@goauthentik/api 2024.8.3-1728939481 → 2024.8.3-1729166675
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/esm/models/OAuth2Provider.d.ts +7 -1
- package/dist/esm/models/OAuth2Provider.js +2 -0
- package/dist/esm/models/OAuth2ProviderRequest.d.ts +7 -1
- package/dist/esm/models/OAuth2ProviderRequest.js +2 -0
- package/dist/esm/models/PatchedOAuth2ProviderRequest.d.ts +7 -1
- package/dist/esm/models/PatchedOAuth2ProviderRequest.js +2 -0
- package/dist/models/OAuth2Provider.d.ts +7 -1
- package/dist/models/OAuth2Provider.js +2 -0
- package/dist/models/OAuth2ProviderRequest.d.ts +7 -1
- package/dist/models/OAuth2ProviderRequest.js +2 -0
- package/dist/models/PatchedOAuth2ProviderRequest.d.ts +7 -1
- package/dist/models/PatchedOAuth2ProviderRequest.js +2 -0
- package/package.json +1 -1
- package/src/models/OAuth2Provider.ts +9 -1
- package/src/models/OAuth2ProviderRequest.ts +9 -1
- package/src/models/PatchedOAuth2ProviderRequest.ts +9 -1
|
@@ -145,11 +145,17 @@ export interface OAuth2Provider {
|
|
|
145
145
|
*/
|
|
146
146
|
includeClaimsInIdToken?: boolean;
|
|
147
147
|
/**
|
|
148
|
-
* Key used to sign the tokens.
|
|
148
|
+
* Key used to sign the tokens.
|
|
149
149
|
* @type {string}
|
|
150
150
|
* @memberof OAuth2Provider
|
|
151
151
|
*/
|
|
152
152
|
signingKey?: string | null;
|
|
153
|
+
/**
|
|
154
|
+
* Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
|
|
155
|
+
* @type {string}
|
|
156
|
+
* @memberof OAuth2Provider
|
|
157
|
+
*/
|
|
158
|
+
encryptionKey?: string | null;
|
|
153
159
|
/**
|
|
154
160
|
* Enter each URI on a new line.
|
|
155
161
|
* @type {string}
|
|
@@ -64,6 +64,7 @@ export function OAuth2ProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
64
64
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
|
65
65
|
'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
|
|
66
66
|
'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
|
|
67
|
+
'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
|
|
67
68
|
'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
|
|
68
69
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
|
69
70
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
|
@@ -91,6 +92,7 @@ export function OAuth2ProviderToJSON(value) {
|
|
|
91
92
|
'refresh_token_validity': value.refreshTokenValidity,
|
|
92
93
|
'include_claims_in_id_token': value.includeClaimsInIdToken,
|
|
93
94
|
'signing_key': value.signingKey,
|
|
95
|
+
'encryption_key': value.encryptionKey,
|
|
94
96
|
'redirect_uris': value.redirectUris,
|
|
95
97
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
|
96
98
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|
|
@@ -91,11 +91,17 @@ export interface OAuth2ProviderRequest {
|
|
|
91
91
|
*/
|
|
92
92
|
includeClaimsInIdToken?: boolean;
|
|
93
93
|
/**
|
|
94
|
-
* Key used to sign the tokens.
|
|
94
|
+
* Key used to sign the tokens.
|
|
95
95
|
* @type {string}
|
|
96
96
|
* @memberof OAuth2ProviderRequest
|
|
97
97
|
*/
|
|
98
98
|
signingKey?: string | null;
|
|
99
|
+
/**
|
|
100
|
+
* Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
|
|
101
|
+
* @type {string}
|
|
102
|
+
* @memberof OAuth2ProviderRequest
|
|
103
|
+
*/
|
|
104
|
+
encryptionKey?: string | null;
|
|
99
105
|
/**
|
|
100
106
|
* Enter each URI on a new line.
|
|
101
107
|
* @type {string}
|
|
@@ -46,6 +46,7 @@ export function OAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
46
46
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
|
47
47
|
'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
|
|
48
48
|
'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
|
|
49
|
+
'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
|
|
49
50
|
'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
|
|
50
51
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
|
51
52
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
|
@@ -73,6 +74,7 @@ export function OAuth2ProviderRequestToJSON(value) {
|
|
|
73
74
|
'refresh_token_validity': value.refreshTokenValidity,
|
|
74
75
|
'include_claims_in_id_token': value.includeClaimsInIdToken,
|
|
75
76
|
'signing_key': value.signingKey,
|
|
77
|
+
'encryption_key': value.encryptionKey,
|
|
76
78
|
'redirect_uris': value.redirectUris,
|
|
77
79
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
|
78
80
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|
|
@@ -91,11 +91,17 @@ export interface PatchedOAuth2ProviderRequest {
|
|
|
91
91
|
*/
|
|
92
92
|
includeClaimsInIdToken?: boolean;
|
|
93
93
|
/**
|
|
94
|
-
* Key used to sign the tokens.
