Skip to content

Commit

Permalink
autogen: regenerate OpenAPI client for v1.16.9
Browse files Browse the repository at this point in the history
Version: v1.16.9
  • Loading branch information
aeneasr committed Feb 24, 2025
1 parent 5c37599 commit 1e77eb3
Show file tree
Hide file tree
Showing 306 changed files with 1,041 additions and 323 deletions.
88 changes: 76 additions & 12 deletions api/openapi.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ info:
url: https://www.apache.org/licenses/LICENSE-2.0.html
termsOfService: /ptos
title: Ory APIs
version: v1.16.7
version: v1.16.9
servers:
- url: "https://{project_slug}.projects.oryapis.com/"
variables:
Expand Down Expand Up @@ -2001,7 +2001,7 @@ paths:
explode: true
in: query
name: subject
required: true
required: false
schema:
type: string
style: form
Expand All @@ -2016,6 +2016,17 @@ paths:
schema:
type: string
style: form
- description: |-
Consent Request ID

If set, revoke all token chains derived from this particular consent request ID.
explode: true
in: query
name: consent_request_id
required: false
schema:
type: string
style: form
- description: |-
Revoke All Consent Sessions

Expand Down Expand Up @@ -2125,6 +2136,8 @@ paths:

Alternatively, you can send a SessionID via `sid` query param, in which case, only the session that is connected
to that SessionID is revoked. OpenID Connect Back-channel logout is performed in this case.

When using Ory for the identity provider, the login provider will also invalidate the session cookie.
operationId: revokeOAuth2LoginSessions
parameters:
- description: |-
Expand Down Expand Up @@ -9634,6 +9647,20 @@ components:
x-go-enum-desc: |-
link SelfServiceMessageVerificationStrategyLink
code SelfServiceMessageVerificationStrategyCode
kratos_selfservice_methods_captcha_config_cf_turnstile_sitekey:
description: |-
Configures the Turnstile site key for CAPTCHA protection

The site key is public and will be shared with the client.

Reach out to your account manager to enable this feature.
type: string
kratos_selfservice_methods_captcha_enabled:
description: |-
Configures the Ory Kratos Self-Service Methods' Captcha Enabled Setting

Reach out to your account manager to enable this feature.
type: boolean
kratos_selfservice_methods_code_config_lifespan:
description: |-
Configures the Ory Kratos Code Method's lifespan
Expand Down Expand Up @@ -12588,6 +12615,8 @@ components:
type: string
subject:
type: string
use_auto_link:
type: boolean
title: CredentialsOIDCProvider is contains a specific OpenID COnnect credential
for a particular connection (e.g. Google).
type: object
Expand Down Expand Up @@ -12735,6 +12764,10 @@ components:
description: The subject (`sub`) of the OpenID Connect connection. Usually
the `sub` field of the ID Token.
type: string
use_auto_link:
description: "If set, this credential allows the user to sign in using the\
\ OpenID Connect provider without setting the subject first."
type: boolean
required:
- provider
- subject
Expand Down Expand Up @@ -15262,6 +15295,20 @@ components:
x-go-enum-desc: |-
link SelfServiceMessageVerificationStrategyLink
code SelfServiceMessageVerificationStrategyCode
kratos_selfservice_methods_captcha_config_cf_turnstile_sitekey:
description: |-
Configures the Turnstile site key for CAPTCHA protection

The site key is public and will be shared with the client.

Reach out to your account manager to enable this feature.
type: string
kratos_selfservice_methods_captcha_enabled:
description: |-
Configures the Ory Kratos Self-Service Methods' Captcha Enabled Setting

Reach out to your account manager to enable this feature.
type: boolean
kratos_selfservice_methods_code_config_lifespan:
description: |-
Configures the Ory Kratos Code Method's lifespan
Expand Down Expand Up @@ -16038,7 +16085,7 @@ components:
OAuth 2.0 Access Token Strategy

