@goauthentik/api 2024.10.4-1732236707 → 2024.10.4-1733219849

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (31) hide show
  1. package/dist/esm/models/OAuth2Provider.d.ts +7 -1
  2. package/dist/esm/models/OAuth2Provider.js +4 -2
  3. package/dist/esm/models/OAuth2ProviderRequest.d.ts +7 -1
  4. package/dist/esm/models/OAuth2ProviderRequest.js +4 -2
  5. package/dist/esm/models/PatchedOAuth2ProviderRequest.d.ts +7 -1
  6. package/dist/esm/models/PatchedOAuth2ProviderRequest.js +4 -2
  7. package/dist/esm/models/PatchedProxyProviderRequest.d.ts +7 -1
  8. package/dist/esm/models/PatchedProxyProviderRequest.js +4 -2
  9. package/dist/esm/models/ProxyProvider.d.ts +7 -1
  10. package/dist/esm/models/ProxyProvider.js +4 -2
  11. package/dist/esm/models/ProxyProviderRequest.d.ts +7 -1
  12. package/dist/esm/models/ProxyProviderRequest.js +4 -2
  13. package/dist/models/OAuth2Provider.d.ts +7 -1
  14. package/dist/models/OAuth2Provider.js +4 -2
  15. package/dist/models/OAuth2ProviderRequest.d.ts +7 -1
  16. package/dist/models/OAuth2ProviderRequest.js +4 -2
  17. package/dist/models/PatchedOAuth2ProviderRequest.d.ts +7 -1
  18. package/dist/models/PatchedOAuth2ProviderRequest.js +4 -2
  19. package/dist/models/PatchedProxyProviderRequest.d.ts +7 -1
  20. package/dist/models/PatchedProxyProviderRequest.js +4 -2
  21. package/dist/models/ProxyProvider.d.ts +7 -1
  22. package/dist/models/ProxyProvider.js +4 -2
  23. package/dist/models/ProxyProviderRequest.d.ts +7 -1
  24. package/dist/models/ProxyProviderRequest.js +4 -2
  25. package/package.json +1 -1
  26. package/src/models/OAuth2Provider.ts +11 -3
  27. package/src/models/OAuth2ProviderRequest.ts +11 -3
  28. package/src/models/PatchedOAuth2ProviderRequest.ts +11 -3
  29. package/src/models/PatchedProxyProviderRequest.ts +11 -3
  30. package/src/models/ProxyProvider.ts +11 -3
  31. package/src/models/ProxyProviderRequest.ts +11 -3
@@ -180,7 +180,13 @@ export interface OAuth2Provider {
180
180
  * @type {Array<string>}
181
181
  * @memberof OAuth2Provider
182
182
  */
183
- jwksSources?: Array<string>;
183
+ jwtFederationSources?: Array<string>;
184
+ /**
185
+ *
186
+ * @type {Array<number>}
187
+ * @memberof OAuth2Provider
188
+ */
189
+ jwtFederationProviders?: Array<number>;
184
190
  }
185
191
  /**
186
192
  * Check if a given object implements the OAuth2Provider interface.
@@ -70,7 +70,8 @@ export function OAuth2ProviderFromJSONTyped(json, ignoreDiscriminator) {
70
70
  'redirectUris': (json['redirect_uris'].map(RedirectURIFromJSON)),
71
71
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
72
72
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
73
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
73
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
74
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
74
75
  };
75
76
  }
76
77
  export function OAuth2ProviderToJSON(value) {
@@ -98,6 +99,7 @@ export function OAuth2ProviderToJSON(value) {
98
99
  'redirect_uris': (value.redirectUris.map(RedirectURIToJSON)),
99
100
  'sub_mode': SubModeEnumToJSON(value.subMode),
100
101
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
101
- 'jwks_sources': value.jwksSources,
102
+ 'jwt_federation_sources': value.jwtFederationSources,
103
+ 'jwt_federation_providers': value.jwtFederationProviders,
102
104
  };
103
105
  }
@@ -126,7 +126,13 @@ export interface OAuth2ProviderRequest {
126
126
  * @type {Array<string>}
127
127
  * @memberof OAuth2ProviderRequest
128
128
  */
129
- jwksSources?: Array<string>;
129
+ jwtFederationSources?: Array<string>;
130
+ /**
131
+ *
132
+ * @type {Array<number>}
133
+ * @memberof OAuth2ProviderRequest
134
+ */
135
+ jwtFederationProviders?: Array<number>;
130
136
  }
131
137
  /**
132
138
  * Check if a given object implements the OAuth2ProviderRequest interface.
