mirror of
https://github.com/Unleash/unleash.git
synced 2025-02-14 00:19:16 +01:00
chore: orval gen (#8220)
This commit is contained in:
parent
4f1c00122d
commit
3ef5d06f00
@ -9,9 +9,9 @@
|
||||
*/
|
||||
export interface CreateServiceAccountSchema {
|
||||
/** The name of the service account */
|
||||
name?: string;
|
||||
name: string;
|
||||
/** The id of the root role for the service account */
|
||||
rootRole: number;
|
||||
/** The username of the service account */
|
||||
username?: string;
|
||||
username: string;
|
||||
}
|
||||
|
14
frontend/src/openapi/models/getPersonalDashboard401.ts
Normal file
14
frontend/src/openapi/models/getPersonalDashboard401.ts
Normal file
@ -0,0 +1,14 @@
|
||||
/**
|
||||
* Generated by Orval
|
||||
* Do not edit manually.
|
||||
* See `gen:api` script in package.json
|
||||
*/
|
||||
|
||||
export type GetPersonalDashboard401 = {
|
||||
/** The ID of the error instance */
|
||||
id?: string;
|
||||
/** A description of what went wrong. */
|
||||
message?: string;
|
||||
/** The name of the error kind */
|
||||
name?: string;
|
||||
};
|
14
frontend/src/openapi/models/getPersonalDashboard403.ts
Normal file
14
frontend/src/openapi/models/getPersonalDashboard403.ts
Normal file
@ -0,0 +1,14 @@
|
||||
/**
|
||||
* Generated by Orval
|
||||
* Do not edit manually.
|
||||
* See `gen:api` script in package.json
|
||||
*/
|
||||
|
||||
export type GetPersonalDashboard403 = {
|
||||
/** The ID of the error instance */
|
||||
id?: string;
|
||||
/** A description of what went wrong. */
|
||||
message?: string;
|
||||
/** The name of the error kind */
|
||||
name?: string;
|
||||
};
|
14
frontend/src/openapi/models/getPersonalDashboard404.ts
Normal file
14
frontend/src/openapi/models/getPersonalDashboard404.ts
Normal file
@ -0,0 +1,14 @@
|
||||
/**
|
||||
* Generated by Orval
|
||||
* Do not edit manually.
|
||||
* See `gen:api` script in package.json
|
||||
*/
|
||||
|
||||
export type GetPersonalDashboard404 = {
|
||||
/** The ID of the error instance */
|
||||
id?: string;
|
||||
/** A description of what went wrong. */
|
||||
message?: string;
|
||||
/** The name of the error kind */
|
||||
name?: string;
|
||||
};
|
@ -690,6 +690,9 @@ export * from './getOutdatedSdks404';
|
||||
export * from './getPats401';
|
||||
export * from './getPats403';
|
||||
export * from './getPats404';
|
||||
export * from './getPersonalDashboard401';
|
||||
export * from './getPersonalDashboard403';
|
||||
export * from './getPersonalDashboard404';
|
||||
export * from './getPlayground400';
|
||||
export * from './getPlayground401';
|
||||
export * from './getProfile401';
|
||||
@ -846,6 +849,9 @@ export * from './notificationsSchema';
|
||||
export * from './notificationsSchemaItem';
|
||||
export * from './notificationsSchemaItemCreatedBy';
|
||||
export * from './notificationsSchemaItemNotificationType';
|
||||
export * from './oidcSettingsResponseSchema';
|
||||
export * from './oidcSettingsResponseSchemaDefaultRootRole';
|
||||
export * from './oidcSettingsResponseSchemaIdTokenSigningAlgorithm';
|
||||
export * from './oidcSettingsSchema';
|
||||
export * from './oidcSettingsSchemaOneOf';
|
||||
export * from './oidcSettingsSchemaOneOfDefaultRootRole';
|
||||
@ -894,6 +900,9 @@ export * from './patchSchemaOp';
|
||||
export * from './patchesSchema';
|
||||
export * from './patsSchema';
|
||||
export * from './permissionSchema';
|
||||
export * from './personalDashboardSchema';
|
||||
export * from './personalDashboardSchemaFlagsItem';
|
||||
export * from './personalDashboardSchemaProjectsItem';
|
||||
export * from './playgroundConstraintSchema';
|
||||
export * from './playgroundConstraintSchemaOperator';
|
||||
export * from './playgroundFeatureSchema';
|
||||
@ -1040,6 +1049,8 @@ export * from './roleWithPermissionsSchema';
|
||||
export * from './roleWithVersionSchema';
|
||||
export * from './rolesSchema';
|
||||
export * from './rolesWithVersionSchema';
|
||||
export * from './samlSettingsResponseSchema';
|
||||
export * from './samlSettingsResponseSchemaDefaultRootRole';
|
||||
export * from './samlSettingsSchema';
|
||||
export * from './samlSettingsSchemaOneOf';
|
||||
export * from './samlSettingsSchemaOneOfDefaultRootRole';
|
||||
|
43
frontend/src/openapi/models/oidcSettingsResponseSchema.ts
Normal file
43
frontend/src/openapi/models/oidcSettingsResponseSchema.ts
Normal file
@ -0,0 +1,43 @@
|
||||
/**
|
||||
* Generated by Orval
|
||||
* Do not edit manually.
