diff --git a/frontend/src/openapi/models/createServiceAccountSchema.ts b/frontend/src/openapi/models/createServiceAccountSchema.ts index 066c6f6b8c..95539f9c51 100644 --- a/frontend/src/openapi/models/createServiceAccountSchema.ts +++ b/frontend/src/openapi/models/createServiceAccountSchema.ts @@ -9,9 +9,9 @@ */ export interface CreateServiceAccountSchema { /** The name of the service account */ - name?: string; + name: string; /** The id of the root role for the service account */ rootRole: number; /** The username of the service account */ - username?: string; + username: string; } diff --git a/frontend/src/openapi/models/getPersonalDashboard401.ts b/frontend/src/openapi/models/getPersonalDashboard401.ts new file mode 100644 index 0000000000..5e02e10bfb --- /dev/null +++ b/frontend/src/openapi/models/getPersonalDashboard401.ts @@ -0,0 +1,14 @@ +/** + * Generated by Orval + * Do not edit manually. + * See `gen:api` script in package.json + */ + +export type GetPersonalDashboard401 = { + /** The ID of the error instance */ + id?: string; + /** A description of what went wrong. */ + message?: string; + /** The name of the error kind */ + name?: string; +}; diff --git a/frontend/src/openapi/models/getPersonalDashboard403.ts b/frontend/src/openapi/models/getPersonalDashboard403.ts new file mode 100644 index 0000000000..7e23722a92 --- /dev/null +++ b/frontend/src/openapi/models/getPersonalDashboard403.ts @@ -0,0 +1,14 @@ +/** + * Generated by Orval + * Do not edit manually. + * See `gen:api` script in package.json + */ + +export type GetPersonalDashboard403 = { + /** The ID of the error instance */ + id?: string; + /** A description of what went wrong. */ + message?: string; + /** The name of the error kind */ + name?: string; +}; diff --git a/frontend/src/openapi/models/getPersonalDashboard404.ts b/frontend/src/openapi/models/getPersonalDashboard404.ts new file mode 100644 index 0000000000..34232af00e --- /dev/null +++ b/frontend/src/openapi/models/getPersonalDashboard404.ts @@ -0,0 +1,14 @@ +/** + * Generated by Orval + * Do not edit manually. + * See `gen:api` script in package.json + */ + +export type GetPersonalDashboard404 = { + /** The ID of the error instance */ + id?: string; + /** A description of what went wrong. */ + message?: string; + /** The name of the error kind */ + name?: string; +}; diff --git a/frontend/src/openapi/models/index.ts b/frontend/src/openapi/models/index.ts index 6ec220645b..f0353accdf 100644 --- a/frontend/src/openapi/models/index.ts +++ b/frontend/src/openapi/models/index.ts @@ -690,6 +690,9 @@ export * from './getOutdatedSdks404'; export * from './getPats401'; export * from './getPats403'; export * from './getPats404'; +export * from './getPersonalDashboard401'; +export * from './getPersonalDashboard403'; +export * from './getPersonalDashboard404'; export * from './getPlayground400'; export * from './getPlayground401'; export * from './getProfile401'; @@ -846,6 +849,9 @@ export * from './notificationsSchema'; export * from './notificationsSchemaItem'; export * from './notificationsSchemaItemCreatedBy'; export * from './notificationsSchemaItemNotificationType'; +export * from './oidcSettingsResponseSchema'; +export * from './oidcSettingsResponseSchemaDefaultRootRole'; +export * from './oidcSettingsResponseSchemaIdTokenSigningAlgorithm'; export * from './oidcSettingsSchema'; export * from './oidcSettingsSchemaOneOf'; export * from './oidcSettingsSchemaOneOfDefaultRootRole'; @@ -894,6 +900,9 @@ export * from './patchSchemaOp'; export * from './patchesSchema'; export * from './patsSchema'; export * from './permissionSchema'; +export * from './personalDashboardSchema'; +export * from './personalDashboardSchemaFlagsItem'; +export * from './personalDashboardSchemaProjectsItem'; export * from './playgroundConstraintSchema'; export * from './playgroundConstraintSchemaOperator'; export * from './playgroundFeatureSchema'; @@ -1040,6 +1049,8 @@ export * from './roleWithPermissionsSchema'; export * from './roleWithVersionSchema'; export * from './rolesSchema'; export * from './rolesWithVersionSchema'; +export * from './samlSettingsResponseSchema'; +export * from './samlSettingsResponseSchemaDefaultRootRole'; export * from './samlSettingsSchema'; export * from './samlSettingsSchemaOneOf'; export * from './samlSettingsSchemaOneOfDefaultRootRole'; diff --git a/frontend/src/openapi/models/oidcSettingsResponseSchema.ts b/frontend/src/openapi/models/oidcSettingsResponseSchema.ts new file mode 100644 index 0000000000..ddf5b2a18b --- /dev/null +++ b/frontend/src/openapi/models/oidcSettingsResponseSchema.ts @@ -0,0 +1,43 @@ +/** + * Generated by Orval + * Do not edit manually. + * See `gen:api` script in package.json + */ +import type { OidcSettingsResponseSchemaDefaultRootRole } from './oidcSettingsResponseSchemaDefaultRootRole'; +import type { OidcSettingsResponseSchemaIdTokenSigningAlgorithm } from './oidcSettingsResponseSchemaIdTokenSigningAlgorithm'; + +/** + * Response for OpenID Connect settings + */ +export interface OidcSettingsResponseSchema { + /** Authentication Context Class Reference, used to request extra values in the acr claim returned from the server. If multiple values are required, they should be space separated. + Consult [the OIDC reference](https://openid.net/specs/openid-connect-core-1_0.html#AuthorizationEndpoint) for more information + */ + acrValues?: string; + /** When enabled Unleash will also request the 'groups' scope as part of the login request. */ + addGroupsScope?: boolean; + /** Auto create users based on email addresses from login tokens */ + autoCreate?: boolean; + /** The OIDC client ID of this application. */ + clientId?: string; + /** [Default role](https://docs.getunleash.io/reference/rbac#standard-roles) granted to users auto-created from email. Only relevant if autoCreate is `true` */ + defaultRootRole?: OidcSettingsResponseSchemaDefaultRootRole; + /** Assign this root role to auto created users. Should be a role ID and takes precedence over `defaultRootRole`. */ + defaultRootRoleId?: number; + /** The [.well-known OpenID discover URL](https://swagger.io/docs/specification/authentication/openid-connect-discovery/) */ + discoverUrl?: string; + /** Comma separated list of email domains that are automatically approved for an account in the server. Only relevant if autoCreate is `true` */ + emailDomains?: string; + /** Whether to enable or disable OpenID Connect for this instance */ + enabled?: boolean; + /** Should we enable group syncing. Refer to the documentation [Group syncing](https://docs.getunleash.io/how-to/how-to-set-up-group-sso-sync) */ + enableGroupSyncing?: boolean; + /** Support Single sign out when user clicks logout in Unleash. If `true` user is signed out of all OpenID Connect sessions against the clientId they may have active */ + enableSingleSignOut?: boolean; + /** Specifies the path in the OIDC token response to read which groups the user belongs to from. */ + groupJsonPath?: string; + /** The signing algorithm used to sign our token. Refer to the [JWT signatures](https://jwt.io/introduction) documentation for more information. */ + idTokenSigningAlgorithm?: OidcSettingsResponseSchemaIdTokenSigningAlgorithm; + /** Shared secret from OpenID server. Used to authenticate login requests */ + secret?: string; +} diff --git a/frontend/src/openapi/models/oidcSettingsResponseSchemaDefaultRootRole.ts b/frontend/src/openapi/models/oidcSettingsResponseSchemaDefaultRootRole.ts new file mode 100644 index 0000000000..0b7e5f01a0 --- /dev/null +++ b/frontend/src/openapi/models/oidcSettingsResponseSchemaDefaultRootRole.ts @@ -0,0 +1,18 @@ +/** + * Generated by Orval + * Do not edit manually. + * See `gen:api` script in package.json + */ + +/** + * [Default