@goauthentik/api 2024.8.3-1728918276 → 2024.8.3-1729166675

Sign up to get free protection for your applications and to get access to all the features.
@@ -75,6 +75,12 @@ export interface Device {
75
75
  * @memberof Device
76
76
  */
77
77
  readonly lastUsed: Date | null;
78
+ /**
79
+ * Get extra description
80
+ * @type {string}
81
+ * @memberof Device
82
+ */
83
+ readonly extraDescription: string;
78
84
  }
79
85
  /**
80
86
  * Check if a given object implements the Device interface.
@@ -26,6 +26,7 @@ export function instanceOfDevice(value) {
26
26
  isInstance = isInstance && "created" in value;
27
27
  isInstance = isInstance && "lastUpdated" in value;
28
28
  isInstance = isInstance && "lastUsed" in value;
29
+ isInstance = isInstance && "extraDescription" in value;
29
30
  return isInstance;
30
31
  }
31
32
  export function DeviceFromJSON(json) {
@@ -46,6 +47,7 @@ export function DeviceFromJSONTyped(json, ignoreDiscriminator) {
46
47
  'created': (new Date(json['created'])),
47
48
  'lastUpdated': (new Date(json['last_updated'])),
48
49
  'lastUsed': (json['last_used'] === null ? null : new Date(json['last_used'])),
50
+ 'extraDescription': json['extra_description'],
49
51
  };
50
52
  }
51
53
  export function DeviceToJSON(value) {
@@ -145,11 +145,17 @@ export interface OAuth2Provider {
145
145
  */
146
146
  includeClaimsInIdToken?: boolean;
147
147
  /**
148
- * Key used to sign the tokens. Only required when JWT Algorithm is set to RS256.
148
+ * Key used to sign the tokens.
149
149
  * @type {string}
150
150
  * @memberof OAuth2Provider
151
151
  */
152
152
  signingKey?: string | null;
153
+ /**
154
+ * Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
155
+ * @type {string}
156
+ * @memberof OAuth2Provider
157
+ */
158
+ encryptionKey?: string | null;
153
159
  /**
154
160
  * Enter each URI on a new line.
155
161
  * @type {string}
@@ -64,6 +64,7 @@ export function OAuth2ProviderFromJSONTyped(json, ignoreDiscriminator) {
64
64
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
65
65
  'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
66
66
  'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
67
+ 'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
67
68
  'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
68
69
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
69
70
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
@@ -91,6 +92,7 @@ export function OAuth2ProviderToJSON(value) {
91
92
  'refresh_token_validity': value.refreshTokenValidity,
92
93
  'include_claims_in_id_token': value.includeClaimsInIdToken,
93
94
  'signing_key': value.signingKey,
95
+ 'encryption_key': value.encryptionKey,
94
96
  'redirect_uris': value.redirectUris,
95
97
  'sub_mode': SubModeEnumToJSON(value.subMode),
96
98
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
@@ -91,11 +91,17 @@ export interface OAuth2ProviderRequest {
91
91
  */
92
92
  includeClaimsInIdToken?: boolean;
93
93
  /**
94
- * Key used to sign the tokens. Only required when JWT Algorithm is set to RS256.
94
+ * Key used to sign the tokens.
95
95
  * @type {string}
96
96
  * @memberof OAuth2ProviderRequest
97
97
  */
98
98
  signingKey?: string | null;
99
+ /**
100
+ * Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
101
+ * @type {string}
102
+ * @memberof OAuth2ProviderRequest
103
+ */
104
+ encryptionKey?: string | null;
99
105
  /**
100
106
  * Enter each URI on a new line.
101
107
  * @type {string}
@@ -46,6 +46,7 @@ export function OAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
46
46
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
47
47
  'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
48
48
  'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
49
+ 'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
49
50
  'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
50
51
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
51
52
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
@@ -73,6 +74,7 @@ export function OAuth2ProviderRequestToJSON(value) {
73
74
  'refresh_token_validity': value.refreshTokenValidity,
74
75
  'include_claims_in_id_token': value.includeClaimsInIdToken,
75
76
  'signing_key': value.signingKey,
77
+ 'encryption_key': value.encryptionKey,
76
78
  'redirect_uris': value.redirectUris,
77
79
  'sub_mode': SubModeEnumToJSON(value.subMode),
78
80
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
@@ -91,11 +91,17 @@ export interface PatchedOAuth2ProviderRequest {
91
91
  */
92
92
  includeClaimsInIdToken?: boolean;
93
93
  /**
94
- * Key used to sign the tokens. Only required when JWT Algorithm is set to RS256.
94
+ * Key used to sign the tokens.
