@goauthentik/api 2024.10.4-1732236707 → 2024.10.4-1733219849
Sign up to get free protection for your applications and to get access to all the features.
- package/dist/esm/models/OAuth2Provider.d.ts +7 -1
- package/dist/esm/models/OAuth2Provider.js +4 -2
- package/dist/esm/models/OAuth2ProviderRequest.d.ts +7 -1
- package/dist/esm/models/OAuth2ProviderRequest.js +4 -2
- package/dist/esm/models/PatchedOAuth2ProviderRequest.d.ts +7 -1
- package/dist/esm/models/PatchedOAuth2ProviderRequest.js +4 -2
- package/dist/esm/models/PatchedProxyProviderRequest.d.ts +7 -1
- package/dist/esm/models/PatchedProxyProviderRequest.js +4 -2
- package/dist/esm/models/ProxyProvider.d.ts +7 -1
- package/dist/esm/models/ProxyProvider.js +4 -2
- package/dist/esm/models/ProxyProviderRequest.d.ts +7 -1
- package/dist/esm/models/ProxyProviderRequest.js +4 -2
- package/dist/models/OAuth2Provider.d.ts +7 -1
- package/dist/models/OAuth2Provider.js +4 -2
- package/dist/models/OAuth2ProviderRequest.d.ts +7 -1
- package/dist/models/OAuth2ProviderRequest.js +4 -2
- package/dist/models/PatchedOAuth2ProviderRequest.d.ts +7 -1
- package/dist/models/PatchedOAuth2ProviderRequest.js +4 -2
- package/dist/models/PatchedProxyProviderRequest.d.ts +7 -1
- package/dist/models/PatchedProxyProviderRequest.js +4 -2
- package/dist/models/ProxyProvider.d.ts +7 -1
- package/dist/models/ProxyProvider.js +4 -2
- package/dist/models/ProxyProviderRequest.d.ts +7 -1
- package/dist/models/ProxyProviderRequest.js +4 -2
- package/package.json +1 -1
- package/src/models/OAuth2Provider.ts +11 -3
- package/src/models/OAuth2ProviderRequest.ts +11 -3
- package/src/models/PatchedOAuth2ProviderRequest.ts +11 -3
- package/src/models/PatchedProxyProviderRequest.ts +11 -3
- package/src/models/ProxyProvider.ts +11 -3
- package/src/models/ProxyProviderRequest.ts +11 -3
@@ -180,7 +180,13 @@ export interface OAuth2Provider {
|
|
180
180
|
* @type {Array<string>}
|
181
181
|
* @memberof OAuth2Provider
|
182
182
|
*/
|
183
|
-
|
183
|
+
jwtFederationSources?: Array<string>;
|
184
|
+
/**
|
185
|
+
*
|
186
|
+
* @type {Array<number>}
|
187
|
+
* @memberof OAuth2Provider
|
188
|
+
*/
|
189
|
+
jwtFederationProviders?: Array<number>;
|
184
190
|
}
|
185
191
|
/**
|
186
192
|
* Check if a given object implements the OAuth2Provider interface.
|
@@ -70,7 +70,8 @@ export function OAuth2ProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
70
70
|
'redirectUris': (json['redirect_uris'].map(RedirectURIFromJSON)),
|
71
71
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
72
72
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
73
|
-
'
|
73
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
74
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
74
75
|
};
|
75
76
|
}
|
76
77
|
export function OAuth2ProviderToJSON(value) {
|
@@ -98,6 +99,7 @@ export function OAuth2ProviderToJSON(value) {
|
|
98
99
|
'redirect_uris': (value.redirectUris.map(RedirectURIToJSON)),
|
99
100
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
100
101
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|
101
|
-
'
|
102
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
103
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
102
104
|
};
|
103
105
|
}
|
@@ -126,7 +126,13 @@ export interface OAuth2ProviderRequest {
|
|
126
126
|
* @type {Array<string>}
|
127
127
|
* @memberof OAuth2ProviderRequest
|
128
128
|
*/
|
129
|
-
|
129
|
+
jwtFederationSources?: Array<string>;
|
130
|
+
/**
|
131
|
+
*
|
132
|
+
* @type {Array<number>}
|
133
|
+
* @memberof OAuth2ProviderRequest
|
134
|
+
*/
|
135
|
+
jwtFederationProviders?: Array<number>;
|
130
136
|
}
|
131
137
|
/**
|
132
138
|
* Check if a given object implements the OAuth2ProviderRequest interface.