|
|
94
|
+
* Key used to sign the tokens.
|
|
95
95
|
* @type {string}
|
|
96
96
|
* @memberof PatchedOAuth2ProviderRequest
|
|
97
97
|
*/
|
|
98
98
|
signingKey?: string | null;
|
|
99
|
+
/**
|
|
100
|
+
* Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
|
|
101
|
+
* @type {string}
|
|
102
|
+
* @memberof PatchedOAuth2ProviderRequest
|
|
103
|
+
*/
|
|
104
|
+
encryptionKey?: string | null;
|
|
99
105
|
/**
|
|
100
106
|
* Enter each URI on a new line.
|
|
101
107
|
* @type {string}
|
|
@@ -43,6 +43,7 @@ export function PatchedOAuth2ProviderRequestFromJSONTyped(json, ignoreDiscrimina
|
|
|
43
43
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
|
44
44
|
'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
|
|
45
45
|
'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
|
|
46
|
+
'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
|
|
46
47
|
'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
|
|
47
48
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
|
48
49
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
|
@@ -70,6 +71,7 @@ export function PatchedOAuth2ProviderRequestToJSON(value) {
|
|
|
70
71
|
'refresh_token_validity': value.refreshTokenValidity,
|
|
71
72
|
'include_claims_in_id_token': value.includeClaimsInIdToken,
|
|
72
73
|
'signing_key': value.signingKey,
|
|
74
|
+
'encryption_key': value.encryptionKey,
|
|
73
75
|
'redirect_uris': value.redirectUris,
|
|
74
76
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
|
75
77
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|
|
@@ -145,11 +145,17 @@ export interface OAuth2Provider {
|
|
|
145
145
|
*/
|
|
146
146
|
includeClaimsInIdToken?: boolean;
|
|
147
147
|
/**
|
|
148
|
-
* Key used to sign the tokens.
|
|
148
|
+
* Key used to sign the tokens.
|
|
149
149
|
* @type {string}
|
|
150
150
|
* @memberof OAuth2Provider
|
|
151
151
|
*/
|
|
152
152
|
signingKey?: string | null;
|
|
153
|
+
/**
|
|
154
|
+
* Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
|
|
155
|
+
* @type {string}
|
|
156
|
+
* @memberof OAuth2Provider
|
|
157
|
+
*/
|
|
158
|
+
encryptionKey?: string | null;
|
|
153
159
|
/**
|
|
154
160
|
* Enter each URI on a new line.
|
|
155
161
|
* @type {string}
|
|
@@ -69,6 +69,7 @@ function OAuth2ProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
69
69
|
'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
|
70
70
|
'includeClaimsInIdToken': !(0, runtime_1.exists)(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
|
|
71
71
|
'signingKey': !(0, runtime_1.exists)(json, 'signing_key') ? undefined : json['signing_key'],
|
|
72
|
+
'encryptionKey': !(0, runtime_1.exists)(json, 'encryption_key') ? undefined : json['encryption_key'],
|
|
72
73
|
'redirectUris': !(0, runtime_1.exists)(json, 'redirect_uris') ? undefined : json['redirect_uris'],
|
|
73
74
|
'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
|
|
74
75
|
'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
|
|
@@ -97,6 +98,7 @@ function OAuth2ProviderToJSON(value) {
|
|
|
97
98
|
'refresh_token_validity': value.refreshTokenValidity,
|
|
98
99
|
'include_claims_in_id_token': value.includeClaimsInIdToken,
|
|
99
100
|
'signing_key': value.signingKey,
|
|
101
|
+
'encryption_key': value.encryptionKey,
|
|
100
102
|
'redirect_uris': value.redirectUris,
|
|
101
103
|
'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
|
|
102
104
|
'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
|
|
@@ -91,11 +91,17 @@ export interface OAuth2ProviderRequest {
|
|
|
91
91
|
*/
|
|
92
92
|
includeClaimsInIdToken?: boolean;
|
|
93
93
|
/**
|
|
94
|
-
* Key used to sign the tokens.
|
|
94
|
+
* Key used to sign the tokens.
