@goauthentik/api 2025.10.0-rc1-1758890642 → 2025.10.0-rc1-1758925111

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (66) hide show
  1. package/dist/apis/SourcesApi.d.ts +2 -0
  2. package/dist/apis/SourcesApi.d.ts.map +1 -1
  3. package/dist/apis/SourcesApi.js +6 -0
  4. package/dist/apis/SourcesApi.js.map +1 -1
  5. package/dist/esm/apis/SourcesApi.d.ts +2 -0
  6. package/dist/esm/apis/SourcesApi.d.ts.map +1 -1
  7. package/dist/esm/apis/SourcesApi.js +6 -0
  8. package/dist/esm/apis/SourcesApi.js.map +1 -1
  9. package/dist/esm/models/OAuth2Provider.d.ts +6 -0
  10. package/dist/esm/models/OAuth2Provider.d.ts.map +1 -1
  11. package/dist/esm/models/OAuth2Provider.js +2 -0
  12. package/dist/esm/models/OAuth2Provider.js.map +1 -1
  13. package/dist/esm/models/OAuth2ProviderRequest.d.ts +6 -0
  14. package/dist/esm/models/OAuth2ProviderRequest.d.ts.map +1 -1
  15. package/dist/esm/models/OAuth2ProviderRequest.js +2 -0
  16. package/dist/esm/models/OAuth2ProviderRequest.js.map +1 -1
  17. package/dist/esm/models/PatchedOAuth2ProviderRequest.d.ts +6 -0
  18. package/dist/esm/models/PatchedOAuth2ProviderRequest.d.ts.map +1 -1
  19. package/dist/esm/models/PatchedOAuth2ProviderRequest.js +2 -0
  20. package/dist/esm/models/PatchedOAuth2ProviderRequest.js.map +1 -1
  21. package/dist/esm/models/PatchedSAMLSourceRequest.d.ts +12 -0
  22. package/dist/esm/models/PatchedSAMLSourceRequest.d.ts.map +1 -1
  23. package/dist/esm/models/PatchedSAMLSourceRequest.js +4 -0
  24. package/dist/esm/models/PatchedSAMLSourceRequest.js.map +1 -1
  25. package/dist/esm/models/SAMLSource.d.ts +12 -0
  26. package/dist/esm/models/SAMLSource.d.ts.map +1 -1
  27. package/dist/esm/models/SAMLSource.js +4 -0
  28. package/dist/esm/models/SAMLSource.js.map +1 -1
  29. package/dist/esm/models/SAMLSourceRequest.d.ts +12 -0
  30. package/dist/esm/models/SAMLSourceRequest.d.ts.map +1 -1
  31. package/dist/esm/models/SAMLSourceRequest.js +4 -0
  32. package/dist/esm/models/SAMLSourceRequest.js.map +1 -1
  33. package/dist/models/OAuth2Provider.d.ts +6 -0
  34. package/dist/models/OAuth2Provider.d.ts.map +1 -1
  35. package/dist/models/OAuth2Provider.js +2 -0
  36. package/dist/models/OAuth2Provider.js.map +1 -1
  37. package/dist/models/OAuth2ProviderRequest.d.ts +6 -0
  38. package/dist/models/OAuth2ProviderRequest.d.ts.map +1 -1
  39. package/dist/models/OAuth2ProviderRequest.js +2 -0
  40. package/dist/models/OAuth2ProviderRequest.js.map +1 -1
  41. package/dist/models/PatchedOAuth2ProviderRequest.d.ts +6 -0
  42. package/dist/models/PatchedOAuth2ProviderRequest.d.ts.map +1 -1
  43. package/dist/models/PatchedOAuth2ProviderRequest.js +2 -0
  44. package/dist/models/PatchedOAuth2ProviderRequest.js.map +1 -1
  45. package/dist/models/PatchedSAMLSourceRequest.d.ts +12 -0
  46. package/dist/models/PatchedSAMLSourceRequest.d.ts.map +1 -1
  47. package/dist/models/PatchedSAMLSourceRequest.js +4 -0
  48. package/dist/models/PatchedSAMLSourceRequest.js.map +1 -1
  49. package/dist/models/SAMLSource.d.ts +12 -0
  50. package/dist/models/SAMLSource.d.ts.map +1 -1
  51. package/dist/models/SAMLSource.js +4 -0
  52. package/dist/models/SAMLSource.js.map +1 -1
  53. package/dist/models/SAMLSourceRequest.d.ts +12 -0
  54. package/dist/models/SAMLSourceRequest.d.ts.map +1 -1
  55. package/dist/models/SAMLSourceRequest.js +4 -0
  56. package/dist/models/SAMLSourceRequest.js.map +1 -1
  57. package/dist/tsconfig.esm.tsbuildinfo +1 -1
  58. package/package.json +1 -1
  59. package/src/apis/SourcesApi.ts +10 -0
  60. package/src/models/OAuth2Provider.ts +8 -0
  61. package/src/models/OAuth2ProviderRequest.ts +8 -0
  62. package/src/models/PatchedOAuth2ProviderRequest.ts +8 -0
  63. package/src/models/PatchedSAMLSourceRequest.ts +16 -0
  64. package/src/models/SAMLSource.ts +16 -0
  65. package/src/models/SAMLSourceRequest.ts +16 -0
  66. package/tsconfig.tsbuildinfo +1 -1
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goauthentik/api",
3
- "version": "2025.10.0-rc1-1758890642",
3
+ "version": "2025.10.0-rc1-1758925111",
4
4
  "description": "OpenAPI client for @goauthentik/api",
5
5
  "author": "OpenAPI-Generator",
6
6
  "repository": {
@@ -792,6 +792,8 @@ export interface SourcesSamlListRequest {
792
792
  preAuthenticationFlow?: string;
793
793
  search?: string;
794
794
  signatureAlgorithm?: SourcesSamlListSignatureAlgorithmEnum;
795
+ signedAssertion?: boolean;
796
+ signedResponse?: boolean;
795
797
  signingKp?: string;
796
798
  sloUrl?: string;
797
799
  slug?: string;
@@ -5623,6 +5625,14 @@ export class SourcesApi extends runtime.BaseAPI {
5623
5625
  queryParameters['signature_algorithm'] = requestParameters['signatureAlgorithm'];
5624
5626
  }
5625
5627
 
