Skip to content

Commit 55918df

Browse files
committed
autogen: regenerate OpenAPI client for v1.22.4
Version: v1.22.4
1 parent cd77301 commit 55918df

15 files changed

+17
-61
lines changed

CHANGELOG.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +0,0 @@
1-
# 1.22.3
2-
3-
Please refer to https://changelog.ory.sh and https://www.ory.sh/docs/sdk

doc/AcceptOAuth2ConsentRequest.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,6 @@ Name | Type | Description | Notes
1111
**context** | [**JsonObject**](.md) | | [optional]
1212
**grantAccessTokenAudience** | **BuiltList<String>** | | [optional]
1313
**grantScope** | **BuiltList<String>** | | [optional]
14-
**handledAt** | [**DateTime**](DateTime.md) | | [optional]
1514
**remember** | **bool** | Remember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same client asks the same user for the same, or a subset of, scope. | [optional]
1615
**rememberFor** | **int** | RememberFor sets how long the consent authorization should be remembered for in seconds. If set to `0`, the authorization will be remembered indefinitely. | [optional]
1716
**session** | [**AcceptOAuth2ConsentRequestSession**](AcceptOAuth2ConsentRequestSession.md) | | [optional]

doc/AcceptOAuth2LoginRequest.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,13 +8,13 @@ import 'package:ory_client/api.dart';
88
## Properties
99
Name | Type | Description | Notes
1010
------------ | ------------- | ------------- | -------------
11-
**acr** | **String** | ACR sets the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it to express that, for example, a user authenticated using two factor authentication. | [optional]
11+
**acr** | **String** | ACR sets the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it to express that, for example, a user authenticated using two-factor authentication. | [optional]
1212
**amr** | **BuiltList<String>** | | [optional]
1313
**context** | [**JsonObject**](.md) | | [optional]
1414
**extendSessionLifespan** | **bool** | Extend OAuth2 authentication session lifespan If set to `true`, the OAuth2 authentication cookie lifespan is extended. This is for example useful if you want the user to be able to use `prompt=none` continuously. This value can only be set to `true` if the user has an authentication, which is the case if the `skip` value is `true`. | [optional]
1515
**forceSubjectIdentifier** | **String** | ForceSubjectIdentifier forces the \"pairwise\" user ID of the end-user that authenticated. The \"pairwise\" user ID refers to the (Pairwise Identifier Algorithm)[http://openid.net/specs/openid-connect-core-1_0.html#PairwiseAlg] of the OpenID Connect specification. It allows you to set an obfuscated subject (\"user\") identifier that is unique to the client. Please note that this changes the user ID on endpoint /userinfo and sub claim of the ID Token. It does not change the sub claim in the OAuth 2.0 Introspection. Per default, ORY Hydra handles this value with its own algorithm. In case you want to set this yourself you can use this field. Please note that setting this field has no effect if `pairwise` is not configured in ORY Hydra or the OAuth 2.0 Client does not expect a pairwise identifier (set via `subject_type` key in the client's configuration). Please also be aware that ORY Hydra is unable to properly compute this value during authentication. This implies that you have to compute this value on every authentication process (probably depending on the client ID or some other unique value). If you fail to compute the proper value, then authentication processes which have id_token_hint set might fail. | [optional]
1616
**identityProviderSessionId** | **String** | IdentityProviderSessionID is the session ID of the end-user that authenticated. If specified, we will use this value to propagate the logout. | [optional]
17-
**remember** | **bool** | Remember, if set to true, tells ORY Hydra to remember this user by telling the user agent (browser) to store a cookie with authentication data. If the same user performs another OAuth 2.0 Authorization Request, he/she will not be asked to log in again. | [optional]
17+
**remember** | **bool** | Remember, if set to true, tells Ory Hydra to remember this user by telling the user agent (browser) to store a cookie with authentication data. If the same user performs another OAuth 2.0 Authorization Request, they will not be asked to log in again. | [optional]
1818
**rememberFor** | **int** | RememberFor sets how long the authentication should be remembered for in seconds. If set to `0`, the authorization will be remembered for the duration of the browser session (using a session cookie). | [optional]
1919
**subject** | **String** | Subject is the user ID of the end-user that authenticated. |
2020