|
@@ -52,7 +52,8 @@ export function OAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
52
52
|
'redirectUris': (json['redirect_uris'].map(RedirectURIRequestFromJSON)),
|
53
53
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
54
54
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
55
|
-
'
|
55
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
56
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
56
57
|
};
|
57
58
|
}
|
58
59
|
export function OAuth2ProviderRequestToJSON(value) {
|
@@ -80,6 +81,7 @@ export function OAuth2ProviderRequestToJSON(value) {
|
|
80
81
|
'redirect_uris': (value.redirectUris.map(RedirectURIRequestToJSON)),
|
81
82
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
82
83
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|
83
|
-
'
|
84
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
85
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
84
86
|
};
|
85
87
|
}
|
@@ -126,7 +126,13 @@ export interface PatchedOAuth2ProviderRequest {
|
|
126
126
|
* @type {Array<string>}
|
127
127
|
* @memberof PatchedOAuth2ProviderRequest
|
128
128
|
*/
|
129
|
-
|
129
|
+
jwtFederationSources?: Array<string>;
|
130
|
+
/**
|
131
|
+
*
|
132
|
+
* @type {Array<number>}
|
133
|
+
* @memberof PatchedOAuth2ProviderRequest
|
134
|
+
*/
|
135
|
+
jwtFederationProviders?: Array<number>;
|
130
136
|
}
|
131
137
|
/**
|
132
138
|
* Check if a given object implements the PatchedOAuth2ProviderRequest interface.
|
@@ -48,7 +48,8 @@ export function PatchedOAuth2ProviderRequestFromJSONTyped(json, ignoreDiscrimina
|
|
48
48
|
'redirectUris': !exists(json, 'redirect_uris') ? undefined : (json['redirect_uris'].map(RedirectURIRequestFromJSON)),
|
49
49
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
50
50
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
51
|
-
'
|
51
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
52
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
52
53
|
};
|
53
54
|
}
|
54
55
|
export function PatchedOAuth2ProviderRequestToJSON(value) {
|
@@ -76,6 +77,7 @@ export function PatchedOAuth2ProviderRequestToJSON(value) {
|
|
76
77
|
'redirect_uris': value.redirectUris === undefined ? undefined : (value.redirectUris.map(RedirectURIRequestToJSON)),
|
77
78
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
78
79
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|
79
|
-
'
|
80
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
81
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
80
82
|
};
|
81
83
|
}
|
@@ -117,7 +117,13 @@ export interface PatchedProxyProviderRequest {
|
|
117
117
|
* @type {Array<string>}
|
118
118
|
* @memberof PatchedProxyProviderRequest
|
119
119
|
*/
|
120
|
-
|
120
|
+
jwtFederationSources?: Array<string>;
|
121
|
+
/**
|
122
|
+
*
|
123
|
+
* @type {Array<number>}
|
124
|
+
* @memberof PatchedProxyProviderRequest
|
125
|
+
*/
|
126
|
+
jwtFederationProviders?: Array<number>;
|
121
127
|
/**
|
122
128
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
123
129
|
* @type {string}
|
@@ -44,7 +44,8 @@ export function PatchedProxyProviderRequestFromJSONTyped(json, ignoreDiscriminat
|
|
44
44
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
45
45
|
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
46
46
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
47
|
-
'
|
47
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
48
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
48
49
|
'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
|
49
50
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
50
51
|
};
|
@@ -73,7 +74,8 @@ export function PatchedProxyProviderRequestToJSON(value) {
|
|
73
74
|
'mode': ProxyModeToJSON(value.mode),
|
74
75
|
'intercept_header_auth': value.interceptHeaderAuth,
|
75
76
|
'cookie_domain': value.cookieDomain,
|
76
|
-
'
|
77
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
78
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
77
79
|
'access_token_validity': value.accessTokenValidity,
|
78
80
|
'refresh_token_validity': value.refreshTokenValidity,
|
79
81
|
};
|
@@ -184,7 +184,13 @@ export interface ProxyProvider {
|
|
184
184
|
* @type {Array<string>}
|
185
185
|
* @memberof ProxyProvider
|
186
186
|
*/
|
187
|
-
|
187
|
+
jwtFederationSources?: Array<string>;
|
188
|
+
/**
|
189
|
+
*
|
190
|
+
* @type {Array<number>}
|
191
|
+
* @memberof ProxyProvider
|
192
|
+
*/
|
193
|
+
jwtFederationProviders?: Array<number>;
|
188
194
|
/**
|
189
195
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
190
196
|
* @type {string}
|
@@ -72,7 +72,8 @@ export function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
