Skip to content

Commit

Permalink
chore: update sdk
Browse files Browse the repository at this point in the history
  • Loading branch information
hperl committed Aug 10, 2023
1 parent 4649f4d commit fb07073
Show file tree
Hide file tree
Showing 6 changed files with 76 additions and 76 deletions.
2 changes: 1 addition & 1 deletion consent/strategy_logout_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -184,7 +184,7 @@ func TestLogoutFlows(t *testing.T) {
checkAndAcceptLoginHandler(t, adminApi, subject, func(t *testing.T, res *hydra.OAuth2LoginRequest, err error) hydra.AcceptOAuth2LoginRequest {
require.NoError(t, err)
//res.Payload.SessionID
return hydra.AcceptOAuth2LoginRequest{Remember: pointerx.Bool(true), SessionId: pointerx.Ptr(kratos.FakeSessionID)}
return hydra.AcceptOAuth2LoginRequest{Remember: pointerx.Ptr(true), KratosSessionId: pointerx.Ptr(kratos.FakeSessionID)}
}),
checkAndAcceptConsentHandler(t, adminApi, func(t *testing.T, res *hydra.OAuth2ConsentRequest, err error) hydra.AcceptOAuth2ConsentRequest {
require.NoError(t, err)
Expand Down
8 changes: 4 additions & 4 deletions internal/httpclient/api/openapi.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -1989,6 +1989,10 @@ components:
\ the proper value, then authentication processes which have id_token_hint\
\ set might fail."
type: string
kratos_session_id:
description: "KratosSessionID is the session ID of the end-user that authenticated.\n\
If specified, we will use this value to propagate the logout."
type: string
remember:
description: "Remember, if set to true, tells ORY Hydra to remember this\
\ user by telling the user agent (browser) to store\na cookie with authentication\
Expand All @@ -2001,10 +2005,6 @@ components:
\ for the duration of the browser session (using a session cookie)."
format: int64
type: integer
session_id:
description: "KratosSessionID is the session ID of the end-user that authenticated.\n\
If specified, we will use this value to propagate the logout."
type: string
subject:
description: Subject is the user ID of the end-user that authenticated.
type: string
Expand Down
52 changes: 26 additions & 26 deletions internal/httpclient/docs/AcceptOAuth2LoginRequest.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,9 +9,9 @@ Name | Type | Description | Notes
**Context** | Pointer to **interface{}** | | [optional]
**ExtendSessionLifespan** | Pointer to **bool** | Extend OAuth2 authentication session lifespan If set to `true`, the OAuth2 authentication cookie lifespan is extended. This is for example useful if you want the user to be able to use `prompt=none` continuously. This value can only be set to `true` if the user has an authentication, which is the case if the `skip` value is `true`. | [optional]
**ForceSubjectIdentifier** | Pointer to **string** | ForceSubjectIdentifier forces the \"pairwise\" user ID of the end-user that authenticated. The \"pairwise\" user ID refers to the (Pairwise Identifier Algorithm)[http://openid.net/specs/openid-connect-core-1_0.html#PairwiseAlg] of the OpenID Connect specification. It allows you to set an obfuscated subject (\"user\") identifier that is unique to the client. Please note that this changes the user ID on endpoint /userinfo and sub claim of the ID Token. It does not change the sub claim in the OAuth 2.0 Introspection. Per default, ORY Hydra handles this value with its own algorithm. In case you want to set this yourself you can use this field. Please note that setting this field has no effect if `pairwise` is not configured in ORY Hydra or the OAuth 2.0 Client does not expect a pairwise identifier (set via `subject_type` key in the client's configuration). Please also be aware that ORY Hydra is unable to properly compute this value during authentication. This implies that you have to compute this value on every authentication process (probably depending on the client ID or some other unique value). If you fail to compute the proper value, then authentication processes which have id_token_hint set might fail. | [optional]
**KratosSessionId** | Pointer to **string** | KratosSessionID is the session ID of the end-user that authenticated. If specified, we will use this value to propagate the logout. | [optional]
**Remember** | Pointer to **bool** | Remember, if set to true, tells ORY Hydra to remember this user by telling the user agent (browser) to store a cookie with authentication data. If the same user performs another OAuth 2.0 Authorization Request, he/she will not be asked to log in again. | [optional]
**RememberFor** | Pointer to **int64** | RememberFor sets how long the authentication should be remembered for in seconds. If set to `0`, the authorization will be remembered for the duration of the browser session (using a session cookie). | [optional]
**SessionId** | Pointer to **string** | KratosSessionID is the session ID of the end-user that authenticated. If specified, we will use this value to propagate the logout. | [optional]
**Subject** | **string** | Subject is the user ID of the end-user that authenticated. |

## Methods
Expand Down Expand Up @@ -168,6 +168,31 @@ SetForceSubjectIdentifier sets ForceSubjectIdentifier field to given value.

HasForceSubjectIdentifier returns a boolean if a field has been set.

### GetKratosSessionId

`func (o *AcceptOAuth2LoginRequest) GetKratosSessionId() string`

GetKratosSessionId returns the KratosSessionId field if non-nil, zero value otherwise.

### GetKratosSessionIdOk

`func (o *AcceptOAuth2LoginRequest) GetKratosSessionIdOk() (*string, bool)`

GetKratosSessionIdOk returns a tuple with the KratosSessionId field if it's non-nil, zero value otherwise
and a boolean to check if the value has been set.

### SetKratosSessionId

`func (o *AcceptOAuth2LoginRequest) SetKratosSessionId(v string)`

SetKratosSessionId sets KratosSessionId field to given value.