doc/NormalizedProjectRevisionThirdPartyProvider.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Name | Type | Description | Notes
2525
**mapperUrl** | **String** | Mapper specifies the JSONNet code snippet which uses the OpenID Connect Provider's data (e.g. GitHub or Google profile information) to hydrate the identity's data. | [optional]
2626
**netIdTokenOriginHeader** | **String** | | [optional]
2727
**organizationId** | **String** | | [optional]
28-
**pkce** | **String** | PKCE controls if the OpenID Connect OAuth2 flow should use PKCE (Proof Key for Code Exchange). Possible values are: `auto` (default), `never`, `force`. `auto`: PKCE is used if the provider supports it. Requires setting `issuer_url`. `never`: Disable PKCE entirely for this provider, even if the provider advertises support for it. `force`: Always use PKCE, even if the provider does not advertise support for it. OAuth2 flows will fail if the provider does not support PKCE. IMPORTANT: If you set this to `force`, you must whitelist a different return URL for your OAuth2 client in the provider's configuration. Instead of <base-url>/self-service/methods/oidc/callback/<provider>, you must use <base-url>/self-service/methods/oidc/callback (Note the missing <provider> path segment and no trailing slash). | [optional]
28+
**pkce** | **String** | | [optional]
2929
**projectRevisionId** | **String** | The Revision's ID this schema belongs to | [optional]
3030
**provider** | **String** | Provider is either \"generic\" for a generic OAuth 2.0 / OpenID Connect Provider or one of: generic google github gitlab microsoft discord slack facebook vk yandex apple | [optional]
3131
**providerId** | **String** | ID is the provider's ID | [optional]

doc/OAuth2Api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -838,7 +838,7 @@ No authorization required
838838
839839
The OAuth 2.0 Device Authorize Endpoint
840840

841-
This endpoint is not documented here because you should never use your own implementation to perform OAuth2 flows. OAuth2 is a very popular protocol and a library for your programming language will exists. To learn more about this flow please refer to the specification: https://tools.ietf.org/html/rfc8628
841+
This endpoint is not documented here because you should never use your own implementation to perform OAuth2 flows. OAuth2 is a very popular protocol and a library for your programming language will exist. To learn more about this flow please refer to the specification: https://tools.ietf.org/html/rfc8628
842842

843843
### Example
844844
```dart
@@ -978,7 +978,7 @@ Name | Type | Description | Notes
978978
979979
OAuth 2.0 Device Verification Endpoint
980980

981-
This is the device user verification endpoint. The user is redirected here when trying to login using the device flow.
981+
This is the device user verification endpoint. The user is redirected here when trying to log in using the device flow.
982982

983983
### Example
984984
```dart

lib/src/api/o_auth2_api.dart

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1597,7 +1597,7 @@ class OAuth2Api {
15971597
}
15981598

15991599
/// The OAuth 2.0 Device Authorize Endpoint
1600-
/// This endpoint is not documented here because you should never use your own implementation to perform OAuth2 flows. OAuth2 is a very popular protocol and a library for your programming language will exists. To learn more about this flow please refer to the specification: https://tools.ietf.org/html/rfc8628
1600+
/// This endpoint is not documented here because you should never use your own implementation to perform OAuth2 flows. OAuth2 is a very popular protocol and a library for your programming language will exist. To learn more about this flow please refer to the specification: https://tools.ietf.org/html/rfc8628
16011601
///
16021602
/// Parameters:
16031603
/// * [cancelToken] - A [CancelToken] that can be used to cancel the operation
@@ -1890,7 +1890,7 @@ class OAuth2Api {
18901890
}
18911891

18921892
/// OAuth 2.0 Device Verification Endpoint
1893-
/// This is the device user verification endpoint. The user is redirected here when trying to login using the device flow.
1893+
/// This is the device user verification endpoint. The user is redirected here when trying to log in using the device flow.
18941894
///
18951895
/// Parameters:
18961896
/// * [cancelToken] - A [CancelToken] that can be used to cancel the operation

lib/src/model/accept_o_auth2_consent_request.dart

Lines changed: 0 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,6 @@ part 'accept_o_auth2_consent_request.g.dart';
1717
/// * [context]
1818
/// * [grantAccessTokenAudience]
1919
/// * [grantScope]
20-
/// * [handledAt]
2120
/// * [remember] - Remember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same client asks the same user for the same, or a subset of, scope.
2221
/// * [rememberFor] - RememberFor sets how long the consent authorization should be remembered for in seconds. If set to `0`, the authorization will be remembered indefinitely.
2322
/// * [session]
@@ -32,9 +31,6 @@ abstract class AcceptOAuth2ConsentRequest implements Built<AcceptOAuth2ConsentRe
3231
@BuiltValueField(wireName: r'grant_scope')
3332
BuiltList<String>? get grantScope;
3433