72
72
|
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
73
73
|
'redirectUris': (json['redirect_uris'].map(RedirectURIFromJSON)),
|
74
74
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
75
|
-
'
|
75
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
76
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
76
77
|
'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
|
77
78
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
78
79
|
'outpostSet': json['outpost_set'],
|
@@ -102,7 +103,8 @@ export function ProxyProviderToJSON(value) {
|
|
102
103
|
'mode': ProxyModeToJSON(value.mode),
|
103
104
|
'intercept_header_auth': value.interceptHeaderAuth,
|
104
105
|
'cookie_domain': value.cookieDomain,
|
105
|
-
'
|
106
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
107
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
106
108
|
'access_token_validity': value.accessTokenValidity,
|
107
109
|
'refresh_token_validity': value.refreshTokenValidity,
|
108
110
|
};
|
@@ -117,7 +117,13 @@ export interface ProxyProviderRequest {
|
|
117
117
|
* @type {Array<string>}
|
118
118
|
* @memberof ProxyProviderRequest
|
119
119
|
*/
|
120
|
-
|
120
|
+
jwtFederationSources?: Array<string>;
|
121
|
+
/**
|
122
|
+
*
|
123
|
+
* @type {Array<number>}
|
124
|
+
* @memberof ProxyProviderRequest
|
125
|
+
*/
|
126
|
+
jwtFederationProviders?: Array<number>;
|
121
127
|
/**
|
122
128
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
123
129
|
* @type {string}
|
@@ -48,7 +48,8 @@ export function ProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
48
48
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
49
49
|
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
50
50
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
51
|
-
'
|
51
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
52
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
52
53
|
'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
|
53
54
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
54
55
|
};
|
@@ -77,7 +78,8 @@ export function ProxyProviderRequestToJSON(value) {
|
|
77
78
|
'mode': ProxyModeToJSON(value.mode),
|
78
79
|
'intercept_header_auth': value.interceptHeaderAuth,
|
79
80
|
'cookie_domain': value.cookieDomain,
|
80
|
-
'
|
81
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
82
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
81
83
|
'access_token_validity': value.accessTokenValidity,
|
82
84
|
'refresh_token_validity': value.refreshTokenValidity,
|
83
85
|
};
|
@@ -180,7 +180,13 @@ export interface OAuth2Provider {
|
|
180
180
|
* @type {Array<string>}
|
181
181
|
* @memberof OAuth2Provider
|
182
182
|
*/
|
183
|
-
|
183
|
+
jwtFederationSources?: Array<string>;
|
184
|
+
/**
|
185
|
+
*
|
186
|
+
* @type {Array<number>}
|
187
|
+
* @memberof OAuth2Provider
|
188
|
+
*/
|
189
|
+
jwtFederationProviders?: Array<number>;
|
184
190
|
}
|
185
191
|
/**
|
186
192
|
* Check if a given object implements the OAuth2Provider interface.
|
@@ -75,7 +75,8 @@ function OAuth2ProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
75
75
|
'redirectUris': (json['redirect_uris'].map(RedirectURI_1.RedirectURIFromJSON)),
|
76
76
|
'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
|
77
77
|
'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
|
78
|
-
'
|
78
|
+
'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
79
|
+
'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
79
80
|
};
|
80
81
|
}
|
81
82
|
exports.OAuth2ProviderFromJSONTyped = OAuth2ProviderFromJSONTyped;
|
@@ -104,7 +105,8 @@ function OAuth2ProviderToJSON(value) {
|
|
104
105
|
'redirect_uris': (value.redirectUris.map(RedirectURI_1.RedirectURIToJSON)),
|
105
106
|
'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
|
106
107
|
'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
|
107
|
-
'
|
108
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
109
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
108
110
|
};
|
109
111
|
}
|
110
112
|
exports.OAuth2ProviderToJSON = OAuth2ProviderToJSON;
|
@@ -126,7 +126,13 @@ export interface OAuth2ProviderRequest {
|
|
126
126
|
* @type {Array<string>}
|
127
127
|
* @memberof OAuth2ProviderRequest
|
128
128
|
*/
|
129
|
-
|
129
|
+
jwtFederationSources?: Array<string>;
|
130
|
+
/**
|
131
|
+
*
|
132
|
+
* @type {Array<number>}
|
133
|
+
* @memberof OAuth2ProviderRequest
|
134
|
+
*/
|
135
|
+
jwtFederationProviders?: Array<number>;
|
130
136
|
}
|
131
137
|
/**
|
132
138
|
* Check if a given object implements the OAuth2ProviderRequest interface.
