1
0
mirror of https://github.com/Unleash/unleash.git synced 2025-02-14 00:19:16 +01:00

chore: orval gen (#8220)

This commit is contained in:
Mateusz Kwasniewski 2024-09-23 16:41:55 +02:00 committed by GitHub
parent 4f1c00122d
commit 3ef5d06f00
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
16 changed files with 227 additions and 8 deletions

View File

@ -9,9 +9,9 @@
*/
export interface CreateServiceAccountSchema {
/** The name of the service account */
name?: string;
name: string;
/** The id of the root role for the service account */
rootRole: number;
/** The username of the service account */
username?: string;
username: string;
}

View File

@ -0,0 +1,14 @@
/**
* Generated by Orval
* Do not edit manually.
* See `gen:api` script in package.json
*/
export type GetPersonalDashboard401 = {
/** The ID of the error instance */
id?: string;
/** A description of what went wrong. */
message?: string;
/** The name of the error kind */
name?: string;
};

View File

@ -0,0 +1,14 @@
/**
* Generated by Orval
* Do not edit manually.
* See `gen:api` script in package.json
*/
export type GetPersonalDashboard403 = {
/** The ID of the error instance */
id?: string;
/** A description of what went wrong. */
message?: string;
/** The name of the error kind */
name?: string;
};

View File

@ -0,0 +1,14 @@
/**
* Generated by Orval
* Do not edit manually.
* See `gen:api` script in package.json
*/
export type GetPersonalDashboard404 = {
/** The ID of the error instance */
id?: string;
/** A description of what went wrong. */
message?: string;
/** The name of the error kind */
name?: string;
};

View File

@ -690,6 +690,9 @@ export * from './getOutdatedSdks404';
export * from './getPats401';
export * from './getPats403';
export * from './getPats404';
export * from './getPersonalDashboard401';
export * from './getPersonalDashboard403';
export * from './getPersonalDashboard404';
export * from './getPlayground400';
export * from './getPlayground401';
export * from './getProfile401';
@ -846,6 +849,9 @@ export * from './notificationsSchema';
export * from './notificationsSchemaItem';
export * from './notificationsSchemaItemCreatedBy';
export * from './notificationsSchemaItemNotificationType';
export * from './oidcSettingsResponseSchema';
export * from './oidcSettingsResponseSchemaDefaultRootRole';
export * from './oidcSettingsResponseSchemaIdTokenSigningAlgorithm';
export * from './oidcSettingsSchema';
export * from './oidcSettingsSchemaOneOf';
export * from './oidcSettingsSchemaOneOfDefaultRootRole';
@ -894,6 +900,9 @@ export * from './patchSchemaOp';
export * from './patchesSchema';
export * from './patsSchema';
export * from './permissionSchema';
export * from './personalDashboardSchema';
export * from './personalDashboardSchemaFlagsItem';
export * from './personalDashboardSchemaProjectsItem';
export * from './playgroundConstraintSchema';
export * from './playgroundConstraintSchemaOperator';
export * from './playgroundFeatureSchema';
@ -1040,6 +1049,8 @@ export * from './roleWithPermissionsSchema';
export * from './roleWithVersionSchema';
export * from './rolesSchema';
export * from './rolesWithVersionSchema';
export * from './samlSettingsResponseSchema';
export * from './samlSettingsResponseSchemaDefaultRootRole';
export * from './samlSettingsSchema';
export * from './samlSettingsSchemaOneOf';
export * from './samlSettingsSchemaOneOfDefaultRootRole';