5628
+ if (requestParameters['signedAssertion'] != null) {
5629
+ queryParameters['signed_assertion'] = requestParameters['signedAssertion'];
5630
+ }
5631
+
5632
+ if (requestParameters['signedResponse'] != null) {
5633
+ queryParameters['signed_response'] = requestParameters['signedResponse'];
5634
+ }
5635
+
5626
5636
  if (requestParameters['signingKp'] != null) {
5627
5637
  queryParameters['signing_kp'] = requestParameters['signingKp'];
5628
5638
  }
@@ -168,6 +168,12 @@ export interface OAuth2Provider {
168
168
  * @memberof OAuth2Provider
169
169
  */
170
170
  refreshTokenValidity?: string;
171
+ /**
172
+ * When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3).
173
+ * @type {string}
174
+ * @memberof OAuth2Provider
175
+ */
176
+ refreshTokenThreshold?: string;
171
177
  /**
172
178
  * Include User claims from scopes in the id_token, for applications that don't access the userinfo endpoint.
173
179
  * @type {boolean}
@@ -276,6 +282,7 @@ export function OAuth2ProviderFromJSONTyped(json: any, ignoreDiscriminator: bool
276
282
  'accessCodeValidity': json['access_code_validity'] == null ? undefined : json['access_code_validity'],
277
283
  'accessTokenValidity': json['access_token_validity'] == null ? undefined : json['access_token_validity'],
278
284
  'refreshTokenValidity': json['refresh_token_validity'] == null ? undefined : json['refresh_token_validity'],
285
+ 'refreshTokenThreshold': json['refresh_token_threshold'] == null ? undefined : json['refresh_token_threshold'],
279
286
  'includeClaimsInIdToken': json['include_claims_in_id_token'] == null ? undefined : json['include_claims_in_id_token'],
280
287
  'signingKey': json['signing_key'] == null ? undefined : json['signing_key'],
281
288
  'encryptionKey': json['encryption_key'] == null ? undefined : json['encryption_key'],
@@ -310,6 +317,7 @@ export function OAuth2ProviderToJSONTyped(value?: Omit<OAuth2Provider, 'pk'|'com
310
317
  'access_code_validity': value['accessCodeValidity'],
311
318
  'access_token_validity': value['accessTokenValidity'],
312
319
  'refresh_token_validity': value['refreshTokenValidity'],
320
+ 'refresh_token_threshold': value['refreshTokenThreshold'],
313
321
  'include_claims_in_id_token': value['includeClaimsInIdToken'],
314
322
  'signing_key': value['signingKey'],
315
323
  'encryption_key': value['encryptionKey'],
@@ -114,6 +114,12 @@ export interface OAuth2ProviderRequest {
114
114
  * @memberof OAuth2ProviderRequest
115
115
  */
116
116
  refreshTokenValidity?: string;
117
+ /**
118
+ * When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3).
119
+ * @type {string}
120
+ * @memberof OAuth2ProviderRequest
121
+ */
122
+ refreshTokenThreshold?: string;
117
123
  /**
118
124
  * Include User claims from scopes in the id_token, for applications that don't access the userinfo endpoint.
119
125
  * @type {boolean}
@@ -204,6 +210,7 @@ export function OAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscriminato
204
210
  'accessCodeValidity': json['access_code_validity'] == null ? undefined : json['access_code_validity'],
205
211
  'accessTokenValidity': json['access_token_validity'] == null ? undefined : json['access_token_validity'],
206
212
  'refreshTokenValidity': json['refresh_token_validity'] == null ? undefined : json['refresh_token_validity'],
213