|
@@ -57,7 +57,8 @@ function OAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
57
57
|
'redirectUris': (json['redirect_uris'].map(RedirectURIRequest_1.RedirectURIRequestFromJSON)),
|
58
58
|
'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
|
59
59
|
'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
|
60
|
-
'
|
60
|
+
'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
61
|
+
'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
61
62
|
};
|
62
63
|
}
|
63
64
|
exports.OAuth2ProviderRequestFromJSONTyped = OAuth2ProviderRequestFromJSONTyped;
|
@@ -86,7 +87,8 @@ function OAuth2ProviderRequestToJSON(value) {
|
|
86
87
|
'redirect_uris': (value.redirectUris.map(RedirectURIRequest_1.RedirectURIRequestToJSON)),
|
87
88
|
'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
|
88
89
|
'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
|
89
|
-
'
|
90
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
91
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
90
92
|
};
|
91
93
|
}
|
92
94
|
exports.OAuth2ProviderRequestToJSON = OAuth2ProviderRequestToJSON;
|
@@ -126,7 +126,13 @@ export interface PatchedOAuth2ProviderRequest {
|
|
126
126
|
* @type {Array<string>}
|
127
127
|
* @memberof PatchedOAuth2ProviderRequest
|
128
128
|
*/
|
129
|
-
|
129
|
+
jwtFederationSources?: Array<string>;
|
130
|
+
/**
|
131
|
+
*
|
132
|
+
* @type {Array<number>}
|
133
|
+
* @memberof PatchedOAuth2ProviderRequest
|
134
|
+
*/
|
135
|
+
jwtFederationProviders?: Array<number>;
|
130
136
|
}
|
131
137
|
/**
|
132
138
|
* Check if a given object implements the PatchedOAuth2ProviderRequest interface.
|
@@ -53,7 +53,8 @@ function PatchedOAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
53
53
|
'redirectUris': !(0, runtime_1.exists)(json, 'redirect_uris') ? undefined : (json['redirect_uris'].map(RedirectURIRequest_1.RedirectURIRequestFromJSON)),
|
54
54
|
'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
|
55
55
|
'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
|
56
|
-
'
|
56
|
+
'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
57
|
+
'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
57
58
|
};
|
58
59
|
}
|
59
60
|
exports.PatchedOAuth2ProviderRequestFromJSONTyped = PatchedOAuth2ProviderRequestFromJSONTyped;
|
@@ -82,7 +83,8 @@ function PatchedOAuth2ProviderRequestToJSON(value) {
|
|
82
83
|
'redirect_uris': value.redirectUris === undefined ? undefined : (value.redirectUris.map(RedirectURIRequest_1.RedirectURIRequestToJSON)),
|
83
84
|
'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
|
84
85
|
'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
|
85
|
-
'
|
86
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
87
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
86
88
|
};
|
87
89
|
}
|
88
90
|
exports.PatchedOAuth2ProviderRequestToJSON = PatchedOAuth2ProviderRequestToJSON;
|
@@ -117,7 +117,13 @@ export interface PatchedProxyProviderRequest {
|
|
117
117
|
* @type {Array<string>}
|
118
118
|
* @memberof PatchedProxyProviderRequest
|
119
119
|
*/
|
120
|
-
|
120
|
+
jwtFederationSources?: Array<string>;
|
121
|
+
/**
|
122
|
+
*
|
123
|
+
* @type {Array<number>}
|
124
|
+
* @memberof PatchedProxyProviderRequest
|
125
|
+
*/
|
126
|
+
jwtFederationProviders?: Array<number>;
|
121
127
|
/**
|
122
128
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
123
129
|
* @type {string}
|
@@ -49,7 +49,8 @@ function PatchedProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
49
49
|
'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
|
50
50
|
'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
51
51
|
'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
52
|
-
'
|
52
|
+
'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
53
|
+
'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
53
54
|
'accessTokenValidity': !(0, runtime_1.exists)(json, 'access_token_validity') ? undefined : json['access_token_validity'],
|
54
55
|
'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
55
56
|
};
|
@@ -79,7 +80,8 @@ function PatchedProxyProviderRequestToJSON(value) {
|
|
79
80
|
'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
|
80
81
|
'intercept_header_auth': value.interceptHeaderAuth,
|
81
82
|
'cookie_domain': value.cookieDomain,
|
82
|
-
'
|
