@goauthentik/api 2024.10.4-1732236707 → 2024.10.4-1733219849

Sign up to get free protection for your applications and to get access to all the features.
Files changed (31) hide show
  1. package/dist/esm/models/OAuth2Provider.d.ts +7 -1
  2. package/dist/esm/models/OAuth2Provider.js +4 -2
  3. package/dist/esm/models/OAuth2ProviderRequest.d.ts +7 -1
  4. package/dist/esm/models/OAuth2ProviderRequest.js +4 -2
  5. package/dist/esm/models/PatchedOAuth2ProviderRequest.d.ts +7 -1
  6. package/dist/esm/models/PatchedOAuth2ProviderRequest.js +4 -2
  7. package/dist/esm/models/PatchedProxyProviderRequest.d.ts +7 -1
  8. package/dist/esm/models/PatchedProxyProviderRequest.js +4 -2
  9. package/dist/esm/models/ProxyProvider.d.ts +7 -1
  10. package/dist/esm/models/ProxyProvider.js +4 -2
  11. package/dist/esm/models/ProxyProviderRequest.d.ts +7 -1
  12. package/dist/esm/models/ProxyProviderRequest.js +4 -2
  13. package/dist/models/OAuth2Provider.d.ts +7 -1
  14. package/dist/models/OAuth2Provider.js +4 -2
  15. package/dist/models/OAuth2ProviderRequest.d.ts +7 -1
  16. package/dist/models/OAuth2ProviderRequest.js +4 -2
  17. package/dist/models/PatchedOAuth2ProviderRequest.d.ts +7 -1
  18. package/dist/models/PatchedOAuth2ProviderRequest.js +4 -2
  19. package/dist/models/PatchedProxyProviderRequest.d.ts +7 -1
  20. package/dist/models/PatchedProxyProviderRequest.js +4 -2
  21. package/dist/models/ProxyProvider.d.ts +7 -1
  22. package/dist/models/ProxyProvider.js +4 -2
  23. package/dist/models/ProxyProviderRequest.d.ts +7 -1
  24. package/dist/models/ProxyProviderRequest.js +4 -2
  25. package/package.json +1 -1
  26. package/src/models/OAuth2Provider.ts +11 -3
  27. package/src/models/OAuth2ProviderRequest.ts +11 -3
  28. package/src/models/PatchedOAuth2ProviderRequest.ts +11 -3
  29. package/src/models/PatchedProxyProviderRequest.ts +11 -3
  30. package/src/models/ProxyProvider.ts +11 -3
  31. package/src/models/ProxyProviderRequest.ts +11 -3
@@ -180,7 +180,13 @@ export interface OAuth2Provider {
180
180
  * @type {Array<string>}
181
181
  * @memberof OAuth2Provider
182
182
  */
183
- jwksSources?: Array<string>;
183
+ jwtFederationSources?: Array<string>;
184
+ /**
185
+ *
186
+ * @type {Array<number>}
187
+ * @memberof OAuth2Provider
188
+ */
189
+ jwtFederationProviders?: Array<number>;
184
190
  }
185
191
  /**
186
192
  * Check if a given object implements the OAuth2Provider interface.
@@ -70,7 +70,8 @@ export function OAuth2ProviderFromJSONTyped(json, ignoreDiscriminator) {
70
70
  'redirectUris': (json['redirect_uris'].map(RedirectURIFromJSON)),
71
71
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
72
72
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
73
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
73
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
74
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
74
75
  };
75
76
  }
76
77
  export function OAuth2ProviderToJSON(value) {
@@ -98,6 +99,7 @@ export function OAuth2ProviderToJSON(value) {
98
99
  'redirect_uris': (value.redirectUris.map(RedirectURIToJSON)),
99
100
  'sub_mode': SubModeEnumToJSON(value.subMode),
100
101
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
101
- 'jwks_sources': value.jwksSources,
102
+ 'jwt_federation_sources': value.jwtFederationSources,
103
+ 'jwt_federation_providers': value.jwtFederationProviders,
102
104
  };
103
105
  }
@@ -126,7 +126,13 @@ export interface OAuth2ProviderRequest {
126
126
  * @type {Array<string>}
127
127
  * @memberof OAuth2ProviderRequest
128
128
  */
129
- jwksSources?: Array<string>;
129
+ jwtFederationSources?: Array<string>;
130
+ /**
131
+ *
132
+ * @type {Array<number>}
133
+ * @memberof OAuth2ProviderRequest
134
+ */
135
+ jwtFederationProviders?: Array<number>;
130
136
  }
131
137
  /**
132
138
  * Check if a given object implements the OAuth2ProviderRequest interface.
