@goauthentik/api 2024.10.4-1732236707 → 2024.10.4-1733219849
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/esm/models/OAuth2Provider.d.ts +7 -1
- package/dist/esm/models/OAuth2Provider.js +4 -2
- package/dist/esm/models/OAuth2ProviderRequest.d.ts +7 -1
- package/dist/esm/models/OAuth2ProviderRequest.js +4 -2
- package/dist/esm/models/PatchedOAuth2ProviderRequest.d.ts +7 -1
- package/dist/esm/models/PatchedOAuth2ProviderRequest.js +4 -2
- package/dist/esm/models/PatchedProxyProviderRequest.d.ts +7 -1
- package/dist/esm/models/PatchedProxyProviderRequest.js +4 -2
- package/dist/esm/models/ProxyProvider.d.ts +7 -1
- package/dist/esm/models/ProxyProvider.js +4 -2
- package/dist/esm/models/ProxyProviderRequest.d.ts +7 -1
- package/dist/esm/models/ProxyProviderRequest.js +4 -2
- package/dist/models/OAuth2Provider.d.ts +7 -1
- package/dist/models/OAuth2Provider.js +4 -2
- package/dist/models/OAuth2ProviderRequest.d.ts +7 -1
- package/dist/models/OAuth2ProviderRequest.js +4 -2
- package/dist/models/PatchedOAuth2ProviderRequest.d.ts +7 -1
- package/dist/models/PatchedOAuth2ProviderRequest.js +4 -2
- package/dist/models/PatchedProxyProviderRequest.d.ts +7 -1
- package/dist/models/PatchedProxyProviderRequest.js +4 -2
- package/dist/models/ProxyProvider.d.ts +7 -1
- package/dist/models/ProxyProvider.js +4 -2
- package/dist/models/ProxyProviderRequest.d.ts +7 -1
- package/dist/models/ProxyProviderRequest.js +4 -2
- package/package.json +1 -1
- package/src/models/OAuth2Provider.ts +11 -3
- package/src/models/OAuth2ProviderRequest.ts +11 -3
- package/src/models/PatchedOAuth2ProviderRequest.ts +11 -3
- package/src/models/PatchedProxyProviderRequest.ts +11 -3
- package/src/models/ProxyProvider.ts +11 -3
- package/src/models/ProxyProviderRequest.ts +11 -3
|
@@ -180,7 +180,13 @@ export interface OAuth2Provider {
|
|
|
180
180
|
* @type {Array<string>}
|
|
181
181
|
* @memberof OAuth2Provider
|
|
182
182
|
*/
|
|
183
|
-
|
|
183
|
+
jwtFederationSources?: Array<string>;
|
|
184
|
+
/**
|
|
185
|
+
*
|
|
186
|
+
* @type {Array<number>}
|
|
187
|
+
* @memberof OAuth2Provider
|
|
188
|
+
*/
|
|
189
|
+
jwtFederationProviders?: Array<number>;
|
|
184
190
|
}
|
|
185
191
|
/**
|
|
186
192
|
* Check if a given object implements the OAuth2Provider interface.
|
|
@@ -70,7 +70,8 @@ export function OAuth2ProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
70
70
|
'redirectUris': (json['redirect_uris'].map(RedirectURIFromJSON)),
|
|
71
71
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
|
72
72
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
|
73
|
-
'
|
|
73
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
|
74
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
|
74
75
|
};
|
|
75
76
|
}
|
|
76
77
|
export function OAuth2ProviderToJSON(value) {
|
|
@@ -98,6 +99,7 @@ export function OAuth2ProviderToJSON(value) {
|
|
|
98
99
|
'redirect_uris': (value.redirectUris.map(RedirectURIToJSON)),
|
|
99
100
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
|
100
101
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|
|
101
|
-
'
|
|
102
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
|
103
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
|
102
104
|
};
|
|
103
105
|
}
|
|
@@ -126,7 +126,13 @@ export interface OAuth2ProviderRequest {
|
|
|
126
126
|
* @type {Array<string>}
|
|
127
127
|
* @memberof OAuth2ProviderRequest
|
|
128
128
|
*/
|
|
129
|
-
|
|
129
|
+
jwtFederationSources?: Array<string>;
|
|
130
|
+
/**
|
|
131
|
+
*
|
|
132
|
+
* @type {Array<number>}
|
|
133
|
+
* @memberof OAuth2ProviderRequest
|
|
134
|
+
*/
|
|
135
|
+
jwtFederationProviders?: Array<number>;
|
|
130
136
|
}
|
|
131
137
|
/**
|
|
132
138
|
* Check if a given object implements the OAuth2ProviderRequest interface.
