@goauthentik/api 2024.8.3-1727731656 → 2024.8.3-1728912934
Sign up to get free protection for your applications and to get access to all the features.
- package/.openapi-generator/FILES +1 -0
- package/README.md +1 -1
- package/dist/apis/ProvidersApi.d.ts +2 -0
- package/dist/apis/ProvidersApi.js +9 -0
- package/dist/apis/SourcesApi.d.ts +1 -1
- package/dist/apis/SourcesApi.js +1 -1
- package/dist/esm/apis/ProvidersApi.d.ts +2 -0
- package/dist/esm/apis/ProvidersApi.js +9 -0
- package/dist/esm/apis/SourcesApi.d.ts +1 -1
- package/dist/esm/apis/SourcesApi.js +1 -1
- package/dist/esm/models/ChallengeTypes.d.ts +3 -0
- package/dist/esm/models/ChallengeTypes.js +5 -0
- package/dist/esm/models/LDAPOutpostConfig.d.ts +6 -0
- package/dist/esm/models/LDAPOutpostConfig.js +2 -0
- package/dist/esm/models/LDAPProvider.d.ts +6 -0
- package/dist/esm/models/LDAPProvider.js +3 -0
- package/dist/esm/models/LDAPProviderRequest.d.ts +6 -0
- package/dist/esm/models/LDAPProviderRequest.js +3 -0
- package/dist/esm/models/NameIdPolicyEnum.d.ts +1 -1
- package/dist/esm/models/NameIdPolicyEnum.js +1 -1
- package/dist/esm/models/OAuth2Provider.d.ts +6 -0
- package/dist/esm/models/OAuth2Provider.js +3 -0
- package/dist/esm/models/OAuth2ProviderRequest.d.ts +6 -0
- package/dist/esm/models/OAuth2ProviderRequest.js +3 -0
- package/dist/esm/models/PatchedLDAPProviderRequest.d.ts +6 -0
- package/dist/esm/models/PatchedLDAPProviderRequest.js +2 -0
- package/dist/esm/models/PatchedOAuth2ProviderRequest.d.ts +6 -0
- package/dist/esm/models/PatchedOAuth2ProviderRequest.js +2 -0
- package/dist/esm/models/PatchedProxyProviderRequest.d.ts +6 -0
- package/dist/esm/models/PatchedProxyProviderRequest.js +2 -0
- package/dist/esm/models/PatchedRACProviderRequest.d.ts +6 -0
- package/dist/esm/models/PatchedRACProviderRequest.js +2 -0
- package/dist/esm/models/PatchedRadiusProviderRequest.d.ts +6 -0
- package/dist/esm/models/PatchedRadiusProviderRequest.js +2 -0
- package/dist/esm/models/PatchedSAMLProviderRequest.d.ts +6 -0
- package/dist/esm/models/PatchedSAMLProviderRequest.js +2 -0
- package/dist/esm/models/Provider.d.ts +6 -0
- package/dist/esm/models/Provider.js +3 -0
- package/dist/esm/models/ProviderRequest.d.ts +6 -0
- package/dist/esm/models/ProviderRequest.js +3 -0
- package/dist/esm/models/ProxyProvider.d.ts +6 -0
- package/dist/esm/models/ProxyProvider.js +3 -0
- package/dist/esm/models/ProxyProviderRequest.d.ts +6 -0
- package/dist/esm/models/ProxyProviderRequest.js +3 -0
- package/dist/esm/models/RACProvider.d.ts +6 -0
- package/dist/esm/models/RACProvider.js +3 -0
- package/dist/esm/models/RACProviderRequest.d.ts +6 -0
- package/dist/esm/models/RACProviderRequest.js +3 -0
- package/dist/esm/models/RadiusProvider.d.ts +6 -0
- package/dist/esm/models/RadiusProvider.js +3 -0
- package/dist/esm/models/RadiusProviderRequest.d.ts +6 -0
- package/dist/esm/models/RadiusProviderRequest.js +3 -0
- package/dist/esm/models/SAMLProvider.d.ts +6 -0
- package/dist/esm/models/SAMLProvider.js +3 -0
- package/dist/esm/models/SAMLProviderRequest.d.ts +6 -0
- package/dist/esm/models/SAMLProviderRequest.js +3 -0
- package/dist/esm/models/SessionEndChallenge.d.ts +83 -0
- package/dist/esm/models/SessionEndChallenge.js +63 -0
- package/dist/esm/models/index.d.ts +1 -0
- package/dist/esm/models/index.js +1 -0
- package/dist/models/ChallengeTypes.d.ts +3 -0
- package/dist/models/ChallengeTypes.js +5 -0
- package/dist/models/LDAPOutpostConfig.d.ts +6 -0
- package/dist/models/LDAPOutpostConfig.js +2 -0
- package/dist/models/LDAPProvider.d.ts +6 -0
- package/dist/models/LDAPProvider.js +3 -0
- package/dist/models/LDAPProviderRequest.d.ts +6 -0
- package/dist/models/LDAPProviderRequest.js +3 -0
- package/dist/models/NameIdPolicyEnum.d.ts +1 -1
- package/dist/models/NameIdPolicyEnum.js +1 -1
- package/dist/models/OAuth2Provider.d.ts +6 -0
- package/dist/models/OAuth2Provider.js +3 -0
- package/dist/models/OAuth2ProviderRequest.d.ts +6 -0
- package/dist/models/OAuth2ProviderRequest.js +3 -0
- package/dist/models/PatchedLDAPProviderRequest.d.ts +6 -0
- package/dist/models/PatchedLDAPProviderRequest.js +2 -0
- package/dist/models/PatchedOAuth2ProviderRequest.d.ts +6 -0
- package/dist/models/PatchedOAuth2ProviderRequest.js +2 -0
- package/dist/models/PatchedProxyProviderRequest.d.ts +6 -0
- package/dist/models/PatchedProxyProviderRequest.js +2 -0
- package/dist/models/PatchedRACProviderRequest.d.ts +6 -0
- package/dist/models/PatchedRACProviderRequest.js +2 -0
- package/dist/models/PatchedRadiusProviderRequest.d.ts +6 -0
- package/dist/models/PatchedRadiusProviderRequest.js +2 -0
- package/dist/models/PatchedSAMLProviderRequest.d.ts +6 -0