@@ -52,7 +52,8 @@ export function OAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
52
52
  'redirectUris': (json['redirect_uris'].map(RedirectURIRequestFromJSON)),
53
53
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
54
54
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
55
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
55
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
56
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
56
57
  };
57
58
  }
58
59
  export function OAuth2ProviderRequestToJSON(value) {
@@ -80,6 +81,7 @@ export function OAuth2ProviderRequestToJSON(value) {
80
81
  'redirect_uris': (value.redirectUris.map(RedirectURIRequestToJSON)),
81
82
  'sub_mode': SubModeEnumToJSON(value.subMode),
82
83
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
83
- 'jwks_sources': value.jwksSources,
84
+ 'jwt_federation_sources': value.jwtFederationSources,
85
+ 'jwt_federation_providers': value.jwtFederationProviders,
84
86
  };
85
87
  }
@@ -126,7 +126,13 @@ export interface PatchedOAuth2ProviderRequest {
126
126
  * @type {Array<string>}
127
127
  * @memberof PatchedOAuth2ProviderRequest
128
128
  */
129
- jwksSources?: Array<string>;
129
+ jwtFederationSources?: Array<string>;
130
+ /**
131
+ *
132
+ * @type {Array<number>}
133
+ * @memberof PatchedOAuth2ProviderRequest
134
+ */
135
+ jwtFederationProviders?: Array<number>;
130
136
  }
131
137
  /**
132
138
  * Check if a given object implements the PatchedOAuth2ProviderRequest interface.
@@ -48,7 +48,8 @@ export function PatchedOAuth2ProviderRequestFromJSONTyped(json, ignoreDiscrimina
48
48
  'redirectUris': !exists(json, 'redirect_uris') ? undefined : (json['redirect_uris'].map(RedirectURIRequestFromJSON)),
49
49
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
50
50
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
51
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
51
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
52
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
52
53
  };
53
54
  }
54
55
  export function PatchedOAuth2ProviderRequestToJSON(value) {
@@ -76,6 +77,7 @@ export function PatchedOAuth2ProviderRequestToJSON(value) {
76
77
  'redirect_uris': value.redirectUris === undefined ? undefined : (value.redirectUris.map(RedirectURIRequestToJSON)),
77
78
  'sub_mode': SubModeEnumToJSON(value.subMode),
78
79
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
79
- 'jwks_sources': value.jwksSources,
80
+ 'jwt_federation_sources': value.jwtFederationSources,
81
+ 'jwt_federation_providers': value.jwtFederationProviders,
80
82
  };
81
83
  }
@@ -117,7 +117,13 @@ export interface PatchedProxyProviderRequest {
117
117
  * @type {Array<string>}
118
118
  * @memberof PatchedProxyProviderRequest
119
119
  */
120
- jwksSources?: Array<string>;
120
+ jwtFederationSources?: Array<string>;
121
+ /**
122
+ *
123
+ * @type {Array<number>}
124
+ * @memberof PatchedProxyProviderRequest
125
+ */
126
+ jwtFederationProviders?: Array<number>;
121
127
  /**
122
128
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
123
129
  * @type {string}
@@ -44,7 +44,8 @@ export function PatchedProxyProviderRequestFromJSONTyped(json, ignoreDiscriminat
44
44
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
45
45
  'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
46
46
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
47
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
47
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
48
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
48
49
  'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
49
50
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
50
51
  };
@@ -73,7 +74,8 @@ export function PatchedProxyProviderRequestToJSON(value) {
73
74
  'mode': ProxyModeToJSON(value.mode),
74
75
  'intercept_header_auth': value.interceptHeaderAuth,
75
76
  'cookie_domain': value.cookieDomain,
76