|
|
@@ -52,7 +52,8 @@ export function OAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
52
52
|
'redirectUris': (json['redirect_uris'].map(RedirectURIRequestFromJSON)),
|
|
53
53
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
|
54
54
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
|
55
|
-
'
|
|
55
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
|
56
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
|
56
57
|
};
|
|
57
58
|
}
|
|
58
59
|
export function OAuth2ProviderRequestToJSON(value) {
|
|
@@ -80,6 +81,7 @@ export function OAuth2ProviderRequestToJSON(value) {
|
|
|
80
81
|
'redirect_uris': (value.redirectUris.map(RedirectURIRequestToJSON)),
|
|
81
82
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
|
82
83
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|
|
83
|
-
'
|
|
84
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
|
85
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
|
84
86
|
};
|
|
85
87
|
}
|
|
@@ -126,7 +126,13 @@ export interface PatchedOAuth2ProviderRequest {
|
|
|
126
126
|
* @type {Array<string>}
|
|
127
127
|
* @memberof PatchedOAuth2ProviderRequest
|
|
128
128
|
*/
|
|
129
|
-
|
|
129
|
+
jwtFederationSources?: Array<string>;
|
|
130
|
+
/**
|
|
131
|
+
*
|
|
132
|
+
* @type {Array<number>}
|
|
133
|
+
* @memberof PatchedOAuth2ProviderRequest
|
|
134
|
+
*/
|
|
135
|
+
jwtFederationProviders?: Array<number>;
|
|
130
136
|
}
|
|
131
137
|
/**
|
|
132
138
|
* Check if a given object implements the PatchedOAuth2ProviderRequest interface.
|
|
@@ -48,7 +48,8 @@ export function PatchedOAuth2ProviderRequestFromJSONTyped(json, ignoreDiscrimina
|
|
|
48
48
|
'redirectUris': !exists(json, 'redirect_uris') ? undefined : (json['redirect_uris'].map(RedirectURIRequestFromJSON)),
|
|
49
49
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
|
50
50
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
|
51
|
-
'
|
|
51
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
|
52
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
|
52
53
|
};
|
|
53
54
|
}
|
|
54
55
|
export function PatchedOAuth2ProviderRequestToJSON(value) {
|
|
@@ -76,6 +77,7 @@ export function PatchedOAuth2ProviderRequestToJSON(value) {
|
|
|
76
77
|
'redirect_uris': value.redirectUris === undefined ? undefined : (value.redirectUris.map(RedirectURIRequestToJSON)),
|
|
77
78
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
|
78
79
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|
|
79
|
-
'
|
|
80
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
|
81
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
|
80
82
|
};
|
|
81
83
|
}
|
|
@@ -117,7 +117,13 @@ export interface PatchedProxyProviderRequest {
|
|
|
117
117
|
* @type {Array<string>}
|
|
118
118
|
* @memberof PatchedProxyProviderRequest
|
|
119
119
|
*/
|
|
120
|
-
|
|
120
|
+
jwtFederationSources?: Array<string>;
|
|
121
|
+
/**
|
|
122
|
+
*
|
|
123
|
+
* @type {Array<number>}
|
|
124
|
+
* @memberof PatchedProxyProviderRequest
|
|
125
|
+
*/
|
|
126
|
+
jwtFederationProviders?: Array<number>;
|
|
121
127
|
/**
|
|
122
128
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
|
123
129
|
* @type {string}
|
|
@@ -44,7 +44,8 @@ export function PatchedProxyProviderRequestFromJSONTyped(json, ignoreDiscriminat
|
|
|
44
44
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
|
45
45
|
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
46
46
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
47
|
-
'
|
|
47
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
|
48
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
|
48
49
|
'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
|
|
49
50
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
|
50
51
|
};
|
|
@@ -73,7 +74,8 @@ export function PatchedProxyProviderRequestToJSON(value) {
|
|
|
73
74
|
'mode': ProxyModeToJSON(value.mode),
|
|
74
75
|
'intercept_header_auth': value.interceptHeaderAuth,
|
|
75
76
|
'cookie_domain': value.cookieDomain,
|
|
76
|