- package/dist/models/PatchedSAMLProviderRequest.js +2 -0
- package/dist/models/Provider.d.ts +6 -0
- package/dist/models/Provider.js +3 -0
- package/dist/models/ProviderRequest.d.ts +6 -0
- package/dist/models/ProviderRequest.js +3 -0
- package/dist/models/ProxyProvider.d.ts +6 -0
- package/dist/models/ProxyProvider.js +3 -0
- package/dist/models/ProxyProviderRequest.d.ts +6 -0
- package/dist/models/ProxyProviderRequest.js +3 -0
- package/dist/models/RACProvider.d.ts +6 -0
- package/dist/models/RACProvider.js +3 -0
- package/dist/models/RACProviderRequest.d.ts +6 -0
- package/dist/models/RACProviderRequest.js +3 -0
- package/dist/models/RadiusProvider.d.ts +6 -0
- package/dist/models/RadiusProvider.js +3 -0
- package/dist/models/RadiusProviderRequest.d.ts +6 -0
- package/dist/models/RadiusProviderRequest.js +3 -0
- package/dist/models/SAMLProvider.d.ts +6 -0
- package/dist/models/SAMLProvider.js +3 -0
- package/dist/models/SAMLProviderRequest.d.ts +6 -0
- package/dist/models/SAMLProviderRequest.js +3 -0
- package/dist/models/SessionEndChallenge.d.ts +83 -0
- package/dist/models/SessionEndChallenge.js +70 -0
- package/dist/models/index.d.ts +1 -0
- package/dist/models/index.js +1 -0
- package/package.json +1 -1
- package/src/apis/ProvidersApi.ts +14 -0
- package/src/apis/SourcesApi.ts +1 -1
- package/src/models/ChallengeTypes.ts +12 -1
- package/src/models/LDAPOutpostConfig.ts +8 -0
- package/src/models/LDAPProvider.ts +9 -0
- package/src/models/LDAPProviderRequest.ts +9 -0
- package/src/models/NameIdPolicyEnum.ts +1 -1
- package/src/models/OAuth2Provider.ts +9 -0
- package/src/models/OAuth2ProviderRequest.ts +9 -0
- package/src/models/PatchedLDAPProviderRequest.ts +8 -0
- package/src/models/PatchedOAuth2ProviderRequest.ts +8 -0
- package/src/models/PatchedProxyProviderRequest.ts +8 -0
- package/src/models/PatchedRACProviderRequest.ts +8 -0
- package/src/models/PatchedRadiusProviderRequest.ts +8 -0
- package/src/models/PatchedSAMLProviderRequest.ts +8 -0
- package/src/models/Provider.ts +9 -0
- package/src/models/ProviderRequest.ts +9 -0
- package/src/models/ProxyProvider.ts +9 -0
- package/src/models/ProxyProviderRequest.ts +9 -0
- package/src/models/RACProvider.ts +9 -0
- package/src/models/RACProviderRequest.ts +9 -0
- package/src/models/RadiusProvider.ts +9 -0
- package/src/models/RadiusProviderRequest.ts +9 -0
- package/src/models/SAMLProvider.ts +9 -0
- package/src/models/SAMLProviderRequest.ts +9 -0
- package/src/models/SessionEndChallenge.ts +145 -0
- package/src/models/index.ts +1 -0
@@ -42,6 +42,12 @@ export interface SAMLProvider {
|
|
42
42
|
* @memberof SAMLProvider
|
43
43
|
*/
|
44
44
|
authorizationFlow: string;
|
45
|
+
/**
|
46
|
+
* Flow used ending the session from a provider.
|
47
|
+
* @type {string}
|
48
|
+
* @memberof SAMLProvider
|
49
|
+
*/
|
50
|
+
invalidationFlow: string;
|
45
51
|
/**
|
46
52
|
*
|
47
53
|
* @type {Array<string>}
|
@@ -26,6 +26,7 @@ function instanceOfSAMLProvider(value) {
|
|
26
26
|
isInstance = isInstance && "pk" in value;
|
27
27
|
isInstance = isInstance && "name" in value;
|
28
28
|
isInstance = isInstance && "authorizationFlow" in value;
|
29
|
+
isInstance = isInstance && "invalidationFlow" in value;
|
29
30
|
isInstance = isInstance && "component" in value;
|
30
31
|
isInstance = isInstance && "assignedApplicationSlug" in value;
|
31
32
|
isInstance = isInstance && "assignedApplicationName" in value;
|
@@ -57,6 +58,7 @@ function SAMLProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
57
58
|
'name': json['name'],
|
58
59
|
'authenticationFlow': !(0, runtime_1.exists)(json, 'authentication_flow') ? undefined : json['authentication_flow'],
|
59
60
|
'authorizationFlow': json['authorization_flow'],
|
61
|
+
'invalidationFlow': json['invalidation_flow'],
|
60
62
|
'propertyMappings': !(0, runtime_1.exists)(json, 'property_mappings') ? undefined : json['property_mappings'],
|
61
63
|
'component': json['component'],
|
62
64
|
'assignedApplicationSlug': json['assigned_application_slug'],
|
@@ -102,6 +104,7 @@ function SAMLProviderToJSON(value) {
|
|
102
104
|
'name': value.name,
|
103
105
|
'authentication_flow': value.authenticationFlow,
|
104
106
|
'authorization_flow': value.authorizationFlow,
|
107
|
+
'invalidation_flow': value.invalidationFlow,
|
105
108
|
'property_mappings': value.propertyMappings,
|
106
109
|
'acs_url': value.acsUrl,
|
107
110
|
'audience': value.audience,
|
@@ -36,6 +36,12 @@ export interface SAMLProviderRequest {
|
|
36
36
|
* @memberof SAMLProviderRequest
|
37
37
|
*/
|
38
38
|
authorizationFlow: string;
|
39
|
+
/**
|
40
|
+
* Flow used ending the session from a provider.