95
95
  * @type {string}
96
96
  * @memberof PatchedOAuth2ProviderRequest
97
97
  */
98
98
  signingKey?: string | null;
99
+ /**
100
+ * Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
101
+ * @type {string}
102
+ * @memberof PatchedOAuth2ProviderRequest
103
+ */
104
+ encryptionKey?: string | null;
99
105
  /**
100
106
  * Enter each URI on a new line.
101
107
  * @type {string}
@@ -43,6 +43,7 @@ export function PatchedOAuth2ProviderRequestFromJSONTyped(json, ignoreDiscrimina
43
43
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
44
44
  'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
45
45
  'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
46
+ 'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
46
47
  'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
47
48
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
48
49
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
@@ -70,6 +71,7 @@ export function PatchedOAuth2ProviderRequestToJSON(value) {
70
71
  'refresh_token_validity': value.refreshTokenValidity,
71
72
  'include_claims_in_id_token': value.includeClaimsInIdToken,
72
73
  'signing_key': value.signingKey,
74
+ 'encryption_key': value.encryptionKey,
73
75
  'redirect_uris': value.redirectUris,
74
76
  'sub_mode': SubModeEnumToJSON(value.subMode),
75
77
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
@@ -75,6 +75,12 @@ export interface Device {
75
75
  * @memberof Device
76
76
  */
77
77
  readonly lastUsed: Date | null;
78
+ /**
79
+ * Get extra description
80
+ * @type {string}
81
+ * @memberof Device
82
+ */
83
+ readonly extraDescription: string;
78
84
  }
79
85
  /**
80
86
  * Check if a given object implements the Device interface.
@@ -29,6 +29,7 @@ function instanceOfDevice(value) {
29
29
  isInstance = isInstance && "created" in value;
30
30
  isInstance = isInstance && "lastUpdated" in value;
31
31
  isInstance = isInstance && "lastUsed" in value;
32
+ isInstance = isInstance && "extraDescription" in value;
32
33
  return isInstance;
33
34
  }
34
35
  exports.instanceOfDevice = instanceOfDevice;
@@ -51,6 +52,7 @@ function DeviceFromJSONTyped(json, ignoreDiscriminator) {
51
52
  'created': (new Date(json['created'])),
52
53
  'lastUpdated': (new Date(json['last_updated'])),
53
54
  'lastUsed': (json['last_used'] === null ? null : new Date(json['last_used'])),
55
+ 'extraDescription': json['extra_description'],
54
56
  };
55
57
  }
56
58
  exports.DeviceFromJSONTyped = DeviceFromJSONTyped;
@@ -145,11 +145,17 @@ export interface OAuth2Provider {
145
145
  */
146
146
  includeClaimsInIdToken?: boolean;
147
147
  /**
148
- * Key used to sign the tokens. Only required when JWT Algorithm is set to RS256.
148
+ * Key used to sign the tokens.
149
149
  * @type {string}
150
150
  * @memberof OAuth2Provider
151
151
  */
152
152
  signingKey?: string | null;
153
+ /**
154
+ * Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
155
+ * @type {string}
156
+ * @memberof OAuth2Provider
157
+ */
158
+ encryptionKey?: string | null;
153
159
  /**
154
160
  * Enter each URI on a new line.
155
161
  * @type {string}
@@ -69,6 +69,7 @@ function OAuth2ProviderFromJSONTyped(json, ignoreDiscriminator) {
69
69
  'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
70
70
  'includeClaimsInIdToken': !(0, runtime_1.exists)(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
71
71
  'signingKey': !(0, runtime_1.exists)(json, 'signing_key') ? undefined : json['signing_key'],
72
+ 'encryptionKey': !(0, runtime_1.exists)(json, 'encryption_key') ? undefined : json['encryption_key'],
72
73
  'redirectUris': !(0, runtime_1.exists)(json, 'redirect_uris') ? undefined : json['redirect_uris'],
73
74
  'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
74
75
  'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
@@ -97,6 +98,7 @@ function OAuth2ProviderToJSON(value) {
97
98
  'refresh_token_validity': value.refreshTokenValidity,
98
99
  'include_claims_in_id_token': value.includeClaimsInIdToken,
99
100
  'signing_key': value.signingKey,
101
+ 'encryption_key': value.encryptionKey,
100
102
  'redirect_uris': value.redirectUris,
101
103
  'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
102
104
  'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
@@ -91,11 +91,17 @@ export interface OAuth2ProviderRequest {
91
91
  */
92
92
  includeClaimsInIdToken?: boolean;
93
93
  /**
94
- * Key used to sign the tokens. Only required when JWT Algorithm is set to RS256.