83
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
84
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
83
85
|
'access_token_validity': value.accessTokenValidity,
|
84
86
|
'refresh_token_validity': value.refreshTokenValidity,
|
85
87
|
};
|
@@ -184,7 +184,13 @@ export interface ProxyProvider {
|
|
184
184
|
* @type {Array<string>}
|
185
185
|
* @memberof ProxyProvider
|
186
186
|
*/
|
187
|
-
|
187
|
+
jwtFederationSources?: Array<string>;
|
188
|
+
/**
|
189
|
+
*
|
190
|
+
* @type {Array<number>}
|
191
|
+
* @memberof ProxyProvider
|
192
|
+
*/
|
193
|
+
jwtFederationProviders?: Array<number>;
|
188
194
|
/**
|
189
195
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
190
196
|
* @type {string}
|
@@ -77,7 +77,8 @@ function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
77
77
|
'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
78
78
|
'redirectUris': (json['redirect_uris'].map(RedirectURI_1.RedirectURIFromJSON)),
|
79
79
|
'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
80
|
-
'
|
80
|
+
'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
81
|
+
'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
81
82
|
'accessTokenValidity': !(0, runtime_1.exists)(json, 'access_token_validity') ? undefined : json['access_token_validity'],
|
82
83
|
'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
83
84
|
'outpostSet': json['outpost_set'],
|
@@ -108,7 +109,8 @@ function ProxyProviderToJSON(value) {
|
|
108
109
|
'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
|
109
110
|
'intercept_header_auth': value.interceptHeaderAuth,
|
110
111
|
'cookie_domain': value.cookieDomain,
|
111
|
-
'
|
112
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
113
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
112
114
|
'access_token_validity': value.accessTokenValidity,
|
113
115
|
'refresh_token_validity': value.refreshTokenValidity,
|
114
116
|
};
|
@@ -117,7 +117,13 @@ export interface ProxyProviderRequest {
|
|
117
117
|
* @type {Array<string>}
|
118
118
|
* @memberof ProxyProviderRequest
|
119
119
|
*/
|
120
|
-
|
120
|
+
jwtFederationSources?: Array<string>;
|
121
|
+
/**
|
122
|
+
*
|
123
|
+
* @type {Array<number>}
|
124
|
+
* @memberof ProxyProviderRequest
|
125
|
+
*/
|
126
|
+
jwtFederationProviders?: Array<number>;
|
121
127
|
/**
|
122
128
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
123
129
|
* @type {string}
|
@@ -53,7 +53,8 @@ function ProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
53
53
|
'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
|
54
54
|
'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
55
55
|
'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
56
|
-
'
|
56
|
+
'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
57
|
+
'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
57
58
|
'accessTokenValidity': !(0, runtime_1.exists)(json, 'access_token_validity') ? undefined : json['access_token_validity'],
|
58
59
|
'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
59
60
|
};
|
@@ -83,7 +84,8 @@ function ProxyProviderRequestToJSON(value) {
|
|
83
84
|
'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
|
84
85
|
'intercept_header_auth': value.interceptHeaderAuth,
|
85
86
|
'cookie_domain': value.cookieDomain,
|
86
|
-
'
|
87
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
88
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
87
89
|
'access_token_validity': value.accessTokenValidity,
|
88
90
|
'refresh_token_validity': value.refreshTokenValidity,
|
89
91
|
};
|
package/package.json
CHANGED
@@ -205,7 +205,13 @@ export interface OAuth2Provider {
|
|
205
205
|
* @type {Array<string>}
|
206
206
|
* @memberof OAuth2Provider
|
207
207
|
*/
|
208
|
-
|
208
|
+
jwtFederationSources?: Array<string>;
|
209
|
+
/**
|
210
|
+
*
|
211
|
+
* @type {Array<number>}
|
212
|
+
* @memberof OAuth2Provider
|
213
|
+
*/
|
214
|
+
jwtFederationProviders?: Array<number>;
|
209
215
|
}
|
210
216
|
|
211
217
|
/**
|
@@ -266,7 +272,8 @@ export function OAuth2ProviderFromJSONTyped(json: any, ignoreDiscriminator: bool
|
|
266
272
|
'redirectUris': ((json['redirect_uris'] as Array<any>).map(RedirectURIFromJSON)),
|
267
273
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
268
274
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