|
41
|
+
* @type {string}
|
42
|
+
* @memberof SAMLProviderRequest
|
43
|
+
*/
|
44
|
+
invalidationFlow: string;
|
39
45
|
/**
|
40
46
|
*
|
41
47
|
* @type {Array<string>}
|
@@ -25,6 +25,7 @@ function instanceOfSAMLProviderRequest(value) {
|
|
25
25
|
let isInstance = true;
|
26
26
|
isInstance = isInstance && "name" in value;
|
27
27
|
isInstance = isInstance && "authorizationFlow" in value;
|
28
|
+
isInstance = isInstance && "invalidationFlow" in value;
|
28
29
|
isInstance = isInstance && "acsUrl" in value;
|
29
30
|
return isInstance;
|
30
31
|
}
|
@@ -41,6 +42,7 @@ function SAMLProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
41
42
|
'name': json['name'],
|
42
43
|
'authenticationFlow': !(0, runtime_1.exists)(json, 'authentication_flow') ? undefined : json['authentication_flow'],
|
43
44
|
'authorizationFlow': json['authorization_flow'],
|
45
|
+
'invalidationFlow': json['invalidation_flow'],
|
44
46
|
'propertyMappings': !(0, runtime_1.exists)(json, 'property_mappings') ? undefined : json['property_mappings'],
|
45
47
|
'acsUrl': json['acs_url'],
|
46
48
|
'audience': !(0, runtime_1.exists)(json, 'audience') ? undefined : json['audience'],
|
@@ -72,6 +74,7 @@ function SAMLProviderRequestToJSON(value) {
|
|
72
74
|
'name': value.name,
|
73
75
|
'authentication_flow': value.authenticationFlow,
|
74
76
|
'authorization_flow': value.authorizationFlow,
|
77
|
+
'invalidation_flow': value.invalidationFlow,
|
75
78
|
'property_mappings': value.propertyMappings,
|
76
79
|
'acs_url': value.acsUrl,
|
77
80
|
'audience': value.audience,
|
@@ -0,0 +1,83 @@
|
|
1
|
+
/**
|
2
|
+
* authentik
|
3
|
+
* Making authentication simple.
|
4
|
+
*
|
5
|
+
* The version of the OpenAPI document: 2024.8.3
|
6
|
+
* Contact: hello@goauthentik.io
|
7
|
+
*
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
9
|
+
* https://openapi-generator.tech
|
10
|
+
* Do not edit the class manually.
|
11
|
+
*/
|
12
|
+
import type { ContextualFlowInfo } from './ContextualFlowInfo';
|
13
|
+
import type { ErrorDetail } from './ErrorDetail';
|
14
|
+
/**
|
15
|
+
* Challenge for ending a session
|
16
|
+
* @export
|
17
|
+
* @interface SessionEndChallenge
|
18
|
+
*/
|
19
|
+
export interface SessionEndChallenge {
|
20
|
+
/**
|
21
|
+
*
|
22
|
+
* @type {ContextualFlowInfo}
|
23
|
+
* @memberof SessionEndChallenge
|
24
|
+
*/
|
25
|
+
flowInfo?: ContextualFlowInfo;
|
26
|
+
/**
|
27
|
+
*
|
28
|
+
* @type {string}
|
29
|
+
* @memberof SessionEndChallenge
|
30
|
+
*/
|
31
|
+
component?: string;
|
32
|
+
/**
|
33
|
+
*
|
34
|
+
* @type {{ [key: string]: Array<ErrorDetail>; }}
|
35
|
+
* @memberof SessionEndChallenge
|
36
|
+
*/
|
37
|
+
responseErrors?: {
|
38
|
+
[key: string]: Array<ErrorDetail>;
|
39
|
+
};
|
40
|
+
/**
|
41
|
+
*
|
42
|
+
* @type {string}
|
43
|
+
* @memberof SessionEndChallenge
|
44
|
+
*/
|
45
|
+
pendingUser: string;
|
46
|
+
/**
|
47
|
+
*
|
48
|
+
* @type {string}
|
49
|
+
* @memberof SessionEndChallenge
|
50
|
+
*/
|
51
|
+
pendingUserAvatar: string;
|
52
|
+
/**
|
53
|
+
*
|
54
|
+
* @type {string}
|
55
|
+
* @memberof SessionEndChallenge
|
56
|
+
*/
|
57
|
+
applicationName?: string;
|
58
|
+
/**
|
59
|
+
*
|
60
|
+
* @type {string}
|
61
|
+
* @memberof SessionEndChallenge
|
62
|
+
*/
|
63
|
+
applicationLaunchUrl?: string;
|
64
|
+
/**
|
65
|
+
*
|
66
|
+
* @type {string}
|
67
|
+
* @memberof SessionEndChallenge
|
68
|
+
*/
|
69
|
+
invalidationFlowUrl?: string;
|
70
|
+
/**
|
71
|
+
*
|
72
|
+
* @type {string}
|
73
|
+
* @memberof SessionEndChallenge
|
74
|
+
*/
|
75
|
+
brandName: string;
|
76
|
+
}
|
77
|
+
/**
|
78
|
+
* Check if a given object implements the SessionEndChallenge interface.
|
79
|
+
*/
|
80
|
+
export declare function instanceOfSessionEndChallenge(value: object): boolean;
|
81
|
+
export declare function SessionEndChallengeFromJSON(json: any): SessionEndChallenge;
|
82
|
+
export declare function SessionEndChallengeFromJSONTyped(json: any, ignoreDiscriminator: boolean): SessionEndChallenge;
|
83
|
+
export declare function SessionEndChallengeToJSON(value?: SessionEndChallenge | null): any;
|
@@ -0,0 +1,70 @@
|
|
1
|
+
"use strict";
|
2
|
+
/* tslint:disable */
|
3
|
+
/* eslint-disable */
|
4
|
+
/**
|
5
|
+
* authentik
|
6
|
+
* Making authentication simple.
|
7
|
+
*
|
8
|
+
* The version of the OpenAPI document: 2024.8.3
|
9
|
+
* Contact: hello@goauthentik.io
|
10
|
+
*
|
11
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
12
|
+
* https://openapi-generator.tech
|
13
|
+
* Do not edit the class manually.
|
14
|
+
*/
|
15
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
16
|
+
exports.SessionEndChallengeToJSON = exports.SessionEndChallengeFromJSONTyped = exports.SessionEndChallengeFromJSON = exports.instanceOfSessionEndChallenge = void 0;
|
17
|
+
const runtime_1 = require("../runtime");
|
18
|
+
const ContextualFlowInfo_1 = require("./ContextualFlowInfo");
|
19
|
+
/**
|
20
|
+
* Check if a given object implements the SessionEndChallenge interface.
