@goauthentik/api 2025.10.0-rc1-1758890642 → 2025.10.0-rc1-1758925111
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/apis/SourcesApi.d.ts +2 -0
- package/dist/apis/SourcesApi.d.ts.map +1 -1
- package/dist/apis/SourcesApi.js +6 -0
- package/dist/apis/SourcesApi.js.map +1 -1
- package/dist/esm/apis/SourcesApi.d.ts +2 -0
- package/dist/esm/apis/SourcesApi.d.ts.map +1 -1
- package/dist/esm/apis/SourcesApi.js +6 -0
- package/dist/esm/apis/SourcesApi.js.map +1 -1
- package/dist/esm/models/OAuth2Provider.d.ts +6 -0
- package/dist/esm/models/OAuth2Provider.d.ts.map +1 -1
- package/dist/esm/models/OAuth2Provider.js +2 -0
- package/dist/esm/models/OAuth2Provider.js.map +1 -1
- package/dist/esm/models/OAuth2ProviderRequest.d.ts +6 -0
- package/dist/esm/models/OAuth2ProviderRequest.d.ts.map +1 -1
- package/dist/esm/models/OAuth2ProviderRequest.js +2 -0
- package/dist/esm/models/OAuth2ProviderRequest.js.map +1 -1
- package/dist/esm/models/PatchedOAuth2ProviderRequest.d.ts +6 -0
- package/dist/esm/models/PatchedOAuth2ProviderRequest.d.ts.map +1 -1
- package/dist/esm/models/PatchedOAuth2ProviderRequest.js +2 -0
- package/dist/esm/models/PatchedOAuth2ProviderRequest.js.map +1 -1
- package/dist/esm/models/PatchedSAMLSourceRequest.d.ts +12 -0
- package/dist/esm/models/PatchedSAMLSourceRequest.d.ts.map +1 -1
- package/dist/esm/models/PatchedSAMLSourceRequest.js +4 -0
- package/dist/esm/models/PatchedSAMLSourceRequest.js.map +1 -1
- package/dist/esm/models/SAMLSource.d.ts +12 -0
- package/dist/esm/models/SAMLSource.d.ts.map +1 -1
- package/dist/esm/models/SAMLSource.js +4 -0
- package/dist/esm/models/SAMLSource.js.map +1 -1
- package/dist/esm/models/SAMLSourceRequest.d.ts +12 -0
- package/dist/esm/models/SAMLSourceRequest.d.ts.map +1 -1
- package/dist/esm/models/SAMLSourceRequest.js +4 -0
- package/dist/esm/models/SAMLSourceRequest.js.map +1 -1
- package/dist/models/OAuth2Provider.d.ts +6 -0
- package/dist/models/OAuth2Provider.d.ts.map +1 -1
- package/dist/models/OAuth2Provider.js +2 -0
- package/dist/models/OAuth2Provider.js.map +1 -1
- package/dist/models/OAuth2ProviderRequest.d.ts +6 -0
- package/dist/models/OAuth2ProviderRequest.d.ts.map +1 -1
- package/dist/models/OAuth2ProviderRequest.js +2 -0
- package/dist/models/OAuth2ProviderRequest.js.map +1 -1
- package/dist/models/PatchedOAuth2ProviderRequest.d.ts +6 -0
- package/dist/models/PatchedOAuth2ProviderRequest.d.ts.map +1 -1
- package/dist/models/PatchedOAuth2ProviderRequest.js +2 -0
- package/dist/models/PatchedOAuth2ProviderRequest.js.map +1 -1
- package/dist/models/PatchedSAMLSourceRequest.d.ts +12 -0
- package/dist/models/PatchedSAMLSourceRequest.d.ts.map +1 -1
- package/dist/models/PatchedSAMLSourceRequest.js +4 -0
- package/dist/models/PatchedSAMLSourceRequest.js.map +1 -1
- package/dist/models/SAMLSource.d.ts +12 -0
- package/dist/models/SAMLSource.d.ts.map +1 -1
- package/dist/models/SAMLSource.js +4 -0
- package/dist/models/SAMLSource.js.map +1 -1
- package/dist/models/SAMLSourceRequest.d.ts +12 -0
- package/dist/models/SAMLSourceRequest.d.ts.map +1 -1
- package/dist/models/SAMLSourceRequest.js +4 -0
- package/dist/models/SAMLSourceRequest.js.map +1 -1
- package/dist/tsconfig.esm.tsbuildinfo +1 -1
- package/package.json +1 -1
- package/src/apis/SourcesApi.ts +10 -0
- package/src/models/OAuth2Provider.ts +8 -0
- package/src/models/OAuth2ProviderRequest.ts +8 -0
- package/src/models/PatchedOAuth2ProviderRequest.ts +8 -0
- package/src/models/PatchedSAMLSourceRequest.ts +16 -0
- package/src/models/SAMLSource.ts +16 -0
- package/src/models/SAMLSourceRequest.ts +16 -0