-
'
|
|
77
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
|
78
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
|
77
79
|
'access_token_validity': value.accessTokenValidity,
|
|
78
80
|
'refresh_token_validity': value.refreshTokenValidity,
|
|
79
81
|
};
|
|
@@ -184,7 +184,13 @@ export interface ProxyProvider {
|
|
|
184
184
|
* @type {Array<string>}
|
|
185
185
|
* @memberof ProxyProvider
|
|
186
186
|
*/
|
|
187
|
-
|
|
187
|
+
jwtFederationSources?: Array<string>;
|
|
188
|
+
/**
|
|
189
|
+
*
|
|
190
|
+
* @type {Array<number>}
|
|
191
|
+
* @memberof ProxyProvider
|
|
192
|
+
*/
|
|
193
|
+
jwtFederationProviders?: Array<number>;
|
|
188
194
|
/**
|
|
189
195
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
|
190
196
|
* @type {string}
|
|
@@ -72,7 +72,8 @@ export function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
72
72
|
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
73
73
|
'redirectUris': (json['redirect_uris'].map(RedirectURIFromJSON)),
|
|
74
74
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
75
|
-
'
|
|
75
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
|
76
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
|
76
77
|
'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
|
|
77
78
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
|
78
79
|
'outpostSet': json['outpost_set'],
|
|
@@ -102,7 +103,8 @@ export function ProxyProviderToJSON(value) {
|
|
|
102
103
|
'mode': ProxyModeToJSON(value.mode),
|
|
103
104
|
'intercept_header_auth': value.interceptHeaderAuth,
|
|
104
105
|
'cookie_domain': value.cookieDomain,
|
|
105
|
-
'
|
|
106
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
|
107
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
|
106
108
|
'access_token_validity': value.accessTokenValidity,
|
|
107
109
|
'refresh_token_validity': value.refreshTokenValidity,
|
|
108
110
|
};
|
|
@@ -117,7 +117,13 @@ export interface ProxyProviderRequest {
|
|
|
117
117
|
* @type {Array<string>}
|
|
118
118
|
* @memberof ProxyProviderRequest
|
|
119
119
|
*/
|
|
120
|
-
|
|
120
|
+
jwtFederationSources?: Array<string>;
|
|
121
|
+
/**
|
|
122
|
+
*
|
|
123
|
+
* @type {Array<number>}
|
|
124
|
+
* @memberof ProxyProviderRequest
|
|
125
|
+
*/
|
|
126
|
+
jwtFederationProviders?: Array<number>;
|
|
121
127
|
/**
|
|
122
128
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
|
123
129
|
* @type {string}
|
|
@@ -48,7 +48,8 @@ export function ProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
48
48
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
|
49
49
|
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
50
50
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
51
|
-
'
|
|
51
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
|
52
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
|
52
53
|
'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
|
|
53
54
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
|
54
55
|
};
|
|
@@ -77,7 +78,8 @@ export function ProxyProviderRequestToJSON(value) {
|
|
|
77
78
|
'mode': ProxyModeToJSON(value.mode),
|
|
78
79
|
'intercept_header_auth': value.interceptHeaderAuth,
|
|
79
80
|
'cookie_domain': value.cookieDomain,
|
|
80
|
-
'
|
|
81
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
|
82
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
|
81
83
|
'access_token_validity': value.accessTokenValidity,
|
|
82
84
|
'refresh_token_validity': value.refreshTokenValidity,
|
|
83
85
|
};
|
|
@@ -180,7 +180,13 @@ export interface OAuth2Provider {
|
|
|
180
180
|
* @type {Array<string>}
|
|
181
181
|
* @memberof OAuth2Provider
|
|
182
182
|
*/
|
|
183
|
-
|
|
183
|
+
jwtFederationSources?: Array<string>;
|
|
184
|
+
/**
|
|
185
|
+
*
|
|
186
|
+
* @type {Array<number>}
|
|
187
|
+
* @memberof OAuth2Provider
|
|
188
|
+
*/
|
|
189
|
+
jwtFederationProviders?: Array<number>;
|
|
184
190
|
}
|
|
185
191
|
/**
|
|
186
192
|
* Check if a given object implements the OAuth2Provider interface.