- 'jwks_sources': value.jwksSources,
77
+ 'jwt_federation_sources': value.jwtFederationSources,
78
+ 'jwt_federation_providers': value.jwtFederationProviders,
77
79
  'access_token_validity': value.accessTokenValidity,
78
80
  'refresh_token_validity': value.refreshTokenValidity,
79
81
  };
@@ -184,7 +184,13 @@ export interface ProxyProvider {
184
184
  * @type {Array<string>}
185
185
  * @memberof ProxyProvider
186
186
  */
187
- jwksSources?: Array<string>;
187
+ jwtFederationSources?: Array<string>;
188
+ /**
189
+ *
190
+ * @type {Array<number>}
191
+ * @memberof ProxyProvider
192
+ */
193
+ jwtFederationProviders?: Array<number>;
188
194
  /**
189
195
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
190
196
  * @type {string}
@@ -72,7 +72,8 @@ export function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
72
72
  'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
73
73
  'redirectUris': (json['redirect_uris'].map(RedirectURIFromJSON)),
74
74
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
75
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
75
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
76
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
76
77
  'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
77
78
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
78
79
  'outpostSet': json['outpost_set'],
@@ -102,7 +103,8 @@ export function ProxyProviderToJSON(value) {
102
103
  'mode': ProxyModeToJSON(value.mode),
103
104
  'intercept_header_auth': value.interceptHeaderAuth,
104
105
  'cookie_domain': value.cookieDomain,
105
- 'jwks_sources': value.jwksSources,
106
+ 'jwt_federation_sources': value.jwtFederationSources,
107
+ 'jwt_federation_providers': value.jwtFederationProviders,
106
108
  'access_token_validity': value.accessTokenValidity,
107
109
  'refresh_token_validity': value.refreshTokenValidity,
108
110
  };
@@ -117,7 +117,13 @@ export interface ProxyProviderRequest {
117
117
  * @type {Array<string>}
118
118
  * @memberof ProxyProviderRequest
119
119
  */
120
- jwksSources?: Array<string>;
120
+ jwtFederationSources?: Array<string>;
121
+ /**
122
+ *
123
+ * @type {Array<number>}
124
+ * @memberof ProxyProviderRequest
125
+ */
126
+ jwtFederationProviders?: Array<number>;
121
127
  /**
122
128
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
123
129
  * @type {string}
@@ -48,7 +48,8 @@ export function ProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
48
48
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
49
49
  'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
50
50
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
51
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
51
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
52
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
52
53
  'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
53
54
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
54
55
  };
@@ -77,7 +78,8 @@ export function ProxyProviderRequestToJSON(value) {
77
78
  'mode': ProxyModeToJSON(value.mode),
78
79
  'intercept_header_auth': value.interceptHeaderAuth,
79
80
  'cookie_domain': value.cookieDomain,
80
- 'jwks_sources': value.jwksSources,
81
+ 'jwt_federation_sources': value.jwtFederationSources,
82
+ 'jwt_federation_providers': value.jwtFederationProviders,
81
83
  'access_token_validity': value.accessTokenValidity,
82
84
  'refresh_token_validity': value.refreshTokenValidity,
83
85
  };
@@ -180,7 +180,13 @@ export interface OAuth2Provider {
180
180
  * @type {Array<string>}
181
181
  * @memberof OAuth2Provider
182
182
  */
183
- jwksSources?: Array<string>;
183
+ jwtFederationSources?: Array<string>;
184
+ /**
185
+ *
186
+ * @type {Array<number>}
187
+ * @memberof OAuth2Provider
188
+ */
189
+ jwtFederationProviders?: Array<number>;
184
190
  }
185
191
  /**
186
192
  * Check if a given object implements the OAuth2Provider interface.