@@ -52,7 +52,8 @@ export function OAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
52
52
  'redirectUris': (json['redirect_uris'].map(RedirectURIRequestFromJSON)),
53
53
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
54
54
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
55
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
55
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
56
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
56
57
  };
57
58
  }
58
59
  export function OAuth2ProviderRequestToJSON(value) {
@@ -80,6 +81,7 @@ export function OAuth2ProviderRequestToJSON(value) {
80
81
  'redirect_uris': (value.redirectUris.map(RedirectURIRequestToJSON)),
81
82
  'sub_mode': SubModeEnumToJSON(value.subMode),
82
83
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
83
- 'jwks_sources': value.jwksSources,
84
+ 'jwt_federation_sources': value.jwtFederationSources,
85
+ 'jwt_federation_providers': value.jwtFederationProviders,
84
86
  };
85
87
  }
@@ -126,7 +126,13 @@ export interface PatchedOAuth2ProviderRequest {
126
126
  * @type {Array<string>}
127
127
  * @memberof PatchedOAuth2ProviderRequest
128
128
  */
129
- jwksSources?: Array<string>;
129
+ jwtFederationSources?: Array<string>;
130
+ /**
131
+ *
132
+ * @type {Array<number>}
133
+ * @memberof PatchedOAuth2ProviderRequest
134
+ */
135
+ jwtFederationProviders?: Array<number>;
130
136
  }
131
137
  /**
132
138
  * Check if a given object implements the PatchedOAuth2ProviderRequest interface.
@@ -48,7 +48,8 @@ export function PatchedOAuth2ProviderRequestFromJSONTyped(json, ignoreDiscrimina
48
48
  'redirectUris': !exists(json, 'redirect_uris') ? undefined : (json['redirect_uris'].map(RedirectURIRequestFromJSON)),
49
49
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
50
50
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
51
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
51
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
52
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
52
53
  };
53
54
  }
54
55
  export function PatchedOAuth2ProviderRequestToJSON(value) {
@@ -76,6 +77,7 @@ export function PatchedOAuth2ProviderRequestToJSON(value) {
76
77
  'redirect_uris': value.redirectUris === undefined ? undefined : (value.redirectUris.map(RedirectURIRequestToJSON)),
77
78
  'sub_mode': SubModeEnumToJSON(value.subMode),
78
79
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
79
- 'jwks_sources': value.jwksSources,
80
+ 'jwt_federation_sources': value.jwtFederationSources,
81
+ 'jwt_federation_providers': value.jwtFederationProviders,
80
82
  };
81
83
  }
@@ -117,7 +117,13 @@ export interface PatchedProxyProviderRequest {
117
117
  * @type {Array<string>}
118
118
  * @memberof PatchedProxyProviderRequest
119
119
  */
120
- jwksSources?: Array<string>;
120
+ jwtFederationSources?: Array<string>;
121
+ /**
122
+ *
123
+ * @type {Array<number>}
124
+ * @memberof PatchedProxyProviderRequest
125
+ */
126
+ jwtFederationProviders?: Array<number>;
121
127
  /**
122
128
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
123
129
  * @type {string}
@@ -44,7 +44,8 @@ export function PatchedProxyProviderRequestFromJSONTyped(json, ignoreDiscriminat
44
44
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
45
45
  'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
46
46
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
47
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
47
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
48
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
48
49
  'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
49
50
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
50
51
  };
@@ -73,7 +74,8 @@ export function PatchedProxyProviderRequestToJSON(value) {
73
74
  'mode': ProxyModeToJSON(value.mode),
74
75
  'intercept_header_auth': value.interceptHeaderAuth,
75
76
  'cookie_domain': value.cookieDomain,
76
- 'jwks_sources': value.jwksSources,
77
+ 'jwt_federation_sources': value.jwtFederationSources,
78
+ 'jwt_federation_providers': value.jwtFederationProviders,
77
79
  'access_token_validity': value.accessTokenValidity,
78
80
  'refresh_token_validity': value.refreshTokenValidity,
79
81
  };
@@ -184,7 +184,13 @@ export interface ProxyProvider {
184
184
  * @type {Array<string>}
185
185
  * @memberof ProxyProvider
186
186
  */
187
- jwksSources?: Array<string>;
187
+ jwtFederationSources?: Array<string>;
188
+ /**
189
+ *
190
+ * @type {Array<number>}
191
+ * @memberof ProxyProvider
192
+ */
193
+ jwtFederationProviders?: Array<number>;
188
194
  /**
189
195
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
190
196
  * @type {string}
@@ -72,7 +72,8 @@ export function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