|
|
95
95
|
* @type {string}
|
|
96
96
|
* @memberof OAuth2ProviderRequest
|
|
97
97
|
*/
|
|
98
98
|
signingKey?: string | null;
|
|
99
|
+
/**
|
|
100
|
+
* Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
|
|
101
|
+
* @type {string}
|
|
102
|
+
* @memberof OAuth2ProviderRequest
|
|
103
|
+
*/
|
|
104
|
+
encryptionKey?: string | null;
|
|
99
105
|
/**
|
|
100
106
|
* Enter each URI on a new line.
|
|
101
107
|
* @type {string}
|
|
@@ -51,6 +51,7 @@ function OAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
51
51
|
'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
|
52
52
|
'includeClaimsInIdToken': !(0, runtime_1.exists)(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
|
|
53
53
|
'signingKey': !(0, runtime_1.exists)(json, 'signing_key') ? undefined : json['signing_key'],
|
|
54
|
+
'encryptionKey': !(0, runtime_1.exists)(json, 'encryption_key') ? undefined : json['encryption_key'],
|
|
54
55
|
'redirectUris': !(0, runtime_1.exists)(json, 'redirect_uris') ? undefined : json['redirect_uris'],
|
|
55
56
|
'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
|
|
56
57
|
'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
|
|
@@ -79,6 +80,7 @@ function OAuth2ProviderRequestToJSON(value) {
|
|
|
79
80
|
'refresh_token_validity': value.refreshTokenValidity,
|
|
80
81
|
'include_claims_in_id_token': value.includeClaimsInIdToken,
|
|
81
82
|
'signing_key': value.signingKey,
|
|
83
|
+
'encryption_key': value.encryptionKey,
|
|
82
84
|
'redirect_uris': value.redirectUris,
|
|
83
85
|
'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
|
|
84
86
|
'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
|
|
@@ -91,11 +91,17 @@ export interface PatchedOAuth2ProviderRequest {
|
|
|
91
91
|
*/
|
|
92
92
|
includeClaimsInIdToken?: boolean;
|
|
93
93
|
/**
|
|
94
|
-
* Key used to sign the tokens.
|
|
94
|
+
* Key used to sign the tokens.
|
|
95
95
|
* @type {string}
|
|
96
96
|
* @memberof PatchedOAuth2ProviderRequest
|
|
97
97
|
*/
|
|
98
98
|
signingKey?: string | null;
|
|
99
|
+
/**
|
|
100
|
+
* Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
|
|
101
|
+
* @type {string}
|
|
102
|
+
* @memberof PatchedOAuth2ProviderRequest
|
|
103
|
+
*/
|
|
104
|
+
encryptionKey?: string | null;
|
|
99
105
|
/**
|
|
100
106
|
* Enter each URI on a new line.
|
|
101
107
|
* @type {string}
|
|
@@ -48,6 +48,7 @@ function PatchedOAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
48
48
|
'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
|
49
49
|
'includeClaimsInIdToken': !(0, runtime_1.exists)(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
|
|
50
50
|
'signingKey': !(0, runtime_1.exists)(json, 'signing_key') ? undefined : json['signing_key'],
|
|
51
|
+
'encryptionKey': !(0, runtime_1.exists)(json, 'encryption_key') ? undefined : json['encryption_key'],
|
|
51
52
|
'redirectUris': !(0, runtime_1.exists)(json, 'redirect_uris') ? undefined : json['redirect_uris'],
|
|
52
53
|
'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
|
|
53
54
|
'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
|
|
@@ -76,6 +77,7 @@ function PatchedOAuth2ProviderRequestToJSON(value) {
|
|
|
76
77
|
'refresh_token_validity': value.refreshTokenValidity,
|
|
77
78
|
'include_claims_in_id_token': value.includeClaimsInIdToken,
|
|
78
79
|
'signing_key': value.signingKey,
|
|
80
|
+
'encryption_key': value.encryptionKey,
|
|
79
81
|
'redirect_uris': value.redirectUris,
|
|
80
82
|
'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
|
|
81
83
|
'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
|
package/package.json
CHANGED
|
@@ -165,11 +165,17 @@ export interface OAuth2Provider {
|
|
|
165
165
|
*/
|
|
166
166
|
includeClaimsInIdToken?: boolean;
|
|
167
167
|
/**
|
|
168
|
-
* Key used to sign the tokens.
|
|
168
|
+
* Key used to sign the tokens.
|
|
169
169
|
* @type {string}
|
|
170
170
|
* @memberof OAuth2Provider
|
|
171
171
|
*/
|
|
172
172
|
signingKey?: string | null;
|
|
173
|
+
/**
|
|
174
|
+
* Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
|
|
175
|
+
* @type {string}
|
|
176
|
+
* @memberof OAuth2Provider
|
|
177
|
+
*/
|
|
178
|
+
encryptionKey?: string | null;
|
|
173
179
|
/**
|
|
174
180
|
* Enter each URI on a new line.