@@ -75,7 +75,8 @@ function OAuth2ProviderFromJSONTyped(json, ignoreDiscriminator) {
75
75
  'redirectUris': (json['redirect_uris'].map(RedirectURI_1.RedirectURIFromJSON)),
76
76
  'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
77
77
  'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
78
- 'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
78
+ 'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
79
+ 'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
79
80
  };
80
81
  }
81
82
  exports.OAuth2ProviderFromJSONTyped = OAuth2ProviderFromJSONTyped;
@@ -104,7 +105,8 @@ function OAuth2ProviderToJSON(value) {
104
105
  'redirect_uris': (value.redirectUris.map(RedirectURI_1.RedirectURIToJSON)),
105
106
  'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
106
107
  'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
107
- 'jwks_sources': value.jwksSources,
108
+ 'jwt_federation_sources': value.jwtFederationSources,
109
+ 'jwt_federation_providers': value.jwtFederationProviders,
108
110
  };
109
111
  }
110
112
  exports.OAuth2ProviderToJSON = OAuth2ProviderToJSON;
@@ -126,7 +126,13 @@ export interface OAuth2ProviderRequest {
126
126
  * @type {Array<string>}
127
127
  * @memberof OAuth2ProviderRequest
128
128
  */
129
- jwksSources?: Array<string>;
129
+ jwtFederationSources?: Array<string>;
130
+ /**
131
+ *
132
+ * @type {Array<number>}
133
+ * @memberof OAuth2ProviderRequest
134
+ */
135
+ jwtFederationProviders?: Array<number>;
130
136
  }
131
137
  /**
132
138
  * Check if a given object implements the OAuth2ProviderRequest interface.
@@ -57,7 +57,8 @@ function OAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
57
57
  'redirectUris': (json['redirect_uris'].map(RedirectURIRequest_1.RedirectURIRequestFromJSON)),
58
58
  'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
59
59
  'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
60
- 'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
60
+ 'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
61
+ 'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
61
62
  };
62
63
  }
63
64
  exports.OAuth2ProviderRequestFromJSONTyped = OAuth2ProviderRequestFromJSONTyped;
@@ -86,7 +87,8 @@ function OAuth2ProviderRequestToJSON(value) {
86
87
  'redirect_uris': (value.redirectUris.map(RedirectURIRequest_1.RedirectURIRequestToJSON)),
87
88
  'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
88
89
  'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
89
- 'jwks_sources': value.jwksSources,
90
+ 'jwt_federation_sources': value.jwtFederationSources,
91
+ 'jwt_federation_providers': value.jwtFederationProviders,
90
92
  };
91
93
  }
92
94
  exports.OAuth2ProviderRequestToJSON = OAuth2ProviderRequestToJSON;
@@ -126,7 +126,13 @@ export interface PatchedOAuth2ProviderRequest {
126
126
  * @type {Array<string>}
127
127
  * @memberof PatchedOAuth2ProviderRequest
128
128
  */
129
- jwksSources?: Array<string>;
129
+ jwtFederationSources?: Array<string>;
130
+ /**
131
+ *
132
+ * @type {Array<number>}
133
+ * @memberof PatchedOAuth2ProviderRequest
134
+ */
135
+ jwtFederationProviders?: Array<number>;
130
136
  }
131
137
  /**
132
138
  * Check if a given object implements the PatchedOAuth2ProviderRequest interface.