|
|
@@ -75,7 +75,8 @@ function OAuth2ProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
75
75
|
'redirectUris': (json['redirect_uris'].map(RedirectURI_1.RedirectURIFromJSON)),
|
|
76
76
|
'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
|
|
77
77
|
'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
|
|
78
|
-
'
|
|
78
|
+
'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
|
79
|
+
'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
|
79
80
|
};
|
|
80
81
|
}
|
|
81
82
|
exports.OAuth2ProviderFromJSONTyped = OAuth2ProviderFromJSONTyped;
|
|
@@ -104,7 +105,8 @@ function OAuth2ProviderToJSON(value) {
|
|
|
104
105
|
'redirect_uris': (value.redirectUris.map(RedirectURI_1.RedirectURIToJSON)),
|
|
105
106
|
'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
|
|
106
107
|
'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
|
|
107
|
-
'
|
|
108
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
|
109
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
|
108
110
|
};
|
|
109
111
|
}
|
|
110
112
|
exports.OAuth2ProviderToJSON = OAuth2ProviderToJSON;
|
|
@@ -126,7 +126,13 @@ export interface OAuth2ProviderRequest {
|
|
|
126
126
|
* @type {Array<string>}
|
|
127
127
|
* @memberof OAuth2ProviderRequest
|
|
128
128
|
*/
|
|
129
|
-
|
|
129
|
+
jwtFederationSources?: Array<string>;
|
|
130
|
+
/**
|
|
131
|
+
*
|
|
132
|
+
* @type {Array<number>}
|
|
133
|
+
* @memberof OAuth2ProviderRequest
|
|
134
|
+
*/
|
|
135
|
+
jwtFederationProviders?: Array<number>;
|
|
130
136
|
}
|
|
131
137
|
/**
|
|
132
138
|
* Check if a given object implements the OAuth2ProviderRequest interface.
|
|
@@ -57,7 +57,8 @@ function OAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
57
57
|
'redirectUris': (json['redirect_uris'].map(RedirectURIRequest_1.RedirectURIRequestFromJSON)),
|
|
58
58
|
'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
|
|
59
59
|
'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
|
|
60
|
-
'
|
|
60
|
+
'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
|
61
|
+
'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
|
61
62
|
};
|
|
62
63
|
}
|
|
63
64
|
exports.OAuth2ProviderRequestFromJSONTyped = OAuth2ProviderRequestFromJSONTyped;
|
|
@@ -86,7 +87,8 @@ function OAuth2ProviderRequestToJSON(value) {
|
|
|
86
87
|
'redirect_uris': (value.redirectUris.map(RedirectURIRequest_1.RedirectURIRequestToJSON)),
|
|
87
88
|
'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
|
|
88
89
|
'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
|
|
89
|
-
'
|
|
90
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
|
91
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
|
90
92
|
};
|
|
91
93
|
}
|
|
92
94
|
exports.OAuth2ProviderRequestToJSON = OAuth2ProviderRequestToJSON;
|
|
@@ -126,7 +126,13 @@ export interface PatchedOAuth2ProviderRequest {
|
|
|
126
126
|
* @type {Array<string>}
|
|
127
127
|
* @memberof PatchedOAuth2ProviderRequest
|
|
128
128
|
*/
|
|
129
|
-
|
|
129
|
+
jwtFederationSources?: Array<string>;
|
|
130
|
+
/**
|
|
131
|
+
*
|
|
132
|
+
* @type {Array<number>}
|
|
133
|
+
* @memberof PatchedOAuth2ProviderRequest
|
|
134
|
+
*/
|
|
135
|
+
jwtFederationProviders?: Array<number>;
|
|
130
136
|
}
|
|
131
137
|
/**
|
|
132
138
|
* Check if a given object implements the PatchedOAuth2ProviderRequest interface.