|
21
|
+
*/
|
22
|
+
function instanceOfSessionEndChallenge(value) {
|
23
|
+
let isInstance = true;
|
24
|
+
isInstance = isInstance && "pendingUser" in value;
|
25
|
+
isInstance = isInstance && "pendingUserAvatar" in value;
|
26
|
+
isInstance = isInstance && "brandName" in value;
|
27
|
+
return isInstance;
|
28
|
+
}
|
29
|
+
exports.instanceOfSessionEndChallenge = instanceOfSessionEndChallenge;
|
30
|
+
function SessionEndChallengeFromJSON(json) {
|
31
|
+
return SessionEndChallengeFromJSONTyped(json, false);
|
32
|
+
}
|
33
|
+
exports.SessionEndChallengeFromJSON = SessionEndChallengeFromJSON;
|
34
|
+
function SessionEndChallengeFromJSONTyped(json, ignoreDiscriminator) {
|
35
|
+
if ((json === undefined) || (json === null)) {
|
36
|
+
return json;
|
37
|
+
}
|
38
|
+
return {
|
39
|
+
'flowInfo': !(0, runtime_1.exists)(json, 'flow_info') ? undefined : (0, ContextualFlowInfo_1.ContextualFlowInfoFromJSON)(json['flow_info']),
|
40
|
+
'component': !(0, runtime_1.exists)(json, 'component') ? undefined : json['component'],
|
41
|
+
'responseErrors': !(0, runtime_1.exists)(json, 'response_errors') ? undefined : json['response_errors'],
|
42
|
+
'pendingUser': json['pending_user'],
|
43
|
+
'pendingUserAvatar': json['pending_user_avatar'],
|
44
|
+
'applicationName': !(0, runtime_1.exists)(json, 'application_name') ? undefined : json['application_name'],
|
45
|
+
'applicationLaunchUrl': !(0, runtime_1.exists)(json, 'application_launch_url') ? undefined : json['application_launch_url'],
|
46
|
+
'invalidationFlowUrl': !(0, runtime_1.exists)(json, 'invalidation_flow_url') ? undefined : json['invalidation_flow_url'],
|
47
|
+
'brandName': json['brand_name'],
|
48
|
+
};
|
49
|
+
}
|
50
|
+
exports.SessionEndChallengeFromJSONTyped = SessionEndChallengeFromJSONTyped;
|
51
|
+
function SessionEndChallengeToJSON(value) {
|
52
|
+
if (value === undefined) {
|
53
|
+
return undefined;
|
54
|
+
}
|
55
|
+
if (value === null) {
|
56
|
+
return null;
|
57
|
+
}
|
58
|
+
return {
|
59
|
+
'flow_info': (0, ContextualFlowInfo_1.ContextualFlowInfoToJSON)(value.flowInfo),
|
60
|
+
'component': value.component,
|
61
|
+
'response_errors': value.responseErrors,
|
62
|
+
'pending_user': value.pendingUser,
|
63
|
+
'pending_user_avatar': value.pendingUserAvatar,
|
64
|
+
'application_name': value.applicationName,
|
65
|
+
'application_launch_url': value.applicationLaunchUrl,
|
66
|
+
'invalidation_flow_url': value.invalidationFlowUrl,
|
67
|
+
'brand_name': value.brandName,
|
68
|
+
};
|
69
|
+
}
|
70
|
+
exports.SessionEndChallengeToJSON = SessionEndChallengeToJSON;
|
package/dist/models/index.d.ts
CHANGED
@@ -552,6 +552,7 @@ export * from './SelectableStage';
|
|
552
552
|
export * from './ServiceConnection';
|
553
553
|
export * from './ServiceConnectionRequest';
|
554
554
|
export * from './ServiceConnectionState';
|
555
|
+
export * from './SessionEndChallenge';
|
555
556
|
export * from './SessionUser';
|
556
557
|
export * from './Settings';
|
557
558
|
export * from './SettingsRequest';
|
package/dist/models/index.js
CHANGED
@@ -570,6 +570,7 @@ __exportStar(require("./SelectableStage"), exports);
|
|
570
570
|
__exportStar(require("./ServiceConnection"), exports);
|
571
571
|
__exportStar(require("./ServiceConnectionRequest"), exports);
|
572
572
|
__exportStar(require("./ServiceConnectionState"), exports);
|
573
|
+
__exportStar(require("./SessionEndChallenge"), exports);
|
573
574
|
__exportStar(require("./SessionUser"), exports);
|
574
575
|
__exportStar(require("./Settings"), exports);
|
575
576
|
__exportStar(require("./SettingsRequest"), exports);
|
package/package.json
CHANGED
package/src/apis/ProvidersApi.ts
CHANGED
@@ -663,6 +663,7 @@ export interface ProvidersSamlDestroyRequest {
|
|
663
663
|
export interface ProvidersSamlImportMetadataCreateRequest {
|
664
664
|
name: string;
|
665
665
|
authorizationFlow: string;
|
666
|
+
invalidationFlow: string;
|
666
667
|
file: Blob;
|
667
668
|
}
|
668
669
|
|
@@ -677,6 +678,7 @@ export interface ProvidersSamlListRequest {
|
|
677
678
|
defaultRelayState?: string;
|
678
679
|
digestAlgorithm?: ProvidersSamlListDigestAlgorithmEnum;
|
679
680
|
encryptionKp?: string;
|
681
|
+
invalidationFlow?: string;
|
680
682
|
isBackchannel?: boolean;
|
681
683
|
issuer?: string;
|
682
684
|
name?: string;
|
@@ -4470,6 +4472,10 @@ export class ProvidersApi extends runtime.BaseAPI {
|
|
4470
4472
|
throw new runtime.RequiredError('authorizationFlow','Required parameter requestParameters.authorizationFlow was null or undefined when calling providersSamlImportMetadataCreate.');
|
4471
4473
|
}
|
4472
4474
|
|
4475
|
+
if (requestParameters.invalidationFlow === null || requestParameters.invalidationFlow === undefined) {
|
4476
|
+
throw new runtime.RequiredError('invalidationFlow','Required parameter requestParameters.invalidationFlow was null or undefined when calling providersSamlImportMetadataCreate.');
|
4477
|
+
}
|
4478
|
+
|
4473
4479
|
if (requestParameters.file === null || requestParameters.file === undefined) {
|
4474
4480
|
throw new runtime.RequiredError('file','Required parameter requestParameters.file was null or undefined when calling providersSamlImportMetadataCreate.');
|
4475
4481
|
}
|
@@ -4510,6 +4516,10 @@ export class ProvidersApi extends runtime.BaseAPI {