72
72
  'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
73
73
  'redirectUris': (json['redirect_uris'].map(RedirectURIFromJSON)),
74
74
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
75
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
75
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
76
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
76
77
  'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
77
78
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
78
79
  'outpostSet': json['outpost_set'],
@@ -102,7 +103,8 @@ export function ProxyProviderToJSON(value) {
102
103
  'mode': ProxyModeToJSON(value.mode),
103
104
  'intercept_header_auth': value.interceptHeaderAuth,
104
105
  'cookie_domain': value.cookieDomain,
105
- 'jwks_sources': value.jwksSources,
106
+ 'jwt_federation_sources': value.jwtFederationSources,
107
+ 'jwt_federation_providers': value.jwtFederationProviders,
106
108
  'access_token_validity': value.accessTokenValidity,
107
109
  'refresh_token_validity': value.refreshTokenValidity,
108
110
  };
@@ -117,7 +117,13 @@ export interface ProxyProviderRequest {
117
117
  * @type {Array<string>}
118
118
  * @memberof ProxyProviderRequest
119
119
  */
120
- jwksSources?: Array<string>;
120
+ jwtFederationSources?: Array<string>;
121
+ /**
122
+ *
123
+ * @type {Array<number>}
124
+ * @memberof ProxyProviderRequest
125
+ */
126
+ jwtFederationProviders?: Array<number>;
121
127
  /**
122
128
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
123
129
  * @type {string}
@@ -48,7 +48,8 @@ export function ProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
48
48
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
49
49
  'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
50
50
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
51
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
51
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
52
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
52
53
  'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
53
54
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
54
55
  };
@@ -77,7 +78,8 @@ export function ProxyProviderRequestToJSON(value) {
77
78
  'mode': ProxyModeToJSON(value.mode),
78
79
  'intercept_header_auth': value.interceptHeaderAuth,
79
80
  'cookie_domain': value.cookieDomain,
80
- 'jwks_sources': value.jwksSources,
81
+ 'jwt_federation_sources': value.jwtFederationSources,
82
+ 'jwt_federation_providers': value.jwtFederationProviders,
81
83
  'access_token_validity': value.accessTokenValidity,
82
84
  'refresh_token_validity': value.refreshTokenValidity,
83
85
  };
@@ -180,7 +180,13 @@ export interface OAuth2Provider {
180
180
  * @type {Array<string>}
181
181
  * @memberof OAuth2Provider
182
182
  */
183
- jwksSources?: Array<string>;
183
+ jwtFederationSources?: Array<string>;
184
+ /**
185
+ *
186
+ * @type {Array<number>}
187
+ * @memberof OAuth2Provider
188
+ */
189
+ jwtFederationProviders?: Array<number>;
184
190
  }
185
191
  /**
186
192
  * Check if a given object implements the OAuth2Provider interface.
@@ -75,7 +75,8 @@ function OAuth2ProviderFromJSONTyped(json, ignoreDiscriminator) {
75
75
  'redirectUris': (json['redirect_uris'].map(RedirectURI_1.RedirectURIFromJSON)),
76
76
  'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
77
77
  'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
78
- 'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
78
+ 'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
79
+ 'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
79
80
  };
80
81
  }
81
82
  exports.OAuth2ProviderFromJSONTyped = OAuth2ProviderFromJSONTyped;
@@ -104,7 +105,8 @@ function OAuth2ProviderToJSON(value) {
104
105
  'redirect_uris': (value.redirectUris.map(RedirectURI_1.RedirectURIToJSON)),
105
106
  'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
106
107
  'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
107
- 'jwks_sources': value.jwksSources,
108
+ 'jwt_federation_sources': value.jwtFederationSources,
109
+ 'jwt_federation_providers': value.jwtFederationProviders,
108
110
  };
109
111
  }
110
112
  exports.OAuth2ProviderToJSON = OAuth2ProviderToJSON;
@@ -126,7 +126,13 @@ export interface OAuth2ProviderRequest {
126
126
  * @type {Array<string>}
127
127
  * @memberof OAuth2ProviderRequest
128
128
  */
129
- jwksSources?: Array<string>;
129
+ jwtFederationSources?: Array<string>;
130
+ /**
131
+ *
132
+ * @type {Array<number>}
133
+ * @memberof OAuth2ProviderRequest
134
+ */
135
+ jwtFederationProviders?: Array<number>;
130
136
  }
131
137
  /**
132
138
  * Check if a given object implements the OAuth2ProviderRequest interface.