AccessTokenStrategy is the strategy used to generate access tokens.
Valid options are `jwt` and `opaque`. `jwt` is a bad idea, see https://www.ory.sh/docs/hydra/advanced#json-web-tokens
Valid options are `jwt` and `opaque`. `jwt` is a bad idea, see https://www.ory.sh/docs/oauth2-oidc/jwt-access-token
Setting the stragegy here overrides the global setting in `strategies.access_token`.
type: string
allowed_cors_origins:
Expand Down Expand Up @@ -16394,6 +16441,7 @@ components:
type: object
oAuth2ConsentRequest:
example:
consent_request_id: consent_request_id
requested_access_token_audience:
- requested_access_token_audience
- requested_access_token_audience
Expand Down Expand Up @@ -16500,12 +16548,13 @@ components:
\ JSON for SQL storage."
type: array
challenge:
description: |-
ID is the identifier ("authorization challenge") of the consent authorization request. It is used to
identify the session.
description: Challenge is used to retrieve/accept/deny the consent request.
type: string
client:
$ref: '#/components/schemas/oAuth2Client'
consent_request_id:
description: ConsentRequestID is the ID of the consent request.
type: string
context:
title: "JSONRawMessage represents a json.RawMessage that works well with\
\ JSON, SQL, and Swagger."
Expand Down Expand Up @@ -16623,8 +16672,10 @@ components:
oAuth2ConsentSession:
description: A completed OAuth 2.0 Consent Session.
example:
consent_request_id: consent_request_id
remember: true
consent_request:
consent_request_id: consent_request_id
requested_access_token_audience:
- requested_access_token_audience
- requested_access_token_audience
Expand Down Expand Up @@ -16739,6 +16790,10 @@ components:
properties:
consent_request:
$ref: '#/components/schemas/oAuth2ConsentRequest'
consent_request_id:
description: ConsentRequestID is the identifier of the consent request that
initiated this consent session.
type: string
context:
title: "JSONRawMessage represents a json.RawMessage that works well with\
\ JSON, SQL, and Swagger."
Expand Down Expand Up @@ -16876,9 +16931,7 @@ components:
- requested_scope
properties:
challenge:
description: |-
ID is the identifier ("login challenge") of the login request. It is used to
identify the session.
description: ID is the identifier of the login request.
type: string
client:
$ref: '#/components/schemas/oAuth2Client'
Expand Down Expand Up @@ -16932,6 +16985,7 @@ components:
type: object
oAuth2LogoutRequest:
example:
expires_at: 2000-01-23T04:56:07.000+00:00
subject: subject
challenge: challenge
client:
Expand Down Expand Up @@ -17001,18 +17055,25 @@ components:
- response_types
rp_initiated: true
request_url: request_url
requested_at: 2000-01-23T04:56:07.000+00:00
sid: sid
properties:
challenge:
description: |-
Challenge is the identifier ("logout challenge") of the logout authentication request. It is used to
identify the session.
description: Challenge is the identifier of the logout authentication request.
type: string
client:
$ref: '#/components/schemas/oAuth2Client'
expires_at:
format: date-time
title: NullTime implements sql.NullTime functionality.
type: string
request_url:
description: RequestURL is the original Logout URL requested.
type: string
requested_at:
format: date-time
title: NullTime implements sql.NullTime functionality.
type: string
rp_initiated:
description: "RPInitiated is set to true if the request was initiated by\
\ a Relying Party (RP), also known as an OAuth 2.0 Client."
Expand Down Expand Up @@ -18527,6 +18588,7 @@ components:
captcha Captcha
saml_sp SAMLSP
saml_idp SAMLIDP
auto_link_policy AutoLinkPolicy
data_location_regional DataLocationRegional Required Features
rate_limit_tier RateLimitTier
session_rate_limit_tier RateLimitTierSessions
Expand Down Expand Up @@ -18562,6 +18624,7 @@ components:
- captcha
- saml_sp
- saml_idp
- auto_link_policy
- data_location_regional
- rate_limit_tier
- session_rate_limit_tier
Expand Down Expand Up @@ -18598,6 +18661,7 @@ components:
captcha Captcha
saml_sp SAMLSP
saml_idp SAMLIDP
auto_link_policy AutoLinkPolicy
data_location_regional DataLocationRegional Required Features
rate_limit_tier RateLimitTier
session_rate_limit_tier RateLimitTierSessions
Expand Down
2 changes: 1 addition & 1 deletion api_courier.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion api_events.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion api_frontend.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion api_identity.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Loading

0 comments on commit 1e77eb3

Please sign in to comment.