|
|
4510
4516
|
formParams.append('authorization_flow', requestParameters.authorizationFlow as any);
|
4511
4517
|
}
|
4512
4518
|
|
4519
|
+
if (requestParameters.invalidationFlow !== undefined) {
|
4520
|
+
formParams.append('invalidation_flow', requestParameters.invalidationFlow as any);
|
4521
|
+
}
|
4522
|
+
|
4513
4523
|
if (requestParameters.file !== undefined) {
|
4514
4524
|
formParams.append('file', requestParameters.file as any);
|
4515
4525
|
}
|
@@ -4578,6 +4588,10 @@ export class ProvidersApi extends runtime.BaseAPI {
|
|
4578
4588
|
queryParameters['encryption_kp'] = requestParameters.encryptionKp;
|
4579
4589
|
}
|
4580
4590
|
|
4591
|
+
if (requestParameters.invalidationFlow !== undefined) {
|
4592
|
+
queryParameters['invalidation_flow'] = requestParameters.invalidationFlow;
|
4593
|
+
}
|
4594
|
+
|
4581
4595
|
if (requestParameters.isBackchannel !== undefined) {
|
4582
4596
|
queryParameters['is_backchannel'] = requestParameters.isBackchannel;
|
4583
4597
|
}
|
package/src/apis/SourcesApi.ts
CHANGED
@@ -5765,9 +5765,9 @@ export type SourcesSamlListDigestAlgorithmEnum = typeof SourcesSamlListDigestAlg
|
|
5765
5765
|
* @export
|
5766
5766
|
*/
|
5767
5767
|
export const SourcesSamlListNameIdPolicyEnum = {
|
5768
|
+
_11nameidFormatX509SubjectName: 'urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName',
|
5768
5769
|
_11nameidFormatemailAddress: 'urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress',
|
5769
5770
|
_20nameidFormatWindowsDomainQualifiedName: 'urn:oasis:names:tc:SAML:2.0:nameid-format:WindowsDomainQualifiedName',
|
5770
|
-
_20nameidFormatX509SubjectName: 'urn:oasis:names:tc:SAML:2.0:nameid-format:X509SubjectName',
|
5771
5771
|
_20nameidFormatpersistent: 'urn:oasis:names:tc:SAML:2.0:nameid-format:persistent',
|
5772
5772
|
_20nameidFormattransient: 'urn:oasis:names:tc:SAML:2.0:nameid-format:transient',
|
5773
5773
|
UnknownDefaultOpenApi: '11184809'
|
@@ -159,6 +159,13 @@ import {
|
|
159
159
|
RedirectChallengeFromJSONTyped,
|
160
160
|
RedirectChallengeToJSON,
|
161
161
|
} from './RedirectChallenge';
|
162
|
+
import {
|
163
|
+
SessionEndChallenge,
|
164
|
+
instanceOfSessionEndChallenge,
|
165
|
+
SessionEndChallengeFromJSON,
|
166
|
+
SessionEndChallengeFromJSONTyped,
|
167
|
+
SessionEndChallengeToJSON,
|
168
|
+
} from './SessionEndChallenge';
|
162
169
|
import {
|
163
170
|
ShellChallenge,
|
164
171
|
instanceOfShellChallenge,
|
@@ -179,7 +186,7 @@ import {
|
|
179
186
|
*
|
180
187
|
* @export
|
181
188
|
*/
|
182
|
-
export type ChallengeTypes = { component: 'ak-provider-oauth2-device-code' } & OAuthDeviceCodeChallenge | { component: 'ak-provider-oauth2-device-code-finish' } & OAuthDeviceCodeFinishChallenge | { component: 'ak-source-oauth-apple' } & AppleLoginChallenge | { component: 'ak-source-plex' } & PlexAuthenticationChallenge | { component: 'ak-stage-access-denied' } & AccessDeniedChallenge | { component: 'ak-stage-authenticator-duo' } & AuthenticatorDuoChallenge | { component: 'ak-stage-authenticator-sms' } & AuthenticatorSMSChallenge | { component: 'ak-stage-authenticator-static' } & AuthenticatorStaticChallenge | { component: 'ak-stage-authenticator-totp' } & AuthenticatorTOTPChallenge | { component: 'ak-stage-authenticator-validate' } & AuthenticatorValidationChallenge | { component: 'ak-stage-authenticator-webauthn' } & AuthenticatorWebAuthnChallenge | { component: 'ak-stage-autosubmit' } & AutosubmitChallenge | { component: 'ak-stage-captcha' } & CaptchaChallenge | { component: 'ak-stage-consent' } & ConsentChallenge | { component: 'ak-stage-dummy' } & DummyChallenge | { component: 'ak-stage-email' } & EmailChallenge | { component: 'ak-stage-flow-error' } & FlowErrorChallenge | { component: 'ak-stage-identification' } & IdentificationChallenge | { component: 'ak-stage-password' } & PasswordChallenge | { component: 'ak-stage-prompt' } & PromptChallenge | { component: 'ak-stage-user-login' } & UserLoginChallenge | { component: 'xak-flow-redirect' } & RedirectChallenge | { component: 'xak-flow-shell' } & ShellChallenge;
|
189
|
+
export type ChallengeTypes = { component: 'ak-provider-oauth2-device-code' } & OAuthDeviceCodeChallenge | { component: 'ak-provider-oauth2-device-code-finish' } & OAuthDeviceCodeFinishChallenge | { component: 'ak-source-oauth-apple' } & AppleLoginChallenge | { component: 'ak-source-plex' } & PlexAuthenticationChallenge | { component: 'ak-stage-access-denied' } & AccessDeniedChallenge | { component: 'ak-stage-authenticator-duo' } & AuthenticatorDuoChallenge | { component: 'ak-stage-authenticator-sms' } & AuthenticatorSMSChallenge | { component: 'ak-stage-authenticator-static' } & AuthenticatorStaticChallenge | { component: 'ak-stage-authenticator-totp' } & AuthenticatorTOTPChallenge | { component: 'ak-stage-authenticator-validate' } & AuthenticatorValidationChallenge | { component: 'ak-stage-authenticator-webauthn' } & AuthenticatorWebAuthnChallenge | { component: 'ak-stage-autosubmit' } & AutosubmitChallenge | { component: 'ak-stage-captcha' } & CaptchaChallenge | { component: 'ak-stage-consent' } & ConsentChallenge | { component: 'ak-stage-dummy' } & DummyChallenge | { component: 'ak-stage-email' } & EmailChallenge | { component: 'ak-stage-flow-error' } & FlowErrorChallenge | { component: 'ak-stage-identification' } & IdentificationChallenge | { component: 'ak-stage-password' } & PasswordChallenge | { component: 'ak-stage-prompt' } & PromptChallenge | { component: 'ak-stage-session-end' } & SessionEndChallenge | { component: 'ak-stage-user-login' } & UserLoginChallenge | { component: 'xak-flow-redirect' } & RedirectChallenge | { component: 'xak-flow-shell' } & ShellChallenge;