### HasKratosSessionId

`func (o *AcceptOAuth2LoginRequest) HasKratosSessionId() bool`

HasKratosSessionId returns a boolean if a field has been set.

### GetRemember

`func (o *AcceptOAuth2LoginRequest) GetRemember() bool`
Expand Down Expand Up @@ -218,31 +243,6 @@ SetRememberFor sets RememberFor field to given value.

HasRememberFor returns a boolean if a field has been set.

### GetSessionId

`func (o *AcceptOAuth2LoginRequest) GetSessionId() string`

GetSessionId returns the SessionId field if non-nil, zero value otherwise.

### GetSessionIdOk

`func (o *AcceptOAuth2LoginRequest) GetSessionIdOk() (*string, bool)`

GetSessionIdOk returns a tuple with the SessionId field if it's non-nil, zero value otherwise
and a boolean to check if the value has been set.

### SetSessionId

`func (o *AcceptOAuth2LoginRequest) SetSessionId(v string)`

SetSessionId sets SessionId field to given value.

### HasSessionId

`func (o *AcceptOAuth2LoginRequest) HasSessionId() bool`

HasSessionId returns a boolean if a field has been set.

### GetSubject

`func (o *AcceptOAuth2LoginRequest) GetSubject() string`
Expand Down
74 changes: 37 additions & 37 deletions internal/httpclient/model_accept_o_auth2_login_request.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

8 changes: 4 additions & 4 deletions spec/api.json
Original file line number Diff line number Diff line change
Expand Up @@ -207,6 +207,10 @@
"description": "ForceSubjectIdentifier forces the \"pairwise\" user ID of the end-user that authenticated. The \"pairwise\" user ID refers to the\n(Pairwise Identifier Algorithm)[http://openid.net/specs/openid-connect-core-1_0.html#PairwiseAlg] of the OpenID\nConnect specification. It allows you to set an obfuscated subject (\"user\") identifier that is unique to the client.\n\nPlease note that this changes the user ID on endpoint /userinfo and sub claim of the ID Token. It does not change the\nsub claim in the OAuth 2.0 Introspection.\n\nPer default, ORY Hydra handles this value with its own algorithm. In case you want to set this yourself\nyou can use this field. Please note that setting this field has no effect if `pairwise` is not configured in\nORY Hydra or the OAuth 2.0 Client does not expect a pairwise identifier (set via `subject_type` key in the client's\nconfiguration).\n\nPlease also be aware that ORY Hydra is unable to properly compute this value during authentication. This implies\nthat you have to compute this value on every authentication process (probably depending on the client ID or some\nother unique value).\n\nIf you fail to compute the proper value, then authentication processes which have id_token_hint set might fail.",
"type": "string"
},
"kratos_session_id": {
"description": "KratosSessionID is the session ID of the end-user that authenticated.\nIf specified, we will use this value to propagate the logout.",
"type": "string"
},
"remember": {
"description": "Remember, if set to true, tells ORY Hydra to remember this user by telling the user agent (browser) to store\na cookie with authentication data. If the same user performs another OAuth 2.0 Authorization Request, he/she\nwill not be asked to log in again.",
"type": "boolean"
Expand All @@ -216,10 +220,6 @@
"format": "int64",
"type": "integer"
},
"session_id": {
"description": "KratosSessionID is the session ID of the end-user that authenticated.\nIf specified, we will use this value to propagate the logout.",
"type": "string"
},
"subject": {
"description": "Subject is the user ID of the end-user that authenticated.",
"type": "string"
Expand Down
8 changes: 4 additions & 4 deletions spec/swagger.json
Original file line number Diff line number Diff line change
Expand Up @@ -2237,6 +2237,10 @@
"description": "ForceSubjectIdentifier forces the \"pairwise\" user ID of the end-user that authenticated. The \"pairwise\" user ID refers to the\n(Pairwise Identifier Algorithm)[http://openid.net/specs/openid-connect-core-1_0.html#PairwiseAlg] of the OpenID\nConnect specification. It allows you to set an obfuscated subject (\"user\") identifier that is unique to the client.\n\nPlease note that this changes the user ID on endpoint /userinfo and sub claim of the ID Token. It does not change the\nsub claim in the OAuth 2.0 Introspection.\n\nPer default, ORY Hydra handles this value with its own algorithm. In case you want to set this yourself\nyou can use this field. Please note that setting this field has no effect if `pairwise` is not configured in\nORY Hydra or the OAuth 2.0 Client does not expect a pairwise identifier (set via `subject_type` key in the client's\nconfiguration).\n\nPlease also be aware that ORY Hydra is unable to properly compute this value during authentication. This implies\nthat you have to compute this value on every authentication process (probably depending on the client ID or some\nother unique value).\n\nIf you fail to compute the proper value, then authentication processes which have id_token_hint set might fail.",
"type": "string"
},
"kratos_session_id": {
"description": "KratosSessionID is the session ID of the end-user that authenticated.\nIf specified, we will use this value to propagate the logout.",
"type": "string"
},
"remember": {
"description": "Remember, if set to true, tells ORY Hydra to remember this user by telling the user agent (browser) to store\na cookie with authentication data. If the same user performs another OAuth 2.0 Authorization Request, he/she\nwill not be asked to log in again.",
"type": "boolean"
Expand All @@ -2246,10 +2250,6 @@
"type": "integer",
"format": "int64"
},
"session_id": {
"description": "KratosSessionID is the session ID of the end-user that authenticated.\nIf specified, we will use this value to propagate the logout.",
"type": "string"
},
"subject": {
"description": "Subject is the user ID of the end-user that authenticated.",
"type": "string"
Expand Down

0 comments on commit fb07073

Please sign in to comment.