+ 'refreshTokenThreshold': json['refresh_token_threshold'] == null ? undefined : json['refresh_token_threshold'],
207
214
  'includeClaimsInIdToken': json['include_claims_in_id_token'] == null ? undefined : json['include_claims_in_id_token'],
208
215
  'signingKey': json['signing_key'] == null ? undefined : json['signing_key'],
209
216
  'encryptionKey': json['encryption_key'] == null ? undefined : json['encryption_key'],
@@ -238,6 +245,7 @@ export function OAuth2ProviderRequestToJSONTyped(value?: OAuth2ProviderRequest |
238
245
  'access_code_validity': value['accessCodeValidity'],
239
246
  'access_token_validity': value['accessTokenValidity'],
240
247
  'refresh_token_validity': value['refreshTokenValidity'],
248
+ 'refresh_token_threshold': value['refreshTokenThreshold'],
241
249
  'include_claims_in_id_token': value['includeClaimsInIdToken'],
242
250
  'signing_key': value['signingKey'],
243
251
  'encryption_key': value['encryptionKey'],
@@ -114,6 +114,12 @@ export interface PatchedOAuth2ProviderRequest {
114
114
  * @memberof PatchedOAuth2ProviderRequest
115
115
  */
116
116
  refreshTokenValidity?: string;
117
+ /**
118
+ * When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3).
119
+ * @type {string}
120
+ * @memberof PatchedOAuth2ProviderRequest
121
+ */
122
+ refreshTokenThreshold?: string;
117
123
  /**
118
124
  * Include User claims from scopes in the id_token, for applications that don't access the userinfo endpoint.
119
125
  * @type {boolean}
@@ -200,6 +206,7 @@ export function PatchedOAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscr
200
206
  'accessCodeValidity': json['access_code_validity'] == null ? undefined : json['access_code_validity'],
201
207
  'accessTokenValidity': json['access_token_validity'] == null ? undefined : json['access_token_validity'],
202
208
  'refreshTokenValidity': json['refresh_token_validity'] == null ? undefined : json['refresh_token_validity'],
209
+ 'refreshTokenThreshold': json['refresh_token_threshold'] == null ? undefined : json['refresh_token_threshold'],
203
210
  'includeClaimsInIdToken': json['include_claims_in_id_token'] == null ? undefined : json['include_claims_in_id_token'],
204
211
  'signingKey': json['signing_key'] == null ? undefined : json['signing_key'],
205
212
  'encryptionKey': json['encryption_key'] == null ? undefined : json['encryption_key'],
@@ -234,6 +241,7 @@ export function PatchedOAuth2ProviderRequestToJSONTyped(value?: PatchedOAuth2Pro
234
241
  'access_code_validity': value['accessCodeValidity'],
235
242
  'access_token_validity': value['accessTokenValidity'],
236
243
  'refresh_token_validity': value['refreshTokenValidity'],
244
+ 'refresh_token_threshold': value['refreshTokenThreshold'],
237
245
  'include_claims_in_id_token': value['includeClaimsInIdToken'],
238
246
  'signing_key': value['signingKey'],
239
247
  'encryption_key': value['encryptionKey'],
@@ -213,6 +213,18 @@ export interface PatchedSAMLSourceRequest {
213
213
  * @memberof PatchedSAMLSourceRequest
214
214
  */
215
215
  encryptionKp?: string | null;
216
+ /**
217
+ *
218
+ * @type {boolean}
219
+ * @memberof PatchedSAMLSourceRequest
220
+ */
221
+ signedAssertion?: boolean;
222
+ /**
223
+ *
224
+ * @type {boolean}
225
+ * @memberof PatchedSAMLSourceRequest
226
+ */
227
+ signedResponse?: boolean;
216
228
  }
217
229
 