35-
@BuiltValueField(wireName: r'handled_at')
36-
DateTime? get handledAt;
37-
3834
/// Remember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same client asks the same user for the same, or a subset of, scope.
3935
@BuiltValueField(wireName: r'remember')
4036
bool? get remember;
@@ -90,13 +86,6 @@ class _$AcceptOAuth2ConsentRequestSerializer implements PrimitiveSerializer<Acce
9086
specifiedType: const FullType(BuiltList, [FullType(String)]),
9187
);
9288
}
93-
if (object.handledAt != null) {
94-
yield r'handled_at';
95-
yield serializers.serialize(
96-
object.handledAt,
97-
specifiedType: const FullType(DateTime),
98-
);
99-
}
10089
if (object.remember != null) {
10190
yield r'remember';
10291
yield serializers.serialize(
@@ -162,13 +151,6 @@ class _$AcceptOAuth2ConsentRequestSerializer implements PrimitiveSerializer<Acce
162151
) as BuiltList<String>;
163152
result.grantScope.replace(valueDes);
164153
break;
165-
case r'handled_at':
166-
final valueDes = serializers.deserialize(
167-
value,
168-
specifiedType: const FullType(DateTime),
169-
) as DateTime;
170-
result.handledAt = valueDes;
171-
break;
172154
case r'remember':
173155
final valueDes = serializers.deserialize(
174156
value,

lib/src/model/accept_o_auth2_consent_request.g.dart

Lines changed: 0 additions & 12 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

lib/src/model/accept_o_auth2_login_request.dart

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,18 +13,18 @@ part 'accept_o_auth2_login_request.g.dart';
1313
/// AcceptOAuth2LoginRequest
1414
///
1515
/// Properties:
16-
/// * [acr] - ACR sets the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it to express that, for example, a user authenticated using two factor authentication.
16+
/// * [acr] - ACR sets the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it to express that, for example, a user authenticated using two-factor authentication.
1717
/// * [amr]
1818
/// * [context]
1919
/// * [extendSessionLifespan] - Extend OAuth2 authentication session lifespan If set to `true`, the OAuth2 authentication cookie lifespan is extended. This is for example useful if you want the user to be able to use `prompt=none` continuously. This value can only be set to `true` if the user has an authentication, which is the case if the `skip` value is `true`.
2020
/// * [forceSubjectIdentifier] - ForceSubjectIdentifier forces the \"pairwise\" user ID of the end-user that authenticated. The \"pairwise\" user ID refers to the (Pairwise Identifier Algorithm)[http://openid.net/specs/openid-connect-core-1_0.html#PairwiseAlg] of the OpenID Connect specification. It allows you to set an obfuscated subject (\"user\") identifier that is unique to the client. Please note that this changes the user ID on endpoint /userinfo and sub claim of the ID Token. It does not change the sub claim in the OAuth 2.0 Introspection. Per default, ORY Hydra handles this value with its own algorithm. In case you want to set this yourself you can use this field. Please note that setting this field has no effect if `pairwise` is not configured in ORY Hydra or the OAuth 2.0 Client does not expect a pairwise identifier (set via `subject_type` key in the client's configuration). Please also be aware that ORY Hydra is unable to properly compute this value during authentication. This implies that you have to compute this value on every authentication process (probably depending on the client ID or some other unique value). If you fail to compute the proper value, then authentication processes which have id_token_hint set might fail.
2121
/// * [identityProviderSessionId] - IdentityProviderSessionID is the session ID of the end-user that authenticated. If specified, we will use this value to propagate the logout.
22-
/// * [remember] - Remember, if set to true, tells ORY Hydra to remember this user by telling the user agent (browser) to store a cookie with authentication data. If the same user performs another OAuth 2.0 Authorization Request, he/she will not be asked to log in again.
22+
/// * [remember] - Remember, if set to true, tells Ory Hydra to remember this user by telling the user agent (browser) to store a cookie with authentication data. If the same user performs another OAuth 2.0 Authorization Request, they will not be asked to log in again.
2323
/// * [rememberFor] - RememberFor sets how long the authentication should be remembered for in seconds. If set to `0`, the authorization will be remembered for the duration of the browser session (using a session cookie).
2424
/// * [subject] - Subject is the user ID of the end-user that authenticated.
2525
@BuiltValue()
2626
abstract class AcceptOAuth2LoginRequest implements Built<AcceptOAuth2LoginRequest, AcceptOAuth2LoginRequestBuilder> {
27-
/// ACR sets the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it to express that, for example, a user authenticated using two factor authentication.
27+
/// ACR sets the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it to express that, for example, a user authenticated using two-factor authentication.
2828
@BuiltValueField(wireName: r'acr')
2929
String? get acr;
3030

@@ -46,7 +46,7 @@ abstract class AcceptOAuth2LoginRequest implements Built<AcceptOAuth2LoginReques
4646
@BuiltValueField(wireName: r'identity_provider_session_id')
4747
String? get identityProviderSessionId;
4848

49-
/// Remember, if set to true, tells ORY Hydra to remember this user by telling the user agent (browser) to store a cookie with authentication data. If the same user performs another OAuth 2.0 Authorization Request, he/she will not be asked to log in again.
49+
/// Remember, if set to true, tells Ory Hydra to remember this user by telling the user agent (browser) to store a cookie with authentication data. If the same user performs another OAuth 2.0 Authorization Request, they will not be asked to log in again.
5050
@BuiltValueField(wireName: r'remember')
5151
bool? get remember;
5252

0 commit comments

Comments
 (0)