269
|
-
'
|
275
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
276
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
270
277
|
};
|
271
278
|
}
|
272
279
|
|
@@ -296,7 +303,8 @@ export function OAuth2ProviderToJSON(value?: OAuth2Provider | null): any {
|
|
296
303
|
'redirect_uris': ((value.redirectUris as Array<any>).map(RedirectURIToJSON)),
|
297
304
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
298
305
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|
299
|
-
'
|
306
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
307
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
300
308
|
};
|
301
309
|
}
|
302
310
|
|
@@ -151,7 +151,13 @@ export interface OAuth2ProviderRequest {
|
|
151
151
|
* @type {Array<string>}
|
152
152
|
* @memberof OAuth2ProviderRequest
|
153
153
|
*/
|
154
|
-
|
154
|
+
jwtFederationSources?: Array<string>;
|
155
|
+
/**
|
156
|
+
*
|
157
|
+
* @type {Array<number>}
|
158
|
+
* @memberof OAuth2ProviderRequest
|
159
|
+
*/
|
160
|
+
jwtFederationProviders?: Array<number>;
|
155
161
|
}
|
156
162
|
|
157
163
|
/**
|
@@ -194,7 +200,8 @@ export function OAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscriminato
|
|
194
200
|
'redirectUris': ((json['redirect_uris'] as Array<any>).map(RedirectURIRequestFromJSON)),
|
195
201
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
196
202
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
197
|
-
'
|
203
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
204
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
198
205
|
};
|
199
206
|
}
|
200
207
|
|
@@ -224,7 +231,8 @@ export function OAuth2ProviderRequestToJSON(value?: OAuth2ProviderRequest | null
|
|
224
231
|
'redirect_uris': ((value.redirectUris as Array<any>).map(RedirectURIRequestToJSON)),
|
225
232
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
226
233
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|
227
|
-
'
|
234
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
235
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
228
236
|
};
|
229
237
|
}
|
230
238
|
|
@@ -151,7 +151,13 @@ export interface PatchedOAuth2ProviderRequest {
|
|
151
151
|
* @type {Array<string>}
|
152
152
|
* @memberof PatchedOAuth2ProviderRequest
|
153
153
|
*/
|
154
|
-
|
154
|
+
jwtFederationSources?: Array<string>;
|
155
|
+
/**
|
156
|
+
*
|
157
|
+
* @type {Array<number>}
|
158
|
+
* @memberof PatchedOAuth2ProviderRequest
|
159
|
+
*/
|
160
|
+
jwtFederationProviders?: Array<number>;
|
155
161
|
}
|
156
162
|
|
157
163
|
/**
|
@@ -190,7 +196,8 @@ export function PatchedOAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscr
|
|
190
196
|
'redirectUris': !exists(json, 'redirect_uris') ? undefined : ((json['redirect_uris'] as Array<any>).map(RedirectURIRequestFromJSON)),
|
191
197
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
192
198
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
193
|
-
'
|
199
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
200
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
194
201
|
};
|
195
202
|
}
|
196
203
|
|
@@ -220,7 +227,8 @@ export function PatchedOAuth2ProviderRequestToJSON(value?: PatchedOAuth2Provider
|
|
220
227
|
'redirect_uris': value.redirectUris === undefined ? undefined : ((value.redirectUris as Array<any>).map(RedirectURIRequestToJSON)),
|
221
228
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
222
229
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|
223
|
-
'
|
230
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
231
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
224
232
|
};
|
225
233
|
}
|
226
234
|
|
@@ -127,7 +127,13 @@ export interface PatchedProxyProviderRequest {
|
|
127
127
|
* @type {Array<string>}
|
128
128
|
* @memberof PatchedProxyProviderRequest
|
129
129
|
*/
|
130
|
-
|
130
|
+
jwtFederationSources?: Array<string>;
|
131
|
+
/**
|
132
|
+
*
|
133
|
+
* @type {Array<number>}
|
134
|
+
* @memberof PatchedProxyProviderRequest
|
135
|
+
*/
|
136
|
+
jwtFederationProviders?: Array<number>;
|
131
137
|
/**
|
132
138
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
133
139
|
* @type {string}
|
@@ -177,7 +183,8 @@ export function PatchedProxyProviderRequestFromJSONTyped(json: any, ignoreDiscri
|
|
177
183