218
230
 
@@ -258,6 +270,8 @@ export function PatchedSAMLSourceRequestFromJSONTyped(json: any, ignoreDiscrimin
258
270
  'signatureAlgorithm': json['signature_algorithm'] == null ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
259
271
  'temporaryUserDeleteAfter': json['temporary_user_delete_after'] == null ? undefined : json['temporary_user_delete_after'],
260
272
  'encryptionKp': json['encryption_kp'] == null ? undefined : json['encryption_kp'],
273
+ 'signedAssertion': json['signed_assertion'] == null ? undefined : json['signed_assertion'],
274
+ 'signedResponse': json['signed_response'] == null ? undefined : json['signed_response'],
261
275
  };
262
276
  }
263
277
 
@@ -296,6 +310,8 @@ export function PatchedSAMLSourceRequestToJSONTyped(value?: PatchedSAMLSourceReq
296
310
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value['signatureAlgorithm']),
297
311
  'temporary_user_delete_after': value['temporaryUserDeleteAfter'],
298
312
  'encryption_kp': value['encryptionKp'],
313
+ 'signed_assertion': value['signedAssertion'],
314
+ 'signed_response': value['signedResponse'],
299
315
  };
300
316
  }
301
317
 
@@ -255,6 +255,18 @@ export interface SAMLSource {
255
255
  * @memberof SAMLSource
256
256
  */
257
257
  encryptionKp?: string | null;
258
+ /**
259
+ *
260
+ * @type {boolean}
261
+ * @memberof SAMLSource
262
+ */
263
+ signedAssertion?: boolean;
264
+ /**
265
+ *
266
+ * @type {boolean}
267
+ * @memberof SAMLSource
268
+ */
269
+ signedResponse?: boolean;
258
270
  }
259
271
 
260
272
 
@@ -318,6 +330,8 @@ export function SAMLSourceFromJSONTyped(json: any, ignoreDiscriminator: boolean)
318
330
  'signatureAlgorithm': json['signature_algorithm'] == null ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
319
331
  'temporaryUserDeleteAfter': json['temporary_user_delete_after'] == null ? undefined : json['temporary_user_delete_after'],
320
332
  'encryptionKp': json['encryption_kp'] == null ? undefined : json['encryption_kp'],
333
+ 'signedAssertion': json['signed_assertion'] == null ? undefined : json['signed_assertion'],
334
+ 'signedResponse': json['signed_response'] == null ? undefined : json['signed_response'],
321
335
  };
322
336
  }
323
337
 
@@ -356,6 +370,8 @@ export function SAMLSourceToJSONTyped(value?: Omit<SAMLSource, 'pk'|'component'|
356
370
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value['signatureAlgorithm']),
357
371
  'temporary_user_delete_after': value['temporaryUserDeleteAfter'],
358
372
  'encryption_kp': value['encryptionKp'],
373
+ 'signed_assertion': value['signedAssertion'],
374
+ 'signed_response': value['signedResponse'],
359
375
  };
360
376
  }
361
377
 
@@ -213,6 +213,18 @@ export interface SAMLSourceRequest {
213
213
  * @memberof SAMLSourceRequest
214
214
  */
215
215
  encryptionKp?: string | null;
216
+ /**
217
+ *
218
+ * @type {boolean}
219
+ * @memberof SAMLSourceRequest
220
+ */
221
+ signedAssertion?: boolean;
222
+ /**
223
+ *
224
+ * @type {boolean}
225
+ * @memberof SAMLSourceRequest
226
+ */
227
+ signedResponse?: boolean;
216
228
  }
217
229
 
218
230
 
@@ -262,6 +274,8 @@ export function SAMLSourceRequestFromJSONTyped(json: any, ignoreDiscriminator: b
262
274
  'signatureAlgorithm': json['signature_algorithm'] == null ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
263
275
  'temporaryUserDeleteAfter': json['temporary_user_delete_after'] == null ? undefined : json['temporary_user_delete_after'],
264
276
  'encryptionKp': json['encryption_kp'] == null ? undefined : json['encryption_kp'],
277
+ 'signedAssertion': json['signed_assertion'] == null ? undefined : json['signed_assertion'],
278
+ 'signedResponse': json['signed_response'] == null ? undefined : json['signed_response'],
265
279
  };
266
280
  }
267
281
 
@@ -300,6 +314,8 @@ export function SAMLSourceRequestToJSONTyped(value?: SAMLSourceRequest | null, i
300
314
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value['signatureAlgorithm']),
301
315
  'temporary_user_delete_after': value['temporaryUserDeleteAfter'],
302
316
  'encryption_kp': value['encryptionKp'],
317
+ 'signed_assertion': value['signedAssertion'],
318
+ 'signed_response': value['signedResponse'],
303
319
  };
304
320
  }
305
321