@goauthentik/api 2025.6.4-1754314590 → 2025.6.4-1754396177

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (30) hide show
  1. package/dist/esm/models/OAuth2Provider.d.ts +6 -0
  2. package/dist/esm/models/OAuth2Provider.d.ts.map +1 -1
  3. package/dist/esm/models/OAuth2Provider.js +2 -0
  4. package/dist/esm/models/OAuth2Provider.js.map +1 -1
  5. package/dist/esm/models/OAuth2ProviderRequest.d.ts +6 -0
  6. package/dist/esm/models/OAuth2ProviderRequest.d.ts.map +1 -1
  7. package/dist/esm/models/OAuth2ProviderRequest.js +2 -0
  8. package/dist/esm/models/OAuth2ProviderRequest.js.map +1 -1
  9. package/dist/esm/models/PatchedOAuth2ProviderRequest.d.ts +6 -0
  10. package/dist/esm/models/PatchedOAuth2ProviderRequest.d.ts.map +1 -1
  11. package/dist/esm/models/PatchedOAuth2ProviderRequest.js +2 -0
  12. package/dist/esm/models/PatchedOAuth2ProviderRequest.js.map +1 -1
  13. package/dist/models/OAuth2Provider.d.ts +6 -0
  14. package/dist/models/OAuth2Provider.d.ts.map +1 -1
  15. package/dist/models/OAuth2Provider.js +2 -0
  16. package/dist/models/OAuth2Provider.js.map +1 -1
  17. package/dist/models/OAuth2ProviderRequest.d.ts +6 -0
  18. package/dist/models/OAuth2ProviderRequest.d.ts.map +1 -1
  19. package/dist/models/OAuth2ProviderRequest.js +2 -0
  20. package/dist/models/OAuth2ProviderRequest.js.map +1 -1
  21. package/dist/models/PatchedOAuth2ProviderRequest.d.ts +6 -0
  22. package/dist/models/PatchedOAuth2ProviderRequest.d.ts.map +1 -1
  23. package/dist/models/PatchedOAuth2ProviderRequest.js +2 -0
  24. package/dist/models/PatchedOAuth2ProviderRequest.js.map +1 -1
  25. package/dist/tsconfig.esm.tsbuildinfo +1 -1
  26. package/package.json +1 -1
  27. package/src/models/OAuth2Provider.ts +8 -0
  28. package/src/models/OAuth2ProviderRequest.ts +8 -0
  29. package/src/models/PatchedOAuth2ProviderRequest.ts +8 -0
  30. package/tsconfig.tsbuildinfo +1 -1
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goauthentik/api",
3
- "version": "2025.6.4-1754314590",
3
+ "version": "2025.6.4-1754396177",
4
4
  "description": "OpenAPI client for @goauthentik/api",
5
5
  "author": "OpenAPI-Generator",
6
6
  "repository": {
@@ -192,6 +192,12 @@ export interface OAuth2Provider {
192
192
  * @memberof OAuth2Provider
193
193
  */
194
194
  redirectUris: Array<RedirectURI>;
195
+ /**
196
+ *
197
+ * @type {string}
198
+ * @memberof OAuth2Provider
199
+ */
200
+ backchannelLogoutUri?: string;
195
201
  /**
196
202
  * Configure what data should be used as unique User Identifier. For most cases, the default should be fine.
197
203
  * @type {SubModeEnum}
@@ -274,6 +280,7 @@ export function OAuth2ProviderFromJSONTyped(json: any, ignoreDiscriminator: bool
274
280
  'signingKey': json['signing_key'] == null ? undefined : json['signing_key'],
275
281
  'encryptionKey': json['encryption_key'] == null ? undefined : json['encryption_key'],
276
282
  'redirectUris': ((json['redirect_uris'] as Array<any>).map(RedirectURIFromJSON)),
283
+ 'backchannelLogoutUri': json['backchannel_logout_uri'] == null ? undefined : json['backchannel_logout_uri'],
277
284
  'subMode': json['sub_mode'] == null ? undefined : SubModeEnumFromJSON(json['sub_mode']),
278
285
  'issuerMode': json['issuer_mode'] == null ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
279
286
  'jwtFederationSources': json['jwt_federation_sources'] == null ? undefined : json['jwt_federation_sources'],
@@ -307,6 +314,7 @@ export function OAuth2ProviderToJSONTyped(value?: Omit<OAuth2Provider, 'pk'|'com
307
314
  'signing_key': value['signingKey'],
308
315
  'encryption_key': value['encryptionKey'],
309
316
  'redirect_uris': ((value['redirectUris'] as Array<any>).map(RedirectURIToJSON)),
317
+ 'backchannel_logout_uri': value['backchannelLogoutUri'],
310
318
  'sub_mode': SubModeEnumToJSON(value['subMode']),
311
319
  'issuer_mode': IssuerModeEnumToJSON(value['issuerMode']),
312
320
  'jwt_federation_sources': value['jwtFederationSources'],
@@ -138,6 +138,12 @@ export interface OAuth2ProviderRequest {
138
138
  * @memberof OAuth2ProviderRequest
139
139
  */
140
140
  redirectUris: Array<RedirectURIRequest>;
141
+ /**
142
+ *
143
+ * @type {string}
144
+ * @memberof OAuth2ProviderRequest
145
+ */
146
+ backchannelLogoutUri?: string;
141
147
  /**
142
148
  * Configure what data should be used as unique User Identifier. For most cases, the default should be fine.