|
||||
* See `gen:api` script in package.json
|
||||
*/
|
||||
import type { OidcSettingsResponseSchemaDefaultRootRole } from './oidcSettingsResponseSchemaDefaultRootRole';
|
||||
import type { OidcSettingsResponseSchemaIdTokenSigningAlgorithm } from './oidcSettingsResponseSchemaIdTokenSigningAlgorithm';
|
||||
|
||||
/**
|
||||
* Response for OpenID Connect settings
|
||||
*/
|
||||
export interface OidcSettingsResponseSchema {
|
||||
/** Authentication Context Class Reference, used to request extra values in the acr claim returned from the server. If multiple values are required, they should be space separated.
|
||||
Consult [the OIDC reference](https://openid.net/specs/openid-connect-core-1_0.html#AuthorizationEndpoint) for more information
|
||||
*/
|
||||
acrValues?: string;
|
||||
/** When enabled Unleash will also request the 'groups' scope as part of the login request. */
|
||||
addGroupsScope?: boolean;
|
||||
/** Auto create users based on email addresses from login tokens */
|
||||
autoCreate?: boolean;
|
||||
/** The OIDC client ID of this application. */
|
||||
clientId?: string;
|
||||
/** [Default role](https://docs.getunleash.io/reference/rbac#standard-roles) granted to users auto-created from email. Only relevant if autoCreate is `true` */
|
||||
defaultRootRole?: OidcSettingsResponseSchemaDefaultRootRole;
|
||||
/** Assign this root role to auto created users. Should be a role ID and takes precedence over `defaultRootRole`. */
|
||||
defaultRootRoleId?: number;
|
||||
/** The [.well-known OpenID discover URL](https://swagger.io/docs/specification/authentication/openid-connect-discovery/) */
|
||||
discoverUrl?: string;
|
||||
/** Comma separated list of email domains that are automatically approved for an account in the server. Only relevant if autoCreate is `true` */
|
||||
emailDomains?: string;
|
||||
/** Whether to enable or disable OpenID Connect for this instance */
|
||||
enabled?: boolean;
|
||||
/** Should we enable group syncing. Refer to the documentation [Group syncing](https://docs.getunleash.io/how-to/how-to-set-up-group-sso-sync) */
|
||||
enableGroupSyncing?: boolean;
|
||||
/** Support Single sign out when user clicks logout in Unleash. If `true` user is signed out of all OpenID Connect sessions against the clientId they may have active */
|
||||
enableSingleSignOut?: boolean;
|
||||
/** Specifies the path in the OIDC token response to read which groups the user belongs to from. */
|
||||
groupJsonPath?: string;
|
||||
/** The signing algorithm used to sign our token. Refer to the [JWT signatures](https://jwt.io/introduction) documentation for more information. */
|
||||
idTokenSigningAlgorithm?: OidcSettingsResponseSchemaIdTokenSigningAlgorithm;
|
||||
/** Shared secret from OpenID server. Used to authenticate login requests */
|
||||
secret?: string;
|
||||
}
|
@ -0,0 +1,18 @@
|
||||
/**
|
||||
* Generated by Orval
|
||||
* Do not edit manually.