|
183
190
|
|
184
191
|
export function ChallengeTypesFromJSON(json: any): ChallengeTypes {
|
185
192
|
return ChallengeTypesFromJSONTyped(json, false);
|
@@ -230,6 +237,8 @@ export function ChallengeTypesFromJSONTyped(json: any, ignoreDiscriminator: bool
|
|
230
237
|
return {...PasswordChallengeFromJSONTyped(json, true), component: 'ak-stage-password'};
|
231
238
|
case 'ak-stage-prompt':
|
232
239
|
return {...PromptChallengeFromJSONTyped(json, true), component: 'ak-stage-prompt'};
|
240
|
+
case 'ak-stage-session-end':
|
241
|
+
return {...SessionEndChallengeFromJSONTyped(json, true), component: 'ak-stage-session-end'};
|
233
242
|
case 'ak-stage-user-login':
|
234
243
|
return {...UserLoginChallengeFromJSONTyped(json, true), component: 'ak-stage-user-login'};
|
235
244
|
case 'xak-flow-redirect':
|
@@ -289,6 +298,8 @@ export function ChallengeTypesToJSON(value?: ChallengeTypes | null): any {
|
|
289
298
|
return PasswordChallengeToJSON(value);
|
290
299
|
case 'ak-stage-prompt':
|
291
300
|
return PromptChallengeToJSON(value);
|
301
|
+
case 'ak-stage-session-end':
|
302
|
+
return SessionEndChallengeToJSON(value);
|
292
303
|
case 'ak-stage-user-login':
|
293
304
|
return UserLoginChallengeToJSON(value);
|
294
305
|
case 'xak-flow-redirect':
|
@@ -50,6 +50,12 @@ export interface LDAPOutpostConfig {
|
|
50
50
|
* @memberof LDAPOutpostConfig
|
51
51
|
*/
|
52
52
|
bindFlowSlug: string;
|
53
|
+
/**
|
54
|
+
* Get slug for unbind flow, defaulting to brand's default flow.
|
55
|
+
* @type {string}
|
56
|
+
* @memberof LDAPOutpostConfig
|
57
|
+
*/
|
58
|
+
readonly unbindFlowSlug: string | null;
|
53
59
|
/**
|
54
60
|
* Prioritise backchannel slug over direct application slug
|
55
61
|
* @type {string}
|
@@ -108,6 +114,7 @@ export function instanceOfLDAPOutpostConfig(value: object): boolean {
|
|
108
114
|
isInstance = isInstance && "pk" in value;
|
109
115
|
isInstance = isInstance && "name" in value;
|
110
116
|
isInstance = isInstance && "bindFlowSlug" in value;
|
117
|
+
isInstance = isInstance && "unbindFlowSlug" in value;
|
111
118
|
isInstance = isInstance && "applicationSlug" in value;
|
112
119
|
|
113
120
|
return isInstance;
|
@@ -127,6 +134,7 @@ export function LDAPOutpostConfigFromJSONTyped(json: any, ignoreDiscriminator: b
|
|
127
134
|
'name': json['name'],
|
128
135
|
'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
|
129
136
|
'bindFlowSlug': json['bind_flow_slug'],
|
137
|
+
'unbindFlowSlug': json['unbind_flow_slug'],
|
130
138
|
'applicationSlug': json['application_slug'],
|
131
139
|
'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
|
132
140
|
'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
@@ -50,6 +50,12 @@ export interface LDAPProvider {
|
|
50
50
|
* @memberof LDAPProvider
|
51
51
|
*/
|
52
52
|
authorizationFlow: string;
|
53
|
+
/**
|
54
|
+
* Flow used ending the session from a provider.
|
55
|
+
* @type {string}
|
56
|
+
* @memberof LDAPProvider
|
57
|
+
*/
|
58
|
+
invalidationFlow: string;
|
53
59
|
/**
|
54
60
|
*
|
55
61
|
* @type {Array<string>}
|
@@ -168,6 +174,7 @@ export function instanceOfLDAPProvider(value: object): boolean {
|
|
168
174
|
isInstance = isInstance && "pk" in value;
|
169
175
|
isInstance = isInstance && "name" in value;
|
170
176
|
isInstance = isInstance && "authorizationFlow" in value;
|
177
|
+
isInstance = isInstance && "invalidationFlow" in value;
|
171
178
|
isInstance = isInstance && "component" in value;
|
172
179
|
isInstance = isInstance && "assignedApplicationSlug" in value;
|
173
180
|
isInstance = isInstance && "assignedApplicationName" in value;
|
@@ -195,6 +202,7 @@ export function LDAPProviderFromJSONTyped(json: any, ignoreDiscriminator: boolea
|
|
195
202
|
'name': json['name'],
|
196
203
|
'authenticationFlow': !exists(json, 'authentication_flow') ? undefined : json['authentication_flow'],
|
197
204
|
'authorizationFlow': json['authorization_flow'],
|
205
|
+
'invalidationFlow': json['invalidation_flow'],
|
198
206
|
'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
|
199
207
|
'component': json['component'],
|
200
208
|
'assignedApplicationSlug': json['assigned_application_slug'],
|
@@ -228,6 +236,7 @@ export function LDAPProviderToJSON(value?: LDAPProvider | null): any {
|
|
228
236
|
'name': value.name,
|
229
237
|
'authentication_flow': value.authenticationFlow,
|
230
238
|
'authorization_flow': value.authorizationFlow,
|
239
|
+
'invalidation_flow': value.invalidationFlow,
|
231
240
|
'property_mappings': value.propertyMappings,
|
232
241
|
'base_dn': value.baseDn,
|
233
242
|
'certificate': value.certificate,
|
@@ -44,6 +44,12 @@ export interface LDAPProviderRequest {
|
|
44
44
|
* @memberof LDAPProviderRequest
|
45
45
|
*/
|
46
46
|
authorizationFlow: string;
|
47
|
+
/**
|
48
|
+
* Flow used ending the session from a provider.
