Skip to content

Commit

Permalink
autogen: regenerate OpenAPI client for v1.15.3
Browse files Browse the repository at this point in the history
Version: v1.15.3
  • Loading branch information
aeneasr committed Sep 23, 2024
1 parent 0aec61a commit 35a6b1d
Show file tree
Hide file tree
Showing 579 changed files with 823 additions and 624 deletions.
3 changes: 3 additions & 0 deletions .openapi-generator/FILES
Original file line number Diff line number Diff line change
Expand Up @@ -90,6 +90,7 @@ docs/Identity.md
docs/IdentityApi.md
docs/IdentityCredentials.md
docs/IdentityCredentialsCode.md
docs/IdentityCredentialsCodeAddress.md
docs/IdentityCredentialsOidc.md
docs/IdentityCredentialsOidcProvider.md
docs/IdentityCredentialsPassword.md
Expand Down Expand Up @@ -388,6 +389,7 @@ ory_client/models/health_status.py
ory_client/models/identity.py
ory_client/models/identity_credentials.py
ory_client/models/identity_credentials_code.py
ory_client/models/identity_credentials_code_address.py
ory_client/models/identity_credentials_oidc.py
ory_client/models/identity_credentials_oidc_provider.py
ory_client/models/identity_credentials_password.py
Expand Down Expand Up @@ -668,6 +670,7 @@ test/test_identity.py
test/test_identity_api.py
test/test_identity_credentials.py
test/test_identity_credentials_code.py
test/test_identity_credentials_code_address.py
test/test_identity_credentials_oidc.py
test/test_identity_credentials_oidc_provider.py
test/test_identity_credentials_password.py
Expand Down
8 changes: 4 additions & 4 deletions docs/FrontendApi.md
Original file line number Diff line number Diff line change
Expand Up @@ -69,7 +69,7 @@ with ory_client.ApiClient(configuration) as api_client:
cookie = 'cookie_example' # str | HTTP Cookies When using the SDK in a browser app, on the server side you must include the HTTP Cookie Header sent by the client to your server here. This ensures that CSRF and session cookies are respected. (optional)
login_challenge = 'login_challenge_example' # str | An optional Hydra login challenge. If present, Kratos will cooperate with Ory Hydra to act as an OAuth2 identity provider. The value for this parameter comes from `login_challenge` URL Query parameter sent to your application (e.g. `/login?login_challenge=abcde`). (optional)
organization = 'organization_example' # str | An optional organization ID that should be used for logging this user in. This parameter is only effective in the Ory Network. (optional)
via = 'via_example' # str | Via should contain the identity's credential the code should be sent to. Only relevant in aal2 flows. (optional)
via = 'via_example' # str | Via should contain the identity's credential the code should be sent to. Only relevant in aal2 flows. DEPRECATED: This field is deprecated. Please remove it from your requests. The user will now see a choice of MFA credentials to choose from to perform the second factor instead. (optional)

try:
# Create Login Flow for Browsers
Expand All @@ -93,7 +93,7 @@ Name | Type | Description | Notes
**cookie** | **str**| HTTP Cookies When using the SDK in a browser app, on the server side you must include the HTTP Cookie Header sent by the client to your server here. This ensures that CSRF and session cookies are respected. | [optional]
**login_challenge** | **str**| An optional Hydra login challenge. If present, Kratos will cooperate with Ory Hydra to act as an OAuth2 identity provider. The value for this parameter comes from `login_challenge` URL Query parameter sent to your application (e.g. `/login?login_challenge=abcde`). | [optional]
**organization** | **str**| An optional organization ID that should be used for logging this user in. This parameter is only effective in the Ory Network. | [optional]
**via** | **str**| Via should contain the identity's credential the code should be sent to. Only relevant in aal2 flows. | [optional]
**via** | **str**| Via should contain the identity's credential the code should be sent to. Only relevant in aal2 flows. DEPRECATED: This field is deprecated. Please remove it from your requests. The user will now see a choice of MFA credentials to choose from to perform the second factor instead. | [optional]