|
|
175
181
|
* @type {string}
|
|
@@ -249,6 +255,7 @@ export function OAuth2ProviderFromJSONTyped(json: any, ignoreDiscriminator: bool
|
|
|
249
255
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
|
250
256
|
'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
|
|
251
257
|
'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
|
|
258
|
+
'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
|
|
252
259
|
'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
|
|
253
260
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
|
254
261
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
|
@@ -278,6 +285,7 @@ export function OAuth2ProviderToJSON(value?: OAuth2Provider | null): any {
|
|
|
278
285
|
'refresh_token_validity': value.refreshTokenValidity,
|
|
279
286
|
'include_claims_in_id_token': value.includeClaimsInIdToken,
|
|
280
287
|
'signing_key': value.signingKey,
|
|
288
|
+
'encryption_key': value.encryptionKey,
|
|
281
289
|
'redirect_uris': value.redirectUris,
|
|
282
290
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
|
283
291
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|
|
@@ -111,11 +111,17 @@ export interface OAuth2ProviderRequest {
|
|
|
111
111
|
*/
|
|
112
112
|
includeClaimsInIdToken?: boolean;
|
|
113
113
|
/**
|
|
114
|
-
* Key used to sign the tokens.
|
|
114
|
+
* Key used to sign the tokens.
|
|
115
115
|
* @type {string}
|
|
116
116
|
* @memberof OAuth2ProviderRequest
|
|
117
117
|
*/
|
|
118
118
|
signingKey?: string | null;
|
|
119
|
+
/**
|
|
120
|
+
* Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
|
|
121
|
+
* @type {string}
|
|
122
|
+
* @memberof OAuth2ProviderRequest
|
|
123
|
+
*/
|
|
124
|
+
encryptionKey?: string | null;
|
|
119
125
|
/**
|
|
120
126
|
* Enter each URI on a new line.
|
|
121
127
|
* @type {string}
|
|
@@ -177,6 +183,7 @@ export function OAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscriminato
|
|
|
177
183
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
|
178
184
|
'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
|
|
179
185
|
'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
|
|
186
|
+
'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
|
|
180
187
|
'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
|
|
181
188
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
|
182
189
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
|
@@ -206,6 +213,7 @@ export function OAuth2ProviderRequestToJSON(value?: OAuth2ProviderRequest | null
|
|
|
206
213
|
'refresh_token_validity': value.refreshTokenValidity,
|
|
207
214
|
'include_claims_in_id_token': value.includeClaimsInIdToken,
|
|
208
215
|
'signing_key': value.signingKey,
|
|
216
|
+
'encryption_key': value.encryptionKey,
|
|
209
217
|
'redirect_uris': value.redirectUris,
|
|
210
218
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
|
211
219
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|
|
@@ -111,11 +111,17 @@ export interface PatchedOAuth2ProviderRequest {
|
|
|
111
111
|
*/
|
|
112
112
|
includeClaimsInIdToken?: boolean;
|
|
113
113
|
/**
|
|
114
|
-
* Key used to sign the tokens.
|
|
114
|
+
* Key used to sign the tokens.
|
|
115
115
|
* @type {string}
|
|
116
116
|
* @memberof PatchedOAuth2ProviderRequest
|
|
117
117
|
*/
|
|
118
118
|
signingKey?: string | null;
|
|
119
|
+
/**
|
|
120
|
+
* Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
|
|
121
|
+
* @type {string}
|
|
122
|
+
* @memberof PatchedOAuth2ProviderRequest
|
|
123
|
+
*/
|
|
124
|
+
encryptionKey?: string | null;
|
|
119
125
|
/**
|
|
120
126
|
* Enter each URI on a new line.
|
|
121
127
|
* @type {string}
|
|
@@ -174,6 +180,7 @@ export function PatchedOAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscr
|
|
|
174
180
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
|
175
181
|
'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
|
|
176
182
|
'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
|
|
183
|
+
'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
|
|
177
184
|
'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
|
|
178
185
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
|
179
186
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
|
@@ -203,6 +210,7 @@ export function PatchedOAuth2ProviderRequestToJSON(value?: PatchedOAuth2Provider
|
|
|
203
210
|
'refresh_token_validity': value.refreshTokenValidity,
|
|
204
211
|
'include_claims_in_id_token': value.includeClaimsInIdToken,
|
|
205
212
|
'signing_key': value.signingKey,
|
|
213
|
+
'encryption_key': value.encryptionKey,
|
|
206
214
|
'redirect_uris': value.redirectUris,
|
|
207
215
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
|
208
216
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|