- package/tsconfig.tsbuildinfo +1 -1
package/package.json
CHANGED
package/src/apis/SourcesApi.ts
CHANGED
|
@@ -792,6 +792,8 @@ export interface SourcesSamlListRequest {
|
|
|
792
792
|
preAuthenticationFlow?: string;
|
|
793
793
|
search?: string;
|
|
794
794
|
signatureAlgorithm?: SourcesSamlListSignatureAlgorithmEnum;
|
|
795
|
+
signedAssertion?: boolean;
|
|
796
|
+
signedResponse?: boolean;
|
|
795
797
|
signingKp?: string;
|
|
796
798
|
sloUrl?: string;
|
|
797
799
|
slug?: string;
|
|
@@ -5623,6 +5625,14 @@ export class SourcesApi extends runtime.BaseAPI {
|
|
|
5623
5625
|
queryParameters['signature_algorithm'] = requestParameters['signatureAlgorithm'];
|
|
5624
5626
|
}
|
|
5625
5627
|
|
|
5628
|
+
if (requestParameters['signedAssertion'] != null) {
|
|
5629
|
+
queryParameters['signed_assertion'] = requestParameters['signedAssertion'];
|
|
5630
|
+
}
|
|
5631
|
+
|
|
5632
|
+
if (requestParameters['signedResponse'] != null) {
|
|
5633
|
+
queryParameters['signed_response'] = requestParameters['signedResponse'];
|
|
5634
|
+
}
|
|
5635
|
+
|
|
5626
5636
|
if (requestParameters['signingKp'] != null) {
|
|
5627
5637
|
queryParameters['signing_kp'] = requestParameters['signingKp'];
|
|
5628
5638
|
}
|
|
@@ -168,6 +168,12 @@ export interface OAuth2Provider {
|
|
|
168
168
|
* @memberof OAuth2Provider
|
|
169
169
|
*/
|
|
170
170
|
refreshTokenValidity?: string;
|
|
171
|
+
/**
|
|
172
|
+
* When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3).
|
|
173
|
+
* @type {string}
|
|
174
|
+
* @memberof OAuth2Provider
|
|
175
|
+
*/
|
|
176
|
+
refreshTokenThreshold?: string;
|
|
171
177
|
/**
|
|
172
178
|
* Include User claims from scopes in the id_token, for applications that don't access the userinfo endpoint.
|
|
173
179
|
* @type {boolean}
|
|
@@ -276,6 +282,7 @@ export function OAuth2ProviderFromJSONTyped(json: any, ignoreDiscriminator: bool
|
|
|
276
282
|
'accessCodeValidity': json['access_code_validity'] == null ? undefined : json['access_code_validity'],
|
|
277
283
|
'accessTokenValidity': json['access_token_validity'] == null ? undefined : json['access_token_validity'],
|
|
278
284
|
'refreshTokenValidity': json['refresh_token_validity'] == null ? undefined : json['refresh_token_validity'],
|
|
285
|
+
'refreshTokenThreshold': json['refresh_token_threshold'] == null ? undefined : json['refresh_token_threshold'],
|
|
279
286
|
'includeClaimsInIdToken': json['include_claims_in_id_token'] == null ? undefined : json['include_claims_in_id_token'],
|
|
280
287
|
'signingKey': json['signing_key'] == null ? undefined : json['signing_key'],
|
|
281
288
|
'encryptionKey': json['encryption_key'] == null ? undefined : json['encryption_key'],
|
|
@@ -310,6 +317,7 @@ export function OAuth2ProviderToJSONTyped(value?: Omit<OAuth2Provider, 'pk'|'com
|
|
|
310
317
|
'access_code_validity': value['accessCodeValidity'],
|
|
311
318
|
'access_token_validity': value['accessTokenValidity'],
|
|
312
319
|
'refresh_token_validity': value['refreshTokenValidity'],
|
|
320
|
+
'refresh_token_threshold': value['refreshTokenThreshold'],
|
|
313
321
|
'include_claims_in_id_token': value['includeClaimsInIdToken'],
|
|
314
322
|
'signing_key': value['signingKey'],
|
|
315
323
|
'encryption_key': value['encryptionKey'],
|
|
@@ -114,6 +114,12 @@ export interface OAuth2ProviderRequest {
|
|
|
114
114
|
* @memberof OAuth2ProviderRequest
|
|
115
115
|
*/
|
|
116
116
|
refreshTokenValidity?: string;
|
|
117
|
+
/**
|
|
118
|
+
* When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3).