@@ -57,7 +57,8 @@ function OAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
57
57
  'redirectUris': (json['redirect_uris'].map(RedirectURIRequest_1.RedirectURIRequestFromJSON)),
58
58
  'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
59
59
  'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
60
- 'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
60
+ 'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
61
+ 'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
61
62
  };
62
63
  }
63
64
  exports.OAuth2ProviderRequestFromJSONTyped = OAuth2ProviderRequestFromJSONTyped;
@@ -86,7 +87,8 @@ function OAuth2ProviderRequestToJSON(value) {
86
87
  'redirect_uris': (value.redirectUris.map(RedirectURIRequest_1.RedirectURIRequestToJSON)),
87
88
  'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
88
89
  'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
89
- 'jwks_sources': value.jwksSources,
90
+ 'jwt_federation_sources': value.jwtFederationSources,
91
+ 'jwt_federation_providers': value.jwtFederationProviders,
90
92
  };
91
93
  }
92
94
  exports.OAuth2ProviderRequestToJSON = OAuth2ProviderRequestToJSON;
@@ -126,7 +126,13 @@ export interface PatchedOAuth2ProviderRequest {
126
126
  * @type {Array<string>}
127
127
  * @memberof PatchedOAuth2ProviderRequest
128
128
  */
129
- jwksSources?: Array<string>;
129
+ jwtFederationSources?: Array<string>;
130
+ /**
131
+ *
132
+ * @type {Array<number>}
133
+ * @memberof PatchedOAuth2ProviderRequest
134
+ */
135
+ jwtFederationProviders?: Array<number>;
130
136
  }
131
137
  /**
132
138
  * Check if a given object implements the PatchedOAuth2ProviderRequest interface.
@@ -53,7 +53,8 @@ function PatchedOAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
53
53
  'redirectUris': !(0, runtime_1.exists)(json, 'redirect_uris') ? undefined : (json['redirect_uris'].map(RedirectURIRequest_1.RedirectURIRequestFromJSON)),
54
54
  'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
55
55
  'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
56
- 'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
56
+ 'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
57
+ 'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
57
58
  };
58
59
  }
59
60
  exports.PatchedOAuth2ProviderRequestFromJSONTyped = PatchedOAuth2ProviderRequestFromJSONTyped;
@@ -82,7 +83,8 @@ function PatchedOAuth2ProviderRequestToJSON(value) {
82
83
  'redirect_uris': value.redirectUris === undefined ? undefined : (value.redirectUris.map(RedirectURIRequest_1.RedirectURIRequestToJSON)),
83
84
  'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
84
85
  'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
85
- 'jwks_sources': value.jwksSources,
86
+ 'jwt_federation_sources': value.jwtFederationSources,
87
+ 'jwt_federation_providers': value.jwtFederationProviders,
86
88
  };
87
89
  }
88
90
  exports.PatchedOAuth2ProviderRequestToJSON = PatchedOAuth2ProviderRequestToJSON;
@@ -117,7 +117,13 @@ export interface PatchedProxyProviderRequest {
117
117
  * @type {Array<string>}
118
118
  * @memberof PatchedProxyProviderRequest
119
119
  */
120
- jwksSources?: Array<string>;
120
+ jwtFederationSources?: Array<string>;
121
+ /**
122
+ *
123
+ * @type {Array<number>}
124
+ * @memberof PatchedProxyProviderRequest
125
+ */
126
+ jwtFederationProviders?: Array<number>;
121
127
  /**
122
128
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
123
129
  * @type {string}
@@ -49,7 +49,8 @@ function PatchedProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
49
49
  'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
50
50
  'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
51
51
  'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
52
- 'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
52
+ 'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
53
+ 'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
53
54
  'accessTokenValidity': !(0, runtime_1.exists)(json, 'access_token_validity') ? undefined : json['access_token_validity'],
54
55
  'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
55
56
  };
@@ -79,7 +80,8 @@ function PatchedProxyProviderRequestToJSON(value) {
79
80
  'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
80
81
  'intercept_header_auth': value.interceptHeaderAuth,
81
82
  'cookie_domain': value.cookieDomain,
82
- 'jwks_sources': value.jwksSources,
83
