
+ * @memberof SourceType
74
+ */
75
+ readonly oidcJwksUrl: string | null;
64
76
  }
65
77
 
66
78
  /**
@@ -75,6 +87,8 @@ export function instanceOfSourceType(value: object): boolean {
75
87
  isInstance = isInstance && "authorizationUrl" in value;
76
88
  isInstance = isInstance && "accessTokenUrl" in value;
77
89
  isInstance = isInstance && "profileUrl" in value;
90
+ isInstance = isInstance && "oidcWellKnownUrl" in value;
91
+ isInstance = isInstance && "oidcJwksUrl" in value;
78
92
 
79
93
  return isInstance;
80
94
  }
@@ -96,6 +110,8 @@ export function SourceTypeFromJSONTyped(json: any, ignoreDiscriminator: boolean)
96
110
  'authorizationUrl': json['authorization_url'],
97
111
  'accessTokenUrl': json['access_token_url'],
98
112
  'profileUrl': json['profile_url'],
113
+ 'oidcWellKnownUrl': json['oidc_well_known_url'],
114
+ 'oidcJwksUrl': json['oidc_jwks_url'],
99
115
  };
100
116
  }
101
117