|
|
119
|
+
* @type {string}
|
|
120
|
+
* @memberof OAuth2ProviderRequest
|
|
121
|
+
*/
|
|
122
|
+
refreshTokenThreshold?: string;
|
|
117
123
|
/**
|
|
118
124
|
* Include User claims from scopes in the id_token, for applications that don't access the userinfo endpoint.
|
|
119
125
|
* @type {boolean}
|
|
@@ -204,6 +210,7 @@ export function OAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscriminato
|
|
|
204
210
|
'accessCodeValidity': json['access_code_validity'] == null ? undefined : json['access_code_validity'],
|
|
205
211
|
'accessTokenValidity': json['access_token_validity'] == null ? undefined : json['access_token_validity'],
|
|
206
212
|
'refreshTokenValidity': json['refresh_token_validity'] == null ? undefined : json['refresh_token_validity'],
|
|
213
|
+
'refreshTokenThreshold': json['refresh_token_threshold'] == null ? undefined : json['refresh_token_threshold'],
|
|
207
214
|
'includeClaimsInIdToken': json['include_claims_in_id_token'] == null ? undefined : json['include_claims_in_id_token'],
|
|
208
215
|
'signingKey': json['signing_key'] == null ? undefined : json['signing_key'],
|
|
209
216
|
'encryptionKey': json['encryption_key'] == null ? undefined : json['encryption_key'],
|
|
@@ -238,6 +245,7 @@ export function OAuth2ProviderRequestToJSONTyped(value?: OAuth2ProviderRequest |
|
|
|
238
245
|
'access_code_validity': value['accessCodeValidity'],
|
|
239
246
|
'access_token_validity': value['accessTokenValidity'],
|
|
240
247
|
'refresh_token_validity': value['refreshTokenValidity'],
|
|
248
|
+
'refresh_token_threshold': value['refreshTokenThreshold'],
|
|
241
249
|
'include_claims_in_id_token': value['includeClaimsInIdToken'],
|
|
242
250
|
'signing_key': value['signingKey'],
|
|
243
251
|
'encryption_key': value['encryptionKey'],
|
|
@@ -114,6 +114,12 @@ export interface PatchedOAuth2ProviderRequest {
|
|
|
114
114
|
* @memberof PatchedOAuth2ProviderRequest
|
|
115
115
|
*/
|
|
116
116
|
refreshTokenValidity?: string;
|
|
117
|
+
/**
|
|
118
|
+
* When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3).
|
|
119
|
+
* @type {string}
|
|
120
|
+
* @memberof PatchedOAuth2ProviderRequest
|
|
121
|
+
*/
|
|
122
|
+
refreshTokenThreshold?: string;
|
|
117
123
|
/**
|
|
118
124
|
* Include User claims from scopes in the id_token, for applications that don't access the userinfo endpoint.