143
149
  * @type {SubModeEnum}
@@ -202,6 +208,7 @@ export function OAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscriminato
202
208
  'signingKey': json['signing_key'] == null ? undefined : json['signing_key'],
203
209
  'encryptionKey': json['encryption_key'] == null ? undefined : json['encryption_key'],
204
210
  'redirectUris': ((json['redirect_uris'] as Array<any>).map(RedirectURIRequestFromJSON)),
211
+ 'backchannelLogoutUri': json['backchannel_logout_uri'] == null ? undefined : json['backchannel_logout_uri'],
205
212
  'subMode': json['sub_mode'] == null ? undefined : SubModeEnumFromJSON(json['sub_mode']),
206
213
  'issuerMode': json['issuer_mode'] == null ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
207
214
  'jwtFederationSources': json['jwt_federation_sources'] == null ? undefined : json['jwt_federation_sources'],
@@ -235,6 +242,7 @@ export function OAuth2ProviderRequestToJSONTyped(value?: OAuth2ProviderRequest |
235
242
  'signing_key': value['signingKey'],
236
243
  'encryption_key': value['encryptionKey'],
237
244
  'redirect_uris': ((value['redirectUris'] as Array<any>).map(RedirectURIRequestToJSON)),
245
+ 'backchannel_logout_uri': value['backchannelLogoutUri'],
238
246
  'sub_mode': SubModeEnumToJSON(value['subMode']),
239
247
  'issuer_mode': IssuerModeEnumToJSON(value['issuerMode']),
240
248
  'jwt_federation_sources': value['jwtFederationSources'],
@@ -138,6 +138,12 @@ export interface PatchedOAuth2ProviderRequest {
138
138
  * @memberof PatchedOAuth2ProviderRequest
139
139
  */
140
140
  redirectUris?: Array<RedirectURIRequest>;
141
+ /**
142
+ *
143
+ * @type {string}
144
+ * @memberof PatchedOAuth2ProviderRequest
145
+ */
146
+ backchannelLogoutUri?: string;
141
147
  /**
142
148
  * Configure what data should be used as unique User Identifier. For most cases, the default should be fine.
143
149
  * @type {SubModeEnum}
@@ -198,6 +204,7 @@ export function PatchedOAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscr
198
204
  'signingKey': json['signing_key'] == null ? undefined : json['signing_key'],
199
205
  'encryptionKey': json['encryption_key'] == null ? undefined : json['encryption_key'],
200
206
  'redirectUris': json['redirect_uris'] == null ? undefined : ((json['redirect_uris'] as Array<any>).map(RedirectURIRequestFromJSON)),
207
+ 'backchannelLogoutUri': json['backchannel_logout_uri'] == null ? undefined : json['backchannel_logout_uri'],
201
208
  'subMode': json['sub_mode'] == null ? undefined : SubModeEnumFromJSON(json['sub_mode']),
202
209
  'issuerMode': json['issuer_mode'] == null ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
203
210
  'jwtFederationSources': json['jwt_federation_sources'] == null ? undefined : json['jwt_federation_sources'],
@@ -231,6 +238,7 @@ export function PatchedOAuth2ProviderRequestToJSONTyped(value?: PatchedOAuth2Pro
231
238
  'signing_key': value['signingKey'],
232
239
  'encryption_key': value['encryptionKey'],
233
240
  'redirect_uris': value['redirectUris'] == null ? undefined : ((value['redirectUris'] as Array<any>).map(RedirectURIRequestToJSON)),
241
+ 'backchannel_logout_uri': value['backchannelLogoutUri'],
234
242
  'sub_mode': SubModeEnumToJSON(value['subMode']),
235
243
  'issuer_mode': IssuerModeEnumToJSON(value['issuerMode']),
236
244
  'jwt_federation_sources': value['jwtFederationSources'],