+ 'jwt_federation_sources': value.jwtFederationSources,
84
+ 'jwt_federation_providers': value.jwtFederationProviders,
83
85
  'access_token_validity': value.accessTokenValidity,
84
86
  'refresh_token_validity': value.refreshTokenValidity,
85
87
  };
@@ -184,7 +184,13 @@ export interface ProxyProvider {
184
184
  * @type {Array<string>}
185
185
  * @memberof ProxyProvider
186
186
  */
187
- jwksSources?: Array<string>;
187
+ jwtFederationSources?: Array<string>;
188
+ /**
189
+ *
190
+ * @type {Array<number>}
191
+ * @memberof ProxyProvider
192
+ */
193
+ jwtFederationProviders?: Array<number>;
188
194
  /**
189
195
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
190
196
  * @type {string}
@@ -77,7 +77,8 @@ function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
77
77
  'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
78
78
  'redirectUris': (json['redirect_uris'].map(RedirectURI_1.RedirectURIFromJSON)),
79
79
  'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
80
- 'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
80
+ 'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
81
+ 'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
81
82
  'accessTokenValidity': !(0, runtime_1.exists)(json, 'access_token_validity') ? undefined : json['access_token_validity'],
82
83
  'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
83
84
  'outpostSet': json['outpost_set'],
@@ -108,7 +109,8 @@ function ProxyProviderToJSON(value) {
108
109
  'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
109
110
  'intercept_header_auth': value.interceptHeaderAuth,
110
111
  'cookie_domain': value.cookieDomain,
111
- 'jwks_sources': value.jwksSources,
112
+ 'jwt_federation_sources': value.jwtFederationSources,
113
+ 'jwt_federation_providers': value.jwtFederationProviders,
112
114
  'access_token_validity': value.accessTokenValidity,
113
115
  'refresh_token_validity': value.refreshTokenValidity,
114
116
  };
@@ -117,7 +117,13 @@ export interface ProxyProviderRequest {
117
117
  * @type {Array<string>}
118
118
  * @memberof ProxyProviderRequest
119
119
  */
120
- jwksSources?: Array<string>;
120
+ jwtFederationSources?: Array<string>;
121
+ /**
122
+ *
123
+ * @type {Array<number>}
124
+ * @memberof ProxyProviderRequest
125
+ */
126
+ jwtFederationProviders?: Array<number>;
121
127
  /**
122
128
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
123
129
  * @type {string}
@@ -53,7 +53,8 @@ function ProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
53
53
  'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
54
54
  'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
55
55
  'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
56
- 'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
56
+ 'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
57
+ 'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
57
58
  'accessTokenValidity': !(0, runtime_1.exists)(json, 'access_token_validity') ? undefined : json['access_token_validity'],
58
59
  'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
59
60
  };
@@ -83,7 +84,8 @@ function ProxyProviderRequestToJSON(value) {
83
84
  'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
84
85
  'intercept_header_auth': value.interceptHeaderAuth,
85
86
  'cookie_domain': value.cookieDomain,
86
- 'jwks_sources': value.jwksSources,
87
+ 'jwt_federation_sources': value.jwtFederationSources,
88
+ 'jwt_federation_providers': value.jwtFederationProviders,
87
89
  'access_token_validity': value.accessTokenValidity,
88
90
  'refresh_token_validity': value.refreshTokenValidity,
89
91
  };
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goauthentik/api",
3
- "version": "2024.10.4-1732236707",
3
+ "version": "2024.10.4-1733219849",
4
4
  "description": "OpenAPI client for @goauthentik/api",
5
5
  "author": "OpenAPI-Generator",
6
6
  "repository": {
@@ -205,7 +205,13 @@ export interface OAuth2Provider {
205
205
  * @type {Array<string>}
206
206
  * @memberof OAuth2Provider
207
207
  */
208
- jwksSources?: Array<string>;
208
+ jwtFederationSources?: Array<string>;
209
+ /**
210
+ *
211
+ * @type {Array<number>}
212
+ * @memberof OAuth2Provider
213
+ */
214
+ jwtFederationProviders?: Array<number>;
209
215
  }
210
216
 
211
217
  /**
@@ -266,7 +272,8 @@ export function OAuth2ProviderFromJSONTyped(json: any, ignoreDiscriminator: bool
266
272
  'redirectUris': ((json['redirect_uris'] as Array<any>).map(RedirectURIFromJSON)),