role](https://docs.getunleash.io/reference/rbac#standard-roles) granted to users auto-created from email. Only relevant if autoCreate is `true` + */ +export type OidcSettingsResponseSchemaDefaultRootRole = + (typeof OidcSettingsResponseSchemaDefaultRootRole)[keyof typeof OidcSettingsResponseSchemaDefaultRootRole]; + +// eslint-disable-next-line @typescript-eslint/no-redeclare +export const OidcSettingsResponseSchemaDefaultRootRole = { + Viewer: 'Viewer', + Editor: 'Editor', + Admin: 'Admin', +} as const; diff --git a/frontend/src/openapi/models/oidcSettingsResponseSchemaIdTokenSigningAlgorithm.ts b/frontend/src/openapi/models/oidcSettingsResponseSchemaIdTokenSigningAlgorithm.ts new file mode 100644 index 0000000000..58fe736307 --- /dev/null +++ b/frontend/src/openapi/models/oidcSettingsResponseSchemaIdTokenSigningAlgorithm.ts @@ -0,0 +1,18 @@ +/** + * Generated by Orval + * Do not edit manually. + * See `gen:api` script in package.json + */ + +/** + * The signing algorithm used to sign our token. Refer to the [JWT signatures](https://jwt.io/introduction) documentation for more information. + */ +export type OidcSettingsResponseSchemaIdTokenSigningAlgorithm = + (typeof OidcSettingsResponseSchemaIdTokenSigningAlgorithm)[keyof typeof OidcSettingsResponseSchemaIdTokenSigningAlgorithm]; + +// eslint-disable-next-line @typescript-eslint/no-redeclare +export const OidcSettingsResponseSchemaIdTokenSigningAlgorithm = { + RS256: 'RS256', + RS384: 'RS384', + RS512: 'RS512', +} as const; diff --git a/frontend/src/openapi/models/passwordAuthSchema.ts b/frontend/src/openapi/models/passwordAuthSchema.ts index f5318d5fab..57c73d2a53 100644 --- a/frontend/src/openapi/models/passwordAuthSchema.ts +++ b/frontend/src/openapi/models/passwordAuthSchema.ts @@ -8,6 +8,6 @@ * Does the server allow username/password authentication */ export interface PasswordAuthSchema { - /** Is username/password authentication enabled */ - enabled?: boolean; + /** Is username/password authentication disabled */ + disabled?: boolean; } diff --git a/frontend/src/openapi/models/personalDashboardSchema.ts b/frontend/src/openapi/models/personalDashboardSchema.ts new file mode 100644 index 0000000000..2b93dfbf24 --- /dev/null +++ b/frontend/src/openapi/models/personalDashboardSchema.ts @@ -0,0 +1,17 @@ +/** + * Generated by Orval + * Do not edit manually. + * See `gen:api` script in package.json + */ +import type { PersonalDashboardSchemaFlagsItem } from './personalDashboardSchemaFlagsItem'; +import type { PersonalDashboardSchemaProjectsItem } from './personalDashboardSchemaProjectsItem'; + +/** + * Project and flags relevant to the user + */ +export interface PersonalDashboardSchema { + /** A list of flags a user created or favorited */ + flags: PersonalDashboardSchemaFlagsItem[]; + /** A list of projects that a user participates in with any role e.g. member or owner or any custom role */ + projects: PersonalDashboardSchemaProjectsItem[]; +} diff --git a/frontend/src/openapi/models/personalDashboardSchemaFlagsItem.ts b/frontend/src/openapi/models/personalDashboardSchemaFlagsItem.ts new file mode 100644 index 0000000000..0f2596dbc9 --- /dev/null +++ b/frontend/src/openapi/models/personalDashboardSchemaFlagsItem.ts @@ -0,0 +1,10 @@ +/** + * Generated by Orval + * Do not edit manually. + * See `gen:api` script in package.json + */ + +export type PersonalDashboardSchemaFlagsItem = { + /** The name of the flag */ + name: string; +}; diff --git a/frontend/src/openapi/models/personalDashboardSchemaProjectsItem.ts b/frontend/src/openapi/models/personalDashboardSchemaProjectsItem.ts new file mode 100644 index 0000000000..6faa3e2741 --- /dev/null +++ b/frontend/src/openapi/models/personalDashboardSchemaProjectsItem.ts @@ -0,0 +1,10 @@ +/** + * Generated by Orval + * Do not edit manually. + * See `gen:api` script in package.json + */ + +export type PersonalDashboardSchemaProjectsItem = { + /** The id