|
|
@@ -53,7 +53,8 @@ function PatchedOAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
53
53
|
'redirectUris': !(0, runtime_1.exists)(json, 'redirect_uris') ? undefined : (json['redirect_uris'].map(RedirectURIRequest_1.RedirectURIRequestFromJSON)),
|
|
54
54
|
'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
|
|
55
55
|
'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
|
|
56
|
-
'
|
|
56
|
+
'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
|
57
|
+
'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
|
57
58
|
};
|
|
58
59
|
}
|
|
59
60
|
exports.PatchedOAuth2ProviderRequestFromJSONTyped = PatchedOAuth2ProviderRequestFromJSONTyped;
|
|
@@ -82,7 +83,8 @@ function PatchedOAuth2ProviderRequestToJSON(value) {
|
|
|
82
83
|
'redirect_uris': value.redirectUris === undefined ? undefined : (value.redirectUris.map(RedirectURIRequest_1.RedirectURIRequestToJSON)),
|
|
83
84
|
'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
|
|
84
85
|
'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
|
|
85
|
-
'
|
|
86
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
|
87
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
|
86
88
|
};
|
|
87
89
|
}
|
|
88
90
|
exports.PatchedOAuth2ProviderRequestToJSON = PatchedOAuth2ProviderRequestToJSON;
|
|
@@ -117,7 +117,13 @@ export interface PatchedProxyProviderRequest {
|
|
|
117
117
|
* @type {Array<string>}
|
|
118
118
|
* @memberof PatchedProxyProviderRequest
|
|
119
119
|
*/
|
|
120
|
-
|
|
120
|
+
jwtFederationSources?: Array<string>;
|
|
121
|
+
/**
|
|
122
|
+
*
|
|
123
|
+
* @type {Array<number>}
|
|
124
|
+
* @memberof PatchedProxyProviderRequest
|
|
125
|
+
*/
|
|
126
|
+
jwtFederationProviders?: Array<number>;
|
|
121
127
|
/**
|
|
122
128
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
|
123
129
|
* @type {string}
|
|
@@ -49,7 +49,8 @@ function PatchedProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
49
49
|
'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
|
|
50
50
|
'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
51
51
|
'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
52
|
-
'
|
|
52
|
+
'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
|
53
|
+
'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
|
53
54
|
'accessTokenValidity': !(0, runtime_1.exists)(json, 'access_token_validity') ? undefined : json['access_token_validity'],
|
|
54
55
|
'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
|
55
56
|
};
|
|
@@ -79,7 +80,8 @@ function PatchedProxyProviderRequestToJSON(value) {
|
|
|
79
80
|
'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
|
|
80
81
|
'intercept_header_auth': value.interceptHeaderAuth,
|
|
81
82
|
'cookie_domain': value.cookieDomain,
|
|
82
|
-
'
|
|
83
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
|
84
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
|
83
85
|
'access_token_validity': value.accessTokenValidity,
|
|
84
86
|
'refresh_token_validity': value.refreshTokenValidity,
|
|
85
87
|
};
|
|
@@ -184,7 +184,13 @@ export interface ProxyProvider {
|
|
|
184
184
|
* @type {Array<string>}
|
|
185
185
|
* @memberof ProxyProvider
|
|
186
186
|
*/
|
|
187
|
-
|
|
187
|
+
jwtFederationSources?: Array<string>;
|
|
188
|
+
/**
|
|
189
|
+
*
|
|
190
|
+
* @type {Array<number>}
|
|
191
|
+
* @memberof ProxyProvider
|
|
192
|
+
*/
|
|
193
|
+
jwtFederationProviders?: Array<number>;
|
|
188
194
|
/**
|
|
189
195
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
|
190
196
|
* @type {string}
|
|
@@ -77,7 +77,8 @@ function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
77
77
|
'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
78
78
|
'redirectUris': (json['redirect_uris'].map(RedirectURI_1.RedirectURIFromJSON)),
|
|
79
79
|
'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
80
|
-
'
|
|
80
|
+
'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
|
81
|
+
'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
|
81
82
|
'accessTokenValidity': !(0, runtime_1.exists)(json, 'access_token_validity') ? undefined : json['access_token_validity'],