View File

@ -0,0 +1,43 @@
/**
* Generated by Orval
* Do not edit manually.
* See `gen:api` script in package.json
*/
import type { OidcSettingsResponseSchemaDefaultRootRole } from './oidcSettingsResponseSchemaDefaultRootRole';
import type { OidcSettingsResponseSchemaIdTokenSigningAlgorithm } from './oidcSettingsResponseSchemaIdTokenSigningAlgorithm';
/**
* Response for OpenID Connect settings
*/
export interface OidcSettingsResponseSchema {
/** Authentication Context Class Reference, used to request extra values in the acr claim returned from the server. If multiple values are required, they should be space separated.
Consult [the OIDC reference](https://openid.net/specs/openid-connect-core-1_0.html#AuthorizationEndpoint) for more information
*/
acrValues?: string;
/** When enabled Unleash will also request the 'groups' scope as part of the login request. */
addGroupsScope?: boolean;
/** Auto create users based on email addresses from login tokens */
autoCreate?: boolean;
/** The OIDC client ID of this application. */
clientId?: string;
/** [Default role](https://docs.getunleash.io/reference/rbac#standard-roles) granted to users auto-created from email. Only relevant if autoCreate is `true` */
defaultRootRole?: OidcSettingsResponseSchemaDefaultRootRole;
/** Assign this root role to auto created users. Should be a role ID and takes precedence over `defaultRootRole`. */
defaultRootRoleId?: number;
/** The [.well-known OpenID discover URL](https://swagger.io/docs/specification/authentication/openid-connect-discovery/) */
discoverUrl?: string;
/** Comma separated list of email domains that are automatically approved for an account in the server. Only relevant if autoCreate is `true` */
emailDomains?: string;
/** Whether to enable or disable OpenID Connect for this instance */
enabled?: boolean;
/** Should we enable group syncing. Refer to the documentation [Group syncing](https://docs.getunleash.io/how-to/how-to-set-up-group-sso-sync) */
enableGroupSyncing?: boolean;
/** Support Single sign out when user clicks logout in Unleash. If `true` user is signed out of all OpenID Connect sessions against the clientId they may have active */
enableSingleSignOut?: boolean;
/** Specifies the path in the OIDC token response to read which groups the user belongs to from. */
groupJsonPath?: string;
/** The signing algorithm used to sign our token. Refer to the [JWT signatures](https://jwt.io/introduction) documentation for more information. */
idTokenSigningAlgorithm?: OidcSettingsResponseSchemaIdTokenSigningAlgorithm;
/** Shared secret from OpenID server. Used to authenticate login requests */
secret?: string;
}

View File

@ -0,0 +1,18 @@
/**
* Generated by Orval
* Do not edit manually.
* See `gen:api` script in package.json
*/
/**
* [Default role](https://docs.getunleash.io/reference/rbac#standard-roles) granted to users auto-created from email. Only relevant if autoCreate is `true`
*/
export type OidcSettingsResponseSchemaDefaultRootRole =
(typeof OidcSettingsResponseSchemaDefaultRootRole)[keyof typeof OidcSettingsResponseSchemaDefaultRootRole];
// eslint-disable-next-line @typescript-eslint/no-redeclare
export const OidcSettingsResponseSchemaDefaultRootRole = {
Viewer: 'Viewer',
Editor: 'Editor',
Admin: 'Admin',
} as const;

View File

@ -0,0 +1,18 @@
/**
* Generated by Orval
* Do not edit manually.
* See `gen:api` script in package.json
*/
/**
* The signing algorithm used to sign our token. Refer to the [JWT signatures](https://jwt.io/introduction) documentation for more information.
*/
export type OidcSettingsResponseSchemaIdTokenSigningAlgorithm =
(typeof OidcSettingsResponseSchemaIdTokenSigningAlgorithm)[keyof typeof OidcSettingsResponseSchemaIdTokenSigningAlgorithm];
// eslint-disable-next-line @typescript-eslint/no-redeclare
export const OidcSettingsResponseSchemaIdTokenSigningAlgorithm = {
RS256: 'RS256',
RS384: 'RS384',
RS512: 'RS512',
} as const;

View File

@ -8,6 +8,6 @@
* Does the server allow username/password authentication
*/
export interface PasswordAuthSchema {
/** Is username/password authentication enabled */
enabled?: boolean;
/** Is username/password authentication disabled */
disabled?: boolean;
}