@@ -53,7 +53,8 @@ function PatchedOAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
53
53
  'redirectUris': !(0, runtime_1.exists)(json, 'redirect_uris') ? undefined : (json['redirect_uris'].map(RedirectURIRequest_1.RedirectURIRequestFromJSON)),
54
54
  'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
55
55
  'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
56
- 'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
56
+ 'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
57
+ 'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
57
58
  };
58
59
  }
59
60
  exports.PatchedOAuth2ProviderRequestFromJSONTyped = PatchedOAuth2ProviderRequestFromJSONTyped;
@@ -82,7 +83,8 @@ function PatchedOAuth2ProviderRequestToJSON(value) {
82
83
  'redirect_uris': value.redirectUris === undefined ? undefined : (value.redirectUris.map(RedirectURIRequest_1.RedirectURIRequestToJSON)),
83
84
  'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
84
85
  'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
85
- 'jwks_sources': value.jwksSources,
86
+ 'jwt_federation_sources': value.jwtFederationSources,
87
+ 'jwt_federation_providers': value.jwtFederationProviders,
86
88
  };
87
89
  }
88
90
  exports.PatchedOAuth2ProviderRequestToJSON = PatchedOAuth2ProviderRequestToJSON;
@@ -117,7 +117,13 @@ export interface PatchedProxyProviderRequest {
117
117
  * @type {Array<string>}
118
118
  * @memberof PatchedProxyProviderRequest
119
119
  */
120
- jwksSources?: Array<string>;
120
+ jwtFederationSources?: Array<string>;
121
+ /**
122
+ *
123
+ * @type {Array<number>}
124
+ * @memberof PatchedProxyProviderRequest
125
+ */
126
+ jwtFederationProviders?: Array<number>;
121
127
  /**
122
128
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
123
129
  * @type {string}
@@ -49,7 +49,8 @@ function PatchedProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
49
49
  'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
50
50
  'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
51
51
  'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
52
- 'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
52
+ 'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
53
+ 'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
53
54
  'accessTokenValidity': !(0, runtime_1.exists)(json, 'access_token_validity') ? undefined : json['access_token_validity'],
54
55
  'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
55
56
  };
@@ -79,7 +80,8 @@ function PatchedProxyProviderRequestToJSON(value) {
79
80
  'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
80
81
  'intercept_header_auth': value.interceptHeaderAuth,
81
82
  'cookie_domain': value.cookieDomain,
82
- 'jwks_sources': value.jwksSources,
83
+ 'jwt_federation_sources': value.jwtFederationSources,
84
+ 'jwt_federation_providers': value.jwtFederationProviders,
83
85
  'access_token_validity': value.accessTokenValidity,
84
86
  'refresh_token_validity': value.refreshTokenValidity,
85
87
  };
@@ -184,7 +184,13 @@ export interface ProxyProvider {
184
184
  * @type {Array<string>}
185
185
  * @memberof ProxyProvider
186
186
  */
187
- jwksSources?: Array<string>;
187
+ jwtFederationSources?: Array<string>;
188
+ /**
189
+ *
190
+ * @type {Array<number>}
191
+ * @memberof ProxyProvider
192
+ */
193
+ jwtFederationProviders?: Array<number>;
188
194
  /**
189
195
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
190
196
  * @type {string}
@@ -77,7 +77,8 @@ function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
77
77
  'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
78
78
  'redirectUris': (json['redirect_uris'].map(RedirectURI_1.RedirectURIFromJSON)),
79
79
  'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
80
- 'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
80
+ 'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
81
+ 'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
81
82
  'accessTokenValidity': !(0, runtime_1.exists)(json, 'access_token_validity') ? undefined : json['access_token_validity'],
82
83
  'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
83
84
  'outpostSet': json['outpost_set'],
@@ -108,7 +109,8 @@ function ProxyProviderToJSON(value) {
108
109
  'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
109
110
  'intercept_header_auth': value.interceptHeaderAuth,
110
111
  'cookie_domain': value.cookieDomain,
111
- 'jwks_sources': value.jwksSources,
112
+ 'jwt_federation_sources': value.jwtFederationSources,
113
+ 'jwt_federation_providers': value.jwtFederationProviders,
112
114
  'access_token_validity': value.accessTokenValidity,
113
115
  'refresh_token_validity': value.refreshTokenValidity,
114
116
  };
@@ -117,7 +117,13 @@ export interface ProxyProviderRequest {
117
117
  * @type {Array<string>}
118
118
  * @memberof ProxyProviderRequest
119
119
  */
120
- jwksSources?: Array<string>;
120
+ jwtFederationSources?: Array<string>;
121
+ /**
122
+ *
123
+ * @type {Array<number>}
124
+ * @memberof ProxyProviderRequest
125
+ */
126
+ jwtFederationProviders?: Array<number>;
121
127
  /**
122
128
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
123
129
  * @type {string}
@@ -53,7 +53,8 @@ function ProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
53
53
  'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
54
54
  'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
55
55
  'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
56
- 'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
56
+ 'jwtFederationSources': !(0, runtime_1.exists)(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
57
+ 'jwtFederationProviders': !(0, runtime_1.exists)(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
57
58
  'accessTokenValidity': !(0, runtime_1.exists)(json, 'access_token_validity') ? undefined : json['access_token_validity'],
58
59
  'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
59
60
  };
@@ -83,7 +84,8 @@ function ProxyProviderRequestToJSON(value) {
83
84
  'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
84
85
  'intercept_header_auth': value.interceptHeaderAuth,
85
86
  'cookie_domain': value.cookieDomain,
86
- 'jwks_sources': value.jwksSources,
87
+ 'jwt_federation_sources': value.jwtFederationSources,
88
+ 'jwt_federation_providers': value.jwtFederationProviders,
87
89
  'access_token_validity': value.accessTokenValidity,
88
90
  'refresh_token_validity': value.refreshTokenValidity,
89
91
  };
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goauthentik/api",
3
- "version": "2024.10.4-1732236707",
3
+ "version": "2024.10.4-1733219849",
4
4
  "description": "OpenAPI client for @goauthentik/api",
5
5
  "author": "OpenAPI-Generator",
6
6
  "repository": {
@@ -205,7 +205,13 @@ export interface OAuth2Provider {
205
205
  * @type {Array<string>}
206
206
  * @memberof OAuth2Provider
207
207
  */
208
- jwksSources?: Array<string>;
208
+ jwtFederationSources?: Array<string>;
209
+ /**
210
+ *
211
+ * @type {Array<number>}
212
+ * @memberof OAuth2Provider
213
+ */
214
+ jwtFederationProviders?: Array<number>;
209
215
  }
210
216
 
211
217
  /**
@@ -266,7 +272,8 @@ export function OAuth2ProviderFromJSONTyped(json: any, ignoreDiscriminator: bool
266
272
  'redirectUris': ((json['redirect_uris'] as Array<any>).map(RedirectURIFromJSON)),
267
273
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
268
274
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
269
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
275
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
276
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
270
277
  };
271
278
  }
272
279
 
@@ -296,7 +303,8 @@ export function OAuth2ProviderToJSON(value?: OAuth2Provider | null): any {
296
303
  'redirect_uris': ((value.redirectUris as Array<any>).map(RedirectURIToJSON)),
297
304
  'sub_mode': SubModeEnumToJSON(value.subMode),
298
305
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
299
- 'jwks_sources': value.jwksSources,
306
+ 'jwt_federation_sources': value.jwtFederationSources,
307
+ 'jwt_federation_providers': value.jwtFederationProviders,
300
308
  };
301
309
  }
302
310
 