267
273
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
268
274
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
269
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
275
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
276
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
270
277
  };
271
278
  }
272
279
 
@@ -296,7 +303,8 @@ export function OAuth2ProviderToJSON(value?: OAuth2Provider | null): any {
296
303
  'redirect_uris': ((value.redirectUris as Array<any>).map(RedirectURIToJSON)),
297
304
  'sub_mode': SubModeEnumToJSON(value.subMode),
298
305
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
299
- 'jwks_sources': value.jwksSources,
306
+ 'jwt_federation_sources': value.jwtFederationSources,
307
+ 'jwt_federation_providers': value.jwtFederationProviders,
300
308
  };
301
309
  }
302
310
 
@@ -151,7 +151,13 @@ export interface OAuth2ProviderRequest {
151
151
  * @type {Array<string>}
152
152
  * @memberof OAuth2ProviderRequest
153
153
  */
154
- jwksSources?: Array<string>;
154
+ jwtFederationSources?: Array<string>;
155
+ /**
156
+ *
157
+ * @type {Array<number>}
158
+ * @memberof OAuth2ProviderRequest
159
+ */
160
+ jwtFederationProviders?: Array<number>;
155
161
  }
156
162
 
157
163
  /**
@@ -194,7 +200,8 @@ export function OAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscriminato
194
200
  'redirectUris': ((json['redirect_uris'] as Array<any>).map(RedirectURIRequestFromJSON)),
195
201
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
196
202
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
197
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
203
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
204
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
198
205
  };
199
206
  }
200
207
 
@@ -224,7 +231,8 @@ export function OAuth2ProviderRequestToJSON(value?: OAuth2ProviderRequest | null
224
231
  'redirect_uris': ((value.redirectUris as Array<any>).map(RedirectURIRequestToJSON)),
225
232
  'sub_mode': SubModeEnumToJSON(value.subMode),
226
233
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
227
- 'jwks_sources': value.jwksSources,
234
+ 'jwt_federation_sources': value.jwtFederationSources,
235
+ 'jwt_federation_providers': value.jwtFederationProviders,
228
236
  };
229
237
  }
230
238
 
@@ -151,7 +151,13 @@ export interface PatchedOAuth2ProviderRequest {
151
151
  * @type {Array<string>}
152
152
  * @memberof PatchedOAuth2ProviderRequest
153
153
  */
154
- jwksSources?: Array<string>;
154
+ jwtFederationSources?: Array<string>;
155
+ /**
156
+ *
157
+ * @type {Array<number>}
158
+ * @memberof PatchedOAuth2ProviderRequest
159
+ */
160
+ jwtFederationProviders?: Array<number>;
155
161
  }
156
162
 
157
163
  /**
@@ -190,7 +196,8 @@ export function PatchedOAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscr
190
196
  'redirectUris': !exists(json, 'redirect_uris') ? undefined : ((json['redirect_uris'] as Array<any>).map(RedirectURIRequestFromJSON)),
191
197
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
192
198
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
193
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
199
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
200
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
194
201
  };
195
202
  }
196
203
 
@@ -220,7 +227,8 @@ export function PatchedOAuth2ProviderRequestToJSON(value?: PatchedOAuth2Provider
220
227
  'redirect_uris': value.redirectUris === undefined ? undefined : ((value.redirectUris as Array<any>).map(RedirectURIRequestToJSON)),
221
228
  'sub_mode': SubModeEnumToJSON(value.subMode),
222
229
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
223
- 'jwks_sources': value.jwksSources,
230
+ 'jwt_federation_sources': value.jwtFederationSources,
231
+ 'jwt_federation_providers': value.jwtFederationProviders,
224
232
  };
225
233
  }
226
234
 
@@ -127,7 +127,13 @@ export interface PatchedProxyProviderRequest {
127
127
  * @type {Array<string>}
128
128
  * @memberof PatchedProxyProviderRequest
129
129
  */
130
- jwksSources?: Array<string>;
130
+ jwtFederationSources?: Array<string>;
131
+ /**
132
+ *
133
+ * @type {Array<number>}
134
+ * @memberof PatchedProxyProviderRequest
135
+ */
136
+ jwtFederationProviders?: Array<number>;
131
137
  /**
132
138
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
133
139
  * @type {string}
@@ -177,7 +183,8 @@ export function PatchedProxyProviderRequestFromJSONTyped(json: any, ignoreDiscri