|
49
|
+
* @type {string}
|
50
|
+
* @memberof LDAPProviderRequest
|
51
|
+
*/
|
52
|
+
invalidationFlow: string;
|
47
53
|
/**
|
48
54
|
*
|
49
55
|
* @type {Array<string>}
|
@@ -107,6 +113,7 @@ export function instanceOfLDAPProviderRequest(value: object): boolean {
|
|
107
113
|
let isInstance = true;
|
108
114
|
isInstance = isInstance && "name" in value;
|
109
115
|
isInstance = isInstance && "authorizationFlow" in value;
|
116
|
+
isInstance = isInstance && "invalidationFlow" in value;
|
110
117
|
|
111
118
|
return isInstance;
|
112
119
|
}
|
@@ -124,6 +131,7 @@ export function LDAPProviderRequestFromJSONTyped(json: any, ignoreDiscriminator:
|
|
124
131
|
'name': json['name'],
|
125
132
|
'authenticationFlow': !exists(json, 'authentication_flow') ? undefined : json['authentication_flow'],
|
126
133
|
'authorizationFlow': json['authorization_flow'],
|
134
|
+
'invalidationFlow': json['invalidation_flow'],
|
127
135
|
'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
|
128
136
|
'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
|
129
137
|
'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
|
@@ -148,6 +156,7 @@ export function LDAPProviderRequestToJSON(value?: LDAPProviderRequest | null): a
|
|
148
156
|
'name': value.name,
|
149
157
|
'authentication_flow': value.authenticationFlow,
|
150
158
|
'authorization_flow': value.authorizationFlow,
|
159
|
+
'invalidation_flow': value.invalidationFlow,
|
151
160
|
'property_mappings': value.propertyMappings,
|
152
161
|
'base_dn': value.baseDn,
|
153
162
|
'certificate': value.certificate,
|
@@ -20,7 +20,7 @@
|
|
20
20
|
export const NameIdPolicyEnum = {
|
21
21
|
_11nameidFormatemailAddress: 'urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress',
|
22
22
|
_20nameidFormatpersistent: 'urn:oasis:names:tc:SAML:2.0:nameid-format:persistent',
|
23
|
-
|
23
|
+
_11nameidFormatX509SubjectName: 'urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName',
|
24
24
|
_20nameidFormatWindowsDomainQualifiedName: 'urn:oasis:names:tc:SAML:2.0:nameid-format:WindowsDomainQualifiedName',
|
25
25
|
_20nameidFormattransient: 'urn:oasis:names:tc:SAML:2.0:nameid-format:transient',
|
26
26
|
UnknownDefaultOpenApi: '11184809'
|
@@ -62,6 +62,12 @@ export interface OAuth2Provider {
|
|
62
62
|
* @memberof OAuth2Provider
|
63
63
|
*/
|
64
64
|
authorizationFlow: string;
|
65
|
+
/**
|
66
|
+
* Flow used ending the session from a provider.
|
67
|
+
* @type {string}
|
68
|
+
* @memberof OAuth2Provider
|
69
|
+
*/
|
70
|
+
invalidationFlow: string;
|
65
71
|
/**
|
66
72
|
*
|
67
73
|
* @type {Array<string>}
|
@@ -198,6 +204,7 @@ export function instanceOfOAuth2Provider(value: object): boolean {
|
|
198
204
|
isInstance = isInstance && "pk" in value;
|
199
205
|
isInstance = isInstance && "name" in value;
|
200
206
|
isInstance = isInstance && "authorizationFlow" in value;
|
207
|
+
isInstance = isInstance && "invalidationFlow" in value;
|
201
208
|
isInstance = isInstance && "component" in value;
|
202
209
|
isInstance = isInstance && "assignedApplicationSlug" in value;
|
203
210
|
isInstance = isInstance && "assignedApplicationName" in value;
|
@@ -224,6 +231,7 @@ export function OAuth2ProviderFromJSONTyped(json: any, ignoreDiscriminator: bool
|
|
224
231
|
'name': json['name'],
|
225
232
|
'authenticationFlow': !exists(json, 'authentication_flow') ? undefined : json['authentication_flow'],
|
226
233
|
'authorizationFlow': json['authorization_flow'],
|
234
|
+
'invalidationFlow': json['invalidation_flow'],
|
227
235
|
'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
|
228
236
|
'component': json['component'],
|
229
237
|
'assignedApplicationSlug': json['assigned_application_slug'],
|
@@ -260,6 +268,7 @@ export function OAuth2ProviderToJSON(value?: OAuth2Provider | null): any {
|
|
260
268
|
'name': value.name,
|
261
269
|
'authentication_flow': value.authenticationFlow,
|
262
270
|
'authorization_flow': value.authorizationFlow,
|
271
|
+
'invalidation_flow': value.invalidationFlow,
|
263
272
|
'property_mappings': value.propertyMappings,
|
264
273
|
'client_type': ClientTypeEnumToJSON(value.clientType),
|
265
274
|
'client_id': value.clientId,
|
@@ -56,6 +56,12 @@ export interface OAuth2ProviderRequest {
|
|
56
56
|
* @memberof OAuth2ProviderRequest
|
57
57
|
*/
|
58
58
|
authorizationFlow: string;
|
59
|
+
/**
|
60
|
+
* Flow used ending the session from a provider.
|
61
|
+
* @type {string}
|
62
|
+
* @memberof OAuth2ProviderRequest
|
63
|
+
*/
|
64
|
+
invalidationFlow: string;
|
59
65
|
/**
|
60
66
|
*
|
61
67
|
* @type {Array<string>}
|
@@ -143,6 +149,7 @@ export function instanceOfOAuth2ProviderRequest(value: object): boolean {
|
|
143
149
|
let isInstance = true;
|
144
150
|
isInstance = isInstance && "name" in value;
|
145
151
|
isInstance = isInstance && "authorizationFlow" in value;
|
152
|
+
isInstance = isInstance && "invalidationFlow" in value;
|
146
153
|
|
147
154
|
return isInstance;
|
148
155
|
}
|
@@ -160,6 +167,7 @@ export function OAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscriminato
|
|
160
167
|
'name': json['name'],
|
161
168
|
'authenticationFlow': !exists(json, 'authentication_flow') ? undefined : json['authentication_flow'],
|
162
169
|
'authorizationFlow': json['authorization_flow'],
|
170
|
+
'invalidationFlow': json['invalidation_flow'],
|
163
171
|
'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
|
164
172
|
'clientType': !exists(json, 'client_type') ? undefined : ClientTypeEnumFromJSON(json['client_type']),
|
165
173
|
'clientId': !exists(json, 'client_id') ? undefined : json['client_id'],
|
@@ -188,6 +196,7 @@ export function OAuth2ProviderRequestToJSON(value?: OAuth2ProviderRequest | null
|
|
188
196
|
'name': value.name,
|
189
197
|
'authentication_flow': value.authenticationFlow,
|
190
198
|
'authorization_flow': value.authorizationFlow,
|
199
|
+
'invalidation_flow': value.invalidationFlow,
|
191
200
|
'property_mappings': value.propertyMappings,
|
192
201
|
'client_type': ClientTypeEnumToJSON(value.clientType),
|
193
202
|
'client_id': value.clientId,
|
@@ -44,6 +44,12 @@ export interface PatchedLDAPProviderRequest {
|
|
44
44
|
* @memberof PatchedLDAPProviderRequest
|
45
45
|
*/
|
46
46
|
authorizationFlow?: string;
|
47
|
+
/**
|
48
|
+
* Flow used ending the session from a provider.