### Return type

Expand Down Expand Up @@ -516,7 +516,7 @@ with ory_client.ApiClient(configuration) as api_client:
x_session_token = 'x_session_token_example' # str | The Session Token of the Identity performing the settings flow. (optional)
return_session_token_exchange_code = True # bool | EnableSessionTokenExchangeCode requests the login flow to include a code that can be used to retrieve the session token after the login flow has been completed. (optional)
return_to = 'return_to_example' # str | The URL to return the browser to after the flow was completed. (optional)
via = 'via_example' # str | Via should contain the identity's credential the code should be sent to. Only relevant in aal2 flows. (optional)
via = 'via_example' # str | Via should contain the identity's credential the code should be sent to. Only relevant in aal2 flows. DEPRECATED: This field is deprecated. Please remove it from your requests. The user will now see a choice of MFA credentials to choose from to perform the second factor instead. (optional)

try:
# Create Login Flow for Native Apps
Expand All @@ -539,7 +539,7 @@ Name | Type | Description | Notes
**x_session_token** | **str**| The Session Token of the Identity performing the settings flow. | [optional]
**return_session_token_exchange_code** | **bool**| EnableSessionTokenExchangeCode requests the login flow to include a code that can be used to retrieve the session token after the login flow has been completed. | [optional]
**return_to** | **str**| The URL to return the browser to after the flow was completed. | [optional]
**via** | **str**| Via should contain the identity's credential the code should be sent to. Only relevant in aal2 flows. | [optional]
**via** | **str**| Via should contain the identity's credential the code should be sent to. Only relevant in aal2 flows. DEPRECATED: This field is deprecated. Please remove it from your requests. The user will now see a choice of MFA credentials to choose from to perform the second factor instead. | [optional]

### Return type

Expand Down
3 changes: 1 addition & 2 deletions docs/IdentityCredentialsCode.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,8 +6,7 @@ CredentialsCode represents a one time login/registration code

Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**address_type** | **str** | The type of the address for this code | [optional]
**used_at** | **datetime** | | [optional]
**addresses** | [**List[IdentityCredentialsCodeAddress]**](IdentityCredentialsCodeAddress.md) | | [optional]

## Example

Expand Down
30 changes: 30 additions & 0 deletions docs/IdentityCredentialsCodeAddress.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
# IdentityCredentialsCodeAddress


## Properties

Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**address** | **str** | The address for this code | [optional]
**channel** | **str** | | [optional]

## Example

```python
from ory_client.models.identity_credentials_code_address import IdentityCredentialsCodeAddress

# TODO update the JSON string below
json = "{}"
# create an instance of IdentityCredentialsCodeAddress from a JSON string
identity_credentials_code_address_instance = IdentityCredentialsCodeAddress.from_json(json)
# print the JSON string representation of the object
print(IdentityCredentialsCodeAddress.to_json())

# convert the object into a dict
identity_credentials_code_address_dict = identity_credentials_code_address_instance.to_dict()
# create an instance of IdentityCredentialsCodeAddress from a dict
identity_credentials_code_address_from_dict = IdentityCredentialsCodeAddress.from_dict(identity_credentials_code_address_dict)
```
[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)


8 changes: 4 additions & 4 deletions docs/OAuth2Api.md
Original file line number Diff line number Diff line change
Expand Up @@ -1322,7 +1322,7 @@ Name | Type | Description | Notes
OAuth 2.0 Authorize Endpoint

Use open source libraries to perform OAuth 2.0 and OpenID Connect available for any programming language. You can find a list of libraries at https://oauth.net/code/ The Ory SDK is not yet able to this endpoint properly.
Use open source libraries to perform OAuth 2.0 and OpenID Connect available for any programming language. You can find a list of libraries at https://oauth.net/code/ This endpoint should not be used via the Ory SDK and is only included for technical reasons. Instead, use one of the libraries linked above.

### Example

Expand Down Expand Up @@ -1387,7 +1387,7 @@ No authorization required
The OAuth 2.0 Token Endpoint

Use open source libraries to perform OAuth 2.0 and OpenID Connect available for any programming language. You can find a list of libraries here https://oauth.net/code/ The Ory SDK is not yet able to this endpoint properly.
Use open source libraries to perform OAuth 2.0 and OpenID Connect available for any programming language. You can find a list of libraries here https://oauth.net/code/ This endpoint should not be used via the Ory SDK and is only included for technical reasons. Instead, use one of the libraries linked above.