177
183
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
178
184
  'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
179
185
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
180
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
186
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
187
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
181
188
  'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
182
189
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
183
190
  };
@@ -208,7 +215,8 @@ export function PatchedProxyProviderRequestToJSON(value?: PatchedProxyProviderRe
208
215
  'mode': ProxyModeToJSON(value.mode),
209
216
  'intercept_header_auth': value.interceptHeaderAuth,
210
217
  'cookie_domain': value.cookieDomain,
211
- 'jwks_sources': value.jwksSources,
218
+ 'jwt_federation_sources': value.jwtFederationSources,
219
+ 'jwt_federation_providers': value.jwtFederationProviders,
212
220
  'access_token_validity': value.accessTokenValidity,
213
221
  'refresh_token_validity': value.refreshTokenValidity,
214
222
  };
@@ -199,7 +199,13 @@ export interface ProxyProvider {
199
199
  * @type {Array<string>}
200
200
  * @memberof ProxyProvider
201
201
  */
202
- jwksSources?: Array<string>;
202
+ jwtFederationSources?: Array<string>;
203
+ /**
204
+ *
205
+ * @type {Array<number>}
206
+ * @memberof ProxyProvider
207
+ */
208
+ jwtFederationProviders?: Array<number>;
203
209
  /**
204
210
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
205
211
  * @type {string}
@@ -282,7 +288,8 @@ export function ProxyProviderFromJSONTyped(json: any, ignoreDiscriminator: boole
282
288
  'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
283
289
  'redirectUris': ((json['redirect_uris'] as Array<any>).map(RedirectURIFromJSON)),
284
290
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
285
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
291
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
292
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
286
293
  'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
287
294
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
288
295
  'outpostSet': json['outpost_set'],
@@ -314,7 +321,8 @@ export function ProxyProviderToJSON(value?: ProxyProvider | null): any {
314
321
  'mode': ProxyModeToJSON(value.mode),
315
322
  'intercept_header_auth': value.interceptHeaderAuth,
316
323
  'cookie_domain': value.cookieDomain,
317
- 'jwks_sources': value.jwksSources,
324
+ 'jwt_federation_sources': value.jwtFederationSources,
325
+ 'jwt_federation_providers': value.jwtFederationProviders,
318
326
  'access_token_validity': value.accessTokenValidity,
319
327
  'refresh_token_validity': value.refreshTokenValidity,
320
328
  };
@@ -127,7 +127,13 @@ export interface ProxyProviderRequest {
127
127
  * @type {Array<string>}
128
128
  * @memberof ProxyProviderRequest
129
129
  */
130
- jwksSources?: Array<string>;
130
+ jwtFederationSources?: Array<string>;
131
+ /**
132
+ *
133
+ * @type {Array<number>}
134
+ * @memberof ProxyProviderRequest
135
+ */
136
+ jwtFederationProviders?: Array<number>;
131
137
  /**
132
138
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
133
139
  * @type {string}
@@ -181,7 +187,8 @@ export function ProxyProviderRequestFromJSONTyped(json: any, ignoreDiscriminator
181
187
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
182
188
  'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
183
189
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
184
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
190
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
191
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
185
192
  'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
186
193
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
187
194
  };
@@ -212,7 +219,8 @@ export function ProxyProviderRequestToJSON(value?: ProxyProviderRequest | null):
212
219
  'mode': ProxyModeToJSON(value.mode),
213
220
  'intercept_header_auth': value.interceptHeaderAuth,
214
221
  'cookie_domain': value.cookieDomain,
215
- 'jwks_sources': value.jwksSources,
222
+ 'jwt_federation_sources': value.jwtFederationSources,
223
+ 'jwt_federation_providers': value.jwtFederationProviders,
216
224
  'access_token_validity': value.accessTokenValidity,
217
225
  'refresh_token_validity': value.refreshTokenValidity,
218
226
  };