|
|
119
125
|
* @type {boolean}
|
|
@@ -200,6 +206,7 @@ export function PatchedOAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscr
|
|
|
200
206
|
'accessCodeValidity': json['access_code_validity'] == null ? undefined : json['access_code_validity'],
|
|
201
207
|
'accessTokenValidity': json['access_token_validity'] == null ? undefined : json['access_token_validity'],
|
|
202
208
|
'refreshTokenValidity': json['refresh_token_validity'] == null ? undefined : json['refresh_token_validity'],
|
|
209
|
+
'refreshTokenThreshold': json['refresh_token_threshold'] == null ? undefined : json['refresh_token_threshold'],
|
|
203
210
|
'includeClaimsInIdToken': json['include_claims_in_id_token'] == null ? undefined : json['include_claims_in_id_token'],
|
|
204
211
|
'signingKey': json['signing_key'] == null ? undefined : json['signing_key'],
|
|
205
212
|
'encryptionKey': json['encryption_key'] == null ? undefined : json['encryption_key'],
|
|
@@ -234,6 +241,7 @@ export function PatchedOAuth2ProviderRequestToJSONTyped(value?: PatchedOAuth2Pro
|
|
|
234
241
|
'access_code_validity': value['accessCodeValidity'],
|
|
235
242
|
'access_token_validity': value['accessTokenValidity'],
|
|
236
243
|
'refresh_token_validity': value['refreshTokenValidity'],
|
|
244
|
+
'refresh_token_threshold': value['refreshTokenThreshold'],
|
|
237
245
|
'include_claims_in_id_token': value['includeClaimsInIdToken'],
|
|
238
246
|
'signing_key': value['signingKey'],
|
|
239
247
|
'encryption_key': value['encryptionKey'],
|
|
@@ -213,6 +213,18 @@ export interface PatchedSAMLSourceRequest {
|
|
|
213
213
|
* @memberof PatchedSAMLSourceRequest
|
|
214
214
|
*/
|
|
215
215
|
encryptionKp?: string | null;
|
|
216
|
+
/**
|
|
217
|
+
*
|
|
218
|
+
* @type {boolean}
|
|
219
|
+
* @memberof PatchedSAMLSourceRequest
|
|
220
|
+
*/
|
|
221
|
+
signedAssertion?: boolean;
|
|
222
|
+
/**
|
|
223
|
+
*
|
|
224
|
+
* @type {boolean}
|
|
225
|
+
* @memberof PatchedSAMLSourceRequest
|
|
226
|
+
*/
|
|
227
|
+
signedResponse?: boolean;
|
|
216
228
|
}
|
|
217
229
|
|
|
218
230
|
|
|
@@ -258,6 +270,8 @@ export function PatchedSAMLSourceRequestFromJSONTyped(json: any, ignoreDiscrimin
|
|
|
258
270
|
'signatureAlgorithm': json['signature_algorithm'] == null ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
|
259
271
|
'temporaryUserDeleteAfter': json['temporary_user_delete_after'] == null ? undefined : json['temporary_user_delete_after'],
|
|
260
272
|
'encryptionKp': json['encryption_kp'] == null ? undefined : json['encryption_kp'],
|
|
273
|
+
'signedAssertion': json['signed_assertion'] == null ? undefined : json['signed_assertion'],
|
|
274
|
+
'signedResponse': json['signed_response'] == null ? undefined : json['signed_response'],
|
|
261
275
|
};
|
|
262
276
|
}
|
|
263
277
|
|
|
@@ -296,6 +310,8 @@ export function PatchedSAMLSourceRequestToJSONTyped(value?: PatchedSAMLSourceReq
|
|
|
296
310
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value['signatureAlgorithm']),
|
|
297
311
|
'temporary_user_delete_after': value['temporaryUserDeleteAfter'],
|
|
298
312
|
'encryption_kp': value['encryptionKp'],
|
|
313
|
+
'signed_assertion': value['signedAssertion'],
|
|
314
|
+
'signed_response': value['signedResponse'],
|
|
299
315
|
};
|
|
300
316
|
}
|
|
301
317
|
|
package/src/models/SAMLSource.ts
CHANGED
|
@@ -255,6 +255,18 @@ export interface SAMLSource {
|
|
|