|
|
82
83
|
'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
|
83
84
|
'outpostSet': json['outpost_set'],
|
|
@@ -108,7 +109,8 @@ function ProxyProviderToJSON(value) {
|
|
|
108
109
|
'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
|
|
109
110
|
'intercept_header_auth': value.interceptHeaderAuth,
|
|
110
111
|
'cookie_domain': value.cookieDomain,
|
|
111
|
-
'
|
|
112
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
|
113
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
|
112
114
|
'access_token_validity': value.accessTokenValidity,
|
|
113
115
|
'refresh_token_validity': value.refreshTokenValidity,
|
|
114
116
|
};
|
|
@@ -117,7 +117,13 @@ export interface ProxyProviderRequest {
|
|
|
117
117
|
* @type {Array<string>}
|
|
118
118
|
* @memberof ProxyProviderRequest
|
|
119
119
|
*/
|
|
120
|
-
|
|
120
|
+
jwtFederationSources?: Array<string>;
|
|
121
|
+
/**
|
|
122
|
+
*
|
|
123
|
+
* @type {Array<number>}
|
|
124
|
+
* @memberof ProxyProviderRequest
|
|
125
|
+
*/
|
|
126
|
+
jwtFederationProviders?: Array<number>;
|
|
121
127
|
/**
|
|
122
128
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
|
123
129
|
* @type {string}
|
|
@@ -53,7 +53,8 @@ function ProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
53
53
|
'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
|
|
54
54
|
'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
55
55
|
'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
56
|
-
'
|
|
56
|
+
'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
|
57
|
+
'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
|
57
58
|
'accessTokenValidity': !(0, runtime_1.exists)(json, 'access_token_validity') ? undefined : json['access_token_validity'],
|
|
58
59
|
'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
|
59
60
|
};
|
|
@@ -83,7 +84,8 @@ function ProxyProviderRequestToJSON(value) {
|
|
|
83
84
|
'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
|
|
84
85
|
'intercept_header_auth': value.interceptHeaderAuth,
|
|
85
86
|
'cookie_domain': value.cookieDomain,
|
|
86
|
-
'
|
|
87
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
|
88
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
|
87
89
|
'access_token_validity': value.accessTokenValidity,
|
|
88
90
|
'refresh_token_validity': value.refreshTokenValidity,
|
|
89
91
|
};
|
package/package.json
CHANGED
|
@@ -205,7 +205,13 @@ export interface OAuth2Provider {
|
|
|
205
205
|
* @type {Array<string>}
|
|
206
206
|
* @memberof OAuth2Provider
|
|
207
207
|
*/
|
|
208
|
-
|
|
208
|
+
jwtFederationSources?: Array<string>;
|
|
209
|
+
/**
|
|
210
|
+
*
|
|
211
|
+
* @type {Array<number>}
|
|
212
|
+
* @memberof OAuth2Provider
|
|
213
|
+
*/
|
|
214
|
+
jwtFederationProviders?: Array<number>;
|
|
209
215
|
}
|
|
210
216
|
|
|
211
217
|
/**
|
|
@@ -266,7 +272,8 @@ export function OAuth2ProviderFromJSONTyped(json: any, ignoreDiscriminator: bool
|
|
|
266
272
|
'redirectUris': ((json['redirect_uris'] as Array<any>).map(RedirectURIFromJSON)),
|
|
267
273
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
|
268
274
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
|
269
|
-
'
|
|
275
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
|
276
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
|
270
277
|
};
|
|
271
278
|
}
|
|
272
279
|
|
|
@@ -296,7 +303,8 @@ export function OAuth2ProviderToJSON(value?: OAuth2Provider | null): any {
|
|
|
296
303
|
'redirect_uris': ((value.redirectUris as Array<any>).map(RedirectURIToJSON)),
|
|
297
304
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
|
298
305
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|
|
299
|
-
'
|
|
306
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
|
307
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
|
300
308
|
};
|
|
301
309
|
}
|
|
302
310
|
|
|
@@ -151,7 +151,13 @@ export interface OAuth2ProviderRequest {
|
|
|
151
151
|
* @type {Array<string>}
|
|
152
152
|
* @memberof OAuth2ProviderRequest