94
+ * Key used to sign the tokens.
95
95
  * @type {string}
96
96
  * @memberof OAuth2ProviderRequest
97
97
  */
98
98
  signingKey?: string | null;
99
+ /**
100
+ * Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
101
+ * @type {string}
102
+ * @memberof OAuth2ProviderRequest
103
+ */
104
+ encryptionKey?: string | null;
99
105
  /**
100
106
  * Enter each URI on a new line.
101
107
  * @type {string}
@@ -51,6 +51,7 @@ function OAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
51
51
  'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
52
52
  'includeClaimsInIdToken': !(0, runtime_1.exists)(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
53
53
  'signingKey': !(0, runtime_1.exists)(json, 'signing_key') ? undefined : json['signing_key'],
54
+ 'encryptionKey': !(0, runtime_1.exists)(json, 'encryption_key') ? undefined : json['encryption_key'],
54
55
  'redirectUris': !(0, runtime_1.exists)(json, 'redirect_uris') ? undefined : json['redirect_uris'],
55
56
  'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
56
57
  'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
@@ -79,6 +80,7 @@ function OAuth2ProviderRequestToJSON(value) {
79
80
  'refresh_token_validity': value.refreshTokenValidity,
80
81
  'include_claims_in_id_token': value.includeClaimsInIdToken,
81
82
  'signing_key': value.signingKey,
83
+ 'encryption_key': value.encryptionKey,
82
84
  'redirect_uris': value.redirectUris,
83
85
  'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
84
86
  'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
@@ -91,11 +91,17 @@ export interface PatchedOAuth2ProviderRequest {
91
91
  */
92
92
  includeClaimsInIdToken?: boolean;
93
93
  /**
94
- * Key used to sign the tokens. Only required when JWT Algorithm is set to RS256.
94
+ * Key used to sign the tokens.
95
95
  * @type {string}
96
96
  * @memberof PatchedOAuth2ProviderRequest
97
97
  */
98
98
  signingKey?: string | null;
99
+ /**
100
+ * Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
101
+ * @type {string}
102
+ * @memberof PatchedOAuth2ProviderRequest
103
+ */
104
+ encryptionKey?: string | null;
99
105
  /**
100
106
  * Enter each URI on a new line.
101
107
  * @type {string}
@@ -48,6 +48,7 @@ function PatchedOAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
48
48
  'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
49
49
  'includeClaimsInIdToken': !(0, runtime_1.exists)(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
50
50
  'signingKey': !(0, runtime_1.exists)(json, 'signing_key') ? undefined : json['signing_key'],
51
+ 'encryptionKey': !(0, runtime_1.exists)(json, 'encryption_key') ? undefined : json['encryption_key'],
51
52
  'redirectUris': !(0, runtime_1.exists)(json, 'redirect_uris') ? undefined : json['redirect_uris'],
52
53
  'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
53
54
  'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
@@ -76,6 +77,7 @@ function PatchedOAuth2ProviderRequestToJSON(value) {
76
77
  'refresh_token_validity': value.refreshTokenValidity,
77
78
  'include_claims_in_id_token': value.includeClaimsInIdToken,
78
79
  'signing_key': value.signingKey,
80
+ 'encryption_key': value.encryptionKey,
79
81
  'redirect_uris': value.redirectUris,
80
82
  'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
81
83
  'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goauthentik/api",
3
- "version": "2024.8.3-1728918276",
3
+ "version": "2024.8.3-1729166675",
4
4
  "description": "OpenAPI client for @goauthentik/api",
5
5
  "author": "OpenAPI-Generator",
6
6
  "repository": {
@@ -79,6 +79,12 @@ export interface Device {
79
79
  * @memberof Device
80
80
  */
81
81
  readonly lastUsed: Date | null;
82
+ /**
83
+ * Get extra description
84
+ * @type {string}
85
+ * @memberof Device
86
+ */
87
+ readonly extraDescription: string;
82
88
  }
83
89
 
84
90
  /**
@@ -96,6 +102,7 @@ export function instanceOfDevice(value: object): boolean {
96
102
  isInstance = isInstance && "created" in value;
97
103
  isInstance = isInstance && "lastUpdated" in value;
98
104
  isInstance = isInstance && "lastUsed" in value;
105
+ isInstance = isInstance && "extraDescription" in value;
99
106
 
100
107
  return isInstance;
101
108
  }
@@ -120,6 +127,7 @@ export function DeviceFromJSONTyped(json: any, ignoreDiscriminator: boolean): De
120
127
  'created': (new Date(json['created'])),
121
128
  'lastUpdated': (new Date(json['last_updated'])),
122
129
  'lastUsed': (json['last_used'] === null ? null : new Date(json['last_used'])),
130
+ 'extraDescription': json['extra_description'],
123
131
  };
124
132
  }
125
133
 
@@ -165,11 +165,17 @@ export interface OAuth2Provider {
165
165
  */
166
166
  includeClaimsInIdToken?: boolean;
167
167
  /**
168
- * Key used to sign the tokens. Only required when JWT Algorithm is set to RS256.