|
49
|
+
* @type {string}
|
50
|
+
* @memberof PatchedLDAPProviderRequest
|
51
|
+
*/
|
52
|
+
invalidationFlow?: string;
|
47
53
|
/**
|
48
54
|
*
|
49
55
|
* @type {Array<string>}
|
@@ -122,6 +128,7 @@ export function PatchedLDAPProviderRequestFromJSONTyped(json: any, ignoreDiscrim
|
|
122
128
|
'name': !exists(json, 'name') ? undefined : json['name'],
|
123
129
|
'authenticationFlow': !exists(json, 'authentication_flow') ? undefined : json['authentication_flow'],
|
124
130
|
'authorizationFlow': !exists(json, 'authorization_flow') ? undefined : json['authorization_flow'],
|
131
|
+
'invalidationFlow': !exists(json, 'invalidation_flow') ? undefined : json['invalidation_flow'],
|
125
132
|
'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
|
126
133
|
'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
|
127
134
|
'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
|
@@ -146,6 +153,7 @@ export function PatchedLDAPProviderRequestToJSON(value?: PatchedLDAPProviderRequ
|
|
146
153
|
'name': value.name,
|
147
154
|
'authentication_flow': value.authenticationFlow,
|
148
155
|
'authorization_flow': value.authorizationFlow,
|
156
|
+
'invalidation_flow': value.invalidationFlow,
|
149
157
|
'property_mappings': value.propertyMappings,
|
150
158
|
'base_dn': value.baseDn,
|
151
159
|
'certificate': value.certificate,
|
@@ -56,6 +56,12 @@ export interface PatchedOAuth2ProviderRequest {
|
|
56
56
|
* @memberof PatchedOAuth2ProviderRequest
|
57
57
|
*/
|
58
58
|
authorizationFlow?: string;
|
59
|
+
/**
|
60
|
+
* Flow used ending the session from a provider.
|
61
|
+
* @type {string}
|
62
|
+
* @memberof PatchedOAuth2ProviderRequest
|
63
|
+
*/
|
64
|
+
invalidationFlow?: string;
|
59
65
|
/**
|
60
66
|
*
|
61
67
|
* @type {Array<string>}
|
@@ -158,6 +164,7 @@ export function PatchedOAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscr
|
|
158
164
|
'name': !exists(json, 'name') ? undefined : json['name'],
|
159
165
|
'authenticationFlow': !exists(json, 'authentication_flow') ? undefined : json['authentication_flow'],
|
160
166
|
'authorizationFlow': !exists(json, 'authorization_flow') ? undefined : json['authorization_flow'],
|
167
|
+
'invalidationFlow': !exists(json, 'invalidation_flow') ? undefined : json['invalidation_flow'],
|
161
168
|
'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
|
162
169
|
'clientType': !exists(json, 'client_type') ? undefined : ClientTypeEnumFromJSON(json['client_type']),
|
163
170
|
'clientId': !exists(json, 'client_id') ? undefined : json['client_id'],
|
@@ -186,6 +193,7 @@ export function PatchedOAuth2ProviderRequestToJSON(value?: PatchedOAuth2Provider
|
|
186
193
|
'name': value.name,
|
187
194
|
'authentication_flow': value.authenticationFlow,
|
188
195
|
'authorization_flow': value.authorizationFlow,
|
196
|
+
'invalidation_flow': value.invalidationFlow,
|
189
197
|
'property_mappings': value.propertyMappings,
|
190
198
|
'client_type': ClientTypeEnumToJSON(value.clientType),
|
191
199
|
'client_id': value.clientId,
|
@@ -44,6 +44,12 @@ export interface PatchedProxyProviderRequest {
|
|
44
44
|
* @memberof PatchedProxyProviderRequest
|
45
45
|
*/
|
46
46
|
authorizationFlow?: string;
|
47
|
+
/**
|
48
|
+
* Flow used ending the session from a provider.
|
49
|
+
* @type {string}
|
50
|
+
* @memberof PatchedProxyProviderRequest
|
51
|
+
*/
|
52
|
+
invalidationFlow?: string;
|
47
53
|
/**
|
48
54
|
*
|
49
55
|
* @type {Array<string>}
|
@@ -158,6 +164,7 @@ export function PatchedProxyProviderRequestFromJSONTyped(json: any, ignoreDiscri
|
|
158
164
|
'name': !exists(json, 'name') ? undefined : json['name'],
|
159
165
|
'authenticationFlow': !exists(json, 'authentication_flow') ? undefined : json['authentication_flow'],
|
160
166
|
'authorizationFlow': !exists(json, 'authorization_flow') ? undefined : json['authorization_flow'],
|
167
|
+
'invalidationFlow': !exists(json, 'invalidation_flow') ? undefined : json['invalidation_flow'],
|
161
168
|
'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
|
162
169
|
'internalHost': !exists(json, 'internal_host') ? undefined : json['internal_host'],
|
163
170
|
'externalHost': !exists(json, 'external_host') ? undefined : json['external_host'],
|
@@ -188,6 +195,7 @@ export function PatchedProxyProviderRequestToJSON(value?: PatchedProxyProviderRe
|
|
188
195
|
'name': value.name,
|
189
196
|
'authentication_flow': value.authenticationFlow,
|
190
197
|
'authorization_flow': value.authorizationFlow,
|
198
|
+
'invalidation_flow': value.invalidationFlow,
|
191
199
|
'property_mappings': value.propertyMappings,
|
192
200
|
'internal_host': value.internalHost,
|
193
201
|
'external_host': value.externalHost,
|