|
|
153
153
|
*/
|
|
154
|
-
|
|
154
|
+
jwtFederationSources?: Array<string>;
|
|
155
|
+
/**
|
|
156
|
+
*
|
|
157
|
+
* @type {Array<number>}
|
|
158
|
+
* @memberof OAuth2ProviderRequest
|
|
159
|
+
*/
|
|
160
|
+
jwtFederationProviders?: Array<number>;
|
|
155
161
|
}
|
|
156
162
|
|
|
157
163
|
/**
|
|
@@ -194,7 +200,8 @@ export function OAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscriminato
|
|
|
194
200
|
'redirectUris': ((json['redirect_uris'] as Array<any>).map(RedirectURIRequestFromJSON)),
|
|
195
201
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
|
196
202
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
|
197
|
-
'
|
|
203
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
|
204
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
|
198
205
|
};
|
|
199
206
|
}
|
|
200
207
|
|
|
@@ -224,7 +231,8 @@ export function OAuth2ProviderRequestToJSON(value?: OAuth2ProviderRequest | null
|
|
|
224
231
|
'redirect_uris': ((value.redirectUris as Array<any>).map(RedirectURIRequestToJSON)),
|
|
225
232
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
|
226
233
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|
|
227
|
-
'
|
|
234
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
|
235
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
|
228
236
|
};
|
|
229
237
|
}
|
|
230
238
|
|
|
@@ -151,7 +151,13 @@ export interface PatchedOAuth2ProviderRequest {
|
|
|
151
151
|
* @type {Array<string>}
|
|
152
152
|
* @memberof PatchedOAuth2ProviderRequest
|
|
153
153
|
*/
|
|
154
|
-
|
|
154
|
+
jwtFederationSources?: Array<string>;
|
|
155
|
+
/**
|
|
156
|
+
*
|
|
157
|
+
* @type {Array<number>}
|
|
158
|
+
* @memberof PatchedOAuth2ProviderRequest
|
|
159
|
+
*/
|
|
160
|
+
jwtFederationProviders?: Array<number>;
|
|
155
161
|
}
|
|
156
162
|
|
|
157
163
|
/**
|
|
@@ -190,7 +196,8 @@ export function PatchedOAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscr
|
|
|
190
196
|
'redirectUris': !exists(json, 'redirect_uris') ? undefined : ((json['redirect_uris'] as Array<any>).map(RedirectURIRequestFromJSON)),
|
|
191
197
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
|
192
198
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
|
193
|
-
'
|
|
199
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
|
200
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
|
194
201
|
};
|
|
195
202
|
}
|
|
196
203
|
|
|
@@ -220,7 +227,8 @@ export function PatchedOAuth2ProviderRequestToJSON(value?: PatchedOAuth2Provider
|
|
|
220
227
|
'redirect_uris': value.redirectUris === undefined ? undefined : ((value.redirectUris as Array<any>).map(RedirectURIRequestToJSON)),
|
|
221
228
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
|
222
229
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|
|
223
|
-
'
|
|
230
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
|
231
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
|
224
232
|
};
|
|
225
233
|
}
|
|
226
234
|
|
|
@@ -127,7 +127,13 @@ export interface PatchedProxyProviderRequest {
|
|
|
127
127
|
* @type {Array<string>}
|
|
128
128
|
* @memberof PatchedProxyProviderRequest
|
|
129
129
|
*/
|
|
130
|
-
|
|
130
|
+
jwtFederationSources?: Array<string>;
|
|
131
|
+
/**
|
|
132
|
+
*
|
|
133
|
+
* @type {Array<number>}
|
|
134
|
+
* @memberof PatchedProxyProviderRequest
|
|
135
|
+
*/
|
|
136
|
+
jwtFederationProviders?: Array<number>;
|
|
131
137
|
/**
|
|
132
138
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
|
133
139
|
* @type {string}
|
|
@@ -177,7 +183,8 @@ export function PatchedProxyProviderRequestFromJSONTyped(json: any, ignoreDiscri
|
|
|
177
183
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
|
178
184
|
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
179
185
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
180
|
-
'
|
|
186
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
|
187
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
|
181
188
|
'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