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
178
184
|
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
179
185
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
180
|
-
'
|
186
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
187
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
181
188
|
'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
|
182
189
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
183
190
|
};
|
@@ -208,7 +215,8 @@ export function PatchedProxyProviderRequestToJSON(value?: PatchedProxyProviderRe
|
|
208
215
|
'mode': ProxyModeToJSON(value.mode),
|
209
216
|
'intercept_header_auth': value.interceptHeaderAuth,
|
210
217
|
'cookie_domain': value.cookieDomain,
|
211
|
-
'
|
218
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
219
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
212
220
|
'access_token_validity': value.accessTokenValidity,
|
213
221
|
'refresh_token_validity': value.refreshTokenValidity,
|
214
222
|
};
|
@@ -199,7 +199,13 @@ export interface ProxyProvider {
|
|
199
199
|
* @type {Array<string>}
|
200
200
|
* @memberof ProxyProvider
|
201
201
|
*/
|
202
|
-
|
202
|
+
jwtFederationSources?: Array<string>;
|
203
|
+
/**
|
204
|
+
*
|
205
|
+
* @type {Array<number>}
|
206
|
+
* @memberof ProxyProvider
|
207
|
+
*/
|
208
|
+
jwtFederationProviders?: Array<number>;
|
203
209
|
/**
|
204
210
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
205
211
|
* @type {string}
|
@@ -282,7 +288,8 @@ export function ProxyProviderFromJSONTyped(json: any, ignoreDiscriminator: boole
|
|
282
288
|
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
283
289
|
'redirectUris': ((json['redirect_uris'] as Array<any>).map(RedirectURIFromJSON)),
|
284
290
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
285
|
-
'
|
291
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
292
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
286
293
|
'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
|
287
294
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
288
295
|
'outpostSet': json['outpost_set'],
|
@@ -314,7 +321,8 @@ export function ProxyProviderToJSON(value?: ProxyProvider | null): any {
|
|
314
321
|
'mode': ProxyModeToJSON(value.mode),
|
315
322
|
'intercept_header_auth': value.interceptHeaderAuth,
|
316
323
|
'cookie_domain': value.cookieDomain,
|
317
|
-
'
|
324
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
325
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
318
326
|
'access_token_validity': value.accessTokenValidity,
|
319
327
|
'refresh_token_validity': value.refreshTokenValidity,
|
320
328
|
};
|
@@ -127,7 +127,13 @@ export interface ProxyProviderRequest {
|
|
127
127
|
* @type {Array<string>}
|
128
128
|
* @memberof ProxyProviderRequest
|
129
129
|
*/
|
130
|
-
|
130
|
+
jwtFederationSources?: Array<string>;
|
131
|
+
/**
|
132
|
+
*
|
133
|
+
* @type {Array<number>}
|
134
|
+
* @memberof ProxyProviderRequest
|
135
|
+
*/
|
136
|
+
jwtFederationProviders?: Array<number>;
|
131
137
|
/**
|
132
138
|
* Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
|
133
139
|
* @type {string}
|
@@ -181,7 +187,8 @@ export function ProxyProviderRequestFromJSONTyped(json: any, ignoreDiscriminator
|
|
181
187
|
'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
|
182
188
|
'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
|
183
189
|
'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
|
184
|
-
'
|
190
|
+
'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
|
191
|
+
'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
|
185
192
|
'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
|
186
193
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
187
194
|
};
|
@@ -212,7 +219,8 @@ export function ProxyProviderRequestToJSON(value?: ProxyProviderRequest | null):
|
|
212
219
|
'mode': ProxyModeToJSON(value.mode),
|
213
220
|
'intercept_header_auth': value.interceptHeaderAuth,
|
214
221
|
'cookie_domain': value.cookieDomain,
|
215
|
-
'
|
222
|
+
'jwt_federation_sources': value.jwtFederationSources,
|
223
|
+
'jwt_federation_providers': value.jwtFederationProviders,
|
216
224
|
'access_token_validity': value.accessTokenValidity,
|
217
225
|
'refresh_token_validity': value.refreshTokenValidity,
|
218
226
|
};
|