@@ -151,7 +151,13 @@ export interface OAuth2ProviderRequest {
151
151
  * @type {Array<string>}
152
152
  * @memberof OAuth2ProviderRequest
153
153
  */
154
- jwksSources?: Array<string>;
154
+ jwtFederationSources?: Array<string>;
155
+ /**
156
+ *
157
+ * @type {Array<number>}
158
+ * @memberof OAuth2ProviderRequest
159
+ */
160
+ jwtFederationProviders?: Array<number>;
155
161
  }
156
162
 
157
163
  /**
@@ -194,7 +200,8 @@ export function OAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscriminato
194
200
  'redirectUris': ((json['redirect_uris'] as Array<any>).map(RedirectURIRequestFromJSON)),
195
201
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
196
202
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
197
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
203
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
204
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
198
205
  };
199
206
  }
200
207
 
@@ -224,7 +231,8 @@ export function OAuth2ProviderRequestToJSON(value?: OAuth2ProviderRequest | null
224
231
  'redirect_uris': ((value.redirectUris as Array<any>).map(RedirectURIRequestToJSON)),
225
232
  'sub_mode': SubModeEnumToJSON(value.subMode),
226
233
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
227
- 'jwks_sources': value.jwksSources,
234
+ 'jwt_federation_sources': value.jwtFederationSources,
235
+ 'jwt_federation_providers': value.jwtFederationProviders,
228
236
  };
229
237
  }
230
238
 
@@ -151,7 +151,13 @@ export interface PatchedOAuth2ProviderRequest {
151
151
  * @type {Array<string>}
152
152
  * @memberof PatchedOAuth2ProviderRequest
153
153
  */
154
- jwksSources?: Array<string>;
154
+ jwtFederationSources?: Array<string>;
155
+ /**
156
+ *
157
+ * @type {Array<number>}
158
+ * @memberof PatchedOAuth2ProviderRequest
159
+ */
160
+ jwtFederationProviders?: Array<number>;
155
161
  }
156
162
 
157
163
  /**
@@ -190,7 +196,8 @@ export function PatchedOAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscr
190
196
  'redirectUris': !exists(json, 'redirect_uris') ? undefined : ((json['redirect_uris'] as Array<any>).map(RedirectURIRequestFromJSON)),
191
197
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
192
198
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
193
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
199
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
200
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
194
201
  };
195
202
  }
196
203
 
@@ -220,7 +227,8 @@ export function PatchedOAuth2ProviderRequestToJSON(value?: PatchedOAuth2Provider
220
227
  'redirect_uris': value.redirectUris === undefined ? undefined : ((value.redirectUris as Array<any>).map(RedirectURIRequestToJSON)),
221
228
  'sub_mode': SubModeEnumToJSON(value.subMode),
222
229
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
223
- 'jwks_sources': value.jwksSources,
230
+ 'jwt_federation_sources': value.jwtFederationSources,
231
+ 'jwt_federation_providers': value.jwtFederationProviders,
224
232
  };
225
233
  }
226
234
 
@@ -127,7 +127,13 @@ export interface PatchedProxyProviderRequest {
127
127
  * @type {Array<string>}
128
128
  * @memberof PatchedProxyProviderRequest
129
129
  */
130
- jwksSources?: Array<string>;
130
+ jwtFederationSources?: Array<string>;
131
+ /**
132
+ *
133
+ * @type {Array<number>}
134
+ * @memberof PatchedProxyProviderRequest
135
+ */
136
+ jwtFederationProviders?: Array<number>;
131
137
  /**
132
138
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
133
139
  * @type {string}
@@ -177,7 +183,8 @@ export function PatchedProxyProviderRequestFromJSONTyped(json: any, ignoreDiscri
177
183
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
178
184
  'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
179
185
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
180
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
186
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
187
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
181
188
  'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
182
189
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