|
||||
* See `gen:api` script in package.json
|
||||
*/
|
||||
|
||||
/**
|
||||
* [Default role](https://docs.getunleash.io/reference/rbac#standard-roles) granted to users auto-created from email. Only relevant if autoCreate is `true`
|
||||
*/
|
||||
export type OidcSettingsResponseSchemaDefaultRootRole =
|
||||
(typeof OidcSettingsResponseSchemaDefaultRootRole)[keyof typeof OidcSettingsResponseSchemaDefaultRootRole];
|
||||
|
||||
// eslint-disable-next-line @typescript-eslint/no-redeclare
|
||||
export const OidcSettingsResponseSchemaDefaultRootRole = {
|
||||
Viewer: 'Viewer',
|
||||
Editor: 'Editor',
|
||||
Admin: 'Admin',
|
||||
} as const;
|
@ -0,0 +1,18 @@
|
||||
/**
|
||||
* Generated by Orval
|
||||
* Do not edit manually.
|
||||
* See `gen:api` script in package.json
|
||||
*/
|
||||
|
||||
/**
|
||||
* The signing algorithm used to sign our token. Refer to the [JWT signatures](https://jwt.io/introduction) documentation for more information.
|
||||
*/
|
||||
export type OidcSettingsResponseSchemaIdTokenSigningAlgorithm =
|
||||
(typeof OidcSettingsResponseSchemaIdTokenSigningAlgorithm)[keyof typeof OidcSettingsResponseSchemaIdTokenSigningAlgorithm];
|
||||
|
||||
// eslint-disable-next-line @typescript-eslint/no-redeclare
|
||||
export const OidcSettingsResponseSchemaIdTokenSigningAlgorithm = {
|
||||
RS256: 'RS256',
|
||||
RS384: 'RS384',
|
||||
RS512: 'RS512',
|
||||
} as const;
|
@ -8,6 +8,6 @@
|
||||
* Does the server allow username/password authentication
|
||||
*/
|
||||
export interface PasswordAuthSchema {
|
||||
/** Is username/password authentication enabled */
|
||||
enabled?: boolean;
|
||||
/** Is username/password authentication disabled */
|
||||
disabled?: boolean;
|
||||
}
|
||||
|
17
frontend/src/openapi/models/personalDashboardSchema.ts
Normal file
17
frontend/src/openapi/models/personalDashboardSchema.ts
Normal file
@ -0,0 +1,17 @@
|
||||
/**
|
||||
* Generated by Orval
|
||||
* Do not edit manually.
|
||||
* See `gen:api` script in package.json
|
||||
*/
|
||||
import type { PersonalDashboardSchemaFlagsItem } from './personalDashboardSchemaFlagsItem';
|
||||
import type { PersonalDashboardSchemaProjectsItem } from './personalDashboardSchemaProjectsItem';
|
||||
|
||||
/**
|
||||
* Project and flags relevant to the user
|
||||
*/
|
||||
export interface PersonalDashboardSchema {
|
||||
/** A list of flags a user created or favorited */
|
||||
flags: PersonalDashboardSchemaFlagsItem[];
|
||||
/** A list of projects that a user participates in with any role e.g. member or owner or any custom role */
|
||||
projects: PersonalDashboardSchemaProjectsItem[];
|
||||
}
|
@ -0,0 +1,10 @@
|
||||
/**
|
||||
* Generated by Orval
|
||||
* Do not edit manually.
|
||||
* See `gen:api` script in package.json
|
||||
*/
|
||||
|
||||
export type PersonalDashboardSchemaFlagsItem = {
|
||||
/** The name of the flag */
|
||||
name: string;
|
||||
};
|
@ -0,0 +1,10 @@
|
||||
/**
|
||||
* Generated by Orval
|
||||
* Do not edit manually.