### Example

Expand Down Expand Up @@ -1913,7 +1913,7 @@ with ory_client.ApiClient(configuration) as api_client:
# Create an instance of the API class
api_instance = ory_client.OAuth2Api(api_client)
subject = 'subject_example' # str | OAuth 2.0 Subject The subject to revoke authentication sessions for. (optional)
sid = 'sid_example' # str | OAuth 2.0 Subject The subject to revoke authentication sessions for. (optional)
sid = 'sid_example' # str | Login Session ID The login session to revoke. (optional)

try:
# Revokes OAuth 2.0 Login Sessions by either a Subject or a SessionID
Expand All @@ -1930,7 +1930,7 @@ with ory_client.ApiClient(configuration) as api_client:
Name | Type | Description | Notes
------------- | ------------- | ------------- | -------------
**subject** | **str**| OAuth 2.0 Subject The subject to revoke authentication sessions for. | [optional]
**sid** | **str**| OAuth 2.0 Subject The subject to revoke authentication sessions for. | [optional]
**sid** | **str**| Login Session ID The login session to revoke. | [optional]

### Return type

Expand Down
1 change: 1 addition & 0 deletions docs/UpdateLoginFlowBody.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@ Name | Type | Description | Notes
**totp_code** | **str** | The TOTP code. |
**webauthn_login** | **str** | Login a WebAuthn Security Key This must contain the ID of the WebAuthN connection. | [optional]
**lookup_secret** | **str** | The lookup secret. |
**address** | **str** | Address is the address to send the code to, in case that there are multiple addresses. This field is only used in two-factor flows and is ineffective for passwordless flows. | [optional]
**code** | **str** | Code is the 6 digits code sent to the user | [optional]
**resend** | **str** | Resend is set when the user wants to resend the code | [optional]
**passkey_login** | **str** | Login a WebAuthn Security Key This must contain the ID of the WebAuthN connection. | [optional]
Expand Down
1 change: 1 addition & 0 deletions docs/UpdateLoginFlowWithCodeMethod.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@ Update Login flow using the code method

Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**address** | **str** | Address is the address to send the code to, in case that there are multiple addresses. This field is only used in two-factor flows and is ineffective for passwordless flows. | [optional]
**code** | **str** | Code is the 6 digits code sent to the user | [optional]
**csrf_token** | **str** | CSRFToken is the anti-CSRF token |
**identifier** | **str** | Identifier is the code identifier The identifier requires that the user has already completed the registration or settings with code flow. | [optional]
Expand Down
5 changes: 3 additions & 2 deletions ory_client/__init__.py
Original file line number Diff line number Diff line change
Expand Up @@ -7,15 +7,15 @@
Documentation for all public and administrative Ory APIs. Administrative APIs can only be accessed with a valid Personal Access Token. Public APIs are mostly used in browsers.
The version of the OpenAPI document: v1.15.0
The version of the OpenAPI document: v1.15.3
Contact: [email protected]
Generated by OpenAPI Generator (https://openapi-generator.tech)
Do not edit the class manually.
""" # noqa: E501


__version__ = "v1.15.0"
__version__ = "v1.15.3"

# import apis into sdk package
from ory_client.api.courier_api import CourierApi
Expand Down Expand Up @@ -126,6 +126,7 @@
from ory_client.models.identity import Identity
from ory_client.models.identity_credentials import IdentityCredentials
from ory_client.models.identity_credentials_code import IdentityCredentialsCode
from ory_client.models.identity_credentials_code_address import IdentityCredentialsCodeAddress
from ory_client.models.identity_credentials_oidc import IdentityCredentialsOidc
from ory_client.models.identity_credentials_oidc_provider import IdentityCredentialsOidcProvider
from ory_client.models.identity_credentials_password import IdentityCredentialsPassword
Expand Down
2 changes: 1 addition & 1 deletion ory_client/api/courier_api.py
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
Documentation for all public and administrative Ory APIs. Administrative APIs can only be accessed with a valid Personal Access Token. Public APIs are mostly used in browsers.
The version of the OpenAPI document: v1.15.0
The version of the OpenAPI document: v1.15.3
Contact: [email protected]
Generated by OpenAPI Generator (https://openapi-generator.tech)
Expand Down
2 changes: 1 addition & 1 deletion ory_client/api/events_api.py
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
Documentation for all public and administrative Ory APIs. Administrative APIs can only be accessed with a valid Personal Access Token. Public APIs are mostly used in browsers.
The version of the OpenAPI document: v1.15.0
The version of the OpenAPI document: v1.15.3
Contact: [email protected]
Generated by OpenAPI Generator (https://openapi-generator.tech)
Expand Down
Loading

0 comments on commit 35a6b1d

Please sign in to comment.