183
190
  };
@@ -208,7 +215,8 @@ export function PatchedProxyProviderRequestToJSON(value?: PatchedProxyProviderRe
208
215
  'mode': ProxyModeToJSON(value.mode),
209
216
  'intercept_header_auth': value.interceptHeaderAuth,
210
217
  'cookie_domain': value.cookieDomain,
211
- 'jwks_sources': value.jwksSources,
218
+ 'jwt_federation_sources': value.jwtFederationSources,
219
+ 'jwt_federation_providers': value.jwtFederationProviders,
212
220
  'access_token_validity': value.accessTokenValidity,
213
221
  'refresh_token_validity': value.refreshTokenValidity,
214
222
  };
@@ -199,7 +199,13 @@ export interface ProxyProvider {
199
199
  * @type {Array<string>}
200
200
  * @memberof ProxyProvider
201
201
  */
202
- jwksSources?: Array<string>;
202
+ jwtFederationSources?: Array<string>;
203
+ /**
204
+ *
205
+ * @type {Array<number>}
206
+ * @memberof ProxyProvider
207
+ */
208
+ jwtFederationProviders?: Array<number>;
203
209
  /**
204
210
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
205
211
  * @type {string}
@@ -282,7 +288,8 @@ export function ProxyProviderFromJSONTyped(json: any, ignoreDiscriminator: boole
282
288
  'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
283
289
  'redirectUris': ((json['redirect_uris'] as Array<any>).map(RedirectURIFromJSON)),
284
290
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
285
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
291
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
292
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
286
293
  'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
287
294
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
288
295
  'outpostSet': json['outpost_set'],
@@ -314,7 +321,8 @@ export function ProxyProviderToJSON(value?: ProxyProvider | null): any {
314
321
  'mode': ProxyModeToJSON(value.mode),
315
322
  'intercept_header_auth': value.interceptHeaderAuth,
316
323
  'cookie_domain': value.cookieDomain,
317
- 'jwks_sources': value.jwksSources,
324
+ 'jwt_federation_sources': value.jwtFederationSources,
325
+ 'jwt_federation_providers': value.jwtFederationProviders,
318
326
  'access_token_validity': value.accessTokenValidity,
319
327
  'refresh_token_validity': value.refreshTokenValidity,
320
328
  };
@@ -127,7 +127,13 @@ export interface ProxyProviderRequest {
127
127
  * @type {Array<string>}
128
128
  * @memberof ProxyProviderRequest
129
129
  */
130
- jwksSources?: Array<string>;
130
+ jwtFederationSources?: Array<string>;
131
+ /**
132
+ *
133
+ * @type {Array<number>}
134
+ * @memberof ProxyProviderRequest
135
+ */
136
+ jwtFederationProviders?: Array<number>;
131
137
  /**
132
138
  * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
133
139
  * @type {string}
@@ -181,7 +187,8 @@ export function ProxyProviderRequestFromJSONTyped(json: any, ignoreDiscriminator
181
187
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
182
188
  'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
183
189
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
184
- 'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
190
+ 'jwtFederationSources': !exists(json, 'jwt_federation_sources') ? undefined : json['jwt_federation_sources'],
191
+ 'jwtFederationProviders': !exists(json, 'jwt_federation_providers') ? undefined : json['jwt_federation_providers'],
185
192
  'accessTokenValidity': !exists(json, 'access_token_validity') ? undefined : json['access_token_validity'],
186
193
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
187
194
  };
@@ -212,7 +219,8 @@ export function ProxyProviderRequestToJSON(value?: ProxyProviderRequest | null):
212
219
  'mode': ProxyModeToJSON(value.mode),
213
220
  'intercept_header_auth': value.interceptHeaderAuth,
214
221
  'cookie_domain': value.cookieDomain,
215
- 'jwks_sources': value.jwksSources,
222
+ 'jwt_federation_sources': value.jwtFederationSources,
223
+ 'jwt_federation_providers': value.jwtFederationProviders,
216
224
  'access_token_validity': value.accessTokenValidity,
217
225
  'refresh_token_validity': value.refreshTokenValidity,
218
226
  };