of the project */ + id: string; +}; diff --git a/frontend/src/openapi/models/samlSettingsResponseSchema.ts b/frontend/src/openapi/models/samlSettingsResponseSchema.ts new file mode 100644 index 0000000000..90bf894be6 --- /dev/null +++ b/frontend/src/openapi/models/samlSettingsResponseSchema.ts @@ -0,0 +1,36 @@ +/** + * Generated by Orval + * Do not edit manually. + * See `gen:api` script in package.json + */ +import type { SamlSettingsResponseSchemaDefaultRootRole } from './samlSettingsResponseSchemaDefaultRootRole'; + +/** + * Response for SAML settings + */ +export interface SamlSettingsResponseSchema { + /** Should Unleash create users based on the emails coming back in the authentication reply from the SAML server */ + autoCreate?: boolean; + /** The X509 certificate used to validate requests */ + certificate?: string; + /** Assign this root role to auto created users */ + defaultRootRole?: SamlSettingsResponseSchemaDefaultRootRole; + /** Assign this root role to auto created users. Should be a role ID and takes precedence over `defaultRootRole`. */ + defaultRootRoleId?: number; + /** A comma separated list of email domains that Unleash will auto create user accounts for. */ + emailDomains?: string; + /** Whether to enable or disable SAML 2.0 for this instance */ + enabled?: boolean; + /** Should we enable group syncing. Refer to the documentation [Group syncing](https://docs.getunleash.io/how-to/how-to-set-up-group-sso-sync) */ + enableGroupSyncing?: boolean; + /** The SAML 2.0 entity ID */ + entityId?: string; + /** Specifies the path in the SAML token response from which to read the groups the user belongs to. */ + groupJsonPath?: string; + /** Which URL to use for Single Sign On */ + signOnUrl?: string; + /** Which URL to use for Single Sign Out */ + signOutUrl?: string; + /** Signing certificate for sign out requests */ + spCertificate?: string; +} diff --git a/frontend/src/openapi/models/samlSettingsResponseSchemaDefaultRootRole.ts b/frontend/src/openapi/models/samlSettingsResponseSchemaDefaultRootRole.ts new file mode 100644 index 0000000000..88b2ca7e6b --- /dev/null +++ b/frontend/src/openapi/models/samlSettingsResponseSchemaDefaultRootRole.ts @@ -0,0 +1,18 @@ +/** + * Generated by Orval + * Do not edit manually. + * See `gen:api` script in package.json + */ + +/** + * Assign this root role to auto created users + */ +export type SamlSettingsResponseSchemaDefaultRootRole = + (typeof SamlSettingsResponseSchemaDefaultRootRole)[keyof typeof SamlSettingsResponseSchemaDefaultRootRole]; + +// eslint-disable-next-line @typescript-eslint/no-redeclare +export const SamlSettingsResponseSchemaDefaultRootRole = { + Viewer: 'Viewer', + Editor: 'Editor', + Admin: 'Admin', +} as const; diff --git a/frontend/src/openapi/models/scimSettingsSchema.ts b/frontend/src/openapi/models/scimSettingsSchema.ts index eeeb60347e..4514a3795b 100644 --- a/frontend/src/openapi/models/scimSettingsSchema.ts +++ b/frontend/src/openapi/models/scimSettingsSchema.ts @@ -8,8 +8,6 @@ * An object describing settings for SCIM provisioning. */ export interface ScimSettingsSchema { - /** Whether SCIM assumes control of existing users */ - assumeControlOfExisting: boolean; /** Whether SCIM provisioning is currently enabled. */ enabled: boolean; /** Whether a SCIM provisioning API token is currently set. */ diff --git a/frontend/src/openapi/models/setScimSettingsSchema.ts b/frontend/src/openapi/models/setScimSettingsSchema.ts index b19cd808e6..6881ec236b 100644 --- a/frontend/src/openapi/models/setScimSettingsSchema.ts +++ b/frontend/src/openapi/models/setScimSettingsSchema.ts @@ -8,8 +8,6 @@ * An object describing settings for SCIM provisioning. */ export interface SetScimSettingsSchema { - /** Whether SCIM assumes control of existing users */ - assumeControlOfExisting: boolean; /** Whether SCIM provisioning is currently enabled. */ enabled: boolean; }