255
255
|
* @memberof SAMLSource
|
|
256
256
|
*/
|
|
257
257
|
encryptionKp?: string | null;
|
|
258
|
+
/**
|
|
259
|
+
*
|
|
260
|
+
* @type {boolean}
|
|
261
|
+
* @memberof SAMLSource
|
|
262
|
+
*/
|
|
263
|
+
signedAssertion?: boolean;
|
|
264
|
+
/**
|
|
265
|
+
*
|
|
266
|
+
* @type {boolean}
|
|
267
|
+
* @memberof SAMLSource
|
|
268
|
+
*/
|
|
269
|
+
signedResponse?: boolean;
|
|
258
270
|
}
|
|
259
271
|
|
|
260
272
|
|
|
@@ -318,6 +330,8 @@ export function SAMLSourceFromJSONTyped(json: any, ignoreDiscriminator: boolean)
|
|
|
318
330
|
'signatureAlgorithm': json['signature_algorithm'] == null ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
|
319
331
|
'temporaryUserDeleteAfter': json['temporary_user_delete_after'] == null ? undefined : json['temporary_user_delete_after'],
|
|
320
332
|
'encryptionKp': json['encryption_kp'] == null ? undefined : json['encryption_kp'],
|
|
333
|
+
'signedAssertion': json['signed_assertion'] == null ? undefined : json['signed_assertion'],
|
|
334
|
+
'signedResponse': json['signed_response'] == null ? undefined : json['signed_response'],
|
|
321
335
|
};
|
|
322
336
|
}
|
|
323
337
|
|
|
@@ -356,6 +370,8 @@ export function SAMLSourceToJSONTyped(value?: Omit<SAMLSource, 'pk'|'component'|
|
|
|
356
370
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value['signatureAlgorithm']),
|
|
357
371
|
'temporary_user_delete_after': value['temporaryUserDeleteAfter'],
|
|
358
372
|
'encryption_kp': value['encryptionKp'],
|
|
373
|
+
'signed_assertion': value['signedAssertion'],
|
|
374
|
+
'signed_response': value['signedResponse'],
|
|
359
375
|
};
|
|
360
376
|
}
|
|
361
377
|
|
|
@@ -213,6 +213,18 @@ export interface SAMLSourceRequest {
|
|
|
213
213
|
* @memberof SAMLSourceRequest
|
|
214
214
|
*/
|
|
215
215
|
encryptionKp?: string | null;
|
|
216
|
+
/**
|
|
217
|
+
*
|
|
218
|
+
* @type {boolean}
|
|
219
|
+
* @memberof SAMLSourceRequest
|
|
220
|
+
*/
|
|
221
|
+
signedAssertion?: boolean;
|
|
222
|
+
/**
|
|
223
|
+
*
|
|
224
|
+
* @type {boolean}
|
|
225
|
+
* @memberof SAMLSourceRequest
|
|
226
|
+
*/
|
|
227
|
+
signedResponse?: boolean;
|
|
216
228
|
}
|
|
217
229
|
|
|
218
230
|
|
|
@@ -262,6 +274,8 @@ export function SAMLSourceRequestFromJSONTyped(json: any, ignoreDiscriminator: b
|
|
|
262
274
|
'signatureAlgorithm': json['signature_algorithm'] == null ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
|
263
275
|
'temporaryUserDeleteAfter': json['temporary_user_delete_after'] == null ? undefined : json['temporary_user_delete_after'],
|
|
264
276
|
'encryptionKp': json['encryption_kp'] == null ? undefined : json['encryption_kp'],
|
|
277
|
+
'signedAssertion': json['signed_assertion'] == null ? undefined : json['signed_assertion'],
|
|
278
|
+
'signedResponse': json['signed_response'] == null ? undefined : json['signed_response'],
|
|
265
279
|
};
|
|
266
280
|
}
|
|
267
281
|
|
|
@@ -300,6 +314,8 @@ export function SAMLSourceRequestToJSONTyped(value?: SAMLSourceRequest | null, i
|
|
|
300
314
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value['signatureAlgorithm']),
|
|
301
315
|
'temporary_user_delete_after': value['temporaryUserDeleteAfter'],
|
|
302
316
|
'encryption_kp': value['encryptionKp'],
|
|
317
|
+
'signed_assertion': value['signedAssertion'],
|
|
318
|
+
'signed_response': value['signedResponse'],
|
|
303
319
|
};
|
|
304
320
|
}
|
|
305
321
|
|