168
+ * Key used to sign the tokens.
169
169
  * @type {string}
170
170
  * @memberof OAuth2Provider
171
171
  */
172
172
  signingKey?: string | null;
173
+ /**
174
+ * Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
175
+ * @type {string}
176
+ * @memberof OAuth2Provider
177
+ */
178
+ encryptionKey?: string | null;
173
179
  /**
174
180
  * Enter each URI on a new line.
175
181
  * @type {string}
@@ -249,6 +255,7 @@ export function OAuth2ProviderFromJSONTyped(json: any, ignoreDiscriminator: bool
249
255
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
250
256
  'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
251
257
  'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
258
+ 'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
252
259
  'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
253
260
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
254
261
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
@@ -278,6 +285,7 @@ export function OAuth2ProviderToJSON(value?: OAuth2Provider | null): any {
278
285
  'refresh_token_validity': value.refreshTokenValidity,
279
286
  'include_claims_in_id_token': value.includeClaimsInIdToken,
280
287
  'signing_key': value.signingKey,
288
+ 'encryption_key': value.encryptionKey,
281
289
  'redirect_uris': value.redirectUris,
282
290
  'sub_mode': SubModeEnumToJSON(value.subMode),
283
291
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
@@ -111,11 +111,17 @@ export interface OAuth2ProviderRequest {
111
111
  */
112
112
  includeClaimsInIdToken?: boolean;
113
113
  /**
114
- * Key used to sign the tokens. Only required when JWT Algorithm is set to RS256.
114
+ * Key used to sign the tokens.
115
115
  * @type {string}
116
116
  * @memberof OAuth2ProviderRequest
117
117
  */
118
118
  signingKey?: string | null;
119
+ /**
120
+ * Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
121
+ * @type {string}
122
+ * @memberof OAuth2ProviderRequest
123
+ */
124
+ encryptionKey?: string | null;
119
125
  /**
120
126
  * Enter each URI on a new line.
121
127
  * @type {string}
@@ -177,6 +183,7 @@ export function OAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscriminato
177
183
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
178
184
  'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
179
185
  'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
186
+ 'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
180
187
  'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
181
188
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
182
189
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
@@ -206,6 +213,7 @@ export function OAuth2ProviderRequestToJSON(value?: OAuth2ProviderRequest | null
206
213
  'refresh_token_validity': value.refreshTokenValidity,
207
214
  'include_claims_in_id_token': value.includeClaimsInIdToken,
208
215
  'signing_key': value.signingKey,
216
+ 'encryption_key': value.encryptionKey,
209
217
  'redirect_uris': value.redirectUris,
210
218
  'sub_mode': SubModeEnumToJSON(value.subMode),
211
219
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
@@ -111,11 +111,17 @@ export interface PatchedOAuth2ProviderRequest {
111
111
  */
112
112
  includeClaimsInIdToken?: boolean;
113
113
  /**
114
- * Key used to sign the tokens. Only required when JWT Algorithm is set to RS256.
114
+ * Key used to sign the tokens.
115
115
  * @type {string}
116
116
  * @memberof PatchedOAuth2ProviderRequest
117
117
  */
118
118
  signingKey?: string | null;
119
+ /**
120
+ * Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
121
+ * @type {string}
122
+ * @memberof PatchedOAuth2ProviderRequest
123
+ */
124
+ encryptionKey?: string | null;
119
125
  /**
120
126
  * Enter each URI on a new line.
121
127
  * @type {string}
@@ -174,6 +180,7 @@ export function PatchedOAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscr
174
180
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
175
181
  'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
176
182
  'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
183
+ 'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
177
184
  'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
178
185
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
179
186
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
@@ -203,6 +210,7 @@ export function PatchedOAuth2ProviderRequestToJSON(value?: PatchedOAuth2Provider
203
210
  'refresh_token_validity': value.refreshTokenValidity,
204
211
  'include_claims_in_id_token': value.includeClaimsInIdToken,
205
212
  'signing_key': value.signingKey,
213
+ 'encryption_key': value.encryptionKey,
206
214
  'redirect_uris': value.redirectUris,
207
215
  'sub_mode': SubModeEnumToJSON(value.subMode),
208
216
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),