|
|
182
189
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
|
183
190
|
};
|
|
@@ -208,7 +215,8 @@ export function PatchedProxyProviderRequestToJSON(value?: PatchedProxyProviderRe
|
|
|
208
215
|
'mode': ProxyModeToJSON(value.mode),
|
|
209
216
|
'intercept_header_auth': value.interceptHeaderAuth,
|
|
210
217
|
'cookie_domain': value.cookieDomain,
|
|
211
|
-
'
|
|
218
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
|
219
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
|
212
220
|
'access_token_validity': value.accessTokenValidity,
|
|
213
221
|
'refresh_token_validity': value.refreshTokenValidity,
|
|
214
222
|
};
|
|
@@ -199,7 +199,13 @@ export interface ProxyProvider {
|
|
|
199
199
|
* @type {Array<string>}
|
|
200
200
|
* @memberof ProxyProvider
|
|
201
201
|
*/
|
|
202
|
-
|
|
202
|
+
jwtFederationSources?: Array<string>;
|
|
203
|
+
/**
|
|
204
|
+
*
|
|
205
|
+
* @type {Array<number>}
|
|
206
|
+
* @memberof ProxyProvider
|
|
207
|
+
*/
|
|
208
|
+
jwtFederationProviders?: Array<number>;
|
|
203
209
|
/**
|
|
204
210
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
|
205
211
|
* @type {string}
|
|
@@ -282,7 +288,8 @@ export function ProxyProviderFromJSONTyped(json: any, ignoreDiscriminator: boole
|
|
|
282
288
|
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
283
289
|
'redirectUris': ((json['redirect_uris'] as Array<any>).map(RedirectURIFromJSON)),
|
|
284
290
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
285
|
-
'
|
|
291
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
|
292
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
|
286
293
|
'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
|
|
287
294
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
|
288
295
|
'outpostSet': json['outpost_set'],
|
|
@@ -314,7 +321,8 @@ export function ProxyProviderToJSON(value?: ProxyProvider | null): any {
|
|
|
314
321
|
'mode': ProxyModeToJSON(value.mode),
|
|
315
322
|
'intercept_header_auth': value.interceptHeaderAuth,
|
|
316
323
|
'cookie_domain': value.cookieDomain,
|
|
317
|
-
'
|
|
324
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
|
325
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
|
318
326
|
'access_token_validity': value.accessTokenValidity,
|
|
319
327
|
'refresh_token_validity': value.refreshTokenValidity,
|
|
320
328
|
};
|
|
@@ -127,7 +127,13 @@ export interface ProxyProviderRequest {
|
|
|
127
127
|
* @type {Array<string>}
|
|
128
128
|
* @memberof ProxyProviderRequest
|
|
129
129
|
*/
|
|
130
|
-
|
|
130
|
+
jwtFederationSources?: Array<string>;
|
|
131
|
+
/**
|
|
132
|
+
*
|
|
133
|
+
* @type {Array<number>}
|
|
134
|
+
* @memberof ProxyProviderRequest
|
|
135
|
+
*/
|
|
136
|
+
jwtFederationProviders?: Array<number>;
|
|
131
137
|
/**
|
|
132
138
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
|
133
139
|
* @type {string}
|
|
@@ -181,7 +187,8 @@ export function ProxyProviderRequestFromJSONTyped(json: any, ignoreDiscriminator
|
|
|
181
187
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
|
182
188
|
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
|
183
189
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
|
184
|
-
'
|
|
190
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
|
191
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
|
185
192
|
'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
|
|
186
193
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
|
187
194
|
};
|
|
@@ -212,7 +219,8 @@ export function ProxyProviderRequestToJSON(value?: ProxyProviderRequest | null):
|
|
|
212
219
|
'mode': ProxyModeToJSON(value.mode),
|
|
213
220
|
'intercept_header_auth': value.interceptHeaderAuth,
|
|
214
221
|
'cookie_domain': value.cookieDomain,
|
|
215
|
-
'
|
|
222
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
|
223
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
|
216
224
|
'access_token_validity': value.accessTokenValidity,
|
|
217
225
|
'refresh_token_validity': value.refreshTokenValidity,
|
|
218
226
|
};
|