View File

@ -0,0 +1,17 @@
/**
* Generated by Orval
* Do not edit manually.
* See `gen:api` script in package.json
*/
import type { PersonalDashboardSchemaFlagsItem } from './personalDashboardSchemaFlagsItem';
import type { PersonalDashboardSchemaProjectsItem } from './personalDashboardSchemaProjectsItem';
/**
* Project and flags relevant to the user
*/
export interface PersonalDashboardSchema {
/** A list of flags a user created or favorited */
flags: PersonalDashboardSchemaFlagsItem[];
/** A list of projects that a user participates in with any role e.g. member or owner or any custom role */
projects: PersonalDashboardSchemaProjectsItem[];
}

View File

@ -0,0 +1,10 @@
/**
* Generated by Orval
* Do not edit manually.
* See `gen:api` script in package.json
*/
export type PersonalDashboardSchemaFlagsItem = {
/** The name of the flag */
name: string;
};

View File

@ -0,0 +1,10 @@
/**
* Generated by Orval
* Do not edit manually.
* See `gen:api` script in package.json
*/
export type PersonalDashboardSchemaProjectsItem = {
/** The id of the project */
id: string;
};

View File

@ -0,0 +1,36 @@
/**
* Generated by Orval
* Do not edit manually.
* See `gen:api` script in package.json
*/
import type { SamlSettingsResponseSchemaDefaultRootRole } from './samlSettingsResponseSchemaDefaultRootRole';
/**
* Response for SAML settings
*/
export interface SamlSettingsResponseSchema {
/** Should Unleash create users based on the emails coming back in the authentication reply from the SAML server */
autoCreate?: boolean;
/** The X509 certificate used to validate requests */
certificate?: string;
/** Assign this root role to auto created users */
defaultRootRole?: SamlSettingsResponseSchemaDefaultRootRole;
/** Assign this root role to auto created users. Should be a role ID and takes precedence over `defaultRootRole`. */
defaultRootRoleId?: number;
/** A comma separated list of email domains that Unleash will auto create user accounts for. */
emailDomains?: string;
/** Whether to enable or disable SAML 2.0 for this instance */
enabled?: boolean;
/** Should we enable group syncing. Refer to the documentation [Group syncing](https://docs.getunleash.io/how-to/how-to-set-up-group-sso-sync) */
enableGroupSyncing?: boolean;
/** The SAML 2.0 entity ID */
entityId?: string;
/** Specifies the path in the SAML token response from which to read the groups the user belongs to. */
groupJsonPath?: string;
/** Which URL to use for Single Sign On */
signOnUrl?: string;
/** Which URL to use for Single Sign Out */
signOutUrl?: string;
/** Signing certificate for sign out requests */
spCertificate?: string;
}

View File

@ -0,0 +1,18 @@
/**
* Generated by Orval
* Do not edit manually.
* See `gen:api` script in package.json
*/
/**
* Assign this root role to auto created users
*/
export type SamlSettingsResponseSchemaDefaultRootRole =
(typeof SamlSettingsResponseSchemaDefaultRootRole)[keyof typeof SamlSettingsResponseSchemaDefaultRootRole];
// eslint-disable-next-line @typescript-eslint/no-redeclare
export const SamlSettingsResponseSchemaDefaultRootRole = {
Viewer: 'Viewer',
Editor: 'Editor',
Admin: 'Admin',
} as const;

View File

@ -8,8 +8,6 @@
* An object describing settings for SCIM provisioning.
*/
export interface ScimSettingsSchema {
/** Whether SCIM assumes control of existing users */
assumeControlOfExisting: boolean;
/** Whether SCIM provisioning is currently enabled. */
enabled: boolean;
/** Whether a SCIM provisioning API token is currently set. */

View File

@ -8,8 +8,6 @@
* An object describing settings for SCIM provisioning.
*/
export interface SetScimSettingsSchema {
/** Whether SCIM assumes control of existing users */
assumeControlOfExisting: boolean;
/** Whether SCIM provisioning is currently enabled. */
enabled: boolean;
}