|
||||
* See `gen:api` script in package.json
|
||||
*/
|
||||
|
||||
export type PersonalDashboardSchemaProjectsItem = {
|
||||
/** The id of the project */
|
||||
id: string;
|
||||
};
|
36
frontend/src/openapi/models/samlSettingsResponseSchema.ts
Normal file
36
frontend/src/openapi/models/samlSettingsResponseSchema.ts
Normal file
@ -0,0 +1,36 @@
|
||||
/**
|
||||
* Generated by Orval
|
||||
* Do not edit manually.
|
||||
* See `gen:api` script in package.json
|
||||
*/
|
||||
import type { SamlSettingsResponseSchemaDefaultRootRole } from './samlSettingsResponseSchemaDefaultRootRole';
|
||||
|
||||
/**
|
||||
* Response for SAML settings
|
||||
*/
|
||||
export interface SamlSettingsResponseSchema {
|
||||
/** Should Unleash create users based on the emails coming back in the authentication reply from the SAML server */
|
||||
autoCreate?: boolean;
|
||||
/** The X509 certificate used to validate requests */
|
||||
certificate?: string;
|
||||
/** Assign this root role to auto created users */
|
||||
defaultRootRole?: SamlSettingsResponseSchemaDefaultRootRole;
|
||||
/** Assign this root role to auto created users. Should be a role ID and takes precedence over `defaultRootRole`. */
|
||||
defaultRootRoleId?: number;
|
||||
/** A comma separated list of email domains that Unleash will auto create user accounts for. */
|
||||
emailDomains?: string;
|
||||
/** Whether to enable or disable SAML 2.0 for this instance */
|
||||
enabled?: boolean;
|
||||
/** Should we enable group syncing. Refer to the documentation [Group syncing](https://docs.getunleash.io/how-to/how-to-set-up-group-sso-sync) */
|
||||
enableGroupSyncing?: boolean;
|
||||
/** The SAML 2.0 entity ID */
|
||||
entityId?: string;
|
||||
/** Specifies the path in the SAML token response from which to read the groups the user belongs to. */
|
||||
groupJsonPath?: string;
|
||||
/** Which URL to use for Single Sign On */
|
||||
signOnUrl?: string;
|
||||
/** Which URL to use for Single Sign Out */
|
||||
signOutUrl?: string;
|
||||
/** Signing certificate for sign out requests */
|
||||
spCertificate?: string;
|
||||
}
|
@ -0,0 +1,18 @@
|
||||
/**
|
||||
* Generated by Orval
|
||||
* Do not edit manually.
|
||||
* See `gen:api` script in package.json
|
||||
*/
|
||||
|
||||
/**
|
||||
* Assign this root role to auto created users
|
||||
*/
|
||||
export type SamlSettingsResponseSchemaDefaultRootRole =
|
||||
(typeof SamlSettingsResponseSchemaDefaultRootRole)[keyof typeof SamlSettingsResponseSchemaDefaultRootRole];
|
||||
|
||||
// eslint-disable-next-line @typescript-eslint/no-redeclare
|
||||
export const SamlSettingsResponseSchemaDefaultRootRole = {
|
||||
Viewer: 'Viewer',
|
||||
Editor: 'Editor',
|
||||
Admin: 'Admin',
|
||||
} as const;
|
@ -8,8 +8,6 @@
|
||||
* An object describing settings for SCIM provisioning.
|
||||
*/
|
||||
export interface ScimSettingsSchema {
|
||||
/** Whether SCIM assumes control of existing users */
|
||||
assumeControlOfExisting: boolean;
|
||||
/** Whether SCIM provisioning is currently enabled. */
|
||||
enabled: boolean;
|
||||
/** Whether a SCIM provisioning API token is currently set. */
|
||||
|
@ -8,8 +8,6 @@
|
||||
* An object describing settings for SCIM provisioning.
|
||||
*/
|
||||
export interface SetScimSettingsSchema {
|
||||
/** Whether SCIM assumes control of existing users */
|
||||
assumeControlOfExisting: boolean;
|
||||
/** Whether SCIM provisioning is currently enabled. */
|
||||
enabled: boolean;
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user